Skip to main content
About
Contact
Press
People
Opportunities
Issues
Free Speech
Privacy
Creativity and Innovation
Transparency
International
Security
Our Work
Deeplinks Blog
Press Releases
Events
Legal Cases
Whitepapers
Podcast
Annual Reports
Take Action
Action Center
Electronic Frontier Alliance
Volunteer
Tools
Privacy Badger
Surveillance Self-Defense
Certbot
Atlas of Surveillance
Cover Your Tracks
Street Level Surveillance
apkeep
Donate
Donate to EFF
Giving Societies
Shop
Org. Membership
Other Ways to Give
Membership FAQ
Donate
Donate to EFF
Shop
Other Ways to Give
Search form
Search
Email updates on news, actions,
and events in your area.
Join EFF Lists
Electronic Frontier Foundation
Donate
EFFecting Change Livestream Series: Is There Hope for Social Media?
Electronic Frontier Foundation
About
Contact
Press
People
Opportunities
Issues
Free Speech
Privacy
Creativity and Innovation
Transparency
International
Security
Our Work
Deeplinks Blog
Press Releases
Events
Legal Cases
Whitepapers
Podcast
Annual Reports
Take Action
Action Center
Electronic Frontier Alliance
Volunteer
Tools
Privacy Badger
Surveillance Self-Defense
Certbot
Atlas of Surveillance
Cover Your Tracks
Street Level Surveillance
apkeep
Donate
Donate to EFF
Giving Societies
Shop
Org. Membership
Other Ways to Give
Membership FAQ
Donate
Donate to EFF
Shop
Other Ways to Give
Search form
Search
Kittens Login
NSA Primary Sources
PAGE
NSA Spying
FAQ
How It Works
Key Officials
NSA Primary Sources
State Secrets Privilege
NSA Timeline 1791–2015
Word Games
NSA Primary Sources
Search Terms
Date
Document
Date
Document
2/4/2015
Who Else Is Targeting Your Target Collecting
2/4/2015
NATO Civilian Intelligence Council Cyber Panel
1/17/2015
APEX Shaping to Put Exfiltrating Network Traffic Into Plausible Deniability
1/17/2015
Fifth Party Access - When Fourth Party Puts Others Under Surveillance
1/17/2015
Interview With NSA's Department For Tailored Access Operations
12/28/2014
Which Encryption Protocols and Techniques Can Be Attacked
12/28/2014
NSA - GCHQ Crypt Discovery Joint Collaboration Activity
12/28/2014
NSA Cryptographic Modernization (CryptoMod) Classification Guide
12/28/2014
NSA Experiment For Massive SSL-TLS Decryption
12/28/2014
NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN
12/28/2014
NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service
12/28/2014
NSA Presentation on the Analysis and Contextualisation of Data From VPN
12/28/2014
NSA Presentation on the Development of Attacks on VPN
12/28/2014
Overview of the Capabilities of the VALIANTSURF Program
12/28/2014
Overview on Internet Anonymization Services on How They Work
12/28/2014
POISENNUT Virtual Private Network Attack Orchestrator (VAO)
12/28/2014
Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic
12/28/2014
Processing of Data From Exploited VPN In the TURMOIL Program
12/28/2014
SCARLETFEVER How Attacks on Encrypted Connections are Orchestrated
12/28/2014
SCARLETFEVER Program to Attack Secure Sockets Layer (SSL) - (TLS)
12/28/2014
TOR Deanonymisation Research
12/28/2014
TOR Overview of Existing Techniques
12/28/2014
What Your Mother Never Told You About the Development of Signal Intelligence
1/17/2015
4th Party Collection - Taking Advantage of Non-partner Exploitation
1/17/2015
APEX Method of Combining Passive With Active Methods to Exfiltrate Data From Networks Attacked
1/17/2015
BYZANTINE HADES - NSA Research on Targets of Chinese Network Exploitation Tools
1/17/2015
Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE
1/17/2015
Exploring and Exploiting Leaky Mobile Apps With BADASS
1/17/2015
HIDDENSALAMANDER -Recognition of Botnet Activity and Options For Takeover of Clients and Data
1/17/2015
iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID)
1/17/2015
Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline
1/17/2015
QUANTUMSHOOTER Implant to Remote-control Computers From Unknown Third Parties
1/17/2015
SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence
1/17/2015
NSA Fourth Party Access - I Drink Your Milkshake
1/17/2015
NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools
1/17/2015
Recognize and Process Data From Third Party Attacks
1/17/2015
NSA SNOWGLOBE, French Government Trojan
1/17/2015
NSA Training Course Material on Computer Network Operations
1/17/2015
QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL)
1/28/2015
CSE Presentation on the LEVITATION Project
12/28/2014
MALIBU Architecture Overview to Exploit VPN Communication
12/28/2014
Intro to the VPN Exploitation Process Mentioning the Protocols Attacked - PPTP, IPSEC, SSL, SSH)
12/28/2014
Intercept With PGP Encrypted Message
12/28/2014
Intercept With OTR Encrypted Chat
12/28/2014
Guide For Analysts on How to Use the PRISM Skype Collection
12/28/2014
General Description How NSA Handles Encrypted Traffic
12/28/2014
GCHQ Presentation on the BULLRUN Programs Decryption Capabilities
12/28/2014
GCHQ Briefing on the BULLRUN Program
12/28/2014
Explanation on the SPIN9 Program on End-to-end Attacks on VPN
12/28/2014
Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »
Back to top
JavaScript license information