This document is a presentation deck from the NSA giving an overview of the TRANSGRESSION program, which aims to discover, evaluate and exploit foreign CNOs and hopes to provide cryptanalytic exploitation support. The presentation includes the…
This document is an extract from a larger document, the "black budget," detailing the research and technology behind two US signals and intelligence projects: "Penetrating Hard Targets" and "Owning the Net." Both projects are housed under the arm of…
This document is a memo submitted to the Foreign Intelligence Surveillance Court that describes the procedures used by the NSA for determining the "foreignness" of persons targeted for surveillance. The document also describes the oversight and…
This document is an internal NSA memo. It describes the use of the XKEYSCORE data analysis tool to retrieve intelligence from attatched logos embedded in online documents.
This document contains a NSA graph detailing the reports made by data from various telecommunications companies, including Microsoft, Yahoo, Google, Facebook and Paltalk.
This document is an internal GCHQ wiki page. It describes BLACK HOLE, a data repository holding a variety of differnent data sources including: webmail, email transfers, ftp transfers, internet browsing metadata and website logins. The document also…
This document appears to be an extract from a GCHQ wiki article. It describes Gemalto's Yuaawaa secure file sharing device, and GCHQ attempts to gain access to it.
This document is a slide deck during a "Close Access" NSA training course to introduce students to computer network exploitation (CNE) using the FOXACID server in combinations with other tools, BADDECISION and NIGHTSTAND.
This document is an extract from a newsletter created by GCHQ's JTRIG division. It describes the planning processes behind operation QUITO, an effort to manipulate Latin American public opinion regarding the country's claims to the Falkland Islands /…
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Spain in a 30 day period between December 10 2012 and Janurary 8 2013.