DocumentRelease Date: 2015-07-01 Document Date: 2009-10-15
This NSA presentation from 15 October 2009 explains how analysts can exploit the products of the agency’s CNE hacking operations within XKeyScore and provides examples with screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
CNE Analysis in XKEYSCORE 15 October 2009 email@example.com firstname.lastname@example.org) y >M 1-5 TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL DERIVED F ROM: Ñ WCSSM 1-52 DATED: 2...
DocumentRelease Date: 2014-03-12 Document Date: 2009-01-01
This slide from a 2009 presentation from the NSA’s Technology Directorate explains how Turbine’s “high-level tasking” effectively automates much of the agency’s offensive operations: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TECHNOLOGY DIRECTORATE Analysis of Converged Data Converged data leads to better analysis, which leads to more focused tasking Note: Our goals for high-level tasking are to relieve the ...