In the Matter of Foreign Governments, Foreign Factions, Foreign Entities, and Foreign-Based Political Organizations
Attorney General of the United States
This document is a briefing prepared by the Attorney General of the United States. It identifies foreign governments, foreign factions, entities controlled by foreign governments, foreign-based policial organizations. These entities are potentially subject to surveillance operations.
Attorney General of the United States
20140630-WaPo-list_of_governments_and_organizations_authorized_for_surveillance.pdf
The Washington Post
Snowden
PDF
en
HASH019a5df62d873bba5b1d2802
The Unofficial XKEYSCORE User Guide
XKEYSCORE
This document is a report prepared by a consultant working for Booz Allen Hamilton. It provides a comprehensive user's guide for the NSA's data analysis tool, XKEYSCORE.
Booz Allen Hamilton
20150701-intercept-unofficial_xks_user_guide.pdf
The Intercept
Snowden
PDF
en
HASHcb6444a94cfc4e7340fa6e
Terms of Reference between the Bundesnachtrictendiest Sigint Department and the Bundesamt fur Verfassungsschutz of Germany and the United States National Security Agency for the XKeyscore Computer Network Exploitation Software
Sigint - Signals Intelligence
This document is a transcript of a Terms of Reference entered into by the NSA and two German intelligence agencies, the Bundesnachrichtendiest's Sigint Department and the Bundesamt fur Verfassungsschutz. The document describes the sharing agreement between the agencies for German access to the XKEYSCORE Computer Network Exploitation application.
Bundesamt fur Verfassungsschutz
20150826-die_zeit-xkeyscore_-_the_document.pdf
Zeit Online
Snowden
PDF
en
HASH01d058b399f1e17147cba66b
Bundesnachrichtendienst - Structure of the BND
Cryptanalysis
This document is a NSA presentation giving an overview of the organizational structure of the BND with special attention given to the breakdown of their SIGINT activity.
Bundesnachrichtendienst - German Foreign Intelligence Service
20140618-der_spiegel-internal_nsa_presentation_on_the_bnds_organization_0.pdf
Der Spiegel
Snowden
PDF
en
HASH01e72ff395825fd1a340986c
TCB Jamboree 2012
USIC - United States Intelligence Community
This document is a memo created by the CIA. It describes the Trusted Computing Base's Jamboree, held in Februrary 2012. The Jamboree was a conference dedicated to communicating research performed by members of the United States Intelligence Community (USIC) into exploiting ivulnerabilities in commercial communications devices such as iPhones, iPads and other mobile devices.
Central Intelligence Agency (CIA)
20150310-Intercept-TCB Jamboree 2012 Invitation.pdf
The Intercept
Snowden
PDF
en
HASH16056506c85ab843e69a31
TCB Jamboree
NSA - National Security Agency
This document is an extract of a memo about the CIA's annual Trusted Computing Base's (TCB) Jamboree conference. This conference focused on the communication about research into the ecxploitation of vulnerabilities in modern communications systems.
Central Intelligence Agency (CIA)
20150310-Intercept-TCB Jamboree 2012.pdf
The Intercept
Snowden
PDF
en
HASH014687f74f94898c9df2703a
Strawhorse: Attacking the MacOS and iOS Software Development Kit
Xcode
This document is an abstract for a CIA presentation. This presentation focused on the exploitation of vulnerabilities in Xcode 4.1, the proprietary code used to compile MacOS X applications and kernel extensions as well as iOS applications used in Apple devices.
Central Intelligence Agency (CIA)
20150310-Intercept-Strawhorse Attacking the Macos and Ios Software.pdf
The Intercept
Snowden
PDF
en
HASH01096be3393b5edb2533c8f9
Rocoto: Implanting the iPhone
JHU / APL
This document is an abstract of a presentation prepared by the CIA. It describes ROCOTO, which is a codeword for the agencies efforts to create surveillance tools for the iPhone 3G.
Central Intelligence Agency (CIA)
20150310-Intercept-ROCOTO Implanting the Iphone.pdf
The Intercept
Snowden
PDF
en
HASH027bd9719e18b1d4ddb354
TPM Vulnerabilities to Power Analysis and an Exposed Exploit to Bitlocker
CRT - Chinese Remainder Theorem
This document is an abstract for a presentation created by the CIA. The presentation focused on exploiting vulnerabilities within Microsoft's Bitlocker encrypted metadata software system.
Central Intelligence Agency (CIA)
20150310-Intercept-TPM Vulnerabilities to Power Analysis and An.pdf
The Intercept
Snowden
PDF
en
HASH017a9d1e16609177ab35ad00
Differential Power Analysis on the Apple A4 Processor
EM - Electromagnetic emissions
This document is an abstract for a presentation by the CIA. It describes the CIA's attempts to subvert the A4 Processor used by Apple in the iPhone 4, the iPod touch, and the first generation iPad.
Central Intelligence Agency (CIA)
20150310-Intercept-Differential Power Analysis on the Apple A4.pdf
The Intercept
Snowden
PDF
en
HASH01ea06af64a30b650fe88f50