Browse Items (626 total)

20150311-NZHerald-SUSLOW Monthly Report WARRIORPRIDE.pdf
This document is a monthly report from an entity within the NSA referred to as "SUSLOW." This document collates news about intelligence in New Zealand, such as changes to governing intelligence legislation, and the development of the capabilities of…

20140618-der_spiegel-guidelines_for_the_classification_of_suslag_details_and_the_nsa-bnd_cooperation.pdf
This document is a NSA classification guide detailing the appropriate security classifications for describing different elements of the NSA/BND partnerships, including the Joint SIGINT Activity (JSA), Special US Liason Activity Germany (SUSLAG), and…

20150925-intercept-200g_iris_access.pdf
This document is an internal GCHQ presentation. It describes the agency's efforts to scale their surveillance activity using data stores at various GCHQ sites across the UK.

20131210-wapo-cotraveler_overview.pdf
This document is a study which overviews the key elements of the NSA's Co-Traveler analytics programs. Co-Traveler is a blanket term used when describing bulk location information processing. The report includes a description of the analytic, its…

20150219-Intercept-CCNE Successes Jan10 Mar10 Trial.pdf
This document is an extract from an internal GCHQ presentation. It describes the accomplishments of an attack against the SIM card manufacturer Gemalto, retrieving encryption keys used in mobile communications.

20150310-Intercept-Strawhorse Attacking the Macos and Ios Software.pdf
This document is an abstract for a CIA presentation. This presentation focused on the exploitation of vulnerabilities in Xcode 4.1, the proprietary code used to compile MacOS X applications and kernel extensions as well as iOS applications used in…

20140805-Intercept-Directorate-of-Terrorist-Identities-Strategic-Accomplishments-2013.pdf
This report documents the strategic accomplishments of the National Counterterrorism Center's Directorate of Terrorist Identities (DTI) for 2013. It refers to the expansion of the TIDE (Terrorist Identities Datamart Environment) system, biometric…

20140311-nyt-classification_guide_for_stellarwind_program_0.pdf
This document is a classification guide for the NSA's STELLARWIND program.

20150117-spiegel-supply-chain_interdiction_-_stealthy_techniques_can_crack_some_of_sigints_hardest_targets.pdf
This article, from the NSA's SIDtoday newsletter, describes the success of a hands-on interception program. Shipments of computer network devices (servers, routers, etc.), en route to target locations, are intercepted and physically implanted with…

20150219-Intercept-CCNE Stats Summaries Jan10 Mar10 Trial.pdf
This document is an extract from an internal GCHQ presentation. It provides statistics and summaries for the data identified in various mobile phone networks retrieved using compromised SIM encyption keys gained from an attack on the SIM card…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2