Browse Items (626 total)

20140430-intercept-ghostmachine.pdf
This document contains presentation slides from the NSA Office of SIGINT Development detailing bulk data collection and analysis protocol improvements for greater efficiency and prioritzation of targets.

20150117-speigel-document_about_the_expansion_of_the_remote_operations_center_roc_on_endpoint_operations.pdf
This document is an article from the internal NSA newsletter, SIDToday, discussing the new facilities planned for the ROC - Remote Operations Center. This new facility will enhance the NSA's endpoint operations capability, which work to "subvert…

20151117-intercept-nsa_scs_venezuela.pdf
This document is an article from an internal NSA wiki. It describes an analysts methodology and process of collecting and analyzing data gleaned from employees of Petroleos de Venezuela, the primary oil producer of Venezuela.

20131119-odni-nsa_summary_of_requirements_for_collection_of_bulk_metadata.pdf
This document is a NSA brief explaining the FISC court-ordered procedures and restrictions for the (now defunct) NSA bulk electronic communications metadata program. This document includes standards for accessing the data, access requirements,…

20140618-der_spiegel-report_on_an_nsa_sigdev_training_course_for_allied_countries_.pdf
This document discusses the success of a NSA training session in SIGINT for its third-party partners in the Five Eye network.

20131024-guard-phones_world_leaders.pdf
This document is a report authored by members of the NSA's Signals Intelligence Directorate. It describes the NSA's efforts to encourage US officials to share their personal contact databases (called "rolodexes") to provide contact information for…

20131104-mundo-info_sharing_partners.pdf
This document is a report detailing the National Security Agency's policy for sharing cryptologic intelligence with the intelligence agencies of different countries. Western countries are divided into "Tier A" nations, which receive "comprehensive…

20150803-intercept-cqv_fields_nov_2010.pdf
The document appears to be an extract from a list of metadata field descriptors, concerning the coding of data for proper routing and analysis.

20150117-spiegel-sample_code_of_a_malware_program_from_the_five_eyes_alliance.pdf
This document contains code for the malware program QWERTY which, as part of the CNO program WARRIORPRIDE, collects the key strokes of an infected computer. Der Spiegel is releasing the code, found in the Snowden document collection, "in order to…

20141125-sz-cables_where_we_want_to_be.pdf
This document lists the cable interceptions desired by GCHQ. The document lists the cable's name, relationship (i.e. owner) and the desired access and egress capacities.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2