Browse Items (626 total)

20141125-sueddeutsche-access_breakdown.pdf
This document is a GCHQ report detailing the cable access points utilized by GCHQ to intercept communications using the infrastructure of major British telecommunications companies.

20141204-intercept-opulant_pup_encryption_attack.pdf
This document is an extract from a GCHQ programme report that discusses decryption research and development for accessing "A5/3 enciphered GSM air-interface." The programme name is OPULENT PUP.

20141228-spiegel-explanation_of_a_potential_technique_to_deanonymise_users_of_the_tor_network.pdf
This document is a presentation on a potential approach to circumventing TOR (The Onion Router) which allows users to remain anonymous on the web. The presentation explores one method of correlating TOR "exit node traffic, and traffic between client…

20141228-speigel-a_potential_technique_to_deanonymise_users_of_the_tor_network_0.pdf
This document is a technical brief on decryption, specifically outling a "technique that can deanonymisc TOR web-browsing." TOR (The Onion Router) is "used by individuals and organisations that want to hide the originating IP address of their…

20140618-der_spiegel-nostalgic_recollections_from_nsa_workers_formerly_stationed_in_bad_aibling.pdf
This NSA newsrelease contains former Bad Aibiling NSA staff memories from their time at the station.

20131117-guardian-dsd_3g.pdf
This document is a DSD presentation describing Australia's Defence Signals Directorates' (now the Australian Signals Directorate) efforts to intercept the communications of various Indonesian politicians, including the president, Susilo Bambang…

20141204-intercept-nsa_gchq_csec_network_tradecraft_advancement.pdf
This document is an extract of a presentation discussing the collaboration between CSE, NSA and GSHQ on various aspects of signals intelligence, including VPN exploitation, network intelligence, IP analysis, and IR21 processing.

20140519-intercept-black_budget.pdf
This document is an excerpt from the United States Intelligence Community 2013 "Black Budget". This secret budget was used to describe covert programs. This extract describes the Special Source Operations (SSO) project, designed to assist the…

20140618-dagbladet-black_budget.pdf
This document is an extract from the 2013 "Black Budget", a budget covering expenses related to the Unites States Intelligence Community's covert operations and programs. This extract describes the Foreign Partner Access Program, comprised of the…

Digint-Imbalance.pdf
This document is a report from GCHQ. It details the challenges facing the agency in managing its strategic communications intelligence requirements for 2010 and 2011
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2