Browse Items (626 total)

20140709-Intercept-spying_on_muslim-american_leaders.pdf
This document is a series of NSA spreadsheets and presentation slides that illustrate surveillance activities being undertaken against foreign and domestic Islamic community leaders.

20150505_intercept_sidtoday-non-linguists-final.pdf
This document is an article from the NSA internal newsletter, SIDtoday. Originating from the NSA Center for Time-Sensitive Information, the article introduces Enhanced Video Text and Audio Processing (eViTAP) program to signals intelligence analysts.…

20141010-intercept-computer_network_exploitation_classification_guide.pdf
This document is a classification guide for NSA Computer Network Exploitation (CNE) programs.

20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf
This document contains Menwith Hill Station presentation slides from the 2010 SIGINT Development Conference. The slides outline the QUANTUMTHEORY program and its sub-programs, from legacy programs to those in experimental stages.

20140312-intercept-mhs_leverages_xkeyscore_for_quantum.pdf
This document describes experiments at the MHS base in Britain (Menwith Hill Satellite Station) with automated deep packet analysis of Yahoo and Hotmail to give insight into the potential success of QUANTUMTHEORY (data injection into a users system)…

20141125-sz-cable_regions.pdf
This document is a report listing the region, cable, location and capacity of telecommunications cables intercepted by GCHQ.

20150528-intercept-in_praise_of_not_knowing.pdf
This report was prepared by an official in the Signals Intelligence Directorate (SID) of the NSA. It criticizes some commonly held philosophical viewpoints within the administration of the NSA.

20140127-nbc-squeaky_dolphin.pdf
This document contains a presentation prepared by GCHQ that demonstrates the real-time monitoring of online activity, through a program called SQUEAKY DOLPHIN. This program uses data from a GCHQ unit, GTE - Global Telecoms Exploitation, which…

20150117-speigel-csec_document_about_the_recognition_of_trojans_and_other_network_based_anomaly_.pdf
This document is a CSEC presentation deck that summarizes the collaboration between "analysts and operators from CNE Operations, Cyber Counterintelligence and Global Network Detection" to provide both defensive and offensive CNE (computer network…

20131104-nyt-collection_accesses.pdf
This document is a chart showing the varied sources of 103 "accesses" to communications or computers collected in a single week in 2009 at the NSA's station in San Antonio, Texas.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2