This document is a list prepared by the NSA Center for Content Extraction. It consists of foreign chief-of-states whose information has been collected by the NSA. The list also alludes to the amount of information (number of citations) collected for…
This document is a presentation from the GCHQ's Network Analysis Centre (NAC) examining ways to use network knowledge to help bypass the use of privacy-protected encryption. The Belgacom computer network exploitation (CNE) operation is used as an…
This document contains code for the malware program QWERTY which, as part of the CNO program WARRIORPRIDE, collects the key strokes of an infected computer. Der Spiegel is releasing the code, found in the Snowden document collection, "in order to…
This document is an article from the NSA's internal Wiki, Intellipedia. It documents various manhunting operations occuring around the world in 2008. Notably, it mentions the assassination of Syrian Brigadier General Muhammad Sulayman in Tartous,…
This document is a preface from an internal NSA report. It describes SIGINT sourcing operations relating to certain "globally - resonating foreign radicalizers" and efforts to uncover "personal vulnerabilities" that could be exploited to undermine…
This document is a memo addressed to the Attorney General of the United Statesm Michael B. Mukasey by Kenneth L. Wainstein, Assistant Attorney General, National Security Division. The memo proposes an amendment of Department of Defence procedures to…
This document is a memo addressed to the Attorney General of the United Statesm Michael B. Mukasey by Kenneth L. Wainstein, Assistant Attorney General, National Security Division. The memo proposes an amendment of Department of Defence procedures to…
This document is a memo prepared by the Deputy General Counsel (Operations). It describes guidance for the NSA's Signals Intelligence Directorate (SID) policy as to the applicable legal standards to query bulk telephony metadata acquired pursuant to…