Browse Items (626 total)

20140618-der_spiegel-report_on_the_surveillance_of_african_countries_by_jsa.pdf
This NSA document gives an overview of the JSA - Joint Signals Activity - an NSA/BND intelligence partnership and their joint intelligence work in North Africa.

20140207-nbc-gchq_honey_trap_cyber_attack_background_on_jtrig.pdf
This is a document prepared by GCHQ's Joint Threat Research Intelligence Group (JTRIG) for the 2012 SIGDEV conference. It describes the main objectives of JTRIG and some of the techniques and devices used to achieve them. It describes ways in which…

20150925-intercept-qfd_blackhole_technology_behind_inoc.pdf
This document is a presentation from the GCHQ Applied Research Unit. It includes images and graphs illustrating bulk web data collection, and gives an brief overview of the programs which are used to query and analyse this data.

20141125-sz-windstop_system_highlights.pdf
This document is an extract from a presentation created by the NSA's Special Source Operations (SSO) division. It describes the key operational developments in the WINDSTOP program, including the implementation of an upgrade to the XKEYSCORE tool and…

20130710-wapo-upstream.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from several U.S. Internet companies: Microsoft (since 2007), Yahoo!…

20150402-Intercept-GCHQ Mission Driven Access Workshop.pdf
This document is an extract from a presentation developed by the GCHQ's Bude station. It describes the "Mission Driver" behind GCHQ operations in Latin America. a key objective appears to be manipulating Latin American public opinion behind…

20141214-intercept-gchq_nac_review_july_sept_2011.pdf
This document is an extract from a progress report on a GCHQ computer network exploitation operation against the Belguim telecommunications company BELGACOM. It states that the Network Analysis Center (NAC) helped to infiltrate the devices of the…

20131119-odni-nsa_course_materials_module_6_analytic_personal_v.18.pdf
This document contains internal NSA training material, explaining in detail the role of the intelligence analyst as it relates to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.

20150701-intercept-category_throttling.pdf
This memo outlines how to configure XKEYSCORE to support category throttling.

20150612-intercept-sidtoday_interview_with_a_sid_hacker.pdf
This document is an interview with a hacker employed by the NSA's Tailored Access Operations (TAO) Division to perform computer network exploitation (CNE) operations against targets, including Osama Bin Laden. It originally appeared in the Signals…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2