Browse Items (626 total)

20140723-Intercept-March-2013-Watchlisting-Guidance.pdf
This document is a report created by the National Counterterrorism Center. It describes the procedures in place allowing intelligence agencies to place individuals suspected of terrorism related offenses onto government watch-lists.

20131004-wapo-gchq_mullenize.pdf
This document is an internal memo created by GCHQ describing Operation MULLENIZE, an attempt to distinguish othewise anonymous internet users. The agency uses "User Agent Staining" to change the way in which the user's web browser identifies itself…

20131204-wapo-chalkfun_foreignness.pdf
This document is an excerpt from an NSA training tool explaining how to determine whether a targeted device is being used outside the United States. It illustrates a hypothetical example involving a query to CHALKFUN, the tool used to search FASCIA,…

20150310-Intercept-Smurf Capability Iphone.pdf
This document is an extract from an internal GCHQ presentation. It describes the existing tools used by GCHQ to intercept communications from iPhones. Programs include: WARRIOR PRIDE, DREAMY SMURF, NOSEY SMURF. TRACKER SMURF, PORUS and PARANOID…

07-Introduction-to-BADDECISION-Redacted.pdf
This document is a slide deck used during a "Close Access" NSA training course to introduce students to computer network exploitation (CNE) tool, BADDECISION.

20150128-intercept-cse_presentation_on_the_levitation_project.pdf
This document is a presentation prepared by CSEC. It describes the LEVITATION program, an effort to monitor file sharing sites in order to locate extremist training and propoganda materials. This program is capable of monitoring 10-15 million…

20140618-der_spiegel-nsacss_europe-_report_on_the_experiences_of_one_nsa_worker.pdf
This document is a NSA release describing the recent trip of an NSA offical to the German operational units; European Commoand (EUCOM), NSA/CSS Europe (NCEUR), European Technical Center (ETC) and European Security Center for discussion on…

20140616-der_spiegel-xkeyscore_fingerprints_1.pdf
This document is an extract from a presentation prepared by the NSA's site in Griesheim, Germany. It describes the storage and curation capabilities of the NSA's analysis tool, XKEYSCORE.

20131210-wapo-location_cookies.pdf
This document contains excerpts from an internal NSA presentation detailing signal surveillance techniques and success stories. They indicate that both the NSA and GCHQ use a Google-specific tracking cookie to pinpoint targets for hacking.

20140404-intercept-gchq_full_spectrum_cyber_effects.pdf
This document contains GCHQ presentation slides detailing the GCHQ Full-Spectrum Cyber Effects program, presented at the 2010 SIGDEV conference. The program includes computer network attacks, computer network information operations, and social media…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2