Browse Items (626 total)

20131104-nyt-sigint_goals.pdf
This document is a report detailing the state of the NSA's SIGINT system as of January 2007. A variety of strategic mission areas are described, along with key targets for SIGINT operations. Mission areas include: winning the global war on terror,…

20141228-spiegel-explanation_of_the_poisennut_product_and_its_role_when_attacking_vpn.pdf
This document is the NSA WikiInfo page for the decryption tool POISIONNUT - a "complex element responisble for scheduling ESP attacks." ESP stands for Encapsulating Security Payload - a tool for encrypting web traffic.

20140618-der_spiegel-cooperation_between_the_nsa_bnd_and_bfv.pdf
This document is an internal NSA memo detailing the relationships existing between the NSA and the German BND (Federal Intelligence Service) and BfV (Office for the Protection of the Constitution). Various collaborative projects are described,…

20130909-spiegel-smartphones (1).pdf
This document is a slideshow describing elements of the NSA's Smartphone surveillance programs. The presentation illustrates methods in which the NSA uses location data from iPhone smartphones to assist in surveillance of foreign targets.

20141228-spiegel-explanation_of_the_transform_engine_emulator_when_attacking_vpn.pdf
This document is a NSA WikiInfo page for the VPN Transform Engine Emulator, which helps in VPN exploitation.

20131211-svt-xkeyscore_sources.pdf
This is an extract of an internal NSA presentation. It describes the sources of information that are aggregated in the NSA's access-tool, XKEYSCORE.

20131211-svt-xkeyscore_sweden_meeting.pdf
This document is an internal NSA memo ahead of an annual summit meeting between NSA chief Keith Alexander and the chief of the FRA, Ingvar Akesson. The meeting took place between 24 - 26 April 2013. It describes the state of the intelligence…

20150701-intercept-intro_to_xks_appids_and_fingerprints.pdf
This document is an internal NSA presentation. It outlines the features available to the NSA's XKEYSCORE data analysis tool in exploiting web applications.

20131126-huffpo-radicalizers_pornography.pdf
This document is a preface from an internal NSA report. It describes SIGINT sourcing operations relating to certain "globally - resonating foreign radicalizers" and efforts to uncover "personal vulnerabilities" that could be exploited to undermine…

20131223-wapo-nsacss-mission.pdf
This document is an extract from an internal NSA presentation. It describes the mission, resources and capabilities of the NSA, as well as identifying and classifying resources used to achieve key objectives.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2