This document is an article from SIDToday, an internal newsletter of the NSA's Signals Intelligence Directorate division. It is a part of the series titled "Ask Zelda", an advice column. This article responds to an enquiry into appropriate levels of…
This document is a report created by the NSA's Signals Intelligence Directorate (SID)'s Office of Oversight and Compliance. This report evaluates the incidents of "incidents" (described as "collection, dissemination, unauthorized access, and…
This document is a newsletter article from the NSA Cryptanalysis and Exploitation Services that discusses the rise of "ubiquitous encryption" on the internet, and the NSAs top secret strategies for circumvention.
This document is an internal GCHQ slideshow. It documents a series of case studies of the use of the PRESTON program, used to intercept phone calls, text messages and internet data.
This document is a report prepared by a consultant working for Booz Allen Hamilton. It provides a comprehensive user's guide for the NSA's data analysis tool, XKEYSCORE.
This document contains a selection of spreadsheets composed by GCHQ. Each spreadsheet identifies a specific UK government ministry, and contains information about the objectives of the office, and GCHQ's desired operations involving that department.…
This document is an article from GCHQ's internal Wiki, GCWiki. It describes the purpose and policies underlying the agency's HRA {Human Rights Act} audit process. The standards were designed to ensure that these audits prove that GCHQ meets the legal…
This document is a memo detailing the composition and operations of GCHQ's Intrusion Analysis (IA) team. It forms part of the Joint Electronic Attack Cell (JeAC).
This document is an NSA powerpoint presentation from June 2012 that discusses the metadata collection and anylsis program SKYNET. The presentation shows the results of the statistical analysis of cell phone metadata to show travel behaviour, social…