This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in The Netherlands in a 30 day period between December 10 2012 and Janurary…
This document is an extract of a memo about the CIA's annual Trusted Computing Base's (TCB) Jamboree conference. This conference focused on the communication about research into the ecxploitation of vulnerabilities in modern communications systems.
This document is an entry from an internal NSA wiki. It describes various SIGINT targeting scenarios and the appropriate course of action in each case, provided from NSA guidelines and policies.
This document is a certification by the Attorney General of the United States and the Director of National Intelligence. It testifies to the American intelligence agencies procedures adherence to sections 101(h), 301(4) and 702 of the Foreign…
This document contains three slides from a presentation from the SIGINT Development branch of the NSA, detailing the damage and data loss during a Chinese cyber attack on the Department of Defense. The presentation also sets out goals for…
This document contains extracts of a report created by GCHQ's Joint Threat Research and Intelligence Group. It highlights GCHQ's HUMINT (Human Intelligence) operations against targets in Zimbabwe and Argentina. These operations are said to involve…
This document from the GCHQ internal wiki presents the event log from Jan 17 2011 - Jan 19 2011 for an operation titled HIGHLAND FLING. Events in this document refer to the tracking of employees at the Netherlands-based SIM card company, Gemalto.
This document is an extract from an NSA report describing the nature of the relationship operating between American and Swedish intelligence agencies. It specifically relates to agreements between the NSA and the FRA (Swedish National Defence Radio…
This NSA document is a final version of the agenda detailing plans for a conference hosted by the NSA, attended by high ranking officials in the German BND (Federal Intelligence Service) and the NSA.
This document is an extract from a report created by the Network Analysis Centre (NAC). It provides a review of the agency's offensive cyber operations during the first quarter of 2011. It describes offensive cyber operations against targets in…