Browse Items (626 total)

nsa-fullman-intercept-16-0813.pdf
These documents are examples of personal civillian internet communications material collected by the PRISM program.

20141228-speigel-canadian_document_from_ces_on_tls_trends_0.pdf
This document is a presentation overview into CSEC's analysis of TLS (Tranport Layer Security) traffic, in an effort to identify encryption capabilites, services, trends, and changes. Workflows show warranted collection and collection from a special…

20141228-speigel-canadian_document_from_ces_on_tls_trends_0.pdf
This document is a presentation overview into CSEC's analysis of TLS (Tranport Layer Security) traffic, in an effort to identify encryption capabilites, services, trends, and changes. Workflows show warranted collection and collection from a special…

20141228-speigel-analysis_from_ssl-tls_connections_through_gchq_in_the_flying_pig_database_0.pdf
This is a presentation report which gives an overview of the GCHQ program for monitoring unselected TLS events over popular websites such as Facebook, Twitter and Gmail. Transport Layer Security is "cryptographic protocol designed to provide…

20140311-nyt-nsa_timeline_of_surveillance_law_developments.pdf
This document is an internal NSA timeline that details the developments in American surveillance law. It identifies relevant laws, executive orders, FISC orders and policies.

20140312-intercept-multiple_methods_of_quantum.pdf
This document is a factsheet from the Office of SIGINT Development. It lists the various QUANTUM programs in operation or in live testing, including their success rate. Programs include diverse CNO (computer network operations) devised for SIGINT…

20150701-intercept-unofficial_xks_user_guide.pdf
This document is a report prepared by a consultant working for Booz Allen Hamilton. It provides a comprehensive user's guide for the NSA's data analysis tool, XKEYSCORE.

20131119-odni-nsa_course_materials_module_6_tech_personnel_v.25.pdf
This document contains internal NSA training material, explaining in detail the separation between the role the technician as it relates to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.

20150528-intercept-fallacies_behind_the_scenes.pdf
This document is a memo prepared by an official within the NSA's Signals Intelligence Directorate (SID). It raises the concern that the structure of SID's SIGINT intelligence gathering operations may affect the cognitive biases of officers within…

20150811-intercept-when-brevity-is-just-the-soul-of-huh.pdf
This document is a column from the NSA newsletter, SIDtoday, written by the SIGINT philosopher. It dicusses workplace writtern correspondence etiquette.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2