This document contain extracts from presentations by the NSA and GCHQ describing programs for mobile device tracking and surveillance. The slides outline the surveillance and collection capabilities for accessing mobile devices, which include:…
This document is an article from an internal NSA newsletter. It contains an NSA analyst's reminiscences about working at the European Technical Center (ETC) in Stuttgart, Germany.
This document is an extract from an internal NSA presentation. It outlines how NSA analysts used the data analysis tool XKEYSCORE to gain access to the talking points of the U.N. Secretary General prior to their meeting with President Barack Obama.
This document is a presentation deck for the FASHIONCLEFT protocol, which is a TAO (Tailored Access Operations) protocol used by implants to exfiltrate target data in computer network operations. The document defines FASHIONCLEFT, gives details on…
This document is a briefing describing the NSA's problems with overcollection of data from email address books and instant messaging buddy lists, as well as NSA efforts to filter out useless information. The briefing concludes with a case study of an…
This document is an article from SSO News, the Internal Newsletter of the NSA's Special Source Operations. It describes a ruling made on 3 October 2011, where a judge from the FISA Court argued that Upstream collection were in violation of the fourth…
This document is an internal NSA presentation. It describes the tasking process and capabilities of QUANTUMTHEORY, a suite of programs developed by the NSA's Tailored Access Operations (TAO). Using a method called Quantum Inserts, specialists are…
This document is a presentation describing the mission statement BOUNDLESSINFORMANT, the NSA's tool used to track and visualize global surveillance data. A more comprehensive version of this document was released by El Mundo.
This document appears to be an extract from an internal GCHQ wiki article. It describes how GCHQ made use of the SIM card manufacturer Gemalto's computer network after gaining access through a CNE (Computer Network Exploitation) attack.
This document is a report detailing the intelligence agreement operating between the National Security Agency and the Israeli SIGINT National Unit (ISNU).