This document is a presentation describing the NSA's query program, XKeyscore. The program's structure, appearance and technical architecture are described and compared to other tools available to the NSA. The document also contains examples of the…
This document is a GCHQ report detailing the cable access points utilized by GCHQ to intercept communications using the infrastructure of major British telecommunications companies.
This document is an article is from the internal NSA newsletter, SIDtoday. It announces the NSA preparations for the 2004 Athens Olympics, and briefly discusses intelligence operations of prior olympic games.
This document is a catalog of the technologies and devices available to the NSA to aid in surveillance. Most devices are described as being operational and available to intelligence agencies across the Five Eyes (5VEY) alliance. The capabilities and…
This document is an article from the NSA's newsletter, SIDtoday. It originally appeared in GCHQ Menwith Hill Station's newsletter, Horizon in March 2012. This article describes INTOLERANT, an effort to identify when surveillance targets are…
This document is a short presentation from the NSA Digital Network Crypt Applications unit (DNCA) describing expansions in scale and volume to the GALLANTWAVE decrpytion program.
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Spain in a 30 day period between December 10 2012 and Janurary 8 2013.
This document is an extract from a newsletter created by GCHQ's JTRIG division. It describes the planning processes behind operation QUITO, an effort to manipulate Latin American public opinion regarding the country's claims to the Falkland Islands /…
This document is a slide deck during a "Close Access" NSA training course to introduce students to computer network exploitation (CNE) using the FOXACID server in combinations with other tools, BADDECISION and NIGHTSTAND.
This document appears to be an extract from a GCHQ wiki article. It describes Gemalto's Yuaawaa secure file sharing device, and GCHQ attempts to gain access to it.