Browse Items (626 total)

20150604-nyt-cyber-surveillance-documents.pdf
This item is a collection of documents released by The New York Times. They cover a wide range of surveillance activities within the NSA. It includes: Extracts from a slide presentation detailing major developments in the Special Source Operations…

20131004-guard-iat_tor.pdf
This document is a presentation describing forms of Open Source Multi-Hop Networks. The most famous of these is TOR, The Onion Router, a service designed to protect online anonymity partially funded by the US due to its use by dissents in repressive…

20131210-wapo-ghost_machine.pdf
This document contains excerpts from an internal NSA presentation describing the NSA's cloud analytics platform, code-named GHOSTMACHINE. It is administered by Special Source Operations (SSO).

20131119-odni-interim_competency_test_for_access_to_fisa_data.pdf
This document is a test used in NSA training. It contains questions and answers determining analyst's competency in accessing information collected pursuant to FISA.

20150701-intercept-asfd_readme.pdf
This document is a read me for the NSA's Atomic SIGINT Data Format (ASDF). This is a data foramt that is used by the XKEYSCORE data storage and analysis program. ASDF is used to provide other organizations with the ability to configure their own…

20140618-der_spiegel-overview_of_the_use_of_boundless_informant_world_map.pdf
This document shows a map of the world charting the targets and collection quantities for the BOUNDLESSINFORMANT program.

20150701-intercept-user_agents.pdf
This document is an internal NSA presentation. It documents the data analysis tool XKEYSCORE's ability to create and manage User Agents (UAs). UAs are strings of data sent to visited websites, providing XKEYSCORE with a means of gleaning various…

20150521-intercept-medical-pattern-of-life.pdf
This document describes the NSA's current surveillance operations involving the gathering of medical intelligence from targets.

This document is an internal NSA presentation. It draws the distinction between retrieving full logs of digital network intelligence (DNI) data and retrieving HTTP activity requests when using the NSA's XKEYSCORE data analysis tool.

20150701-intercept-web_forum_exploitation_using_xks.pdf
This document is an internal NSA presentation. It outlines the best strategies for targeting web forums for surveillance using the XKEYSCORE and PINWALE query systems.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2