This document describes the processing of VPN data packets within the TURMOIL program. More specifically, the "document describes the sessionization requirements for the various IPSec VPN protocols processed."
This document is a single slide from a presentation on DROPMIRE, a bug that was implanted by the NSA on the "cryptofax" of the EU's embassy in Washington, DC. The document notes that this fax was used to send cables back to foreign affairs ministries…
This document contains four NSA presentation slides which provide an overview of the APEX VPN and VoIP exploitation programs and their phases for metadata collection and circumventing encryption.
This document is a NSA meeting agenda for the NSA visit of the Turkish Signals Intelligence Chief for a strategic planning conference, electronic intelligence (ELINT) demonstration and discussion of ongoing collaboration including an NSA request to…
This document is a memo that explains the rationale used by the NSA in its selection of surveillance targets outside the US. The document contains actual examples of certification examples that indicate that the staff of foreign heads of state and…
This document is a presentation detailing the potential uses of smartphone devices for signals intelligence. The presentation highlights the ability to access social media, location, search history, network history, and photo data from smartphones.…
This document is an internal presentated prepared by an official within the NSA. it describes the basics of HTTP protocol and how to target and exploit this using the XKEYSCORE query and analysis tool.
This document is an extract from an internal NSA presentation about XKEYSCORE, the NSA's tool to search and analyze surveillance data. It describes the scope and content of the MARINA and PINWALE databases, as well as the NSA's ability to track…
This document is an NSA information paper on the partnership between Turkish and U.S. intelligence. The paper provides key recent issues, discusses what each organization offers the other in terms of SIGINT, and refers to challenges balancing the…
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in The Netherlands in a 30 day period between December 10 2012 and Janurary…