This document is a NSA factsheet answering analyst's frequently asked questions about BOUNDLESSINFORMANT, a tool used by the NSA to track and visualize global surveillance data. It is identical to the factsheet also published by Dagbladet.
This document is an extract from an internal GCHQ presentation. It describes the operation of a traditional mobile telecommunications network, and the position of Individual Subscriber Authentication Keys (KI values) within it.
This document is a column from the NSA newsletter, SIDtoday, written by the "SIGINT philosopher." As part of a recurring column about surveillance ethics, the author dicusses the rationale for surveilling more rather then less in terms of diplomatic…
This document is an internal NSA timeline that details the developments in American surveillance law. It identifies relevant laws, executive orders, FISC orders and policies.
This document is an excerpt from a draft report produced by the GCHQ. It discusses the NSA/GCHQ operations in Cyprus, their technical capabilities, current initatives in COMSAT (communications satellite access), funding, governance, and facility…
This document is an extract from an internal GCHQ document. It describes an example of how QUANTUM was used to target the computers of extremists in an unnamed African country through CNE (Computer Network Exploitation). QUANTUM is a suite of attack…
This document is an extract from an internal GCHQ presentation. It describes the CNE (Computer Network Exploitation) attack against the SIM card manufacturer, Gemalto.
This document is an internal NSA presentation. It describes the NSA's data analysis tool, XKEYSCORE. The presentation outlines the structure of the tool, its relation to other data NSA repositories, and examples of its real-life use as an…
This document is a NSA release announcing the status of ICREACH, the NSA producediIntelligence community-wide communications metadata search engine. The document states that the purpose of the program is for "situational awareness and target…
This document is an internal NSA presentation. It outlines the CAMPERDADA program, which seeks to monitor, collect, triage and repurpose malware and email phishing scams.