This document discusses the types of lawful intercept used by the NSA, including access through special source operations. Lawful Intercept is defined as Èobtaining communications network data by legal authority for analysis or evidence.È A long list…
This document is an article from the internal NSA newsletter, SIDToday, discussing the new facilities planned for the ROC - Remote Operations Center. This new facility will enhance the NSA's endpoint operations capability, which work to "subvert…
This document is an extract from a larger document, the "black budget," detailing the research and technology behind two US signals and intelligence projects: "Penetrating Hard Targets" and "Owning the Net." Both projects are housed under the arm of…
This document is a NSA list of programs that have a security classification of ECI (Exceptionally Controlled Information). It provides an abstract for each program, as well as identifying potentially overlapping programs.
This document is a power point presentation from the GCHQ, outlining different event analysis products, including SOCIAL ANTHROPOID, LUSTRE, SAMUEL PEPYS, and GUIDING LIGHT. It includes screen shots of query forms and result lists.
This NSA release gives an account of evacuation and security measures taken at the NSA's European Technical Center (ETC) during a concern that there was an unexploded WWII ordnance in the area.