This document is an article retrieved from GCHQ's internal Wiki, GCWiki. It outlines the operations of GCHQ's TEA-RE Reverse Engineering team, who provide the NSA with research and development into a variety of cyrptographic related products and…
This document is an NSA report detailing the United States' preparations for the G8 and G20 Summits, held in Canada in 2010. It includes an assessment of the threat potential for the events. The NSA was not directly present at either event, but…
This document is an article from the NSA's internal Wiki, Intellipedia. It documents various manhunting operations occuring around the world in 2008. Notably, it mentions the assassination of Syrian Brigadier General Muhammad Sulayman in Tartous,…
This document is a course outline used in training new NSA analysts and technicians in the (now defunct) Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.
This document is an extract of a report created by the NSA's division of Cryptanalysis and Exploitation Services (CES). It describes the Target Systems Project, which aims to produce capacities to exploit new communications technologies and systems…
This document is an article from the internal NSA Yakima Research Station (YRS) newsletter, The Northwest Passage. The article celebrates the YRS 40th anniversary of operations, focusing on its role within the ECHELON program "to collect and process…
This document is a NSA presentation given at the 2012 SIGDEV Conference. It discusses the AURORAGOLD program which tracks information on exploiting mobile networks and industry developments.