Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets

Title

Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets

Subject

GPRS data

Description

This article, from the NSA's SIDtoday newsletter, describes the success of a hands-on interception program. Shipments of computer network devices (servers, routers, etc.), en route to target locations, are intercepted and physically implanted with beacons that will enable NSA data collection. The article refers specifically to a successful example involving the Syrian Telecommunications Establishment (STE).

Creator

National Security Agency

Publisher

Der Spiegel

Relation

Snowden

Language

en

Date:Created

2010-06

Source:Classification

Top Secret

Source:Redactions

Author's name redacted

Report:Creator

Michael Sontheimer

NumPages

2

CreatorOffice

NSA

Date:Leaked

2015-01-17

Distribution

NOFORN

Surveillance Programs

SIGINT Enabling Project

Collection

Citation

National Security Agency, “Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets,” Snowden Archive, accessed October 5, 2024, https://snowden.glendon.yorku.ca/items/show/410.

Item Relations

This item has no relations.