Filtered By
MAILORDER X
Codewords [filter]
United States (USA/US) X
Countries Mentioned [filter]
Results
10 Total
0.0

GCHQ Analytic Cloud Challenges

Document

Release Date: 2015-09-25 Document Date: 2012-05-14
This GCHQ presentation dated 14 May 2012 describes the agency receiving “more than 50 billion events [metadata records] per day” and some of the tools available for analysing that mass of data: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
gchq-analytic-cloud-challenges-p1-normal.gif: GCHQ Analytic Cloud Challenges Innovation Lead for Data, Analytics & Visualisation Engineering This information is exempt from Disclosure unde...
0.0

XKEYSCORE Workflows 2009

Document

Release Date: 2015-07-01 Document Date: 2009-03-05
This NSA presentation dated 5 March 2009 outlines the use of Workflows within XKeyScore and includes screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-workflows-2009-p1-normal.gif: XKEYSCORE Workflows 05 March 2009 i3I SECRET//COMINT//REL TO USA, AUS, CAN, GBR, MZL i —* DERIVED FROM: NSA/CSSM 1-52 DATED: 20070108 ...
0.0

TRAFFICTHIEF Configuration Readme

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration information for TRAFFICTHIEF, the live alerts element of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
trafficthief-readme-p1-normal.gif: SECRET//REL TO USA, FVEY (U//FOUO) TRAFFICTHIEF Configuration Read Me (U) Overview (S//REL) TRAFFICTHIEF (TT) is the NSA corporate alerting and tippin...
0.0

An Easy Way to Win: Using SIGINT to Learn about New Viruses (Project Camberdada)

Document

Release Date: 2015-06-22 Document Date: 2010-01-01
This 2010 NSA presentation describes Project Camberdada, an attempt to subvert popular antivirus software by means of surveilling email traffic: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL An Eas Using S about P fwmuuuu IGINT to Learn iew Viruses Project CAMBERDADA ByHH, 1412 (IAD) V252|| Derived From: NSA/CSSM...
0.0

Intro to the VPN Exploitation Process

Document

Release Date: 2014-12-28 Document Date: 2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
0.0

XKEYSCORE Workflows 2011

Document

Release Date: 2015-07-01 Document Date: 2011-09-19
This NSA presentation dated 19 September 2011 outlines the use of Workflows within XKeyScore and includes screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-workflows-2011-p1-normal.gif: XKEYSCORE Workflows 19 September 2011 SECRET7/COMINT//REL TO USA, AUS, CAN, GBR, MZL i —* DERIVED FROM: NSA/CSSM 1-52 DATED: 20070108...
0.0

UTT Configuration README

Document

Release Date: 2015-07-01
This undated NSA technical document provides information about the Universal Targeting Tool (UTT), “a mission critical component of the TURBULENCE architecture”: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
utt-config-readme-p1-normal.gif: SECRET//REL TO USA, FVEY (U) UTT Configuration README (U) Overview (S//SI//REL) The Unified Targeting Tool (UTT) makes it possible to transition from to...
0.0

Fielded Capability: End-to-End VPN SPIN 9 Design Review

Document

Release Date: 2014-12-28
This undated NSA presentation describes the Spin 9 system for decrypting VPN data: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
The overall classification for this brief is: TOPSECRET//COMINT//REL USA, AUS, CAN, GBR, NZL//20320108 SPIN 9 Design Review TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL//20320108 VPN ...
0.0

VALIANTSURF WikiInfo page

Document

Release Date: 2014-12-28
This undated page from NSA’s internal WikiInfo describes VALIANTSURF “the coverterm for the development of Data Network Cipher (DNC) exploitation capabilities in TURMOIL”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
VALIANTSURF - Wikiinfo The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEYHOLE//ORCON/PROPIN/RELIDO/REL TO USA, FVEY * TOP SECRET1/SI/10RCON1REL TO USA, FVEY ...
0.0

Net Defense from Encrypted Communications

Document

Release Date: 2014-12-28
This February 2012 presentation from NSA’s Technology Directorate describes a system codenamed BLUESNORT and its relationship to associated systems: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
(U//FOUO) Net Defense from Encrypted Communications irt i ir\ / 1 HI 1 SECRET//SI//REL TO USA, FVEY Increment 3 Requirement SYSREQ10322.2 (S//REL) TURMOIL shall reinject decrypted ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh