Browse Items (626 total)

20131126-wapo-microsoft_cloud_exploitation.pdf
This document is an extract from an NSA presentation. It describes SERENDIPITY, which was seemingly an effort by the NSA to target Microsoft for similar SIGINT sourcing programs that affected Google and Yahoo. These slides show efforts to intercept…

20141010-intercept-cno_core_secrets_security_structure.pdf
This document is a NSA diagram describing the security classification of various components of the SENTRY EAGLE program. SENTRY EAGLE is a blanket term for the NSA's surveillance programs with a security clearance of ECI (Exceptionally Controlled…

20140312-intercept-turbine_and_turmoil.pdf
This document contains two slides detailing the computer network operations programs which intercept, passively and actively, communications as they "transit the globe." Diagrams also show the "automated management and control" of surveillance…

20150925-intercept-sensitive_targeting_authorisation.pdf
This document is an approval form used by the GCHQ to request surveillance approval for individuals with "a sensitive nationality or in a sensitive location." It provides details on tasking and datamining of individuals both inside and outside of the…

20140312-intercept-nsa_selector_types.pdf
This document contains one NSA slide listing the possible data selectors through which the NSA identifies possible surveillance targets. Possible selectors include email ids from popular services such as Google, MSN, and Hotmail; IP addresses; Device…

20131211-svt-accomplishments_from_nsa.pdf
This document is an extract from a NSA presentation describing the nature of the NSA's intelligence relationship with Sweden. It mentions Swedish intelligence service's assistance with the QUANTUM program.

20150310-Intercept-Secure Key Extraction By Physical De Processing.pdf
This document is an abstract for a presentation created by the CIA. This presentation focused on describing methods to physically extract the Global ID (GID) key from iPhones and other Apple devices.

20140618-der_spiegel-nsacss_presentation_on_technical_surveillance_in_europe_and_africa.pdf
This document is a NSA presentation giving an overview on the strategic analytics affecting Europe and Africa. Gives details on various challenges and cases, as well as a disucussion on different initiatives for collection and processing.

20150505_intercept_rt10-overview.pdf
This document is an NSA powerpoint presentation from June 2006 that discusses plans for the program RT-10 (REAL TIME) for converged intelligence workflows, great efficiencies in analysis and improved bulk data processing technologies. These slides…

20150701-intercept-rwc_updater_readme.pdf
This document contains a readme for Royale With Cheese Updater, a service used to maintain and update XKEYSCORE dictionaries.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2