Browse Items (626 total)

20131104-mundo-info_sharing_partners.pdf
This document is a report detailing the National Security Agency's policy for sharing cryptologic intelligence with the intelligence agencies of different countries. Western countries are divided into "Tier A" nations, which receive "comprehensive…

20150701-intercept-xks_for_counter_cne.pdf
This document is an internal NSA presentation. It describes utilizing the XKEYSCORE data analysis tool as a resource supporting CNE (Computer Network Exploitation) operations, in distinction to XKEYSCORE's traditional use for DNI (Digital Network…

This document is an internal NSA presentation. It explains the syntax behind the construction of AppIds and Fingerprints in the NSA's XKEYSCORE data analysis program. AppIds and Fingerprints are methods to make searches of intelligence information…

20150701-intercept-xks_search_forms.pdf
This document is an internal NSA presentation. It describes the search format and capabilities of the NSA's XKEYSCORE data analysis tool.

20150715-intercept-manhunting-redacted.pdf
This document is an article from the NSA's internal Wiki, Intellipedia. It documents various manhunting operations occuring around the world in 2008. Notably, it mentions the assassination of Syrian Brigadier General Muhammad Sulayman in Tartous,…

20131119-odni-nsa_metadata_collection_training_slides_.pdf
This document is a course outline used in training new NSA analysts and technicians in the (now defunct) Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.

20150701-intercept-guide_to_using_contexts_in_xks_fingerprints.pdf
This document is an internal NSA memo that outlines the use of contextual logic expressions when using the XKEYSCORE data analysis tool.

20150701-intercept-category_throttling.pdf
This memo outlines how to configure XKEYSCORE to support category throttling.

20131025-monde-french_cyberattacks.pdf
This document is an NSA agenda for a meeting held on April 12 2013 between Bernard Barbier, Techical Director of France's Directorate of External Security, Patrick Pailloux, Director of France's National Information Systems Security Agency, and…

20150117-spiegel-overview_on_the_nsa_use_of_bots_and_the_defiantwarrior_program.pdf
This document is a presentation deck giving an overview of the NSA's techniques for detecting bots and using bots in their CNE operations. The document discusses the main uses for bots and bot herding, how they can be used in SIGINT, future hopes and…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2