This document is a presentation deck from the NSA's Threat Operations Center (NTOC) outlining TUTELAGE, an application that instrumentalizes 3rd party attacks. The presentation goes over TUTELAGE's current and future capabilities of alerting,…
This document is a presentation describing forms of Open Source Multi-Hop Networks. The most famous of these is TOR, The Onion Router, a service designed to protect online anonymity partially funded by the US due to its use by dissents in repressive…
This document is a series of extracts from an NSA report. It describes the GILGAMESH and VICTORYDANCE programs, which were efforts to use new geolocation algorithms in collaboration with the CIA's drone assassination program. It describes the…
This document is an extract from an internal GCHQ presentation. It provides an example of an email harvested using SIM encryption keys compromised in a CNE attack on the SIM card manufacturer, Gemalto.
This document is a briefing posted to the NSA's internal website detailing the upcoming UN Climate Control Conference and the broad goals for overcoming a divide between developed and developing countries. The document refers to surveillance…
This document is a report detailing the state of the NSA's SIGINT system as of January 2007. A variety of strategic mission areas are described, along with key targets for SIGINT operations. Mission areas include: winning the global war on terror,…
This document is a presentation describing the NSA's STORMBREW program, an UPSTREAM collection program that intercepts internet communications as they pass through points in the US's fibre optic communications infrastructure. The slides are in a very…
This NSA document gives an overview of the JSA - Joint Signals Activity - an NSA/BND intelligence partnership and their joint intelligence work in North Africa.
This NSA document gives an overview of the JSA - Joint Signals Activity - an NSA/BND intelligence partnership and their joint intelligence work in North Africa.
This document is an internal NSA presentation. It documents the data analysis tool XKEYSCORE's ability to create and manage User Agents (UAs). UAs are strings of data sent to visited websites, providing XKEYSCORE with a means of gleaning various…