Filtered By
CADENCE X
Codewords [filter]
Top Secret X
Classification [filter]
Results
7 Total
0.0

SIGINT Development Support II Program Management Review

Document

Release Date: 2016-08-19 Document Date: 2013-04-24
Four slides taken from a 24 April 2013 NSA presentation detail how SECONDDATE man-in-the-middle attacks were used against targets in Pakistan and Lebanon: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//SI//NOFORN The overall classification of this brief is (U) SIGINT Development Support II Program Management Review ► 24 April 2013 TOP SECRET//COMINT//NOFORN Derived Fro...
0.0

Introduction to XKS Application IDs and Fingerprints

Document

Release Date: 2015-07-01 Document Date: 2009-08-27
This 60-page NSA presentation from 27 August 2009 explains the use of different kinds of metadata tags in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Application IDs and Fingerprints 27 August 2009 .... ‘s 01 Ol A l • DERIVED FROM: NSA/CSSM...
0.0

DNI 101 How Do I Begin Analyzing a Target’s Email Address?

Document

Release Date: 2015-07-01
This undated NSA document provides a decision tree for the analysis of email addresses, IP addresses, cookies and phone numbers in XKeyScore and other agency tools: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//20291123 DNI101 How Do I Begin Analyzing a Target's Email Address? TOP SECRET//COMINT//20291i23 [ =Tool/Database^ What Things Are Found Doing DNI Analysis and What...
0.0

An Easy Way to Win: Using SIGINT to Learn about New Viruses (Project Camberdada)

Document

Release Date: 2015-06-22 Document Date: 2010-01-01
This 2010 NSA presentation describes Project Camberdada, an attempt to subvert popular antivirus software by means of surveilling email traffic: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL An Eas Using S about P fwmuuuu IGINT to Learn iew Viruses Project CAMBERDADA ByHH, 1412 (IAD) V252|| Derived From: NSA/CSSM...
0.0

Intro to the VPN Exploitation Process

Document

Release Date: 2014-12-28 Document Date: 2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
0.0

RAMPART-A Sites

Document

Release Date: 2014-06-18
These three undated NSA Special Source Operation slides supply details on selected RAMPART-A cable access sites: see the Intercept article How Secret Partners Expand NSA’s Surveillance Dragnet, 18 June 2014.
TOP SECRET//COMINT//NOFORN RAMPART A Sites Five sites, 4 with a Trusted 3rd Party Partner ■ US-3127!VH AZUREPHOENIX**4mb BW/1 Ogb/day ■ US-3145/KX MOONLIGHTPATH** - ~2mb BW/5gb/day ...
0.0

Finding and Querying on Document Metadata

Document

Release Date: 2015-07-01 Document Date: 2009-04-01
This NSA presentation from April 2009 explains how analysts can make use of document metadata available through XKeyScore, together with worked examples and screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Finding and Querying on Document Metadata tooz|/ 1 Booz|Allen| Hamilton Sigint Development Support / SIGINT Technica...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh