Browse Items (626 total)

20130816-wapo-targeting_rationale.pdf
This document is a memo that explains the rationale used by the NSA in its selection of surveillance targets outside the US. The document contains actual examples of certification examples that indicate that the staff of foreign heads of state and…

20150219-Intercept-Dapino Gamma Target Personalisation Centres.pdf
This document appears to be an extract from an internal GCHQ wiki article. It describes active operations against the SIM card manufacturer Gemalto's SIM personaliztion centers worldwide.

20131210-wapo-target_location.pdf
This document is an excerpt from a transcript of an NSA training video. It describes how to verify the location of a targeted mobile device. It describes how the NSA monitors different types of mobile signaling information known as HLR and VLR…

20150925-intercept-tdi_introduction.pdf
This document is a presentation from the GCHQ Applied Research Unit. It discusses using target detection identifiers (TDI) to track targets online though various web events, including email, social media, webcam images, and other kinds of internet…

20131230-spiegel-tao_quantum_theory.pdf
This document is an internal NSA presentation that describes the functioning of QUANTUM. It also describes the operation of FOXACID in the QUANTUM tasking process, and how it infects machines with malicious programs.

20131230-spiegel-tao_intro.pdf
This document is an internal NSA presentation that describes the structure, operations and resources of the Tailored Access Operations (TAO) division. It includes personnel lists, office and facility maps, and key operations. It also describes…

20150521-cbc-synergising_network_analysis_tradecraft.pdf
This document, seemingly prepared by the Communications Security Establishment Canada, reveals the use of surveillance methods targeting UC Browser, a popular web app in India, China and North America. It describes a plugin to analyze and display…

20130928-nyt-syanpse.pdf
This document is a slide from an NSA presentation illustrating one of the ways in which the agency uses e-mail and telephony metadata to analyze the relationship networks of foreign intelligence targets. Connections between people are illustrated…

20131211-svt-xkeyscore_sweden_meeting.pdf
This document is an internal NSA memo ahead of an annual summit meeting between NSA chief Keith Alexander and the chief of the FRA, Ingvar Akesson. The meeting took place between 24 - 26 April 2013. It describes the state of the intelligence…

20131211-svt-final_agenda_sweden_usa.pdf
This document is the final agenda of the SWEDUSA Strategic Planning Conference, hosted on 24 - 26th April 2013. Attending this meeting was Ingvar Akesson, Director General of Sweden's FRA (National Defence Radio Establishment / Forsvarets…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2