Filtered By
OAKSTAR X
Codewords [filter]
United States (USA/US) X
Countries Mentioned [filter]
Results
6 Total
0.0

OAKSTAR Travel Handbook: A Guide for Traveling

Document

Release Date: 2018-03-20 Document Date: 2013-03-01
This internal document for NSA employees dated 1 March 2013 provides a guide for visiting facilities related with the OAKSTAR programme,which are largely based in the United States, save for the MONKEYROCKET source, which has information forwarded to the European Technical Center in Germany: see the Intercept article The NSA Worked To “track Down” Bitcoin […]
TOP SECRET//COMINT//NOFORN (U) OAKSTAR Travel Handbook: A Guide for Traveling Initials Revision 20060925 Initial draft template 20061124 Initial draft for site 20061130 ...
0.0

FAIRVIEW TDY Handbook

Document

Release Date: 2016-11-16 Document Date: 2013-02-06
This internal document for NSA employees dated 6 February 2013 provides a guide for visiting facilities related with the FAIRVIEW programme, including the TITANPOINTE building in New York City: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20301121 FAIRVIEW TDY Handbook (U) A guide for traveling to Site Last Updated: 6 February 2013 POC: I Derived From: NSA/CSSM 1-52 Date...
0.0

SHELLTRUMPET Processes it’s One Trillionth Metadata Record

Document

Release Date: 2014-05-13 Document Date: 2012-12-31
This 31 December 2012 post from the NSA’s intranet describes the scale of the metadata records handled by the SHELLTRUMPET analysis tool: see the book No Place To Hide, 13 May 2014.
Page 100 (S//SI//REL TO USA, FVEY) SHELLTRUMPET Processes it|'s One Trillionth Metadata Record (S//SI//REL TO USA, FVEY) On December 21, 2012 SHELLTRUMPET processed its One Trillionth meta...
0.0

Update software on all Cisco ONS nodes

Document

This NSA report dated 11 April 2014 describes the difficulties with the network switches the agency had compromised on Cisco devices in order to collect data from Cisco customers: see the book No Place To Hide, 13 May 2014.
Page 150 TOP SECRET//COMINT//REL TO USA, FVEY (Report generated on:4/11/2013 3:31:05PM ) NewCrossProgram | Active ECP Count: | i~~| CrossProgram-1-13 New ECP Lead: I name redacted"! ...
0.0

Special Source Operations Weekly – 14 March 2013

Document

Release Date: 2014-06-18 Document Date: 2013-03-14
This excerpt from the 14 March 2013 edition of internal NSA newsletter SSO Weekly describes an incident on 12 March where “unwitting” contractors discovered a cable tap known as WHARPDRIVE, which had to be discreetly reinstalled and provides details about the Breckenridge access point that corroborate the identification of the NSA’s corporate partner STORMBREW as […]
UNCLASSIFIED//FOR OFFICIAL USE ONLY 14 MARCH 2013 Special Source Operations Watkly UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY (U) CORPORATE TEAM ...
0.0

Cyber Threats and Special Source Operations

Document

Release Date: 2015-08-15 Document Date: 2013-03-22
This NSA Special Source Operations presentation from 22 March 2013 supplies a detail about the Breckenridge access point that supports the identification of the corporate partner codenamed STORMBREW as US telecommunications company Verizon: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN TOPSECRET//SI//REL USA, Cyber Threats and Special Source Operations A Current Perspective for NTOC March 22 2013 Classified...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh