Browse Items (626 total)

20150622-intercept-gchq_ministry_stakeholder_relationships_spreadsheets.pdf
This document contains a selection of spreadsheets composed by GCHQ. Each spreadsheet identifies a specific UK government ministry, and contains information about the objectives of the office, and GCHQ's desired operations involving that department.…

20131209-nyt-nsa_games.pdf
This document is a report created by GCHQ and the NSA's UK Satellite Station, MHS. It describes the (then) state of the video gaming industry. The potential use of this industry for recruitment into Islamic terrorist organizations is discussed, as…

20141228-spiegel-explanation_of_the_gallantwave_that_decrypts_vpn_traffic_within_longhaul.pdf
This document is a short presentation from the NSA Digital Network Crypt Applications unit (DNCA) describing expansions in scale and volume to the GALLANTWAVE decrpytion program.

20130830_cryptome_congressional_budget_2013.pdf
This document is a summary of the Office of the Director of National Intelligence's multivolume FY 2013 Congressional Budget Justification, also known as the "black budget". It covers the operations of the United States Intelligence Community, a…

20150518_intercept_fy13-black-budget-on-bin-laden-raid.pdf
This document is an excerpt from the Budget Justification for the FY 2013, prepared by the US Intelligence Community. This excerpt details the raid on Osama bin Laden's compound, generally referencing the many technologies and applications of imagery…

20140207-nbc-gchq_honey_trap_cyber_attack_leveraging_foreign_journalists_via_jtrig.pdf
This document contains presentation slides prepared by GCHQ's Joint Threat Intelligence Research Group for the 2010 SIGDEV conference. They describe existing operations such as ROYAL CONCIERGE, an operation focused on exploiting hotel reservation…

20140404-intercept-gchq_full_spectrum_cyber_effects.pdf
This document contains GCHQ presentation slides detailing the GCHQ Full-Spectrum Cyber Effects program, presented at the 2010 SIGDEV conference. The program includes computer network attacks, computer network information operations, and social media…

This document is an internal NSA presentation. It draws the distinction between retrieving full logs of digital network intelligence (DNI) data and retrieving HTTP activity requests when using the NSA's XKEYSCORE data analysis tool.

20150701-intercept-full_log_vs_http.pdf
This document is an internal NSA presentation. It draws the distinction between retrieving full logs of digital network intelligence (DNI) data and retrieving HTTP activity requests when using the NSA's XKEYSCORE data analysis tool.

20150701-intercept-free_file_uploaders.pdf
This document is an internal NSA presentation. It outlines strategies for using the XKEYSCORE data analysis tool to retrive intelligence data from free file uploader websites.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2