This document contains internal NSA training material, explaining in detail the role of the intelligence analyst as it relates to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.
This document is a series of extracts from an NSA report. It describes the GILGAMESH and VICTORYDANCE programs, which were efforts to use new geolocation algorithms in collaboration with the CIA's drone assassination program. It describes the…
This document is a memo describing key "talking points" relating to the NSA's surveillance activities against Iran, and the NSA's understanding of Iran's surveillance and information warfare capabilities.
This document contains notes from a NSA employee on their work and travel to the DSD. The notes include progress reports on two projects, the first being a tool to use against Windows file systems, and the second involving an implant that grants…
This document is an internal NSA presentation. It outlines the best strategies for targeting web forums for surveillance using the XKEYSCORE and PINWALE query systems.
This document is an internal NSA presentation. It draws the distinction between retrieving full logs of digital network intelligence (DNI) data and retrieving HTTP activity requests when using the NSA's XKEYSCORE data analysis tool.
This document is an internal NSA presentation. It documents the data analysis tool XKEYSCORE's ability to create and manage User Agents (UAs). UAs are strings of data sent to visited websites, providing XKEYSCORE with a means of gleaning various…