This document is a presentation overview into CSEC's analysis of TLS (Tranport Layer Security) traffic, in an effort to identify encryption capabilites, services, trends, and changes. Workflows show warranted collection and collection from a special…
This document is a presentation overview into CSEC's analysis of TLS (Tranport Layer Security) traffic, in an effort to identify encryption capabilites, services, trends, and changes. Workflows show warranted collection and collection from a special…
This is a presentation report which gives an overview of the GCHQ program for monitoring unselected TLS events over popular websites such as Facebook, Twitter and Gmail. Transport Layer Security is "cryptographic protocol designed to provide…
This document is an internal NSA timeline that details the developments in American surveillance law. It identifies relevant laws, executive orders, FISC orders and policies.
This document is a factsheet from the Office of SIGINT Development. It lists the various QUANTUM programs in operation or in live testing, including their success rate. Programs include diverse CNO (computer network operations) devised for SIGINT…
This document is a report prepared by a consultant working for Booz Allen Hamilton. It provides a comprehensive user's guide for the NSA's data analysis tool, XKEYSCORE.
This document contains internal NSA training material, explaining in detail the separation between the role the technician as it relates to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.
This document is a memo prepared by an official within the NSA's Signals Intelligence Directorate (SID). It raises the concern that the structure of SID's SIGINT intelligence gathering operations may affect the cognitive biases of officers within…
This document is a column from the NSA newsletter, SIDtoday, written by the SIGINT philosopher. It dicusses workplace writtern correspondence etiquette.