Results
5 Total
0.0
The Unofficial XKEYSCORE User Guide
Document
Release Date:
2015-07-01
This 27-page NSA document, authored by a consultant from contractor Booz Allen Hamilton, provides a step-by-step guide to using XKeyScore, together with screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
unofficial-xks-user-guide-p1-normal.gif:
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108
The Unofficial XKEYSCORE User Guide
E92 - ADET
Consultant, Booz Allen Hamilton
Th...
0.0
DNI 101 How Do I Begin Analyzing a Target’s Email Address?
Document
Release Date:
2015-07-01
This undated NSA document provides a decision tree for the analysis of email addresses, IP addresses, cookies and phone numbers in XKeyScore and other agency tools: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//20291123
DNI101
How Do I Begin Analyzing a Target's Email Address?
TOP SECRET//COMINT//20291i23
[ =Tool/Database^ What Things Are Found Doing DNI Analysis and What...
0.0
HTTP Activity vs. User Activity
Document
Release Date:
2015-07-01
Document Date:
2009-06-19
This NSA presentation from 19 June 2009 explains the metadata capabilities of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL
m
V
HTTP Activity vs
User Activity
19 June 2009
Derived From: NSA/CSSM 1-52
Bated :l2007i
MM
TOP SEC...
0.0
Full Log vs. HTTP
Document
Release Date:
2015-07-01
Document Date:
2009-06-11
This NSA presentation from 11 June 2009 explains the scope of metadata collection within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123
Log vs. HTTP
11 June 2009
* WHv:i
DERIV
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123
TOP SECRET//...
0.0
Internet Anonymity 2011
Document
Release Date:
2014-12-28
This NSA presentation from 2011 gives an overview of anonymising technologies, including Tor: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
• NSA (S31323)
TOP SECRET//COMINT REL TO USA,FVEY
ÊF
1
M r-
(U) Many Possible Meanings/lnterpretations
(S//REL) Simply Not Using Real Name for Email
(S//REL) Private Forum w...