Browse Items (626 total)

20150701-intercept-intro_to_xks_appids_and_fingerprints.pdf
This document is an internal NSA presentation. It outlines the features available to the NSA's XKEYSCORE data analysis tool in exploiting web applications.

20131211-svt-xkeyscore_sweden_meeting.pdf
This document is an internal NSA memo ahead of an annual summit meeting between NSA chief Keith Alexander and the chief of the FRA, Ingvar Akesson. The meeting took place between 24 - 26 April 2013. It describes the state of the intelligence…

20150528-intercept-too_many_choices.pdf
This document is a memo created by an official within the Signals Intelligence Directorate (SID) of the NSA. In it, the author describes "analysis paralysis", a situation where over analysis hinders developing coherent action. The article then goes…

20131211-svt-xkeyscore_sources.pdf
This is an extract of an internal NSA presentation. It describes the sources of information that are aggregated in the NSA's access-tool, XKEYSCORE.

20150622-intercept-gchq_ministry_stakeholder_relationships_spreadsheets.pdf
This document contains a selection of spreadsheets composed by GCHQ. Each spreadsheet identifies a specific UK government ministry, and contains information about the objectives of the office, and GCHQ's desired operations involving that department.…

20140914-spiegel-treasure_map_presentation.pdf
This document is an internal presentation prepared by the NSA's Threat Operations Center (NTOC). It describes TREASUREMAP, a massive internet mapping, exploration and analysis engine. Its aim was to create a fully interactive map of the internet…

20140207-nbc-gchq_honey_trap_cyber_attack_leveraging_foreign_journalists_via_jtrig.pdf
This document contains presentation slides prepared by GCHQ's Joint Threat Intelligence Research Group for the 2010 SIGDEV conference. They describe existing operations such as ROYAL CONCIERGE, an operation focused on exploiting hotel reservation…

20141228-spiegel-explanation_of_the_transform_engine_emulator_when_attacking_vpn.pdf
This document is a NSA WikiInfo page for the VPN Transform Engine Emulator, which helps in VPN exploitation.

20150219-Intercept-PCS Harvesting At Scale.pdf
This document is a report that describes the introduction of an automated approach to retrieving Individual Subscriber Authentication Keys (KIs) from networks of the SIM card manufacturer Gemalto, which was compromised by a GCHQ CNE (Computer Network…

20140430-intercept-prism_olympics.pdf
This document is a presentaion slide prepared by NSA Special Source Operations, detailing the training and approval for PRISM access granted to 100 GCHQ users during the 2012 Olympics and the status of the collection as of 24 May 2012.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2