This document is an image of two flow charts that visualize the workflows of analysts gathering digial network intelligence (DNI) using the XKEYSCORE data analysis tool.
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Norway in a 30 day period between December 10 2012 and Janurary 8 2013.
This document is an internal NSA presentation. It describes the workflow of using the XKEYSCORE data analysis tool in conjunction with the PINWALE, MARINA and TRAFFICTHIEF databases to provide actionable intelligence on targets. It includes a…
These documents are presentation slides prepared for the 2010 SIGDEV conference. The presentation describes the NSA's attempts to use network mapping to target various credit card authorization networks, with the aim to create actionable intelligence…
This document is a NSA classification guide for the WHIPGENIE program. WHIPGENIE has a security classification of ECI (Exceptionally Controlled Information). The program covers Special Source Operations (SSO) relationships with U.S. Corporate…
This document is a heavily redacted intercepted chat conversation. The document shows that OTR (Off-the-Record chat encryption protocol) could not be decrypted by the NSA.
This document is a briefing by the GCHQ pertaining to the Kurdish people in Iraq. It includes definitions of the Kurds and Kurdistan, details about the decentralized governement of Iraq and the Kurdistan Regional Government (KRG), and discusses…
This document is allegedly an extract from the 2013 NSA Black Budget, requesting funding to expand the ICREACH program to access a "wider set of shareable dala." The request includes expanding IC access to digital network intelligence metadata,…
This article, from the NSA internal newsletter, SIDToday, is a SIGINT analyst's reflection on the nature of their work filtering raw signals intelligence to the rest of the intelligence community, including its possible flaws and the margin of error…
This document is an extract from an internal NSA report. It describes the Tailored Access Operation's (TAO) efforts to expand their hardware infrastructure, enabling more active implants to be carried out on a daily basis.