Filtered By
BLACKPEARL X
Codewords [filter]
Results
8 Total
0.0

Bad guys are everywhere, good guys are somewhere!

Document

Release Date: 2014-09-14
This undated NSA presentation sets out the network-mapping tool Treasure Map, and supplies information on some of the agency’s collection access points: see the Intercept article New Zealand Launched Mass Surveillance Project While Publicly Denying It, 15 September 2014.
Bad guys are everywhere, good guys are somewhere! NSA/CSS Threat Operations Center (NTOC) NTOC Technology Development TS//SI//REL TO USA, FVEY (U) NTOC • (U//FOUO) Operates under bot...
0.0

Network Shaping 101

Document

Release Date: 2016-06-28
This undated 81-page NSA presentation and accompanying handdrawn diagram, both produced by the author of ‘I hunt sys admins’ explains how a country’s entire network traffic could be fed into agency systems: see the Intercept article The Hunter, 28 June 2016.
Network-Shaping-101.pdf: TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 Network Shaping 101 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20320108 TOP SECRET...
0.0

DNI 101 How Do I Begin Analyzing a Target’s Email Address?

Document

Release Date: 2015-07-01
This undated NSA document provides a decision tree for the analysis of email addresses, IP addresses, cookies and phone numbers in XKeyScore and other agency tools: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//20291123 DNI101 How Do I Begin Analyzing a Target's Email Address? TOP SECRET//COMINT//20291i23 [ =Tool/Database^ What Things Are Found Doing DNI Analysis and What...
0.0

Private Networks are Important

Document

Release Date: 2014-05-13
This undated and redacted slide, taken from a presentation given by the NSA and GCHQ, names surveillance targets, some of which appear to be primarily economic in nature: see the book No Place To Hide, 13 May 2014.
Page 135 TOP SECRET//SI//REL TO USA, FVEY Private Networks are Important ) a Many targets use private networks. Google infrastructure SWIFT Network REDACTED REDACTED REDACTED Gazp...
0.0

Discovery SIGINT Targeting Scenarios and Compliance

Document

Release Date: 2014-02-18 Document Date: 2011-07-01
This page from the NSA intranet dated July 2011 supplies advice from the NSA Offices of General Counsel (OGC) and Oversight and Compliance (NOC) on the admissibility of targeting strategies against the users of popular websites (including WikLeaks and the Pirate Bay): see the Intercept article Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed […]
TOP SECRET//SI//REL TO USA, FVEY Navigation Main Page Community portal Recent changes Random page Help Toolbox What links here Related changes Upload file Special pages Printab...
0.0

Special Source Operations overview

Document

Release Date: 2013-11-04
This presentation gives an overview of the NSA’s programmes targeting the fibre optic cables that carry much of the world’s internet traffic. One slide gives a breakdown of which data sources form the basis of Presidential daily briefings. Another shows that the access point used to collect Yahoo and Google cloud data (MUSCULAR) is operated […]
TOP SECRET//COMINT//NOFORN Special Source Operations r The Cryptologic Provider of Intelligence from GlobalHigh-Capacity Telecommunications Systems P TOP SECRET//COMINT//NOFORN TO...
0.0

SSO Corporate Portfolio Overview

Document

Release Date: 2015-08-15
This undated NSA presentation, presented together with speaking notes, provides an introduction to the main cable access programmes facilitated by the agency’s corporate partners and specifies the relevant SIGADs: see the book No Place to Hide, 13 May 2014.
 SSO Corporate Portfolio Overview Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20361201 Agenda 2 What is SSO Corporate access collection? (TS//SI//NF) Access an...
0.0

What Your Mother Never Told You About SIGDEV Analysis

Document

Release Date: 2014-12-28
This undated presentation from NSA’s Network Analysis Center describes agency techniques for overcoming Virtual Private Networks (VPNs): see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
(s//si//rel) What Your Mother Never Told You About SIGDEV Analysis^^^^^^^ SSG21 Net Pursuit Network Analysis Center Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 2037040...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh