This document contains four slides which may have been extracted from a larger presentation. The slides show four different work flows concerning decryption applications.
This document is a newsletter from the National Information Assurance Research Laboratory (NIARL) highlighting recent R&D from the information assurance community, which includes members of the 5 Eyes, student research programs, and corporate…
This report documents the strategic accomplishments of the National Counterterrorism Center's Directorate of Terrorist Identities (DTI) for 2013. It refers to the expansion of the TIDE (Terrorist Identities Datamart Environment) system, biometric…
This document is a report created by the National Counterterrorism Center. It describes the procedures in place allowing intelligence agencies to place individuals suspected of terrorism related offenses onto government watch-lists.
This document is a presentation that outlines the OSINT fusion project, performed in tandem by contractors of the NSA and GCHQ. The OSINT fusion project aims to compile OSINT (open source intelligence) enabling analysts to further perform computer…
This NSA document gives an overview of the JSA - Joint Signals Activity - an NSA/BND intelligence partnership and their joint intelligence work in North Africa.
This NSA document gives an overview of the JSA - Joint Signals Activity - an NSA/BND intelligence partnership and their joint intelligence work in North Africa.
This document is an account of the NSA's (with SUSLAG and JSA) visit to the BND's (German Federal Intelligence Service) FORNSAT collection center in Schöningen, Germany, where the BND demonstrated their signals intelligence capabilities and the two…