Filtered By
United States (USA/US) X
Countries Mentioned [filter]
Internet Metadata X
Document Topic [filter]
United Kingdom X
Countries Shared With [filter]
Results
9 Total
0.0

MHS and GCHQ “Get in the Game with Target Development for World of Warcraft Online Gaming”

Document

Release Date: 2013-12-09 Document Date: 2008-01-01
An NSA document from 2008 shows that efforts to collect data from players of World of Warcraft started that year with the development of specialised exploits by GCHQ. The operation was based at Menwith Hill in the UK: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 […]
TOP SECRET//COMINT//REL TO USA, FVEY (TS//SI//REL) MHS and GCHQ “Get in the Game” with Target Development for World of Warcraft Online Gaming (TS//SI//REL) Although online gaming may seem...
0.0

Transnational DNI Training

Document

Release Date: 2018-03-01
This undated NSA instructional presentation, along with instructor’s notes, provides a briefing on metadata sharing between the Five Eyes: see the Intercept article How London’s 7/7 Bombings Led to “Unprecedented” Surveillance Tactics, 1 March 2018.
TOPSECRET//COMINT/REL TO USA, AUS, CAN, GBR, NZL//20291123 (U) Instructional Content/Activities (U) Instructor Notes - (U) This lesson will provide you with an overview of sensitive ...
0.0

Summary of DNR and DNI Co-Travel Analytics

Document

Release Date: 2013-12-10 Document Date: 2012-10-01
This 24 page white paper dated 1 October 2012 describes and evaluates some of the Co-Traveller tools the NSA and partner agencies uses to analyse phone location data: see the Washington Post article New documents show how the NSA infers relationships based on mobile location data, 10 December 2013.
TOP SECRET//COMINT//REL TO USA, FVEY Summary of DNR and DNI Co-Travel Analytics S2I5 1 October 2012 Contact information TOP SECRET//COMINT//REL TO USA, FVEY TOP SECRET//COMINT//R...
0.0

SYNAPSE Data Model

Document

Release Date: 2013-09-28
This slide from an undated NSA presentation demonstrates how the agency uses email and phone data to analyse the social networks of targets (the “Agent” in the diagram): see the New York Times article N.S.A. Gathers Data on Social Connections of U.S. Citizens, 28 September 2013.
SECRET//SI//REL TO USA FVEY (S//SI//REL USA, FVEY) SYANPSE Data Model CUSSTXATWt SKKTAKOMiNVMl TO US*. M». OK, •». kftj IMM: 1« Paki 5 9 'P>rvr/*»^ <* Page 13 SECRET//SI//R...
0.0

HTTP Activity vs. User Activity

Document

Release Date: 2015-07-01 Document Date: 2009-06-19
This NSA presentation from 19 June 2009 explains the metadata capabilities of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL m V HTTP Activity vs User Activity 19 June 2009 Derived From: NSA/CSSM 1-52 Bated :l2007i MM TOP SEC...
0.0

NSA: How Network Mapping is Helping to Target the Credit Card Authorization Networks

Document

Release Date: 2013-09-16 Document Date: 2010-01-01
These three slides from an NSA presentation made for the 2010 SIGDEV conference show that the agency is actively targeting payments networks: see the Der Spiegel article ‘Follow the Money’: NSA Monitors Financial World, 13 September 2013.
(S//REL TO USA, FVEY) NSA: How Network Mapping is Helping to Target the Credit Card Authorization Networks (U//FOUO) NSA, Network Analysis Center 2010 SIGDEV Conference 09/13/13 SE...
0.0

Full Log vs. HTTP

Document

Release Date: 2015-07-01 Document Date: 2009-06-11
This NSA presentation from 11 June 2009 explains the scope of metadata collection within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Log vs. HTTP 11 June 2009 * WHv:i DERIV TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//...
0.0

Finding and Querying on Document Metadata

Document

Release Date: 2015-07-01 Document Date: 2009-04-01
This NSA presentation from April 2009 explains how analysts can make use of document metadata available through XKeyScore, together with worked examples and screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Finding and Querying on Document Metadata tooz|/ 1 Booz|Allen| Hamilton Sigint Development Support / SIGINT Technica...
0.0

ICREACH in the Black Budget

Document

Release Date: 2014-08-25
These extracts from the Congressional Budget Justification for the financial year 2013 show that increased funding was sought for ICREACH: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
[S//REL TO USA. FVEY) Provide 1C analysts with access to a wider set of shareable data through the ICREACH Application. ICREACH allows IC analysts the ability to perform more comprehensive analys...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh