NSA Leak Dokumente Liste

Aus Piratenwiki
Wechseln zu: Navigation, Suche

inlineSnowden-Dokumente (Links) (201 - 300)

Stand: 04.12.2014 Update
Nr Datum Doc
Datum
Org Doc Titel Inhalt ACLU EFF FreeSnoden Cryptome S. Typ
296 - - - - - A - - - - pdf
295 - - - - - A - - - - pdf
294 - - - - - A - - - - pdf
293 - - - - - A - - - - pdf
292 2014-04-12 - NSA - - A NSA First Ever Collect of High Interest 4G Cellular Signal - - 1 pdf
Hinweis = Software Update 2015-02-01
291 2014-04-12 - GCHQ
NSA
- - A NSA GCHQ CSEC Network Tradecraft Advancement - - 1 pdf
Hinweis = Software Update 2015-02-01
290 2014-04-12 - NSA - - A Opulant Pup Encryption Attack - - 1 pdf
Hinweis = Software Update 2015-02-01
289 2014-04-12 - NSA AURORA GOLD - A - - NSA AURORA GOLD 63 pdf
288 2014-11-25 - GCHQ - - A Access Breakdown - - 1 pdf
287 2014-11-25 - GCHQ - - A Partner Cables - - 1 pdf
286 2014-11-25 - GCHQ - - A Cable Master List AC - - 58 pdf
285 2014-11-25 - GCHQ - - A PTC Glossary - - 1 pdf
284 2014-11-25 - GCHQ - - A Cable Master List FEA - - 1 pdf
283 2014-11-25 - GCHQ - - A Windstop System Highlights - - 1 pdf
282 2014-11-25 - GCHQ - - A Cable Regions - - 2 pdf
281 2014-11-25 - GCHQ - - A Cables No Current Access - - 2 pdf
280 2014-11-25 - GCHQ - - A Cables Where We Are - - 1 pdf
279 2014-11-25 - GCHQ - - A Cables Where We Want to Be - - 1 pdf
278 2014-11-25 - GCHQ - - A CNE EndPoint Project Load - - 1 pdf
277 2014-11-25 - GCHQ - - A MTI Access Project Weekly Status February 6 2009 - - 1 pdf
276 2014-11-25 - GCHQ - - A MTI Access Project Weekly Status June 27 2008 - - 1 pdf
275 2014-11-25 - GCHQ - - A MTI Access Project Weekly Status November 28 2008 - - 1 pdf
274 2014-11-25 - GCHQ Vodafone Cables and Slides - A - - Vodafone GCHQ Gerontic Cables and Slides (zip-Datei) 69 pdf
273 2014-10-10 - NSA/CSS National Initiative Task Security Framework Core Secrets - A Computer Network Exploitation Classification Guide CNO Core Secrets CNO Core Secrets NSA National Initiative Task Security 1 7 pdf
272 2014-10-10 - NSA/CSS Computer Network Exploitation (CNE) Classification Guide - A Computer Network Exploitation Classification Guide Computer Network Exploitation (CNE) Classification Guide NSA Computer Network Exploitation Declass 8 pdf
271 2014-10-10 - NSA/CSS Sentry Eagle Framework Die National Security Agency hat Agenten in China (Beijing), Deutschland und Südkorea die an Programmen, die mit "physischen Zersetzung" zum infiltrieren und kompromitieren von Netze und Geräte arbeiten. A CNO Core Secrets Security Structure Sentry Eagle National Initiative – Security Framework NSA Sentry Eagle 2 3 pdf
270 2014-10-10 - NSA/CSS National Initiative Task Security Framework Die National Security Agency hat Agenten in China (Beijing), Deutschland und Südkorea die an Programmen, die mit "physischen Zersetzung" zum infiltrieren und kompromitieren von Netze und Geräte arbeiten. A CNO Core Secrets Slide Slices NSA/CSS and JFCC-NW National Initiative Task – Security Framework NSA National Initiative Task Security 2 10 pdf
269 2014-10-10 - NSA/CSS Exceptionally Controlled Information (ECI) Compartments - A ECI Compartments Exceptionally Controlled Information (ECI) Compartments NSA Exceptionally Controlled Info Compartments 4 pdf
268 2014-10-10 - NSA/CSS Classification Guide for ECI PAWLEYS (PAW) - A ECI Pawleys Classification Guide Classification guide for ECI Pawleys (PAW) NSA Exceptionally Controlled Info Pawleys 4 pdf
267 2014-10-10 - NSA/CSS Classification Guide for ECI WHIPGENIE - A ECI WHIPGENIE Classification Guide Classification guide for ECI Whipgenie NSA Whipgenie Classification Guide 7 pdf
266 2014-10-10 - NSA/CSS Exceptionally Controlled Information (ECI) - A Exceptionally Controlled Information Listing Exceptionally Controlled Information (ECI) as of 12 September 2003 NSA Exceptionally Controlled Information 6 pdf
265 2014-10-10 - NSA/CSS Classification Guide for TAREX - A TAREX Classification Guide Classification guide for the NSA/CSS Target Exploitation (TAREX) program NSA Tarex Classification Guide 7 pdf
264 2014-10-10 - NSA/CSS Sentry Eagle Program - A Sentry Eagle Brief Sheet National Initiative Protection Program – Sentry Eagle NSA Sentry Eagle 1 13 pdf
263 2014-09-22 - DIA Legal Workshop Fundamentals Targeting Rechtauslegung im Sinne der NSA DoD HUMINT Legal Workshop Fundamentals of HUMINT Targeting - - - 10 pdf
262 2014-09-22 - DIA Legal Requirements Operations Rechtauslegung im Sinne der NSA Legal Requirements for HUMINT Operations - - - 9 pdf
261 2014-09-22 2004-08-xx DIA Intelligence Law Handbook Handbuch zum Nachrichtendienste-Recht, Verteidigung von HUMINT Service Intelligence Law Handbook: Defense HUMINT Service - - - 132 pdf
260 2014-09-22 2013-11-xx DIA Intelligence Oversight Rechtauslegung im Sinne der NSA Intelligence Oversight - - - 20 pdf
259 2014-09-29 2007-01-08 NSA Overview of Signals Intelligence Authorities - Overview of Signals Intelligence Authorities (2007-01-08) - - - 18 pdf
258 2014-09-22 2014-06-19 NSA Legal Fact Sheet: Executive Order 12.333 - Legal Fact Sheet: Executive Order 12,333 - - - 4 pdf
257 2014-09-15 - NSA Key Activities In Progress - A Key Activities In Progress - - 1 pdf
256 2014-09-15 - NSA Speargun Phase One - A Speargun Phase One - - 1 pdf
255 2014-09-15 - NSA Speargun Underway - A Speargun Underway - - 1 pdf
254 2014-09-15 2013-03-22 NSA Ferguson Visit Precis - A Ferguson Visit Precis Visit Precis: Ambassador Roy Ferguson NSA Visit by NZ Spy Ferguson 2 pdf
253 2014-09-14 2011-01-11 NSA Treasure Map New Release - A Treasure Map Announces a New Release SIDToday – TREASUREMAP Announces a New Release NSA Treasure Map New Release 4 pdf
252 2014-09-14 2010-01-19 NSA Treasure Map Treasure Map soll die NSA in die Lage versetzen, die Netze von Internet-Anbietern (ISPs) auf der ganzen Welt zu überblicken / kartografieren, um einen möglichst vollständigen Überblick zum gesamten Datenverkehr und sämtlichen in allen Netzen angeschlossenen Geräten zu erhalten. A Treasure Map Presentation Bad guys are everywhere, good guys are somewhere! NSA Treasure Map (17.1MB) 38 pdf
251 2014-09-14 - GCHQ
NSA
STELLAR NSA Zugang zu STELLAR-Satelitennetzen A Satellite Teleport Knowledge Satellite Transport Knowledge GCHQ Satellite Teleport Knowledge STELLAR (3.6MB) 26 pdf
250 2014-09-05 - - Masterspy Quadrennial Report 2009 - A Quadrennial Intelligence Community Review Final Report Quadrennial Intelligence Community Review Final Report, April 2009 Masterspy Quadrennial Report 2009 32 pdf
249 2014-08-31 - GCHQ
NSA
Spy Turkey - A - - NSA-GCHQ Spy Turkey 34 pdf
248 2014-08-31 - GCHQ Kurdistan Regional Government - A Kurdistan Regional Government - Kurdistan Regional Government 3 pdf
247 2014-08-31 2008-10-29
2009-03-02
GCHQ Turkey Energy Company Development - A Turkey Energy Company Development Turkish Energy Company Development MHS/GCHQ Projects - Turkey Energy Company Development 1 pdf
246 2014-08-31 2009-09-(2-5) GCHQ Turkey at the G20 Pre-Meeting in London - A Turkey at the G20 Pre-Meeting Turkey at the G20 Pre-Meeting in London, September 2-5, 2009 Turkey at the G20 Pre-Meeting in London September 2-5 2009 2 pdf
245 2014-08-31 2008-10-15 GCHQ Load Sharing Carriers R.O.W. (via UK) in IRAQ plus RLEs - A Iraq UK Load Sharing Carriers - Load Sharing Carriers R.O.W. (via UK) in IRAQ plus RLEs 2 pdf
244 2014-08-31 2008-01-12 GCHQ JORDAN-BELGIUM - A Jordan Belgium - JORDAN-BELGIUM 6 pdf
243 2014-08-31 2003-06-10 NSA SINIO Series of Strategic Intelligence Issue Seminars Begins with Tough Times for Turkey - A SINIO Seminar Tough Times for Turkey - SINIO Series of Strategic Intelligence Issue Seminars Begins with Tough Times for Turkey 2 pdf
242 2014-08-31 2013-04-30 NSA Agenda May 2013: Brigadier general - Turkish Signal Intelligence Chief - A Turkish Signal Intelligence Chief Agenda - Agenda 14-15 May 2013: Brigadier general - Turkish Signal Intelligence Chief 2 pdf
241 2014-08-31 2005-10-07 NSA NSAs Oldest Third Party Partnership - A NSAs Oldest Third Party Partnership NSA’s Oldest Third Party SIGINT Partnership NSAs Oldest Third Party Partnership 2 pdf
240 2014-08-31 2013-04-15 NSA NSA Intelligence Relationship with Turkey - Turkish National Intelligence Organization (MIT) and the Turkish Intelligence Directorate (SIB) - A NSA Intelligence Relationship with Turkey - NSA Intelligence Relationship with Turkey: Turkish National Intelligence Organization (MIT) and the Turkish Intelligence Directorate (SIB) 4 pdf
239 2014-08-31 2007-08-13 NSA SINIO Seminar Turkish Presidential and Parliamentary Elections - A SINIO Seminar Turkish Elections - SINIO Seminar: Turkish Presidential and Parliamentary Elections 2 pdf
238 2014-08-31 2006-08-30 NSA NCRs with Foreign Relations Missions Become 'SUSLAs' - A NCRs with Foreign Relations Missions Become SUSLAs - NCRs with Foreign Relations Missions Become 'SUSLAs' 2 pdf
237 2014-08-31 2005-12-20 NSA Turkey and the PKK - A Turkey and the PKK Turkey and the PKK Turkey and the PKK 3 pdf
236 2014-08-31 2006-11-13 NSA Collaboration in Overdrive A CNE Success - A Collaboration in Overdrive - Collaboration in Overdrive: A CNE Success 2 pdf
235 2014-08-31 2006-05-18 NSA SINIO Seminar Turkey and the Kurds - A SINIO Seminar Turkey and the Kurds - SINIO Seminar: Turkey and the Kurds 1 pdf
234 2014-08-25 - NSA - - A ICREACH Black Budget Extract ICREACH in the Black Budget - 2 pdf
233 2014-08-25 2006-02-22 NSA - - A CRISSCROSS/PROTON Point Paper CRISSCROSS/PROTON - 4 pdf
232 2014-08-25 - NSA ICREACH Metadata Memorandum - A Metadata Sharing Memorandum Sharing of MetaData across the IC —- Dissemination of SIGINT Metadata Beyond NSA - 4 pdf
231 2014-08-25 - NSA ICREACH Decision Memorandum - A DNI Decision Memorandum on ICREACH Sharing Communications Data Across the Intelligence Community – Decision Memorandum - 3 pdf
230 2014-08-25 - NSA ICREACH Intelligence Community - A ICREACH Wholesale Sharing Intelligence Community (IC) Reach Team - 1 pdf
229 2014-08-25 2007-05-15 NSA ICREACH Die US-amerikanischen National Security Agency (NSA) baute eine Suchmaschine um nationalen und internationalen Regierungsbehörden Zugang zu Informationen von Milliarden Kommunikationsdaten zu geben. A Sharing Communications Metadata Across the U.S. Intelligence Community - ICREACH Sharing Communications Metadata Across the US Intelligence Community - 36 pdf
228 2014-08-25 - CIA
NSA
- - A CIA Colleagues Enthusiastically Welcome NSA Training CIA Colleagues Enthusiastically Welcome NSA Training - - pdf
227 2014-08-16 - CSEC
GCHQ
NSA
HACIENDA
Internet Colonization
- A HACIENDA Program The Hacking Process, What is HACIENDA, MUGSHOT, LANDMARK
(html)
NSA GCHQ CESC HACIENDA Internet Colonization 26 pdf
html
226 2014-08-12 2010-06-28 GCHQ Covert Mobile Phones Policy - A GCHQ Covert Mobile Phones Policy OPA~TAS Covert Mobile Phones Policy GCHQ Covert Mobile Phones Policy 6 pdf
225 2014-08-05 2013-03-07 NCTC NCTC Directorate of Terrorist Identities - A Directorate of Terrorist Identities (DTI) Strategic Accomplishments 2013 - NCTC Directorate of Terrorist Identities 12 pdf
224 2014-08-04 1999-07-15 - Israel-US Spying Pact 1999 - A Israel-US 1999 Agreement - Israel-US Spying Pact 1999 16 pdf
223 2014-08-04 2013-04-19 NSA Israel-US Spying Pact 2013 - A NSA Intelligence Relationship With Israel - Israel-US Spying Pact 2013 3 pdf
222 2014-07-25 2013-04-08 NSA Saudi Arabia Information Letter - A Saudi Arabia Information Paper NSA Intelligence Relationship with Saudi Arabia NSA Saudi Arabia Information Letter 4 pdf
221 2014-07-25 - - - - A March 2013 Watchlisting Guidance Signals Intelligence Authority Decision Tree SIGINT Authority decision tree - - pdf
220 2014-07-22 - - SSO Corporate Partner Access - Special Source Operations (Corporate Partners) - - - 8 pdf
219 2014-07-14 2012-07-05 GCHQ JTRIG Tools and Techniques - A GCHQ’s Joint Threat Research Intelligence Group Jtrigall NSA JTRIG Tools and Techniques 8 pdf
218 2014-07-12 2014-07-08 NSA Review Group Charter - A [] - NSA Review Group Charter 4 pdf
217 2014-07-09 2005-07-05 NSA Spying on Muslim-American Leaders - A Spying on Muslim-American Leaders Ordinary Web-users far outnumber foreign targets [2 S.] NSA Emails Spy
[1 S.]
8 pdf
216 2014-06-24 - NSA Analytics for Targets in Europe - A Analytics for Targets in Europe - - 1 pdf
215 2014-06-24 - NSA Xkeyscore Fingerprints - A - Xkeyscore Fingerprints - 1 pdf
214 2014-06-23 - NSA NSA Der Spiegel Release on German SIGADs - A - - NSA Der Spiegel Release on German SIGADs 9 pdf
213 2014-06-22 - NSA - Keith Alexander's talking points
Black Budget
RAMPART-A Project Overview
Special Source Operations
Special Source Operation extra slides
A Affidavit of Keith Alexander Regarding Spying on Foreign Entities
[4 S.]
- NSA Information-The Intercept Releases 41 Pages 41 pdf
212 2014-06-19 - NSA NSA Partners - - - - NSA Partners 20 pdf
211 2014-06-18 2013-06-06
bis
2013-06-06
NSA Keith Alexander Talking Points - - Keith Alexander Talking Points
Dagbladet - The Snowden files
- - 3 pdf
210 2014-06-18 - NSA Black Budget - - Black Budget
Dagbladet - The Snowden files
- - 4 pdf
209 2014-06-18 2010-10-01 NSA RAMPART-A Overview Die NSA schnorchelt mehr als 3 Terabit pro Sekunde von Glasfasern ab – und der BND macht mit - RAMPART-A Overview
Dagbladet - The Snowden files
- - 23 pdf
208 2014-06-18 - NSA Special Source Operations - - Special Source Operations
Dagbladet - The Snowden files
- - 8 pdf
207 2014-06-18 - BfV
BND
NSA
NSA German Spying 2 Snowdens Deutschland-Akte
Die Dokumente im PDF-Format
Im Fundus von Edward Snowden finden sich zahlreiche Dokumente mit Deutschland-Bezug.
SPIEGEL ONLINE veröffentlicht 53 Snowden Dokumente (200 Seiten)
Abkürzungen erklärt:
So lesen Sie die NSA-Dokumente (Glossar) - www.spiegel.de
- - - Der Spiegel Releases 200 pp of Snowden Docs 200 pdf
206 2014-06-16 - BfV
BND
NSA
NSA German Spying Mein Nachbar NSA
Der Spiegel vom 16.06.2014

mit den Artikeln:
Partner und Gegner zugleich
Snowdens Deutschland-Akte
Amerikas Brückenkopf
Eifer und Gier
- Analytics for targets in Europe
Xkeyscore Fingerprints
- NSA German Spying
NSA in "Der Spiegel" (16.06.2014) (de)
4 pdf
205 2014-06-10 - NSA
DEA
SANDKEY - - SANDKEY - DEA-NSA SANDKEY Voice Intercepts FVEY 4 pdf
204 2014-06-01 - NSA Identity Spying - - Identity Intelligence Identity Intelligence: Image is Everything NSA Identity Spying 4 pdf
203 2014-05-20 - NSA MYSTIC Identity - - Intercept-SSO Mystic Charts - NSA MYSTIC Identity 3 pdf
202 2014-05-19 - NSA Intercept Black Budget - A Intercept Black Budget - - 1 pdf
201 2014-05-19 - NSA DEA Warfighter - - DEA Warfighter DEA – the “Other” Warfighter - 2 pdf

 Top

inlineTabelle Links (101 - 200)

Nr Datum DocDatum Org Doc Titel Inhalt ACLU EFF FreeSnoden Cryptome Seite Typ
200 2014-05-19 - NSA Intercept Mystic - - Intercept Mystic MYSTIC fact sheet - 1 pdf
199 2014-05-19 - NSA Somalget - - Somalget Somalget - 2 pdf
198 2014-05-19 - NSA SSO Dictionary Excerpt - - SSO Dictionary Excerpt SSO Dictionary - 1 pdf
197 2014-05-19 - NSA MYSTIC Charts - - Intercept-SSO Mystic Charts - - 5 pdf
196 2014-05-13 2013-08-03 NSA PRISM Microsoft Skydrive Collection NSA-Memo verkündet nach Monaten der Verhandlungen zwischen dem FBI und Microsoft eine Allianz mit Microsoft für den Zugriff auf Skydrive Daten ohne besondere Genehmigung. SkyDrive ist ein Cloud-Service der von über 250 Millionen Menschen weltweit verwendet wird, um Dateien online zu speichern und dann von anderen Geräten aus zuzugreifen. PRISM: Microsoft Skydrive Collection [-] [-] [-] 1 pdf
195 2014-05-13 2012-12-26 NSA Microsoft Releases New Service Nach Sorgen, dass Microsoft's neue Verschlüsselungspraktiken den Zugriff der NSA auf E-Mail-Chat-Daten verhindern würde, gibt diese NSA-Memo Einblick in neue Überwachungsmöglichkeiten die in Zusammenarbeit mit Microsoft entwickelt wurden, um die neuen Verschlüsselungen zu umgehen. Durch die Partnerschaft mit Microsoft, kann die NSA auf E-Mails, Text-basierte Chat-und Voice / Video und Dateiübertragungen zugreifen. Microsoft Releases New Service [-] [-] [-] 1 pdf
194 2014-05-03 - NSA Google Emails - Emails Between NSA Director Keith Alexander and Google executives Re: Mobility Threats and Security - - NSA Google Emails
Al Jazeera America
3 pdf
193 2014-05-03 - NSA SIGINT Enabling full - A - - Update:
NSA SIGINT Enabling Suggesting Redacted Pages
3 von 117 pdf
192 2014-05-03 - NSA IAT TOR full - A - - Update:
NSA IAT TOR Suggesting Redacted Pages
9 von 48 pdf
191 2014-05-03 - GCHQ Optic Nerve full - A - - Update:
GCHQ OPTIC NERVE Suggesting Redacted Pages
3 von 8 pdf
190 2014-05-03 - GCHQ G20 Spying full - A - - Update:
GCHQ G20 Spying Suggesting Redacted Pages
4 von 9 pdf
189 2014-04-30 - NSA GHOSTMACHINE with ECHOBASE - GHOSTMACHINE: Identifier Lead Triage with ECHOBASE Ghostmachine Identifier Lead Triage with ECHOBASE NSA GHOSTMACHINE with ECHOBASE 14 pdf
188 2014-04-30 - NSA
GCHQ
NSA Visit by GCHQ Lobban - Lobban NSA Visit Precis GCHQ Visit Visit Precis – Sir Iain Lobban NSA Visit by GCHQ Lobban 4 pdf
187 2014-04-30 - NSA NSA PRISM with Olympics Option - PRISM Operations Highlight: Olympics Support - GCHQ Using PRISM Access Prism Olympics PRISM Operations Highlight: Olympics Support – GCHQ Using PRISM Access NSA PRISM with Olympics Option 1 pdf
186 2014-04-27 2013-04-17 NSA
NIS
Dagbladet Doc Decensored - - - - NSA Dagbladet Doc Decensored 1 pdf
185 2014-04-05 - GCHQ Full Spectrum Cyber Effects - Full-Spectrum Cyber Effects GCHQ Full Spectrum Cyber Effects Full Spectrum Cyber Effects GCHQ Full Spectrum Cyber 19 pdf
184 2014-04-05 2009-08-14 NSA 5-Eyes 2009 SIGDEV Conference - 2009 SigDev Conference 2009 SIGDEV Conference 2009 SIGDEV Conference: ‘Best Yet and Continuing to Improve’ NSA 5-Eyes SIGDEV Conference 2 pdf
183 2014-03-29
2014-03-31
- NSA Nymrod: Merkel Überwachunsberichte Überwachung
Nr. 9; Angela Merkel; German Chancellor; COS; > 300!
(Stückzahl Größer 300 Berichte)
(U) Court Orders
Machine vs. Manual Chief-of-State Citations
GCHQ and NSA Spy on Heads of State [1 S.] 2013 FISA Court order authorised spying on communications related to “Germany”
Court Orders
Machine vs. Manual Chief-Of-State Citations
Machine vs. Manual Chief-of-State Citations
Update:Ganze Liste
2 pdf
182 2014-03-25 - NSA 21th Century SID Culture - - - - NSA SID Culture 7 pdf
181 2014-03-22 - NSA Huawei SHOTGIANT Hardware Exploit - - Operation Shotgiant Objectives - NSA Huawei SHOTGIANT Hardware Exploit Part 2 2 pdf
180 2014-03-22 - NSA Huawei SHOTGIANT - Huawei Powerpoint Slides - Operation Shotgiant Objectives NSA Huawei SHOTGIANT Hardware Exploit Part 1 2 pdf
179 2014-03-21 - CSEC CSEC SNOWGLOBE - - French Intelligence E-Mail Spying Operation - CSEC SNOWGLOBE 7 pdf
178 2014-03-20 - NSA I Hunt Sys Admins - - Targeting System Administrator Accounts to Access Networks I Hunt Sys Admins NSA Hunt Sysadmins 6 pdf
177 2014-03-18 - NSA Adding Country to Mystic - Adding a Country to MYSTIC Efforts Mentioned Adding Another Country to Mystic Program An “additional target country” for MYSTIC - 1 pdf
176 2014-03-18 - NSA Tasking of SCALAWAG NSA SCALAWAG Top Provider of Actionable SIGINT Description of Data Collection by NSA Under Mystic Description of Data Collection Under Mystic Tasking of SCALAWAG NSA SCALAWAG 2 pdf
175 2014-03-18 - NSA MYSTIC Comprehensive Metadata Access - NSA Symbolizes Data-Collection Program With Wizard Mystic Program [1 S.] MYSTIC SSO Weeklybrief [1 S.] NSA MYSTIC Comprehensive Metadata Access 2 pdf
174 2014-03-17 - NSA Intelligence Command and Control - - TURBINE Intelligence Command and Control A new intelligent command and control capability
TURBINE command and control capability
- 1 pdf
173 2014-03-14 - NSA Cooperative Third Party Relationships - Third Party Relationships NSA Cooperative Third Party Relationships What Are We After With Our Third Party Relationships? NSA Third Party - pdf
172 2014-03-12 - NSA HAMMERCHANT and HAMMERSTEIN - VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN NSA Hammerchant 4 pdf
171 2014-03-12 - NSA Mikey and Ibake - - - - NSA Mikey and Ibake 3 pdf
170 2014-03-12 - NSA TURBINE and TURMOIL - TURBINE and TURMOIL TURBINE and TURMOIL Turbine and Turmoil NSA Turbine and Turmoil 2 pdf
169 2014-03-12 - NSA 1000s of implanted Targets - Thousands of Implants Thousands of Implants Simultaneously managing thousands of implanted targets NSA 1000s Implants 1 pdf
168 2014-03-12 - NSA More Than One Way Mit "Quantum" kann TAO fast nach Belieben Rechner mit Schadsoftware verseuchen. Auflistung der Quantum-Software There Is More Then One Way to Quantum NSA More Than One Way There Is More Than One Way To QUANTUM NSA More Than One Way 1 pdf
167 2014-03-12 - NSA
GCHQ
Quantum Theory Hacking Tactics Mit der "Quantumtheory" kann die NSA-Abteilung Tailored Access Operations (TAO) fast nach Belieben Rechner von Zielpersonen mit Schadsoftware verseuchen. The NSA and GCHQ's QUANTUMTHEORY Hacking Tactics The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics QUANTUMTHEORY NSA Quantumtheory 11 pdf
166 2014-03-12 - NSA NSA Selector Types - Selector Types NSA Selector Types Selector types NSA Selector Types 1 pdf
165 2014-03-12 - NSA Quantum Insert Mit der Quantum Insert Methode kann die NSA-Abteilung Tailored Access Operations (TAO) fast nach Belieben Rechner von Zielpersonen mit Schadsoftware verseuchen. Quantum Insert Diagrams Quantum Insert Diagrams QUANTUMINSERT
[Datei defekt]
NSA Quantum Insert 5 pdf
164 2014-03-12 - NSA Analysis of Converged Data - NSA Technology Directorate Analysis of Converged Data NSA Technology Directorate Analysis of Converged Data Analysis of Converged Data NSA Converged Data 1 pdf
163 2014-03-12 - NSA Phishing MTM - NSA Phishing Tactics and Man in the Middle Attacks NSA Phishing Tactics and Man in the Middle Attacks WILLOWVIXEN and SECONDDATE NSA Phishing MTM 3 pdf
162 2014-03-12 - NSA MHS Leverages XKS for Quantum Against Yahoo and Hotmail Beschreibt beliebte Art der Quantum Methode zur Xerseuchung eines Zielrechners mittels Yahoo und Hotmail. Menwith Hill Station Leverages XKS for QUANTUM Against Yahoo and Hotmail MHS Leverages XKeyscore for Quantum MHS Leverages XKS for Quantum Against Yahoo and Hotmail NSA Menwith Hill 1 -
161 2014-03-12 - NSA TURBINE Industry Exploit - Industrial-Scale Exploitation TURBINE Industrial Scale Exploitation TURBINE NSA Industry Exploit 1 -
160 2014-03-12 - NSA Hacking Routers - Five Eyes Hacking Large Routers Five Eyes Hacking Large Routers Hacking Routers NSA 5 Eyes Hacking 1 -
159 2014-03-12 - - - - - - QUANTUMHAND - 1 pdf
158 2014-03-12 - NSA Stellarwind - Stellarwind Classification Guide Classification Guide for Stellarwind Program STELLARWIND classification guide NSA Stellarwind 37 pdf
157 2014-03-12 - NSA Classification Guide for FISA - Classification Guide for FISA, the Protect America Act and the FISA Amendments Act Classification Guide for FISA, the Protect America Act and the FISA Amendments Act Classification guide for FISA, the Protect America Act and the FISA Amendments Act NSA FISA FAA 18 pdf
156 2014-03-12 - - - - Ashcroft Memo on Intelligence Sharing Procedures Classification Guide for FISA, the Protect America Act and the FISA Amendments Act Procedures for the dissemination by NSA to foreign governments of information from FISA electronic surveillance or physical search carried out by the FBI AG Dissemination 2 pdf
155 2014-03-12 - NSA Access to FISA - NSA Memo Expands Access to FISA Information NSA Memo Expands Access to FISA Information Recommended Requirements for cryptanalysts at CCs in Texas, Georgia and Hawaii to access NSA and FBI FISA material NSA Cryptanalyist FISA 4 pdf
154 2014-03-12 - NSA Spying Timeline - NSA Timeline of Surveillance Law Developments NSA Timeline of Surveillance Law Developments Timeline of surveillance law developments NSA Spying Timeline 1 pdf
153 2014-03-12 - NSA Aids Dutch Anti-Piracy - - Dutch Shares Collected Anti-Piracy Information with NSA - NSA Aids Dutch Anti-Piracy 3 pdf
152 2014-03-07 - NSA Ask Zelda
Ask Zelda Unclass
- Silenced in SID [2 S.] NSA Ask Zelda_An Interview with Zelda [2 S.] “Ask Zelda!”: Watching Every Word in Snitch City [2 S.] NSA Releases SIDtoday "Ask Zelda" 104 pp Unclass
[104 S.]
NSA Ask Zelda [8 S.]
2
8
pdf
151 2014-03-03 - - Report on Pen Register FISA Orders - - DOJ Report on Pen Register FISA Orders - Not Snowden EPIC FOIA 3 pdf
150 2014-02-27 - GCHQ Optic Nerve - Optic Nerve GCHQ Optic Nerve optic-nerve yahoo-webcam-display-and-target-discovery
optic-nerve potentially-undesirable-images
GCHQ Optic Nerve 3 pdf
149 2014-02-25 - GCHQ Cyber Effects - GCHQ Honey Trap Cyber Attack (2) GCHQ Honey Trap Cyber Attack (2) - GCHQ Cyber Effects 11 pdf
148 2014-02-24 - GCHQ Disruption - - - - GCHQ Disruption 4 pdf
147 2014-02-24 - GCHQ Online Deception The Art of Deception: Training for a New Generation
"Kunst des Täuschens - Training für eine neue Generation verdeckter Online-Operationen"
The Art of Deception Training for Online Covert Operations Training for Covert Online Operations The Art of Deception: Training for a New Generation of Online Covert Operations GCHQ Online Deception 50 pdf
146 2014-02-18 - GCHQ Psychology: a new kind of SIGDEV - GCHQ SIGDEV GCHQ SIGDEV Psychology: a new kind of SIGDEV GCHQ Psychology 44 pdf

Tabelle LeakVid Videos
145 2014-02-18 - - Discovery SIGINT Targeting Scenarios and Compliance - - Discovery Sigint Targeting Scenarios and Compliance Discovery SIGINT Targeting Scenarios and Compliance NSA-GCHQ Discovery 1 pdf
144 2014-02-15 - ASD SUSLOC Trade Document - - SUSLOC - - 1 htm
143 2014-02-10 - NSA Intercept Drones - Intercept-Drones InterceptDrones GILGAMESH und VICTORYDANCE [3 S.]
2013 Congressional Budget Justification [1 S.]
New Tactical Collection System Joins the War on [1 S.]
- 5 pdf
142 2014-02-08 - - Boundless Nederland - Boundless Nederland Boundless Nederland - MIVD Boundless Informant
Cryptomemirror
1 jpg
141 2014-02-07 - GCHQ GCHQ Cyber Attack - GCHQ Honey Trap Cyber Attack (1) GCHQ Honey Trap Cyber Attack Cyber Integration “The art of the possible” GCHQ Cyber Attack 16 pdf
140 2014-02-04 - GCHQ GCHQ Attacked Hactivist Anonymous - British Spies Attacked Hactivist Anonymous British Spies Attacked Hactivist Anonymous Pushing the Boundaries and Action Against Hacktivism GCHQ Anonymous 14 pdf
139 2014-01-31 - CSEC IP Profiling Analytics & Mission Impacts Präsentation CSEC benutzt Flughafen Wi-Fi-Anschluss um kanadische Reisende zu tracken (verfolgen). CSEC Airport WiFi Tracking CSEC Airport WiFi Tracking IP Profiling Analytics & Mission Impacts CESC IP Profiling 27 pdf
138 2014-01-30 - - COP15 - COP15 Interception Document COP15 Interception Document UN Climate Change Conference in Copenhagen — Will the Developed and Developing World Agree on Climate Change? - 2 pdf
137 2014-01-28 - NSA Leaky Phone Apps - - Leaky Phone Apps - NSA Smartphones Analysis 14 pdf
136 2014-01-27 - GCHQ Mobile Theme - Mobile Theme Briefing Mobile Theme Briefing Mobile Theme Briefing GCHQ Mobile Theme 4 pdf
135 2014-01-27 2010-05 NSA Converged Analysis Smartphone Devices NSA presentation describing information the
agency can extract from smartphone traffic.
Social Convergence Converged Analysison Smartphone Devices Converged Analysis of Smartphone Devices NSA Smartphones Analysis 14 pdf
134 2014-01-27 - GCHQ Squeaky Dolphin - - Squeaky Dolphin - GCHQ Squeaky Dolphin 47 pdf
133 2014-01-16 - NSA SMS Text Messages Exploit - - [C:\snowden-files-14-0221\20140116-guard-dishfire_presentation.pdf Dishfire Presentation] Content Extraction Enhancements for Target Analytics SMS Text Messages Exploit 8 pdf
132 2014-01-14 - - - - - - - SSO
[Duplikat von Nr. 115]
7 pdf
131 2014-01-14 - - - - - - - PRISM
[Duplikat]
11 pdf
130 2014-01-13 - - - - - - - 5-Eyes SpyG 8-G20
[Duplikat]
4 pdf
129 2014-01-02 - - Classification guide for NSA/CSS quantum computing research - Quantum Computing Quantum Computing Classification guide for NSA/CSS quantum computing research Quantum Computer2 10 pdf
128 2014-01-02 - - Research & Technology penetrating hard Targets - Quantum Computers Hard Targets Quantum Computers Hard Targets Penetrating Hard Targets and Owning The Net Quantum Computer 3 pdf
127 2013-12-30 2007-01-08 NSA
CSS
QUANTUM Tasking Techniques Präsentation für NSA-Techniker und Analysten, erstellt vom NSA-Dienst Booz Allen Hamilton. NSA Quantum Tasking Techniques for the R&T Analyst TAOQuantumTheory
TAO Quantum Tasking
NSA QUANTUM Tasking Techniques for the R&T Analysis QUANTUM Tasking
QUANTUMTHEORY
28
14
pdf
126 2013-12-30 2008 NSA Tailored Access Operations Tailored Access Operations / 'Amt maßgeschneiderter Maßnahmen' (TAO) ist eine nachrichtendienstliche Cyber-Warfare-Einheit der NSA und aktiv seit mindestens 1998. Presentation über das Texas Cryptologic Center. Tailored Access Operations TAO Intro [17 S.] Tailored Access Operations – Texas Cryptologic Center TAO Introduction 16 pdf
125 2013-12-30 - NSA
CSS
QFIRE pilot report - QFIRE QFIRE QFIRE pilot report QFIRE 16 htm
124 2013-12-30 2008 NSA
CSS
ANT Catalog (53 Seiten) Produktkatalog, aus dem andere NSA Mitarbeiter "Technologie aus der ANT Abteilung" für die Erschließung von Datenziele bestellen können. NSA's Spy Catalogue NSA ANT Catalog ANT Product Data NSA Catalog [50 S.] 53 pdf
htm
zip
123 2013-12-30 - NSA
CSS
Appelbaum ANT Catalog - NSA's Spy Catalogue - NSA ANT Catalog NSA Catalog Video Clips 21 pdf
122 2013-12-29 - NSA
CSS
ANT Cottonmouth TAO ANT Cottonmouth - - - TAO ANT COTTONMOUTH (Bilder)
TAO ANT COTTONMOUTH

(de Artikel)
4 -
121 2013-12-23 - NSA
CSS
- - - NSA/CSS Mission
[Dat leer]
- NSA/CSS Mission 3 pdf
120 2013-12-18 - - - - - - Geopolitical trends for 2014-2019 - 3 html
119 2013-12-11 - NSA - SSO Content Acquisition Optimization - - - Excessive Collection 9 pdf
118 2013-12-11 - NSA - SSO Collection Optimization - - - SCISSORS2 7 pdf
117 2013-12-11 - NSA - SSO Collection Optimization Overview - - - SCISSORS1 4 pdf
116 2013-12-11 - NSA Yahoo-Google Exploit - - - - Yahoo-Google Exploit 6 pdf
115 2013-12-11 - - - - - - - Cable Spying Types
[Duplikat von Nr. 65]
7 pdf
114 2013-12--- - NSA WINDSTOP - - - - WINDSTOP 2 pdf
113 2013-12-11 - NSA XKeyScore Data Sources - - Xkeyscore Sources XKeyScore Data Sources NSA Sweden FRA XKeyScore Sources 1 pdf
112 2013-12-11 - - - - - - - NSA and Sweden Pact
[Duplikat von Nr. 106]
1 pdf
111 2013-12-11 - - - - - Quantum from GCHQ - GCHQ Sweden FRA Quantum 1 -
110 2013-12-11 - NSA SWEDUSA 20I3 STRATEGIC PLANNING CONFERENCE (SPC) - - Xkeyscore Sweden Meeting Visit Precis SWEDUSA NSA Sweden FRA XKeyScore Plan 5 pdf
109 2013-12-11 - NSA Baltic Region - - Baltic Region - NSA Sweden FRA RU Baltic 1 pdf
108 2013-12-11 - NSA Final Agenda Sweden - - Final Agenda Sweden USA Final Agenda SWEDUSA NSA Sweden FRA Agenda 8 pdf
107 2013-12-11 - NSA NSA 5Eyes Partners SSEUR members are the Five Eyes Nations (Australia, Canada, New Zealand, United Kingdom and United States) and the following Third Party partners: Belgium, Denmark, France, Gernany, Italy, Netherlands, Norway, Spain, Sweden. All Third Party nations in SSEUR send students to the training, as did the UK. - - Third Party Partners NSA 5Eyes Partners 1 pdf
106 2013-12-11 - NSA NSA Internal PM on FRA - - NSA Internal PM on FRA - NSA Sweden FRA Relationship 1 pdf
105 2013-12-11 - NSA SIGINT Successes - - - - SIGINT Successes 4 pdf
104 2013-12-11 - - NSA Sweden FRA Relationship - - Sweden Neutral - NSA GCHQ Sweden FRA COMINT 1 pdf
103 2013-12-11 - - XKeyScore Slide with Swedish Example - - XKeyScore Slide with Swedish Example XKeyScore Slide with Swedish example NSA Sweden FRA XKeyscore Slide 1 pdf
102 2013-12-11 - NSA XKeyScore Tor et al - - NSA Slides Xkeyscore (Tor LOG) - NSA Sweden FRA XKeyScore Tor et al 3 pdf
101 2013-12-11 - - UK and Swedish involvement in Quantum - - Legal Issues UK Regarding Swedenand Quantum UK and Swedish involvement in Quantum NSA Sweden FRA Quantum1 1 pdf

 Top

inlineTabelle Links (1 - 100)

Nr Datum DocDatum Org Doc Titel Inhalt ACLU EFF FreeSnoden Cryptome Seite Typ
100 2013-12-11 - NSA Sweden FRA Quantum Accomplishments - - Accomplishments from NSA Select Accomplishments: Production NSA Sweden FRA Quantum Accomplishments 2 pdf
99 2013-12-10 - - - - - - - G8-G20 Spying (Duplikat von Nr.86) 4 pdf
98 2013-12-10 2006-09-20 - GSM Classification Guide Internal NSA document outlining the agency 'sability to intercept, process and discern location data from mobilephone calls. GMS Classification Guide GSM Classification Guide GSM Classification Guide GSM Tracking 2 pdf
97 2013-12-10 2012-10-01 NSA Summary of DNR and DNI Co-Travel Analytics Study overviewing key elements of the co-traveler analytics both under development and operational at NSA. Cotraveler Overview Cotraveler Overview Summary of DNR and DNI Co-Travel Analytics GSM classification guide Co-Traveler 24 pdf
96 2013-12-10 - NSA GhostMachine Excerpts from slides describing the NSA's Special Source Operations cloud analytics platform, code-named GHOSTMACHINE. Ghost Machine GhostMachine SSO GHOSTMACHINE Analytics GHOSTMACHINE 4 pdf
95 2013-12-10 - NSA Target Location An excerpt from a transcript of National Security Agency training videos that describe how to verify the location of a targeted device. Target Location Target Location - Target Location 1 pdf
94 2013-12-10 2013-04-03 - NSA CSEC Partnership Information paper from the NSA detailing the NSA's intelligence relationship with Canada's Communications Security Establishment Canada (CSEC). NSA CSEC Partnership NSA CSEC Partnership - - 2 pdf
93 2013-12-10 2013-04 NSA Location Cookies NSA internal presentation slides detailing signal surveillance techniques and successes. Location Cookies Location Cookies - - 4 pdf
92 2013-12-09 2008 GCHQ Video Games Paper NSA paper entitled "Games: A look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities," stressing the risk of leaving games communities under-monitored. NSA Video Games Paper NSA Video Games Paper MHS and GCHQ “Get in the Game with Target Development for World of Warcraft Online Gaming”
Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities
Spying on Games 82 pdf
91 2013-12-09 - NSA Spying on Games - - - Exploiting Terrorist Use of Games & Virtual Environments Spying on Games 2 pdf
90 2013-12-05 2013-04-18 NSA Spionage-Beziehungen zu Schweden Excerpts from a document related to Swedish-American surveillance of Russia FRA Russia FRARussia Spionage-Beziehungen der NSA in Schweden Sweden Spied Russia for NSA 2 pdf
89 2013-12-05 2010-09-10 NSA NSA Italy Spying Excerpts from slides describing spying against the Italian Embassy in Washington DC. Italy Spying Italy Spying Italy – last 30 days
SCS Operations in Italy
Close Access Sigads
NSA Spies Italy [3 S.] 4 htm
pdf
88 2013-12-04 - NSA CHALKFUN Excerpt from NSA Agency training manual explaining how to determine if a targeted device is "foreign". Chalkfun Foreignness Chalkfun Foreignness CHALKFUN and TAPERLAY CHALKFUN 1 pdf
87 2013-12-04 - NSA FASCIA NSA slides about the FASCIA program, including the volume and type of device-location data collected by the agency. FASCIA Slides Fascia FASCIA FASCIA 2 pdf
86 2013-12-02 2010-06-23 - Spying G8 & G20 Meeting Canada Briefing notes on NSA operational plans to conduct surveillance during the 2010 G8 and G20 summits in Canada. NSA Lends Support to Upcoming G8 and G20 Summits in Canada G20 Summit [4 S.] NSA lends support to upcoming G8 and G20 meetings in Canada G8 - G20 Spying [3 S.] 4 pdf
85 2013-12-02 - CSEC - - - DSD Data - - 4 pdf
84 2013-11-30 - NSA Dutch SIGINT AIVD SIGINT - AIVD SIGINT Notes for Dutch SIGINT/Cyber Analytic Exchange Dutch SIGINT 3 pdf
83 2013-11-30 2013-11-30 CSEC CSEC Brazil Spying Presentation by Communications Security Establishment Canada on surveillance of Brazil's Ministry of Mines and Energy. CSEC Presentation CSEC Brazil CSEC – Advanced Network Tradecraft CSEC Brazil Spying 18 htm
pdf
82 2013-11-26 - - Evidence of Microsoft's vulnerability Slides describing collection of data from Internetproviders. Address Books/Serendipity/HTTP-Demux - apps.washingtonpost.com - - - 3 htm
81 2013-11-26 2009-11-24 GCHQ
NSA
Microsoft Monkey Puzzle E-Mail von GCHQ an NSA die darauf hindeutet, dass von Microsoft für NSA-Programm der Zugriff auf Google und Yahoo Verkehr ausgerichtet wurde. Did the NSA target Microsoft too? Microsoft Monkey Puzzle MUSCULAR and realms - 1 pdf
80 2013-11-26 - NSA Microsoft Cloud Exploitation - Did the NSA target Microsoft too? Microsoft Cloud Exploitation Microsoft data Microsoft Cloud Exploit 4 pdf
79 2013-11-26 2013-10-03 NSA Muslim Porn Viewing Excerpts from document detailing collection of information on targets' online sexual activity, intended to be used to discredit them. Program to discredit "radicals" through use of online sexual activity Radicalizers Pornography Global Radicalizers Vulnerable in Terms of Authority Muslim Porn Viewing 3 htm
pdf
78 2013-11-23 2012-02-23 NSA SIGINT Strategy 2012-2016 Strategy document detailing NSA mission statement and goals. SIGINT Strategy 2012-2016 SIGINT Strategy 2012 SIGINT Strategy 2012-2016 SIGINT Strategy 2012-2016 5 htm
pdf
77 2013-11-23 2012 NSA SIGINT Cryptologic Platform Presentation demonstrating NSA infected 50,000 computers worldwide with malware. Worldwide SIGINT / Defense Cryptologic Platform NSA Malware Worldwide SIGINT / Defense Cryptologic Platform SIGINT Cryptologic Platform 1 htm
pdf
76 2013-11-22 - - Boundless Informant Presentation describing Boundless Informant's "Mission Capabilities from Metadata Records." Boundless Informant [Duplicate of June 2013] Boundless Informant [Duplicate of June 2013] - [Duplicate of June 2013] 8 pdf
75 2013-11-22 - - Boundless Informant FAQ - - Boundless Informant FAQ [Duplicate of June 2013] - [Duplicate of June 2013] 3 pdf
74 2013-11-22 - NSA - Slides detailing the collection of call records from Afghanistan and Norway over a period of 30 days. Afghanistan, Norway, Boundless Informant, Boundless Informant FAQ Afghanistan Collection Afghanistan – last 30 days
Norway – last 30 days
- 2 htm
73 2013-11-20 2013-02-14 - - Notes on a meeting with Dutch intelligence services, whose officials described their use of Computer Network Exploitation technology to hack web forums and collect data of users. Notes for Dutch SIGINT/Cyber Analytic Exchange Collection, Processing and Dissemination of Allied Communications [4 S.] Collection, Processing and Dissemination of Allied Communications - 3 pdf
72 2013-11-20 2007 - UK Phone Data Memo detailing UK-U.S. deal allowing NSA to store data of UK citizens not suspected of wrong doing. SID Analysts Can Now Unminimize [UK Phone Data] - 2007 agreement on UK contact identifiers - 1 jpg
71 2013-11-19 - - Boundless Informant / FAQ - - - - BOUNDLESS INFORMANT incl. FAQ 13 pdf
70 2013-11-19 - NSA Norway - Last 30 Days - - Norway Collection - Norway 1 pdf
69 2013-11-17 - - DSD 3G-Handsets Impact and Update - - DSD3G 3G: impact and update DSD-3G 6 pdf
68 2013-11-17 - GCHQ Royal Concierge - - Royal Concierge Royal Concierge Royal Concierge (de)
Royal Concierge (en)
4 pdf
67 2013-11-04 - - Boundless Informant - - Boundless Informant (Duplikat von Nr.6) - - 8 pdf
66 2013-11-04 - NSA Special Source Operations (SSO) - Details of MUSCULAR - - Special Source Operations (SSO) Collection Optimization "Midpoint" Slides - Google and Yahoo! exploitations [6 S.] - WINDSTOP, SSO, Yahoo - Google
MUSCULAR - INCENSOR Google and Yahoo
14 htm
65 2013-11-04 - NSA Special Source Operations Collection Optimizazion - - Special Source Operations (SSO) Intercept Program Slides -- cable programs, details of MUSCULAR Special Source Operations overview Cable Spying Types [7 S.] 4 pdf
64 2013-11-04 - - - - - WINDSTOP Collection 30 day period December 2012 - January 2013 WINDSTOP – last 30 days - 1 pdf
63 2013-11-03 - - Collection Accesses - - Collection Accesses 30 Nov 2009 Collection accesses - 1 htm
62 2013-11-03 2007-10-03 NSA SIGINT Mission Strategic Plan 2008-2013 - - NSA SIGINT Mission Strategic Plan 2008-2013 2008-13 Strategic Plan SIGINT Mission 2013 11 htm
pdf
61 2013-11-033 2007-01 NSA 2007 Strategic Mission List - - NSA SIGINT January 2007 Strategic Mission List January 2007 Strategic Mission List SIGINT Mission 2007 11 htm
pdf
60 2013-11-01 - NSA Corporate FAA Reporting Metrics Corporate FAA Reporting Metrics - Corporate FAA Reporting Metrics Corporate FAA Reporting Metrics SSO2 Slide (Corporate FAA Reporting Metrics) 1 pdf
59 2013-11-01 2013-04 - - - - - Relationships & Authorities
Corporate FAA Reporting Metrics
PRISM, SSO [11 S.]
SSO1 Slide (Relationships & Authorities)
SSO2 Slide (Corporate FAA Reporting Metrics)
13 pdf
58 2013-10-30 2013-03-14 NSA Project Muscular An excerpt from the Special Operations Weekly -- an internal NSA publication -- describing data collection via the MUSCULAR program. NSA: Special Operations Weekly Excerpt Slideson MUSCULAR program possibly from February 28, 2013 Project Muscular - 3 pdf
57 2013-10-30 - - Current Efforts - Google An NSA Powerpoint slide showing the intersection of "Public Internet" and internal "Google Cloud" user data. NSA Powerpoint Slide: Google Cloud Exploitation MUSCULAR slide "Current Efforts - Google" pdf-fail - - 1 pdf
56 2013-10-28 - NSA Spain - Last 30 Days - - Graphic showing phone calls intercepted in Spain December 2012 - - 1 pdf
55 2013-10-27 - NSA - - - NSA SCS Slides on embassy spying [Slides 3-6] - NSA-CIASCS [3 S.]
NSA-CIASCS [2 S.]
5 ??
54 2013-10-25 2010-09-10 NSA Close Access Sigads - - Close Access Sigads September 10, 2010 (listing French Embassy) NSA codenames Close Access Sigads 2 pdf
53 2013-10-25 - NSA Cable attacks French Presidential Network - - Cable regarding cyber attacks on French Presidential Network April 12, 2013 Four-page internal memo NSA Hosts FRSpies 4 pdf
52 2013-10/24 - NSA Phones World Leaders - - NSA memo to Signals Intelligence Division (SID) staff October 27, 2006 regarding monitoring of phones of world leaders - - 1 pdf
51 2013-10-22 2013-04 NSA PRISM 4.2013 PRISM ist ein Top Secret eingestuftes Programm zur Überwachung und Auswertung elektronischer Medien und elektronisch gespeicherter Daten der National Security Agency und gehört zum dem großen Überwachungsprogramm „Stellar Wind“. An dem Programm sind neun der größten Internetkonzerne und Dienste der USA beteiligt: Microsoft (u. a. mit Skype), Google (u. a. mit YouTube), Facebook, Yahoo, Apple, AOL und Paltalk. - Prism April 2013 - PRISM 11 pdf
50 2013-10-21 - NSA PRISM Wanadoo-Alcatel - - NSA PRISM slide - alcatel / wanadoo (undated) - Wanadoo - Alcatel 1 pdf
49 2013-10-21 - NSA Boundless Informant France - - Boundless Informant France PRISM overview and Boundless Informant on France
Boundless Informant on France
Boundless Informant 2 pdf
48 2013-10-20 - NSA - - - NSA Cable dated November 10, 2010 discussing hacking of Mexican President's email - - 1 pdf
47 2013-10-14 2011-09 NSA Content Aquisition - - NSA Special Source Organization (SSO) slides on Content Acquisition Optimization Content Aquisition Optimization SSO Content Slides 9 pdf
46 2013-10-14 2013-01-07 NSA SSO Overview - - Intellipedia entry-Special Source Organization (SSO) Collection Optimization Overview - SSO Overview 4 pdf
45 2013-10-14 2012 NSA Content Optimization Internal NSA presentation detailing the collection of hundreds of millions of contactlists from around of the world. Content Acquisition Optimization PowerPoint Slides NSA Special Source Organization (SSO) Slides on Content Optimization - Address Books (SCISSORS) SSO Collection Optimization SSO Slides [7 S.] 9 pdf
44 2013-10-06 - CSEC - Presentation on Brazilian Ministry of Mines and Energy - - - CSE Brazil Ministry 7 htm
43 2013-10-04 2012-06 NSA Tor Stinks Presentation Presentation on de-anonymizing users of Tor,a tool meant to protect online anonymity. "Tor Stinks" "Tor Stinks" Presentation June 2012 "Tor Stinks" Presentation "Tor Stinks" 23 pdf
42 2013-10-04 - NSA Tor Egotistical Giraffe Presentation on EgotisticalGiraffe, a technique designed by the NSA to attack Tor users. Peeling back the layers of Tor with Egotistical Giraffe Peeling Back the Layers of Tor with Egotistical Giraffe January 8, 2007 Peeling back the layers of Tor with Egotistical Giraffe Egotistical Giraffe 20 pdf
41 2013-10-04 - NSA Tor Types of IAT Extracts from an NSA document on Tor. Extracts from an NSA document on Tor Types of IAT (how Tor works) Tor: ‘The king of high-secure, low-latency anonymity’ Types of IAT Tor 9 pdf
40 2013-10-04 - - - NSA Notes from talk on Tor by Roger Dingledine November 2007 - - - Roger Dingledine
[Not Snowden document]
2 htm
39 2013-10-04 - NSA Tor Report 2006 - - NSA Crypt analysis and Exploitation Services Report on TOR 2006 NSA report on the Tor encrypted network Tor 49 pdf
38 2013-10-04 - GCHQ Tor Op Mullenize and beyond GCHQ report on ‘MULLENIZE’ program to ‘stain’ anonymous electronic traffic - GCHQ Mullenize GCHQ report on ‘MULLENIZE’ program to ‘stain’ anonymous electronic traffic GCHQ MULLENIZE 2 pdf
37 2013-09-28 2011-01-03 - - NSA memo on "new contact-chaining procedures to allow better, faster analysis" of foreign intelligence targets. NSA Contact-Chaining Memo NSA memo from January 3, 2011 on contact chaining - Contact Chaining Social Networks [1] 3 pdf
36 2013-09-28 - NSA - An NSA powerpoint slide illustrating how phone and email data are used to graph the relationships of foreign intelligence targets. NSA Social Network Graph Powerpoint Slide Slide on contact chaining (SYANPSE) - SYANPSE 1 pdf
35 2013-09-20 - GCHQ GCHQ Belgacom Hack - - GCHQ Slides on Belgacom - Belgacom 3 htm
34 2013-09-16 - NSA - - - NSA Network Analysis Center 2010 SIGDEV Conference on creditcard authorization net workmapping - SWIFT 3 pdf
33 2013-09-11 - NSA NSA-Israel: Memorandum of Understanding - - IsraelSharing NSA and Israeli intelligence: memorandum of understanding NSA-Israel Spy 5 pdf
32 2013-09-09 - NSA - - - NSA slides on smartphones - Smartphones 5 pdf
31 2013-09-08 - - - (WP) STORMBREW - StormbrewTV - - - -
30 2013-09-08 - - Petrobas - - NSA slides on Petrobras and private networks - Petrobas ~60 -
29 2013-09-05 - NSA Classification Guide for Cryptanalysis - - NSA Classification Guide for Crypt analysis from September 13, 2005 NSA classification guide for cryptanalysis NSA classification guide 3 pdf
28 2013-09-05 - NSA SIGINT Enabling Project - - NSA SIGINT Enabling Project Description - engaging companies to covertly leverage product designs (nodate) SIGINT Enabling Project SIGINT Enabling
SIGINT Enabling [NYT 3]
SIGINT Enabling [PP 3]
3 pdf
27 2013-09-05 - NSA Bullrun – Classification Guide - - Project Bullrun Description June 16, 2010 Project Bullrun – classification guide to the NSA’s decryption program BULLRUN
BULLRUN [NYT 4]
BULLRUN [PP 4]
5 pdf
26 2013-09-03 - NSA Brazil and Mexico case studies - - SATC slides Mexico and Brazil Case Studies Intelligently filtering your data: Brazil and Mexico case studies Brazil and Mexico 20 htm
25 2013-09-01 - NSA - NSA document dated June 2010 (notreleased) discussing targeting of French Foreign Ministry - - - French Foreign Ministry 0 -
24 2013-08-31 - NSA - NSA document dated March 23,2006 (notreleased) showingt hat AlJazeera was surveilled - - - Al Jazeera 0 -
23 2013-08-30 - NSA Black Budget - - FY 2013 Congressional Budget Summary February 2012 National Intelligence Program Summary ("black budget") Inside the 2013 U.S. intelligence ‘black budget’ [17 S.]
2013 U.S. intelligence budget tables [26 S.]
Budget 43 pdf
22 2013-08-23 - NSA - - - Prism Payments - - - -
21 2013-08-15 2007-01-08 NSA Targeting Rationale (TAR) An NSA document describing how analysts should explaint heir targeting decisions under the FISA Amendments Act. NSA Memo: Targeting Rationale (TAR) NSA Targeting Analyst Rationale slides (undated) NSA Auditing: Targeting Rationale - 4 pdf
20 2013-08-15 2011-10-12 NSA - An NSA document describing the FISACourt's 2011 FAA Certifications and noting the FISC ruling that certain procedures for the collection of "Multiple Communications Transactions" were "deficienton statut oryand constitutional grounds." FAA Certification Renewals with Caveats NSA Special Source Organization (SSO) news article from October 12, 2011 discussing FISC ruling holding NSA surveillance unconstitutional SSO transitions following FISA Court ruling - 1 pdf
19 2013-08-15 2011-11-01 NSA U.S. Person Information An NSA training slide about what analysts should do when they acquire "U.S.person information". Slide: So you got U.S. Person Information? "So You Got a US Person?" training slide November 8, 2011 Training material: US Person Information - 1 pdf
18 2013-08-15 2012-05-03 NSA SID Oversight & Compliance A2012 quarterly audit of the NSA's surveillance activities, which describes 2.766 violations by the NSA of the surveillance laws and its internal rules and regulations. SID Oversight and Compliance NSA Signals Intelligence Division (SID) Oversight & Compliance Report May 31, 2012 discussing privacy violations for the preceding year 2012 SID Auditing report - 13 pdf
17 2013-08-09 2011 NSA - An NSA Section 702 rule change expanding NSA targeting/surveillance authorities. NSA Section 702 'Loop Hole' NSA Special Source Organization (SSO) glossary on Section 702 - - 1 pdf
16 2013-07-31 2008-02-25 NSA XKeyScore Training Slides Eine NSA Ausbildungs-
präsentation die den Zweck und Umfang des XKeyScore Programms beschreibt.
NSA XKeyscore Powerpoint NSA XKeyScore Training Slides, 2.2008 XKeyScore training presentation, 2008 XKeyScore 32 pdf
15 2013-07-10 2013-04-13 NSA PRISM UPSTREAM Slide An NSA training slide about the collection of internet and phonedata from fiber-optic cablenet works via the UPSTREAM program. UPSTREAM Powerpoint Slide PRISM Slide - PRISM Slide 1 htm
14 2013-06-30 - NSA Dropmire - - Dropmire - Dropmire 1 pdf
13 2013-06-29 2013-04-13 NSA PRISM NSA training slides about the acquisition of surveillance information through the PRISM program. PRISM Powerpoint Slides re Data Acquisition PRISM Slides PRISM Powerpoint Slides re Data Acquisition PRISM [8 S.] 4 pdf
htm
12 2013-06-27 2007-11-20 NSA - A memo from the NSA to the DOD seeking approval of a proposed amendment to procedures governing the NSA's metadata analysis NSA Memo to DOD - Proposed Amendment to Conduct Analysis of Metadata DOJ Memo from November 20, 2007 Proposing Amendment to DOD procedures to allow NSA todo contact chaining of metadata related to US Persons Justice Department and NSA memos proposing broader powers for NSA to collect data DoJ Memo on NSA 16 pdf
11 2013-06-27 2009-03-24 NSA President Bush's post-9/11 surveillance programs A2009 NSA IG Report reviewing President Bush's post-9/11 surveillance programs. Draft NSA IG Report NSA OIG Working Draft Report from March 24, 2009 on StellarWind (PSP) NSA Inspector General review of government surveillance programs after 9/11 StellarWind 51 pdf
10 2013-06-27 2011-02-02 - - ADOJ report to the Senate Intelligence Committee describing the government's bulk collection program under Section 215. 2011 OIG Report on Bulk Collection - - [NotSnowden] 9 -
9 2013-06-23 2009-12-14 - - ADOJ report to the Senate Intelligence Committee describing the government's bulk collection program under Section 215. 2009 OIG Report on Bulk Collection - - [NotSnowden] 7 pdf
8 2013-06-20 2009-07-29 NSA FAA Minimization Exhibit B FISC document describing the NSA'sminimization procedures under Section 702 of FISA (the FISAAmendments Act). FAA Minimization Procedures Minimization Procedures used by NSA in Connection with Data Acquisitions Pursuant to 702 FISC July 29, 2009 FAA Minimization Procedures Minimization Exhibit B 9 pdf
7 2013-06-20 2009-07-29 NSA FAA Targeting Exhibit A FISC document describing the NSA's targeting procedures under Section 702 of FISA (the FISA Amendments Act). FAA Targeting Procedures Procedures Used by NSA for Targeting Non-US Persons Reasonably Believed to Be Outside the US to Acquire Foreign Intelligence Pursuant to 702 FISC July 29, 2009 FAA Targeting Procedures Minimization Exhibit A 9 pdf
6 2013-06-08 2012-07-13 NSA Boundless Informant NSA training slides describing the Boundless Informant tool and "mission capabilities from metadata records." NSA Boundless Informant Powerpoint Slides [8 S.] Boundless Informant Introduction Slides July 13, 2012 Boundless Informant slides [8 S.]
Describing Mission Capabilities from Metadata Records [4 S.]
Boundless Informant Slides 8
4
pdf
5 2013-06-08 2012-06-09 NSA Boundless Informant - FAQ An NSA "Work-in-Progress" factsheet describing the Boundless Informant dataminingtool. NSA Boundless Informant Frequently Asked Questions Boundless Informant Explanation/FAQ Slides September 6, 2012 Boundless Informant – Frequently Asked Questions Boundless Informant FAQ 3 pdf
4 2013-06-08 - NSA - - - PRISM/Upstream explanation slide - - 1 -
3 2013-06-07 - NSA Presidential Policy Directive (PPD-20) Presidential Policy Directive PPD-20 on US Cyber Operations Policy - - Presidential Policy Directive PPD-20 on US Cyber Operations Policy PRESIDENTIAL POLICY DIRECTIVE (PPD-20) 18 pdf
2 2013-06-06 2013-04-13 NSA PRISM Overview NSA training slides providing an introduction and overview of the PRISM program. PRISM Overview Powerpoint Slides [4 S.] PRISM Slides [4 S.]
PRISM (4.2013) [11 S.]
PRISM/US-984XN Overview [12 S.] PRISM [9 S.] 4 pdf
htm
1 2013-06-05 2013-04-25 - Verizon SECONDARY ORDER AFIS Corder approving the application of Section 215 for Verizon metadata collection. Section 215 - Secondary Order (Verizon) Verizon 215 Secondary Order April 25, 2013 Verizon FISA Court order Verizon 4 pdf

 Top


inlineTabelle Snowdens Deutschland-Akte

Snowdens Deutschland-Akte: Die Dokumente im PDF-Format (hier verlinkt)
Im Fundus von Edward Snowden finden sich zahlreiche Dokumente mit Deutschland-Bezug. SPIEGEL ONLINE veröffentlicht 53 Snowden Dokumente - als PDF zum Download

Nr Datum Doc
Datum
Org Doc Titel Inhalt Der Spiegel netzpolitik.org
(Server- https)
EFF S. Typ
- - - - - Dokumente über die Zusammenarbeit mit deutschen Diensten und Behörden - - - -
55 2014-06-18 - NSA
BfV
Weitergabe XKeyscore an BfV Dokumentausschnitt über die Weitergabe des NSA-Spähwerkzeugs XKeyscore an das Bundesamt für Verfassungsschutz (BfV)] Dokumentausschnitt über die Weitergabe des NSA-Spähwerkzeugs XKeyscore an das Bundesamt für Verfassungsschutz (BfV) Dokumentausschnitt Weitergabe XKeyscore an BfV Excerpt on the sharing of XKeyscore with German intelligence agency BfV 1 pdf
54 2014-06-18 2007-01-08 NSA
BND
BfV
Zusammenarbeit NSA - BND, BfV Geheimdokument zur Zusammenarbeit zwischen NSA, BND und Verfassungsschutz im Kampf gegen Terroristen Geheimdokument zur Zusammenarbeit zwischen NSA, BND und Verfassungsschutz im Kampf gegen Terroristen Zusammenarbeit NSA - BND, BfV Cooperation between the NSA, BND and BfV 4 pdf
53 2014-06-18 2007-01-08 NSA
BND
Plan Treffen NSA und BND Vorläufiger Ablaufplan eines Treffens zwischen hochrangigen Mitarbeitern von NSA und BND Vorläufiger Ablaufplan eines Treffens zwischen hochrangigen Mitarbeitern von NSA und BND Plan Treffen NSA und BND Preliminary agenda of a meeting between NSA and BND officials 3 pdf
52 2014-06-18 - NSA
BND
Briefing Besuch BND bei der NSA Briefing zum Besuch hochrangiger BND-Mitarbeiter bei der NSA Briefing zum Besuch hochrangiger BND-Mitarbeiter bei der NSA Briefing Besuch BND bei der NSA Briefing on the visit to the NSA of a high-ranking BND official 4 pdf
51 2014-05-22 2007-01-08 NSA
BND
Ablaufplan Treffen NSA und BND Endgültiger Ablaufplan eines Treffens zwischen hochrangigen Mitarbeitern von NSA und BND Endgültiger Ablaufplan eines Treffens zwischen hochrangigen Mitarbeitern von NSA und BND Ablaufplan Treffen NSA und BND Final agenda of a meeting between high-ranking NSA and BND officials 5 pdf
50 2014-06-18 2012-10-03
2013-03-07
BND Präsentation Aufbau BND Interne Präsentation über den Aufbau des BND Interne Präsentation über den Aufbau des BND Präsentation Aufbau BND Internal NSA presentation on the BND's organization 6 pdf
49 2014-06-18 2007-01-08 NSA
BND
BfV
NSA-Gesprächsleitfaden Zusammenarbeit BND und BfV Interner Gesprächsleitfaden der NSA zum Thema Zusammenarbeit mit BND und Verfassungsschutz Interner Gesprächsleitfaden der NSA zum Thema Zusammenarbeit mit BND und Verfassungsschutz NSA-Gesprächsleitfaden Zusammenarbeit BND und BfV Internal NSA discussion guidelines relating to cooperation with the BND and BfV 4 pdf
48 2014-06-18 2007-01-08 NSA
BND
NSA-Gesprächsleitfaden Treffens BND Interner Gesprächsleitfaden der NSA in Vorbereitung eines Treffens mit hochrangigen BND-Mitarbeitern Interner Gesprächsleitfaden der NSA in Vorbereitung eines Treffens mit hochrangigen BND-Mitarbeitern NSA-Gesprächsleitfaden Treffens BND Internal NSA discussion guidelines in preparation for a meeting with high-ranking BND officials 2 pdf
47 2014-06-18 2013-01-17 NSA
BND
Übersicht Zusammenarbeit NSA - BND Umfassende interne Übersicht über die Historie und den aktuellen Stand der Zusammenarbeit zwischen NSA und BND Umfassende interne Übersicht über die Historie und den aktuellen Stand der Zusammenarbeit zwischen NSA und BND Übersicht Zusammenarbeit NSA - BND History and current state of cooperation between the NSA and BND 4 pdf
46 2014-06-18 2013-01-17 NSA
BSI
BSI-Vize-Präsident Andreas Könen bei NSA Agenda des Besuchs von BSI-Vize-Präsident Andreas Könen bei der NSA Agenda des Besuchs von BSI-Vize-Präsident Andreas Könen bei der NSA BSI-Vize-Präsident Andreas Könen bei NSA Agenda for the visit of BSI Vice President Andreas Könen to the NSA 1 pdf
45 2014-06-18 - NSA
BND
NSA-BND-Kooperation Joint SIGINT Activity (JSA) Bericht über die NSA-BND-Kooperation Joint SIGINT Activity (JSA) Bericht über die NSA-BND-Kooperation Joint SIGINT Activity (JSA) NSA-BND-Kooperation Joint SIGINT Activity (JSA) Report on the NSA-BND cooperation known as Joint SIGINT Activity (JSA) 3 pdf
44 2014-06-18 - NSA
BND
JSA-Ausspähung afrikanischer Staaten Bericht über die Ausspähung afrikanischer Staaten durch die JSA Bericht über die Ausspähung afrikanischer Staaten durch die JSA JSA-Ausspähung afrikanischer Staaten Report on the surveillance of African countries by JSA 3 pdf
43 2014-06-18 - NSA
BND
JSA-Einschränkungen technische Aufklärung Einschränkungen für die im JSA durchgeführte technische Aufklärung Einschränkungen für die im JSA durchgeführte technische Aufklärung JSA-Einschränkungen technische Aufklärung Restrictions on the technical surveillance performed by JSA 4 pdf
42 2014-06-18 - NSA
BND
Zeitgeist-Banner Join SIGINT Activity Logo - Zeitgeist NSA-Adler mit Deutschlandflagge: Logo der Zusammenarbeit zwischen NSA und BND Zeitgeist-Banner Logo of NSA-BND cooperation 1 pdf
41 2014-06-18 - NSA
BND
Datentaustausch NSA - BND bei JSA Bericht über den Datentaustausch zwischen NSA und BND im Rahmen von JSA Bericht über den Datentaustausch zwischen NSA und BND im Rahmen von JSA Datentaustausch NSA - BND bei JSA Report on data exchange between the NSA and BND within the JSA framework 2 pdf
40 2014-06-18 2005-01-14 NSA/
CSS
Bericht NSA/CSS Europe, 40 tote Terrorverdächtige in Afrika Bericht über die Arbeit von NSA/CSS Europe, 40 gefangene oder getötete Terrorverdächtige Bericht über die Arbeit von NSA/CSS Europe, 40 gefangene oder getötete Terrorverdächtige Bericht NSA/CSS Europe, 40 tote Terrorverdächtige in Afrika NSA/CSS presentation on technical surveillance in Europe and Africa 2 pdf
39 2014-06-18 2006-10-31 NSA
BND
NSA bei BND Schöningen inkl. Datenweitergabe Bericht über einen Besuch der NSA beim BND-Standort Schöningen und Datenweitergabe vom BND an die NSA[1] Bericht über einen Besuch der NSA beim BND-Standort Schöningen und Datenweitergabe vom BND an die NSA NSA bei BND Schöningen inkl. Datenweitergabe Report on an NSA visit to BND site and on data transfer from the BND to the NSA 3 pdf
38 2014-06-18 2005-10-06 NSA
BND
Einjähriges NSA-Verbindungseinheit SUSLAG Mangfall-Kaserne/Bad Aibling Bericht über das einjährige Bestehen der NSA-Verbindungseinheit SUSLAG am neuen Standort in der Mangfall-Kaserne/Bad Aibling Bericht über das einjährige Bestehen der NSA-Verbindungseinheit SUSLAG am neuen Standort in der Mangfall-Kaserne/Bad Aibling Einjähriges NSA-Verbindungseinheit SUSLAG Mangfall-Kaserne/Bad Aibling Report on the one-year anniversary of the NSA liaison unit SUSLAG in Bad Aibling 3 pdf
37 2014-06-18 2005-02-16 NSA
BND
CSC
SUSLAG Klassifizierung Anleitung zur Klassifizierung von Details zu SUSLAG und NSA-BND-Kooperationen
inkl. FIFTYEXLAIM
Anleitung zur Klassifizierung von Details zu SUSLAG und NSA-BND-Kooperationen SUSLAG Klassifizierung Guidelines for the classification of SUSLAG details and the NSA-BND cooperation 6 pdf
- - - - - Dokumente über NSA-Standorte in Deutschland - - - -
36 2014-06-18 2004-06-04 NSA NSA Erinnerungen Bad Aibling Wehmütige, nostalgische Erinnerungen von ehemals in Bad Aibling stationierten NSA-Mitarbeitern aus dem NSA-Intranet Wehmütige, nostalgische Erinnerungen von ehemals in Bad Aibling stationierten NSA-Mitarbeitern aus dem NSA-Intranet NSA Erinnerungen Bad Aibling Nostalgic recollections from NSA workers formerly stationed in Bad Aibling 2 pdf
35 2014-06-18 2004-03-29 NSA Bericht Anfänge ESC im Dagger Complex Bericht über die Anfänge des European Security Center (ESC) im Dagger Complex Bericht über die Anfänge des European Security Center (ESC) im Dagger Complex Bericht Anfänge ESC im Dagger Complex Report on the beginnings of the European Security Center (ESC) in the Dagger Complex 2 pdf
34 2014-06-18 2006-11-09 NSA Umbenennung ESC in European Security Operations Center (ESOC) Bericht über die Umbenennung des ESC in European Security Operations Center (ESOC) Bericht über die Umbenennung des ESC in European Security Operations Center (ESOC) Umbenennung ESC in European Security Operations Center (ESOC) Report on the changing of the ESC’s name to European Security Operations Center (ESOC) 3 pdf
33 2014-06-18 2007-05-12 NSA ESOC: Erfahrungsbericht NSA ESOC: Erfahrungsbericht eines NSA-Mitarbeiters ESOC: Erfahrungsbericht eines NSA-Mitarbeiters ESOC: Erfahrungsbericht NSA ESOC- Report on the experiences of one NSA worker 3 pdf
32 2014-06-18 2011-06-10
2011-06-13
NSA/
CSS
Umbenennung des ESOC in European Cryptologic Center (ECC) inkl. "Missionen" Bericht über Umbenennung des ESOC in European Cryptologic Center (ECC) samt Details zu den von dort ausgeführten "Missionen" Bericht über Umbenennung des ESOC in European Cryptologic Center (ECC) samt Details zu den von dort ausgeführten "Missionen" Umbenennung des ESOC in European Cryptologic Center (ECC) inkl. "Missionen" Report on the changing of the ESOC’s name to European Cryptologic Center (ECC) 2 pdf
31 2014-06-18 2003-09-16 NSA ETC: Erfahrungsbericht NSA-Mitarbeiter European Technical Center: Erfahrungsbericht eines NSA-Mitarbeiters European Technical Center: Erfahrungsbericht eines NSA-Mitarbeiters ETC: Erfahrungsbericht NSA-Mitarbeiter [] 3 pdf
30 2014-06-18 2006-03-15 NSA Blindgänger-Alarm European Technical Center Bericht über einen Blindgänger-Alarm beim European Technical Center in Wiesbaden Mainz-Kastel Bericht über einen Blindgänger-Alarm beim European Technical Center in Wiesbaden Mainz-Kastel Blindgänger-Alarm European Technical Center Report on an unexploded ordnance alarm at European Technical Centern 2 pdf
29 2014-06-18 2011-10-20 NSA Bericht technischer Ausbau European Technical Center Bericht über den technischen Ausbau des European Technical Center in Wiesbaden Mainz-Kastel Bericht über den technischen Ausbau des European Technical Center in Wiesbaden Mainz-Kastel Bericht technischer Ausbau European Technical Center Report on the technical expansion of the European Technical Center in Wiesbaden 3 pdf
28 2014-06-18 2006-01-02 NSA/
CSS
NSA/CSS Europe: Erfahrungsbericht NSA/CSS Europe: Erfahrungsbericht eines NSA-Mitarbeiters NSA/CSS Europe: Erfahrungsbericht eines NSA-Mitarbeiters NSA/CSS Europe: Erfahrungsbericht NSA/CSS Europe- Report on the experiences of one NSA worker 3 pdf
27 2014-06-18 - NSA Cryptologic Services Groups Folie: Weltweite Standorte der Cryptologic Services Groups Folie: Weltweite Standorte der Cryptologic Services Groups Weltweite Standorte der Cryptologic Services Groups Worldwide locations of the Cryptologic Services Groups 1 pdf
26 2014-06-18 - NSA/
CSS
Satelliten-Überwachung NSA/CSS Folie: Weltweite Standorte der Satelliten-Überwachung der NSA/CSS Folie: Weltweite Standorte der Satelliten-Überwachung der NSA/CSS Satelliten-Überwachung NSA/CSS Worldwide locations of NSA/CSS satellite surveillance 1 pdf
25 2014-06-18 - NSA NSA-Personal Deutschland US-Stützpunkte mit NSA-Personal in Deutschland US-Stützpunkte mit NSA-Personal in Deutschland NSA-Personal Deutschland US sites with NSA personnel in Germany 1 pdf
- - - - - Dokumente über Programme und Arbeitsweisen der NSA - - - -
24 2014-06-18 2009-05-21 NSA Nymrod: Merkel in der Datenbank Merkel in der Datenbank: Präsentation des Center for Content Extraction Merkel in der Datenbank: Präsentation des Center for Content Extraction Nymrod: Merkel in der Datenbank Presentation from the Center for Content Extraction 8 pdf
23 2014-06-18 2013-01-17 NSA
BND
BfV
BSI
Zusammenarbeit zwischen NSA und BND Umfassende interne Übersicht über die Historie und den aktuellen Stand der Zusammenarbeit zwischen NSA und BND Umfassende interne Übersicht über die Historie und den aktuellen Stand der Zusammenarbeit zwischen NSA und BND Zusammenarbeit zwischen NSA und BND History and current state of cooperation between the NSA and BND 4 pdf
22 2014-06-18 2012-06-09 NSA Boundless Informant - FAQ Fragen und Antworten (FAQ) zum Programm BOUNDLESS INFORMANT
Boundless Informant (Übersicht)
Boundless Informant FAQ 1; Boundless Informant FAQ 2, Boundless Informant FAQ 3
Fragen und Antworten (FAQ) zum Programm BOUNDLESS INFORMANT
(Veröffentlicht siehe Leak DocListe Nr.5)
BOUNDLESS INFORMANT FAQ FAQs on the Boundless Informant program 3 pdf
21 2014-06-18 - NSA BOUNDLESS INFORMANT Deutschland BOUNDLESS INFORMANT-Statistik für Deutschland BOUNDLESS INFORMANT-Statistik für Deutschland BOUNDLESS INFORMANT Deutschland Boundless Informant statistics on Germany 1 pdf
20 2014-06-18 - NSA BOUNDLESS INFORMANT Großbritannien BOUNDLESS INFORMANT-Statistik für Großbritannien BOUNDLESS INFORMANT-Statistik für Großbritannien BOUNDLESS INFORMANT Großbritannien Boundless Informant statistics on the UK 1 pdf
19 2014-06-18 - NSA BOUNDLESS INFORMANT-Übersicht BOUNDLESS INFORMANT-Übersicht (global) BOUNDLESS INFORMANT-Übersicht (global) BOUNDLESS INFORMANT-Übersicht Boundless Informant overview (global) 1 pdf
18 2014-06-18 - NSA BOUNDLESS INFORMANT
3rd Partys
BOUNDLESS INFORMANT-Statistik für die sogenannten 3rd Partys (zu denen auch Deutschland zählt) BOUNDLESS INFORMANT-Statistik für die sogenannten 3rd Partys (zu denen auch Deutschland zählt) BOUNDLESS INFORMANT 3rd Partys Boundless Informant statistics for so-called Third Parties 1 pdf
17 2014-06-18 - NSA BOUNDLESS INFORMANT "Foreign Partners" BOUNDLESS INFORMANT-Statistik zu Daten von "Foreign Partners" BOUNDLESS INFORMANT-Statistik zu Daten von "Foreign Partners" BOUNDLESS INFORMANT "Foreign Partners" Boundless Informant statistics on data from "Foreign Partners" 1 pdf
16 2014-06-18 - NSA BOUNDLESS INFORMANT Übersicht Weltkarte Übersicht über den Einsatz des Programms BOUNDLESS INFORMANT / Weltkarte Übersicht über den Einsatz des Programms BOUNDLESS INFORMANT / Weltkarte BOUNDLESS INFORMANT Übersicht Weltkarte Overview of the use of Boundless Informant (world map) 1 pdf
15 2014-06-18 - NSA BOUNDLESS INFORMANT Weltkarte Weltkarte aus dem Programm BOUNDLESS INFORMANT Weltkarte aus dem Programm BOUNDLESS INFORMANT BOUNDLESS INFORMANT Weltkarte World map from the Boundless Informant program 1 pdf
14 2014-06-18 - NSA BOUNDLESS INFORMANT Projektnamen Zoom in ein Dokument zu BOUNDLESS INFORMANT mit Projektnamen Zoom in ein Dokument zu BOUNDLESS INFORMANT mit Projektnamen BOUNDLESS INFORMANT Projektnamen Zoom of a Boundless Informant document, with project names 1 pdf
13 2014-06-18 2012-04-13 NSA XKeyscore-Training Dagger Complex Bericht über ein XKeyscore-Training im ECC / Dagger Complex Bericht über ein XKeyscore-Training im ECC / Dagger Complex XKeyscore-Training Dagger Complex Report on an XKeyscore training session at the ECC / Dagger Complex 4 pdf
12 2014-06-18 2011-06 bis 2012-05
2013-01-30
NSA PRISM mit ECC Präsentation über das Spähprogramm PRISM und die Beteiligung des ECC Präsentation über das Spähprogramm PRISM und die Beteiligung des ECC PRISM mit ECC Presentation on PRISM and ECC's participation 3 pdf
11 2014-06-18 - NSA/
CSS
NSA/CSS Überwachung Europa+Afrika NSA/CSS-Präsentation über technische Überwachung in Europa und Afrika NSA/CSS-Präsentation über technische Überwachung in Europa und Afrika NSA/CSS Überwachung Europa+Afrika NSA/CSS presentation on technical surveillance in Europe and Africa 13 pdf
10 2014-06-18 2010-10-25 NSA NSA-Lehrgang SIGINT Seniors Europe (SSEUR) Partners Bericht über einen NSA-Lehrgang über geheime Datenerlangung für befreundete Staaten
First-Ever Formal SIGINT Development (SIGDEV)
Training Is Provided to SIGINT Seniors Europe (SSEUR) Partners
Bericht über einen NSA-Lehrgang über geheime Datenerlangung für befreundete Staaten NSA-Lehrgang SIGINT Seniors Europe (SSEUR) Partners Report on an NSA SIGDEV training course for allied countries 2 pdf
9 2014-06-18 2012-09-19 GCHQ
NSA
NSA-Zugriff TEMPORA Bericht über den NSA-Zugriff auf TEMPORA Bericht über den NSA-Zugriff auf TEMPORA NSA-Zugriff auf TEMPORA
"The World largest XKeyScore"
Report on the NSA’s access to TEMPORA 4 pdf
8 2014-06-18 2012-04-25 NSA Klassifizierungsanleitung NSA (1945-1967) Anleitung zur Klassifizierung von SIGINT-Details der NSA (1945-1967) Anleitung zur Klassifizierung von SIGINT-Details der NSA (1945-1967) Klassifizierungsanleitung NSA (1945-1967) Stand:25.04.2012 Guidelines for the classification of NSA SIGINT details (1945-1967) - pdf
7 2014-06-18 2008-06-11 NSA Erklärung Nymrod Namenssuche Erklärung zu Nymrod, einem System zur Namenssuche Erklärung zu Nymrod, einem System zur Namenssuche Erklärung Nymrod Namenssuche Explanation of Nymrod, a system for searching for people and places in databases and documents 1 pdf
6 2014-06-18 - NSA Arbeitsweise von Nymrod NSA-Präsentation zur Arbeitsweise von Nymrod NSA-Präsentation zur Arbeitsweise von Nymrod Arbeitsweise von Nymrod NSA presentation on Nymrod 3 pdf
5 2014-06-18 2011-03- NSA Präsentation NSA/CIA-Einheit SCS Präsentation der in US-Botschaften weltweit agierenden NSA/CIA-Einheit "Special Collection Service" (SCS) Präsentation der in US-Botschaften weltweit agierenden NSA/CIA-Einheit "Special Collection Service" (SCS) Präsentation NSA/CIA-Einheit SCS Presentation on the NSA/CIA unit Special Collection Service 12 pdf
4 2014-06-18 2014-06- GCHQ GCHQ Technik TEMPORA GCHQ-Bericht über die technischen Fähigkeiten des mächtigen Spähprogramms TEMPORA, das den "Full take" erlaubt GCHQ-Bericht über die technischen Fähigkeiten des mächtigen Spähprogramms TEMPORA, das den "Full take" erlaubt GCHQ Technik TEMPORA GCHQ report on the technical abilities of TEMPORA 1 pdf
3 2014-06-18 2013-03-14 NSA/
SSO

BND
WHARPDRIVE-Zwischenfall Bericht über WHARPDRIVE-Zwischenfall in einer SSO-Präsentation Bericht über WHARPDRIVE-Zwischenfall in einer SSO-Präsentation Bericht WHARPDRIVE-Zwischenfall SSO-Präsentation Report on a WHARPDRIVE incident in an SSO presentation 2 pdf
2 2014-06-18 - NSA
GCHQ
Details XKeyscore GCHQ-Website Details zu XKeyscore auf einer internen GCHQ-Website Details zu XKeyscore auf einer internen GCHQ-Website Details XKeyscore GCHQ-Website Details on XKeyscore from an internal GCHQ website 1 pdf
1 2014-06-18 - NSA SIGAD Listing SIGAD Listing SIGAD Listing - - 9 pdf


 Top

inlineTabelle Greenwald - No Place To Hide - Links

Nr Datum DocDatum Org Doc Titel Inhalt - EFF - Cryptome Seite Typ
12 2014-06-21 2014-05-13 - No Place To Hide Penguin Glenn Greenwald - No Place To Hide
Das Buch - Gesamt als Penguin Book - wikileaks.com.br
- - - - 966 pdf
11 2014-05-22 2014-05-13 - No Place To Hide Torrent Glenn Greenwald - No Place To Hide
Das Buch - Gesamt als Torrent
oder auch als E-Book (epub, mobi) - thepiratebay.se
- - - - -
10 2014-05-22 2014-05-13 - No Place To Hide Download Glenn Greenwald - No Place To Hide
Das Buch - Gesamt als Download
(Komplett - gepackt als 7z-File) Alternativ als PDF
- - - No Place to Hide (27MB) 310 pdf
9 2014-05-22 2014-05-13 - No Place To Hide
Intro, Parts 1-5, Epilogue,
Glenn Greenwald - No Place To Hide
Intro, Parts 1-5, Epilogue (Komplett - Compressed 7z-File)
- - - No Place to Hide Intro Parts 1-5 Epilogue 310 pdf
8 2014-05-22 2014-05-13 - No Place To Hide
Ten Days in Hong Kong
Glenn Greenwald - No Place To Hide
10 Tage in Hong Kong
- - - No Place to Hide Part 2 Ten Days in Hong Kong 37 pdf
7 2014-05-22 2014-05-13 - No Place To Hide
The Harm of Surveillance
Glenn Greenwald - No Place To Hide
Der Nachteil der Überwachung
- - - No Place to Hide Part 4 The Harm of Surveillance 24 pdf
6 2014-05-22 2014-05-13 - No Place To Hide
The 4th Estate Epilogue
Glenn Greenwald - No Place To Hide
Der 4. Staat, Nachwort
- - - No Place to Hide Part 5 The 4th Estate Epilogue 28 pdf
5 2014-05-21 2014-05-13 - No Place To Hide
Introduction Contact
Glenn Greenwald - No Place To Hide
Einleitung, Kontakt
- - - No Place to Hide Introduction Part 1 Contact 22 pdf
4 2014-05-20 2014-05-13 - No Place To Hide
Collect It All
Glenn Greenwald - No Place To Hide
Collect It All
- - - No Place to Hide Part 3 Collect It All 44 pdf
3 2014-05-19 2014-05-13 - No Place To Hide
12 Various Pages
Glenn Greenwald - No Place To Hide
12 Various Pages
- - - 12 Various Pages 12 pdf
2 2014-05-16 2014-05-13 - No Place To Hide
Folienübersicht
Glenn Greenwald - No Place To Hide
Übersicht veröffentlicht Folien / bislang unbekannte Folien
- - - No Place to Hide Documents Compared to Previous 47 pdf
1 2014-05-13 2014-05-13 - No Place To Hide
Documents
Glenn Greenwald - No Place To Hide
Documents
(Uncompressed) Documents (Compressed)
No Place To Hide - Index
No Place To Hide - Notes
- 20140513-Greenwald-NoPlaceToHideDocuments - - 108 pdf
0 2014-05-13 2014-05-13 - No Place To Hide
(Website)
Glenn Greenwald - No Place To Hide
Edward Snowden, the NSA, and the U.S. Surveillance State
- - - - - Html

 Top

Einzelnachweise

Dropzone


. Top