Browse Items (626 total)

20150701-intercept-dni101.pdf
This document is an image of two flow charts that visualize the workflows of analysts gathering digial network intelligence (DNI) using the XKEYSCORE data analysis tool.

20131119-dagbladet-norway_collection_0.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Norway in a 30 day period between December 10 2012 and Janurary 8 2013.

20150701-intercept-xks_as_a_sigdev_tool.pdf
This document is an internal NSA presentation. It describes the workflow of using the XKEYSCORE data analysis tool in conjunction with the PINWALE, MARINA and TRAFFICTHIEF databases to provide actionable intelligence on targets. It includes a…

20130916-spiegel-credit_card_transactions.pdf
These documents are presentation slides prepared for the 2010 SIGDEV conference. The presentation describes the NSA's attempts to use network mapping to target various credit card authorization networks, with the aim to create actionable intelligence…

20141010-intercept-eci_whipgenie_classification_guide.pdf
This document is a NSA classification guide for the WHIPGENIE program. WHIPGENIE has a security classification of ECI (Exceptionally Controlled Information). The program covers Special Source Operations (SSO) relationships with U.S. Corporate…

20141228-spiegel-intercept_with_otr_encrypted_chat.pdf
This document is a heavily redacted intercepted chat conversation. The document shows that OTR (Off-the-Record chat encryption protocol) could not be decrypted by the NSA.

20140831-spiegel-kurdistan_regional_government.pdf
This document is a briefing by the GCHQ pertaining to the Kurdish people in Iraq. It includes definitions of the Kurds and Kurdistan, details about the decentralized governement of Iraq and the Kurdistan Regional Government (KRG), and discusses…

20140825-Intercept-ICREACH-Black-Budget-Extract.pdf
This document is allegedly an extract from the 2013 NSA Black Budget, requesting funding to expand the ICREACH program to access a "wider set of shareable dala." The request includes expanding IC access to digital network intelligence metadata,…

20150811-intercept-descartes-would-have-been-a-lousy-sigint-reporter.pdf
This article, from the NSA internal newsletter, SIDToday, is a SIGINT analyst's reflection on the nature of their work filtering raw signals intelligence to the rest of the intelligence community, including its possible flaws and the margin of error…

20140312-intercept-increasing_collection_capacity_by_increasing_implants.pdf
This document is an extract from an internal NSA report. It describes the Tailored Access Operation's (TAO) efforts to expand their hardware infrastructure, enabling more active implants to be carried out on a daily basis.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2