DocumentRelease Date: 2014-05-13 Document Date: 2012-12-31
This 31 December 2012 post from the NSA’s intranet describes the scale of the metadata records handled by the SHELLTRUMPET analysis tool: see the book No Place To Hide, 13 May 2014.
Page 100 (S//SI//REL TO USA, FVEY) SHELLTRUMPET Processes it|'s One Trillionth Metadata Record (S//SI//REL TO USA, FVEY) On December 21, 2012 SHELLTRUMPET processed its One Trillionth meta...
DocumentRelease Date: 2015-06-04 Document Date: 2012-01-25
This NSA slide from a 2012 presentation on Cyber 702 Authorities shows that the agency’s authority to undertake warantless wiretapping of US persons’ internet traffic was extended over the course of 2012: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.
> Spring 2008 - CNCI FYDP Becomes Real. > July 2008 - FISA Amendments Act; CT Cert, first, Foreign Governments Cert in Sept. > 5. > 2010 to 2011 - Low-Profile TURMOIL @ 10 Gbps deployed w...
DocumentRelease Date: 2016-08-19 Document Date: 2011-09-26
This 26 September 2011 article from the NSA’s internal newsletter Special Source Operations News discusses the delivery of QUANTUMINSERT malware to a target in Pakistan: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
(TS//SI//NF) DGO Enables Endpoint Implants via QUANTUMTHEORY By [[REDACTED]] on 2011-09-26 1548 (TS//SI//NF) In another example of the emerging collaboration between the Endpoint and Midpoint ...