Browse Items (626 total)

20131119-odni-nsa_course_materials_module_4_v.28.pdf
This document contains internal NSA training material, explaining in detail the procedures governing the access, sharing, dissemination and retention of surveillance information, as it relates to the NSA's Business Records (BR) and Pen Register Trap…

20131104-nyt-collection_accesses.pdf
This document is a chart showing the varied sources of 103 "accesses" to communications or computers collected in a single week in 2009 at the NSA's station in San Antonio, Texas.

20140709-Intercept-spying_on_muslim-american_leaders.pdf
This document is a series of NSA spreadsheets and presentation slides that illustrate surveillance activities being undertaken against foreign and domestic Islamic community leaders.

20150701-intercept-http_activity_in_xks.pdf
This document is an internal NSA presentation. It outlines the utility of the XKEYSCORE data analysis tool used by the NSA to gather digital network intelligence (DNI) on the basis of analysis of target's HTTP activity while using the internet.

20131122-dagbladet-afghanistan_collection.pdf
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Afghanistan in a 30 day period between December 10 2012 and Janurary 8…

20150701-intercept-comms_readme.pdf
This document is a readme for the Communications System (Comms) used by the NSA's XKEYSCORE data analysis tool. The Communications System is the primary means used by XKEYSCORE to communicate among servers and with the outside internet.

20140320-intercept-targeting_system_administrator_accounts.pdf
This document contains posts from an internal NSA message board outlining methods for collecting data on unknown potential targets by way of infiltrating systems administrator accounts.

20140531-nyt-identity-intelligence.pdf
This document is an internal NSA presentation describing the agencies efforts in Identity Intelligence, a surveillance technique based on "exploiting pieces of information that are unique to an individual to track, exploit and identify targets of…

20131119-odni-nsa_course_materials_module_2_v.16.pdf
This document contains internal NSA training material, explaining in detail the rules ensuring the NSA's compliance with FISA, FISC and Executive Order 12333 in their SIGINT activities. The document specifically relates to the NSA's Business Records…

20140914-intercept-ferguson_visit_precis.pdf
This document is a NSA visit précis detailing the upcoming visit of New Zealand Director, Intelligence Coordination Group, Ambassador Roy Ferguson. The agenda's "primary purpose for the visit is to provide an update on legislation being proposed for…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2