Browse Items (626 total)

20131210-wapo-target_location.pdf
This document is an excerpt from a transcript of an NSA training video. It describes how to verify the location of a targeted mobile device. It describes how the NSA monitors different types of mobile signaling information known as HLR and VLR…

20140305-nrc-dutch_shares_collected_anti-piracy_information_with_nsa.pdf
This document contains a presentation slide detailing NSA collaboration with the Dutch Defence Intelligence and Security Service (MIVD) in anti-piracy operations in and around Somalia. It specifically talks about intercept operations against a…

20130905-guard-sigint_enabling.pdf
This document is a budget request for the SIGINT Enabling project for the financial year of 2013. This budget involves engaging the US and foreign IT industries to covertly and overtly change their commercial product's designs to make them more…

This document is an internal NSA presentation giving a detailde description of the systems adminstration of the XKEYSCORE data analysis tool. It provides a comprehensive outline of the tool's data architecture, GUI (Graphical User Interface), and…

20140519-intercept-sso_dictionary_excerpt.pdf
This document is an excerpt from an NSA Special Source Operations glossary which provides the code names, countries and details for the audio data and bulk collection programs generally known as MYSTIC.

20131211-svt-xkeyscore_slide_with_swedish_example.pdf
This document is an extract from internal NSA training material. It shows the user-interface of XKEYSCORE, the NSA's tool for retrieving surveillance data. It shows an example query on Sweden, and methods to assure compliance with USSID-18.

20150701-intercept-analyzing_mobile_cellular_dni_in_xks.pdf
This document is an internal NSA presentation. It outlines how the XKEYSCORE data querying tool used by NSA analysts can also be used to target mobile and cellular digital network intelligence (DNI).

20130731-guard-xkeyscore_training_slides.pdf
This document is a presentation describing the NSA's query program, XKeyscore. The program's structure, appearance and technical architecture are described and compared to other tools available to the NSA. The document also contains examples of the…

20131028-mundo-spain_collections.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Spain in a 30 day period between December 10 2012 and Janurary 8 2013.

20150701-intercept-xks_logos_embedded_in_docs.pdf
This document is an internal NSA memo. It describes the use of the XKEYSCORE data analysis tool to retrieve intelligence from attatched logos embedded in online documents.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2