April 2, 2015 |
Britain Used Spy Team to Shape Latin American Public Opinion on Falklands |
Intercept |
April 2, 2015 |
NSA Extended Enterprise Report – July 2008 |
Intercept |
April 2, 2015 |
Behavioural Science Support for JTRIG |
Intercept |
April 2, 2015 |
Op QUITO – JTRIG Wiki Highlights – August 2009 |
Intercept |
April 2, 2015 |
GCHQ Mission Driven Access Workshop |
Intercept |
April 2, 2015 |
NAC 2Q 2011 Business Review |
Intercept |
April 2, 2015 |
Comet News – March 2010 |
Intercept |
March 23, 2015 |
Communication Security Establishment's cyberwarfare toolbox revealed |
CBC |
March 23, 2015 |
CASCADE: Joint Cyber Sensor Architecture |
CBC |
March 23, 2015 |
NSA memo on intelligence relationship with CSE |
CBC |
March 23, 2015 |
CSEC Cyber Threat Capabilities |
CBC |
March 23, 2015 |
Cyber Threat Detection |
CBC |
March 23, 2015 |
CSEC SIGINT Cyber Discovery |
CBC |
March 23, 2015 |
CSE response to CBC's questions |
CBC |
March 11, 2015 |
NZ's spy reach stretches across globe |
NZ Herald |
March 11, 2015 |
NSA Intelligence Relationship with New Zealand |
NZ Herald |
March 11, 2015 |
SIGINT Development Forum Minutes - June 2009 |
NZ Herald |
March 11, 2015 |
SUSLOW Monthly Report for March 2013 |
NZ Herald |
March 10, 2015 |
iSpy: The CIA Campaign to Steal Apple's Secrets |
Intercept |
March 10, 2015 |
Black Budget: Cryptanalysis and Exploitation Services – Analysis of Target Systems |
Intercept |
March 10, 2015 |
TCB Jamboree 2012 Invitation |
Intercept |
March 10, 2015 |
Strawhorse: Attacking the MacOS and iOS Software Development Kit |
Intercept |
March 10, 2015 |
TPM Vulnerabilities to Power Analysis and An Exposed Exploit to Bitlocker |
Intercept |
March 10, 2015 |
TCB Jamboree 2012 |
Intercept |
March 10, 2015 |
Apple A4/A5 Application Processors Analysis |
Intercept |
March 10, 2015 |
Differential Power Analysis on the Apple A4 Processor |
Intercept |
March 10, 2015 |
Secure Key Extraction by Physical De-Processing of Apple's A4 Processor |
Intercept |
March 10, 2015 |
Rocoto: Implanting the iPhone |
Intercept |
March 10, 2015 |
Smurf Capability – iPhone |
Intercept |
March 7, 2015 |
Inside Waihopai's domes |
Sunday Star Times |
March 7, 2015 |
GCSB update 2012 |
Sunday Star Times |
March 7, 2015 |
GCSB update 2010 |
Sunday Star Times |
March 7, 2015 |
Second Party National Identity Rules |
Sunday Star Times |
February 26, 2015 |
CSE monitors millions of Canadian emails to government |
CBC |
February 26, 2015 |
CSEC ITS/N2E Cyber Threat Discovery |
CBC |
February 26, 2015 |
CSE Cyber Network Defence R&D Activities |
CBC |
February 19, 2015 |
The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle |
Intercept |
February 19, 2015 |
PCS Harvesting at Scale |
Intercept |
February 19, 2015 |
CNE Access to Core Mobile Networks |
Intercept |
February 19, 2015 |
Where Are These Keys? |
Intercept |
February 19, 2015 |
CCNE Successes Jan10-Mar10 Trial |
Intercept |
February 19, 2015 |
DAPINO GAMMA CNE Presence Wiki |
Intercept |
February 19, 2015 |
DAPINO GAMMA Gemalto Yuaawaa Wiki |
Intercept |
February 19, 2015 |
DAPINO GAMMA Target Personalisation Centres Gemalto Wiki |
Intercept |
February 19, 2015 |
IMSIs Identified with Ki Data for Network Providers Jan10-Mar10 Trial |
Intercept |
February 19, 2015 |
CCNE Stats Summaries Jan10-Mar10 Trial |
Intercept |
February 19, 2015 |
CCNE Email Harvesting Jan10-Mar10 Trial |
Intercept |
February 19, 2015 |
CCNE Email Addresses Jan10-Mar10 Trial |
Intercept |
February 10, 2015 |
NSA Claims Iran Learned From Western Cyberattacks |
Intercept |
February 10, 2015 |
Iran – Current Topics, Interaction with GCHQ |
Intercept |
February 4, 2015 |
Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise |
Intercept |
February 4, 2015 |
NATO Civilian Intelligence Council – Cyber Panel – US Talking Points |
Intercept |
February 4, 2015 |
INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers |
Intercept |
February 4, 2015 |
LOVELY HORSE – GCHQ Wiki Overview |
Intercept |
February 4, 2015 |
HAPPY TRIGGER/LOVELY HORSE/Zool/TWO FACE – Open Source for Cyber Defence/Progress |
Intercept |
January 28, 2015 |
CSE tracks millions of downloads daily: Snowden documents |
CBC |
January 28, 2015 |
CSE presentation: Levitation |
CBC |
January 17, 2015 |
Part 2: How the NSA Reads Over Shoulders of Other Spies |
Der Spiegel |
January 17, 2015 |
Description of an NSA employee on fifth party access / When the targeted fourth party has someone under surveillance who puts others under surveillance |
Der Spiegel |
January 17, 2015 |
4th party collection / Taking advantage of non-partner computer network exploitation activity |
Der Spiegel |
January 17, 2015 |
Combination of offensive and defensive missions / How fourth-party missions are being performed |
Der Spiegel |
January 17, 2015 |
Overview of the TRANSGRESSION program to analyze and exploit foreign CNA/CNE exploits |
Der Spiegel |
January 17, 2015 |
NSA example SNOWGLOBE, in which a suspected French government trojan is analyzed to find out if it can be helpful for own interests |
Der Spiegel |
January 17, 2015 |
NSA fourth party access / "I drink your milkshake" |
Der Spiegel |
January 17, 2015 |
NSA Program TUTELAGE to instrumentalize third party attack tools |
Der Spiegel |
January 17, 2015 |
Codename BYZANTINE HADES / NSA research on the targets of Chinese network exploitation tools, the targets and actors |
Der Spiegel |
January 17, 2015 |
CSEC document on the handling of existing trojans when trojanizing computers |
Der Spiegel |
January 17, 2015 |
Analysis of Chinese methods and performed actions in the context of computer network exploitation |
Der Spiegel |
January 17, 2015 |
Overview on the NSA use of bots and the DEFIANTWARRIOR program |
Der Spiegel |
January 17, 2015 |
HIDDENSALAMANDER / Program for the recognition of botnet activity and options for takeover of clients and data |
Der Spiegel |
January 17, 2015 |
The Digital Arms Race: NSA Preps America for Future Battle |
Der Spiegel |
January 17, 2015 |
Excerpt from the secret NSA budget on computer network operations / Code word GENIE |
Der Spiegel |
January 17, 2015 |
Document about the expansion of the Remote Operations Center (ROC) on endpoint operations |
Der Spiegel |
January 17, 2015 |
Document explaining the role of the Remote Operations Center (ROC) |
Der Spiegel |
January 17, 2015 |
Interview with an employee of NSA's department for Tailored Access Operations about his field of work |
Der Spiegel |
January 17, 2015 |
Supply-chain interdiction / Stealthy techniques can crack some of SIGINT's hardest targets |
Der Spiegel |
January 17, 2015 |
Classification guide for computer network exploitation (CNE) |
Der Spiegel |
January 17, 2015 |
NSA training course material on computer network operations |
Der Spiegel |
January 17, 2015 |
Overview of methods for NSA integrated cyber operations |
Der Spiegel |
January 17, 2015 |
NSA project description to recognize and process data that comes from third party attacks on computers |
Der Spiegel |
January 17, 2015 |
Exploring and exploiting leaky mobile apps with BADASS |
Der Spiegel |
January 17, 2015 |
Overview of projects of the TAO/ATO department such as the remote destruction of network cards |
Der Spiegel |
January 17, 2015 |
iPhone target analysis and exploitation with Apple's unique device identifiers (UDID) |
Der Spiegel |
January 17, 2015 |
Report of an NSA Employee about a Backdoor in the OpenSSH Daemon |
Der Spiegel |
January 17, 2015 |
NSA document on QUANTUMSHOOTER, an implant to remote-control computers with good network connections from unknown third parties |
Der Spiegel |
January 17, 2015 |
CSEC document about the recognition of trojans and other "network based anomaly" |
Der Spiegel |
January 17, 2015 |
The formalized process through which analysts choose their data requirement and then get to know the tools that can do the job |
Der Spiegel |
January 17, 2015 |
QUANTUMTHEORY is a set of technologies allowing man-on-the-side interference attacks on TCP/IP connections (includes STRAIGHTBIZARRE and DAREDEVIL) |
Der Spiegel |
January 17, 2015 |
Sample code of a malware program from the Five Eyes alliance |
Der Spiegel |
January 17, 2015 |
Explanation of the APEX method of combining passive with active methods to exfiltrate data from networks attacked |
Der Spiegel |
January 17, 2015 |
Explanation of APEX shaping to put exfiltrating network traffic into patterns that allow plausible deniability |
Der Spiegel |
January 17, 2015 |
Presentation on the FASHIONCLEFT protocol that the NSA uses to exfiltrate data from trojans and implants to the NSA |
Der Spiegel |
January 17, 2015 |
Methods to exfiltrate data even from devices which are supposed to be offline |
Der Spiegel |
January 17, 2015 |
Document detailing SPINALTAP, an NSA project to combine data from active operations and passive signals intelligence |
Der Spiegel |
January 17, 2015 |
Technical description of the FASHIONCLEFT protocol the NSA uses to exfiltrate data from Trojans and implants to the NSA |
Der Spiegel |
December 28, 2014 |
Prying Eyes: Inside the NSA's War on Internet Security |
Der Spiegel |
December 28, 2014 |
NSA Documents: Attacks on VPN, SSL, TLS, SSH, Tor |
Der Spiegel |
December 28, 2014 |
Guide for Analysts on how to use the PRISM Skype Collection |
Der Spiegel |
December 28, 2014 |
GCHQ Briefing on the BULLRUN Program |
Der Spiegel |
December 28, 2014 |
GCHQ Presentation on the BULLRUN Programs Decryption Capabilities |
Der Spiegel |
December 28, 2014 |
NSA LONGHAUL program for end-to-end attack orchestration and key recovery service |
Der Spiegel |
December 28, 2014 |
BLUESNORT program on "Net Defense" from Encrypted Communications |
Der Spiegel |
December 28, 2014 |
Presentation from the SIGDEV Conference 2012 explaining which encryption protocols and techniques can be attacked and which not |
Der Spiegel |
December 28, 2014 |
NSA program SCARLETFEVER explaining how attacks on encrypted connections are orchestrated |
Der Spiegel |
December 28, 2014 |
Description of VOIP Telephony Encryption methods and cryptanalytic and other ways to attack |
Der Spiegel |
December 28, 2014 |
NSA Experiment for massive SSL/TLS Decryption |
Der Spiegel |
December 28, 2014 |
Canadian Document from CES on TLS Trends |
Der Spiegel |
December 28, 2014 |
Details on how NSA uses the SCARLETFEVER program to attack Scure Sockets Layer (SSL)/Transport Layer Scurity (TLS) |
Der Spiegel |
December 28, 2014 |
Analysis from SSL/TLS Connections through GCHQ in the flying pig database |
Der Spiegel |
December 28, 2014 |
NSA High Level Description on TURMOIL / APEX Programs on Attacking VPN |
Der Spiegel |
December 28, 2014 |
Explanation of the GALLANTWAVE that decrypts VPN Traffic within LONGHAUL |
Der Spiegel |
December 28, 2014 |
Intro to the VPN Exploitation Process mentioning the protocols attacked - PPTP, IPSEC, SSL, SSH) |
Der Spiegel |
December 28, 2014 |
Analytic Challenges from Active-Passive Integration when NSA attacks IPSEC VPNs |
Der Spiegel |
December 28, 2014 |
Overview of the capabilities of the VALIANTSURF program |
Der Spiegel |
December 28, 2014 |
MALIBU Architecture Overview to exploit VPN Communication |
Der Spiegel |
December 28, 2014 |
POISENNUT Virtual Private Network Attack Orchestrator (VAO) |
Der Spiegel |
December 28, 2014 |
NSA Presentation on the development of Attacks on VPN |
Der Spiegel |
December 28, 2014 |
NSA Presentation on the Analysis and Contextualisation of data from VPN |
Der Spiegel |
December 28, 2014 |
Description of existing projects on VPN decryption |
Der Spiegel |
December 28, 2014 |
Explanation of the Transform Engine Emulator when attacking VPN |
Der Spiegel |
December 28, 2014 |
Explanation of the POISENNUT Product and its role when attacking VPN |
Der Spiegel |
December 28, 2014 |
Explanation of the TURMOIL GALLANTWAVE Program and its role when attacking VPN |
Der Spiegel |
December 28, 2014 |
Processing of data from exploited VPN in the TURMOIL program |
Der Spiegel |
December 28, 2014 |
Decryption of VPN Connections within the VALIANTSURF program |
Der Spiegel |
December 28, 2014 |
Description on the processing of VPN data packets within the TURMOIL program |
Der Spiegel |
December 28, 2014 |
Explanation on the SPIN9 program on end-to-end attacks on VPN |
Der Spiegel |
December 28, 2014 |
Explanation of a potential technique to deanonymise users of the TOR network |
Der Spiegel |
December 28, 2014 |
Analytics on security of TOR hidden services |
Der Spiegel |
December 28, 2014 |
Overview on Internet Anonymization Services on how they work |
Der Spiegel |
December 28, 2014 |
TOR deanonymisation research |
Der Spiegel |
December 28, 2014 |
TOR Overview of Existing Techniques |
Der Spiegel |
December 28, 2014 |
A potential technique to deanonymise users of the TOR network |
Der Spiegel |
December 28, 2014 |
General Description how NSA handles encrypted traffic |
Der Spiegel |
December 28, 2014 |
Intercept with PGP encrypted message |
Der Spiegel |
December 28, 2014 |
Classification Guide for Cryptanalysis |
Der Spiegel |
December 28, 2014 |
Procedural GCHQ Document on how analysts are to handle encrypted traffic |
Der Spiegel |
December 28, 2014 |
NSA / GCHQ Crypt Discovery Joint Collaboration Activity |
Der Spiegel |
December 28, 2014 |
NSA Cryptographic Modernization (CryptoMod) Classification Guide |
Der Spiegel |
December 28, 2014 |
National Information Assurance Research Laboratory (NIARL): Newsletter, Keyword TUNDRA |
Der Spiegel |
December 28, 2014 |
What Your Mother Never Told You About the development of Signal Intelligence |
Der Spiegel |
December 28, 2014 |
Intercept with OTR encrypted chat |
Der Spiegel |
December 28, 2014 |
Obama's Lists: A Dubious History of Targeted Killings in Afghanistan |
Der Spiegel |
December 28, 2014 |
US Document from 2009: Including the Drug Trade in the War Against the Taliban |
Der Spiegel |
December 28, 2014 |
Report about Operation Doody: The Child of the Neighbor Shot By Accident |
Der Spiegel |
December 28, 2014 |
The JPEL List in Anonymized Form |
Der Spiegel |
December 28, 2014 |
Take-Down Operation; U.S. SIGINT Provides Key Support |
Der Spiegel |
December 13, 2014 |
Operation Socialist: The Inside Story of How British Spies Hacked Belgium's Largest Telco |
Intercept |
December 13, 2014 |
Automated NOC detection |
Intercept |
December 13, 2014 |
Mobile Networks in My NOC World |
Intercept |
December 13, 2014 |
Making network sense of the encryption problem |
Intercept |
December 13, 2014 |
Stargate CNE requirements |
Intercept |
December 13, 2014 |
NAC review – October to December 2011 |
Intercept |
December 13, 2014 |
GCHQ NAC review – January to March 2011 |
Intercept |
December 13, 2014 |
GCHQ NAC review – April to June 2011 |
Intercept |
December 13, 2014 |
GCHQ NAC review – July to September 2011 |
Intercept |
December 13, 2014 |
GCHQ NAC review – January to March 2012 |
Intercept |
December 13, 2014 |
GCHQ Hopscotch |
Intercept |
December 13, 2014 |
Belgacom connections |
Intercept |
December 4, 2014 |
AURORAGOLD – Project Overview |
Intercept |
December 4, 2014 |
AURORAGOLD Working Group |
Intercept |
December 4, 2014 |
IR.21 – A Technology Warning Mechanism |
Intercept |
December 4, 2014 |
AURORAGOLD – Target Technology Trends Center support to WPMO |
Intercept |
December 4, 2014 |
NSA First-Ever Collect of High-Interest 4G Cellular Signal |
Intercept |
December 4, 2014 |
AURORAGOLD Working Aid |
Intercept |
December 4, 2014 |
WOLFRAMITE Encryption Attack |
Intercept |
December 4, 2014 |
OPULENT PUP Encryption Attack |
Intercept |
December 4, 2014 |
NSA/GCHQ/CSEC Network Tradecraft Advancement Team |
Intercept |
December 4, 2014 |
Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide |
Intercept |
November 20, 2014 |
Vodafone-Linked Company Aided British Mass Surveillance |
Intercept |
November 20, 2014 |
Special Source Operations (SSO) Weekly Brief 25.04.2013 - Windstop System Highlights |
Suddeutsche Zeitung |
November 20, 2014 |
Mastering the Internet (MTI) Access Project 27.06.2008 - Weekly Status |
Suddeutsche Zeitung |
November 20, 2014 |
Mastering the Internet (MTI) Access Project 28.11.2008 - Weekly Status |
Suddeutsche Zeitung |
November 20, 2014 |
Mastering the Internet (MTI) Access Project 06.02.2009 - Weekly Status |
Suddeutsche Zeitung |
November 20, 2014 |
Computer Network Exploitation (CNE) EndPoint Project Load - Pfenning |
Suddeutsche Zeitung |
November 20, 2014 |
Cable Master List: Flag EA |
Suddeutsche Zeitung |
November 20, 2014 |
PTC Glossary: INCENSER |
Suddeutsche Zeitung |
November 20, 2014 |
Access Breakdown |
Suddeutsche Zeitung |
November 20, 2014 |
Cable Master List - Data |
Suddeutsche Zeitung |
November 20, 2014 |
Cables we do not currently have good access |
Suddeutsche Zeitung |
November 20, 2014 |
Partner Cables |
Suddeutsche Zeitung |
November 20, 2014 |
Regions |
Suddeutsche Zeitung |
November 20, 2014 |
Where we are |
Suddeutsche Zeitung |
November 20, 2014 |
Where we want to be |
Suddeutsche Zeitung |
November 20, 2014 |
How Vodafone-Subsidiary Cable & Wireless Aided GCHQ's Spying Efforts |
Suddeutsche Zeitung |
October 10, 2014 |
Core Secrets: NSA Saboteurs in China and Germany |
Intercept |
October 10, 2014 |
Sentry Eagle Brief Sheet |
Intercept |
October 10, 2014 |
TAREX Classification Guide |
Intercept |
October 10, 2014 |
Exceptionally Controlled Information Listing |
Intercept |
October 10, 2014 |
ECI WHIPGENIE Classification Guide |
Intercept |
October 10, 2014 |
ECI Pawleys Classification Guide |
Intercept |
October 10, 2014 |
ECI Compartments |
Intercept |
October 10, 2014 |
CNO Core Secrets Slide Slices |
Intercept |
October 10, 2014 |
CNO Core Secrets Security Structure |
Intercept |
October 10, 2014 |
Computer Network Exploitation Classification Guide |
Intercept |
October 10, 2014 |
CNO Core Secrets |
Intercept |
September 15, 2014 |
Treasure Map Announces a New Release |
Intercept |
September 15, 2014 |
Treasure Map Presentation |
Intercept |
September 15, 2014 |
New Zealand Visit Precis |
Intercept |
September 15, 2014 |
Key Activities In Progress |
Intercept |
September 15, 2014 |
Speargun Phase One |
Der Spiegel |
September 15, 2014 |
Speargun Underway |
Der Spiegel |
September 5, 2014 |
Satellite Teleport Knowledge |
Der Spiegel |
August 31, 2014 |
Collaboration in Overdrive: A CNE Success (NSA) |
Der Spiegel |
August 31, 2014 |
Turkey and the PKK (NSA) |
Der Spiegel |
August 31, 2014 |
NCRs with Foreign Relations Missions Become 'SUSLAs' (NSA) |
Der Spiegel |
August 31, 2014 |
SINIO Seminar: Turkish Presidential and Parliamentary Elections (NSA) |
Der Spiegel |
August 31, 2014 |
NSA Intelligence Relationship with Turkey - Turkish National Intelligence Organization (MIT) and the Turkish Intelligence Directorate (SIB) (NSA) |
Der Spiegel |
August 31, 2014 |
NSAs Oldest Third Party Partnership (NSA) |
Der Spiegel |
August 31, 2014 |
Agenda 14-15 May 2013: Brigadier general XXXXXXX YYYY - Turkish Signal Intelligence Chief (NSA) |
Der Spiegel |
August 31, 2014 |
SINIO Series of Strategic Intelligence Issue Seminars Begins with Tough Times for Turkey (NSA) |
Der Spiegel |
August 31, 2014 |
JORDAN-BELGIUM (GCHQ) |
Der Spiegel |
August 31, 2014 |
Load Sharing Carriers R.O.W. (via UK) in IRAQ plus RLEs (GCHQ) |
Der Spiegel |
August 31, 2014 |
Turkey at the G20 Pre-Meeting in London September 2-5 2009 (GCHQ) |
Der Spiegel |
August 31, 2014 |
MHS/GCHQ Projects - Turkey Energy Company Development (GCHQ) |
Der Spiegel |
August 31, 2014 |
Kurdistan Regional Government (GCHQ) |
Der Spiegel |
August 31, 2014 |
SINIO Seminar: Turkey and the Kurds (NSA) |
Der Spiegel |
August 31, 2014 |
A Two-Faced Friendship: Turkey Is 'Partner and Target' for the NSA |
Der Spiegel |
August 25, 2014 |
CIA Colleagues Enthusiastically Welcome NSA Training |
Intercept |
August 25, 2014 |
Sharing Communications Metadata Across the U.S. Intelligence Community |
Intercept |
August 25, 2014 |
CRISSCROSS/PROTON Point Paper |
Intercept |
August 25, 2014 |
Decision Memorandum for the DNI on ICREACH |
Intercept |
August 25, 2014 |
Metadata Sharing Memorandum |
Intercept |
August 25, 2014 |
Sharing SIGINT metadata on ICREACH |
Intercept |
August 25, 2014 |
Metadata Policy Conference |
Intercept |
August 25, 2014 |
ICREACH Wholesale Sharing |
Intercept |
August 25, 2014 |
Black Budget Extracts |
Intercept |
August 25, 2014 |
The Surveillance Engine: How the NSA Built Its Own Secret Google |
Intercept |
August 12, 2014 |
HACIENDA Program |
Heise |
August 5, 2014 |
GCHQ Covert Mobile Phones Policy |
Intercept |
August 3, 2014 |
Directorate of Terrorist Identities (DTI) Strategic Accomplishments 2013 |
Intercept |
August 3, 2014 |
Israel-US 1999 Agreement |
Intercept |
July 25, 2014 |
NSA Intelligence Relationship With Israel |
Intercept |
July 23, 2014 |
Saudi Arabia Information Paper |
Intercept |
July 23, 2014 |
Signals Intelligence Authority Decision Tree |
Washington Post |
July 14, 2014 |
GCHQ’s Joint Threat Research Intelligence Group |
Intercept |
July 9, 2014 |
Spying on Muslim-American Leaders |
Intercept |
June 30, 2014 |
NSA document on targeting Five Eyes countries and territories |
Washington Post |
June 30, 2014 |
DNI, attorney general certify surveillance targets 'reasonably believed' to be outside U.S. |
Washington Post |
June 30, 2014 |
FISA Amendments Act of 2008 Section 702 summary document |
Washington Post |
June 30, 2014 |
NSA director Keith Alexander's Affidavit Regarding Spying on Foreign Entities |
Washington Post |
June 30, 2014 |
FISA Judge's Order Authorizing Surveillance of Foreign Entities |
Washington Post |
June 30, 2014 |
List of Foreign Entities Authorized for Surveillance |
Washington Post |
June 30, 2014 |
ODNI Certification Regarding Foreign Entities |
Washington Post |
June 30, 2014 |
Court gave NSA broad leeway in surveillance, documents show |
Washington Post |
June 18, 2014 |
Nostalgic recollections out of the NSA intranet from NSA workers formerly stationed in Bad Aibling |
Der Spiegel |
June 18, 2014 |
Document excerpt on the sharing of the NSA spy tool XKeyscore with the Federal Office for the Protection of the Constitution (BfV), Germany’s domestic intelligence agency |
Der Spiegel |
June 18, 2014 |
Secret document on the cooperation between the NSA, BND and BfV in the fight against terrorism |
Der Spiegel |
June 18, 2014 |
Preliminary agenda of a meeting between high-ranking NSA and BND officials |
Der Spiegel |
June 18, 2014 |
Briefing on the visit to the NSA of a high-ranking BND official |
Der Spiegel |
June 18, 2014 |
Final agenda of a meeting between high-ranking NSA and BND officials |
Der Spiegel |
June 18, 2014 |
Internal NSA presentation on the BND's organization |
Der Spiegel |
June 18, 2014 |
Internal NSA discussion guidelines relating to cooperation with the BND and BfV |
Der Spiegel |
June 18, 2014 |
Internal NSA discussion guidelines in preparation for a meeting with high-ranking BND officials |
Der Spiegel |
June 18, 2014 |
Comprehensive internal summary of the history and current state of cooperation between the NSA and BND |
Der Spiegel |
June 18, 2014 |
FAQs on the Boundless Informant program |
Der Spiegel |
June 18, 2014 |
Boundless Informant statistics on Germany |
Der Spiegel |
June 18, 2014 |
Boundless Informant overview (global) |
Der Spiegel |
June 18, 2014 |
Boundless Informant statistics for so-called Third Parties, which includes Germany |
Der Spiegel |
June 18, 2014 |
Boundless Informant statistics on data from "Foreign Partners" |
Der Spiegel |
June 18, 2014 |
Overview of the use of Boundless Informant (world map) |
Der Spiegel |
June 18, 2014 |
World map from the Boundless Informant program |
Der Spiegel |
June 18, 2014 |
Zoom of a Boundless Informant document, with project names |
Der Spiegel |
June 18, 2014 |
Agenda for the visit of BSI Vice President Andreas Könen to the NSA |
Der Spiegel |
June 18, 2014 |
Report on the beginnings of the European Security Center (ESC) in the Dagger Complex |
Der Spiegel |
June 18, 2014 |
Report on the changing of the ESC’s name to European Security Operations Center (ESOC) |
Der Spiegel |
June 18, 2014 |
ESOC: Report on the experiences of one NSA worker |
Der Spiegel |
June 18, 2014 |
Report on the changing of the ESOC’s name to European Cryptologic Center (ECC) including details on missions launched from there |
Der Spiegel |
June 18, 2014 |
Report on an XKeyscore training session at the ECC / Dagger Complex |
Der Spiegel |
June 18, 2014 |
Presentation on the spying program PRISM and ECC's participation |
Der Spiegel |
June 18, 2014 |
NSA/CSS presentation on technical surveillance in Europe and Africa |
Der Spiegel |
June 18, 2014 |
Report on an unexploded ordnance alarm at the European Technical Center in the Mainz-Kastel neighborhood of Wiesbaden |
Der Spiegel |
June 18, 2014 |
Report on an NSA SIGDEV training course for allied countries |
Der Spiegel |
June 18, 2014 |
Report on the technical expansion of the European Technical Center in the Mainz-Kastel neighborhood of Wiesbaden |
Der Spiegel |
June 18, 2014 |
Report on the NSA-BND cooperation known as Joint SIGINT Activity (JSA) |
Der Spiegel |
June 18, 2014 |
Report on the surveillance of African countries by JSA |
Der Spiegel |
June 18, 2014 |
Restrictions on the technical surveillance performed by JSA |
Der Spiegel |
June 18, 2014 |
Report on data exchange between the NSA and BND within the JSA framework |
Der Spiegel |
June 18, 2014 |
Merkel in the database: Presentation from the Center for Content Extraction |
Der Spiegel |
June 18, 2014 |
Report on the NSA’s access to TEMPORA |
Der Spiegel |
June 18, 2014 |
Report on the work of NSA/CSS Europe, including the capture or killing of 40 terror suspects |
Der Spiegel |
June 18, 2014 |
Guidelines for the classification of NSA SIGINT details (1945-1967) |
Der Spiegel |
June 18, 2014 |
Slide: Worldwide locations of the Cryptologic Services Groups |
Der Spiegel |
June 18, 2014 |
Slide: Worldwide locations of NSA/CSS satellite surveillance |
Der Spiegel |
June 18, 2014 |
US sites with NSA personnel in Germany |
Der Spiegel |
June 18, 2014 |
Logo of NSA-BND cooperation |
Der Spiegel |
June 18, 2014 |
Explanation of Nymrod, a system for searching for people and places in databases and documents |
Der Spiegel |
June 18, 2014 |
NSA presentation on the work of Nymrod |
Der Spiegel |
June 18, 2014 |
Report on an NSA visit to the BND site in Schöningen and on data transfer from the BND to the NSA |
Der Spiegel |
June 18, 2014 |
Presentation on the NSA/CIA unit Special Collection Service (SCS), active in US embassies around the world |
Der Spiegel |
June 18, 2014 |
Report on the one-year anniversary of the NSA liaison unit SUSLAG at the new site in the Mangfall Kaserne in Bad Aibling |
Der Spiegel |
June 18, 2014 |
Guidelines for the classification of SUSLAG details and the NSA-BND cooperation |
Der Spiegel |
June 18, 2014 |
GCHQ report on the technical abilities of the powerful spying program TEMPORA, which allows for a "full take" |
Der Spiegel |
June 18, 2014 |
Report on a WHARPDRIVE incident in an SSO presentation |
Der Spiegel |
June 18, 2014 |
Details on XKeyscore from an internal GCHQ website |
Der Spiegel |
June 18, 2014 |
Boundless Informant statistics on Great Britain |
Der Spiegel |
June 18, 2014 |
European Technical Center: Report on the experiences of one NSA |
Der Spiegel |
June 18, 2014 |
NSA/CSS Europe: Report on the experiences of one NSA worker |
Der Spiegel |
June 18, 2014 |
The NSA in Germany: Snowden's Documents Available for Download |
Der Spiegel |
June 18, 2014 |
Boundless Informant statistics on the UK |
Dagbladet |
June 18, 2014 |
Report on data exchange between the NSA and BND within the JSA framework |
Dagbladet |
June 18, 2014 |
Black Budget |
Dagbladet |
June 18, 2014 |
Keith Alexander Talking Points |
Dagbladet |
June 18, 2014 |
RAMPART-A Overview |
Dagbladet |
June 16, 2014 |
Analytics for targets in Europe |
Der Spiegel |
June 10, 2014 |
Xkeyscore Fingerprints |
Der Spiegel |
June 10, 2014 |
SANDKEY |
Cryptome |
May 19, 2014 |
SOMALGET memo |
Intercept |
May 19, 2014 |
SIDToday: DEA – The "Other" Warfighter |
Intercept |
May 19, 2014 |
SSO Dictionary Excerpt |
Intercept |
May 19, 2014 |
MYSTIC |
Intercept |
May 19, 2014 |
SSO March 14, 2013 |
Intercept |
May 19, 2014 |
SSO April 18, 2013 – What's New |
Intercept |
May 19, 2014 |
SSO May 2, 2013 |
Intercept |
May 19, 2014 |
SSO May 3, 2013 – MYSTIC |
Intercept |
May 19, 2014 |
SSO May 3, 2012 |
Intercept |
May 19, 2014 |
Black Budget Excerpt |
Intercept |
May 19, 2014 |
Data Pirates of the Caribbean: The NSA is Recording Every Cell Phone Call in the Bahamas |
Intercept |
April 30, 2014 |
No Place to Hide Documents |
Glenn Greenwald |
April 30, 2014 |
Prism Olympics |
Intercept |
April 30, 2014 |
Ghostmachine |
Intercept |
April 30, 2014 |
GCHQ Visit |
Intercept |
April 4, 2014 |
GCHQ Full Spectrum Cyber Effects |
Intercept |
April 4, 2014 |
2009 SIGDEV Conference |
Intercept |
March 29, 2014 |
GCHQ and NSA Spy on Heads of State |
Der Spiegel |
March 22, 2014 |
Operation Shotgiant Objectives |
NY Times |
March 21, 2014 |
French Intelligence E-Mail Spying Operation |
Le Monde |
March 20, 2014 |
Targeting System Administrator Accounts to Access Networks |
Intercept |
March 18, 2014 |
Adding Another Country to Mystic Program |
Washington Post |
March 18, 2014 |
Description of Data Collection Under Mystic |
Washington Post |
March 18, 2014 |
Mystic Program |
Washington Post |
March 15, 2014 |
How NSA Servers Masquerade In Order to Infect Target with Malware |
Intercept |
March 15, 2014 |
TURBINE Intelligence Command and Control |
Intercept |
March 13, 2014 |
NSA Cooperative Third Party Relationships |
Intercept |
March 12, 2014 |
TURBINE and TURMOIL |
Intercept |
March 12, 2014 |
VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN |
Intercept |
March 12, 2014 |
TURBINE Industrial Scale Exploitation |
Intercept |
March 12, 2014 |
MHS Leverages XKeyscore for Quantum |
Intercept |
March 12, 2014 |
Increasing Collection Capacity by Increasing Implants |
Intercept |
March 12, 2014 |
Five Eyes Hacking Large Routers |
Intercept |
March 12, 2014 |
NSA Technology Directorate Analysis of Converged Data |
Intercept |
March 12, 2014 |
NSA Selector Types |
Intercept |
March 12, 2014 |
Multiple Methods of Quantum |
Intercept |
March 12, 2014 |
NSA Phishing Tactics and Man in the Middle Attacks |
Intercept |
March 12, 2014 |
Quantum Insert Diagrams |
Intercept |
March 12, 2014 |
The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics |
Intercept |
March 11, 2014 |
NSA Timeline of Surveillance Law Developments |
NY Times |
March 11, 2014 |
Classification Guide for FISA, the Protect America Act and the FISA Amendments Act |
NY Times |
March 11, 2014 |
Ashcroft Memo on Intelligence Sharing Procedures |
NY Times |
March 11, 2014 |
NSA Memo Expands Access to FISA Information |
NY Times |
March 11, 2014 |
Classification Guide for Stellarwind Program |
NY Times |
March 7, 2014 |
NSA Ask Zelda - Guilty Until Proven Innocent |
Intercept |
March 7, 2014 |
NSA Ask Zelda - An Interview with Zelda |
Intercept |
March 7, 2014 |
NSA Ask Zelda - Is Bain de Soleil a Bane on the NSA |
Intercept |
March 7, 2014 |
NSA Ask Zelda - Watching Every Word in Snitch City |
Intercept |
March 7, 2014 |
Ask Zelda - The NSA Has An Advice Columnist. Seriously. |
Intercept |
March 5, 2014 |
Dutch Shares Collected Anti-Piracy Information with NSA |
NRC Handelsblad |
March 3, 2014 |
DOJ Report on Pen Register FISA Orders |
EPIC |
February 27, 2014 |
GCHQ Optic Nerve |
Guardian |
February 24, 2014 |
Training for Covert Online Operations |
Intercept |
February 18, 2014 |
GCHQ SIGDEV |
Intercept |
February 18, 2014 |
Discovery Sigint Targeting Scenarios and Compliance |
Intercept |
February 15, 2014 |
SUSLOC Trade Document |
NY Times |
February 11, 2014 |
Drones Intercepting Communications |
Intercept |
February 8, 2014 |
Boundless Nederland |
NRC Handelsblad |
February 7, 2014 |
GCHQ Honey Trap Cyber Attack - Background on JTRIG |
NBC |
February 7, 2014 |
GCHQ Honey Trap Cyber Attack - Leveraging Foreign Journalists via JTRIG |
NBC |
February 4, 2014 |
British Spies Attacked Hactivist Anonymous |
NBC |
January 31, 2014 |
CSEC Airport WiFi Tracking |
CBC |
January 30, 2014 |
COP15 Interception Document |
Information DK |
January 30, 2014 |
COP15 Interception Document |
Information DK |
January 28, 2014 |
Leaky Phone Apps |
Guardian |
January 27, 2014 |
Converged Analysis on Smartphone Devices |
NBC |
January 27, 2014 |
Squeaky Dolphin |
NY Times |
January 27, 2014 |
Mobile Theme Briefing |
NY Times |
January 16, 2014 |
Dishfire Presentation |
Guardian |
January 2, 2014 |
Quantum Computing |
Washington Post |
January 2, 2014 |
Quantum Computers Hard Targets |
Washington Post |
December 30, 2013 |
TAO Quantum Tasking |
Der Spiegel |
December 30, 2013 |
TAO Intro |
Der Spiegel |
December 30, 2013 |
QFIRE |
Jacob Appelbaum |
December 30, 2013 |
NSA ANT Catalog |
Der Spiegel |
December 30, 2013 |
TAO Quantum Theory |
Der Spiegel |
December 29, 2013 |
Inside TAO: Documents Reveal Top NSA Hacking Unit |
Der Spiegel |
December 29, 2013 |
TAO ANT Cottonmouth |
Der Spiegel |
December 23, 2013 |
NSA/CSS Mission |
Washington Post |
December 11, 2013 |
Xkeyscore Sources |
SVT |
December 11, 2013 |
Xkeyscore Sweden Meeting |
SVT |
December 11, 2013 |
Quantum from GCHQ |
SVT |
December 11, 2013 |
NSA Slides Xkeyscore |
SVT |
December 11, 2013 |
Baltic Region |
SVT |
December 11, 2013 |
Final Agenda Sweden USA |
SVT |
December 11, 2013 |
Legal Issues UK Regarding Sweden and Quantum |
SVT |
December 11, 2013 |
NSA Internal PM on FRA |
SVT |
December 11, 2013 |
Accomplishments from NSA |
SVT |
December 11, 2013 |
Sweden Neutral |
SVT |
December 11, 2013 |
Xkeyscore Slide with Swedish Example |
SVT |
December 10, 2013 |
Ghost Machine |
Washington Post |
December 10, 2013 |
Target Location |
Washington Post |
December 10, 2013 |
NSA CSEC Partnership |
CBC |
December 10, 2013 |
Location Cookies |
Washington Post |
December 10, 2013 |
GSM Classification Guide |
Washington Post |
December 10, 2013 |
Cotraveler Overview |
Washington Post |
December 9, 2013 |
NSA Video Games Paper |
NY Times |
December 5, 2013 |
Italy Spying |
SVT |
December 5, 2013 |
FRA Russia |
L'Espresso |
December 4, 2013 |
Chalkfun Foreignness |
Washington Post |
December 4, 2013 |
Fascia |
Washington Post |
December 2, 2013 |
G20 Summit |
CBC |
December 2, 2013 |
DSD Data |
Guardian |
November 30, 2013 |
AIVD SIGINT |
Globe and Mail |
November 30, 2013 |
CSEC Brazil |
NRC Handelsblad |
November 26, 2013 |
Microsoft Cloud Exploitation |
Washington Post |
November 26, 2013 |
Microsoft Monkey Puzzle |
Washington Post |
November 26, 2013 |
Radicalizers Pornography |
Huffington Post |
November 23, 2013 |
SIGINT Strategy 2012 |
NY Times |
November 23, 2013 |
NSA Malware |
NRC Handelsblad |
November 22, 2013 |
Boundless Informant |
Dagbladet |
November 22, 2013 |
Boundless Informant FAQ |
Dagbladet |
November 22, 2013 |
Afghanistan Collection |
Dagbladet |
November 20, 2013 |
Collection, Processing and Dissemination of Allied Communications |
Guardian |
November 19, 2013 |
Norway Collection |
US Government |
November 19, 2013 |
Interim Competency Test for Access to FISA Data |
US Government |
November 19, 2013 |
NSA Course Materials Module 5 v.24 |
US Government |
November 19, 2013 |
Office of General Council Business Record Analyst Training Slides |
US Government |
November 19, 2013 |
NSA Course Materials Module 6 Analytic Personal v.18 |
US Government |
November 19, 2013 |
NSA Cryptological School Course Slides on Legal, Compliance, and Minimization Procedures |
US Government |
November 19, 2013 |
NSA Course Materials Module 6 Tech Personnel v.25 |
US Government |
November 19, 2013 |
NSA Guidance Memo on Legal Standards for Searching Bulk Metadata |
US Government |
November 19, 2013 |
United States Signals Intelligence Directive 18 Jan 25 2011 |
US Government |
November 19, 2013 |
AG Guidelines for Domestic FBI Operations |
US Government |
November 19, 2013 |
United States Signals Intelligence Directive 18 Appendix J |
US Government |
November 19, 2013 |
NSA Core Intelligence Oversight Training |
US Government |
November 19, 2013 |
NSA Course Materials Intro v.13 |
US Government |
November 19, 2013 |
NSA Course Materials Module 1 v.17 |
US Government |
November 19, 2013 |
Verification Slide |
Dagbladet |
November 19, 2013 |
NSA Course Materials Module 2 v.16 |
US Government |
November 19, 2013 |
NSA Summary of Requirements for Collection of Bulk Metadata |
US Government |
November 19, 2013 |
NSA Course Materials Module 3 v.22 |
US Government |
November 19, 2013 |
NSA Metadata Collection Training Slides |
US Government |
November 19, 2013 |
NSA Course Materials Module 4 v.28 |
US Government |
November 17, 2013 |
DSD 3G |
Guardian |
November 17, 2013 |
Royal Concierge |
Guardian |
November 4, 2013 |
Boundless Informant |
El Mundo |
November 4, 2013 |
Info Sharing Partners |
El Mundo |
November 4, 2013 |
Special Source Operations (SSO) Collection Optimization 'Midpoint' Slides - Google and Yahoo! exploitations |
Washington Post |
November 4, 2013 |
Special Source Operations (SSO) Intercept Program Slides -- cable programs, details of MUSCULAR |
Washington Post |
November 4, 2013 |
WINDSTOP Collection 30 day period December 2012 - January 2013 |
Washington Post |
November 3, 2013 |
Collection Accesses 30 Nov 2009 |
NY Times |
November 3, 2013 |
NSA SIGINT Mission Strategic Plan 2008-2013 |
NY Times |
November 3, 2013 |
NSA SIGINT January 2007 Strategic Mission List |
NY Times |
November 1, 2013 |
Corporate FAA Reporting Metrics |
Guardian |
October 30, 2013 |
MUSCULAR slide 'Current Efforts on Google' |
Washington Post |
October 30, 2013 |
Slides on MUSCULAR program possibly from February 28, 2013 |
Washington Post |
October 28, 2013 |
Graphic showing phone calls intercepted in Spain December 2012 |
El Mundo |
October 27, 2013 |
NSA SCS Slides on embassy spying (slides 3-6) |
Der Spiegel |
October 25, 2013 |
Close Access Sigads September 10, 2010 (listing French Embassy) |
Le Monde |
October 25, 2013 |
Cable regarding cyber attacks on French Presidential Network April 12, 2013 |
Le Monde |
October 24, 2013 |
NSA memo to Signals Intelligence Division (SID) staff October 27, 2006 regarding monitoring of phones of world leaders |
Guardian |
October 22, 2013 |
Prism April 2013 |
Le Monde |
October 21, 2013 |
NSA PRISM slide undated - alcatel / wanadoo |
Le Monde |
October 21, 2013 |
Boundless Informant France |
Le Monde |
October 20, 2013 |
NSA Cable dated November 10, 2010 discussing hacking of Mexican President's email |
Der Spiegel |
October 14, 2013 |
Intellipedia entry - Special Source Organization (SSO) Collection Optimization Overview |
Washington Post |
October 14, 2013 |
NSA Special Source Organization (SSO) Slides on Content Optimization - Address Books (SCISSORS) |
Washington Post |
October 14, 2013 |
NSA Special Source Organization (SSO) slides on Content Acquisition Optimization |
Washington Post |
October 6, 2013 |
Presentation on Brazilian Ministry of Mines and Energy |
O Globo Fantastico |
October 4, 2013 |
Tor Stinks Presentation June 2012 |
Guardian |
October 4, 2013 |
Peeling Back the Layers of Tor with Egotistical Giraffe January 8, 2007 |
Guardian |
October 4, 2013 |
Types of IAT (how Tor works) |
Guardian |
October 4, 2013 |
NSA Notes from talk on Tor by Roger Dingledine November 2007 |
Washington Post |
October 4, 2013 |
NSA Cryptanalysis and Exploitation Services Report on TOR 2006 |
Washington Post |
October 4, 2013 |
GCHQ Mullenize |
Washington Post |
September 28, 2013 |
NSA memo from January 3, 2011 on contact chaining |
NY Times |
September 28, 2013 |
Slide on contact chaining (SYANPSE) |
NY Times |
September 20, 2013 |
GCHQ Slides on Belgacom |
Der Spiegel |
September 16, 2013 |
NSA Network Analysis Center 2010 SIGDEV Conference on credit card authorization network mapping |
Der Spiegel |
September 11, 2013 |
Israel Sharing |
Guardian |
September 9, 2013 |
NSA slides on smartphones |
Der Spiegel |
September 8, 2013 |
Stormbrew TV |
O Globo Fantastico |
September 8, 2013 |
NSA slides on Petrobras and private networks |
O Globo Fantastico |
September 5, 2013 |
NSA Classification Guide for Cryptanalysis from September 13, 2005 |
Guardian |
September 5, 2013 |
NSA SIGINT Enabling Project Description - engaging companies to covertly leverage product designs (no date) |
Guardian |
September 5, 2013 |
Project Bullrun Description June 16, 2010 |
Guardian |
September 3, 2013 |
SATC slides Mexico and Brazil Case Studies |
O Globo Fantastico |
September 1, 2013 |
NSA document dated June 2010 (not released) discussing targeting of French Foreign Ministry |
Der Spiegel |
August 31, 2013 |
NSA document dated March 23, 2006 (not released) showing that Al Jazeera was surveilled |
Der Spiegel |
August 30, 2013 |
FY 2013 Congressional Budget Summary February 2012 National Intelligence Program Summary ('black budget') |
Washington Post |
August 23, 2013 |
Prism Payments |
Guardian |
August 16, 2013 |
'So You Got a US Person?' training slide November 8, 2011 |
Washington Post |
August 16, 2013 |
NSA Signals Intelligence Division (SID) Oversight and Compliance Report May 31, 2012 discussing privacy violations for the preceding year |
Washington Post |
August 16, 2013 |
NSA Special Source Organization (SSO) news article from October 12, 2011 discussing FISC ruling holding NSA surveillance unconstitutional |
Washington Post |
August 16, 2013 |
NSA Targeting Analyst Rationale slides (undated) |
Washington Post |
August 9, 2013 |
NSA Special Source Organization (SSO) glossary on Section 702 |
Guardian |
July 31, 2013 |
NSA Xkeyscore Training Slides Feb 25, 2008 |
Guardian |
July 10, 2013 |
PRISM slides (Updated) |
Washington Post |
June 30, 2013 |
Dropmire |
Guardian |
June 29, 2013 |
PRISM slides |
Washington Post |
June 27, 2013 |
NSA OIG Working Draft Report from March 24, 2009 on Stellar Wind (PSP) |
Guardian |
June 27, 2013 |
DOJ Memo from November 20, 2007 Proposing Amendment to DOD procedures to allow NSA to do contact chaining of metadata related to US Persons |
Guardian |
June 20, 2013 |
Procedures Used by NSA for Targeting Non-US Persons Reasonably Believed to Be Outside the US to Acquire Foreign Intelligence Pursuant to 702 FISC July 29, 2009 |
Guardian |
June 20, 2013 |
Minimization Procedures used by NSA in Connection with Data Acquisitions Pursuant to 702 FISC July 29, 2009 |
Guardian |
June 8, 2013 |
PRISM/Upstream explanation slides |
Guardian |
June 8, 2013 |
Boundless Informant Introduction Slides July 13, 2012 |
Guardian |
June 8, 2013 |
Boundless Informant Explanation/FAQ Slides September 6, 2012 |
Guardian |
June 6, 2013 |
PRISM slides |
Washington Post |
June 6, 2013 |
NSA collecting phone records of millions of Verizon customers daily |
Guardian |
June 6, 2013 |
Verizon Foreign Intelligence Surveillance Court Order |
Guardian |