For example, they claim Canada is monitoring hockey sites:
> Canada's Communications Security Establishment (CSEC) even monitors sites devoted to the country's national pastime: "We have noticed a large increase in chat activity on the hockeytalk sites. This is likely due to the beginning of playoff season," it says in one presentation.
But if you look at the actual slide https://i.imgur.com/2GO8H6L.png, it is clearly a fake sample report of what a real one might look like. It even uses the name 'Canukistan' as the country name.
There are 44 slide decks, one of the biggest leaks so far. It will take time to make sense of the noise. And any misinformation from reporting by non-technical journalists doesn't help the cause.
non-technical journalists
Ever heard of a certain Jacob Appelbaum?
However we already knew for a while that the active attacks are being done:
http://www.theguardian.com/technology/2014/dec/07/north-kore...
The active attack can of course obtain enough information to decrypt the traffic automatically afterwards or even record it unencrypted. It appears that's the context of the SSH decryption in the documents.
So, all your sessions are hosed at some point in time. Either now or in the future.
And yes, sensationalize is sometimes necessary to get more folks onboard to work with the documents.