Browse Items (626 total)

Milkwhite.pdf
This document is a report detailing GCHQ's MILKWHITE program. This program supported the operations of the Home Office Communications Capabilites Directorate (CCD).

Digint-Imbalance.pdf
This document is a report from GCHQ. It details the challenges facing the agency in managing its strategic communications intelligence requirements for 2010 and 2011

20131119-odni-united_states_signals_intelligence_directive_18_jan_25_2011.pdf
This document is also known as United States Signals Intelligence Directive 18. It prescribes policies and procedures, and assigns responsibilities to ensure that the NSA's signals intelligence activities are aligned with the U.S. Constitution's 4th…

20141228-speigel-analytics_on_security_of_tor_hidden_services_0.pdf
This document is a presentation that gives information on TOR (The Onion Router): its background, how it works to keep users anonymous, and suggestions/challenges for circumvention.

20140831-spiegel-turkey_and_the_pkk.pdf
This document is a release outlining the situation of NSA, Turkey and the PKK, and complications due to the NSA SIGINT partnership with Turkey. The NSA describes the PKK action in northern Iraq and "cross-border operations" as an Iraqi sovereignty…

20150505_intercept_black-budget-262.pdf
This document is an extract from the 2012 Black Budget, prepared by the NSA to document and justify their spending. This extract discusses the success and setbacks in their voice analysis technology which renders voice data into searchable text. The…

20140131-cbc-csec_airport_wifi_tracking.pdf
This document is a presentation which outlines a CSEC test program that tracked the movement of user ids on IP addresses for popular urban wireless internet connections, such as airports, hotels, libraries and coffee shops, by providing "richer…

20131004-guard-egotistical_giraffe (1).pdf
This document is a briefing describing the NSA's efforts to undermine the TOR network, codenamed EGOTISTICAL GIRAFFE. This briefing describes a technique developed by the NSA to attack TOR users through vulnerabilities in the TOR browser bundle and…

20141204-intercept-nsa_gchq_csec_network_tradecraft_advancement.pdf
This document is an extract of a presentation discussing the collaboration between CSE, NSA and GSHQ on various aspects of signals intelligence, including VPN exploitation, network intelligence, IP analysis, and IR21 processing.

20140630-WaPo-fisa_amendments_act_summary_document_1.pdf
This document is a briefing of the impact of the 2008 FISA Amendment Act's Section 702 upon the NSA's surveillance activities.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2