This document is an internal NSA presentation describing the agencies efforts in Identity Intelligence, a surveillance technique based on "exploiting pieces of information that are unique to an individual to track, exploit and identify targets of…
This document contains presentation slides from the NSA Office of SIGINT Development detailing bulk data collection and analysis protocol improvements for greater efficiency and prioritzation of targets.
This document is a NSA release announcing the status of ICREACH, the NSA producediIntelligence community-wide communications metadata search engine. The document states that the purpose of the program is for "situational awareness and target…
This document is allegedly an extract from the 2013 NSA Black Budget, requesting funding to expand the ICREACH program to access a "wider set of shareable dala." The request includes expanding IC access to digital network intelligence metadata,…
This document contains NSA presentation slides and notes describing Huawei Corp, a Chinese telecommunications company, as a potential surveillance threat and link to the PRC. The document dicusses operations to exploit Huawei equipment globally and…
This document is an internal NSA presentation. It outlines the features of the XKEYSCORE data analysis application, specifically, its ability to retrieve data based on both HTTP traffic and user activity metadata.
This document is an internal NSA presentation. It outlines the utility of the XKEYSCORE data analysis tool used by the NSA to gather digital network intelligence (DNI) on the basis of analysis of target's HTTP activity while using the internet.
This document is an article from GCHQ's internal Wiki, GCWiki. It describes the purpose and policies underlying the agency's HRA {Human Rights Act} audit process. The standards were designed to ensure that these audits prove that GCHQ meets the legal…