Browse Items (626 total)

20130627-guard-nsa_oig_2009_report.pdf
This document is a draft report by the NSA's inspector general. It shows the development and operations of the Presidents Surveillance Program, a collection of surveillance programs began by George W Bush in the aftermath of September 11, 2001 and…

20150219-Intercept-Dapino Gamma Target Personalisation Centres.pdf
This document appears to be an extract from an internal GCHQ wiki article. It describes active operations against the SIM card manufacturer Gemalto's SIM personaliztion centers worldwide.

20131130-GlobeandMail-csec-br-spy.pdf
This document is a presentation created by Communications Security Establishment Canada (CSEC). It describes operation OLYMPIA, which as an effort to analyze the telecommunications traffic of Brazil's Ministry of Mines and Energy.

20150310-Intercept-ROCOTO Implanting the Iphone.pdf
This document is an abstract of a presentation prepared by the CIA. It describes ROCOTO, which is a codeword for the agencies efforts to create surveillance tools for the iPhone 3G.

20140831-spiegel-iraq_uk_load_sharing_carriers.pdf
This document displays telecommunications data about load-sharing traffic between Iraq and R.O.W. (Turkey, Syria, Saudi Arabia, UAE, Egypt & UK) indicating a potential target: "This informal report has been issued to highlight IRAQ/UK load sharing…

20131223-wapo-nsacss-mission.pdf
This document is an extract from an internal NSA presentation. It describes the mission, resources and capabilities of the NSA, as well as identifying and classifying resources used to achieve key objectives.

20141125-sz-partner_cables.pdf
This document is a GCHQ report listing their corporate partners assisting in telecommunications cable interception.

20150701-intercept-phone_number_extractor.pdf
This document is an internal NSA presentation. It outlines how the data analysis tool XKEYSCORE can be used to retrieve target's phone numbers.

20140312-intercept-turbine_and_turmoil.pdf
This document contains two slides detailing the computer network operations programs which intercept, passively and actively, communications as they "transit the globe." Diagrams also show the "automated management and control" of surveillance…

20150117-spiegel-nsa_training_course_material_on_computer_network_operations.pdf
This document is a training course manual from the NIOC (Navy Information Operations Command) Maryland, for computer network operations. It provides background on the need for computer network operations training (due to the risk of cyber conflict),…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2