Browse Items (626 total)

This document is a slide from a NSA presentation describing the NSA's collection activities worldwide. Specifically, it illustrates that the NSA used a technique called "Computer Network Exploitation" (CNE) to install malware onto over 50,000 devices…

20140630-WaPo-list_of_governments_and_organizations_authorized_for_surveillance.pdf
This document is a briefing prepared by the Attorney General of the United States. It identifies foreign governments, foreign factions, entities controlled by foreign governments, foreign-based policial organizations. These entities are potentially…

20141010-intercept-exceptionally_controlled_information_listing.pdf
This document is a NSA list of programs that have a security classification of ECI (Exceptionally Controlled Information). It provides an abstract for each program, as well as identifying potentially overlapping programs.

20150811-intercept-sigint-philosopher-lessons-for-civil-servants.pdf
This article, from the internal NSA newsletter, SIDtoday, is one in a series written about ethics for NSA analysts. The author, likens intelligence analysis to the American Civil War, encouraging fellow analysts to trust the chain of command when…

20150701-intercept-intro_to_connect_sensitive_scanning_with_xks_fingerprints.pdf
This document is an internal NSA presentation. It introduces users of the XKEYSCORE data analysis system to Context Sensitive Scanning. This feature of XKEYSCORE allows analysts to surgically target traggic, by only applying keywords in the context…

20150701-intercept-un_secretary_general_xks.pdf
This document is an extract from an internal NSA presentation. It outlines how NSA analysts used the data analysis tool XKEYSCORE to gain access to the talking points of the U.N. Secretary General prior to their meeting with President Barack Obama.

20141010-intercept-tarex_classification_guide.pdf
This document is a NSA classification guide for the NSA's Target Exploitation (TAREX) program. TAREX conducts worldwide signals intelligence (SIGINT) close-access operations and overt and clandestine human intelligence (HUMINT) in direct support of…

20131120-guard-collection_processing_and_dissemination_of_allied_communications.pdf
This document is an extract from a draft 2005 directive created in the name of the NSA's director of signals intelligence. It describes the British - U.S. Communications Intelligence Agreement of 5 March 1946, which establishes broad cooperation…

Mobile-Apps-Checkpoint-Meeting-Archives.pdf
This document is an extract from GCHQ's internal Wiki, GCWiki. It is a log of meeting minutes from the Mobile Apps Project from November 27 2009 to 22 February 2011.

20150701-intercept-asfd_readme.pdf
This document is a read me for the NSA's Atomic SIGINT Data Format (ASDF). This is a data foramt that is used by the XKEYSCORE data storage and analysis program. ASDF is used to provide other organizations with the ability to configure their own…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2