This document is a NSA presentation giving an overview of the organizational structure of the BND with special attention given to the breakdown of their SIGINT activity.
This document is a NSA classification guide detailing the appropriate security classifications for describing different elements of program BULLRUN. This program is used to unlock encryption tools used to protect emails, banking and medical records.
This document contains internal NSA training material, explaining in detail the rules ensuring the NSA's compliance with FISA, FISC and Executive Order 12333 in their SIGINT activities. The document specifically relates to the NSA's Business Records…
This document is a readme for DEEPDIVE, a means of establishing a "filter" in front of a traditional server using XKEYSCORE, a data analysis tool used by the NSA.
This document is a classification guide provided by the NSA branch, Tailer Access Operations (TAO), which outlines the level of classification assigned to specific aspects of computer network intelligence operations.
This document is a report describing the TOR network and the NSA's attempts to uncloak its anonymous traffic, including the MJOLNIR program. TOR is a service designed to protect online anonymity partially funded by the US due to its use by dissents…
This document is a news article posted to the NSA's internal newsletter, SIDtoday. It describes the operations of the Drug Enforcement Administration (DEA) and the relationship between this agency's counternarcotics operations and other agency's…
This document is an account of the NSA's (with SUSLAG and JSA) visit to the BND's (German Federal Intelligence Service) FORNSAT collection center in Schöningen, Germany, where the BND demonstrated their signals intelligence capabilities and the two…
This document is a presentation that outlines the OSINT fusion project, performed in tandem by contractors of the NSA and GCHQ. The OSINT fusion project aims to compile OSINT (open source intelligence) enabling analysts to further perform computer…