This document is an update from an internal intelligence community discussion group for media, including both the NSA and GCHQ. The topic is a summary of the main take aways of the recent IETF - Internet Engineering Task Force conference and…
This presentation outlines the focus of GCHQ's developing Cyber Defence Mission. It also includes a map of the Northern Hemisphere indicating how many malware events are collected by GCHQ every day.
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…
This document is from the NSA internal newsletter, SIDtoday. It discusses the progress of Human Language Technology (HLT) research, focussing on projects in Afghanistan, and Latin America. It also indicates the future potential of HLT.
This document is a power point presentation from the GCHQ, outlining different event analysis products, including SOCIAL ANTHROPOID, LUSTRE, SAMUEL PEPYS, and GUIDING LIGHT. It includes screen shots of query forms and result lists.
This document is a Report created by the NSA. It describes attempts to exploit weaknesses in anti-virus systems created by the Russian company, Kapersky Lab.
This document is a training course manual from the NIOC (Navy Information Operations Command) Maryland, for computer network operations. It provides background on the need for computer network operations training (due to the risk of cyber conflict),…
This document contains two slides detailing the computer network operations programs which intercept, passively and actively, communications as they "transit the globe." Diagrams also show the "automated management and control" of surveillance…