Browse Items (626 total)

20150310-Intercept-Smurf Capability Iphone.pdf
This document is an extract from an internal GCHQ presentation. It describes the existing tools used by GCHQ to intercept communications from iPhones. Programs include: WARRIOR PRIDE, DREAMY SMURF, NOSEY SMURF. TRACKER SMURF, PORUS and PARANOID…

20150323-CBC-Cascade Joint Cyber Sensor Architecture Presentation.pdf
This document is a CSEC presentation describing the CASCASE Joint Cyber Sensor Architecture. CASCADE is an effort to align CSEC's passive cyber sensor capabilities and architecture in its SIGINT and ITS missions through adopting common sensor…

20150117-spiegel-overview_of_methods_for_nsa_integrated_cyber_operations_0.pdf
This document is a presentation from the NSA's Threat Operations Center (NTOC) on methods for intergrated cyber operations, including the applications TURBINE, TUTELAGE, and QUANTUM. The document gives various case studies and lists future work.

20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod.pdf
This document consists of three NSA presentation slides outlining Content Extraction goals and challenges, including a redacted list of the top ten most frequent mentionend targets in their collection.

20140630-WaPo-odni_certification_regarding_foreign_entities.pdf
This document is a certification by the Attorney General of the United States and the Director of National Intelligence. It testifies to the American intelligence agencies procedures adherence to sections 101(h), 301(4) and 702 of the Foreign…

20140630-WaPo-odni_certification_regarding_foreign_entities.pdf
This document is a certification by the Attorney General of the United States and the Director of National Intelligence. It testifies to the American intelligence agencies procedures adherence to sections 101(h), 301(4) and 702 of the Foreign…

20131204-wapo-chalkfun_foreignness.pdf
This document is an excerpt from an NSA training tool explaining how to determine whether a targeted device is being used outside the United States. It illustrates a hypothetical example involving a query to CHALKFUN, the tool used to search FASCIA,…

20150117-speigel-analysis_of_chinese_methods_and_performed_actions_in_the_context_of_computer_network_exploitation.pdf
This document contains three slides from a presentation from the SIGINT Development branch of the NSA, detailing the damage and data loss during a Chinese cyber attack on the Department of Defense. The presentation also sets out goals for…

20140825-Intercept-CIA-Colleagues-Enthusiastically-Welcome-NSA-Training.pdf
This document is a NSA news release giving a summary of the ongoing success of NSA-led training initiatives for the CIA. These efforts help in the "development of a cadre of CIA Target Analysts who are capable of using SIGINT target-development…

20130905-guard-cryptanalysis_classification.pdf
This document is a classification guide that describes the appropriate security classificiations to be used when describing different elements of the operations of the NSA's Office of Cryptanalysis and Exploitation Services, including the…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2