10/20/2013 |
NSA Cable dated November 10, 2010 discussing hacking of Mexican President's email |
9/5/2013 |
NSA Classification Guide for Cryptanalysis from September 13, 2005 |
3/13/2014 |
NSA Cooperative Third Party Relationships |
11/19/2013 |
NSA Core Intelligence Oversight Training |
11/19/2013 |
NSA Course Materials Intro v.13 |
11/19/2013 |
NSA Course Materials Module 1 v.17 |
11/19/2013 |
NSA Course Materials Module 2 v.16 |
11/19/2013 |
NSA Course Materials Module 3 v.22 |
11/19/2013 |
NSA Course Materials Module 4 v.28 |
11/19/2013 |
NSA Course Materials Module 5 v.24 |
11/19/2013 |
NSA Course Materials Module 6 Analytic Personal v.18 |
11/19/2013 |
NSA Course Materials Module 6 Tech Personnel v.25 |
10/4/2013 |
NSA Cryptanalysis and Exploitation Services Report on TOR 2006 |
12/28/2014 |
NSA Cryptographic Modernization (CryptoMod) Classification Guide |
11/19/2013 |
NSA Cryptological School Course Slides on Legal, Compliance, and Minimization Procedures |
12/10/2013 |
NSA CSEC Partnership |
9/1/2013 |
NSA document dated June 2010 (not released) discussing targeting of French Foreign Ministry |
8/31/2013 |
NSA document dated March 23, 2006 (not released) showing that Al Jazeera was surveilled |
12/28/2014 |
NSA Experiment For Massive SSL-TLS Decryption |
12/4/2014 |
NSA First Ever Collect of High Interest 4G Cellular Signal |
1/17/2015 |
NSA Fourth Party Access - I Drink Your Milkshake |
12/4/2014 |
NSA GCHQ CSEC Network Tradecraft Advancement |
11/19/2013 |
NSA Guidance Memo on Legal Standards for Searching Bulk Metadata |
12/28/2014 |
NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN |
8/3/2014 |
NSA Intelligence Relationship With Israel |
8/31/2014 |
NSA Intelligence Relationship with Turkey |
12/11/2013 |
NSA Internal PM on FRA |
12/28/2014 |
NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service |
11/23/2013 |
NSA Malware |
3/11/2014 |
NSA Memo Expands Access to FISA Information |
9/28/2013 |
NSA memo from January 3, 2011 on contact chaining |
10/24/2013 |
NSA memo to Signals Intelligence Division (SID) staff October 27, 2006 regarding monitoring of phones of world leaders |
11/19/2013 |
NSA Metadata Collection Training Slides |
9/16/2013 |
NSA Network Analysis Center 2010 SIGDEV Conference on credit card authorization network mapping |
10/4/2013 |
NSA Notes from talk on Tor by Roger Dingledine November 2007 |
6/27/2013 |
NSA OIG Working Draft Report from March 24, 2009 on Stellar Wind (PSP) |
3/12/2014 |
NSA Phishing Tactics and Man in the Middle Attacks |
6/18/2014 |
NSA presentation on Nymrod |
12/28/2014 |
NSA Presentation on the Analysis and Contextualisation of Data From VPN |
12/28/2014 |
NSA Presentation on the Development of Attacks on VPN |
10/21/2013 |
NSA PRISM slide undated - alcatel / wanadoo |
1/17/2015 |
NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools |
10/27/2013 |
NSA SCS Slides on embassy spying (slides 3-6) |
3/12/2014 |
NSA Selector Types |
9/5/2013 |
NSA SIGINT Enabling Project Description - engaging companies to covertly leverage product designs (no date) |
11/3/2013 |
NSA SIGINT January 2007 Strategic Mission List |
11/3/2013 |
NSA SIGINT Mission Strategic Plan 2008-2013 |
8/16/2013 |
NSA Signals Intelligence Division (SID) Oversight & Compliance Report May 31, 2012 discussing privacy violations for the preceding year |
9/8/2013 |
NSA slides on Petrobras and private networks |
9/9/2013 |
NSA slides on smartphones |