Browse Items (626 total)

20131230-spiegel-tao_quantum_theory.pdf
This document is an internal NSA presentation that describes the functioning of QUANTUM. It also describes the operation of FOXACID in the QUANTUM tasking process, and how it infects machines with malicious programs.

20150117-spiegel-technical_description_of_the_fashioncleft_protocol_.pdf
This document is a technical description of the FASHIONCLEFT computer network exploitation (CNE) collection protocol. It "enables raw data packets from the external internet to interface to the Common Data Receptor (CDR) of Data Network Technology's…

20150925-intercept-demystifying_nge_rock_ridge.pdf
This document is an internal GCHQ presentation. It describes ROCKRIDGE, which is a GCHQ program that seeks to improve the agency's capabilities to ingest more data and provide more comprehensive analytics utilizing the BLACK HOLE content depository.

20130903-globo-satc.pdf
This document contains two presentations and one article relating to the NSA's foreign surveillance programs. The first describes case studies of operations against the staff of Enrique Pena Nieto, formerly a leading Mexican Presidential candidate,…

20131211-svt-final_agenda_sweden_usa.pdf
This document is the final agenda of the SWEDUSA Strategic Planning Conference, hosted on 24 - 26th April 2013. Attending this meeting was Ingvar Akesson, Director General of Sweden's FRA (National Defence Radio Establishment / Forsvarets…

20131211-svt-nsa_internal_pm_on_fra.pdf
This document is a NSA memo describing the nature and extent between the NSA and Sweden's National Defence Radio Establishment (FRA).

20140825-Intercept-Metadata-Policy-Conference.pdf
This document contains a rough draft of a conference summary outlining the definitions of collection content under the authority of the Executive Order 12333 and FISA. The draft document refers to the difficulty to differentiate between…

20130928-nyt-syanpse.pdf
This document is a slide from an NSA presentation illustrating one of the ways in which the agency uses e-mail and telephony metadata to analyze the relationship networks of foreign intelligence targets. Connections between people are illustrated…

20140618-dagbladet-keith_alexander_talking_points.pdf
This document contains notes for the opening remarks offered by former NSA Director, Keith Alexander at the 2013 DENUSA conference in Copenhagen, Denmark.

20140618-der_spiegel-explanation_of_nymrod_a_system_for_searching_for_people_and_places_in_databases_and_documents.pdf
This document is an internal NSA memo. It describes the operation of NYMROD, an automatic name recognition tool.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2