This document is an internal NSA presentation. It documents the data analysis tool XKEYSCORE's ability to create and manage User Agents (UAs). UAs are strings of data sent to visited websites, providing XKEYSCORE with a means of gleaning various…
This document is an article from the NSA internal newsletter, SIDtoday. Originating from the NSA Center for Time-Sensitive Information, the article introduces Enhanced Video Text and Audio Processing (eViTAP) program to signals intelligence analysts.…
This document is an internal NSA presentation. It draws the distinction between retrieving full logs of digital network intelligence (DNI) data and retrieving HTTP activity requests when using the NSA's XKEYSCORE data analysis tool.
This document is a presentation prepared by CSEC. It describes CSEC's capabilities in CNE (Compter Network Exploitation) and CND (Computer Network Defense) operations. It also describes the EONBLUE cyber threat detection sensor.
This document is an extract from a draft report created by the Defence Signals Directorate (Australia), addressed to the Communications Security Establishment Canada (Canada). It describes the conditions under which DSD are permitted to share bulk,…
This NSA document provides a briefing on SENTRY EAGLE, the NSA and JFCC-NW's compartmented program for surveillance programs with ECI (Exceptionally Controlled Information). SENTRY EAGLE contains the following sub-programs: SENTRY OWL: NSA…
This document is an internal NSA presentation. It outlines the best strategies for targeting web forums for surveillance using the XKEYSCORE and PINWALE query systems.
This document is a memorandum of understanding between the NSA and Israel's National SIGINT National Unit. As part of this agreement, Israeli intelligence agencies are given minimized and unminimized raw SIGINT without removing information about US…