Browse Items (626 total)

20140905-intercept-quadrennial_intelligence_community_review_final_report.pdf
This document is a report from the US Office of the National Director of Intelligence, titled the "Quadrenial Intelligence Community Review" (QICR). It is produced every four years as guide to long-term (10-20 years) intelligence strategic planning.…

20130630-guard-dropmire_.pdf
This document is a single slide from a presentation on DROPMIRE, a bug that was implanted by the NSA on the "cryptofax" of the EU's embassy in Washington, DC. The document notes that this fax was used to send cables back to foreign affairs ministries…

20141228-spiegel-description_on_the_processing_of_vpn_data_packets_within_the_turmoil_program.pdf
This document describes the processing of VPN data packets within the TURMOIL program. More specifically, the "document describes the sessionization requirements for the various IPSec VPN protocols processed."

20140313-intercept-nsa_cooperative_third_party_relationships.pdf
This document is an internal NSA publication of an interview with the FAD's Deputy Assistant for SIGINT Operations discussing the relationships between NSA/Third Party nations intelligence partnerships.

20141228-speigel-decryption_of_vpn_connections_within_the_valiantsurf_program_0.pdf
This document is an NSA internal Wiki page for VALIANTSURF, the "coverterm for the development of Data Network Cipher (DNC) exploitation capabilities in TURMOIL for integration into the TURBULENCE DNC thread."

20150701-intercept-utt_config_readme.pdf
This document is an internal NSA memo. It describes the Unified Targeting Tool (UTT), a tool allowing analysts finer granularity in performing queries of existing NSA data stores such as TURBULENCE.

20131211-svt-sweden_neutral.pdf
This document is an extract from an internal NSA briefing. It describes the triparteid relationship between Sweden's FRA, the NSA and GCHQ in COMINT, SIGINT and ELINT matters. This document is classified as top secret due to its sensitivity…

20140311-nyt-classification_guide_for_stellarwind_program_0.pdf
This document is a classification guide for the NSA's STELLARWIND program.

20140224-intercept-training_for_covert_online_operations.pdf
This document is an internal GCHQ presentation prepared by the Joint Threat Intelligence Research Group (JTRIG). It describes the division's covert online operations, specifically the control, infiltration and manipulation of online communication…

20140315-intercept-turbine_intelligence_command_and_control.pdf
This document contains an extract from an NSA report that provides an overview of the automated TUBINE implant system. TURBINE allows for large-scale exploitation networks.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2