|
20141228-Spiegel-Which Encryption Protocols and Techniques Can Be Attacked |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Which Encryption Protocols and Techniques Can Be Attacked |
|
20141228-Spiegel-Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic |
|
20141228-Spiegel-Processing of Data From Exploited VPN In the TURMOIL Program |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Processing of Data From Exploited VPN In the TURMOIL Program |
|
20141228-Spiegel-SCARLETFEVER How Attacks on Encrypted Connections are Orchestrated |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-SCARLETFEVER How Attacks on Encrypted Connections are Orchestrated |
|
20141228-Spiegel-SCARLETFEVER Program to Attack Secure Sockets Layer (SSL) - (TLS) |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-SCARLETFEVER Program to Attack Secure Sockets Layer (SSL) - (TLS) |
|
CalECPA Bill Language |
Friday, February 6, 2015 |
|
|
|
sb_178_leno_intro_2_9_15_2.pdf |
|
Comments Re: NHTSA V2V ANPRM from Professor Dorothy J. Glancy and the Electronic Frontier Foundation |
Monday, October 20, 2014 |
|
|
|
professor_dorothy_j_glancy_professor_of_law_at_santa_clara_university_school_of_law_and_the_electronic_frontier_foundation_comments.pdf |
|
EFF Amicus Brief IBM S. African Apartheid |
Wednesday, February 4, 2015 |
|
|
Surveillance and Human Rights |
eff_ibm_apartheid_amicus_brief_final.pdf |
|
deletethis |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-4th Party Collection - Taking Advantage of Non-partner Exploitation |
|
20150117-Spiegel-APEX Method of Combining Passive With Active Methods to Exfiltrate Data From Networks Attacked |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-APEX Method of Combining Passive With Active Methods to Exfiltrate Data From Networks Attacked |
|
20150117-Spiegel-BYZANTINE HADES - NSA Research on Targets of Chinese Network Exploitation Tools |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-BYZANTINE HADES - NSA Research on Targets of Chinese Network Exploitation Tools |
|
20150117-Spiegel-Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE |
|
20150117-Spiegel-Explanation of APEX Shaping to Put Exfiltrating Network Traffic Into Patterns That Allow Plausible Deniability |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Explanation of APEX Shaping to Put Exfiltrating Network Traffic Into Patterns That Allow Plausible Deniability |
|
20150117-Spiegel-Exploring and Exploiting Leaky Mobile Apps With BADASS |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Exploring and Exploiting Leaky Mobile Apps With BADASS |
|
20150117-Spiegel-Fifth Party Access - When Fourth Party Puts Others Under Surveillance |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Fifth Party Access - When Fourth Party Puts Others Under Surveillance |
|
20150117-Spiegel-HIDDENSALAMANDER -Recognition of Botnet Activity and Options For Takeover of Clients and Data |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-HIDDENSALAMANDER -Recognition of Botnet Activity and Options For Takeover of Clients and Data |
|
20150117-Spiegel-Interview With NSA's Department For Tailored Access Operations |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Interview With NSA's Department For Tailored Access Operations |
|
20150117-Spiegel-iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID) |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID) |
|
20150117-Spiegel-Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline |
|
20150117-Spiegel-QUANTUMSHOOTER Implant to Remote-control Computers From Unknown Third Parties |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-QUANTUMSHOOTER Implant to Remote-control Computers From Unknown Third Parties |
|
20150117-Spiegel-SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence |
|
20150117-Spiegel-4th Party Collection - Taking Advantage of Non-partner Exploitation |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-4th Party Collection - Taking Advantage of Non-partner Exploitation |
|
20150117-Spiegel-SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence |
|
SSPS Minutes Dec 2, 2014 |
Monday, February 2, 2015 |
|
|
|
ssps-meeting-minutes-12022014_0.pdf |
|
Order Granting Parties' Stipulation on Service of Defendants in their Individual Capacities |
Monday, February 2, 2015 |
|
|
NSA Spying |
first_uni_order_on_service_defs_ind_capacity.pdf |
|
EFF, PK, CDT, OTI and R Street's Amicus Brief |
Friday, January 30, 2015 |
|
|
|
google_v_hood_corrected_amici_brief_conformed.pdf |
|
EFF Amicus - Los Angeles v. Patel |
Friday, January 30, 2015 |
|
|
|
patel_eff_amicus_brief.pdf |
|
EFF Amicus Brief |
Friday, January 30, 2015 |
|
|
|
|
|
Respondents' Brief |
Friday, January 23, 2015 |
|
|
|
13-1175_resp.authcheckdam.pdf |
|
Hard Drive Productions Declaration of Seth Schoen |
Thursday, January 26, 2012 |
|
|
Copyright Trolls |
seth_decl_hard_drive_dc.pdf |
|
ALPR Records Appeal - EFF, ACLU v. LAPD, LASD |
Tuesday, January 27, 2015 |
|
|
Transparency |
alpr_appeal_writ_reply_-final.pdf |
|
delete25 |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-NSA Example SNOWGLOBE, In Which A Suspected French Government Trojan Is Analyzed to Find Out If It Can Be Helpf |
|
20150117-Spiegel-NSA Fourth Party Access - I Drink Your Milkshake |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-NSA Fourth Party Access - I Drink Your Milkshake |
|
20150117-Spiegel-NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools |
|
20150117-Spiegel-Recognize and Process Data From Third Party Attacks |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-NSA Project Description to Recognize and Process Data That Comes From Third Party Attacks on Computers |
|
20150117-Spiegel-NSA Training Course Material on Computer Network Operations |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-NSA Training Course Material on Computer Network Operations |
|
20150117-Spiegel-QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL) |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL) |
|
20150117-Spiegel-NSA SNOWGLOBE, French Government Trojan |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-NSA Example SNOWGLOBE, In Which A Suspected French Government Trojan Is Analyzed to Find Out If It Can Be Helpf |
|
20150117-Spiegel-QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL) |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL) |
|
20150128-Intercept-CSE Presentation on the LEVITATION Project |
Wednesday, January 28, 2015 |
|
|
|
20150128-intercept-cse_presentation_on_the_levitation_project.pdf |
|
delete128 |
Wednesday, January 28, 2015 |
|
|
|
20141228-Spiegel-Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN |
|
20141228-Spiegel-Explanation on the SPIN9 Program on End-to-end Attacks on VPN |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Explanation on the SPIN9 Program on End-to-end Attacks on VPN |
|
20141228-Spiegel-GCHQ Briefing on the BULLRUN Program |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-GCHQ Briefing on the BULLRUN Program |
|
20141228-Spiegel-GCHQ Presentation on the BULLRUN Programs Decryption Capabilities |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-GCHQ Presentation on the BULLRUN Programs Decryption Capabilities |
|
20141228-Spiegel-General Description How NSA Handles Encrypted Traffic |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-General Description How NSA Handles Encrypted Traffic |
|
20141228-Spiegel-Guide For Analysts on How to Use the PRISM Skype Collection |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Guide For Analysts on How to Use the PRISM Skype Collection |
|
20141228-Spiegel-Intercept With OTR Encrypted Chat |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Intercept With OTR Encrypted Chat |
|
20141228-Spiegel-Intercept With PGP Encrypted Message |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Intercept With PGP Encrypted Message |
|
20141228-Spiegel-Intro to the VPN Exploitation Process Mentioning the Protocols Attacked - PPTP, IPSEC, SSL, SSH) |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Intro to the VPN Exploitation Process Mentioning the Protocols Attacked - PPTP, IPSEC, SSL, SSH) |
|
20141228-Spiegel-MALIBU Architecture Overview to Exploit VPN Communication |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-MALIBU Architecture Overview to Exploit VPN Communication |
|
20141228-Spiegel-Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN |
|
20141228-Spiegel-MALIBU Architecture Overview to Exploit VPN Communication |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-MALIBU Architecture Overview to Exploit VPN Communication |
|
Government's Admin Motion to Strike Plaintiffs' Revised Proposed Order |
Wednesday, January 28, 2015 |
|
|
NSA Spying |
jewel_us_admin_motion_to_strike_revised_proposed_order.pdf |
|
DELETE1 |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job |
|
20150117-Spiegel-Report of An NSA Employee About A Backdoor In the OpenSSH Daemon |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Report of An NSA Employee About A Backdoor In the OpenSSH Daemon |
|
20150117-Spiegel-Sample Code of A Malware Program From the Five Eyes Alliance |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Sample Code of A Malware Program From the Five Eyes Alliance |
|
20150117-Spiegel-Supply-chain Interdiction - Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Supply-chain Interdiction - Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets |
|
20150117-Spiegel-Technical Description of the FASHIONCLEFT Protocol |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Technical Description of the FASHIONCLEFT Protocol |
|
20150117-Spiegel-Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job |
|
20150117-Spiegel-Technical Description of the FASHIONCLEFT Protocol |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Technical Description of the FASHIONCLEFT Protocol |
|
20150117-Spiegel-Overview of Methods For NSA Integrated Cyber Operations |
Saturday, January 17, 2015 |
|
|
|
20150117-spiegel-overview_of_methods_for_nsa_integrated_cyber_operations.pdf |
|
20150117-Spiegel-The FASHIONCLEFT Protocol NSA Uses to Exfiltrate Data From Trojans and Implants to the NSA |
Saturday, January 17, 2015 |
|
|
|
20150117-spiegel-the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa.pdf |
|
20150117-Spiegel-Overview of the TRANSGRESSION Program to Analyze and Exploit Foreign CNA-CNE Exploits |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Overview of the TRANSGRESSION Program to Analyze and Exploit Foreign CNA-CNE Exploits |
|
20150117-Spiegel-Overview on the NSA Use of Bots and the DEFIANTWARRIOR Program |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Overview on the NSA Use of Bots and the DEFIANTWARRIOR Program |
|
20150117-Spiegel-Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards |
|
20150117-Spiegel-The FASHIONCLEFT Protocol NSA Uses to Exfiltrate Data From Trojans and Implants to the NSA |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-The FASHIONCLEFT Protocol NSA Uses to Exfiltrate Data From Trojans and Implants to the NSA |
|
20141228-Spiegel- National Information Assurance Research Laboratory (NIARL) TUNDRA |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel- National Information Assurance Research Laboratory (NIARL) TUNDRA |
|
20141228-Spiegel-Description of VOIP Telephony Encryption Methods and Other Ways to Attack |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Description of VOIP Telephony Encryption Methods and Other Ways to Attack |
|
20141228-Spiegel-Description on the Processing of VPN Data Packets Within the TURMOIL Program |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Description on the Processing of VPN Data Packets Within the TURMOIL Program |
|
20141228-Spiegel-Explanation of A Potential Technique to Deanonymise Users of the TOR Network |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Explanation of A Potential Technique to Deanonymise Users of the TOR Network |
|
20141228-Spiegel-Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL |
|
20141228-Spiegel-Explanation of the POISENNUT Product and Its Role When Attacking VPN |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Explanation of the POISENNUT Product and Its Role When Attacking VPN |
|
20141228-Spiegel-Explanation of the Transform Engine Emulator When Attacking VPN |
Sunday, December 28, 2014 |
|
|
|
20141228-Spiegel-Explanation of the Transform Engine Emulator When Attacking VPN |
|
Petitioner's Opening Brief |
Monday, December 15, 2014 |
|
|
|
petitioners_opening_brief.pdf |
|
Grant of Certiorari |
Monday, October 20, 2014 |
|
|
|
patel_cert_grant.pdf |
|
En Banc 9th Circuit Opinion |
Tuesday, December 24, 2013 |
|
|
|
patel_9th_circuit_en_banc_opinion.pdf |
|
Public Letter from Digital Rights Groups to Sen. Wyden to Oppose Fast Track |
Tuesday, January 27, 2015 |
|
|
Fair Use, International, Trans-Pacific Partnership Agreement |
publicletter-wyden-tpa-eff-fnl.pdf |
|
20141228-Speigel-Processing of Data From Exploited VPN In the TURMOIL Program |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-Processing of Data From Exploited VPN In the TURMOIL Program |
|
20141228-Speigel-TOR Deanonymisation Research |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-TOR Deanonymisation Research |
|
20141228-Speigel-TOR Overview of Existing Techniques |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-TOR Overview of Existing Techniques |
|
20141228-Speigel-What Your Mother Never Told You About the Development of Signal Intelligence |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-What Your Mother Never Told You About the Development of Signal Intelligence |
|
SSH) to end |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-Intro to the VPN Exploitation Process Mentioning the Protocols Attacked - PPTP, IPSEC, SSL, SSH) |
|
20141228-Speigel-MALIBU Architecture Overview to Exploit VPN Communication |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-MALIBU Architecture Overview to Exploit VPN Communication |
|
20141228-Speigel-NSA - GCHQ Crypt Discovery Joint Collaboration Activity |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-NSA - GCHQ Crypt Discovery Joint Collaboration Activity |
|
20141228-Speigel-NSA Cryptographic Modernization (CryptoMod) Classification Guide |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-NSA Cryptographic Modernization (CryptoMod) Classification Guide |
|
20141228-Speigel-NSA Experiment For Massive SSL-TLS Decryption |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-NSA Experiment For Massive SSL-TLS Decryption |
|
20141228-Speigel-NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN |
|
20141228-Speigel-NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service |
|
20141228-Speigel-NSA Presentation on the Analysis and Contextualisation of Data From VPN |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-NSA Presentation on the Analysis and Contextualisation of Data From VPN |
|
20141228-Speigel-NSA Presentation on the Development of Attacks on VPN |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-NSA Presentation on the Development of Attacks on VPN |
|
20141228-Speigel-NSA Program SCARLETFEVER Explaining How Attacks on Encrypted Connections are Orchestrated |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-NSA Program SCARLETFEVER Explaining How Attacks on Encrypted Connections are Orchestrated |
|
20141228-Speigel-Overview of the Capabilities of the VALIANTSURF Program |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-Overview of the Capabilities of the VALIANTSURF Program |
|
20141228-Speigel-Overview on Internet Anonymization Services on How They Work |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-Overview on Internet Anonymization Services on How They Work |
|
20141228-Speigel-POISENNUT Virtual Private Network Attack Orchestrator (VAO) |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-POISENNUT Virtual Private Network Attack Orchestrator (VAO) |
|
20141228-Speigel-Presentation From the SIGDEV Conference 2012 Explaining Which Encryption Protocols and Techniques Can Be Attack |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-Presentation From the SIGDEV Conference 2012 Explaining Which Encryption Protocols and Techniques Can Be Attack |
|
20141228-Speigel-Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic |
|
20141228-Speigel-Processing of Data From Exploited VPN In the TURMOIL Program |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-Processing of Data From Exploited VPN In the TURMOIL Program |
|
20141228-Speigel-TOR Deanonymisation Research |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-TOR Deanonymisation Research |
|
20141228-Speigel-TOR Overview of Existing Techniques |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-TOR Overview of Existing Techniques |
|
20141228-Speigel-What Your Mother Never Told You About the Development of Signal Intelligence |
Sunday, December 28, 2014 |
|
|
|
20141228-Speigel-What Your Mother Never Told You About the Development of Signal Intelligence |
|
sp1-10 |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel- National Information Assurance Research Laboratory (NIARL) Newsletter, Keyword TUNDRA |
|
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network |
|
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database |
|
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs |
|
20141228-Speigel-Analytics on Security of TOR Hidden Services |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Analytics on Security of TOR Hidden Services |
|
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications |
|
20141228-Speigel-Canadian Document From CES on TLS Trends |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Canadian Document From CES on TLS Trends |
|
20141228-Speigel-Classification Guide For Cryptanalysis |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Classification Guide For Cryptanalysis |
|
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program |
|
20141228-Speigel-Description of Existing Projects on VPN Decryption |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Description of Existing Projects on VPN Decryption |
|
sp1-10 |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel- National Information Assurance Research Laboratory (NIARL) Newsletter, Keyword TUNDRA |
|
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network |
|
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database |
|
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs |
|
20141228-Speigel-Analytics on Security of TOR Hidden Services |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Analytics on Security of TOR Hidden Services |
|
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications |
|
20141228-Speigel-Canadian Document From CES on TLS Trends |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Canadian Document From CES on TLS Trends |
|
20141228-Speigel-Classification Guide For Cryptanalysis |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Classification Guide For Cryptanalysis |
|
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program |
|
20141228-Speigel-Description of Existing Projects on VPN Decryption |
Sunday, December 28, 2014 |
sp1-10
|
|
|
20141228-Speigel-Description of Existing Projects on VPN Decryption |
|
Sp14toencyptedmessage |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel- National Information Assurance Research Laboratory (NIARL) Newsletter, Keyword TUNDRA |
|
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-A Potential Technique to Deanonymise Users of the TOR Network |
|
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database |
|
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs |
|
20141228-Speigel-Analytics on Security of TOR Hidden Services |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Analytics on Security of TOR Hidden Services |
|
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-BLUESNORT Program on Net Defense From Encrypted Communications |
|
20141228-Speigel-Canadian Document From CES on TLS Trends |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Canadian Document From CES on TLS Trends |
|
20141228-Speigel-Classification Guide For Cryptanalysis |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Classification Guide For Cryptanalysis |
|
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Decryption of VPN Connections Within the VALIANTSURF Program |
|
20141228-Speigel-Description of Existing Projects on VPN Decryption |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Description of Existing Projects on VPN Decryption |
|
20141228-Speigel-Description of VOIP Telephony Encryption Methods and Cryptanalytic and Other Ways to Attack |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Description of VOIP Telephony Encryption Methods and Cryptanalytic and Other Ways to Attack |
|
20141228-Speigel-Description on the Processing of VPN Data Packets Within the TURMOIL Program |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Description on the Processing of VPN Data Packets Within the TURMOIL Program |
|
20141228-Speigel-Details on How NSA Uses the SCARLETFEVER Program to Attack Scure Sockets Layer (SSL)-Transport Layer Scurity (T |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Details on How NSA Uses the SCARLETFEVER Program to Attack Scure Sockets Layer (SSL)-Transport Layer Scurity (T |
|
20141228-Speigel-Explanation of A Potential Technique to Deanonymise Users of the TOR Network |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Explanation of A Potential Technique to Deanonymise Users of the TOR Network |
|
20141228-Speigel-Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL |
|
20141228-Speigel-Explanation of the POISENNUT Product and Its Role When Attacking VPN |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Explanation of the POISENNUT Product and Its Role When Attacking VPN |
|
20141228-Speigel-Explanation of the Transform Engine Emulator When Attacking VPN |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Explanation of the Transform Engine Emulator When Attacking VPN |
|
20141228-Speigel-Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN |
|
20141228-Speigel-Explanation on the SPIN9 Program on End-to-end Attacks on VPN |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Explanation on the SPIN9 Program on End-to-end Attacks on VPN |
|
20141228-Speigel-GCHQ Briefing on the BULLRUN Program |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-GCHQ Briefing on the BULLRUN Program |
|
20141228-Speigel-GCHQ Presentation on the BULLRUN Programs Decryption Capabilities |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-GCHQ Presentation on the BULLRUN Programs Decryption Capabilities |
|
20141228-Speigel-General Description How NSA Handles Encrypted Traffic |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-General Description How NSA Handles Encrypted Traffic |
|
20141228-Speigel-Guide For Analysts on How to Use the PRISM Skype Collection |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Guide For Analysts on How to Use the PRISM Skype Collection |
|
20141228-Speigel-Intercept With OTR Encrypted Chat |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Intercept With OTR Encrypted Chat |
|
20141228-Speigel-Intercept With PGP Encrypted Message |
Sunday, December 28, 2014 |
half of 2014 sp docs
|
|
|
20141228-Speigel-Intercept With PGP Encrypted Message |
|
Plaintiffs' Amended Proposed Order Granting Motion for Summary Judgment |
Friday, January 23, 2015 |
|
|
NSA Spying |
jewel_pltfs_revised_prop_order_mpsj.pdf |
|
20150117-Speigel |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-4th Party Collection - Taking Advantage of Non-partner Computer Network Exploitation Activity |
|
20150117-Speigel-Analysis of Chinese Methods and Performed Actions In the Context of Computer Network Exploitation |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Analysis of Chinese Methods and Performed Actions In the Context of Computer Network Exploitation |
|
20150117-Speigel-Classification Guide For Computer Network Exploitation (CNE) |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Classification Guide For Computer Network Exploitation (CNE) |
|
20150117-Speigel-Codename BYZANTINE HADES - NSA Research on the Targets of Chinese Network Exploitation Tools, the Targets and A |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Codename BYZANTINE HADES - NSA Research on the Targets of Chinese Network Exploitation Tools, the Targets and A |
|
20150117-Speigel-Combination of Offensive and Defensive Missions - How Fourth-party Missions are Being Performed |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Combination of Offensive and Defensive Missions - How Fourth-party Missions are Being Performed |
|
20150117-Speigel-CSEC Document About the Recognition of Trojans and Other network Based Anomaly |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-CSEC Document About the Recognition of Trojans and Other network Based Anomaly |
|
20150117-Speigel-CSEC Document on the Handling of Existing Trojans When Trojanizing Computers |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-CSEC Document on the Handling of Existing Trojans When Trojanizing Computers |
|
20150117-Speigel-Description of An NSA Employee on Fifth Party Access - When the Targeted Fourth Party Has Someone Under Surveil |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Description of An NSA Employee on Fifth Party Access - When the Targeted Fourth Party Has Someone Under Surveil |
|
20150117-Speigel-Document About the Expansion of the Remote Operations Center (ROC) on Endpoint Operations |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Document About the Expansion of the Remote Operations Center (ROC) on Endpoint Operations |
|
20150117-Speigel-Document Detailing SPINALTAP, An NSA Project to Combine Data From Active Operations and Passive Signals Intelli |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Document Detailing SPINALTAP, An NSA Project to Combine Data From Active Operations and Passive Signals Intelli |
|
20150117-Speigel-Document Explaining the Role of the Remote Operations Center (ROC) |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Document Explaining the Role of the Remote Operations Center (ROC) |
|
20150117-Speigel-Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE |
|
20150117-Spiegel-APEX Shaping to Put Exfiltrating Network Traffic Into Plausible Deniability |
Saturday, January 17, 2015 |
|
|
|
20150117-Spiegel-APEX Shaping to Put Exfiltrating Network Traffic Into Plausible Deniability |
|
20150117-Speigel-Explanation of the APEX Method of Combining Passive With Active Methods to Exfiltrate Data From Networks Attack |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Explanation of the APEX Method of Combining Passive With Active Methods to Exfiltrate Data From Networks Attack |
|
20150117-Speigel-Exploring and Exploiting Leaky Mobile Apps With BADASS |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Exploring and Exploiting Leaky Mobile Apps With BADASS |
|
20150117-Speigel-HIDDENSALAMANDER - Program For the Recognition of Botnet Activity and Options For Takeover of Clients and Data |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-HIDDENSALAMANDER - Program For the Recognition of Botnet Activity and Options For Takeover of Clients and Data |
|
20150117-Speigel-Interview With An Employee of NSA's Department For Tailored Access Operations About His Field of Work |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Interview With An Employee of NSA's Department For Tailored Access Operations About His Field of Work |
|
20150117-Speigel-iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID) |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID) |
|
20150117-Speigel-Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline |
|
20150117-Speigel-NSA Document on QUANTUMSHOOTER, An Implant to Remote-control Computers With Good Network Connections From Unkno |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-NSA Document on QUANTUMSHOOTER, An Implant to Remote-control Computers With Good Network Connections From Unkno |
|
20150117-Speigel-NSA Example SNOWGLOBE, In Which A Suspected French Government Trojan Is Analyzed to Find Out If It Can Be Helpf |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-NSA Example SNOWGLOBE, In Which A Suspected French Government Trojan Is Analyzed to Find Out If It Can Be Helpf |
|
20150117-Speigel-NSA Fourth Party Access - I Drink Your Milkshake |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-NSA Fourth Party Access - I Drink Your Milkshake |
|
20150117-Speigel-NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools |
|
20150117-Speigel-NSA Project Description to Recognize and Process Data That Comes From Third Party Attacks on Computers |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-NSA Project Description to Recognize and Process Data That Comes From Third Party Attacks on Computers |
|
20150117-Speigel-NSA Training Course Material on Computer Network Operations |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-NSA Training Course Material on Computer Network Operations |
|
20150117-Speigel-Overview of Methods For NSA Integrated Cyber Operations |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Overview of Methods For NSA Integrated Cyber Operations |
|
20150117-Speigel-Overview of Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Overview of Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards |
|
20150117-Speigel-Overview of the TRANSGRESSION Program to Analyze and Exploit Foreign CNA-CNE Exploits |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Overview of the TRANSGRESSION Program to Analyze and Exploit Foreign CNA-CNE Exploits |
|
20150117-Speigel-Overview on the NSA Use of Bots and the DEFIANTWARRIOR Program |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Overview on the NSA Use of Bots and the DEFIANTWARRIOR Program |
|
20150117-Speigel-Presentation on the FASHIONCLEFT Protocol That the NSA Uses to Exfiltrate Data From Trojans and Implants to the |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Presentation on the FASHIONCLEFT Protocol That the NSA Uses to Exfiltrate Data From Trojans and Implants to the |
|
20150117-Speigel-QUANTUMTHEORY Is A Set of Technologies Allowing Man-on-the-side Interference Attacks on TCP-IP Connections (inc |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-QUANTUMTHEORY Is A Set of Technologies Allowing Man-on-the-side Interference Attacks on TCP-IP Connections (inc |
|
20150117-Speigel-Report of An NSA Employee About A Backdoor In the OpenSSH Daemon |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Report of An NSA Employee About A Backdoor In the OpenSSH Daemon |
|
20150117-Speigel-Sample Code of A Malware Program From the Five Eyes Alliance |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Sample Code of A Malware Program From the Five Eyes Alliance |
|
20150117-Speigel-Supply-chain Interdiction - Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Supply-chain Interdiction - Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets |
|
20150117-Speigel-Technical Description of the FASHIONCLEFT Protocol the NSA Uses to Exfiltrate Data From Trojans and Implants to |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-Technical Description of the FASHIONCLEFT Protocol the NSA Uses to Exfiltrate Data From Trojans and Implants to |
|
20150117-Speigel-The Formalized Process Through Which Analysts Choose Their Data Requirement and Then Get to Know the Tools That |
Saturday, January 17, 2015 |
|
|
|
20150117-Speigel-The Formalized Process Through Which Analysts Choose Their Data Requirement and Then Get to Know the Tools That |
|
20141214-Intercept-Senate Intelligence Committee Study of Detention and Interrogation Program |
Sunday, December 14, 2014 |
|
|
|
|
|
20141214-Intercept-GCHQ Stargate CNE Requirements |
Sunday, December 14, 2014 |
|
|
|
20141214-intercept-gchq_stargate_cne_requirements.pdf |
|
20141214-Intercept-GCHQ NAC Review October December 2011 |
Sunday, December 14, 2014 |
|
|
|
20141214-intercept-gchq_nac_review_october_december_2011.pdf |
|
20141214-Intercept-GCHQ NAC Review July Sept 2011 |
Sunday, December 14, 2014 |
|
|
|
20141214-intercept-gchq_nac_review_july_sept_2011.pdf |
|
20141214-Intercept-GCHQ NAC Review January March 2012 |
Sunday, December 14, 2014 |
|
|
|
20141214-intercept-gchq_nac_review_january_march_2012.pdf |
|
20141214-Intercept-GCHQ NAC Review April June 2011 |
Sunday, December 14, 2014 |
|
|
|
20141214-intercept-gchq_nac_review_april_june_2011.pdf |
|
20141214-Intercept-GCHQ Mobile Networks In My NOC World |
Sunday, December 14, 2014 |
|
|
|
|
|
20141214-Intercept-GCHQ Making Network Sense of the Encryption |
Sunday, December 14, 2014 |
|
|
|
20141214-intercept-gchq_making_network_sense_of_the_encryption.pdf |
|
20141214-Intercept-GCHQ Hopscotch |
Sunday, December 14, 2014 |
|
|
|
20141214-intercept-gchq_hopscotch.pdf |
|
Appellant's Citation of Supplemental Authorities re DEA Declaration |
Friday, January 23, 2015 |
|
|
NSA Spying |
smith_appellants_28j_letter.pdf |
|
ECPA Letter to House 2015 114th Congress |
Thursday, January 22, 2015 |
|
|
|
ecpa_support_letter_house_judiciary-jan2015-114.pdf |
|
ECPA Letter to Senate 2015 114th Congress |
Thursday, January 22, 2015 |
|
|
Privacy |
ecpa_support_letter_senate_judiciary-jan2015-114.pdf |
|
EFF Alerts |
Wednesday, January 7, 2015 |
Read more about EFF Alerts
SHA-256 fingerprint of the certificate used to sign the APK: 0D:25:96:CB:2F:CC:35:5A:22:23:2D:24:29:A1:22:AC:C4:65:68:1B:B0:80:6D:87:DB:93:77:E5:28:74:43:9A
Download and install the APK:
|
|
|
|
|
EFF and CDT Comments to FEC |
Thursday, January 15, 2015 |
|
|
|
eff_and_cdt_comments_re_internet_regulations_jan._15_2015.pdf |
|
Ninth Circuit Scheduling Order |
Tuesday, January 13, 2015 |
|
|
|
vargas_sched_order.pdf |
|
Government's Notice of Appeal |
Monday, January 12, 2015 |
|
|
|
vargas_notice_of_appeal.pdf |
|
Ireland's Second Circuit Amicus Brief in Support of Microsoft |
Tuesday, December 23, 2014 |
|
|
|
ireland_microsoft_second_circuit_amicus_brief.pdf |
|
20141214-Intercept-GCHQ Automated NOC Detection |
Sunday, December 14, 2014 |
|
|
|
20141214-intercept-gchq_automated_noc_detection.pdf |