Browse Items (626 total)

20150505_intercept_sidtoday-tsunami-of-intercept-final.pdf
This document is an article from a NSA internal newsletter, SIDtoday. Originating from the Human Lanaguage Technology division of the NSA, the artice discusses the future of Human Language Technology (HLT) as an aid in bulk data collection. Two major…

20150505_intercept_sidtoday-tsunami-of-intercept-final.pdf
This document is an article from a NSA internal newsletter, SIDtoday. Originating from the Human Lanaguage Technology division of the NSA, the artice discusses the future of Human Language Technology (HLT) as an aid in bulk data collection. Two major…

20140610-cryptome-dea-nsa-sandkey.pdf
This document is an extract from a report describing the joint DEA / NSA SANDKEY program. SANDKEY targets unencrypted voice communications of drug-traffickers at sea. This document displays the location and operational status of the program's FCC -…

20140519-intercept-dea_warfighter.pdf
This document is a news article posted to the NSA's internal newsletter, SIDtoday. It describes the operations of the Drug Enforcement Administration (DEA) and the relationship between this agency's counternarcotics operations and other agency's…

20150925-intercept-data_stored_in_black_hole.pdf
This document is an internal GCHQ wiki page. It describes BLACK HOLE, a data repository holding a variety of differnent data sources including: webmail, email transfers, ftp transfers, internet browsing metadata and website logins. The document also…

20150219-Intercept-Dapino Gamma CNE Presence Wiki.pdf
This document appears to be an extract from an internal GCHQ wiki article. It describes how GCHQ made use of the SIM card manufacturer Gemalto's computer network after gaining access through a CNE (Computer Network Exploitation) attack.

20150803-intercept-comsat_cyrpus_technical_capability.pdf
This document is an excerpt from a draft report produced by the GCHQ. It discusses the NSA/GCHQ operations in Cyprus, their technical capabilities, current initatives in COMSAT (communications satellite access), funding, governance, and facility…

20150323-CBC-Cyber Threat Detection.pdf
This document is a presentation created by CSEC. It describes CSEC's cyber threat detection operations, including the EONBLUE program and CND (Computer Network Defense) operations.

20140207-nbc-gchq_honey_trap_cyber_attack_background_on_jtrig.pdf
This is a document prepared by GCHQ's Joint Threat Research Intelligence Group (JTRIG) for the 2012 SIGDEV conference. It describes the main objectives of JTRIG and some of the techniques and devices used to achieve them. It describes ways in which…

20150925-intercept-crypt_defense_operations_legal_policy.pdf
This document is an internal GCHQ Wiki article. It outlines the legal and policy frameworks informing the activities of the agency's Cyber Defence Operations. It includes a description of the various sources of different data sources, the retention…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2