DocumentRelease Date: 2015-07-01
This undated NSA technical document provides configuration instructions for DEEPDIVE, a system that can be integrated with XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
CONFIDENTIAL (U//FOUO) DEEPDIVE Configuration Read Me (U) Overview (C) The purpose of this document is to provide procedures to configure an XKEYSCORE server as a DEEPDIVE server. DEEPD...
DocumentRelease Date: 2016-11-16
This undated NSA presentation describes SKIDROWE, a FORNSAT operation that surveils signals being sent to and from satellites: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL Low Speed DNI processing solution TOP SECRET//COMINT// yJ SKIDROWE Components WEALTHYCLUSTER to TURNWEALTHY Capabilities o...
DocumentRelease Date: 2013-12-30
These pages from an NSA internal catalogue describe the tools available to the agency in 2008: see the Der Spiegel article NSA’s Secret Toolbox: Unit Offers Spy Gadgets for Every Need, 30 December 2013
S3222_DEITYBOUNCE.jpg: SECRET//COMINT//REL TO USA, FVEY DEITYBOUNCE ANT Product Data (TS//SI//REL) DEITYBOUNCE provides software application persistence on Dell PowerEdge servers by exp...
ANGRYNEIGHBOR, ARKSTREAM, BANANAGLEE, BLINDDATE, BULLDOZER, CANDYGRAM, CHIMNEYPOOL, CONJECTURE, COTTONMOUTH (CM), CROSSBEAM, CYCLONE Hx9, DANDERSPRITZ, DEITYBOUNCE, DROPOUTJEEP, ENTOURAGE, GENESIS, GENIE, GOPHERSET, GOTHAM, GOURMETTROUGH, HALLUXWATER, HEADWATER, HOLLOWPOINT, HOWLERMONKEY (HM), IRATEMONK, JETPLOW, JUNIORMINT, KONGUR, LOUDAUTO, MOCCASIN, MONKEYCALENDAR, NIGHTSTAND, NIGHTWATCH, OLYMPUS, PHOTOANGLO, PICASSO, QUANTUM, RAGEMASTER, ROCKYKNOB, SOUFFLETROUGH, SPECULATION, SWAP, TAWDRYYARD, TOTECHASER, TOTEGHOSTLY, TRINITY, TURBOPANDA, TURBULENCE (TU), TWISTEDKILT, TYPHON, TYPHON HX, UNITEDRAKE, VAGRANT, VIEWPLATE, WATERWITCH, WISTFULTOLL, ZESTYLEAK
DocumentRelease Date: 2015-07-01 Document Date: 2011-03-01
This NSA presentation from March 2011 discusses the use of the XKeyScore tool for countering foreign CNE attacks: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-for-counter-cne-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, FVEY Using the XKS CNE dataset and a DISGRUNTLEDDUCK fingerprint, we now see at least 21 TAO boxes with evidence of this in...
DocumentRelease Date: 2015-07-01
This undated NSA technical document provides detailed information for performing searches within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.s
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL Guide to using Contexts in XKS Fingerprints Version 1.0 Example 1 $a = cc('pk') and (web_search('jihad') or document_body('planning for ...
DocumentRelease Date: 2014-06-18 Document Date: 2012-09-19
This internal NSA post dated 19 September 2012, describes GCHQ’s operation Tempora which, make “more than 40 billion pieces of content a day” available to analysts from both agencies: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
(C//REL) TEMPORA -- "The World s Largest XKEYSCORE" - Is Now Available to Qualified NSA Users (U//FOUO) NSA Integree at GCIIQ Run Date: 09/19/2012 (U//FOUO) SIGINT analysts: We have all...