This document contains a presentation prepared by the NSA analyzing the TOR router. TOR is a service designed to protect online anonymity partially funded by the US due to its use by dissents in repressive regimes such as Syria and China. The NSA's…
This document is a presentation describing GCHQ's FLYING PIG Program, a means of monitoring secure TLS / SSL computer networks through "MiTM" or "Man in the Middle" attacks where data is routed to a government server and then relayed to its…
This document is a study which overviews the key elements of the NSA's Co-Traveler analytics programs. Co-Traveler is a blanket term used when describing bulk location information processing. The report includes a description of the analytic, its…
This document is a presentation demonstrating the NSA's mass untargeted collection and analysis of SMS text messages. It gives figures demostrating the programs reach. Collection data includes VCARDS, Geocoordinates, Missed Calls, SIM Card Changes,…
This document is a briefing posted to the NSA's internal website detailing the upcoming UN Climate Control Conference and the broad goals for overcoming a divide between developed and developing countries. The document refers to surveillance…
This document is a NSA wikiInfo page outlining potential intern projects under the NSA CNA (Computer Network Attack) team. Most of the projects are "tasked to remotely degrade or destroy opponent computers, routers, servers and network enabled…
This document is a NSA brief describing the NSA's SIGINT strategies circa February 2012. It describes their mission with broad goals, including a desire to push for changes to the law enabling expanded surveillance powers, and a desire to…
This document is an internal NSA presentation. It explains the syntax behind the construction of AppIds and Fingerprints in the NSA's XKEYSCORE data analysis program. AppIds and Fingerprints are methods to make searches of intelligence information…