This document is an abstract for a presentation created by the CIA. The presentation focused on exploiting vulnerabilities within Microsoft's Bitlocker encrypted metadata software system.
This document is an internal NSA presentation. It outlines the procedures for retrieving intelligence located in NSA repositories harvested from from online social networks using the NSA's data analysis tool, XKEYSCORE.
This documnent is an internal NSA memo. It outlines the procedures in configuring TRAFFICTHIEF. TRAFFICTHIEF is the NSA's "corporate alerting and tipping system", which interacts with the data analysis tool TRAFFICTHIEF to provide real time…
This document is a presentation deck from the NSA giving an overview of the TRANSGRESSION program, which aims to discover, evaluate and exploit foreign CNOs and hopes to provide cryptanalytic exploitation support. The presentation includes the…
This document is a release announcing a new version of TREASUREMAP, an NSA system for "global IP network-mapping and exploration." The release highlights new and improved features and stresses the system's ability to show a "near real-time,…
This document is a release outlining the situation of NSA, Turkey and the PKK, and complications due to the NSA SIGINT partnership with Turkey. The NSA describes the PKK action in northern Iraq and "cross-border operations" as an Iraqi sovereignty…
This document contains briefing for Turkish involvement at an upcoming G20 pre-meeting and discusses objectives and targets for the occaision. Concerns include financial system stability, global trade, reform, and sustainable recovery, as well as…
This document contains pages from the NSA internal wiki detailing the TURMOIL GALLANTWAVE program which allows exploitation of large communications systems which use Data Network Session Cipher (DNSC).
This document describes the processing of VPN data packets within the TURMOIL program. More specifically, the "document describes the sessionization requirements for the various IPSec VPN protocols processed."