Browse Items (626 total)

20140630-WaPo-affidavit_of_keith_alexander_regarding_spying_on_foreign_entities.pdf
This document is an affidavit by the former director of the National Security Agency, General Keith B. Alexander created in adherence to subsection 702(g)(2)(C) of the Foreign Intelligence Surveillance Act. It describes the procedures enabling the…

This document is an affidavit by the former director of the National Security Agency, General Keith B. Alexander created in adherence to subsection 702(g)(2)(C) of the Foreign Intelligence Surveillance Act. It describes the procedures enabling the…

20150518_intercept_rc-sw-intsum-20110619-20110620-r.pdf
This document is an intelligence report created by Regional Command Southwest. It describes the political situation in Afghanistan and Pakistan on June 19 - 20 2011.

20150518_intercept_rc-sw-intsum-20110623-20110624-r.pdf
This document is an intelligence report created by Regional Command Southwest. It describes the political situation in Afghanistan and Pakistan on June 19 - 20 2011.

20140618-DerSpiegel-agenda_for_the_visit_of_bsi_vice_president_andreas_konen_to_the_nsa.pdf
This internal NSA document provides the agenda for a visit from the President of Germany’s Federal Office of Information Security (BSI).

20150622-intercept-project_camberdada_-_nsa.pdf
This document is an internal NSA presentation. It outlines the CAMPERDADA program, which seeks to monitor, collect, triage and repurpose malware and email phishing scams.

20150323-CBC-CSE Response to CBC Questions.pdf
This document is a memo prepared by CSEC addressing several questions from the media outlet CBC.

20140307-intercept-nsa_ask_zelda_an_interview_with_zelda.pdf
This document is an article from SIDToday, an internal newsletter of the NSA's Signals Intelligence Directorate division. It contains an interview with the author of an advice column called 'Ask Zelda'.

20140312-intercept-nsa_technology_directorate_analysis_of_converged_data.pdf
This document contains a slide from the NSA Technology Directorate discussing the benefits of converged data analysis. The slide outlines how NSA Signals and Target analysts recieve data without knowing the circumstances of collection.

20141228-speigel-analytic_challenges_from_active-passive_integration_when_nsa_attacks_ipsec_vpns_0.pdf
This document is a presentation on "shaping:" Active implant copies traffic and directs a copy past a passive collector, such as TURMOIL. It allows for decryption, collecting metadata records and analysis of internet key exhanges, selection of VPNs,…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2