Browse Items (626 total)

20150117-speigel-classification_guide_for_computer_network_exploitation_cne.pdf
This document is a classification guide provided by the NSA branch, Tailer Access Operations (TAO), which outlines the level of classification assigned to specific aspects of computer network intelligence operations.

20150701-intercept-deepdive_readme.pdf
This document is a readme for DEEPDIVE, a means of establishing a "filter" in front of a traditional server using XKEYSCORE, a data analysis tool used by the NSA.

20131119-odni-nsa_course_materials_module_1_v.17.pdf
This document contains internal NSA training material, explaining in detail the rules ensuring the NSA's compliance with FISA, FISC and Executive Order 12333 in their SIGINT activities. The document specifically relates to the NSA's Business Records…

20130905-guard-bullrun.pdf
This document is a NSA classification guide detailing the appropriate security classifications for describing different elements of program BULLRUN. This program is used to unlock encryption tools used to protect emails, banking and medical records.

20150701-intercept-voip_readme.pdf
This document contains a readme for analysts seeking to use XKEYSCORE to query and retrieve VoIP data.

20140618-der_spiegel-internal_nsa_presentation_on_the_bnds_organization_0.pdf
This document is a NSA presentation giving an overview of the organizational structure of the BND with special attention given to the breakdown of their SIGINT activity.

20150622-intercept-project_camberdada_-_nsa.pdf
This document is an internal NSA presentation. It outlines the CAMPERDADA program, which seeks to monitor, collect, triage and repurpose malware and email phishing scams.

20140825-Intercept-ICREACH-Sharing-SIGINT-Comms-Metadata-with-the-Intel-Community-Memo.pdf
This document is a NSA release announcing the status of ICREACH, the NSA producediIntelligence community-wide communications metadata search engine. The document states that the purpose of the program is for "situational awareness and target…

20150701-intercept-xks_intro.pdf
This document is an internal NSA presentation. It describes the NSA's data analysis tool, XKEYSCORE. The presentation outlines the structure of the tool, its relation to other data NSA repositories, and examples of its real-life use as an…

20150219-Intercept-CNE Access to Core Mobile Networks.pdf
This document is an extract from an internal GCHQ presentation. It describes the CNE (Computer Network Exploitation) attack against the SIM card manufacturer, Gemalto.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2