This NSA document provides a briefing on SENTRY EAGLE, the NSA and JFCC-NW's compartmented program for surveillance programs with ECI (Exceptionally Controlled Information). SENTRY EAGLE contains the following sub-programs: SENTRY OWL: NSA…
This document is a briefing sheet from the Office of the Director of National Intelligence to the NATO Civilian Intelligence Council. It provides discussion of a previous assessment of the cyber threat to NATO, especially the threat of state actors…
This document is a briefing sheet from the Office of the Director of National Intelligence to the NATO Civilian Intelligence Council. It provides discussion of a previous assessment of the cyber threat to NATO, especially the threat of state actors…
This document is a NSA release announcing the official title changes of NSA/CSS Representatives for major Third-Parties, such as Turkey. The new title is Special US Liasion Advisor (SUSLA).
This document is a NSA release announcing the official title changes of NSA/CSS Representatives for major Third-Parties, such as Turkey. The new title is Special US Liasion Advisor (SUSLA).
This document is a presentation detailing requirements, proposed solutions, status, workflows and issues/risks of a current decryption program, involving the applications TURMOIL, GALLANTWAVE, and XKEYSCORE.
This document is an internal memo created by the NSA's Signals Intelligence Directorate. It describes new procedures that permit analysts to perform "contact chaining", the analysis of American's networks of online associations for foreign…
This document is an internal GCHQ presentation. It describes the Next Generation Events plan. This plan involves a series of different programs and projects all aimed at scaling the agency's capabilities of dealing with SIGINT events. Among others,…
This document is a training course manual from the NIOC (Navy Information Operations Command) Maryland, for computer network operations. It provides background on the need for computer network operations training (due to the risk of cyber conflict),…