Browse Items (626 total)

05-Introduction-to-WLAN-CNE-Operations-Redacted.pdf
This document is a slide deck during a "Close Access" NSA training course to introduce students to computer network exploitation (CNE) using the FOXACID server in combinations with other tools, BADDECISION and NIGHTSTAND.

01-Course-Introduction-Nohidden-Redacted.pdf
This document is a slide deck introducing a "Close Access" NSA training course to "familiarize, educate, and certify students in the operational usage" of various computer network exploitation tools.

20150928-intercept-another_successful_olympics_story.pdf
This document is a release from the NSA internal newsletter, SIDtoday. It describes the successful NSA operation that was collaboration among several teams, including Tailer Access Operations and Special Source Operations, in order to access,…

20140831-spiegel-nsas_oldest_third_party_partnership.pdf
This document is a NSA release detailing the history and current partnership between Turkish and U.S intelligence operations. Intelligence sharing began in 1949 between the CIA and the Turkish Electronic and Technical Intelligence (ETI) and has…

20130905-guard-bullrun.pdf
This document is a NSA classification guide detailing the appropriate security classifications for describing different elements of program BULLRUN. This program is used to unlock encryption tools used to protect emails, banking and medical records.

20141010-intercept-eci_pawleys_classification_guide.pdf
This document is a classification guide for the NSA's PAWLEYS program, which has a security classification of ECI (Exceptionally Controlled Information). PAWLEYS is a program aiming to protect clandestine HUMINT and computer network access intended…

20141228-spiegel-general_description_how_nsa_handles_encrypted_traffic.pdf
This document is a newsletter article from the NSA Cryptanalysis and Exploitation Services that discusses the rise of "ubiquitous encryption" on the internet, and the NSAs top secret strategies for circumvention.

20141228-speigel-description_of_existing_projects_on_vpn_decryption_0.pdf
This document is a draft of a project plan outline for VPN exploitation, with dates and nexts steps, for targeting SMK.

20140311-nyt-nsa_memo_expands_access_to_fisa_information.pdf
This document is an NSA staff processing form addressed to the SIGINT Director of the NSA's Signals Intelligence Directorate (SID). It requests SID approval for the Cryptanalis and Exploitation Division (CES) at the Cryptologic Centers (CCs) in…

20150310-Intercept-Black Budget Cryptanalysis Amp Exploitation.pdf
This document is an extract of a report created by the NSA's division of Cryptanalysis and Exploitation Services (CES). It describes the Target Systems Project, which aims to produce capacities to exploit new communications technologies and systems…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2