This document is an internal NSA presentation. It further describes the syntax underlying Application IDs in the NSA's ZKEYSCORE data analysis tools. Application IDs are designed to increase the efficiency of queries to repositories of intelligence…
This document is an internal NSA presentation. It describes using the NSA's XKEYSCORE data analysis tool to create "Fingerprints", improving the utility to searching repositories of intelligence information.
This document is a slide deck introducing a "Close Access" NSA training course to "familiarize, educate, and certify students in the operational usage" of various computer network exploitation tools.
This document contains of NSA Special Source Operations slides and speaking remarks related to the MUSCULAR program. WINDSTOP is a trusted secondary component of this program. MUSCULAR involves the interception of the data flows across the fibre…
This document is an extract from a presentation created by the NSA's Special Source Operations (SSO) division. It describes the key operational developments in the WINDSTOP program, including the implementation of an upgrade to the XKEYSCORE tool and…
This document is an article from the NSA's newsletter, SIDtoday. It originally appeared in GCHQ Menwith Hill Station's newsletter, Horizon in March 2012. This article describes INTOLERANT, an effort to identify when surveillance targets are…