Browse Items (626 total)

20131211-svt-accomplishments_from_nsa.pdf
This document is an extract from a NSA presentation describing the nature of the NSA's intelligence relationship with Sweden. It mentions Swedish intelligence service's assistance with the QUANTUM program.

20140312-intercept-nsa_selector_types.pdf
This document contains one NSA slide listing the possible data selectors through which the NSA identifies possible surveillance targets. Possible selectors include email ids from popular services such as Google, MSN, and Hotmail; IP addresses; Device…

20150925-intercept-sensitive_targeting_authorisation.pdf
This document is an approval form used by the GCHQ to request surveillance approval for individuals with "a sensitive nationality or in a sensitive location." It provides details on tasking and datamining of individuals both inside and outside of the…

20140312-intercept-turbine_and_turmoil.pdf
This document contains two slides detailing the computer network operations programs which intercept, passively and actively, communications as they "transit the globe." Diagrams also show the "automated management and control" of surveillance…

20141010-intercept-cno_core_secrets_security_structure.pdf
This document is a NSA diagram describing the security classification of various components of the SENTRY EAGLE program. SENTRY EAGLE is a blanket term for the NSA's surveillance programs with a security clearance of ECI (Exceptionally Controlled…

20131126-wapo-microsoft_cloud_exploitation.pdf
This document is an extract from an NSA presentation. It describes SERENDIPITY, which was seemingly an effort by the NSA to target Microsoft for similar SIGINT sourcing programs that affected Google and Yahoo. These slides show efforts to intercept…

20140825-Intercept-DNI-Decision-Memorandum-on-ICREACH.pdf
This document is a decision memorandum for the Director of National Intelligence, requesting the establishment of "a U.S. Intelligence Community-wide communications metadata sharing structure; to recommend that the National Security Agency establish…

20140825-The Intercept-Sharing-Communications-Metadata-Across-the-USIC-ICREACH.pdf
This document is a presentation about a new SIGINT processing application, ICREACH. The proposed application will enable "large scale expansion of communications metadata shared with IC partners." ICREACH makes "greater use" of NSA's communications…

20131104-mundo-info_sharing_partners.pdf
This document is a report detailing the National Security Agency's policy for sharing cryptologic intelligence with the intelligence agencies of different countries. Western countries are divided into "Tier A" nations, which receive "comprehensive…

20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker.pdf
This document is an article from an internal NSA newsletter. It contains an NSA analyst's reminiscences about working at the European Technical Center (ETC) in Stuttgart, Germany.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2