Browse Items (626 total)

This document is a report preparted by NATO's Supreme Headquarters Allied Powers Europe, it describes the military environment in Afghanistan in June 2011, after the assassination of Osama Bin Laden.

20131211-svt-legal_issues_uk_regarding_sweden_and_quantum.pdf
This document is an extract from notes for an internal NSA presentation. It describes key achievements made by the NSA's Signals Intelligence Directorare (SID) in 2013. Mention is made of the trilateral agreement existing between the NSA, GCHQ and…

20150518_intercept_shape-weekly-report-01-jun-2011-r.pdf
This document is a report preparted by NATO's Supreme Headquarters Allied Powers Europe, it describes the military environment in Afghanistan in June 2011, after the assassination of Osama Bin Laden.

20150219-Intercept-CCNE Email Harvesting Jan10 Mar10 Trial.pdf
This document is an extract from an internal GCHQ presentation. It provides an example of an email harvested using SIM encryption keys compromised in a CNE attack on the SIM card manufacturer, Gemalto.

20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod.pdf
This document consists of three NSA presentation slides outlining Content Extraction goals and challenges, including a redacted list of the top ten most frequent mentionend targets in their collection.

20131211-svt-xkeyscore_slide_with_swedish_example.pdf
This document is an extract from internal NSA training material. It shows the user-interface of XKEYSCORE, the NSA's tool for retrieving surveillance data. It shows an example query on Sweden, and methods to assure compliance with USSID-18.

20141228-speigel-description_of_existing_projects_on_vpn_decryption_0.pdf
This document is a draft of a project plan outline for VPN exploitation, with dates and nexts steps, for targeting SMK.

20150508_intercept_skynet_courier_detection_via_machine_learning.pdf
This document is an NSA powerpoint presentation from June 2012 that discusses the metadata collection and anylsis program SKYNET. The presentation shows the results of the statistical analysis of cell phone metadata to show travel behaviour, social…

20150622-intercept-intrusion_analysis_-_gchq.pdf
This document is a memo detailing the composition and operations of GCHQ's Intrusion Analysis (IA) team. It forms part of the Joint Electronic Attack Cell (JeAC).

20150925-intercept-hra_auditing.pdf
This document is an article from GCHQ's internal Wiki, GCWiki. It describes the purpose and policies underlying the agency's HRA {Human Rights Act} audit process. The standards were designed to ensure that these audits prove that GCHQ meets the legal…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2