Browse Items (626 total)

20150402-Intercept-GCHQ Mission Driven Access Workshop.pdf
This document is an extract from a presentation developed by the GCHQ's Bude station. It describes the "Mission Driver" behind GCHQ operations in Latin America. a key objective appears to be manipulating Latin American public opinion behind…

20130710-wapo-upstream.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from several U.S. Internet companies: Microsoft (since 2007), Yahoo!…

20141125-sz-windstop_system_highlights.pdf
This document is an extract from a presentation created by the NSA's Special Source Operations (SSO) division. It describes the key operational developments in the WINDSTOP program, including the implementation of an upgrade to the XKEYSCORE tool and…

20150925-intercept-qfd_blackhole_technology_behind_inoc.pdf
This document is a presentation from the GCHQ Applied Research Unit. It includes images and graphs illustrating bulk web data collection, and gives an brief overview of the programs which are used to query and analyse this data.

20140207-nbc-gchq_honey_trap_cyber_attack_background_on_jtrig.pdf
This is a document prepared by GCHQ's Joint Threat Research Intelligence Group (JTRIG) for the 2012 SIGDEV conference. It describes the main objectives of JTRIG and some of the techniques and devices used to achieve them. It describes ways in which…

20140618-der_spiegel-report_on_the_surveillance_of_african_countries_by_jsa.pdf
This NSA document gives an overview of the JSA - Joint Signals Activity - an NSA/BND intelligence partnership and their joint intelligence work in North Africa.

20150117-speigel-csec_document_on_the_handling_of_existing_trojans_when_trojanizing_computers.pdf
This document contains presentation slides from a CSEC presentation at the NSA SIGDEV conference in 2010. The deck provides an overview of CSEC's CCNE (counter computer network exploitation) team and its operations, applications and examples. The…

20140211-intercept-drones_intercepting_communications.pdf
This document is a series of extracts from an NSA report. It describes the GILGAMESH and VICTORYDANCE programs, which were efforts to use new geolocation algorithms in collaboration with the CIA's drone assassination program. It describes the…

20140329-der_spiegel-gchq_and_nsa_spy_on_heads_of_state.pdf
This document is a list prepared by the NSA Center for Content Extraction. It consists of foreign chief-of-states whose information has been collected by the NSA. The list also alludes to the amount of information (number of citations) collected for…

20150210-intercept-iran_current_topics_-_interactions_with_gchq.pdf
This document is a memo describing key "talking points" relating to the NSA's surveillance activities against Iran, and the NSA's understanding of Iran's surveillance and information warfare capabilities.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2