This articles, from the SIGINT philosopher series, published in the internal NSA newsletter, SIDtoday, discusses the analysts role in acknowledging the SIGINT information gaps. The article gives insight into the work of a SIGINT analyst.
This NSA document, from "no earlier than 2010," is a draft of the standard operating procedures for using the FOXACID server. This NSA server is used in TAO (tailored access operations) for hacking into target's networks. The user manual describes…
This document is a slide deck introducing a "Close Access" NSA training course to "familiarize, educate, and certify students in the operational usage" of various computer network exploitation tools.
This document is a report prepared by GCHQ's Access Strategy Team. It provides an analysis of Juniper Networks Inc. A key producer of network products including routers, ethernet switches, and NetScreen and SRX-series security products. This report…