Browse Items (626 total)

20140311-nyt-classification_guide_for_fisa_the_protect_america_act_and_the_fisa_amendments_act.pdf
This document is a NSA classification guide relating to intelligence operations performed by the NSA under the authority of the Foreign Intelligence Surveillance Act (FISA), the Protect America Act (PAA), and the Fisa Amendments Act (FAA).

20141228-spiegel-explanation_of_the_turmoil_gallantwave_program_and_its_role_when_attacking_vpn_0.pdf
This document contains pages from the NSA internal wiki detailing the TURMOIL GALLANTWAVE program which allows exploitation of large communications systems which use Data Network Session Cipher (DNSC).

PRESTON-Business-Processes.pdf
This document is a report detailing the business processes behind the operation of PRESTON, a communication interception program which covertly intercepts phone calls, text messages, internet data.

Preston-Architecture.pdf
This document is a report detailing the architecture of PRESTON, a communication interception program which covertly intercepts phone calls, text messages, internet data.

20140307-intercept-nsa_ask_zelda_an_interview_with_zelda.pdf
This document is an article from SIDToday, an internal newsletter of the NSA's Signals Intelligence Directorate division. It contains an interview with the author of an advice column called 'Ask Zelda'.

CNO-Course-EAO-Redacted.pdf
This document is an NSA slide deck giving an overview of the Expeditionary Access Operations (EAO) unit, its make up and major task. The unit conducts "worldwide Human Enabled Close Access Cyber Operations" to support signals intelligence (SIGINT).

20150701-intercept-email_address_vs_user_activity.pdf
This document is an internal NSA presentation. It describes the functions of the XKEYSCORE querying tool used by NSA analysts. This presentation focuses on retrieving data on targets through queries to their email addresses and user activity.

20141010-intercept-eci_compartments.pdf
This document is a list of NSA surveillance projects that have an ECI (Exceptionally Controlled Information) security classification.

20130608-guard-boundless_informant_capabilities (1).pdf
This document is a presentation describing the mission statement BOUNDLESSINFORMANT, the NSA's tool used to track and visualize global surveillance data. A more comprehensive version of this document was released by El Mundo.

20141125-sz-cable_master_list_fea.pdf
This document is a report providing detailed information about GCHQ's interception of Flag EA's telecommunication cable landing in the UK at Porthcurno, Cornwall.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2