NSA Leak Dokumente Liste

Aus Piratenwiki
Wechseln zu: Navigation, Suche

inlineSnowden-Dokumente (Links) (201 - 300)

Stand: 14.10.2014 Update
Nr Datum Doc
Datum
Org Doc Titel Inhalt ACLU EFF FreeSnoden Cryptome S. Typ
- - - - - - A - - - - pdf
278 - - - - - A - - - - pdf
277 - - - - - A - - - - pdf
276 - - - - - A - - - - pdf
275 - - - - - A - - - - pdf
274 - - - - - A - - - - pdf
273 2014-10-10 - NSA/CSS National Initiative Task Security Framework Core Secrets - A Computer Network Exploitation Classification Guide CNO Core Secrets CNO Core Secrets NSA National Initiative Task Security 1 7 pdf
Hinweis = Software Update 2014-10-13
272 2014-10-10 - NSA/CSS Computer Network Exploitation (CNE) Classification Guide - A Computer Network Exploitation Classification Guide Computer Network Exploitation (CNE) Classification Guide NSA Computer Network Exploitation Declass 8 pdf
Hinweis = Software Update 2014-10-13
271 2014-10-10 - NSA/CSS Sentry Eagle Framework Die National Security Agency hat Agenten in China (Beijing), Deutschland und Südkorea die an Programmen, die mit "physischen Zersetzung" zum infiltrieren und kompromitieren von Netze und Geräte arbeiten. A CNO Core Secrets Security Structure Sentry Eagle National Initiative – Security Framework NSA Sentry Eagle 2 3 pdf
Hinweis = Software Update 2014-10-13
270 2014-10-10 - NSA/CSS National Initiative Task Security Framework Die National Security Agency hat Agenten in China (Beijing), Deutschland und Südkorea die an Programmen, die mit "physischen Zersetzung" zum infiltrieren und kompromitieren von Netze und Geräte arbeiten. A CNO Core Secrets Slide Slices NSA/CSS and JFCC-NW National Initiative Task – Security Framework NSA National Initiative Task Security 2 10 pdf
Hinweis = Software Update 2014-10-13
269 2014-10-10 - NSA/CSS Exceptionally Controlled Information (ECI) Compartments - A ECI Compartments Exceptionally Controlled Information (ECI) Compartments NSA Exceptionally Controlled Info Compartments 4 pdf
Hinweis = Software Update 2014-10-13
268 2014-10-10 - NSA/CSS Classification Guide for ECI PAWLEYS (PAW) - A ECI Pawleys Classification Guide Classification guide for ECI Pawleys (PAW) NSA Exceptionally Controlled Info Pawleys 4 pdf
Hinweis = Software Update 2014-10-13
267 2014-10-10 - NSA/CSS Classification Guide for ECI WHIPGENIE - A ECI WHIPGENIE Classification Guide Classification guide for ECI Whipgenie NSA Whipgenie Classification Guide 7 pdf
Hinweis = Software Update 2014-10-13
266 2014-10-10 - NSA/CSS Exceptionally Controlled Information (ECI) - A Exceptionally Controlled Information Listing Exceptionally Controlled Information (ECI) as of 12 September 2003 NSA Exceptionally Controlled Information 6 pdf
Hinweis = Software Update 2014-10-13
265 2014-10-10 - NSA/CSS Classification Guide for TAREX - A TAREX Classification Guide Classification guide for the NSA/CSS Target Exploitation (TAREX) program NSA Tarex Classification Guide 7 pdf
Hinweis = Software Update 2014-10-13
264 2014-10-10 - NSA/CSS Sentry Eagle Program - A Sentry Eagle Brief Sheet National Initiative Protection Program – Sentry Eagle NSA Sentry Eagle 1 13 pdf
Hinweis = Software Update 2014-10-13
263 2014-09-22 - DIA Legal Workshop Fundamentals Targeting Rechtauslegung im Sinne der NSA DoD HUMINT Legal Workshop Fundamentals of HUMINT Targeting - - - 10 pdf
262 2014-09-22 - DIA Legal Requirements Operations Rechtauslegung im Sinne der NSA Legal Requirements for HUMINT Operations - - - 9 pdf
261 2014-09-22 2004-08-xx DIA Intelligence Law Handbook Handbuch zum Nachrichtendienste-Recht, Verteidigung von HUMINT Service Intelligence Law Handbook: Defense HUMINT Service - - - 132 pdf
260 2014-09-22 2013-11-xx DIA Intelligence Oversight Rechtauslegung im Sinne der NSA Intelligence Oversight - - - 20 pdf
259 2014-09-29 2007-01-08 NSA Overview of Signals Intelligence Authorities - Overview of Signals Intelligence Authorities (2007-01-08) - - - 18 pdf
258 2014-09-22 2014-06-19 NSA Legal Fact Sheet: Executive Order 12.333 - Legal Fact Sheet: Executive Order 12,333 - - - 4 pdf
257 2014-09-15 - NSA Key Activities In Progress - A Key Activities In Progress - - 1 pdf
256 2014-09-15 - NSA Speargun Phase One - A Speargun Phase One - - 1 pdf
255 2014-09-15 - NSA Speargun Underway - A Speargun Underway - - 1 pdf
254 2014-09-15 2013-03-22 NSA Ferguson Visit Precis - A Ferguson Visit Precis Visit Precis: Ambassador Roy Ferguson NSA Visit by NZ Spy Ferguson 2 pdf
253 2014-09-14 2011-01-11 NSA Treasure Map New Release - A Treasure Map Announces a New Release SIDToday – TREASUREMAP Announces a New Release NSA Treasure Map New Release 4 pdf
252 2014-09-14 2010-01-19 NSA Treasure Map Treasure Map soll die NSA in die Lage versetzen, die Netze von Internet-Anbietern (ISPs) auf der ganzen Welt zu überblicken / kartografieren, um einen möglichst vollständigen Überblick zum gesamten Datenverkehr und sämtlichen in allen Netzen angeschlossenen Geräten zu erhalten. A Treasure Map Presentation Bad guys are everywhere, good guys are somewhere! NSA Treasure Map (17.1MB) 38 pdf
251 2014-09-14 - GCHQ
NSA
STELLAR NSA Zugang zu STELLAR-Satelitennetzen A Satellite Teleport Knowledge Satellite Transport Knowledge GCHQ Satellite Teleport Knowledge STELLAR (3.6MB) 26 pdf
250 2014-09-05 - - Masterspy Quadrennial Report 2009 - A Quadrennial Intelligence Community Review Final Report Quadrennial Intelligence Community Review Final Report, April 2009 Masterspy Quadrennial Report 2009 32 pdf
249 2014-08-31 - GCHQ
NSA
Spy Turkey - A - - NSA-GCHQ Spy Turkey 34 pdf
248 2014-08-31 - GCHQ Kurdistan Regional Government - A Kurdistan Regional Government - Kurdistan Regional Government 3 pdf
247 2014-08-31 2008-10-29
2009-03-02
GCHQ Turkey Energy Company Development - A Turkey Energy Company Development Turkish Energy Company Development MHS/GCHQ Projects - Turkey Energy Company Development 1 pdf
246 2014-08-31 2009-09-(2-5) GCHQ Turkey at the G20 Pre-Meeting in London - A Turkey at the G20 Pre-Meeting Turkey at the G20 Pre-Meeting in London, September 2-5, 2009 Turkey at the G20 Pre-Meeting in London September 2-5 2009 2 pdf
245 2014-08-31 2008-10-15 GCHQ Load Sharing Carriers R.O.W. (via UK) in IRAQ plus RLEs - A Iraq UK Load Sharing Carriers - Load Sharing Carriers R.O.W. (via UK) in IRAQ plus RLEs 2 pdf
244 2014-08-31 2008-01-12 GCHQ JORDAN-BELGIUM - A Jordan Belgium - JORDAN-BELGIUM 6 pdf
243 2014-08-31 2003-06-10 NSA SINIO Series of Strategic Intelligence Issue Seminars Begins with Tough Times for Turkey - A SINIO Seminar Tough Times for Turkey - SINIO Series of Strategic Intelligence Issue Seminars Begins with Tough Times for Turkey 2 pdf
242 2014-08-31 2013-04-30 NSA Agenda May 2013: Brigadier general - Turkish Signal Intelligence Chief - A Turkish Signal Intelligence Chief Agenda - Agenda 14-15 May 2013: Brigadier general - Turkish Signal Intelligence Chief 2 pdf
241 2014-08-31 2005-10-07 NSA NSAs Oldest Third Party Partnership - A NSAs Oldest Third Party Partnership NSA’s Oldest Third Party SIGINT Partnership NSAs Oldest Third Party Partnership 2 pdf
240 2014-08-31 2013-04-15 NSA NSA Intelligence Relationship with Turkey - Turkish National Intelligence Organization (MIT) and the Turkish Intelligence Directorate (SIB) - A NSA Intelligence Relationship with Turkey - NSA Intelligence Relationship with Turkey: Turkish National Intelligence Organization (MIT) and the Turkish Intelligence Directorate (SIB) 4 pdf
239 2014-08-31 2007-08-13 NSA SINIO Seminar Turkish Presidential and Parliamentary Elections - A SINIO Seminar Turkish Elections - SINIO Seminar: Turkish Presidential and Parliamentary Elections 2 pdf
238 2014-08-31 2006-08-30 NSA NCRs with Foreign Relations Missions Become 'SUSLAs' - A NCRs with Foreign Relations Missions Become SUSLAs - NCRs with Foreign Relations Missions Become 'SUSLAs' 2 pdf
237 2014-08-31 2005-12-20 NSA Turkey and the PKK - A Turkey and the PKK Turkey and the PKK Turkey and the PKK 3 pdf
236 2014-08-31 2006-11-13 NSA Collaboration in Overdrive A CNE Success - A Collaboration in Overdrive - Collaboration in Overdrive: A CNE Success 2 pdf
235 2014-08-31 2006-05-18 NSA SINIO Seminar Turkey and the Kurds - A SINIO Seminar Turkey and the Kurds - SINIO Seminar: Turkey and the Kurds 1 pdf
234 2014-08-25 - NSA - - A ICREACH Black Budget Extract ICREACH in the Black Budget - 2 pdf
233 2014-08-25 2006-02-22 NSA - - A CRISSCROSS/PROTON Point Paper CRISSCROSS/PROTON - 4 pdf
232 2014-08-25 - NSA ICREACH Metadata Memorandum - A Metadata Sharing Memorandum Sharing of MetaData across the IC —- Dissemination of SIGINT Metadata Beyond NSA - 4 pdf
231 2014-08-25 - NSA ICREACH Decision Memorandum - A DNI Decision Memorandum on ICREACH Sharing Communications Data Across the Intelligence Community – Decision Memorandum - 3 pdf
230 2014-08-25 - NSA ICREACH Intelligence Community - A ICREACH Wholesale Sharing Intelligence Community (IC) Reach Team - 1 pdf
229 2014-08-25 2007-05-15 NSA ICREACH Die US-amerikanischen National Security Agency (NSA) baute eine Suchmaschine um nationalen und internationalen Regierungsbehörden Zugang zu Informationen von Milliarden Kommunikationsdaten zu geben. A Sharing Communications Metadata Across the U.S. Intelligence Community - ICREACH Sharing Communications Metadata Across the US Intelligence Community - 36 pdf
228 2014-08-25 - CIA
NSA
- - A CIA Colleagues Enthusiastically Welcome NSA Training CIA Colleagues Enthusiastically Welcome NSA Training - - pdf
227 2014-08-16 - CSEC
GCHQ
NSA
HACIENDA
Internet Colonization
- A HACIENDA Program The Hacking Process, What is HACIENDA, MUGSHOT, LANDMARK
(html)
NSA GCHQ CESC HACIENDA Internet Colonization 26 pdf
html
226 2014-08-12 2010-06-28 GCHQ Covert Mobile Phones Policy - A GCHQ Covert Mobile Phones Policy OPA~TAS Covert Mobile Phones Policy GCHQ Covert Mobile Phones Policy 6 pdf
225 2014-08-05 2013-03-07 NCTC NCTC Directorate of Terrorist Identities - A Directorate of Terrorist Identities (DTI) Strategic Accomplishments 2013 - NCTC Directorate of Terrorist Identities 12 pdf
224 2014-08-04 1999-07-15 - Israel-US Spying Pact 1999 - A Israel-US 1999 Agreement - Israel-US Spying Pact 1999 16 pdf
223 2014-08-04 2013-04-19 NSA Israel-US Spying Pact 2013 - A NSA Intelligence Relationship With Israel - Israel-US Spying Pact 2013 3 pdf
222 2014-07-25 2013-04-08 NSA Saudi Arabia Information Letter - A Saudi Arabia Information Paper NSA Intelligence Relationship with Saudi Arabia NSA Saudi Arabia Information Letter 4 pdf
221 2014-07-25 - - - - A March 2013 Watchlisting Guidance Signals Intelligence Authority Decision Tree SIGINT Authority decision tree - - pdf
220 2014-07-22 - - SSO Corporate Partner Access - Special Source Operations (Corporate Partners) - - - 8 pdf
219 2014-07-14 2012-07-05 GCHQ JTRIG Tools and Techniques - A GCHQ’s Joint Threat Research Intelligence Group Jtrigall NSA JTRIG Tools and Techniques 8 pdf
218 2014-07-12 2014-07-08 NSA Review Group Charter - A [] - NSA Review Group Charter 4 pdf
217 2014-07-09 2005-07-05 NSA Spying on Muslim-American Leaders - A Spying on Muslim-American Leaders Ordinary Web-users far outnumber foreign targets [2 S.] NSA Emails Spy
[1 S.]
8 pdf
216 2014-06-24 - NSA Analytics for Targets in Europe - A Analytics for Targets in Europe - - 1 pdf
215 2014-06-24 - NSA Xkeyscore Fingerprints - A - Xkeyscore Fingerprints - 1 pdf
214 2014-06-23 - NSA NSA Der Spiegel Release on German SIGADs - A - - NSA Der Spiegel Release on German SIGADs 9 pdf
213 2014-06-22 - NSA - Keith Alexander's talking points
Black Budget
RAMPART-A Project Overview
Special Source Operations
Special Source Operation extra slides
A Affidavit of Keith Alexander Regarding Spying on Foreign Entities
[4 S.]
- NSA Information-The Intercept Releases 41 Pages 41 pdf
212 2014-06-19 - NSA NSA Partners - - - - NSA Partners 20 pdf
211 2014-06-18 2013-06-06
bis
2013-06-06
NSA Keith Alexander Talking Points - - Keith Alexander Talking Points
Dagbladet - The Snowden files
- - 3 pdf
210 2014-06-18 - NSA Black Budget - - Black Budget
Dagbladet - The Snowden files
- - 4 pdf
209 2014-06-18 2010-10-01 NSA RAMPART-A Overview Die NSA schnorchelt mehr als 3 Terabit pro Sekunde von Glasfasern ab – und der BND macht mit - RAMPART-A Overview
Dagbladet - The Snowden files
- - 23 pdf
208 2014-06-18 - NSA Special Source Operations - - Special Source Operations
Dagbladet - The Snowden files
- - 8 pdf
207 2014-06-18 - BfV
BND
NSA
NSA German Spying 2 Snowdens Deutschland-Akte
Die Dokumente im PDF-Format
Im Fundus von Edward Snowden finden sich zahlreiche Dokumente mit Deutschland-Bezug.
SPIEGEL ONLINE veröffentlicht 53 Snowden Dokumente (200 Seiten)
Abkürzungen erklärt:
So lesen Sie die NSA-Dokumente (Glossar) - www.spiegel.de
- - - Der Spiegel Releases 200 pp of Snowden Docs 200 pdf
206 2014-06-16 - BfV
BND
NSA
NSA German Spying Mein Nachbar NSA
Der Spiegel vom 16.06.2014

mit den Artikeln:
Partner und Gegner zugleich
Snowdens Deutschland-Akte
Amerikas Brückenkopf
Eifer und Gier
- Analytics for targets in Europe
Xkeyscore Fingerprints
- NSA German Spying
NSA in "Der Spiegel" (16.06.2014) (de)
4 pdf
205 2014-06-10 - NSA
DEA
SANDKEY - - SANDKEY - DEA-NSA SANDKEY Voice Intercepts FVEY 4 pdf
204 2014-06-01 - NSA Identity Spying - - Identity Intelligence Identity Intelligence: Image is Everything NSA Identity Spying 4 pdf
203 2014-05-20 - NSA MYSTIC Identity - - Intercept-SSO Mystic Charts - NSA MYSTIC Identity 3 pdf
202 2014-05-19 - NSA Intercept Black Budget - A Intercept Black Budget - - 1 pdf
201 2014-05-19 - NSA DEA Warfighter - - DEA Warfighter DEA – the “Other” Warfighter - 2 pdf

 Top



inlineTabelle Links (101 - 200)

Nr Datum DocDatum Org Doc Titel Inhalt ACLU EFF FreeSnoden Cryptome Seite Typ
200 2014-05-19 - NSA Intercept Mystic - - Intercept Mystic MYSTIC fact sheet - 1 pdf
199 2014-05-19 - NSA Somalget - - Somalget Somalget - 2 pdf
198 2014-05-19 - NSA SSO Dictionary Excerpt - - SSO Dictionary Excerpt SSO Dictionary - 1 pdf
197 2014-05-19 - NSA MYSTIC Charts - - Intercept-SSO Mystic Charts - - 5 pdf
196 2014-05-13 2013-08-03 NSA PRISM Microsoft Skydrive Collection NSA-Memo verkündet nach Monaten der Verhandlungen zwischen dem FBI und Microsoft eine Allianz mit Microsoft für den Zugriff auf Skydrive Daten ohne besondere Genehmigung. SkyDrive ist ein Cloud-Service der von über 250 Millionen Menschen weltweit verwendet wird, um Dateien online zu speichern und dann von anderen Geräten aus zuzugreifen. PRISM: Microsoft Skydrive Collection [-] [-] [-] 1 pdf
195 2014-05-13 2012-12-26 NSA Microsoft Releases New Service Nach Sorgen, dass Microsoft's neue Verschlüsselungspraktiken den Zugriff der NSA auf E-Mail-Chat-Daten verhindern würde, gibt diese NSA-Memo Einblick in neue Überwachungsmöglichkeiten die in Zusammenarbeit mit Microsoft entwickelt wurden, um die neuen Verschlüsselungen zu umgehen. Durch die Partnerschaft mit Microsoft, kann die NSA auf E-Mails, Text-basierte Chat-und Voice / Video und Dateiübertragungen zugreifen. Microsoft Releases New Service [-] [-] [-] 1 pdf
194 2014-05-03 - NSA Google Emails - Emails Between NSA Director Keith Alexander and Google executives Re: Mobility Threats and Security - - NSA Google Emails
Al Jazeera America
3 pdf
193 2014-05-03 - NSA SIGINT Enabling full - A - - Update:
NSA SIGINT Enabling Suggesting Redacted Pages
3 von 117 pdf
192 2014-05-03 - NSA IAT TOR full - A - - Update:
NSA IAT TOR Suggesting Redacted Pages
9 von 48 pdf
191 2014-05-03 - GCHQ Optic Nerve full - A - - Update:
GCHQ OPTIC NERVE Suggesting Redacted Pages
3 von 8 pdf
190 2014-05-03 - GCHQ G20 Spying full - A - - Update:
GCHQ G20 Spying Suggesting Redacted Pages
4 von 9 pdf
189 2014-04-30 - NSA GHOSTMACHINE with ECHOBASE - GHOSTMACHINE: Identifier Lead Triage with ECHOBASE Ghostmachine Identifier Lead Triage with ECHOBASE NSA GHOSTMACHINE with ECHOBASE 14 pdf
188 2014-04-30 - NSA
GCHQ
NSA Visit by GCHQ Lobban - Lobban NSA Visit Precis GCHQ Visit Visit Precis – Sir Iain Lobban NSA Visit by GCHQ Lobban 4 pdf
187 2014-04-30 - NSA NSA PRISM with Olympics Option - PRISM Operations Highlight: Olympics Support - GCHQ Using PRISM Access Prism Olympics PRISM Operations Highlight: Olympics Support – GCHQ Using PRISM Access NSA PRISM with Olympics Option 1 pdf
186 2014-04-27 2013-04-17 NSA
NIS
Dagbladet Doc Decensored - - - - NSA Dagbladet Doc Decensored 1 pdf
185 2014-04-05 - GCHQ Full Spectrum Cyber Effects - Full-Spectrum Cyber Effects GCHQ Full Spectrum Cyber Effects Full Spectrum Cyber Effects GCHQ Full Spectrum Cyber 19 pdf
184 2014-04-05 2009-08-14 NSA 5-Eyes 2009 SIGDEV Conference - 2009 SigDev Conference 2009 SIGDEV Conference 2009 SIGDEV Conference: ‘Best Yet and Continuing to Improve’ NSA 5-Eyes SIGDEV Conference 2 pdf
183 2014-03-29
2014-03-31
- NSA Nymrod: Merkel Überwachunsberichte Überwachung
Nr. 9; Angela Merkel; German Chancellor; COS; > 300!
(Stückzahl Größer 300 Berichte)
(U) Court Orders
Machine vs. Manual Chief-of-State Citations
GCHQ and NSA Spy on Heads of State [1 S.] 2013 FISA Court order authorised spying on communications related to “Germany”
Court Orders
Machine vs. Manual Chief-Of-State Citations
Machine vs. Manual Chief-of-State Citations
Update:Ganze Liste
2 pdf
182 2014-03-25 - NSA 21th Century SID Culture - - - - NSA SID Culture 7 pdf
181 2014-03-22 - NSA Huawei SHOTGIANT Hardware Exploit - - Operation Shotgiant Objectives - NSA Huawei SHOTGIANT Hardware Exploit Part 2 2 pdf
180 2014-03-22 - NSA Huawei SHOTGIANT - Huawei Powerpoint Slides - Operation Shotgiant Objectives NSA Huawei SHOTGIANT Hardware Exploit Part 1 2 pdf
179 2014-03-21 - CSEC CSEC SNOWGLOBE - - French Intelligence E-Mail Spying Operation - CSEC SNOWGLOBE 7 pdf
178 2014-03-20 - NSA I Hunt Sys Admins - - Targeting System Administrator Accounts to Access Networks I Hunt Sys Admins NSA Hunt Sysadmins 6 pdf
177 2014-03-18 - NSA Adding Country to Mystic - Adding a Country to MYSTIC Efforts Mentioned Adding Another Country to Mystic Program An “additional target country” for MYSTIC - 1 pdf
176 2014-03-18 - NSA Tasking of SCALAWAG NSA SCALAWAG Top Provider of Actionable SIGINT Description of Data Collection by NSA Under Mystic Description of Data Collection Under Mystic Tasking of SCALAWAG NSA SCALAWAG 2 pdf
175 2014-03-18 - NSA MYSTIC Comprehensive Metadata Access - NSA Symbolizes Data-Collection Program With Wizard Mystic Program [1 S.] MYSTIC SSO Weeklybrief [1 S.] NSA MYSTIC Comprehensive Metadata Access 2 pdf
174 2014-03-17 - NSA Intelligence Command and Control - - TURBINE Intelligence Command and Control A new intelligent command and control capability
TURBINE command and control capability
- 1 pdf
173 2014-03-14 - NSA Cooperative Third Party Relationships - Third Party Relationships NSA Cooperative Third Party Relationships What Are We After With Our Third Party Relationships? NSA Third Party - pdf
172 2014-03-12 - NSA HAMMERCHANT and HAMMERSTEIN - VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN NSA Hammerchant 4 pdf
171 2014-03-12 - NSA Mikey and Ibake - - - - NSA Mikey and Ibake 3 pdf
170 2014-03-12 - NSA TURBINE and TURMOIL - TURBINE and TURMOIL TURBINE and TURMOIL Turbine and Turmoil NSA Turbine and Turmoil 2 pdf
169 2014-03-12 - NSA 1000s of implanted Targets - Thousands of Implants Thousands of Implants Simultaneously managing thousands of implanted targets NSA 1000s Implants 1 pdf
168 2014-03-12 - NSA More Than One Way Mit "Quantum" kann TAO fast nach Belieben Rechner mit Schadsoftware verseuchen. Auflistung der Quantum-Software There Is More Then One Way to Quantum NSA More Than One Way There Is More Than One Way To QUANTUM NSA More Than One Way 1 pdf
167 2014-03-12 - NSA
GCHQ
Quantum Theory Hacking Tactics Mit der "Quantumtheory" kann die NSA-Abteilung Tailored Access Operations (TAO) fast nach Belieben Rechner von Zielpersonen mit Schadsoftware verseuchen. The NSA and GCHQ's QUANTUMTHEORY Hacking Tactics The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics QUANTUMTHEORY NSA Quantumtheory 11 pdf
166 2014-03-12 - NSA NSA Selector Types - Selector Types NSA Selector Types Selector types NSA Selector Types 1 pdf
165 2014-03-12 - NSA Quantum Insert Mit der Quantum Insert Methode kann die NSA-Abteilung Tailored Access Operations (TAO) fast nach Belieben Rechner von Zielpersonen mit Schadsoftware verseuchen. Quantum Insert Diagrams Quantum Insert Diagrams QUANTUMINSERT
[Datei defekt]
NSA Quantum Insert 5 pdf
164 2014-03-12 - NSA Analysis of Converged Data - NSA Technology Directorate Analysis of Converged Data NSA Technology Directorate Analysis of Converged Data Analysis of Converged Data NSA Converged Data 1 pdf
163 2014-03-12 - NSA Phishing MTM - NSA Phishing Tactics and Man in the Middle Attacks NSA Phishing Tactics and Man in the Middle Attacks WILLOWVIXEN and SECONDDATE NSA Phishing MTM 3 pdf
162 2014-03-12 - NSA MHS Leverages XKS for Quantum Against Yahoo and Hotmail Beschreibt beliebte Art der Quantum Methode zur Xerseuchung eines Zielrechners mittels Yahoo und Hotmail. Menwith Hill Station Leverages XKS for QUANTUM Against Yahoo and Hotmail MHS Leverages XKeyscore for Quantum MHS Leverages XKS for Quantum Against Yahoo and Hotmail NSA Menwith Hill 1 -
161 2014-03-12 - NSA TURBINE Industry Exploit - Industrial-Scale Exploitation TURBINE Industrial Scale Exploitation TURBINE NSA Industry Exploit 1 -
160 2014-03-12 - NSA Hacking Routers - Five Eyes Hacking Large Routers Five Eyes Hacking Large Routers Hacking Routers NSA 5 Eyes Hacking 1 -
159 2014-03-12 - - - - - - QUANTUMHAND - 1 pdf
158 2014-03-12 - NSA Stellarwind - Stellarwind Classification Guide Classification Guide for Stellarwind Program STELLARWIND classification guide NSA Stellarwind 37 pdf
157 2014-03-12 - NSA Classification Guide for FISA - Classification Guide for FISA, the Protect America Act and the FISA Amendments Act Classification Guide for FISA, the Protect America Act and the FISA Amendments Act Classification guide for FISA, the Protect America Act and the FISA Amendments Act NSA FISA FAA 18 pdf
156 2014-03-12 - - - - Ashcroft Memo on Intelligence Sharing Procedures Classification Guide for FISA, the Protect America Act and the FISA Amendments Act Procedures for the dissemination by NSA to foreign governments of information from FISA electronic surveillance or physical search carried out by the FBI AG Dissemination 2 pdf
155 2014-03-12 - NSA Access to FISA - NSA Memo Expands Access to FISA Information NSA Memo Expands Access to FISA Information Recommended Requirements for cryptanalysts at CCs in Texas, Georgia and Hawaii to access NSA and FBI FISA material NSA Cryptanalyist FISA 4 pdf
154 2014-03-12 - NSA Spying Timeline - NSA Timeline of Surveillance Law Developments NSA Timeline of Surveillance Law Developments Timeline of surveillance law developments NSA Spying Timeline 1 pdf
153 2014-03-12 - NSA Aids Dutch Anti-Piracy - - Dutch Shares Collected Anti-Piracy Information with NSA - NSA Aids Dutch Anti-Piracy 3 pdf
152 2014-03-07 - NSA Ask Zelda
Ask Zelda Unclass
- Silenced in SID [2 S.] NSA Ask Zelda_An Interview with Zelda [2 S.] “Ask Zelda!”: Watching Every Word in Snitch City [2 S.] NSA Releases SIDtoday "Ask Zelda" 104 pp Unclass
[104 S.]
NSA Ask Zelda [8 S.]
2
8
pdf
151 2014-03-03 - - Report on Pen Register FISA Orders - - DOJ Report on Pen Register FISA Orders - Not Snowden EPIC FOIA 3 pdf
150 2014-02-27 - GCHQ Optic Nerve - Optic Nerve GCHQ Optic Nerve optic-nerve yahoo-webcam-display-and-target-discovery
optic-nerve potentially-undesirable-images
GCHQ Optic Nerve 3 pdf
149 2014-02-25 - GCHQ Cyber Effects - GCHQ Honey Trap Cyber Attack (2) GCHQ Honey Trap Cyber Attack (2) - GCHQ Cyber Effects 11 pdf
148 2014-02-24 - GCHQ Disruption - - - - GCHQ Disruption 4 pdf
147 2014-02-24 - GCHQ Online Deception The Art of Deception: Training for a New Generation
"Kunst des Täuschens - Training für eine neue Generation verdeckter Online-Operationen"
The Art of Deception Training for Online Covert Operations Training for Covert Online Operations The Art of Deception: Training for a New Generation of Online Covert Operations GCHQ Online Deception 50 pdf
146 2014-02-18 - GCHQ Psychology: a new kind of SIGDEV - GCHQ SIGDEV GCHQ SIGDEV Psychology: a new kind of SIGDEV GCHQ Psychology 44 pdf

Tabelle LeakVid Videos
145 2014-02-18 - - Discovery SIGINT Targeting Scenarios and Compliance - - Discovery Sigint Targeting Scenarios and Compliance Discovery SIGINT Targeting Scenarios and Compliance NSA-GCHQ Discovery 1 pdf
144 2014-02-15 - ASD SUSLOC Trade Document - - SUSLOC - - 1 htm
143 2014-02-10 - NSA Intercept Drones - Intercept-Drones InterceptDrones GILGAMESH und VICTORYDANCE [3 S.]
2013 Congressional Budget Justification [1 S.]
New Tactical Collection System Joins the War on [1 S.]
- 5 pdf
142 2014-02-08 - - Boundless Nederland - Boundless Nederland Boundless Nederland - MIVD Boundless Informant
Cryptomemirror
1 jpg
141 2014-02-07 - GCHQ GCHQ Cyber Attack - GCHQ Honey Trap Cyber Attack (1) GCHQ Honey Trap Cyber Attack Cyber Integration “The art of the possible” GCHQ Cyber Attack 16 pdf
140 2014-02-04 - GCHQ GCHQ Attacked Hactivist Anonymous - British Spies Attacked Hactivist Anonymous British Spies Attacked Hactivist Anonymous Pushing the Boundaries and Action Against Hacktivism GCHQ Anonymous 14 pdf
139 2014-01-31 - CSEC IP Profiling Analytics & Mission Impacts Präsentation CSEC benutzt Flughafen Wi-Fi-Anschluss um kanadische Reisende zu tracken (verfolgen). CSEC Airport WiFi Tracking CSEC Airport WiFi Tracking IP Profiling Analytics & Mission Impacts CESC IP Profiling 27 pdf
138 2014-01-30 - - COP15 - COP15 Interception Document COP15 Interception Document UN Climate Change Conference in Copenhagen — Will the Developed and Developing World Agree on Climate Change? - 2 pdf
137 2014-01-28 - NSA Leaky Phone Apps - - Leaky Phone Apps - NSA Smartphones Analysis 14 pdf
136 2014-01-27 - GCHQ Mobile Theme - Mobile Theme Briefing Mobile Theme Briefing Mobile Theme Briefing GCHQ Mobile Theme 4 pdf
135 2014-01-27 2010-05 NSA Converged Analysis Smartphone Devices NSA presentation describing information the
agency can extract from smartphone traffic.
Social Convergence Converged Analysison Smartphone Devices Converged Analysis of Smartphone Devices NSA Smartphones Analysis 14 pdf
134 2014-01-27 - GCHQ Squeaky Dolphin - - Squeaky Dolphin - GCHQ Squeaky Dolphin 47 pdf
133 2014-01-16 - NSA SMS Text Messages Exploit - - [C:\snowden-files-14-0221\20140116-guard-dishfire_presentation.pdf Dishfire Presentation] Content Extraction Enhancements for Target Analytics SMS Text Messages Exploit 8 pdf
132 2014-01-14 - - - - - - - SSO
[Duplikat von Nr. 115]
7 pdf
131 2014-01-14 - - - - - - - PRISM
[Duplikat]
11 pdf
130 2014-01-13 - - - - - - - 5-Eyes SpyG 8-G20
[Duplikat]
4 pdf
129 2014-01-02 - - Classification guide for NSA/CSS quantum computing research - Quantum Computing Quantum Computing Classification guide for NSA/CSS quantum computing research Quantum Computer2 10 pdf
128 2014-01-02 - - Research & Technology penetrating hard Targets - Quantum Computers Hard Targets Quantum Computers Hard Targets Penetrating Hard Targets and Owning The Net Quantum Computer 3 pdf
127 2013-12-30 2007-01-08 NSA
CSS
QUANTUM Tasking Techniques Präsentation für NSA-Techniker und Analysten, erstellt vom NSA-Dienst Booz Allen Hamilton. NSA Quantum Tasking Techniques for the R&T Analyst TAOQuantumTheory
TAO Quantum Tasking
NSA QUANTUM Tasking Techniques for the R&T Analysis QUANTUM Tasking
QUANTUMTHEORY
28
14
pdf
126 2013-12-30 2008 NSA Tailored Access Operations Tailored Access Operations / 'Amt maßgeschneiderter Maßnahmen' (TAO) ist eine nachrichtendienstliche Cyber-Warfare-Einheit der NSA und aktiv seit mindestens 1998. Presentation über das Texas Cryptologic Center. Tailored Access Operations TAO Intro [17 S.] Tailored Access Operations – Texas Cryptologic Center TAO Introduction 16 pdf
125 2013-12-30 - NSA
CSS
QFIRE pilot report - QFIRE QFIRE QFIRE pilot report QFIRE 16 htm
124 2013-12-30 2008 NSA
CSS
ANT Catalog (53 Seiten) Produktkatalog, aus dem andere NSA Mitarbeiter "Technologie aus der ANT Abteilung" für die Erschließung von Datenziele bestellen können. NSA's Spy Catalogue NSA ANT Catalog ANT Product Data NSA Catalog [50 S.] 53 pdf
htm
zip
123 2013-12-30 - NSA
CSS
Appelbaum ANT Catalog - NSA's Spy Catalogue - NSA ANT Catalog NSA Catalog Video Clips 21 pdf
122 2013-12-29 - NSA
CSS
ANT Cottonmouth TAO ANT Cottonmouth - - - TAO ANT COTTONMOUTH (Bilder)
TAO ANT COTTONMOUTH

(de Artikel)
4 -
121 2013-12-23 - NSA
CSS
- - - NSA/CSS Mission
[Dat leer]
- NSA/CSS Mission 3 pdf
120 2013-12-18 - - - - - - Geopolitical trends for 2014-2019 - 3 html
119 2013-12-11 - NSA - SSO Content Acquisition Optimization - - - Excessive Collection 9 pdf
118 2013-12-11 - NSA - SSO Collection Optimization - - - SCISSORS2 7 pdf
117 2013-12-11 - NSA - SSO Collection Optimization Overview - - - SCISSORS1 4 pdf
116 2013-12-11 - NSA Yahoo-Google Exploit - - - - Yahoo-Google Exploit 6 pdf
115 2013-12-11 - - - - - - - Cable Spying Types
[Duplikat von Nr. 65]
7 pdf
114 2013-12--- - NSA WINDSTOP - - - - WINDSTOP 2 pdf
113 2013-12-11 - NSA XKeyScore Data Sources - - Xkeyscore Sources XKeyScore Data Sources NSA Sweden FRA XKeyScore Sources 1 pdf
112 2013-12-11 - - - - - - - NSA and Sweden Pact
[Duplikat von Nr. 106]
1 pdf
111 2013-12-11 - - - - - Quantum from GCHQ - GCHQ Sweden FRA Quantum 1 -
110 2013-12-11 - NSA SWEDUSA 20I3 STRATEGIC PLANNING CONFERENCE (SPC) - - Xkeyscore Sweden Meeting Visit Precis SWEDUSA NSA Sweden FRA XKeyScore Plan 5 pdf
109 2013-12-11 - NSA Baltic Region - - Baltic Region - NSA Sweden FRA RU Baltic 1 pdf
108 2013-12-11 - NSA Final Agenda Sweden - - Final Agenda Sweden USA Final Agenda SWEDUSA NSA Sweden FRA Agenda 8 pdf
107 2013-12-11 - NSA NSA 5Eyes Partners SSEUR members are the Five Eyes Nations (Australia, Canada, New Zealand, United Kingdom and United States) and the following Third Party partners: Belgium, Denmark, France, Gernany, Italy, Netherlands, Norway, Spain, Sweden. All Third Party nations in SSEUR send students to the training, as did the UK. - - Third Party Partners NSA 5Eyes Partners 1 pdf
106 2013-12-11 - NSA NSA Internal PM on FRA - - NSA Internal PM on FRA - NSA Sweden FRA Relationship 1 pdf
105 2013-12-11 - NSA SIGINT Successes - - - - SIGINT Successes 4 pdf
104 2013-12-11 - - NSA Sweden FRA Relationship - - Sweden Neutral - NSA GCHQ Sweden FRA COMINT 1 pdf
103 2013-12-11 - - XKeyScore Slide with Swedish Example - - XKeyScore Slide with Swedish Example XKeyScore Slide with Swedish example NSA Sweden FRA XKeyscore Slide 1 pdf
102 2013-12-11 - NSA XKeyScore Tor et al - - NSA Slides Xkeyscore (Tor LOG) - NSA Sweden FRA XKeyScore Tor et al 3 pdf
101 2013-12-11 - - UK and Swedish involvement in Quantum - - Legal Issues UK Regarding Swedenand Quantum UK and Swedish involvement in Quantum NSA Sweden FRA Quantum1 1 pdf

 Top

inlineTabelle Links (1 - 100)

Nr Datum DocDatum Org Doc Titel Inhalt ACLU EFF FreeSnoden Cryptome Seite Typ
100 2013-12-11 - NSA Sweden FRA Quantum Accomplishments - - Accomplishments from NSA Select Accomplishments: Production NSA Sweden FRA Quantum Accomplishments 2 pdf
99 2013-12-10 - - - - - - - G8-G20 Spying (Duplikat von Nr.86) 4 pdf
98 2013-12-10 2006-09-20 - GSM Classification Guide Internal NSA document outlining the agency 'sability to intercept, process and discern location data from mobilephone calls. GMS Classification Guide GSM Classification Guide GSM Classification Guide GSM Tracking 2 pdf
97 2013-12-10 2012-10-01 NSA Summary of DNR and DNI Co-Travel Analytics Study overviewing key elements of the co-traveler analytics both under development and operational at NSA. Cotraveler Overview Cotraveler Overview Summary of DNR and DNI Co-Travel Analytics GSM classification guide Co-Traveler 24 pdf
96 2013-12-10 - NSA GhostMachine Excerpts from slides describing the NSA's Special Source Operations cloud analytics platform, code-named GHOSTMACHINE. Ghost Machine GhostMachine SSO GHOSTMACHINE Analytics GHOSTMACHINE 4 pdf
95 2013-12-10 - NSA Target Location An excerpt from a transcript of National Security Agency training videos that describe how to verify the location of a targeted device. Target Location Target Location - Target Location 1 pdf
94 2013-12-10 2013-04-03 - NSA CSEC Partnership Information paper from the NSA detailing the NSA's intelligence relationship with Canada's Communications Security Establishment Canada (CSEC). NSA CSEC Partnership NSA CSEC Partnership - - 2 pdf
93 2013-12-10 2013-04 NSA Location Cookies NSA internal presentation slides detailing signal surveillance techniques and successes. Location Cookies Location Cookies - - 4 pdf
92 2013-12-09 2008 GCHQ Video Games Paper NSA paper entitled "Games: A look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities," stressing the risk of leaving games communities under-monitored. NSA Video Games Paper NSA Video Games Paper MHS and GCHQ “Get in the Game with Target Development for World of Warcraft Online Gaming”
Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities
Spying on Games 82 pdf
91 2013-12-09 - NSA Spying on Games - - - Exploiting Terrorist Use of Games & Virtual Environments Spying on Games 2 pdf
90 2013-12-05 2013-04-18 NSA Spionage-Beziehungen zu Schweden Excerpts from a document related to Swedish-American surveillance of Russia FRA Russia FRARussia Spionage-Beziehungen der NSA in Schweden Sweden Spied Russia for NSA 2 pdf
89 2013-12-05 2010-09-10 NSA NSA Italy Spying Excerpts from slides describing spying against the Italian Embassy in Washington DC. Italy Spying Italy Spying Italy – last 30 days
SCS Operations in Italy
Close Access Sigads
NSA Spies Italy [3 S.] 4 htm
pdf
88 2013-12-04 - NSA CHALKFUN Excerpt from NSA Agency training manual explaining how to determine if a targeted device is "foreign". Chalkfun Foreignness Chalkfun Foreignness CHALKFUN and TAPERLAY CHALKFUN 1 pdf
87 2013-12-04 - NSA FASCIA NSA slides about the FASCIA program, including the volume and type of device-location data collected by the agency. FASCIA Slides Fascia FASCIA FASCIA 2 pdf
86 2013-12-02 2010-06-23 - Spying G8 & G20 Meeting Canada Briefing notes on NSA operational plans to conduct surveillance during the 2010 G8 and G20 summits in Canada. NSA Lends Support to Upcoming G8 and G20 Summits in Canada G20 Summit [4 S.] NSA lends support to upcoming G8 and G20 meetings in Canada G8 - G20 Spying [3 S.] 4 pdf
85 2013-12-02 - CSEC - - - DSD Data - - 4 pdf
84 2013-11-30 - NSA Dutch SIGINT AIVD SIGINT - AIVD SIGINT Notes for Dutch SIGINT/Cyber Analytic Exchange Dutch SIGINT 3 pdf
83 2013-11-30 2013-11-30 CSEC CSEC Brazil Spying Presentation by Communications Security Establishment Canada on surveillance of Brazil's Ministry of Mines and Energy. CSEC Presentation CSEC Brazil CSEC – Advanced Network Tradecraft CSEC Brazil Spying 18 htm
pdf
82 2013-11-26 - - Evidence of Microsoft's vulnerability Slides describing collection of data from Internetproviders. Address Books/Serendipity/HTTP-Demux - apps.washingtonpost.com - - - 3 htm
81 2013-11-26 2009-11-24 GCHQ
NSA
Microsoft Monkey Puzzle E-Mail von GCHQ an NSA die darauf hindeutet, dass von Microsoft für NSA-Programm der Zugriff auf Google und Yahoo Verkehr ausgerichtet wurde. Did the NSA target Microsoft too? Microsoft Monkey Puzzle MUSCULAR and realms - 1 pdf
80 2013-11-26 - NSA Microsoft Cloud Exploitation - Did the NSA target Microsoft too? Microsoft Cloud Exploitation Microsoft data Microsoft Cloud Exploit 4 pdf
79 2013-11-26 2013-10-03 NSA Muslim Porn Viewing Excerpts from document detailing collection of information on targets' online sexual activity, intended to be used to discredit them. Program to discredit "radicals" through use of online sexual activity Radicalizers Pornography Global Radicalizers Vulnerable in Terms of Authority Muslim Porn Viewing 3 htm
pdf
78 2013-11-23 2012-02-23 NSA SIGINT Strategy 2012-2016 Strategy document detailing NSA mission statement and goals. SIGINT Strategy 2012-2016 SIGINT Strategy 2012 SIGINT Strategy 2012-2016 SIGINT Strategy 2012-2016 5 htm
pdf
77 2013-11-23 2012 NSA SIGINT Cryptologic Platform Presentation demonstrating NSA infected 50,000 computers worldwide with malware. Worldwide SIGINT / Defense Cryptologic Platform NSA Malware Worldwide SIGINT / Defense Cryptologic Platform SIGINT Cryptologic Platform 1 htm
pdf
76 2013-11-22 - - Boundless Informant Presentation describing Boundless Informant's "Mission Capabilities from Metadata Records." Boundless Informant [Duplicate of June 2013] Boundless Informant [Duplicate of June 2013] - [Duplicate of June 2013] 8 pdf
75 2013-11-22 - - Boundless Informant FAQ - - Boundless Informant FAQ [Duplicate of June 2013] - [Duplicate of June 2013] 3 pdf
74 2013-11-22 - NSA - Slides detailing the collection of call records from Afghanistan and Norway over a period of 30 days. Afghanistan, Norway, Boundless Informant, Boundless Informant FAQ Afghanistan Collection Afghanistan – last 30 days
Norway – last 30 days
- 2 htm
73 2013-11-20 2013-02-14 - - Notes on a meeting with Dutch intelligence services, whose officials described their use of Computer Network Exploitation technology to hack web forums and collect data of users. Notes for Dutch SIGINT/Cyber Analytic Exchange Collection, Processing and Dissemination of Allied Communications [4 S.] Collection, Processing and Dissemination of Allied Communications - 3 pdf
72 2013-11-20 2007 - UK Phone Data Memo detailing UK-U.S. deal allowing NSA to store data of UK citizens not suspected of wrong doing. SID Analysts Can Now Unminimize [UK Phone Data] - 2007 agreement on UK contact identifiers - 1 jpg
71 2013-11-19 - - Boundless Informant / FAQ - - - - BOUNDLESS INFORMANT incl. FAQ 13 pdf
70 2013-11-19 - NSA Norway - Last 30 Days - - Norway Collection - Norway 1 pdf
69 2013-11-17 - - DSD 3G-Handsets Impact and Update - - DSD3G 3G: impact and update DSD-3G 6 pdf
68 2013-11-17 - GCHQ Royal Concierge - - Royal Concierge Royal Concierge Royal Concierge (de)
Royal Concierge (en)
4 pdf
67 2013-11-04 - - Boundless Informant - - Boundless Informant (Duplikat von Nr.6) - - 8 pdf
66 2013-11-04 - NSA Special Source Operations (SSO) - Details of MUSCULAR - - Special Source Operations (SSO) Collection Optimization "Midpoint" Slides - Google and Yahoo! exploitations [6 S.] - WINDSTOP, SSO, Yahoo - Google
MUSCULAR - INCENSOR Google and Yahoo
14 htm
65 2013-11-04 - NSA Special Source Operations Collection Optimizazion - - Special Source Operations (SSO) Intercept Program Slides -- cable programs, details of MUSCULAR Special Source Operations overview Cable Spying Types [7 S.] 4 pdf
64 2013-11-04 - - - - - WINDSTOP Collection 30 day period December 2012 - January 2013 WINDSTOP – last 30 days - 1 pdf
63 2013-11-03 - - Collection Accesses - - Collection Accesses 30 Nov 2009 Collection accesses - 1 htm
62 2013-11-03 2007-10-03 NSA SIGINT Mission Strategic Plan 2008-2013 - - NSA SIGINT Mission Strategic Plan 2008-2013 2008-13 Strategic Plan SIGINT Mission 2013 11 htm
pdf
61 2013-11-033 2007-01 NSA 2007 Strategic Mission List - - NSA SIGINT January 2007 Strategic Mission List January 2007 Strategic Mission List SIGINT Mission 2007 11 htm
pdf
60 2013-11-01 - NSA Corporate FAA Reporting Metrics Corporate FAA Reporting Metrics - Corporate FAA Reporting Metrics Corporate FAA Reporting Metrics SSO2 Slide (Corporate FAA Reporting Metrics) 1 pdf
59 2013-11-01 2013-04 - - - - - Relationships & Authorities
Corporate FAA Reporting Metrics
PRISM, SSO [11 S.]
SSO1 Slide (Relationships & Authorities)
SSO2 Slide (Corporate FAA Reporting Metrics)
13 pdf
58 2013-10-30 2013-03-14 NSA Project Muscular An excerpt from the Special Operations Weekly -- an internal NSA publication -- describing data collection via the MUSCULAR program. NSA: Special Operations Weekly Excerpt Slideson MUSCULAR program possibly from February 28, 2013 Project Muscular - 3 pdf
57 2013-10-30 - - Current Efforts - Google An NSA Powerpoint slide showing the intersection of "Public Internet" and internal "Google Cloud" user data. NSA Powerpoint Slide: Google Cloud Exploitation MUSCULAR slide "Current Efforts - Google" pdf-fail - - 1 pdf
56 2013-10-28 - NSA Spain - Last 30 Days - - Graphic showing phone calls intercepted in Spain December 2012 - - 1 pdf
55 2013-10-27 - NSA - - - NSA SCS Slides on embassy spying [Slides 3-6] - NSA-CIASCS [3 S.]
NSA-CIASCS [2 S.]
5  ??
54 2013-10-25 2010-09-10 NSA Close Access Sigads - - Close Access Sigads September 10, 2010 (listing French Embassy) NSA codenames Close Access Sigads 2 pdf
53 2013-10-25 - NSA Cable attacks French Presidential Network - - Cable regarding cyber attacks on French Presidential Network April 12, 2013 Four-page internal memo NSA Hosts FRSpies 4 pdf
52 2013-10/24 - NSA Phones World Leaders - - NSA memo to Signals Intelligence Division (SID) staff October 27, 2006 regarding monitoring of phones of world leaders - - 1 pdf
51 2013-10-22 2013-04 NSA PRISM 4.2013 PRISM ist ein Top Secret eingestuftes Programm zur Überwachung und Auswertung elektronischer Medien und elektronisch gespeicherter Daten der National Security Agency und gehört zum dem großen Überwachungsprogramm „Stellar Wind“. An dem Programm sind neun der größten Internetkonzerne und Dienste der USA beteiligt: Microsoft (u. a. mit Skype), Google (u. a. mit YouTube), Facebook, Yahoo, Apple, AOL und Paltalk. - Prism April 2013 - PRISM 11 pdf
50 2013-10-21 - NSA PRISM Wanadoo-Alcatel - - NSA PRISM slide - alcatel / wanadoo (undated) - Wanadoo - Alcatel 1 pdf
49 2013-10-21 - NSA Boundless Informant France - - Boundless Informant France PRISM overview and Boundless Informant on France
Boundless Informant on France
Boundless Informant 2 pdf
48 2013-10-20 - NSA - - - NSA Cable dated November 10, 2010 discussing hacking of Mexican President's email - - 1 pdf
47 2013-10-14 2011-09 NSA Content Aquisition - - NSA Special Source Organization (SSO) slides on Content Acquisition Optimization Content Aquisition Optimization SSO Content Slides 9 pdf
46 2013-10-14 2013-01-07 NSA SSO Overview - - Intellipedia entry-Special Source Organization (SSO) Collection Optimization Overview - SSO Overview 4 pdf
45 2013-10-14 2012 NSA Content Optimization Internal NSA presentation detailing the collection of hundreds of millions of contactlists from around of the world. Content Acquisition Optimization PowerPoint Slides NSA Special Source Organization (SSO) Slides on Content Optimization - Address Books (SCISSORS) SSO Collection Optimization SSO Slides [7 S.] 9 pdf
44 2013-10-06 - CSEC - Presentation on Brazilian Ministry of Mines and Energy - - - CSE Brazil Ministry 7 htm
43 2013-10-04 2012-06 NSA Tor Stinks Presentation Presentation on de-anonymizing users of Tor,a tool meant to protect online anonymity. "Tor Stinks" "Tor Stinks" Presentation June 2012 "Tor Stinks" Presentation "Tor Stinks" 23 pdf
42 2013-10-04 - NSA Tor Egotistical Giraffe Presentation on EgotisticalGiraffe, a technique designed by the NSA to attack Tor users. Peeling back the layers of Tor with Egotistical Giraffe Peeling Back the Layers of Tor with Egotistical Giraffe January 8, 2007 Peeling back the layers of Tor with Egotistical Giraffe Egotistical Giraffe 20 pdf
41 2013-10-04 - NSA Tor Types of IAT Extracts from an NSA document on Tor. Extracts from an NSA document on Tor Types of IAT (how Tor works) Tor: ‘The king of high-secure, low-latency anonymity’ Types of IAT Tor 9 pdf
40 2013-10-04 - - - NSA Notes from talk on Tor by Roger Dingledine November 2007 - - - Roger Dingledine
[Not Snowden document]
2 htm
39 2013-10-04 - NSA Tor Report 2006 - - NSA Crypt analysis and Exploitation Services Report on TOR 2006 NSA report on the Tor encrypted network Tor 49 pdf
38 2013-10-04 - GCHQ Tor Op Mullenize and beyond GCHQ report on ‘MULLENIZE’ program to ‘stain’ anonymous electronic traffic - GCHQ Mullenize GCHQ report on ‘MULLENIZE’ program to ‘stain’ anonymous electronic traffic GCHQ MULLENIZE 2 pdf
37 2013-09-28 2011-01-03 - - NSA memo on "new contact-chaining procedures to allow better, faster analysis" of foreign intelligence targets. NSA Contact-Chaining Memo NSA memo from January 3, 2011 on contact chaining - Contact Chaining Social Networks [1] 3 pdf
36 2013-09-28 - NSA - An NSA powerpoint slide illustrating how phone and email data are used to graph the relationships of foreign intelligence targets. NSA Social Network Graph Powerpoint Slide Slide on contact chaining (SYANPSE) - SYANPSE 1 pdf
35 2013-09-20 - GCHQ GCHQ Belgacom Hack - - GCHQ Slides on Belgacom - Belgacom 3 htm
34 2013-09-16 - NSA - - - NSA Network Analysis Center 2010 SIGDEV Conference on creditcard authorization net workmapping - SWIFT 3 pdf
33 2013-09-11 - NSA NSA-Israel: Memorandum of Understanding - - IsraelSharing NSA and Israeli intelligence: memorandum of understanding NSA-Israel Spy 5 pdf
32 2013-09-09 - NSA - - - NSA slides on smartphones - Smartphones 5 pdf
31 2013-09-08 - - - (WP) STORMBREW - StormbrewTV - - - -
30 2013-09-08 - - Petrobas - - NSA slides on Petrobras and private networks - Petrobas ~60 -
29 2013-09-05 - NSA Classification Guide for Cryptanalysis - - NSA Classification Guide for Crypt analysis from September 13, 2005 NSA classification guide for cryptanalysis NSA classification guide 3 pdf
28 2013-09-05 - NSA SIGINT Enabling Project - - NSA SIGINT Enabling Project Description - engaging companies to covertly leverage product designs (nodate) SIGINT Enabling Project SIGINT Enabling
SIGINT Enabling [NYT 3]
SIGINT Enabling [PP 3]
3 pdf
27 2013-09-05 - NSA Bullrun – Classification Guide - - Project Bullrun Description June 16, 2010 Project Bullrun – classification guide to the NSA’s decryption program BULLRUN
BULLRUN [NYT 4]
BULLRUN [PP 4]
5 pdf
26 2013-09-03 - NSA Brazil and Mexico case studies - - SATC slides Mexico and Brazil Case Studies Intelligently filtering your data: Brazil and Mexico case studies Brazil and Mexico 20 htm
25 2013-09-01 - NSA - NSA document dated June 2010 (notreleased) discussing targeting of French Foreign Ministry - - - French Foreign Ministry 0 -
24 2013-08-31 - NSA - NSA document dated March 23,2006 (notreleased) showingt hat AlJazeera was surveilled - - - Al Jazeera 0 -
23 2013-08-30 - NSA Black Budget - - FY 2013 Congressional Budget Summary February 2012 National Intelligence Program Summary ("black budget") Inside the 2013 U.S. intelligence ‘black budget’ [17 S.]
2013 U.S. intelligence budget tables [26 S.]
Budget 43 pdf
22 2013-08-23 - NSA - - - Prism Payments - - - -
21 2013-08-15 2007-01-08 NSA Targeting Rationale (TAR) An NSA document describing how analysts should explaint heir targeting decisions under the FISA Amendments Act. NSA Memo: Targeting Rationale (TAR) NSA Targeting Analyst Rationale slides (undated) NSA Auditing: Targeting Rationale - 4 pdf
20 2013-08-15 2011-10-12 NSA - An NSA document describing the FISACourt's 2011 FAA Certifications and noting the FISC ruling that certain procedures for the collection of "Multiple Communications Transactions" were "deficienton statut oryand constitutional grounds." FAA Certification Renewals with Caveats NSA Special Source Organization (SSO) news article from October 12, 2011 discussing FISC ruling holding NSA surveillance unconstitutional SSO transitions following FISA Court ruling - 1 pdf
19 2013-08-15 2011-11-01 NSA U.S. Person Information An NSA training slide about what analysts should do when they acquire "U.S.person information". Slide: So you got U.S. Person Information? "So You Got a US Person?" training slide November 8, 2011 Training material: US Person Information - 1 pdf
18 2013-08-15 2012-05-03 NSA SID Oversight & Compliance A2012 quarterly audit of the NSA's surveillance activities, which describes 2.766 violations by the NSA of the surveillance laws and its internal rules and regulations. SID Oversight and Compliance NSA Signals Intelligence Division (SID) Oversight & Compliance Report May 31, 2012 discussing privacy violations for the preceding year 2012 SID Auditing report - 13 pdf
17 2013-08-09 2011 NSA - An NSA Section 702 rule change expanding NSA targeting/surveillance authorities. NSA Section 702 'Loop Hole' NSA Special Source Organization (SSO) glossary on Section 702 - - 1 pdf
16 2013-07-31 2008-02-25 NSA XKeyScore Training Slides Eine NSA Ausbildungs-
präsentation die den Zweck und Umfang des XKeyScore Programms beschreibt.
NSA XKeyscore Powerpoint NSA XKeyScore Training Slides, 2.2008 XKeyScore training presentation, 2008 XKeyScore 32 pdf
15 2013-07-10 2013-04-13 NSA PRISM UPSTREAM Slide An NSA training slide about the collection of internet and phonedata from fiber-optic cablenet works via the UPSTREAM program. UPSTREAM Powerpoint Slide PRISM Slide - PRISM Slide 1 htm
14 2013-06-30 - NSA Dropmire - - Dropmire - Dropmire 1 pdf
13 2013-06-29 2013-04-13 NSA PRISM NSA training slides about the acquisition of surveillance information through the PRISM program. PRISM Powerpoint Slides re Data Acquisition PRISM Slides PRISM Powerpoint Slides re Data Acquisition PRISM [8 S.] 4 pdf
htm
12 2013-06-27 2007-11-20 NSA - A memo from the NSA to the DOD seeking approval of a proposed amendment to procedures governing the NSA's metadata analysis NSA Memo to DOD - Proposed Amendment to Conduct Analysis of Metadata DOJ Memo from November 20, 2007 Proposing Amendment to DOD procedures to allow NSA todo contact chaining of metadata related to US Persons Justice Department and NSA memos proposing broader powers for NSA to collect data DoJ Memo on NSA 16 pdf
11 2013-06-27 2009-03-24 NSA President Bush's post-9/11 surveillance programs A2009 NSA IG Report reviewing President Bush's post-9/11 surveillance programs. Draft NSA IG Report NSA OIG Working Draft Report from March 24, 2009 on StellarWind (PSP) NSA Inspector General review of government surveillance programs after 9/11 StellarWind 51 pdf
10 2013-06-27 2011-02-02 - - ADOJ report to the Senate Intelligence Committee describing the government's bulk collection program under Section 215. 2011 OIG Report on Bulk Collection - - [NotSnowden] 9 -
9 2013-06-23 2009-12-14 - - ADOJ report to the Senate Intelligence Committee describing the government's bulk collection program under Section 215. 2009 OIG Report on Bulk Collection - - [NotSnowden] 7 pdf
8 2013-06-20 2009-07-29 NSA FAA Minimization Exhibit B FISC document describing the NSA'sminimization procedures under Section 702 of FISA (the FISAAmendments Act). FAA Minimization Procedures Minimization Procedures used by NSA in Connection with Data Acquisitions Pursuant to 702 FISC July 29, 2009 FAA Minimization Procedures Minimization Exhibit B 9 pdf
7 2013-06-20 2009-07-29 NSA FAA Targeting Exhibit A FISC document describing the NSA's targeting procedures under Section 702 of FISA (the FISA Amendments Act). FAA Targeting Procedures Procedures Used by NSA for Targeting Non-US Persons Reasonably Believed to Be Outside the US to Acquire Foreign Intelligence Pursuant to 702 FISC July 29, 2009 FAA Targeting Procedures Minimization Exhibit A 9 pdf
6 2013-06-08 2012-07-13 NSA Boundless Informant NSA training slides describing the Boundless Informant tool and "mission capabilities from metadata records." NSA Boundless Informant Powerpoint Slides [8 S.] Boundless Informant Introduction Slides July 13, 2012 Boundless Informant slides [8 S.]
Describing Mission Capabilities from Metadata Records [4 S.]
Boundless Informant Slides 8
4
pdf
5 2013-06-08 2012-06-09 NSA Boundless Informant - FAQ An NSA "Work-in-Progress" factsheet describing the Boundless Informant dataminingtool. NSA Boundless Informant Frequently Asked Questions Boundless Informant Explanation/FAQ Slides September 6, 2012 Boundless Informant – Frequently Asked Questions Boundless Informant FAQ 3 pdf
4 2013-06-08 - NSA - - - PRISM/Upstream explanation slide - - 1 -
3 2013-06-07 - NSA Presidential Policy Directive (PPD-20) Presidential Policy Directive PPD-20 on US Cyber Operations Policy - - Presidential Policy Directive PPD-20 on US Cyber Operations Policy PRESIDENTIAL POLICY DIRECTIVE (PPD-20) 18 pdf
2 2013-06-06 2013-04-13 NSA PRISM Overview NSA training slides providing an introduction and overview of the PRISM program. PRISM Overview Powerpoint Slides [4 S.] PRISM Slides [4 S.]
PRISM (4.2013) [11 S.]
PRISM/US-984XN Overview [12 S.] PRISM [9 S.] 4 pdf
htm
1 2013-06-05 2013-04-25 - Verizon SECONDARY ORDER AFIS Corder approving the application of Section 215 for Verizon metadata collection. Section 215 - Secondary Order (Verizon) Verizon 215 Secondary Order April 25, 2013 Verizon FISA Court order Verizon 4 pdf

 Top


Einzelnachweise


Dropzone


. Top