Browse Items (626 total)

20150505_intercept_sidtoday-future-is-now-final.pdf
This is a document from the internal NSA newsletter, SIDtoday, written by a representative from the Human Language Technology (HLT) research project. It discusses the agency-wide program REAL TIME (RT-10) which is a initiative that aims to provide…

20150505_intercept_sidtoday-future-is-now-conclusion-final.pdf
This document is a follow-up to a previous article in the NSA internal newsletter SIDtoday. It concludes a discussion of innovative possiblities and current initiatives underway within the NSA's Human Language Technology research division, including…

20150701-intercept-selection_forwarding_readme.pdf
This document is a memo prepared by the NSA. It explains how to configue the XKEYSCORE data analysis tool to forward selected sessions via MAILORDER.

20150117-spiegel-nsa_fourth_party_access_-_i_drink_your_milkshake_.pdf
This document is a presentation deck from the Fourth Party IPT branch of the TAO (Tailored Access Operations) division of the NSA. The presentation details the opportunities provided through "Fourth Party collection" which "leverages CCNE accesses to…

20140618-der_spiegel-report_on_the_work_of_nsacss_europe.pdf
This document is a NSA brief on the success of Forward Production - a program developed by NSA/CSS Europe (NCEUR) - which uses intellignce information in North Africa to "engage and enable regional governments to conduct successful counterterrorism…

20140312-intercept-nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf
This document contains extracts from an NSA presentation reporting on the future of the FOXACID program, discussing new programs for computer network exploitation. Programs such as SECONDDATE and WILLOWVIXEN allow for mass exploitation through…

20150701-intercept-free_file_uploaders.pdf
This document is an internal NSA presentation. It outlines strategies for using the XKEYSCORE data analysis tool to retrive intelligence data from free file uploader websites.

20150701-intercept-full_log_vs_http.pdf
This document is an internal NSA presentation. It draws the distinction between retrieving full logs of digital network intelligence (DNI) data and retrieving HTTP activity requests when using the NSA's XKEYSCORE data analysis tool.

This document is an internal NSA presentation. It draws the distinction between retrieving full logs of digital network intelligence (DNI) data and retrieving HTTP activity requests when using the NSA's XKEYSCORE data analysis tool.

20140404-intercept-gchq_full_spectrum_cyber_effects.pdf
This document contains GCHQ presentation slides detailing the GCHQ Full-Spectrum Cyber Effects program, presented at the 2010 SIGDEV conference. The program includes computer network attacks, computer network information operations, and social media…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2