Browse Items (626 total)

20141228-speigel-bluesnort_program_on_net_defense_from_encrypted_communications_0.pdf
This document is a presentation detailing requirements, proposed solutions, status, workflows and issues/risks of a current decryption program, involving the applications TURMOIL, GALLANTWAVE, and XKEYSCORE.

20141228-speigel-analytic_challenges_from_active-passive_integration_when_nsa_attacks_ipsec_vpns_0.pdf
This document is a presentation on "shaping:" Active implant copies traffic and directs a copy past a passive collector, such as TURMOIL. It allows for decryption, collecting metadata records and analysis of internet key exhanges, selection of VPNs,…

20150505_intercept_sidtoday-finding-nuggets-final.pdf
This document is an article from the NSA internal newsletter, SIDtoday. It was written by the Intelligence Analysis Technical Director, NSA Texas, and it dicusses the use of Human Language Technology (HLT) in intelligence operations in Mexico, as…

20150117-speigel-combination_of_offensive_and_defensive_missions_-_how_fourth-party_missions_are_being_performed.pdf
This document is an article from the internal NSA newsletter SIDtoday. The article discusses the success of a collaboration between offensive and defensive branches of the NSA. For example, the revelation of a Chinese cyber attack on the Department…

20140914-spiegel-treasure_map_presentation.pdf
This document is an internal presentation prepared by the NSA's Threat Operations Center (NTOC). It describes TREASUREMAP, a massive internet mapping, exploration and analysis engine. Its aim was to create a fully interactive map of the internet…

20150117-spiegel-overview_of_methods_for_nsa_integrated_cyber_operations_0.pdf
This document is a presentation from the NSA's Threat Operations Center (NTOC) on methods for intergrated cyber operations, including the applications TURBINE, TUTELAGE, and QUANTUM. The document gives various case studies and lists future work.

20150117-spiegel-nsa_program_tutelage_to_instrumentalize_third_party_attack_tools.pdf
This document is a presentation deck from the NSA's Threat Operations Center (NTOC) outlining TUTELAGE, an application that instrumentalizes 3rd party attacks. The presentation goes over TUTELAGE's current and future capabilities of alerting,…

20150803-intercept-blast_from_the_past_yrs_in_the_beginning.pdf
This January 2011 newsletter extract, published by the NSA's Yakima Research Station (YRS), includes two articles. The first article gives a history (covering the years 1965 to 1974) of the development of the YRS based on archival material newly…

20150803-intercept-yrs_gears_up_to_celebrate_40_years.pdf
This document is an article from the internal NSA Yakima Research Station (YRS) newsletter, The Northwest Passage. The article celebrates the YRS 40th anniversary of operations, focusing on its role within the ECHELON program "to collect and process…

20130606-wapo-prism.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2