Browse Items (626 total)

20141010-intercept-eci_pawleys_classification_guide.pdf
This document is a classification guide for the NSA's PAWLEYS program, which has a security classification of ECI (Exceptionally Controlled Information). PAWLEYS is a program aiming to protect clandestine HUMINT and computer network access intended…

20130905-guard-bullrun.pdf
This document is a NSA classification guide detailing the appropriate security classifications for describing different elements of program BULLRUN. This program is used to unlock encryption tools used to protect emails, banking and medical records.

20140831-spiegel-nsas_oldest_third_party_partnership.pdf
This document is a NSA release detailing the history and current partnership between Turkish and U.S intelligence operations. Intelligence sharing began in 1949 between the CIA and the Turkish Electronic and Technical Intelligence (ETI) and has…

20150928-intercept-another_successful_olympics_story.pdf
This document is a release from the NSA internal newsletter, SIDtoday. It describes the successful NSA operation that was collaboration among several teams, including Tailer Access Operations and Special Source Operations, in order to access,…

01-Course-Introduction-Nohidden-Redacted.pdf
This document is a slide deck introducing a "Close Access" NSA training course to "familiarize, educate, and certify students in the operational usage" of various computer network exploitation tools.

05-Introduction-to-WLAN-CNE-Operations-Redacted.pdf
This document is a slide deck during a "Close Access" NSA training course to introduce students to computer network exploitation (CNE) using the FOXACID server in combinations with other tools, BADDECISION and NIGHTSTAND.

07-Introduction-to-BADDECISION-Redacted.pdf
This document is a slide deck used during a "Close Access" NSA training course to introduce students to computer network exploitation (CNE) tool, BADDECISION.

FOXACID-Server-SOP-Redacted.pdf
This NSA document, from "no earlier than 2010," is a draft of the standard operating procedures for using the FOXACID server. This NSA server is used in TAO (tailored access operations) for hacking into target's networks. The user manual describes…

20150505_intercept_sidtoday-non-linguists-final.pdf
This document is an article from the NSA internal newsletter, SIDtoday. Originating from the NSA Center for Time-Sensitive Information, the article introduces Enhanced Video Text and Audio Processing (eViTAP) program to signals intelligence analysts.…

20150505_intercept_sidtoday-non-linguists-final.pdf
This document is an article from the NSA internal newsletter, SIDtoday. Originating from the NSA Center for Time-Sensitive Information, the article introduces Enhanced Video Text and Audio Processing (eViTAP) program to signals intelligence analysts.…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2