This document is a spreadsheet containing "the collated CNE (computer network exploitation) user requirements captured by the Endpoint initiative lead." The spreadsheet lists requirements with their priority, the amount of innovation needed to…
This document is a study which overviews the key elements of the NSA's Co-Traveler analytics programs. Co-Traveler is a blanket term used when describing bulk location information processing. The report includes a description of the analytic, its…
This document is a presentation describing GCHQ's FLYING PIG Program, a means of monitoring secure TLS / SSL computer networks through "MiTM" or "Man in the Middle" attacks where data is routed to a government server and then relayed to its…
This document is a CSEC presentation deck giving an overview of LEVITATION, "a behaviour-based target discovery project." LEVITATION is used to identify targets based on documents downloaded from free file upload (FFU) services such as Sendspace and…
This document is a technical brief on decryption, specifically outling a "technique that can deanonymisc TOR web-browsing." TOR (The Onion Router) is "used by individuals and organisations that want to hide the originating IP address of their…
This docuument is a memo prepared by an official within the NSA's Signals Intelligence Directorate. It raises the possibility that SID's existing SIGINT storage capacities are suitable for the amount of data being retrieved across different SIGINT…
This document is a briefing by the GCHQ pertaining to the Kurdish people in Iraq. It includes definitions of the Kurds and Kurdistan, details about the decentralized governement of Iraq and the Kurdistan Regional Government (KRG), and discusses…
This document contains a presentation prepared by the NSA analyzing the TOR router. TOR is a service designed to protect online anonymity partially funded by the US due to its use by dissents in repressive regimes such as Syria and China. The NSA's…