Browse Items (626 total)

20131024-guard-phones_world_leaders.pdf
This document is a report authored by members of the NSA's Signals Intelligence Directorate. It describes the NSA's efforts to encourage US officials to share their personal contact databases (called "rolodexes") to provide contact information for…

20150518_intercept_nctc-current-status-of-major-terrorism-figures.pdf
This document is an extract from an NSA report detailing the current (as of June 2008) status and location of Usama Bin Laden and Ayman al-Zawahiri.

20150117-speigel-csec_document_about_the_recognition_of_trojans_and_other_network_based_anomaly_.pdf
This document is a CSEC presentation deck that summarizes the collaboration between "analysts and operators from CNE Operations, Cyber Counterintelligence and Global Network Detection" to provide both defensive and offensive CNE (computer network…

20150323-CBC-CSEC SIGINT Cyber Discovery.pdf
This document is a presentation by CSEC that was presented to GCHQ at teh Discovery Conference in November 2010. It summarizes CSEC's current state of SIGINT Cyber Discovery operations. It also describes the WARRIORPRIDE, REPLICANTFARM, EONBLUE and…

20150323-CBC-CSEC Cyber Threat Capabilities.pdf
This document is a presentation prepared by CSEC. It describes CSEC's capabilities in CNE (Compter Network Exploitation) and CND (Computer Network Defense) operations. It also describes the EONBLUE cyber threat detection sensor.

20131119-odni-nsa_cryptological_school_course_slides_on_legal_compliance_and_minimization_procedures.pdf
This document contains internal NSA training material, explaining the agency's legal, compliance, and minimization procedures. These course materials have been designed for NSA personnel that had access to bulk telephony and electronic communications…

20150310-Intercept-Black Budget Cryptanalysis Amp Exploitation.pdf
This document is an extract of a report created by the NSA's division of Cryptanalysis and Exploitation Services (CES). It describes the Target Systems Project, which aims to produce capacities to exploit new communications technologies and systems…

20150925-intercept-crypt_discovery_activity.pdf
This document is a report prepared in conjunction between the NSA and GCHQ. It documents a collaborative plan to develop and use various surveillance tools aimed at subverting encryption technologies.

20140825-Intercept-CRISSCROSSPROTON-Point-Paper.pdf
This document is a point paper on CRISSCROSS/PROTON with the purpose to provide DIRNSA information on subject. The paper gives a detailed overview of the communications metadata collection and access applications CRISSCROSS and its more sophisticated…

20140618-DerSpiegel-internal_nsa_discussion_guidelines_relating_to_cooperation_with_the_bnd_and_bfv.pdf
This document is a briefing sheet describing elements of the intelligence relationship between the National Security Agency and the German Federal Intelligence Service (BND) and the German Federal Office for the Protection of the Constitution (BfV).…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2