SlideShare a Scribd company logo
1 of 24
Exposed NSA’s evil snooping
Good Guy
1
…for the world
Exposed internal secrets
BAAAAD Guy …for his organization
2
1
Xkeyscore
TAO
PRISM
GCHQ *
VictoryDance
http://projects.propublica.org/nsa-grid/
Hammerchant – Spy on VoIP & VPN
ANT catalog – Inject surveillance software in Apple cisco dell products
WellSpring – Collect images from email based on face recognition
DishFire – Collect upto 200million SMS a day
NoseySmurf – Smurf in iPhones & Android, turning on mic & track loc
Bullrun – NSA & GCHQ effort to weaken cryptography standards/tools
ShotGiant – program to break Chinese Huawei networks and products.
Upstream – program collects communications transiting the Internet
HappyFoot– use cookies & data from phone apps to identify users'
devices and physical locations
http://projects.propublica.org/nsa-grid/
Alphabetical list of NSA Programs and Tools
• A
AGILITY - NSA internet information tool or database
AGILEVIEW - NSA internet information tool or database
ALPHA - SIGINT Exchange Designator for Great Britain
ANCHORY - NSA software system which provides web access to textual
intelligence documents
AUTOSOURCE - NSA tool or database
AQUACADE - A class of SIGINT spy satellites (formerly RHYOLITE)
ASSOCIATION - NSA tool or database
• B
BANYAN - NSA tool or database
BELLTOPPER - NSA database
BELLVIEW -
BINOCULAR - Former NSA intelligence dissemination tool
BLACKPEARL - NSA tool or database
BLARNEY - NSA internet and telephony network collection program
BOUNDLESS INFORMANT - DNI and DNR data visualization tool.
BULLRUN
BYEMAN (BYE) - Retired control system for overhead collection systems
(1961-2005)
• C
CADENCE - NSA collection tasking tool or database
CANYON - Class of COMINT spy satellites (1968-1977)
CANNON LIGHT - Counterintelligence database of the US Army
CHESS- Compartment of TALENT KEYHOLE for the U-2 spy plane
CONFIRM - NSA database for personell access
CONTRAOCTAVE - NSA tool or database
CONVEYANCE - A voice content ingest processor? / Provide filtering for PRISM.
CORONA - A series of photographic surveillance satellites (1959-1972)
COURIERSKILL - NSA Collection mission system
CREST - Database which automatically translates foreign language intercepts in
English
CRYPTO ENABLED - collection derived from AO's efforts to enable crypto (cf.
lemonde.fr)
CULTWEAVE - Smaller size SIGINT database *
• D
DANCINGOASIS - (?)
DELTA - Compartment for COMINT material from intercepts of Soviet military
operations
DIKTER - SIGINT Exchange Designator for Norway
DINAR - Predecessor of the UMBRA compartment for COMINT
DISHFIRE - NSA internet information tool or database
DROPMIRE - passive collection of emanations using an antenna
DRTBOX -
DRUID - SIGINT Exchange Designator for third party countries
DYNAMO - SIGINT Exchange Designator for Denmark
• E
ECHELON - A SIGINT collection network run by Australia, Canada,
New Zealand, the United Kingdom, and the United States,
ECHO - SIGINT Exchange Designator for Australia
EVILOLIVE -
• F
FAIRVIEW - NSA internet and telephony network collection program
FALLOUT - DNI metadata ingest processor / Provides filtering for
PRISM.
FISHBOWL - NSA program for securing commercial smartphones
FOREMAN - ?
FOXACID - target the TOR's users
• G
GMMA (G) - Compartment for highly sensitive communication
intercepts
GAMUT - NSA collection tasking tool or database
GENIE - implants of spywares
GENTE - multi-stage opetation; jumping the airgap etc. (lemonde.fr -
GLOBAL BROKER - NSA tool or database
• H
HAVE BLUE - Development program of the F-117A Stealth fighter-
bomber
HAVE QUICK (HQ) - Frequency-hopping system used to protect military
UHF radio traffic
HERCULES - CIA terrorism database
HIGHTIDE - NSA tool or database
HIGHLANDS - spywares implants
• I
INDIA - SIGINT Exchange Designator for New Zealand
INTRUDER - Series of ELINT and COMINT spy satellites (since 2009)
ISHTAR - SIGINT Exchange Designator for Japan
IVY BELLS - NSA, CIA and Navy operation to place wire taps on Soviet
underwater communication cables
• J
JEROBOAM - Another name used for the TRUMPET spy satellites
JUGGERNAUT - Picks up all signals from mobile networks
JUMPSEAT - Class of SIGINT reconnaissance satellites (1971-1983)
• K
KLONDIKE (KDK) - Control system for sensitive geospatial intelligence
• L
• LIFESAVER - imaging of the hard driver (from lemonde.fr
LITHIUM - ?
LOPERS - Software application for Public Switched Telephone Networks
• M
MAGIC LANTERN - A keystroke logging software developed by the FBI
MAGNETIC - sensor collection of magnetic emanations (lemonde.fr)
MAGNUM - Series of SIGINT spy satellites (since 1985)
MAILORDER -
MAIN CORE - Federal database of personal and financial data of
suspicious US citizens
MAINWAY - NSA database of bulk phone metadata (Call records DB)
MARINA - NSA database of bulk internet metadata (Internet records DB)
MENTOR - Class of SIGINT spy satellites (since 1995)
MESSIAH - NSA automated message handling system
METTLESOME - NSA Collection mission system
MINARET - A sister project to Project SHAMROCK (1967-1973)
MINERALIZE - collection from LAN implant (lemonde.fr
MOONLIGHTPATH - An NSA collection program
MORAY - Retired compartment for the least sensitive COMINT material
• N
NUCLEON - Database for contents of phone calls (Voice data DB)
• O
OAKSTAR - NSA internet and telephony network collection program, voir
aussi "2013 mass surveillance disclosures".
OCEAN - (?) from lemonde.fr.
OCEANARIUM - Database for SIGINT from NSA and intelligence sharing
partners around the world.
OCELOT - Probably a NSA program for collection from internet and
telephony networks
OCTAVE - NSA tool for telephone network tasking
OCTSKYWARD - NSA tool or database
OSCAR - SIGINT Exchange Designator for the USA
• P
PATHFINDER - SIGINT analysis tool (made by SAIC)
PINWALE - Database for recorded signals intercepts/internet content (Video
data DB)
PLUS - NSA SIGINT production feedback program *
PRISM - NSA collection program for foreign internet data
PROTON - Smaller size SIGINT database
PURPLE - Codename for a Japanese diplomatic cryptosystem during WWII
PUZZLECUBE - NSA tool or database
• Q
QUANTUM - see FOXACID - target the TOR's users,
• R
RADON - host tap than can inject Ethernet packets onto the same target -
exploitation of denied networks (cf. lemonde.fr)
• RAGTIME (RT) - Codeword for four NSA surveillance programs
(Ragtime-A, B, C et P).
RAMPART / RAMPART-T - penetration of hard targets at or near leadership level
RENOIR - NSA telephone network visualization tool
RESERVE (RSV) - Control system for the National Reconnaissance Office (NRO)
RICHTER - SIGINT Exchange Designator for Germany
RUFF - Compartment of TALENT KEYHOLE for IMINT satellites
RHYOLITE - Class of SIGINT spy satellites (in 1975 changed to AQUACADE)
• S
• SABRE - Retired(?) SIGINT product codeword
SAVILLE - Narrow band voice encryption used for radio and telephone
communication
SCISSOR
SCORPIOFORE -
SHARKFIN - Sweeps up all-source communications intelligence at high speed and
volumes
SEMESTER - NSA SIGINT reporting tool
SENTINEL - NSA database security filter
SETTEE- SIGINT Exchange Designator for South Korea
• SHAMROCK - Operation for intercepting telegraphic data going in or
out the US (1945-1975)
SHELLTRUMPET - NSA metadata processing program
SILKWORTH - A software program used for the ECHELON system
SIRE - A software program used for the ECHELON system
SKYWRITER - NSA internet intelligence reporting tool
SOLIS - SIGINT product databases
SPHINX - Counterintelligence database of the Defense Intelligence
Agency
SPINNERET - an NSA operational branche?
SPOKE - Retired compartment for less sensitive COMINT material
STELLARWIND (STLW) - SCI compartment for the President's
Surveillance Program information
STONE GHOST - DIA classified network for information exchange
with UK, Canada and Australia
STORMBREW - NSA internet and telephony network collection
program
STUMPCURSOR - Foreign computer accessing program of the
NSA's Tailored Access Operations
• T
• TALENT KEYHOLE (TK) - Control system for space-based collection
platforms
TALK QUICK - An interim secure voice system created to satisfy urgent
requirements imposed by conditions to Southeast Asia. Function was
absorbed by AUTOSEVOCOM
TAPERLAY - covername for Global Numbering Data Base (GNDB)?
TAROTCARD - NSA tool or database
TEMPEST - Investigations and studies of compromising electronic
emanations
THINTREAD - NSA program for wiretapping and sophisticated analysis of
the resulting data
TRAFFICTHIEF - Part of the TURBULENCE and the PRISM programs
TRAILBLAZER - NSA Program to analyze data carried on communications
networks
TREASUREMAP - NSA internet content visualization tool
TRIBUTARY - NSA provided voice threat warning network
TRINE - Predecessor of the UMBRA compartment for COMINT
TRUMPET - Series of ELINT reconnaissance satellites (1994-2008)
TUNINGFORK - NSA tool or database
TURBULENCE - NSA Program to detect threats in cyberspace (2005- )
TURMOIL - Part of the TURBULENCE program
TUSKATTIRE - DNR (telephony) ingest processor
TUTELAGE - Part of the TURBULENCE program
• U
• UMBRA - Retired compartment for the most sensitive COMINT material
UNIFORM - SIGINT Exchange Designator for Canada
UPSTREAM -
• V
VAGRANT - computer screens / captures d'écrans
[lemonde.fr](http://www.lemonde.fr/international/article/2013/10/22/la-
diplomatie-francaise-sur-ecoute-aux-etats-unis35007173210.html
VORTEX - Class of SIGINT spy satellites (1978-1989)
• W
WEALTHYCLUSTER - Program to hunt down tips on terrorists in
cyberspace (2002- )
WEBCANDID - NSA tool or database
WHITEBOX -
• X
XCONCORD - Program for finding key words in foreign language
documents
XKEYSCORE (XKS) - Program for analysing SIGINT traffic
• Z
ZARF - Compartment of TALENT KEYHOLE for ELINT satellites
“If everything is terrorism,
then nothing is terrorism,”
- David Gomez, a former senior FBI agent.
2
INSIDER
No more than 22 personnel at NSA
were to have access to the highly
classified data
- Michael Hayden, former director of
the NSA and CIA,
“Does your organization have a way to
detect unauthorized access to your
data?”
“Does your organization uses and
monitors the available
technology”
Summarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threat

More Related Content

Viewers also liked

Amish Umesh - Future Of Web App Testing - ClubHack2007
Amish Umesh - Future Of Web App Testing  - ClubHack2007Amish Umesh - Future Of Web App Testing  - ClubHack2007
Amish Umesh - Future Of Web App Testing - ClubHack2007ClubHack
 
Fatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleFatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleClubHack
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianClubHack
 
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...ClubHack
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber InsuranceClubHack
 
India legal 31 october 2014
India legal 31 october 2014India legal 31 october 2014
India legal 31 october 2014ClubHack
 
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ BangaloreCyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ BangaloreClubHack
 
The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can Judy O'Connell
 

Viewers also liked (8)

Amish Umesh - Future Of Web App Testing - ClubHack2007
Amish Umesh - Future Of Web App Testing  - ClubHack2007Amish Umesh - Future Of Web App Testing  - ClubHack2007
Amish Umesh - Future Of Web App Testing - ClubHack2007
 
Fatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleFatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep Kamble
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas Kurian
 
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber Insurance
 
India legal 31 october 2014
India legal 31 october 2014India legal 31 october 2014
India legal 31 october 2014
 
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ BangaloreCyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
 
The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can
 

Similar to Summarising Snowden and Snowden as internal threat

Broadcast Signal Intrusion - Hacking Radio Stations
Broadcast Signal Intrusion - Hacking Radio StationsBroadcast Signal Intrusion - Hacking Radio Stations
Broadcast Signal Intrusion - Hacking Radio StationsZero Science Lab
 
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSIntellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSDr. Edwin Hernandez
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools iSyaiful Ahdan
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?hackdemocracy
 
Backtrack
BacktrackBacktrack
Backtrackoa Đi
 
EGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - LicensingEGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - LicensingDr. Edwin Hernandez
 
SDR Basestation with Raspberry Pi
SDR Basestation with Raspberry PiSDR Basestation with Raspberry Pi
SDR Basestation with Raspberry PiJonathan Singer
 
RFID Security Module
RFID Security ModuleRFID Security Module
RFID Security Modulecgvwzq
 
Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4D.J Md Thani
 
slide_rftrack_22082015
slide_rftrack_22082015slide_rftrack_22082015
slide_rftrack_22082015Marco Rainone
 
BackTrack5 - Linux
BackTrack5 - LinuxBackTrack5 - Linux
BackTrack5 - Linuxmariuszantal
 
High Performance Collaboration – The Jump to Light Speed
High Performance Collaboration – The Jump to Light SpeedHigh Performance Collaboration – The Jump to Light Speed
High Performance Collaboration – The Jump to Light SpeedLarry Smarr
 
Sun SPOT, Wireless Sensors Networks
Sun SPOT, Wireless Sensors NetworksSun SPOT, Wireless Sensors Networks
Sun SPOT, Wireless Sensors NetworksJosé Ariza
 
Uranium corporation of india
Uranium corporation of indiaUranium corporation of india
Uranium corporation of indiaengineeringwatch
 
202209 QSO Today Virtual Ham Introduction to Software Defined Radio with emph...
202209 QSO Today Virtual Ham Introduction to Software Defined Radio with emph...202209 QSO Today Virtual Ham Introduction to Software Defined Radio with emph...
202209 QSO Today Virtual Ham Introduction to Software Defined Radio with emph...dhorvath
 

Similar to Summarising Snowden and Snowden as internal threat (20)

Broadcast Signal Intrusion - Hacking Radio Stations
Broadcast Signal Intrusion - Hacking Radio StationsBroadcast Signal Intrusion - Hacking Radio Stations
Broadcast Signal Intrusion - Hacking Radio Stations
 
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSIntellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?
 
Internet
InternetInternet
Internet
 
Backtrack
BacktrackBacktrack
Backtrack
 
Mk
MkMk
Mk
 
EGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - LicensingEGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - Licensing
 
SDR Basestation with Raspberry Pi
SDR Basestation with Raspberry PiSDR Basestation with Raspberry Pi
SDR Basestation with Raspberry Pi
 
Software Defined Radio
Software Defined RadioSoftware Defined Radio
Software Defined Radio
 
RFID Security Module
RFID Security ModuleRFID Security Module
RFID Security Module
 
Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4
 
slide_rftrack_22082015
slide_rftrack_22082015slide_rftrack_22082015
slide_rftrack_22082015
 
BackTrack5 - Linux
BackTrack5 - LinuxBackTrack5 - Linux
BackTrack5 - Linux
 
Sectools
SectoolsSectools
Sectools
 
aaa
aaaaaa
aaa
 
High Performance Collaboration – The Jump to Light Speed
High Performance Collaboration – The Jump to Light SpeedHigh Performance Collaboration – The Jump to Light Speed
High Performance Collaboration – The Jump to Light Speed
 
Sun SPOT, Wireless Sensors Networks
Sun SPOT, Wireless Sensors NetworksSun SPOT, Wireless Sensors Networks
Sun SPOT, Wireless Sensors Networks
 
Uranium corporation of india
Uranium corporation of indiaUranium corporation of india
Uranium corporation of india
 
202209 QSO Today Virtual Ham Introduction to Software Defined Radio with emph...
202209 QSO Today Virtual Ham Introduction to Software Defined Radio with emph...202209 QSO Today Virtual Ham Introduction to Software Defined Radio with emph...
202209 QSO Today Virtual Ham Introduction to Software Defined Radio with emph...
 

More from ClubHack

Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodClubHack
 
Legal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalLegal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalClubHack
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanHybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanClubHack
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyClubHack
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiClubHack
 
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaContent Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaClubHack
 
XSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiXSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiClubHack
 
Clubhack Magazine Issue February 2012
Clubhack Magazine Issue  February 2012Clubhack Magazine Issue  February 2012
Clubhack Magazine Issue February 2012ClubHack
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack
 
ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack
 
ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack
 
One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)ClubHack
 
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)ClubHack
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)ClubHack
 
Mere Paas Teensy Hai (Nikhil Mittal)
Mere Paas Teensy Hai (Nikhil Mittal)Mere Paas Teensy Hai (Nikhil Mittal)
Mere Paas Teensy Hai (Nikhil Mittal)ClubHack
 
How Android Based Phone Helped Me Win American Idol (Elad Shapira)
How Android Based Phone Helped Me Win American Idol (Elad Shapira)How Android Based Phone Helped Me Win American Idol (Elad Shapira)
How Android Based Phone Helped Me Win American Idol (Elad Shapira)ClubHack
 
Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)
Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)
Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)ClubHack
 
Dom XSS - Encounters of the 3rd Kind (Bishan Singh Kochher)
Dom XSS - Encounters of the 3rd Kind (Bishan Singh Kochher)Dom XSS - Encounters of the 3rd Kind (Bishan Singh Kochher)
Dom XSS - Encounters of the 3rd Kind (Bishan Singh Kochher)ClubHack
 

More from ClubHack (20)

Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
 
Legal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalLegal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara Agrawal
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanHybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish Bomisstty
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
 
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaContent Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
 
XSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiXSS Shell by Vandan Joshi
XSS Shell by Vandan Joshi
 
Clubhack Magazine Issue February 2012
Clubhack Magazine Issue  February 2012Clubhack Magazine Issue  February 2012
Clubhack Magazine Issue February 2012
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012
 
ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012
 
ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack Magazine – December 2011
ClubHack Magazine – December 2011
 
One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)
 
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)
 
Mere Paas Teensy Hai (Nikhil Mittal)
Mere Paas Teensy Hai (Nikhil Mittal)Mere Paas Teensy Hai (Nikhil Mittal)
Mere Paas Teensy Hai (Nikhil Mittal)
 
How Android Based Phone Helped Me Win American Idol (Elad Shapira)
How Android Based Phone Helped Me Win American Idol (Elad Shapira)How Android Based Phone Helped Me Win American Idol (Elad Shapira)
How Android Based Phone Helped Me Win American Idol (Elad Shapira)
 
Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)
Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)
Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)
 
Dom XSS - Encounters of the 3rd Kind (Bishan Singh Kochher)
Dom XSS - Encounters of the 3rd Kind (Bishan Singh Kochher)Dom XSS - Encounters of the 3rd Kind (Bishan Singh Kochher)
Dom XSS - Encounters of the 3rd Kind (Bishan Singh Kochher)
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingSelcen Ozturkcan
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Summarising Snowden and Snowden as internal threat

  • 1.
  • 2. Exposed NSA’s evil snooping Good Guy 1 …for the world
  • 3. Exposed internal secrets BAAAAD Guy …for his organization 2
  • 6. Hammerchant – Spy on VoIP & VPN ANT catalog – Inject surveillance software in Apple cisco dell products WellSpring – Collect images from email based on face recognition DishFire – Collect upto 200million SMS a day NoseySmurf – Smurf in iPhones & Android, turning on mic & track loc Bullrun – NSA & GCHQ effort to weaken cryptography standards/tools ShotGiant – program to break Chinese Huawei networks and products. Upstream – program collects communications transiting the Internet HappyFoot– use cookies & data from phone apps to identify users' devices and physical locations http://projects.propublica.org/nsa-grid/
  • 7. Alphabetical list of NSA Programs and Tools • A AGILITY - NSA internet information tool or database AGILEVIEW - NSA internet information tool or database ALPHA - SIGINT Exchange Designator for Great Britain ANCHORY - NSA software system which provides web access to textual intelligence documents AUTOSOURCE - NSA tool or database AQUACADE - A class of SIGINT spy satellites (formerly RHYOLITE) ASSOCIATION - NSA tool or database • B BANYAN - NSA tool or database BELLTOPPER - NSA database BELLVIEW - BINOCULAR - Former NSA intelligence dissemination tool BLACKPEARL - NSA tool or database BLARNEY - NSA internet and telephony network collection program BOUNDLESS INFORMANT - DNI and DNR data visualization tool. BULLRUN BYEMAN (BYE) - Retired control system for overhead collection systems (1961-2005)
  • 8. • C CADENCE - NSA collection tasking tool or database CANYON - Class of COMINT spy satellites (1968-1977) CANNON LIGHT - Counterintelligence database of the US Army CHESS- Compartment of TALENT KEYHOLE for the U-2 spy plane CONFIRM - NSA database for personell access CONTRAOCTAVE - NSA tool or database CONVEYANCE - A voice content ingest processor? / Provide filtering for PRISM. CORONA - A series of photographic surveillance satellites (1959-1972) COURIERSKILL - NSA Collection mission system CREST - Database which automatically translates foreign language intercepts in English CRYPTO ENABLED - collection derived from AO's efforts to enable crypto (cf. lemonde.fr) CULTWEAVE - Smaller size SIGINT database * • D DANCINGOASIS - (?) DELTA - Compartment for COMINT material from intercepts of Soviet military operations DIKTER - SIGINT Exchange Designator for Norway DINAR - Predecessor of the UMBRA compartment for COMINT DISHFIRE - NSA internet information tool or database DROPMIRE - passive collection of emanations using an antenna DRTBOX - DRUID - SIGINT Exchange Designator for third party countries DYNAMO - SIGINT Exchange Designator for Denmark
  • 9. • E ECHELON - A SIGINT collection network run by Australia, Canada, New Zealand, the United Kingdom, and the United States, ECHO - SIGINT Exchange Designator for Australia EVILOLIVE - • F FAIRVIEW - NSA internet and telephony network collection program FALLOUT - DNI metadata ingest processor / Provides filtering for PRISM. FISHBOWL - NSA program for securing commercial smartphones FOREMAN - ? FOXACID - target the TOR's users • G GMMA (G) - Compartment for highly sensitive communication intercepts GAMUT - NSA collection tasking tool or database GENIE - implants of spywares GENTE - multi-stage opetation; jumping the airgap etc. (lemonde.fr - GLOBAL BROKER - NSA tool or database
  • 10. • H HAVE BLUE - Development program of the F-117A Stealth fighter- bomber HAVE QUICK (HQ) - Frequency-hopping system used to protect military UHF radio traffic HERCULES - CIA terrorism database HIGHTIDE - NSA tool or database HIGHLANDS - spywares implants • I INDIA - SIGINT Exchange Designator for New Zealand INTRUDER - Series of ELINT and COMINT spy satellites (since 2009) ISHTAR - SIGINT Exchange Designator for Japan IVY BELLS - NSA, CIA and Navy operation to place wire taps on Soviet underwater communication cables • J JEROBOAM - Another name used for the TRUMPET spy satellites JUGGERNAUT - Picks up all signals from mobile networks JUMPSEAT - Class of SIGINT reconnaissance satellites (1971-1983) • K KLONDIKE (KDK) - Control system for sensitive geospatial intelligence
  • 11. • L • LIFESAVER - imaging of the hard driver (from lemonde.fr LITHIUM - ? LOPERS - Software application for Public Switched Telephone Networks • M MAGIC LANTERN - A keystroke logging software developed by the FBI MAGNETIC - sensor collection of magnetic emanations (lemonde.fr) MAGNUM - Series of SIGINT spy satellites (since 1985) MAILORDER - MAIN CORE - Federal database of personal and financial data of suspicious US citizens MAINWAY - NSA database of bulk phone metadata (Call records DB) MARINA - NSA database of bulk internet metadata (Internet records DB) MENTOR - Class of SIGINT spy satellites (since 1995) MESSIAH - NSA automated message handling system METTLESOME - NSA Collection mission system MINARET - A sister project to Project SHAMROCK (1967-1973) MINERALIZE - collection from LAN implant (lemonde.fr MOONLIGHTPATH - An NSA collection program MORAY - Retired compartment for the least sensitive COMINT material • N NUCLEON - Database for contents of phone calls (Voice data DB)
  • 12. • O OAKSTAR - NSA internet and telephony network collection program, voir aussi "2013 mass surveillance disclosures". OCEAN - (?) from lemonde.fr. OCEANARIUM - Database for SIGINT from NSA and intelligence sharing partners around the world. OCELOT - Probably a NSA program for collection from internet and telephony networks OCTAVE - NSA tool for telephone network tasking OCTSKYWARD - NSA tool or database OSCAR - SIGINT Exchange Designator for the USA • P PATHFINDER - SIGINT analysis tool (made by SAIC) PINWALE - Database for recorded signals intercepts/internet content (Video data DB) PLUS - NSA SIGINT production feedback program * PRISM - NSA collection program for foreign internet data PROTON - Smaller size SIGINT database PURPLE - Codename for a Japanese diplomatic cryptosystem during WWII PUZZLECUBE - NSA tool or database • Q QUANTUM - see FOXACID - target the TOR's users,
  • 13. • R RADON - host tap than can inject Ethernet packets onto the same target - exploitation of denied networks (cf. lemonde.fr) • RAGTIME (RT) - Codeword for four NSA surveillance programs (Ragtime-A, B, C et P). RAMPART / RAMPART-T - penetration of hard targets at or near leadership level RENOIR - NSA telephone network visualization tool RESERVE (RSV) - Control system for the National Reconnaissance Office (NRO) RICHTER - SIGINT Exchange Designator for Germany RUFF - Compartment of TALENT KEYHOLE for IMINT satellites RHYOLITE - Class of SIGINT spy satellites (in 1975 changed to AQUACADE) • S • SABRE - Retired(?) SIGINT product codeword SAVILLE - Narrow band voice encryption used for radio and telephone communication SCISSOR SCORPIOFORE - SHARKFIN - Sweeps up all-source communications intelligence at high speed and volumes SEMESTER - NSA SIGINT reporting tool SENTINEL - NSA database security filter SETTEE- SIGINT Exchange Designator for South Korea
  • 14. • SHAMROCK - Operation for intercepting telegraphic data going in or out the US (1945-1975) SHELLTRUMPET - NSA metadata processing program SILKWORTH - A software program used for the ECHELON system SIRE - A software program used for the ECHELON system SKYWRITER - NSA internet intelligence reporting tool SOLIS - SIGINT product databases SPHINX - Counterintelligence database of the Defense Intelligence Agency SPINNERET - an NSA operational branche? SPOKE - Retired compartment for less sensitive COMINT material STELLARWIND (STLW) - SCI compartment for the President's Surveillance Program information STONE GHOST - DIA classified network for information exchange with UK, Canada and Australia STORMBREW - NSA internet and telephony network collection program STUMPCURSOR - Foreign computer accessing program of the NSA's Tailored Access Operations
  • 15. • T • TALENT KEYHOLE (TK) - Control system for space-based collection platforms TALK QUICK - An interim secure voice system created to satisfy urgent requirements imposed by conditions to Southeast Asia. Function was absorbed by AUTOSEVOCOM TAPERLAY - covername for Global Numbering Data Base (GNDB)? TAROTCARD - NSA tool or database TEMPEST - Investigations and studies of compromising electronic emanations THINTREAD - NSA program for wiretapping and sophisticated analysis of the resulting data TRAFFICTHIEF - Part of the TURBULENCE and the PRISM programs TRAILBLAZER - NSA Program to analyze data carried on communications networks TREASUREMAP - NSA internet content visualization tool TRIBUTARY - NSA provided voice threat warning network TRINE - Predecessor of the UMBRA compartment for COMINT TRUMPET - Series of ELINT reconnaissance satellites (1994-2008) TUNINGFORK - NSA tool or database TURBULENCE - NSA Program to detect threats in cyberspace (2005- ) TURMOIL - Part of the TURBULENCE program TUSKATTIRE - DNR (telephony) ingest processor TUTELAGE - Part of the TURBULENCE program
  • 16. • U • UMBRA - Retired compartment for the most sensitive COMINT material UNIFORM - SIGINT Exchange Designator for Canada UPSTREAM - • V VAGRANT - computer screens / captures d'écrans [lemonde.fr](http://www.lemonde.fr/international/article/2013/10/22/la- diplomatie-francaise-sur-ecoute-aux-etats-unis35007173210.html VORTEX - Class of SIGINT spy satellites (1978-1989) • W WEALTHYCLUSTER - Program to hunt down tips on terrorists in cyberspace (2002- ) WEBCANDID - NSA tool or database WHITEBOX - • X XCONCORD - Program for finding key words in foreign language documents XKEYSCORE (XKS) - Program for analysing SIGINT traffic • Z ZARF - Compartment of TALENT KEYHOLE for ELINT satellites
  • 17.
  • 18. “If everything is terrorism, then nothing is terrorism,” - David Gomez, a former senior FBI agent.
  • 20. No more than 22 personnel at NSA were to have access to the highly classified data - Michael Hayden, former director of the NSA and CIA,
  • 21. “Does your organization have a way to detect unauthorized access to your data?”
  • 22. “Does your organization uses and monitors the available technology”

Editor's Notes

  1. GCHQ – global comm HQ Canada Sweden
  2. Obama has boosted the number of people on the no fly list more than ten-fold, to an all-time high of 47,000
  3. Snowden was a contract staff