Browse Items (626 total)

20140618-DerSpiegel-internal_nsa_discussion_guidelines_relating_to_cooperation_with_the_bnd_and_bfv.pdf
This document is a briefing sheet describing elements of the intelligence relationship between the National Security Agency and the German Federal Intelligence Service (BND) and the German Federal Office for the Protection of the Constitution (BfV).…

20150701-intercept-tracking_targets_on_online_social_networks.pdf
This document is an internal NSA presentation. It outlines the procedures for retrieving intelligence located in NSA repositories harvested from from online social networks using the NSA's data analysis tool, XKEYSCORE.

xks-system-administration.pdf
This document is an internal NSA presentation giving a detailde description of the systems adminstration of the XKEYSCORE data analysis tool. It provides a comprehensive outline of the tool's data architecture, GUI (Graphical User Interface), and…

20131122-dagbladet-afghanistan_collection.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Afghanistan in a 30 day period between December 10 2012 and Janurary 8…

20140618-der_spiegel-details_on_xkeyscore_from_an_internal_gchq_website.pdf
This document appears to be an extract from an NSA wiki. It describes the XKEYSCORE analytics program and its relationship with other NSA repositories such as PINWALEand TURMOIL, as well as GCHQ's MUSCULAR.

20150701-intercept-xks_application_ids_brief.pdf
This document is an internal NSA presentation. It further describes the syntax underlying Application IDs in the NSA's ZKEYSCORE data analysis tools. Application IDs are designed to increase the efficiency of queries to repositories of intelligence…

20141228-spiegel-intercept_with_pgp_encrypted_message.pdf
This document is a heavily redacted intercepted chat log. The log shows that the NSA was not able to decrypt the message that was encrypted with PGP (Pretty Good Privacy).

20131211-svt-xkeyscore_sources.pdf
This is an extract of an internal NSA presentation. It describes the sources of information that are aggregated in the NSA's access-tool, XKEYSCORE.

20131119-odni-nsa_course_materials_module_6_tech_personnel_v.25.pdf
This document contains internal NSA training material, explaining in detail the separation between the role the technician as it relates to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.

20141228-spiegel-guide_for_analysts_on_how_to_use_the_prism_skype_collection.pdf
This document is a guide for analysts on how to use PRISM Skype collection. It gives a background of the program which began Feb 2011 and now collects a "mixture of audio, video, chat, and file transfers." The bulk of the document answers frequently…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2