Browse Items (626 total)

20150310-Intercept-Apple A4 A5 Application Processors Analysis.pdf
This document is an extract from a presentation created by the CIA. It appears to be the front page of a presentation related to CIA operations against Apple's A4/A5 Application Processors used in the iPhone.

20141228-spiegel-gchq_briefing_on_the_bullrun_program.pdf
This document is a GCHQ brief on the NSA BULLRUN Col - a program described as protecting "our abilities to defeat the encryption used in network communications technologies." The document outlines procedures for BULLRUN and includes a glossary of…

This document is an internal NSA presentation. It explains the syntax behind the construction of AppIds and Fingerprints in the NSA's XKEYSCORE data analysis program. AppIds and Fingerprints are methods to make searches of intelligence information…

20150701-intercept-xks_for_counter_cne.pdf
This document is an internal NSA presentation. It describes utilizing the XKEYSCORE data analysis tool as a resource supporting CNE (Computer Network Exploitation) operations, in distinction to XKEYSCORE's traditional use for DNI (Digital Network…

20140825-Intercept-ICREACH-Wholesale-Sharing.pdf
This document is a NSA memo giving a brief overview of the development, implementation, and status of the NSA's ICREACH program, which gives the US intelligence community and its Five Eye second-party partners access to a mass collection of…

20150811-intercept-when-brevity-is-just-the-soul-of-huh.pdf
This document is a column from the NSA newsletter, SIDtoday, written by the SIGINT philosopher. It dicusses workplace writtern correspondence etiquette.

20141125-sz-cables_where_we_want_to_be.pdf
This document lists the cable interceptions desired by GCHQ. The document lists the cable's name, relationship (i.e. owner) and the desired access and egress capacities.

20150117-spiegel-sample_code_of_a_malware_program_from_the_five_eyes_alliance.pdf
This document contains code for the malware program QWERTY which, as part of the CNO program WARRIORPRIDE, collects the key strokes of an infected computer. Der Spiegel is releasing the code, found in the Snowden document collection, "in order to…

20150803-intercept-cqv_fields_nov_2010.pdf
The document appears to be an extract from a list of metadata field descriptors, concerning the coding of data for proper routing and analysis.

20131104-mundo-info_sharing_partners.pdf
This document is a report detailing the National Security Agency's policy for sharing cryptologic intelligence with the intelligence agencies of different countries. Western countries are divided into "Tier A" nations, which receive "comprehensive…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2