Date Document
12/28/2014 Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic
6/20/2013 Procedures Used by NSA for Targeting Non-US Persons Reasonably Believed to Be Outside the US to Acquire Foreign Intelligence Pursuant to 702 FISC July 29, 2009
1/17/2015 Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job
12/28/2014 Processing of Data From Exploited VPN In the TURMOIL Program
9/5/2013 Project Bullrun Description June 16, 2010
6/22/2015 Project Camberdada - NSA
1/17/2015 Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards
11/25/2014 PTC Glossary
9/25/2015 PullThrough Steering Group Minutes
9/25/2015 QFD BLACKHOLE Technology Behind INOC
12/30/2013 QFIRE
9/5/2014 Quadrennial Intelligence Community Review Final Report
1/2/2014 Quantum Computers Hard Targets
1/2/2014 Quantum Computing
12/11/2013 Quantum from GCHQ
3/12/2014 Quantum Insert Diagrams
1/17/2015 QUANTUMSHOOTER Implant to Remote-control Computers From Unknown Third Parties
1/17/2015 QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL)
11/26/2013 Radicalizers Pornography
6/18/2014 RAMPART-A Overview
5/18/2015 RC SW Intelligence Summaries
1/17/2015 Recognize and Process Data From Third Party Attacks
1/17/2015 Report of An NSA Employee About a Backdoor In the OpenSSH Daemon
6/18/2014 Report on a WHARPDRIVE incident in an SSO presentation
6/18/2014 Report on an NSA SIGDEV training course for allied countries
6/18/2014 Report on an NSA visit to BND site and on data transfer from the BND to the NSA
6/18/2014 Report on an unexploded ordnance alarm at European Technical Centern
6/18/2014 Report on an XKeyscore training session at the ECC / Dagger Complex
6/18/2014 Report on data exchange between the NSA and BND within the JSA framework
6/18/2014 Report on the beginnings of the European Security Center (ESC) in the Dagger Complex
6/18/2014 Report on the changing of the ESC’s name to European Security Operations Center (ESOC)
6/18/2014 Report on the changing of the ESOC’s name to European Cryptologic Center (ECC)
6/18/2014 Report on the NSA-BND cooperation known as Joint SIGINT Activity (JSA)
6/18/2014 Report on the NSA’s access to TEMPORA
6/18/2014 Report on the one-year anniversary of the NSA liaison unit SUSLAG in Bad Aibling
6/18/2014 Report on the surveillance of African countries by JSA
6/18/2014 Report on the technical expansion of the European Technical Center in Wiesbaden
6/18/2014 Report on the work of NSA/CSS Europe
6/18/2014 Restrictions on the technical surveillance performed by JSA
6/22/2015 Reverse Engineering - GCHQ Wiki
11/17/2013 Royal Concierge
5/5/2015 RT10 Overview
7/1/2015 RWC Updater Readme
1/17/2015 Sample Code of A Malware Program From the Five Eyes Alliance
6/10/2014 SANDKEY
9/3/2013 SATC slides Mexico and Brazil Case Studies
9/14/2014 Satellite Teleport Knowledge
7/25/2014 Saudi Arabia Information Paper
12/28/2014 SCARLETFEVER How Attacks on Encrypted Connections are Orchestrated
12/28/2014 SCARLETFEVER Program to Attack Secure Sockets Layer (SSL) - (TLS)

Pages