Results
3 Total
0.0
The Unofficial XKEYSCORE User Guide
Document
Release Date:
2015-07-01
This 27-page NSA document, authored by a consultant from contractor Booz Allen Hamilton, provides a step-by-step guide to using XKeyScore, together with screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
unofficial-xks-user-guide-p1-normal.gif:
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108
The Unofficial XKEYSCORE User Guide
E92 - ADET
Consultant, Booz Allen Hamilton
Th...
0.0
CNE Analysis in XKeyScore
Document
Release Date:
2015-07-01
Document Date:
2009-10-15
This NSA presentation from 15 October 2009 explains how analysts can exploit the products of the agency’s CNE hacking operations within XKeyScore and provides examples with screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
CNE Analysis in
XKEYSCORE
15 October 2009
xkeyscore@nsa.ic.gov
l@nsa.ic.gov)
y
>M 1-5
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL
DERIVED F ROM: Ñ WCSSM 1-52
DATED: 2...
0.0
A new intelligent command and control capability
Document
Release Date:
2014-03-12
This extract from an undated NSA document describes the planned capability of the automated malware injection system Turbine as extending to “potentially millions of implants”: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
(TS//SI//REL) A new intelligent command and control capability designed to manage a very large number of covert implants for
active SIGINT and active Attack that reside on the GENIE covert infras...