Browse Items (626 total)

20140311-nyt-nsa_memo_expands_access_to_fisa_information.pdf
This document is an NSA staff processing form addressed to the SIGINT Director of the NSA's Signals Intelligence Directorate (SID). It requests SID approval for the Cryptanalis and Exploitation Division (CES) at the Cryptologic Centers (CCs) in…

20150925-intercept-architecture_risk_2012.pdf
This document is a summary of a report prepared by GCHQ. It analyzes GCHQ's broader surveillance architecture in light of "changes in mission and changes in external environment", and how the agency should repsond to these changes over time.

20150622-intercept-reverse_engineering_-_gchq_wiki.pdf
This document is an article retrieved from GCHQ's internal Wiki, GCWiki. It outlines the operations of GCHQ's TEA-RE Reverse Engineering team, who provide the NSA with research and development into a variety of cyrptographic related products and…

20150622-intercept-reverse_engineering_-_gchq_wiki.pdf
This document is an article retrieved from GCHQ's internal Wiki, GCWiki. It outlines the operations of GCHQ's TEA-RE Reverse Engineering team, who provide the NSA with research and development into a variety of cyrptographic related products and…

20150925-intercept-demystifying_nge_rock_ridge.pdf
This document is an internal GCHQ presentation. It describes ROCKRIDGE, which is a GCHQ program that seeks to improve the agency's capabilities to ingest more data and provide more comprehensive analytics utilizing the BLACK HOLE content depository.

20150310-Intercept-ROCOTO Implanting the Iphone.pdf
This document is an abstract of a presentation prepared by the CIA. It describes ROCOTO, which is a codeword for the agencies efforts to create surveillance tools for the iPhone 3G.

20150701-intercept-rwc_updater_readme.pdf
This document contains a readme for Royale With Cheese Updater, a service used to maintain and update XKEYSCORE dictionaries.

20150505_intercept_rt10-overview.pdf
This document is an NSA powerpoint presentation from June 2006 that discusses plans for the program RT-10 (REAL TIME) for converged intelligence workflows, great efficiencies in analysis and improved bulk data processing technologies. These slides…

20140618-der_spiegel-nsacss_presentation_on_technical_surveillance_in_europe_and_africa.pdf
This document is a NSA presentation giving an overview on the strategic analytics affecting Europe and Africa. Gives details on various challenges and cases, as well as a disucussion on different initiatives for collection and processing.

20150310-Intercept-Secure Key Extraction By Physical De Processing.pdf
This document is an abstract for a presentation created by the CIA. This presentation focused on describing methods to physically extract the Global ID (GID) key from iPhones and other Apple devices.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2