Browse Items (626 total)

20130630-guard-dropmire_.pdf
This document is a single slide from a presentation on DROPMIRE, a bug that was implanted by the NSA on the "cryptofax" of the EU's embassy in Washington, DC. The document notes that this fax was used to send cables back to foreign affairs ministries…

This document is a slide from a NSA presentation describing the NSA's collection activities worldwide. Specifically, it illustrates that the NSA used a technique called "Computer Network Exploitation" (CNE) to install malware onto over 50,000 devices…

20131123-nrc-nsa_malware.pdf
This document is a slide from a NSA presentation describing the NSA's collection activities worldwide. Specifically, it illustrates that the NSA used a technique called "Computer Network Exploitation" (CNE) to install malware onto over 50,000 devices…

20140618-der_spiegel-report_on_an_xkeyscore_training_session_at_the_ecc_dagger_complex.pdf
This document is a NSA release which gives an account of an Xkeyscore (data processing system) training session, concerning bulk and targetted data collection and analysis, that took place at NSA's European Cryptologic Center (ECC) in Darmstadt,…

20140618-der_spiegel-preliminary_agenda_of_a_meeting_between_nsa_and_bnd_officials.pdf
This document is a draft of the NSA agenda detailing the plans for the upcoming meetings between top BND officials and NSA.

20140218-intercept-discovery_sigint_targeting_scenarios_and_compliance.pdf
This document is an entry from an internal NSA wiki. It describes various SIGINT targeting scenarios and the appropriate course of action in each case, provided from NSA guidelines and policies.

20140618-dagbladet-keith_alexander_talking_points.pdf
This document contains notes for the opening remarks offered by former NSA Director, Keith Alexander at the 2013 DENUSA conference in Copenhagen, Denmark.

20150310-Intercept-Differential Power Analysis on the Apple A4.pdf
This document is an abstract for a presentation by the CIA. It describes the CIA's attempts to subvert the A4 Processor used by Apple in the iPhone 4, the iPod touch, and the first generation iPad.

20150117-spiegel-overview_on_the_nsa_use_of_bots_and_the_defiantwarrior_program.pdf
This document is a presentation deck giving an overview of the NSA's techniques for detecting bots and using bots in their CNE operations. The document discusses the main uses for bots and bot herding, how they can be used in SIGINT, future hopes and…

20150701-intercept-deepdive_readme.pdf
This document is a readme for DEEPDIVE, a means of establishing a "filter" in front of a traditional server using XKEYSCORE, a data analysis tool used by the NSA.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2