This document is an extract from an internal NSA presentation. It outlines how NSA analysts used the data analysis tool XKEYSCORE to gain access to the talking points of the U.N. Secretary General prior to their meeting with President Barack Obama.
This document is an extract from an internal NSA presentation. It outlines how NSA analysts used the data analysis tool XKEYSCORE to gain access to the talking points of the U.N. Secretary General prior to their meeting with President Barack Obama.
This document is an extract from a newsletter created by GCHQ's JTRIG division. It describes the planning processes behind operation QUITO, an effort to manipulate Latin American public opinion regarding the country's claims to the Falkland Islands /…
This document is an internal presentation prepared by officers at GCHQ. It establishes the legal framework of surveillance activities performed by British intelligence agencies, notably GCHQ. It also outlines the features of the BROAD OAK database…
This document is a report on the development of OPTIC NERVE, a web interface used to display Yahoo Webcam images. It also describes the procedures put in place by GCHQ to control exposure to "undesirable" webcam imagery.
This document is a presentation that outlines the OSINT fusion project, performed in tandem by contractors of the NSA and GCHQ. The OSINT fusion project aims to compile OSINT (open source intelligence) enabling analysts to further perform computer…
This document is an NSA presentation prepared by the Special Collection Service division in preparation for the Pacific Sigdev Conference held in March 2011. It describes the organizational structure of the division, including key strategic…
This document contains presentation slides from a CSEC presentation at the NSA SIGDEV conference in 2010. The deck provides an overview of CSEC's CCNE (counter computer network exploitation) team and its operations, applications and examples. The…
This document is a report that describes the introduction of an automated approach to retrieving Individual Subscriber Authentication Keys (KIs) from networks of the SIM card manufacturer Gemalto, which was compromised by a GCHQ CNE (Computer Network…