Browse Items (626 total)

20150811-intercept-when-brevity-is-just-the-soul-of-huh.pdf
This document is a column from the NSA newsletter, SIDtoday, written by the SIGINT philosopher. It dicusses workplace writtern correspondence etiquette.

20140825-Intercept-ICREACH-Wholesale-Sharing.pdf
This document is a NSA memo giving a brief overview of the development, implementation, and status of the NSA's ICREACH program, which gives the US intelligence community and its Five Eye second-party partners access to a mass collection of…

20150701-intercept-xks_for_counter_cne.pdf
This document is an internal NSA presentation. It describes utilizing the XKEYSCORE data analysis tool as a resource supporting CNE (Computer Network Exploitation) operations, in distinction to XKEYSCORE's traditional use for DNI (Digital Network…

This document is an internal NSA presentation. It explains the syntax behind the construction of AppIds and Fingerprints in the NSA's XKEYSCORE data analysis program. AppIds and Fingerprints are methods to make searches of intelligence information…

20141228-spiegel-gchq_briefing_on_the_bullrun_program.pdf
This document is a GCHQ brief on the NSA BULLRUN Col - a program described as protecting "our abilities to defeat the encryption used in network communications technologies." The document outlines procedures for BULLRUN and includes a glossary of…

20150310-Intercept-Apple A4 A5 Application Processors Analysis.pdf
This document is an extract from a presentation created by the CIA. It appears to be the front page of a presentation related to CIA operations against Apple's A4/A5 Application Processors used in the iPhone.

20140204-nbc-british_spies_attacked_hactivist_anonymous.pdf
This document is an extract from a GCHQ presentation prepared for the 2012 SIGDEV conference. It describes operations undertaken by the Joint Threat Research Intelligence Group (JTRIG) division of GCHQ against hacktivists of Anonymous and Lulsec. It…

This document is an extract from a presentation developed by the GCHQ's Bude station. It describes the "Mission Driver" behind GCHQ operations in Latin America. a key objective appears to be manipulating Latin American public opinion behind…

20130920-spiegel-belgacom.pdf
This document is a selection of slides from a GCHQ presentation describing Operation SOCIALIST, a cyber-attack against Belgacom, a partly state owned Belgian telecoms company. The presentation describes the utilization of Quantum Insert attack…

20150311-NZHerald-SUSLOW Monthly Report WARRIORPRIDE.pdf
This document is a monthly report from an entity within the NSA referred to as "SUSLOW." This document collates news about intelligence in New Zealand, such as changes to governing intelligence legislation, and the development of the capabilities of…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2