Browse Items (626 total)

20141204-intercept-ir21_a_technology_warning_mechanism_0.pdf
This document is a NSA presentation from the 2010 SIGDEV Conference, which discusses tracking a "carrier's technical evolution" using IR.21 and other data. This informaiton is aimed to help forecast targets.

20130909-spiegel-smartphones (1).pdf
This document is a slideshow describing elements of the NSA's Smartphone surveillance programs. The presentation illustrates methods in which the NSA uses location data from iPhone smartphones to assist in surveillance of foreign targets.

20140131-cbc-csec_airport_wifi_tracking.pdf
This document is a presentation which outlines a CSEC test program that tracked the movement of user ids on IP addresses for popular urban wireless internet connections, such as airports, hotels, libraries and coffee shops, by providing "richer…

20150622-intercept-intrusion_analysis_-_gchq.pdf
This document is a memo detailing the composition and operations of GCHQ's Intrusion Analysis (IA) team. It forms part of the Joint Electronic Attack Cell (JeAC).

20150622-intercept-intrusion_analysis_-_gchq.pdf
This document is a memo detailing the composition and operations of GCHQ's Intrusion Analysis (IA) team. It forms part of the Joint Electronic Attack Cell (JeAC).

20150701-intercept-intro_to_xks_appids_and_fingerprints.pdf
This document is an internal NSA presentation. It outlines the features available to the NSA's XKEYSCORE data analysis tool in exploiting web applications.

05-Introduction-to-WLAN-CNE-Operations-Redacted.pdf
This document is a slide deck during a "Close Access" NSA training course to introduce students to computer network exploitation (CNE) using the FOXACID server in combinations with other tools, BADDECISION and NIGHTSTAND.

20150701-intercept-intro_to_connect_sensitive_scanning_with_xks_fingerprints.pdf
This document is an internal NSA presentation. It introduces users of the XKEYSCORE data analysis system to Context Sensitive Scanning. This feature of XKEYSCORE allows analysts to surgically target traggic, by only applying keywords in the context…

20150701-intercept-intro_to_connect_sensitive_scanning_with_xks_fingerprints.pdf
This document is an internal NSA presentation. It introduces users of the XKEYSCORE data analysis system to Context Sensitive Scanning. This feature of XKEYSCORE allows analysts to surgically target traggic, by only applying keywords in the context…

07-Introduction-to-BADDECISION-Redacted.pdf
This document is a slide deck used during a "Close Access" NSA training course to introduce students to computer network exploitation (CNE) tool, BADDECISION.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2