2013 LEAKS          2014 LEAKS          2015 LEAKS          2016 LEAKS          2017 LEAKS  
IC off the Record
IC OFF THE RECORD:

Direct access to leaked information related to the surveillance activities of the U.S. Intelligence Community and their partners.


2013 Leaks
2014 Leaks
2015 Leaks
2016 Leaks
2017 Leaks
ANT Product Catalog
Black Budget
Boundless Informant
Petrobras Screenshots
PRISM slides
Snowden Statements
XKeyscore

About this website


Too much information? Visit the redacted
IC ON THE RECORD website instead.

7/31/13 - NSA Tool Collects 'Nearly Everything a User Does on the Internet' (link)


 XKeyscore slide - cover

 XKeyscore slide - what is xkeyscore

 XKeyscore slide - methodology

 XKeyscore slide - system details

 XKeyscore slide - query hierarchy - FORNSAT, SSO site

 XKeyscore slide - map of where xkeyscore is - 700 servers - 150 sites

 XKeyscore slide - unique aspects

 XKeyscore slide - general capability - turmoil - turbulance

 XKeyscore slide - why do shallow

 XKeyscore slide - why go deep

 XKeyscore slide - what xks does with sessions - plug-ins extract and index metadata into tables

 XKeyscore slide - plug-ins

 XKeyscore slide - what can be stored - http parser

 XKeyscore slide - what can you do

 XKeyscore slide - finding targets - terrorist cells - encryption - searching for suspicious stuff

 XKeyscore slide - pgp usage in Iran

 XKeyscore slide - technology detection - VPN

 XKeyscore slide - persona session collection

 XKeyscore slide - language tracking - German - Pakistan

 XKeyscore slide - Google Maps to scope target locations

 XKeyscore slide - Jihadist document tracking

 XKeyscore slide - redacted

 XKeyscore slide - excel spreadsheets containing mac addresses out of IRAQ - network mapping

 XKeyscore slide - TAO fingerprints of exploitable machines

 XKeyscore slide - new target web services

 XKeyscore slide - entity extraction - Arabic, Chinese, IAEO, Osama Bin Laden

 XKeyscore slide - Success stories

 XKeyscore slide - 300 terrorists captured

 XKeyscore slide - redacted NSA slide

 XKeyscore slide - redacted NSA document

 XKeyscore slide - innovation - marina, GPRS, WLAN

 XKeyscore slide - future - voip, exif tags, CES-AppProcs

ORIGINAL DOCUMENT:  32 XKEYSCORE Slides

 

 

7/31/13 - Additional slides appearing in the above story


 XKeyscore slide - email address query

 XKeyscore slide - email address

 XKeyscore slide - foreign factors

 XKeyscore slide - Facebook chat - DNI presenter

 XKeyscore slide - user activity query - Facebook

 XKeyscore slide - http activity - Musharraf - BBC - client to server

 XKeyscore slide - http - yahoo, google, twitter

 XKeyscore slide - DNI discovery options - trafficthief, Pinwale, Marina

 XKeyscore slide - example

ORIGINAL SOURCE:  Screenshots from 7/31/13 story

 

 

12/11/13 - FRA has Access to Controversial Surveillance System (link)


 XKeyscore slide - Tor log - identified routers

 XKeyscore slide - slowing down the internet

 XKeyscore slide - SIGDEV - Pinwale

 XKeyscore slide - Sweden extremist website forum

 XKeyscore slide - data sources

ORIGINAL DOCUMENTS:  3 XKEYSCORE Slides; Swedish example; XKEYSCORE data sources

 

 

5/13/14 - No Place to Hide by Glenn Greenwald (link)


 XKEYSCORE plugins

 XKEYSCORE email address queries

 XKEYSCORE why interested in http

 XKEYSCORE activity search

 XKEYSCORE http search example

 XKEYSCORE user activity query

 XKEYSCORE osn intelligence target

ORIGINAL DOCUMENT:  No Place to Hide

 

 

7/3/14 - XKEYSCORE Source Code Targets TOR and TAILS Users

NSA targets the privacy-conscious

SOURCE CODE:  XKeyscore rules


XKeyscore Rules
 XKeyscore source code

 

 

3/14/15 - XKEYSCORE Code Defining GCSB Targets in the Solomon Islands

Can't take my eyes off of you, neighbour - New Zealand Herald


GCSB's XKeyscore Rules
 XKeyscore source code for GCSB - Solomon Islands

 

 

3/22/15 - XKEYSCORE Code Defining WTO Director Candidates as GCSB Targets

How Spy Agency Homed in on Groser's Rivals - New Zealand Herald


GCSB's XKeyscore Rules
 XKeyscore source code for GCSB - WTO Director candidates

 

 

7/1/15 - More XKEYSCORE Documents Published

XKEYSCORE: NSA’S Google For The World’s Private Communications - The Intercept

A Look At The Inner Workings Of NSA’S XKEYSCORE - The Intercept


XKEYSCORE Slide Presentations:

NSA XKEYSCORE slides - Introduction
XKEYSCORE - Feb 25, 2008
(30 slides)
NSA XKEYSCORE slides - XKS, Cipher Detection, and You!
XKS, Cipher Detection, and You!
Aug 21, 2008 (17 slides)
NSA XKEYSCORE slides - HTTP activity
HTTP Activity in XKEYSCORE - March, 2009 (21 slides)

 

NSA XKEYSCORE slides - VOIP in XKS
VOIP in XKS - March, 2009
(13 slides)
NSA XKEYSCORE slides - Search Forms
XKEYSCORE Search Forms - March, 2009 (49 slides)
NSA XKEYSCORE slides - Finding and Querying Document Metadata
Finding and Querying Document Metadata - April, 2009
(24 slides)

 

NSA XKEYSCORE slides - Analyzing Mobile Cellular DNI
Analyzing Mobile Cellular DNI in XKS - May, 2009 (17 slides)
NSA XKEYSCORE slides - Full Log vs HTTP
Full Log vs HTTP - June 11, 2009
(33 slides)
NSA XKEYSCORE slides - HTTP Activity vs User Activity
HTTP Activity vs User Activity - June 19, 2009 (36 slides)

 

NSA XKEYSCORE slides - Email Address vs User Activity
Email Address vs User Activity - June 24, 2009 (20 slides)
NSA XKEYSCORE slides - Using XKS to Enable TAO
Using XKS to Enable TAO -
July 16, 2009 (47 slides)
NSA XKEYSCORE slides - Web Forum Exploitation Using XKS
Web Forum Exploitation Using XKS- July, 2009 (7 slides)

 

NSA XKEYSCORE slides - Free file uploaders
Free File Uploaders (FFU) -
Aug 13, 2009 (33 slides)
NSA XKEYSCORE slides - Intro to XKS AppIDs and Fingerprints
Intro to XKS AppIDs and Fingerprints - Aug 27, 2009
(60 slides)
NSA XKEYSCORE slides - Tracking Targets on Online Social Networks
Tracking Targets on Online Social Networks - Sept, 2009
(21 slides)

 

NSA XKEYSCORE slides - Phone Number Extractor
Phone Number Extractor -
Oct, 2009 (20 slides)
NSA XKEYSCORE slides - CNE Analysis in XKS
CNE Analysis in XKS -
Oct 15, 2009 (33 slides)
NSA XKEYSCORE slides - XKS as a SIGDEV Tool
XKS as a SIGDEV Tool - 2009
(44 slides)

 

NSA XKEYSCORE slides - Advanced HTTP Activity Analysis
Advanced HTTP Activity Analysis - 2009 (114 slides)
NSA XKEYSCORE slides - Tech Strings in Documents - Tech Extractor
Tech Extractor
- April, 2010 (23 slides)
- Dec 2009 (14 pages)
NSA XKEYSCORE slides - Intro to Context Sensitive Scanning With XKS Fingerprints
Intro to Context Sensitive Scanning With XKS Fingerprints - May, 2010 (61 slides)

 

NSA XKEYSCORE slides - User Agents
User Agents - July, 2010
(42 slides)
NSA XKEYSCORE slides - Writing XKS Fingerprints
Writing XKS Fingerprints -
Nov, 2010 (67 slides)
NSA XKEYSCORE slides - XKS for Counter CNE
XKS for Counter CNE -
March, 2011 (21 slides)

 

NSA XKEYSCORE slides - XKS Workflows 2011
XKEYSCORE Workflows
- Sep 19, 2011 (26 slides)
- Mar 5, 2009 (24 slides)
NSA XKEYSCORE slides - XKEYSCORE System Administration guide
XKS System Administration - Dec, 2012 (144 slides)
NSA XKEYSCORE slides - AppIDs and Fingerprints
XKS Appids and Fingerprints -
(42 slides);   and XKS Application IDs (21 pages)

 

XKEYSCORE User Guide and Documentation:

NSA XKEYSCORE user guide and XKEYSCORE fingerprints documentation
  • The Unofficial XKEYSCORE User Guide (27 pages)
  • Guide to Using Contexts in XKS Fingerprints (24 pages)
  • How to Configure Category Throttling in XKEYSCORE (2 pages)
  • Using XKS to find and search for logos embedded in documents (2 pages)