Filtered By
XKEYSCORE (XKS) X
Codewords [filter]
Results
121 Total
0.0

DNI Processing of RINGBILL Access

Document

Release Date: 2016-11-16 Document Date: 2013-04-23
This NSA technical memo from April 2013 describes deployments of agency personnel to the facility codenamed TITANPOINTE: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
TOP SECRET//COMINT//REL TO USA, FVEY (Report generated on:4/23/2013 7:00:17AM ) Blarney-40-12 Work in Progress ECP Lead: Title of Change: DNI Processing of RINGBILL Access Site(s): TIT...
0.0

Next Generation Events

Document

Release Date: 2015-09-25 Document Date: 2009-03-23
This GCHQ presentation from 23 March 2009 discusses the agency’s plan for “processing Events [metadata] at scale”: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
nge-anyst-exch-redacted-p1-normal.gif: TOP SECRET STRAP 1 Analysis Next Generation Events TOP SECRET STRAP 1 23 March 2009nge-anyst-exch-redacted-p2-normal.gif: TOP SECRET STRAP 1 ...
0.0

XKEYSCORE Workflows 2009

Document

Release Date: 2015-07-01 Document Date: 2009-03-05
This NSA presentation dated 5 March 2009 outlines the use of Workflows within XKeyScore and includes screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-workflows-2009-p1-normal.gif: XKEYSCORE Workflows 05 March 2009 i3I SECRET//COMINT//REL TO USA, AUS, CAN, GBR, MZL i —* DERIVED FROM: NSA/CSSM 1-52 DATED: 20070108 ...
0.0

Tech Strings in Documents (aka Tech Extractor) 2009

Document

Release Date: 2015-07-01 Document Date: 2009-12-01
This December 2009 NSA presentation explains how keyword selection works within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-tech-extractor-2009-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. AUS, CAN, GBR. NZU/20291123 Tech Strings in Documents (aka Tech Extractor) December 2009xks-tech-extractor-2009-p2...
0.0

XKEYSCORE, Cipher Detection, and You!

Document

Release Date: 2013-12-11 Document Date: 2008-08-21
This presentation from NSA’s Mathematics Research Group, dated 21 August 2008 provides an introduction to the XKeyScore system’s data sources and fingerprinting capabilities: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
xks-cipher-detection-and-you-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, FVEY , Cipher Detection, and You! Mathematics Research Group 21 August 2008 TOP SECRET//COMINT//REL TO USA, F...
0.0

TRAFFICTHIEF Configuration Readme

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration information for TRAFFICTHIEF, the live alerts element of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
trafficthief-readme-p1-normal.gif: SECRET//REL TO USA, FVEY (U//FOUO) TRAFFICTHIEF Configuration Read Me (U) Overview (S//REL) TRAFFICTHIEF (TT) is the NSA corporate alerting and tippin...
0.0

Tracking Targets on Online Social Networks

Document

Release Date: 2014-05-13 Document Date: 2009-09-01
This September 2009 NSA presentation outline some of the insights that analysts can gather from online social networks (OSNs) and show the XKeyScore interface for performing such searches: see the book No Place To Hide, 13 May 2014.
TOP SECRET//COMINT//REL TO USA, FVEY (S//SI//REL) Tracking Targets on Online Social Networks The overall classification of this briefing to TOP SECRET//COMINT//REL TO USA, FVEY Online...
0.0

HTTP Activity in XKEYSCORE

Document

Release Date: 2015-07-01 Document Date: 2009-03-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 HTTP Activity in XKEYSCORE March 2009 Derived From: NSA/QSSM 1-52 Dated: 200701 (T Declassify On: 202911 ...
0.0

Email Address vs User Activity

Document

Release Date: 2015-07-01 Document Date: 2009-06-24
This NSA presentation from 24 June 2009 explains how to use the email search functionality within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 vs User Activity 24 June 2009 "»Ol 01 t » «4 Ha#f* IWt De rived From: NSA/CSSM 1-52 ...
0.0

DEEPDIVE Configuration Read Me

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration instructions for DEEPDIVE, a system that can be integrated with XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
CONFIDENTIAL (U//FOUO) DEEPDIVE Configuration Read Me (U) Overview (C) The purpose of this document is to provide procedures to configure an XKEYSCORE server as a DEEPDIVE server. DEEPD...
0.0

Advanced HTTP Activity Analysis

Document

Release Date: 2015-07-01 Document Date: 2009-01-01
This 114-page NSA training presentation from 2009 explains how agency analysts can exploit HTTP traffic within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
Advanced HTTP Activity Analysis 2009 Goal The goal of this training is to get you familiar with basic HTTP traffic and understand how to target and expliot it using X-KEYSCORE Ag...
0.0

Continued effort against the South Pacific region

Document

Release Date: 2015-03-05 Document Date: 2009-06-06
This extract from the NSA’s minutes of a June 2009 meeting at the agency’s headquarters in Fort Meade, where a GCSB officer was present: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 May 2015.
TOP SECRET//COMINT//REL10 USA, AUS, CAN, GBR, NZL Continued effort against the South Pacific region - GCSB s access development activities will be focused on the South Pacific region and entai...
0.0

DEFIANTWARRIOR and the NSA’s Use of Bots

Document

Release Date: 2015-01-17 Document Date: 2010-05-24
This 24 May 2010 NSA presentation describes the ways the agency uses botnets (“bot herding”): see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL USA, FVEY DEFIANTWARRIO R 7 / //and the ; NSA's Uè^ojÆotá/ Overall Classification: TOP SECRET//COMINT//REL FVEY Current As Of: 24 May 2010 Derived From: NSA/CSS...
0.0

BYZANTINE HADES: An Evolution of Collection

Document

Release Date: 2015-01-17 Document Date: 2010-06-01
This June 2010 NSA presentation for the SIGDEV conference describes efforts to trace a suspected Chinese cyber attack: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (S//REL)BYZANTINE HADES: An Evolution of Collection NTOC, V225 SIGINT Development Conference June 2010 TOP SECRET//COMINT//REL TO...
0.0

TUTELAGE

Document

Release Date: 2015-01-17
This undated NSA presentation describes tecniques for repurposing third party attack tools: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT ■ Communications Security Establishment Canada Centre de la sécurité des télécommunications Canada CSEC SIGINT Cyber Discovery: Summary of the current effort ...
0.0

TRANSGRESSION Overview for Pod58

Document

Release Date: 2015-01-17 Document Date: 2010-02-07
This 7 February 2010 NSA presentation outlines techniques to “discover, understand, evaluate, and exploit foreign CNE/CNA exploits”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOPSECRET//COMINT//REL TO USA, FVEY TRANSGRESSION Overview for Pod58 S31177 7 Feb 2010 DERIVED FROM: NSA/CSSM 1-52 DATED 08 JAN 2007 DECLASSIFY ON: 20320108 TOPSECRET//COMINT//REL T...
0.0

CNE End Point Requirements

Document

Release Date: 2015-01-17
This undated GCHQ reference document enumerates the processes and tools analysts use for computer network exploitation: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET STRAP1 COMINT CNE End Point Requirements CATEGORY O Experimt O Refinemer O Bug Fix O ALL REQTYPE O Capability O Convergenc O Query O Taskir O Viewe Oall PRIOR...
0.0

SPIN 15 VPN Story

Document

Release Date: 2014-12-28
This undated NSA document gives information on ongoing development of attacks against VPNs: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 DRAFT SPIN 15 VPN Story VPN has two thrusts, one has high mission impacts and the other has high performance and functionalit...
0.0

VALIANTSURF

Document

Release Date: 2014-12-28
These three undated NSA slides provide an overview of the VALIANTSURF system: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, FVEY VALIANTSURF (VS): VALIANTSURF Capability Level Beneficiaries CES & LONGHAUL OTP & SSG TOPIs Link Access CES A Key Recovery, no on-site decrypti...
0.0

PTC Glossary

Document

Release Date: 2014-11-25
This undated screenshot from GCHQ’s internal GCWiki provides details of INCENSER, “a GERONTIC delivery from the NIGELLA access” – in other words, a supply of data arranged by Cable & Wireless from a rival company’s infrastructure: see the Süddeutsche Zeitung article Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts, 25 November 2014. Download […]
TOP SECRET STRAP 1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: page PTC Glossary F...
0.0

TEMPORA

Document

Release Date: 2014-06-18 Document Date: 2012-05-21
This page from GCHQ’s internal GCWiki, last edited in May 2012, provides background information on the agency’s “internet buffer business capability”: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
[edit] News BREAKING NEWS (May 2012) - The second tranche of 'deep dive' processing capability at RPC has gone live. In addition 2 extra lOG's are being processed at OPC. This brings the curre...
0.0

XKeyScoreTabs XKS Development

Document

Release Date: 2014-06-18
This page from GCHQ’s internal GCWiki provides a guide to the NSA’s XKeyScore tool: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
XKeyscoreTabs XKS Development Jump to: navigation. search N BWS Getting __ . I Using an ---- „ XKevscure Account Training XKS Development XKS Cuntacts Requirem...
0.0

Dragons, Shrimp, and XKEYSCORE: Tales from the Land of Brothers Grimm

Document

Release Date: 2014-06-18 Document Date: 2012-04-13
This internal NSA post dated 13 April 2012 from the European Cryptologic Center in Darmstadt, Germany recounts an “XKS training blitz”: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(U//FOUO) Dragons, Shrimp, and XKEYSCORE; Tales from the Land of Brothers Grimm European Cryptologic Center, SIGDEV (F22) Run Date: 04/13/2012 (S//REL) The European Cryptologic Center ...
0.0

Provision of XKeyScore software to the BfV

Document

Release Date: 2014-06-18
This short extract from an NSA document shows that cooperation with Germany’s intelligence services went as far as providing the country’s domestic intelligence service, the Federal Office for the Protection of the Constitution (BfV), with access to XKeyScore: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
exchange. [TS//SI//NF) Germany: Provision of XKEYSCORE software to the ES1V will expand their ability to support NSA as we jointly prosecute CT targets. Technical support forXKEYSCGRE will be...
0.0

Email Address Queries in XKeyScore

Document

Release Date: 2014-05-13
These two slides demonstrate how email search queries are conducted in XKeyScore: see the book No Place To Hide, 13 May 2014.
email1.jpg: Page 157 TOP SECRET,VCOWNTflREL TO U8A, AU8, CAN, OBR, NZL Creating Email Address Queries Enter usernames and domains into query Search: Email Addresses Quary Name ...
0.0

Royal Concierge

Document

Release Date: 2013-11-17
Two slides from a GCHQ presentation describe the Royal Concierge programme “a SIGINT driven hotel reservation tip-off service”: see the Der Spiegel article ‘Royal Concierge’: GCHQ Monitors Hotel Reservations to Track Diplomats, 17 November 2013.
image-568949-galleryV9-sitq1.jpg: TOP SECRET//COMINT//REL TO USA, AUS. CAN, GBR, NZL * ^CCHQ^ (TS//SI//REL) Contact mapping - tip-off to Diplomatic travel plans (TS//SI//REL) - ROYAL ...
0.0

Exploiting Foreign Lawful Intercept (LI) Roundtable

Document

Release Date: 2015-09-29 Document Date: 2012-01-01
This NSA presentation from 2012 discusses techniques for subverting “lawful intercept” systems used abroad: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
2012-lawful-intercept-redacted2-p1-normal.gif: TOP SECRET//SI//REL TO USA, FVEY (S//SI//REL) Exploiting Foreign Lawful Intercept (LI) Roundtable S31122 TOP SECRET//SI//REL TO USA, FVEY...
0.0

Tech Strings in Documents (aka Tech Extractor) 2010

Document

Release Date: 2015-07-01 Document Date: 2010-04-01
This April 2010 NSA presentation explains how keyword selection works within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-tech-extractor-2010-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. AUS, CAN. GBR, NZL Tech Strings in Documents (aka Tech Extractor) TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZLx...
0.0

XKEYSCORE Search Forms

Document

Release Date: 2015-07-01 Document Date: 2009-03-01
This 49-page March 2009 NSA presentation explains how to conduct searches within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-search-forms-p1-normal.gif: XKEYSCORE Search Forms March 2009 El • *1 ... ■ OK l 1001 SECRET//COMINT//REL TO USA, AUS, CAN, GBR, MZL 1-52 DATED: 20...
0.0

X-KEYSCORE as a SIGDEV tool

Document

Release Date: 2015-07-01 Document Date: 2009-01-01
This 2009 NSA presentation describes some of the plug ins available and the way the tool relates to other NSA methods for searching internet metadata, with XKeyScore having the broadest capability: see the book No Place To Hide, 13 May 2014.
xks-as-a-sigdev-tool-p1-normal.gif: X-KEYSCORE as a SIGDEV tool 2009 ■EBTxks-as-a-sigdev-tool-p2-normal.gif: What is X-KEYSCORE?xks-as-a-sigdev-tool-p3-normal.gif: TOP SECRET//COMINT//ORC...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh