Browse Items (626 total)

20131211-svt-nsa_internal_pm_on_fra.pdf
This document is a NSA memo describing the nature and extent between the NSA and Sweden's National Defence Radio Establishment (FRA).

20131004-guard-tor_stinks.pdf
This document contains a presentation prepared by the NSA analyzing the TOR router. TOR is a service designed to protect online anonymity partially funded by the US due to its use by dissents in repressive regimes such as Syria and China. The NSA's…

20130908-globo-tv.pdf
This document is a presentation describing GCHQ's FLYING PIG Program, a means of monitoring secure TLS / SSL computer networks through "MiTM" or "Man in the Middle" attacks where data is routed to a government server and then relayed to its…

20131210-wapo-cotraveler_overview.pdf
This document is a study which overviews the key elements of the NSA's Co-Traveler analytics programs. Co-Traveler is a blanket term used when describing bulk location information processing. The report includes a description of the analytic, its…

20150323-CBC-NSA Memo on Intelligence Relationship With CSE.pdf
This document is a copy of the intelligence relationship existing between CSEC and the NSA.

20140116-guard-dishfire_presentation.pdf
This document is a presentation demonstrating the NSA's mass untargeted collection and analysis of SMS text messages. It gives figures demostrating the programs reach. Collection data includes VCARDS, Geocoordinates, Missed Calls, SIM Card Changes,…

20140130-information_dk-cop15_interception_document.pdf
This document is a briefing posted to the NSA's internal website detailing the upcoming UN Climate Control Conference and the broad goals for overcoming a divide between developed and developing countries. The document refers to surveillance…

20150117-spiegel-projects_of_the_tao-ato_department_such_as_the_remote_destruction_of_network_cards.pdf
This document is a NSA wikiInfo page outlining potential intern projects under the NSA CNA (Computer Network Attack) team. Most of the projects are "tasked to remotely degrade or destroy opponent computers, routers, servers and network enabled…

20131123-nyt-sigint_strategy_feb_2012.pdf
This document is a NSA brief describing the NSA's SIGINT strategies circa February 2012. It describes their mission with broad goals, including a desire to push for changes to the law enabling expanded surveillance powers, and a desire to…

20150701-intercept-xks_application_ids.pdf
This document is an internal NSA presentation. It explains the syntax behind the construction of AppIds and Fingerprints in the NSA's XKEYSCORE data analysis program. AppIds and Fingerprints are methods to make searches of intelligence information…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2