Browse Items (626 total)

20140322-nyt-operation_shotgiant_objectives.pdf
This document contains NSA presentation slides and notes describing Huawei Corp, a Chinese telecommunications company, as a potential surveillance threat and link to the PRC. The document dicusses operations to exploit Huawei equipment globally and…

20150311-NZHerald-NSA Relationship With New Zealand.pdf
This document is an NSA information paper detailing the nature of the intelligence relationship operating between the NSA and New Zealand's intelligence agency, the Government Communications Security Bureau.

20140618-DerSpiegel-agenda_for_the_visit_of_bsi_vice_president_andreas_konen_to_the_nsa.pdf
This internal NSA document provides the agenda for a visit from the President of Germany’s Federal Office of Information Security (BSI).

20141204-intercept-nsa_first_ever_collect_of_high_interest_4g_cellular_signal.pdf
This document is a NSA news release announcing a successful collaborative effort, codenamed RAINFALL, to collect "Time Division-Long Term Evolution (TD LTE) 4G (fourth generation)" cellular communicatons, a high-priority goal for the NSA and the…

20150117-spiegel-overview_of_the_transgression_program_to_analyze_and_exploit_foreign_cna-cne_exploits.pdf
This document is a presentation deck from the NSA giving an overview of the TRANSGRESSION program, which aims to discover, evaluate and exploit foreign CNOs and hopes to provide cryptanalytic exploitation support. The presentation includes the…

20140102-wapo-quantum_computers_hard_targets.pdf
This document is an extract from a larger document, the "black budget," detailing the research and technology behind two US signals and intelligence projects: "Penetrating Hard Targets" and "Owning the Net." Both projects are housed under the arm of…

20150701-intercept-xks_logos_embedded_in_docs.pdf
This document is an internal NSA memo. It describes the use of the XKEYSCORE data analysis tool to retrieve intelligence from attatched logos embedded in online documents.

20131028-mundo-spain_collections.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Spain in a 30 day period between December 10 2012 and Janurary 8 2013.

20130731-guard-xkeyscore_training_slides.pdf
This document is a presentation describing the NSA's query program, XKeyscore. The program's structure, appearance and technical architecture are described and compared to other tools available to the NSA. The document also contains examples of the…

20150701-intercept-analyzing_mobile_cellular_dni_in_xks.pdf
This document is an internal NSA presentation. It outlines how the XKEYSCORE data querying tool used by NSA analysts can also be used to target mobile and cellular digital network intelligence (DNI).
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2