Tempora
Tempora - NSA - PDF: LINK ¤ N S A
_________________________________________
- ""Tempora" - had been a data program - of the GCHQ !"
_________________________________________
- "adapted from a program of the NSA - called "XKEYSCORE" !"
- "the documents described - big data !"
_________________________________________
- "1000 machines - processed 40 billion pieces - of content !"
_________________________________________
- "had been available - for analysts !"
_________________________________________
- "a core base of 300 analysts - produced 200 reports !"
_________________________________________
- "this kind of "XKEYSCORE" - supported SIGINT !"
_________________________________________
- ""TEMPORA" - "slowed down" - the large chunk of Internet data !"
_________________________________________
- "the documents described - a content-based program !"
_________________________________________
- "used the "GENESIS" language - for the analyst's tool kit !"
_________________________________________
- "of selection targeting - and bulk meta-data !"
_________________________________________
- ""TEMPORA" appeared as an additional database - in XKS central !"
_________________________________________
- ""XKEYSCORE" - was a computer-network system - with high-speed filtering !"
_________________________________________
- "analysts were asked before search - to pay attention - to details concerning !"
_________________________________________
- "the UK legality requirements - on the "TEMPORA" - user-guidance wiki page !"
XKEYSCORE - NSA - PDF: LINK ¤ N S A
_________________________________________
- ""XKEYSCORE" - had been a data program - of the NSA !"
_________________________________________
- "the documents described - three different types - of XKS !"
_________________________________________
- "they differed - on where in the processing chain - they sat !"
_________________________________________
- "whether the data had been sessionised - or whether they ingested the data they received !"
_________________________________________
- "traditional was - when XKS was first developed - it received data !"
_________________________________________
- "from low data rate signals - processed through - "WEALTHYCLUSTER" !"
_________________________________________
- "stage 2 XKS was developed - for higher data rates - ingested data from - "TURMOIL" !"
_________________________________________
- "it passed 5% of the packets - to XKS - which XKS then sessionized !"
_________________________________________
- ""TURMOIL" decided - which 5% of packets - passed based on criteria !"
_________________________________________
- "strong selection - technology promotion - e-mail domains !"
_________________________________________
- "in persona session promotion - 10 minutes' - or 10 MB of data - was collected !"
_________________________________________
- "in persona session collection - the data was collected !"
_________________________________________
- "and forwarded to - "PINWALE" - but was also passed to the XKS !"
_________________________________________
- "only JPC - "MUSCULAR" - at GCHQ - used stage 2 XKS !"
_________________________________________
- "deep dive XKS was - when it sessionised - all data !"
_________________________________________
- "on a link - then promoted data !"
_________________________________________
- "that process could have three decisions - blocked data !"
- "that was legally not allowed - to be in the system - ie UK-UK traffic !"
_________________________________________
- "allowed data - that was known to be wanted !"
_________________________________________
- "through use of - promotion rules !"
_________________________________________
- "and then dropped data - that did not meet either of these !"
_________________________________________
- "a factor in deciding - how much data kept !"
_________________________________________
- "was the scale of storage capacity - that could be provided !"
NYMROD - NSA - PDF: LINK ¤ N S A
_________________________________________
- "there had been a program of the NSA - called "NYMROD" !"
_________________________________________
- "the documents described - a name-matching system !"
_________________________________________
- ""NYMROD" - was developed by the center for content extraction - CCE !"
_________________________________________
- "and could accept queries - consisting of personal names !"
_________________________________________
- "performed a "fuzzy" match - of the input name - to one or more sets - of stored names !"
_________________________________________
- "( ie intelligence reports - from NSA - CIA - and DoD database ! )"
_________________________________________
- "and returned a list - of potential matches - for presentation to the user !"
_________________________________________
- "the user interface was simple - type in the name - you were looking for !"
_________________________________________
- "set a matching threshold from 0.1 - tolerant of differences - to 1.0 - exact match !"
_________________________________________
- "selected the datases - and submitted the query !"
_________________________________________
- "the results presentation - allowed to browse the snippets of text - that contained the matched name !"
NYMROD - NSA - PDF: LINK ¤ N S A
_________________________________________
- "most frequent mentions - in anchory reports !"
_________________________________________
- "in the "NYMROD" - name-matching program - had been !"
_________________________________________
- "Ban Ki-Moon !"
_________________________________________
- "UN Secretary General !"
TEMPORA - Wikipedia EN: LINK ¤ TEMPORA
Tools für mehr Anonymität - der Standard: LINK ¤ der STANDARD
_________________________________________
- "viele gute Anonymitäts-Tools im Netz - basieren auf Tor !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "Tor - steht für "the onion router" !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "die namensgebende Zwiebel - beschreibt die Umleitung von Datenströmen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "die wie Zwiebelschalen - den Kern der Kommunikation - schützen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "prinzipiell wird Tor genutzt - um anonym zu browsen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "die Geschwindigkeit ist eine Spur langsamer - allerdings wird Tor immer schneller !!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "was auch daran liegt - dass immer mehr Menschen auf Verschlüsselung - mit Tor setzen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "bei der Verschlüsselung - von E-Mail-Inhalten - ist PGP am besten !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "dieses steht für "Pretty Good Privacy" - und beschreibt eine Methode - den Nachrichteninhalt zu verschlüsseln !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "möglich ist das per Plugin für Mailclients - wie Thunderbird - Enigmail - oder Outlook !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "bei Webmail-Accounts ist - Mailvelope empfehlenswert !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "beim Chat - sind empfehlenswerte Anonymisierungs-Tools !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "Adium - OS X - und Pidgin - bieten "Off the Record"-Chat !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "das Tor-Projekt selbst - entwickelt einen eigenen Client !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "zum Filesharing - empfiehlt sich das Onionshare !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "das die Datenströme - via Tor leitet !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "Vorsicht bei Anbietern wie Dropbox - oder Google !"
_________________________________________
- "bei mobilen Betriebssystemen bietet mit Orbot - Tor ein Tool für Android an !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "Entwickler können Orlib implementieren - und Datenströme ihrer Apps so anonymisieren !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "wer noch einen Schritt weitergehen möchte - kann ein ganzes Betriebssystem für mehr Privatsphäre benutzen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "Tails - steht für "the amnesic incognito live system" !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "das vergessliche Betriebssystem - basiert auf Linux !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
TEMPORA - Wikipedia DE: LINK ¤ TEMPORA