Filtered By
XKEYSCORE (XKS) X
Codewords [filter]
France (FRA/FR) X
Countries Mentioned [filter]
Results
4 Total
0.0

DEFIANTWARRIOR and the NSA’s Use of Bots

Document

Release Date: 2015-01-17 Document Date: 2010-05-24
This 24 May 2010 NSA presentation describes the ways the agency uses botnets (“bot herding”): see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL USA, FVEY DEFIANTWARRIO R 7 / //and the ; NSA's Uè^ojÆotá/ Overall Classification: TOP SECRET//COMINT//REL FVEY Current As Of: 24 May 2010 Derived From: NSA/CSS...
0.0

THIEVING MAGPIE – Using on-board GSM/GPRS to track targets

Document

Release Date: 2014-05-13 Document Date: 2012-01-01
These slides from a 2012 GCHQ presentation outline the progress the agency has made in intercepting mobile phone calls made on board commercial aircraft: see the book No Place To Hide, 13 May 2014.
THIEVING MAGPIE Using on-board GSM/GPRS services to track targets TOP SECRET//COMINT//REL TO USA, FVEY STRAP 1 This information is exempt from disclosure under the Freedom of Infor ____...
0.0

GCSB Sigint Development Quarterly Report

Document

Release Date: 2015-03-05 Document Date: 2009-07-01
This GCSB report from July 2009 describes the move towards “full collection” at the agency’s Waihopai, progress against several named targets and “2nd party sharing” arrangements via XKeyScore: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 March 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL GCSB SIGINT Development Quarterly Report Quarterly Report: 002/09 J uly 2009 To: Deputy Director Signals Intelligence Target tele...
0.0

DAPINO GAMMA Gemalto Yuaawaa

Document

Release Date: 2015-02-19 Document Date: 2011-01-01
This Wiki page from 2011 details aspects of GCHQ’s DAPINO GAMMA operation against mobile SIM manufacturer Gemalto: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
[edit] Other Gemalto Yuaawaa - secure file sharing service identified, apparently used by gemalto employees- maybe just as testers? Findings from JTRIG research identified as a Gem...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh