Browse Items (626 total)

01-Course-Introduction-Nohidden-Redacted.pdf
This document is a slide deck introducing a "Close Access" NSA training course to "familiarize, educate, and certify students in the operational usage" of various computer network exploitation tools.

20140618-der_spiegel-world_map_from_the_boundless_informant_program.pdf
This document contains two slides which show the extent of reach of the Boundless Informant program on a world map.

20140618-der_spiegel-world_map_from_the_boundless_informant_program.pdf
This document contains two slides which show the extent of reach of the Boundless Informant program on a world map.

20140618-der_spiegel-overview_of_the_use_of_boundless_informant_world_map.pdf
This document shows a map of the world charting the targets and collection quantities for the BOUNDLESSINFORMANT program.

20150701-intercept-writing_xks_fingerprints.pdf
This document is an internal NSA presentation. It describes using the NSA's XKEYSCORE data analysis tool to create "Fingerprints", improving the utility to searching repositories of intelligence information.

20150701-intercept-xks_application_ids_brief.pdf
This document is an internal NSA presentation. It further describes the syntax underlying Application IDs in the NSA's ZKEYSCORE data analysis tools. Application IDs are designed to increase the efficiency of queries to repositories of intelligence…

20150701-intercept-xks_as_a_sigdev_tool.pdf
This document is an internal NSA presentation. It describes the workflow of using the XKEYSCORE data analysis tool in conjunction with the PINWALE, MARINA and TRAFFICTHIEF databases to provide actionable intelligence on targets. It includes a…

20150701-intercept-xks_intro.pdf
This document is an internal NSA presentation. It describes the NSA's data analysis tool, XKEYSCORE. The presentation outlines the structure of the tool, its relation to other data NSA repositories, and examples of its real-life use as an…

20130731-guard-xkeyscore_training_slides.pdf
This document is a presentation describing the NSA's query program, XKeyscore. The program's structure, appearance and technical architecture are described and compared to other tools available to the NSA. The document also contains examples of the…

20131211-svt-xkeyscore_slide_with_swedish_example.pdf
This document is an extract from internal NSA training material. It shows the user-interface of XKEYSCORE, the NSA's tool for retrieving surveillance data. It shows an example query on Sweden, and methods to assure compliance with USSID-18.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2