Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@ws50p:/home/devel/src/snowden-archive# git status
- On branch master
- Your branch is up to date with 'origin/master'.
- Changes not staged for commit:
- (use "git add/rm <file>..." to update what will be committed)
- (use "git checkout -- <file>..." to discard changes in working directory)
- deleted: documents/2013/20131014-thewashingtonpost__sso_collection_optimization.pdf
- deleted: documents/2013/20131014-thewashingtonpost__sso_collection_optimization_overview.pdf
- deleted: documents/2013/20131014-thewashingtonpost__sso_content_acquisition_optimization.pdf
- deleted: documents/2013/20131104-thewashingtonpost__sso_collection_optimization_google.pdf
- deleted: documents/2013/20131119-odni__ag_guidelines_for_domestic_fbi_operations.pdf
- deleted: documents/2013/20131119-odni__interim_competency_test_for_access_to_fisa_data.pdf
- deleted: documents/2013/20131119-odni__nsa_core_intelligence_oversight_training.pdf
- deleted: documents/2013/20131119-odni__nsa_course_materials_module_6_analytic_personal_v_18.pdf
- deleted: documents/2013/20131119-odni__nsa_course_materials_module_6_tech_personnel_v_25.pdf
- deleted: documents/2013/20131119-odni__nsa_cryptological_school_course_slides_on_legal_compliance_and_minimization_procedures.pdf
- deleted: documents/2013/20131119-odni__nsa_guidance_memo_on_legal_standards_for_searching_bulk_metadata.pdf
- deleted: documents/2013/20131119-odni__nsa_summary_of_requirements_for_collection_of_bulk_metadata.pdf
- deleted: documents/2013/20131119-odni__office_of_general_council_business_record_analyst_training_slides.pdf
- deleted: documents/2013/20131119-odni__united_states_signals_intelligence_directive_18_appendix_j.pdf
- deleted: documents/2013/20131119-odni__united_states_signals_intelligence_directive_18_january_25_2011.pdf
- deleted: documents/2013/20131120-theguardian__collection_processing_and_dissemination_of_allied_communications.pdf
- deleted: documents/2013/20131123-thenewyorktimes__sigint_strategy_23_february_2012.pdf
- deleted: documents/2013/20131126-thewashingtonpost__microsoft_cloud_exploitation.pdf
- deleted: documents/2013/20131211-svt__legal_issues_uk_regarding_sweden_and_quantum.pdf
- deleted: documents/2014/20140102-thewashingtonpost__quantum_computers_hard_targets.pdf
- deleted: documents/2014/20140127-thenewyorktimes__converged_analysis_on_smartphone_devices.pdf
- deleted: documents/2014/20140204-nbc__british_spies_attacked_hacktivist_anonymous.pdf
- deleted: documents/2014/20140207-nbc__gchq_honey_trap_cyber_attack_background_on_jtrig.pdf
- deleted: documents/2014/20140207-nbc__gchq_honey_trap_cyber_attack_leveraging_foreign_journalists_via_jtrig.pdf
- deleted: documents/2014/20140211-theintercept__drones_intercepting_communications.pdf
- deleted: documents/2014/20140218-theintercept__discovery_sigint_targeting_scenarios_and_compliance.pdf
- deleted: documents/2014/20140224-theintercept__training_for_covert_online_operations.pdf
- deleted: documents/2014/20140303-epicfoia__not-snowden__doj_report_on_pen_register_fisa_orders.pdf
- deleted: documents/2014/20140305-nrchandelsblad__dutch_shares_collected_anti_piracy_information_with_nsa.pdf
- deleted: documents/2014/20140307-theintercept__nsa_ask_zelda_an_interview_with_zelda.pdf
- deleted: documents/2014/20140307-theintercept__nsa_ask_zelda_guilty_until_proven_innocent.pdf
- deleted: documents/2014/20140307-theintercept__nsa_ask_zelda_is_bain_de_soleil_a_bane_on_the_nsa.pdf
- deleted: documents/2014/20140307-theintercept__nsa_ask_zelda_watching_every_word_in_snitch_city.pdf
- deleted: documents/2014/20140311-thenewyorktimes__ashcroft_memo_on_intelligence_sharing_procedures.pdf
- deleted: documents/2014/20140311-thenewyorktimes__classification_guide_for_fisa_the_protect_america_act_and_the_fisa_amendments_act.pdf
- deleted: documents/2014/20140311-thenewyorktimes__classification_guide_for_stellarwind_program_0.pdf
- deleted: documents/2014/20140311-thenewyorktimes__nsa_memo_expands_access_to_fisa_information.pdf
- deleted: documents/2014/20140311-thenewyorktimes__nsa_timeline_of_surveillance_law_developments.pdf
- deleted: documents/2014/20140312-theintercept__increasing_collection_capacity_by_increasing_implants.pdf
- deleted: documents/2014/20140312-theintercept__mhs_leverages_xkeyscore_for_quantum.pdf
- deleted: documents/2014/20140312-theintercept__nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf
- deleted: documents/2014/20140312-theintercept__nsa_technology_directorate_analysis_of_converged_data.pdf
- deleted: documents/2014/20140312-theintercept__the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf
- deleted: documents/2014/20140312-theintercept__turbine_industrial_scale_exploitation.pdf
- deleted: documents/2014/20140312-theintercept__vpn_and_voip_exploitation_with_hammerchant_and_hammerstein.pdf
- deleted: documents/2014/20140313-theintercept__nsa_cooperative_third_party_relationships.pdf
- deleted: documents/2014/20140315-theintercept__turbine_intelligence_command_and_control.pdf
- deleted: documents/2014/20140318-thewashingtonpost__adding_another_country_to_mystic_program.pdf
- deleted: documents/2014/20140318-thewashingtonpost__description_of_data_collection_under_mystic.pdf
- deleted: documents/2014/20140320-theintercept__targeting_system_administrator_accounts.pdf
- deleted: documents/2014/20140321-lemonde__french_intelligence_email_spying_operation.pdf
- deleted: documents/2014/20140322-thenewyorktimes__operation_shotgiant_objectives.pdf
- deleted: documents/2014/20140329-derspiegel__gchq_and_nsa_spy_on_heads_of_state.pdf
- deleted: documents/2014/20140404-theintercept__gchq_full_spectrum_cyber_effects.pdf
- deleted: documents/2014/20140618-derspiegel__agenda_for_the_visit_of_bsi_vice_president_andreas_konen_to_the_nsa.pdf
- deleted: documents/2014/20140618-derspiegel__boundless_informant_overview_global.pdf
- deleted: documents/2014/20140618-derspiegel__boundless_informant_statistics_for_so-called_third_parties.pdf
- deleted: documents/2014/20140618-derspiegel__boundless_informant_statistics_on_data_from_foreign_partners.pdf
- deleted: documents/2014/20140618-derspiegel__boundless_informant_statistics_on_germany.pdf
- deleted: documents/2014/20140618-derspiegel__boundless_informant_statistics_on_the_uk.pdf
- deleted: documents/2014/20140618-derspiegel__briefing_on_the_visit_to_the_nsa_of_high_ranking_bnd_official.pdf
- deleted: documents/2014/20140618-derspiegel__cooperation_between_the_nsa_bnd_and_bfv.pdf
- deleted: documents/2014/20140618-derspiegel__details_on_xkeyscore_from_an_internal_gchq_website.pdf
- deleted: documents/2014/20140618-derspiegel__european_technical_center_report_on_the_experiences_of_one_nsa_worker.pdf
- deleted: documents/2014/20140618-derspiegel__excerpt_on_the_sharing_of_xkeyscore_with_german_intelligence_agency_bfv.pdf
- deleted: documents/2014/20140618-derspiegel__explanation_of_nymrod_a_system_for_searching_for_people_and_places_in_databases_and_documents.pdf
- deleted: documents/2014/20140618-derspiegel__faqs_on_the_boundless_informant_program.pdf
- deleted: documents/2014/20140618-derspiegel__final_agenda_of_meeting_between_high_ranking_nsa_and_bnd_officials.pdf
- deleted: documents/2014/20140618-derspiegel__gchq_report_on_the_technical_abilities_of_tempora.pdf
- deleted: documents/2014/20140618-derspiegel__guidelines_for_the_classification_of_nsa_sigint_details_1945_1967.pdf
- deleted: documents/2014/20140618-derspiegel__guidelines_for_the_classification_of_suslag_details_and_the_nsa_bnd_cooperation.pdf
- deleted: documents/2014/20140618-derspiegel__internal_nsa_discussion_guidelines_relating_to_cooperation_with_the_bnd_and_bfv.pdf
- deleted: documents/2014/20140618-derspiegel__internal_nsa_presentation_on_the_bnds_organization.pdf
- deleted: documents/2014/20140618-derspiegel__nostalgic_recollections_from_nsa_workers_formerly_stationed_in_bad_aibling.pdf
- deleted: documents/2014/20140618-derspiegel__nsa_presentation_on_the_work_of_nymrod.pdf
- deleted: documents/2014/20140618-derspiegel__nsacss_europe_report_on_the_experiences_of_one_nsa_worker.pdf
- deleted: documents/2014/20140618-derspiegel__nsacss_presentation_on_technical_surveillance_in_europe_and_africa.pdf
- deleted: documents/2014/20140618-derspiegel__overview_of_the_use_of_boundless_informant_world_map.pdf
- deleted: documents/2014/20140618-derspiegel__preliminary_agenda_of_meeting_between_nsa_and_bnd_officials.pdf
- deleted: documents/2014/20140618-derspiegel__presentation_on_the_nsacia_unit_special_collection_service.pdf
- deleted: documents/2014/20140618-derspiegel__report_on_a_wharpdrive_incident_in_an_sso_presentation.pdf
- deleted: documents/2014/20140618-derspiegel__report_on_an_nsa_sigdev_training_course_for_allied_countries.pdf
- deleted: documents/2014/20140618-derspiegel__report_on_an_nsa_visit_to_bnd_site_and_on_data_transfer_from_the_bnd_to_the_nsa.pdf
- deleted: documents/2014/20140618-derspiegel__report_on_an_unexploded_ordnance_alarm_at_european_technical_centern.pdf
- deleted: documents/2014/20140618-derspiegel__report_on_an_xkeyscore_training_session_at_the_ecc_dagger_complex.pdf
- deleted: documents/2014/20140618-derspiegel__report_on_data_exchange_between_the_nsa_and_bnd_within_the_jsa_framework.pdf
- deleted: documents/2014/20140618-derspiegel__report_on_the_beginnings_of_the_european_security_center_esc_in_the_dagger_complex.pdf
- deleted: documents/2014/20140618-derspiegel__report_on_the_changing_of_the_escs_name_to_european_security_operations_center_esoc.pdf
- deleted: documents/2014/20140618-derspiegel__report_on_the_nsas_access_to_tempora.pdf
- deleted: documents/2014/20140618-derspiegel__report_on_the_one_year_anniversary_of_nsa_liaison_unit_suslag_in_bad_aibling.pdf
- deleted: documents/2014/20140618-derspiegel__report_on_the_surveillance_of_african_countries_by_jsa.pdf
- deleted: documents/2014/20140618-derspiegel__report_on_the_technical_expansion_of_the_european_technical_center_in_wiesbaden.pdf
- deleted: documents/2014/20140618-derspiegel__report_on_the_work_of_nsacss_europe.pdf
- deleted: documents/2014/20140618-derspiegel__restrictions_on_the_technical_surveillance_performed_by_jsa.pdf
- deleted: documents/2014/20140618-derspiegel__us_sites_with_nsa_personnel_in_germany.pdf
- deleted: documents/2014/20140618-derspiegel__world_map_from_the_boundless_informant_program.pdf
- deleted: documents/2014/20140618-derspiegel__zoom_of_a_boundless_informant_document_with_project_names.pdf
- deleted: documents/2014/20140630-thewashingtonpost__affidavit_of_keith_alexander_regarding_spying_on_foreign_entities.pdf
- deleted: documents/2014/20140630-thewashingtonpost__fisa_amendments_act_summary_document.pdf
- deleted: documents/2014/20140630-thewashingtonpost__fisa_judges_order_authorizing_surveillance_of_foreign_governments_and_organizations.pdf
- deleted: documents/2014/20140630-thewashingtonpost__list_of_governments_and_organizations_authorized_for_surveillance.pdf
- deleted: documents/2014/20140630-thewashingtonpost__odni_certification_regarding_foreign_entities.pdf
- deleted: documents/2014/20140709-theintercept__spying_on_muslim_american_leaders.pdf
- deleted: documents/2014/20140723-thewashingtonpost__post_signals_intelligence_authority_decision_tree.pdf
- deleted: documents/2014/20140803-theintercept__nsa_intelligence_relationship_with_israel.pdf
- deleted: documents/2014/20140805-theintercept__directorate_of_terrorist_identities_strategic_accomplishments_2013.pdf
- deleted: documents/2014/20140812-theintercept__gchq_covert_mobile_phones_policy.pdf
- deleted: documents/2014/20140825-theintercept__cia_colleagues_enthusiastically_welcome_nsa_training.pdf
- deleted: documents/2014/20140825-theintercept__dni_decision_memorandum_on_icreach.pdf
- deleted: documents/2014/20140825-theintercept__icreach_sharing_sigint_comms_metadata_with_the_intel_community_memo.pdf
- deleted: documents/2014/20140825-theintercept__sharing_communications_metadata_across_the_usic_icreach.pdf
- deleted: documents/2014/20140831-derspiegel__ncrs_with_foreign_relations_missions_become_suslas.pdf
- deleted: documents/2014/20140831-derspiegel__nsa_intelligence_relationship_with_turkey.pdf
- deleted: documents/2014/20140831-derspiegel__nsas_oldest_third_party_partnership.pdf
- deleted: documents/2014/20140831-derspiegel__sinio_seminar_tough_times_for_turkey.pdf
- deleted: documents/2014/20140831-derspiegel__sinio_seminar_turkey_and_the_kurds.pdf
- deleted: documents/2014/20140831-derspiegel__turkish_signal_intelligence_chief_agenda.pdf
- deleted: documents/2014/20140905-theintercept__quadrennial_intelligence_community_review_final_report.pdf
- deleted: documents/2014/20140914-derspiegel__treasure_map_announces_a_new_release.pdf
- deleted: documents/2014/20141010-theintercept__cno_core_secrets_security_structure.pdf
- deleted: documents/2014/20141010-theintercept__computer_network_exploitation_classification_guide.pdf
- deleted: documents/2014/20141010-theintercept__eci_pawleys_classification_guide.pdf
- deleted: documents/2014/20141010-theintercept__eci_whipgenie_classification_guide.pdf
- deleted: documents/2014/20141010-theintercept__exceptionally_controlled_information_listing.pdf
- deleted: documents/2014/20141125-suddeutschezeitung__cables_where_we_want_to_be.pdf
- deleted: documents/2014/20141125-suddeutschezeitung__mti_access_project_weekly_status_february_6_2009.pdf
- deleted: documents/2014/20141125-suddeutschezeitung__mti_access_project_weekly_status_june_27_2008.pdf
- deleted: documents/2014/20141125-suddeutschezeitung__mti_access_project_weekly_status_november_28_2008.pdf
- deleted: documents/2014/20141125-suddeutschezeitung__windstop_system_highlights.pdf
- deleted: documents/2014/20141204-theintercept__auroragold_target_technology_trends_center_support_to_wpmo.pdf
- deleted: documents/2014/20141204-theintercept__ir21_a_technology_warning_mechanism.pdf
- deleted: documents/2014/20141204-theintercept__nsa_first_ever_collect_of_high_interest_4g_cellular_signal.pdf
- deleted: documents/2014/20141204-theintercept__nsa_gchq_csec_network_tradecraft_advancement.pdf
- deleted: documents/2014/20141214-theintercept__gchq_making_network_sense_of_the_encryption.pdf
- deleted: documents/2014/20141214-theintercept__gchq_mobile_networks_in_my_noc_world.pdf
- deleted: documents/2014/20141214-theintercept__gchq_nac_review_january_march_2012.pdf
- deleted: documents/2014/20141214-theintercept__gchq_nac_review_october_december_2011.pdf
- deleted: documents/2014/20141228-derspiegel__analysis_from_ssl-tls_connections_through_gchq_in_the_flying_pig_database.pdf
- deleted: documents/2014/20141228-derspiegel__analytic_challenges_from_active_passive_integration_when_nsa_attacks_ipsec_vpns.pdf
- deleted: documents/2014/20141228-derspiegel__analytics_on_security_of_tor_hidden_services.pdf
- deleted: documents/2014/20141228-derspiegel__bluesnort_program_on_net_defense_from_encrypted_communications.pdf
- deleted: documents/2014/20141228-derspiegel__canadian_document_from_ces_on_tls_trends.pdf
- deleted: documents/2014/20141228-derspiegel__classification_guide_for_cryptanalysis.pdf
- deleted: documents/2014/20141228-derspiegel__decryption_of_vpn_connections_within_the_valiantsurf_program.pdf
- deleted: documents/2014/20141228-derspiegel__description_of_existing_projects_on_vpn_decryption.pdf
- deleted: documents/2014/20141228-derspiegel__description_of_voip_telephony_encryption_methods_and_other_ways_to_attack.pdf
- deleted: documents/2014/20141228-derspiegel__description_on_the_processing_of_vpn_data_packets_within_the_turmoil_program.pdf
- deleted: documents/2014/20141228-derspiegel__explanation_of_a_potential_technique_to_deanonymise_users_of_the_tor_network.pdf
- deleted: documents/2014/20141228-derspiegel__explanation_of_the_gallantwave_that_decrypts_vpn_traffic_within_longhaul.pdf
- deleted: documents/2014/20141228-derspiegel__explanation_of_the_poisennut_product_and_its_role_when_attacking_vpn.pdf
- deleted: documents/2014/20141228-derspiegel__explanation_of_the_transform_engine_emulator_when_attacking_vpn.pdf
- deleted: documents/2014/20141228-derspiegel__explanation_of_the_turmoil_gallantwave_program_and_its_role_when_attacking_vpn.pdf
- deleted: documents/2014/20141228-derspiegel__explanation_on_the_spin9_program_on_end_to_end_attacks_on_vpn.pdf
- deleted: documents/2014/20141228-derspiegel__gchq_briefing_on_the_bullrun_program.pdf
- deleted: documents/2014/20141228-derspiegel__gchq_presentation_on_the_bullrun_programs_decryption_capabilities.pdf
- deleted: documents/2014/20141228-derspiegel__general_description_how_nsa_handles_encrypted_traffic.pdf
- deleted: documents/2014/20141228-derspiegel__guide_for_analysts_on_how_to_use_the_prism_skype_collection.pdf
- deleted: documents/2014/20141228-derspiegel__intercept_with_pgp_encrypted_message.pdf
- deleted: documents/2014/20141228-derspiegel__intro_to_the_vpn_exploitation_process_mentioning_the_protocols_attacked_pptp_ipsec_ssl_ssh.pdf
- deleted: documents/2014/20141228-derspiegel__malibu_architecture_overview_to_exploit_vpn_communication.pdf
- deleted: documents/2014/20141228-derspiegel__national_information_assurance_research_laboratory_niarl_tundra.pdf
- deleted: documents/2014/20141228-derspiegel__potential_technique_to_deanonymise_users_of_tor_network.pdf
- deleted: documents/2015/20150117-derspeigel__analysis_of_chinese_methods_and_performed_actions_in_the_context_of_computer_network_exploitation.pdf
- deleted: documents/2015/20150117-derspeigel__classification_guide_for_computer_network_exploitation_cne.pdf
- deleted: documents/2015/20150117-derspeigel__combination_of_offensive_and_defensive_missions_how_fourth-party_missions_are_being_performed.pdf
- deleted: documents/2015/20150117-derspeigel__csec_document_about_the_recognition_of_trojans_and_other_network_based_anomaly.pdf
- deleted: documents/2015/20150117-derspeigel__csec_document_on_the_handling_of_existing_trojans_when_trojanizing_computers.pdf
- deleted: documents/2015/20150117-derspeigel__document_explaining_the_role_of_the_remote_operations_center_roc.pdf
- deleted: documents/2015/20150117-derspeigel__expansion_of_the_remote_operations_center_roc_on_endpoint_operations.pdf
- deleted: documents/2015/20150117-derspeigel__nsa_example_snowglobe_in_which_a_suspected_french_government_trojan_is_analyzed_to_find_out_if_it_can_be_helpful_for_own_interests.pdf
- deleted: documents/2015/20150117-derspeigel__nsa_program_tutelage_to_instrumentalize_third_party_attack_tools.pdf
- deleted: documents/2015/20150117-derspeigel__nsa_project_description_to_recognize_and_process_data_that_comes_from_third_party_attacks_on_computers.pdf
- deleted: documents/2015/20150117-derspeigel__nsa_training_course_material_on_computer_network_operations.pdf
- deleted: documents/2015/20150117-derspeigel__overview_of_methods_for_nsa_integrated_cyber_operations.pdf
- deleted: documents/2015/20150117-derspeigel__overview_of_the_transgression_program_to_analyze_and_exploit_foreign_cna-cne_exploits.pdf
- deleted: documents/2015/20150117-derspeigel__overview_on_the_nsa_use_of_bots_and_the_defiantwarrior_program.pdf
- deleted: documents/2015/20150117-derspeigel__process_analysts_choose_their_data_requirement_and_then_get_to_know_the_tools_that_can_do_the_job.pdf
- deleted: documents/2015/20150117-derspeigel__projects_of_the_tao-ato_department_such_as_the_remote_destruction_of_network_cards.pdf
- deleted: documents/2015/20150117-derspeigel__quantumtheory_is_a_set_of_technologies_allowing_man_on_the_side_interference_attacks_on_tcp_ip_connections_includes_straightbizarre_and_daredev.pdf
- deleted: documents/2015/20150117-derspeigel__report_of_nsa_employee_about_backdoor_in_the_openssh_daemon.pdf
- deleted: documents/2015/20150117-derspeigel__sample_code_of_malware_program_from_five_eyes_alliance.pdf
- deleted: documents/2015/20150117-derspeigel__supply-chain_interdiction_stealthy_techniques_can_crack_some_of_sigints_hardest_targets.pdf
- deleted: documents/2015/20150117-derspeigel__technical_description_of_the_fashioncleft_protocol.pdf
- deleted: documents/2015/20150117-derspeigel__the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa.pdf
- deleted: documents/2015/20150128-cbc__cse_presentation_on_the_levitation_project.pdf
- deleted: documents/2015/20150128-theintercept__cse_presentation_on_the_levitation_project.pdf
- deleted: documents/2015/20150204-theintercept__nato_civilian_intelligence_council_cyber_panel.pdf
- deleted: documents/2015/20150204-theintercept__open_source_for_cyber_defence_progress.pdf
- deleted: documents/2015/20150204-theintercept__who_else_is_targeting_your_target_collecting.pdf
- deleted: documents/2015/20150210-theintercept__iran_current_topics_interactions_with_gchq.pdf
- deleted: documents/2015/20150219-theintercept__ccne_email_addresses_jan10_mar10_trial.pdf
- deleted: documents/2015/20150219-theintercept__ccne_email_harvesting_jan10_mar10_trial.pdf
- deleted: documents/2015/20150219-theintercept__ccne_stats_summaries_jan10_mar10_trial.pdf
- deleted: documents/2015/20150219-theintercept__ccne_successes_jan10_mar10_trial.pdf
- deleted: documents/2015/20150219-theintercept__cne_access_to_core_mobile_networks.pdf
- deleted: documents/2015/20150219-theintercept__dapino_gamma_gemalto_yuaawaa_wiki.pdf
- deleted: documents/2015/20150219-theintercept__dapino_gamma_target_personalisation_centres.pdf
- deleted: documents/2015/20150219-theintercept__imsis_identified_with_ki_data_for_network.pdf
- deleted: documents/2016/20160606-theintercept__communications_capability_development_programme.pdf
- deleted: documents/2016/20160606-theintercept__mobile_apps_checkpoint_meeting_archives.pdf
- deleted: documents/2016/20160819-theintercept__course__introduction_nohidden_redacted.pdf
- deleted: documents/2016/20160819-theintercept__foxacid_overall_briefing_third_revision_redacted.pdf
- deleted: documents/2016/20160819-theintercept__introduction_to_baddecision_redacted.pdf
- deleted: documents/2016/20160819-theintercept__introduction_to_wlan_cne_operations_redacted.pdf
- deleted: documents/2016/20160819-theintercept__sigint_development_program_management_review_redacted.pdf
- deleted: documents/2016/20160906-theintercept__afghanistan_30_enemy_killed_january_february_2012.pdf
- deleted: documents/2016/20160906-theintercept__apparition_becomes_a_reality_new_corporate_vsat.pdf
- deleted: documents/2016/20160906-theintercept__apparition_ghosthunter_tasking_info.pdf
- deleted: documents/2016/20160906-theintercept__elegant_chaos_collect_it_all_exploit_it_all.pdf
- deleted: documents/2016/20160906-theintercept__elegant_chaos_collect_it_all_exploit_it_all_plus_notes.pdf
- deleted: documents/2016/20160906-theintercept__ghosthunter_and_the_geolocating_of_internet_cafes.pdf
- deleted: documents/2016/20160906-theintercept__ghosthunter_future_capabilities_2008.pdf
- deleted: documents/2016/20160906-theintercept__ghosthunter_only_capability_of_its_kind.pdf
- deleted: documents/2016/20160906-theintercept__gsm_tower_mapping_made_easier_and_more_accurate.pdf
- deleted: documents/2016/20160906-theintercept__menwith_satellite_classification_guide.pdf
- deleted: documents/2016/20160906-theintercept__mhs_continues_successful_counterterrorism_survey.pdf
- deleted: documents/2016/20160906-theintercept__mhs_databases_as_of_14_august_2008.pdf
- deleted: documents/2016/20160906-theintercept__mhs_initiatives_maximizing_our_access.pdf
- deleted: documents/2016/20160906-theintercept__new_ops_building_at_mhs_completed_fit_up_begins.pdf
- deleted: documents/2016/20160906-theintercept__new_technique_geolocates_targets_active_at.pdf
- deleted: documents/2016/20160906-theintercept__new_tool_combines_multi_int_multi_agency.pdf
- deleted: documents/2016/20160906-theintercept__project_sandstorm_wifi_geolocation_january_2011.pdf
- deleted: documents/2016/20160906-theintercept__sigint_target_package_leads_to_usmc_capture_of_alqaeda_weapons_procurer.pdf
- deleted: documents/2016/20160906-theintercept__traffic_series_is_your_collection_surveyed_or.pdf
- deleted: documents/2016/20160906-theintercept__uk_special_forces_reaper_drone_january_february_2012.pdf
- deleted: documents/2016/20160906-theintercept__work_is_progressing_on_menwith_hill_station_s.pdf
- deleted: documents/2016/20160906-theintercept__yemen_backhaul_comms_collected_january_2011.pdf
- deleted: documents/2016/20161116-theintercept__fairview_dataflow_charts_april_2012.pdf
- deleted: documents/2016/20161229-theintercept__anna_politkovskaya_intellipedia_redacted.pdf
- deleted: documents/2017/20170410-theintercept__10th_anniversary_edition_ep_3_damage_assessment.pdf
- Untracked files:
- (use "git add <file>..." to include in what will be committed)
- documents/2013/20131014-thewashingtonpost__sso_collection_optimization.pd
- documents/2013/20131014-thewashingtonpost__sso_collection_optimization_ov
- documents/2013/20131014-thewashingtonpost__sso_content_acquisition_optimi
- documents/2013/20131104-thewashingtonpost__sso_collection_optimization_go
- documents/2013/20131119-odni__ag_guidelines_for_domestic_fbi_operations.p
- documents/2013/20131119-odni__interim_competency_test_for_access_to_fisa_
- documents/2013/20131119-odni__nsa_core_intelligence_oversight_training.pd
- documents/2013/20131119-odni__nsa_course_materials_module_6_analytic_pers
- documents/2013/20131119-odni__nsa_course_materials_module_6_tech_personne
- documents/2013/20131119-odni__nsa_cryptological_school_course_slides_on_l
- documents/2013/20131119-odni__nsa_guidance_memo_on_legal_standards_for_se
- documents/2013/20131119-odni__nsa_summary_of_requirements_for_collection_
- documents/2013/20131119-odni__office_of_general_council_business_record_a
- documents/2013/20131119-odni__united_states_signals_intelligence_directiv
- documents/2013/20131120-theguardian__collection_processing_and_disseminat
- documents/2013/20131123-thenewyorktimes__sigint_strategy_23_february_2012
- documents/2013/20131126-thewashingtonpost__microsoft_cloud_exploitation.p
- documents/2013/20131211-svt__legal_issues_uk_regarding_sweden_and_quantum
- documents/2014/20140102-thewashingtonpost__quantum_computers_hard_targets
- documents/2014/20140127-thenewyorktimes__converged_analysis_on_smartphone
- documents/2014/20140204-nbc__british_spies_attacked_hacktivist_anonymous.
- documents/2014/20140207-nbc__gchq_honey_trap_cyber_attack_background_on_j
- documents/2014/20140207-nbc__gchq_honey_trap_cyber_attack_leveraging_fore
- documents/2014/20140211-theintercept__drones_intercepting_communications.
- documents/2014/20140218-theintercept__discovery_sigint_targeting_scenario
- documents/2014/20140224-theintercept__training_for_covert_online_operatio
- documents/2014/20140303-epicfoia__not-snowden__doj_report_on_pen_register
- documents/2014/20140305-nrchandelsblad__dutch_shares_collected_anti_pirac
- documents/2014/20140307-theintercept__nsa_ask_zelda_an_interview_with_zel
- documents/2014/20140307-theintercept__nsa_ask_zelda_guilty_until_proven_i
- documents/2014/20140307-theintercept__nsa_ask_zelda_is_bain_de_soleil_a_b
- documents/2014/20140307-theintercept__nsa_ask_zelda_watching_every_word_i
- documents/2014/20140311-thenewyorktimes__ashcroft_memo_on_intelligence_sh
- documents/2014/20140311-thenewyorktimes__classification_guide_for_fisa_th
- documents/2014/20140311-thenewyorktimes__classification_guide_for_stellar
- documents/2014/20140311-thenewyorktimes__nsa_memo_expands_access_to_fisa_
- documents/2014/20140311-thenewyorktimes__nsa_timeline_of_surveillance_law
- documents/2014/20140312-theintercept__increasing_collection_capacity_by_i
- documents/2014/20140312-theintercept__mhs_leverages_xkeyscore_for_quantum
- documents/2014/20140312-theintercept__nsa_phishing_tactics_and_man_in_the
- documents/2014/20140312-theintercept__nsa_technology_directorate_analysis
- documents/2014/20140312-theintercept__the_nsa_and_gchqs_quantumtheory_hac
- documents/2014/20140312-theintercept__turbine_industrial_scale_exploitati
- documents/2014/20140312-theintercept__vpn_and_voip_exploitation_with_hamm
- documents/2014/20140313-theintercept__nsa_cooperative_third_party_relatio
- documents/2014/20140315-theintercept__turbine_intelligence_command_and_co
- documents/2014/20140318-thewashingtonpost__adding_another_country_to_myst
- documents/2014/20140318-thewashingtonpost__description_of_data_collection
- documents/2014/20140320-theintercept__targeting_system_administrator_acco
- documents/2014/20140321-lemonde__french_intelligence_email_spying_operati
- documents/2014/20140322-thenewyorktimes__operation_shotgiant_objectives.p
- documents/2014/20140329-derspiegel__gchq_and_nsa_spy_on_heads_of_state.pd
- documents/2014/20140404-theintercept__gchq_full_spectrum_cyber_effects.pd
- documents/2014/20140618-derspiegel__agenda_for_the_visit_of_bsi_vice_pres
- documents/2014/20140618-derspiegel__boundless_informant_overview_global.p
- documents/2014/20140618-derspiegel__boundless_informant_statistics_for_so
- documents/2014/20140618-derspiegel__boundless_informant_statistics_on_dat
- documents/2014/20140618-derspiegel__boundless_informant_statistics_on_ger
- documents/2014/20140618-derspiegel__boundless_informant_statistics_on_the
- documents/2014/20140618-derspiegel__briefing_on_the_visit_to_the_nsa_of_h
- documents/2014/20140618-derspiegel__cooperation_between_the_nsa_bnd_and_b
- documents/2014/20140618-derspiegel__details_on_xkeyscore_from_an_internal
- documents/2014/20140618-derspiegel__european_technical_center_report_on_t
- documents/2014/20140618-derspiegel__excerpt_on_the_sharing_of_xkeyscore_w
- documents/2014/20140618-derspiegel__explanation_of_nymrod_a_system_for_se
- documents/2014/20140618-derspiegel__faqs_on_the_boundless_informant_progr
- documents/2014/20140618-derspiegel__final_agenda_of_meeting_between_high_
- documents/2014/20140618-derspiegel__gchq_report_on_the_technical_abilitie
- documents/2014/20140618-derspiegel__guidelines_for_the_classification_of_
- documents/2014/20140618-derspiegel__internal_nsa_discussion_guidelines_re
- documents/2014/20140618-derspiegel__internal_nsa_presentation_on_the_bnds
- documents/2014/20140618-derspiegel__nostalgic_recollections_from_nsa_work
- documents/2014/20140618-derspiegel__nsa_presentation_on_the_work_of_nymro
- documents/2014/20140618-derspiegel__nsacss_europe_report_on_the_experienc
- documents/2014/20140618-derspiegel__nsacss_presentation_on_technical_surv
- documents/2014/20140618-derspiegel__overview_of_the_use_of_boundless_info
- documents/2014/20140618-derspiegel__preliminary_agenda_of_meeting_between
- documents/2014/20140618-derspiegel__presentation_on_the_nsacia_unit_speci
- documents/2014/20140618-derspiegel__report_on_a_wharpdrive_incident_in_an
- documents/2014/20140618-derspiegel__report_on_an_nsa_sigdev_training_cour
- documents/2014/20140618-derspiegel__report_on_an_nsa_visit_to_bnd_site_an
- documents/2014/20140618-derspiegel__report_on_an_unexploded_ordnance_alar
- documents/2014/20140618-derspiegel__report_on_an_xkeyscore_training_sessi
- documents/2014/20140618-derspiegel__report_on_data_exchange_between_the_n
- documents/2014/20140618-derspiegel__report_on_the_beginnings_of_the_europ
- documents/2014/20140618-derspiegel__report_on_the_changing_of_the_escs_na
- documents/2014/20140618-derspiegel__report_on_the_nsas_access_to_tempora.
- documents/2014/20140618-derspiegel__report_on_the_one_year_anniversary_of
- documents/2014/20140618-derspiegel__report_on_the_surveillance_of_african
- documents/2014/20140618-derspiegel__report_on_the_technical_expansion_of_
- documents/2014/20140618-derspiegel__report_on_the_work_of_nsacss_europe.p
- documents/2014/20140618-derspiegel__restrictions_on_the_technical_surveil
- documents/2014/20140618-derspiegel__us_sites_with_nsa_personnel_in_german
- documents/2014/20140618-derspiegel__world_map_from_the_boundless_informan
- documents/2014/20140618-derspiegel__zoom_of_a_boundless_informant_documen
- documents/2014/20140630-thewashingtonpost__affidavit_of_keith_alexander_r
- documents/2014/20140630-thewashingtonpost__fisa_amendments_act_summary_do
- documents/2014/20140630-thewashingtonpost__fisa_judges_order_authorizing_
- documents/2014/20140630-thewashingtonpost__list_of_governments_and_organi
- documents/2014/20140630-thewashingtonpost__odni_certification_regarding_f
- documents/2014/20140709-theintercept__spying_on_muslim_american_leaders.p
- documents/2014/20140723-thewashingtonpost__post_signals_intelligence_auth
- documents/2014/20140803-theintercept__nsa_intelligence_relationship_with_
- documents/2014/20140805-theintercept__directorate_of_terrorist_identities
- documents/2014/20140812-theintercept__gchq_covert_mobile_phones_policy.pd
- documents/2014/20140825-theintercept__cia_colleagues_enthusiastically_wel
- documents/2014/20140825-theintercept__dni_decision_memorandum_on_icreach.
- documents/2014/20140825-theintercept__icreach_sharing_sigint_comms_metada
- documents/2014/20140825-theintercept__sharing_communications_metadata_acr
- documents/2014/20140831-derspiegel__ncrs_with_foreign_relations_missions_
- documents/2014/20140831-derspiegel__nsa_intelligence_relationship_with_tu
- documents/2014/20140831-derspiegel__nsas_oldest_third_party_partnership.p
- documents/2014/20140831-derspiegel__sinio_seminar_tough_times_for_turkey.
- documents/2014/20140831-derspiegel__sinio_seminar_turkey_and_the_kurds.pd
- documents/2014/20140831-derspiegel__turkish_signal_intelligence_chief_age
- documents/2014/20140905-theintercept__quadrennial_intelligence_community_
- documents/2014/20140914-derspiegel__treasure_map_announces_a_new_release.
- documents/2014/20141010-theintercept__cno_core_secrets_security_structure
- documents/2014/20141010-theintercept__computer_network_exploitation_class
- documents/2014/20141010-theintercept__eci_pawleys_classification_guide.pd
- documents/2014/20141010-theintercept__eci_whipgenie_classification_guide.
- documents/2014/20141010-theintercept__exceptionally_controlled_informatio
- documents/2014/20141125-suddeutschezeitung__cables_where_we_want_to_be.pd
- documents/2014/20141125-suddeutschezeitung__mti_access_project_weekly_sta
- documents/2014/20141125-suddeutschezeitung__windstop_system_highlights.pd
- documents/2014/20141204-theintercept__auroragold_target_technology_trends
- documents/2014/20141204-theintercept__ir21_a_technology_warning_mechanism
- documents/2014/20141204-theintercept__nsa_first_ever_collect_of_high_inte
- documents/2014/20141204-theintercept__nsa_gchq_csec_network_tradecraft_ad
- documents/2014/20141214-theintercept__gchq_making_network_sense_of_the_en
- documents/2014/20141214-theintercept__gchq_mobile_networks_in_my_noc_worl
- documents/2014/20141214-theintercept__gchq_nac_review_january_march_2012.
- documents/2014/20141214-theintercept__gchq_nac_review_october_december_20
- documents/2014/20141228-derspiegel__analysis_from_ssl-tls_connections_thr
- documents/2014/20141228-derspiegel__analytic_challenges_from_active_passi
- documents/2014/20141228-derspiegel__analytics_on_security_of_tor_hidden_s
- documents/2014/20141228-derspiegel__bluesnort_program_on_net_defense_from
- documents/2014/20141228-derspiegel__canadian_document_from_ces_on_tls_tre
- documents/2014/20141228-derspiegel__classification_guide_for_cryptanalysi
- documents/2014/20141228-derspiegel__decryption_of_vpn_connections_within_
- documents/2014/20141228-derspiegel__description_of_existing_projects_on_v
- documents/2014/20141228-derspiegel__description_of_voip_telephony_encrypt
- documents/2014/20141228-derspiegel__description_on_the_processing_of_vpn_
- documents/2014/20141228-derspiegel__explanation_of_a_potential_technique_
- documents/2014/20141228-derspiegel__explanation_of_the_gallantwave_that_d
- documents/2014/20141228-derspiegel__explanation_of_the_poisennut_product_
- documents/2014/20141228-derspiegel__explanation_of_the_transform_engine_e
- documents/2014/20141228-derspiegel__explanation_of_the_turmoil_gallantwav
- documents/2014/20141228-derspiegel__explanation_on_the_spin9_program_on_e
- documents/2014/20141228-derspiegel__gchq_briefing_on_the_bullrun_program.
- documents/2014/20141228-derspiegel__gchq_presentation_on_the_bullrun_prog
- documents/2014/20141228-derspiegel__general_description_how_nsa_handles_e
- documents/2014/20141228-derspiegel__guide_for_analysts_on_how_to_use_the_
- documents/2014/20141228-derspiegel__intercept_with_pgp_encrypted_message.
- documents/2014/20141228-derspiegel__intro_to_the_vpn_exploitation_process
- documents/2014/20141228-derspiegel__malibu_architecture_overview_to_explo
- documents/2014/20141228-derspiegel__national_information_assurance_resear
- documents/2014/20141228-derspiegel__potential_technique_to_deanonymise_us
- documents/2015/20150117-derspeigel__analysis_of_chinese_methods_and_perfo
- documents/2015/20150117-derspeigel__classification_guide_for_computer_net
- documents/2015/20150117-derspeigel__combination_of_offensive_and_defensiv
- documents/2015/20150117-derspeigel__csec_document_about_the_recognition_o
- documents/2015/20150117-derspeigel__csec_document_on_the_handling_of_exis
- documents/2015/20150117-derspeigel__document_explaining_the_role_of_the_r
- documents/2015/20150117-derspeigel__expansion_of_the_remote_operations_ce
- documents/2015/20150117-derspeigel__nsa_example_snowglobe_in_which_a_susp
- documents/2015/20150117-derspeigel__nsa_program_tutelage_to_instrumentali
- documents/2015/20150117-derspeigel__nsa_project_description_to_recognize_
- documents/2015/20150117-derspeigel__nsa_training_course_material_on_compu
- documents/2015/20150117-derspeigel__overview_of_methods_for_nsa_integrate
- documents/2015/20150117-derspeigel__overview_of_the_transgression_program
- documents/2015/20150117-derspeigel__overview_on_the_nsa_use_of_bots_and_t
- documents/2015/20150117-derspeigel__process_analysts_choose_their_data_re
- documents/2015/20150117-derspeigel__projects_of_the_tao-ato_department_su
- documents/2015/20150117-derspeigel__quantumtheory_is_a_set_of_technologie
- documents/2015/20150117-derspeigel__report_of_nsa_employee_about_backdoor
- documents/2015/20150117-derspeigel__sample_code_of_malware_program_from_f
- documents/2015/20150117-derspeigel__supply-chain_interdiction_stealthy_te
- documents/2015/20150117-derspeigel__technical_description_of_the_fashionc
- documents/2015/20150117-derspeigel__the_fashioncleft_protocol_nsa_uses_to
- documents/2015/20150128-cbc__cse_presentation_on_the_levitation_project.p
- documents/2015/20150128-theintercept__cse_presentation_on_the_levitation_
- documents/2015/20150204-theintercept__nato_civilian_intelligence_council_
- documents/2015/20150204-theintercept__open_source_for_cyber_defence_progr
- documents/2015/20150204-theintercept__who_else_is_targeting_your_target_c
- documents/2015/20150210-theintercept__iran_current_topics_interactions_wi
- documents/2015/20150219-theintercept__ccne_email_addresses_jan10_mar10_tr
- documents/2015/20150219-theintercept__ccne_email_harvesting_jan10_mar10_t
- documents/2015/20150219-theintercept__ccne_stats_summaries_jan10_mar10_tr
- documents/2015/20150219-theintercept__ccne_successes_jan10_mar10_trial.pd
- documents/2015/20150219-theintercept__cne_access_to_core_mobile_networks.
- documents/2015/20150219-theintercept__dapino_gamma_gemalto_yuaawaa_wiki.p
- documents/2015/20150219-theintercept__dapino_gamma_target_personalisation
- documents/2015/20150219-theintercept__imsis_identified_with_ki_data_for_n
- documents/2016/20160606-theintercept__communications_capability_developme
- documents/2016/20160606-theintercept__mobile_apps_checkpoint_meeting_arch
- documents/2016/20160819-theintercept__course__introduction_nohidden_redac
- documents/2016/20160819-theintercept__foxacid_overall_briefing_third_revi
- documents/2016/20160819-theintercept__introduction_to_baddecision_redacte
- documents/2016/20160819-theintercept__introduction_to_wlan_cne_operations
- documents/2016/20160819-theintercept__sigint_development_program_manageme
- documents/2016/20160906-theintercept__afghanistan_30_enemy_killed_january
- documents/2016/20160906-theintercept__apparition_becomes_a_reality_new_co
- documents/2016/20160906-theintercept__apparition_ghosthunter_tasking_info
- documents/2016/20160906-theintercept__elegant_chaos_collect_it_all_exploi
- documents/2016/20160906-theintercept__ghosthunter_and_the_geolocating_of_
- documents/2016/20160906-theintercept__ghosthunter_future_capabilities_200
- documents/2016/20160906-theintercept__ghosthunter_only_capability_of_its_
- documents/2016/20160906-theintercept__gsm_tower_mapping_made_easier_and_m
- documents/2016/20160906-theintercept__menwith_satellite_classification_gu
- documents/2016/20160906-theintercept__mhs_continues_successful_counterter
- documents/2016/20160906-theintercept__mhs_databases_as_of_14_august_2008.
- documents/2016/20160906-theintercept__mhs_initiatives_maximizing_our_acce
- documents/2016/20160906-theintercept__new_ops_building_at_mhs_completed_f
- documents/2016/20160906-theintercept__new_technique_geolocates_targets_ac
- documents/2016/20160906-theintercept__new_tool_combines_multi_int_multi_a
- documents/2016/20160906-theintercept__project_sandstorm_wifi_geolocation_
- documents/2016/20160906-theintercept__sigint_target_package_leads_to_usmc
- documents/2016/20160906-theintercept__traffic_series_is_your_collection_s
- documents/2016/20160906-theintercept__uk_special_forces_reaper_drone_janu
- documents/2016/20160906-theintercept__work_is_progressing_on_menwith_hill
- documents/2016/20160906-theintercept__yemen_backhaul_comms_collected_janu
- documents/2016/20161116-theintercept__fairview_dataflow_charts_april_2012
- documents/2016/20161229-theintercept__anna_politkovskaya_intellipedia_red
- documents/2017/20170410-theintercept__10th_anniversary_edition_ep_3_damag
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement