How to Make Your Own NSA Bulk Surveillance System | Wired

How to Make Your Own NSA Bulk Surveillance System; ; In Wired; 2016-01-27 (two years ago).

Mentions

  • National Security Agency (NSA)
  • XKEYSCORE
  • Nicholas Weaver, staff, International Computer Science Institute (ICSI), University of California, Berkeley (UCB)

Projects

  • Bro
  • Hadoop
  • OpenFlow
  • Vortex
    • Lockheed-Martin

Codewords

  • XKEYSCORE
  • QUANTUM

Argot

  • Intrusion Detection System (IDS)
  • Load Balancer

Referenced

In order of appearance

A Close Look at the NSA’s Most Powerful Internet Attack Tool | Wired

A Close Look at the NSA’s Most Powerful Internet Attack Tool; Nicholas Weaver; In Wired; 2014-03-13.

<quote>The NSA/GCHQ was looking to add “pwn by keyword”: check if a user’s email through Hotmail or Yahoo mail contained any keyword and, if so, exploit them automatically.

The agencies conducted and experiment to see if this attack would work. This experiment reveals that the QUANTUMTHEORY wiretaps only look at individual packets, not complete TCP streams, making it a surprisingly limited tool.

QUANTUM, at heart, really is airpwn without the goatse.</quote>

Original Sources

The Internet is Compromised | Claudio Guarnieri

(Rapid7); The Internet is Compromised; In The Medium; 2014-01-25.
Teaser: A diagnosis after a tragic year of revelations on global surveillance

How The NSA Deploys Malware: An In-Depth Look at the New Revelations | Electronic Frontier Foundation

Dan Auerbach (EFF); How The NSA Deploys Malware: An In-Depth Look at the New Revelations; In Their Blog; 2013-10-08.

Original Source: article by Bruce Schneier