Download - NSA Surveillance Research Presentation
![Page 1: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/1.jpg)
A BRIEF TECHNICAL OVERVIEW
OF NSA SURVEILANCE PROGRAMSBY CORY ANDREW HOFSTAD
![Page 2: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/2.jpg)
DOCUMENT OVERVIEW
2. TECHNICAL OVERVIEW OF TWO (2) NSA SPYING APPLICATIONS
4. TECHNICAL LINKS AND RESOURCES FOR FURTHER RESEARCH
3. TECHNICAL CAPABILITIES OF NSA SPYING APPLICATIONS
TOPICS OUT OF THE SCOPE OF THIS DOCUMENTATIONPOLITICS OF NSA SCANDAL CIVIL RIGHTS CONCERNSPRIVACY VS SECURITY
1. INTRODUCTION TO TECHNICAL DOCUMENTATION
WALKTHROUGH OF X-KEYSCORE & PRISM APPLICATION DOCUMENTATION
FEATURES & REAL WORLD TECHNICAL CAPABILITIES OVERVIEW
OFFICIAL GOVERNMENT DOCUMENTATION & INDUSTRY RECOGNIZED RESEARCH
WALKTHROUGH OF X-KEYSCORE & PRISM APPLICATION DOCUMENTATION
![Page 3: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/3.jpg)
INTRODUCTION
JUNE 6TH , 2013
• Guardian releases classified training material obtained
from a contracted NSA program instructor named
Edward Snowden.
• Documentation was created for training purposes and was used in
presentations & instructional demonstrations.
• Documents provide details and technical overviews of capabilities of
current NSA surveillance operations.
• Documents were reviewed and published by American journalist and
lawyer Glen Greenwald.
![Page 4: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/4.jpg)
![Page 5: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/5.jpg)
![Page 6: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/6.jpg)
![Page 7: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/7.jpg)
![Page 8: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/8.jpg)
![Page 9: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/9.jpg)
![Page 10: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/10.jpg)
![Page 11: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/11.jpg)
![Page 12: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/12.jpg)
![Page 13: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/13.jpg)
![Page 14: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/14.jpg)
![Page 15: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/15.jpg)
![Page 16: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/16.jpg)
![Page 17: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/17.jpg)
LINKS FOR RESEARCHPRIMARY RESOURCES
THE GUARDIAN PUBLICATIONShttp://www.theguardian.com/us-news/the-nsa-files
IC OFF THE RECORDhttps://nsa.gov1.info/dni/
Original source of NSA documentation and direct interviews with Edward Snowden.
Original source of legal overview by Lawyer and Journalist Glen Greenwald.
Raw Database of classified documentation related to surveillance ranging from 2013-2014.
Includes PRISM Documents & X-Keyscore Documents as well as the NSA TAO ANT Catalog.
ADDITIONAL SOURCES
https://www.aclu.org/files/natsec/nsa/20140130/NSA%27s%20Spy%20Catalogue.pdf
http://mashable.com/2014/06/05/edward-snowden-revelations/
The 10 Biggest Revelations From Edward Snowden's Leaks
ACLU – NSA Tailored Access Operations, ANT Catalog
![Page 18: NSA Surveillance Research Presentation](https://reader033.vdocuments.mx/reader033/viewer/2022052912/55a19b441a28abdd748b4839/html5/thumbnails/18.jpg)