Browse Items (626 total)

20150117-spiegel-supply-chain_interdiction_-_stealthy_techniques_can_crack_some_of_sigints_hardest_targets.pdf
This article, from the NSA's SIDtoday newsletter, describes the success of a hands-on interception program. Shipments of computer network devices (servers, routers, etc.), en route to target locations, are intercepted and physically implanted with…

20140618-der_spiegel-excerpt_on_the_sharing_of_xkeyscore_with_german_intelligence_agency_bfv.pdf
This is an extract from an internal NSA presentation. It relates to the provision of XKEYSCORE analytics program to the German BfV (Federal Office for the Protection of the Constitution).

20140312-intercept-multiple_methods_of_quantum.pdf
This document is a factsheet from the Office of SIGINT Development. It lists the various QUANTUM programs in operation or in live testing, including their success rate. Programs include diverse CNO (computer network operations) devised for SIGINT…

20150803-intercept-comsat_background.pdf
This GCHQ document discusses the collaboration between the NSA and the GCHQ on initiatives in COMSAT (Communications satellites access). The report focuses on funding and budget concerns for the future of the projects.

20140831-spiegel-nsas_oldest_third_party_partnership.pdf
This document is a NSA release detailing the history and current partnership between Turkish and U.S intelligence operations. Intelligence sharing began in 1949 between the CIA and the Turkish Electronic and Technical Intelligence (ETI) and has…

20150622-intercept-teca_product_centre_gchq_wiki.pdf
This document is an article from GCHQ's internal Wiki, GCWiki. It outlines the products made available to intelligence analysts by The Technical Enabling Access Product Centre (TECA). TECA is a division of GCHQ focused on reverse engineering…

20140404-intercept-2009_sigdev_conference.pdf
This document contains an internal NSA news release giving a summary of the 2009 SIGDEV conference, an "annual Five-Eyes event" which "enables unprecedented visibility of SIGINT Development activities from across the Extended Enterprise."

20140312-intercept-quantum_insert_diagrams.pdf
This document contains slides displaying the operations of the QUANTUMINSERT computer network exploitation (CNE) program. Through partner programs such as TURBINE and TURMOIL, the NSA is able to exploit target computer networks by redirecting…

20131021-monde-boundless_informant_france.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in France in a 30 day period between December 10 2012 and Janurary 8 2013.

20131123-nrc-nsa_malware.pdf
This document is a slide from a NSA presentation describing the NSA's collection activities worldwide. Specifically, it illustrates that the NSA used a technique called "Computer Network Exploitation" (CNE) to install malware onto over 50,000 devices…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2