Browse Items (626 total)

20150117-spiegel-nsa_project_description_to_recognize_and_process_data_that_comes_from_third_party_attacks_on_computers.pdf
This document is a report from the NSA's TAO (Tailer Access Operations) CT10 Pilot Project, on the inclusion of (CNE) computer network exploitation data. The report gives the current status of the project, near and short term goals, and challenges.

20140318-wapo-adding_another_country_to_mystic_program.pdf
This document contains an extract from the FY13 Congressional Budget Justification for the National Intelligence Program discussing the addition of another country to the MYSTIC program. The MYSTIC program monitors voice call metadata and content.

20140825-Intercept-Metadata-Sharing-Memorandum.pdf
This document is a memorandum from the United States Government which proposed that DIRNSA/CHCSS and NSA/CSS be establish as the "Executive Agent for IC-wide metadata sharing." The document gives and overview of the current programs for storing and…

20140312-intercept-vpn_and_voip_exploitation_with_hammerchant_and_hammerstein.pdf
This document contains four NSA presentation slides which provide an overview of the APEX VPN and VoIP exploitation programs and their phases for metadata collection and circumventing encryption.

20140831-spiegel-turkish_signal_intelligence_chief_agenda.pdf
This document is a NSA meeting agenda for the NSA visit of the Turkish Signals Intelligence Chief for a strategic planning conference, electronic intelligence (ELINT) demonstration and discussion of ongoing collaboration including an NSA request to…

20140618-der_spiegel-report_on_an_unexploded_ordnance_alarm_at_european_technical_centern.pdf
This NSA release gives an account of evacuation and security measures taken at the NSA's European Technical Center (ETC) during a concern that there was an unexploded WWII ordnance in the area.

20150505_intercept_human-language-technology.pdf
This document is a classification guide prepared by the NSA's Human Language Technology project. It gives the classification levels for the different models of human language analysis, including speaker recognition, gender recognition and anomaly…

20150310-Intercept-TCB Jamboree 2012 Invitation.pdf
This document is a memo created by the CIA. It describes the Trusted Computing Base's Jamboree, held in Februrary 2012. The Jamboree was a conference dedicated to communicating research performed by members of the United States Intelligence Community…

20150803-intercept-back_in_time_the_echelon_story.pdf
This NSA newsletter article, reprinted from the internal publication Foreign Affairs Digest, gives a brief history of the communications intelligence system ECHELON, which targeted western communications satellites, and its interactions with European…

20131119-odni-ag_guidelines_for_domestic_fbi_operations (1).pdf
This document is a report prepared by the Office of the Attorney General of the United States. It lays out the legal and procedural frameworks for the collection of signals intelligence by the FBI. It describes the historical evolution of the…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2