Browse Items (626 total)

20150117-spiegel-nsa_program_tutelage_to_instrumentalize_third_party_attack_tools.pdf
This document is a presentation deck from the NSA's Threat Operations Center (NTOC) outlining TUTELAGE, an application that instrumentalizes 3rd party attacks. The presentation goes over TUTELAGE's current and future capabilities of alerting,…

20131004-guard-iat_tor.pdf
This document is a presentation describing forms of Open Source Multi-Hop Networks. The most famous of these is TOR, The Onion Router, a service designed to protect online anonymity partially funded by the US due to its use by dissents in repressive…

20140211-intercept-drones_intercepting_communications.pdf
This document is a series of extracts from an NSA report. It describes the GILGAMESH and VICTORYDANCE programs, which were efforts to use new geolocation algorithms in collaboration with the CIA's drone assassination program. It describes the…

20150219-Intercept-CCNE Email Harvesting Jan10 Mar10 Trial.pdf
This document is an extract from an internal GCHQ presentation. It provides an example of an email harvested using SIM encryption keys compromised in a CNE attack on the SIM card manufacturer, Gemalto.

20140130-information_dk-cop15_interception_document.pdf
This document is a briefing posted to the NSA's internal website detailing the upcoming UN Climate Control Conference and the broad goals for overcoming a divide between developed and developing countries. The document refers to surveillance…

20131104-nyt-sigint_goals.pdf
This document is a report detailing the state of the NSA's SIGINT system as of January 2007. A variety of strategic mission areas are described, along with key targets for SIGINT operations. Mission areas include: winning the global war on terror,…

20130908-globo-stormbrew_tv.pdf
This document is a presentation describing the NSA's STORMBREW program, an UPSTREAM collection program that intercepts internet communications as they pass through points in the US's fibre optic communications infrastructure. The slides are in a very…

20140618-der_spiegel-report_on_the_surveillance_of_african_countries_by_jsa.pdf
This NSA document gives an overview of the JSA - Joint Signals Activity - an NSA/BND intelligence partnership and their joint intelligence work in North Africa.

20140618-der_spiegel-report_on_the_surveillance_of_african_countries_by_jsa.pdf
This NSA document gives an overview of the JSA - Joint Signals Activity - an NSA/BND intelligence partnership and their joint intelligence work in North Africa.

20150701-intercept-user_agents.pdf
This document is an internal NSA presentation. It documents the data analysis tool XKEYSCORE's ability to create and manage User Agents (UAs). UAs are strings of data sent to visited websites, providing XKEYSCORE with a means of gleaning various…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2