This document is a draft report by the NSA's inspector general. It shows the development and operations of the Presidents Surveillance Program, a collection of surveillance programs began by George W Bush in the aftermath of September 11, 2001 and…
This document appears to be an extract from an internal GCHQ wiki article. It describes active operations against the SIM card manufacturer Gemalto's SIM personaliztion centers worldwide.
This document is a presentation created by Communications Security Establishment Canada (CSEC). It describes operation OLYMPIA, which as an effort to analyze the telecommunications traffic of Brazil's Ministry of Mines and Energy.
This document is an abstract of a presentation prepared by the CIA. It describes ROCOTO, which is a codeword for the agencies efforts to create surveillance tools for the iPhone 3G.
This document displays telecommunications data about load-sharing traffic between Iraq and R.O.W. (Turkey, Syria, Saudi Arabia, UAE, Egypt & UK) indicating a potential target: "This informal report has been issued to highlight IRAQ/UK load sharing…
This document is an extract from an internal NSA presentation. It describes the mission, resources and capabilities of the NSA, as well as identifying and classifying resources used to achieve key objectives.
This document contains two slides detailing the computer network operations programs which intercept, passively and actively, communications as they "transit the globe." Diagrams also show the "automated management and control" of surveillance…
This document is a training course manual from the NIOC (Navy Information Operations Command) Maryland, for computer network operations. It provides background on the need for computer network operations training (due to the risk of cyber conflict),…