DocumentDocument Date: 2012-06-06Release Date: 2014-12-28
This 40-page NSA presentation for the June 2012 SIGDEV conference includes a ranking of cryptographic protocols in order of ‘risk’ the they pose to the agency’s operations: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL FVEY//20340601 SIGDEV Conference 2012 (U) Making Things Measureable: Technology Trending Challenges and Approaches June 2012 TOP SECRET//COMINT//REL FVEY/...
DocumentDocument Date: 2012-01-01Release Date: 2014-05-13
These two slides, taken from a 2012 NSA presentation, describe the agency’s monitoring of in-air communications and the sharing of that information among the Five Eyes: see the book No Place To Hide, 13 May 2014.
Page 166 TOP SECRET//COMINT//REL TO USA, FVEY (U) ANALYTIC DRIVER (CONT.) □(S//SI//REL FVEY) Analytic Question Given a GSM handset detected on a known aircraft flight, what is the lik...