XKEYSCORE Slide Presentations:
![View these slides NSA XKEYSCORE slides - XKS, Cipher Detection, and You!](2015/xkeyscore/cypher-detection.jpg)
![View these slides NSA XKEYSCORE slides - HTTP activity](2015/xkeyscore/http-activity.jpg)
![View these slides NSA XKEYSCORE slides - VOIP in XKS](2015/xkeyscore/voip.jpg)
![View these slides NSA XKEYSCORE slides - Search Forms](2015/xkeyscore/search-forms.jpg)
![View these slides NSA XKEYSCORE slides - Finding and Querying Document Metadata](2015/xkeyscore/document-metadata.jpg)
![View these slides NSA XKEYSCORE slides - Analyzing Mobile Cellular DNI](2015/xkeyscore/mobile-cellular-dni.jpg)
![View these slides NSA XKEYSCORE slides - Full Log vs HTTP](2015/xkeyscore/full-log.jpg)
![View these slides NSA XKEYSCORE slides - HTTP Activity vs User Activity](2015/xkeyscore/http-user.jpg)
![View these slides NSA XKEYSCORE slides - Email Address vs User Activity](2015/xkeyscore/email-address.jpg)
![View these slides NSA XKEYSCORE slides - Using XKS to Enable TAO](2015/xkeyscore/enable-tao.jpg)
![View these slides NSA XKEYSCORE slides - Web Forum Exploitation Using XKS](2015/xkeyscore/web-forum-exploitation.jpg)
![View these slides NSA XKEYSCORE slides - Free file uploaders](2015/xkeyscore/free-file-uploaders.jpg)
![View these slides NSA XKEYSCORE slides - Intro to XKS AppIDs and Fingerprints](2015/xkeyscore/intro-appid-fngerprints.jpg)
![View these slides NSA XKEYSCORE slides - Tracking Targets on Online Social Networks](2015/xkeyscore/tracking-online-social-networks.jpg)
![View these slides NSA XKEYSCORE slides - Phone Number Extractor](2015/xkeyscore/phone-number-extractor.jpg)
![View these slides NSA XKEYSCORE slides - CNE Analysis in XKS](2015/xkeyscore/cne-analysis.jpg)
![View these slides NSA XKEYSCORE slides - XKS as a SIGDEV Tool](2015/xkeyscore/sigdev-tool.jpg)
![View these slides NSA XKEYSCORE slides - Advanced HTTP Activity Analysis](2015/xkeyscore/advanced-http.jpg)
![View these slides NSA XKEYSCORE slides - Tech Strings in Documents - Tech Extractor](2015/xkeyscore/tech-extractor.jpg)
![View these slides NSA XKEYSCORE slides - Intro to Context Sensitive Scanning With XKS Fingerprints](2015/xkeyscore/context-sensitive-fingerprints.jpg)
![View these slides NSA XKEYSCORE slides - User Agents](2015/xkeyscore/user-agents.jpg)
![View these slides NSA XKEYSCORE slides - Writing XKS Fingerprints](2015/xkeyscore/writing-xks-fingerprints.jpg)
![View these slides NSA XKEYSCORE slides - XKS for Counter CNE](2015/xkeyscore/counter-cne.jpg)
![View these slides NSA XKEYSCORE slides - XKS Workflows 2011](2015/xkeyscore/workflows.jpg)
![View these slides NSA XKEYSCORE slides - XKEYSCORE System Administration guide](2015/xkeyscore/system-administration.jpg)
![View these slides NSA XKEYSCORE slides - AppIDs and Fingerprints](2015/xkeyscore/app-id-fingerprints.jpg)
XKEYSCORE User Guide and Documentation:
![Links to these documents are below NSA XKEYSCORE user guide and XKEYSCORE fingerprints documentation](2015/xkeyscore/xkeyscore-user-guide.jpg)
('-. ('-. _ .-') .-') _ _ .-') _ .-') ('-. _( OO) ( OO ).-.( \( -O ) ( OO ) )( '.( OO )_ ( \( -O ) _( OO) ,--. (,------./ . --. / ,------. ,--./ ,--,' ,--. ,--.).-'),-----. ,------. (,------. | |.-') | .---'| \-. \ | /`. '| \ | |\ | `.' |( OO' .-. '| /`. ' | .---' | | OO ) | | .-'-' | | | / | || \| | ) | |/ | | | || / | | | | | |`-' |(| '--.\| |_.' | | |_.' || . |/ | |'.'| |\_) | |\| || |_.' |(| '--. (| '---.' | .--' | .-. | | . '.'| |\ | | | | | \ | | | || . '.' | .--' | | | `---.| | | | | |\ \ | | \ | | | | | `' '-' '| |\ \ | `---. `------' `------'`--' `--' `--' '--'`--' `--' `--' `--' `-----' `--' '--' `------'
XKEYSCORE User Guide and Documentation: