This document is a NSA release celebrating the completion of a modernization project at the NSA European Technichal Center in Wiesbaden, Germany. The document describes technical upgrades that will aid in signals intelligence.
This document is a NSA release detailing the transition of the European Security Center (ESC) into the European Security Operations Center (ESOC) - a NSA lead project to "help build up the Center's capabilities to allow it to assume even greater…
This document is a NSA release detailing the transition of the European Security Center (ESC) into the European Security Operations Center (ESOC) - a NSA lead project to "help build up the Center's capabilities to allow it to assume even greater…
This document is a NSA release which gives an account of an Xkeyscore (data processing system) training session, concerning bulk and targetted data collection and analysis, that took place at NSA's European Cryptologic Center (ECC) in Darmstadt,…
This document is a short presentation from the NSA Digital Network Crypt Applications unit (DNCA) describing expansions in scale and volume to the GALLANTWAVE decrpytion program.
This document is a classification guide that describes the appropriate security classificiations to be used when describing different elements of the operations of the NSA's Office of Cryptanalysis and Exploitation Services, including the…
This document is an extract of a report created by the NSA's division of Cryptanalysis and Exploitation Services (CES). It describes the Target Systems Project, which aims to produce capacities to exploit new communications technologies and systems…
This document is an NSA staff processing form addressed to the SIGINT Director of the NSA's Signals Intelligence Directorate (SID). It requests SID approval for the Cryptanalis and Exploitation Division (CES) at the Cryptologic Centers (CCs) in…
This document is a newsletter article from the NSA Cryptanalysis and Exploitation Services that discusses the rise of "ubiquitous encryption" on the internet, and the NSAs top secret strategies for circumvention.