Browse Items (626 total)

20140430-intercept-gchq_visit.pdf
This document is a NSA briefing on the potential political talking points and "landmines"for NSA officials to be aware of in preparation for the visit of GCHQ Director Iain Lobban.

20131230-spiegel-tao_intro.pdf
This document is an internal NSA presentation that describes the structure, operations and resources of the Tailored Access Operations (TAO) division. It includes personnel lists, office and facility maps, and key operations. It also describes…

20150310-Intercept-TPM Vulnerabilities to Power Analysis and An.pdf
This document is an abstract for a presentation created by the CIA. The presentation focused on exploiting vulnerabilities within Microsoft's Bitlocker encrypted metadata software system.

20150528-intercept-cognitive_overflow.pdf
This document is a memo prepared by an official in the NSA. It describes the "channel capacity" of the NSA's Signals Intelligence Directorate (SID). This capacity refers to the divisions ability to meaningfully analzye the amounts of data that it…

20140618-der_spiegel-report_on_the_beginnings_of_the_european_security_center_esc_in_the_dagger_complex.pdf
This document is a US Army release announcing the European Security Center (ESC) - a US Army led SIGINT producer in Darmstadt, Germany.

20140618-der_spiegel-restrictions_on_the_technical_surveillance_performed_by_jsa.pdf
This document contains pages from a website outlining the governmental web domains and private business sites restricted from the Joint Signals Activity (JSA) US-German intelligence partnership.

20130605-guard-verizon_215_secondary_order.pdf
This document contains a court order signed by the judge of the Foreign Intelligence Surveillance Court, Roger Vinson. The order compels the telecommunications company Verizon to produce "tangible things" to the National Security Agency. These…

20150622-intercept-reverse_engineering_-_gchq_wiki.pdf
This document is an article retrieved from GCHQ's internal Wiki, GCWiki. It outlines the operations of GCHQ's TEA-RE Reverse Engineering team, who provide the NSA with research and development into a variety of cyrptographic related products and…

20131119-odni-nsa_course_materials_module_5_v.24.pdf
This document contains internal NSA training material, explaining in detail the separation between the role of analyst and technician work roles as it relates to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata…

20150622-intercept-software_reverse_engineering_gchq.pdf
This document is a report outlining GCHQ's reverse engineering operations, targeting both malicious code (i.e. malware) and non-malicious code (i.e. commercially available products and tools). The report also outlines GCHQ's understanding of the…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2