This document is a page from GCHQ's internal wiki, GCWiki. This page details the SIGINT and CNE (Computer Network Exploitation) tools and programs available to the JTRIG (Joint Threat Research Intelligence Group). The document lists programs…
This document is an extract from a presentation prepared by the NSA's site in Griesheim, Germany. It details the variety of different sources of intelligence on suspected terrorists in Europe.
This document is a NSA classification guide for Operation STATEROOM. It details elements of the NSA's surveillance program concerning covert SIGINT collection from Diplomatic facilities overseas. The German component of this project is presumably…
This document is an article from the NSA internal newsletter, SIDtoday. It was written by the Intelligence Analysis Technical Director, NSA Texas, and it dicusses the use of Human Language Technology (HLT) in intelligence operations in Mexico, as…
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It details the information gathered for specific NSA surveillance projects.
This document is a briefing memo prepared by the NSA in preparation of "Hr. Dietmar B.", Director of SIGINT Analysis of Production at the BND, the German Intelligence Service. The memo describes the purpose of the official's visit, security requests,…
This document is an internal presentated prepared by an official within the NSA. it describes the basics of HTTP protocol and how to target and exploit this using the XKEYSCORE query and analysis tool.
This document is a NSA brief explaining the FISC court-ordered procedures and restrictions for the (now defunct) NSA bulk electronic communications metadata program. This document includes standards for accessing the data, access requirements,…