Browse Items (626 total)

20140630-WaPo-odni_certification_regarding_foreign_entities.pdf
This document is a certification by the Attorney General of the United States and the Director of National Intelligence. It testifies to the American intelligence agencies procedures adherence to sections 101(h), 301(4) and 702 of the Foreign…

20140630-WaPo-odni_certification_regarding_foreign_entities.pdf
This document is a certification by the Attorney General of the United States and the Director of National Intelligence. It testifies to the American intelligence agencies procedures adherence to sections 101(h), 301(4) and 702 of the Foreign…

20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod.pdf
This document consists of three NSA presentation slides outlining Content Extraction goals and challenges, including a redacted list of the top ten most frequent mentionend targets in their collection.

20150117-spiegel-overview_of_methods_for_nsa_integrated_cyber_operations_0.pdf
This document is a presentation from the NSA's Threat Operations Center (NTOC) on methods for intergrated cyber operations, including the applications TURBINE, TUTELAGE, and QUANTUM. The document gives various case studies and lists future work.

20150323-CBC-Cascade Joint Cyber Sensor Architecture Presentation.pdf
This document is a CSEC presentation describing the CASCASE Joint Cyber Sensor Architecture. CASCADE is an effort to align CSEC's passive cyber sensor capabilities and architecture in its SIGINT and ITS missions through adopting common sensor…

20150310-Intercept-Smurf Capability Iphone.pdf
This document is an extract from an internal GCHQ presentation. It describes the existing tools used by GCHQ to intercept communications from iPhones. Programs include: WARRIOR PRIDE, DREAMY SMURF, NOSEY SMURF. TRACKER SMURF, PORUS and PARANOID…

20150701-intercept-cadence_readme.pdf
This document is a read me outlining CADENCE, a selection tasking tool used in conjunction by the NSA's XKEYSCORE data storage and analysis tool.

20141125-sz-cables_no_current_access.pdf
This document is a report listing the telecommunications intercepts to which GCHQ does not have adequate access.

20141125-sz-cable_regions.pdf
This document is a report listing the region, cable, location and capacity of telecommunications cables intercepted by GCHQ.

20141125-sz-cable_master_list_fea.pdf
This document is a report providing detailed information about GCHQ's interception of Flag EA's telecommunication cable landing in the UK at Porthcurno, Cornwall.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2