Links


Related weblogs:
- Christos military and intelligence corner
- About Canadian SIGINT: Lux ex Umbra
- About ciphers and crypto: Dirk's Weblog
- The nuclear secrecy blog: Restricted Data
- Embedded security, kernel and crypto challenges: root labs rdist
- Matthew Green: A Few Thoughts on Cryptographic Engineering
- Weblog of Bruce Schneier on Security
- Steven Aftergood's Secrecy News
- The Lawfare blog
- The weblog Empty Wheel
- Richard Bejtlich's blog: Tao Security
- The weblog of William M. Arkin Online
- About cyberwar: Matthijs R. Koot's notebook
- The Grugq's Tumblr: Underground Tradecraft
- Weblog from Errata Security
- Stewart Baker's Skating on Stilts
- Marc Ambinder's The Compass
- The weblog of intelligence expert Matthew Aid
- About intelligence, strategy and security: The XX Committee / re: Snowden
- French weblog about Intelligence and Defense: Zone d'Intérêt
- Dutch intelligence weblog: 3 Secret Fingers
- A US Intelligence blog: Intelnews.org
- The British Spy Blog
- — cypherpunks
- Wired State
- National Security Archive Blog


Related websites:
- The Infosecurity Magazine
- Jane's International Defence Review
- German website about Geheime Welten
- Dutch website about NetKwesties.nl
- German website about Netzpolitik.org
- Forum about Above Top Secret
- GlobalSecurity.org
- The Federation of American Scientists
- The Cryptome / Eyeball Series
- Nice Open Source IMINT
- Public Intelligence
- Government Attic
- The National Security Archive
- Media platform of Greenwald c.s.: The Intercept
- Articles by William Arkin: Phase Zero
- About national security issues: War on the Rocks
- Let's learn about intelligence: Intelligence 101
- Analysis of NSA material by Paul Dietrich
- AFCEA's SIGNAL Online
- The US National Cryptologic Museum Foundation
- The Homeland Security Digital Library
- Declassified documents: IC On the Record


Some key documents related to NSA
- Statement before the House Committee on the Judiciary on the FISA Amendments Act (pdf) (2016)
- National Research Council: Bulk Collection of Signals Intelligence: Technical Options (pdf) (2015)
- NSA Civil Liberties and Privacy Report about Targeted SIGINT Activities under EO 12333 (pdf) (2014)
- President Obama's Presidential Policy Directive (PPD-28) (pdf) (2014)
- Privacy and Civil Liberties Oversight Board report: Surveillance Program Operated Persuant to Section 702 FISA (pdf) (2014)
- Privacy and Civil Liberties Oversight Board report: Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act (pdf) (2014)
- Legal fact sheet: Executive Order 12333 (pdf) (2013)
- Reconstruction of the US National Intelligence Priorities Framework (2007-2013)
- The Department of Defense Directive about NSA/CSS (pdf) (2010)
- TheWeek.com: The NSA's org chart
- NSA's SIGINT Style Manual (pdf) (2010)
- The NSA Inspector General's Report about STELLARWIND (pdf) (2009)
- The NSA Strategic Mission List (pdf) (2007)
- The Classified Annex to EO 12333 (pdf) (1988)
- Executive Order 12333 (1981)


Some key documents related to GCHQ
- Intelligence and Security Committee of British Parliament: Report on the capabilities of the UK intelligence agencies (pdf) (2015)


Various interesting articles and sources
- The New York Times: Amid Trump Inquiry, a Primer on Surveillance Practices and Privacy (2017)
- Newsweek: How Snowden smartened up our spying (2016)
- The Nation: 5 Corporations Now Dominate Our Privatized Intelligence Industry (2016)
- TheRegister.co.uk: NSA’s top hacking boss explains how to protect your network from his attack squads (2015)
- Wired.com: Researchers Solve Juniper Backdoor Mystery; Signs Point to NSA (2015)
- EmptyWheel.net: The FISA Court’s Uncelebrated Good Points (2015)
- Zone d'Intérêt: U.S. Intelligence Support to Find, Fix, Finish Operations (2015)
- Truther Guide: Cryptoanarchists (2015)
- David Omand: Understanding Digital Intelligence and the Norms That Might Govern It (.pdf) (2015)
- Emptywheel.net: A Guide to the 5+ Known Intelligence Community Telecommunications Metadata Dragnets
- Webpolicy.org: Executive Order 12333 on American Soil, and Other Tales from the FISA Frontier
- Matthew Green about NSA's efforts to break internet encryption protocols
- About NSA's AURORAGOLD program: NSA Hacking of Cell Phone Networks
- About FBI "backdoor" searches: When Is Congress Going to Rein In FBI Surveillance?
- Robert Sesek: Unraveling NSA's TURBULENCE Programs
- Belgian report: De Snowden-revelaties: Massale data-captatie en politieke spionage(pdf)
- Future Force: How Do We Deal with a Flood of Data?
- PBS Frontline: United States of Secrets - Part 1 - Part 2
- ArsTechnica.com: How the NSA (may have) put a backdoor in RSA’s cryptography
- ProspectMagazine.com: The errors of Edward Snowden and Glenn Greenwald
- Munk Debates: Glenn Greenwald Debates Former NSA Director Michael Hayden
- ForeignPolicy.com: The Cowboy of the NSA
- NPR.org: Transcript: Interview with NSA Deputy Director John Inglis
- Der Spiegel: GCHQ Revealed: Inside Her Majesty’s Listening Service
- The Telegraph: Edward Snowden: Did the American whistleblower act alone?
- Ars Technica: Deep packet inspection meets ‘Net neutrality, CALEA
- A Washington Post Investigation: Top Secret America
- Historical information about NSA collected by Federation of American Scientists (FAS)
- A crash course about the Canadian signals intelligence agency CSEC
- Paper about the intelligence capabilities of France, Germany, Italy and Turkey (pdf)
- ArsTechnica.com: A primer on elliptic curve cryptography
- ForeignPolicy.com: Stuxnet's Secret Twin
- Nigel Inkster: Snowden – myths and misapprehensions
- About President of United States: Secret Service Protection
- The Guardian's NSA Files: Decoded (2013)
- About NSA’s Activities: Valid Foreign Intelligence Targets Are the Focus (2013)
- Overview of Cloud Computing in the Intelligence Community (2013)
- Extensive Employee's Guide to Security Responsibilities
- Wikipedia listing of Signals intelligence operational platforms by nation
- CNet.com NSA eavesdropping: How it might work
- The National Security Archive: The National Security Agency Declassified (2000/2005)


Signals Intelligence agencies:
- United States: National Security Agency (NSA)
- United Kingdom: Government Communications Headquarters (GCHQ)
- Canada: Communications Security Establishment (CSE)
- Australia: Australian Signals Directorate (ASD, formerly DSD)
- New Zealand: Government Communications Security Bureau (GCSB)
- Sweden: Försvarets radioanstalt (FRA)
- Denmark: Försvarets Central Radio (FCR)
- The Netherlands: Joint SIGINT Cyber Unit (JSCU)
- Israel: Israeli SIGINT National Unit (ISNU)
(in other countries, signals intelligence is part of the armed forces or the foreign intelligence agency)


Information Assurance agencies and divisions:
- United States: Information Assurance Directorate (IAD)
   - Information Assurance Support Environment (IASE)
   - Committee on National Security Systems (CNSS)
   - National Counterintelligence and Security Center (NCSC)
- United Kingdom: Communications-Electronics Security Group (CESG)
- Germany: Bundesamt für Sicherheit in der Informationstechnik (BSI)
- Italy: Organismo di Certificazione della Sicurezza Informatica (OCSI)
- France: Agence Nationale de la Sécurité des Systèmes d’Information (ANSSI)
- The Netherlands: Nationaal Bureau voor Verbindingsbeveiliging (NBV)
- NATO: Information Assurance Technical Centre (IATC)
- European Union: European Union Network and Information Security Agency (ENISA)
- United Nations: Department of Safety & Security (DSS)

US Intelligence Community contractors::
- SAIC - Leidos - CSRA - CACI - Booz Allen Hamilton
- Raytheon - General Dynamics - Boeing - Northrop Grumman
- L-3 Communications - CIS Secure Computing - Advanced Programs, Inc. (API) - Dell - PiccoTek
- Jasint - OptiMetrics - 2HB
- DRT - Klas Telecom - MacAulay-Brown
- Narus - Verint - IP Fabrics
- Mandiant - Endgame - CrowdStrike
- and many more...


About ECHELON
- Covert Government/Military Interception of International Telcommunications (1999)
- Duncan Campbell, Inside Echelon (2000)
- Duncan Campbell, Paper 1: Echelon and its role in COMINT (2001)
- Homepage of Duncan Campbell
- Homepage of Nicky Hager


Books about the Snowden-revelations
- Barton Gellman: Dark Mirror, Edward Snowden and the American Surveillance State, June 2017
- Edward Jay Epstein, How America Lost Its Secrets: Edward Snowden, the Man and the Theft, Knopf, January 2017
- Ronald Goldfarb e.a.: After Snowden: Privacy, Secrecy, and Security in the Information Age, May 2015
- David P. Fidler ed.: The Snowden Reader, Indiana University Press, April 2015 (review)
- Glenn Greenwald: No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State, Metropolitan Books, May 2014
- Michael Gurnow: The Edward Snowden Affair: Exposing the Politics and Media Behind the NSA Scandal, Blue River Press, April 2014
- Marcel Rosenbach & Holger Stark: Der NSA-Komplex: Edward Snowden und der Weg in die totale Überwachung, Deutsche Verlags-Anstalt, March 2014
- Luke Harding: The Snowden Files: The Inside Story of the World's Most Wanted Man, Vintage, February 2014


Books about signals intelligence agencies
- Richard J. Aldrich: GCHQ, The uncensored story of Britain's most secret intelligence agency(pdf) (2010)
- James Bamford: The Shadow Factory (2008)
- Matthew Aid, Cees Wiebes e.a.: Secrets of Signals Intelligence during the Cold War and beyond (pdf) (2001)
- Nicky Hager, Secret Power, New Zealand’s role in the international spy network (pdf) (1996)


Documentaries about NSA:
- 2009: The Spy Factory
- 1997: Inside the NSA


Intelligence studies associations:
- Netherlands Intelligence Studies Association: NISA
- Belgian Intelligence Studies Centre: BISC
- Center for the Study of Intelligence at the CIA
- Canadian Association for Intelligence and Security Studies: CASIS
- Gesprächskreis Nachrichtendienste in Deutschland: GKND
- Austrian Center for Intelligence, Propaganda & Security Studies: ACIPSS
- International Intelligence History Organization: IIHA


- European Network of National Intelligence Reviewers: ENNIR


Approved cryptographic products:
- For the United States / Secure Products Wiki
- For the United Kingdom
- For France
- For The Netherlands
- For Poland
- For the European Council
- For NATO


Websites about cryptographic equipment:
- Website about Cipher Machines
- The Dutch virtual Crypto Museum
- Jerry Proc's website about Crypto Machines
- Richard Brisson's collection of Vintage Cryptographic Artifacts
- Brooke Clark's pages about Crypto Machines
- Pictures by nesnet: Secure Phones
- Dirk Rijmenants' Cipher Machines and Cryptology


General telephony technology
- Weblog about internetworking: IPSpace.net
- The electronics of the Digital Non-Secure Voice Terminal (DNVT)
- eLectures about Telecommunications from ISDN and GSM to VoIP


General telephony history
- The American JKL Museum of Telephony
- Adam Forrest's website: Manufactured Discontinued
- In general: Telephone Collectors International
- Library of telephony documents
- The historical AT&T Tech Channel
- The Dutch Online Telephone Museum
- Vintage Dutch phones: Oude Telefoons - Telefoniemuseum Rotterdam
- Website about America's Cold War Infrastructure
- Yahoo news group about Cold War Communications
- Dutch weblog about Ongelukken in de krijgsmacht


General telephony websites
- Coveragemapfinder.com


General Internet technology
- Fiber-optic Data Rates - or Speeds
- Basic tutorial about computer networking: Omnisecu.com
- The 2017 Online Privacy Guide for Journalists



- Articles from this weblog posted on Reddit and Hacker News


More links will be added gradually!

2 comments:

Brianna said...

To Whom it may concern:

I am the social media manager for The Museum of Telephony. My role is to ensure the brand and content is done in a professional matter. I have been directed by Steven, "the Curator" to kindly request to change the description from "weblog" to ether "website" or "site" because "weblog" is too formal (I can't remember the last time someone used the phrase other than defining the word.) Most importantly, such phrase also DEVALUES the site, because despite it being hosted on WordPress, this site FAR from expressing personal thoughts from some emotionally troubled person, as "blogs" are stereotypically known for. He has spent five years, and possibly millions of words to describe said subjects over the hundreds of pictures. He also has nearly fifty WP pages that also link to posts within the "site" as we call it here.

We use "weblogs" (in your term) as a content management system, not to express our interest or history. It's a website for sure in the opinion.

If the change of description is informal for your standards, we both request you remove the link per to our request.

Thank you,
Brianna

P/K said...

The link to The Museum of Telephony has been removed.