This document is a NSA briefing on the potential political talking points and "landmines"for NSA officials to be aware of in preparation for the visit of GCHQ Director Iain Lobban.
This document contains internal NSA training material, explaining in detail the separation between the role of analyst and technician work roles as it relates to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata…
This document is an article from the internal NSA newsletter, SIDtoday. It describes the hiring process for the NSA Olympics Support Team, as well as briefly noting collaboration with many foreighn partners in the European Union.
This document is an NSA powerpoint presentation from June 2006 that discusses plans for the program RT-10 (REAL TIME) for converged intelligence workflows, great efficiencies in analysis and improved bulk data processing technologies. These slides…
This document is an internal NSA presentation. It outlines strategies for using the XKEYSCORE data analysis tool to retrive intelligence data from free file uploader websites.
This document shows the volumes and limits of the NSA's FASCIA database between the beginning of 2011 to June 2012. FASCIA is used to store the location information of mobile devices. Analysts query this database using the CHALKFUN tool. It also…
This document contains training materials relating to NSA signals intelligence collection activities, including: Executive Order 12333, December 1982 DoD Procedures Governing the Activities of DoD Intelligence Components, NSA Policy 1-23, and DoD…
This document is an NSA powerpoint presentation from June 2012 that discusses the metadata collection and anylsis program SKYNET. The presentation shows the results of the statistical analysis of cell phone metadata to show travel behaviour, social…
This document is an extract from internal NSA training material. It shows the user-interface of XKEYSCORE, the NSA's tool for retrieving surveillance data. It shows an example query on Sweden, and methods to assure compliance with USSID-18.
This document consists of three NSA presentation slides outlining Content Extraction goals and challenges, including a redacted list of the top ten most frequent mentionend targets in their collection.