Browse Items (626 total)

20131119-odni-nsa_course_materials_module_5_v.24.pdf
This document contains internal NSA training material, explaining in detail the separation between the role of analyst and technician work roles as it relates to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata…

20150826-die_zeit-xkeyscore_-_the_document.pdf
This document is a transcript of a Terms of Reference entered into by the NSA and two German intelligence agencies, the Bundesnachrichtendiest's Sigint Department and the Bundesamt fur Verfassungsschutz. The document describes the sharing agreement…

20140618-der_spiegel-report_on_the_nsas_access_to_tempora.pdf
This is an NSA document announcing the TEMPORA program. TEMPORA gives qualified NSA analysts access to a large GCHQ XKEYSCORE (Computer Network Exploitation) system for targeted and bulk metadata collection.

20140618-der_spiegel-gchq_report_on_the_technical_abilities_of_tempora.pdf
This document is a report authored by a Project Manager at GCHQ. It details the technical abilities of an operation codenamed TEMPORA, an Internet Buffer capability enabling the storage of intercepted data for up to three days and metadata for up to…

20141228-spiegel-explanation_of_the_poisennut_product_and_its_role_when_attacking_vpn.pdf
This document is the NSA WikiInfo page for the decryption tool POISIONNUT - a "complex element responisble for scheduling ESP attacks." ESP stands for Encapsulating Security Payload - a tool for encrypting web traffic.

20150622-intercept-teca_product_centre_gchq_wiki.pdf
This document is an article from GCHQ's internal Wiki, GCWiki. It outlines the products made available to intelligence analysts by The Technical Enabling Access Product Centre (TECA). TECA is a division of GCHQ focused on reverse engineering…

20150310-Intercept-TCB Jamboree 2012 Invitation.pdf
This document is a memo created by the CIA. It describes the Trusted Computing Base's Jamboree, held in Februrary 2012. The Jamboree was a conference dedicated to communicating research performed by members of the United States Intelligence Community…

20150310-Intercept-TCB Jamboree 2012.pdf
This document is an extract of a memo about the CIA's annual Trusted Computing Base's (TCB) Jamboree conference. This conference focused on the communication about research into the ecxploitation of vulnerabilities in modern communications systems.

20140318-wapo-description_of_data_collection_under_mystic.pdf
This document is an extract from a weekly NSA Special Source Opertations briefing memo which describes protocol for the bulk collection, storage, and analysis of audio content and metadate under the SCALWAG program, a sub-program of MYSTIC.

20150701-intercept-xks_targets_visiting_specific_websites.pdf
This document is an internal NSA presentation. It showcases using the XKEYSCORE query tool to target individuals visiting specific websites.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2