Browse Items (626 total)

20130816-wapo-so_you_got_a_us_person.pdf
This document is a slide that was used in the training of NSA analysts. This slide explains the appropriate actions to undertake in various situations involving the surveillance of U.S. Persons.

20150117-speigel-combination_of_offensive_and_defensive_missions_-_how_fourth-party_missions_are_being_performed.pdf
This document is an article from the internal NSA newsletter SIDtoday. The article discusses the success of a collaboration between offensive and defensive branches of the NSA. For example, the revelation of a Chinese cyber attack on the Department…

20140321-le_monde-french_intelligence_e-mail_spying_operation.pdf
This document contains slides outlining the CSEC interception and inspection of a piece of spyware, SNOWGLOBE. Slides titled "Victimology" and "Intelligence Priorities" list the spyware's targets as Canada, Europe, Africa and Iran, incuding Iranian…

20150701-intercept-cadence_readme.pdf
This document is a read me outlining CADENCE, a selection tasking tool used in conjunction by the NSA's XKEYSCORE data storage and analysis tool.

20140825-Intercept-CRISSCROSSPROTON-Point-Paper.pdf
This document is a point paper on CRISSCROSS/PROTON with the purpose to provide DIRNSA information on subject. The paper gives a detailed overview of the communications metadata collection and access applications CRISSCROSS and its more sophisticated…

20131022-monde-prism_april_2013.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…

20140618-der_spiegel-explanation_of_nymrod_a_system_for_searching_for_people_and_places_in_databases_and_documents.pdf
This document is an internal NSA memo. It describes the operation of NYMROD, an automatic name recognition tool.

20140618-dagbladet-keith_alexander_talking_points.pdf
This document contains notes for the opening remarks offered by former NSA Director, Keith Alexander at the 2013 DENUSA conference in Copenhagen, Denmark.

20130928-nyt-syanpse.pdf
This document is a slide from an NSA presentation illustrating one of the ways in which the agency uses e-mail and telephony metadata to analyze the relationship networks of foreign intelligence targets. Connections between people are illustrated…

20140825-Intercept-Metadata-Policy-Conference.pdf
This document contains a rough draft of a conference summary outlining the definitions of collection content under the authority of the Executive Order 12333 and FISA. The draft document refers to the difficulty to differentiate between…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2