Tempora





Tempora - NSA - PDF: LINK ¤ N S A

_________________________________________

 

  • ""Tempora" - had been a data program - of the GCHQ !"

 

 

 

 

_________________________________________

  • "adapted from a program of the NSA - called "XKEYSCORE"  !"

 

 

 

 

 

_________________________________________
  • "the documents described - big data !"

 

 

 

 

 

_________________________________________

  • "1000 machines - processed 40 billion pieces - of content !"

 

 

 

 

_________________________________________

  • "had been available - for analysts !"

 

 

 

 

 

_________________________________________

  • "a core base of 300 analysts - produced 200 reports !"

 

 

 

 

_________________________________________

  • "this kind of "XKEYSCORE" - supported SIGINT !"

 

 

 

 

 

_________________________________________

  • ""TEMPORA" - "slowed down" - the large chunk of Internet data !"

 

 

 

 

 

 

_________________________________________

  • "the documents described - a content-based program !"

 

 

 

 

_________________________________________

  • "used the "GENESIS" language - for the analyst's tool kit !"

 

 

 

 

 

_________________________________________

  • "of selection targeting - and bulk meta-data !"

 

 

 

 

 

_________________________________________

  • ""TEMPORA" appeared as an additional database - in XKS central !"

 

 

 

 

_________________________________________

  • ""XKEYSCORE" - was a computer-network system - with high-speed filtering !"

 

 

 

 

 

_________________________________________

  • "analysts were asked before search - to pay attention - to details concerning !"

 


 

 

_________________________________________

  • "the UK legality requirements - on the "TEMPORA" - user-guidance wiki page !"

 

 

 

 

 

 

 

 

 

______________________________________________________________________________

XKEYSCORE - NSA - PDF: LINK ¤ N S A

_________________________________________

 

  • ""XKEYSCORE" - had been a data program - of the NSA !"

 

 

 

 

_________________________________________

  • "the documents described - three different types - of XKS !"

 

 

 

 

 

_________________________________________

  • "they differed - on where in the processing chain - they sat !"

 

 

 

 

_________________________________________

  • "whether the data had been sessionised - or whether they ingested the data they received !"

 

 

 

 

 

_________________________________________

  • "traditional was - when XKS was first developed - it received data !"

 

 

 

 

_________________________________________

  • "from low data rate signals - processed through - "WEALTHYCLUSTER"  !"

 

 

 

 

 

 

_________________________________________

  • "stage 2 XKS was developed - for higher data rates - ingested data from - "TURMOIL"  !"

 

 

 

 

_________________________________________

  • "it passed 5% of the packets - to XKS - which XKS then sessionized !"

 

 

 

 

 

_________________________________________

  • ""TURMOIL" decided - which 5% of packets - passed based on criteria !"

 

 

 

 

_________________________________________

  • "strong selection - technology promotion - e-mail domains !"

 

 

 

 

 

_________________________________________

  • "in persona session promotion - 10 minutes' - or 10 MB of data - was collected !"

 

 

 

 

_________________________________________

  • "in persona session collection - the data was collected !"

 

 

 

 

 

_________________________________________

  • "and forwarded to - "PINWALE" - but was also passed to the XKS !"

 

 

 

 

_________________________________________

  • "only JPC - "MUSCULAR" - at GCHQ - used stage 2 XKS !"

 

 

 

 

 

 

_________________________________________

  • "deep dive XKS was - when it sessionised - all data !"

 

 

 

 

_________________________________________

  • "on a link - then promoted data !"

 

 

 

 

 

_________________________________________

  • "that process could have three decisions - blocked data !"

 

 

 

 

_________________________________________
  • "that was legally not allowed - to be in the system - ie UK-UK traffic !"

 

 

 

 

 

_________________________________________

  • "allowed data - that was known to be wanted !"

 

 

 

 

_________________________________________

  • "through use of - promotion rules !"

 

 

 

 

 

_________________________________________

  • "and then dropped data - that did not meet either of these !"

 

 

 

 

 

_________________________________________

  • "a factor in deciding - how much data kept !"

 


 

 

_________________________________________

  • "was the scale of storage capacity - that could be provided !"

 

 

 

 

 

 

 

 

 

______________________________________________________________________________

NYMROD - NSA - PDF: LINK ¤ N S A

_________________________________________

 

  • "there had been a program of the NSA - called "NYMROD"  !"

 

 

 

 

_________________________________________

  • "the documents described - a name-matching system !"

 

 

 

 

 

_________________________________________

  • ""NYMROD" - was developed by the center for content extraction - CCE !"

 

 

 

 

_________________________________________

  • "and could accept queries - consisting of personal names !"

 

 

 

 

 

_________________________________________

  • "performed a "fuzzy" match - of the input name - to one or more sets - of stored names !"

 

 

 

 

_________________________________________

  • "( ie intelligence reports - from NSA - CIA - and DoD database ! )"

 

 

 

 

 

_________________________________________

  • "and returned a list - of potential matches - for presentation to the user !"

 

 

 

 

 

_________________________________________

  • "the user interface was simple - type in the name - you were looking for !"

 

 

 

 

_________________________________________

  • "set a matching threshold from 0.1 - tolerant of differences - to 1.0 - exact match !"

 

 

 

 

 

_________________________________________

  • "selected the datases - and submitted the query !"

 

 

 

_________________________________________

  • "the results presentation - allowed to browse the snippets of text - that contained the matched name !"

 

 

 

 

 

 

 

 

 

______________________________________________________________________________

NYMROD - NSA - PDF: LINK ¤ N S A

_________________________________________

 

  • "most frequent mentions - in anchory reports !"

 

 

 

 

_________________________________________

  • "in the "NYMROD" - name-matching program - had been !"

 

 

 

 

 

_________________________________________

  • "Ban Ki-Moon !"

 

 

 

 

_________________________________________

  • "UN Secretary General !"

 

 

 

 

 

 

 

 

 

 

 

 

 

 

______________________________________________________________________________

TEMPORA
- Wikipedia EN:
LINK ¤ TEMPORA
______________________________________________________________________________

______________________________________________________________________________



Tools für mehr Anonymität - der Standard:
LINK ¤ der STANDARD

_________________________________________

 

  • "viele gute Anonymitäts-Tools im Netz - basieren auf Tor !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "Tor - steht für "the onion router"  !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "die namensgebende Zwiebel - beschreibt die Umleitung von Datenströmen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "die wie Zwiebelschalen - den Kern der Kommunikation - schützen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "prinzipiell wird Tor genutzt - um anonym zu browsen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "die Geschwindigkeit ist eine Spur langsamer - allerdings wird Tor immer schneller !!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "was auch daran liegt - dass immer mehr Menschen auf Verschlüsselung - mit Tor setzen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "bei der Verschlüsselung - von E-Mail-Inhalten - ist PGP am besten !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "dieses steht für "Pretty Good Privacy" - und beschreibt eine Methode - den Nachrichteninhalt zu verschlüsseln !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "möglich ist das per Plugin für Mailclients - wie Thunderbird - Enigmail - oder Outlook !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "bei Webmail-Accounts ist - Mailvelope empfehlenswert !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "beim Chat - sind empfehlenswerte Anonymisierungs-Tools !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "Adium - OS X - und Pidgin - bieten "Off the Record"-Chat !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "das Tor-Projekt selbst - entwickelt einen eigenen Client !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "zum Filesharing - empfiehlt sich das Onionshare !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "das die Datenströme - via Tor leitet !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "Vorsicht bei Anbietern wie Dropbox - oder Google !"

 

 

_________________________________________

  • "bei mobilen Betriebssystemen bietet mit Orbot - Tor ein Tool für Android an !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "Entwickler können Orlib implementieren - und Datenströme ihrer Apps so anonymisieren !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "wer noch einen Schritt weitergehen möchte - kann ein ganzes Betriebssystem für mehr Privatsphäre benutzen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "Tails - steht für "the amnesic incognito live system"  !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 


 

_________________________________________

  • "das vergessliche Betriebssystem - basiert auf Linux !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

 

 

______________________________________________________________________________

TEMPORA - Wikipedia DE: LINK ¤ TEMPORA
______________________________________________________________________________




tempora - 14371TE
designed by Free CSS Templates | powerd by pluck | hosted by akis