Browse Items (626 total)

20140914-intercept-speargun_underway.pdf
This GCSB document contains one slide pertaining to the SPEARHEAD project in New Zealand, an alleged collaboration with the NSA which sought to access to underwater cable for mass surveillance puposes. The slide only says that the SPEARHEAD project…

20140320-intercept-targeting_system_administrator_accounts.pdf
This document contains posts from an internal NSA message board outlining methods for collecting data on unknown potential targets by way of infiltrating systems administrator accounts.

20140303-epic-doj_report_on_pen_register_fisa_orders.pdf
This document, acquired via a freedom of Information Act lawsuit by EPIC, is a collection of reports detailing the number of times the Foreign Intelligence Surveillance Court authorized the use of Pen Registers and Trap and Trace Devices in order to…

20150701-intercept-comms_readme.pdf
This document is a readme for the Communications System (Comms) used by the NSA's XKEYSCORE data analysis tool. The Communications System is the primary means used by XKEYSCORE to communicate among servers and with the outside internet.

20150117-speigel-document_explaining_the_role_of_the_remote_operations_center_roc.pdf
This document is an article from SIDtoday, an internal NSA newsletter, discussing the importance of the NSA's Remote Operations Center (ROC) to the agencies "objective of Global Network Dominance." The ROC specializes in computer network operations…

20131122-dagbladet-afghanistan_collection.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Afghanistan in a 30 day period between December 10 2012 and Janurary 8…

20150701-intercept-http_activity_in_xks.pdf
This document is an internal NSA presentation. It outlines the utility of the XKEYSCORE data analysis tool used by the NSA to gather digital network intelligence (DNI) on the basis of analysis of target's HTTP activity while using the internet.

20150323-CBC-Cyber Threat Detection.pdf
This document is a presentation created by CSEC. It describes CSEC's cyber threat detection operations, including the EONBLUE program and CND (Computer Network Defense) operations.

20150803-intercept-blast_from_the_past_yrs_in_the_beginning.pdf
This January 2011 newsletter extract, published by the NSA's Yakima Research Station (YRS), includes two articles. The first article gives a history (covering the years 1965 to 1974) of the development of the YRS based on archival material newly…

20141214-intercept-gchq_automated_noc_detection.pdf
This document is a joint presentation by NAC (Network Analysis Centre), with members from CSEC and GCHQ, discussing test approaches for automating the detection of Network Operation Centres (NOC). NOCs form the "nerve centre" of telecommunications…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2