Browse Items (626 total)

20150117-spiegel-overview_of_methods_for_nsa_integrated_cyber_operations_0.pdf
This document is a presentation from the NSA's Threat Operations Center (NTOC) on methods for intergrated cyber operations, including the applications TURBINE, TUTELAGE, and QUANTUM. The document gives various case studies and lists future work.

20140831-spiegel-collaboration_in_overdrive.pdf
This document is a NSA release announcing the NSA International Security Issues collaboration success in acheiving the "first-ever computer network exploitation against Turkish leadership."

20150117-spiegel-report_of_an_nsa_employee_about_a_backdoor_in_the_openssh_daemon.pdf
This document contains notes from a NSA employee on their work and travel to the DSD. The notes include progress reports on two projects, the first being a tool to use against Windows file systems, and the second involving an implant that grants…

20141228-speigel-bluesnort_program_on_net_defense_from_encrypted_communications_0.pdf
This document is a presentation detailing requirements, proposed solutions, status, workflows and issues/risks of a current decryption program, involving the applications TURMOIL, GALLANTWAVE, and XKEYSCORE.

20131104-wapo-windstop.pdf
This document is a report on the data gathered by the WINDSTOP program between December 10 2012 and January 08 2013.

20131117-guardian-dsd_3g.pdf
This document is a DSD presentation describing Australia's Defence Signals Directorates' (now the Australian Signals Directorate) efforts to intercept the communications of various Indonesian politicians, including the president, Susilo Bambang…

20150210-intercept-iran_current_topics_-_interactions_with_gchq.pdf
This document is a memo describing key "talking points" relating to the NSA's surveillance activities against Iran, and the NSA's understanding of Iran's surveillance and information warfare capabilities.

20140329-der_spiegel-gchq_and_nsa_spy_on_heads_of_state.pdf
This document is a list prepared by the NSA Center for Content Extraction. It consists of foreign chief-of-states whose information has been collected by the NSA. The list also alludes to the amount of information (number of citations) collected for…

20140211-intercept-drones_intercepting_communications.pdf
This document is a series of extracts from an NSA report. It describes the GILGAMESH and VICTORYDANCE programs, which were efforts to use new geolocation algorithms in collaboration with the CIA's drone assassination program. It describes the…

20150117-speigel-csec_document_on_the_handling_of_existing_trojans_when_trojanizing_computers.pdf
This document contains presentation slides from a CSEC presentation at the NSA SIGDEV conference in 2010. The deck provides an overview of CSEC's CCNE (counter computer network exploitation) team and its operations, applications and examples. The…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2