This document is a NSA release announcing an upcoming "Strategic Intelligence Issue Seminar" titled: "Turkish Cross-Border Operations and Kurdish Intifada: Rhetoric or Reality?" The main focus of the seminar will be the social unrest in Turkey of…
This document is a NSA factsheet answering analyst's frequently asked questions about BOUNDLESSINFORMANT, a tool used by the NSA to track and visualize global surveillance data. It is identical to the factsheet previously released by The Guardian.
This document is a NSA slide used in NSA analyst training. It documents the decision tree for targeting individuals in response to foreign intelligence requirements with reference to relevant laws, policies and procedures.
This document is an extract from a NSA glossary. The FISA Amendments Act (FAA), Section 702 is described, including the NSA's rationale for permitting the surveillance targeting of non-US citizens situated outside te USA. The document also describes…
This document is a presentation from the GCHQ Applied Research Unit. It discusses using target detection identifiers (TDI) to track targets online though various web events, including email, social media, webcam images, and other kinds of internet…
This document is a transcript of a Terms of Reference entered into by the NSA and two German intelligence agencies, the Bundesnachrichtendiest's Sigint Department and the Bundesamt fur Verfassungsschutz. The document describes the sharing agreement…
This document is a presentation describing the NSA's STORMBREW program, an UPSTREAM collection program that intercepts internet communications as they pass through points in the US's fibre optic communications infrastructure. The slides are in a very…
This document is an extract from an internal GCHQ presentation. It shows a chart describing the number of ISMI (International Mobile Subscriber Identity) numbers retrieved using encryption keys sourced from a CNE (Computer Network Exploitation)…
This document is a presentation overview into CSEC's analysis of TLS (Tranport Layer Security) traffic, in an effort to identify encryption capabilites, services, trends, and changes. Workflows show warranted collection and collection from a special…