Browse Items (626 total)

20150622-intercept-teca_product_centre_gchq_wiki.pdf
This document is an article from GCHQ's internal Wiki, GCWiki. It outlines the products made available to intelligence analysts by The Technical Enabling Access Product Centre (TECA). TECA is a division of GCHQ focused on reverse engineering…

20140831-spiegel-nsas_oldest_third_party_partnership.pdf
This document is a NSA release detailing the history and current partnership between Turkish and U.S intelligence operations. Intelligence sharing began in 1949 between the CIA and the Turkish Electronic and Technical Intelligence (ETI) and has…

20150803-intercept-comsat_background.pdf
This GCHQ document discusses the collaboration between the NSA and the GCHQ on initiatives in COMSAT (Communications satellites access). The report focuses on funding and budget concerns for the future of the projects.

20140312-intercept-multiple_methods_of_quantum.pdf
This document is a factsheet from the Office of SIGINT Development. It lists the various QUANTUM programs in operation or in live testing, including their success rate. Programs include diverse CNO (computer network operations) devised for SIGINT…

20140618-der_spiegel-excerpt_on_the_sharing_of_xkeyscore_with_german_intelligence_agency_bfv.pdf
This is an extract from an internal NSA presentation. It relates to the provision of XKEYSCORE analytics program to the German BfV (Federal Office for the Protection of the Constitution).

20150117-spiegel-supply-chain_interdiction_-_stealthy_techniques_can_crack_some_of_sigints_hardest_targets.pdf
This article, from the NSA's SIDtoday newsletter, describes the success of a hands-on interception program. Shipments of computer network devices (servers, routers, etc.), en route to target locations, are intercepted and physically implanted with…

20150117-spiegel-quantumtheory_is_a_set_of_technologies_allowing_man-on-the-side_interference_attacks_on_tcp-ip_connections_includes_straightbizarre_and_daredev.pdf
This document contains presentation slides from the 2010 SIGINT Development Conference outlining the QUANTUMTHEORY program and its sub-programs, from legacy to those in experimental stages.

20150701-intercept-xks_cipher_detection_and_you.pdf
This document is an internal presentation prepared by the NSA's Mathematics Research Group (MRG). It outlines the structure, features and examples of use of the XKEYSCORE data analysis tool. The presentation also describes the relations of XKEYSCORE…

20131126-wapo-microsoft_cloud_exploitation.pdf
This document is an extract from an NSA presentation. It describes SERENDIPITY, which was seemingly an effort by the NSA to target Microsoft for similar SIGINT sourcing programs that affected Google and Yahoo. These slides show efforts to intercept…

20141228-spiegel-explanation_on_the_spin9_program_on_end-to-end_attacks_on_vpn.pdf
This document is a presentation that reviews in detail the capabilities and constraints of the GCHQ program VPN SPIN 9 - a VPN decryption program. The document shows how the VPN service is connected to other SIGINT programs, maps out several…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2