This document is a NSA classification guide relating to intelligence operations performed by the NSA under the authority of the Foreign Intelligence Surveillance Act (FISA), the Protect America Act (PAA), and the Fisa Amendments Act (FAA).
This document contains pages from the NSA internal wiki detailing the TURMOIL GALLANTWAVE program which allows exploitation of large communications systems which use Data Network Session Cipher (DNSC).
This document is a report detailing the business processes behind the operation of PRESTON, a communication interception program which covertly intercepts phone calls, text messages, internet data.
This document is a report detailing the architecture of PRESTON, a communication interception program which covertly intercepts phone calls, text messages, internet data.
This document is an article from SIDToday, an internal newsletter of the NSA's Signals Intelligence Directorate division. It contains an interview with the author of an advice column called 'Ask Zelda'.
This document is an NSA slide deck giving an overview of the Expeditionary Access Operations (EAO) unit, its make up and major task. The unit conducts "worldwide Human Enabled Close Access Cyber Operations" to support signals intelligence (SIGINT).
This document is an internal NSA presentation. It describes the functions of the XKEYSCORE querying tool used by NSA analysts. This presentation focuses on retrieving data on targets through queries to their email addresses and user activity.
This document is a presentation describing the mission statement BOUNDLESSINFORMANT, the NSA's tool used to track and visualize global surveillance data. A more comprehensive version of this document was released by El Mundo.
This document is a report providing detailed information about GCHQ's interception of Flag EA's telecommunication cable landing in the UK at Porthcurno, Cornwall.