Browse Items (626 total)

20131211-svt-xkeyscore_sources.pdf
This is an extract of an internal NSA presentation. It describes the sources of information that are aggregated in the NSA's access-tool, XKEYSCORE.

20140618-der_spiegel-guidelines_for_the_classification_of_suslag_details_and_the_nsa-bnd_cooperation.pdf
This document is a NSA classification guide detailing the appropriate security classifications for describing different elements of the NSA/BND partnerships, including the Joint SIGINT Activity (JSA), Special US Liason Activity Germany (SUSLAG), and…

20150204-intercept-nato_civilian_intelligence_council_cyber_panel.pdf
This document is a briefing sheet from the Office of the Director of National Intelligence to the NATO Civilian Intelligence Council. It provides discussion of a previous assessment of the cyber threat to NATO, especially the threat of state actors…

20141228-spiegel-intercept_with_pgp_encrypted_message.pdf
This document is a heavily redacted intercepted chat log. The log shows that the NSA was not able to decrypt the message that was encrypted with PGP (Pretty Good Privacy).

20141214-Intercept-gchq-mobile-networks-in-my-noc-world.pdf
This document is a presentation illustrating the strengths of Network Operations Centre(NOC) analysis for aiding in computer network exploitation (CNE) opertations. NOC analysis provides network maps, access points and key members of a target's…

20150219-Intercept-CCNE Stats Summaries Jan10 Mar10 Trial.pdf
This document is an extract from an internal GCHQ presentation. It provides statistics and summaries for the data identified in various mobile phone networks retrieved using compromised SIM encyption keys gained from an attack on the SIM card…

20150701-intercept-xks_application_ids_brief.pdf
This document is an internal NSA presentation. It further describes the syntax underlying Application IDs in the NSA's ZKEYSCORE data analysis tools. Application IDs are designed to increase the efficiency of queries to repositories of intelligence…

20150505_intercept_wg-advice-to-security-service.pdf
This document is an assessment report from the SIRDCC Speech Technology Working Group on the current state of speech to text (STT) technology. The working group was established by the Securiy Service and the GCHQ. The report discusses competing…

20140618-der_spiegel-details_on_xkeyscore_from_an_internal_gchq_website.pdf
This document appears to be an extract from an NSA wiki. It describes the XKEYSCORE analytics program and its relationship with other NSA repositories such as PINWALEand TURMOIL, as well as GCHQ's MUSCULAR.

20150925-intercept-architecture_risk_2012.pdf
This document is a summary of a report prepared by GCHQ. It analyzes GCHQ's broader surveillance architecture in light of "changes in mission and changes in external environment", and how the agency should repsond to these changes over time.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2