Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets
Title
Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets
Subject
GPRS data
Description
This article, from the NSA's SIDtoday newsletter, describes the success of a hands-on interception program. Shipments of computer network devices (servers, routers, etc.), en route to target locations, are intercepted and physically implanted with beacons that will enable NSA data collection. The article refers specifically to a successful example involving the Syrian Telecommunications Establishment (STE).
Creator
National Security Agency
Publisher
Der Spiegel
Relation
Snowden
Language
en
Date:Created
2010-06
Source:Classification
Top Secret
Source:Redactions
Author's name redacted
Report:Creator
Michael Sontheimer
NumPages
2
CreatorOffice
NSA
Date:Leaked
2015-01-17
Distribution
NOFORN
Surveillance Programs
SIGINT Enabling Project
Collection
Citation
National Security Agency, “Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets,” Snowden Archive, accessed November 24, 2024, https://snowden.glendon.yorku.ca/items/show/410.
Item Relations
This item has no relations.