Browse Items (626 total)

20140618-der_spiegel-report_on_the_changing_of_the_escs_name_to_european_security_operations_center_esoc.pdf
This document is a NSA release detailing the transition of the European Security Center (ESC) into the European Security Operations Center (ESOC) - a NSA lead project to "help build up the Center's capabilities to allow it to assume even greater…

20140312-intercept-turbine_industrial_scale_exploitation.pdf
This document contains one slide from a NSA presentation detailing the benefits of the TURBINE program for automating computer network exploitation programs, suggesting that it allows for "industrial-scale exploitation."

20140618-der_spiegel-boundless_informant_statistics_for_so-called_third_parties.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications from 3rd party surveillance relationships 30 day period between December 10…

20140618-der_spiegel-report_on_the_nsas_access_to_tempora.pdf
This is an NSA document announcing the TEMPORA program. TEMPORA gives qualified NSA analysts access to a large GCHQ XKEYSCORE (Computer Network Exploitation) system for targeted and bulk metadata collection.

20150311-NZHerald-SIGINT Development Forum Minutes.pdf
This document contains minutes from a forum held at the National Security Agency in June 2009. The minutes describe various programs involving NSA collaboration with other Five Eyes intelligence agencies such as Australia's Defense Signals…

20140312-intercept-five_eyes_hacking_large_routers.pdf
This document is an internal NSA memo. It describes current operations by the NSA and other Five Eyes intelligence agencies involving hacking large internet routers.

20131123-nrc-nsa_malware.pdf
This document is a slide from a NSA presentation describing the NSA's collection activities worldwide. Specifically, it illustrates that the NSA used a technique called "Computer Network Exploitation" (CNE) to install malware onto over 50,000 devices…

20131021-monde-boundless_informant_france.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in France in a 30 day period between December 10 2012 and Janurary 8 2013.

20140312-intercept-quantum_insert_diagrams.pdf
This document contains slides displaying the operations of the QUANTUMINSERT computer network exploitation (CNE) program. Through partner programs such as TURBINE and TURMOIL, the NSA is able to exploit target computer networks by redirecting…

20140404-intercept-2009_sigdev_conference.pdf
This document contains an internal NSA news release giving a summary of the 2009 SIGDEV conference, an "annual Five-Eyes event" which "enables unprecedented visibility of SIGINT Development activities from across the Extended Enterprise."
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2