Общая информация
Название Snowden archive
Тип Книги
Размер 1.84Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
_20131119-odni-nsa_course_materials_module_4_v.28.pdf 2.67Мб
01302014-dagbladet-cop15_interception_document.pdf 60.12Кб
01312014-cbc-csec_airport_wifi_tracking.pdf 2.11Мб
2009-OIG_Report_on_Bulk_Collection.pdf 3.75Мб
2011-OIG_Report_on_Bulk_Collection.pdf 4.30Мб
20130605-guard-verizon_215_secondary_order.pdf 127.79Кб
20130606-wapo-prism.pdf 562.03Кб
20130608-guard-boundless_informant_capabilities.pdf 719.29Кб
20130608-guard-boundless_informant_faq.pdf 532.16Кб
20130608-guard-prism.pdf 132.25Кб
20130620-guard-702_minimization_procedures.pdf 509.84Кб
20130620-guard-702_targeting_procedures.pdf 539.17Кб
20130627-guard-2007_memo_on_us_person_metadata.pdf 974.10Кб
20130627-guard-nsa_oig_2009_report.pdf 7.34Мб
20130629-wapo-prism.pdf 602.62Кб
20130630-guard-dropmire_.pdf 16.25Кб
20130710-wapo-upstream.pdf 207.76Кб
20130731-guard-xkeyscore_training_slides.pdf 27.26Мб
20130809-guard-702_glossary.pdf 151.72Кб
20130816-wapo-sid_oversight.pdf 1.20Мб
20130816-wapo-so_you_got_a_us_person.pdf 147.08Кб
20130816-wapo-sso_news_article.pdf 94.89Кб
20130816-wapo-targeting_rationale.pdf 457.02Кб
20130830_cryptome_congressional_budget_2013.pdf 2.26Мб
2013-08-30_cryptome_congressional_budget_2013.pdf 2.26Мб
20130903-globo-satc.pdf 1.56Мб
20130905-guard-bullrun.pdf 686.80Кб
20130905-guard-cryptanalysis_classification.pdf 248.25Кб
20130905-guard-sigint_enabling.pdf 382.13Кб
20130908-globo-stormbew_tv.pdf 90.66Кб
20130908-globo-stormbrew_tv.pdf 90.66Кб
20130908-globo-tv.pdf 649.75Кб
20130909-spiegel-smartphones.pdf 519.64Кб
20130911-guard-israel_sharing_0.pdf 808.09Кб
20130916-spiegel-credit_card_transactions.pdf 422.18Кб
20130920-spiegel-belgacom.pdf 317.78Кб
20130928-nyt-contact_chaining.pdf 280.44Кб
20130928-nyt-syanpse.pdf 186.37Кб
20131004-guard-egotistical_giraffe.pdf 1.96Мб
20131004-guard-iat_tor.pdf 1000.26Кб
20131004-guard-tor_stinks.pdf 2.00Мб
20131004-wapo-gchq_mullenize.pdf 1.26Мб
20131004-wapo-tor.pdf 310.58Кб
20131014-wapo-collection_optimization.pdf 59.96Кб
20131014-wapo-content_acquisition_optimization1.pdf 2.70Мб
20131014-wapo-content_acquisition_optimization2.pdf 2.50Мб
20131020-spiegel-mexican_president.pdf 180.92Кб
20131021-monde-boundless_informant_france.pdf 136.65Кб
20131021-monde-close_access_sigads.pdf 198.53Кб
20131021-monde-wanadoo_alcatel.pdf 115.18Кб
20131022-monde-prism_april_2013.pdf 1.26Мб
20131024-guard-phones_world_leaders.pdf 147.73Кб
20131025-monde-french_cyberattacks.pdf 666.39Кб
20131027-spiegel-embassy.pdf 632.37Кб
20131028-mundo-spain_collections.pdf 15.12Кб
20131030-wapo-muscular_smiley.pdf 244.01Кб
20131030-wapo-muscular.pdf 96.50Кб
20131101-guard-corporate_reporting.pdf 121.06Кб
20131104-mundo-boundless_informant.pdf 621.45Кб
20131104-mundo-info_sharing_partners.pdf 103.45Кб
20131104-nyt-collection_accesses.pdf 48.94Кб
20131104-nyt-sigint_goals.pdf 1.68Мб
20131104-nyt-sigint_strategic_plan.pdf 2.38Мб
20131104-wapo-optimization_google.pdf 2.12Мб
20131104-wapo-sso_overview.pdf 465.47Кб
20131104-wapo-windstop.pdf 94.00Кб
20131117-guardian-dsd_3g.pdf 340.47Кб
20131117-spiegel-royal_concierge.pdf 93.92Кб
20131119-dagbladet-norway_collection_0.pdf 53.53Кб
20131119-odni-ag_guidelines_for_domestic_fbi_operations.pdf 7.34Мб
20131119-odni-interim_competency_test_for_access_to_fisa_data.pdf 171.14Кб
20131119-odni-nsa_core_intelligence_oversight_training.pdf 15.62Мб
20131119-odni-nsa_course_materials_intro_v.13.pdf 378.08Кб
20131119-odni-nsa_course_materials_module_1_v.17.pdf 1.01Мб
20131119-odni-nsa_course_materials_module_2_v.16.pdf 811.74Кб
20131119-odni-nsa_course_materials_module_3_v.22.pdf 1.35Мб
20131119-odni-nsa_course_materials_module_4_v.28.pdf 2.67Мб
20131119-odni-nsa_course_materials_module_5_v.24.pdf 906.48Кб
20131119-odni-nsa_course_materials_module_6_analytic_personal_v.18.pdf 1019.92Кб
20131119-odni-nsa_course_materials_module_6_tech_personnel_v.25.pdf 2.40Мб
20131119-odni-nsa cryptological school course slides on legal compliance and minimization procedures pdf 17.02Мб
20131119-odni-nsa guidance memo on legal standards for searching bulk metadata pdf 1.79Мб
20131119-odni-nsa_metadata_collection_training_slides_.pdf 7.46Мб
20131119-odni-nsa summary of requirements for collection of bulk metadata pdf 293.91Кб
20131119-odni-office of general council business record analyst training slides pdf 2.13Мб
20131119-odni-united states signals intelligence directive 18 appendix j pdf 4.34Мб
20131119-odni-united states signals intelligence directive 18 jan 25 2011 pdf 9.34Мб
20131119-odni-verification_slide.pdf 86.98Кб
20131120-guard-collection processing and dissemination of allied communications pdf 246.38Кб
20131122-dagbladet-afghanistan_collection.pdf 30.26Кб
20131122-dagbladet-boundless_informant_faq.pdf 274.13Кб
20131122-dagbladet-boundless_informant.pdf 5.71Мб
20131123-nrc-nsa_malware.pdf 145.98Кб
20131123-nyt-sigint_strategy_feb_2012.pdf 372.73Кб
20131126-huffpo-radicalizers_pornography.pdf 795.25Кб
20131126-wapo-microsoft_cloud_exploitation.pdf 2.37Мб
20131126-wapo-microsoft_monkey_puzzle.pdf 46.12Кб
20131130-GlobeandMail-csec-br-spy.pdf 616.64Кб
20131202-cbc-g20.pdf 136.32Кб
20131202-guard-dsd_data.pdf 152.84Кб
20131204-wapo-chalkfun_foreignness.pdf 61.37Кб
20131204-wapo-fascia.pdf 233.23Кб
20131205-espresso-italy_spying.pdf 168.78Кб
20131205-svt-fra_russia.pdf 93.61Кб
20131209-nyt-nsa_games.pdf 293.91Кб
20131210-cbc-nsa_csec_partnership.pdf 91.15Кб
20131210-wapo-cotraveler_overview.pdf 1.35Мб
20131210-wapo-ghost_machine.pdf 859.54Кб
20131210-wapo-gsm_classification_guide.pdf 143.10Кб
20131210-wapo-location_cookies.pdf 255.29Кб
20131210-wapo-target_location.pdf 133.22Кб
20131211-svt-accomplishments_from_nsa.pdf 191.24Кб
20131211-svt-baltic_region.pdf 152.42Кб
20131211-svt-final_agenda_sweden_usa.pdf 1015.03Кб
20131211-svt-legal_issues_uk_regarding_sweden_and_quantum.pdf 27.63Кб
20131211-svt-nsa_internal_pm_on_fra.pdf 189.71Кб
20131211-svt-nsa_slides_xkeyscore.pdf 562.66Кб
20131211-svt-quantum_from_gchq.pdf 37.53Кб
20131211-svt-sweden_neutral.pdf 182.87Кб
20131211-svt-xkeyscore_slide_with_swedish_example.pdf 195.51Кб
20131211-svt-xkeyscore_sources.pdf 37.27Кб
20131211-svt-xkeyscore_sweden_meeting.pdf 905.20Кб
20131223-wapo-nsacss-mission.pdf 100.25Кб
20131230-appelbaum-nsa_ant_catalo.pdf 6.87Мб
20131230-appelbaum-nsa_ant_catalog.pdf 6.87Мб
20131230-spiegel-qfire.pdf 2.14Мб
20131230-spiegel-tao_intro.pdf 2.23Мб
20131230-spiegel-tao_quantum_tasking.pdf 3.51Мб
20131230-spiegel-tao_quantum_theory.pdf 727.72Кб
2013-watchlist-guidance.pdf 26.49Мб
20140102-wapo-quantum_computers_hard_targets.pdf 374.72Кб
20140102-wapo-quantum_computing.pdf 139.98Кб
20140116-guard-dishfire_presentation.pdf 861.66Кб
20140127-nbc-squeaky_dolphin.pdf 17.36Мб
20140127-nyt-converged_analysis_on_smartphone_devices.pdf 848.49Кб
20140127-nyt-mobile_theme_briefing.pdf 131.50Кб
20140128-guard-leaky_phone_apps_0.pdf 222.27Кб
20140128-guard-leaky_phone_apps.pdf 81.85Кб
20140130-information_dk-cop15_interception_document.pdf 60.12Кб
20140131-cbc-csec_airport_wifi_tracking.pdf 2.11Мб
20140204-nbc-british_spies_attacked_hactivist_anonymous.pdf 1.13Мб
20140207-nbc-gchq_honey_trap_cyber_attack_background_on_jtrig.pdf 1.12Мб
20140207-nbc-gchq honey trap cyber attack leveraging foreign journalists via jtrig pdf 590.87Кб
20140207-nrc-boundless_nederland.pdf 1.07Мб
20140211-intercept-drones_intercepting_communications.pdf 365.83Кб
20140218-intercept-discovery_sigint_targeting_scenarios_and_compliance.pdf 631.45Кб
20140218-intercept-gchq_sigdev_.pdf 27.83Мб
20140224-intercept-training_for_covert_online_operations.pdf 4.28Мб
20140227-guard-gchq_optic.pdf 240.64Кб
20140303-epic-doj_report_on_pen_register_fisa_orders.pdf 3.70Мб
20140305-nrc-dutch_shares_collected_anti-piracy_information_with_nsa.pdf 535.99Кб
20140307-intercept-nsa_ask_zelda_an_interview_with_zelda.pdf 65.09Кб
20140307-intercept-nsa_ask_zelda_guilty_until_proven_innocent.pdf 47.54Кб
20140307-intercept-nsa_ask_zelda_is_bain_de_soleil_a_bane_on_the_nsa.pdf 55.21Кб
20140307-intercept-nsa_ask_zelda_watching_every_word_in_snitch_city.pdf 40.11Кб
20140311-nyt-ashcroft_memo_on_intelligence_sharing_procedures.pdf 117.86Кб
20140311-nyt-classification guide for fisa the protect america act and the fisa amendments act pdf 876.96Кб
20140311-nyt-classification_guide_for_stellarwind_program_0.pdf 2.17Мб
20140311-nyt-nsa_memo_expands_access_to_fisa_information.pdf 440.00Кб
20140311-nyt-nsa_timeline_of_surveillance_law_developments.pdf 194.96Кб
20140312-intercept-five_eyes_hacking_large_routers.pdf 22.54Кб
20140312-intercept-increasing collection capacity by increasing implants pdf 21.13Кб
20140312-intercept-mhs_leverages_xkeyscore_for_quantum.pdf 46.38Кб
20140312-intercept-multiple_methods_of_quantum.pdf 121.12Кб
20140312-intercept-nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf 353.62Кб
20140312-intercept-nsa_selector_types.pdf 117.08Кб
20140312-intercept-nsa technology directorate analysis of converged data pdf 115.66Кб
20140312-intercept-quantum_insert_diagrams.pdf 514.41Кб
20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf 1.15Мб
20140312-intercept-turbine_and_turmoil.pdf 217.97Кб
20140312-intercept-turbine_industrial_scale_exploitation.pdf 81.13Кб
20140312-intercept-vpn and voip exploitation with hammerchant and hammerstein pdf 459.06Кб
20140313-intercept-nsa_cooperative_third_party_relationships.pdf 312.20Кб
20140315-intercept-turbine_intelligence_command_and_control.pdf 121.95Кб
20140318-wapo-adding_another_country_to_mystic_program.pdf 48.08Кб
20140318-wapo-description_of_data_collection_under_mystic.pdf 61.93Кб
20140318-wapo-mystic_program.pdf 73.36Кб
20140320-intercept-targeting_system_administrator_accounts.pdf 490.67Кб
20140321-le_monde-french_intelligence_e-mail_spying_operation.pdf 1.07Мб
20140322-nyt-operation_shotgiant_objectives.pdf 384.50Кб
20140329-der_spiegel-gchq_and_nsa_spy_on_heads_of_state.pdf 102.70Кб
20140404-intercept-2009_sigdev_conference.pdf 40.92Кб
20140404-intercept-gchq_full_spectrum_cyber_effects.pdf 1.74Мб
20140430-intercept-gchq_visit.pdf 28.59Кб
20140430-intercept-ghostmachine.pdf 6.43Мб
20140430-intercept-prism_olympics.pdf 581.23Кб
20140513-greenwald-noplacetohidedocuments.pdf 86.95Мб
20140519-intercept-black_budget.pdf 53.22Кб
20140519-intercept-dea_warfighter.pdf 142.78Кб
20140519-intercept-mystic.pdf 78.50Кб
20140519-intercept-somalget.pdf 131.46Кб
20140519-intercept-sso_dictionary_excerpt.pdf 34.05Кб
20140519-intercept-sso_mystic_charts.pdf 563.22Кб
20140531-nyt-identity-intelligence.pdf 1.19Мб
20140610-cryptome-dea-nsa-sandkey.pdf 361.37Кб
20140616-der_spiegel-analytics_for_targets_in_europe_0.pdf 54.22Кб
20140616-der_spiegel-xkeyscore_fingerprints_1.pdf 53.51Кб
20140618-dagbladet-black_budget.pdf 107.79Кб
20140618-dagbladet-keith_alexander_talking_points.pdf 46.54Кб
20140618-der_spiegel-boundless_informant_overview_global.pdf 316.56Кб
20140618-der spiegel-boundless informant statistics for so-called third parties pdf 353.50Кб
20140618-der spiegel-boundless informant statistics on data from 22foreign partners22 pdf 356.05Кб
20140618-der_spiegel-boundless_informant_statistics_on_germany.pdf 289.02Кб
20140618-der_spiegel-boundless_informant_statistics_on_the_uk.pdf 157.08Кб
20140618-der spiegel-briefing on the visit to the nsa of a high-ranking bnd official pdf 491.70Кб
20140618-der_spiegel-cooperation_between_the_nsa_bnd_and_bfv.pdf 327.92Кб
20140618-der_spiegel-details_on_xkeyscore_from_an_internal_gchq_website.pdf 413.65Кб
20140618-der spiegel-excerpt on the sharing of xkeyscore with german intelligence agency bfv pdf 66.89Кб
20140618-der spiegel-explanation of nymrod a system for searching for people and places in databases and documents pdf 263.31Кб
20140618-der_spiegel-faqs_on_the_boundless_informant_program.pdf 231.88Кб
20140618-der spiegel-final agenda of a meeting between high-ranking nsa and bnd officials pdf 525.17Кб
20140618-der_spiegel-gchq_report_on_the_technical_abilities_of_tempora.pdf 293.41Кб
20140618-der spiegel-guidelines for the classification of nsa sigint details 1945-1967 pdf 2.59Мб
20140618-der spiegel-guidelines for the classification of suslag details and the nsa-bnd cooperation pdf 777.93Кб
20140618-der spiegel-internal nsa presentation on the bnds organization 0 pdf 1.08Мб
20140618-der_spiegel-logo_of_nsa-bnd_cooperation.pdf 29.78Кб
20140618-der spiegel-nostalgic recollections from nsa workers formerly stationed in bad aibling pdf 265.50Кб
20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod.pdf 418.41Кб
20140618-der spiegel-nsacss europe- report on the experiences of one nsa worker pdf 362.97Кб
20140618-der spiegel-nsacss presentation on technical surveillance in europe and africa pdf 1.54Мб
20140618-der spiegel-overview of the use of boundless informant world map pdf 219.75Кб
20140618-der spiegel-preliminary agenda of a meeting between nsa and bnd officials pdf 349.48Кб
20140618-der spiegel-report on a wharpdrive incident in an sso presentation pdf 261.12Кб
20140618-der spiegel-report on an nsa sigdev training course for allied countries pdf 249.86Кб
20140618-der spiegel-report on an nsa visit to bnd site and on data transfer from the bnd to the nsa pdf 305.80Кб
20140618-der spiegel-report on an unexploded ordnance alarm at european technical centern pdf 269.94Кб
20140618-der spiegel-report on an xkeyscore training session at the ecc dagger complex pdf 402.49Кб
20140618-der spiegel-report on data exchange between the nsa and bnd within the jsa framework pdf 150.04Кб
20140618-der spiegel-report on the beginnings of the european security center esc in the dagger complex pdf 287.03Кб
20140618-der spiegel-report on the changing of the escs name to european security operations center esoc pdf 273.93Кб
20140618-der_spiegel-report_on_the_nsas_access_to_tempora.pdf 280.23Кб
20140618-der spiegel-report on the one-year anniversary of the nsa liaison unit suslag in bad aibling pdf 334.72Кб
20140618-der spiegel-report on the surveillance of african countries by jsa pdf 254.78Кб
20140618-der spiegel-report on the technical expansion of the european technical center in wiesbaden pdf 218.91Кб
20140618-der_spiegel-report_on_the_work_of_nsacss_europe.pdf 299.81Кб
20140618-der spiegel-restrictions on the technical surveillance performed by jsa pdf 214.19Кб
20140618-der_spiegel-us_sites_with_nsa_personnel_in_germany.pdf 84.77Кб
20140618-der_spiegel-world_map_from_the_boundless_informant_program.pdf 302.62Кб
20140618-DerSpiegel-agenda for the visit of bsi vice president andreas konen to the nsa pdf 120.15Кб
20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker pdf 204.84Кб
20140618-DerSpiegel-internal nsa discussion guidelines relating to cooperation with the bnd and bfv pdf 326.75Кб
20140618-DerSpiegel-presentation on the nsacia unit special collection service pdf 1.83Мб
20140618-DerSpiegel-zoom of a boundless informant document with project names pdf 125.61Кб
20140630-WaPo-affidavit of keith alexander regarding spying on foreign entities pdf 19.19Кб
20140630-WaPo-fisa_amendments_act_summary_document_1.pdf 52.44Кб
20140630-WaPo-fisa judges order authorizing surveillance of foreign governments and organizations pdf 37.12Кб
20140630-WaPo-list of governments and organizations authorized for surveillance pdf 120.12Кб
20140630-WaPo-odni_certification_regarding_foreign_entities.pdf 269.07Кб
20140709-Intercept-spying_on_muslim-american_leaders.pdf 294.37Кб
20140714-Intercept-jtrigall.pdf 1.06Мб
20140723-Intercept-March-2013-Watchlisting-Guidance.pdf 29.39Мб
20140723-WaPo-Post-Signals-Intelligence-Authority-Decision-Tree.pdf 58.95Кб
20140725-Intercept-Saudi-Arabia-Information-Paper.pdf 325.13Кб
20140803-Intercept-Israel-US-1999-Agreement.pdf 2.01Мб
20140803-Intercept-NSA-Intelligence-Relationship-With-Israel.pdf 212.07Кб
20140805-Intercept-Directorate-of-Terrorist-Identities-Strategic-Accomplishments-2013 pdf 1.72Мб
20140812-Intercept-GCHQ-Covert-Mobile-Phones-Policy.pdf 86.05Кб
20140815-Heise-HACIENDA-Program.pdf 1.83Мб
20140825-Intercept-CIA-Colleagues-Enthusiastically-Welcome-NSA-Training.pdf 87.82Кб
20140825-Intercept-CRISSCROSSPROTON-Point-Paper.pdf 288.89Кб
20140825-Intercept-DNI-Decision-Memorandum-on-ICREACH.pdf 254.53Кб
20140825-Intercept-ICREACH-Black-Budget-Extract.pdf 36.61Кб
20140825-Intercept-ICREACH-Sharing-SIGINT-Comms-Metadata-with-the-Intel-Community-Memo pdf 194.58Кб
20140825-Intercept-ICREACH-Wholesale-Sharing.pdf 33.73Кб
20140825-Intercept-Metadata-Policy-Conference.pdf 181.00Кб
20140825-Intercept-Metadata-Sharing-Memorandum.pdf 392.62Кб
20140825-The-Intercept-Sharing-Communications-Metadata-Across-the-USIC-ICREACH pdf 3.92Мб
20140831-spiegel-collaboration_in_overdrive.pdf 335.35Кб
20140831-spiegel-iraq_uk_load_sharing_carriers.pdf 376.78Кб
20140831-spiegel-jordan_belgium.pdf 608.65Кб
20140831-spiegel-kurdistan_regional_government.pdf 623.14Кб
20140831-Spiegel-NCRs-with-Foreign-Relations-Missions-Become-SUSLAs.pdf 374.82Кб
20140831-spiegel-nsa_intelligence_relationship_with_turkey.pdf 782.88Кб
20140831-spiegel-nsas_oldest_third_party_partnership.pdf 397.78Кб
20140831-spiegel-sinio_seminar_tough_times_for_turkey.pdf 255.96Кб
20140831-spiegel-sinio_seminar_turkey_and_the_kurds.pdf 271.21Кб
20140831-spiegel-sinio_seminar_turkish_elections.pdf 272.57Кб
20140831-spiegel-turkey_and_the_pkk.pdf 669.60Кб
20140831-spiegel-turkey_at_the_g20_pre-meeting.pdf 206.81Кб
20140831-spiegel-turkey_energy_company_development.pdf 149.69Кб
20140831-spiegel-turkish_signal_intelligence_chief_agenda.pdf 374.93Кб
20140905-intercept-quadrennial intelligence community review final report pdf 3.49Мб
20140914-intercept-ferguson_visit_precis.pdf 231.71Кб
20140914-intercept-key_activities_in_progress.pdf 228.10Кб
20140914-intercept-speargun_phase_one.pdf 54.17Кб
20140914-intercept-speargun_underway.pdf 127.01Кб
20140914-spiegel-satellite_teleport_knowledge.pdf 4.38Мб
20140914-spiegel-treasure_map_announces_a_new_release.pdf 551.96Кб
20140914-spiegel-treasure_map_presentation.pdf 5.73Мб
20141010-intercept-cno_core_secrets_security_structure.pdf 329.13Кб
20141010-intercept-cno_core_secrets_slide_slices.pdf 1.10Мб
20141010-intercept-computer_network_exploitation_classification_guide.pdf 965.80Кб
20141010-intercept-eci_compartments.pdf 534.56Кб
20141010-intercept-eci_pawleys_classification_guide.pdf 434.74Кб
20141010-intercept-eci_whipgenie_classification_guide.pdf 684.37Кб
20141010-intercept-exceptionally_controlled_information_listing.pdf 934.86Кб
20141010-intercept-sentry_eagle_brief_sheet.pdf 1.22Мб
20141010-intercept-tarex_classification_guide.pdf 757.56Кб
20141125-sueddeutsche-access_breakdown.pdf 25.87Кб
20141125-sz-cable_master_list_ac.pdf 158.76Кб
20141125-sz-cable_master_list_fea.pdf 59.73Кб
20141125-sz-cable_regions.pdf 32.99Кб
20141125-sz-cables_no_current_access.pdf 27.72Кб
20141125-sz-cables_where_we_are.pdf 27.59Кб
20141125-sz-cables_where_we_want_to_be.pdf 26.76Кб
20141125-sz-cne_endpoint_project_load.pdf 61.16Кб
20141125-sz-mti_access_project_weekly_status_february_6_2009.pdf 70.59Кб
20141125-sz-mti_access_project_weekly_status_june_27_2008.pdf 95.64Кб
20141125-sz-mti_access_project_weekly_status_november_28_2008.pdf 92.08Кб
20141125-sz-partner_cables.pdf 151.74Кб
20141125-sz-ptc_glossary.pdf 121.02Кб
20141125-sz-windstop_system_highlights.pdf 137.21Кб
20141204-intercept-auroragold_project_overview.pdf 418.03Кб
20141204-intercept-auroragold target technology trends center support to wpmo 0 pdf 1.60Мб
20141204-intercept-auroragold_working_aid.pdf 427.75Кб
20141204-intercept-auroragold_working_group.pdf 22.60Мб
20141204-intercept-ir21_a_technology_warning_mechanism_0.pdf 1.75Мб
20141204-intercept-nsa first ever collect of high interest 4g cellular signal pdf 15.35Кб
20141204-intercept-nsa_gchq_csec_network_tradecraft_advancement.pdf 239.41Кб
20141204-intercept-opulant_pup_encryption_attack.pdf 35.96Кб
20141204-intercept-wolframite_encryption_attack.pdf 71.90Кб
20141214-intercept-gchq_automated_noc_detection.pdf 3.69Мб
20141214-intercept-gchq_hopscotch.pdf 10.90Кб
20141214-intercept-gchq_making_network_sense_of_the_encryption.pdf 2.33Мб
20141214-intercept-gchq_nac_review_april_june_2011.pdf 29.74Кб
20141214-intercept-gchq_nac_review_january_march_2012.pdf 17.74Кб
20141214-intercept-gchq_nac_review_july_sept_2011.pdf 25.55Кб
20141214-intercept-gchq_nac_review_october_december_2011.pdf 80.96Кб
20141214-intercept-gchq_stargate_cne_requirements.pdf 269.85Кб
20141214-Intercept-gchq-mobile-networks-in-my-noc-world.pdf 1.86Мб
20141228-speigel-a potential technique to deanonymise users of the tor network 0 pdf 2.05Мб
20141228-speigel-analysis from ssl-tls connections through gchq in the flying pig database 0 pdf 1.46Мб
20141228-speigel-analytic challenges from active-passive integration when nsa attacks ipsec vpns 0 pdf 1.96Мб
20141228-speigel-analytics_on_security_of_tor_hidden_services_0.pdf 3.65Мб
20141228-speigel-bluesnort program on net defense from encrypted communications 0 pdf 1.31Мб
20141228-speigel-canadian_document_from_ces_on_tls_trends_0.pdf 1.91Мб
20141228-speigel-classification_guide_for_cryptanalysis_0.pdf 276.64Кб
20141228-speigel-decryption of vpn connections within the valiantsurf program 0 pdf 2.01Мб
20141228-speigel-description_of_existing_projects_on_vpn_decryption_0.pdf 487.65Кб
20141228-spiegel- national information assurance research laboratory niarl tundra pdf 1.97Мб
20141228-spiegel-description of voip telephony encryption methods and other ways to attack pdf 284.65Кб
20141228-spiegel-description on the processing of vpn data packets within the turmoil program pdf 1.58Мб
20141228-spiegel-explanation of a potential technique to deanonymise users of the tor network pdf 2.41Мб
20141228-spiegel-explanation of the gallantwave that decrypts vpn traffic within longhaul pdf 570.28Кб
20141228-spiegel-explanation of the poisennut product and its role when attacking vpn pdf 250.23Кб
20141228-spiegel-explanation of the transform engine emulator when attacking vpn pdf 186.96Кб
20141228-spiegel-explanation of the turmoil gallantwave program and its role when attacking vpn 0 pdf 257.89Кб
20141228-spiegel-explanation on the spin9 program on end-to-end attacks on vpn pdf 6.52Мб
20141228-spiegel-gchq_briefing_on_the_bullrun_program.pdf 429.34Кб
20141228-spiegel-gchq presentation on the bullrun programs decryption capabilities pdf 844.20Кб
20141228-spiegel-general_description_how_nsa_handles_encrypted_traffic.pdf 230.49Кб
20141228-spiegel-guide for analysts on how to use the prism skype collection pdf 896.28Кб
20141228-spiegel-intercept_with_otr_encrypted_chat.pdf 169.56Кб
20141228-spiegel-intercept_with_pgp_encrypted_message.pdf 100.87Кб
20141228-spiegel-intro to the vpn exploitation process mentioning the protocols attacked - pptp ipsec ssl ssh pdf 5.89Мб
20141228-spiegel-malibu architecture overview to exploit vpn communication pdf 620.61Кб
20150117-speigel-analysis of chinese methods and performed actions in the context of computer network exploitation pdf 1.34Мб
20150117-speigel-classification guide for computer network exploitation cne pdf 1.00Мб
20150117-speigel-combination of offensive and defensive missions - how fourth-party missions are being performed pdf 226.21Кб
20150117-speigel-csec document about the recognition of trojans and other network based anomaly pdf 3.37Мб
20150117-speigel-csec document on the handling of existing trojans when trojanizing computers pdf 3.87Мб
20150117-speigel-document about the expansion of the remote operations center roc on endpoint operations pdf 228.14Кб
20150117-speigel-document explaining the role of the remote operations center roc pdf 167.81Кб
20150117-spiegel-nsa example snowglobe in which a suspected french government trojan is analyzed to find out if it can be helpful for own interests 0 pdf 3.30Мб
20150117-spiegel-nsa_fourth_party_access_-_i_drink_your_milkshake_.pdf 3.60Мб
20150117-spiegel-nsa program tutelage to instrumentalize third party attack tools pdf 4.11Мб
20150117-spiegel-nsa project description to recognize and process data that comes from third party attacks on computers pdf 352.45Кб
20150117-spiegel-nsa training course material on computer network operations pdf 6.95Мб
20150117-spiegel-overview of methods for nsa integrated cyber operations 0 pdf 2.55Мб
20150117-spiegel-overview of the transgression program to analyze and exploit foreign cna-cne exploits pdf 2.06Мб
20150117-spiegel-overview on the nsa use of bots and the defiantwarrior program pdf 9.43Мб
20150117-spiegel-process analysts choose their data requirement and then get to know the tools that can do the job 0 pdf 1.57Мб
20150117-spiegel-projects of the tao-ato department such as the remote destruction of network cards pdf 1.38Мб
20150117-spiegel-quantumtheory is a set of technologies allowing man-on-the-side interference attacks on tcp-ip connections includes straightbizarre and daredev pdf 1.55Мб
20150117-spiegel-report of an nsa employee about a backdoor in the openssh daemon pdf 402.93Кб
20150117-spiegel-sample code of a malware program from the five eyes alliance pdf 184.88Кб
20150117-spiegel-supply-chain interdiction - stealthy techniques can crack some of sigints hardest targets pdf 212.91Кб
20150117-spiegel-technical_description_of_the_fashioncleft_protocol_.pdf 2.86Мб
20150117-spiegel-the fashioncleft protocol nsa uses to exfiltrate data from trojans and implants to the nsa 0 pdf 2.60Мб
20150128-cbc-cse_presentation_on_the_levitation_project.pdf 3.73Мб
20150128-intercept-cse_presentation_on_the_levitation_project.pdf 3.73Мб
20150204-intercept-lovely_horse_0.pdf 66.96Кб
20150204-intercept-nato_civilian_intelligence_council_cyber_panel.pdf 236.11Кб
20150204-intercept-open_source_for_cyber_defence_progress.pdf 65.69Кб
20150204-intercept-who_else_is_targeting_your_target_collecting.pdf 52.44Кб
20150210-intercept-iran_current_topics_-_interactions_with_gchq.pdf 381.91Кб
20150219-Intercept-CCNE-Email-Addresses-Jan10-Mar10-Trial.pdf 76.75Кб
20150219-Intercept-CCNE-Email-Harvesting-Jan10-Mar10-Trial.pdf 77.15Кб
20150219-Intercept-CCNE-Stats-Summaries-Jan10-Mar10-Trial.pdf 77.06Кб
20150219-Intercept-CCNE-Successes-Jan10-Mar10-Trial.pdf 71.99Кб
20150219-Intercept-CNE-Access-to-Core-Mobile-Networks.pdf 77.86Кб
20150219-Intercept-Dapino-Gamma-CNE-Presence-Wiki.pdf 55.26Кб
20150219-Intercept-Dapino-Gamma-Gemalto-Yuaawaa-Wiki.pdf 63.68Кб
20150219-Intercept-Dapino-Gamma-Target-Personalisation-Centres.pdf 89.38Кб
20150219-Intercept-IMSIs-Identified-With-Ki-Data-For-Network.pdf 82.55Кб
20150219-Intercept-PCS-Harvesting-At-Scale.pdf 2.75Мб
20150219-Intercept-Where-are-These-Keys.pdf 80.28Кб
ambassadesFrance.pdf 319.96Кб
blackhat-Alexander-keynote.pdf 15.36Мб
bullrun-briefing-sheet-from-gchq.pdf 2.60Мб
ccne-email-addresses-jan10-mar10-trial.pdf 82.49Кб
ccne-email-harvesting-jan10-mar10-trial.pdf 81.02Кб
ccne-stats-summaries-jan10-mar10-trial.pdf 79.57Кб
ccne-successes-jan10-mar10-trial.pdf 64.17Кб
CLEANED004.-Cover_Memo-Sealed.pdf 1.05Мб
CLEANED007.-CongNotificationInfoMemoSSCI_10_Apr_09-Sealedpdf.pdf 2.15Мб
CLEANED032.-Basket_2_-_NSA_training.log.pdf 15.75Мб
CLEANED096.-NSA_summary_of_BR_requirements_(maybe_Feb_2009)-.pdf 236.94Кб
CLEANEDFinal-USSID_SP0018_Annex_J.pdf 532.64Кб
CLEANEDFinal-USSID_SP0018.pdf 6.60Мб
CLEANEDPRTT-1.pdf 24.70Мб
CLEANEDPRTT-2.pdf 3.56Мб
cne-access-to-core-mobile-networks.pdf 465.85Кб
csec-br-spy.pdf 616.64Кб
dapino-gamma-cne-presence-wiki.pdf 73.11Кб
dapino-gamma-gemalto-yuaawaa-wiki.pdf 103.25Кб
dapino-gamma-target-personalisation-centres.pdf 116.97Кб
discovery-sigint-targeting-scenarios-and.pdf 726.84Кб
doc-6-cyber-threat-capabilities.pdf 19.82Мб
doj-nsa-memo.pdf 1.36Мб
doody.pdf 1.31Мб
dsd-3g.pdf 886.34Кб
ericsson_reply.pdf 64.13Кб
europebriefingnote_en.pdf 797.51Кб
eyes_wide_open_v1.pdf 4.19Мб
FAA-Certification_Renewals_with_Caveats.pdf 138.31Кб
FAA-Minimization-Procedures.pdf 574.83Кб
FAA-Targeting_Procedures.pdf 615.65Кб
FISC-Order,-BR-06-12.pdf 292.11Кб
gchq-g20-spy.pdf 3.23Мб
gchq-mullenize.pdf 21.97Кб
gchq-royal-concierge-de.pdf 120.85Кб
gchq-se-fra-quantum-3.pdf 31.02Кб
General-Alexander-Letter-re-NSA-Fact-Sheet-Inaccuracy.pdf 184.30Кб
identity-intelligence.pdf 2.14Мб
i-hunt-sys-admins.pdf 21.81Мб
imsis-identified-with-ki-data-for-network.pdf 75.32Кб
invisibility-report-9-0-final.pdf 89.54Кб
jtrigall.pdf 1.30Мб
Judge-Walton_Answers_to_Questions_re_FISC.pdf 1.56Мб
Lesson-4_-_So_you_got_US_Person_Information.pdf 147.08Кб
letter_to_companies.pdf 100.29Кб
media-34093.pdf 1.15Мб
media-35509.pdf 1.51Мб
media-35510.pdf 4.33Мб
media-35511.pdf 9.92Мб
media-35512.pdf 1.34Мб
media-35513.pdf 3.39Мб
media-35514.pdf 835.07Кб
media-35515.pdf 24.30Мб
media-35516.pdf 5.85Мб
media-35517.pdf 575.91Кб
media-35518.pdf 2.80Мб
media-35519.pdf 892.10Кб
media-35520.pdf 4.34Мб
media-35521.pdf 15.91Мб
media-35522.pdf 1.11Мб
media-35523.pdf 366.46Кб
media-35524.pdf 508.05Кб
media-35525.pdf 665.46Кб
media-35526.pdf 12.28Мб
media-35527.pdf 7.86Мб
media-35528.pdf 2.27Мб
media-35529.pdf 20.99Мб
media-35530.pdf 2.33Мб
media-35531.pdf 494.42Кб
media-35532.pdf 1.43Мб
media-35533.pdf 4.11Мб
media-35534.pdf 2.13Мб
media-35535.pdf 6.85Мб
media-35536.pdf 571.16Кб
media-35537.pdf 574.47Кб
media-35538.pdf 3.84Мб
media-35539.pdf 15.45Мб
media-35540.pdf 44.17Мб
media-35541.pdf 426.04Кб
media-35542.pdf 3.47Мб
media-35543.pdf 3.89Мб
media-35544.pdf 535.29Кб
media-35545.pdf 177.57Кб
media-35546.pdf 599.27Кб
media-35547.pdf 383.11Кб
media-35548.pdf 766.90Кб
media-35549.pdf 1012.75Кб
media-35550.pdf 4.49Мб
media-35551.pdf 5.06Мб
media-35552.pdf 404.70Кб
media-35653.pdf 620.45Кб
media-35654.pdf 394.03Кб
media-35655.pdf 807.87Кб
media-35656.pdf 2.38Мб
media-35657.pdf 16.90Мб
media-35658.pdf 12.19Мб
media-35659.pdf 980.05Кб
media-35661.pdf 3.48Мб
media-35662.pdf 2.89Мб
media-35663.pdf 1.02Мб
media-35664.pdf 1.51Мб
media-35665.pdf 8.68Мб
media-35666.pdf 2.70Мб
media-35667.pdf 6.63Мб
media-35668.pdf 167.47Кб
media-35669.pdf 1.13Мб
media-35670.pdf 26.27Мб
media-35671.pdf 30.24Мб
media-35672.pdf 5.11Мб
media-35673.pdf 6.59Мб
media-35674.pdf 36.53Мб
media-35675.pdf 18.74Мб
media-35676.pdf 6.65Мб
media-35677.pdf 27.61Мб
media-35678.pdf 7.11Мб
media-35680.pdf 602.64Кб
media-35681.pdf 523.64Кб
media-35682.pdf 3.26Мб
media-35683.pdf 8.90Мб
media-35684.pdf 6.22Мб
media-35685.pdf 40.27Мб
media-35686.pdf 18.77Мб
media-35687.pdf 2.50Мб
media-35688.pdf 11.49Мб
media-35689.pdf 27.61Мб
nokia_reply.pdf 101.41Кб
no-place-to-hide.pdf 86.95Мб
nsa-5-eyes-partners.pdf 20.61Кб
nsa-5-eyes-spy-g20-dk.pdf 188.35Кб
NSA-Boundless_Informant_Frequently_Asked_Questions.pdf 1.40Мб
NSA-Boundless_Informant_Powerpoint_Slides.pdf 72.09Мб
nsa-boundless-informant.pdf 189.40Кб
nsa-boundless-informant-faq.pdf 1.75Мб
NSA-Boundless-Informant-Frequently-Asked-Questions.pdf 1.40Мб
nsa-boundlessinformant-no-33m.pdf 5.96Мб
nsa-boundless-informant-slides.pdf 72.08Мб
nsabullrun.pdf 2.60Мб
nsa-bullrun-2-16-guardian-13-0905.pdf 9.64Мб
nsa-bullrun-brief-nyt-13-0905.pdf 92.52Кб
nsa-bullrun-brief-propublica-13-0905.pdf 2.60Мб
nsa-cable-spy-types.pdf 1.01Мб
nsa-catalog-appelbaum.pdf 950.64Кб
nsa-chalkfun.pdf 68.00Кб
nsa-close-access-sigads.pdf 378.97Кб
nsa-cotraveler.pdf 602.83Кб
nsa-cryptanalysis-2-12-guardian-13-0905.pdf 4.00Мб
nsa-csec-partners.pdf 93.10Кб
nsa-css-mission.pdf 100.25Кб
nsa-dutch-sigint.pdf 667.61Кб
nsa-egotisticalgiraffe.pdf 3.06Мб
nsa-fascia.pdf 141.09Кб
nsa-finance-spy-de.pdf 726.98Кб
nsa-fisa-certification.pdf 45.84Кб
nsa-fisa-minimization.pdf 799.14Кб
nsa-fisa-targeting.pdf 859.04Кб
nsa-g8-g20-spying.pdf 191.56Кб
nsa-g8-g20-spying-02.pdf 196.25Кб
nsa-gchq-fra-quantum.pdf 294.63Кб
nsa-gchq-se-fra-comint.pdf 397.64Кб
nsa-gchq-spy-games.pdf 2.24Мб
nsa-ghost-machine.pdf 2.66Мб
nsa-gsm-tracking.pdf 326.47Кб
nsa-hosts-fr-spies.pdf 921.60Кб
nsa-iat-tor.pdf 2.61Мб
NSA-IG_Report.pdf 18.77Мб
nsa-israel-spy.pdf 3.46Мб
NSA-Memo_to_DOD_-_Proposed_Amendment_to_Conduct_Analysis_of_Metadata.pdf 1.23Мб
NSA-Memo-to-DOD---Proposed-Amendment-to-Conduct-Analysis-of-Metadata.pdf 1.23Мб
nsa-microsoft-cloud-exploit.pdf 567.25Кб
NSA-Missions_Authorities_Oversight_and_Partnerships.pdf 114.04Кб
NSA-Missions-Authorities-Oversight-and-Partnerships.pdf 114.04Кб
nsa-muslim-porn.pdf 1.32Мб
nsa-overcollection.pdf 3.03Мб
nsa-ppd-20.pdf 1.28Мб
nsa-prism-13-1021.pdf 2.06Мб
nsa-prism-dk.pdf 918.28Кб
nsa-prism-guardian-13-1101.pdf 2.06Мб
nsa-quantum-computer.pdf 515.03Кб
nsa-quantum-computer-2.pdf 138.46Кб
nsa-quantum-tasking.pdf 5.46Мб
nsa-quantumtheory.pdf 2.36Мб
nsa-scissors.pdf 295.16Кб
nsa-scissors-2.pdf 3.02Мб
NSA-Section_702_'Loop_Hole'.pdf 64.72Кб
NSA-Section_702_and_Section_215_Factsheets.pdf 1.76Мб
NSA-Section-702-and-Section-215-Factsheets.pdf 1.76Мб
nsa-se-fra-quantum-2.pdf 34.04Кб
nsa-se-fra-relationship.pdf 551.45Кб
nsa-se-fra-ru-baltic.pdf 49.54Кб
nsa-se-fra-spying-agenda.pdf 1.99Мб
nsa-se-fra-xkeyscore.pdf 1.16Мб
nsa-se-fra-xkeyscore-slide.pdf 570.25Кб
nsa-se-spies.pdf 455.42Кб
nsa-sigint-cryptologic-platform.pdf 544.77Кб
nsa-sigint-enabling-guardian-13-0905.pdf 5.42Мб
nsa-sigint-enabling-nyt-13-0905.pdf 347.68Кб
nsa-sigint-enabling-propublica-13-0905.pdf 2.02Мб
nsa-sigint-strategic-mission-2007.pdf 1.89Мб
nsa-sigint-strategic-mission-2013.pdf 2.58Мб
nsa-sigint-strategy-2012-2016.pdf 372.29Кб
nsa-sigint-successes.pdf 3.47Мб
nsa-smartphones.pdf 741.38Кб
nsa-smartphones-analysis.pdf 848.49Кб
nsa-sms-exploit.pdf 1.66Мб
nsa-spy-games.pdf 78.79Кб
nsa-sso1-guardian-13-1101.pdf 182.69Кб
nsa-sso2-guardian-13-1101.pdf 107.27Кб
nsa-sso-content.pdf 551.25Кб
nsa-sso-dk.pdf 222.05Кб
nsa-sso-overview.pdf 19.81Кб
nsa-sso-slides.pdf 986.06Кб
nsa-stellar-wind.pdf 7.99Мб
nsa-tao-ant.pdf 164.54Кб
nsa-tao-ant-pdf.pdf 962.52Кб
nsa-tao-intro.pdf 3.08Мб
nsa-target-location.pdf 132.19Кб
nsa-tor.pdf 265.66Кб
nsa-tor-stinks.pdf 3.99Мб
nsa-verizon-spy.pdf 129.72Кб
nsa-wanadoo-alcatel.pdf 274.59Кб
nsa-windstop.pdf 596.92Кб
nsa-windstop-muscular-incenser.pdf 1.01Мб
NSA-XKeyscore_Powerpoint.pdf 12.23Мб
nsa-xkeyscore.pdf 3.48Мб
NSA-XKeyscore-Powerpoint.pdf 12.23Мб
nsa-xkeyscore-sources.pdf 29.48Кб
nsa-xkeyscore-tor-slides.pdf 160.53Кб
nsa-yahoo-google-exploit.pdf 2.99Мб
pcs-harvesting-at-scale.pdf 3.40Мб
phonesgchq.pdf 1.84Мб
phonesnsa.pdf 4.62Мб
PRISM-Overview_Powerpoint_Slides.pdf 266.34Кб
PRISM-Overview-Powerpoint-Slides.pdf 266.34Кб
PRISM-Powerpoint_Slides_re_Data_Acquisition.pdf 294.85Кб
PRISM-Powerpoint-Slides-re-Data-Acquisition.pdf 294.85Кб
psychology-a-new-kind-of-sigdev.pdf 27.85Мб
rcs-9-admin-final.pdf 4.27Мб
rcs-9-analyst-final.pdf 8.22Мб
rcs-9-sysadmin-final.pdf 11.45Мб
rcs-9-technician-final.pdf 13.42Мб
remote-control-system-9-0-changelog-final.pdf 82.99Кб
remote-control-system-9-1-changelog-final.pdf 46.49Кб
samsung_reply_2.pdf 2.64Мб
samsung_reply.pdf 2.77Мб
saudi-arabia-information-paper.pdf 335.03Кб
Section-215_-_Obama_Administration_White_Paper.pdf 156.48Кб
Section-215_-_Primary_Order.pdf 5.61Мб
Section-215_-_Secondary_Order_-_Verizon.pdf 1.06Мб
Section-215---Obama-Administration-White-Paper.pdf 156.48Кб
Section-215---Primary-Order.pdf 5.61Мб
Section-215---Secondary-Order---Verizon.pdf 1.06Мб
SID-Oversight_and_Compliance.pdf 1.11Мб
SID-Oversight-and-Compliance.pdf 1.11Мб
sigint-enabling-project.pdf 2.06Мб
sigint-enabling-project2.pdf 2.02Мб
spy-budget-fy13.pdf 2.26Мб
Targeting-Rationale_-_TAR.pdf 516.77Кб
Targeting-Rationale---TAR.pdf 516.77Кб
the-art-of-deception-training-for-a-new.pdf 27.76Мб
the-nsa-and-gchqs-quantumtheory-hacking-tactics.pdf 451.06Кб
turbine-and-turmoil.pdf 441.18Кб
UPSTREAM-Powerpoint_Slide.pdf 78.22Кб
UPSTREAM-Powerpoint-Slide.pdf 78.22Кб
vpn-and-voip-exploitation-with-hammerchant.pdf 551.01Кб
What_We_Need_to_Learn_from_Snowden.pdf 41.31Кб
where-are-these-keys.pdf 85.63Кб
Wyden-Udall-Letter_on_NSA_Fact_Sheet_Inaccuracy.pdf 173.96Кб
Wyden-Udall-Letter-on-NSA-Fact-Sheet-Inaccuracy.pdf 173.96Кб
Статистика распространения по странам
Нидерланды (NL) 4
США (US) 3
Венгрия (HU) 2
Канада (CA) 2
Исландия (IS) 1
Италия (IT) 1
Испания (ES) 1
Чешская Республика (CZ) 1
Россия (RU) 1
Швейцария (CH) 1
Гватемала (GT) 1
Франция (FR) 1
Всего 19
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент