Browse Items (626 total)

20140618-der_spiegel-boundless_informant_statistics_on_germany.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Germany in a 30 day period between December 10 2012 and Janurary 8 2013.

20150204-intercept-open_source_for_cyber_defence_progress.pdf
This document is an article from GCHQ's internal Wiki, GCWiki. It provides a list of the data sources used in the social media monitoring programs HAPPY TRIGGER, LOVELY HORSE, ZOOL and TWOFACE.

20131104-wapo-sso_overview.pdf
This document is a series of presentation slides created by the NSA's Special Source Operations. It describes the MUSCULAR program, a program administered by GCHQ that collects the internet "cloud" traffic of Yahoo and Google from an interception…

20150701-intercept-email_address_vs_user_activity.pdf
This document is an internal NSA presentation. It describes the functions of the XKEYSCORE querying tool used by NSA analysts. This presentation focuses on retrieving data on targets through queries to their email addresses and user activity.

20140630-WaPo-affidavit_of_keith_alexander_regarding_spying_on_foreign_entities.pdf
This document is an affidavit by the former director of the National Security Agency, General Keith B. Alexander created in adherence to subsection 702(g)(2)(C) of the Foreign Intelligence Surveillance Act. It describes the procedures enabling the…

20150117-spiegel-nsa_fourth_party_access_-_i_drink_your_milkshake_.pdf
This document is a presentation deck from the Fourth Party IPT branch of the TAO (Tailored Access Operations) division of the NSA. The presentation details the opportunities provided through "Fourth Party collection" which "leverages CCNE accesses to…

20140803-Intercept-NSA-Intelligence-Relationship-With-Israel.pdf
This document is a report detailing the intelligence agreement operating between the National Security Agency and the Israeli SIGINT National Unit (ISNU).

20150219-Intercept-Dapino Gamma CNE Presence Wiki.pdf
This document appears to be an extract from an internal GCHQ wiki article. It describes how GCHQ made use of the SIM card manufacturer Gemalto's computer network after gaining access through a CNE (Computer Network Exploitation) attack.

20130608-guard-boundless_informant_capabilities (1).pdf
This document is a presentation describing the mission statement BOUNDLESSINFORMANT, the NSA's tool used to track and visualize global surveillance data. A more comprehensive version of this document was released by El Mundo.

20131230-spiegel-tao_quantum_tasking.pdf
This document is an internal NSA presentation. It describes the tasking process and capabilities of QUANTUMTHEORY, a suite of programs developed by the NSA's Tailored Access Operations (TAO). Using a method called Quantum Inserts, specialists are…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2