8/3/2015 |
CQV Fields Nov 2010 |
8/25/2014 |
CRISSCROSS/PROTON Point Paper |
9/25/2015 |
Crypt Defense Operations Legal Policy |
9/25/2015 |
Crypt Discovery Activity |
3/23/2015 |
CSE Cyberwarfare Toolbox (Collection) |
1/28/2015 |
CSE Presentation on the LEVITATION Project |
1/31/2014 |
CSEC Airport WiFi Tracking |
11/30/2013 |
CSEC Brazil |
1/17/2015 |
CSEC Document About the Recognition of Trojans and Other network Based Anomaly |
1/17/2015 |
CSEC Document on the Handling of Existing Trojans When Trojanizing Computers |
6/4/2015 |
Cyber Surveillance Documents |
5/28/2015 |
Data is Not Intelligence |
9/25/2015 |
Data Stored in BLACK HOLE |
5/19/2014 |
DEA Warfighter |
12/28/2014 |
Decryption of VPN Connections Within the VALIANTSURF Program |
7/1/2015 |
DEEPDIVE Readme |
9/25/2015 |
Demystifying NGE Rock Ridge |
3/18/2014 |
Description of Data Collection Under Mystic |
12/28/2014 |
Description of Existing Projects on VPN Decryption |
12/28/2014 |
Description of VOIP Telephony Encryption Methods and Other Ways to Attack |
12/28/2014 |
Description on the Processing of VPN Data Packets Within the TURMOIL Program |
6/18/2014 |
Details on XKeyscore from an internal GCHQ website |
8/5/2014 |
Directorate of Terrorist Identities (DTI) Strategic Accomplishments 2013 |
2/18/2014 |
Discovery Sigint Targeting Scenarios and Compliance |
1/16/2014 |
Dishfire Presentation |
8/25/2014 |
DNI Decision Memorandum on ICREACH |
7/1/2015 |
DNI101 |
5/28/2015 |
Do We Need A Bigger SIGINT Truck? |
1/17/2015 |
Document About the Expansion of the Remote Operations Center (ROC) on Endpoint Operations |
1/17/2015 |
Document Explaining the Role of the Remote Operations Center (ROC) |
6/27/2013 |
DOJ Memo from November 20, 2007 Proposing Amendment to DOD procedures to allow NSA to do contact chaining of metadata related to US Persons |
3/3/2014 |
DOJ Report on Pen Register FISA Orders |
2/11/2014 |
Drones Intercepting Communications |
6/30/2013 |
Dropmire |
11/17/2013 |
DSD 3G |
12/2/2013 |
DSD Data |
3/5/2014 |
Dutch Shares Collected Anti-Piracy Information with NSA |
10/10/2014 |
ECI Compartments |
10/10/2014 |
ECI Pawleys Classification Guide |
10/10/2014 |
ECI WHIPGENIE Classification Guide |
7/1/2015 |
Email Address vs User Activity |
6/18/2014 |
ESOC- Report on the experiences of one NSA worker |
6/18/2014 |
ESOC- Report on the experiences of one NSA worker |
6/18/2014 |
European Technical Center- Report on the experiences of one NSA worker |
9/25/2015 |
Event Analysis |
9/25/2015 |
Events |
10/10/2014 |
Exceptionally Controlled Information Listing |
1/17/2015 |
Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE |
6/18/2014 |
Excerpt on the sharing of XKeyscore with German intelligence agency BfV |
12/28/2014 |
Explanation of A Potential Technique to Deanonymise Users of the TOR Network |