Browse Items (626 total)

20141125-sz-cables_where_we_want_to_be.pdf
This document lists the cable interceptions desired by GCHQ. The document lists the cable's name, relationship (i.e. owner) and the desired access and egress capacities.

20141125-sz-cables_where_we_are.pdf
This document is a report listing GCHQ's current operational telecommunications cable interceptions.

20141125-sz-cables_where_we_are.pdf
This document is a report listing GCHQ's current operational telecommunications cable interceptions.

20150219-Intercept-Where are These Keys.pdf
This document is an extract from an internal GCHQ presentation. It describes the operation of a traditional mobile telecommunications network, and the position of Individual Subscriber Authentication Keys (KI values) within it.

20150219-Intercept-Where are These Keys.pdf
This document is an extract from an internal GCHQ presentation. It describes the operation of a traditional mobile telecommunications network, and the position of Individual Subscriber Authentication Keys (KI values) within it.

20140815-Heise-HACIENDA-Program.pdf
This document is a selection of presentation slides prepared by GCHQ's Joint Threat Research Intelligence Group (JTRIG), CSEC and the NSA. They describe several surveillance programs. The first of these is HACIENDA, a program that involved port…

20150518_intercept_2011-05-17-sidtoday-what-does-the-death-of-usama.pdf
This document is an NSA article from the internal NSA newsletter SIDtoday. Written by the SIDtoday editor, the article is an interview with Jon Darby, Signals Intelligence (SID) Associate Deputy Director for Counterterrorism. The interview dicusses…

20140313-intercept-nsa_cooperative_third_party_relationships.pdf
This document is an internal NSA publication of an interview with the FAD's Deputy Assistant for SIGINT Operations discussing the relationships between NSA/Third Party nations intelligence partnerships.

20131119-odni-office_of_general_council_business_record_analyst_training_slides.pdf
This document is a presentation used in NSA training material. This presentation was designed for use by NSA personnel with access to the bulk telephony metadata acquired by the NSA pursuant to Section 501 of FISA, for purposes of performing…

20131119-odni-nsa_course_materials_intro_v.13.pdf
This document contains internal NSA training material. This document welcomes potential technicians and analysts to a course devoted to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2