Browse Items (626 total)

20150402-Intercept-Behavioural Science Support for JTRIG.pdf
This document contains extracts of a report created by GCHQ's Joint Threat Research and Intelligence Group. It highlights GCHQ's HUMINT (Human Intelligence) operations against targets in Zimbabwe and Argentina. These operations are said to involve…

20150117-speigel-analysis_of_chinese_methods_and_performed_actions_in_the_context_of_computer_network_exploitation.pdf
This document contains three slides from a presentation from the SIGINT Development branch of the NSA, detailing the damage and data loss during a Chinese cyber attack on the Department of Defense. The presentation also sets out goals for…

20140630-WaPo-odni_certification_regarding_foreign_entities.pdf
This document is a certification by the Attorney General of the United States and the Director of National Intelligence. It testifies to the American intelligence agencies procedures adherence to sections 101(h), 301(4) and 702 of the Foreign…

20140218-intercept-discovery_sigint_targeting_scenarios_and_compliance.pdf
This document is an entry from an internal NSA wiki. It describes various SIGINT targeting scenarios and the appropriate course of action in each case, provided from NSA guidelines and policies.

20150310-Intercept-TCB Jamboree 2012.pdf
This document is an extract of a memo about the CIA's annual Trusted Computing Base's (TCB) Jamboree conference. This conference focused on the communication about research into the ecxploitation of vulnerabilities in modern communications systems.

20140207-nrc-boundless_nederland.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in The Netherlands in a 30 day period between December 10 2012 and Janurary…

20150622-intercept-operational_legalities_gchq_powerpoint_presentation.pdf
This document is an internal presentation prepared by officers at GCHQ. It establishes the legal framework of surveillance activities performed by British intelligence agencies, notably GCHQ. It also outlines the features of the BROAD OAK database…

20141214-intercept-gchq_hopscotch.pdf
This document is an extract from a larger report the content of which is unclear. HOPSCOTCH is allegedly a malware program for accessing network data.

20150622-intercept-malware_analysis_reverse_engineering_-_acno_skill_levels_-_gchq.pdf
This document is a list of core competencies required for GCHQ analysts working on Malware Analysis and Reverse Engineering.

20150204-intercept-nato_civilian_intelligence_council_cyber_panel.pdf
This document is a briefing sheet from the Office of the Director of National Intelligence to the NATO Civilian Intelligence Council. It provides discussion of a previous assessment of the cyber threat to NATO, especially the threat of state actors…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2