12/28/2014 |
Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic |
6/20/2013 |
Procedures Used by NSA for Targeting Non-US Persons Reasonably Believed to Be Outside the US to Acquire Foreign Intelligence Pursuant to 702 FISC July 29, 2009 |
1/17/2015 |
Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job |
12/28/2014 |
Processing of Data From Exploited VPN In the TURMOIL Program |
9/5/2013 |
Project Bullrun Description June 16, 2010 |
6/22/2015 |
Project Camberdada - NSA |
1/17/2015 |
Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards |
11/25/2014 |
PTC Glossary |
9/25/2015 |
PullThrough Steering Group Minutes |
9/25/2015 |
QFD BLACKHOLE Technology Behind INOC |
12/30/2013 |
QFIRE |
9/5/2014 |
Quadrennial Intelligence Community Review Final Report |
1/2/2014 |
Quantum Computers Hard Targets |
1/2/2014 |
Quantum Computing |
12/11/2013 |
Quantum from GCHQ |
3/12/2014 |
Quantum Insert Diagrams |
1/17/2015 |
QUANTUMSHOOTER Implant to Remote-control Computers From Unknown Third Parties |
1/17/2015 |
QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL) |
11/26/2013 |
Radicalizers Pornography |
6/18/2014 |
RAMPART-A Overview |
5/18/2015 |
RC SW Intelligence Summaries |
1/17/2015 |
Recognize and Process Data From Third Party Attacks |
1/17/2015 |
Report of An NSA Employee About a Backdoor In the OpenSSH Daemon |
6/18/2014 |
Report on a WHARPDRIVE incident in an SSO presentation |
6/18/2014 |
Report on an NSA SIGDEV training course for allied countries |
6/18/2014 |
Report on an NSA visit to BND site and on data transfer from the BND to the NSA |
6/18/2014 |
Report on an unexploded ordnance alarm at European Technical Centern |
6/18/2014 |
Report on an XKeyscore training session at the ECC / Dagger Complex |
6/18/2014 |
Report on data exchange between the NSA and BND within the JSA framework |
6/18/2014 |
Report on the beginnings of the European Security Center (ESC) in the Dagger Complex |
6/18/2014 |
Report on the changing of the ESC’s name to European Security Operations Center (ESOC) |
6/18/2014 |
Report on the changing of the ESOC’s name to European Cryptologic Center (ECC) |
6/18/2014 |
Report on the NSA-BND cooperation known as Joint SIGINT Activity (JSA) |
6/18/2014 |
Report on the NSA’s access to TEMPORA |
6/18/2014 |
Report on the one-year anniversary of the NSA liaison unit SUSLAG in Bad Aibling |
6/18/2014 |
Report on the surveillance of African countries by JSA |
6/18/2014 |
Report on the technical expansion of the European Technical Center in Wiesbaden |
6/18/2014 |
Report on the work of NSA/CSS Europe |
6/18/2014 |
Restrictions on the technical surveillance performed by JSA |
6/22/2015 |
Reverse Engineering - GCHQ Wiki |
11/17/2013 |
Royal Concierge |
5/5/2015 |
RT10 Overview |
7/1/2015 |
RWC Updater Readme |
1/17/2015 |
Sample Code of A Malware Program From the Five Eyes Alliance |
6/10/2014 |
SANDKEY |
9/3/2013 |
SATC slides Mexico and Brazil Case Studies |
9/14/2014 |
Satellite Teleport Knowledge |
7/25/2014 |
Saudi Arabia Information Paper |
12/28/2014 |
SCARLETFEVER How Attacks on Encrypted Connections are Orchestrated |
12/28/2014 |
SCARLETFEVER Program to Attack Secure Sockets Layer (SSL) - (TLS) |