Browse Items (626 total)

20131004-guard-egotistical_giraffe (1).pdf
This document is a briefing describing the NSA's efforts to undermine the TOR network, codenamed EGOTISTICAL GIRAFFE. This briefing describes a technique developed by the NSA to attack TOR users through vulnerabilities in the TOR browser bundle and…

20150701-intercept-phone_number_extractor.pdf
This document is an internal NSA presentation. It outlines how the data analysis tool XKEYSCORE can be used to retrieve target's phone numbers.

Preston-Architecture.pdf
This document is a report detailing the architecture of PRESTON, a communication interception program which covertly intercepts phone calls, text messages, internet data.

PRESTON-Business-Processes.pdf
This document is a report detailing the business processes behind the operation of PRESTON, a communication interception program which covertly intercepts phone calls, text messages, internet data.

20131021-monde-wanadoo_alcatel.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…

20130608-guard-prism.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from several U.S. Internet companies: Microsoft (since 2007), Yahoo!…

20130710-wapo-upstream.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from several U.S. Internet companies: Microsoft (since 2007), Yahoo!…

20130606-wapo-prism.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…

20130606-wapo-prism.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…

20140430-intercept-prism_olympics.pdf
This document is a presentaion slide prepared by NSA Special Source Operations, detailing the training and approval for PRISM access granted to 100 GCHQ users during the 2012 Olympics and the status of the collection as of 24 May 2012.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2