Browse Items (626 total)

20140618-der_spiegel-faqs_on_the_boundless_informant_program.pdf
This document is a NSA factsheet answering analyst's frequently asked questions about BOUNDLESSINFORMANT, a tool used by the NSA to track and visualize global surveillance data. It is identical to the factsheet also published by Dagbladet.

20150219-Intercept-Where are These Keys.pdf
This document is an extract from an internal GCHQ presentation. It describes the operation of a traditional mobile telecommunications network, and the position of Individual Subscriber Authentication Keys (KI values) within it.

20150811-intercept-the-sigint-philosopher-is-back-with-a-new-face.pdf
This document is a column from the NSA newsletter, SIDtoday, written by the "SIGINT philosopher." As part of a recurring column about surveillance ethics, the author dicusses the rationale for surveilling more rather then less in terms of diplomatic…

20140311-nyt-nsa_timeline_of_surveillance_law_developments.pdf
This document is an internal NSA timeline that details the developments in American surveillance law. It identifies relevant laws, executive orders, FISC orders and policies.

20150803-intercept-comsat_cyrpus_technical_capability.pdf
This document is an excerpt from a draft report produced by the GCHQ. It discusses the NSA/GCHQ operations in Cyprus, their technical capabilities, current initatives in COMSAT (communications satellite access), funding, governance, and facility…

20131211-svt-quantum_from_gchq.pdf
This document is an extract from an internal GCHQ document. It describes an example of how QUANTUM was used to target the computers of extremists in an unnamed African country through CNE (Computer Network Exploitation). QUANTUM is a suite of attack…

20150219-Intercept-CNE Access to Core Mobile Networks.pdf
This document is an extract from an internal GCHQ presentation. It describes the CNE (Computer Network Exploitation) attack against the SIM card manufacturer, Gemalto.

20150701-intercept-xks_intro.pdf
This document is an internal NSA presentation. It describes the NSA's data analysis tool, XKEYSCORE. The presentation outlines the structure of the tool, its relation to other data NSA repositories, and examples of its real-life use as an…

20140825-Intercept-ICREACH-Sharing-SIGINT-Comms-Metadata-with-the-Intel-Community-Memo.pdf
This document is a NSA release announcing the status of ICREACH, the NSA producediIntelligence community-wide communications metadata search engine. The document states that the purpose of the program is for "situational awareness and target…

20150622-intercept-project_camberdada_-_nsa.pdf
This document is an internal NSA presentation. It outlines the CAMPERDADA program, which seeks to monitor, collect, triage and repurpose malware and email phishing scams.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2