This document is from the GCwiki, an internal information resource of the GCHQ. This entry gives an overview of the JTB team in JTAC, which is the "thematic assessment team for Islamist Attack Methodogy. The JTB team provides "all-source intelligence…
This document is an article from the internal NSA newsletter, SIDtoday. It describes the hiring process for the NSA Olympics Support Team, as well as briefly noting collaboration with many foreighn partners in the European Union.
This document is an NSA powerpoint presentation from June 2006 that discusses plans for the program RT-10 (REAL TIME) for converged intelligence workflows, great efficiencies in analysis and improved bulk data processing technologies. These slides…
This document is a GCHQ project overview for the EndPoint project, a GCHQ CNE (Computer Network Exploitation) program. This document describes exploitation of Flag Telecom's linux infrastructure to retrieve weekly router monitoring webpages and perf…
This collection of documents, which range from 2003 to 2013, includes NSA presentations and internal communications concerning Special Source Operations (SSO). The presentations provide information about the main commercial telecommunications…
This document is a memo prepared by the Signals Intelligence Division (SID) of the NSA. It describes the impact of Information Management and Storage (IM&S) systems providing long term access to various repositories of electronic intelligence…
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from several U.S. Internet companies: Microsoft (since 2007), Yahoo!…
This document is a release announcing a new version of TREASUREMAP, an NSA system for "global IP network-mapping and exploration." The release highlights new and improved features and stresses the system's ability to show a "near real-time,…
This document is a NSA classification guide for the WHIPGENIE program. WHIPGENIE has a security classification of ECI (Exceptionally Controlled Information). The program covers Special Source Operations (SSO) relationships with U.S. Corporate…