Browse Items (626 total)

20130905-guard-bullrun.pdf
This document is a NSA classification guide detailing the appropriate security classifications for describing different elements of program BULLRUN. This program is used to unlock encryption tools used to protect emails, banking and medical records.

20141204-intercept-wolframite_encryption_attack.pdf
This document is an extract from a GCHQ programme report that discusses decryption research and development for accessing mobile devices and apps. The programme name is WOLFRAMITE.

20130620-guard-702_targeting_procedures.pdf
This document is a memo submitted to the Foreign Intelligence Surveillance Court that describes the procedures used by the NSA for determining the "foreignness" of persons targeted for surveillance. The document also describes the oversight and…

20140311-nyt-ashcroft_memo_on_intelligence_sharing_procedures.pdf
This document is a memo originating from the office of the Attorney General of the United States. It describes the policies and procedures for disseminating mimimized intelligence information on U.S. citizens to foreign intelligence agencies,…

20131022-monde-prism_april_2013.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…

20130629-wapo-prism.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…

20140430-intercept-prism_olympics.pdf
This document is a presentaion slide prepared by NSA Special Source Operations, detailing the training and approval for PRISM access granted to 100 GCHQ users during the 2012 Olympics and the status of the collection as of 24 May 2012.

20130606-wapo-prism.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…

20130606-wapo-prism.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…

20130710-wapo-upstream.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from several U.S. Internet companies: Microsoft (since 2007), Yahoo!…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2