This document is a classification guide prepared by the NSA's Human Language Technology project. It gives the classification levels for the different models of human language analysis, including speaker recognition, gender recognition and anomaly…
This document is a slide from a NSA Special Source Operations presentation on "Google Cloud Exploitation", a component of the MUSCULAR program, administered by GCHQ. MUSCULAR involves the interception of the data flows across the fibre optic cables…
This document contains one NSA slide listing the possible data selectors through which the NSA identifies possible surveillance targets. Possible selectors include email ids from popular services such as Google, MSN, and Hotmail; IP addresses; Device…
This document is a memo addressed to the Attorney General of the United Statesm Michael B. Mukasey by Kenneth L. Wainstein, Assistant Attorney General, National Security Division. The memo proposes an amendment of Department of Defence procedures to…
This document is an internal NSA presentation. It describes using the NSA's XKEYSCORE data analysis tool to retrieve and analyze Voice Over IP (VOIP) communications.
This article, published in the internal NSA newsletter SIDToday, describes the experience of a signals intelligence language analyst learning a "less-commonly-taught-language" (LCTL) to aid in his work. In this case the analyst, proficient already in…
This is a presentation report which gives an overview of the GCHQ program for monitoring unselected TLS events over popular websites such as Facebook, Twitter and Gmail. Transport Layer Security is "cryptographic protocol designed to provide…
This document contains internal NSA training material. This document welcomes potential technicians and analysts to a course devoted to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.