Browse Items (626 total)

20140128-guard-leaky_phone_apps.pdf
This document contain extracts from presentations by the NSA and GCHQ describing programs for mobile device tracking and surveillance. The slides outline the surveillance and collection capabilities for accessing mobile devices, which include:…

20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker.pdf
This document is an article from an internal NSA newsletter. It contains an NSA analyst's reminiscences about working at the European Technical Center (ETC) in Stuttgart, Germany.

20150701-intercept-un_secretary_general_xks.pdf
This document is an extract from an internal NSA presentation. It outlines how NSA analysts used the data analysis tool XKEYSCORE to gain access to the talking points of the U.N. Secretary General prior to their meeting with President Barack Obama.

20150117-spiegel-the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa_0.pdf
This document is a presentation deck for the FASHIONCLEFT protocol, which is a TAO (Tailored Access Operations) protocol used by implants to exfiltrate target data in computer network operations. The document defines FASHIONCLEFT, gives details on…

20131014-wapo-content_acquisition_optimization2.pdf
This document is a briefing describing the NSA's problems with overcollection of data from email address books and instant messaging buddy lists, as well as NSA efforts to filter out useless information. The briefing concludes with a case study of an…

20130816-wapo-sso_news_article.pdf
This document is an article from SSO News, the Internal Newsletter of the NSA's Special Source Operations. It describes a ruling made on 3 October 2011, where a judge from the FISA Court argued that Upstream collection were in violation of the fourth…

20131230-spiegel-tao_quantum_tasking.pdf
This document is an internal NSA presentation. It describes the tasking process and capabilities of QUANTUMTHEORY, a suite of programs developed by the NSA's Tailored Access Operations (TAO). Using a method called Quantum Inserts, specialists are…

20130608-guard-boundless_informant_capabilities (1).pdf
This document is a presentation describing the mission statement BOUNDLESSINFORMANT, the NSA's tool used to track and visualize global surveillance data. A more comprehensive version of this document was released by El Mundo.

20150219-Intercept-Dapino Gamma CNE Presence Wiki.pdf
This document appears to be an extract from an internal GCHQ wiki article. It describes how GCHQ made use of the SIM card manufacturer Gemalto's computer network after gaining access through a CNE (Computer Network Exploitation) attack.

20140803-Intercept-NSA-Intelligence-Relationship-With-Israel.pdf
This document is a report detailing the intelligence agreement operating between the National Security Agency and the Israeli SIGINT National Unit (ISNU).
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2