Browse Items (626 total)

20141125-sz-cable_regions.pdf
This document is a report listing the region, cable, location and capacity of telecommunications cables intercepted by GCHQ.

20140312-intercept-mhs_leverages_xkeyscore_for_quantum.pdf
This document describes experiments at the MHS base in Britain (Menwith Hill Satellite Station) with automated deep packet analysis of Yahoo and Hotmail to give insight into the potential success of QUANTUMTHEORY (data injection into a users system)…

20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf
This document contains Menwith Hill Station presentation slides from the 2010 SIGINT Development Conference. The slides outline the QUANTUMTHEORY program and its sub-programs, from legacy programs to those in experimental stages.

20141010-intercept-computer_network_exploitation_classification_guide.pdf
This document is a classification guide for NSA Computer Network Exploitation (CNE) programs.

20150505_intercept_sidtoday-non-linguists-final.pdf
This document is an article from the NSA internal newsletter, SIDtoday. Originating from the NSA Center for Time-Sensitive Information, the article introduces Enhanced Video Text and Audio Processing (eViTAP) program to signals intelligence analysts.…

20140709-Intercept-spying_on_muslim-american_leaders.pdf
This document is a series of NSA spreadsheets and presentation slides that illustrate surveillance activities being undertaken against foreign and domestic Islamic community leaders.

20141214-intercept-gchq_automated_noc_detection.pdf
This document is a joint presentation by NAC (Network Analysis Centre), with members from CSEC and GCHQ, discussing test approaches for automating the detection of Network Operation Centres (NOC). NOCs form the "nerve centre" of telecommunications…

20150803-intercept-blast_from_the_past_yrs_in_the_beginning.pdf
This January 2011 newsletter extract, published by the NSA's Yakima Research Station (YRS), includes two articles. The first article gives a history (covering the years 1965 to 1974) of the development of the YRS based on archival material newly…

20150323-CBC-Cyber Threat Detection.pdf
This document is a presentation created by CSEC. It describes CSEC's cyber threat detection operations, including the EONBLUE program and CND (Computer Network Defense) operations.

20150701-intercept-http_activity_in_xks.pdf
This document is an internal NSA presentation. It outlines the utility of the XKEYSCORE data analysis tool used by the NSA to gather digital network intelligence (DNI) on the basis of analysis of target's HTTP activity while using the internet.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2