Browse Items (626 total)

20140618-der_spiegel-briefing_on_the_visit_to_the_nsa_of_a_high-ranking_bnd_official.pdf
This document is a briefing memo prepared by the NSA in preparation of "Hr. Dietmar B.", Director of SIGINT Analysis of Production at the BND, the German Intelligence Service. The memo describes the purpose of the official's visit, security requests,…

20150701-intercept-advanced_http_activity_analysis.pdf
This document is an internal presentated prepared by an official within the NSA. it describes the basics of HTTP protocol and how to target and exploit this using the XKEYSCORE query and analysis tool.

20140312-intercept-turbine_industrial_scale_exploitation.pdf
This document contains one slide from a NSA presentation detailing the benefits of the TURBINE program for automating computer network exploitation programs, suggesting that it allows for "industrial-scale exploitation."

20140618-der_spiegel-boundless_informant_statistics_for_so-called_third_parties.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications from 3rd party surveillance relationships 30 day period between December 10…

20140618-der_spiegel-report_on_the_nsas_access_to_tempora.pdf
This is an NSA document announcing the TEMPORA program. TEMPORA gives qualified NSA analysts access to a large GCHQ XKEYSCORE (Computer Network Exploitation) system for targeted and bulk metadata collection.

20150311-NZHerald-SIGINT Development Forum Minutes.pdf
This document contains minutes from a forum held at the National Security Agency in June 2009. The minutes describe various programs involving NSA collaboration with other Five Eyes intelligence agencies such as Australia's Defense Signals…

20140312-intercept-five_eyes_hacking_large_routers.pdf
This document is an internal NSA memo. It describes current operations by the NSA and other Five Eyes intelligence agencies involving hacking large internet routers.

20131123-nrc-nsa_malware.pdf
This document is a slide from a NSA presentation describing the NSA's collection activities worldwide. Specifically, it illustrates that the NSA used a technique called "Computer Network Exploitation" (CNE) to install malware onto over 50,000 devices…

20131021-monde-boundless_informant_france.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in France in a 30 day period between December 10 2012 and Janurary 8 2013.

20140312-intercept-quantum_insert_diagrams.pdf
This document contains slides displaying the operations of the QUANTUMINSERT computer network exploitation (CNE) program. Through partner programs such as TURBINE and TURMOIL, the NSA is able to exploit target computer networks by redirecting…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2