This document is a DSD presentation describing Australia's Defence Signals Directorates' (now the Australian Signals Directorate) efforts to intercept the communications of various Indonesian politicians, including the president, Susilo Bambang…
This document is a technical brief on decryption, specifically outling a "technique that can deanonymisc TOR web-browsing." TOR (The Onion Router) is "used by individuals and organisations that want to hide the originating IP address of their…
This document is a presentation on a potential approach to circumventing TOR (The Onion Router) which allows users to remain anonymous on the web. The presentation explores one method of correlating TOR "exit node traffic, and traffic between client…
This document is an extract from a GCHQ programme report that discusses decryption research and development for accessing "A5/3 enciphered GSM air-interface." The programme name is OPULENT PUP.
This document is a GCHQ report detailing the cable access points utilized by GCHQ to intercept communications using the infrastructure of major British telecommunications companies.
This document contains internal NSA training material, explaining in detail the procedures governing the access, sharing, dissemination and retention of surveillance information, as it relates to the NSA's Business Records (BR) and Pen Register Trap…
This document is a presentation prepared by GCHQ. It describes, in broad terms, the agency's visision for their surveillance capabilities by the year 2013.
This document is an internal presentated prepared by an official within the NSA. it describes the basics of HTTP protocol and how to target and exploit this using the XKEYSCORE query and analysis tool.
This document is an internal presentated prepared by an official within the NSA. it describes the basics of HTTP protocol and how to target and exploit this using the XKEYSCORE query and analysis tool.