NSA Files

NSA Ideology:

Sigint Strategy NSA Ideology Sigint Strategy

In the Matter of Foreign Governments & Foreign-Based Political Organizations NSA Ideology In the Matter of Foreign Governments & Foreign-Based Political Organizations

Computer Networking Operations NSA Ideology Computer Networking Operations

Non-Targetable 2nd Party Countries, Territories & Individuals NSA Ideology Non-Targetable 2nd Party Countries, Territories & Individuals

Ideology Miscellaneous NSA Ideology Miscellaneous

 

NSA Partnerships & Alliances:

a) Technology Corporations NSA Partnerships & Alliances - Technology Corporations

b) Germany NSA Partnerships & Alliances - Germany

c) Sweden NSA Partnerships & Alliances - Sweden

d) Canada NSA Partnerships & Alliances - Canada

e) Saudi Arabia NSA Partnerships & Alliances - Saudi Arabia

f) Israel NSA Partnerships & Alliances - Israel

g) Turkey NSA Partnerships & Alliances - Turkey

h) New Zealand NSA Partnerships & Alliances - New Zealand

i) US Departments NSA Partnerships & Alliances - US Departments

j) SIGINT Partners NSA Partnerships & Alliances - SIGINT Partners

 

Tor Network:

Tor Stinks NSA Tor Stinks

Peeling Back the Layers of Tor with Egotistical Giraffe  NSA Peeling Back the Layers of Tor with Egotistical Giraffe

2006 CES Summer Program  NSA Tor 2006 CES Summer Program

 

NSA Virtual Private Network Exploitation:

Intro to the VPN Exploitation Process NSA Intro to the VPN Exploitation Process

VPN Sigdev Basics NSA VPN Sigdev Basics

Turmoil VPN Processing NSA Turmoil VPN Processing

Fielded Capability: End-to-End VPN SPIN 9 Design Review NSA Fielded Capability: End-to-End VPN SPIN 9 Design Review

 

NSA Classification Guide NSA Classification Guide1 NSA Classification Guide2

National Counter-Terrorism Center National Counter-Terrorism Center1

US Fleet Cyber Command US Fleet Cyber Command

2013 National Intelligence Program Budget 2013 National Intelligence Program Budget1

Center for Content Extraction NSA Center for Content Extraction1

Mexico and Brazil Surveillance NSA Mexico and Brazil Surveillance1 NSA Mexico and Brazil Surveillance2

Quantum Computing NSA Quantum Computing1 NSA Quantum Computing2

Social Media Surveillance NSA Tracking Targets on Online Social Networks

 

NSA Surveillance Programs:

X-KEYSCORE:

Introduction NSA X-Keyscore Introduction

Analyzing Mobile/Cellular DNI in X-Keyscore NSA Analyzing Mobile/cellular DNI in X-Keyscore

Email Address vs. User Activity NSA X-Keyscore Email Address vs. User Activity

http Activity in X-Keyscore NSA http Activity in X-keyscore

http Activity vs. User Activity NSA X-Keyscore http Activity vs. User Activity

Introduction to Context Sensitive Scanning with X-Keyscore NSA Introduction to Context Sensitive Scanning with X-Keyscore

Introduction to X-Keyscore Application IDs and Fingerprints NSA Introduction to X-Keyscore Application IDs and Fingerprints

Using X-Keyscore to Enable TAO NSA Using X-Keyscore to Enable TAO

VOIP in X-Keyscore NSA VOIP in X-Keyscore

Web Forum Exploitation Using X-Keyscore NSA Web Forum Exploitation Using X-Keyscore

X-Keyscore as a Sigdev Tool NSA X-Keyscore as a Sigdev Tool

 

PRISM:

Prism Overview NSA Prism Overview

User's Guide for Prism Skype Collection NSA User's Guide for Prism Skype Collection

Prism Miscellaneous NSA Prism Miscellaneous

 

SPECIAL SOURCE OPERATIONS:

Special Source Operations NSA Special Source Operations

Content Acquisition Optimization NSA SSO Content Acquisition Optimization

SSO Corporate Portfolio Overview NSA SSO Corporate Portfolio Overview

SSO Miscellaneous NSA SSO Miscellaneous

 

AURORA GOLD:

Aurora Gold Introduction NSA Aurora Gold Introduction

Target Technology Trends Center/T3C support to WPMO NSA Aurora Gold Target Technology Trends Center/T3C support to WPMO

Working Aid NSA Aurora Gold Working Aid

IR.21 – A Technology Warning Mechanism NSA Auroragold IR.21 – A Technology Warning Mechanism

 

BULLRUN:

Bullrun Overview NSA Bullrun Overview

Penetrate Target's Defenses NSA Bullrun Pentrate Target's Defenses

Briefing Sheet NSA Bullrun Briefing Sheet

 

BLARNEY NSA blarney1

BOUNDLESS INFORMANT NSA boundless informant1

CLOSE ACCESS SIGADS NSA close access sigads1

IDENTITY INTELLIGENCE UNIT NSA identity intelligence unit1

MYSTIC NSA mystic1

RAMPART-A NSA rampart-A1

SPECIAL COLLECTION SERVICE NSA special collection service1 NSA special collection service2

TAILORED ACCESS OPERATIONS NSA tailored access operations1 NSA tailored access operations2

TURMOIL and TURBINE NSA turmoil and turbine1 NSA turmoil and turbine2

ICREACH NSA ICREACH1 NSA ICREACH2

TUTELAGE/BOXINGRUMBLE NSA Tutelage and Boxingrumble

CAMBERDADA NSA Project Camberdada

 

*Note: Some slides have been attached together for convenience.