Browse Items (626 total)

20140312-intercept-multiple_methods_of_quantum.pdf
This document is a factsheet from the Office of SIGINT Development. It lists the various QUANTUM programs in operation or in live testing, including their success rate. Programs include diverse CNO (computer network operations) devised for SIGINT…

20140311-nyt-nsa_timeline_of_surveillance_law_developments.pdf
This document is an internal NSA timeline that details the developments in American surveillance law. It identifies relevant laws, executive orders, FISC orders and policies.

20141228-speigel-analysis_from_ssl-tls_connections_through_gchq_in_the_flying_pig_database_0.pdf
This is a presentation report which gives an overview of the GCHQ program for monitoring unselected TLS events over popular websites such as Facebook, Twitter and Gmail. Transport Layer Security is "cryptographic protocol designed to provide…

20141228-speigel-canadian_document_from_ces_on_tls_trends_0.pdf
This document is a presentation overview into CSEC's analysis of TLS (Tranport Layer Security) traffic, in an effort to identify encryption capabilites, services, trends, and changes. Workflows show warranted collection and collection from a special…

20141228-speigel-canadian_document_from_ces_on_tls_trends_0.pdf
This document is a presentation overview into CSEC's analysis of TLS (Tranport Layer Security) traffic, in an effort to identify encryption capabilites, services, trends, and changes. Workflows show warranted collection and collection from a special…

nsa-fullman-intercept-16-0813.pdf
These documents are examples of personal civillian internet communications material collected by the PRISM program.

20131004-wapo-tor.pdf
This document is a report describing the TOR network and the NSA's attempts to uncloak its anonymous traffic, including the MJOLNIR program. TOR is a service designed to protect online anonymity partially funded by the US due to its use by dissents…

20141228-speigel-analytics_on_security_of_tor_hidden_services_0.pdf
This document is a presentation that gives information on TOR (The Onion Router): its background, how it works to keep users anonymous, and suggestions/challenges for circumvention.

20131211-svt-nsa_slides_xkeyscore.pdf
This document is an extract from an internal NSA presentation about XKEYSCORE, the NSA's tool to search and analyze surveillance data. It describes the scope and content of the MARINA and PINWALE databases, as well as the NSA's ability to track…

20131004-guard-tor_stinks.pdf
This document contains a presentation prepared by the NSA analyzing the TOR router. TOR is a service designed to protect online anonymity partially funded by the US due to its use by dissents in repressive regimes such as Syria and China. The NSA's…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2