Skip to main content
About
Contact
Press
People
Opportunities
Issues
Free Speech
Privacy
Creativity and Innovation
Transparency
International
Security
Our Work
Deeplinks Blog
Press Releases
Events
Legal Cases
Whitepapers
Podcast
Annual Reports
Take Action
Action Center
Electronic Frontier Alliance
Volunteer
Tools
Privacy Badger
Surveillance Self-Defense
Certbot
Atlas of Surveillance
Cover Your Tracks
Street Level Surveillance
apkeep
Donate
Donate to EFF
Giving Societies
Shop
Org. Membership
Other Ways to Give
Membership FAQ
Donate
Donate to EFF
Shop
Other Ways to Give
Search form
Search
Email updates on news, actions,
and events in your area.
Join EFF Lists
Electronic Frontier Foundation
Donate
Electronic Frontier Foundation
About
Contact
Press
People
Opportunities
Issues
Free Speech
Privacy
Creativity and Innovation
Transparency
International
Security
Our Work
Deeplinks Blog
Press Releases
Events
Legal Cases
Whitepapers
Podcast
Annual Reports
Take Action
Action Center
Electronic Frontier Alliance
Volunteer
Tools
Privacy Badger
Surveillance Self-Defense
Certbot
Atlas of Surveillance
Cover Your Tracks
Street Level Surveillance
apkeep
Donate
Donate to EFF
Giving Societies
Shop
Org. Membership
Other Ways to Give
Membership FAQ
Donate
Donate to EFF
Shop
Other Ways to Give
Search form
Search
NSA Primary Sources
PAGE
NSA Spying
FAQ
How It Works
Key Officials
NSA Primary Sources
State Secrets Privilege
NSA Timeline 1791–2015
Word Games
NSA Primary Sources
Search Terms
Date
Document
Date
Document
1/17/2015
Report of An NSA Employee About a Backdoor In the OpenSSH Daemon
1/17/2015
Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job
1/17/2015
Sample Code of A Malware Program From the Five Eyes Alliance
1/17/2015
Technical Description of the FASHIONCLEFT Protocol
1/17/2015
Supply-chain Interdiction - Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets
1/17/2015
Overview of Methods For NSA Integrated Cyber Operations
1/17/2015
Overview of the TRANSGRESSION Program to Analyze and Exploit Foreign CNA-CNE Exploits
1/17/2015
Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards
1/17/2015
Overview on the NSA Use of Bots and the DEFIANTWARRIOR Program
1/17/2015
The FASHIONCLEFT Protocol NSA Uses to Exfiltrate Data From Trojans and Implants to the NSA
12/28/2014
National Information Assurance Research Laboratory (NIARL) TUNDRA
12/28/2014
Description of VOIP Telephony Encryption Methods and Other Ways to Attack
12/28/2014
Description on the Processing of VPN Data Packets Within the TURMOIL Program
12/28/2014
Explanation of A Potential Technique to Deanonymise Users of the TOR Network
12/28/2014
Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL
12/28/2014
Explanation of the POISENNUT Product and Its Role When Attacking VPN
12/28/2014
Explanation of the Transform Engine Emulator When Attacking VPN
1/17/2015
Document Explaining the Role of the Remote Operations Center (ROC)
1/17/2015
Document About the Expansion of the Remote Operations Center (ROC) on Endpoint Operations
12/28/2014
Description of Existing Projects on VPN Decryption
12/28/2014
Decryption of VPN Connections Within the VALIANTSURF Program
12/28/2014
Classification Guide For Cryptanalysis
12/28/2014
Canadian Document From CES on TLS Trends
12/28/2014
A Potential Technique to Deanonymise Users of the TOR Network
12/28/2014
BLUESNORT Program on Net Defense From Encrypted Communications
12/28/2014
Analytics on Security of TOR Hidden Services
12/28/2014
Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs
12/28/2014
Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database
1/17/2015
CSEC Document on the Handling of Existing Trojans When Trojanizing Computers
1/17/2015
CSEC Document About the Recognition of Trojans and Other network Based Anomaly
1/17/2015
Combination of Offensive and Defensive Missions - How Fourth-party Missions are Being Performed
1/17/2015
Classification Guide For Computer Network Exploitation (CNE)
1/17/2015
Analysis of Chinese Methods and Performed Actions In the Context of Computer Network Exploitation
12/14/2014
Senate Intelligence Committee Study of Detention and Interrogation Program
12/14/2014
GCHQ Stargate CNE Requirements
12/14/2014
GCHQ NAC Review October December 2011
12/14/2014
GCHQ NAC Review July Sept 2011
12/14/2014
GCHQ NAC Review January March 2012
12/14/2014
GCHQ NAC Review April June 2011
12/14/2014
GCHQ Mobile Networks In My NOC World
12/14/2014
GCHQ Making Network Sense of the Encryption
12/14/2014
GCHQ Hopscotch
12/14/2014
GCHQ Automated NOC Detection
12/4/2014
Wolframite Encryption Attack
12/4/2014
Opulant Pup Encryption Attack
12/4/2014
NSA GCHQ CSEC Network Tradecraft Advancement
12/4/2014
NSA First Ever Collect of High Interest 4G Cellular Signal
12/4/2014
IR21 A Technology Warning Mechanism
12/4/2014
Auroragold Working Group
12/4/2014
Auroragold Working Aid
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »
Back to top
JavaScript license information