Browse Items (626 total)

20150701-intercept-http_activity_vs_user_activity.pdf
This document is an internal NSA presentation. It outlines the features of the XKEYSCORE data analysis application, specifically, its ability to retrieve data based on both HTTP traffic and user activity metadata.

20140322-nyt-operation_shotgiant_objectives.pdf
This document contains NSA presentation slides and notes describing Huawei Corp, a Chinese telecommunications company, as a potential surveillance threat and link to the PRC. The document dicusses operations to exploit Huawei equipment globally and…

20140825-Intercept-ICREACH-Black-Budget-Extract.pdf
This document is allegedly an extract from the 2013 NSA Black Budget, requesting funding to expand the ICREACH program to access a "wider set of shareable dala." The request includes expanding IC access to digital network intelligence metadata,…

20140825-Intercept-ICREACH-Sharing-SIGINT-Comms-Metadata-with-the-Intel-Community-Memo.pdf
This document is a NSA release announcing the status of ICREACH, the NSA producediIntelligence community-wide communications metadata search engine. The document states that the purpose of the program is for "situational awareness and target…

20140430-intercept-ghostmachine.pdf
This document contains presentation slides from the NSA Office of SIGINT Development detailing bulk data collection and analysis protocol improvements for greater efficiency and prioritzation of targets.

20140531-nyt-identity-intelligence.pdf
This document is an internal NSA presentation describing the agencies efforts in Identity Intelligence, a surveillance technique based on "exploiting pieces of information that are unique to an individual to track, exploit and identify targets of…

20130605-guard-verizon_215_secondary_order.pdf
This document contains a court order signed by the judge of the Foreign Intelligence Surveillance Court, Roger Vinson. The order compels the telecommunications company Verizon to produce "tangible things" to the National Security Agency. These…

20140630-WaPo-fisa_judges_order_authorizing_surveillance_of_foreign_governments_and_organizations.pdf
This document is a court order originating from the Foreign Intelligence Surveillance Court, signed by judge John D. Bates. It determines that the certification included in Docket Number 702(i)-10-02 is consistent with the Foreign Intelligence…

20140630-WaPo-list_of_governments_and_organizations_authorized_for_surveillance.pdf
This document is a briefing prepared by the Attorney General of the United States. It identifies foreign governments, foreign factions, entities controlled by foreign governments, foreign-based policial organizations. These entities are potentially…

20140312-intercept-increasing_collection_capacity_by_increasing_implants.pdf
This document is an extract from an internal NSA report. It describes the Tailored Access Operation's (TAO) efforts to expand their hardware infrastructure, enabling more active implants to be carried out on a daily basis.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2