Results
85 Total
0.0
DEFIANTWARRIOR and the NSA’s Use of Bots
Document
Release Date:
2015-01-17
Document Date:
2010-05-24
This 24 May 2010 NSA presentation describes the ways the agency uses botnets (“bot herding”): see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL USA, FVEY
DEFIANTWARRIO R 7
/ //and the ;
NSA's Uè^ojÆotá/
Overall Classification: TOP SECRET//COMINT//REL FVEY
Current As Of: 24 May 2010
Derived From: NSA/CSS...
DEFIANTWARRIOR, FREEFLOW-compliant, INCENSER, ISLANDTRANSPORT (IT), OLYMPUS, PUZZLECUBE, QUANTUMBOT, TREASUREMAP (TM), TURBINE, TURBULENCE (TU), UNITEDRAKE, XKEYSCORE (XKS), STELLABLUE
0.0
BYZANTINE HADES: An Evolution of Collection
Document
Release Date:
2015-01-17
Document Date:
2010-06-01
This June 2010 NSA presentation for the SIGDEV conference describes efforts to trace a suspected Chinese cyber attack: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL
(S//REL)BYZANTINE HADES: An
Evolution of Collection
NTOC, V225
SIGINT Development Conference
June 2010
TOP SECRET//COMINT//REL TO...
0.0
TUTELAGE
Document
Release Date:
2015-01-17
This undated NSA presentation describes techniques for repurposing third party attack tools: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA,
FVEY
TOP SECRET//COMINT//REL TO USA,
TOP SECRET//COMINT//REL TO USA,
FVEY
Before TUTELAGE...
AFTERk
INTRUSION
Manual Analysis of Reporting Lo...
0.0
TRANSGRESSION Overview for Pod58
Document
Release Date:
2015-01-17
Document Date:
2010-02-07
This 7 February 2010 NSA presentation outlines techniques to “discover, understand, evaluate, and exploit foreign CNE/CNA exploits”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOPSECRET//COMINT//REL TO USA, FVEY
TRANSGRESSION Overview for Pod58
S31177
7 Feb 2010
DERIVED FROM: NSA/CSSM 1-52
DATED 08 JAN 2007
DECLASSIFY ON: 20320108
TOPSECRET//COMINT//REL T...
0.0
XKEYSCORE Workflows 2009
Document
Release Date:
2015-07-01
Document Date:
2009-03-05
This NSA presentation dated 5 March 2009 outlines the use of Workflows within XKeyScore and includes screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-workflows-2009-p1-normal.gif:
XKEYSCORE
Workflows
05 March 2009
i3I
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, MZL
i —*
DERIVED FROM: NSA/CSSM 1-52
DATED: 20070108
...
0.0
Tech Strings in Documents (aka Tech Extractor) 2009
Document
Release Date:
2015-07-01
Document Date:
2009-12-01
This December 2009 NSA presentation explains how keyword selection works within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-tech-extractor-2009-p1-normal.gif:
TOP SECRET//COMINT//REL TO USA. AUS, CAN, GBR. NZU/20291123
Tech Strings in
Documents
(aka Tech Extractor)
December 2009xks-tech-extractor-2009-p2...
0.0
Continued effort against the South Pacific region
Document
Release Date:
2015-03-05
Document Date:
2009-06-06
This extract from the NSA’s minutes of a June 2009 meeting at the agency’s headquarters in Fort Meade, where a GCSB officer was present: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 May 2015.
TOP SECRET//COMINT//REL10 USA, AUS, CAN, GBR, NZL
Continued effort against the South Pacific region - GCSB s access development
activities will be focused on the South Pacific region and entai...
0.0
Advanced HTTP Activity Analysis
Document
Release Date:
2015-07-01
Document Date:
2009-01-01
This 114-page NSA training presentation from 2009 explains how agency analysts can exploit HTTP traffic within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
Advanced HTTP Activity
Analysis
2009
Goal
The goal of this training is to get you
familiar with basic HTTP traffic and
understand how to target and expliot it
using X-KEYSCORE
Ag...
0.0
XKEYSCORE, Cipher Detection, and You!
Document
Release Date:
2013-12-11
Document Date:
2008-08-21
This presentation from NSA’s Mathematics Research Group, dated 21 August 2008 provides an introduction to the XKeyScore system’s data sources and fingerprinting capabilities: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
xks-cipher-detection-and-you-p1-normal.gif:
TOP SECRET//COMINT//REL TO USA, FVEY
, Cipher Detection, and You!
Mathematics Research Group
21 August 2008
TOP SECRET//COMINT//REL TO USA, F...
0.0
TRAFFICTHIEF Configuration Readme
Document
Release Date:
2015-07-01
This undated NSA technical document provides configuration information for TRAFFICTHIEF, the live alerts element of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
trafficthief-readme-p1-normal.gif:
SECRET//REL TO USA, FVEY
(U//FOUO) TRAFFICTHIEF
Configuration Read Me
(U) Overview
(S//REL) TRAFFICTHIEF (TT) is the NSA corporate alerting and tippin...
0.0
Tracking Targets on Online Social Networks
Document
Release Date:
2014-05-13
Document Date:
2009-09-01
This September 2009 NSA presentation outline some of the insights that analysts can gather from online social networks (OSNs) and show the XKeyScore interface for performing such searches: see the book No Place To Hide, 13 May 2014.
TOP SECRET//COMINT//REL TO USA, FVEY
(S//SI//REL) Tracking
Targets on Online
Social Networks
The overall classification of this briefing to TOP SECRET//COMINT//REL TO USA, FVEY
Online...
0.0
HTTP Activity in XKEYSCORE
Document
Release Date:
2015-07-01
Document Date:
2009-03-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123
HTTP Activity in
XKEYSCORE
March 2009
Derived From: NSA/QSSM 1-52
Dated: 200701 (T
Declassify On: 202911
...
0.0
Email Address vs User Activity
Document
Release Date:
2015-07-01
Document Date:
2009-06-24
This NSA presentation from 24 June 2009 explains how to use the email search functionality within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123
vs User Activity
24 June 2009
"»Ol 01
t » «4
Ha#f* IWt
De rived From: NSA/CSSM 1-52 ...
0.0
SIGINT Development Support II Program Management Review
Document
Release Date:
2016-08-19
Document Date:
2013-04-24
Four slides taken from a 24 April 2013 NSA presentation detail how SECONDDATE man-in-the-middle attacks were used against targets in Pakistan and Lebanon: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//SI//NOFORN
The overall classification of this brief is
(U) SIGINT Development Support II
Program Management Review
► 24 April 2013
TOP SECRET//COMINT//NOFORN
Derived Fro...
0.0
DNI Processing of RINGBILL Access
Document
Release Date:
2016-11-16
Document Date:
2013-04-23
This NSA technical memo from April 2013 describes deployments of agency personnel to the facility codenamed TITANPOINTE: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
TOP SECRET//COMINT//REL TO USA, FVEY
(Report generated on:4/23/2013 7:00:17AM )
Blarney-40-12 Work in Progress ECP Lead:
Title of Change: DNI Processing of RINGBILL Access
Site(s): TIT...
0.0
SPIN 15 VPN Story
Document
Release Date:
2014-12-28
This undated NSA document gives information on ongoing development of attacks against VPNs: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108
DRAFT
SPIN 15 VPN Story
VPN has two thrusts, one has high mission impacts and the other has high performance
and functionalit...
0.0
VALIANTSURF
Document
Release Date:
2014-12-28
These three undated NSA slides provide an overview of the VALIANTSURF system: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, FVEY
VALIANTSURF (VS):
VALIANTSURF Capability Level Beneficiaries
CES & LONGHAUL OTP & SSG TOPIs Link Access CES
A Key Recovery, no on-site decrypti...
0.0
APEX Active/Passive Exfiltration
Document
Release Date:
2015-01-17
Document Date:
2009-08-01
This NSA TURBULENCE presentation dated August 2009 explains the APEX method of combining passive with active methods to exfiltrate data from networks attacked: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Active/Passive Exfiltration
"go apex"
STDP: S32354 & T112, NCSC/C91
August 2009
OP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123
TOP SECRET//COMHMT//REL TO USA. AUS. CAN....
0.0
X-KEYSCORE as a SIGDEV tool
Document
Release Date:
2015-07-01
Document Date:
2009-01-01
This 2009 NSA presentation describes some of the plug ins available and the way the tool relates to other NSA methods for searching internet metadata, with XKeyScore having the broadest capability: see the book No Place To Hide, 13 May 2014.
xks-as-a-sigdev-tool-p1-normal.gif:
X-KEYSCORE as a SIGDEV tool
2009
■EBTxks-as-a-sigdev-tool-p2-normal.gif:
What is X-KEYSCORE?xks-as-a-sigdev-tool-p3-normal.gif:
TOP SECRET//COMINT//ORC...
0.0
XKEYSCORE Application IDs
Document
Release Date:
2015-07-01
This undated NSA presentation gives a technical introduction to the treatment of AppIDs within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-application-ids-brief-p1-normal.gif:
Classification: TOP SECRET//COMIIMT//ORCON//REL TO USA, FVEY//20291123
Classification: TOP SECRET//COMINT//ORCON//REL TO USA, FVEY//20291123
M - 1 *...
0.0
XKEYSCORE Appids & Fingerprints
Document
Release Date:
2015-07-01
This undated NSA presentation gives a technical introduction to the treatment of AppIDs within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-application-ids-p1-normal.gif:
XKEYSCORE
Appids & Fingerprints
xkeyscore@nsaxks-application-ids-p2-normal.gif:
• Syntax is similar to C:
functionCname', level, coptional info ) = 'se...
0.0
VoIP Configuration and Forwarding Read Me
Document
Release Date:
2015-07-01
This undated NSA technical document describes how to configure XKeyScore to send search results to NUCLEON, the agency’s database for voice data: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
voip-readme-p1-normal.gif:
SECRET//REL TO USA, FVEY
(U) VoIP Configuration
and Forwarding Read Me
(U) Overview
(U//FOUO) In the late 1990s, voice over IP (VoIP) emerged as an alternativ...
0.0
Using XKEYSCORE to Enable TAO
Document
Release Date:
2015-07-01
Document Date:
2009-07-16
This NSA presentation from 16 July 2009 explains how the XKeyScore system supports the agency’s Tailored Access Operations: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
using-xks-to-enable-tao-p1-normal.gif:
TOP SECRET//COMINT//REL TO USA. AUS, CAN. GBR. NZL//20291123
Ait* tuv.
Using XKEYSCORE
to Enable TAO
Booz I AJIen l Hamilton SDS Analyst
16 July ...
0.0
Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints
Document
Release Date:
2015-07-01
Document Date:
2010-05-01
This 61-page NSA presentation from May 2010 provides analysts with a guide to tracking individuals within XKeyScore using the system’s fingerprint capability: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL
Introduction to Context
Sensitive Scanning with
X-KEYSCORE Fingerprints
May 2010
TOP SECRET //COMINT //REL TO USA, AUS, CAN, GBR, NZL
...
0.0
Analyzing Mobile/Cellular DNI in XKeyScore
Document
Release Date:
2015-07-01
Document Date:
2009-05-01
This NSA presentation from May 2009 describes the procedure for analysing phone data within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015. analyzing-mobile-cellular-dni-in-xks
Analyzing
Mobile/Cellular DNI in
XKEYSCORE
May 2009
TOP SECRET//COMINT//REL TO USA, AUS, CAN. GBR. NZL//20291123
08
TOP SECRET/,'COMINT//REL TO USA, AUS, CAN, GBR, NZL
Mobile DNI
...
0.0
Profiling SSL and Attributing Private Networks
Document
Release Date:
2014-12-28
This undated GCHQ presentation introduces the FLYING PIG and HUSH PUPPY tools: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL
PROFILING SSL AND ATTRIBUTING
PRIVATE NETWORKS
An introduction to FLYING PIG and HUSH PUPPY
ICTR - Network Exploitation
GCHQ
T R
J...
0.0
VPN SigDev Basics
Document
Release Date:
2014-12-28
This undated NSA presentation describes how to perform attacks against VPNs: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL
(TS//SI//REL)VPN SigDev
Basics
S31244 - OTTERCREEK
Derived From: NSA/CSSM 1-52
Dated: 20070108
______Declassify On: 20341101
TOP S...
USD-1031TE, USD-1Q31TE, USF-790, USF-790, USF-790, USD-10D1TE, USD-10J1TE, USD-10D1TE, USF-790, UKC-12SW, UKC-125W, UKC-12SW, UKC-12SW, UKC-125W, UKC-125W, UKC-12SW, UKC-12SW, US-967J, UKC-12SW, UKC-12SW
0.0
Tech Strings in Documents (aka Tech Extractor) 2010
Document
Release Date:
2015-07-01
Document Date:
2010-04-01
This April 2010 NSA presentation explains how keyword selection works within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-tech-extractor-2010-p1-normal.gif:
TOP SECRET//COMINT//REL TO USA. AUS, CAN. GBR, NZL
Tech Strings in Documents
(aka Tech Extractor)
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZLx...
0.0
XKEYSCORE Search Forms
Document
Release Date:
2015-07-01
Document Date:
2009-03-01
This 49-page March 2009 NSA presentation explains how to conduct searches within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-search-forms-p1-normal.gif:
XKEYSCORE
Search Forms
March 2009
El
• *1
... ■
OK
l 1001
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, MZL
1-52
DATED: 20...
0.0
SIGDEV: Is It Time for a ‘Target Reboot’?
Document
Release Date:
2015-11-18
Document Date:
2011-03-23
This 23 March 2011 article from the internal NSA newsletter SIDToday describes an analyst’s surprise at discovering that the agency was collecting internal communications from Venezuelan energy company Petróleos de Venezuela (PDVSA): see the Intercept article Overwhelmed NSA Surprised To Discover Its Own Surveillance “Goldmine” on Venezuela’s Oil Executives, 18 November 2015.
sigdev-is-it-time-for-a-target-reboot-p1-normal.gif:
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION
IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
Welcome! Saturday, 10 Nov 2012
...