This document is an abstract for a CIA presentation. This presentation focused on the exploitation of vulnerabilities in Xcode 4.1, the proprietary code used to compile MacOS X applications and kernel extensions as well as iOS applications used in…
This document is an extract from an internal GCHQ presentation. It describes the accomplishments of an attack against the SIM card manufacturer Gemalto, retrieving encryption keys used in mobile communications.
This document is a study which overviews the key elements of the NSA's Co-Traveler analytics programs. Co-Traveler is a blanket term used when describing bulk location information processing. The report includes a description of the analytic, its…
This document is an internal GCHQ presentation. It describes the agency's efforts to scale their surveillance activity using data stores at various GCHQ sites across the UK.
This document is a NSA classification guide detailing the appropriate security classifications for describing different elements of the NSA/BND partnerships, including the Joint SIGINT Activity (JSA), Special US Liason Activity Germany (SUSLAG), and…
This document is a monthly report from an entity within the NSA referred to as "SUSLOW." This document collates news about intelligence in New Zealand, such as changes to governing intelligence legislation, and the development of the capabilities of…
This document is the final agenda of the SWEDUSA Strategic Planning Conference, hosted on 24 - 26th April 2013. Attending this meeting was Ingvar Akesson, Director General of Sweden's FRA (National Defence Radio Establishment / Forsvarets…
This document is an internal NSA memo ahead of an annual summit meeting between NSA chief Keith Alexander and the chief of the FRA, Ingvar Akesson. The meeting took place between 24 - 26 April 2013. It describes the state of the intelligence…
This document is a slide from an NSA presentation illustrating one of the ways in which the agency uses e-mail and telephony metadata to analyze the relationship networks of foreign intelligence targets. Connections between people are illustrated…
This document, seemingly prepared by the Communications Security Establishment Canada, reveals the use of surveillance methods targeting UC Browser, a popular web app in India, China and North America. It describes a plugin to analyze and display…