Browse Items (626 total)

20130816-wapo-sso_news_article.pdf
This document is an article from SSO News, the Internal Newsletter of the NSA's Special Source Operations. It describes a ruling made on 3 October 2011, where a judge from the FISA Court argued that Upstream collection were in violation of the fourth…

20131014-wapo-content_acquisition_optimization2.pdf
This document is a briefing describing the NSA's problems with overcollection of data from email address books and instant messaging buddy lists, as well as NSA efforts to filter out useless information. The briefing concludes with a case study of an…

20150117-spiegel-the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa_0.pdf
This document is a presentation deck for the FASHIONCLEFT protocol, which is a TAO (Tailored Access Operations) protocol used by implants to exfiltrate target data in computer network operations. The document defines FASHIONCLEFT, gives details on…

20150701-intercept-un_secretary_general_xks.pdf
This document is an extract from an internal NSA presentation. It outlines how NSA analysts used the data analysis tool XKEYSCORE to gain access to the talking points of the U.N. Secretary General prior to their meeting with President Barack Obama.

20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker.pdf
This document is an article from an internal NSA newsletter. It contains an NSA analyst's reminiscences about working at the European Technical Center (ETC) in Stuttgart, Germany.

20140128-guard-leaky_phone_apps.pdf
This document contain extracts from presentations by the NSA and GCHQ describing programs for mobile device tracking and surveillance. The slides outline the surveillance and collection capabilities for accessing mobile devices, which include:…

20150701-intercept-osint_fusion_project.pdf
This document is a presentation that outlines the OSINT fusion project, performed in tandem by contractors of the NSA and GCHQ. The OSINT fusion project aims to compile OSINT (open source intelligence) enabling analysts to further perform computer…

20140618-der_spiegel-report_on_an_nsa_visit_to_bnd_site_and_on_data_transfer_from_the_bnd_to_the_nsa.pdf
This document is an account of the NSA's (with SUSLAG and JSA) visit to the BND's (German Federal Intelligence Service) FORNSAT collection center in Schöningen, Germany, where the BND demonstrated their signals intelligence capabilities and the two…

20140519-intercept-dea_warfighter.pdf
This document is a news article posted to the NSA's internal newsletter, SIDtoday. It describes the operations of the Drug Enforcement Administration (DEA) and the relationship between this agency's counternarcotics operations and other agency's…

20131004-wapo-tor.pdf
This document is a report describing the TOR network and the NSA's attempts to uncloak its anonymous traffic, including the MJOLNIR program. TOR is a service designed to protect online anonymity partially funded by the US due to its use by dissents…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2