This document is a slide deck during a "Close Access" NSA training course to introduce students to computer network exploitation (CNE) using the FOXACID server in combinations with other tools, BADDECISION and NIGHTSTAND.
This document is a slide deck introducing a "Close Access" NSA training course to "familiarize, educate, and certify students in the operational usage" of various computer network exploitation tools.
This document is a release from the NSA internal newsletter, SIDtoday. It describes the successful NSA operation that was collaboration among several teams, including Tailer Access Operations and Special Source Operations, in order to access,…
This document is a NSA release detailing the history and current partnership between Turkish and U.S intelligence operations. Intelligence sharing began in 1949 between the CIA and the Turkish Electronic and Technical Intelligence (ETI) and has…
This document is a NSA classification guide detailing the appropriate security classifications for describing different elements of program BULLRUN. This program is used to unlock encryption tools used to protect emails, banking and medical records.
This document is a classification guide for the NSA's PAWLEYS program, which has a security classification of ECI (Exceptionally Controlled Information). PAWLEYS is a program aiming to protect clandestine HUMINT and computer network access intended…
This document is a newsletter article from the NSA Cryptanalysis and Exploitation Services that discusses the rise of "ubiquitous encryption" on the internet, and the NSAs top secret strategies for circumvention.
This document is an NSA staff processing form addressed to the SIGINT Director of the NSA's Signals Intelligence Directorate (SID). It requests SID approval for the Cryptanalis and Exploitation Division (CES) at the Cryptologic Centers (CCs) in…
This document is an extract of a report created by the NSA's division of Cryptanalysis and Exploitation Services (CES). It describes the Target Systems Project, which aims to produce capacities to exploit new communications technologies and systems…