This document is a monthly report from an entity within the NSA referred to as "SUSLOW." This document collates news about intelligence in New Zealand, such as changes to governing intelligence legislation, and the development of the capabilities of…
This document is a NSA classification guide detailing the appropriate security classifications for describing different elements of the NSA/BND partnerships, including the Joint SIGINT Activity (JSA), Special US Liason Activity Germany (SUSLAG), and…
This document is an internal GCHQ presentation. It describes the agency's efforts to scale their surveillance activity using data stores at various GCHQ sites across the UK.
This document is a study which overviews the key elements of the NSA's Co-Traveler analytics programs. Co-Traveler is a blanket term used when describing bulk location information processing. The report includes a description of the analytic, its…
This document is an extract from an internal GCHQ presentation. It describes the accomplishments of an attack against the SIM card manufacturer Gemalto, retrieving encryption keys used in mobile communications.
This document is an abstract for a CIA presentation. This presentation focused on the exploitation of vulnerabilities in Xcode 4.1, the proprietary code used to compile MacOS X applications and kernel extensions as well as iOS applications used in…
This report documents the strategic accomplishments of the National Counterterrorism Center's Directorate of Terrorist Identities (DTI) for 2013. It refers to the expansion of the TIDE (Terrorist Identities Datamart Environment) system, biometric…
This article, from the NSA's SIDtoday newsletter, describes the success of a hands-on interception program. Shipments of computer network devices (servers, routers, etc.), en route to target locations, are intercepted and physically implanted with…
This document is an extract from an internal GCHQ presentation. It provides statistics and summaries for the data identified in various mobile phone networks retrieved using compromised SIM encyption keys gained from an attack on the SIM card…