Browse Items (626 total)

20150701-intercept-phone_number_extractor.pdf
This document is an internal NSA presentation. It outlines how the data analysis tool XKEYSCORE can be used to retrieve target's phone numbers.

20150622-intercept-kaspersky_user-agent_strings_-_nsa.pdf
This document is a Report created by the NSA. It describes attempts to exploit weaknesses in anti-virus systems created by the Russian company, Kapersky Lab.

20140618-der_spiegel-nostalgic_recollections_from_nsa_workers_formerly_stationed_in_bad_aibling.pdf
This NSA newsrelease contains former Bad Aibiling NSA staff memories from their time at the station.

20150518_intercept_nctc-current-status-of-major-terrorism-figures.pdf
This document is an extract from an NSA report detailing the current (as of June 2008) status and location of Usama Bin Laden and Ayman al-Zawahiri.

20140618-der_spiegel-boundless_informant_statistics_on_germany.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Germany in a 30 day period between December 10 2012 and Janurary 8 2013.

20150701-intercept-email_address_vs_user_activity.pdf
This document is an internal NSA presentation. It describes the functions of the XKEYSCORE querying tool used by NSA analysts. This presentation focuses on retrieving data on targets through queries to their email addresses and user activity.

20140803-Intercept-NSA-Intelligence-Relationship-With-Israel.pdf
This document is a report detailing the intelligence agreement operating between the National Security Agency and the Israeli SIGINT National Unit (ISNU).

20131004-wapo-tor.pdf
This document is a report describing the TOR network and the NSA's attempts to uncloak its anonymous traffic, including the MJOLNIR program. TOR is a service designed to protect online anonymity partially funded by the US due to its use by dissents…

20150701-intercept-deepdive_readme.pdf
This document is a readme for DEEPDIVE, a means of establishing a "filter" in front of a traditional server using XKEYSCORE, a data analysis tool used by the NSA.

20131119-odni-nsa_course_materials_module_1_v.17.pdf
This document contains internal NSA training material, explaining in detail the rules ensuring the NSA's compliance with FISA, FISC and Executive Order 12333 in their SIGINT activities. The document specifically relates to the NSA's Business Records…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2