This document is a presentation from the NSA's Threat Operations Center (NTOC) on methods for intergrated cyber operations, including the applications TURBINE, TUTELAGE, and QUANTUM. The document gives various case studies and lists future work.
This document is a NSA release announcing the NSA International Security Issues collaboration success in acheiving the "first-ever computer network exploitation against Turkish leadership."
This document contains notes from a NSA employee on their work and travel to the DSD. The notes include progress reports on two projects, the first being a tool to use against Windows file systems, and the second involving an implant that grants…
This document is a presentation detailing requirements, proposed solutions, status, workflows and issues/risks of a current decryption program, involving the applications TURMOIL, GALLANTWAVE, and XKEYSCORE.
This document is a DSD presentation describing Australia's Defence Signals Directorates' (now the Australian Signals Directorate) efforts to intercept the communications of various Indonesian politicians, including the president, Susilo Bambang…
This document is a memo describing key "talking points" relating to the NSA's surveillance activities against Iran, and the NSA's understanding of Iran's surveillance and information warfare capabilities.
This document is a list prepared by the NSA Center for Content Extraction. It consists of foreign chief-of-states whose information has been collected by the NSA. The list also alludes to the amount of information (number of citations) collected for…
This document is a series of extracts from an NSA report. It describes the GILGAMESH and VICTORYDANCE programs, which were efforts to use new geolocation algorithms in collaboration with the CIA's drone assassination program. It describes the…
This document contains presentation slides from a CSEC presentation at the NSA SIGDEV conference in 2010. The deck provides an overview of CSEC's CCNE (counter computer network exploitation) team and its operations, applications and examples. The…