Browse Items (626 total)

20140315-intercept-turbine_intelligence_command_and_control.pdf
This document contains an extract from an NSA report that provides an overview of the automated TUBINE implant system. TURBINE allows for large-scale exploitation networks.

20140618-der_spiegel-guidelines_for_the_classification_of_nsa_sigint_details_1945-1967.pdf
This document is a classification guide for NSA Signals Intelligence material collected between 1945 and 1967. It also includes a glossary defining key terms used in U.S. intelligence material.

20150928-intercept-exploiting_foreign_law_intercept_roundtable.pdf
This document discusses the types of lawful intercept used by the NSA, including access through special source operations. Lawful Intercept is defined as Èobtaining communications network data by legal authority for analysis or evidence.È A long list…

20150701-intercept-writing_xks_fingerprints.pdf
This document is an internal NSA presentation. It describes using the NSA's XKEYSCORE data analysis tool to create "Fingerprints", improving the utility to searching repositories of intelligence information.

20131119-odni-verification_slide.pdf
This document is a slide from an internal NSA presentation. The slide describes the appropriate target minimization procedures to be adopted by NSA analysts, such as the importance of not recieving the "substantive content" of communciations in the…

20140312-intercept-nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf
This document contains extracts from an NSA presentation reporting on the future of the FOXACID program, discussing new programs for computer network exploitation. Programs such as SECONDDATE and WILLOWVIXEN allow for mass exploitation through…

20141228-spiegel-guide_for_analysts_on_how_to_use_the_prism_skype_collection.pdf
This document is a guide for analysts on how to use PRISM Skype collection. It gives a background of the program which began Feb 2011 and now collects a "mixture of audio, video, chat, and file transfers." The bulk of the document answers frequently…

20131119-odni-nsa_course_materials_module_6_tech_personnel_v.25.pdf
This document contains internal NSA training material, explaining in detail the separation between the role the technician as it relates to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.

20131211-svt-xkeyscore_sources.pdf
This is an extract of an internal NSA presentation. It describes the sources of information that are aggregated in the NSA's access-tool, XKEYSCORE.

20141228-spiegel-intercept_with_pgp_encrypted_message.pdf
This document is a heavily redacted intercepted chat log. The log shows that the NSA was not able to decrypt the message that was encrypted with PGP (Pretty Good Privacy).
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2