Browse Items (626 total)

20131211-svt-xkeyscore_sources.pdf
This is an extract of an internal NSA presentation. It describes the sources of information that are aggregated in the NSA's access-tool, XKEYSCORE.

20141228-spiegel-explanation_of_the_transform_engine_emulator_when_attacking_vpn.pdf
This document is a NSA WikiInfo page for the VPN Transform Engine Emulator, which helps in VPN exploitation.

20130909-spiegel-smartphones (1).pdf
This document is a slideshow describing elements of the NSA's Smartphone surveillance programs. The presentation illustrates methods in which the NSA uses location data from iPhone smartphones to assist in surveillance of foreign targets.

20140618-der_spiegel-cooperation_between_the_nsa_bnd_and_bfv.pdf
This document is an internal NSA memo detailing the relationships existing between the NSA and the German BND (Federal Intelligence Service) and BfV (Office for the Protection of the Constitution). Various collaborative projects are described,…

20141228-spiegel-explanation_of_the_poisennut_product_and_its_role_when_attacking_vpn.pdf
This document is the NSA WikiInfo page for the decryption tool POISIONNUT - a "complex element responisble for scheduling ESP attacks." ESP stands for Encapsulating Security Payload - a tool for encrypting web traffic.

20131104-nyt-sigint_goals.pdf
This document is a report detailing the state of the NSA's SIGINT system as of January 2007. A variety of strategic mission areas are described, along with key targets for SIGINT operations. Mission areas include: winning the global war on terror,…

20150701-intercept-xks_application_ids.pdf
This document is an internal NSA presentation. It explains the syntax behind the construction of AppIds and Fingerprints in the NSA's XKEYSCORE data analysis program. AppIds and Fingerprints are methods to make searches of intelligence information…

20131123-nyt-sigint_strategy_feb_2012.pdf
This document is a NSA brief describing the NSA's SIGINT strategies circa February 2012. It describes their mission with broad goals, including a desire to push for changes to the law enabling expanded surveillance powers, and a desire to…

20150117-spiegel-projects_of_the_tao-ato_department_such_as_the_remote_destruction_of_network_cards.pdf
This document is a NSA wikiInfo page outlining potential intern projects under the NSA CNA (Computer Network Attack) team. Most of the projects are "tasked to remotely degrade or destroy opponent computers, routers, servers and network enabled…

20140130-information_dk-cop15_interception_document.pdf
This document is a briefing posted to the NSA's internal website detailing the upcoming UN Climate Control Conference and the broad goals for overcoming a divide between developed and developing countries. The document refers to surveillance…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2