Browse Items (626 total)

20140618-der_spiegel-explanation_of_nymrod_a_system_for_searching_for_people_and_places_in_databases_and_documents.pdf
This document is an internal NSA memo. It describes the operation of NYMROD, an automatic name recognition tool.

20140914-spiegel-treasure_map_announces_a_new_release.pdf
This document is a release announcing a new version of TREASUREMAP, an NSA system for "global IP network-mapping and exploration." The release highlights new and improved features and stresses the system's ability to show a "near real-time,…

20150117-spiegel-overview_of_the_transgression_program_to_analyze_and_exploit_foreign_cna-cne_exploits.pdf
This document is a presentation deck from the NSA giving an overview of the TRANSGRESSION program, which aims to discover, evaluate and exploit foreign CNOs and hopes to provide cryptanalytic exploitation support. The presentation includes the…

20150701-intercept-trafficthief_readme.pdf
This documnent is an internal NSA memo. It outlines the procedures in configuring TRAFFICTHIEF. TRAFFICTHIEF is the NSA's "corporate alerting and tipping system", which interacts with the data analysis tool TRAFFICTHIEF to provide real time…

20150701-intercept-tracking_targets_on_online_social_networks.pdf
This document is an internal NSA presentation. It outlines the procedures for retrieving intelligence located in NSA repositories harvested from from online social networks using the NSA's data analysis tool, XKEYSCORE.

20150310-Intercept-TPM Vulnerabilities to Power Analysis and An.pdf
This document is an abstract for a presentation created by the CIA. The presentation focused on exploiting vulnerabilities within Microsoft's Bitlocker encrypted metadata software system.

20131004-guard-tor_stinks.pdf
This document contains a presentation prepared by the NSA analyzing the TOR router. TOR is a service designed to protect online anonymity partially funded by the US due to its use by dissents in repressive regimes such as Syria and China. The NSA's…

20131211-svt-nsa_slides_xkeyscore.pdf
This document is an extract from an internal NSA presentation about XKEYSCORE, the NSA's tool to search and analyze surveillance data. It describes the scope and content of the MARINA and PINWALE databases, as well as the NSA's ability to track…

20141228-speigel-analytics_on_security_of_tor_hidden_services_0.pdf
This document is a presentation that gives information on TOR (The Onion Router): its background, how it works to keep users anonymous, and suggestions/challenges for circumvention.

20131004-wapo-tor.pdf
This document is a report describing the TOR network and the NSA's attempts to uncloak its anonymous traffic, including the MJOLNIR program. TOR is a service designed to protect online anonymity partially funded by the US due to its use by dissents…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2