Browse Items (626 total)

20131230-appelbaum-nsa_ant_catalog.pdf
This document is a catalog of the technologies and devices available to the NSA to aid in surveillance. Most devices are described as being operational and available to intelligence agencies across the Five Eyes (5VEY) alliance. The capabilities and…

20131230-spiegel-tao_intro.pdf
This document is an internal NSA presentation that describes the structure, operations and resources of the Tailored Access Operations (TAO) division. It includes personnel lists, office and facility maps, and key operations. It also describes…

20141010-intercept-computer_network_exploitation_classification_guide.pdf
This document is a classification guide for NSA Computer Network Exploitation (CNE) programs.

20131021-monde-close_access_sigads.pdf
This document is a NSA briefing of the close access SIGADs used by the NSA's Tailored Access Operations to perform diplomatic surveillance on embassies in New York and Washington, DC. The document also contains a glossary defining certain key SIGADs…

20140312-intercept-increasing_collection_capacity_by_increasing_implants.pdf
This document is an extract from an internal NSA report. It describes the Tailored Access Operation's (TAO) efforts to expand their hardware infrastructure, enabling more active implants to be carried out on a daily basis.

20150117-spiegel-quantumtheory_is_a_set_of_technologies_allowing_man-on-the-side_interference_attacks_on_tcp-ip_connections_includes_straightbizarre_and_daredev.pdf
This document contains presentation slides from the 2010 SIGINT Development Conference outlining the QUANTUMTHEORY program and its sub-programs, from legacy to those in experimental stages.

20150117-speigel-classification_guide_for_computer_network_exploitation_cne.pdf
This document is a classification guide provided by the NSA branch, Tailer Access Operations (TAO), which outlines the level of classification assigned to specific aspects of computer network intelligence operations.

20150117-spiegel-the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa_0.pdf
This document is a presentation deck for the FASHIONCLEFT protocol, which is a TAO (Tailored Access Operations) protocol used by implants to exfiltrate target data in computer network operations. The document defines FASHIONCLEFT, gives details on…

20150117-spiegel-nsa_fourth_party_access_-_i_drink_your_milkshake_.pdf
This document is a presentation deck from the Fourth Party IPT branch of the TAO (Tailored Access Operations) division of the NSA. The presentation details the opportunities provided through "Fourth Party collection" which "leverages CCNE accesses to…

20150117-spiegel-nsa_project_description_to_recognize_and_process_data_that_comes_from_third_party_attacks_on_computers.pdf
This document is a report from the NSA's TAO (Tailer Access Operations) CT10 Pilot Project, on the inclusion of (CNE) computer network exploitation data. The report gives the current status of the project, near and short term goals, and challenges.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2