This document is a presentation on "shaping:" Active implant copies traffic and directs a copy past a passive collector, such as TURMOIL. It allows for decryption, collecting metadata records and analysis of internet key exhanges, selection of VPNs,…
This document is an internal GCHQ presentation. It describes the legal and regulatory framework that UK based intelligence services operate within. It describes key pieces of legislation, key commissions and regulatory watchdogs, and also compares…
This document is a presentation deck from the NSA's Threat Operations Center (NTOC) outlining TUTELAGE, an application that instrumentalizes 3rd party attacks. The presentation goes over TUTELAGE's current and future capabilities of alerting,…
This document is a presentation giving an overview of a new branch within the NSA, "Custom Thread Development for Network Encryption," in which a team "OTP VPN Exploitation" will aid diverse SIGINT teams in decryption. The document goes over the…
This document is a presentation describing the mission statement BOUNDLESSINFORMANT, the NSA's tool used to track and visualize global surveillance data. This document is an expanded version of that released by the Guardian.
This document is a classification guide that describes the appropriate security classificiations to be used when describing different elements of the operations of the NSA's Office of Cryptanalysis and Exploitation Services, including the…
This document is an internal NSA presentation. It outlines the features of the XKEYSCORE data analysis application, specifically, its ability to retrieve data based on both HTTP traffic and user activity metadata.
This is an NSA document from the internal newsletter SIDtoday. It is written by Teresa H. Shea, Director, Signal Intelligene Directorate, and gives general congratulations to the 'SIGINT Enterprise' for a successful 2011, with a focus on their work…
This document contains slides from a weekly NSA presentation which allude to the discovery of an "access point for WHARPDRIVE" by personnel of a commerical target and the resulting cover up.