Browse Items (626 total)

20140618-der_spiegel-report_on_an_nsa_sigdev_training_course_for_allied_countries_.pdf
This document discusses the success of a NSA training session in SIGINT for its third-party partners in the Five Eye network.

20150505_intercept_sidtoday-finding-nuggets-final.pdf
This document is an article from the NSA internal newsletter, SIDtoday. It was written by the Intelligence Analysis Technical Director, NSA Texas, and it dicusses the use of Human Language Technology (HLT) in intelligence operations in Mexico, as…

20150701-intercept-finding_and_querying_document_metadata.pdf
This document is an internal NSA presentation. It outlines how XKEYSCORE can be used to gather information using metadata gleaned from document metadata (e.g. embeded documents, images or sound files), in contrast to more traditional selectors (e.g.…

20140618-der_spiegel-final_agenda_of_a_meeting_between_high-ranking_nsa_and_bnd_officials.pdf
This NSA document is a final version of the agenda detailing plans for a conference hosted by the NSA, attended by high ranking officials in the German BND (Federal Intelligence Service) and the NSA.

20141228-spiegel-explanation_on_the_spin9_program_on_end-to-end_attacks_on_vpn.pdf
This document is a presentation that reviews in detail the capabilities and constraints of the GCHQ program VPN SPIN 9 - a VPN decryption program. The document shows how the VPN service is connected to other SIGINT programs, maps out several…

20150117-spiegel-technical_description_of_the_fashioncleft_protocol_.pdf
This document is a technical description of the FASHIONCLEFT computer network exploitation (CNE) collection protocol. It "enables raw data packets from the external internet to interface to the Common Data Receptor (CDR) of Data Network Technology's…

20131204-wapo-fascia.pdf
This document shows the volumes and limits of the NSA's FASCIA database between the beginning of 2011 to June 2012. FASCIA is used to store the location information of mobile devices. Analysts query this database using the CHALKFUN tool. It also…

20130816-wapo-sso_news_article.pdf
This document is an article from SSO News, the Internal Newsletter of the NSA's Special Source Operations. It describes a ruling made on 3 October 2011, where a judge from the FISA Court argued that Upstream collection were in violation of the fourth…

20140128-guard-leaky_phone_apps.pdf
This document contain extracts from presentations by the NSA and GCHQ describing programs for mobile device tracking and surveillance. The slides outline the surveillance and collection capabilities for accessing mobile devices, which include:…

20150402-Intercept-Extended Enterprise Documents.pdf
This document is an extract from a report created by GCHQ. It describes NSA activities of interest for GCHQ relating to surveillance operations against Latin America.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2