This document is a presentation prepared by CSEC. It describes the LEVITATION program, an effort to monitor file sharing sites in order to locate extremist training and propoganda materials. This program is capable of monitoring 10-15 million…
This document is a slide deck used during a "Close Access" NSA training course to introduce students to computer network exploitation (CNE) tool, BADDECISION.
This document is an extract from an internal GCHQ presentation. It describes the existing tools used by GCHQ to intercept communications from iPhones. Programs include: WARRIOR PRIDE, DREAMY SMURF, NOSEY SMURF. TRACKER SMURF, PORUS and PARANOID…
This document is an excerpt from an NSA training tool explaining how to determine whether a targeted device is being used outside the United States. It illustrates a hypothetical example involving a query to CHALKFUN, the tool used to search FASCIA,…
This document is an internal memo created by GCHQ describing Operation MULLENIZE, an attempt to distinguish othewise anonymous internet users. The agency uses "User Agent Staining" to change the way in which the user's web browser identifies itself…
This document is a report created by the National Counterterrorism Center. It describes the procedures in place allowing intelligence agencies to place individuals suspected of terrorism related offenses onto government watch-lists.
This document is a NSA report describing the nature of the NSA's surveillance relationship with Sweden's National Defence Radio Establishment (FRA). It is largely focused upon the FRA's collaboration in SIGINT against "high-priority Russian targets."
This article, from the internal NSA newsletter, SIDtoday, is one in a series written by the "SIGINT philosopher." This article discusses the performance and peer review system among NSA analysts.
This document is a briefing sheet describing elements of the intelligence relationship between the National Security Agency and the German Federal Intelligence Service (BND) and the German Federal Office for the Protection of the Constitution (BfV).…
This document is an internal NSA presentation. It outlines the procedures for retrieving intelligence located in NSA repositories harvested from from online social networks using the NSA's data analysis tool, XKEYSCORE.