Skip to main content
Privacy’s Defender: My Thirty-Year Fight Against Digital Surveillance

Documents

Documents

Title Date Description Document Category Related Issues Filename
Government's Rule 28(j) Letter Thursday, February 12, 2015 National Security Letters, NSA Spying PDF icon 57_31_govt_28j_letter.pdf
Joint Motion to Unseal Government's Rule 28(j) Letter Thursday, February 19, 2015 National Security Letters, NSA Spying PDF icon 32_joint_motion_unseal.pdf
Joint Motion to Unseal Government's Rule 28(j) Letter Thursday, February 19, 2015 National Security Letters, NSA Spying PDF icon 57_31_joint_motion_unseal.pdf
Order Granting Unsealing Wednesday, March 4, 2015 National Security Letters, NSA Spying PDF icon nsl_cases_unsealing_order.pdf
Joint Civil Society Statement on Privacy in the Digital Age Submitted to the 27th Session of the UN Human Rights Coun Thursday, September 11, 2014 International, Surveillance and Human Rights, Privacy PDF icon eff-un-hrc27-jointstatementprivacy-12092014.pdf
Media Alliance CalECPA Support Letter Saturday, February 14, 2015 PDF icon media_alliance_letter_of_support_for_cal-ecpa.pdf
California Newspaper Publishers Association SB 178 Sponsor Letter Thursday, February 26, 2015 PDF icon cnpa_sb_178_support_letter.pdf
ACLU SB 178 Sponsor Letter Wednesday, February 25, 2015 PDF icon aclu_sb_178_support.pdf
NGOs Call On Governments To Support the Establishment Of A UN Special Rapporteur on The Right to Privacy Friday, February 27, 2015 International, Surveillance and Human Rights, Privacy PDF icon in_support_a_sr_on_privacy_updated_version.pdf
Commil v. Cisco - EFF Amicus Brief Thursday, February 26, 2015 Patents, Patent Trolls PDF icon 13-896_bsac_electronic_frontier_foundation.pdf
Vera Ranieri's congressional testimony Thursday, February 26, 2015 Patents PDF icon update_-_patent_demand_letters_ranieri_testimony.pdf
EFF SB 178 Sponsor Letter Wednesday, February 25, 2015 Privacy PDF icon eff_sb_178_sponsor_letter.pdf
20150219-Intercept-SIM Card Encryption Key Theft and Mobile Network Access Thursday, February 19, 2015 Package icon 20150219-intercept-sim_card_encryption_key_theft_and_mobile_network_access.zip
20150210-Intercept-Iran Current Topics - Interactions with GCHQ Tuesday, February 10, 2015 PDF icon 20150210-intercept-iran_current_topics_-_interactions_with_gchq.pdf
Cyber Information Sharing Act of 2015 Senate Intelligence Committee 114 Congress Friday, February 20, 2015 Cyber Security Legislation PDF icon cisa_2015_discussion_draft.pdf
Prof. Scherr Amicus Brief in Support of Supreme Court Cert. - Raynor v. Maryland Thursday, February 19, 2015 Biometrics, Mandatory National IDs and Biometric Databases, Privacy, Genetic Information Privacy PDF icon raynor_v._maryland_-_scherr_amicus.pdf
Order Granting Motion to Seal Thursday, February 19, 2015 NSA Spying PDF icon first_uni_order_granting_sealing_2.19.15.pdf
State v. Raynor - Maryland Court of Appeals Opinion Thursday, February 19, 2015 Biometrics, Privacy, Genetic Information Privacy PDF icon state_v_raynor_md_ct_app_2014.pdf
Raynor v. Maryland - Petition to the Supreme Court for a Writ of Certiorari Thursday, February 19, 2015 Biometrics, Privacy, Genetic Information Privacy PDF icon raynor_v_md_cert_petition_2015.pdf
EFF's Amicus Brief in Support of Supreme Court Cert - Raynor v. Maryland Wednesday, February 18, 2015 PDF icon eff_raynor_amicus_brief.pdf
Amicus brief Tuesday, February 17, 2015 PDF icon twitter_v_holder_amicus_brief_nsl_recipients.pdf
EFF v. Personal Audio - Transcript of Oral Argument Tuesday, February 17, 2015 Patents, Patent Busting Project, Patent Trolls, Creativity & Innovation PDF icon 40_-_record_of_oral_hearing.pdf
Answer and counterclaim Friday, February 13, 2015 PDF icon garfumanswerandcounterclaim.pdf
Motion to Dismiss Friday, February 13, 2015 PDF icon garfummotiontodismiss.pdf
Government's Response to Citation of Supplemental Authorities Friday, February 13, 2015 NSA Spying PDF icon smith_govt_28j_letter.pdf
Society of Professional Journalists Amicus Brief in Support of EFF's ALPR Appeal Wednesday, February 11, 2015

Amicus Brief filed on behalf of Northern California Chapter of Society of Professional Journalists in support of EFF and ACLU-SoCal’s appellate petition for writ of mandate in our case seeking access to a week’s worth of Los Angeles law enforcement ALPR license plate data.

Privacy, Locational Privacy, Transparency PDF icon spj_alpr_amicus.pdf
Reporters Committee Amicus Brief Filed in Support of EFF's ALPR Appeal Tuesday, February 10, 2015

Amicus Brief filed on behalf of Reporters Committee for Freedom of the Press, Los Angeles Times, California Newspaper Publishers Association, Californians Aware, and the McClatchy Company in support of EFF and ACLU-SoCal’s appellate petition for writ of mandate in our case seeking access to a week’s worth of Los Angeles law enforcement ALPR license plate data.

Privacy, Locational Privacy, Transparency PDF icon rcfp_alpr_brief_v_1.pdf
Order on Motions for Summary Judgment Tuesday, February 10, 2015 NSA Spying PDF icon jewel_order.pdf
EFF Comments Submitted to the United Nations Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression Tuesday, February 10, 2015 International, Surveillance and Human Rights PDF icon Comments submitted to the United Nations Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion a
Oakland City Council Staff Report February 10, 2015 Tuesday, February 10, 2015 PDF icon dac.2.10.report.pdf
Privacy Policy Committee Recommendations to Oakland City Council Tuesday, February 10, 2015 PDF icon dac_committee_recommendations.pdf
Dirtbox FOIA Complaint Tuesday, February 10, 2015 PDF icon eff_v._doj_complaint.pdf
Oakland City Council Resolution About Domain Awareness Center Tuesday, March 4, 2014 PDF icon brooks.resolution.pdf
Defend Innovation: How to Fix Our Broken Patent System Tuesday, February 10, 2015 Patents PDF icon eff-defend-innovation.pdf
EFF Comments on DMCA Exemption for Abandoned Games Friday, February 6, 2015 Fair Use, DMCA Rulemaking, Creativity & Innovation, DRM PDF icon 2014-07_eff_gaming_exemption_comment.pdf
CalECPA Fact Sheet Monday, February 9, 2015 PDF icon calecpa_fact_sheet.2.9.15.pdf
Comments of EFF to the USTR 2015 Special 301 Review Friday, February 6, 2015

Comments of EFF to the USTR 2015 Special 301 Review, docket number USTR-2014-0025.

Fair Use, International, Trade Agreements and Digital Rights PDF icon eff_comments_to_2015_special_301_report.pdf
x
EFF and Organization for Transformative Works Remix Exemption Request Friday, February 6, 2015 PDF icon 2014-07_eff_remix_comments.pdf
EFF Gaming Exemption Request Friday, February 6, 2015 PDF icon 2014-07_eff_gaming_exemption_comment.pdf
EFF Phone Jailbreaking Exemption Request Friday, February 6, 2015 PDF icon 2014-07_eff_comments_phone_jailbreaking.pdf
EFF Device Jailbreaking Exemption Request Friday, February 6, 2015 PDF icon 2014-07_eff_comments_device_jailbreaking.pdf
EFF Vehicle Security Exemption Request Friday, February 6, 2015 PDF icon 2014-_07_eff_vehicle_security_comment_.pdf
EFF Vehicle Repair Exemption Request Friday, February 6, 2015 PDF icon 2014_-07_eff_vehicle_repair_comment.pdf
deletethis Wednesday, February 4, 2015 PDF icon 20150204-Intercept-Lovely Horse
20150204-Intercept-NATO Civilian Intelligence Council Cyber Panel Wednesday, February 4, 2015 PDF icon 20150204-Intercept-NATO Civilian Intelligence Council Cyber Panel
20150204-Intercept-Open Source For Cyber Defence Progress Wednesday, February 4, 2015 PDF icon 20150204-Intercept-Open Source For Cyber Defence Progress
20150204-Intercept-Who Else Is Targeting Your Target Collecting Wednesday, February 4, 2015 PDF icon 20150204-Intercept-Who Else Is Targeting Your Target Collecting
20150204-Intercept-Lovely Horse Wednesday, February 4, 2015 PDF icon 20150204-Intercept-Lovely Horse
20150204-Intercept-Who Else Is Targeting Your Target Collecting Wednesday, February 4, 2015 PDF icon 20150204-Intercept-Who Else Is Targeting Your Target Collecting
deletethiskthxbai Sunday, December 28, 2014 PDF icon 20141228-Spiegel-NSA - GCHQ Crypt Discovery Joint Collaboration Activity
20141228-Spiegel-NSA Cryptographic Modernization (CryptoMod) Classification Guide Sunday, December 28, 2014 PDF icon 20141228-Spiegel-NSA Cryptographic Modernization (CryptoMod) Classification Guide
20141228-Spiegel-NSA Experiment For Massive SSL-TLS Decryption Sunday, December 28, 2014 PDF icon 20141228-Spiegel-NSA Experiment For Massive SSL-TLS Decryption
20141228-Spiegel-NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN Sunday, December 28, 2014 PDF icon 20141228-Spiegel-NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN
20141228-Spiegel-NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service Sunday, December 28, 2014 PDF icon 20141228-Spiegel-NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service
20141228-Spiegel-NSA Presentation on the Analysis and Contextualisation of Data From VPN Sunday, December 28, 2014 PDF icon 20141228-Spiegel-NSA Presentation on the Analysis and Contextualisation of Data From VPN
20141228-Spiegel-NSA Presentation on the Development of Attacks on VPN Sunday, December 28, 2014 PDF icon 20141228-Spiegel-NSA Presentation on the Development of Attacks on VPN
20141228-Spiegel-Overview of the Capabilities of the VALIANTSURF Program Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Overview of the Capabilities of the VALIANTSURF Program
20141228-Spiegel-Overview on Internet Anonymization Services on How They Work Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Overview on Internet Anonymization Services on How They Work
20141228-Spiegel-POISENNUT Virtual Private Network Attack Orchestrator (VAO) Sunday, December 28, 2014 PDF icon 20141228-Spiegel-POISENNUT Virtual Private Network Attack Orchestrator (VAO)
20141228-Spiegel-Which Encryption Protocols and Techniques Can Be Attacked Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Which Encryption Protocols and Techniques Can Be Attacked
20141228-Spiegel-Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic
20141228-Spiegel-Processing of Data From Exploited VPN In the TURMOIL Program Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Processing of Data From Exploited VPN In the TURMOIL Program
20141228-Spiegel-SCARLETFEVER How Attacks on Encrypted Connections are Orchestrated Sunday, December 28, 2014 PDF icon 20141228-Spiegel-SCARLETFEVER How Attacks on Encrypted Connections are Orchestrated
20141228-Spiegel-SCARLETFEVER Program to Attack Secure Sockets Layer (SSL) - (TLS) Sunday, December 28, 2014 PDF icon 20141228-Spiegel-SCARLETFEVER Program to Attack Secure Sockets Layer (SSL) - (TLS)
20141228-Spiegel-TOR Deanonymisation Research Sunday, December 28, 2014 PDF icon 20141228-Spiegel-TOR Deanonymisation Research
20141228-Spiegel-TOR Overview of Existing Techniques Sunday, December 28, 2014 PDF icon 20141228-Spiegel-TOR Overview of Existing Techniques
20141228-Spiegel-What Your Mother Never Told You About the Development of Signal Intelligence Sunday, December 28, 2014 PDF icon 20141228-Spiegel-What Your Mother Never Told You About the Development of Signal Intelligence
20141228-Spiegel-NSA - GCHQ Crypt Discovery Joint Collaboration Activity Sunday, December 28, 2014 PDF icon 20141228-Spiegel-NSA - GCHQ Crypt Discovery Joint Collaboration Activity
20141228-Spiegel-What Your Mother Never Told You About the Development of Signal Intelligence Sunday, December 28, 2014 PDF icon 20141228-Spiegel-What Your Mother Never Told You About the Development of Signal Intelligence
CalECPA Bill Language Friday, February 6, 2015 PDF icon sb_178_leno_intro_2_9_15_2.pdf
Comments Re: NHTSA V2V ANPRM from Professor Dorothy J. Glancy and the Electronic Frontier Foundation Monday, October 20, 2014 PDF icon professor_dorothy_j_glancy_professor_of_law_at_santa_clara_university_school_of_law_and_the_electronic_frontier_foundation_comments.pdf
EFF Amicus Brief IBM S. African Apartheid Wednesday, February 4, 2015 Surveillance and Human Rights PDF icon eff_ibm_apartheid_amicus_brief_final.pdf
deletethis Saturday, January 17, 2015 PDF icon 20150117-Spiegel-4th Party Collection - Taking Advantage of Non-partner Exploitation
20150117-Spiegel-APEX Method of Combining Passive With Active Methods to Exfiltrate Data From Networks Attacked Saturday, January 17, 2015 PDF icon 20150117-Spiegel-APEX Method of Combining Passive With Active Methods to Exfiltrate Data From Networks Attacked
20150117-Spiegel-BYZANTINE HADES - NSA Research on Targets of Chinese Network Exploitation Tools Saturday, January 17, 2015 PDF icon 20150117-Spiegel-BYZANTINE HADES - NSA Research on Targets of Chinese Network Exploitation Tools
20150117-Spiegel-Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE
20150117-Spiegel-Explanation of APEX Shaping to Put Exfiltrating Network Traffic Into Patterns That Allow Plausible Deniability Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Explanation of APEX Shaping to Put Exfiltrating Network Traffic Into Patterns That Allow Plausible Deniability
20150117-Spiegel-Exploring and Exploiting Leaky Mobile Apps With BADASS Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Exploring and Exploiting Leaky Mobile Apps With BADASS
20150117-Spiegel-Fifth Party Access - When Fourth Party Puts Others Under Surveillance Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Fifth Party Access - When Fourth Party Puts Others Under Surveillance
20150117-Spiegel-HIDDENSALAMANDER -Recognition of Botnet Activity and Options For Takeover of Clients and Data Saturday, January 17, 2015 PDF icon 20150117-Spiegel-HIDDENSALAMANDER -Recognition of Botnet Activity and Options For Takeover of Clients and Data
20150117-Spiegel-Interview With NSA's Department For Tailored Access Operations Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Interview With NSA's Department For Tailored Access Operations
20150117-Spiegel-iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID) Saturday, January 17, 2015 PDF icon 20150117-Spiegel-iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID)
20150117-Spiegel-Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline
20150117-Spiegel-QUANTUMSHOOTER Implant to Remote-control Computers From Unknown Third Parties Saturday, January 17, 2015 PDF icon 20150117-Spiegel-QUANTUMSHOOTER Implant to Remote-control Computers From Unknown Third Parties
20150117-Spiegel-SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence Saturday, January 17, 2015 PDF icon 20150117-Spiegel-SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence
20150117-Spiegel-4th Party Collection - Taking Advantage of Non-partner Exploitation Saturday, January 17, 2015 PDF icon 20150117-Spiegel-4th Party Collection - Taking Advantage of Non-partner Exploitation
20150117-Spiegel-SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence Saturday, January 17, 2015 PDF icon 20150117-Spiegel-SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence
SSPS Minutes Dec 2, 2014 Monday, February 2, 2015 PDF icon ssps-meeting-minutes-12022014_0.pdf
Order Granting Parties' Stipulation on Service of Defendants in their Individual Capacities Monday, February 2, 2015 NSA Spying PDF icon first_uni_order_on_service_defs_ind_capacity.pdf
EFF, PK, CDT, OTI and R Street's Amicus Brief Friday, January 30, 2015 PDF icon google_v_hood_corrected_amici_brief_conformed.pdf
EFF Amicus - Los Angeles v. Patel Friday, January 30, 2015 PDF icon patel_eff_amicus_brief.pdf
EFF Amicus Brief Friday, January 30, 2015
Respondents' Brief Friday, January 23, 2015 PDF icon 13-1175_resp.authcheckdam.pdf
Hard Drive Productions Declaration of Seth Schoen Thursday, January 26, 2012 Copyright Trolls PDF icon seth_decl_hard_drive_dc.pdf
ALPR Records Appeal - EFF, ACLU v. LAPD, LASD Tuesday, January 27, 2015 Transparency PDF icon alpr_appeal_writ_reply_-final.pdf
delete25 Saturday, January 17, 2015 PDF icon 20150117-Spiegel-NSA Example SNOWGLOBE, In Which A Suspected French Government Trojan Is Analyzed to Find Out If It Can Be Helpf
20150117-Spiegel-NSA Fourth Party Access - I Drink Your Milkshake Saturday, January 17, 2015 PDF icon 20150117-Spiegel-NSA Fourth Party Access - I Drink Your Milkshake
20150117-Spiegel-NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools Saturday, January 17, 2015 PDF icon 20150117-Spiegel-NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools
20150117-Spiegel-Recognize and Process Data From Third Party Attacks Saturday, January 17, 2015 PDF icon 20150117-Spiegel-NSA Project Description to Recognize and Process Data That Comes From Third Party Attacks on Computers
20150117-Spiegel-NSA Training Course Material on Computer Network Operations Saturday, January 17, 2015 PDF icon 20150117-Spiegel-NSA Training Course Material on Computer Network Operations
20150117-Spiegel-QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL) Saturday, January 17, 2015 PDF icon 20150117-Spiegel-QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL)
20150117-Spiegel-NSA SNOWGLOBE, French Government Trojan Saturday, January 17, 2015 PDF icon 20150117-Spiegel-NSA Example SNOWGLOBE, In Which A Suspected French Government Trojan Is Analyzed to Find Out If It Can Be Helpf
20150117-Spiegel-QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL) Saturday, January 17, 2015 PDF icon 20150117-Spiegel-QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL)
20150128-Intercept-CSE Presentation on the LEVITATION Project Wednesday, January 28, 2015 PDF icon 20150128-intercept-cse_presentation_on_the_levitation_project.pdf
delete128 Wednesday, January 28, 2015 PDF icon 20141228-Spiegel-Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN
20141228-Spiegel-Explanation on the SPIN9 Program on End-to-end Attacks on VPN Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Explanation on the SPIN9 Program on End-to-end Attacks on VPN
20141228-Spiegel-GCHQ Briefing on the BULLRUN Program Sunday, December 28, 2014 PDF icon 20141228-Spiegel-GCHQ Briefing on the BULLRUN Program
20141228-Spiegel-GCHQ Presentation on the BULLRUN Programs Decryption Capabilities Sunday, December 28, 2014 PDF icon 20141228-Spiegel-GCHQ Presentation on the BULLRUN Programs Decryption Capabilities
20141228-Spiegel-General Description How NSA Handles Encrypted Traffic Sunday, December 28, 2014 PDF icon 20141228-Spiegel-General Description How NSA Handles Encrypted Traffic
20141228-Spiegel-Guide For Analysts on How to Use the PRISM Skype Collection Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Guide For Analysts on How to Use the PRISM Skype Collection
20141228-Spiegel-Intercept With OTR Encrypted Chat Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Intercept With OTR Encrypted Chat
20141228-Spiegel-Intercept With PGP Encrypted Message Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Intercept With PGP Encrypted Message
20141228-Spiegel-Intro to the VPN Exploitation Process Mentioning the Protocols Attacked - PPTP, IPSEC, SSL, SSH) Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Intro to the VPN Exploitation Process Mentioning the Protocols Attacked - PPTP, IPSEC, SSL, SSH)
20141228-Spiegel-MALIBU Architecture Overview to Exploit VPN Communication Sunday, December 28, 2014 PDF icon 20141228-Spiegel-MALIBU Architecture Overview to Exploit VPN Communication
20141228-Spiegel-Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN
20141228-Spiegel-MALIBU Architecture Overview to Exploit VPN Communication Sunday, December 28, 2014 PDF icon 20141228-Spiegel-MALIBU Architecture Overview to Exploit VPN Communication
Government's Admin Motion to Strike Plaintiffs' Revised Proposed Order Wednesday, January 28, 2015 NSA Spying PDF icon jewel_us_admin_motion_to_strike_revised_proposed_order.pdf
DELETE1 Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job
20150117-Spiegel-Report of An NSA Employee About A Backdoor In the OpenSSH Daemon Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Report of An NSA Employee About A Backdoor In the OpenSSH Daemon
20150117-Spiegel-Sample Code of A Malware Program From the Five Eyes Alliance Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Sample Code of A Malware Program From the Five Eyes Alliance
20150117-Spiegel-Supply-chain Interdiction - Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Supply-chain Interdiction - Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets
20150117-Spiegel-Technical Description of the FASHIONCLEFT Protocol Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Technical Description of the FASHIONCLEFT Protocol
20150117-Spiegel-Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job
20150117-Spiegel-Technical Description of the FASHIONCLEFT Protocol Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Technical Description of the FASHIONCLEFT Protocol
20150117-Spiegel-Overview of Methods For NSA Integrated Cyber Operations Saturday, January 17, 2015 PDF icon 20150117-spiegel-overview_of_methods_for_nsa_integrated_cyber_operations.pdf
20150117-Spiegel-The FASHIONCLEFT Protocol NSA Uses to Exfiltrate Data From Trojans and Implants to the NSA Saturday, January 17, 2015 PDF icon 20150117-spiegel-the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa.pdf
20150117-Spiegel-Overview of the TRANSGRESSION Program to Analyze and Exploit Foreign CNA-CNE Exploits Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Overview of the TRANSGRESSION Program to Analyze and Exploit Foreign CNA-CNE Exploits
20150117-Spiegel-Overview on the NSA Use of Bots and the DEFIANTWARRIOR Program Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Overview on the NSA Use of Bots and the DEFIANTWARRIOR Program
20150117-Spiegel-Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards
20150117-Spiegel-The FASHIONCLEFT Protocol NSA Uses to Exfiltrate Data From Trojans and Implants to the NSA Saturday, January 17, 2015 PDF icon 20150117-Spiegel-The FASHIONCLEFT Protocol NSA Uses to Exfiltrate Data From Trojans and Implants to the NSA
20141228-Spiegel- National Information Assurance Research Laboratory (NIARL) TUNDRA Sunday, December 28, 2014 PDF icon 20141228-Spiegel- National Information Assurance Research Laboratory (NIARL) TUNDRA
20141228-Spiegel-Description of VOIP Telephony Encryption Methods and Other Ways to Attack Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Description of VOIP Telephony Encryption Methods and Other Ways to Attack
20141228-Spiegel-Description on the Processing of VPN Data Packets Within the TURMOIL Program Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Description on the Processing of VPN Data Packets Within the TURMOIL Program
20141228-Spiegel-Explanation of A Potential Technique to Deanonymise Users of the TOR Network Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Explanation of A Potential Technique to Deanonymise Users of the TOR Network
20141228-Spiegel-Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL
20141228-Spiegel-Explanation of the POISENNUT Product and Its Role When Attacking VPN Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Explanation of the POISENNUT Product and Its Role When Attacking VPN
20141228-Spiegel-Explanation of the Transform Engine Emulator When Attacking VPN Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Explanation of the Transform Engine Emulator When Attacking VPN
Petitioner's Opening Brief Monday, December 15, 2014 PDF icon petitioners_opening_brief.pdf
Grant of Certiorari Monday, October 20, 2014 PDF icon patel_cert_grant.pdf
En Banc 9th Circuit Opinion Tuesday, December 24, 2013 PDF icon patel_9th_circuit_en_banc_opinion.pdf
Public Letter from Digital Rights Groups to Sen. Wyden to Oppose Fast Track Tuesday, January 27, 2015 Fair Use, International, Trans-Pacific Partnership Agreement PDF icon publicletter-wyden-tpa-eff-fnl.pdf
20141228-Speigel-Processing of Data From Exploited VPN In the TURMOIL Program Sunday, December 28, 2014 PDF icon 20141228-Speigel-Processing of Data From Exploited VPN In the TURMOIL Program
20141228-Speigel-TOR Deanonymisation Research Sunday, December 28, 2014 PDF icon 20141228-Speigel-TOR Deanonymisation Research
20141228-Speigel-TOR Overview of Existing Techniques Sunday, December 28, 2014 PDF icon 20141228-Speigel-TOR Overview of Existing Techniques
20141228-Speigel-What Your Mother Never Told You About the Development of Signal Intelligence Sunday, December 28, 2014 PDF icon 20141228-Speigel-What Your Mother Never Told You About the Development of Signal Intelligence
SSH) to end Sunday, December 28, 2014 PDF icon 20141228-Speigel-Intro to the VPN Exploitation Process Mentioning the Protocols Attacked - PPTP, IPSEC, SSL, SSH)
20141228-Speigel-MALIBU Architecture Overview to Exploit VPN Communication Sunday, December 28, 2014 PDF icon 20141228-Speigel-MALIBU Architecture Overview to Exploit VPN Communication
20141228-Speigel-NSA - GCHQ Crypt Discovery Joint Collaboration Activity Sunday, December 28, 2014 PDF icon 20141228-Speigel-NSA - GCHQ Crypt Discovery Joint Collaboration Activity
20141228-Speigel-NSA Cryptographic Modernization (CryptoMod) Classification Guide Sunday, December 28, 2014 PDF icon 20141228-Speigel-NSA Cryptographic Modernization (CryptoMod) Classification Guide
20141228-Speigel-NSA Experiment For Massive SSL-TLS Decryption Sunday, December 28, 2014 PDF icon 20141228-Speigel-NSA Experiment For Massive SSL-TLS Decryption
20141228-Speigel-NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN Sunday, December 28, 2014 PDF icon 20141228-Speigel-NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN
20141228-Speigel-NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service Sunday, December 28, 2014 PDF icon 20141228-Speigel-NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service
20141228-Speigel-NSA Presentation on the Analysis and Contextualisation of Data From VPN Sunday, December 28, 2014 PDF icon 20141228-Speigel-NSA Presentation on the Analysis and Contextualisation of Data From VPN
20141228-Speigel-NSA Presentation on the Development of Attacks on VPN Sunday, December 28, 2014 PDF icon 20141228-Speigel-NSA Presentation on the Development of Attacks on VPN
20141228-Speigel-NSA Program SCARLETFEVER Explaining How Attacks on Encrypted Connections are Orchestrated Sunday, December 28, 2014 PDF icon 20141228-Speigel-NSA Program SCARLETFEVER Explaining How Attacks on Encrypted Connections are Orchestrated
20141228-Speigel-Overview of the Capabilities of the VALIANTSURF Program Sunday, December 28, 2014 PDF icon 20141228-Speigel-Overview of the Capabilities of the VALIANTSURF Program
20141228-Speigel-Overview on Internet Anonymization Services on How They Work Sunday, December 28, 2014 PDF icon 20141228-Speigel-Overview on Internet Anonymization Services on How They Work
20141228-Speigel-POISENNUT Virtual Private Network Attack Orchestrator (VAO) Sunday, December 28, 2014 PDF icon 20141228-Speigel-POISENNUT Virtual Private Network Attack Orchestrator (VAO)
20141228-Speigel-Presentation From the SIGDEV Conference 2012 Explaining Which Encryption Protocols and Techniques Can Be Attack Sunday, December 28, 2014 PDF icon 20141228-Speigel-Presentation From the SIGDEV Conference 2012 Explaining Which Encryption Protocols and Techniques Can Be Attack
20141228-Speigel-Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic Sunday, December 28, 2014 PDF icon 20141228-Speigel-Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic
20141228-Speigel-Processing of Data From Exploited VPN In the TURMOIL Program Sunday, December 28, 2014 PDF icon 20141228-Speigel-Processing of Data From Exploited VPN In the TURMOIL Program
20141228-Speigel-TOR Deanonymisation Research Sunday, December 28, 2014 PDF icon 20141228-Speigel-TOR Deanonymisation Research
20141228-Speigel-TOR Overview of Existing Techniques Sunday, December 28, 2014 PDF icon 20141228-Speigel-TOR Overview of Existing Techniques
20141228-Speigel-What Your Mother Never Told You About the Development of Signal Intelligence Sunday, December 28, 2014 PDF icon 20141228-Speigel-What Your Mother Never Told You About the Development of Signal Intelligence
sp1-10 Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel- National Information Assurance Research Laboratory (NIARL) Newsletter, Keyword TUNDRA
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs
20141228-Speigel-Analytics on Security of TOR Hidden Services Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Analytics on Security of TOR Hidden Services
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications
20141228-Speigel-Canadian Document From CES on TLS Trends Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Canadian Document From CES on TLS Trends
20141228-Speigel-Classification Guide For Cryptanalysis Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Classification Guide For Cryptanalysis
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program
20141228-Speigel-Description of Existing Projects on VPN Decryption Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Description of Existing Projects on VPN Decryption
sp1-10 Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel- National Information Assurance Research Laboratory (NIARL) Newsletter, Keyword TUNDRA
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs
20141228-Speigel-Analytics on Security of TOR Hidden Services Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Analytics on Security of TOR Hidden Services
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications
20141228-Speigel-Canadian Document From CES on TLS Trends Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Canadian Document From CES on TLS Trends
20141228-Speigel-Classification Guide For Cryptanalysis Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Classification Guide For Cryptanalysis
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program
20141228-Speigel-Description of Existing Projects on VPN Decryption Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Description of Existing Projects on VPN Decryption
Sp14toencyptedmessage Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel- National Information Assurance Research Laboratory (NIARL) Newsletter, Keyword TUNDRA
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs
20141228-Speigel-Analytics on Security of TOR Hidden Services Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Analytics on Security of TOR Hidden Services
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications
20141228-Speigel-Canadian Document From CES on TLS Trends Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Canadian Document From CES on TLS Trends
20141228-Speigel-Classification Guide For Cryptanalysis Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Classification Guide For Cryptanalysis
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program
20141228-Speigel-Description of Existing Projects on VPN Decryption Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Description of Existing Projects on VPN Decryption
20141228-Speigel-Description of VOIP Telephony Encryption Methods and Cryptanalytic and Other Ways to Attack Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Description of VOIP Telephony Encryption Methods and Cryptanalytic and Other Ways to Attack
20141228-Speigel-Description on the Processing of VPN Data Packets Within the TURMOIL Program Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Description on the Processing of VPN Data Packets Within the TURMOIL Program
20141228-Speigel-Details on How NSA Uses the SCARLETFEVER Program to Attack Scure Sockets Layer (SSL)-Transport Layer Scurity (T Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Details on How NSA Uses the SCARLETFEVER Program to Attack Scure Sockets Layer (SSL)-Transport Layer Scurity (T
20141228-Speigel-Explanation of A Potential Technique to Deanonymise Users of the TOR Network Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Explanation of A Potential Technique to Deanonymise Users of the TOR Network
20141228-Speigel-Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL

Pages

Back to top

JavaScript license information