-
Notifications
You must be signed in to change notification settings - Fork 7
Home
Welcome to the database of www.nsa-observer.net, You can download and reuse freely our database in JSON or in WIKI format. If you want to talk with someone, a mailing-list is available and you can join us on IRC (irc.freenode.org - #lqdn-nsa).
IMPORTANT:
- if you note a problem, an item or a feature missing, you can tell us here.
- we recommend to use the tools nsa.imirhil.fr for a research within ALL the documents (see nsa-doc-search and documents for more informations)
- If you want to add some items, you need to log in. You can do it a the bottom of the website, in the "For admins" section.
- if you're on an existing item, you can click on the "new item" button, and complete the following template:
=== ===
""Short Description"" :
""Category"" :
""Alias"" :
""Family"" :
""Agency"" :
""Tags"" :
""Compartments"" :
""Related items"" :
""Related items (Parents)"" :
""Related items (Children)"" :
""Status"" :
""Links"" :
* [ | ]
###=== NAME ===
ex: === PRISM === always in CAPSLOCK
###""Alias"" :
ex: [[US-3354]] for COBALTFALCON, or [[XKS]] for XKEYSCORE
###""Short Description"" :
###""Category"" :
program OR attack vector (see Family)
A program is a technical solution of some sort (ex: a database, satellite collection, etc.) or a group of programs.
###""Family"" :
For a program Category
-
collect: A collection program attempts to retrieve signal by any mean necessary (either global or local) -
process: Such a program receives raw data (think packets), attempts to read from it and stores this information in a database -
database: Stores data for later use -
target: Once the processed signal is stored, targeting allows the analyst to find new targets -
attack: Once a target is found, it is attacked in order to collect more informations -
agence: define an agence, see[[ALPHA]](link - alias for the GCHQ, orTAO, a NSA's department)
For an attack vector Category (an attack vector is any kind of attack tool, software (ex: trojan) or hardware (ex: USB bug)).
-
software: Any bytecode executed on an target computer (ex: Trojan, keylogger, etc.) -
hardware: Any physical deployed in target environment (ex: USB or video cable implant) -
network: Any network operation executed on target network traffic (ex: packets manipulation, stream injection)
- ""Related items"" : list of related items, separated by whitespaces, between (see "example")
- ""Related items (parents)"" : its parent if it's a sub-program --> ONLY if it is directly under (n+1) above it
- ""Related items (children)"" : its child(ren) --> ONLY if it is directly beneath (n-1) it
[[TOP SECRET]] [[SI]] [[REL TO USA]] [[FVEY]] [[ECI]]
You can check electrospaces.blogspot for a list.
###""Agency"" :
ex [[NSA]], or [[GCHQ]]
###""Tags""
For a tags' list, you can check at the bottom of the website. By convention, the tags are never in capsize.
ex: skype, dni, malware
either active|inactive|unknown (unknown si vous ne savez pas.)
###""Links"":
Exemple :
* [http://wikipedia|Wikipedia]
* [http://src|Source PDF/document]
* [http://etc|More]