Browse Items (626 total)

20130608-guard-prism.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from several U.S. Internet companies: Microsoft (since 2007), Yahoo!…

20131021-monde-wanadoo_alcatel.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…

PRESTON-Business-Processes.pdf
This document is a report detailing the business processes behind the operation of PRESTON, a communication interception program which covertly intercepts phone calls, text messages, internet data.

Preston-Architecture.pdf
This document is a report detailing the architecture of PRESTON, a communication interception program which covertly intercepts phone calls, text messages, internet data.

20150701-intercept-phone_number_extractor.pdf
This document is an internal NSA presentation. It outlines how the data analysis tool XKEYSCORE can be used to retrieve target's phone numbers.

20131004-guard-egotistical_giraffe (1).pdf
This document is a briefing describing the NSA's efforts to undermine the TOR network, codenamed EGOTISTICAL GIRAFFE. This briefing describes a technique developed by the NSA to attack TOR users through vulnerabilities in the TOR browser bundle and…

20150219-Intercept-PCS Harvesting At Scale.pdf
This document is a report that describes the introduction of an automated approach to retrieving Individual Subscriber Authentication Keys (KIs) from networks of the SIM card manufacturer Gemalto, which was compromised by a GCHQ CNE (Computer Network…

20150117-speigel-csec_document_on_the_handling_of_existing_trojans_when_trojanizing_computers.pdf
This document contains presentation slides from a CSEC presentation at the NSA SIGDEV conference in 2010. The deck provides an overview of CSEC's CCNE (counter computer network exploitation) team and its operations, applications and examples. The…

20141125-sz-partner_cables.pdf
This document is a GCHQ report listing their corporate partners assisting in telecommunications cable interception.

20140618-DerSpiegel-presentation_on_the_nsacia_unit_special_collection_service.pdf
This document is an NSA presentation prepared by the Special Collection Service division in preparation for the Pacific Sigdev Conference held in March 2011. It describes the organizational structure of the division, including key strategic…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2