Skip to content
This repository was archived by the owner on Jul 27, 2023. It is now read-only.
Skhaen edited this page Feb 18, 2015 · 16 revisions

Welcome to the database of www.nsa-observer.net, You can download and reuse freely our database in JSON or in WIKI format. If you want to talk with someone, a mailing-list is available and you can join us on IRC (irc.freenode.org - #lqdn-nsa).

IMPORTANT:

  • if you note a problem, an item or a feature missing, you can tell us here.
  • we recommend to use the tools nsa.imirhil.fr for a research within ALL the documents (see nsa-doc-search and documents for more informations)

I want to add an item

  1. If you want to add some items, you need to log in. You can do it a the bottom of the website, in the "For admins" section.
  2. if you're on an existing item, you can click on the "new item" button, and complete the following template:
===  ===
""Short Description"" : 
""Category"" :
""Alias"" :
""Family"" :
""Agency"" :
""Tags"" : 
""Compartments"" : 
""Related items"" :
""Related items (Parents)"" :
""Related items (Children)"" :
""Status"" :
""Links"" :
* [ | ]

Explication

###=== NAME ===

ex: === PRISM === always in CAPSLOCK

###""Alias"" :

ex: [[US-3354]] for COBALTFALCON, or [[XKS]] for XKEYSCORE

###""Short Description"" :

###""Category"" :

program OR attack vector (see Family)

A program is a technical solution of some sort (ex: a database, satellite collection, etc.) or a group of programs.

###""Family"" :

For a program Category

  • collect : A collection program attempts to retrieve signal by any mean necessary (either global or local)
  • process : Such a program receives raw data (think packets), attempts to read from it and stores this information in a database
  • database : Stores data for later use
  • target : Once the processed signal is stored, targeting allows the analyst to find new targets
  • attack : Once a target is found, it is attacked in order to collect more informations
  • agence : define an agence, see [[ALPHA]] (link - alias for the GCHQ, or TAO, a NSA's department)

For an attack vector Category (an attack vector is any kind of attack tool, software (ex: trojan) or hardware (ex: USB bug)).

  • software : Any bytecode executed on an target computer (ex: Trojan, keylogger, etc.)
  • hardware : Any physical deployed in target environment (ex: USB or video cable implant)
  • network : Any network operation executed on target network traffic (ex: packets manipulation, stream injection)

""Related items""

  • ""Related items"" : list of related items, separated by whitespaces, between (see "example")
  • ""Related items (parents)"" : its parent if it's a sub-program --> ONLY if it is directly under (n+1) above it
  • ""Related items (children)"" : its child(ren) --> ONLY if it is directly beneath (n-1) it

""Compartments"" :

[[TOP SECRET]] [[SI]] [[REL TO USA]] [[FVEY]] [[ECI]] You can check electrospaces.blogspot for a list.

###""Agency"" :

ex [[NSA]], or [[GCHQ]]

###""Tags""

For a tags' list, you can check at the bottom of the website. By convention, the tags are never in capsize.

ex: skype, dni, malware

""Status"" :

either active|inactive|unknown (unknown si vous ne savez pas.)

###""Links"":

Exemple :

* [http://wikipedia|Wikipedia]
* [http://src|Source PDF/document]
* [http://etc|More]

Clone this wiki locally