|
Government's Rule 28(j) Letter |
Thursday, February 12, 2015 |
|
|
National Security Letters, NSA Spying |
57_31_govt_28j_letter.pdf |
|
Joint Motion to Unseal Government's Rule 28(j) Letter |
Thursday, February 19, 2015 |
|
|
National Security Letters, NSA Spying |
32_joint_motion_unseal.pdf |
|
Joint Motion to Unseal Government's Rule 28(j) Letter |
Thursday, February 19, 2015 |
|
|
National Security Letters, NSA Spying |
57_31_joint_motion_unseal.pdf |
|
Order Granting Unsealing |
Wednesday, March 4, 2015 |
|
|
National Security Letters, NSA Spying |
nsl_cases_unsealing_order.pdf |
|
Joint Civil Society Statement on Privacy in the Digital Age Submitted to the 27th Session of the UN Human Rights Coun |
Thursday, September 11, 2014 |
|
|
International, Surveillance and Human Rights, Privacy |
eff-un-hrc27-jointstatementprivacy-12092014.pdf |
|
Media Alliance CalECPA Support Letter |
Saturday, February 14, 2015 |
|
|
|
media_alliance_letter_of_support_for_cal-ecpa.pdf |
|
California Newspaper Publishers Association SB 178 Sponsor Letter |
Thursday, February 26, 2015 |
|
|
|
cnpa_sb_178_support_letter.pdf |
|
ACLU SB 178 Sponsor Letter |
Wednesday, February 25, 2015 |
|
|
|
aclu_sb_178_support.pdf |
|
NGOs Call On Governments To Support the Establishment Of A UN Special Rapporteur on The Right to Privacy |
Friday, February 27, 2015 |
|
|
International, Surveillance and Human Rights, Privacy |
in_support_a_sr_on_privacy_updated_version.pdf |
|
Commil v. Cisco - EFF Amicus Brief |
Thursday, February 26, 2015 |
|
|
Patents, Patent Trolls |
13-896_bsac_electronic_frontier_foundation.pdf |
|
Vera Ranieri's congressional testimony |
Thursday, February 26, 2015 |
|
|
Patents |
update_-_patent_demand_letters_ranieri_testimony.pdf |
|
EFF SB 178 Sponsor Letter |
Wednesday, February 25, 2015 |
|
|
Privacy |
eff_sb_178_sponsor_letter.pdf |
|
20150219-Intercept-SIM Card Encryption Key Theft and Mobile Network Access |
Thursday, February 19, 2015 |
|
|
|
20150219-intercept-sim_card_encryption_key_theft_and_mobile_network_access.zip |
|
20150210-Intercept-Iran Current Topics - Interactions with GCHQ |
Tuesday, February 10, 2015 |
|
|
|
20150210-intercept-iran_current_topics_-_interactions_with_gchq.pdf |
|
Cyber Information Sharing Act of 2015 Senate Intelligence Committee 114 Congress |
Friday, February 20, 2015 |
|
|
Cyber Security Legislation |
cisa_2015_discussion_draft.pdf |
|
Prof. Scherr Amicus Brief in Support of Supreme Court Cert. - Raynor v. Maryland |
Thursday, February 19, 2015 |
|
|
Biometrics, Mandatory National IDs and Biometric Databases, Privacy, Genetic Information Privacy |
raynor_v._maryland_-_scherr_amicus.pdf |
|
Order Granting Motion to Seal |
Thursday, February 19, 2015 |
|
|
NSA Spying |
first_uni_order_granting_sealing_2.19.15.pdf |
|
State v. Raynor - Maryland Court of Appeals Opinion |
Thursday, February 19, 2015 |
|
|
Biometrics, Privacy, Genetic Information Privacy |
state_v_raynor_md_ct_app_2014.pdf |
|
Raynor v. Maryland - Petition to the Supreme Court for a Writ of Certiorari |
Thursday, February 19, 2015 |
|
|
Biometrics, Privacy, Genetic Information Privacy |
raynor_v_md_cert_petition_2015.pdf |
|
EFF's Amicus Brief in Support of Supreme Court Cert - Raynor v. Maryland |
Wednesday, February 18, 2015 |
|
|
|
eff_raynor_amicus_brief.pdf |
|
Amicus brief |
Tuesday, February 17, 2015 |
|
|
|
twitter_v_holder_amicus_brief_nsl_recipients.pdf |
|
EFF v. Personal Audio - Transcript of Oral Argument |
Tuesday, February 17, 2015 |
|
|
Patents, Patent Busting Project, Patent Trolls, Creativity & Innovation |
40_-_record_of_oral_hearing.pdf |
|
Answer and counterclaim |
Friday, February 13, 2015 |
|
|
|
garfumanswerandcounterclaim.pdf |
|
Motion to Dismiss |
Friday, February 13, 2015 |
|
|
|
garfummotiontodismiss.pdf |
|
Government's Response to Citation of Supplemental Authorities |
Friday, February 13, 2015 |
|
|
NSA Spying |
smith_govt_28j_letter.pdf |
|
Society of Professional Journalists Amicus Brief in Support of EFF's ALPR Appeal |
Wednesday, February 11, 2015 |
Amicus Brief filed on behalf of Northern California Chapter of Society of Professional Journalists in support of EFF and ACLU-SoCal’s appellate petition for writ of mandate in our case seeking access to a week’s worth of Los Angeles law enforcement ALPR license plate data.
|
|
Privacy, Locational Privacy, Transparency |
spj_alpr_amicus.pdf |
|
Reporters Committee Amicus Brief Filed in Support of EFF's ALPR Appeal |
Tuesday, February 10, 2015 |
Amicus Brief filed on behalf of Reporters Committee for Freedom of the Press, Los Angeles Times, California Newspaper Publishers Association, Californians Aware, and the McClatchy Company in support of EFF and ACLU-SoCal’s appellate petition for writ of mandate in our case seeking access to a week’s worth of Los Angeles law enforcement ALPR license plate data.
|
|
Privacy, Locational Privacy, Transparency |
rcfp_alpr_brief_v_1.pdf |
|
Order on Motions for Summary Judgment |
Tuesday, February 10, 2015 |
|
|
NSA Spying |
jewel_order.pdf |
|
EFF Comments Submitted to the United Nations Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression |
Tuesday, February 10, 2015 |
|
|
International, Surveillance and Human Rights |
Comments submitted to the United Nations Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion a |
|
Oakland City Council Staff Report February 10, 2015 |
Tuesday, February 10, 2015 |
|
|
|
dac.2.10.report.pdf |
|
Privacy Policy Committee Recommendations to Oakland City Council |
Tuesday, February 10, 2015 |
|
|
|
dac_committee_recommendations.pdf |
|
Dirtbox FOIA Complaint |
Tuesday, February 10, 2015 |
|
|
|
eff_v._doj_complaint.pdf |
|
Oakland City Council Resolution About Domain Awareness Center |
Tuesday, March 4, 2014 |
|
|
|
brooks.resolution.pdf |
|
Defend Innovation: How to Fix Our Broken Patent System |
Tuesday, February 10, 2015 |
|
|
Patents |
eff-defend-innovation.pdf |
|
EFF Comments on DMCA Exemption for Abandoned Games |
Friday, February 6, 2015 |
|
|
Fair Use, DMCA Rulemaking, Creativity & Innovation, DRM |
2014-07_eff_gaming_exemption_comment.pdf |
|
CalECPA Fact Sheet |
Monday, February 9, 2015 |
|
|
|
calecpa_fact_sheet.2.9.15.pdf |
|
Comments of EFF to the USTR 2015 Special 301 Review |
Friday, February 6, 2015 |
Comments of EFF to the USTR 2015 Special 301 Review, docket number USTR-2014-0025.
|
|
Fair Use, International, Trade Agreements and Digital Rights |
eff_comments_to_2015_special_301_report.pdf |
|
x |
|
|
|
|
|
|
EFF and Organization for Transformative Works Remix Exemption Request |
Friday, February 6, 2015 |
|
|
|
2014-07_eff_remix_comments.pdf |
|
EFF Gaming Exemption Request |
Friday, February 6, 2015 |
|
|
|
2014-07_eff_gaming_exemption_comment.pdf |
|
EFF Phone Jailbreaking Exemption Request |
Friday, February 6, 2015 |
|
|
|
2014-07_eff_comments_phone_jailbreaking.pdf |
|
EFF Device Jailbreaking Exemption Request |
Friday, February 6, 2015 |
|
|
|
2014-07_eff_comments_device_jailbreaking.pdf |
|
EFF Vehicle Security Exemption Request |
Friday, February 6, 2015 |
|
|
|
2014-_07_eff_vehicle_security_comment_.pdf |
|
EFF Vehicle Repair Exemption Request |
Friday, February 6, 2015 |
|
|
|
2014_-07_eff_vehicle_repair_comment.pdf |
|
deletethis |
Wednesday, February 4, 2015 |
|
|
|
20150204-Intercept-Lovely Horse |
|
20150204-Intercept-NATO Civilian Intelligence Council Cyber Panel |
Wednesday, February 4, 2015 |
|
|
|
20150204-Intercept-NATO Civilian Intelligence Council Cyber Panel |
|
20150204-Intercept-Open Source For Cyber Defence Progress |
Wednesday, February 4, 2015 |
|
|
|
20150204-Intercept-Open Source For Cyber Defence Progress |
|
20150204-Intercept-Who Else Is Targeting Your Target Collecting |
Wednesday, February 4, 2015 |
|
|
|
20150204-Intercept-Who Else Is Targeting Your Target Collecting |
|
20150204-Intercept-Lovely Horse |
Wednesday, February 4, 2015 |
|
|
|
20150204-Intercept-Lovely Horse |
|
20150204-Intercept-Who Else Is Targeting Your Target Collecting |
Wednesday, February 4, 2015 |
|
|
|
20150204-Intercept-Who Else Is Targeting Your Target Collecting |
|
deletethiskthxbai |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-NSA - GCHQ Crypt Discovery Joint Collaboration Activity |
|
20141228-Spiegel-NSA Cryptographic Modernization (CryptoMod) Classification Guide |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-NSA Cryptographic Modernization (CryptoMod) Classification Guide |
|
20141228-Spiegel-NSA Experiment For Massive SSL-TLS Decryption |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-NSA Experiment For Massive SSL-TLS Decryption |
|
20141228-Spiegel-NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN |
|
20141228-Spiegel-NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service |
|
20141228-Spiegel-NSA Presentation on the Analysis and Contextualisation of Data From VPN |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-NSA Presentation on the Analysis and Contextualisation of Data From VPN |
|
20141228-Spiegel-NSA Presentation on the Development of Attacks on VPN |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-NSA Presentation on the Development of Attacks on VPN |
|
20141228-Spiegel-Overview of the Capabilities of the VALIANTSURF Program |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Overview of the Capabilities of the VALIANTSURF Program |
|
20141228-Spiegel-Overview on Internet Anonymization Services on How They Work |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Overview on Internet Anonymization Services on How They Work |
|
20141228-Spiegel-POISENNUT Virtual Private Network Attack Orchestrator (VAO) |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-POISENNUT Virtual Private Network Attack Orchestrator (VAO) |
|
20141228-Spiegel-Which Encryption Protocols and Techniques Can Be Attacked |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Which Encryption Protocols and Techniques Can Be Attacked |
|
20141228-Spiegel-Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic |
|
20141228-Spiegel-Processing of Data From Exploited VPN In the TURMOIL Program |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Processing of Data From Exploited VPN In the TURMOIL Program |
|
20141228-Spiegel-SCARLETFEVER How Attacks on Encrypted Connections are Orchestrated |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-SCARLETFEVER How Attacks on Encrypted Connections are Orchestrated |
|
20141228-Spiegel-SCARLETFEVER Program to Attack Secure Sockets Layer (SSL) - (TLS) |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-SCARLETFEVER Program to Attack Secure Sockets Layer (SSL) - (TLS) |
|
20141228-Spiegel-TOR Deanonymisation Research |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-TOR Deanonymisation Research |
|
20141228-Spiegel-TOR Overview of Existing Techniques |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-TOR Overview of Existing Techniques |
|
20141228-Spiegel-What Your Mother Never Told You About the Development of Signal Intelligence |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-What Your Mother Never Told You About the Development of Signal Intelligence |
|
20141228-Spiegel-NSA - GCHQ Crypt Discovery Joint Collaboration Activity |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-NSA - GCHQ Crypt Discovery Joint Collaboration Activity |
|
20141228-Spiegel-What Your Mother Never Told You About the Development of Signal Intelligence |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-What Your Mother Never Told You About the Development of Signal Intelligence |
|
CalECPA Bill Language |
Friday, February 6, 2015 |
|
|
|
sb_178_leno_intro_2_9_15_2.pdf |
|
Comments Re: NHTSA V2V ANPRM from Professor Dorothy J. Glancy and the Electronic Frontier Foundation |
Monday, October 20, 2014 |
|
|
|
professor_dorothy_j_glancy_professor_of_law_at_santa_clara_university_school_of_law_and_the_electronic_frontier_foundation_comments.pdf |
|
EFF Amicus Brief IBM S. African Apartheid |
Wednesday, February 4, 2015 |
|
|
Surveillance and Human Rights |
eff_ibm_apartheid_amicus_brief_final.pdf |
|
deletethis |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-4th Party Collection - Taking Advantage of Non-partner Exploitation |
|
20150117-Spiegel-APEX Method of Combining Passive With Active Methods to Exfiltrate Data From Networks Attacked |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-APEX Method of Combining Passive With Active Methods to Exfiltrate Data From Networks Attacked |
|
20150117-Spiegel-BYZANTINE HADES - NSA Research on Targets of Chinese Network Exploitation Tools |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-BYZANTINE HADES - NSA Research on Targets of Chinese Network Exploitation Tools |
|
20150117-Spiegel-Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE |
|
20150117-Spiegel-Explanation of APEX Shaping to Put Exfiltrating Network Traffic Into Patterns That Allow Plausible Deniability |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Explanation of APEX Shaping to Put Exfiltrating Network Traffic Into Patterns That Allow Plausible Deniability |
|
20150117-Spiegel-Exploring and Exploiting Leaky Mobile Apps With BADASS |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Exploring and Exploiting Leaky Mobile Apps With BADASS |
|
20150117-Spiegel-Fifth Party Access - When Fourth Party Puts Others Under Surveillance |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Fifth Party Access - When Fourth Party Puts Others Under Surveillance |
|
20150117-Spiegel-HIDDENSALAMANDER -Recognition of Botnet Activity and Options For Takeover of Clients and Data |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-HIDDENSALAMANDER -Recognition of Botnet Activity and Options For Takeover of Clients and Data |
|
20150117-Spiegel-Interview With NSA's Department For Tailored Access Operations |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Interview With NSA's Department For Tailored Access Operations |
|
20150117-Spiegel-iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID) |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID) |
|
20150117-Spiegel-Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline |
|
20150117-Spiegel-QUANTUMSHOOTER Implant to Remote-control Computers From Unknown Third Parties |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-QUANTUMSHOOTER Implant to Remote-control Computers From Unknown Third Parties |
|
20150117-Spiegel-SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence |
|
20150117-Spiegel-4th Party Collection - Taking Advantage of Non-partner Exploitation |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-4th Party Collection - Taking Advantage of Non-partner Exploitation |
|
20150117-Spiegel-SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence |
|
SSPS Minutes Dec 2, 2014 |
Monday, February 2, 2015 |
|
|
|
ssps-meeting-minutes-12022014_0.pdf |
|
Order Granting Parties' Stipulation on Service of Defendants in their Individual Capacities |
Monday, February 2, 2015 |
|
|
NSA Spying |
first_uni_order_on_service_defs_ind_capacity.pdf |
|
EFF, PK, CDT, OTI and R Street's Amicus Brief |
Friday, January 30, 2015 |
|
|
|
google_v_hood_corrected_amici_brief_conformed.pdf |
|
EFF Amicus - Los Angeles v. Patel |
Friday, January 30, 2015 |
|
|
|
patel_eff_amicus_brief.pdf |
|
EFF Amicus Brief |
Friday, January 30, 2015 |
|
|
|
|
|
Respondents' Brief |
Friday, January 23, 2015 |
|
|
|
13-1175_resp.authcheckdam.pdf |
|
Hard Drive Productions Declaration of Seth Schoen |
Thursday, January 26, 2012 |
|
|
Copyright Trolls |
seth_decl_hard_drive_dc.pdf |
|
ALPR Records Appeal - EFF, ACLU v. LAPD, LASD |
Tuesday, January 27, 2015 |
|
|
Transparency |
alpr_appeal_writ_reply_-final.pdf |
|
delete25 |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-NSA Example SNOWGLOBE, In Which A Suspected French Government Trojan Is Analyzed to Find Out If It Can Be Helpf |
|
20150117-Spiegel-NSA Fourth Party Access - I Drink Your Milkshake |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-NSA Fourth Party Access - I Drink Your Milkshake |
|
20150117-Spiegel-NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools |
|
20150117-Spiegel-Recognize and Process Data From Third Party Attacks |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-NSA Project Description to Recognize and Process Data That Comes From Third Party Attacks on Computers |
|
20150117-Spiegel-NSA Training Course Material on Computer Network Operations |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-NSA Training Course Material on Computer Network Operations |
|
20150117-Spiegel-QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL) |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL) |
|
20150117-Spiegel-NSA SNOWGLOBE, French Government Trojan |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-NSA Example SNOWGLOBE, In Which A Suspected French Government Trojan Is Analyzed to Find Out If It Can Be Helpf |
|
20150117-Spiegel-QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL) |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL) |
|
20150128-Intercept-CSE Presentation on the LEVITATION Project |
Wednesday, January 28, 2015 |
|
|
|
20150128-intercept-cse_presentation_on_the_levitation_project.pdf |
|
delete128 |
Wednesday, January 28, 2015 |
|
|
|
20141228-Spiegel-Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN |
|
20141228-Spiegel-Explanation on the SPIN9 Program on End-to-end Attacks on VPN |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Explanation on the SPIN9 Program on End-to-end Attacks on VPN |
|
20141228-Spiegel-GCHQ Briefing on the BULLRUN Program |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-GCHQ Briefing on the BULLRUN Program |
|
20141228-Spiegel-GCHQ Presentation on the BULLRUN Programs Decryption Capabilities |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-GCHQ Presentation on the BULLRUN Programs Decryption Capabilities |
|
20141228-Spiegel-General Description How NSA Handles Encrypted Traffic |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-General Description How NSA Handles Encrypted Traffic |
|
20141228-Spiegel-Guide For Analysts on How to Use the PRISM Skype Collection |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Guide For Analysts on How to Use the PRISM Skype Collection |
|
20141228-Spiegel-Intercept With OTR Encrypted Chat |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Intercept With OTR Encrypted Chat |
|
20141228-Spiegel-Intercept With PGP Encrypted Message |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Intercept With PGP Encrypted Message |
|
20141228-Spiegel-Intro to the VPN Exploitation Process Mentioning the Protocols Attacked - PPTP, IPSEC, SSL, SSH) |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Intro to the VPN Exploitation Process Mentioning the Protocols Attacked - PPTP, IPSEC, SSL, SSH) |
|
20141228-Spiegel-MALIBU Architecture Overview to Exploit VPN Communication |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-MALIBU Architecture Overview to Exploit VPN Communication |
|
20141228-Spiegel-Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN |
|
20141228-Spiegel-MALIBU Architecture Overview to Exploit VPN Communication |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-MALIBU Architecture Overview to Exploit VPN Communication |
|
Government's Admin Motion to Strike Plaintiffs' Revised Proposed Order |
Wednesday, January 28, 2015 |
|
|
NSA Spying |
jewel_us_admin_motion_to_strike_revised_proposed_order.pdf |
|
DELETE1 |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job |
|
20150117-Spiegel-Report of An NSA Employee About A Backdoor In the OpenSSH Daemon |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Report of An NSA Employee About A Backdoor In the OpenSSH Daemon |
|
20150117-Spiegel-Sample Code of A Malware Program From the Five Eyes Alliance |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Sample Code of A Malware Program From the Five Eyes Alliance |
|
20150117-Spiegel-Supply-chain Interdiction - Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Supply-chain Interdiction - Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets |
|
20150117-Spiegel-Technical Description of the FASHIONCLEFT Protocol |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Technical Description of the FASHIONCLEFT Protocol |
|
20150117-Spiegel-Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job |
|
20150117-Spiegel-Technical Description of the FASHIONCLEFT Protocol |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Technical Description of the FASHIONCLEFT Protocol |
|
20150117-Spiegel-Overview of Methods For NSA Integrated Cyber Operations |
Saturday, January 17, 2015 |
|
|
|
20150117-spiegel-overview_of_methods_for_nsa_integrated_cyber_operations.pdf |
|
20150117-Spiegel-The FASHIONCLEFT Protocol NSA Uses to Exfiltrate Data From Trojans and Implants to the NSA |
Saturday, January 17, 2015 |
|
|
|
20150117-spiegel-the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa.pdf |
|
20150117-Spiegel-Overview of the TRANSGRESSION Program to Analyze and Exploit Foreign CNA-CNE Exploits |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Overview of the TRANSGRESSION Program to Analyze and Exploit Foreign CNA-CNE Exploits |
|
20150117-Spiegel-Overview on the NSA Use of Bots and the DEFIANTWARRIOR Program |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Overview on the NSA Use of Bots and the DEFIANTWARRIOR Program |
|
20150117-Spiegel-Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards |
|
20150117-Spiegel-The FASHIONCLEFT Protocol NSA Uses to Exfiltrate Data From Trojans and Implants to the NSA |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-The FASHIONCLEFT Protocol NSA Uses to Exfiltrate Data From Trojans and Implants to the NSA |
|
20141228-Spiegel- National Information Assurance Research Laboratory (NIARL) TUNDRA |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel- National Information Assurance Research Laboratory (NIARL) TUNDRA |
|
20141228-Spiegel-Description of VOIP Telephony Encryption Methods and Other Ways to Attack |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Description of VOIP Telephony Encryption Methods and Other Ways to Attack |
|
20141228-Spiegel-Description on the Processing of VPN Data Packets Within the TURMOIL Program |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Description on the Processing of VPN Data Packets Within the TURMOIL Program |
|
20141228-Spiegel-Explanation of A Potential Technique to Deanonymise Users of the TOR Network |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Explanation of A Potential Technique to Deanonymise Users of the TOR Network |
|
20141228-Spiegel-Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL |
|
20141228-Spiegel-Explanation of the POISENNUT Product and Its Role When Attacking VPN |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Explanation of the POISENNUT Product and Its Role When Attacking VPN |
|
20141228-Spiegel-Explanation of the Transform Engine Emulator When Attacking VPN |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Explanation of the Transform Engine Emulator When Attacking VPN |
|
Petitioner's Opening Brief |
Monday, December 15, 2014 |
|
|
|
petitioners_opening_brief.pdf |
|
Grant of Certiorari |
Monday, October 20, 2014 |
|
|
|
patel_cert_grant.pdf |
|
En Banc 9th Circuit Opinion |
Tuesday, December 24, 2013 |
|
|
|
patel_9th_circuit_en_banc_opinion.pdf |
|
Public Letter from Digital Rights Groups to Sen. Wyden to Oppose Fast Track |
Tuesday, January 27, 2015 |
|
|
Fair Use, International, Trans-Pacific Partnership Agreement |
publicletter-wyden-tpa-eff-fnl.pdf |
|
20141228-Speigel-Processing of Data From Exploited VPN In the TURMOIL Program |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-Processing of Data From Exploited VPN In the TURMOIL Program |
|
20141228-Speigel-TOR Deanonymisation Research |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-TOR Deanonymisation Research |
|
20141228-Speigel-TOR Overview of Existing Techniques |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-TOR Overview of Existing Techniques |
|
20141228-Speigel-What Your Mother Never Told You About the Development of Signal Intelligence |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-What Your Mother Never Told You About the Development of Signal Intelligence |
|
SSH) to end |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-Intro to the VPN Exploitation Process Mentioning the Protocols Attacked - PPTP, IPSEC, SSL, SSH) |
|
20141228-Speigel-MALIBU Architecture Overview to Exploit VPN Communication |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-MALIBU Architecture Overview to Exploit VPN Communication |
|
20141228-Speigel-NSA - GCHQ Crypt Discovery Joint Collaboration Activity |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-NSA - GCHQ Crypt Discovery Joint Collaboration Activity |
|
20141228-Speigel-NSA Cryptographic Modernization (CryptoMod) Classification Guide |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-NSA Cryptographic Modernization (CryptoMod) Classification Guide |
|
20141228-Speigel-NSA Experiment For Massive SSL-TLS Decryption |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-NSA Experiment For Massive SSL-TLS Decryption |
|
20141228-Speigel-NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN |
|
20141228-Speigel-NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service |
|
20141228-Speigel-NSA Presentation on the Analysis and Contextualisation of Data From VPN |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-NSA Presentation on the Analysis and Contextualisation of Data From VPN |
|
20141228-Speigel-NSA Presentation on the Development of Attacks on VPN |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-NSA Presentation on the Development of Attacks on VPN |
|
20141228-Speigel-NSA Program SCARLETFEVER Explaining How Attacks on Encrypted Connections are Orchestrated |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-NSA Program SCARLETFEVER Explaining How Attacks on Encrypted Connections are Orchestrated |
|
20141228-Speigel-Overview of the Capabilities of the VALIANTSURF Program |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-Overview of the Capabilities of the VALIANTSURF Program |
|
20141228-Speigel-Overview on Internet Anonymization Services on How They Work |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-Overview on Internet Anonymization Services on How They Work |
|
20141228-Speigel-POISENNUT Virtual Private Network Attack Orchestrator (VAO) |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-POISENNUT Virtual Private Network Attack Orchestrator (VAO) |
|
20141228-Speigel-Presentation From the SIGDEV Conference 2012 Explaining Which Encryption Protocols and Techniques Can Be Attack |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-Presentation From the SIGDEV Conference 2012 Explaining Which Encryption Protocols and Techniques Can Be Attack |
|
20141228-Speigel-Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic |
|
20141228-Speigel-Processing of Data From Exploited VPN In the TURMOIL Program |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-Processing of Data From Exploited VPN In the TURMOIL Program |
|
20141228-Speigel-TOR Deanonymisation Research |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-TOR Deanonymisation Research |
|
20141228-Speigel-TOR Overview of Existing Techniques |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-TOR Overview of Existing Techniques |
|
20141228-Speigel-What Your Mother Never Told You About the Development of Signal Intelligence |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-What Your Mother Never Told You About the Development of Signal Intelligence |
|
sp1-10 |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel- National Information Assurance Research Laboratory (NIARL) Newsletter, Keyword TUNDRA |
|
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network |
|
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database |
|
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs |
|
20141228-Speigel-Analytics on Security of TOR Hidden Services |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Analytics on Security of TOR Hidden Services |
|
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications |
|
20141228-Speigel-Canadian Document From CES on TLS Trends |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Canadian Document From CES on TLS Trends |
|
20141228-Speigel-Classification Guide For Cryptanalysis |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Classification Guide For Cryptanalysis |
|
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program |
|
20141228-Speigel-Description of Existing Projects on VPN Decryption |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Description of Existing Projects on VPN Decryption |
|
sp1-10 |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel- National Information Assurance Research Laboratory (NIARL) Newsletter, Keyword TUNDRA |
|
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network |
|
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database |
|
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs |
|
20141228-Speigel-Analytics on Security of TOR Hidden Services |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Analytics on Security of TOR Hidden Services |
|
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications |
|
20141228-Speigel-Canadian Document From CES on TLS Trends |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Canadian Document From CES on TLS Trends |
|
20141228-Speigel-Classification Guide For Cryptanalysis |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Classification Guide For Cryptanalysis |
|
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program |
|
20141228-Speigel-Description of Existing Projects on VPN Decryption |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Description of Existing Projects on VPN Decryption |
|
Sp14toencyptedmessage |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel- National Information Assurance Research Laboratory (NIARL) Newsletter, Keyword TUNDRA |
|
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network |
|
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database |
|
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs |
|
20141228-Speigel-Analytics on Security of TOR Hidden Services |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Analytics on Security of TOR Hidden Services |
|
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications |
|
20141228-Speigel-Canadian Document From CES on TLS Trends |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Canadian Document From CES on TLS Trends |
|
20141228-Speigel-Classification Guide For Cryptanalysis |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Classification Guide For Cryptanalysis |
|
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program |
|
20141228-Speigel-Description of Existing Projects on VPN Decryption |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Description of Existing Projects on VPN Decryption |
|
20141228-Speigel-Description of VOIP Telephony Encryption Methods and Cryptanalytic and Other Ways to Attack |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Description of VOIP Telephony Encryption Methods and Cryptanalytic and Other Ways to Attack |
|
20141228-Speigel-Description on the Processing of VPN Data Packets Within the TURMOIL Program |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Description on the Processing of VPN Data Packets Within the TURMOIL Program |
|
20141228-Speigel-Details on How NSA Uses the SCARLETFEVER Program to Attack Scure Sockets Layer (SSL)-Transport Layer Scurity (T |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Details on How NSA Uses the SCARLETFEVER Program to Attack Scure Sockets Layer (SSL)-Transport Layer Scurity (T |
|
20141228-Speigel-Explanation of A Potential Technique to Deanonymise Users of the TOR Network |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Explanation of A Potential Technique to Deanonymise Users of the TOR Network |
|
20141228-Speigel-Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL |