This document is an extract from a NSA presentation describing the nature of the NSA's intelligence relationship with Sweden. It mentions Swedish intelligence service's assistance with the QUANTUM program.
This document contains one NSA slide listing the possible data selectors through which the NSA identifies possible surveillance targets. Possible selectors include email ids from popular services such as Google, MSN, and Hotmail; IP addresses; Device…
This document is an approval form used by the GCHQ to request surveillance approval for individuals with "a sensitive nationality or in a sensitive location." It provides details on tasking and datamining of individuals both inside and outside of the…
This document contains two slides detailing the computer network operations programs which intercept, passively and actively, communications as they "transit the globe." Diagrams also show the "automated management and control" of surveillance…
This document is a NSA diagram describing the security classification of various components of the SENTRY EAGLE program. SENTRY EAGLE is a blanket term for the NSA's surveillance programs with a security clearance of ECI (Exceptionally Controlled…
This document is an extract from an NSA presentation. It describes SERENDIPITY, which was seemingly an effort by the NSA to target Microsoft for similar SIGINT sourcing programs that affected Google and Yahoo. These slides show efforts to intercept…
This document is a decision memorandum for the Director of National Intelligence, requesting the establishment of "a U.S. Intelligence Community-wide communications metadata sharing structure; to recommend that the National Security Agency establish…
This document is a presentation about a new SIGINT processing application, ICREACH. The proposed application will enable "large scale expansion of communications metadata shared with IC partners." ICREACH makes "greater use" of NSA's communications…
This document is a report detailing the National Security Agency's policy for sharing cryptologic intelligence with the intelligence agencies of different countries. Western countries are divided into "Tier A" nations, which receive "comprehensive…
This document is an article from an internal NSA newsletter. It contains an NSA analyst's reminiscences about working at the European Technical Center (ETC) in Stuttgart, Germany.