Browse Items (626 total)

20141204-intercept-auroragold_target_technology_trends_center_support_to_wpmo_0.pdf
This document is a NSA presentation on AURORAGOLD (data gathering and analytics on GSM/UMTS networks) and "Auto-Minimization" (to ensure compliance with NSA reporting policy).

20141214-intercept-gchq_automated_noc_detection.pdf
This document is a joint presentation by NAC (Network Analysis Centre), with members from CSEC and GCHQ, discussing test approaches for automating the detection of Network Operation Centres (NOC). NOCs form the "nerve centre" of telecommunications…

20140312-intercept-turbine_industrial_scale_exploitation.pdf
This document contains one slide from a NSA presentation detailing the benefits of the TURBINE program for automating computer network exploitation programs, suggesting that it allows for "industrial-scale exploitation."

20140312-intercept-turbine_industrial_scale_exploitation.pdf
This document contains one slide from a NSA presentation detailing the benefits of the TURBINE program for automating computer network exploitation programs, suggesting that it allows for "industrial-scale exploitation."

20150803-intercept-back_in_time_the_echelon_story.pdf
This NSA newsletter article, reprinted from the internal publication Foreign Affairs Digest, gives a brief history of the communications intelligence system ECHELON, which targeted western communications satellites, and its interactions with European…

20140914-spiegel-treasure_map_presentation.pdf
This document is an internal presentation prepared by the NSA's Threat Operations Center (NTOC). It describes TREASUREMAP, a massive internet mapping, exploration and analysis engine. Its aim was to create a fully interactive map of the internet…

20150402-Intercept-Behavioural Science Support for JTRIG.pdf
This document contains extracts of a report created by GCHQ's Joint Threat Research and Intelligence Group. It highlights GCHQ's HUMINT (Human Intelligence) operations against targets in Zimbabwe and Argentina. These operations are said to involve…

20150505_intercept_black-budget-262.pdf
This document is an extract from the 2012 Black Budget, prepared by the NSA to document and justify their spending. This extract discusses the success and setbacks in their voice analysis technology which renders voice data into searchable text. The…

20150505_intercept_black-budget-360-364.pdf
This document is an extract from the US Intelligence Community's Black Budget for 2013. This extract describes and justifies spending for the Human Language Technology Project, which is developing capacities for machine translation and converting…

20150925-intercept-tint_external_july_2009.pdf
This document is an extract from a larger piece. It gives limited information, with little context, about the GCHQ program BLACK HOLE, in regards to bulk metadata collection, processing and analysis.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2