Browse Items (626 total)

20140714-Intercept-jtrigall.pdf
This document is a page from GCHQ's internal wiki, GCWiki. This page details the SIGINT and CNE (Computer Network Exploitation) tools and programs available to the JTRIG (Joint Threat Research Intelligence Group). The document lists programs…

20140616-der_spiegel-analytics_for_targets_in_europe_0.pdf
This document is an extract from a presentation prepared by the NSA's site in Griesheim, Germany. It details the variety of different sources of intelligence on suspected terrorists in Europe.

20131027-spiegel-embassy.pdf
This document is a NSA classification guide for Operation STATEROOM. It details elements of the NSA's surveillance program concerning covert SIGINT collection from Diplomatic facilities overseas. The German component of this project is presumably…

20150505_intercept_sidtoday-finding-nuggets-final.pdf
This document is an article from the NSA internal newsletter, SIDtoday. It was written by the Intelligence Analysis Technical Director, NSA Texas, and it dicusses the use of Human Language Technology (HLT) in intelligence operations in Mexico, as…

20140618-DerSpiegel-zoom_of_a_boundless_informant_document_with_project_names.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It details the information gathered for specific NSA surveillance projects.

20150701-intercept-selection_forwarding_readme.pdf
This document is a memo prepared by the NSA. It explains how to configue the XKEYSCORE data analysis tool to forward selected sessions via MAILORDER.

20140618-der_spiegel-briefing_on_the_visit_to_the_nsa_of_a_high-ranking_bnd_official.pdf
This document is a briefing memo prepared by the NSA in preparation of "Hr. Dietmar B.", Director of SIGINT Analysis of Production at the BND, the German Intelligence Service. The memo describes the purpose of the official's visit, security requests,…

20150701-intercept-advanced_http_activity_analysis.pdf
This document is an internal presentated prepared by an official within the NSA. it describes the basics of HTTP protocol and how to target and exploit this using the XKEYSCORE query and analysis tool.

20131119-odni-nsa_summary_of_requirements_for_collection_of_bulk_metadata.pdf
This document is a NSA brief explaining the FISC court-ordered procedures and restrictions for the (now defunct) NSA bulk electronic communications metadata program. This document includes standards for accessing the data, access requirements,…

20140318-wapo-mystic_program.pdf
This document is a cover slide from a NSA Special Source briefing presentation for the MYSTIC voice call surveillance program.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2