This document contains extracts of a report created by GCHQ's Joint Threat Research and Intelligence Group. It highlights GCHQ's HUMINT (Human Intelligence) operations against targets in Zimbabwe and Argentina. These operations are said to involve…
This document contains three slides from a presentation from the SIGINT Development branch of the NSA, detailing the damage and data loss during a Chinese cyber attack on the Department of Defense. The presentation also sets out goals for…
This document is a certification by the Attorney General of the United States and the Director of National Intelligence. It testifies to the American intelligence agencies procedures adherence to sections 101(h), 301(4) and 702 of the Foreign…
This document is an entry from an internal NSA wiki. It describes various SIGINT targeting scenarios and the appropriate course of action in each case, provided from NSA guidelines and policies.
This document is an extract of a memo about the CIA's annual Trusted Computing Base's (TCB) Jamboree conference. This conference focused on the communication about research into the ecxploitation of vulnerabilities in modern communications systems.
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in The Netherlands in a 30 day period between December 10 2012 and Janurary…
This document is an internal presentation prepared by officers at GCHQ. It establishes the legal framework of surveillance activities performed by British intelligence agencies, notably GCHQ. It also outlines the features of the BROAD OAK database…
This document is a briefing sheet from the Office of the Director of National Intelligence to the NATO Civilian Intelligence Council. It provides discussion of a previous assessment of the cyber threat to NATO, especially the threat of state actors…