Browse Items (626 total)

20131211-svt-xkeyscore_slide_with_swedish_example.pdf
This document is an extract from internal NSA training material. It shows the user-interface of XKEYSCORE, the NSA's tool for retrieving surveillance data. It shows an example query on Sweden, and methods to assure compliance with USSID-18.

20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod.pdf
This document consists of three NSA presentation slides outlining Content Extraction goals and challenges, including a redacted list of the top ten most frequent mentionend targets in their collection.

20150219-Intercept-CCNE Email Harvesting Jan10 Mar10 Trial.pdf
This document is an extract from an internal GCHQ presentation. It provides an example of an email harvested using SIM encryption keys compromised in a CNE attack on the SIM card manufacturer, Gemalto.

20150518_intercept_shape-weekly-report-01-jun-2011-r.pdf
This document is a report preparted by NATO's Supreme Headquarters Allied Powers Europe, it describes the military environment in Afghanistan in June 2011, after the assassination of Osama Bin Laden.

20131211-svt-legal_issues_uk_regarding_sweden_and_quantum.pdf
This document is an extract from notes for an internal NSA presentation. It describes key achievements made by the NSA's Signals Intelligence Directorare (SID) in 2013. Mention is made of the trilateral agreement existing between the NSA, GCHQ and…

This document is a report preparted by NATO's Supreme Headquarters Allied Powers Europe, it describes the military environment in Afghanistan in June 2011, after the assassination of Osama Bin Laden.

20150612-intercept-sidtoday_interview_with_a_sid_hacker.pdf
This document is an interview with a hacker employed by the NSA's Tailored Access Operations (TAO) Division to perform computer network exploitation (CNE) operations against targets, including Osama Bin Laden. It originally appeared in the Signals…

20150701-intercept-category_throttling.pdf
This memo outlines how to configure XKEYSCORE to support category throttling.

20131119-odni-nsa_course_materials_module_6_analytic_personal_v.18.pdf
This document contains internal NSA training material, explaining in detail the role of the intelligence analyst as it relates to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.

20141214-intercept-gchq_nac_review_july_sept_2011.pdf
This document is an extract from a progress report on a GCHQ computer network exploitation operation against the Belguim telecommunications company BELGACOM. It states that the Network Analysis Center (NAC) helped to infiltrate the devices of the…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2