This document is an NSA slide deck giving an overview of the Expeditionary Access Operations (EAO) unit, its make up and major task. The unit conducts "worldwide Human Enabled Close Access Cyber Operations" to support signals intelligence (SIGINT).
This document is an article from SIDToday, an internal newsletter of the NSA's Signals Intelligence Directorate division. It contains an interview with the author of an advice column called 'Ask Zelda'.
This document is a report detailing the architecture of PRESTON, a communication interception program which covertly intercepts phone calls, text messages, internet data.
This document is a report detailing the business processes behind the operation of PRESTON, a communication interception program which covertly intercepts phone calls, text messages, internet data.
This document contains pages from the NSA internal wiki detailing the TURMOIL GALLANTWAVE program which allows exploitation of large communications systems which use Data Network Session Cipher (DNSC).
This document is a NSA classification guide relating to intelligence operations performed by the NSA under the authority of the Foreign Intelligence Surveillance Act (FISA), the Protect America Act (PAA), and the Fisa Amendments Act (FAA).
This document is a read me for the NSA's Atomic SIGINT Data Format (ASDF). This is a data foramt that is used by the XKEYSCORE data storage and analysis program. ASDF is used to provide other organizations with the ability to configure their own…
This document is an extract from GCHQ's internal Wiki, GCWiki. It is a log of meeting minutes from the Mobile Apps Project from November 27 2009 to 22 February 2011.
This document is an extract from a draft 2005 directive created in the name of the NSA's director of signals intelligence. It describes the British - U.S. Communications Intelligence Agreement of 5 March 1946, which establishes broad cooperation…
This document is a NSA classification guide for the NSA's Target Exploitation (TAREX) program. TAREX conducts worldwide signals intelligence (SIGINT) close-access operations and overt and clandestine human intelligence (HUMINT) in direct support of…