This document is a report detailing the National Security Agency's policy for sharing cryptologic intelligence with the intelligence agencies of different countries. Western countries are divided into "Tier A" nations, which receive "comprehensive…
This document is an internal NSA presentation. It describes utilizing the XKEYSCORE data analysis tool as a resource supporting CNE (Computer Network Exploitation) operations, in distinction to XKEYSCORE's traditional use for DNI (Digital Network…
This document is an internal NSA presentation. It explains the syntax behind the construction of AppIds and Fingerprints in the NSA's XKEYSCORE data analysis program. AppIds and Fingerprints are methods to make searches of intelligence information…
This document is an article from the NSA's internal Wiki, Intellipedia. It documents various manhunting operations occuring around the world in 2008. Notably, it mentions the assassination of Syrian Brigadier General Muhammad Sulayman in Tartous,…
This document is a course outline used in training new NSA analysts and technicians in the (now defunct) Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.
This document is an NSA agenda for a meeting held on April 12 2013 between Bernard Barbier, Techical Director of France's Directorate of External Security, Patrick Pailloux, Director of France's National Information Systems Security Agency, and…
This document is a presentation deck giving an overview of the NSA's techniques for detecting bots and using bots in their CNE operations. The document discusses the main uses for bots and bot herding, how they can be used in SIGINT, future hopes and…