Browse Items (626 total)

20150219-Intercept-CCNE Stats Summaries Jan10 Mar10 Trial.pdf
This document is an extract from an internal GCHQ presentation. It provides statistics and summaries for the data identified in various mobile phone networks retrieved using compromised SIM encyption keys gained from an attack on the SIM card…

20141214-Intercept-gchq-mobile-networks-in-my-noc-world.pdf
This document is a presentation illustrating the strengths of Network Operations Centre(NOC) analysis for aiding in computer network exploitation (CNE) opertations. NOC analysis provides network maps, access points and key members of a target's…

20141228-spiegel-intercept_with_pgp_encrypted_message.pdf
This document is a heavily redacted intercepted chat log. The log shows that the NSA was not able to decrypt the message that was encrypted with PGP (Pretty Good Privacy).

20150204-intercept-nato_civilian_intelligence_council_cyber_panel.pdf
This document is a briefing sheet from the Office of the Director of National Intelligence to the NATO Civilian Intelligence Council. It provides discussion of a previous assessment of the cyber threat to NATO, especially the threat of state actors…

20140618-der_spiegel-guidelines_for_the_classification_of_suslag_details_and_the_nsa-bnd_cooperation.pdf
This document is a NSA classification guide detailing the appropriate security classifications for describing different elements of the NSA/BND partnerships, including the Joint SIGINT Activity (JSA), Special US Liason Activity Germany (SUSLAG), and…

20131211-svt-xkeyscore_sources.pdf
This is an extract of an internal NSA presentation. It describes the sources of information that are aggregated in the NSA's access-tool, XKEYSCORE.

20131119-odni-nsa_course_materials_module_6_tech_personnel_v.25.pdf
This document contains internal NSA training material, explaining in detail the separation between the role the technician as it relates to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.

20141228-spiegel-guide_for_analysts_on_how_to_use_the_prism_skype_collection.pdf
This document is a guide for analysts on how to use PRISM Skype collection. It gives a background of the program which began Feb 2011 and now collects a "mixture of audio, video, chat, and file transfers." The bulk of the document answers frequently…

20140312-intercept-nsa_technology_directorate_analysis_of_converged_data.pdf
This document contains a slide from the NSA Technology Directorate discussing the benefits of converged data analysis. The slide outlines how NSA Signals and Target analysts recieve data without knowing the circumstances of collection.

20140312-intercept-nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf
This document contains extracts from an NSA presentation reporting on the future of the FOXACID program, discussing new programs for computer network exploitation. Programs such as SECONDDATE and WILLOWVIXEN allow for mass exploitation through…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2