Browse Items (626 total)

20131230-spiegel-tao_intro.pdf
This document is an internal NSA presentation that describes the structure, operations and resources of the Tailored Access Operations (TAO) division. It includes personnel lists, office and facility maps, and key operations. It also describes…

20131230-spiegel-tao_quantum_theory.pdf
This document is an internal NSA presentation that describes the functioning of QUANTUM. It also describes the operation of FOXACID in the QUANTUM tasking process, and how it infects machines with malicious programs.

20150925-intercept-tdi_introduction.pdf
This document is a presentation from the GCHQ Applied Research Unit. It discusses using target detection identifiers (TDI) to track targets online though various web events, including email, social media, webcam images, and other kinds of internet…

20131210-wapo-target_location.pdf
This document is an excerpt from a transcript of an NSA training video. It describes how to verify the location of a targeted mobile device. It describes how the NSA monitors different types of mobile signaling information known as HLR and VLR…

20150219-Intercept-Dapino Gamma Target Personalisation Centres.pdf
This document appears to be an extract from an internal GCHQ wiki article. It describes active operations against the SIM card manufacturer Gemalto's SIM personaliztion centers worldwide.

20130816-wapo-targeting_rationale.pdf
This document is a memo that explains the rationale used by the NSA in its selection of surveillance targets outside the US. The document contains actual examples of certification examples that indicate that the staff of foreign heads of state and…

20150701-intercept-xks_targets_visiting_specific_websites.pdf
This document is an internal NSA presentation. It showcases using the XKEYSCORE query tool to target individuals visiting specific websites.

20140318-wapo-description_of_data_collection_under_mystic.pdf
This document is an extract from a weekly NSA Special Source Opertations briefing memo which describes protocol for the bulk collection, storage, and analysis of audio content and metadate under the SCALWAG program, a sub-program of MYSTIC.

20150310-Intercept-TCB Jamboree 2012.pdf
This document is an extract of a memo about the CIA's annual Trusted Computing Base's (TCB) Jamboree conference. This conference focused on the communication about research into the ecxploitation of vulnerabilities in modern communications systems.

20150310-Intercept-TCB Jamboree 2012 Invitation.pdf
This document is a memo created by the CIA. It describes the Trusted Computing Base's Jamboree, held in Februrary 2012. The Jamboree was a conference dedicated to communicating research performed by members of the United States Intelligence Community…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2