This document is a presentation from the NSA's Threat Operations Center (NTOC) on methods for intergrated cyber operations, including the applications TURBINE, TUTELAGE, and QUANTUM. The document gives various case studies and lists future work.
This document is an internal presentation prepared by the NSA's Threat Operations Center (NTOC). It describes TREASUREMAP, a massive internet mapping, exploration and analysis engine. Its aim was to create a fully interactive map of the internet…
This document is an article from the internal NSA newsletter SIDtoday. The article discusses the success of a collaboration between offensive and defensive branches of the NSA. For example, the revelation of a Chinese cyber attack on the Department…
This document is an article from the NSA internal newsletter, SIDtoday. It was written by the Intelligence Analysis Technical Director, NSA Texas, and it dicusses the use of Human Language Technology (HLT) in intelligence operations in Mexico, as…
This document is a presentation on "shaping:" Active implant copies traffic and directs a copy past a passive collector, such as TURMOIL. It allows for decryption, collecting metadata records and analysis of internet key exhanges, selection of VPNs,…
This document is a presentation detailing requirements, proposed solutions, status, workflows and issues/risks of a current decryption program, involving the applications TURMOIL, GALLANTWAVE, and XKEYSCORE.
This document is an internal NSA presentation that describes QUANTUMTHEORY program. This program leveraged the NSA's system of passive sensors in order to detect and disrupt internet traffic. It also introduces QFIRE, a consolidated QUANTUMTHEORY…
This document contains a slide from the NSA Technology Directorate discussing the benefits of converged data analysis. The slide outlines how NSA Signals and Target analysts recieve data without knowing the circumstances of collection.
This document is a NSA release announcing the status of ICREACH, the NSA producediIntelligence community-wide communications metadata search engine. The document states that the purpose of the program is for "situational awareness and target…
This document is a briefing describing the NSA's efforts to undermine the TOR network, codenamed EGOTISTICAL GIRAFFE. This briefing describes a technique developed by the NSA to attack TOR users through vulnerabilities in the TOR browser bundle and…