This document is a news article posted to the NSA's internal newsletter, SIDtoday. It describes the operations of the Drug Enforcement Administration (DEA) and the relationship between this agency's counternarcotics operations and other agency's…
This document is an extract from a report describing the joint DEA / NSA SANDKEY program. SANDKEY targets unencrypted voice communications of drug-traffickers at sea. This document displays the location and operational status of the program's FCC -…
This document is a selection of slides from a GCHQ presentation describing Operation SOCIALIST, a cyber-attack against Belgacom, a partly state owned Belgian telecoms company. The presentation describes the utilization of Quantum Insert attack…
This document is an extract from a draft report created by the Defence Signals Directorate (Australia), addressed to the Communications Security Establishment Canada (Canada). It describes the conditions under which DSD are permitted to share bulk,…
This document is a DSD presentation describing Australia's Defence Signals Directorates' (now the Australian Signals Directorate) efforts to intercept the communications of various Indonesian politicians, including the president, Susilo Bambang…
This document is a joint presentation by NAC (Network Analysis Centre), with members from CSEC and GCHQ, discussing test approaches for automating the detection of Network Operation Centres (NOC). NOCs form the "nerve centre" of telecommunications…
This document is a CSEC presentation describing the CASCASE Joint Cyber Sensor Architecture. CASCADE is an effort to align CSEC's passive cyber sensor capabilities and architecture in its SIGINT and ITS missions through adopting common sensor…
This document is an expanded version of a previously released presentation deck from CSEC, outlining the discovery of an intelligence CNO effort, codenamed SNOWGLOBE. The document outlines in detail the process of discovery through current CSEC…
This document is a CSEC presentation deck that summarizes the collaboration between "analysts and operators from CNE Operations, Cyber Counterintelligence and Global Network Detection" to provide both defensive and offensive CNE (computer network…