Browse Items (626 total)

20140831-spiegel-nsa_intelligence_relationship_with_turkey.pdf
This document is an NSA information paper on the partnership between Turkish and U.S. intelligence. The paper provides key recent issues, discusses what each organization offers the other in terms of SIGINT, and refers to challenges balancing the…

20131117-spiegel-royal_concierge.pdf
This document is a presentation slide describing GCHQ's ROYAL CONCIERGE program. This "SIGINT driven hotel reservation tip-off service" enables analysts to exploit hotel reservation confirmation emails to enable more directed targeting of specified…

20131211-svt-nsa_slides_xkeyscore.pdf
This document is an extract from an internal NSA presentation about XKEYSCORE, the NSA's tool to search and analyze surveillance data. It describes the scope and content of the MARINA and PINWALE databases, as well as the NSA's ability to track…

20150701-intercept-advanced_http_activity_analysis.pdf
This document is an internal presentated prepared by an official within the NSA. it describes the basics of HTTP protocol and how to target and exploit this using the XKEYSCORE query and analysis tool.

20140127-nyt-converged_analysis_on_smartphone_devices.pdf
This document is a presentation detailing the potential uses of smartphone devices for signals intelligence. The presentation highlights the ability to access social media, location, search history, network history, and photo data from smartphones.…

20130816-wapo-targeting_rationale.pdf
This document is a memo that explains the rationale used by the NSA in its selection of surveillance targets outside the US. The document contains actual examples of certification examples that indicate that the staff of foreign heads of state and…

20131119-odni-ag_guidelines_for_domestic_fbi_operations (1).pdf
This document is a report prepared by the Office of the Attorney General of the United States. It lays out the legal and procedural frameworks for the collection of signals intelligence by the FBI. It describes the historical evolution of the…

20150803-intercept-back_in_time_the_echelon_story.pdf
This NSA newsletter article, reprinted from the internal publication Foreign Affairs Digest, gives a brief history of the communications intelligence system ECHELON, which targeted western communications satellites, and its interactions with European…

20150310-Intercept-TCB Jamboree 2012 Invitation.pdf
This document is a memo created by the CIA. It describes the Trusted Computing Base's Jamboree, held in Februrary 2012. The Jamboree was a conference dedicated to communicating research performed by members of the United States Intelligence Community…

20150505_intercept_human-language-technology.pdf
This document is a classification guide prepared by the NSA's Human Language Technology project. It gives the classification levels for the different models of human language analysis, including speaker recognition, gender recognition and anomaly…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2