Browse Items (626 total)

20150305-nzherald-gcsb_sigint_development_quarterly_report_0.pdf
This document is an internal quarterly report created by New Zealand's Government Communications Security Bureau (GCSB), addressed to the Deputy Director of Signals Intelligence. It describes the agency's development of SIGINT operations against New…

20150219-Intercept-Dapino Gamma Gemalto Yuaawaa Wiki.pdf
This document appears to be an extract from a GCHQ wiki article. It describes Gemalto's Yuaawaa secure file sharing device, and GCHQ attempts to gain access to it.

20140618-der_spiegel-report_on_data_exchange_between_the_nsa_and_bnd_within_the_jsa_framework.pdf
This NSA document describes the partnership between the BND and the NSA - through SUSLAG - in collaborating on data processing technology developement and anaylst training.

20131230-spiegel-qfire.pdf
This document is an internal NSA presentation that describes QUANTUMTHEORY program. This program leveraged the NSA's system of passive sensors in order to detect and disrupt internet traffic. It also introduces QFIRE, a consolidated QUANTUMTHEORY…

20130809-guard-702_glossary.pdf
This document is an extract from a NSA glossary. The FISA Amendments Act (FAA), Section 702 is described, including the NSA's rationale for permitting the surveillance targeting of non-US citizens situated outside te USA. The document also describes…

20150928-intercept-gold_medal_support_for_olympic_games.pdf
This document is a release from the internal NSA newsletter, SIDtoday. It outlines the collaborative effort for tracking and collecting communications intelligence during the 2004 Athens Olympics, and names many of the NSA units involved.

20131210-wapo-gsm_classification_guide.pdf
This document is a classification guide relating to elements of the NSA's GSM (Global System for Mobile Communications) surveillance programs. It relates specifically to the harvesting and processing of mass bulk location information produced by…

20150701-intercept-guide_to_using_contexts_in_xks_fingerprints.pdf
This document is an internal NSA memo that outlines the use of contextual logic expressions when using the XKEYSCORE data analysis tool.

20150701-intercept-guide_to_using_contexts_in_xks_fingerprints.pdf
This document is an internal NSA memo that outlines the use of contextual logic expressions when using the XKEYSCORE data analysis tool.

20140312-intercept-five_eyes_hacking_large_routers.pdf
This document is an internal NSA memo. It describes current operations by the NSA and other Five Eyes intelligence agencies involving hacking large internet routers.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2