Browse Items (626 total)

20150701-intercept-intro_to_connect_sensitive_scanning_with_xks_fingerprints.pdf
This document is an internal NSA presentation. It introduces users of the XKEYSCORE data analysis system to Context Sensitive Scanning. This feature of XKEYSCORE allows analysts to surgically target traggic, by only applying keywords in the context…

20140725-Intercept-Saudi-Arabia-Information-Paper.pdf
This document details the NSA's intelligence relationship with the intelligence agencies of the Kingdom of Saudi Arabia.

20140630-WaPo-fisa_judges_order_authorizing_surveillance_of_foreign_governments_and_organizations.pdf
This document is a court order originating from the Foreign Intelligence Surveillance Court, signed by judge John D. Bates. It determines that the certification included in Docket Number 702(i)-10-02 is consistent with the Foreign Intelligence…

20131119-odni-nsa_course_materials_module_4_v.28.pdf
This document contains internal NSA training material, explaining in detail the procedures governing the access, sharing, dissemination and retention of surveillance information, as it relates to the NSA's Business Records (BR) and Pen Register Trap…

20131126-wapo-microsoft_monkey_puzzle.pdf
This document is an email from the Development Team of MONKEY PUZZLE (GCHQ) to a Residential Integree - OPASSOS (NSA). It describes MONKEY PUZZLE, GCHQ's UTT (Unified Targeting Tool). It suggests that Yahoo, Google and Microsoft were subject to the…

20150305-nzherald-gcsb_sigint_development_quarterly_report_0.pdf
This document is an internal quarterly report created by New Zealand's Government Communications Security Bureau (GCSB), addressed to the Deputy Director of Signals Intelligence. It describes the agency's development of SIGINT operations against New…

20131104-nyt-collection_accesses.pdf
This document is a chart showing the varied sources of 103 "accesses" to communications or computers collected in a single week in 2009 at the NSA's station in San Antonio, Texas.

20150117-speigel-csec_document_about_the_recognition_of_trojans_and_other_network_based_anomaly_.pdf
This document is a CSEC presentation deck that summarizes the collaboration between "analysts and operators from CNE Operations, Cyber Counterintelligence and Global Network Detection" to provide both defensive and offensive CNE (computer network…

20140127-nbc-squeaky_dolphin.pdf
This document contains a presentation prepared by GCHQ that demonstrates the real-time monitoring of online activity, through a program called SQUEAKY DOLPHIN. This program uses data from a GCHQ unit, GTE - Global Telecoms Exploitation, which…

20150528-intercept-in_praise_of_not_knowing.pdf
This report was prepared by an official in the Signals Intelligence Directorate (SID) of the NSA. It criticizes some commonly held philosophical viewpoints within the administration of the NSA.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2