Browse Items (626 total)

20131119-odni-nsa_cryptological_school_course_slides_on_legal_compliance_and_minimization_procedures.pdf
This document contains internal NSA training material, explaining the agency's legal, compliance, and minimization procedures. These course materials have been designed for NSA personnel that had access to bulk telephony and electronic communications…

20150323-CBC-CSEC Cyber Threat Capabilities.pdf
This document is a presentation prepared by CSEC. It describes CSEC's capabilities in CNE (Compter Network Exploitation) and CND (Computer Network Defense) operations. It also describes the EONBLUE cyber threat detection sensor.

20150323-CBC-CSEC SIGINT Cyber Discovery.pdf
This document is a presentation by CSEC that was presented to GCHQ at teh Discovery Conference in November 2010. It summarizes CSEC's current state of SIGINT Cyber Discovery operations. It also describes the WARRIORPRIDE, REPLICANTFARM, EONBLUE and…

20150117-speigel-csec_document_about_the_recognition_of_trojans_and_other_network_based_anomaly_.pdf
This document is a CSEC presentation deck that summarizes the collaboration between "analysts and operators from CNE Operations, Cyber Counterintelligence and Global Network Detection" to provide both defensive and offensive CNE (computer network…

20150518_intercept_nctc-current-status-of-major-terrorism-figures.pdf
This document is an extract from an NSA report detailing the current (as of June 2008) status and location of Usama Bin Laden and Ayman al-Zawahiri.

20131024-guard-phones_world_leaders.pdf
This document is a report authored by members of the NSA's Signals Intelligence Directorate. It describes the NSA's efforts to encourage US officials to share their personal contact databases (called "rolodexes") to provide contact information for…

20150925-intercept-crypt_defense_operations_legal_policy.pdf
This document is an internal GCHQ Wiki article. It outlines the legal and policy frameworks informing the activities of the agency's Cyber Defence Operations. It includes a description of the various sources of different data sources, the retention…

20140207-nbc-gchq_honey_trap_cyber_attack_background_on_jtrig.pdf
This is a document prepared by GCHQ's Joint Threat Research Intelligence Group (JTRIG) for the 2012 SIGDEV conference. It describes the main objectives of JTRIG and some of the techniques and devices used to achieve them. It describes ways in which…

20150323-CBC-Cyber Threat Detection.pdf
This document is a presentation created by CSEC. It describes CSEC's cyber threat detection operations, including the EONBLUE program and CND (Computer Network Defense) operations.

20150803-intercept-comsat_cyrpus_technical_capability.pdf
This document is an excerpt from a draft report produced by the GCHQ. It discusses the NSA/GCHQ operations in Cyprus, their technical capabilities, current initatives in COMSAT (communications satellite access), funding, governance, and facility…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2