IC OFF THE RECORD:
Direct access to leaked information related to the surveillance activities of the U.S. Intelligence Community and their partners. 2016 INDEX: OTHER YEARS: 2020+ (View all) 2019 (View all) 2018 (View all) 2017 (View all) 2015 (View all) 2014 (View all) 2013 (View all)
EDWARD SNOWDEN: RELATED CONTENT: ANT Product Catalog Black Budget Boundless Informant Petrobras Screenshots PRISM slides XKeyscore About this website
Too much information? Visit the redacted IC ON THE RECORD website instead.
Your NSA dictionary: NSA Files: Decoded Snowden Documents:
PARTNERS: Five Eyes (FVEY) US: NSA UK: GCHQ CA: CSE AU: ASD NZ: GCSB Nine Eyes (+4) DK: FE FR: DGSE NL: AIVD NO: NIS Fourteen Eyes (+5) BE: GISS DE: BND IT: AISE SP: CNI SE: FRA |
![]() ![]() ![]() What NSA Knew About Previous Russian Email Hacking December 29, 2016 Top-Secret Snowden Document Reveals What the NSA Knew About Previous Russian Hacking ![]() Intellipedia: Anna Politkovskaya (3 pages)
![]() ![]() ![]() GCHQ Surveillance: Israel, Africa, and Others December 7-8, 2016 Britain has spent years spying on Israel’s leaders - Le Monde
![]() Jordan-USA (5 pages)
![]() Jordan-Belgium (7 pages) ![]() ![]() ![]() In-Flight Mobile Phone Use Targeted by NSA and GCHQ December 7, 2016 American and British Spy Agencies Targeted In-Flight Mobile Phone Use - The Intercept US and Britain refine ability to tap into airline passenger’s mobile phones - Le Monde ![]() In-Flight GSM (20 slides)
![]() THIEVING MAGPIE (15 slides)
![]() HOMING PIGEON (4 slides)
![]() SIDToday: In-Flight GSM is No Joke (2 pages) SOUTHWINDS; THIEVING MAGPIE; HOMING PIGEON ![]() ![]() ![]()
December 7, 2016 The Snowden Archive - SIDtoday Files - The Intercept Reagan Administration “Cavalierly” Leaked NSA Signals Intelligence - The Intercept
Download a zip file containing the 262 SIDToday articles ![]() ![]() ![]() NSA's AT&T Spy Hub in New York City November 16, 2016 TITANPOINTE: The NSA’s Spy Hub in New York, Hidden in Plain Sight - The Intercept ![]() BLARNEY Program TDY Handbook (5 pages)
![]() FAIRVIEW TDY Handbook (11 pages)
![]() FAIRVIEW Dataflow Diagrams - April 2012 (20 slides)
![]() Special Source Operations: Corporate Partner Access (7 slides)
![]() BLARNEY Report - April 2013 (7 pages)
![]() SKIDROWE: Low Speed DNI Processing Solution (8 slides)
![]() BLARNEY Program Overview (1 slide) TITANPOINTE; LITHIUM; RIMROCK; SKIDROWE; FAIRVIEW; BLARNEY ![]() ![]() ![]() Inside Menwith Hill Station September 6, 2016 The NSA’s British Base at the Heart of U.S. Targeted Killing - The Intercept ![]() Elegant Chaos: collect it all, exploit it all (23 slides) (23 slides with notes)
![]() Menwith initiatives maximizing our access (11 slides)
![]() Menwith Hill satellite classification guide (3 pages)
SANDSTORM; GHOSTHUNTER; APPARITION; ELEGANTCHAOS; DRINKYBIRD; ASPHALT; VENUSAFFECT; FOGHORN; MATCHMAKER; ROADBED; MOONPENNY; WINDCHASER; SPARKLEPONY; MARINA; COUNTRYSTORE; DARKSIDE;
HERETIC; SPOTBEAM; BROOMSTICK; CULTWEAVE II; PUZZLECUBE
![]() ![]() ![]() NSA Hacking Tools (ShadowBrokers) August 19, 2016 The NSA Leak Is Real, Snowden Documents Confirm - The Intercept ![]() NSA Remote Operations Center: FOXACID Briefing (23 slides)
![]() FOXACID SOP for Operational Management of FOXACID Infrastructure (31 pages)
![]() Expeditionary Access Operations: NSA's Close Access Network Exploitation Program (15 slides)
![]() SIGINT Development Support II Program Management Review (4 slides)
RELATED:
FOXACID; SECONDDATE; BADDECISION; NIGHTSTAND; MAGIC SQUIRREL; MAGICBEAN; BLINDDATE
![]() ![]() ![]() NSA Targeted Pro-Democracy Activist August 14, 2016 In Bungled Spying Operation, NSA Targeted Pro-Democracy Campaigner - The Intercept Inside one of the SIS's biggest anti-terrorism operations - TV New Zealand ![]() NSA surveillance files: Facebook photo, car, credit card statement
![]() NSA surveillance files: Gmail, 2nd Gmail, bank statement ![]() ![]() ![]() NSA Medical Intelligence August 10, 2016 How the U.S. Spies on Medical Nonprofits and Health Defenses Worldwide - The Intercept ![]() SSO Weekly Briefing: PRISM Reporting Highlight (3 slides)
![]() Black Budget, Volume 1, "Counter WMD Proliferation" (11 pages)
![]() Black Budget, Volume 3, "General Defense Intelligence Program: Medical Analysis Project" (13 pages) ![]() ![]() ![]()
August 10, 2016 The Snowden Archive - SIDtoday Files - The Intercept Iraqi Insurgents Stymied the NSA and Other Highlights from 263 Internal Agency Reports
Download a zip file containing the 263 SIDToday articles ![]() ![]() ![]() Interview with an NSA Hacker June 28, 2016 He Was a Hacker for the NSA and He Was Willing to Talk - The Intercept ![]() Tracking Targets Through Proxies & Anonymizers (25 slides)
![]() Network Shaping 101 (81 slides)
![]() Shaping Diagram (1 slide)
Related Leak: How NSA Hacks System Administrators
![]() ![]() GCHQ: UK Domestic Surveillance Programs June 7, 2016 Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure - The Intercept ![]() The DIGINT Programme (8 pages)
![]() Preston Study (6 slides)
![]() Preston Business Processes (24 pages)
![]() Preston Architecture (47 pages)
![]() NTAC Programme Manager (11 slides)
![]() GCWiki: Communications Capabilities Development Programme (3 pages)
![]() GCWiki: Mobile Apps - Checkpoint Meeting Archives (20 pages)
Related: The Troubling Metadata Sharing Program That Was Just Revealed in the UK - Motherboard Exclusive: Edward Snowden leaks reveal secret Scottish spy system - CommonSpace The Little-Known Company That Enables Worldwide Mass Surveillance - The Intercept
MILKWHITE; PRESTON; ARTEMIS; ZAMENSIS; REMEDY; GEORGELET; GERONTIC; NIGH; NORWALK; PECTASE; LABORO; NTAC; CATSUP; CONDONE
![]() ![]() ![]()
May 16, 2016 The Snowden Archive - SIDtoday Files - The Intercept The Most Intriguing Spy Stories From 166 Internal NSA Reports - The Intercept NSA Closely Involved in Guantánamo Interrogations, Documents Show - The Intercept
MARCH 2003 Announcement of beta test of a new desktop dashboard for analysts.
Introduction to the new SIDtoday website on March 31, 2003.
APRIL 2003 Deputy Director Quirk asks SID analysts to consider volunteering for deployment to military support operations in Iraq.
A humorous post on the history of April Fools’ Day.
A reminder about training sessions for the QUICKMASK system for emergency planning and preparedness.
SIGINT director announces the availability of a new SIGINT strategy document and encourages the whole team to read it.
Invitation to a session for recently hired employees to talk about what’s on their minds. The Geospatial Exploitation Office, on 24/7 watch for the Iraq War, assisted in the mapping of geolocation communications data in near real time for high-value targets and threat activity. SIGINT director announces her appointment as the FBI’s director of intelligence. Schedule of classes offered for software tools, most taught by contractors. Quotations from foreign press about the NSA. Introduction to the series on Communications and Support Operations. Call for applications for the Intelligence Community Assignment Program rotational assignments for civilian employees. U.N. Ambassadors Negroponte (U.S.) and Greenstock (U.K.) congratulate NSA for the quality of SIGINT in the lead-up to the Iraq War. Information about SID’s 2003 promotion cycle, including more money for top performers. Description of SID Registry, which routes correspondence and monitors responses. Based on NSA SIGINT, the State Department confronted North Korean officials with evidence they were developing a uranium enrichment capability. Overview of SIGINT Support Services, which keeps records and provides travel services. Announcement of new positions for Quirk and Meals, effective April 21, 2003. Request from Records Management for records relating to NSA contributions to Iraq campaign. Upcoming training announcements. Planning underway for post-war changes and challenges in April 2003. Proposals sought for fresh ideas and innovative analytic approaches. SIGINT Legislative Affairs coordinates actions related to congressional oversight, language for funding, and briefings and notifications for intelligence committees. SIGINT supported the rescue of POW Jessica Lynch in Iraq. Director Baginski and departing leadership invite staff to a farewell open house. Introduction to SID’s Customer Relationships Directorate series and summary of future articles. Announcement of HR feedback session for longtime employees. The SIGINT Policy office creates, maintains, and communicates policy documents. When the Iraq War started, the Customer Relationships Directorate managed to avoid the chaos of information requests that follwed 9/11 because it had many months to plan and put everything in place before the start of the campaign. President Bush signed a directive on Feb. 24, 2003, that created a new intelligence priority process. This article announces a briefing on the new National Intelligence Priorities Framework. On her last day as SIGINT director, Baginski bids farewell and thanks the staff. Overview of how the NSA handles leaks. New Director Quirk greets the staff. Announcement of various leadership changes. New Deputy Director Meals greets the staff. After 9/11, SID suddenly got an influx of requests from previously minor customers (like the departments of Interior and Agriculture), acquired many new customers, and had to interact differently with law enforcement. In response, CRD designed new products to be more flexible with secret documents (allowing them to be accessed outside of SCIFs, on mobile devices, etc.). Open house hellos and goodbyes. The intelligence SID gave to the U.S. United Nations team (USUN) during the wind-up to the Iraq War “played a critical role” in the adoption of U.N. Security Council resolutions. The work with that customer was a resounding success. President Bush signed a directive on Feb. 24, 2003, that created a new intelligence priority process. This article announces a briefing on the new National Intelligence Priorities Framework. President Bush signed a directive on Feb. 24, 2003, that created a new intelligence priority process. This article recaps a briefing on the new National Intelligence Priorities Framework. Conclusion of the series on customer relationships and summary of the Customer Service Steering Group structure. The People Office wants to know what’s on the mind of the SID military workforce. Introduction to the Learned Organizations series. The new director and deputy director met with the staff and discussed SID’s goals and staffing. Copies of NSA’s vital records are stored in Sugar Grove, West Virginia, in case of disaster affecting Fort Meade. A reminder to read the earlier town meeting recap. Congress gave SID 500 new hires; the People Office reminds hiring managers to continue moving full steam ahead. The People Office wants a friendly welcome for new hires and points supervisors to a website developed to assist with the assimilation process. MAY 2003 NSA created MINUTEMAN PROMETHEUS for Special Forces to collect data from High Power Cordless Phones in Afghanistan. Reminder about the meeting for the military workforce. SID is changing classification markings used in reports. Report from the new leaders of SID on their first weeks on the job. The State Department tasked NSA with getting information about an alleged Russian gangster. SID leadership has new offices and phones. The Terrorist Threat Integration Center opens at the CIA, and NSA’s information-sharing role is described. A feedback session for shift workers is scheduled. Introduction of a new content management system, JOURNEYMAN, for authoring and distributing SIGINT information. Announcement of a cross-agency analyst forum on SARS (severe acute respiratory syndrome), including impact of the virus on China’s military. Reminder about the feedback meeting for experienced SID employees. This describes CATAPULT, a prototype of a data portal for sharing SIGINT product between NSA and second-party partners, based on a Canadian project that uses an XML-based standard format. Announcing the first SIGINT Enterprise Annual Report, for 2002. The KRYPTOS Society was established in 1981 to “promote interest in cryptoanalysis” and “excellence in the cryptologic community.” It had 250 members in 2003, has local chapters in second-party spy agencies like GCHQ, and organizes competitions, monthly lectures, etc. Six NSA personnel returned from tour at CENTCOM headquarters in Tampa where they provided support to Operation Iraqi Freedom (including researching possible locations of stockpiled WMD material). The SID Mailbag for questions and comments is open again. After 9/11, SID used SIGINT against terrorist targets in the Horn of Africa. This describes lessons learned from that experience and strategies for signals intelligence elsewhere on the continent. Reminder about the What’s on Your Mind feedback meeting for shift workers. Reminder about the What’s on Your Mind meeting for shift workers. SID’s chief of staff writes about the employee promotion and awards system and the importance of productive feedback. The What’s on Your Mind meeting for new hires is scheduled. National Intelligence Priorities Framework is released to the intelligence community. How NSA was able to safely use the latest Arabic language translation software produced by a foreign firm without a costly and time-consuming code review process. The 2002 SID property inventory showed more than $27 million worth of SID equipment was “unaccounted for.” New processes and accountability needed for the 2003 property inventory. The Crypto-Linguistic Association was established in 1965 to “support the continuing development and advancement of agency language analysts.” It had 200 members in 2003. Events included lectures, award ceremonies, and a luncheon with the “director of the Klingon Institute.” Three people from SIGINT Communications ran in a 5K race. Repeat: The 2002 SID property inventory showed more than $27 million worth of SID equipment was “unaccounted for.” New processes and accountability needed for the 2003 property inventory. Announcement for a SIGINT conference in June, including classes on “internet research.” Repeat: Announcement of cross-agency analyst forum on SARS (severe acute respiratory syndrome), including impact of the virus on China’s military. The Korean Issue Management Team identifies North Korean SIGINT gaps, prioritizes them, and challenges the enterprise to respond with solutions. SID leadership held an offsite at the University of Maryland’s Institute for Defense Analysis. WARGODDESS is a system that fuses multiple sources of signal data to help characterize targets and threats and produce estimates about targets and their intentions. The Collection Association was established in 1977 to provide “community-wide recognition and unique opportunities for professional growth in collection and related disciplines.” Historically, collectors were people who sat with an antenna and spied on the radio spectrum, but the role has expanded to spying using satellites and even gathering information from the internet. Operation SIGINT is recruiting new detailees to work with the Korean Issue Management Team. SEARCHLIGHT, the NSA internal directory, is adding middle names to link to identification systems, specifically to help the PKI (Public Key Infrastructure) system work. Dr. Zachary Abuza, a terrorism expert, will give an address to NSA workforce. SID senior enlisted advisor writes a tribute to Memorial Day. Recap of a conference on cross-border criminal activities, including trafficking in drugs, people, and weapons, as well as money laundering. Experts from academia, intelligence, and law enforcement communities provided briefings. At leadership offsite, SID director says he believes in magic of the workforce. Dr. Zachary Abuza, a terrorism expert, will give an address to NSA workforce. Part 1 of the Congress series explains the budget process and SID’s part in putting together the Congressional Budget Justification Book. Civilian and military employees hired in the past two years are invited to a feedback session. SIGINT director posts job for his civilian executive assistant. Part 2 of the Congress series explains budget jargon, describes the focus of the current budget, and names congressional staffers. Repost: SEARCHLIGHT, the NSA internal directory, is adding middle names to link to identification systems. Part 3 of the Congress series provides the number of queries from congressional staff and briefings per month. It also describes “Congressional Notifications,” where NSA alerts Congress to reports of “bad news” and other items of interest. JUNE 2003 SID leadership held its second offsite. Reminder of an upcoming speech by Brig. Gen. Zahner about the Iraq War. Description of a plan for the modernization of collection and processing of international communications from foreign communications satellites. Teaser for an upcoming SID Around the World series. Language award winners are announced. Language award winners are announced. Reminder about Brig. Gen. Zahner’s speech about the Iraq War. A continuing theme at the SID leadership offsite was decentralizing decision-making. A linguist describes his experiences supporting NSA offices in the Balkans theater. Description of Brig. Gen. Zahner’s speech, which covered the role of intelligence in Operation Iraqi Freedom and the importance of taking risks. Junior Officer Cryptologic Career Program offers a 36-month program to develop military SIGINT officers. Introduction of a new form for customer feedback. Only 5 percent of product has documented feedback; analysts encouraged to enter feedback into the database. An office manager describes the work, which includes helping keep morale high and being a manager’s eyes and ears. Sometimes the capabilities of office managers aren’t appreciated. Announcement of a new list of web links to support employees facing potentially stressful situations, like deployment to a war zone. Instructions about the performance review process and a note to managers about adding an objective related to property accountability. Awards announced for military performers of the quarter. SINIO Summer 2003 Series of Strategic Intelligence Issue Seminars Begins with Tough Times for Turkey
Announcement of a seminar on negative fallout from the Iraq War for Turkey and Turkey-U.S. relations. The PATENTHAMMER system was developed for SOCOM for advanced signal collection with remote, reach-back capability and deployed to Kosovo, Georgia, Afghanistan, Saudi Arabia, Bahrain, and the Philippines. NSA is finally getting better internet access on a new network; this is part of the multibillion-dollar Eagle Alliance outsourced contract. Staffers need internet training. An article describes the mission and recent activities of SIGINT Development, an expanding mission of NSA. The Crypto-Mathematics Institute is NSA’s oldest Learned Organization, founded in 1957 to “promote those aspects of mathematics which pertain to cryptology.” The organization hosts events and seminars, sponsors an essay contest, publishes a newsletter, and puts on a “classified mathematics conference called MATHFEST.” The assistant deputy director for customer relationships will be traveling to Europe headquarters and London. Promo for a series on the new SID leadership team. Annual conference on COMBAT SENT, an airborne collection system for information on potentially hostile radar systems. Cryptologic workforce will be required to populate an intelligence community database (Analytic Resources Catalog) with information on expertise. Announcement of a seminar on Latin America analyzing potential developments in the Andean region and Brazil over the next five years. The NSA director’s “final WARgram” on Operation Iraqi Freedom states, “Although major combat is over, Iraq is still a troubled environment and much work needs to be done.” Deputy director for analysis and production describes his leadership style. First Annual Analysis Conference invitation to all NSA civilian and military affiliates, second-party colleagues, and contractors with clearances. The conference, “Charting the Course to the Future,” will include seminars on analytic tradecraft. The senior technical leader for analysis and production writes that his primary concern is Digital Network Intelligence and the problems with access and cultural proclivities that affect reporting. NSA’s Japan representative describes the American military base. The front end for the majority of signals collected for exploitation at Kunia in Hawaii is on Okinawa. The International Affairs Institute was founded in 1971. It presents “distinguished speakers from the fields of business, politics, the military, and academia” and encourages members to write and publish papers. The IAI hosts events (including a trivia contest) and recruits heavily from interns. Key points from NSA Director Hayden’s paper “The Extended Enterprise: Where To From Here?” and its impact on the organization. A North Korea “rock drill” featuring experts from across the cryptologic community was held to prepare the cryptologic system to better support policymakers and war fighters. Announcement of a “Terrorism in Southeast Asia” seminar about Jemaah Islamiyah and terrorist groups in the Philippines. How to make SIDtoday your home page in Netscape and Explorer. Description of SID’s contribution to the capture of the “king of diamonds” from CENTCOM’s deck of cards representing its list of most wanted Iraqis. Explanation of beaver tails, a Canadian pastry. Example of dangerous incidents in Iraq from one day in June 2003. The war has entered the reconstruction phase, and SIGINT support has shifted to force protection. Announcement of forthcoming promotion list; congratulations to promotees and award recipients. The SIGINT director went with the NSA director to the Palliser Conference, an annual meeting of the five-eyes SIGINT and HUMINT agencies. Short book review of Neal Stephenson’s Cryptonomicon. Photo display of MG Quirk’s November 2002 trip to Baghdad, including a visit to Abu Ghraib prison; no photos are included, only the captions. In Belgium, SID has representatives at NATO in Brussels and Mons, where they work in an underground bunker. The assistant deputy director for customer relationships describes his first month on the job. List of SID HR personnel and their roles following a reorganization. SIGINT played a very prominent role in the capture of the “ace of diamonds” from CENTCOM’s card deck representing its list of most wanted Iraqis. Brig. Gen. Zahner’s speech to NSA on Operation Iraqi Freedom will be rebroadcast multiple times each day for a week on an internal video channel. Wrap-up of the 2003 SIGDEV conference; the theme was “Creating Opportunities Through Collaboration.” JULY 2003 An employee of the Cryptologic Applications Directorate writes about tours in Europe. A staff member at the Cryptologic Support Group writes about working at the Pentagon. The executive assistant to SIGINT Director Quirk describes a “daily roller coaster ride.” How NSA deals with electronic records, including tips on records management and transfer to the Records Center or Archives. AUGUST 2003 A typical day as a policy wonk at the NSA. The deputy director for customer relationships describes the business model of the Customer Relationships Directorate and the role of leadership. Explanation of the process of downgrading information’s classification level and who at NSA performs the downgrading task. Quotations from foreign press about the NSA Special U.S. Liaison Offices are representatives to the second-party countries (the U.K., Canada, Australia, and New Zealand) for cryptologic collaboration. The Foreign Affairs Directorate has officers overseeing second-party matters at Fort Meade, and each second party maintains a senior liaison at NSA. Data flow managers understand data and the processing that ensures that the collected signal is converted to data and intelligence and delivered to customers. SEPTEMBER 2003 A mission planner in the Denver field station writes about life and recreation in the Rockies. A mathematician describes work in the field of “diagnosis,” doing cryptanalysis on new types of encryption. Projects include working as part of a close-knit team looking for weaknesses in new cryptosystems, using a variety of tools to find patterns in ciphertext, and programming new tools that don’t yet exist. An NSA couple worked at locations in Germany’s Rheinland and enjoyed local cuisine and European travel. A Spanish linguist describes the steps in language analysis of intercept. On a typical day, a linguist can scan hundreds of items. Most of the time, the intercept is unproductive, but when actionable intelligence information is found, the value of a linguist becomes evident. The Action Team provides services to the director, chief of staff, and deputy directors. OCTOBER 2003 In part 1, a computer scientist compares tours in Misawa, Japan, and Menwith Hill in the U.K. In part 2, the computer scientist describes lifestyle differences between Japan and the U.K. Menwith Hill is four hours from a Taco Bell. NOVEMBER 2003 A senior operations officer in the National Security Operations Center represents the NSA director on watch in the round-the-clock critical mission center. DECEMBER 2003 Anecdote from a Gordon Regional Security Operations Center analyst who was asked to provide immediate intelligence on a specific flight from Iran to Syria, at the end of the workday. “Working as an analyst at GRSOC gives you the opportunity to fully experience the SIGINT process — GET IT, KNOW IT, USE IT.” A handy guide to military rank abbreviations. In the early days at Guantánamo, this NSA liaison officer worked in the Joint Interrogation Group. NSA liaison officers provided intelligence to support interrogations, observed or participated in interrogations, and relayed information back to NSA for SIGINT. Quotations from foreign press about the NSA.
CATAPULT; FIRSTFRUIT; JOURNEYMAN; MINUTEMAN PROMETHEUS; MUSKETEER; OUTPARKS; PATENTHAMMER; QUICKMASK; SEARCHLIGHT; WARGODDESS
![]() ![]() ![]() NSA Diary of an Abu Ghraib Interrogator May 11, 2016 The Secret NSA Diary of an Abu Ghraib Interrogator - The Intercept ![]() ![]() ![]() NSA Intercepts: United Nations, European Union, Italy February 23, 2016 NSA Targets World Leaders for US Geopolitical Interests - WikiLeaks Related Stories: WikiLeaks: NSA Spied on Israel’s Attempts to Repair Relations With U.S. - The Intercept WikiLeaks reveals the NSA spied on Berlusconi and his closest advisors - L'Espresso Irish citizen working for the UN Refugee Agency was targeted by the NSA - Medium UNITED NATIONS: (Source) ![]() NSA database extract of significant United Nations political telephone interception targets (View larger) Global SIGINT Highlights: EUROPEAN UNION: (Source) ![]() NSA database extract of significant European Union political telephone interception targets (View larger) Global SIGINT Highlights:
ITALY: (Source) ![]() NSA database extract of significant Italian political telephone interception targets (View larger) Global SIGINT Highlights: View More NSA Targets / Intercepts: ![]() ![]() ![]() GCHQ Malware Checklist and Data Mining Research Report February 2, 2016 Exclusive: Snowden intelligence docs reveal UK spooks' malware checklist - Boing Boing ![]() GCHQ March 2010: What's the worst that could happen? (3 pages)
![]() HIMR Data Mining Research Problem Book (96 pages) Analysis: A technical reading of the “HIMR Data Mining Research Problem Book” ![]() ![]() ![]() GCHQ and NSA Hacked Israeli Drone Video Feeds January 28, 2016 Israeli Drone Feeds Hacked By British and American Intelligence - The Intercept Hacked Images from Israel’s Drone Fleet - The Intercept
![]() S455N - Israeli UAV Digital Video (7 pages)
![]() ANARCHIST Training Manual: ISUAV Video Descrambling (3 pages) Analysis: Cryptanalysis of intercepted Israeli drone feeds Related: Laura Poitras Prepares ‘Astro Noise’ for the Whitney Museum - New York Times ANARCHIST ![]() ![]() |