This document is a DSD presentation describing Australia's Defence Signals Directorates' (now the Australian Signals Directorate) efforts to intercept the communications of various Indonesian politicians, including the president, Susilo Bambang…
This document is a presentation detailing requirements, proposed solutions, status, workflows and issues/risks of a current decryption program, involving the applications TURMOIL, GALLANTWAVE, and XKEYSCORE.
This document contains notes from a NSA employee on their work and travel to the DSD. The notes include progress reports on two projects, the first being a tool to use against Windows file systems, and the second involving an implant that grants…
This document is a NSA release announcing the NSA International Security Issues collaboration success in acheiving the "first-ever computer network exploitation against Turkish leadership."
This document is a presentation from the NSA's Threat Operations Center (NTOC) on methods for intergrated cyber operations, including the applications TURBINE, TUTELAGE, and QUANTUM. The document gives various case studies and lists future work.
This document is a memorandum of understanding between the NSA and Israel's National SIGINT National Unit. As part of this agreement, Israeli intelligence agencies are given minimized and unminimized raw SIGINT without removing information about US…
This document is an internal NSA presentation. It outlines the best strategies for targeting web forums for surveillance using the XKEYSCORE and PINWALE query systems.
This NSA document provides a briefing on SENTRY EAGLE, the NSA and JFCC-NW's compartmented program for surveillance programs with ECI (Exceptionally Controlled Information). SENTRY EAGLE contains the following sub-programs: SENTRY OWL: NSA…
This document is an extract from a draft report created by the Defence Signals Directorate (Australia), addressed to the Communications Security Establishment Canada (Canada). It describes the conditions under which DSD are permitted to share bulk,…