Browse Items (626 total)

20150815-nyt-att-fairview-stormbrew.pdf
This collection of documents, which range from 2003 to 2013, includes NSA presentations and internal communications concerning Special Source Operations (SSO). The presentations provide information about the main commercial telecommunications…

20141214-intercept-gchq_nac_review_january_march_2012.pdf

20141125-sz-cne_endpoint_project_load.pdf
This document is a GCHQ project overview for the EndPoint project, a GCHQ CNE (Computer Network Exploitation) program. This document describes exploitation of Flag Telecom's linux infrastructure to retrieve weekly router monitoring webpages and perf…

20150505_intercept_rt10-overview.pdf
This document is an NSA powerpoint presentation from June 2006 that discusses plans for the program RT-10 (REAL TIME) for converged intelligence workflows, great efficiencies in analysis and improved bulk data processing technologies. These slides…

20150928-intercept-nsa_team_selected_for_olympics_support.pdf
This document is an article from the internal NSA newsletter, SIDtoday. It describes the hiring process for the NSA Olympics Support Team, as well as briefly noting collaboration with many foreighn partners in the European Union.

20150518_intercept_jtac-attack-methodology-team.pdf
This document is from the GCwiki, an internal information resource of the GCHQ. This entry gives an overview of the JTB team in JTAC, which is the "thematic assessment team for Islamist Attack Methodogy. The JTB team provides "all-source intelligence…

20150622-intercept-software_reverse_engineering_gchq.pdf
This document is a report outlining GCHQ's reverse engineering operations, targeting both malicious code (i.e. malware) and non-malicious code (i.e. commercially available products and tools). The report also outlines GCHQ's understanding of the…

20131119-odni-nsa_course_materials_module_5_v.24.pdf
This document contains internal NSA training material, explaining in detail the separation between the role of analyst and technician work roles as it relates to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata…

20150622-intercept-reverse_engineering_-_gchq_wiki.pdf
This document is an article retrieved from GCHQ's internal Wiki, GCWiki. It outlines the operations of GCHQ's TEA-RE Reverse Engineering team, who provide the NSA with research and development into a variety of cyrptographic related products and…

20130605-guard-verizon_215_secondary_order.pdf
This document contains a court order signed by the judge of the Foreign Intelligence Surveillance Court, Roger Vinson. The order compels the telecommunications company Verizon to produce "tangible things" to the National Security Agency. These…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2