Skip to content

Hafez-CS/NSA-documents

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

NSA Documents with OCR text version

Monty Python

Here is the complete list of PDF documents included

01302014-dagbladet-cop15_interception_document.pdf

01312014-cbc-csec_airport_wifi_tracking.pdf

2009-OIG_Report_on_Bulk_Collection.pdf

2011-OIG_Report_on_Bulk_Collection.pdf

20130605-guard-verizon_215_secondary_order.pdf

20130606-wapo-prism.pdf

20130608-guard-boundless_informant_capabilities-(1).pdf

20130608-guard-boundless_informant_faq.pdf

20130608-guard-prism.pdf

20130620-guard-702_minimization_procedures.pdf

20130620-guard-702_targeting_procedures.pdf

20130627-guard-2007_memo_on_us_person_metadata.pdf

20130627-guard-nsa_oig_2009_report.pdf

20130629-wapo-prism.pdf

20130630-guard-dropmire_.pdf

20130710-wapo-upstream.pdf

20130731-guard-xkeyscore_training_slides.pdf

20130809-guard-702_glossary.pdf

20130816-wapo-sid_oversight.pdf

20130816-wapo-so_you_got_a_us_person.pdf

20130816-wapo-sso_news_article.pdf

20130816-wapo-targeting_rationale.pdf

2013-08-30_cryptome_congressional_budget_2013.pdf

20130830_cryptome_congressional_budget_2013.pdf

20130903-globo-satc.pdf

20130905-guard-bullrun.pdf

20130905-guard-cryptanalysis_classification.pdf

20130905-guard-sigint_enabling.pdf

20130908-globo-stormbew_tv.pdf

20130908-globo-stormbrew_tv.pdf

20130908-globo-tv.pdf

20130909-spiegel-smartphones-(1).pdf

20130911-guard-israel_sharing_0.pdf

20130916-spiegel-credit_card_transactions.pdf

20130920-spiegel-belgacom.pdf

20130928-nyt-contact_chaining.pdf

20130928-nyt-syanpse.pdf

20131004-guard-egotistical_giraffe-(1).pdf

20131004-guard-iat_tor.pdf

20131004-guard-tor_stinks.pdf

20131004-wapo-gchq_mullenize.pdf

20131004-wapo-tor.pdf

20131014-wapo-collection_optimization.pdf

20131014-wapo-content_acquisition_optimization1.pdf

20131014-wapo-content_acquisition_optimization2.pdf

20131020-spiegel-mexican_president.pdf

20131021-monde-boundless_informant_france.pdf

20131021-monde-close_access_sigads.pdf

20131021-monde-wanadoo_alcatel.pdf

20131022-monde-prism_april_2013.pdf

20131024-guard-phones_world_leaders.pdf

20131025-monde-french_cyberattacks.pdf

20131027-spiegel-embassy.pdf

20131028-mundo-spain_collections-(1).pdf

20131028-mundo-spain_collections.pdf

20131030-wapo-muscular.pdf

20131030-wapo-muscular_smiley.pdf

20131101-guard-corporate_reporting.pdf

20131104-mundo-boundless_informant.pdf

20131104-mundo-info_sharing_partners.pdf

20131104-nyt-collection_accesses.pdf

20131104-nyt-sigint_goals.pdf

20131104-nyt-sigint_strategic_plan.pdf

20131104-wapo-optimization_google.pdf

20131104-wapo-sso_overview.pdf

20131104-wapo-windstop.pdf

20131117-guardian-dsd_3g.pdf

20131117-spiegel-royal_concierge.pdf

20131119-dagbladet-norway_collection_0.pdf

20131119-odni-ag_guidelines_for_domestic_fbi_operations-(1).pdf

20131119-odni-interim_competency_test_for_access_to_fisa_data.pdf

20131119-odni-nsa_core_intelligence_oversight_training.pdf

20131119-odni-nsa_course_materials_intro_v.13.pdf

20131119-odni-nsa_course_materials_module_1_v.17.pdf

20131119-odni-nsa_course_materials_module_2_v.16.pdf

20131119-odni-nsa_course_materials_module_3_v.22.pdf

_20131119-odni-nsa_course_materials_module_4_v.28.pdf

20131119-odni-nsa_course_materials_module_4_v.28.pdf

20131119-odni-nsa_course_materials_module_5_v.24.pdf

20131119-odni-nsa_course_materials_module_6_analytic_personal_v.18.pdf

20131119-odni-nsa_course_materials_module_6_tech_personnel_v.25.pdf

20131119-odni-nsa_cryptological_school_course_slides_on_legal_compliance_and_minimization_procedures.pdf

20131119-odni-nsa_guidance_memo_on_legal_standards_for_searching_bulk_metadata.pdf

20131119-odni-nsa_metadata_collection_training_slides_.pdf

20131119-odni-nsa_summary_of_requirements_for_collection_of_bulk_metadata.pdf

20131119-odni-office_of_general_council_business_record_analyst_training_slides.pdf

20131119-odni-united_states_signals_intelligence_directive_18_appendix_j.pdf

20131119-odni-united_states_signals_intelligence_directive_18_jan_25_2011.pdf

20131119-odni-verification_slide.pdf

20131120-guard-collection_processing_and_dissemination_of_allied_communications.pdf

20131122-dagbladet-afghanistan_collection.pdf

20131122-dagbladet-boundless_informant_faq.pdf

20131122-dagbladet-boundless_informant.pdf

20131123-nrc-nsa_malware.pdf

20131123-nyt-sigint_strategy_feb_2012.pdf

20131126-huffpo-radicalizers_pornography.pdf

20131126-wapo-microsoft_cloud_exploitation.pdf

20131126-wapo-microsoft_monkey_puzzle.pdf

20131130-GlobeandMail-csec-br-spy.pdf

20131202-cbc-g20.pdf

20131202-guard-dsd_data.pdf

20131204-wapo-chalkfun_foreignness.pdf

20131204-wapo-fascia-(1).pdf

20131204-wapo-fascia.pdf

20131205-espresso-italy_spying.pdf

20131205-svt-fra_russia.pdf

20131209-nyt-nsa_games.pdf

20131210-cbc-nsa_csec_partnership-(1).pdf

20131210-cbc-nsa_csec_partnership.pdf

20131210-wapo-cotraveler_overview.pdf

20131210-wapo-ghost_machine.pdf

20131210-wapo-gsm_classification_guide.pdf

20131210-wapo-location_cookies.pdf

20131210-wapo-target_location-(1).pdf

20131210-wapo-target_location.pdf

20131211-svt-accomplishments_from_nsa.pdf

20131211-svt-baltic_region-(1).pdf

20131211-svt-baltic_region.pdf

20131211-svt-final_agenda_sweden_usa.pdf

20131211-svt-legal_issues_uk_regarding_sweden_and_quantum.pdf

20131211-svt-nsa_internal_pm_on_fra.pdf

20131211-svt-nsa_slides_xkeyscore.pdf

20131211-svt-quantum_from_gchq.pdf

20131211-svt-sweden_neutral.pdf

20131211-svt-xkeyscore_slide_with_swedish_example.pdf

20131211-svt-xkeyscore_sources.pdf

20131211-svt-xkeyscore_sweden_meeting.pdf

20131223-wapo-nsacss-mission.pdf

20131230-appelbaum-nsa_ant_catalog.pdf

20131230-appelbaum-nsa_ant_catalo.pdf

20131230-spiegel-qfire.pdf

20131230-spiegel-tao_intro.pdf

20131230-spiegel-tao_quantum_tasking.pdf

20131230-spiegel-tao_quantum_theory.pdf

2013-watchlist-guidance.pdf

20140102-wapo-quantum_computers_hard_targets.pdf

20140102-wapo-quantum_computing.pdf

20140116-guard-dishfire_presentation.pdf

20140127-nbc-squeaky_dolphin.pdf

20140127-nyt-converged_analysis_on_smartphone_devices.pdf

20140127-nyt-mobile_theme_briefing.pdf

20140128-guard-leaky_phone_apps_0.pdf

20140128-guard-leaky_phone_apps.pdf

20140130-information_dk-cop15_interception_document.pdf

20140131-cbc-csec_airport_wifi_tracking.pdf

20140204-nbc-british_spies_attacked_hactivist_anonymous.pdf

20140207-nbc-gchq_honey_trap_cyber_attack_background_on_jtrig.pdf

20140207-nbc-gchq_honey_trap_cyber_attack_leveraging_foreign_journalists_via_jtrig.pdf

20140207-nrc-boundless_nederland.pdf

20140211-intercept-drones_intercepting_communications.pdf

20140218-intercept-discovery_sigint_targeting_scenarios_and_compliance.pdf

20140218-intercept-gchq_sigdev_.pdf

20140224-intercept-training_for_covert_online_operations.pdf

20140227-guard-gchq_optic.pdf

20140303-epic-doj_report_on_pen_register_fisa_orders.pdf

20140305-nrc-dutch_shares_collected_anti-piracy_information_with_nsa.pdf

20140307-intercept-nsa_ask_zelda_an_interview_with_zelda.pdf

20140307-intercept-nsa_ask_zelda_guilty_until_proven_innocent.pdf

20140307-intercept-nsa_ask_zelda_is_bain_de_soleil_a_bane_on_the_nsa.pdf

20140307-intercept-nsa_ask_zelda_watching_every_word_in_snitch_city.pdf

20140311-nyt-ashcroft_memo_on_intelligence_sharing_procedures.pdf

20140311-nyt-classification_guide_for_fisa_the_protect_america_act_and_the_fisa_amendments_act.pdf

20140311-nyt-classification_guide_for_stellarwind_program_0.pdf

20140311-nyt-nsa_memo_expands_access_to_fisa_information.pdf

20140311-nyt-nsa_timeline_of_surveillance_law_developments.pdf

20140312-intercept-five_eyes_hacking_large_routers.pdf

20140312-intercept-increasing_collection_capacity_by_increasing_implants.pdf

20140312-intercept-mhs_leverages_xkeyscore_for_quantum.pdf

20140312-intercept-multiple_methods_of_quantum.pdf

20140312-intercept-nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf

20140312-intercept-nsa_selector_types.pdf

20140312-intercept-nsa_technology_directorate_analysis_of_converged_data.pdf

20140312-intercept-quantum_insert_diagrams.pdf

20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf

20140312-intercept-turbine_and_turmoil.pdf

20140312-intercept-turbine_industrial_scale_exploitation.pdf

20140312-intercept-vpn_and_voip_exploitation_with_hammerchant_and_hammerstein.pdf

20140313-intercept-nsa_cooperative_third_party_relationships.pdf

20140315-intercept-turbine_intelligence_command_and_control-(1).pdf

20140315-intercept-turbine_intelligence_command_and_control-(2).pdf

20140315-intercept-turbine_intelligence_command_and_control.pdf

20140318-wapo-adding_another_country_to_mystic_program.pdf

20140318-wapo-description_of_data_collection_under_mystic-(1).pdf

20140318-wapo-description_of_data_collection_under_mystic.pdf

20140318-wapo-mystic_program.pdf

20140320-intercept-targeting_system_administrator_accounts.pdf

20140321-le_monde-french_intelligence_e-mail_spying_operation-(1).pdf

20140321-le_monde-french_intelligence_e-mail_spying_operation.pdf

20140322-nyt-operation_shotgiant_objectives.pdf

20140329-der_spiegel-gchq_and_nsa_spy_on_heads_of_state.pdf

20140404-intercept-2009_sigdev_conference.pdf

20140404-intercept-gchq_full_spectrum_cyber_effects.pdf

20140430-intercept-gchq_visit.pdf

20140430-intercept-ghostmachine.pdf

20140430-intercept-prism_olympics.pdf

20140513-greenwald-noplacetohidedocuments.pdf

20140519-intercept-black_budget.pdf

20140519-intercept-dea_warfighter.pdf

20140519-intercept-mystic.pdf

20140519-intercept-somalget.pdf

20140519-intercept-sso_dictionary_excerpt.pdf

20140519-intercept-sso_mystic_charts.pdf

20140531-nyt-identity-intelligence.pdf

20140610-cryptome-dea-nsa-sandkey.pdf

20140616-der_spiegel-analytics_for_targets_in_europe_0.pdf

20140616-der_spiegel-xkeyscore_fingerprints_1.pdf

20140618-dagbladet-black_budget.pdf

20140618-dagbladet-keith_alexander_talking_points.pdf

20140618-DerSpiegel-agenda_for_the_visit_of_bsi_vice_president_andreas_konen_to_the_nsa.pdf

20140618-der_spiegel-boundless_informant_overview_global.pdf

20140618-der_spiegel-boundless_informant_statistics_for_so-called_third_parties.pdf

20140618-der_spiegel-boundless_informant_statistics_on_data_from_22foreign_partners22.pdf

20140618-der_spiegel-boundless_informant_statistics_on_germany.pdf

20140618-der_spiegel-boundless_informant_statistics_on_the_uk.pdf

20140618-der_spiegel-briefing_on_the_visit_to_the_nsa_of_a_high-ranking_bnd_official.pdf

20140618-der_spiegel-cooperation_between_the_nsa_bnd_and_bfv.pdf

20140618-der_spiegel-details_on_xkeyscore_from_an_internal_gchq_website.pdf

20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker-(1).pdf

20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker.pdf

20140618-der_spiegel-excerpt_on_the_sharing_of_xkeyscore_with_german_intelligence_agency_bfv.pdf

20140618-der_spiegel-explanation_of_nymrod_a_system_for_searching_for_people_and_places_in_databases_and_documents.pdf

20140618-der_spiegel-faqs_on_the_boundless_informant_program.pdf

20140618-der_spiegel-final_agenda_of_a_meeting_between_high-ranking_nsa_and_bnd_officials.pdf

20140618-der_spiegel-gchq_report_on_the_technical_abilities_of_tempora.pdf

20140618-der_spiegel-guidelines_for_the_classification_of_nsa_sigint_details_1945-1967.pdf

20140618-der_spiegel-guidelines_for_the_classification_of_suslag_details_and_the_nsa-bnd_cooperation.pdf

20140618-DerSpiegel-internal_nsa_discussion_guidelines_relating_to_cooperation_with_the_bnd_and_bfv.pdf

20140618-der_spiegel-internal_nsa_presentation_on_the_bnds_organization_0.pdf

20140618-der_spiegel-logo_of_nsa-bnd_cooperation.pdf

20140618-der_spiegel-nostalgic_recollections_from_nsa_workers_formerly_stationed_in_bad_aibling.pdf

20140618-der_spiegel-nsacss_europe-_report_on_the_experiences_of_one_nsa_worker.pdf

20140618-der_spiegel-nsacss_presentation_on_technical_surveillance_in_europe_and_africa.pdf

20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod-(1).pdf

20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod.pdf

20140618-der_spiegel-overview_of_the_use_of_boundless_informant_world_map.pdf

20140618-der_spiegel-preliminary_agenda_of_a_meeting_between_nsa_and_bnd_officials.pdf

20140618-DerSpiegel-presentation_on_the_nsacia_unit_special_collection_service.pdf

20140618-der_spiegel-report_on_an_nsa_sigdev_training_course_for_allied_countries_.pdf

20140618-der_spiegel-report_on_an_nsa_visit_to_bnd_site_and_on_data_transfer_from_the_bnd_to_the_nsa.pdf

20140618-der_spiegel-report_on_an_unexploded_ordnance_alarm_at_european_technical_centern.pdf

20140618-der_spiegel-report_on_an_xkeyscore_training_session_at_the_ecc_dagger_complex.pdf

20140618-der_spiegel-report_on_a_wharpdrive_incident_in_an_sso_presentation.pdf

20140618-der_spiegel-report_on_data_exchange_between_the_nsa_and_bnd_within_the_jsa_framework.pdf

20140618-der_spiegel-report_on_the_beginnings_of_the_european_security_center_esc_in_the_dagger_complex.pdf

20140618-der_spiegel-report_on_the_changing_of_the_escs_name_to_european_security_operations_center_esoc.pdf

20140618-der_spiegel-report_on_the_nsas_access_to_tempora.pdf

20140618-der_spiegel-report_on_the_one-year_anniversary_of_the_nsa_liaison_unit_suslag_in_bad_aibling.pdf

20140618-der_spiegel-report_on_the_surveillance_of_african_countries_by_jsa.pdf

20140618-der_spiegel-report_on_the_technical_expansion_of_the_european_technical_center_in_wiesbaden.pdf

20140618-der_spiegel-report_on_the_work_of_nsacss_europe.pdf

20140618-der_spiegel-restrictions_on_the_technical_surveillance_performed_by_jsa.pdf

20140618-der_spiegel-us_sites_with_nsa_personnel_in_germany.pdf

20140618-der_spiegel-world_map_from_the_boundless_informant_program.pdf

20140618-DerSpiegel-zoom_of_a_boundless_informant_document_with_project_names.pdf

20140630-WaPo-affidavit_of_keith_alexander_regarding_spying_on_foreign_entities.pdf

20140630-WaPo-fisa_amendments_act_summary_document_1.pdf

20140630-WaPo-fisa_judges_order_authorizing_surveillance_of_foreign_governments_and_organizations.pdf

20140630-WaPo-list_of_governments_and_organizations_authorized_for_surveillance.pdf

20140630-WaPo-odni_certification_regarding_foreign_entities.pdf

20140709-Intercept-spying_on_muslim-american_leaders.pdf

20140714-Intercept-jtrigall.pdf

20140723-Intercept-March-2013-Watchlisting-Guidance.pdf

20140723-WaPo-Post-Signals-Intelligence-Authority-Decision-Tree.pdf

20140725-Intercept-Saudi-Arabia-Information-Paper.pdf

20140803-Intercept-Israel-US-1999-Agreement.pdf

20140803-Intercept-NSA-Intelligence-Relationship-With-Israel.pdf

20140805-Intercept-Directorate-of-Terrorist-Identities-Strategic-Accomplishments-2013.pdf

20140812-Intercept-GCHQ-Covert-Mobile-Phones-Policy.pdf

20140815-Heise-HACIENDA-Program.pdf

20140825-Intercept-CIA-Colleagues-Enthusiastically-Welcome-NSA-Training.pdf

20140825-Intercept-CRISSCROSSPROTON-Point-Paper.pdf

20140825-Intercept-DNI-Decision-Memorandum-on-ICREACH.pdf

20140825-Intercept-ICREACH-Black-Budget-Extract.pdf

20140825-Intercept-ICREACH-Sharing-SIGINT-Comms-Metadata-with-the-Intel-Community-Memo.pdf

20140825-Intercept-ICREACH-Wholesale-Sharing.pdf

20140825-Intercept-Metadata-Policy-Conference.pdf

20140825-Intercept-Metadata-Sharing-Memorandum.pdf

20140825-The-Intercept-Sharing-Communications-Metadata-Across-the-USIC-ICREACH.pdf

20140831-spiegel-collaboration_in_overdrive.pdf

20140831-spiegel-iraq_uk_load_sharing_carriers.pdf

20140831-spiegel-jordan_belgium.pdf

20140831-spiegel-kurdistan_regional_government.pdf

20140831-Spiegel-NCRs-with-Foreign-Relations-Missions-Become-SUSLAs.pdf

20140831-spiegel-nsa_intelligence_relationship_with_turkey.pdf

20140831-spiegel-nsas_oldest_third_party_partnership-(1).pdf

20140831-spiegel-nsas_oldest_third_party_partnership.pdf

20140831-spiegel-sinio_seminar_tough_times_for_turkey-(1).pdf

20140831-spiegel-sinio_seminar_tough_times_for_turkey.pdf

20140831-spiegel-sinio_seminar_turkey_and_the_kurds.pdf

20140831-spiegel-sinio_seminar_turkish_elections.pdf

20140831-spiegel-turkey_and_the_pkk.pdf

20140831-spiegel-turkey_at_the_g20_pre-meeting.pdf

20140831-spiegel-turkey_energy_company_development.pdf

20140831-spiegel-turkish_signal_intelligence_chief_agenda.pdf

20140905-intercept-quadrennial_intelligence_community_review_final_report.pdf

20140914-intercept-ferguson_visit_precis.pdf

20140914-intercept-key_activities_in_progress.pdf

20140914-intercept-speargun_phase_one.pdf

20140914-intercept-speargun_underway.pdf

20140914-spiegel-satellite_teleport_knowledge.pdf

20140914-spiegel-treasure_map_announces_a_new_release-(1).pdf

20140914-spiegel-treasure_map_announces_a_new_release.pdf

20140914-spiegel-treasure_map_presentation-(1).pdf

20140914-spiegel-treasure_map_presentation.pdf

20141010-intercept-cno_core_secrets_security_structure.pdf

20141010-intercept-cno_core_secrets_slide_slices.pdf

20141010-intercept-computer_network_exploitation_classification_guide.pdf

20141010-intercept-eci_compartments.pdf

20141010-intercept-eci_pawleys_classification_guide.pdf

20141010-intercept-eci_whipgenie_classification_guide.pdf

20141010-intercept-exceptionally_controlled_information_listing.pdf

20141010-intercept-sentry_eagle_brief_sheet.pdf

20141010-intercept-tarex_classification_guide.pdf

20141125-sueddeutsche-access_breakdown.pdf

20141125-sz-cable_master_list_ac.pdf

20141125-sz-cable_master_list_fea.pdf

20141125-sz-cable_regions.pdf

20141125-sz-cables_no_current_access.pdf

20141125-sz-cables_where_we_are.pdf

20141125-sz-cables_where_we_want_to_be.pdf

20141125-sz-cne_endpoint_project_load.pdf

20141125-sz-mti_access_project_weekly_status_february_6_2009.pdf

20141125-sz-mti_access_project_weekly_status_june_27_2008.pdf

20141125-sz-mti_access_project_weekly_status_november_28_2008.pdf

20141125-sz-partner_cables.pdf

20141125-sz-ptc_glossary.pdf

20141125-sz-windstop_system_highlights.pdf

20141204-intercept-auroragold_project_overview.pdf

20141204-intercept-auroragold_target_technology_trends_center_support_to_wpmo_0.pdf

20141204-intercept-auroragold_working_aid.pdf

20141204-intercept-auroragold_working_group.pdf

20141204-intercept-ir21_a_technology_warning_mechanism_0.pdf

20141204-intercept-nsa_first_ever_collect_of_high_interest_4g_cellular_signal.pdf

20141204-intercept-nsa_gchq_csec_network_tradecraft_advancement.pdf

20141204-intercept-opulant_pup_encryption_attack.pdf

20141204-intercept-wolframite_encryption_attack-(1).pdf

20141204-intercept-wolframite_encryption_attack.pdf

20141214-intercept-gchq_automated_noc_detection.pdf

20141214-intercept-gchq_hopscotch.pdf

20141214-intercept-gchq_making_network_sense_of_the_encryption.pdf

20141214-Intercept-gchq-mobile-networks-in-my-noc-world.pdf

20141214-intercept-gchq_nac_review_april_june_2011.pdf

20141214-intercept-gchq_nac_review_january_march_2012.pdf

20141214-intercept-gchq_nac_review_july_sept_2011.pdf

20141214-intercept-gchq_nac_review_october_december_2011.pdf

20141214-intercept-gchq_stargate_cne_requirements.pdf

20141228-speigel-analysis_from_ssl-tls_connections_through_gchq_in_the_flying_pig_database_0.pdf

20141228-speigel-analytic_challenges_from_active-passive_integration_when_nsa_attacks_ipsec_vpns_0.pdf

20141228-speigel-analytics_on_security_of_tor_hidden_services_0.pdf

20141228-speigel-a_potential_technique_to_deanonymise_users_of_the_tor_network_0.pdf

20141228-speigel-bluesnort_program_on_net_defense_from_encrypted_communications_0.pdf

20141228-speigel-canadian_document_from_ces_on_tls_trends_0.pdf

20141228-speigel-classification_guide_for_cryptanalysis_0.pdf

20141228-speigel-decryption_of_vpn_connections_within_the_valiantsurf_program_0.pdf

20141228-speigel-description_of_existing_projects_on_vpn_decryption_0.pdf

20141228-spiegel-description_of_voip_telephony_encryption_methods_and_other_ways_to_attack.pdf

20141228-spiegel-description_on_the_processing_of_vpn_data_packets_within_the_turmoil_program.pdf

20141228-spiegel-explanation_of_a_potential_technique_to_deanonymise_users_of_the_tor_network.pdf

20141228-spiegel-explanation_of_the_gallantwave_that_decrypts_vpn_traffic_within_longhaul.pdf

20141228-spiegel-explanation_of_the_poisennut_product_and_its_role_when_attacking_vpn.pdf

20141228-spiegel-explanation_of_the_transform_engine_emulator_when_attacking_vpn.pdf

20141228-spiegel-explanation_of_the_turmoil_gallantwave_program_and_its_role_when_attacking_vpn_0.pdf

20141228-spiegel-explanation_on_the_spin9_program_on_end-to-end_attacks_on_vpn.pdf

20141228-spiegel-gchq_briefing_on_the_bullrun_program.pdf

20141228-spiegel-gchq_presentation_on_the_bullrun_programs_decryption_capabilities.pdf

20141228-spiegel-general_description_how_nsa_handles_encrypted_traffic.pdf

20141228-spiegel-guide_for_analysts_on_how_to_use_the_prism_skype_collection.pdf

20141228-spiegel-intercept_with_otr_encrypted_chat.pdf

20141228-spiegel-intercept_with_pgp_encrypted_message.pdf

20141228-spiegel-intro_to_the_vpn_exploitation_process_mentioning_the_protocols_attacked_-_pptp_ipsec_ssl_ssh.pdf

20141228-spiegel-malibu_architecture_overview_to_exploit_vpn_communication.pdf

20141228-spiegel-_national_information_assurance_research_laboratory_niarl_tundra.pdf

20150117-speigel-analysis_of_chinese_methods_and_performed_actions_in_the_context_of_computer_network_exploitation.pdf

20150117-speigel-classification_guide_for_computer_network_exploitation_cne.pdf

20150117-speigel-combination_of_offensive_and_defensive_missions_-_how_fourth-party_missions_are_being_performed.pdf

20150117-speigel-csec_document_about_the_recognition_of_trojans_and_other_network_based_anomaly_.pdf

20150117-speigel-csec_document_on_the_handling_of_existing_trojans_when_trojanizing_computers.pdf

20150117-speigel-document_about_the_expansion_of_the_remote_operations_center_roc_on_endpoint_operations.pdf

20150117-speigel-document_explaining_the_role_of_the_remote_operations_center_roc.pdf

20150117-spiegel-nsa_example_snowglobe_in_which_a_suspected_french_government_trojan_is_analyzed_to_find_out_if_it_can_be_helpful_for_own_interests_0.pdf

20150117-spiegel-nsa_fourth_party_access_-i_drink_your_milkshake.pdf

20150117-spiegel-nsa_program_tutelage_to_instrumentalize_third_party_attack_tools.pdf

20150117-spiegel-nsa_project_description_to_recognize_and_process_data_that_comes_from_third_party_attacks_on_computers.pdf

20150117-spiegel-nsa_training_course_material_on_computer_network_operations-(1).pdf

20150117-spiegel-nsa_training_course_material_on_computer_network_operations.pdf

20150117-spiegel-overview_of_methods_for_nsa_integrated_cyber_operations_0.pdf

20150117-spiegel-overview_of_the_transgression_program_to_analyze_and_exploit_foreign_cna-cne_exploits.pdf

20150117-spiegel-overview_on_the_nsa_use_of_bots_and_the_defiantwarrior_program.pdf

20150117-spiegel-process_analysts_choose_their_data_requirement_and_then_get_to_know_the_tools_that_can_do_the_job_0.pdf

20150117-spiegel-projects_of_the_tao-ato_department_such_as_the_remote_destruction_of_network_cards.pdf

20150117-spiegel-quantumtheory_is_a_set_of_technologies_allowing_man-on-the-side_interference_attacks_on_tcp-ip_connections_includes_straightbizarre_and_daredev.pdf

20150117-spiegel-report_of_an_nsa_employee_about_a_backdoor_in_the_openssh_daemon.pdf

20150117-spiegel-sample_code_of_a_malware_program_from_the_five_eyes_alliance.pdf

20150117-spiegel-supply-chain_interdiction_-_stealthy_techniques_can_crack_some_of_sigints_hardest_targets.pdf

20150117-spiegel-technical_description_of_the_fashioncleft_protocol_.pdf

20150117-spiegel-the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa_0.pdf

20150128-cbc-cse_presentation_on_the_levitation_project.pdf

20150128-intercept-cse_presentation_on_the_levitation_project.pdf

20150204-intercept-lovely_horse_0.pdf

20150204-intercept-nato_civilian_intelligence_council_cyber_panel.pdf

20150204-intercept-open_source_for_cyber_defence_progress.pdf

20150204-intercept-who_else_is_targeting_your_target_collecting.pdf

20150210-intercept-iran_current_topics_-_interactions_with_gchq.pdf

20150219-Intercept-CCNE-Email-Addresses-Jan10-Mar10-Trial.pdf

20150219-Intercept-CCNE-Email-Harvesting-Jan10-Mar10-Trial.pdf

20150219-Intercept-CCNE-Stats-Summaries-Jan10-Mar10-Trial.pdf

20150219-Intercept-CCNE-Successes-Jan10-Mar10-Trial.pdf

20150219-Intercept-CNE-Access-to-Core-Mobile-Networks.pdf

20150219-Intercept-Dapino-Gamma-CNE-Presence-Wiki.pdf

20150219-Intercept-Dapino-Gamma-Gemalto-Yuaawaa-Wiki.pdf

20150219-Intercept-Dapino-Gamma-Target-Personalisation-Centres.pdf

20150219-Intercept-IMSIs-Identified-With-Ki-Data-For-Network.pdf

20150219-Intercept-PCS-Harvesting-At-Scale.pdf

20150219-Intercept-Where-are-These-Keys.pdf

ambassadesFrance.pdf

blackhat-Alexander-keynote.pdf

bullrun-briefing-sheet-from-gchq.pdf

ccne-email-addresses-jan10-mar10-trial.pdf

ccne-email-harvesting-jan10-mar10-trial.pdf

ccne-stats-summaries-jan10-mar10-trial.pdf

ccne-successes-jan10-mar10-trial.pdf

CLEANED004.-Cover_Memo-Sealed.pdf

CLEANED007.-CongNotificationInfoMemoSSCI_10_Apr_09-Sealedpdf.pdf

CLEANED032.-Basket_2_-_NSA_training.log.pdf

CLEANED096.-NSA_summary_of_BR_requirements_(maybe_Feb_2009)-.pdf

CLEANEDFinal-USSID_SP0018_Annex_J.pdf

CLEANEDFinal-USSID_SP0018.pdf

CLEANEDPRTT-1.pdf

CLEANEDPRTT-2.pdf

cne-access-to-core-mobile-networks.pdf

csec-br-spy.pdf

dapino-gamma-cne-presence-wiki.pdf

dapino-gamma-gemalto-yuaawaa-wiki.pdf

dapino-gamma-target-personalisation-centres.pdf

discovery-sigint-targeting-scenarios-and.pdf

doc-6-cyber-threat-capabilities.pdf

doj-nsa-memo.pdf

doody.pdf

dsd-3g.pdf

ericsson_reply.pdf

europebriefingnote_en.pdf

eyes_wide_open_v1.pdf

FAA-Certification_Renewals_with_Caveats.pdf

FAA-Certification-Renewals-with-Caveats.pdf

FAA-Minimization_Procedures.pdf

FAA-Minimization-Procedures.pdf

FAA-Targeting_Procedures.pdf

FISC-Order,_BR_06-12.pdf

FISC-Order,-BR-06-12.pdf

gchq-g20-spy.pdf

gchq-mullenize.pdf

gchq-royal-concierge-de.pdf

gchq-se-fra-quantum-3.pdf

General-Alexander_Letter_re_NSA_Fact_Sheet_Inaccuracy.pdf

General-Alexander-Letter-re-NSA-Fact-Sheet-Inaccuracy.pdf

identity-intelligence.pdf

i-hunt-sys-admins.pdf

imsis-identified-with-ki-data-for-network.pdf

invisibility-report-9-0-final.pdf

jtrigall.pdf

Judge-Walton_Answers_to_Questions_re_FISC.pdf

Judge-Walton-Answers-to-Questions-re-FISC.pdf

Lesson-4_-_So_you_got_US_Person_Information.pdf

letter_to_companies.pdf

media-34093.pdf

media-35509.pdf

media-35510.pdf

media-35511.pdf

media-35512.pdf

media-35513.pdf

media-35514.pdf

media-35515.pdf

media-35516.pdf

media-35517.pdf

media-35518.pdf

media-35519.pdf

media-35520.pdf

media-35521.pdf

media-35522.pdf

media-35523.pdf

media-35524.pdf

media-35525.pdf

media-35526.pdf

media-35527.pdf

media-35528.pdf

media-35529.pdf

media-35530.pdf

media-35531.pdf

media-35532.pdf

media-35533.pdf

media-35534.pdf

media-35535.pdf

media-35536.pdf

media-35537.pdf

media-35538.pdf

media-35539.pdf

media-35540.pdf

media-35541.pdf

media-35542.pdf

media-35543.pdf

media-35544.pdf

media-35545.pdf

media-35546.pdf

media-35547.pdf

media-35548.pdf

media-35549.pdf

media-35550.pdf

media-35551.pdf

media-35552.pdf

media-35653.pdf

media-35654.pdf

media-35655.pdf

media-35656.pdf

media-35657.pdf

media-35658.pdf

media-35659.pdf

media-35661.pdf

media-35662.pdf

media-35663.pdf

media-35664.pdf

media-35665.pdf

media-35666.pdf

media-35667.pdf

media-35668.pdf

media-35669.pdf

media-35670.pdf

media-35671.pdf

media-35672.pdf

media-35673.pdf

media-35674.pdf

media-35675.pdf

media-35676.pdf

media-35677.pdf

media-35678.pdf

media-35680.pdf

media-35681.pdf

media-35682.pdf

media-35683.pdf

media-35684.pdf

media-35685.pdf

media-35686.pdf

media-35687.pdf

media-35688.pdf

media-35689.pdf

nokia_reply.pdf

no-place-to-hide.pdf

nsa-5-eyes-partners.pdf

nsa-5-eyes-spy-g20-dk.pdf

nsa-boundless-informant-faq.pdf

NSA-Boundless_Informant_Frequently_Asked_Questions.pdf

NSA-Boundless-Informant-Frequently-Asked-Questions.pdf

nsa-boundlessinformant-no-33m.pdf

nsa-boundless-informant.pdf

NSA-Boundless_Informant_Powerpoint_Slides.pdf

nsa-boundless-informant-slides.pdf

nsa-bullrun-2-16-guardian-13-0905.pdf

nsa-bullrun-brief-nyt-13-0905.pdf

nsa-bullrun-brief-propublica-13-0905.pdf

nsabullrun.pdf

nsa-cable-spy-types.pdf

nsa-catalog-appelbaum.pdf

nsa-chalkfun.pdf

nsa-close-access-sigads.pdf

nsa-cotraveler.pdf

nsa-cryptanalysis-2-12-guardian-13-0905.pdf

nsa-csec-partners.pdf

nsa-css-mission.pdf

nsa-dutch-sigint.pdf

nsa-egotisticalgiraffe.pdf

nsa-fascia.pdf

nsa-finance-spy-de.pdf

nsa-fisa-certification.pdf

nsa-fisa-minimization.pdf

nsa-fisa-targeting.pdf

nsa-g8-g20-spying-02.pdf

nsa-g8-g20-spying.pdf

nsa-gchq-fra-quantum.pdf

nsa-gchq-se-fra-comint.pdf

nsa-gchq-spy-games.pdf

nsa-ghost-machine.pdf

nsa-gsm-tracking.pdf

nsa-hosts-fr-spies.pdf

nsa-iat-tor.pdf

NSA-IG_Report.pdf

nsa-israel-spy.pdf

NSA-Memo_to_DOD_-_Proposed_Amendment_to_Conduct_Analysis_of_Metadata.pdf

NSA-Memo-to-DOD---Proposed-Amendment-to-Conduct-Analysis-of-Metadata.pdf

nsa-microsoft-cloud-exploit.pdf

NSA-Missions_Authorities_Oversight_and_Partnerships.pdf

NSA-Missions-Authorities-Oversight-and-Partnerships.pdf

nsa-muslim-porn.pdf

nsa-overcollection.pdf

nsa-ppd-20.pdf

nsa-prism-13-1021.pdf

nsa-prism-dk.pdf

nsa-prism-guardian-13-1101.pdf

nsa-quantum-computer-2.pdf

nsa-quantum-computer.pdf

nsa-quantum-tasking.pdf

nsa-quantumtheory.pdf

nsa-scissors-2.pdf

nsa-scissors.pdf

NSA-Section_702_and_Section_215_Factsheets.pdf

NSA-Section-702-and-Section-215-Factsheets.pdf

NSA-Section_702_'Loop_Hole'.pdf

nsa-se-fra-quantum-2.pdf

nsa-se-fra-relationship.pdf

nsa-se-fra-ru-baltic.pdf

nsa-se-fra-spying-agenda.pdf

nsa-se-fra-xkeyscore.pdf

nsa-se-fra-xkeyscore-slide.pdf

nsa-se-spies.pdf

nsa-sigint-cryptologic-platform.pdf

nsa-sigint-enabling-guardian-13-0905.pdf

nsa-sigint-enabling-nyt-13-0905.pdf

nsa-sigint-enabling-propublica-13-0905.pdf

nsa-sigint-strategic-mission-2007.pdf

nsa-sigint-strategic-mission-2013.pdf

nsa-sigint-strategy-2012-2016.pdf

nsa-sigint-successes.pdf

nsa-smartphones-analysis.pdf

nsa-smartphones.pdf

nsa-sms-exploit.pdf

nsa-spy-games.pdf

nsa-sso1-guardian-13-1101.pdf

nsa-sso2-guardian-13-1101.pdf

nsa-sso-content.pdf

nsa-sso-dk.pdf

nsa-sso-overview.pdf

nsa-sso-slides.pdf

nsa-stellar-wind.pdf

nsa-tao-ant.pdf

nsa-tao-ant-pdf.pdf

nsa-tao-intro.pdf

nsa-target-location.pdf

nsa-tor.pdf

nsa-tor-stinks.pdf

nsa-verizon-spy.pdf

nsa-wanadoo-alcatel.pdf

nsa-windstop-muscular-incenser.pdf

nsa-windstop.pdf

nsa-xkeyscore.pdf

NSA-XKeyscore_Powerpoint.pdf

NSA-XKeyscore-Powerpoint.pdf

nsa-xkeyscore-sources.pdf

nsa-xkeyscore-tor-slides.pdf

nsa-yahoo-google-exploit.pdf

pcs-harvesting-at-scale.pdf

phonesgchq.pdf

phonesnsa.pdf

PRISM-Overview_Powerpoint_Slides.pdf

PRISM-Overview-Powerpoint-Slides.pdf

PRISM-Powerpoint_Slides_re_Data_Acquisition.pdf

PRISM-Powerpoint-Slides-re-Data-Acquisition.pdf

psychology-a-new-kind-of-sigdev.pdf

rcs-9-admin-final.pdf

rcs-9-analyst-final.pdf

rcs-9-sysadmin-final.pdf

rcs-9-technician-final.pdf

remote-control-system-9-0-changelog-final.pdf

remote-control-system-9-1-changelog-final.pdf

samsung_reply_2.pdf

samsung_reply.pdf

saudi-arabia-information-paper.pdf

Section-215_-_Obama_Administration_White_Paper.pdf

Section-215---Obama-Administration-White-Paper.pdf

Section-215_-_Primary_Order.pdf

Section-215---Primary-Order.pdf

Section-215_-Secondary_Order-_Verizon.pdf

Section-215---Secondary-Order---Verizon.pdf

SID-Oversight_and_Compliance.pdf

SID-Oversight-and-Compliance.pdf

sigint-enabling-project2.pdf

sigint-enabling-project.pdf

spy-budget-fy13.pdf

Targeting-Rationale_-_TAR.pdf

Targeting-Rationale---TAR.pdf

the-art-of-deception-training-for-a-new.pdf

the-nsa-and-gchqs-quantumtheory-hacking-tactics.pdf

turbine-and-turmoil.pdf

UPSTREAM-Powerpoint_Slide.pdf

UPSTREAM-Powerpoint-Slide.pdf

vpn-and-voip-exploitation-with-hammerchant.pdf

What_We_Need_to_Learn_from_Snowden.pdf

where-are-these-keys.pdf

Wyden-Udall-Letter_on_NSA_Fact_Sheet_Inaccuracy.pdf

Wyden-Udall-Letter-on-NSA-Fact-Sheet-Inaccuracy.pdf

Releases

No releases published

Packages

No packages published

Languages

  • Shell 100.0%