Browse Items (626 total)

20141228-spiegel-gchq_presentation_on_the_bullrun_programs_decryption_capabilities.pdf
This document is a presentation from the GCHQ on the capabilities, sensitivities and protocol of the cryptanalytical BULLRUN project - which "covers the ability to defeat encryption used in specific network communications," such as VPN, SSH, TLS/SSL,…

20150925-intercept-200g_iris_access.pdf
This document is an internal GCHQ presentation. It describes the agency's efforts to scale their surveillance activity using data stores at various GCHQ sites across the UK.

20140618-der_spiegel-report_on_the_one-year_anniversary_of_the_nsa_liaison_unit_suslag_in_bad_aibling.pdf
This NSA document celebrates the one-year anniversary of the Special US Liason Activity Germany (SUSLAG) partnership and gives an overview of their SIGINT operations and technology in Bad Aibling, Germany.

20131210-wapo-ghost_machine.pdf
This document contains excerpts from an internal NSA presentation describing the NSA's cloud analytics platform, code-named GHOSTMACHINE. It is administered by Special Source Operations (SSO).

20150925-intercept-blazing_saddles_tools.pdf
This document is a page from GCHQ's internal Wiki, GCWiki. It describes GCHQ's BLAZING SADDLES program. This is the TDB portion of the second pilot of the Next Generation Events Program under the Better Analysis Programme. The primary purpose of…

20140812-Intercept-GCHQ-Covert-Mobile-Phones-Policy.pdf
This document, created by GCHQ, describes the procedures for the use of mobile phones by agents posted overseas.

20131004-guard-iat_tor.pdf
This document is a presentation describing forms of Open Source Multi-Hop Networks. The most famous of these is TOR, The Onion Router, a service designed to protect online anonymity partially funded by the US due to its use by dissents in repressive…

20150604-nyt-cyber-surveillance-documents.pdf
This item is a collection of documents released by The New York Times. They cover a wide range of surveillance activities within the NSA. It includes: Extracts from a slide presentation detailing major developments in the Special Source Operations…

20150701-intercept-xks_cipher_detection_and_you.pdf
This document is an internal presentation prepared by the NSA's Mathematics Research Group (MRG). It outlines the structure, features and examples of use of the XKEYSCORE data analysis tool. The presentation also describes the relations of XKEYSCORE…

20150925-intercept-pullthrough_steering_group_minutes.pdf
This document is meeting notes from the GCHQ PullThrough Steering Group Meeting #16. Brief descriptions and status updates are given for various bulk collection programs, such as KARMA POLICE, ORB Finder, LIGHTWOOD, SALTY OTTER and MOOSE MILK.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2