This document is a report preparted by NATO's Supreme Headquarters Allied Powers Europe, it describes the military environment in Afghanistan in June 2011, after the assassination of Osama Bin Laden.
This document is an extract from notes for an internal NSA presentation. It describes key achievements made by the NSA's Signals Intelligence Directorare (SID) in 2013. Mention is made of the trilateral agreement existing between the NSA, GCHQ and…
This document is a report preparted by NATO's Supreme Headquarters Allied Powers Europe, it describes the military environment in Afghanistan in June 2011, after the assassination of Osama Bin Laden.
This document is an extract from an internal GCHQ presentation. It provides an example of an email harvested using SIM encryption keys compromised in a CNE attack on the SIM card manufacturer, Gemalto.
This document consists of three NSA presentation slides outlining Content Extraction goals and challenges, including a redacted list of the top ten most frequent mentionend targets in their collection.
This document is an extract from internal NSA training material. It shows the user-interface of XKEYSCORE, the NSA's tool for retrieving surveillance data. It shows an example query on Sweden, and methods to assure compliance with USSID-18.
This document is an NSA powerpoint presentation from June 2012 that discusses the metadata collection and anylsis program SKYNET. The presentation shows the results of the statistical analysis of cell phone metadata to show travel behaviour, social…
This document is a memo detailing the composition and operations of GCHQ's Intrusion Analysis (IA) team. It forms part of the Joint Electronic Attack Cell (JeAC).
This document is an article from GCHQ's internal Wiki, GCWiki. It describes the purpose and policies underlying the agency's HRA {Human Rights Act} audit process. The standards were designed to ensure that these audits prove that GCHQ meets the legal…