Browse Items (626 total)

20150219-Intercept-Dapino Gamma CNE Presence Wiki.pdf
This document appears to be an extract from an internal GCHQ wiki article. It describes how GCHQ made use of the SIM card manufacturer Gemalto's computer network after gaining access through a CNE (Computer Network Exploitation) attack.

20150925-intercept-data_stored_in_black_hole.pdf
This document is an internal GCHQ wiki page. It describes BLACK HOLE, a data repository holding a variety of differnent data sources including: webmail, email transfers, ftp transfers, internet browsing metadata and website logins. The document also…

20140519-intercept-dea_warfighter.pdf
This document is a news article posted to the NSA's internal newsletter, SIDtoday. It describes the operations of the Drug Enforcement Administration (DEA) and the relationship between this agency's counternarcotics operations and other agency's…

20140610-cryptome-dea-nsa-sandkey.pdf
This document is an extract from a report describing the joint DEA / NSA SANDKEY program. SANDKEY targets unencrypted voice communications of drug-traffickers at sea. This document displays the location and operational status of the program's FCC -…

20150505_intercept_sidtoday-tsunami-of-intercept-final.pdf
This document is an article from a NSA internal newsletter, SIDtoday. Originating from the Human Lanaguage Technology division of the NSA, the artice discusses the future of Human Language Technology (HLT) as an aid in bulk data collection. Two major…

20150505_intercept_sidtoday-tsunami-of-intercept-final.pdf
This document is an article from a NSA internal newsletter, SIDtoday. Originating from the Human Lanaguage Technology division of the NSA, the artice discusses the future of Human Language Technology (HLT) as an aid in bulk data collection. Two major…

20150701-intercept-deepdive_readme.pdf
This document is a readme for DEEPDIVE, a means of establishing a "filter" in front of a traditional server using XKEYSCORE, a data analysis tool used by the NSA.

20150117-spiegel-overview_on_the_nsa_use_of_bots_and_the_defiantwarrior_program.pdf
This document is a presentation deck giving an overview of the NSA's techniques for detecting bots and using bots in their CNE operations. The document discusses the main uses for bots and bot herding, how they can be used in SIGINT, future hopes and…

20150310-Intercept-Differential Power Analysis on the Apple A4.pdf
This document is an abstract for a presentation by the CIA. It describes the CIA's attempts to subvert the A4 Processor used by Apple in the iPhone 4, the iPod touch, and the first generation iPad.

20140618-dagbladet-keith_alexander_talking_points.pdf
This document contains notes for the opening remarks offered by former NSA Director, Keith Alexander at the 2013 DENUSA conference in Copenhagen, Denmark.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2