Browse Items (626 total)

20150622-intercept-teca_product_centre_gchq_wiki.pdf
This document is an article from GCHQ's internal Wiki, GCWiki. It outlines the products made available to intelligence analysts by The Technical Enabling Access Product Centre (TECA). TECA is a division of GCHQ focused on reverse engineering…

20141228-spiegel-explanation_of_the_poisennut_product_and_its_role_when_attacking_vpn.pdf
This document is the NSA WikiInfo page for the decryption tool POISIONNUT - a "complex element responisble for scheduling ESP attacks." ESP stands for Encapsulating Security Payload - a tool for encrypting web traffic.

20140618-der_spiegel-gchq_report_on_the_technical_abilities_of_tempora.pdf
This document is a report authored by a Project Manager at GCHQ. It details the technical abilities of an operation codenamed TEMPORA, an Internet Buffer capability enabling the storage of intercepted data for up to three days and metadata for up to…

20140618-der_spiegel-report_on_the_nsas_access_to_tempora.pdf
This is an NSA document announcing the TEMPORA program. TEMPORA gives qualified NSA analysts access to a large GCHQ XKEYSCORE (Computer Network Exploitation) system for targeted and bulk metadata collection.

20150826-die_zeit-xkeyscore_-_the_document.pdf
This document is a transcript of a Terms of Reference entered into by the NSA and two German intelligence agencies, the Bundesnachrichtendiest's Sigint Department and the Bundesamt fur Verfassungsschutz. The document describes the sharing agreement…

20131119-odni-nsa_course_materials_module_5_v.24.pdf
This document contains internal NSA training material, explaining in detail the separation between the role of analyst and technician work roles as it relates to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata…

20131119-odni-nsa_course_materials_module_6_analytic_personal_v.18.pdf
This document contains internal NSA training material, explaining in detail the role of the intelligence analyst as it relates to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.

20140224-intercept-training_for_covert_online_operations.pdf
This document is an internal GCHQ presentation prepared by the Joint Threat Intelligence Research Group (JTRIG). It describes the division's covert online operations, specifically the control, infiltration and manipulation of online communication…

20131119-odni-ag_guidelines_for_domestic_fbi_operations (1).pdf
This document is a report prepared by the Office of the Attorney General of the United States. It lays out the legal and procedural frameworks for the collection of signals intelligence by the FBI. It describes the historical evolution of the…

20140303-epic-doj_report_on_pen_register_fisa_orders.pdf
This document, acquired via a freedom of Information Act lawsuit by EPIC, is a collection of reports detailing the number of times the Foreign Intelligence Surveillance Court authorized the use of Pen Registers and Trap and Trace Devices in order to…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2