|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| _20131119-odni-nsa_course_materials_module_4_v.28.pdf |
2.67MB |
| 01302014-dagbladet-cop15_interception_document.pdf |
60.12KB |
| 01312014-cbc-csec_airport_wifi_tracking.pdf |
2.11MB |
| 2009-OIG_Report_on_Bulk_Collection.pdf |
3.75MB |
| 2011-OIG_Report_on_Bulk_Collection.pdf |
4.30MB |
| 20130605-guard-verizon_215_secondary_order.pdf |
127.79KB |
| 20130606-wapo-prism.pdf |
562.03KB |
| 20130608-guard-boundless_informant_capabilities.pdf |
719.29KB |
| 20130608-guard-boundless_informant_faq.pdf |
532.16KB |
| 20130608-guard-prism.pdf |
132.25KB |
| 20130620-guard-702_minimization_procedures.pdf |
509.84KB |
| 20130620-guard-702_targeting_procedures.pdf |
539.17KB |
| 20130627-guard-2007_memo_on_us_person_metadata.pdf |
974.10KB |
| 20130627-guard-nsa_oig_2009_report.pdf |
7.34MB |
| 20130629-wapo-prism.pdf |
602.62KB |
| 20130630-guard-dropmire_.pdf |
16.25KB |
| 20130710-wapo-upstream.pdf |
207.76KB |
| 20130731-guard-xkeyscore_training_slides.pdf |
27.26MB |
| 20130809-guard-702_glossary.pdf |
151.72KB |
| 20130816-wapo-sid_oversight.pdf |
1.20MB |
| 20130816-wapo-so_you_got_a_us_person.pdf |
147.08KB |
| 20130816-wapo-sso_news_article.pdf |
94.89KB |
| 20130816-wapo-targeting_rationale.pdf |
457.02KB |
| 20130830_cryptome_congressional_budget_2013.pdf |
2.26MB |
| 2013-08-30_cryptome_congressional_budget_2013.pdf |
2.26MB |
| 20130903-globo-satc.pdf |
1.56MB |
| 20130905-guard-bullrun.pdf |
686.80KB |
| 20130905-guard-cryptanalysis_classification.pdf |
248.25KB |
| 20130905-guard-sigint_enabling.pdf |
382.13KB |
| 20130908-globo-stormbew_tv.pdf |
90.66KB |
| 20130908-globo-stormbrew_tv.pdf |
90.66KB |
| 20130908-globo-tv.pdf |
649.75KB |
| 20130909-spiegel-smartphones.pdf |
519.64KB |
| 20130911-guard-israel_sharing_0.pdf |
808.09KB |
| 20130916-spiegel-credit_card_transactions.pdf |
422.18KB |
| 20130920-spiegel-belgacom.pdf |
317.78KB |
| 20130928-nyt-contact_chaining.pdf |
280.44KB |
| 20130928-nyt-syanpse.pdf |
186.37KB |
| 20131004-guard-egotistical_giraffe.pdf |
1.96MB |
| 20131004-guard-iat_tor.pdf |
1000.26KB |
| 20131004-guard-tor_stinks.pdf |
2.00MB |
| 20131004-wapo-gchq_mullenize.pdf |
1.26MB |
| 20131004-wapo-tor.pdf |
310.58KB |
| 20131014-wapo-collection_optimization.pdf |
59.96KB |
| 20131014-wapo-content_acquisition_optimization1.pdf |
2.70MB |
| 20131014-wapo-content_acquisition_optimization2.pdf |
2.50MB |
| 20131020-spiegel-mexican_president.pdf |
180.92KB |
| 20131021-monde-boundless_informant_france.pdf |
136.65KB |
| 20131021-monde-close_access_sigads.pdf |
198.53KB |
| 20131021-monde-wanadoo_alcatel.pdf |
115.18KB |
| 20131022-monde-prism_april_2013.pdf |
1.26MB |
| 20131024-guard-phones_world_leaders.pdf |
147.73KB |
| 20131025-monde-french_cyberattacks.pdf |
666.39KB |
| 20131027-spiegel-embassy.pdf |
632.37KB |
| 20131028-mundo-spain_collections.pdf |
15.12KB |
| 20131030-wapo-muscular_smiley.pdf |
244.01KB |
| 20131030-wapo-muscular.pdf |
96.50KB |
| 20131101-guard-corporate_reporting.pdf |
121.06KB |
| 20131104-mundo-boundless_informant.pdf |
621.45KB |
| 20131104-mundo-info_sharing_partners.pdf |
103.45KB |
| 20131104-nyt-collection_accesses.pdf |
48.94KB |
| 20131104-nyt-sigint_goals.pdf |
1.68MB |
| 20131104-nyt-sigint_strategic_plan.pdf |
2.38MB |
| 20131104-wapo-optimization_google.pdf |
2.12MB |
| 20131104-wapo-sso_overview.pdf |
465.47KB |
| 20131104-wapo-windstop.pdf |
94.00KB |
| 20131117-guardian-dsd_3g.pdf |
340.47KB |
| 20131117-spiegel-royal_concierge.pdf |
93.92KB |
| 20131119-dagbladet-norway_collection_0.pdf |
53.53KB |
| 20131119-odni-ag_guidelines_for_domestic_fbi_operations.pdf |
7.34MB |
| 20131119-odni-interim_competency_test_for_access_to_fisa_data.pdf |
171.14KB |
| 20131119-odni-nsa_core_intelligence_oversight_training.pdf |
15.62MB |
| 20131119-odni-nsa_course_materials_intro_v.13.pdf |
378.08KB |
| 20131119-odni-nsa_course_materials_module_1_v.17.pdf |
1.01MB |
| 20131119-odni-nsa_course_materials_module_2_v.16.pdf |
811.74KB |
| 20131119-odni-nsa_course_materials_module_3_v.22.pdf |
1.35MB |
| 20131119-odni-nsa_course_materials_module_4_v.28.pdf |
2.67MB |
| 20131119-odni-nsa_course_materials_module_5_v.24.pdf |
906.48KB |
| 20131119-odni-nsa_course_materials_module_6_analytic_personal_v.18.pdf |
1019.92KB |
| 20131119-odni-nsa_course_materials_module_6_tech_personnel_v.25.pdf |
2.40MB |
| 20131119-odni-nsa cryptological school course slides on legal compliance and minimization procedures pdf |
17.02MB |
| 20131119-odni-nsa guidance memo on legal standards for searching bulk metadata pdf |
1.79MB |
| 20131119-odni-nsa_metadata_collection_training_slides_.pdf |
7.46MB |
| 20131119-odni-nsa summary of requirements for collection of bulk metadata pdf |
293.91KB |
| 20131119-odni-office of general council business record analyst training slides pdf |
2.13MB |
| 20131119-odni-united states signals intelligence directive 18 appendix j pdf |
4.34MB |
| 20131119-odni-united states signals intelligence directive 18 jan 25 2011 pdf |
9.34MB |
| 20131119-odni-verification_slide.pdf |
86.98KB |
| 20131120-guard-collection processing and dissemination of allied communications pdf |
246.38KB |
| 20131122-dagbladet-afghanistan_collection.pdf |
30.26KB |
| 20131122-dagbladet-boundless_informant_faq.pdf |
274.13KB |
| 20131122-dagbladet-boundless_informant.pdf |
5.71MB |
| 20131123-nrc-nsa_malware.pdf |
145.98KB |
| 20131123-nyt-sigint_strategy_feb_2012.pdf |
372.73KB |
| 20131126-huffpo-radicalizers_pornography.pdf |
795.25KB |
| 20131126-wapo-microsoft_cloud_exploitation.pdf |
2.37MB |
| 20131126-wapo-microsoft_monkey_puzzle.pdf |
46.12KB |
| 20131130-GlobeandMail-csec-br-spy.pdf |
616.64KB |
| 20131202-cbc-g20.pdf |
136.32KB |
| 20131202-guard-dsd_data.pdf |
152.84KB |
| 20131204-wapo-chalkfun_foreignness.pdf |
61.37KB |
| 20131204-wapo-fascia.pdf |
233.23KB |
| 20131205-espresso-italy_spying.pdf |
168.78KB |
| 20131205-svt-fra_russia.pdf |
93.61KB |
| 20131209-nyt-nsa_games.pdf |
293.91KB |
| 20131210-cbc-nsa_csec_partnership.pdf |
91.15KB |
| 20131210-wapo-cotraveler_overview.pdf |
1.35MB |
| 20131210-wapo-ghost_machine.pdf |
859.54KB |
| 20131210-wapo-gsm_classification_guide.pdf |
143.10KB |
| 20131210-wapo-location_cookies.pdf |
255.29KB |
| 20131210-wapo-target_location.pdf |
133.22KB |
| 20131211-svt-accomplishments_from_nsa.pdf |
191.24KB |
| 20131211-svt-baltic_region.pdf |
152.42KB |
| 20131211-svt-final_agenda_sweden_usa.pdf |
1015.03KB |
| 20131211-svt-legal_issues_uk_regarding_sweden_and_quantum.pdf |
27.63KB |
| 20131211-svt-nsa_internal_pm_on_fra.pdf |
189.71KB |
| 20131211-svt-nsa_slides_xkeyscore.pdf |
562.66KB |
| 20131211-svt-quantum_from_gchq.pdf |
37.53KB |
| 20131211-svt-sweden_neutral.pdf |
182.87KB |
| 20131211-svt-xkeyscore_slide_with_swedish_example.pdf |
195.51KB |
| 20131211-svt-xkeyscore_sources.pdf |
37.27KB |
| 20131211-svt-xkeyscore_sweden_meeting.pdf |
905.20KB |
| 20131223-wapo-nsacss-mission.pdf |
100.25KB |
| 20131230-appelbaum-nsa_ant_catalo.pdf |
6.87MB |
| 20131230-appelbaum-nsa_ant_catalog.pdf |
6.87MB |
| 20131230-spiegel-qfire.pdf |
2.14MB |
| 20131230-spiegel-tao_intro.pdf |
2.23MB |
| 20131230-spiegel-tao_quantum_tasking.pdf |
3.51MB |
| 20131230-spiegel-tao_quantum_theory.pdf |
727.72KB |
| 2013-watchlist-guidance.pdf |
26.49MB |
| 20140102-wapo-quantum_computers_hard_targets.pdf |
374.72KB |
| 20140102-wapo-quantum_computing.pdf |
139.98KB |
| 20140116-guard-dishfire_presentation.pdf |
861.66KB |
| 20140127-nbc-squeaky_dolphin.pdf |
17.36MB |
| 20140127-nyt-converged_analysis_on_smartphone_devices.pdf |
848.49KB |
| 20140127-nyt-mobile_theme_briefing.pdf |
131.50KB |
| 20140128-guard-leaky_phone_apps_0.pdf |
222.27KB |
| 20140128-guard-leaky_phone_apps.pdf |
81.85KB |
| 20140130-information_dk-cop15_interception_document.pdf |
60.12KB |
| 20140131-cbc-csec_airport_wifi_tracking.pdf |
2.11MB |
| 20140204-nbc-british_spies_attacked_hactivist_anonymous.pdf |
1.13MB |
| 20140207-nbc-gchq_honey_trap_cyber_attack_background_on_jtrig.pdf |
1.12MB |
| 20140207-nbc-gchq honey trap cyber attack leveraging foreign journalists via jtrig pdf |
590.87KB |
| 20140207-nrc-boundless_nederland.pdf |
1.07MB |
| 20140211-intercept-drones_intercepting_communications.pdf |
365.83KB |
| 20140218-intercept-discovery_sigint_targeting_scenarios_and_compliance.pdf |
631.45KB |
| 20140218-intercept-gchq_sigdev_.pdf |
27.83MB |
| 20140224-intercept-training_for_covert_online_operations.pdf |
4.28MB |
| 20140227-guard-gchq_optic.pdf |
240.64KB |
| 20140303-epic-doj_report_on_pen_register_fisa_orders.pdf |
3.70MB |
| 20140305-nrc-dutch_shares_collected_anti-piracy_information_with_nsa.pdf |
535.99KB |
| 20140307-intercept-nsa_ask_zelda_an_interview_with_zelda.pdf |
65.09KB |
| 20140307-intercept-nsa_ask_zelda_guilty_until_proven_innocent.pdf |
47.54KB |
| 20140307-intercept-nsa_ask_zelda_is_bain_de_soleil_a_bane_on_the_nsa.pdf |
55.21KB |
| 20140307-intercept-nsa_ask_zelda_watching_every_word_in_snitch_city.pdf |
40.11KB |
| 20140311-nyt-ashcroft_memo_on_intelligence_sharing_procedures.pdf |
117.86KB |
| 20140311-nyt-classification guide for fisa the protect america act and the fisa amendments act pdf |
876.96KB |
| 20140311-nyt-classification_guide_for_stellarwind_program_0.pdf |
2.17MB |
| 20140311-nyt-nsa_memo_expands_access_to_fisa_information.pdf |
440.00KB |
| 20140311-nyt-nsa_timeline_of_surveillance_law_developments.pdf |
194.96KB |
| 20140312-intercept-five_eyes_hacking_large_routers.pdf |
22.54KB |
| 20140312-intercept-increasing collection capacity by increasing implants pdf |
21.13KB |
| 20140312-intercept-mhs_leverages_xkeyscore_for_quantum.pdf |
46.38KB |
| 20140312-intercept-multiple_methods_of_quantum.pdf |
121.12KB |
| 20140312-intercept-nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf |
353.62KB |
| 20140312-intercept-nsa_selector_types.pdf |
117.08KB |
| 20140312-intercept-nsa technology directorate analysis of converged data pdf |
115.66KB |
| 20140312-intercept-quantum_insert_diagrams.pdf |
514.41KB |
| 20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf |
1.15MB |
| 20140312-intercept-turbine_and_turmoil.pdf |
217.97KB |
| 20140312-intercept-turbine_industrial_scale_exploitation.pdf |
81.13KB |
| 20140312-intercept-vpn and voip exploitation with hammerchant and hammerstein pdf |
459.06KB |
| 20140313-intercept-nsa_cooperative_third_party_relationships.pdf |
312.20KB |
| 20140315-intercept-turbine_intelligence_command_and_control.pdf |
121.95KB |
| 20140318-wapo-adding_another_country_to_mystic_program.pdf |
48.08KB |
| 20140318-wapo-description_of_data_collection_under_mystic.pdf |
61.93KB |
| 20140318-wapo-mystic_program.pdf |
73.36KB |
| 20140320-intercept-targeting_system_administrator_accounts.pdf |
490.67KB |
| 20140321-le_monde-french_intelligence_e-mail_spying_operation.pdf |
1.07MB |
| 20140322-nyt-operation_shotgiant_objectives.pdf |
384.50KB |
| 20140329-der_spiegel-gchq_and_nsa_spy_on_heads_of_state.pdf |
102.70KB |
| 20140404-intercept-2009_sigdev_conference.pdf |
40.92KB |
| 20140404-intercept-gchq_full_spectrum_cyber_effects.pdf |
1.74MB |
| 20140430-intercept-gchq_visit.pdf |
28.59KB |
| 20140430-intercept-ghostmachine.pdf |
6.43MB |
| 20140430-intercept-prism_olympics.pdf |
581.23KB |
| 20140513-greenwald-noplacetohidedocuments.pdf |
86.95MB |
| 20140519-intercept-black_budget.pdf |
53.22KB |
| 20140519-intercept-dea_warfighter.pdf |
142.78KB |
| 20140519-intercept-mystic.pdf |
78.50KB |
| 20140519-intercept-somalget.pdf |
131.46KB |
| 20140519-intercept-sso_dictionary_excerpt.pdf |
34.05KB |
| 20140519-intercept-sso_mystic_charts.pdf |
563.22KB |
| 20140531-nyt-identity-intelligence.pdf |
1.19MB |
| 20140610-cryptome-dea-nsa-sandkey.pdf |
361.37KB |
| 20140616-der_spiegel-analytics_for_targets_in_europe_0.pdf |
54.22KB |
| 20140616-der_spiegel-xkeyscore_fingerprints_1.pdf |
53.51KB |
| 20140618-dagbladet-black_budget.pdf |
107.79KB |
| 20140618-dagbladet-keith_alexander_talking_points.pdf |
46.54KB |
| 20140618-der_spiegel-boundless_informant_overview_global.pdf |
316.56KB |
| 20140618-der spiegel-boundless informant statistics for so-called third parties pdf |
353.50KB |
| 20140618-der spiegel-boundless informant statistics on data from 22foreign partners22 pdf |
356.05KB |
| 20140618-der_spiegel-boundless_informant_statistics_on_germany.pdf |
289.02KB |
| 20140618-der_spiegel-boundless_informant_statistics_on_the_uk.pdf |
157.08KB |
| 20140618-der spiegel-briefing on the visit to the nsa of a high-ranking bnd official pdf |
491.70KB |
| 20140618-der_spiegel-cooperation_between_the_nsa_bnd_and_bfv.pdf |
327.92KB |
| 20140618-der_spiegel-details_on_xkeyscore_from_an_internal_gchq_website.pdf |
413.65KB |
| 20140618-der spiegel-excerpt on the sharing of xkeyscore with german intelligence agency bfv pdf |
66.89KB |
| 20140618-der spiegel-explanation of nymrod a system for searching for people and places in databases and documents pdf |
263.31KB |
| 20140618-der_spiegel-faqs_on_the_boundless_informant_program.pdf |
231.88KB |
| 20140618-der spiegel-final agenda of a meeting between high-ranking nsa and bnd officials pdf |
525.17KB |
| 20140618-der_spiegel-gchq_report_on_the_technical_abilities_of_tempora.pdf |
293.41KB |
| 20140618-der spiegel-guidelines for the classification of nsa sigint details 1945-1967 pdf |
2.59MB |
| 20140618-der spiegel-guidelines for the classification of suslag details and the nsa-bnd cooperation pdf |
777.93KB |
| 20140618-der spiegel-internal nsa presentation on the bnds organization 0 pdf |
1.08MB |
| 20140618-der_spiegel-logo_of_nsa-bnd_cooperation.pdf |
29.78KB |
| 20140618-der spiegel-nostalgic recollections from nsa workers formerly stationed in bad aibling pdf |
265.50KB |
| 20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod.pdf |
418.41KB |
| 20140618-der spiegel-nsacss europe- report on the experiences of one nsa worker pdf |
362.97KB |
| 20140618-der spiegel-nsacss presentation on technical surveillance in europe and africa pdf |
1.54MB |
| 20140618-der spiegel-overview of the use of boundless informant world map pdf |
219.75KB |
| 20140618-der spiegel-preliminary agenda of a meeting between nsa and bnd officials pdf |
349.48KB |
| 20140618-der spiegel-report on a wharpdrive incident in an sso presentation pdf |
261.12KB |
| 20140618-der spiegel-report on an nsa sigdev training course for allied countries pdf |
249.86KB |
| 20140618-der spiegel-report on an nsa visit to bnd site and on data transfer from the bnd to the nsa pdf |
305.80KB |
| 20140618-der spiegel-report on an unexploded ordnance alarm at european technical centern pdf |
269.94KB |
| 20140618-der spiegel-report on an xkeyscore training session at the ecc dagger complex pdf |
402.49KB |
| 20140618-der spiegel-report on data exchange between the nsa and bnd within the jsa framework pdf |
150.04KB |
| 20140618-der spiegel-report on the beginnings of the european security center esc in the dagger complex pdf |
287.03KB |
| 20140618-der spiegel-report on the changing of the escs name to european security operations center esoc pdf |
273.93KB |
| 20140618-der_spiegel-report_on_the_nsas_access_to_tempora.pdf |
280.23KB |
| 20140618-der spiegel-report on the one-year anniversary of the nsa liaison unit suslag in bad aibling pdf |
334.72KB |
| 20140618-der spiegel-report on the surveillance of african countries by jsa pdf |
254.78KB |
| 20140618-der spiegel-report on the technical expansion of the european technical center in wiesbaden pdf |
218.91KB |
| 20140618-der_spiegel-report_on_the_work_of_nsacss_europe.pdf |
299.81KB |
| 20140618-der spiegel-restrictions on the technical surveillance performed by jsa pdf |
214.19KB |
| 20140618-der_spiegel-us_sites_with_nsa_personnel_in_germany.pdf |
84.77KB |
| 20140618-der_spiegel-world_map_from_the_boundless_informant_program.pdf |
302.62KB |
| 20140618-DerSpiegel-agenda for the visit of bsi vice president andreas konen to the nsa pdf |
120.15KB |
| 20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker pdf |
204.84KB |
| 20140618-DerSpiegel-internal nsa discussion guidelines relating to cooperation with the bnd and bfv pdf |
326.75KB |
| 20140618-DerSpiegel-presentation on the nsacia unit special collection service pdf |
1.83MB |
| 20140618-DerSpiegel-zoom of a boundless informant document with project names pdf |
125.61KB |
| 20140630-WaPo-affidavit of keith alexander regarding spying on foreign entities pdf |
19.19KB |
| 20140630-WaPo-fisa_amendments_act_summary_document_1.pdf |
52.44KB |
| 20140630-WaPo-fisa judges order authorizing surveillance of foreign governments and organizations pdf |
37.12KB |
| 20140630-WaPo-list of governments and organizations authorized for surveillance pdf |
120.12KB |
| 20140630-WaPo-odni_certification_regarding_foreign_entities.pdf |
269.07KB |
| 20140709-Intercept-spying_on_muslim-american_leaders.pdf |
294.37KB |
| 20140714-Intercept-jtrigall.pdf |
1.06MB |
| 20140723-Intercept-March-2013-Watchlisting-Guidance.pdf |
29.39MB |
| 20140723-WaPo-Post-Signals-Intelligence-Authority-Decision-Tree.pdf |
58.95KB |
| 20140725-Intercept-Saudi-Arabia-Information-Paper.pdf |
325.13KB |
| 20140803-Intercept-Israel-US-1999-Agreement.pdf |
2.01MB |
| 20140803-Intercept-NSA-Intelligence-Relationship-With-Israel.pdf |
212.07KB |
| 20140805-Intercept-Directorate-of-Terrorist-Identities-Strategic-Accomplishments-2013 pdf |
1.72MB |
| 20140812-Intercept-GCHQ-Covert-Mobile-Phones-Policy.pdf |
86.05KB |
| 20140815-Heise-HACIENDA-Program.pdf |
1.83MB |
| 20140825-Intercept-CIA-Colleagues-Enthusiastically-Welcome-NSA-Training.pdf |
87.82KB |
| 20140825-Intercept-CRISSCROSSPROTON-Point-Paper.pdf |
288.89KB |
| 20140825-Intercept-DNI-Decision-Memorandum-on-ICREACH.pdf |
254.53KB |
| 20140825-Intercept-ICREACH-Black-Budget-Extract.pdf |
36.61KB |
| 20140825-Intercept-ICREACH-Sharing-SIGINT-Comms-Metadata-with-the-Intel-Community-Memo pdf |
194.58KB |
| 20140825-Intercept-ICREACH-Wholesale-Sharing.pdf |
33.73KB |
| 20140825-Intercept-Metadata-Policy-Conference.pdf |
181.00KB |
| 20140825-Intercept-Metadata-Sharing-Memorandum.pdf |
392.62KB |
| 20140825-The-Intercept-Sharing-Communications-Metadata-Across-the-USIC-ICREACH pdf |
3.92MB |
| 20140831-spiegel-collaboration_in_overdrive.pdf |
335.35KB |
| 20140831-spiegel-iraq_uk_load_sharing_carriers.pdf |
376.78KB |
| 20140831-spiegel-jordan_belgium.pdf |
608.65KB |
| 20140831-spiegel-kurdistan_regional_government.pdf |
623.14KB |
| 20140831-Spiegel-NCRs-with-Foreign-Relations-Missions-Become-SUSLAs.pdf |
374.82KB |
| 20140831-spiegel-nsa_intelligence_relationship_with_turkey.pdf |
782.88KB |
| 20140831-spiegel-nsas_oldest_third_party_partnership.pdf |
397.78KB |
| 20140831-spiegel-sinio_seminar_tough_times_for_turkey.pdf |
255.96KB |
| 20140831-spiegel-sinio_seminar_turkey_and_the_kurds.pdf |
271.21KB |
| 20140831-spiegel-sinio_seminar_turkish_elections.pdf |
272.57KB |
| 20140831-spiegel-turkey_and_the_pkk.pdf |
669.60KB |
| 20140831-spiegel-turkey_at_the_g20_pre-meeting.pdf |
206.81KB |
| 20140831-spiegel-turkey_energy_company_development.pdf |
149.69KB |
| 20140831-spiegel-turkish_signal_intelligence_chief_agenda.pdf |
374.93KB |
| 20140905-intercept-quadrennial intelligence community review final report pdf |
3.49MB |
| 20140914-intercept-ferguson_visit_precis.pdf |
231.71KB |
| 20140914-intercept-key_activities_in_progress.pdf |
228.10KB |
| 20140914-intercept-speargun_phase_one.pdf |
54.17KB |
| 20140914-intercept-speargun_underway.pdf |
127.01KB |
| 20140914-spiegel-satellite_teleport_knowledge.pdf |
4.38MB |
| 20140914-spiegel-treasure_map_announces_a_new_release.pdf |
551.96KB |
| 20140914-spiegel-treasure_map_presentation.pdf |
5.73MB |
| 20141010-intercept-cno_core_secrets_security_structure.pdf |
329.13KB |
| 20141010-intercept-cno_core_secrets_slide_slices.pdf |
1.10MB |
| 20141010-intercept-computer_network_exploitation_classification_guide.pdf |
965.80KB |
| 20141010-intercept-eci_compartments.pdf |
534.56KB |
| 20141010-intercept-eci_pawleys_classification_guide.pdf |
434.74KB |
| 20141010-intercept-eci_whipgenie_classification_guide.pdf |
684.37KB |
| 20141010-intercept-exceptionally_controlled_information_listing.pdf |
934.86KB |
| 20141010-intercept-sentry_eagle_brief_sheet.pdf |
1.22MB |
| 20141010-intercept-tarex_classification_guide.pdf |
757.56KB |
| 20141125-sueddeutsche-access_breakdown.pdf |
25.87KB |
| 20141125-sz-cable_master_list_ac.pdf |
158.76KB |
| 20141125-sz-cable_master_list_fea.pdf |
59.73KB |
| 20141125-sz-cable_regions.pdf |
32.99KB |
| 20141125-sz-cables_no_current_access.pdf |
27.72KB |
| 20141125-sz-cables_where_we_are.pdf |
27.59KB |
| 20141125-sz-cables_where_we_want_to_be.pdf |
26.76KB |
| 20141125-sz-cne_endpoint_project_load.pdf |
61.16KB |
| 20141125-sz-mti_access_project_weekly_status_february_6_2009.pdf |
70.59KB |
| 20141125-sz-mti_access_project_weekly_status_june_27_2008.pdf |
95.64KB |
| 20141125-sz-mti_access_project_weekly_status_november_28_2008.pdf |
92.08KB |
| 20141125-sz-partner_cables.pdf |
151.74KB |
| 20141125-sz-ptc_glossary.pdf |
121.02KB |
| 20141125-sz-windstop_system_highlights.pdf |
137.21KB |
| 20141204-intercept-auroragold_project_overview.pdf |
418.03KB |
| 20141204-intercept-auroragold target technology trends center support to wpmo 0 pdf |
1.60MB |
| 20141204-intercept-auroragold_working_aid.pdf |
427.75KB |
| 20141204-intercept-auroragold_working_group.pdf |
22.60MB |
| 20141204-intercept-ir21_a_technology_warning_mechanism_0.pdf |
1.75MB |
| 20141204-intercept-nsa first ever collect of high interest 4g cellular signal pdf |
15.35KB |
| 20141204-intercept-nsa_gchq_csec_network_tradecraft_advancement.pdf |
239.41KB |
| 20141204-intercept-opulant_pup_encryption_attack.pdf |
35.96KB |
| 20141204-intercept-wolframite_encryption_attack.pdf |
71.90KB |
| 20141214-intercept-gchq_automated_noc_detection.pdf |
3.69MB |
| 20141214-intercept-gchq_hopscotch.pdf |
10.90KB |
| 20141214-intercept-gchq_making_network_sense_of_the_encryption.pdf |
2.33MB |
| 20141214-intercept-gchq_nac_review_april_june_2011.pdf |
29.74KB |
| 20141214-intercept-gchq_nac_review_january_march_2012.pdf |
17.74KB |
| 20141214-intercept-gchq_nac_review_july_sept_2011.pdf |
25.55KB |
| 20141214-intercept-gchq_nac_review_october_december_2011.pdf |
80.96KB |
| 20141214-intercept-gchq_stargate_cne_requirements.pdf |
269.85KB |
| 20141214-Intercept-gchq-mobile-networks-in-my-noc-world.pdf |
1.86MB |
| 20141228-speigel-a potential technique to deanonymise users of the tor network 0 pdf |
2.05MB |
| 20141228-speigel-analysis from ssl-tls connections through gchq in the flying pig database 0 pdf |
1.46MB |
| 20141228-speigel-analytic challenges from active-passive integration when nsa attacks ipsec vpns 0 pdf |
1.96MB |
| 20141228-speigel-analytics_on_security_of_tor_hidden_services_0.pdf |
3.65MB |
| 20141228-speigel-bluesnort program on net defense from encrypted communications 0 pdf |
1.31MB |
| 20141228-speigel-canadian_document_from_ces_on_tls_trends_0.pdf |
1.91MB |
| 20141228-speigel-classification_guide_for_cryptanalysis_0.pdf |
276.64KB |
| 20141228-speigel-decryption of vpn connections within the valiantsurf program 0 pdf |
2.01MB |
| 20141228-speigel-description_of_existing_projects_on_vpn_decryption_0.pdf |
487.65KB |
| 20141228-spiegel- national information assurance research laboratory niarl tundra pdf |
1.97MB |
| 20141228-spiegel-description of voip telephony encryption methods and other ways to attack pdf |
284.65KB |
| 20141228-spiegel-description on the processing of vpn data packets within the turmoil program pdf |
1.58MB |
| 20141228-spiegel-explanation of a potential technique to deanonymise users of the tor network pdf |
2.41MB |
| 20141228-spiegel-explanation of the gallantwave that decrypts vpn traffic within longhaul pdf |
570.28KB |
| 20141228-spiegel-explanation of the poisennut product and its role when attacking vpn pdf |
250.23KB |
| 20141228-spiegel-explanation of the transform engine emulator when attacking vpn pdf |
186.96KB |
| 20141228-spiegel-explanation of the turmoil gallantwave program and its role when attacking vpn 0 pdf |
257.89KB |
| 20141228-spiegel-explanation on the spin9 program on end-to-end attacks on vpn pdf |
6.52MB |
| 20141228-spiegel-gchq_briefing_on_the_bullrun_program.pdf |
429.34KB |
| 20141228-spiegel-gchq presentation on the bullrun programs decryption capabilities pdf |
844.20KB |
| 20141228-spiegel-general_description_how_nsa_handles_encrypted_traffic.pdf |
230.49KB |
| 20141228-spiegel-guide for analysts on how to use the prism skype collection pdf |
896.28KB |
| 20141228-spiegel-intercept_with_otr_encrypted_chat.pdf |
169.56KB |
| 20141228-spiegel-intercept_with_pgp_encrypted_message.pdf |
100.87KB |
| 20141228-spiegel-intro to the vpn exploitation process mentioning the protocols attacked - pptp ipsec ssl ssh pdf |
5.89MB |
| 20141228-spiegel-malibu architecture overview to exploit vpn communication pdf |
620.61KB |
| 20150117-speigel-analysis of chinese methods and performed actions in the context of computer network exploitation pdf |
1.34MB |
| 20150117-speigel-classification guide for computer network exploitation cne pdf |
1.00MB |
| 20150117-speigel-combination of offensive and defensive missions - how fourth-party missions are being performed pdf |
226.21KB |
| 20150117-speigel-csec document about the recognition of trojans and other network based anomaly pdf |
3.37MB |
| 20150117-speigel-csec document on the handling of existing trojans when trojanizing computers pdf |
3.87MB |
| 20150117-speigel-document about the expansion of the remote operations center roc on endpoint operations pdf |
228.14KB |
| 20150117-speigel-document explaining the role of the remote operations center roc pdf |
167.81KB |
| 20150117-spiegel-nsa example snowglobe in which a suspected french government trojan is analyzed to find out if it can be helpful for own interests 0 pdf |
3.30MB |
| 20150117-spiegel-nsa_fourth_party_access_-_i_drink_your_milkshake_.pdf |
3.60MB |
| 20150117-spiegel-nsa program tutelage to instrumentalize third party attack tools pdf |
4.11MB |
| 20150117-spiegel-nsa project description to recognize and process data that comes from third party attacks on computers pdf |
352.45KB |
| 20150117-spiegel-nsa training course material on computer network operations pdf |
6.95MB |
| 20150117-spiegel-overview of methods for nsa integrated cyber operations 0 pdf |
2.55MB |
| 20150117-spiegel-overview of the transgression program to analyze and exploit foreign cna-cne exploits pdf |
2.06MB |
| 20150117-spiegel-overview on the nsa use of bots and the defiantwarrior program pdf |
9.43MB |
| 20150117-spiegel-process analysts choose their data requirement and then get to know the tools that can do the job 0 pdf |
1.57MB |
| 20150117-spiegel-projects of the tao-ato department such as the remote destruction of network cards pdf |
1.38MB |
| 20150117-spiegel-quantumtheory is a set of technologies allowing man-on-the-side interference attacks on tcp-ip connections includes straightbizarre and daredev pdf |
1.55MB |
| 20150117-spiegel-report of an nsa employee about a backdoor in the openssh daemon pdf |
402.93KB |
| 20150117-spiegel-sample code of a malware program from the five eyes alliance pdf |
184.88KB |
| 20150117-spiegel-supply-chain interdiction - stealthy techniques can crack some of sigints hardest targets pdf |
212.91KB |
| 20150117-spiegel-technical_description_of_the_fashioncleft_protocol_.pdf |
2.86MB |
| 20150117-spiegel-the fashioncleft protocol nsa uses to exfiltrate data from trojans and implants to the nsa 0 pdf |
2.60MB |
| 20150128-cbc-cse_presentation_on_the_levitation_project.pdf |
3.73MB |
| 20150128-intercept-cse_presentation_on_the_levitation_project.pdf |
3.73MB |
| 20150204-intercept-lovely_horse_0.pdf |
66.96KB |
| 20150204-intercept-nato_civilian_intelligence_council_cyber_panel.pdf |
236.11KB |
| 20150204-intercept-open_source_for_cyber_defence_progress.pdf |
65.69KB |
| 20150204-intercept-who_else_is_targeting_your_target_collecting.pdf |
52.44KB |
| 20150210-intercept-iran_current_topics_-_interactions_with_gchq.pdf |
381.91KB |
| 20150219-Intercept-CCNE-Email-Addresses-Jan10-Mar10-Trial.pdf |
76.75KB |
| 20150219-Intercept-CCNE-Email-Harvesting-Jan10-Mar10-Trial.pdf |
77.15KB |
| 20150219-Intercept-CCNE-Stats-Summaries-Jan10-Mar10-Trial.pdf |
77.06KB |
| 20150219-Intercept-CCNE-Successes-Jan10-Mar10-Trial.pdf |
71.99KB |
| 20150219-Intercept-CNE-Access-to-Core-Mobile-Networks.pdf |
77.86KB |
| 20150219-Intercept-Dapino-Gamma-CNE-Presence-Wiki.pdf |
55.26KB |
| 20150219-Intercept-Dapino-Gamma-Gemalto-Yuaawaa-Wiki.pdf |
63.68KB |
| 20150219-Intercept-Dapino-Gamma-Target-Personalisation-Centres.pdf |
89.38KB |
| 20150219-Intercept-IMSIs-Identified-With-Ki-Data-For-Network.pdf |
82.55KB |
| 20150219-Intercept-PCS-Harvesting-At-Scale.pdf |
2.75MB |
| 20150219-Intercept-Where-are-These-Keys.pdf |
80.28KB |
| ambassadesFrance.pdf |
319.96KB |
| blackhat-Alexander-keynote.pdf |
15.36MB |
| bullrun-briefing-sheet-from-gchq.pdf |
2.60MB |
| ccne-email-addresses-jan10-mar10-trial.pdf |
82.49KB |
| ccne-email-harvesting-jan10-mar10-trial.pdf |
81.02KB |
| ccne-stats-summaries-jan10-mar10-trial.pdf |
79.57KB |
| ccne-successes-jan10-mar10-trial.pdf |
64.17KB |
| CLEANED004.-Cover_Memo-Sealed.pdf |
1.05MB |
| CLEANED007.-CongNotificationInfoMemoSSCI_10_Apr_09-Sealedpdf.pdf |
2.15MB |
| CLEANED032.-Basket_2_-_NSA_training.log.pdf |
15.75MB |
| CLEANED096.-NSA_summary_of_BR_requirements_(maybe_Feb_2009)-.pdf |
236.94KB |
| CLEANEDFinal-USSID_SP0018_Annex_J.pdf |
532.64KB |
| CLEANEDFinal-USSID_SP0018.pdf |
6.60MB |
| CLEANEDPRTT-1.pdf |
24.70MB |
| CLEANEDPRTT-2.pdf |
3.56MB |
| cne-access-to-core-mobile-networks.pdf |
465.85KB |
| csec-br-spy.pdf |
616.64KB |
| dapino-gamma-cne-presence-wiki.pdf |
73.11KB |
| dapino-gamma-gemalto-yuaawaa-wiki.pdf |
103.25KB |
| dapino-gamma-target-personalisation-centres.pdf |
116.97KB |
| discovery-sigint-targeting-scenarios-and.pdf |
726.84KB |
| doc-6-cyber-threat-capabilities.pdf |
19.82MB |
| doj-nsa-memo.pdf |
1.36MB |
| doody.pdf |
1.31MB |
| dsd-3g.pdf |
886.34KB |
| ericsson_reply.pdf |
64.13KB |
| europebriefingnote_en.pdf |
797.51KB |
| eyes_wide_open_v1.pdf |
4.19MB |
| FAA-Certification_Renewals_with_Caveats.pdf |
138.31KB |
| FAA-Minimization-Procedures.pdf |
574.83KB |
| FAA-Targeting_Procedures.pdf |
615.65KB |
| FISC-Order,-BR-06-12.pdf |
292.11KB |
| gchq-g20-spy.pdf |
3.23MB |
| gchq-mullenize.pdf |
21.97KB |
| gchq-royal-concierge-de.pdf |
120.85KB |
| gchq-se-fra-quantum-3.pdf |
31.02KB |
| General-Alexander-Letter-re-NSA-Fact-Sheet-Inaccuracy.pdf |
184.30KB |
| identity-intelligence.pdf |
2.14MB |
| i-hunt-sys-admins.pdf |
21.81MB |
| imsis-identified-with-ki-data-for-network.pdf |
75.32KB |
| invisibility-report-9-0-final.pdf |
89.54KB |
| jtrigall.pdf |
1.30MB |
| Judge-Walton_Answers_to_Questions_re_FISC.pdf |
1.56MB |
| Lesson-4_-_So_you_got_US_Person_Information.pdf |
147.08KB |
| letter_to_companies.pdf |
100.29KB |
| media-34093.pdf |
1.15MB |
| media-35509.pdf |
1.51MB |
| media-35510.pdf |
4.33MB |
| media-35511.pdf |
9.92MB |
| media-35512.pdf |
1.34MB |
| media-35513.pdf |
3.39MB |
| media-35514.pdf |
835.07KB |
| media-35515.pdf |
24.30MB |
| media-35516.pdf |
5.85MB |
| media-35517.pdf |
575.91KB |
| media-35518.pdf |
2.80MB |
| media-35519.pdf |
892.10KB |
| media-35520.pdf |
4.34MB |
| media-35521.pdf |
15.91MB |
| media-35522.pdf |
1.11MB |
| media-35523.pdf |
366.46KB |
| media-35524.pdf |
508.05KB |
| media-35525.pdf |
665.46KB |
| media-35526.pdf |
12.28MB |
| media-35527.pdf |
7.86MB |
| media-35528.pdf |
2.27MB |
| media-35529.pdf |
20.99MB |
| media-35530.pdf |
2.33MB |
| media-35531.pdf |
494.42KB |
| media-35532.pdf |
1.43MB |
| media-35533.pdf |
4.11MB |
| media-35534.pdf |
2.13MB |
| media-35535.pdf |
6.85MB |
| media-35536.pdf |
571.16KB |
| media-35537.pdf |
574.47KB |
| media-35538.pdf |
3.84MB |
| media-35539.pdf |
15.45MB |
| media-35540.pdf |
44.17MB |
| media-35541.pdf |
426.04KB |
| media-35542.pdf |
3.47MB |
| media-35543.pdf |
3.89MB |
| media-35544.pdf |
535.29KB |
| media-35545.pdf |
177.57KB |
| media-35546.pdf |
599.27KB |
| media-35547.pdf |
383.11KB |
| media-35548.pdf |
766.90KB |
| media-35549.pdf |
1012.75KB |
| media-35550.pdf |
4.49MB |
| media-35551.pdf |
5.06MB |
| media-35552.pdf |
404.70KB |
| media-35653.pdf |
620.45KB |
| media-35654.pdf |
394.03KB |
| media-35655.pdf |
807.87KB |
| media-35656.pdf |
2.38MB |
| media-35657.pdf |
16.90MB |
| media-35658.pdf |
12.19MB |
| media-35659.pdf |
980.05KB |
| media-35661.pdf |
3.48MB |
| media-35662.pdf |
2.89MB |
| media-35663.pdf |
1.02MB |
| media-35664.pdf |
1.51MB |
| media-35665.pdf |
8.68MB |
| media-35666.pdf |
2.70MB |
| media-35667.pdf |
6.63MB |
| media-35668.pdf |
167.47KB |
| media-35669.pdf |
1.13MB |
| media-35670.pdf |
26.27MB |
| media-35671.pdf |
30.24MB |
| media-35672.pdf |
5.11MB |
| media-35673.pdf |
6.59MB |
| media-35674.pdf |
36.53MB |
| media-35675.pdf |
18.74MB |
| media-35676.pdf |
6.65MB |
| media-35677.pdf |
27.61MB |
| media-35678.pdf |
7.11MB |
| media-35680.pdf |
602.64KB |
| media-35681.pdf |
523.64KB |
| media-35682.pdf |
3.26MB |
| media-35683.pdf |
8.90MB |
| media-35684.pdf |
6.22MB |
| media-35685.pdf |
40.27MB |
| media-35686.pdf |
18.77MB |
| media-35687.pdf |
2.50MB |
| media-35688.pdf |
11.49MB |
| media-35689.pdf |
27.61MB |
| nokia_reply.pdf |
101.41KB |
| no-place-to-hide.pdf |
86.95MB |
| nsa-5-eyes-partners.pdf |
20.61KB |
| nsa-5-eyes-spy-g20-dk.pdf |
188.35KB |
| NSA-Boundless_Informant_Frequently_Asked_Questions.pdf |
1.40MB |
| NSA-Boundless_Informant_Powerpoint_Slides.pdf |
72.09MB |
| nsa-boundless-informant.pdf |
189.40KB |
| nsa-boundless-informant-faq.pdf |
1.75MB |
| NSA-Boundless-Informant-Frequently-Asked-Questions.pdf |
1.40MB |
| nsa-boundlessinformant-no-33m.pdf |
5.96MB |
| nsa-boundless-informant-slides.pdf |
72.08MB |
| nsabullrun.pdf |
2.60MB |
| nsa-bullrun-2-16-guardian-13-0905.pdf |
9.64MB |
| nsa-bullrun-brief-nyt-13-0905.pdf |
92.52KB |
| nsa-bullrun-brief-propublica-13-0905.pdf |
2.60MB |
| nsa-cable-spy-types.pdf |
1.01MB |
| nsa-catalog-appelbaum.pdf |
950.64KB |
| nsa-chalkfun.pdf |
68.00KB |
| nsa-close-access-sigads.pdf |
378.97KB |
| nsa-cotraveler.pdf |
602.83KB |
| nsa-cryptanalysis-2-12-guardian-13-0905.pdf |
4.00MB |
| nsa-csec-partners.pdf |
93.10KB |
| nsa-css-mission.pdf |
100.25KB |
| nsa-dutch-sigint.pdf |
667.61KB |
| nsa-egotisticalgiraffe.pdf |
3.06MB |
| nsa-fascia.pdf |
141.09KB |
| nsa-finance-spy-de.pdf |
726.98KB |
| nsa-fisa-certification.pdf |
45.84KB |
| nsa-fisa-minimization.pdf |
799.14KB |
| nsa-fisa-targeting.pdf |
859.04KB |
| nsa-g8-g20-spying.pdf |
191.56KB |
| nsa-g8-g20-spying-02.pdf |
196.25KB |
| nsa-gchq-fra-quantum.pdf |
294.63KB |
| nsa-gchq-se-fra-comint.pdf |
397.64KB |
| nsa-gchq-spy-games.pdf |
2.24MB |
| nsa-ghost-machine.pdf |
2.66MB |
| nsa-gsm-tracking.pdf |
326.47KB |
| nsa-hosts-fr-spies.pdf |
921.60KB |
| nsa-iat-tor.pdf |
2.61MB |
| NSA-IG_Report.pdf |
18.77MB |
| nsa-israel-spy.pdf |
3.46MB |
| NSA-Memo_to_DOD_-_Proposed_Amendment_to_Conduct_Analysis_of_Metadata.pdf |
1.23MB |
| NSA-Memo-to-DOD---Proposed-Amendment-to-Conduct-Analysis-of-Metadata.pdf |
1.23MB |
| nsa-microsoft-cloud-exploit.pdf |
567.25KB |
| NSA-Missions_Authorities_Oversight_and_Partnerships.pdf |
114.04KB |
| NSA-Missions-Authorities-Oversight-and-Partnerships.pdf |
114.04KB |
| nsa-muslim-porn.pdf |
1.32MB |
| nsa-overcollection.pdf |
3.03MB |
| nsa-ppd-20.pdf |
1.28MB |
| nsa-prism-13-1021.pdf |
2.06MB |
| nsa-prism-dk.pdf |
918.28KB |
| nsa-prism-guardian-13-1101.pdf |
2.06MB |
| nsa-quantum-computer.pdf |
515.03KB |
| nsa-quantum-computer-2.pdf |
138.46KB |
| nsa-quantum-tasking.pdf |
5.46MB |
| nsa-quantumtheory.pdf |
2.36MB |
| nsa-scissors.pdf |
295.16KB |
| nsa-scissors-2.pdf |
3.02MB |
| NSA-Section_702_'Loop_Hole'.pdf |
64.72KB |
| NSA-Section_702_and_Section_215_Factsheets.pdf |
1.76MB |
| NSA-Section-702-and-Section-215-Factsheets.pdf |
1.76MB |
| nsa-se-fra-quantum-2.pdf |
34.04KB |
| nsa-se-fra-relationship.pdf |
551.45KB |
| nsa-se-fra-ru-baltic.pdf |
49.54KB |
| nsa-se-fra-spying-agenda.pdf |
1.99MB |
| nsa-se-fra-xkeyscore.pdf |
1.16MB |
| nsa-se-fra-xkeyscore-slide.pdf |
570.25KB |
| nsa-se-spies.pdf |
455.42KB |
| nsa-sigint-cryptologic-platform.pdf |
544.77KB |
| nsa-sigint-enabling-guardian-13-0905.pdf |
5.42MB |
| nsa-sigint-enabling-nyt-13-0905.pdf |
347.68KB |
| nsa-sigint-enabling-propublica-13-0905.pdf |
2.02MB |
| nsa-sigint-strategic-mission-2007.pdf |
1.89MB |
| nsa-sigint-strategic-mission-2013.pdf |
2.58MB |
| nsa-sigint-strategy-2012-2016.pdf |
372.29KB |
| nsa-sigint-successes.pdf |
3.47MB |
| nsa-smartphones.pdf |
741.38KB |
| nsa-smartphones-analysis.pdf |
848.49KB |
| nsa-sms-exploit.pdf |
1.66MB |
| nsa-spy-games.pdf |
78.79KB |
| nsa-sso1-guardian-13-1101.pdf |
182.69KB |
| nsa-sso2-guardian-13-1101.pdf |
107.27KB |
| nsa-sso-content.pdf |
551.25KB |
| nsa-sso-dk.pdf |
222.05KB |
| nsa-sso-overview.pdf |
19.81KB |
| nsa-sso-slides.pdf |
986.06KB |
| nsa-stellar-wind.pdf |
7.99MB |
| nsa-tao-ant.pdf |
164.54KB |
| nsa-tao-ant-pdf.pdf |
962.52KB |
| nsa-tao-intro.pdf |
3.08MB |
| nsa-target-location.pdf |
132.19KB |
| nsa-tor.pdf |
265.66KB |
| nsa-tor-stinks.pdf |
3.99MB |
| nsa-verizon-spy.pdf |
129.72KB |
| nsa-wanadoo-alcatel.pdf |
274.59KB |
| nsa-windstop.pdf |
596.92KB |
| nsa-windstop-muscular-incenser.pdf |
1.01MB |
| NSA-XKeyscore_Powerpoint.pdf |
12.23MB |
| nsa-xkeyscore.pdf |
3.48MB |
| NSA-XKeyscore-Powerpoint.pdf |
12.23MB |
| nsa-xkeyscore-sources.pdf |
29.48KB |
| nsa-xkeyscore-tor-slides.pdf |
160.53KB |
| nsa-yahoo-google-exploit.pdf |
2.99MB |
| pcs-harvesting-at-scale.pdf |
3.40MB |
| phonesgchq.pdf |
1.84MB |
| phonesnsa.pdf |
4.62MB |
| PRISM-Overview_Powerpoint_Slides.pdf |
266.34KB |
| PRISM-Overview-Powerpoint-Slides.pdf |
266.34KB |
| PRISM-Powerpoint_Slides_re_Data_Acquisition.pdf |
294.85KB |
| PRISM-Powerpoint-Slides-re-Data-Acquisition.pdf |
294.85KB |
| psychology-a-new-kind-of-sigdev.pdf |
27.85MB |
| rcs-9-admin-final.pdf |
4.27MB |
| rcs-9-analyst-final.pdf |
8.22MB |
| rcs-9-sysadmin-final.pdf |
11.45MB |
| rcs-9-technician-final.pdf |
13.42MB |
| remote-control-system-9-0-changelog-final.pdf |
82.99KB |
| remote-control-system-9-1-changelog-final.pdf |
46.49KB |
| samsung_reply_2.pdf |
2.64MB |
| samsung_reply.pdf |
2.77MB |
| saudi-arabia-information-paper.pdf |
335.03KB |
| Section-215_-_Obama_Administration_White_Paper.pdf |
156.48KB |
| Section-215_-_Primary_Order.pdf |
5.61MB |
| Section-215_-_Secondary_Order_-_Verizon.pdf |
1.06MB |
| Section-215---Obama-Administration-White-Paper.pdf |
156.48KB |
| Section-215---Primary-Order.pdf |
5.61MB |
| Section-215---Secondary-Order---Verizon.pdf |
1.06MB |
| SID-Oversight_and_Compliance.pdf |
1.11MB |
| SID-Oversight-and-Compliance.pdf |
1.11MB |
| sigint-enabling-project.pdf |
2.06MB |
| sigint-enabling-project2.pdf |
2.02MB |
| spy-budget-fy13.pdf |
2.26MB |
| Targeting-Rationale_-_TAR.pdf |
516.77KB |
| Targeting-Rationale---TAR.pdf |
516.77KB |
| the-art-of-deception-training-for-a-new.pdf |
27.76MB |
| the-nsa-and-gchqs-quantumtheory-hacking-tactics.pdf |
451.06KB |
| turbine-and-turmoil.pdf |
441.18KB |
| UPSTREAM-Powerpoint_Slide.pdf |
78.22KB |
| UPSTREAM-Powerpoint-Slide.pdf |
78.22KB |
| vpn-and-voip-exploitation-with-hammerchant.pdf |
551.01KB |
| What_We_Need_to_Learn_from_Snowden.pdf |
41.31KB |
| where-are-these-keys.pdf |
85.63KB |
| Wyden-Udall-Letter_on_NSA_Fact_Sheet_Inaccuracy.pdf |
173.96KB |
| Wyden-Udall-Letter-on-NSA-Fact-Sheet-Inaccuracy.pdf |
173.96KB |