Browse Items (626 total)

20130816-wapo-targeting_rationale.pdf
This document is a memo that explains the rationale used by the NSA in its selection of surveillance targets outside the US. The document contains actual examples of certification examples that indicate that the staff of foreign heads of state and…

20140127-nyt-converged_analysis_on_smartphone_devices.pdf
This document is a presentation detailing the potential uses of smartphone devices for signals intelligence. The presentation highlights the ability to access social media, location, search history, network history, and photo data from smartphones.…

20150701-intercept-advanced_http_activity_analysis.pdf
This document is an internal presentated prepared by an official within the NSA. it describes the basics of HTTP protocol and how to target and exploit this using the XKEYSCORE query and analysis tool.

20131211-svt-nsa_slides_xkeyscore.pdf
This document is an extract from an internal NSA presentation about XKEYSCORE, the NSA's tool to search and analyze surveillance data. It describes the scope and content of the MARINA and PINWALE databases, as well as the NSA's ability to track…

20131117-spiegel-royal_concierge.pdf
This document is a presentation slide describing GCHQ's ROYAL CONCIERGE program. This "SIGINT driven hotel reservation tip-off service" enables analysts to exploit hotel reservation confirmation emails to enable more directed targeting of specified…

20140831-spiegel-nsa_intelligence_relationship_with_turkey.pdf
This document is an NSA information paper on the partnership between Turkish and U.S. intelligence. The paper provides key recent issues, discusses what each organization offers the other in terms of SIGINT, and refers to challenges balancing the…

20150204-intercept-nato_civilian_intelligence_council_cyber_panel.pdf
This document is a briefing sheet from the Office of the Director of National Intelligence to the NATO Civilian Intelligence Council. It provides discussion of a previous assessment of the cyber threat to NATO, especially the threat of state actors…

20150622-intercept-malware_analysis_reverse_engineering_-_acno_skill_levels_-_gchq.pdf
This document is a list of core competencies required for GCHQ analysts working on Malware Analysis and Reverse Engineering.

20141214-intercept-gchq_hopscotch.pdf
This document is an extract from a larger report the content of which is unclear. HOPSCOTCH is allegedly a malware program for accessing network data.

20150622-intercept-operational_legalities_gchq_powerpoint_presentation.pdf
This document is an internal presentation prepared by officers at GCHQ. It establishes the legal framework of surveillance activities performed by British intelligence agencies, notably GCHQ. It also outlines the features of the BROAD OAK database…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2