Browse Items (626 total)

20141228-spiegel-explanation_of_the_turmoil_gallantwave_program_and_its_role_when_attacking_vpn_0.pdf
This document contains pages from the NSA internal wiki detailing the TURMOIL GALLANTWAVE program which allows exploitation of large communications systems which use Data Network Session Cipher (DNSC).

20140311-nyt-classification_guide_for_fisa_the_protect_america_act_and_the_fisa_amendments_act.pdf
This document is a NSA classification guide relating to intelligence operations performed by the NSA under the authority of the Foreign Intelligence Surveillance Act (FISA), the Protect America Act (PAA), and the Fisa Amendments Act (FAA).

20150701-intercept-asfd_readme.pdf
This document is a read me for the NSA's Atomic SIGINT Data Format (ASDF). This is a data foramt that is used by the XKEYSCORE data storage and analysis program. ASDF is used to provide other organizations with the ability to configure their own…

20131120-guard-collection_processing_and_dissemination_of_allied_communications.pdf
This document is an extract from a draft 2005 directive created in the name of the NSA's director of signals intelligence. It describes the British - U.S. Communications Intelligence Agreement of 5 March 1946, which establishes broad cooperation…

20141010-intercept-tarex_classification_guide.pdf
This document is a NSA classification guide for the NSA's Target Exploitation (TAREX) program. TAREX conducts worldwide signals intelligence (SIGINT) close-access operations and overt and clandestine human intelligence (HUMINT) in direct support of…

20150701-intercept-intro_to_connect_sensitive_scanning_with_xks_fingerprints.pdf
This document is an internal NSA presentation. It introduces users of the XKEYSCORE data analysis system to Context Sensitive Scanning. This feature of XKEYSCORE allows analysts to surgically target traggic, by only applying keywords in the context…

20141010-intercept-exceptionally_controlled_information_listing.pdf
This document is a NSA list of programs that have a security classification of ECI (Exceptionally Controlled Information). It provides an abstract for each program, as well as identifying potentially overlapping programs.

This document is a slide from a NSA presentation describing the NSA's collection activities worldwide. Specifically, it illustrates that the NSA used a technique called "Computer Network Exploitation" (CNE) to install malware onto over 50,000 devices…

20140914-intercept-key_activities_in_progress.pdf
This document contains an excerpted and heavily redacted NSA presentation slide. Slide is a progress report from the NSA; the information provided refers the New Zealand cable access partner program, allegedly SPEARGUN, and confirms that phase 1 is…

20140312-intercept-turbine_industrial_scale_exploitation.pdf
This document contains one slide from a NSA presentation detailing the benefits of the TURBINE program for automating computer network exploitation programs, suggesting that it allows for "industrial-scale exploitation."
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2