Skip to main content

NSA Primary Sources

Date Document Media Outlet
2/4/2015 Who Else Is Targeting Your Target Collecting Intercept
2/4/2015 NATO Civilian Intelligence Council Cyber Panel Intercept
1/17/2015 APEX Shaping to Put Exfiltrating Network Traffic Into Plausible Deniability Der Spiegel
1/17/2015 Fifth Party Access - When Fourth Party Puts Others Under Surveillance Der Spiegel
1/17/2015 Interview With NSA's Department For Tailored Access Operations Der Spiegel
12/28/2014 Which Encryption Protocols and Techniques Can Be Attacked Der Spiegel
12/28/2014 NSA - GCHQ Crypt Discovery Joint Collaboration Activity Der Spiegel
12/28/2014 NSA Cryptographic Modernization (CryptoMod) Classification Guide Der Spiegel
12/28/2014 NSA Experiment For Massive SSL-TLS Decryption Der Spiegel
12/28/2014 NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN Der Spiegel
12/28/2014 NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service Der Spiegel
12/28/2014 NSA Presentation on the Analysis and Contextualisation of Data From VPN Der Spiegel
12/28/2014 NSA Presentation on the Development of Attacks on VPN Der Spiegel
12/28/2014 Overview of the Capabilities of the VALIANTSURF Program Der Spiegel
12/28/2014 Overview on Internet Anonymization Services on How They Work Der Spiegel
12/28/2014 POISENNUT Virtual Private Network Attack Orchestrator (VAO) Der Spiegel
12/28/2014 Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic Der Spiegel
12/28/2014 Processing of Data From Exploited VPN In the TURMOIL Program Der Spiegel
12/28/2014 SCARLETFEVER How Attacks on Encrypted Connections are Orchestrated Der Spiegel
12/28/2014 SCARLETFEVER Program to Attack Secure Sockets Layer (SSL) - (TLS) Der Spiegel
12/28/2014 TOR Deanonymisation Research Der Spiegel
12/28/2014 TOR Overview of Existing Techniques Der Spiegel
12/28/2014 What Your Mother Never Told You About the Development of Signal Intelligence Der Spiegel
1/17/2015 4th Party Collection - Taking Advantage of Non-partner Exploitation Der Spiegel
1/17/2015 APEX Method of Combining Passive With Active Methods to Exfiltrate Data From Networks Attacked Der Spiegel
1/17/2015 BYZANTINE HADES - NSA Research on Targets of Chinese Network Exploitation Tools Der Spiegel
1/17/2015 Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE Der Spiegel
1/17/2015 Exploring and Exploiting Leaky Mobile Apps With BADASS Der Spiegel
1/17/2015 HIDDENSALAMANDER -Recognition of Botnet Activity and Options For Takeover of Clients and Data Der Spiegel
1/17/2015 iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID) Der Spiegel
1/17/2015 Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline Der Spiegel
1/17/2015 QUANTUMSHOOTER Implant to Remote-control Computers From Unknown Third Parties Der Spiegel
1/17/2015 SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence Der Spiegel
1/17/2015 NSA Fourth Party Access - I Drink Your Milkshake Der Spiegel
1/17/2015 NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools Der Spiegel
1/17/2015 Recognize and Process Data From Third Party Attacks Der Spiegel
1/17/2015 NSA SNOWGLOBE, French Government Trojan Der Spiegel
1/17/2015 NSA Training Course Material on Computer Network Operations Der Spiegel
1/17/2015 QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL) Der Spiegel
1/28/2015 CSE Presentation on the LEVITATION Project CBC
12/28/2014 MALIBU Architecture Overview to Exploit VPN Communication Der Spiegel
12/28/2014 Intro to the VPN Exploitation Process Mentioning the Protocols Attacked - PPTP, IPSEC, SSL, SSH) Der Spiegel
12/28/2014 Intercept With PGP Encrypted Message Der Spiegel
12/28/2014 Intercept With OTR Encrypted Chat Der Spiegel
12/28/2014 Guide For Analysts on How to Use the PRISM Skype Collection Der Spiegel
12/28/2014 General Description How NSA Handles Encrypted Traffic Der Spiegel
12/28/2014 GCHQ Presentation on the BULLRUN Programs Decryption Capabilities Der Spiegel
12/28/2014 GCHQ Briefing on the BULLRUN Program Der Spiegel
12/28/2014 Explanation on the SPIN9 Program on End-to-end Attacks on VPN Der Spiegel
12/28/2014 Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN Der Spiegel

Pages

JavaScript license information