Browse Items (626 total)

20131117-guardian-dsd_3g.pdf
This document is a DSD presentation describing Australia's Defence Signals Directorates' (now the Australian Signals Directorate) efforts to intercept the communications of various Indonesian politicians, including the president, Susilo Bambang…

20140618-der_spiegel-nostalgic_recollections_from_nsa_workers_formerly_stationed_in_bad_aibling.pdf
This NSA newsrelease contains former Bad Aibiling NSA staff memories from their time at the station.

20141228-speigel-a_potential_technique_to_deanonymise_users_of_the_tor_network_0.pdf
This document is a technical brief on decryption, specifically outling a "technique that can deanonymisc TOR web-browsing." TOR (The Onion Router) is "used by individuals and organisations that want to hide the originating IP address of their…

20141228-spiegel-explanation_of_a_potential_technique_to_deanonymise_users_of_the_tor_network.pdf
This document is a presentation on a potential approach to circumventing TOR (The Onion Router) which allows users to remain anonymous on the web. The presentation explores one method of correlating TOR "exit node traffic, and traffic between client…

20141204-intercept-opulant_pup_encryption_attack.pdf
This document is an extract from a GCHQ programme report that discusses decryption research and development for accessing "A5/3 enciphered GSM air-interface." The programme name is OPULENT PUP.

20141125-sueddeutsche-access_breakdown.pdf
This document is a GCHQ report detailing the cable access points utilized by GCHQ to intercept communications using the infrastructure of major British telecommunications companies.

20131119-odni-nsa_course_materials_module_4_v.28.pdf
This document contains internal NSA training material, explaining in detail the procedures governing the access, sharing, dissemination and retention of surveillance information, as it relates to the NSA's Business Records (BR) and Pen Register Trap…

20150925-intercept-access_vision_2013.pdf
This document is a presentation prepared by GCHQ. It describes, in broad terms, the agency's visision for their surveillance capabilities by the year 2013.

20150701-intercept-advanced_http_activity_analysis.pdf
This document is an internal presentated prepared by an official within the NSA. it describes the basics of HTTP protocol and how to target and exploit this using the XKEYSCORE query and analysis tool.

20150701-intercept-advanced_http_activity_analysis.pdf
This document is an internal presentated prepared by an official within the NSA. it describes the basics of HTTP protocol and how to target and exploit this using the XKEYSCORE query and analysis tool.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2