This document is a technical description of the FASHIONCLEFT computer network exploitation (CNE) collection protocol. It "enables raw data packets from the external internet to interface to the Common Data Receptor (CDR) of Data Network Technology's…
This document is a presentation that reviews in detail the capabilities and constraints of the GCHQ program VPN SPIN 9 - a VPN decryption program. The document shows how the VPN service is connected to other SIGINT programs, maps out several…
This NSA document is a final version of the agenda detailing plans for a conference hosted by the NSA, attended by high ranking officials in the German BND (Federal Intelligence Service) and the NSA.
This document is an internal NSA presentation. It outlines how XKEYSCORE can be used to gather information using metadata gleaned from document metadata (e.g. embeded documents, images or sound files), in contrast to more traditional selectors (e.g.…
This document is an article from the NSA internal newsletter, SIDtoday. It was written by the Intelligence Analysis Technical Director, NSA Texas, and it dicusses the use of Human Language Technology (HLT) in intelligence operations in Mexico, as…
This document is a NSA brief explaining the FISC court-ordered procedures and restrictions for the (now defunct) NSA bulk electronic communications metadata program. This document includes standards for accessing the data, access requirements,…
This document is a NSA brief explaining the FISC court-ordered procedures and restrictions for the (now defunct) NSA bulk electronic communications metadata program. This document includes standards for accessing the data, access requirements,…
This document is a series of NSA spreadsheets and presentation slides that illustrate surveillance activities being undertaken against foreign and domestic Islamic community leaders.