Browse Items (626 total)

20140519-intercept-sso_dictionary_excerpt.pdf
This document is an excerpt from an NSA Special Source Operations glossary which provides the code names, countries and details for the audio data and bulk collection programs generally known as MYSTIC.

20131210-wapo-ghost_machine.pdf
This document contains excerpts from an internal NSA presentation describing the NSA's cloud analytics platform, code-named GHOSTMACHINE. It is administered by Special Source Operations (SSO).

20130627-guard-nsa_oig_2009_report.pdf
This document is a draft report by the NSA's inspector general. It shows the development and operations of the Presidents Surveillance Program, a collection of surveillance programs began by George W Bush in the aftermath of September 11, 2001 and…

20141214-intercept-gchq_stargate_cne_requirements.pdf
This document is a page from the GCWiki to facilitate planning a new file system (STARGATE) for computer network exploitation (CNE).

20141228-speigel-description_of_existing_projects_on_vpn_decryption_0.pdf
This document is a draft of a project plan outline for VPN exploitation, with dates and nexts steps, for targeting SMK.

20150701-intercept-stats_config_readme.pdf
This document is a memo prepared by the NSA. It outlines procedures to change the default statistic configurations of the NSA's XKEYSCORE data analysis program.

20150219-Intercept-CCNE Stats Summaries Jan10 Mar10 Trial.pdf
This document is an extract from an internal GCHQ presentation. It provides statistics and summaries for the data identified in various mobile phone networks retrieved using compromised SIM encyption keys gained from an attack on the SIM card…

20150117-spiegel-supply-chain_interdiction_-_stealthy_techniques_can_crack_some_of_sigints_hardest_targets.pdf
This article, from the NSA's SIDtoday newsletter, describes the success of a hands-on interception program. Shipments of computer network devices (servers, routers, etc.), en route to target locations, are intercepted and physically implanted with…

20140311-nyt-classification_guide_for_stellarwind_program_0.pdf
This document is a classification guide for the NSA's STELLARWIND program.

20140805-Intercept-Directorate-of-Terrorist-Identities-Strategic-Accomplishments-2013.pdf
This report documents the strategic accomplishments of the National Counterterrorism Center's Directorate of Terrorist Identities (DTI) for 2013. It refers to the expansion of the TIDE (Terrorist Identities Datamart Environment) system, biometric…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2