Browse Items (626 total)

20150622-intercept-gchq_ministry_stakeholder_relationships_spreadsheets.pdf
This document contains a selection of spreadsheets composed by GCHQ. Each spreadsheet identifies a specific UK government ministry, and contains information about the objectives of the office, and GCHQ's desired operations involving that department.…

20150701-intercept-unofficial_xks_user_guide.pdf
This document is a report prepared by a consultant working for Booz Allen Hamilton. It provides a comprehensive user's guide for the NSA's data analysis tool, XKEYSCORE.

Preston-Study.pdf
This document is an internal GCHQ slideshow. It documents a series of case studies of the use of the PRESTON program, used to intercept phone calls, text messages and internet data.

20141228-spiegel-general_description_how_nsa_handles_encrypted_traffic.pdf
This document is a newsletter article from the NSA Cryptanalysis and Exploitation Services that discusses the rise of "ubiquitous encryption" on the internet, and the NSAs top secret strategies for circumvention.

20130816-wapo-sid_oversight.pdf
This document is a report created by the NSA's Signals Intelligence Directorate (SID)'s Office of Oversight and Compliance. This report evaluates the incidents of "incidents" (described as "collection, dissemination, unauthorized access, and…

20140307-intercept-nsa_ask_zelda_watching_every_word_in_snitch_city.pdf
This document is an article from SIDToday, an internal newsletter of the NSA's Signals Intelligence Directorate division. It is a part of the series titled "Ask Zelda", an advice column. This article responds to an enquiry into appropriate levels of…

20150518_intercept_rc-sw-intsum-20110619-20110620-r.pdf
This document is an intelligence report created by Regional Command Southwest. It describes the political situation in Afghanistan and Pakistan on June 19 - 20 2011.

20150528-intercept-leave_bright_pebbles_not_breadcrumbs_for_those_coming_after_you.pdf
This document is a memo composed by an official within the Signals Intelligence Directorate (SID) of the NSA. In this memo, the author describes the importance of inter-agency cooperation in sharing intelligence.

20131030-wapo-muscular.pdf
This document contains of NSA Special Source Operations slides and speaking remarks related to the MUSCULAR program. WINDSTOP is a trusted secondary component of this program. MUSCULAR involves the interception of the data flows across the fibre…

20150925-intercept-event_analysis.pdf
This document describes the surveillance tools SALAMANCA, HAUSTORIUM, THUGGEE and IMMINGLE at a high level of abstraction.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2