This document is an abstract of a presentation prepared by the CIA. It describes ROCOTO, which is a codeword for the agencies efforts to create surveillance tools for the iPhone 3G.
This document is an internal GCHQ presentation. It describes ROCKRIDGE, which is a GCHQ program that seeks to improve the agency's capabilities to ingest more data and provide more comprehensive analytics utilizing the BLACK HOLE content depository.
This document is an article retrieved from GCHQ's internal Wiki, GCWiki. It outlines the operations of GCHQ's TEA-RE Reverse Engineering team, who provide the NSA with research and development into a variety of cyrptographic related products and…
This document is an article retrieved from GCHQ's internal Wiki, GCWiki. It outlines the operations of GCHQ's TEA-RE Reverse Engineering team, who provide the NSA with research and development into a variety of cyrptographic related products and…
This document is a summary of a report prepared by GCHQ. It analyzes GCHQ's broader surveillance architecture in light of "changes in mission and changes in external environment", and how the agency should repsond to these changes over time.
This document is an NSA staff processing form addressed to the SIGINT Director of the NSA's Signals Intelligence Directorate (SID). It requests SID approval for the Cryptanalis and Exploitation Division (CES) at the Cryptologic Centers (CCs) in…
This document is an email from the Development Team of MONKEY PUZZLE (GCHQ) to a Residential Integree - OPASSOS (NSA). It describes MONKEY PUZZLE, GCHQ's UTT (Unified Targeting Tool). It suggests that Yahoo, Google and Microsoft were subject to the…
This document contains Menwith Hill Station presentation slides from the 2010 SIGINT Development Conference. The slides outline the QUANTUMTHEORY program and its sub-programs, from legacy programs to those in experimental stages.
This document contains presentation slides from the 2010 SIGINT Development Conference outlining the QUANTUMTHEORY program and its sub-programs, from legacy to those in experimental stages.
This document contains slides displaying the operations of the QUANTUMINSERT computer network exploitation (CNE) program. Through partner programs such as TURBINE and TURMOIL, the NSA is able to exploit target computer networks by redirecting…