Browse Items (626 total)

20141228-speigel-analytic_challenges_from_active-passive_integration_when_nsa_attacks_ipsec_vpns_0.pdf
This document is a presentation on "shaping:" Active implant copies traffic and directs a copy past a passive collector, such as TURMOIL. It allows for decryption, collecting metadata records and analysis of internet key exhanges, selection of VPNs,…

20140803-Intercept-Israel-US-1999-Agreement.pdf
This document describes the intelligence relationship between the United States and Israel.

20150925-intercept-jce_uk_legalities_context.pdf
This document is an internal GCHQ presentation. It describes the legal and regulatory framework that UK based intelligence services operate within. It describes key pieces of legislation, key commissions and regulatory watchdogs, and also compares…

20150117-spiegel-nsa_program_tutelage_to_instrumentalize_third_party_attack_tools.pdf
This document is a presentation deck from the NSA's Threat Operations Center (NTOC) outlining TUTELAGE, an application that instrumentalizes 3rd party attacks. The presentation goes over TUTELAGE's current and future capabilities of alerting,…

20141228-spiegel-intro_to_the_vpn_exploitation_process_mentioning_the_protocols_attacked_-_pptp_ipsec_ssl_ssh.pdf
This document is a presentation giving an overview of a new branch within the NSA, "Custom Thread Development for Network Encryption," in which a team "OTP VPN Exploitation" will aid diverse SIGINT teams in decryption. The document goes over the…

20131122-dagbladet-boundless_informant.pdf
This document is a presentation describing the mission statement BOUNDLESSINFORMANT, the NSA's tool used to track and visualize global surveillance data. This document is an expanded version of that released by the Guardian.

20130905-guard-cryptanalysis_classification.pdf
This document is a classification guide that describes the appropriate security classificiations to be used when describing different elements of the operations of the NSA's Office of Cryptanalysis and Exploitation Services, including the…

20150701-intercept-http_activity_vs_user_activity.pdf
This document is an internal NSA presentation. It outlines the features of the XKEYSCORE data analysis application, specifically, its ability to retrieve data based on both HTTP traffic and user activity metadata.

20150518_intercept_2011-11-22-sidtoday-sigint-year-in-review.pdf
This is an NSA document from the internal newsletter SIDtoday. It is written by Teresa H. Shea, Director, Signal Intelligene Directorate, and gives general congratulations to the 'SIGINT Enterprise' for a successful 2011, with a focus on their work…

20140618-der_spiegel-report_on_a_wharpdrive_incident_in_an_sso_presentation.pdf
This document contains slides from a weekly NSA presentation which allude to the discovery of an "access point for WHARPDRIVE" by personnel of a commerical target and the resulting cover up.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2