Browse Items (626 total)

20150518_intercept_shape-weekly-report-01-jun-2011-r.pdf
This document is a report preparted by NATO's Supreme Headquarters Allied Powers Europe, it describes the military environment in Afghanistan in June 2011, after the assassination of Osama Bin Laden.

This document is a report preparted by NATO's Supreme Headquarters Allied Powers Europe, it describes the military environment in Afghanistan in June 2011, after the assassination of Osama Bin Laden.

20150518_intercept_shape-weekly-report-13-may-2011-r.pdf
This document is a report preparted by NATO's Supreme Headquarters Allied Powers Europe, it describes the military environment in Afghanistan in June 2011, after the assassination of Osama Bin Laden.

20150117-spiegel-projects_of_the_tao-ato_department_such_as_the_remote_destruction_of_network_cards.pdf
This document is a NSA wikiInfo page outlining potential intern projects under the NSA CNA (Computer Network Attack) team. Most of the projects are "tasked to remotely degrade or destroy opponent computers, routers, servers and network enabled…

20150612-intercept-sidtoday_interview_with_a_sid_hacker.pdf
This document is an interview with a hacker employed by the NSA's Tailored Access Operations (TAO) Division to perform computer network exploitation (CNE) operations against targets, including Osama Bin Laden. It originally appeared in the Signals…

20141228-spiegel-intro_to_the_vpn_exploitation_process_mentioning_the_protocols_attacked_-_pptp_ipsec_ssl_ssh.pdf
This document is a presentation giving an overview of a new branch within the NSA, "Custom Thread Development for Network Encryption," in which a team "OTP VPN Exploitation" will aid diverse SIGINT teams in decryption. The document goes over the…

07-Introduction-to-BADDECISION-Redacted.pdf
This document is a slide deck used during a "Close Access" NSA training course to introduce students to computer network exploitation (CNE) tool, BADDECISION.

20150701-intercept-intro_to_connect_sensitive_scanning_with_xks_fingerprints.pdf
This document is an internal NSA presentation. It introduces users of the XKEYSCORE data analysis system to Context Sensitive Scanning. This feature of XKEYSCORE allows analysts to surgically target traggic, by only applying keywords in the context…

20150701-intercept-intro_to_connect_sensitive_scanning_with_xks_fingerprints.pdf
This document is an internal NSA presentation. It introduces users of the XKEYSCORE data analysis system to Context Sensitive Scanning. This feature of XKEYSCORE allows analysts to surgically target traggic, by only applying keywords in the context…

05-Introduction-to-WLAN-CNE-Operations-Redacted.pdf
This document is a slide deck during a "Close Access" NSA training course to introduce students to computer network exploitation (CNE) using the FOXACID server in combinations with other tools, BADDECISION and NIGHTSTAND.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2