Browse Items (626 total)

20150117-spiegel-overview_of_methods_for_nsa_integrated_cyber_operations_0.pdf
This document is a presentation from the NSA's Threat Operations Center (NTOC) on methods for intergrated cyber operations, including the applications TURBINE, TUTELAGE, and QUANTUM. The document gives various case studies and lists future work.

20140914-spiegel-treasure_map_presentation.pdf
This document is an internal presentation prepared by the NSA's Threat Operations Center (NTOC). It describes TREASUREMAP, a massive internet mapping, exploration and analysis engine. Its aim was to create a fully interactive map of the internet…

20150117-speigel-combination_of_offensive_and_defensive_missions_-_how_fourth-party_missions_are_being_performed.pdf
This document is an article from the internal NSA newsletter SIDtoday. The article discusses the success of a collaboration between offensive and defensive branches of the NSA. For example, the revelation of a Chinese cyber attack on the Department…

20150505_intercept_sidtoday-finding-nuggets-final.pdf
This document is an article from the NSA internal newsletter, SIDtoday. It was written by the Intelligence Analysis Technical Director, NSA Texas, and it dicusses the use of Human Language Technology (HLT) in intelligence operations in Mexico, as…

20141228-speigel-analytic_challenges_from_active-passive_integration_when_nsa_attacks_ipsec_vpns_0.pdf
This document is a presentation on "shaping:" Active implant copies traffic and directs a copy past a passive collector, such as TURMOIL. It allows for decryption, collecting metadata records and analysis of internet key exhanges, selection of VPNs,…

20141228-speigel-bluesnort_program_on_net_defense_from_encrypted_communications_0.pdf
This document is a presentation detailing requirements, proposed solutions, status, workflows and issues/risks of a current decryption program, involving the applications TURMOIL, GALLANTWAVE, and XKEYSCORE.

20131230-spiegel-qfire.pdf
This document is an internal NSA presentation that describes QUANTUMTHEORY program. This program leveraged the NSA's system of passive sensors in order to detect and disrupt internet traffic. It also introduces QFIRE, a consolidated QUANTUMTHEORY…

20140312-intercept-nsa_technology_directorate_analysis_of_converged_data.pdf
This document contains a slide from the NSA Technology Directorate discussing the benefits of converged data analysis. The slide outlines how NSA Signals and Target analysts recieve data without knowing the circumstances of collection.

20140825-Intercept-ICREACH-Sharing-SIGINT-Comms-Metadata-with-the-Intel-Community-Memo.pdf
This document is a NSA release announcing the status of ICREACH, the NSA producediIntelligence community-wide communications metadata search engine. The document states that the purpose of the program is for "situational awareness and target…

20131004-guard-egotistical_giraffe (1).pdf
This document is a briefing describing the NSA's efforts to undermine the TOR network, codenamed EGOTISTICAL GIRAFFE. This briefing describes a technique developed by the NSA to attack TOR users through vulnerabilities in the TOR browser bundle and…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2