Browse Items (626 total)

20130830_cryptome_congressional_budget_2013.pdf
This document is a summary of the Office of the Director of National Intelligence's multivolume FY 2013 Congressional Budget Justification, also known as the "black budget". It covers the operations of the United States Intelligence Community, a…

20141214-intercept-gchq_nac_review_october_december_2011.pdf
This document is an extract from a progress report on a GCHQ computer network exploitation operation against the Belguim telecommunications company BELGACOM. It involves virtual private network (VPN) exploitation and GPRS tunneling protocol (GTP)…

20141204-intercept-auroragold_target_technology_trends_center_support_to_wpmo_0.pdf
This document is a NSA presentation on AURORAGOLD (data gathering and analytics on GSM/UMTS networks) and "Auto-Minimization" (to ensure compliance with NSA reporting policy).

20141228-spiegel-malibu_architecture_overview_to_exploit_vpn_communication.pdf
This document contains four slides which may have been extracted from a larger presentation. The slides show four different work flows concerning decryption applications.

20140618-der_spiegel-boundless_informant_overview_global.pdf
This document shows a map of the world charting the targets and collection quantities for the BOUNDLESSINFORMANT program.

20140307-intercept-nsa_ask_zelda_is_bain_de_soleil_a_bane_on_the_nsa.pdf
This document is an article from SIDToday, an internal newsletter of the NSA's Signals Intelligence Directorate division. It is a part of the series titled "Ask Zelda", an advice column. This article describes how supervisors can promote an…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2