This document is an extract from an internal GCHQ presentation. It describes the accomplishments of an attack against the SIM card manufacturer Gemalto, retrieving encryption keys used in mobile communications.
This document is a NSA release announcing an upcoming "Strategic Intelligence Issue Seminar" on "Turkish Presidential and Parliamentary Elections: Dynamics, Regional Impact and Relations with the United States." Main topics of the seminar include the…
This document is an extract from an NSA brief referring to the status of New Zealand's GCSB underwater cable surveillance program SPEARGUN phase 1. The document notes that the program is awaiting legislation expected in July 2013, and will begin…
This document is a memo prepared by the Deputy General Counsel (Operations). It describes guidance for the NSA's Signals Intelligence Directorate (SID) policy as to the applicable legal standards to query bulk telephony metadata acquired pursuant to…
This document is an extract from a weekly NSA Special Source Opertations briefing memo which describes protocol for the bulk collection, storage, and analysis of audio content and metadate under the SCALWAG program, a sub-program of MYSTIC.
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Italy in a 6 day period between December 18 and December 24 2012.
This document is a page from GCHQ's internal wiki, GCWiki. It is an article describing the LOVELY HORSE program. This program aimed to monitor and index discussion on social media sites such as Twitter. The main targets of the program appear to have…
This document is an abstract for a CIA presentation. This presentation focused on the exploitation of vulnerabilities in Xcode 4.1, the proprietary code used to compile MacOS X applications and kernel extensions as well as iOS applications used in…