This document is a report from GCHQ. It details the scope and capabilities of the agency's DIGINT (Digtital Intelligence) program. It reveals the challenges the agency faced when collecting and exploting communications intelligence from targets for…
This document is a newsletter from the National Information Assurance Research Laboratory (NIARL) highlighting recent R&D from the information assurance community, which includes members of the 5 Eyes, student research programs, and corporate…
This document is a NSA release detailing the transition of the European Security Center (ESC) into the European Security Operations Center (ESOC) - a NSA lead project to "help build up the Center's capabilities to allow it to assume even greater…
This document is a NSA release detailing the transition of the European Security Center (ESC) into the European Security Operations Center (ESOC) - a NSA lead project to "help build up the Center's capabilities to allow it to assume even greater…
This document is a presentation deck for the FASHIONCLEFT protocol, which is a TAO (Tailored Access Operations) protocol used by implants to exfiltrate target data in computer network operations. The document defines FASHIONCLEFT, gives details on…
This document is an article from SIDtoday, an internal NSA newsletter, discussing the importance of the NSA's Remote Operations Center (ROC) to the agencies "objective of Global Network Dominance." The ROC specializes in computer network operations…
This document is an extract from an internal NSA briefing. It describes the triparteid relationship between Sweden's FRA, the NSA and GCHQ in COMINT, SIGINT and ELINT matters. This document is classified as top secret due to its sensitivity…
This article, from the NSA internal newsletter, SIDToday, is a SIGINT analyst's reflection on the nature of their work filtering raw signals intelligence to the rest of the intelligence community, including its possible flaws and the margin of error…
This article, from the internal NSA newsletter, SIDtoday, is one in a series written about ethics for NSA analysts. The author, likens intelligence analysis to the American Civil War, encouraging fellow analysts to trust the chain of command when…
This document is a column from the NSA newsletter, SIDtoday, written by the "SIGINT philosopher." As part of a recurring column about surveillance ethics, the author dicusses the rationale for surveilling more rather then less in terms of diplomatic…