Results
8 Total
0.0
TUTELAGE
Document
Release Date:
2015-01-17
This undated NSA presentation describes techniques for repurposing third party attack tools: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA,
FVEY
TOP SECRET//COMINT//REL TO USA,
TOP SECRET//COMINT//REL TO USA,
FVEY
Before TUTELAGE...
AFTERk
INTRUSION
Manual Analysis of Reporting Lo...
0.0
Identifier Lead Triage with ECHOBASE
Document
Release Date:
2014-04-30
Document Date:
2012-06-01
This SIGDEV presentation dated June 2012 describes techniques for filtering very large datasets through the cloud-based GHOSTMACHINE framework. Cooperation between NSA and GCHQ during the 2012 London Olympics – the “Olympic Option” – is used as a case study: see the Intercept article British Spy Chiefs Secretly Begged to Play in NSA’s Data Pools, 30 […]
;---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------...
0.0
SSO GHOSTMACHINE Analytics
Document
Release Date:
2013-12-10
Excerpts from slides describing GHOSTMACHINE, the NSA Special Source Operations cloud-based analytics platform: see the Washington Post article New documents show how the NSA infers relationships based on mobile location data, 10 December 2013.
SSO GHOSTMACHINE Analytics
TOP SECRET//COMINT//NOFORN
Fascia Limit?
5,000M
4,000M -
3,000M -
2,000M -
1,000M -
OM
Hitting The Wall
Tuskattire Volume Totals
H CERF
...
0.0
SPINALTAP: Making Passive Sexy for Generation Cyber
Document
Release Date:
2015-01-17
This undated NSA Menwith Hill presentation describes SPINALTAP, a project to combine data from active operations and passive signals intelligence: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA, FVEY
/
'■%.^
(U//FOUO) SPINALTAP:
Making Passive Sexy for
Generation Cyber
TOP SECRET//COMINT//REL TO USA, FVEY
TOP SECRET//COMINT//REL TO USA, FVE...
UKJ-26, USJ-759A, UKJ-26, UKJ-260D, UKJ-260G, UKJ-26, UKJ-260D, DS-30G, DS-300, DS-300, DS-300, DS-300, UKJ-260, UKJ-260, UKJ-260, UKJ-260, UKJ-26CO, UKJ-260CI, UKJ-260CI, UKJ-260, UKJ-260, UKJ-260, UKJ-26CO, UKJ-260CI, UKJ-260, UKJ-260, UKJ-260, UKJ-2G0CI, UKJ-260CI, UKJ-260, UKJ-260, UKJ-260, UKJ-260CI, UKJ-260CI, UKJ-26CO, UKJ-260, USJ-759A, USJ-759A, USJ-759A, USJ-759A, USJ-759A, USJ-759A, USJ-759A, DS-300, DS-300, DS-300, DS-300, DS-300, DS-300, DS-300, DS-300, DS-300, DS-300, DS-300, DS-300, DS-300, DS-300, DS-300, US-972U, US-972U, UKC-302A, UKC-302A, UKC-3024, UKC-302A, USD-1079, UKC-3024, UKC-302A, UKC-302A, UKC-3024, UKC-3024, USJ-759A, USJ-759A, USJ-759, USJ-759, US-9664, US-9664, US-9664, US-9664, US-9664, US-9664, UKC-3024, UKC-3024, UKC-3024, US-968Z, UKC-3024, UKC-3024, USJ-759A, USJ-759, US-955A, US-96, US-966A, US-96, US-966A, US-966A, US-966A
0.0
How is Human Language (HTL) Progressing?
Document
Release Date:
2015-05-05
Document Date:
2011-09-06
This 6 September 2011 post from the NSA’s internal SIDToday newsletter describes progress in the agency’s speech-to-text capability over the course of the year: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
(S//SI//REL) How Is Human Language Technology (HLT) Progressing?
FROM: (U//FOUO)^^^H
Language Analysis Modernization Lead (S2)
Run Date: 09/06/2011
(S//SI//REL) Editor's intro: At the SI...
0.0
HIDDENSALAMANDER: Alerting and Characterization of Botnet Activity in TURMOIL
Document
Release Date:
2015-01-17
This undated NSA presentation describes techniques for detecting botnets: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
P SECRET//COMINT//REL TO USA, FVEY
HIDDENSALAMANDER
Alerting and Characterization of
_____iyiissiQr\]
CAPABILIT, ES
Botnet Activity in TURMOIL
Briefers:
SECRET//REL TO USA, FV...
0.0
Innov8 VoiceAnalytics Experiment Profile
Document
Release Date:
2018-01-19
Document Date:
2010-03-29
This GCHQ experiment profile from March 2010 proposes a test of the effectiveness of GCHQ and NSA voice recognition systems: see the Intercept article Finding Your Voice, 19 January 2018.
TOP SECRET
Experiment Profile
Experiment Name Voice Analytics Experiment Reference
Version 1.0 Date 29 March 2010
Experiment Owner Department T12
Experiment Start Date 5 July 2010 Exper...
0.0
Running Strategic Analytics Affecting Europe and Africa
Document
Release Date:
2014-06-18
This undated presentation from the NSA’s European Cryptologic Center explains some of the activities of the agency’s main European base: see the Der Spiegel article Terrorverdächtige: NSA nutzte Erkenntnisse aus Deutschland-Filiale für Tötungen, 15 June 2014.
(Uj Running btrategic
Analytics Affecting Europe
and Africa
The overall classification of this briefing is:
TOP SECRET//COM INT//REL USA, FVEYS//2D291
Region: Europe, Middle East
(Isra...