Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
_20131119-odni-nsa_course_materials_module_4_v.28.pdf |
2.67Мб |
01302014-dagbladet-cop15_interception_document.pdf |
60.12Кб |
01312014-cbc-csec_airport_wifi_tracking.pdf |
2.11Мб |
2009-OIG_Report_on_Bulk_Collection.pdf |
3.75Мб |
2011-OIG_Report_on_Bulk_Collection.pdf |
4.30Мб |
20130605-guard-verizon_215_secondary_order.pdf |
127.79Кб |
20130606-wapo-prism.pdf |
562.03Кб |
20130608-guard-boundless_informant_capabilities.pdf |
719.29Кб |
20130608-guard-boundless_informant_faq.pdf |
532.16Кб |
20130608-guard-prism.pdf |
132.25Кб |
20130620-guard-702_minimization_procedures.pdf |
509.84Кб |
20130620-guard-702_targeting_procedures.pdf |
539.17Кб |
20130627-guard-2007_memo_on_us_person_metadata.pdf |
974.10Кб |
20130627-guard-nsa_oig_2009_report.pdf |
7.34Мб |
20130629-wapo-prism.pdf |
602.62Кб |
20130630-guard-dropmire_.pdf |
16.25Кб |
20130710-wapo-upstream.pdf |
207.76Кб |
20130731-guard-xkeyscore_training_slides.pdf |
27.26Мб |
20130809-guard-702_glossary.pdf |
151.72Кб |
20130816-wapo-sid_oversight.pdf |
1.20Мб |
20130816-wapo-so_you_got_a_us_person.pdf |
147.08Кб |
20130816-wapo-sso_news_article.pdf |
94.89Кб |
20130816-wapo-targeting_rationale.pdf |
457.02Кб |
20130830_cryptome_congressional_budget_2013.pdf |
2.26Мб |
2013-08-30_cryptome_congressional_budget_2013.pdf |
2.26Мб |
20130903-globo-satc.pdf |
1.56Мб |
20130905-guard-bullrun.pdf |
686.80Кб |
20130905-guard-cryptanalysis_classification.pdf |
248.25Кб |
20130905-guard-sigint_enabling.pdf |
382.13Кб |
20130908-globo-stormbew_tv.pdf |
90.66Кб |
20130908-globo-stormbrew_tv.pdf |
90.66Кб |
20130908-globo-tv.pdf |
649.75Кб |
20130909-spiegel-smartphones.pdf |
519.64Кб |
20130911-guard-israel_sharing_0.pdf |
808.09Кб |
20130916-spiegel-credit_card_transactions.pdf |
422.18Кб |
20130920-spiegel-belgacom.pdf |
317.78Кб |
20130928-nyt-contact_chaining.pdf |
280.44Кб |
20130928-nyt-syanpse.pdf |
186.37Кб |
20131004-guard-egotistical_giraffe.pdf |
1.96Мб |
20131004-guard-iat_tor.pdf |
1000.26Кб |
20131004-guard-tor_stinks.pdf |
2.00Мб |
20131004-wapo-gchq_mullenize.pdf |
1.26Мб |
20131004-wapo-tor.pdf |
310.58Кб |
20131014-wapo-collection_optimization.pdf |
59.96Кб |
20131014-wapo-content_acquisition_optimization1.pdf |
2.70Мб |
20131014-wapo-content_acquisition_optimization2.pdf |
2.50Мб |
20131020-spiegel-mexican_president.pdf |
180.92Кб |
20131021-monde-boundless_informant_france.pdf |
136.65Кб |
20131021-monde-close_access_sigads.pdf |
198.53Кб |
20131021-monde-wanadoo_alcatel.pdf |
115.18Кб |
20131022-monde-prism_april_2013.pdf |
1.26Мб |
20131024-guard-phones_world_leaders.pdf |
147.73Кб |
20131025-monde-french_cyberattacks.pdf |
666.39Кб |
20131027-spiegel-embassy.pdf |
632.37Кб |
20131028-mundo-spain_collections.pdf |
15.12Кб |
20131030-wapo-muscular_smiley.pdf |
244.01Кб |
20131030-wapo-muscular.pdf |
96.50Кб |
20131101-guard-corporate_reporting.pdf |
121.06Кб |
20131104-mundo-boundless_informant.pdf |
621.45Кб |
20131104-mundo-info_sharing_partners.pdf |
103.45Кб |
20131104-nyt-collection_accesses.pdf |
48.94Кб |
20131104-nyt-sigint_goals.pdf |
1.68Мб |
20131104-nyt-sigint_strategic_plan.pdf |
2.38Мб |
20131104-wapo-optimization_google.pdf |
2.12Мб |
20131104-wapo-sso_overview.pdf |
465.47Кб |
20131104-wapo-windstop.pdf |
94.00Кб |
20131117-guardian-dsd_3g.pdf |
340.47Кб |
20131117-spiegel-royal_concierge.pdf |
93.92Кб |
20131119-dagbladet-norway_collection_0.pdf |
53.53Кб |
20131119-odni-ag_guidelines_for_domestic_fbi_operations.pdf |
7.34Мб |
20131119-odni-interim_competency_test_for_access_to_fisa_data.pdf |
171.14Кб |
20131119-odni-nsa_core_intelligence_oversight_training.pdf |
15.62Мб |
20131119-odni-nsa_course_materials_intro_v.13.pdf |
378.08Кб |
20131119-odni-nsa_course_materials_module_1_v.17.pdf |
1.01Мб |
20131119-odni-nsa_course_materials_module_2_v.16.pdf |
811.74Кб |
20131119-odni-nsa_course_materials_module_3_v.22.pdf |
1.35Мб |
20131119-odni-nsa_course_materials_module_4_v.28.pdf |
2.67Мб |
20131119-odni-nsa_course_materials_module_5_v.24.pdf |
906.48Кб |
20131119-odni-nsa_course_materials_module_6_analytic_personal_v.18.pdf |
1019.92Кб |
20131119-odni-nsa_course_materials_module_6_tech_personnel_v.25.pdf |
2.40Мб |
20131119-odni-nsa cryptological school course slides on legal compliance and minimization procedures pdf |
17.02Мб |
20131119-odni-nsa guidance memo on legal standards for searching bulk metadata pdf |
1.79Мб |
20131119-odni-nsa_metadata_collection_training_slides_.pdf |
7.46Мб |
20131119-odni-nsa summary of requirements for collection of bulk metadata pdf |
293.91Кб |
20131119-odni-office of general council business record analyst training slides pdf |
2.13Мб |
20131119-odni-united states signals intelligence directive 18 appendix j pdf |
4.34Мб |
20131119-odni-united states signals intelligence directive 18 jan 25 2011 pdf |
9.34Мб |
20131119-odni-verification_slide.pdf |
86.98Кб |
20131120-guard-collection processing and dissemination of allied communications pdf |
246.38Кб |
20131122-dagbladet-afghanistan_collection.pdf |
30.26Кб |
20131122-dagbladet-boundless_informant_faq.pdf |
274.13Кб |
20131122-dagbladet-boundless_informant.pdf |
5.71Мб |
20131123-nrc-nsa_malware.pdf |
145.98Кб |
20131123-nyt-sigint_strategy_feb_2012.pdf |
372.73Кб |
20131126-huffpo-radicalizers_pornography.pdf |
795.25Кб |
20131126-wapo-microsoft_cloud_exploitation.pdf |
2.37Мб |
20131126-wapo-microsoft_monkey_puzzle.pdf |
46.12Кб |
20131130-GlobeandMail-csec-br-spy.pdf |
616.64Кб |
20131202-cbc-g20.pdf |
136.32Кб |
20131202-guard-dsd_data.pdf |
152.84Кб |
20131204-wapo-chalkfun_foreignness.pdf |
61.37Кб |
20131204-wapo-fascia.pdf |
233.23Кб |
20131205-espresso-italy_spying.pdf |
168.78Кб |
20131205-svt-fra_russia.pdf |
93.61Кб |
20131209-nyt-nsa_games.pdf |
293.91Кб |
20131210-cbc-nsa_csec_partnership.pdf |
91.15Кб |
20131210-wapo-cotraveler_overview.pdf |
1.35Мб |
20131210-wapo-ghost_machine.pdf |
859.54Кб |
20131210-wapo-gsm_classification_guide.pdf |
143.10Кб |
20131210-wapo-location_cookies.pdf |
255.29Кб |
20131210-wapo-target_location.pdf |
133.22Кб |
20131211-svt-accomplishments_from_nsa.pdf |
191.24Кб |
20131211-svt-baltic_region.pdf |
152.42Кб |
20131211-svt-final_agenda_sweden_usa.pdf |
1015.03Кб |
20131211-svt-legal_issues_uk_regarding_sweden_and_quantum.pdf |
27.63Кб |
20131211-svt-nsa_internal_pm_on_fra.pdf |
189.71Кб |
20131211-svt-nsa_slides_xkeyscore.pdf |
562.66Кб |
20131211-svt-quantum_from_gchq.pdf |
37.53Кб |
20131211-svt-sweden_neutral.pdf |
182.87Кб |
20131211-svt-xkeyscore_slide_with_swedish_example.pdf |
195.51Кб |
20131211-svt-xkeyscore_sources.pdf |
37.27Кб |
20131211-svt-xkeyscore_sweden_meeting.pdf |
905.20Кб |
20131223-wapo-nsacss-mission.pdf |
100.25Кб |
20131230-appelbaum-nsa_ant_catalo.pdf |
6.87Мб |
20131230-appelbaum-nsa_ant_catalog.pdf |
6.87Мб |
20131230-spiegel-qfire.pdf |
2.14Мб |
20131230-spiegel-tao_intro.pdf |
2.23Мб |
20131230-spiegel-tao_quantum_tasking.pdf |
3.51Мб |
20131230-spiegel-tao_quantum_theory.pdf |
727.72Кб |
2013-watchlist-guidance.pdf |
26.49Мб |
20140102-wapo-quantum_computers_hard_targets.pdf |
374.72Кб |
20140102-wapo-quantum_computing.pdf |
139.98Кб |
20140116-guard-dishfire_presentation.pdf |
861.66Кб |
20140127-nbc-squeaky_dolphin.pdf |
17.36Мб |
20140127-nyt-converged_analysis_on_smartphone_devices.pdf |
848.49Кб |
20140127-nyt-mobile_theme_briefing.pdf |
131.50Кб |
20140128-guard-leaky_phone_apps_0.pdf |
222.27Кб |
20140128-guard-leaky_phone_apps.pdf |
81.85Кб |
20140130-information_dk-cop15_interception_document.pdf |
60.12Кб |
20140131-cbc-csec_airport_wifi_tracking.pdf |
2.11Мб |
20140204-nbc-british_spies_attacked_hactivist_anonymous.pdf |
1.13Мб |
20140207-nbc-gchq_honey_trap_cyber_attack_background_on_jtrig.pdf |
1.12Мб |
20140207-nbc-gchq honey trap cyber attack leveraging foreign journalists via jtrig pdf |
590.87Кб |
20140207-nrc-boundless_nederland.pdf |
1.07Мб |
20140211-intercept-drones_intercepting_communications.pdf |
365.83Кб |
20140218-intercept-discovery_sigint_targeting_scenarios_and_compliance.pdf |
631.45Кб |
20140218-intercept-gchq_sigdev_.pdf |
27.83Мб |
20140224-intercept-training_for_covert_online_operations.pdf |
4.28Мб |
20140227-guard-gchq_optic.pdf |
240.64Кб |
20140303-epic-doj_report_on_pen_register_fisa_orders.pdf |
3.70Мб |
20140305-nrc-dutch_shares_collected_anti-piracy_information_with_nsa.pdf |
535.99Кб |
20140307-intercept-nsa_ask_zelda_an_interview_with_zelda.pdf |
65.09Кб |
20140307-intercept-nsa_ask_zelda_guilty_until_proven_innocent.pdf |
47.54Кб |
20140307-intercept-nsa_ask_zelda_is_bain_de_soleil_a_bane_on_the_nsa.pdf |
55.21Кб |
20140307-intercept-nsa_ask_zelda_watching_every_word_in_snitch_city.pdf |
40.11Кб |
20140311-nyt-ashcroft_memo_on_intelligence_sharing_procedures.pdf |
117.86Кб |
20140311-nyt-classification guide for fisa the protect america act and the fisa amendments act pdf |
876.96Кб |
20140311-nyt-classification_guide_for_stellarwind_program_0.pdf |
2.17Мб |
20140311-nyt-nsa_memo_expands_access_to_fisa_information.pdf |
440.00Кб |
20140311-nyt-nsa_timeline_of_surveillance_law_developments.pdf |
194.96Кб |
20140312-intercept-five_eyes_hacking_large_routers.pdf |
22.54Кб |
20140312-intercept-increasing collection capacity by increasing implants pdf |
21.13Кб |
20140312-intercept-mhs_leverages_xkeyscore_for_quantum.pdf |
46.38Кб |
20140312-intercept-multiple_methods_of_quantum.pdf |
121.12Кб |
20140312-intercept-nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf |
353.62Кб |
20140312-intercept-nsa_selector_types.pdf |
117.08Кб |
20140312-intercept-nsa technology directorate analysis of converged data pdf |
115.66Кб |
20140312-intercept-quantum_insert_diagrams.pdf |
514.41Кб |
20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf |
1.15Мб |
20140312-intercept-turbine_and_turmoil.pdf |
217.97Кб |
20140312-intercept-turbine_industrial_scale_exploitation.pdf |
81.13Кб |
20140312-intercept-vpn and voip exploitation with hammerchant and hammerstein pdf |
459.06Кб |
20140313-intercept-nsa_cooperative_third_party_relationships.pdf |
312.20Кб |
20140315-intercept-turbine_intelligence_command_and_control.pdf |
121.95Кб |
20140318-wapo-adding_another_country_to_mystic_program.pdf |
48.08Кб |
20140318-wapo-description_of_data_collection_under_mystic.pdf |
61.93Кб |
20140318-wapo-mystic_program.pdf |
73.36Кб |
20140320-intercept-targeting_system_administrator_accounts.pdf |
490.67Кб |
20140321-le_monde-french_intelligence_e-mail_spying_operation.pdf |
1.07Мб |
20140322-nyt-operation_shotgiant_objectives.pdf |
384.50Кб |
20140329-der_spiegel-gchq_and_nsa_spy_on_heads_of_state.pdf |
102.70Кб |
20140404-intercept-2009_sigdev_conference.pdf |
40.92Кб |
20140404-intercept-gchq_full_spectrum_cyber_effects.pdf |
1.74Мб |
20140430-intercept-gchq_visit.pdf |
28.59Кб |
20140430-intercept-ghostmachine.pdf |
6.43Мб |
20140430-intercept-prism_olympics.pdf |
581.23Кб |
20140513-greenwald-noplacetohidedocuments.pdf |
86.95Мб |
20140519-intercept-black_budget.pdf |
53.22Кб |
20140519-intercept-dea_warfighter.pdf |
142.78Кб |
20140519-intercept-mystic.pdf |
78.50Кб |
20140519-intercept-somalget.pdf |
131.46Кб |
20140519-intercept-sso_dictionary_excerpt.pdf |
34.05Кб |
20140519-intercept-sso_mystic_charts.pdf |
563.22Кб |
20140531-nyt-identity-intelligence.pdf |
1.19Мб |
20140610-cryptome-dea-nsa-sandkey.pdf |
361.37Кб |
20140616-der_spiegel-analytics_for_targets_in_europe_0.pdf |
54.22Кб |
20140616-der_spiegel-xkeyscore_fingerprints_1.pdf |
53.51Кб |
20140618-dagbladet-black_budget.pdf |
107.79Кб |
20140618-dagbladet-keith_alexander_talking_points.pdf |
46.54Кб |
20140618-der_spiegel-boundless_informant_overview_global.pdf |
316.56Кб |
20140618-der spiegel-boundless informant statistics for so-called third parties pdf |
353.50Кб |
20140618-der spiegel-boundless informant statistics on data from 22foreign partners22 pdf |
356.05Кб |
20140618-der_spiegel-boundless_informant_statistics_on_germany.pdf |
289.02Кб |
20140618-der_spiegel-boundless_informant_statistics_on_the_uk.pdf |
157.08Кб |
20140618-der spiegel-briefing on the visit to the nsa of a high-ranking bnd official pdf |
491.70Кб |
20140618-der_spiegel-cooperation_between_the_nsa_bnd_and_bfv.pdf |
327.92Кб |
20140618-der_spiegel-details_on_xkeyscore_from_an_internal_gchq_website.pdf |
413.65Кб |
20140618-der spiegel-excerpt on the sharing of xkeyscore with german intelligence agency bfv pdf |
66.89Кб |
20140618-der spiegel-explanation of nymrod a system for searching for people and places in databases and documents pdf |
263.31Кб |
20140618-der_spiegel-faqs_on_the_boundless_informant_program.pdf |
231.88Кб |
20140618-der spiegel-final agenda of a meeting between high-ranking nsa and bnd officials pdf |
525.17Кб |
20140618-der_spiegel-gchq_report_on_the_technical_abilities_of_tempora.pdf |
293.41Кб |
20140618-der spiegel-guidelines for the classification of nsa sigint details 1945-1967 pdf |
2.59Мб |
20140618-der spiegel-guidelines for the classification of suslag details and the nsa-bnd cooperation pdf |
777.93Кб |
20140618-der spiegel-internal nsa presentation on the bnds organization 0 pdf |
1.08Мб |
20140618-der_spiegel-logo_of_nsa-bnd_cooperation.pdf |
29.78Кб |
20140618-der spiegel-nostalgic recollections from nsa workers formerly stationed in bad aibling pdf |
265.50Кб |
20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod.pdf |
418.41Кб |
20140618-der spiegel-nsacss europe- report on the experiences of one nsa worker pdf |
362.97Кб |
20140618-der spiegel-nsacss presentation on technical surveillance in europe and africa pdf |
1.54Мб |
20140618-der spiegel-overview of the use of boundless informant world map pdf |
219.75Кб |
20140618-der spiegel-preliminary agenda of a meeting between nsa and bnd officials pdf |
349.48Кб |
20140618-der spiegel-report on a wharpdrive incident in an sso presentation pdf |
261.12Кб |
20140618-der spiegel-report on an nsa sigdev training course for allied countries pdf |
249.86Кб |
20140618-der spiegel-report on an nsa visit to bnd site and on data transfer from the bnd to the nsa pdf |
305.80Кб |
20140618-der spiegel-report on an unexploded ordnance alarm at european technical centern pdf |
269.94Кб |
20140618-der spiegel-report on an xkeyscore training session at the ecc dagger complex pdf |
402.49Кб |
20140618-der spiegel-report on data exchange between the nsa and bnd within the jsa framework pdf |
150.04Кб |
20140618-der spiegel-report on the beginnings of the european security center esc in the dagger complex pdf |
287.03Кб |
20140618-der spiegel-report on the changing of the escs name to european security operations center esoc pdf |
273.93Кб |
20140618-der_spiegel-report_on_the_nsas_access_to_tempora.pdf |
280.23Кб |
20140618-der spiegel-report on the one-year anniversary of the nsa liaison unit suslag in bad aibling pdf |
334.72Кб |
20140618-der spiegel-report on the surveillance of african countries by jsa pdf |
254.78Кб |
20140618-der spiegel-report on the technical expansion of the european technical center in wiesbaden pdf |
218.91Кб |
20140618-der_spiegel-report_on_the_work_of_nsacss_europe.pdf |
299.81Кб |
20140618-der spiegel-restrictions on the technical surveillance performed by jsa pdf |
214.19Кб |
20140618-der_spiegel-us_sites_with_nsa_personnel_in_germany.pdf |
84.77Кб |
20140618-der_spiegel-world_map_from_the_boundless_informant_program.pdf |
302.62Кб |
20140618-DerSpiegel-agenda for the visit of bsi vice president andreas konen to the nsa pdf |
120.15Кб |
20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker pdf |
204.84Кб |
20140618-DerSpiegel-internal nsa discussion guidelines relating to cooperation with the bnd and bfv pdf |
326.75Кб |
20140618-DerSpiegel-presentation on the nsacia unit special collection service pdf |
1.83Мб |
20140618-DerSpiegel-zoom of a boundless informant document with project names pdf |
125.61Кб |
20140630-WaPo-affidavit of keith alexander regarding spying on foreign entities pdf |
19.19Кб |
20140630-WaPo-fisa_amendments_act_summary_document_1.pdf |
52.44Кб |
20140630-WaPo-fisa judges order authorizing surveillance of foreign governments and organizations pdf |
37.12Кб |
20140630-WaPo-list of governments and organizations authorized for surveillance pdf |
120.12Кб |
20140630-WaPo-odni_certification_regarding_foreign_entities.pdf |
269.07Кб |
20140709-Intercept-spying_on_muslim-american_leaders.pdf |
294.37Кб |
20140714-Intercept-jtrigall.pdf |
1.06Мб |
20140723-Intercept-March-2013-Watchlisting-Guidance.pdf |
29.39Мб |
20140723-WaPo-Post-Signals-Intelligence-Authority-Decision-Tree.pdf |
58.95Кб |
20140725-Intercept-Saudi-Arabia-Information-Paper.pdf |
325.13Кб |
20140803-Intercept-Israel-US-1999-Agreement.pdf |
2.01Мб |
20140803-Intercept-NSA-Intelligence-Relationship-With-Israel.pdf |
212.07Кб |
20140805-Intercept-Directorate-of-Terrorist-Identities-Strategic-Accomplishments-2013 pdf |
1.72Мб |
20140812-Intercept-GCHQ-Covert-Mobile-Phones-Policy.pdf |
86.05Кб |
20140815-Heise-HACIENDA-Program.pdf |
1.83Мб |
20140825-Intercept-CIA-Colleagues-Enthusiastically-Welcome-NSA-Training.pdf |
87.82Кб |
20140825-Intercept-CRISSCROSSPROTON-Point-Paper.pdf |
288.89Кб |
20140825-Intercept-DNI-Decision-Memorandum-on-ICREACH.pdf |
254.53Кб |
20140825-Intercept-ICREACH-Black-Budget-Extract.pdf |
36.61Кб |
20140825-Intercept-ICREACH-Sharing-SIGINT-Comms-Metadata-with-the-Intel-Community-Memo pdf |
194.58Кб |
20140825-Intercept-ICREACH-Wholesale-Sharing.pdf |
33.73Кб |
20140825-Intercept-Metadata-Policy-Conference.pdf |
181.00Кб |
20140825-Intercept-Metadata-Sharing-Memorandum.pdf |
392.62Кб |
20140825-The-Intercept-Sharing-Communications-Metadata-Across-the-USIC-ICREACH pdf |
3.92Мб |
20140831-spiegel-collaboration_in_overdrive.pdf |
335.35Кб |
20140831-spiegel-iraq_uk_load_sharing_carriers.pdf |
376.78Кб |
20140831-spiegel-jordan_belgium.pdf |
608.65Кб |
20140831-spiegel-kurdistan_regional_government.pdf |
623.14Кб |
20140831-Spiegel-NCRs-with-Foreign-Relations-Missions-Become-SUSLAs.pdf |
374.82Кб |
20140831-spiegel-nsa_intelligence_relationship_with_turkey.pdf |
782.88Кб |
20140831-spiegel-nsas_oldest_third_party_partnership.pdf |
397.78Кб |
20140831-spiegel-sinio_seminar_tough_times_for_turkey.pdf |
255.96Кб |
20140831-spiegel-sinio_seminar_turkey_and_the_kurds.pdf |
271.21Кб |
20140831-spiegel-sinio_seminar_turkish_elections.pdf |
272.57Кб |
20140831-spiegel-turkey_and_the_pkk.pdf |
669.60Кб |
20140831-spiegel-turkey_at_the_g20_pre-meeting.pdf |
206.81Кб |
20140831-spiegel-turkey_energy_company_development.pdf |
149.69Кб |
20140831-spiegel-turkish_signal_intelligence_chief_agenda.pdf |
374.93Кб |
20140905-intercept-quadrennial intelligence community review final report pdf |
3.49Мб |
20140914-intercept-ferguson_visit_precis.pdf |
231.71Кб |
20140914-intercept-key_activities_in_progress.pdf |
228.10Кб |
20140914-intercept-speargun_phase_one.pdf |
54.17Кб |
20140914-intercept-speargun_underway.pdf |
127.01Кб |
20140914-spiegel-satellite_teleport_knowledge.pdf |
4.38Мб |
20140914-spiegel-treasure_map_announces_a_new_release.pdf |
551.96Кб |
20140914-spiegel-treasure_map_presentation.pdf |
5.73Мб |
20141010-intercept-cno_core_secrets_security_structure.pdf |
329.13Кб |
20141010-intercept-cno_core_secrets_slide_slices.pdf |
1.10Мб |
20141010-intercept-computer_network_exploitation_classification_guide.pdf |
965.80Кб |
20141010-intercept-eci_compartments.pdf |
534.56Кб |
20141010-intercept-eci_pawleys_classification_guide.pdf |
434.74Кб |
20141010-intercept-eci_whipgenie_classification_guide.pdf |
684.37Кб |
20141010-intercept-exceptionally_controlled_information_listing.pdf |
934.86Кб |
20141010-intercept-sentry_eagle_brief_sheet.pdf |
1.22Мб |
20141010-intercept-tarex_classification_guide.pdf |
757.56Кб |
20141125-sueddeutsche-access_breakdown.pdf |
25.87Кб |
20141125-sz-cable_master_list_ac.pdf |
158.76Кб |
20141125-sz-cable_master_list_fea.pdf |
59.73Кб |
20141125-sz-cable_regions.pdf |
32.99Кб |
20141125-sz-cables_no_current_access.pdf |
27.72Кб |
20141125-sz-cables_where_we_are.pdf |
27.59Кб |
20141125-sz-cables_where_we_want_to_be.pdf |
26.76Кб |
20141125-sz-cne_endpoint_project_load.pdf |
61.16Кб |
20141125-sz-mti_access_project_weekly_status_february_6_2009.pdf |
70.59Кб |
20141125-sz-mti_access_project_weekly_status_june_27_2008.pdf |
95.64Кб |
20141125-sz-mti_access_project_weekly_status_november_28_2008.pdf |
92.08Кб |
20141125-sz-partner_cables.pdf |
151.74Кб |
20141125-sz-ptc_glossary.pdf |
121.02Кб |
20141125-sz-windstop_system_highlights.pdf |
137.21Кб |
20141204-intercept-auroragold_project_overview.pdf |
418.03Кб |
20141204-intercept-auroragold target technology trends center support to wpmo 0 pdf |
1.60Мб |
20141204-intercept-auroragold_working_aid.pdf |
427.75Кб |
20141204-intercept-auroragold_working_group.pdf |
22.60Мб |
20141204-intercept-ir21_a_technology_warning_mechanism_0.pdf |
1.75Мб |
20141204-intercept-nsa first ever collect of high interest 4g cellular signal pdf |
15.35Кб |
20141204-intercept-nsa_gchq_csec_network_tradecraft_advancement.pdf |
239.41Кб |
20141204-intercept-opulant_pup_encryption_attack.pdf |
35.96Кб |
20141204-intercept-wolframite_encryption_attack.pdf |
71.90Кб |
20141214-intercept-gchq_automated_noc_detection.pdf |
3.69Мб |
20141214-intercept-gchq_hopscotch.pdf |
10.90Кб |
20141214-intercept-gchq_making_network_sense_of_the_encryption.pdf |
2.33Мб |
20141214-intercept-gchq_nac_review_april_june_2011.pdf |
29.74Кб |
20141214-intercept-gchq_nac_review_january_march_2012.pdf |
17.74Кб |
20141214-intercept-gchq_nac_review_july_sept_2011.pdf |
25.55Кб |
20141214-intercept-gchq_nac_review_october_december_2011.pdf |
80.96Кб |
20141214-intercept-gchq_stargate_cne_requirements.pdf |
269.85Кб |
20141214-Intercept-gchq-mobile-networks-in-my-noc-world.pdf |
1.86Мб |
20141228-speigel-a potential technique to deanonymise users of the tor network 0 pdf |
2.05Мб |
20141228-speigel-analysis from ssl-tls connections through gchq in the flying pig database 0 pdf |
1.46Мб |
20141228-speigel-analytic challenges from active-passive integration when nsa attacks ipsec vpns 0 pdf |
1.96Мб |
20141228-speigel-analytics_on_security_of_tor_hidden_services_0.pdf |
3.65Мб |
20141228-speigel-bluesnort program on net defense from encrypted communications 0 pdf |
1.31Мб |
20141228-speigel-canadian_document_from_ces_on_tls_trends_0.pdf |
1.91Мб |
20141228-speigel-classification_guide_for_cryptanalysis_0.pdf |
276.64Кб |
20141228-speigel-decryption of vpn connections within the valiantsurf program 0 pdf |
2.01Мб |
20141228-speigel-description_of_existing_projects_on_vpn_decryption_0.pdf |
487.65Кб |
20141228-spiegel- national information assurance research laboratory niarl tundra pdf |
1.97Мб |
20141228-spiegel-description of voip telephony encryption methods and other ways to attack pdf |
284.65Кб |
20141228-spiegel-description on the processing of vpn data packets within the turmoil program pdf |
1.58Мб |
20141228-spiegel-explanation of a potential technique to deanonymise users of the tor network pdf |
2.41Мб |
20141228-spiegel-explanation of the gallantwave that decrypts vpn traffic within longhaul pdf |
570.28Кб |
20141228-spiegel-explanation of the poisennut product and its role when attacking vpn pdf |
250.23Кб |
20141228-spiegel-explanation of the transform engine emulator when attacking vpn pdf |
186.96Кб |
20141228-spiegel-explanation of the turmoil gallantwave program and its role when attacking vpn 0 pdf |
257.89Кб |
20141228-spiegel-explanation on the spin9 program on end-to-end attacks on vpn pdf |
6.52Мб |
20141228-spiegel-gchq_briefing_on_the_bullrun_program.pdf |
429.34Кб |
20141228-spiegel-gchq presentation on the bullrun programs decryption capabilities pdf |
844.20Кб |
20141228-spiegel-general_description_how_nsa_handles_encrypted_traffic.pdf |
230.49Кб |
20141228-spiegel-guide for analysts on how to use the prism skype collection pdf |
896.28Кб |
20141228-spiegel-intercept_with_otr_encrypted_chat.pdf |
169.56Кб |
20141228-spiegel-intercept_with_pgp_encrypted_message.pdf |
100.87Кб |
20141228-spiegel-intro to the vpn exploitation process mentioning the protocols attacked - pptp ipsec ssl ssh pdf |
5.89Мб |
20141228-spiegel-malibu architecture overview to exploit vpn communication pdf |
620.61Кб |
20150117-speigel-analysis of chinese methods and performed actions in the context of computer network exploitation pdf |
1.34Мб |
20150117-speigel-classification guide for computer network exploitation cne pdf |
1.00Мб |
20150117-speigel-combination of offensive and defensive missions - how fourth-party missions are being performed pdf |
226.21Кб |
20150117-speigel-csec document about the recognition of trojans and other network based anomaly pdf |
3.37Мб |
20150117-speigel-csec document on the handling of existing trojans when trojanizing computers pdf |
3.87Мб |
20150117-speigel-document about the expansion of the remote operations center roc on endpoint operations pdf |
228.14Кб |
20150117-speigel-document explaining the role of the remote operations center roc pdf |
167.81Кб |
20150117-spiegel-nsa example snowglobe in which a suspected french government trojan is analyzed to find out if it can be helpful for own interests 0 pdf |
3.30Мб |
20150117-spiegel-nsa_fourth_party_access_-_i_drink_your_milkshake_.pdf |
3.60Мб |
20150117-spiegel-nsa program tutelage to instrumentalize third party attack tools pdf |
4.11Мб |
20150117-spiegel-nsa project description to recognize and process data that comes from third party attacks on computers pdf |
352.45Кб |
20150117-spiegel-nsa training course material on computer network operations pdf |
6.95Мб |
20150117-spiegel-overview of methods for nsa integrated cyber operations 0 pdf |
2.55Мб |
20150117-spiegel-overview of the transgression program to analyze and exploit foreign cna-cne exploits pdf |
2.06Мб |
20150117-spiegel-overview on the nsa use of bots and the defiantwarrior program pdf |
9.43Мб |
20150117-spiegel-process analysts choose their data requirement and then get to know the tools that can do the job 0 pdf |
1.57Мб |
20150117-spiegel-projects of the tao-ato department such as the remote destruction of network cards pdf |
1.38Мб |
20150117-spiegel-quantumtheory is a set of technologies allowing man-on-the-side interference attacks on tcp-ip connections includes straightbizarre and daredev pdf |
1.55Мб |
20150117-spiegel-report of an nsa employee about a backdoor in the openssh daemon pdf |
402.93Кб |
20150117-spiegel-sample code of a malware program from the five eyes alliance pdf |
184.88Кб |
20150117-spiegel-supply-chain interdiction - stealthy techniques can crack some of sigints hardest targets pdf |
212.91Кб |
20150117-spiegel-technical_description_of_the_fashioncleft_protocol_.pdf |
2.86Мб |
20150117-spiegel-the fashioncleft protocol nsa uses to exfiltrate data from trojans and implants to the nsa 0 pdf |
2.60Мб |
20150128-cbc-cse_presentation_on_the_levitation_project.pdf |
3.73Мб |
20150128-intercept-cse_presentation_on_the_levitation_project.pdf |
3.73Мб |
20150204-intercept-lovely_horse_0.pdf |
66.96Кб |
20150204-intercept-nato_civilian_intelligence_council_cyber_panel.pdf |
236.11Кб |
20150204-intercept-open_source_for_cyber_defence_progress.pdf |
65.69Кб |
20150204-intercept-who_else_is_targeting_your_target_collecting.pdf |
52.44Кб |
20150210-intercept-iran_current_topics_-_interactions_with_gchq.pdf |
381.91Кб |
20150219-Intercept-CCNE-Email-Addresses-Jan10-Mar10-Trial.pdf |
76.75Кб |
20150219-Intercept-CCNE-Email-Harvesting-Jan10-Mar10-Trial.pdf |
77.15Кб |
20150219-Intercept-CCNE-Stats-Summaries-Jan10-Mar10-Trial.pdf |
77.06Кб |
20150219-Intercept-CCNE-Successes-Jan10-Mar10-Trial.pdf |
71.99Кб |
20150219-Intercept-CNE-Access-to-Core-Mobile-Networks.pdf |
77.86Кб |
20150219-Intercept-Dapino-Gamma-CNE-Presence-Wiki.pdf |
55.26Кб |
20150219-Intercept-Dapino-Gamma-Gemalto-Yuaawaa-Wiki.pdf |
63.68Кб |
20150219-Intercept-Dapino-Gamma-Target-Personalisation-Centres.pdf |
89.38Кб |
20150219-Intercept-IMSIs-Identified-With-Ki-Data-For-Network.pdf |
82.55Кб |
20150219-Intercept-PCS-Harvesting-At-Scale.pdf |
2.75Мб |
20150219-Intercept-Where-are-These-Keys.pdf |
80.28Кб |
ambassadesFrance.pdf |
319.96Кб |
blackhat-Alexander-keynote.pdf |
15.36Мб |
bullrun-briefing-sheet-from-gchq.pdf |
2.60Мб |
ccne-email-addresses-jan10-mar10-trial.pdf |
82.49Кб |
ccne-email-harvesting-jan10-mar10-trial.pdf |
81.02Кб |
ccne-stats-summaries-jan10-mar10-trial.pdf |
79.57Кб |
ccne-successes-jan10-mar10-trial.pdf |
64.17Кб |
CLEANED004.-Cover_Memo-Sealed.pdf |
1.05Мб |
CLEANED007.-CongNotificationInfoMemoSSCI_10_Apr_09-Sealedpdf.pdf |
2.15Мб |
CLEANED032.-Basket_2_-_NSA_training.log.pdf |
15.75Мб |
CLEANED096.-NSA_summary_of_BR_requirements_(maybe_Feb_2009)-.pdf |
236.94Кб |
CLEANEDFinal-USSID_SP0018_Annex_J.pdf |
532.64Кб |
CLEANEDFinal-USSID_SP0018.pdf |
6.60Мб |
CLEANEDPRTT-1.pdf |
24.70Мб |
CLEANEDPRTT-2.pdf |
3.56Мб |
cne-access-to-core-mobile-networks.pdf |
465.85Кб |
csec-br-spy.pdf |
616.64Кб |
dapino-gamma-cne-presence-wiki.pdf |
73.11Кб |
dapino-gamma-gemalto-yuaawaa-wiki.pdf |
103.25Кб |
dapino-gamma-target-personalisation-centres.pdf |
116.97Кб |
discovery-sigint-targeting-scenarios-and.pdf |
726.84Кб |
doc-6-cyber-threat-capabilities.pdf |
19.82Мб |
doj-nsa-memo.pdf |
1.36Мб |
doody.pdf |
1.31Мб |
dsd-3g.pdf |
886.34Кб |
ericsson_reply.pdf |
64.13Кб |
europebriefingnote_en.pdf |
797.51Кб |
eyes_wide_open_v1.pdf |
4.19Мб |
FAA-Certification_Renewals_with_Caveats.pdf |
138.31Кб |
FAA-Minimization-Procedures.pdf |
574.83Кб |
FAA-Targeting_Procedures.pdf |
615.65Кб |
FISC-Order,-BR-06-12.pdf |
292.11Кб |
gchq-g20-spy.pdf |
3.23Мб |
gchq-mullenize.pdf |
21.97Кб |
gchq-royal-concierge-de.pdf |
120.85Кб |
gchq-se-fra-quantum-3.pdf |
31.02Кб |
General-Alexander-Letter-re-NSA-Fact-Sheet-Inaccuracy.pdf |
184.30Кб |
identity-intelligence.pdf |
2.14Мб |
i-hunt-sys-admins.pdf |
21.81Мб |
imsis-identified-with-ki-data-for-network.pdf |
75.32Кб |
invisibility-report-9-0-final.pdf |
89.54Кб |
jtrigall.pdf |
1.30Мб |
Judge-Walton_Answers_to_Questions_re_FISC.pdf |
1.56Мб |
Lesson-4_-_So_you_got_US_Person_Information.pdf |
147.08Кб |
letter_to_companies.pdf |
100.29Кб |
media-34093.pdf |
1.15Мб |
media-35509.pdf |
1.51Мб |
media-35510.pdf |
4.33Мб |
media-35511.pdf |
9.92Мб |
media-35512.pdf |
1.34Мб |
media-35513.pdf |
3.39Мб |
media-35514.pdf |
835.07Кб |
media-35515.pdf |
24.30Мб |
media-35516.pdf |
5.85Мб |
media-35517.pdf |
575.91Кб |
media-35518.pdf |
2.80Мб |
media-35519.pdf |
892.10Кб |
media-35520.pdf |
4.34Мб |
media-35521.pdf |
15.91Мб |
media-35522.pdf |
1.11Мб |
media-35523.pdf |
366.46Кб |
media-35524.pdf |
508.05Кб |
media-35525.pdf |
665.46Кб |
media-35526.pdf |
12.28Мб |
media-35527.pdf |
7.86Мб |
media-35528.pdf |
2.27Мб |
media-35529.pdf |
20.99Мб |
media-35530.pdf |
2.33Мб |
media-35531.pdf |
494.42Кб |
media-35532.pdf |
1.43Мб |
media-35533.pdf |
4.11Мб |
media-35534.pdf |
2.13Мб |
media-35535.pdf |
6.85Мб |
media-35536.pdf |
571.16Кб |
media-35537.pdf |
574.47Кб |
media-35538.pdf |
3.84Мб |
media-35539.pdf |
15.45Мб |
media-35540.pdf |
44.17Мб |
media-35541.pdf |
426.04Кб |
media-35542.pdf |
3.47Мб |
media-35543.pdf |
3.89Мб |
media-35544.pdf |
535.29Кб |
media-35545.pdf |
177.57Кб |
media-35546.pdf |
599.27Кб |
media-35547.pdf |
383.11Кб |
media-35548.pdf |
766.90Кб |
media-35549.pdf |
1012.75Кб |
media-35550.pdf |
4.49Мб |
media-35551.pdf |
5.06Мб |
media-35552.pdf |
404.70Кб |
media-35653.pdf |
620.45Кб |
media-35654.pdf |
394.03Кб |
media-35655.pdf |
807.87Кб |
media-35656.pdf |
2.38Мб |
media-35657.pdf |
16.90Мб |
media-35658.pdf |
12.19Мб |
media-35659.pdf |
980.05Кб |
media-35661.pdf |
3.48Мб |
media-35662.pdf |
2.89Мб |
media-35663.pdf |
1.02Мб |
media-35664.pdf |
1.51Мб |
media-35665.pdf |
8.68Мб |
media-35666.pdf |
2.70Мб |
media-35667.pdf |
6.63Мб |
media-35668.pdf |
167.47Кб |
media-35669.pdf |
1.13Мб |
media-35670.pdf |
26.27Мб |
media-35671.pdf |
30.24Мб |
media-35672.pdf |
5.11Мб |
media-35673.pdf |
6.59Мб |
media-35674.pdf |
36.53Мб |
media-35675.pdf |
18.74Мб |
media-35676.pdf |
6.65Мб |
media-35677.pdf |
27.61Мб |
media-35678.pdf |
7.11Мб |
media-35680.pdf |
602.64Кб |
media-35681.pdf |
523.64Кб |
media-35682.pdf |
3.26Мб |
media-35683.pdf |
8.90Мб |
media-35684.pdf |
6.22Мб |
media-35685.pdf |
40.27Мб |
media-35686.pdf |
18.77Мб |
media-35687.pdf |
2.50Мб |
media-35688.pdf |
11.49Мб |
media-35689.pdf |
27.61Мб |
nokia_reply.pdf |
101.41Кб |
no-place-to-hide.pdf |
86.95Мб |
nsa-5-eyes-partners.pdf |
20.61Кб |
nsa-5-eyes-spy-g20-dk.pdf |
188.35Кб |
NSA-Boundless_Informant_Frequently_Asked_Questions.pdf |
1.40Мб |
NSA-Boundless_Informant_Powerpoint_Slides.pdf |
72.09Мб |
nsa-boundless-informant.pdf |
189.40Кб |
nsa-boundless-informant-faq.pdf |
1.75Мб |
NSA-Boundless-Informant-Frequently-Asked-Questions.pdf |
1.40Мб |
nsa-boundlessinformant-no-33m.pdf |
5.96Мб |
nsa-boundless-informant-slides.pdf |
72.08Мб |
nsabullrun.pdf |
2.60Мб |
nsa-bullrun-2-16-guardian-13-0905.pdf |
9.64Мб |
nsa-bullrun-brief-nyt-13-0905.pdf |
92.52Кб |
nsa-bullrun-brief-propublica-13-0905.pdf |
2.60Мб |
nsa-cable-spy-types.pdf |
1.01Мб |
nsa-catalog-appelbaum.pdf |
950.64Кб |
nsa-chalkfun.pdf |
68.00Кб |
nsa-close-access-sigads.pdf |
378.97Кб |
nsa-cotraveler.pdf |
602.83Кб |
nsa-cryptanalysis-2-12-guardian-13-0905.pdf |
4.00Мб |
nsa-csec-partners.pdf |
93.10Кб |
nsa-css-mission.pdf |
100.25Кб |
nsa-dutch-sigint.pdf |
667.61Кб |
nsa-egotisticalgiraffe.pdf |
3.06Мб |
nsa-fascia.pdf |
141.09Кб |
nsa-finance-spy-de.pdf |
726.98Кб |
nsa-fisa-certification.pdf |
45.84Кб |
nsa-fisa-minimization.pdf |
799.14Кб |
nsa-fisa-targeting.pdf |
859.04Кб |
nsa-g8-g20-spying.pdf |
191.56Кб |
nsa-g8-g20-spying-02.pdf |
196.25Кб |
nsa-gchq-fra-quantum.pdf |
294.63Кб |
nsa-gchq-se-fra-comint.pdf |
397.64Кб |
nsa-gchq-spy-games.pdf |
2.24Мб |
nsa-ghost-machine.pdf |
2.66Мб |
nsa-gsm-tracking.pdf |
326.47Кб |
nsa-hosts-fr-spies.pdf |
921.60Кб |
nsa-iat-tor.pdf |
2.61Мб |
NSA-IG_Report.pdf |
18.77Мб |
nsa-israel-spy.pdf |
3.46Мб |
NSA-Memo_to_DOD_-_Proposed_Amendment_to_Conduct_Analysis_of_Metadata.pdf |
1.23Мб |
NSA-Memo-to-DOD---Proposed-Amendment-to-Conduct-Analysis-of-Metadata.pdf |
1.23Мб |
nsa-microsoft-cloud-exploit.pdf |
567.25Кб |
NSA-Missions_Authorities_Oversight_and_Partnerships.pdf |
114.04Кб |
NSA-Missions-Authorities-Oversight-and-Partnerships.pdf |
114.04Кб |
nsa-muslim-porn.pdf |
1.32Мб |
nsa-overcollection.pdf |
3.03Мб |
nsa-ppd-20.pdf |
1.28Мб |
nsa-prism-13-1021.pdf |
2.06Мб |
nsa-prism-dk.pdf |
918.28Кб |
nsa-prism-guardian-13-1101.pdf |
2.06Мб |
nsa-quantum-computer.pdf |
515.03Кб |
nsa-quantum-computer-2.pdf |
138.46Кб |
nsa-quantum-tasking.pdf |
5.46Мб |
nsa-quantumtheory.pdf |
2.36Мб |
nsa-scissors.pdf |
295.16Кб |
nsa-scissors-2.pdf |
3.02Мб |
NSA-Section_702_'Loop_Hole'.pdf |
64.72Кб |
NSA-Section_702_and_Section_215_Factsheets.pdf |
1.76Мб |
NSA-Section-702-and-Section-215-Factsheets.pdf |
1.76Мб |
nsa-se-fra-quantum-2.pdf |
34.04Кб |
nsa-se-fra-relationship.pdf |
551.45Кб |
nsa-se-fra-ru-baltic.pdf |
49.54Кб |
nsa-se-fra-spying-agenda.pdf |
1.99Мб |
nsa-se-fra-xkeyscore.pdf |
1.16Мб |
nsa-se-fra-xkeyscore-slide.pdf |
570.25Кб |
nsa-se-spies.pdf |
455.42Кб |
nsa-sigint-cryptologic-platform.pdf |
544.77Кб |
nsa-sigint-enabling-guardian-13-0905.pdf |
5.42Мб |
nsa-sigint-enabling-nyt-13-0905.pdf |
347.68Кб |
nsa-sigint-enabling-propublica-13-0905.pdf |
2.02Мб |
nsa-sigint-strategic-mission-2007.pdf |
1.89Мб |
nsa-sigint-strategic-mission-2013.pdf |
2.58Мб |
nsa-sigint-strategy-2012-2016.pdf |
372.29Кб |
nsa-sigint-successes.pdf |
3.47Мб |
nsa-smartphones.pdf |
741.38Кб |
nsa-smartphones-analysis.pdf |
848.49Кб |
nsa-sms-exploit.pdf |
1.66Мб |
nsa-spy-games.pdf |
78.79Кб |
nsa-sso1-guardian-13-1101.pdf |
182.69Кб |
nsa-sso2-guardian-13-1101.pdf |
107.27Кб |
nsa-sso-content.pdf |
551.25Кб |
nsa-sso-dk.pdf |
222.05Кб |
nsa-sso-overview.pdf |
19.81Кб |
nsa-sso-slides.pdf |
986.06Кб |
nsa-stellar-wind.pdf |
7.99Мб |
nsa-tao-ant.pdf |
164.54Кб |
nsa-tao-ant-pdf.pdf |
962.52Кб |
nsa-tao-intro.pdf |
3.08Мб |
nsa-target-location.pdf |
132.19Кб |
nsa-tor.pdf |
265.66Кб |
nsa-tor-stinks.pdf |
3.99Мб |
nsa-verizon-spy.pdf |
129.72Кб |
nsa-wanadoo-alcatel.pdf |
274.59Кб |
nsa-windstop.pdf |
596.92Кб |
nsa-windstop-muscular-incenser.pdf |
1.01Мб |
NSA-XKeyscore_Powerpoint.pdf |
12.23Мб |
nsa-xkeyscore.pdf |
3.48Мб |
NSA-XKeyscore-Powerpoint.pdf |
12.23Мб |
nsa-xkeyscore-sources.pdf |
29.48Кб |
nsa-xkeyscore-tor-slides.pdf |
160.53Кб |
nsa-yahoo-google-exploit.pdf |
2.99Мб |
pcs-harvesting-at-scale.pdf |
3.40Мб |
phonesgchq.pdf |
1.84Мб |
phonesnsa.pdf |
4.62Мб |
PRISM-Overview_Powerpoint_Slides.pdf |
266.34Кб |
PRISM-Overview-Powerpoint-Slides.pdf |
266.34Кб |
PRISM-Powerpoint_Slides_re_Data_Acquisition.pdf |
294.85Кб |
PRISM-Powerpoint-Slides-re-Data-Acquisition.pdf |
294.85Кб |
psychology-a-new-kind-of-sigdev.pdf |
27.85Мб |
rcs-9-admin-final.pdf |
4.27Мб |
rcs-9-analyst-final.pdf |
8.22Мб |
rcs-9-sysadmin-final.pdf |
11.45Мб |
rcs-9-technician-final.pdf |
13.42Мб |
remote-control-system-9-0-changelog-final.pdf |
82.99Кб |
remote-control-system-9-1-changelog-final.pdf |
46.49Кб |
samsung_reply_2.pdf |
2.64Мб |
samsung_reply.pdf |
2.77Мб |
saudi-arabia-information-paper.pdf |
335.03Кб |
Section-215_-_Obama_Administration_White_Paper.pdf |
156.48Кб |
Section-215_-_Primary_Order.pdf |
5.61Мб |
Section-215_-_Secondary_Order_-_Verizon.pdf |
1.06Мб |
Section-215---Obama-Administration-White-Paper.pdf |
156.48Кб |
Section-215---Primary-Order.pdf |
5.61Мб |
Section-215---Secondary-Order---Verizon.pdf |
1.06Мб |
SID-Oversight_and_Compliance.pdf |
1.11Мб |
SID-Oversight-and-Compliance.pdf |
1.11Мб |
sigint-enabling-project.pdf |
2.06Мб |
sigint-enabling-project2.pdf |
2.02Мб |
spy-budget-fy13.pdf |
2.26Мб |
Targeting-Rationale_-_TAR.pdf |
516.77Кб |
Targeting-Rationale---TAR.pdf |
516.77Кб |
the-art-of-deception-training-for-a-new.pdf |
27.76Мб |
the-nsa-and-gchqs-quantumtheory-hacking-tactics.pdf |
451.06Кб |
turbine-and-turmoil.pdf |
441.18Кб |
UPSTREAM-Powerpoint_Slide.pdf |
78.22Кб |
UPSTREAM-Powerpoint-Slide.pdf |
78.22Кб |
vpn-and-voip-exploitation-with-hammerchant.pdf |
551.01Кб |
What_We_Need_to_Learn_from_Snowden.pdf |
41.31Кб |
where-are-these-keys.pdf |
85.63Кб |
Wyden-Udall-Letter_on_NSA_Fact_Sheet_Inaccuracy.pdf |
173.96Кб |
Wyden-Udall-Letter-on-NSA-Fact-Sheet-Inaccuracy.pdf |
173.96Кб |