Browse Items (626 total)

20141125-sz-cables_where_we_are.pdf
This document is a report listing GCHQ's current operational telecommunications cable interceptions.

20140218-intercept-gchq_sigdev_.pdf
This document is an internal GCHQ presentation. It describes various operations aimed at monitoring target's activities on social media using the SQEAKY DOLPHIN and ANTICRISISGIRL applications. It also more generally describes the value of the social…

20150701-intercept-category_throttling.pdf
This memo outlines how to configure XKEYSCORE to support category throttling.

20150701-intercept-guide_to_using_contexts_in_xks_fingerprints.pdf
This document is an internal NSA memo that outlines the use of contextual logic expressions when using the XKEYSCORE data analysis tool.

20150505_intercept_sidtoday-is-hlt-progressing-final.pdf
This document is from the NSA internal newsletter, SIDtoday. It discusses the progress of Human Language Technology (HLT) research, focussing on projects in Afghanistan, and Latin America. It also indicates the future potential of HLT.

20141125-sz-mti_access_project_weekly_status_june_27_2008.pdf
This document is a report from GCHQ's internal wiki, GCWiki. It describes the status of GCHQ's MTI Access Project during the week ending June 27 2008.

20141125-sz-mti_access_project_weekly_status_november_28_2008.pdf
This document is a report describing the status of GCHQ's MTI Access Project during the week ending 28 November 2008.

20141204-intercept-auroragold_working_group.pdf
This document is a NSA presentation given at the 2012 SIGDEV Conference. It discusses the AURORAGOLD program which tracks information on exploiting mobile networks and industry developments.

20150803-intercept-yrs_gears_up_to_celebrate_40_years.pdf
This document is an article from the internal NSA Yakima Research Station (YRS) newsletter, The Northwest Passage. The article celebrates the YRS 40th anniversary of operations, focusing on its role within the ECHELON program "to collect and process…

20150310-Intercept-Black Budget Cryptanalysis Amp Exploitation.pdf
This document is an extract of a report created by the NSA's division of Cryptanalysis and Exploitation Services (CES). It describes the Target Systems Project, which aims to produce capacities to exploit new communications technologies and systems…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2