Browse Items (626 total)

20130731-guard-xkeyscore_training_slides.pdf
This document is a presentation describing the NSA's query program, XKeyscore. The program's structure, appearance and technical architecture are described and compared to other tools available to the NSA. The document also contains examples of the…

20141125-sueddeutsche-access_breakdown.pdf
This document is a GCHQ report detailing the cable access points utilized by GCHQ to intercept communications using the infrastructure of major British telecommunications companies.

20150928-intercept-sid_trains_for_athens_olympics.pdf
This document is an article is from the internal NSA newsletter, SIDtoday. It announces the NSA preparations for the 2004 Athens Olympics, and briefly discusses intelligence operations of prior olympic games.

20131230-appelbaum-nsa_ant_catalog.pdf
This document is a catalog of the technologies and devices available to the NSA to aid in surveillance. Most devices are described as being operational and available to intelligence agencies across the Five Eyes (5VEY) alliance. The capabilities and…

20150204-intercept-who_else_is_targeting_your_target_collecting.pdf
This document is an article from the NSA's newsletter, SIDtoday. It originally appeared in GCHQ Menwith Hill Station's newsletter, Horizon in March 2012. This article describes INTOLERANT, an effort to identify when surveillance targets are…

20141228-spiegel-explanation_of_the_gallantwave_that_decrypts_vpn_traffic_within_longhaul.pdf
This document is a short presentation from the NSA Digital Network Crypt Applications unit (DNCA) describing expansions in scale and volume to the GALLANTWAVE decrpytion program.

20131028-mundo-spain_collections.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Spain in a 30 day period between December 10 2012 and Janurary 8 2013.

20150402-Intercept-JTRIG Wiki Highlights August 2009.pdf
This document is an extract from a newsletter created by GCHQ's JTRIG division. It describes the planning processes behind operation QUITO, an effort to manipulate Latin American public opinion regarding the country's claims to the Falkland Islands /…

05-Introduction-to-WLAN-CNE-Operations-Redacted.pdf
This document is a slide deck during a "Close Access" NSA training course to introduce students to computer network exploitation (CNE) using the FOXACID server in combinations with other tools, BADDECISION and NIGHTSTAND.

20150219-Intercept-Dapino Gamma Gemalto Yuaawaa Wiki.pdf
This document appears to be an extract from a GCHQ wiki article. It describes Gemalto's Yuaawaa secure file sharing device, and GCHQ attempts to gain access to it.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2