SlideShare a Scribd company logo
1 of 18
A BRIEF TECHNICAL OVERVIEW 
OF NSA SURVEILANCE PROGRAMS 
BY CORY ANDREW HOFSTAD
DOCUMENT OVERVIEW 
1. INTRODUCTION TO TECHNICAL DOCUMENTATION 
WALKTHROUGH OF X-KEYSCORE & PRISM APPLICATION DOCUMENTATION 
2. TECHNICAL OVERVIEW OF TWO (2) NSA SPYING APPLICATIONS 
WALKTHROUGH OF X-KEYSCORE & PRISM APPLICATION DOCUMENTATION 
3. TECHNICAL CAPABILITIES OF NSA SPYING APPLICATIONS 
FEATURES & REAL WORLD TECHNICAL CAPABILITIES OVERVIEW 
4. TECHNICAL LINKS AND RESOURCES FOR FURTHER RESEARCH 
OFFICIAL GOVERNMENT DOCUMENTATION & INDUSTRY RECOGNIZED RESEARCH 
TOPICS OUT OF THE SCOPE OF THIS DOCUMENTATION 
PRIVACY VS SECURITY POLITICS OF NSA SCANDAL CIVIL RIGHTS CONCERNS
INTRODUCTION 
JUNE 6TH , 2013 
• Guardian releases classified training material obtained 
from a contracted NSA program instructor named 
Edward Snowden. 
• Documentation was created for training purposes and was used in 
presentations & instructional demonstrations. 
• Documents provide details and technical overviews of capabilities of 
current NSA surveillance operations. 
• Documents were reviewed and published by American journalist and 
lawyer Glen Greenwald.
LINKS FOR RESEARCH 
PRIMARY RESOURCES 
THE GUARDIAN PUBLICATIONS 
http://www.theguardian.com/us-news/the-nsa-files 
Original source of NSA documentation and direct interviews with Edward Snowden. 
Original source of legal overview by Lawyer and Journalist Glen Greenwald. 
IC OFF THE RECORD 
https://nsa.gov1.info/dni/ 
Raw Database of classified documentation related to surveillance ranging from 2013-2014. 
Includes PRISM Documents & X-Keyscore Documents as well as the NSA TAO ANT Catalog. 
ADDITIONAL SOURCES 
ACLU – NSA Tailored Access Operations, ANT Catalog 
https://www.aclu.org/files/natsec/nsa/20140130/NSA%27s%20Spy%20Catalogue.pdf 
The 10 Biggest Revelations From Edward Snowden's Leaks 
http://mashable.com/2014/06/05/edward-snowden-revelations/
NSA Surveillance Programs: An Overview of XKeyscore & PRISM

More Related Content

Similar to NSA Surveillance Programs: An Overview of XKeyscore & PRISM

Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Great Wide Open
 
pres_drone_forensics_program.pptx
pres_drone_forensics_program.pptxpres_drone_forensics_program.pptx
pres_drone_forensics_program.pptxVolgaTC
 
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...DETER-Project
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicIRJET Journal
 
«Руководство по безопасности и защите персональных данных при использовании п...
«Руководство по безопасности и защите персональных данных при использовании п...«Руководство по безопасности и защите персональных данных при использовании п...
«Руководство по безопасности и защите персональных данных при использовании п...Victor Gridnev
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
Glossary - Standard Security Terms - NIST Vocabulary
Glossary - Standard Security Terms - NIST VocabularyGlossary - Standard Security Terms - NIST Vocabulary
Glossary - Standard Security Terms - NIST VocabularyDavid Sweigert
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Securitydocomusa
 
Intro to Digital Preservation
Intro to Digital PreservationIntro to Digital Preservation
Intro to Digital PreservationBen Fino-radin
 
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdfTdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdfRamithaDevi
 
Insights from-NSAs-cybersecurity-threat-operations-center
Insights from-NSAs-cybersecurity-threat-operations-centerInsights from-NSAs-cybersecurity-threat-operations-center
Insights from-NSAs-cybersecurity-threat-operations-centerPriyanka Aash
 
IRJET-Ethical Hacking
IRJET-Ethical HackingIRJET-Ethical Hacking
IRJET-Ethical HackingIRJET Journal
 
Guidelines for Smart Grid Cybersecurity Strategy, Architecture & High Level R...
Guidelines for Smart Grid Cybersecurity Strategy, Architecture & High Level R...Guidelines for Smart Grid Cybersecurity Strategy, Architecture & High Level R...
Guidelines for Smart Grid Cybersecurity Strategy, Architecture & High Level R...Dr Dev Kambhampati
 
Odum.t.averbeck.r
Odum.t.averbeck.rOdum.t.averbeck.r
Odum.t.averbeck.rNASAPMC
 
nistspecialpublication800-86.pdf
nistspecialpublication800-86.pdfnistspecialpublication800-86.pdf
nistspecialpublication800-86.pdfAlexandre Pinheiro
 

Similar to NSA Surveillance Programs: An Overview of XKeyscore & PRISM (20)

Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 
pres_drone_forensics_program.pptx
pres_drone_forensics_program.pptxpres_drone_forensics_program.pptx
pres_drone_forensics_program.pptx
 
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
«Руководство по безопасности и защите персональных данных при использовании п...
«Руководство по безопасности и защите персональных данных при использовании п...«Руководство по безопасности и защите персональных данных при использовании п...
«Руководство по безопасности и защите персональных данных при использовании п...
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
Sp800 94.pdf
Sp800 94.pdfSp800 94.pdf
Sp800 94.pdf
 
Nist.sp.800 124r1
Nist.sp.800 124r1Nist.sp.800 124r1
Nist.sp.800 124r1
 
Glossary - Standard Security Terms - NIST Vocabulary
Glossary - Standard Security Terms - NIST VocabularyGlossary - Standard Security Terms - NIST Vocabulary
Glossary - Standard Security Terms - NIST Vocabulary
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
Intro to Digital Preservation
Intro to Digital PreservationIntro to Digital Preservation
Intro to Digital Preservation
 
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdfTdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
 
Insights from-NSAs-cybersecurity-threat-operations-center
Insights from-NSAs-cybersecurity-threat-operations-centerInsights from-NSAs-cybersecurity-threat-operations-center
Insights from-NSAs-cybersecurity-threat-operations-center
 
IRJET-Ethical Hacking
IRJET-Ethical HackingIRJET-Ethical Hacking
IRJET-Ethical Hacking
 
Guidelines for Smart Grid Cybersecurity Strategy, Architecture & High Level R...
Guidelines for Smart Grid Cybersecurity Strategy, Architecture & High Level R...Guidelines for Smart Grid Cybersecurity Strategy, Architecture & High Level R...
Guidelines for Smart Grid Cybersecurity Strategy, Architecture & High Level R...
 
Odum.t.averbeck.r
Odum.t.averbeck.rOdum.t.averbeck.r
Odum.t.averbeck.r
 
nistspecialpublication800-86.pdf
nistspecialpublication800-86.pdfnistspecialpublication800-86.pdf
nistspecialpublication800-86.pdf
 
1998annualreport[1]
1998annualreport[1]1998annualreport[1]
1998annualreport[1]
 
Capstone Paper
Capstone PaperCapstone Paper
Capstone Paper
 

Recently uploaded

Scootsy Overview Deck - Pan City Delivery
Scootsy Overview Deck - Pan City DeliveryScootsy Overview Deck - Pan City Delivery
Scootsy Overview Deck - Pan City Deliveryrishi338139
 
cse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitycse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitysandeepnani2260
 
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRRINDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRRsarwankumar4524
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...Sebastiano Panichella
 
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08LloydHelferty
 
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxEngaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxAsifArshad8
 
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...soumyapottola
 
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Sebastiano Panichella
 
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptxerickamwana1
 
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRachelAnnTenibroAmaz
 
General Elections Final Press Noteas per M
General Elections Final Press Noteas per MGeneral Elections Final Press Noteas per M
General Elections Final Press Noteas per MVidyaAdsule1
 
GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE
 
Application of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxApplication of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxRoquia Salam
 
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunityDon't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunityApp Ethena
 

Recently uploaded (14)

Scootsy Overview Deck - Pan City Delivery
Scootsy Overview Deck - Pan City DeliveryScootsy Overview Deck - Pan City Delivery
Scootsy Overview Deck - Pan City Delivery
 
cse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitycse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber security
 
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRRINDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
 
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
 
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxEngaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
 
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
 
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
 
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
 
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
 
General Elections Final Press Noteas per M
General Elections Final Press Noteas per MGeneral Elections Final Press Noteas per M
General Elections Final Press Noteas per M
 
GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024
 
Application of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxApplication of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptx
 
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunityDon't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
 

NSA Surveillance Programs: An Overview of XKeyscore & PRISM

  • 1. A BRIEF TECHNICAL OVERVIEW OF NSA SURVEILANCE PROGRAMS BY CORY ANDREW HOFSTAD
  • 2. DOCUMENT OVERVIEW 1. INTRODUCTION TO TECHNICAL DOCUMENTATION WALKTHROUGH OF X-KEYSCORE & PRISM APPLICATION DOCUMENTATION 2. TECHNICAL OVERVIEW OF TWO (2) NSA SPYING APPLICATIONS WALKTHROUGH OF X-KEYSCORE & PRISM APPLICATION DOCUMENTATION 3. TECHNICAL CAPABILITIES OF NSA SPYING APPLICATIONS FEATURES & REAL WORLD TECHNICAL CAPABILITIES OVERVIEW 4. TECHNICAL LINKS AND RESOURCES FOR FURTHER RESEARCH OFFICIAL GOVERNMENT DOCUMENTATION & INDUSTRY RECOGNIZED RESEARCH TOPICS OUT OF THE SCOPE OF THIS DOCUMENTATION PRIVACY VS SECURITY POLITICS OF NSA SCANDAL CIVIL RIGHTS CONCERNS
  • 3. INTRODUCTION JUNE 6TH , 2013 • Guardian releases classified training material obtained from a contracted NSA program instructor named Edward Snowden. • Documentation was created for training purposes and was used in presentations & instructional demonstrations. • Documents provide details and technical overviews of capabilities of current NSA surveillance operations. • Documents were reviewed and published by American journalist and lawyer Glen Greenwald.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. LINKS FOR RESEARCH PRIMARY RESOURCES THE GUARDIAN PUBLICATIONS http://www.theguardian.com/us-news/the-nsa-files Original source of NSA documentation and direct interviews with Edward Snowden. Original source of legal overview by Lawyer and Journalist Glen Greenwald. IC OFF THE RECORD https://nsa.gov1.info/dni/ Raw Database of classified documentation related to surveillance ranging from 2013-2014. Includes PRISM Documents & X-Keyscore Documents as well as the NSA TAO ANT Catalog. ADDITIONAL SOURCES ACLU – NSA Tailored Access Operations, ANT Catalog https://www.aclu.org/files/natsec/nsa/20140130/NSA%27s%20Spy%20Catalogue.pdf The 10 Biggest Revelations From Edward Snowden's Leaks http://mashable.com/2014/06/05/edward-snowden-revelations/