Browse Items (626 total)

20140307-intercept-nsa_ask_zelda_watching_every_word_in_snitch_city.pdf
This document is an article from SIDToday, an internal newsletter of the NSA's Signals Intelligence Directorate division. It is a part of the series titled "Ask Zelda", an advice column. This article responds to an enquiry into appropriate levels of…

20130816-wapo-sid_oversight.pdf
This document is a report created by the NSA's Signals Intelligence Directorate (SID)'s Office of Oversight and Compliance. This report evaluates the incidents of "incidents" (described as "collection, dissemination, unauthorized access, and…

20141228-spiegel-general_description_how_nsa_handles_encrypted_traffic.pdf
This document is a newsletter article from the NSA Cryptanalysis and Exploitation Services that discusses the rise of "ubiquitous encryption" on the internet, and the NSAs top secret strategies for circumvention.

Preston-Study.pdf
This document is an internal GCHQ slideshow. It documents a series of case studies of the use of the PRESTON program, used to intercept phone calls, text messages and internet data.

20150701-intercept-unofficial_xks_user_guide.pdf
This document is a report prepared by a consultant working for Booz Allen Hamilton. It provides a comprehensive user's guide for the NSA's data analysis tool, XKEYSCORE.

20150622-intercept-gchq_ministry_stakeholder_relationships_spreadsheets.pdf
This document contains a selection of spreadsheets composed by GCHQ. Each spreadsheet identifies a specific UK government ministry, and contains information about the objectives of the office, and GCHQ's desired operations involving that department.…

20150925-intercept-hra_auditing.pdf
This document is an article from GCHQ's internal Wiki, GCWiki. It describes the purpose and policies underlying the agency's HRA {Human Rights Act} audit process. The standards were designed to ensure that these audits prove that GCHQ meets the legal…

20150622-intercept-intrusion_analysis_-_gchq.pdf
This document is a memo detailing the composition and operations of GCHQ's Intrusion Analysis (IA) team. It forms part of the Joint Electronic Attack Cell (JeAC).

20150508_intercept_skynet_courier_detection_via_machine_learning.pdf
This document is an NSA powerpoint presentation from June 2012 that discusses the metadata collection and anylsis program SKYNET. The presentation shows the results of the statistical analysis of cell phone metadata to show travel behaviour, social…

20141228-speigel-description_of_existing_projects_on_vpn_decryption_0.pdf
This document is a draft of a project plan outline for VPN exploitation, with dates and nexts steps, for targeting SMK.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2