This document lists the cable interceptions desired by GCHQ. The document lists the cable's name, relationship (i.e. owner) and the desired access and egress capacities.
This document is an extract from an internal GCHQ presentation. It describes the operation of a traditional mobile telecommunications network, and the position of Individual Subscriber Authentication Keys (KI values) within it.
This document is an extract from an internal GCHQ presentation. It describes the operation of a traditional mobile telecommunications network, and the position of Individual Subscriber Authentication Keys (KI values) within it.
This document is a selection of presentation slides prepared by GCHQ's Joint Threat Research Intelligence Group (JTRIG), CSEC and the NSA. They describe several surveillance programs. The first of these is HACIENDA, a program that involved port…
This document is an NSA article from the internal NSA newsletter SIDtoday. Written by the SIDtoday editor, the article is an interview with Jon Darby, Signals Intelligence (SID) Associate Deputy Director for Counterterrorism. The interview dicusses…
This document is an internal NSA publication of an interview with the FAD's Deputy Assistant for SIGINT Operations discussing the relationships between NSA/Third Party nations intelligence partnerships.
This document is a presentation used in NSA training material. This presentation was designed for use by NSA personnel with access to the bulk telephony metadata acquired by the NSA pursuant to Section 501 of FISA, for purposes of performing…
This document contains internal NSA training material. This document welcomes potential technicians and analysts to a course devoted to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.