This document is a factsheet from the Office of SIGINT Development. It lists the various QUANTUM programs in operation or in live testing, including their success rate. Programs include diverse CNO (computer network operations) devised for SIGINT…
This document is an internal NSA timeline that details the developments in American surveillance law. It identifies relevant laws, executive orders, FISC orders and policies.
This is a presentation report which gives an overview of the GCHQ program for monitoring unselected TLS events over popular websites such as Facebook, Twitter and Gmail. Transport Layer Security is "cryptographic protocol designed to provide…
This document is a presentation overview into CSEC's analysis of TLS (Tranport Layer Security) traffic, in an effort to identify encryption capabilites, services, trends, and changes. Workflows show warranted collection and collection from a special…
This document is a presentation overview into CSEC's analysis of TLS (Tranport Layer Security) traffic, in an effort to identify encryption capabilites, services, trends, and changes. Workflows show warranted collection and collection from a special…
This document is a report describing the TOR network and the NSA's attempts to uncloak its anonymous traffic, including the MJOLNIR program. TOR is a service designed to protect online anonymity partially funded by the US due to its use by dissents…
This document is a presentation that gives information on TOR (The Onion Router): its background, how it works to keep users anonymous, and suggestions/challenges for circumvention.
This document is an extract from an internal NSA presentation about XKEYSCORE, the NSA's tool to search and analyze surveillance data. It describes the scope and content of the MARINA and PINWALE databases, as well as the NSA's ability to track…
This document contains a presentation prepared by the NSA analyzing the TOR router. TOR is a service designed to protect online anonymity partially funded by the US due to its use by dissents in repressive regimes such as Syria and China. The NSA's…