This document is a memo that explains the rationale used by the NSA in its selection of surveillance targets outside the US. The document contains actual examples of certification examples that indicate that the staff of foreign heads of state and…
This document is a presentation detailing the potential uses of smartphone devices for signals intelligence. The presentation highlights the ability to access social media, location, search history, network history, and photo data from smartphones.…
This document is an internal presentated prepared by an official within the NSA. it describes the basics of HTTP protocol and how to target and exploit this using the XKEYSCORE query and analysis tool.
This document is an extract from an internal NSA presentation about XKEYSCORE, the NSA's tool to search and analyze surveillance data. It describes the scope and content of the MARINA and PINWALE databases, as well as the NSA's ability to track…
This document is a presentation slide describing GCHQ's ROYAL CONCIERGE program. This "SIGINT driven hotel reservation tip-off service" enables analysts to exploit hotel reservation confirmation emails to enable more directed targeting of specified…
This document is an NSA information paper on the partnership between Turkish and U.S. intelligence. The paper provides key recent issues, discusses what each organization offers the other in terms of SIGINT, and refers to challenges balancing the…
This document is a briefing sheet from the Office of the Director of National Intelligence to the NATO Civilian Intelligence Council. It provides discussion of a previous assessment of the cyber threat to NATO, especially the threat of state actors…
This document is an internal presentation prepared by officers at GCHQ. It establishes the legal framework of surveillance activities performed by British intelligence agencies, notably GCHQ. It also outlines the features of the BROAD OAK database…