Browse Items (626 total)

20150701-intercept-voip_in_xks.pdf
This document is an internal NSA presentation. It describes using the NSA's XKEYSCORE data analysis tool to retrieve and analyze Voice Over IP (VOIP) communications.

20130627-guard-2007_memo_on_us_person_metadata.pdf
This document is a memo addressed to the Attorney General of the United Statesm Michael B. Mukasey by Kenneth L. Wainstein, Assistant Attorney General, National Security Division. The memo proposes an amendment of Department of Defence procedures to…

20140312-intercept-nsa_selector_types.pdf
This document contains one NSA slide listing the possible data selectors through which the NSA identifies possible surveillance targets. Possible selectors include email ids from popular services such as Google, MSN, and Hotmail; IP addresses; Device…

20150701-intercept-xks_workflows_2011.pdf

20131030-wapo-muscular_smiley.pdf
This document is a slide from a NSA Special Source Operations presentation on "Google Cloud Exploitation", a component of the MUSCULAR program, administered by GCHQ. MUSCULAR involves the interception of the data flows across the fibre optic cables…

20150505_intercept_human-language-technology.pdf
This document is a classification guide prepared by the NSA's Human Language Technology project. It gives the classification levels for the different models of human language analysis, including speaker recognition, gender recognition and anomaly…

20141204-intercept-auroragold_project_overview.pdf
This NSA document gives an overview of AURORAGOLD: "The mission of the AURORAGOLD (AG) project is to maintain data about international GSM/UMTS networks."

20140618-der_spiegel-boundless_informant_statistics_on_the_uk.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the frequency of collections under a variety of surveillance programs in the United Kingdom over a 30 day period.

20141214-intercept-gchq_making_network_sense_of_the_encryption.pdf
This document is a presentation from the GCHQ's Network Analysis Centre (NAC) examining ways to use network knowledge to help bypass the use of privacy-protected encryption. The Belgacom computer network exploitation (CNE) operation is used as an…

20140831-spiegel-sinio_seminar_tough_times_for_turkey.pdf
This NSA document announces an upcoming Strategic Intelligence Issue Seminar titled: "Tough Times for Turkey." The session's main focus concerns the "fallout from the Iraqi campaign" and the negative impact it has had on Turkish-US relations: "The…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2