Browse Items (626 total)

20150701-intercept-finding_and_querying_document_metadata.pdf
This document is an internal NSA presentation. It outlines how XKEYSCORE can be used to gather information using metadata gleaned from document metadata (e.g. embeded documents, images or sound files), in contrast to more traditional selectors (e.g.…

20131211-svt-accomplishments_from_nsa.pdf
This document is an extract from a NSA presentation describing the nature of the NSA's intelligence relationship with Sweden. It mentions Swedish intelligence service's assistance with the QUANTUM program.

20150701-intercept-guide_to_using_contexts_in_xks_fingerprints.pdf
This document is an internal NSA memo that outlines the use of contextual logic expressions when using the XKEYSCORE data analysis tool.

20131104-nyt-sigint_strategic_plan.pdf
This document contains a report detailing the strategic goals of the NSA's SIGINT mission plans for the financial year 2008-2009.

20140618-der_spiegel-boundless_informant_statistics_on_germany.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Germany in a 30 day period between December 10 2012 and Janurary 8 2013.

20140618-der_spiegel-world_map_from_the_boundless_informant_program.pdf
This document contains two slides which show the extent of reach of the Boundless Informant program on a world map.

20150701-intercept-dni101.pdf
This document is an image of two flow charts that visualize the workflows of analysts gathering digial network intelligence (DNI) using the XKEYSCORE data analysis tool.

20131119-dagbladet-norway_collection_0.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Norway in a 30 day period between December 10 2012 and Janurary 8 2013.

20150701-intercept-xks_as_a_sigdev_tool.pdf
This document is an internal NSA presentation. It describes the workflow of using the XKEYSCORE data analysis tool in conjunction with the PINWALE, MARINA and TRAFFICTHIEF databases to provide actionable intelligence on targets. It includes a…

20141228-spiegel-intercept_with_otr_encrypted_chat.pdf
This document is a heavily redacted intercepted chat conversation. The document shows that OTR (Off-the-Record chat encryption protocol) could not be decrypted by the NSA.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2