Browse Items (626 total)

20141010-intercept-cno_core_secrets_slide_slices.pdf
This NSA diagram presents the United States intelligence community's security and distribution codes in a visual form.

20150811-intercept-sigint-philosopher-in-praise-of-not-knowing.pdf
This articles, from the SIGINT philosopher series, published in the internal NSA newsletter, SIDtoday, discusses the analysts role in acknowledging the SIGINT information gaps. The article gives insight into the work of a SIGINT analyst.

FOXACID-Server-SOP-Redacted.pdf
This NSA document, from "no earlier than 2010," is a draft of the standard operating procedures for using the FOXACID server. This NSA server is used in TAO (tailored access operations) for hacking into target's networks. The user manual describes…

01-Course-Introduction-Nohidden-Redacted.pdf
This document is a slide deck introducing a "Close Access" NSA training course to "familiarize, educate, and certify students in the operational usage" of various computer network exploitation tools.

20151223-intercept-juniper.pdf
This document is a report prepared by GCHQ's Access Strategy Team. It provides an analysis of Juniper Networks Inc. A key producer of network products including routers, ethernet switches, and NetScreen and SRX-series security products. This report…

Army Cryptologic Operations - Operations Division.pdf
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2