Affidavit of General Keith B. Alexander in the Matter of Foreign Governments, Foreign Factions, Foreign Entities, and Foreign-Based Political Organizations
Analyzing Mobile/Cellular DNI in XKEYSCORE
Ant Catalog
Blazing Saddles
Broadcast/Internet Radio Exploitation and Analysis
C1-030-05 Close Out for "Bush Lets U.S. Spy on Callers without Courts" - Action Memorandum
CASCADE : Joint Cyber Sensor Architecture
Classification Guide for ECI PAWLEYS (PAW) 02-19
Classification Guide for ECI WHIPGENIE 02-05
Close Access SIGADS
Collection Accesses : 30 Nov - 06 Dec 2009
Communications Capability Development Programme
Content or Metadata? Categorisation of aspects of intercepted communications - GCHQ policy guideance
Corporate FAA Reporting Metrics
CSEC Cyber Threat Capabilities : SIGINT and ITS : an end-to-end approach
CSEC SIGINT Cyber Discovery : Summary of the current effort
An Easy Win: Using SIGINT to Learn about New Viruses
EINSTEIN / CASTANET
Email Address vs User Activity
Event {SIGINT}
Exceptionally Controlled Information (ECI) As Of 12 September 2003
FASCIA : Example of Current Volumes and Limits
Finding and Querying on Document Metadata
FISA Amendments Act of 2008 Section 702 Summary Document
FISA Recap
Free File Uploaders (FFU)
Full Log vs. HTTP
Guide to using Contexts in XKS Fingerprints
Hacktivism: Online Covert Action
How Do I Begin Analyzing a Target's Email Address?
How to configure category throttling in XKEYSCORE
HRA auditing
HTTP Activity in XKEYSCORE
HTTP Activity vs. User Activity
Intelligence Oversight (IO) Quarterly Report - First Calendar Year 2012 (1 January - 31 March 2012)
Intelligently filtering your data: Brazil and Mexico case studies
Interim Competency Test for Access to BR FISA Data
Introduction to BADDECISION
Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints
Introduction to WLAN / 802.11 Active CNE Operations
Introduction to XKS Appliaction IDs and Fingerprints
Iran - Current Topics, Interaction with GCHQ
JTRIG Tools and Techniques
Kapersky User-Agent Strings
LOVELY HORSE
Medical Pattern of Life : Targeting High Value Individual #1 (SIGINT Enabling HUMINT / Targeting)
Memorandum for the Attorney General : Proposed Amendment to Department of Defence Procedures to Permit the NSA to Conduct Analysis of Communications Metadata Associated with Persons in the United States