Browse Items (626 total)

20141228-spiegel-description_of_voip_telephony_encryption_methods_and_other_ways_to_attack.pdf
This document is an update from an internal intelligence community discussion group for media, including both the NSA and GCHQ. The topic is a summary of the main take aways of the recent IETF - Internet Engineering Task Force conference and…

20150622-intercept-ndist_-_gchqs_developing_cyber_defence_mission.pdf
This presentation outlines the focus of GCHQ's developing Cyber Defence Mission. It also includes a map of the Northern Hemisphere indicating how many malware events are collected by GCHQ every day.

20130606-wapo-prism.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…

20150505_intercept_sidtoday-is-hlt-progressing-final.pdf
This document is from the NSA internal newsletter, SIDtoday. It discusses the progress of Human Language Technology (HLT) research, focussing on projects in Afghanistan, and Latin America. It also indicates the future potential of HLT.

20150925-intercept-operational_engineering_november_2010_0.pdf
This document is a power point presentation from the GCHQ, outlining different event analysis products, including SOCIAL ANTHROPOID, LUSTRE, SAMUEL PEPYS, and GUIDING LIGHT. It includes screen shots of query forms and result lists.

20150622-intercept-kaspersky_user-agent_strings_-_nsa.pdf
This document is a Report created by the NSA. It describes attempts to exploit weaknesses in anti-virus systems created by the Russian company, Kapersky Lab.

20150117-spiegel-nsa_training_course_material_on_computer_network_operations.pdf
This document is a training course manual from the NIOC (Navy Information Operations Command) Maryland, for computer network operations. It provides background on the need for computer network operations training (due to the risk of cyber conflict),…

20140312-intercept-turbine_and_turmoil.pdf
This document contains two slides detailing the computer network operations programs which intercept, passively and actively, communications as they "transit the globe." Diagrams also show the "automated management and control" of surveillance…

20150701-intercept-phone_number_extractor.pdf
This document is an internal NSA presentation. It outlines how the data analysis tool XKEYSCORE can be used to retrieve target's phone numbers.

20141125-sz-partner_cables.pdf
This document is a GCHQ report listing their corporate partners assisting in telecommunications cable interception.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2