Browse Items (626 total)

20150117-spiegel-overview_of_the_transgression_program_to_analyze_and_exploit_foreign_cna-cne_exploits.pdf
This document is a presentation deck from the NSA giving an overview of the TRANSGRESSION program, which aims to discover, evaluate and exploit foreign CNOs and hopes to provide cryptanalytic exploitation support. The presentation includes the…

20140102-wapo-quantum_computers_hard_targets.pdf
This document is an extract from a larger document, the "black budget," detailing the research and technology behind two US signals and intelligence projects: "Penetrating Hard Targets" and "Owning the Net." Both projects are housed under the arm of…

20130620-guard-702_targeting_procedures.pdf
This document is a memo submitted to the Foreign Intelligence Surveillance Court that describes the procedures used by the NSA for determining the "foreignness" of persons targeted for surveillance. The document also describes the oversight and…

20150701-intercept-xks_logos_embedded_in_docs.pdf
This document is an internal NSA memo. It describes the use of the XKEYSCORE data analysis tool to retrieve intelligence from attatched logos embedded in online documents.

20131101-guard-corporate_reporting.pdf
This document contains a NSA graph detailing the reports made by data from various telecommunications companies, including Microsoft, Yahoo, Google, Facebook and Paltalk.

20150925-intercept-data_stored_in_black_hole.pdf
This document is an internal GCHQ wiki page. It describes BLACK HOLE, a data repository holding a variety of differnent data sources including: webmail, email transfers, ftp transfers, internet browsing metadata and website logins. The document also…

20150219-Intercept-Dapino Gamma Gemalto Yuaawaa Wiki.pdf
This document appears to be an extract from a GCHQ wiki article. It describes Gemalto's Yuaawaa secure file sharing device, and GCHQ attempts to gain access to it.

05-Introduction-to-WLAN-CNE-Operations-Redacted.pdf
This document is a slide deck during a "Close Access" NSA training course to introduce students to computer network exploitation (CNE) using the FOXACID server in combinations with other tools, BADDECISION and NIGHTSTAND.

20150402-Intercept-JTRIG Wiki Highlights August 2009.pdf
This document is an extract from a newsletter created by GCHQ's JTRIG division. It describes the planning processes behind operation QUITO, an effort to manipulate Latin American public opinion regarding the country's claims to the Falkland Islands /…

20131028-mundo-spain_collections.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Spain in a 30 day period between December 10 2012 and Janurary 8 2013.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2