Browse Items (626 total)

20150701-intercept-intro_to_connect_sensitive_scanning_with_xks_fingerprints.pdf
This document is an internal NSA presentation. It introduces users of the XKEYSCORE data analysis system to Context Sensitive Scanning. This feature of XKEYSCORE allows analysts to surgically target traggic, by only applying keywords in the context…

20141010-intercept-tarex_classification_guide.pdf
This document is a NSA classification guide for the NSA's Target Exploitation (TAREX) program. TAREX conducts worldwide signals intelligence (SIGINT) close-access operations and overt and clandestine human intelligence (HUMINT) in direct support of…

20131120-guard-collection_processing_and_dissemination_of_allied_communications.pdf
This document is an extract from a draft 2005 directive created in the name of the NSA's director of signals intelligence. It describes the British - U.S. Communications Intelligence Agreement of 5 March 1946, which establishes broad cooperation…

20150701-intercept-asfd_readme.pdf
This document is a read me for the NSA's Atomic SIGINT Data Format (ASDF). This is a data foramt that is used by the XKEYSCORE data storage and analysis program. ASDF is used to provide other organizations with the ability to configure their own…

20140311-nyt-classification_guide_for_fisa_the_protect_america_act_and_the_fisa_amendments_act.pdf
This document is a NSA classification guide relating to intelligence operations performed by the NSA under the authority of the Foreign Intelligence Surveillance Act (FISA), the Protect America Act (PAA), and the Fisa Amendments Act (FAA).

20141228-spiegel-explanation_of_the_turmoil_gallantwave_program_and_its_role_when_attacking_vpn_0.pdf
This document contains pages from the NSA internal wiki detailing the TURMOIL GALLANTWAVE program which allows exploitation of large communications systems which use Data Network Session Cipher (DNSC).

20150701-intercept-email_address_vs_user_activity.pdf
This document is an internal NSA presentation. It describes the functions of the XKEYSCORE querying tool used by NSA analysts. This presentation focuses on retrieving data on targets through queries to their email addresses and user activity.

20141010-intercept-eci_compartments.pdf
This document is a list of NSA surveillance projects that have an ECI (Exceptionally Controlled Information) security classification.

20141010-intercept-cno_core_secrets_security_structure.pdf
This document is a NSA diagram describing the security classification of various components of the SENTRY EAGLE program. SENTRY EAGLE is a blanket term for the NSA's surveillance programs with a security clearance of ECI (Exceptionally Controlled…

20141010-intercept-cno_core_secrets_slide_slices.pdf
This document is an internal NSA presentation describing the security classification of various components of the SENTRY EAGLE program. SENTRY EAGLE is an blanket umbrella program containing the NSA's surveillance programs with a security clearance…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2