DocumentRelease Date: 2014-12-28
This undated NSA presentation describes how to perform attacks against VPNs: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (TS//SI//REL)VPN SigDev Basics S31244 - OTTERCREEK Derived From: NSA/CSSM 1-52 Dated: 20070108 ______Declassify On: 20341101 TOP S...
BLEAKINQUIRY, DISCOROUTE, MARINA, MASTERSHAKE, PINWALE, RENOIR, ROADBED, TOYGRIPPE, TREASUREMAP (TM), TUNINGFORK, XKEYSCORE (XKS)
USD-1031TE, USD-1Q31TE, USF-790, USF-790, USF-790, USD-10D1TE, USD-10J1TE, USD-10D1TE, USF-790, UKC-12SWUKC-125W, UKC-12SWUKC-12SWUKC-125W, UKC-125W, UKC-12SWUKC-12SWUS-967J, UKC-12SWUKC-12SW
DocumentDocument Date: 2009-01-01Release Date: 2014-08-31
This internal GCHQ document from early 2009 describes ongoing operations to surveil the Turkish energy industry and its corresponding government department: see the Intercept article How the NSA Helped Turkey Kill Kurdish Rebels, 31 August 2014.
TOP SECRET STRAP 1 COMINT MHS/GCHQ Projects - (TS//S1) Turkey Enerçy Company Development ■ Requirement - The Enet^gy Security Team within GCHQ's OPJ-TSJ require any indication of where the ...
DocumentRelease Date: 2015-07-01
This undated NSA document provides a decision tree for the analysis of email addresses, IP addresses, cookies and phone numbers in XKeyScore and other agency tools: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//20291123 DNI101 How Do I Begin Analyzing a Target's Email Address? TOP SECRET//COMINT//20291i23 [ =Tool/Database^ What Things Are Found Doing DNI Analysis and What...