This document is an article from SIDtoday, an internal NSA newsletter, discussing the importance of the NSA's Remote Operations Center (ROC) to the agencies "objective of Global Network Dominance." The ROC specializes in computer network operations…
This document is a presentation deck for the FASHIONCLEFT protocol, which is a TAO (Tailored Access Operations) protocol used by implants to exfiltrate target data in computer network operations. The document defines FASHIONCLEFT, gives details on…
This document is a NSA release detailing the transition of the European Security Center (ESC) into the European Security Operations Center (ESOC) - a NSA lead project to "help build up the Center's capabilities to allow it to assume even greater…
This document is a NSA release detailing the transition of the European Security Center (ESC) into the European Security Operations Center (ESOC) - a NSA lead project to "help build up the Center's capabilities to allow it to assume even greater…
This document is a newsletter from the National Information Assurance Research Laboratory (NIARL) highlighting recent R&D from the information assurance community, which includes members of the 5 Eyes, student research programs, and corporate…
This document is a report from GCHQ. It details the scope and capabilities of the agency's DIGINT (Digtital Intelligence) program. It reveals the challenges the agency faced when collecting and exploting communications intelligence from targets for…
This document, acquired via a freedom of Information Act lawsuit by EPIC, is a collection of reports detailing the number of times the Foreign Intelligence Surveillance Court authorized the use of Pen Registers and Trap and Trace Devices in order to…
This document is a report prepared by the Office of the Attorney General of the United States. It lays out the legal and procedural frameworks for the collection of signals intelligence by the FBI. It describes the historical evolution of the…
This document is an internal GCHQ presentation prepared by the Joint Threat Intelligence Research Group (JTRIG). It describes the division's covert online operations, specifically the control, infiltration and manipulation of online communication…
This document contains internal NSA training material, explaining in detail the role of the intelligence analyst as it relates to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.