This document contains extracts from an NSA presentation reporting on the future of the FOXACID program, discussing new programs for computer network exploitation. Programs such as SECONDDATE and WILLOWVIXEN allow for mass exploitation through…
This document is a slide from an internal NSA presentation. The slide describes the appropriate target minimization procedures to be adopted by NSA analysts, such as the importance of not recieving the "substantive content" of communciations in the…
This document is an internal NSA presentation. It describes using the NSA's XKEYSCORE data analysis tool to create "Fingerprints", improving the utility to searching repositories of intelligence information.
This document discusses the types of lawful intercept used by the NSA, including access through special source operations. Lawful Intercept is defined as Èobtaining communications network data by legal authority for analysis or evidence.È A long list…
This document is a classification guide for NSA Signals Intelligence material collected between 1945 and 1967. It also includes a glossary defining key terms used in U.S. intelligence material.
This document contains an extract from an NSA report that provides an overview of the automated TUBINE implant system. TURBINE allows for large-scale exploitation networks.
This document is an extract from an internal NSA briefing. It describes the triparteid relationship between Sweden's FRA, the NSA and GCHQ in COMINT, SIGINT and ELINT matters. This document is classified as top secret due to its sensitivity…
This document is an internal NSA memo. It describes the Unified Targeting Tool (UTT), a tool allowing analysts finer granularity in performing queries of existing NSA data stores such as TURBULENCE.
This document is an NSA internal Wiki page for VALIANTSURF, the "coverterm for the development of Data Network Cipher (DNC) exploitation capabilities in TURMOIL for integration into the TURBULENCE DNC thread."