Skip to main content

Documents

Documents

Title Date Description Document Category Related Issues Filename
20141228-Spiegel-Which Encryption Protocols and Techniques Can Be Attacked Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Which Encryption Protocols and Techniques Can Be Attacked
20141228-Spiegel-Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic
20141228-Spiegel-Processing of Data From Exploited VPN In the TURMOIL Program Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Processing of Data From Exploited VPN In the TURMOIL Program
20141228-Spiegel-SCARLETFEVER How Attacks on Encrypted Connections are Orchestrated Sunday, December 28, 2014 PDF icon 20141228-Spiegel-SCARLETFEVER How Attacks on Encrypted Connections are Orchestrated
20141228-Spiegel-SCARLETFEVER Program to Attack Secure Sockets Layer (SSL) - (TLS) Sunday, December 28, 2014 PDF icon 20141228-Spiegel-SCARLETFEVER Program to Attack Secure Sockets Layer (SSL) - (TLS)
CalECPA Bill Language Friday, February 6, 2015 PDF icon sb_178_leno_intro_2_9_15_2.pdf
Comments Re: NHTSA V2V ANPRM from Professor Dorothy J. Glancy and the Electronic Frontier Foundation Monday, October 20, 2014 PDF icon professor_dorothy_j_glancy_professor_of_law_at_santa_clara_university_school_of_law_and_the_electronic_frontier_foundation_comments.pdf
EFF Amicus Brief IBM S. African Apartheid Wednesday, February 4, 2015 Surveillance and Human Rights PDF icon eff_ibm_apartheid_amicus_brief_final.pdf
deletethis Saturday, January 17, 2015 PDF icon 20150117-Spiegel-4th Party Collection - Taking Advantage of Non-partner Exploitation
20150117-Spiegel-APEX Method of Combining Passive With Active Methods to Exfiltrate Data From Networks Attacked Saturday, January 17, 2015 PDF icon 20150117-Spiegel-APEX Method of Combining Passive With Active Methods to Exfiltrate Data From Networks Attacked
20150117-Spiegel-BYZANTINE HADES - NSA Research on Targets of Chinese Network Exploitation Tools Saturday, January 17, 2015 PDF icon 20150117-Spiegel-BYZANTINE HADES - NSA Research on Targets of Chinese Network Exploitation Tools
20150117-Spiegel-Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE
20150117-Spiegel-Explanation of APEX Shaping to Put Exfiltrating Network Traffic Into Patterns That Allow Plausible Deniability Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Explanation of APEX Shaping to Put Exfiltrating Network Traffic Into Patterns That Allow Plausible Deniability
20150117-Spiegel-Exploring and Exploiting Leaky Mobile Apps With BADASS Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Exploring and Exploiting Leaky Mobile Apps With BADASS
20150117-Spiegel-Fifth Party Access - When Fourth Party Puts Others Under Surveillance Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Fifth Party Access - When Fourth Party Puts Others Under Surveillance
20150117-Spiegel-HIDDENSALAMANDER -Recognition of Botnet Activity and Options For Takeover of Clients and Data Saturday, January 17, 2015 PDF icon 20150117-Spiegel-HIDDENSALAMANDER -Recognition of Botnet Activity and Options For Takeover of Clients and Data
20150117-Spiegel-Interview With NSA's Department For Tailored Access Operations Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Interview With NSA's Department For Tailored Access Operations
20150117-Spiegel-iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID) Saturday, January 17, 2015 PDF icon 20150117-Spiegel-iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID)
20150117-Spiegel-Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline
20150117-Spiegel-QUANTUMSHOOTER Implant to Remote-control Computers From Unknown Third Parties Saturday, January 17, 2015 PDF icon 20150117-Spiegel-QUANTUMSHOOTER Implant to Remote-control Computers From Unknown Third Parties
20150117-Spiegel-SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence Saturday, January 17, 2015 PDF icon 20150117-Spiegel-SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence
20150117-Spiegel-4th Party Collection - Taking Advantage of Non-partner Exploitation Saturday, January 17, 2015 PDF icon 20150117-Spiegel-4th Party Collection - Taking Advantage of Non-partner Exploitation
20150117-Spiegel-SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence Saturday, January 17, 2015 PDF icon 20150117-Spiegel-SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence
SSPS Minutes Dec 2, 2014 Monday, February 2, 2015 PDF icon ssps-meeting-minutes-12022014_0.pdf
Order Granting Parties' Stipulation on Service of Defendants in their Individual Capacities Monday, February 2, 2015 NSA Spying PDF icon first_uni_order_on_service_defs_ind_capacity.pdf
EFF, PK, CDT, OTI and R Street's Amicus Brief Friday, January 30, 2015 PDF icon google_v_hood_corrected_amici_brief_conformed.pdf
EFF Amicus - Los Angeles v. Patel Friday, January 30, 2015 PDF icon patel_eff_amicus_brief.pdf
EFF Amicus Brief Friday, January 30, 2015
Respondents' Brief Friday, January 23, 2015 PDF icon 13-1175_resp.authcheckdam.pdf
Hard Drive Productions Declaration of Seth Schoen Thursday, January 26, 2012 Copyright Trolls PDF icon seth_decl_hard_drive_dc.pdf
ALPR Records Appeal - EFF, ACLU v. LAPD, LASD Tuesday, January 27, 2015 Transparency PDF icon alpr_appeal_writ_reply_-final.pdf
delete25 Saturday, January 17, 2015 PDF icon 20150117-Spiegel-NSA Example SNOWGLOBE, In Which A Suspected French Government Trojan Is Analyzed to Find Out If It Can Be Helpf
20150117-Spiegel-NSA Fourth Party Access - I Drink Your Milkshake Saturday, January 17, 2015 PDF icon 20150117-Spiegel-NSA Fourth Party Access - I Drink Your Milkshake
20150117-Spiegel-NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools Saturday, January 17, 2015 PDF icon 20150117-Spiegel-NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools
20150117-Spiegel-Recognize and Process Data From Third Party Attacks Saturday, January 17, 2015 PDF icon 20150117-Spiegel-NSA Project Description to Recognize and Process Data That Comes From Third Party Attacks on Computers
20150117-Spiegel-NSA Training Course Material on Computer Network Operations Saturday, January 17, 2015 PDF icon 20150117-Spiegel-NSA Training Course Material on Computer Network Operations
20150117-Spiegel-QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL) Saturday, January 17, 2015 PDF icon 20150117-Spiegel-QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL)
20150117-Spiegel-NSA SNOWGLOBE, French Government Trojan Saturday, January 17, 2015 PDF icon 20150117-Spiegel-NSA Example SNOWGLOBE, In Which A Suspected French Government Trojan Is Analyzed to Find Out If It Can Be Helpf
20150117-Spiegel-QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL) Saturday, January 17, 2015 PDF icon 20150117-Spiegel-QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL)
20150128-Intercept-CSE Presentation on the LEVITATION Project Wednesday, January 28, 2015 PDF icon 20150128-intercept-cse_presentation_on_the_levitation_project.pdf
delete128 Wednesday, January 28, 2015 PDF icon 20141228-Spiegel-Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN
20141228-Spiegel-Explanation on the SPIN9 Program on End-to-end Attacks on VPN Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Explanation on the SPIN9 Program on End-to-end Attacks on VPN
20141228-Spiegel-GCHQ Briefing on the BULLRUN Program Sunday, December 28, 2014 PDF icon 20141228-Spiegel-GCHQ Briefing on the BULLRUN Program
20141228-Spiegel-GCHQ Presentation on the BULLRUN Programs Decryption Capabilities Sunday, December 28, 2014 PDF icon 20141228-Spiegel-GCHQ Presentation on the BULLRUN Programs Decryption Capabilities
20141228-Spiegel-General Description How NSA Handles Encrypted Traffic Sunday, December 28, 2014 PDF icon 20141228-Spiegel-General Description How NSA Handles Encrypted Traffic
20141228-Spiegel-Guide For Analysts on How to Use the PRISM Skype Collection Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Guide For Analysts on How to Use the PRISM Skype Collection
20141228-Spiegel-Intercept With OTR Encrypted Chat Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Intercept With OTR Encrypted Chat
20141228-Spiegel-Intercept With PGP Encrypted Message Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Intercept With PGP Encrypted Message
20141228-Spiegel-Intro to the VPN Exploitation Process Mentioning the Protocols Attacked - PPTP, IPSEC, SSL, SSH) Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Intro to the VPN Exploitation Process Mentioning the Protocols Attacked - PPTP, IPSEC, SSL, SSH)
20141228-Spiegel-MALIBU Architecture Overview to Exploit VPN Communication Sunday, December 28, 2014 PDF icon 20141228-Spiegel-MALIBU Architecture Overview to Exploit VPN Communication
20141228-Spiegel-Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN
20141228-Spiegel-MALIBU Architecture Overview to Exploit VPN Communication Sunday, December 28, 2014 PDF icon 20141228-Spiegel-MALIBU Architecture Overview to Exploit VPN Communication
Government's Admin Motion to Strike Plaintiffs' Revised Proposed Order Wednesday, January 28, 2015 NSA Spying PDF icon jewel_us_admin_motion_to_strike_revised_proposed_order.pdf
DELETE1 Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job
20150117-Spiegel-Report of An NSA Employee About A Backdoor In the OpenSSH Daemon Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Report of An NSA Employee About A Backdoor In the OpenSSH Daemon
20150117-Spiegel-Sample Code of A Malware Program From the Five Eyes Alliance Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Sample Code of A Malware Program From the Five Eyes Alliance
20150117-Spiegel-Supply-chain Interdiction - Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Supply-chain Interdiction - Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets
20150117-Spiegel-Technical Description of the FASHIONCLEFT Protocol Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Technical Description of the FASHIONCLEFT Protocol
20150117-Spiegel-Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job
20150117-Spiegel-Technical Description of the FASHIONCLEFT Protocol Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Technical Description of the FASHIONCLEFT Protocol
20150117-Spiegel-Overview of Methods For NSA Integrated Cyber Operations Saturday, January 17, 2015 PDF icon 20150117-spiegel-overview_of_methods_for_nsa_integrated_cyber_operations.pdf
20150117-Spiegel-The FASHIONCLEFT Protocol NSA Uses to Exfiltrate Data From Trojans and Implants to the NSA Saturday, January 17, 2015 PDF icon 20150117-spiegel-the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa.pdf
20150117-Spiegel-Overview of the TRANSGRESSION Program to Analyze and Exploit Foreign CNA-CNE Exploits Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Overview of the TRANSGRESSION Program to Analyze and Exploit Foreign CNA-CNE Exploits
20150117-Spiegel-Overview on the NSA Use of Bots and the DEFIANTWARRIOR Program Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Overview on the NSA Use of Bots and the DEFIANTWARRIOR Program
20150117-Spiegel-Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards Saturday, January 17, 2015 PDF icon 20150117-Spiegel-Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards
20150117-Spiegel-The FASHIONCLEFT Protocol NSA Uses to Exfiltrate Data From Trojans and Implants to the NSA Saturday, January 17, 2015 PDF icon 20150117-Spiegel-The FASHIONCLEFT Protocol NSA Uses to Exfiltrate Data From Trojans and Implants to the NSA
20141228-Spiegel- National Information Assurance Research Laboratory (NIARL) TUNDRA Sunday, December 28, 2014 PDF icon 20141228-Spiegel- National Information Assurance Research Laboratory (NIARL) TUNDRA
20141228-Spiegel-Description of VOIP Telephony Encryption Methods and Other Ways to Attack Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Description of VOIP Telephony Encryption Methods and Other Ways to Attack
20141228-Spiegel-Description on the Processing of VPN Data Packets Within the TURMOIL Program Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Description on the Processing of VPN Data Packets Within the TURMOIL Program
20141228-Spiegel-Explanation of A Potential Technique to Deanonymise Users of the TOR Network Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Explanation of A Potential Technique to Deanonymise Users of the TOR Network
20141228-Spiegel-Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL
20141228-Spiegel-Explanation of the POISENNUT Product and Its Role When Attacking VPN Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Explanation of the POISENNUT Product and Its Role When Attacking VPN
20141228-Spiegel-Explanation of the Transform Engine Emulator When Attacking VPN Sunday, December 28, 2014 PDF icon 20141228-Spiegel-Explanation of the Transform Engine Emulator When Attacking VPN
Petitioner's Opening Brief Monday, December 15, 2014 PDF icon petitioners_opening_brief.pdf
Grant of Certiorari Monday, October 20, 2014 PDF icon patel_cert_grant.pdf
En Banc 9th Circuit Opinion Tuesday, December 24, 2013 PDF icon patel_9th_circuit_en_banc_opinion.pdf
Public Letter from Digital Rights Groups to Sen. Wyden to Oppose Fast Track Tuesday, January 27, 2015 Fair Use, International, Trans-Pacific Partnership Agreement PDF icon publicletter-wyden-tpa-eff-fnl.pdf
20141228-Speigel-Processing of Data From Exploited VPN In the TURMOIL Program Sunday, December 28, 2014 PDF icon 20141228-Speigel-Processing of Data From Exploited VPN In the TURMOIL Program
20141228-Speigel-TOR Deanonymisation Research Sunday, December 28, 2014 PDF icon 20141228-Speigel-TOR Deanonymisation Research
20141228-Speigel-TOR Overview of Existing Techniques Sunday, December 28, 2014 PDF icon 20141228-Speigel-TOR Overview of Existing Techniques
20141228-Speigel-What Your Mother Never Told You About the Development of Signal Intelligence Sunday, December 28, 2014 PDF icon 20141228-Speigel-What Your Mother Never Told You About the Development of Signal Intelligence
SSH) to end Sunday, December 28, 2014 PDF icon 20141228-Speigel-Intro to the VPN Exploitation Process Mentioning the Protocols Attacked - PPTP, IPSEC, SSL, SSH)
20141228-Speigel-MALIBU Architecture Overview to Exploit VPN Communication Sunday, December 28, 2014 PDF icon 20141228-Speigel-MALIBU Architecture Overview to Exploit VPN Communication
20141228-Speigel-NSA - GCHQ Crypt Discovery Joint Collaboration Activity Sunday, December 28, 2014 PDF icon 20141228-Speigel-NSA - GCHQ Crypt Discovery Joint Collaboration Activity
20141228-Speigel-NSA Cryptographic Modernization (CryptoMod) Classification Guide Sunday, December 28, 2014 PDF icon 20141228-Speigel-NSA Cryptographic Modernization (CryptoMod) Classification Guide
20141228-Speigel-NSA Experiment For Massive SSL-TLS Decryption Sunday, December 28, 2014 PDF icon 20141228-Speigel-NSA Experiment For Massive SSL-TLS Decryption
20141228-Speigel-NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN Sunday, December 28, 2014 PDF icon 20141228-Speigel-NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN
20141228-Speigel-NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service Sunday, December 28, 2014 PDF icon 20141228-Speigel-NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service
20141228-Speigel-NSA Presentation on the Analysis and Contextualisation of Data From VPN Sunday, December 28, 2014 PDF icon 20141228-Speigel-NSA Presentation on the Analysis and Contextualisation of Data From VPN
20141228-Speigel-NSA Presentation on the Development of Attacks on VPN Sunday, December 28, 2014 PDF icon 20141228-Speigel-NSA Presentation on the Development of Attacks on VPN
20141228-Speigel-NSA Program SCARLETFEVER Explaining How Attacks on Encrypted Connections are Orchestrated Sunday, December 28, 2014 PDF icon 20141228-Speigel-NSA Program SCARLETFEVER Explaining How Attacks on Encrypted Connections are Orchestrated
20141228-Speigel-Overview of the Capabilities of the VALIANTSURF Program Sunday, December 28, 2014 PDF icon 20141228-Speigel-Overview of the Capabilities of the VALIANTSURF Program
20141228-Speigel-Overview on Internet Anonymization Services on How They Work Sunday, December 28, 2014 PDF icon 20141228-Speigel-Overview on Internet Anonymization Services on How They Work
20141228-Speigel-POISENNUT Virtual Private Network Attack Orchestrator (VAO) Sunday, December 28, 2014 PDF icon 20141228-Speigel-POISENNUT Virtual Private Network Attack Orchestrator (VAO)
20141228-Speigel-Presentation From the SIGDEV Conference 2012 Explaining Which Encryption Protocols and Techniques Can Be Attack Sunday, December 28, 2014 PDF icon 20141228-Speigel-Presentation From the SIGDEV Conference 2012 Explaining Which Encryption Protocols and Techniques Can Be Attack
20141228-Speigel-Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic Sunday, December 28, 2014 PDF icon 20141228-Speigel-Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic
20141228-Speigel-Processing of Data From Exploited VPN In the TURMOIL Program Sunday, December 28, 2014 PDF icon 20141228-Speigel-Processing of Data From Exploited VPN In the TURMOIL Program
20141228-Speigel-TOR Deanonymisation Research Sunday, December 28, 2014 PDF icon 20141228-Speigel-TOR Deanonymisation Research
20141228-Speigel-TOR Overview of Existing Techniques Sunday, December 28, 2014 PDF icon 20141228-Speigel-TOR Overview of Existing Techniques
20141228-Speigel-What Your Mother Never Told You About the Development of Signal Intelligence Sunday, December 28, 2014 PDF icon 20141228-Speigel-What Your Mother Never Told You About the Development of Signal Intelligence
sp1-10 Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel- National Information Assurance Research Laboratory (NIARL) Newsletter, Keyword TUNDRA
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs
20141228-Speigel-Analytics on Security of TOR Hidden Services Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Analytics on Security of TOR Hidden Services
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications
20141228-Speigel-Canadian Document From CES on TLS Trends Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Canadian Document From CES on TLS Trends
20141228-Speigel-Classification Guide For Cryptanalysis Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Classification Guide For Cryptanalysis
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program
20141228-Speigel-Description of Existing Projects on VPN Decryption Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Description of Existing Projects on VPN Decryption
sp1-10 Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel- National Information Assurance Research Laboratory (NIARL) Newsletter, Keyword TUNDRA
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs
20141228-Speigel-Analytics on Security of TOR Hidden Services Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Analytics on Security of TOR Hidden Services
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications
20141228-Speigel-Canadian Document From CES on TLS Trends Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Canadian Document From CES on TLS Trends
20141228-Speigel-Classification Guide For Cryptanalysis Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Classification Guide For Cryptanalysis
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program
20141228-Speigel-Description of Existing Projects on VPN Decryption Sunday, December 28, 2014

sp1-10

PDF icon 20141228-Speigel-Description of Existing Projects on VPN Decryption
Sp14toencyptedmessage Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel- National Information Assurance Research Laboratory (NIARL) Newsletter, Keyword TUNDRA
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs
20141228-Speigel-Analytics on Security of TOR Hidden Services Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Analytics on Security of TOR Hidden Services
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications
20141228-Speigel-Canadian Document From CES on TLS Trends Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Canadian Document From CES on TLS Trends
20141228-Speigel-Classification Guide For Cryptanalysis Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Classification Guide For Cryptanalysis
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program
20141228-Speigel-Description of Existing Projects on VPN Decryption Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Description of Existing Projects on VPN Decryption
20141228-Speigel-Description of VOIP Telephony Encryption Methods and Cryptanalytic and Other Ways to Attack Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Description of VOIP Telephony Encryption Methods and Cryptanalytic and Other Ways to Attack
20141228-Speigel-Description on the Processing of VPN Data Packets Within the TURMOIL Program Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Description on the Processing of VPN Data Packets Within the TURMOIL Program
20141228-Speigel-Details on How NSA Uses the SCARLETFEVER Program to Attack Scure Sockets Layer (SSL)-Transport Layer Scurity (T Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Details on How NSA Uses the SCARLETFEVER Program to Attack Scure Sockets Layer (SSL)-Transport Layer Scurity (T
20141228-Speigel-Explanation of A Potential Technique to Deanonymise Users of the TOR Network Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Explanation of A Potential Technique to Deanonymise Users of the TOR Network
20141228-Speigel-Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL
20141228-Speigel-Explanation of the POISENNUT Product and Its Role When Attacking VPN Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Explanation of the POISENNUT Product and Its Role When Attacking VPN
20141228-Speigel-Explanation of the Transform Engine Emulator When Attacking VPN Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Explanation of the Transform Engine Emulator When Attacking VPN
20141228-Speigel-Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN
20141228-Speigel-Explanation on the SPIN9 Program on End-to-end Attacks on VPN Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Explanation on the SPIN9 Program on End-to-end Attacks on VPN
20141228-Speigel-GCHQ Briefing on the BULLRUN Program Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-GCHQ Briefing on the BULLRUN Program
20141228-Speigel-GCHQ Presentation on the BULLRUN Programs Decryption Capabilities Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-GCHQ Presentation on the BULLRUN Programs Decryption Capabilities
20141228-Speigel-General Description How NSA Handles Encrypted Traffic Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-General Description How NSA Handles Encrypted Traffic
20141228-Speigel-Guide For Analysts on How to Use the PRISM Skype Collection Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Guide For Analysts on How to Use the PRISM Skype Collection
20141228-Speigel-Intercept With OTR Encrypted Chat Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Intercept With OTR Encrypted Chat
20141228-Speigel-Intercept With PGP Encrypted Message Sunday, December 28, 2014

half of 2014 sp docs

PDF icon 20141228-Speigel-Intercept With PGP Encrypted Message
Plaintiffs' Amended Proposed Order Granting Motion for Summary Judgment Friday, January 23, 2015 NSA Spying PDF icon jewel_pltfs_revised_prop_order_mpsj.pdf
20150117-Speigel Saturday, January 17, 2015 PDF icon 20150117-Speigel-4th Party Collection - Taking Advantage of Non-partner Computer Network Exploitation Activity
20150117-Speigel-Analysis of Chinese Methods and Performed Actions In the Context of Computer Network Exploitation Saturday, January 17, 2015 PDF icon 20150117-Speigel-Analysis of Chinese Methods and Performed Actions In the Context of Computer Network Exploitation
20150117-Speigel-Classification Guide For Computer Network Exploitation (CNE) Saturday, January 17, 2015 PDF icon 20150117-Speigel-Classification Guide For Computer Network Exploitation (CNE)
20150117-Speigel-Codename BYZANTINE HADES - NSA Research on the Targets of Chinese Network Exploitation Tools, the Targets and A Saturday, January 17, 2015 PDF icon 20150117-Speigel-Codename BYZANTINE HADES - NSA Research on the Targets of Chinese Network Exploitation Tools, the Targets and A
20150117-Speigel-Combination of Offensive and Defensive Missions - How Fourth-party Missions are Being Performed Saturday, January 17, 2015 PDF icon 20150117-Speigel-Combination of Offensive and Defensive Missions - How Fourth-party Missions are Being Performed
20150117-Speigel-CSEC Document About the Recognition of Trojans and Other network Based Anomaly Saturday, January 17, 2015 PDF icon 20150117-Speigel-CSEC Document About the Recognition of Trojans and Other network Based Anomaly
20150117-Speigel-CSEC Document on the Handling of Existing Trojans When Trojanizing Computers Saturday, January 17, 2015 PDF icon 20150117-Speigel-CSEC Document on the Handling of Existing Trojans When Trojanizing Computers
20150117-Speigel-Description of An NSA Employee on Fifth Party Access - When the Targeted Fourth Party Has Someone Under Surveil Saturday, January 17, 2015 PDF icon 20150117-Speigel-Description of An NSA Employee on Fifth Party Access - When the Targeted Fourth Party Has Someone Under Surveil
20150117-Speigel-Document About the Expansion of the Remote Operations Center (ROC) on Endpoint Operations Saturday, January 17, 2015 PDF icon 20150117-Speigel-Document About the Expansion of the Remote Operations Center (ROC) on Endpoint Operations
20150117-Speigel-Document Detailing SPINALTAP, An NSA Project to Combine Data From Active Operations and Passive Signals Intelli Saturday, January 17, 2015 PDF icon 20150117-Speigel-Document Detailing SPINALTAP, An NSA Project to Combine Data From Active Operations and Passive Signals Intelli
20150117-Speigel-Document Explaining the Role of the Remote Operations Center (ROC) Saturday, January 17, 2015 PDF icon 20150117-Speigel-Document Explaining the Role of the Remote Operations Center (ROC)
20150117-Speigel-Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE Saturday, January 17, 2015 PDF icon 20150117-Speigel-Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE
20150117-Spiegel-APEX Shaping to Put Exfiltrating Network Traffic Into Plausible Deniability Saturday, January 17, 2015 PDF icon 20150117-Spiegel-APEX Shaping to Put Exfiltrating Network Traffic Into Plausible Deniability
20150117-Speigel-Explanation of the APEX Method of Combining Passive With Active Methods to Exfiltrate Data From Networks Attack Saturday, January 17, 2015 PDF icon 20150117-Speigel-Explanation of the APEX Method of Combining Passive With Active Methods to Exfiltrate Data From Networks Attack
20150117-Speigel-Exploring and Exploiting Leaky Mobile Apps With BADASS Saturday, January 17, 2015 PDF icon 20150117-Speigel-Exploring and Exploiting Leaky Mobile Apps With BADASS
20150117-Speigel-HIDDENSALAMANDER - Program For the Recognition of Botnet Activity and Options For Takeover of Clients and Data Saturday, January 17, 2015 PDF icon 20150117-Speigel-HIDDENSALAMANDER - Program For the Recognition of Botnet Activity and Options For Takeover of Clients and Data
20150117-Speigel-Interview With An Employee of NSA's Department For Tailored Access Operations About His Field of Work Saturday, January 17, 2015 PDF icon 20150117-Speigel-Interview With An Employee of NSA's Department For Tailored Access Operations About His Field of Work
20150117-Speigel-iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID) Saturday, January 17, 2015 PDF icon 20150117-Speigel-iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID)
20150117-Speigel-Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline Saturday, January 17, 2015 PDF icon 20150117-Speigel-Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline
20150117-Speigel-NSA Document on QUANTUMSHOOTER, An Implant to Remote-control Computers With Good Network Connections From Unkno Saturday, January 17, 2015 PDF icon 20150117-Speigel-NSA Document on QUANTUMSHOOTER, An Implant to Remote-control Computers With Good Network Connections From Unkno
20150117-Speigel-NSA Example SNOWGLOBE, In Which A Suspected French Government Trojan Is Analyzed to Find Out If It Can Be Helpf Saturday, January 17, 2015 PDF icon 20150117-Speigel-NSA Example SNOWGLOBE, In Which A Suspected French Government Trojan Is Analyzed to Find Out If It Can Be Helpf
20150117-Speigel-NSA Fourth Party Access - I Drink Your Milkshake Saturday, January 17, 2015 PDF icon 20150117-Speigel-NSA Fourth Party Access - I Drink Your Milkshake
20150117-Speigel-NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools Saturday, January 17, 2015 PDF icon 20150117-Speigel-NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools
20150117-Speigel-NSA Project Description to Recognize and Process Data That Comes From Third Party Attacks on Computers Saturday, January 17, 2015 PDF icon 20150117-Speigel-NSA Project Description to Recognize and Process Data That Comes From Third Party Attacks on Computers
20150117-Speigel-NSA Training Course Material on Computer Network Operations Saturday, January 17, 2015 PDF icon 20150117-Speigel-NSA Training Course Material on Computer Network Operations
20150117-Speigel-Overview of Methods For NSA Integrated Cyber Operations Saturday, January 17, 2015 PDF icon 20150117-Speigel-Overview of Methods For NSA Integrated Cyber Operations
20150117-Speigel-Overview of Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards Saturday, January 17, 2015 PDF icon 20150117-Speigel-Overview of Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards
20150117-Speigel-Overview of the TRANSGRESSION Program to Analyze and Exploit Foreign CNA-CNE Exploits Saturday, January 17, 2015 PDF icon 20150117-Speigel-Overview of the TRANSGRESSION Program to Analyze and Exploit Foreign CNA-CNE Exploits
20150117-Speigel-Overview on the NSA Use of Bots and the DEFIANTWARRIOR Program Saturday, January 17, 2015 PDF icon 20150117-Speigel-Overview on the NSA Use of Bots and the DEFIANTWARRIOR Program
20150117-Speigel-Presentation on the FASHIONCLEFT Protocol That the NSA Uses to Exfiltrate Data From Trojans and Implants to the Saturday, January 17, 2015 PDF icon 20150117-Speigel-Presentation on the FASHIONCLEFT Protocol That the NSA Uses to Exfiltrate Data From Trojans and Implants to the
20150117-Speigel-QUANTUMTHEORY Is A Set of Technologies Allowing Man-on-the-side Interference Attacks on TCP-IP Connections (inc Saturday, January 17, 2015 PDF icon 20150117-Speigel-QUANTUMTHEORY Is A Set of Technologies Allowing Man-on-the-side Interference Attacks on TCP-IP Connections (inc
20150117-Speigel-Report of An NSA Employee About A Backdoor In the OpenSSH Daemon Saturday, January 17, 2015 PDF icon 20150117-Speigel-Report of An NSA Employee About A Backdoor In the OpenSSH Daemon
20150117-Speigel-Sample Code of A Malware Program From the Five Eyes Alliance Saturday, January 17, 2015 PDF icon 20150117-Speigel-Sample Code of A Malware Program From the Five Eyes Alliance
20150117-Speigel-Supply-chain Interdiction - Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets Saturday, January 17, 2015 PDF icon 20150117-Speigel-Supply-chain Interdiction - Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets
20150117-Speigel-Technical Description of the FASHIONCLEFT Protocol the NSA Uses to Exfiltrate Data From Trojans and Implants to Saturday, January 17, 2015 PDF icon 20150117-Speigel-Technical Description of the FASHIONCLEFT Protocol the NSA Uses to Exfiltrate Data From Trojans and Implants to
20150117-Speigel-The Formalized Process Through Which Analysts Choose Their Data Requirement and Then Get to Know the Tools That Saturday, January 17, 2015 PDF icon 20150117-Speigel-The Formalized Process Through Which Analysts Choose Their Data Requirement and Then Get to Know the Tools That
20141214-Intercept-Senate Intelligence Committee Study of Detention and Interrogation Program Sunday, December 14, 2014
20141214-Intercept-GCHQ Stargate CNE Requirements Sunday, December 14, 2014 PDF icon 20141214-intercept-gchq_stargate_cne_requirements.pdf
20141214-Intercept-GCHQ NAC Review October December 2011 Sunday, December 14, 2014 PDF icon 20141214-intercept-gchq_nac_review_october_december_2011.pdf
20141214-Intercept-GCHQ NAC Review July Sept 2011 Sunday, December 14, 2014 PDF icon 20141214-intercept-gchq_nac_review_july_sept_2011.pdf
20141214-Intercept-GCHQ NAC Review January March 2012 Sunday, December 14, 2014 PDF icon 20141214-intercept-gchq_nac_review_january_march_2012.pdf
20141214-Intercept-GCHQ NAC Review April June 2011 Sunday, December 14, 2014 PDF icon 20141214-intercept-gchq_nac_review_april_june_2011.pdf
20141214-Intercept-GCHQ Mobile Networks In My NOC World Sunday, December 14, 2014
20141214-Intercept-GCHQ Making Network Sense of the Encryption Sunday, December 14, 2014 PDF icon 20141214-intercept-gchq_making_network_sense_of_the_encryption.pdf
20141214-Intercept-GCHQ Hopscotch Sunday, December 14, 2014 PDF icon 20141214-intercept-gchq_hopscotch.pdf
Appellant's Citation of Supplemental Authorities re DEA Declaration Friday, January 23, 2015 NSA Spying PDF icon smith_appellants_28j_letter.pdf
ECPA Letter to House 2015 114th Congress Thursday, January 22, 2015 PDF icon ecpa_support_letter_house_judiciary-jan2015-114.pdf
ECPA Letter to Senate 2015 114th Congress Thursday, January 22, 2015 Privacy PDF icon ecpa_support_letter_senate_judiciary-jan2015-114.pdf
EFF Alerts Wednesday, January 7, 2015

Read more about EFF Alerts

SHA-256 fingerprint of the certificate used to sign the APK: 0D:25:96:CB:2F:CC:35:5A:22:23:2D:24:29:A1:22:AC:C4:65:68:1B:B0:80:6D:87:DB:93:77:E5:28:74:43:9A

Download and install the APK:

EFF and CDT Comments to FEC Thursday, January 15, 2015 PDF icon eff_and_cdt_comments_re_internet_regulations_jan._15_2015.pdf
Ninth Circuit Scheduling Order Tuesday, January 13, 2015 PDF icon vargas_sched_order.pdf
Government's Notice of Appeal Monday, January 12, 2015 PDF icon vargas_notice_of_appeal.pdf
Ireland's Second Circuit Amicus Brief in Support of Microsoft Tuesday, December 23, 2014 PDF icon ireland_microsoft_second_circuit_amicus_brief.pdf
20141214-Intercept-GCHQ Automated NOC Detection Sunday, December 14, 2014 PDF icon 20141214-intercept-gchq_automated_noc_detection.pdf

Pages

Back to top

JavaScript license information