Browse Items (626 total)

20150117-speigel-document_explaining_the_role_of_the_remote_operations_center_roc.pdf
This document is an article from SIDtoday, an internal NSA newsletter, discussing the importance of the NSA's Remote Operations Center (ROC) to the agencies "objective of Global Network Dominance." The ROC specializes in computer network operations…

20150117-spiegel-the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa_0.pdf
This document is a presentation deck for the FASHIONCLEFT protocol, which is a TAO (Tailored Access Operations) protocol used by implants to exfiltrate target data in computer network operations. The document defines FASHIONCLEFT, gives details on…

20140618-der_spiegel-report_on_the_changing_of_the_escs_name_to_european_security_operations_center_esoc.pdf
This document is a NSA release detailing the transition of the European Security Center (ESC) into the European Security Operations Center (ESOC) - a NSA lead project to "help build up the Center's capabilities to allow it to assume even greater…

20140618-der_spiegel-report_on_the_changing_of_the_escs_name_to_european_security_operations_center_esoc.pdf
This document is a NSA release detailing the transition of the European Security Center (ESC) into the European Security Operations Center (ESOC) - a NSA lead project to "help build up the Center's capabilities to allow it to assume even greater…

20141228-spiegel-_national_information_assurance_research_laboratory_niarl_tundra.pdf
This document is a newsletter from the National Information Assurance Research Laboratory (NIARL) highlighting recent R&D from the information assurance community, which includes members of the 5 Eyes, student research programs, and corporate…

Digint-Narrative.pdf
This document is a report from GCHQ. It details the scope and capabilities of the agency's DIGINT (Digtital Intelligence) program. It reveals the challenges the agency faced when collecting and exploting communications intelligence from targets for…

20140303-epic-doj_report_on_pen_register_fisa_orders.pdf
This document, acquired via a freedom of Information Act lawsuit by EPIC, is a collection of reports detailing the number of times the Foreign Intelligence Surveillance Court authorized the use of Pen Registers and Trap and Trace Devices in order to…

20131119-odni-ag_guidelines_for_domestic_fbi_operations (1).pdf
This document is a report prepared by the Office of the Attorney General of the United States. It lays out the legal and procedural frameworks for the collection of signals intelligence by the FBI. It describes the historical evolution of the…

20140224-intercept-training_for_covert_online_operations.pdf
This document is an internal GCHQ presentation prepared by the Joint Threat Intelligence Research Group (JTRIG). It describes the division's covert online operations, specifically the control, infiltration and manipulation of online communication…

20131119-odni-nsa_course_materials_module_6_analytic_personal_v.18.pdf
This document contains internal NSA training material, explaining in detail the role of the intelligence analyst as it relates to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2