Browse Items (626 total)

20150505_intercept_human-language-technology.pdf
This document is a classification guide prepared by the NSA's Human Language Technology project. It gives the classification levels for the different models of human language analysis, including speaker recognition, gender recognition and anomaly…

20131030-wapo-muscular_smiley.pdf
This document is a slide from a NSA Special Source Operations presentation on "Google Cloud Exploitation", a component of the MUSCULAR program, administered by GCHQ. MUSCULAR involves the interception of the data flows across the fibre optic cables…

20150701-intercept-xks_workflows_2011.pdf

20140312-intercept-nsa_selector_types.pdf
This document contains one NSA slide listing the possible data selectors through which the NSA identifies possible surveillance targets. Possible selectors include email ids from popular services such as Google, MSN, and Hotmail; IP addresses; Device…

20130627-guard-2007_memo_on_us_person_metadata.pdf
This document is a memo addressed to the Attorney General of the United Statesm Michael B. Mukasey by Kenneth L. Wainstein, Assistant Attorney General, National Security Division. The memo proposes an amendment of Department of Defence procedures to…

20150701-intercept-voip_in_xks.pdf
This document is an internal NSA presentation. It describes using the NSA's XKEYSCORE data analysis tool to retrieve and analyze Voice Over IP (VOIP) communications.

20150811-intercept-are-obscure-languages-still-obscure.pdf
This article, published in the internal NSA newsletter SIDToday, describes the experience of a signals intelligence language analyst learning a "less-commonly-taught-language" (LCTL) to aid in his work. In this case the analyst, proficient already in…

20141228-speigel-analysis_from_ssl-tls_connections_through_gchq_in_the_flying_pig_database_0.pdf
This is a presentation report which gives an overview of the GCHQ program for monitoring unselected TLS events over popular websites such as Facebook, Twitter and Gmail. Transport Layer Security is "cryptographic protocol designed to provide…

20140618-der_spiegel-us_sites_with_nsa_personnel_in_germany.pdf
This document contains a NSA list of sites in Germany where NSA personnel were openly present but where the operations of SIGINT were kept top secret.

20131119-odni-nsa_course_materials_intro_v.13.pdf
This document contains internal NSA training material. This document welcomes potential technicians and analysts to a course devoted to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2