Browse Items (626 total)

20141010-intercept-eci_pawleys_classification_guide.pdf
This document is a classification guide for the NSA's PAWLEYS program, which has a security classification of ECI (Exceptionally Controlled Information). PAWLEYS is a program aiming to protect clandestine HUMINT and computer network access intended…

20141010-intercept-eci_whipgenie_classification_guide.pdf
This document is a NSA classification guide for the WHIPGENIE program. WHIPGENIE has a security classification of ECI (Exceptionally Controlled Information). The program covers Special Source Operations (SSO) relationships with U.S. Corporate…

20141010-intercept-eci_whipgenie_classification_guide.pdf
This document is a NSA classification guide for the WHIPGENIE program. WHIPGENIE has a security classification of ECI (Exceptionally Controlled Information). The program covers Special Source Operations (SSO) relationships with U.S. Corporate…

20140311-nyt-classification_guide_for_fisa_the_protect_america_act_and_the_fisa_amendments_act.pdf
This document is a NSA classification guide relating to intelligence operations performed by the NSA under the authority of the Foreign Intelligence Surveillance Act (FISA), the Protect America Act (PAA), and the Fisa Amendments Act (FAA).

20150505_intercept_human-language-technology.pdf
This document is a classification guide prepared by the NSA's Human Language Technology project. It gives the classification levels for the different models of human language analysis, including speaker recognition, gender recognition and anomaly…

20150505_intercept_human-language-technology.pdf
This document is a classification guide prepared by the NSA's Human Language Technology project. It gives the classification levels for the different models of human language analysis, including speaker recognition, gender recognition and anomaly…

20140102-wapo-quantum_computing.pdf
This document is a classification guide for the NSA's quantum computing research program. The guide outlines the security levels of the specific aspects of the program, from an unclassified level that acknowledges the fact that the NSA conducts…

20140618-der_spiegel-guidelines_for_the_classification_of_nsa_sigint_details_1945-1967.pdf
This document is a classification guide for NSA Signals Intelligence material collected between 1945 and 1967. It also includes a glossary defining key terms used in U.S. intelligence material.

20141010-intercept-tarex_classification_guide.pdf
This document is a NSA classification guide for the NSA's Target Exploitation (TAREX) program. TAREX conducts worldwide signals intelligence (SIGINT) close-access operations and overt and clandestine human intelligence (HUMINT) in direct support of…

20131021-monde-close_access_sigads.pdf
This document is a NSA briefing of the close access SIGADs used by the NSA's Tailored Access Operations to perform diplomatic surveillance on embassies in New York and Washington, DC. The document also contains a glossary defining certain key SIGADs…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2