Browse Items (626 total)

20140630-WaPo-fisa_amendments_act_summary_document_1.pdf
This document is a briefing of the impact of the 2008 FISA Amendment Act's Section 702 upon the NSA's surveillance activities.

20131119-odni-nsa_summary_of_requirements_for_collection_of_bulk_metadata.pdf
This document is a NSA brief explaining the FISC court-ordered procedures and restrictions for the (now defunct) NSA bulk electronic communications metadata program. This document includes standards for accessing the data, access requirements,…

20131119-odni-office_of_general_council_business_record_analyst_training_slides.pdf
This document is a presentation used in NSA training material. This presentation was designed for use by NSA personnel with access to the bulk telephony metadata acquired by the NSA pursuant to Section 501 of FISA, for purposes of performing…

20131119-odni-nsa_summary_of_requirements_for_collection_of_bulk_metadata.pdf
This document is a NSA brief explaining the FISC court-ordered procedures and restrictions for the (now defunct) NSA bulk electronic communications metadata program. This document includes standards for accessing the data, access requirements,…

20140218-intercept-discovery_sigint_targeting_scenarios_and_compliance.pdf
This document is an entry from an internal NSA wiki. It describes various SIGINT targeting scenarios and the appropriate course of action in each case, provided from NSA guidelines and policies.

20131119-odni-nsa_cryptological_school_course_slides_on_legal_compliance_and_minimization_procedures.pdf
This document contains internal NSA training material, explaining the agency's legal, compliance, and minimization procedures. These course materials have been designed for NSA personnel that had access to bulk telephony and electronic communications…

20141204-intercept-nsa_gchq_csec_network_tradecraft_advancement.pdf
This document is an extract of a presentation discussing the collaboration between CSE, NSA and GSHQ on various aspects of signals intelligence, including VPN exploitation, network intelligence, IP analysis, and IR21 processing.

20130916-spiegel-credit_card_transactions.pdf
These documents are presentation slides prepared for the 2010 SIGDEV conference. The presentation describes the NSA's attempts to use network mapping to target various credit card authorization networks, with the aim to create actionable intelligence…

20140312-intercept-mhs_leverages_xkeyscore_for_quantum.pdf
This document describes experiments at the MHS base in Britain (Menwith Hill Satellite Station) with automated deep packet analysis of Yahoo and Hotmail to give insight into the potential success of QUANTUMTHEORY (data injection into a users system)…

20131209-nyt-nsa_games.pdf
This document is a report created by GCHQ and the NSA's UK Satellite Station, MHS. It describes the (then) state of the video gaming industry. The potential use of this industry for recruitment into Islamic terrorist organizations is discussed, as…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2