Browse Items (626 total)

20150925-intercept-operational_engineering_november_2010_0.pdf
This document is a power point presentation from the GCHQ, outlining different event analysis products, including SOCIAL ANTHROPOID, LUSTRE, SAMUEL PEPYS, and GUIDING LIGHT. It includes screen shots of query forms and result lists.

20141010-intercept-exceptionally_controlled_information_listing.pdf
This document is a NSA list of programs that have a security classification of ECI (Exceptionally Controlled Information). It provides an abstract for each program, as well as identifying potentially overlapping programs.

20141010-intercept-eci_compartments.pdf
This document is a list of NSA surveillance projects that have an ECI (Exceptionally Controlled Information) security classification.

20140102-wapo-quantum_computers_hard_targets.pdf
This document is an extract from a larger document, the "black budget," detailing the research and technology behind two US signals and intelligence projects: "Penetrating Hard Targets" and "Owning the Net." Both projects are housed under the arm of…

20150117-speigel-document_about_the_expansion_of_the_remote_operations_center_roc_on_endpoint_operations.pdf
This document is an article from the internal NSA newsletter, SIDToday, discussing the new facilities planned for the ROC - Remote Operations Center. This new facility will enhance the NSA's endpoint operations capability, which work to "subvert…

20150928-intercept-exploiting_foreign_law_intercept_roundtable.pdf
This document discusses the types of lawful intercept used by the NSA, including access through special source operations. Lawful Intercept is defined as Èobtaining communications network data by legal authority for analysis or evidence.È A long list…

20150402-Intercept-Extended Enterprise Documents.pdf
This document is an extract from a report created by GCHQ. It describes NSA activities of interest for GCHQ relating to surveillance operations against Latin America.

20140128-guard-leaky_phone_apps.pdf
This document contain extracts from presentations by the NSA and GCHQ describing programs for mobile device tracking and surveillance. The slides outline the surveillance and collection capabilities for accessing mobile devices, which include:…

20130816-wapo-sso_news_article.pdf
This document is an article from SSO News, the Internal Newsletter of the NSA's Special Source Operations. It describes a ruling made on 3 October 2011, where a judge from the FISA Court argued that Upstream collection were in violation of the fourth…

20131204-wapo-fascia.pdf
This document shows the volumes and limits of the NSA's FASCIA database between the beginning of 2011 to June 2012. FASCIA is used to store the location information of mobile devices. Analysts query this database using the CHALKFUN tool. It also…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2