Browse Items (626 total)

20150701-intercept-xks_targets_visiting_specific_websites.pdf
This document is an internal NSA presentation. It showcases using the XKEYSCORE query tool to target individuals visiting specific websites.

20140519-intercept-black_budget.pdf
This document is an excerpt from the United States Intelligence Community 2013 "Black Budget". This secret budget was used to describe covert programs. This extract describes the Special Source Operations (SSO) project, designed to assist the…

20131119-odni-nsa_course_materials_module_3_v.22.pdf
This document contains internal NSA training material, explaining in detail the legal and procedural rules underlying the assumption of "Reasonable Articulable Suspicion (RAS)" as it relates to the NSA's Business Records (BR) and Pen Register Trap…

20150505_intercept_sidtoday-future-is-now-conclusion-final.pdf
This document is a follow-up to a previous article in the NSA internal newsletter SIDtoday. It concludes a discussion of innovative possiblities and current initiatives underway within the NSA's Human Language Technology research division, including…

20141228-spiegel-_national_information_assurance_research_laboratory_niarl_tundra.pdf
This document is a newsletter from the National Information Assurance Research Laboratory (NIARL) highlighting recent R&D from the information assurance community, which includes members of the 5 Eyes, student research programs, and corporate…

20150925-intercept-broadcast_analysis.pdf
This document is a report prepared by GCHQ. It outlines research and data analyses performed by the agency on users of internet radio stations using information gleaned from a variety of difference surveillance tools such as BLAZING SADDLES and KARMA…

20141228-spiegel-explanation_on_the_spin9_program_on_end-to-end_attacks_on_vpn.pdf
This document is a presentation that reviews in detail the capabilities and constraints of the GCHQ program VPN SPIN 9 - a VPN decryption program. The document shows how the VPN service is connected to other SIGINT programs, maps out several…

20131126-wapo-microsoft_cloud_exploitation.pdf
This document is an extract from an NSA presentation. It describes SERENDIPITY, which was seemingly an effort by the NSA to target Microsoft for similar SIGINT sourcing programs that affected Google and Yahoo. These slides show efforts to intercept…

20150701-intercept-xks_cipher_detection_and_you.pdf
This document is an internal presentation prepared by the NSA's Mathematics Research Group (MRG). It outlines the structure, features and examples of use of the XKEYSCORE data analysis tool. The presentation also describes the relations of XKEYSCORE…

20150117-spiegel-quantumtheory_is_a_set_of_technologies_allowing_man-on-the-side_interference_attacks_on_tcp-ip_connections_includes_straightbizarre_and_daredev.pdf
This document contains presentation slides from the 2010 SIGINT Development Conference outlining the QUANTUMTHEORY program and its sub-programs, from legacy to those in experimental stages.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2