This document is an internal memo created by the NSA's Signals Intelligence Directorate. It describes new procedures that permit analysts to perform "contact chaining", the analysis of American's networks of online associations for foreign…
This document is an extract from notes for an internal NSA presentation. It describes key achievements made by the NSA's Signals Intelligence Directorare (SID) in 2013. Mention is made of the trilateral agreement existing between the NSA, GCHQ and…
This document is a memo created by an official within the Signals Intelligence Directorate (SID) of the NSA. In it, the author describes "analysis paralysis", a situation where over analysis hinders developing coherent action. The article then goes…
This document is a memo prepared by an official within the NSA's Signals Intelligence Directorate (SID). It raises the concern that the structure of SID's SIGINT intelligence gathering operations may affect the cognitive biases of officers within…
This document is also known as United States Signals Intelligence Directive 18. It prescribes policies and procedures, and assigns responsibilities to ensure that the NSA's signals intelligence activities are aligned with the U.S. Constitution's 4th…
This document is an appendix to United States Signals Intelligence Directive 18. It prescribes policies and procedures, and assigns responsibilities to ensure that the NSA's signals intelligence activities are aligned with the U.S. Constitution's 4th…
This document is an article from SIDToday, an internal newsletter of the NSA's Signals Intelligence Directorate division. It contains an interview with the author of an advice column called 'Ask Zelda'.
This document is an NSA presentation prepared by the Special Collection Service division in preparation for the Pacific Sigdev Conference held in March 2011. It describes the organizational structure of the division, including key strategic…
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…
This document contains an extract from the FY13 Congressional Budget Justification for the National Intelligence Program discussing the addition of another country to the MYSTIC program. The MYSTIC program monitors voice call metadata and content.