Browse Items (626 total)

20150701-intercept-comms_readme.pdf
This document is a readme for the Communications System (Comms) used by the NSA's XKEYSCORE data analysis tool. The Communications System is the primary means used by XKEYSCORE to communicate among servers and with the outside internet.

20131122-dagbladet-afghanistan_collection.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Afghanistan in a 30 day period between December 10 2012 and Janurary 8…

20150701-intercept-http_activity_in_xks.pdf
This document is an internal NSA presentation. It outlines the utility of the XKEYSCORE data analysis tool used by the NSA to gather digital network intelligence (DNI) on the basis of analysis of target's HTTP activity while using the internet.

20140709-Intercept-spying_on_muslim-american_leaders.pdf
This document is a series of NSA spreadsheets and presentation slides that illustrate surveillance activities being undertaken against foreign and domestic Islamic community leaders.

20131104-nyt-collection_accesses.pdf
This document is a chart showing the varied sources of 103 "accesses" to communications or computers collected in a single week in 2009 at the NSA's station in San Antonio, Texas.

20131119-odni-nsa_course_materials_module_4_v.28.pdf
This document contains internal NSA training material, explaining in detail the procedures governing the access, sharing, dissemination and retention of surveillance information, as it relates to the NSA's Business Records (BR) and Pen Register Trap…

20140725-Intercept-Saudi-Arabia-Information-Paper.pdf
This document details the NSA's intelligence relationship with the intelligence agencies of the Kingdom of Saudi Arabia.

20150701-intercept-intro_to_connect_sensitive_scanning_with_xks_fingerprints.pdf
This document is an internal NSA presentation. It introduces users of the XKEYSCORE data analysis system to Context Sensitive Scanning. This feature of XKEYSCORE allows analysts to surgically target traggic, by only applying keywords in the context…

20150701-intercept-full_log_vs_http.pdf
This document is an internal NSA presentation. It draws the distinction between retrieving full logs of digital network intelligence (DNI) data and retrieving HTTP activity requests when using the NSA's XKEYSCORE data analysis tool.

20131223-wapo-nsacss-mission.pdf
This document is an extract from an internal NSA presentation. It describes the mission, resources and capabilities of the NSA, as well as identifying and classifying resources used to achieve key objectives.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2