Special Source Operations

Total Page:16

File Type:pdf, Size:1020Kb

Special Source Operations TOP SECRET//COMINT//NOFORN NATIONAL SECURITY AGENCY Special Source TOP SECRET//COMINT//NOFORN UNITED STATES OF Operations AMERICA SPECIAL SOURCE OPERATIONS Der Kryptologie-Anbieter für nachrichtendienstliche Informationen aus globalen Telekommunikationssystemen mit hoher Kapazität [Achtel-Note] TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT //NOFORN TOP SECRET//COMINT//NOFORN NATIONAL SECURITY Special Source AGENCY Operations UNITED STATES OF AMERICA Das Kabelprogramm heute Drei Ausländisch Zugriffsportfolios RAMPART-A (Drittpartner) WINDSTOP (Zweitpartner) Unternehmen Unilateral BLARNEY - FISA [unkenntlich gemacht] FAIRVIEW RAMPART-I/X STORMBREW RAMPART-T (ClanSIG) OAKSTAR [unkenntlich gemacht] PRISM MYSTIC FAA TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT //NOFORN NICHT ALS GEHEIM EINGESTUFT//AUSSCHLIESSLICH FÜR OFFIZIELLEN GEBRAUCH NATIONAL SECURITY NICHT ALS GEHEIM KLASSIFIZIERT//AUSSCHLIESSLICH FÜR OFFIZIELLEN GEBRAUCH AGENCY Special Source UNITED STATES OF Operations AMERICA Haste Glasfaser?? Bestehende und geplante unterseeische Glasfaserrouten weltweit NICHT ALS GEHEIM EINGESTUFT//AUSSCHLIESSLICH FÜR OFFIZIELLEN GEBRAUCH NICHT ALS GEHEIM KLASSIFIZIERT//AUSSCHLIESSLICH FÜR OFFIZIELLEN GEBRAUCH TOP SECRET//COMINT//NOFORN NATIONAL SECURITY Special Source AGENCY UNITED STATES OF Operations AMERICA TOP SECRET//COMINT//NOFORN Unglaubliche Herausforderungen … Wie findet man Zielinformationen in einem typischen Glasfaserkabel? 1 Kabel x 12 Stränge x 64 Wellenlängen x 10 Mia. Bit/Sek = 100 Millionen simultane Telefonie- oder Internetsitzungen Internationales Wachstum des Internets (Milliarden Bit/Sekunde) 6000 5000 4000 3000 2000 1000 0 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN NATIONAL SECURITY AGENCY Special Source UNITED STATES OF Operations AMERICA Ausländische Programme von SSO Partnerschaften mit ausländischen SIGINT-Partnern, um Zugang zu nachrichtendienstlichen Erkenntnissen aus dem Ausland Partnerschaften werden gemeinsam mit dem Foreign Affairs Directorate entwickelt TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN NATIONAL SECURITY AGENCY Special Source UNITED STATES OF Operations AMERICA RAMPART A (TS//SI//NF) Unkonventionelles Special-Access-Programm [für besonderen Zugang], das sich Drittpartnerschaften zu Nutze macht: Internationale Glasfaserleitungen mit hoher Kapazität, die wichtige Congestion Points [„Datenstau“-Punkte im Internet] in der ganzen Welt durchkreuzen Ausländische Partner bieten Zugriff auf Kabel und nutzen von den USA bereitgestellte Ausstattung Die USA stellen Geräte für den Transport, die Verarbeitung und die Analyse zur Verfügung Keine US-Erhebungen durch den Partner, keine Erhebungen des Gastlandes durch die USA – es GIBT Ausnahmen! Gemeinsame Aufgabenzuweisung und Sammlung TOP SECRET//COMINT//NOFORN SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL NATIONAL SECURITY AGENCY Special Source UNITED STATES OF Operations AMERICA Typische RAM-A-Konfiguration RAMPART-A – typische Operation USA LAND X [Satellit] Standort D/E Standort B Standort C NSA Verarbeitungs- Partneranalysten zentrum Standort A Internationales Kabel Zugriffspunkt SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL [Originalschaubild, s. o.] SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL NATIONAL SECURITY AGENCY Special Source UNITED STATES OF Operations AMERICA Kabel zu Datenbank LOPERS FASCIA DNR Switch Controller Front-End-Kabel DNI WC-2 & DEEP DIVE PINWALE Bestückung Bestückung TURMOIL MARINA TRAFFICTHIEF Überprüfung ACS TWISTEDPATH BLACKPEARL SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL .
Recommended publications
  • Mutual Watching and Resistance to Mass Surveillance After Snowden
    Media and Communication (ISSN: 2183-2439) 2015, Volume 3, Issue 3, Pages 12-25 Doi: 10.17645/mac.v3i3.277 Article “Veillant Panoptic Assemblage”: Mutual Watching and Resistance to Mass Surveillance after Snowden Vian Bakir School of Creative Studies and Media, Bangor University, Bangor, LL57 2DG, UK; E-Mail: [email protected] Submitted: 9 April 2015 | In Revised Form: 16 July 2015 | Accepted: 4 August 2015 | Published: 20 October 2015 Abstract The Snowden leaks indicate the extent, nature, and means of contemporary mass digital surveillance of citizens by their intelligence agencies and the role of public oversight mechanisms in holding intelligence agencies to account. As such, they form a rich case study on the interactions of “veillance” (mutual watching) involving citizens, journalists, intelli- gence agencies and corporations. While Surveillance Studies, Intelligence Studies and Journalism Studies have little to say on surveillance of citizens’ data by intelligence agencies (and complicit surveillant corporations), they offer insights into the role of citizens and the press in holding power, and specifically the political-intelligence elite, to account. Atten- tion to such public oversight mechanisms facilitates critical interrogation of issues of surveillant power, resistance and intelligence accountability. It directs attention to the veillant panoptic assemblage (an arrangement of profoundly une- qual mutual watching, where citizens’ watching of self and others is, through corporate channels of data flow, fed back into state surveillance of citizens). Finally, it enables evaluation of post-Snowden steps taken towards achieving an equiveillant panoptic assemblage (where, alongside state and corporate surveillance of citizens, the intelligence-power elite, to ensure its accountability, faces robust scrutiny and action from wider civil society).
    [Show full text]
  • What Is Xkeyscore, and Can It 'Eavesdrop on Everyone, Everywhere'? (+Video) - Csmonitor.Com
    8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com The Christian Science Monitor ­ CSMonitor.com What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) XKeyscore is apparently a tool the NSA uses to sift through massive amounts of data. Critics say it allows the NSA to dip into people's 'most private thoughts' – a claim key lawmakers reject. This photo shows an aerial view of the NSA's Utah Data Center in Bluffdale, Utah. The long, squat buildings span 1.5 million square feet, and are filled with super­ powered computers designed to store massive amounts of information gathered secretly from phone calls and e­mails. (Rick Bowmer/AP/File) By Mark Clayton, Staff writer / August 1, 2013 at 9:38 pm EDT Top­secret documents leaked to The Guardian newspaper have set off a new round of debate over National Security Agency surveillance of electronic communications, with some cyber experts saying the trove reveals new and more dangerous means of digital snooping, while some members of Congress suggested that interpretation was incorrect. The NSA's collection of "metadata" – basic call logs of phone numbers, time of the call, and duration of calls – is now well­known, with the Senate holding a hearing on the subject this week. But the tools discussed in the new Guardian documents apparently go beyond mere collection, allowing the agency to sift through the www.csmonitor.com/layout/set/print/USA/2013/0801/What-is-XKeyscore-and-can-it-eavesdrop-on-everyone-everywhere-video 1/4 8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com haystack of digital global communications to find the needle of terrorist activity.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • Jus Algoritmi: How the NSA Remade Citizenship
    Extended Abstract Jus Algoritmi: How the NSA Remade Citizenship John Cheney-Lippold 1 1 University of Michigan / 500 S State St, Ann Arbor, MI 48109, United States of America / [email protected] Introduction It was the summer of 2013, and two discrete events were making analogous waves. First, Italy’s Minister for Integration, Cécile Kyenge was pushing for a change in the country’s citizenship laws. After a decades-long influx of immigrants from Asia, Africa, and Eastern Europe, the country’s demographic identity had become multicultural. In the face of growing neo-nationalist fascist movements in Europe, Kyenge pushed for a redefinition of Italian citizenship. She asked the state to abandon its practice of jus sanguinis, or citizenship rights by blood, and to adopt a practice of jus soli, or citizenship rights by landed birth. Second, Edward Snowden fled the United States and leaked to journalists hundreds of thousands of classified documents from the National Security Agency regarding its global surveillance and data mining programs. These materials unearthed the classified specifics of how billions of people’s data and personal details were being recorded and processed by an intergovernmental surveillant assemblage. These two moments are connected by more than time. They are both making radical moves in debates around citizenship, though one is obvious while the other remains furtive. In Italy, this debate is heavily ethnicized and racialized. According to jus sanguinis, to be a legitimate part of the Italian body politic is to have Italian blood running in your veins. Italian meant white. Italian meant ethnic- Italian. Italian meant Catholic.
    [Show full text]
  • PRISM/US-984XN Overview
    TOP SFCRF.T//SI//ORCON//NOFORX a msn Hotmail Go« „ paltalk™n- Youffl facebook Gr-iai! AOL b mail & PRISM/US-984XN Overview OR The SIGAD Used Most in NSA Reporting Overview PRISM Collection Manager, S35333 Derived From: NSA/CSSM 1-52 April 20L-3 Dated: 20070108 Declassify On: 20360901 TOP SECRET//SI// ORCON//NOFORN TOP SECRET//SI//ORCON//NOEÛEK ® msnV Hotmail ^ paltalk.com Youi Google Ccnmj<K8t« Be>cnö Wxd6 facebook / ^ AU • GM i! AOL mail ty GOOglC ( TS//SI//NF) Introduction ILS. as World's Telecommunications Backbone Much of the world's communications flow through the U.S. • A target's phone call, e-mail or chat will take the cheapest path, not the physically most direct path - you can't always predict the path. • Your target's communications could easily be flowing into and through the U.S. International Internet Regional Bandwidth Capacity in 2011 Source: Telegeographv Research TOP SECRET//SI// ORCON//NOFORN TOP SECRET//SI//ORCON//NOEQBN Hotmail msn Google ^iïftvgm paltalk™m YouSM) facebook Gm i ¡1 ^ ^ M V^fc i v w*jr ComnuMcatiw Bemm ^mmtmm fcyGooglc AOL & mail  xr^ (TS//SI//NF) FAA702 Operations U « '«PRISM/ -A Two Types of Collection 7 T vv Upstream •Collection of ;ommujai£ations on fiber You Should Use Both PRISM • Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google Facebook, PalTalk, AOL, Skype, YouTube Apple. TOP SECRET//SI//ORCON//NOFORN TOP SECRET//SI//ORCON//NOEÛEK Hotmail ® MM msn Google paltalk.com YOUE f^AVi r/irmiVAlfCcmmjotal«f Rhnnl'MirBe>coo WxdS6 GM i! facebook • ty Google AOL & mail Jk (TS//SI//NF) FAA702 Operations V Lfte 5o/7?: PRISM vs.
    [Show full text]
  • SURVEILLE NSA Paper Based on D2.8 Clean JA V5
    FP7 – SEC- 2011-284725 SURVEILLE Surveillance: Ethical issues, legal limitations, and efficiency Collaborative Project This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no. 284725 SURVEILLE Paper on Mass Surveillance by the National Security Agency (NSA) of the United States of America Extract from SURVEILLE Deliverable D2.8: Update of D2.7 on the basis of input of other partners. Assessment of surveillance technologies and techniques applied in a terrorism prevention scenario. Due date of deliverable: 31.07.2014 Actual submission date: 29.05.2014 Start date of project: 1.2.2012 Duration: 39 months SURVEILLE WorK PacKage number and lead: WP02 Prof. Tom Sorell Author: Michelle Cayford (TU Delft) SURVEILLE: Project co-funded by the European Commission within the Seventh Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Commission Services) Executive summary • SURVEILLE deliverable D2.8 continues the approach pioneered in SURVEILLE deliverable D2.6 for combining technical, legal and ethical assessments for the use of surveillance technology in realistic serious crime scenarios. The new scenario considered is terrorism prevention by means of Internet monitoring, emulating what is known about signals intelligence agencies’ methods of electronic mass surveillance. The technologies featured and assessed are: the use of a cable splitter off a fiber optic backbone; the use of ‘Phantom Viewer’ software; the use of social networking analysis and the use of ‘Finspy’ equipment installed on targeted computers.
    [Show full text]
  • Data Epistemologies / Surveillance and Uncertainty Sun Ha Hong University of Pennsylvania, [email protected]
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 1-1-2016 Data Epistemologies / Surveillance and Uncertainty Sun Ha Hong University of Pennsylvania, [email protected] Follow this and additional works at: http://repository.upenn.edu/edissertations Part of the Communication Commons, Other Sociology Commons, and the Philosophy of Science Commons Recommended Citation Hong, Sun Ha, "Data Epistemologies / Surveillance and Uncertainty" (2016). Publicly Accessible Penn Dissertations. 1766. http://repository.upenn.edu/edissertations/1766 This paper is posted at ScholarlyCommons. http://repository.upenn.edu/edissertations/1766 For more information, please contact [email protected]. Data Epistemologies / Surveillance and Uncertainty Abstract Data Epistemologies studies the changing ways in which ‘knowledge’ is defined, promised, problematised, legitimated vis-á-vis the advent of digital, ‘big’ data surveillance technologies in early twenty-first century America. As part of the period’s fascination with ‘new’ media and ‘big’ data, such technologies intersect ambitious claims to better knowledge with a problematisation of uncertainty. This entanglement, I argue, results in contextual reconfigurations of what ‘counts’ as knowledge and who (or what) is granted authority to produce it – whether it involves proving that indiscriminate domestic surveillance prevents terrorist attacks, to arguing that machinic sensors can know us better than we can ever know ourselves. The present work focuses on two empirical cases. The first is the ‘Snowden Affair’ (2013-Present): the public controversy unleashed through the leakage of vast quantities of secret material on the electronic surveillance practices of the U.S. government. The es cond is the ‘Quantified Self’ (2007-Present), a name which describes both an international community of experimenters and the wider industry built up around the use of data- driven surveillance technology for self-tracking every possible aspect of the individual ‘self’.
    [Show full text]
  • Download Legal Document
    Case 1:15-cv-00662-TSE Document 168-33 Filed 12/18/18 Page 1 of 15 Wikimedia Foundation v. NSA No. 15-cv-0062-TSE (D. Md.) Plaintiff’s Exhibit 29 12/16/2018 XKEYSCORE: NSA's Google for the World's Private Communications Case 1:15-cv-00662-TSE Document 168-33 Filed 12/18/18 Page 2 of 15 XKEYSCORE NSA’s Google for the World’s Private Communications Morgan Marquis-Boire, Glenn Greenwald, Micah Lee July 1 2015, 10:49 a.m. One of the National Security Agency’s most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse. Today, The Intercept is publishing 48 top-secret and other classified documents about XKEYSCORE dated up to 2013, which shed new light on the breadth, depth and functionality of this critical spy system — one of the largest releases yet of documents provided by NSA whistleblower Edward Snowden. The NSA’s XKEYSCORE program, first revealed by The Guardian, sweeps up countless people’s Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is fed a constant flow of Internet traffic from fiber optic cables that make up the backbone of the world’s communication network, among other sources, for processing. As of 2008, the surveillance system boasted approximately 150 field sites in the United States, Mexico, Brazil, United Kingdom, Spain, Russia, Nigeria, Somalia, Pakistan, Japan, Australia, as well as many other countries, consisting of over 700 servers.
    [Show full text]
  • SSO Corporate Portfolio Overview
    SSO Corporate Portfolio Overview Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20361201 What is SSO's Corporate Portfolio? What data can we collect? Where do I go for more help? Agenda 2 What is SSO's Corporate Portfolio? What is SSO Corporate access collection? (TS//SI//NF) Access and collection of telecommunications on cable, switch network, and/or routers made possible by the partnerships involving NSA and commercial telecommunications companies. 3 Brief discussion of global telecommunications infrastructure. How access points in the US can collect on communications from "bad guy" countries (least cost routing, etc.) 4 Unique Aspects Access to massive amounts of data Controlled by variety of legal authorities Most accesses are controlled by partner Tasking delays (TS//SI//NF) Key Points: 1) SSO provides more than 80% of collection for NSA. SSO's Corporate Portfolio represents a large portion of this collection. 2) Because of the partners and access points, the Corporate Portfolio is governed by several different legal authorities (Transit, FAA, FISA, E012333), some of which are extremely time-intensive. 3) Because of partner relations and legal authorities, SSO Corporate sites are often controlled by the partner, who filters the communications before sending to NSA. 4) Because we go through partners and do not typically have direct access to the systems, it can take some time for OCTAVE/UTT/Cadence tasking to be updated at site (anywhere from weekly for some BLARNEY accesses to a few hours for STORMBREW). 5 Explanation of how we can collect on a call between (hypothetically) Iran and Brazil using Transit Authority.
    [Show full text]
  • Protecting Personal Data, Electronic Communications, and Individual
    Hastings Constitutional Law Quarterly Volume 42 Article 4 Number 3 Spring 2015 1-1-2015 The ewN Data Marketplace: Protecting Personal Data, Electronic Communications, and Individual Privacy in the Age of Mass Surveillance through a Return to a Property-Based Approach to the Fourth Amendment Megan Blass Follow this and additional works at: https://repository.uchastings.edu/ hastings_constitutional_law_quaterly Part of the Constitutional Law Commons Recommended Citation Megan Blass, The New Data Marketplace: Protecting Personal Data, Electronic Communications, and Individual Privacy in the Age of Mass Surveillance through a Return to a Property-Based Approach to the Fourth Amendment, 42 Hastings Const. L.Q. 577 (2015). Available at: https://repository.uchastings.edu/hastings_constitutional_law_quaterly/vol42/iss3/4 This Note is brought to you for free and open access by the Law Journals at UC Hastings Scholarship Repository. It has been accepted for inclusion in Hastings Constitutional Law Quarterly by an authorized editor of UC Hastings Scholarship Repository. For more information, please contact [email protected]. The New Data Marketplace: Protecting Personal Data, Electronic Communications, and Individual Privacy in the Age of Mass Surveillance Through a Return to a Property-Based Approach to the Fourth Amendment by MEGAN BLASS* I. Mass Surveillance in the New Millennium: Edward Snowden Versus The National Security Agency A. Watergate Fears Realized: National Security Agency Programs Exposed in 2013 Edward Snowden is now a household name.' He garnered global attention in 2013 when he claimed responsibility for leaking government documents that revealed unprecedented levels of domestic surveillance conducted by the National Security Agency ("NSA" or "the Agency"). 2 The information leaked by Mr.
    [Show full text]
  • Fiff-Kommunikation 4/2015
    Britta Schinzel NGOs – wir klagen an und fordern auf Das Projekt 11 TAGE berührt die Intentionen des FIfF und anderer gegen Überwachung, Cyberwar und Drohnenkrieg agitierender NGOs auf vielfältige Weise. Der virtuelle Angriff auf die Ratte aus dem Internet simuliert die Drohnen-Zielfindung; das von Florian Mehnert verwendete Mittel von Egoshootern aus der Spielewelt verweist auf die Vermischung der Gamification mit dem Training an modernen Waffensystemen; die Überwachung ist essentieller Teil von Cyberwar und Drohnenkrieg. Nicht zuletzt sind auch die gegen Mehnert instanziierten Shitstorms und Morddrohungen wichtige Themen für NGOs, die sich mit dem IT-Bereich beschäftigen. Hier werden einige dieser Punkte aufgegriffen. Einleitung kontrollstation in Nähe zum Einsatzgebiet, von wo aus er mit- tels Sichtdatenlink kontrolliert wird, und einer Satelliten-Kom- Es scheint zunehmend nötig, gegen Krieg, Waffenproduktion, munikationsverbindung für Operationen ausser Sichtweite. In und Überwachung zu agitieren, gesellschaftliches Bewusstsein der Bodenkontrollstation sitzt ein Pilot, der das System fern- schwerpunkt herzustellen bzw. zu schärfen, mehr noch, Einfluss auf Parla- steuert und auf der Militärbasis in Nevada oder Ramstein im mentarier und die Regierung zu nehmen und sogar Verfassungs- Pfälzerwald2 vor ihren Bildschirmen 2 Sensoroperatoren zur klagen anzustrengen. Bedienung der Kameras, Sensoren und Radare, und für die Datenanalyse und Kommunikation. Das Fluggerät besitzt ein Wer kann in einer Demokratie außerparlamentarisch Einfluss auf Multispektral-Zielsystem, eine TV-Kamera und eine thermo- die Politik nehmen? graphische Kamera, die volle Bewegungsvideos produzieren. Es kann bis zu 14 Stunden in der Luft bleiben, bis zu 15 km hoch Solche Akteure sind einmal die Medien, zum anderen die Wis- fliegen, in einem Einsatzradius von 750 km und zurück zur Ba- senschaften mit Veröffentlichungen, und wie im vorliegenden sis.
    [Show full text]
  • NSA's Survaliance of the Internet
    NSA’s survaliance of the internet Can open-source help? KLID presentation May 21, 2015 Luke Herbert [email protected] Professionelle Keld Simonsen [email protected] Linux-Interessenter Can open-sourcei Danmark help? May 21, 2015 1/ 82 → Contents 1 Introduction 2 Tailored Access Operations 3 Data Collection 4 Analysis 5 Hacking (Malware) 6 Cryptography 7 Using the Data 8 Open-Source Possibilities 9 Conclusion Can open-source help? May 21, 2015 2/ 82 Introduction → NSA National Security Agency (NSA) ”The National Security Agency/Central Security Service (NSA/CSS) leads the U.S. Government in cryptology that encompasses both Signals Intelligence (SIGINT) and Information Assurance (IA) products and services, and enables Computer Network Operations (CNO) in order to gain a decision advantage for the Nation and our allies under all circumstances.” Can open-source help? May 21, 2015 3/ 82 Introduction → 5 Eyes The 5 Eyes alliance (FVEY) UKUSA Agreement • Great Britain • New Zeeland • Canada • Australia Founded August 1941 Backbone STONEGHOST Intel Network Can open-source help? May 21, 2015 4/ 82 Introduction → Partners Partners as of 2013 Glenn Greenwald: No Place To Hide, May-2014. Can open-source help? May 21, 2015 5/ 82 Introduction → Edward Snowden Edward Snowden • Born: 21 June, 1983 • 2006: CIA System admin. • 2009: Dell Consultant at NSA • One of approx. 1000 NSA admins authorised to access almost all systems. • 2010: NSA allows USB sticks to be used in secure areas. • 2013: Charged with Theft of government property, unauthorized communication of national defense information, and ... Can open-source help? May 21, 2015 6/ 82 Introduction → Publication Edward Snowden (ES) • ES stationed at the NSA’s Remote Operations Center facility in Hawaii.
    [Show full text]