This document is a technical brief on decryption, specifically outling a "technique that can deanonymisc TOR web-browsing." TOR (The Onion Router) is "used by individuals and organisations that want to hide the originating IP address of their…
This document is a CSEC presentation deck giving an overview of LEVITATION, "a behaviour-based target discovery project." LEVITATION is used to identify targets based on documents downloaded from free file upload (FFU) services such as Sendspace and…
This document is a presentation describing GCHQ's FLYING PIG Program, a means of monitoring secure TLS / SSL computer networks through "MiTM" or "Man in the Middle" attacks where data is routed to a government server and then relayed to its…
This document is a study which overviews the key elements of the NSA's Co-Traveler analytics programs. Co-Traveler is a blanket term used when describing bulk location information processing. The report includes a description of the analytic, its…
This document is a spreadsheet containing "the collated CNE (computer network exploitation) user requirements captured by the Endpoint initiative lead." The spreadsheet lists requirements with their priority, the amount of innovation needed to…
This document is a memo detailing the composition and operations of GCHQ's Intrusion Analysis (IA) team. It forms part of the Joint Electronic Attack Cell (JeAC).
This document is a NSA presentation from the 2010 SIGDEV Conference, which discusses tracking a "carrier's technical evolution" using IR.21 and other data. This informaiton is aimed to help forecast targets.
This document is a presentation demonstrating the NSA's mass untargeted collection and analysis of SMS text messages. It gives figures demostrating the programs reach. Collection data includes VCARDS, Geocoordinates, Missed Calls, SIM Card Changes,…
This document is a briefing posted to the NSA's internal website detailing the upcoming UN Climate Control Conference and the broad goals for overcoming a divide between developed and developing countries. The document refers to surveillance…