Browse Items (626 total)

20131104-nyt-sigint_goals.pdf
This document is a report detailing the state of the NSA's SIGINT system as of January 2007. A variety of strategic mission areas are described, along with key targets for SIGINT operations. Mission areas include: winning the global war on terror,…

20140130-information_dk-cop15_interception_document.pdf
This document is a briefing posted to the NSA's internal website detailing the upcoming UN Climate Control Conference and the broad goals for overcoming a divide between developed and developing countries. The document refers to surveillance…

20150219-Intercept-CCNE Email Harvesting Jan10 Mar10 Trial.pdf
This document is an extract from an internal GCHQ presentation. It provides an example of an email harvested using SIM encryption keys compromised in a CNE attack on the SIM card manufacturer, Gemalto.

20140211-intercept-drones_intercepting_communications.pdf
This document is a series of extracts from an NSA report. It describes the GILGAMESH and VICTORYDANCE programs, which were efforts to use new geolocation algorithms in collaboration with the CIA's drone assassination program. It describes the…

20131004-guard-iat_tor.pdf
This document is a presentation describing forms of Open Source Multi-Hop Networks. The most famous of these is TOR, The Onion Router, a service designed to protect online anonymity partially funded by the US due to its use by dissents in repressive…

20150117-spiegel-nsa_program_tutelage_to_instrumentalize_third_party_attack_tools.pdf
This document is a presentation deck from the NSA's Threat Operations Center (NTOC) outlining TUTELAGE, an application that instrumentalizes 3rd party attacks. The presentation goes over TUTELAGE's current and future capabilities of alerting,…

20141228-spiegel-description_on_the_processing_of_vpn_data_packets_within_the_turmoil_program.pdf
This document describes the processing of VPN data packets within the TURMOIL program. More specifically, the "document describes the sessionization requirements for the various IPSec VPN protocols processed."

20141228-spiegel-explanation_of_the_turmoil_gallantwave_program_and_its_role_when_attacking_vpn_0.pdf
This document contains pages from the NSA internal wiki detailing the TURMOIL GALLANTWAVE program which allows exploitation of large communications systems which use Data Network Session Cipher (DNSC).

20140831-spiegel-turkey_at_the_g20_pre-meeting.pdf
This document contains briefing for Turkish involvement at an upcoming G20 pre-meeting and discusses objectives and targets for the occaision. Concerns include financial system stability, global trade, reform, and sustainable recovery, as well as…

20140831-spiegel-turkey_and_the_pkk.pdf
This document is a release outlining the situation of NSA, Turkey and the PKK, and complications due to the NSA SIGINT partnership with Turkey. The NSA describes the PKK action in northern Iraq and "cross-border operations" as an Iraqi sovereignty…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2