This document is a presentation demonstrating the NSA's mass untargeted collection and analysis of SMS text messages. It gives figures demostrating the programs reach. Collection data includes VCARDS, Geocoordinates, Missed Calls, SIM Card Changes,…
This document is a study which overviews the key elements of the NSA's Co-Traveler analytics programs. Co-Traveler is a blanket term used when describing bulk location information processing. The report includes a description of the analytic, its…
This document is a presentation describing GCHQ's FLYING PIG Program, a means of monitoring secure TLS / SSL computer networks through "MiTM" or "Man in the Middle" attacks where data is routed to a government server and then relayed to its…
This document contains a presentation prepared by the NSA analyzing the TOR router. TOR is a service designed to protect online anonymity partially funded by the US due to its use by dissents in repressive regimes such as Syria and China. The NSA's…
This document is an extract from an NSA brief referring to the status of New Zealand's GCSB underwater cable surveillance program SPEARGUN phase 1. The document notes that the program is awaiting legislation expected in July 2013, and will begin…
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Italy in a 6 day period between December 18 and December 24 2012.
This document is a classification guide for the NSA's quantum computing research program. The guide outlines the security levels of the specific aspects of the program, from an unclassified level that acknowledges the fact that the NSA conducts…