Browse Items (626 total)

20131210-wapo-target_location.pdf
This document is an excerpt from a transcript of an NSA training video. It describes how to verify the location of a targeted mobile device. It describes how the NSA monitors different types of mobile signaling information known as HLR and VLR…

20140805-Intercept-Directorate-of-Terrorist-Identities-Strategic-Accomplishments-2013.pdf
This report documents the strategic accomplishments of the National Counterterrorism Center's Directorate of Terrorist Identities (DTI) for 2013. It refers to the expansion of the TIDE (Terrorist Identities Datamart Environment) system, biometric…

20150219-Intercept-Where are These Keys.pdf
This document is an extract from an internal GCHQ presentation. It describes the operation of a traditional mobile telecommunications network, and the position of Individual Subscriber Authentication Keys (KI values) within it.

20140312-intercept-turbine_industrial_scale_exploitation.pdf
This document contains one slide from a NSA presentation detailing the benefits of the TURBINE program for automating computer network exploitation programs, suggesting that it allows for "industrial-scale exploitation."

20140914-spiegel-satellite_teleport_knowledge.pdf
This document is a brief for a project which aims to develop "in depth knowledge of key Satellite IP service providers in Germany in support of .. developing German IP transit knowledge." The brief lists three target service providers and key…

20140914-intercept-key_activities_in_progress.pdf
This document contains an excerpted and heavily redacted NSA presentation slide. Slide is a progress report from the NSA; the information provided refers the New Zealand cable access partner program, allegedly SPEARGUN, and confirms that phase 1 is…

20140630-WaPo-fisa_amendments_act_summary_document_1.pdf
This document is a briefing of the impact of the 2008 FISA Amendment Act's Section 702 upon the NSA's surveillance activities.

20141204-intercept-nsa_gchq_csec_network_tradecraft_advancement.pdf
This document is an extract of a presentation discussing the collaboration between CSE, NSA and GSHQ on various aspects of signals intelligence, including VPN exploitation, network intelligence, IP analysis, and IR21 processing.

20131004-guard-egotistical_giraffe (1).pdf
This document is a briefing describing the NSA's efforts to undermine the TOR network, codenamed EGOTISTICAL GIRAFFE. This briefing describes a technique developed by the NSA to attack TOR users through vulnerabilities in the TOR browser bundle and…

20140131-cbc-csec_airport_wifi_tracking.pdf
This document is a presentation which outlines a CSEC test program that tracked the movement of user ids on IP addresses for popular urban wireless internet connections, such as airports, hotels, libraries and coffee shops, by providing "richer…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2