Date Document
8/3/2015 CQV Fields Nov 2010
8/25/2014 CRISSCROSS/PROTON Point Paper
9/25/2015 Crypt Defense Operations Legal Policy
9/25/2015 Crypt Discovery Activity
3/23/2015 CSE Cyberwarfare Toolbox (Collection)
1/28/2015 CSE Presentation on the LEVITATION Project
1/31/2014 CSEC Airport WiFi Tracking
11/30/2013 CSEC Brazil
1/17/2015 CSEC Document About the Recognition of Trojans and Other network Based Anomaly
1/17/2015 CSEC Document on the Handling of Existing Trojans When Trojanizing Computers
6/4/2015 Cyber Surveillance Documents
5/28/2015 Data is Not Intelligence
9/25/2015 Data Stored in BLACK HOLE
5/19/2014 DEA Warfighter
12/28/2014 Decryption of VPN Connections Within the VALIANTSURF Program
7/1/2015 DEEPDIVE Readme
9/25/2015 Demystifying NGE Rock Ridge
3/18/2014 Description of Data Collection Under Mystic
12/28/2014 Description of Existing Projects on VPN Decryption
12/28/2014 Description of VOIP Telephony Encryption Methods and Other Ways to Attack
12/28/2014 Description on the Processing of VPN Data Packets Within the TURMOIL Program
6/18/2014 Details on XKeyscore from an internal GCHQ website
8/5/2014 Directorate of Terrorist Identities (DTI) Strategic Accomplishments 2013
2/18/2014 Discovery Sigint Targeting Scenarios and Compliance
1/16/2014 Dishfire Presentation
8/25/2014 DNI Decision Memorandum on ICREACH
7/1/2015 DNI101
5/28/2015 Do We Need A Bigger SIGINT Truck?
1/17/2015 Document About the Expansion of the Remote Operations Center (ROC) on Endpoint Operations
1/17/2015 Document Explaining the Role of the Remote Operations Center (ROC)
6/27/2013 DOJ Memo from November 20, 2007 Proposing Amendment to DOD procedures to allow NSA to do contact chaining of metadata related to US Persons
3/3/2014 DOJ Report on Pen Register FISA Orders
2/11/2014 Drones Intercepting Communications
6/30/2013 Dropmire
11/17/2013 DSD 3G
12/2/2013 DSD Data
3/5/2014 Dutch Shares Collected Anti-Piracy Information with NSA
10/10/2014 ECI Compartments
10/10/2014 ECI Pawleys Classification Guide
10/10/2014 ECI WHIPGENIE Classification Guide
7/1/2015 Email Address vs User Activity
6/18/2014 ESOC- Report on the experiences of one NSA worker
6/18/2014 ESOC- Report on the experiences of one NSA worker
6/18/2014 European Technical Center- Report on the experiences of one NSA worker
9/25/2015 Event Analysis
9/25/2015 Events
10/10/2014 Exceptionally Controlled Information Listing
1/17/2015 Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE
6/18/2014 Excerpt on the sharing of XKeyscore with German intelligence agency BfV
12/28/2014 Explanation of A Potential Technique to Deanonymise Users of the TOR Network

Pages