This document is an NSA information paper on the partnership between Turkish and U.S. intelligence. The paper provides key recent issues, discusses what each organization offers the other in terms of SIGINT, and refers to challenges balancing the…
This document is a NSA memo giving a brief overview of the development, implementation, and status of the NSA's ICREACH program, which gives the US intelligence community and its Five Eye second-party partners access to a mass collection of…
This document is a NSA memo giving a brief overview of the development, implementation, and status of the NSA's ICREACH program, which gives the US intelligence community and its Five Eye second-party partners access to a mass collection of…
This document is a report created by the NSA's Signals Intelligence Directorate (SID)'s Office of Oversight and Compliance. This report evaluates the incidents of "incidents" (described as "collection, dissemination, unauthorized access, and…
This document is a report created by the NSA's Signals Intelligence Directorate (SID)'s Office of Oversight and Compliance. This report evaluates the incidents of "incidents" (described as "collection, dissemination, unauthorized access, and…
This document contains an extract from an NSA report that provides an overview of the automated TUBINE implant system. TURBINE allows for large-scale exploitation networks.
This document contains two presentations and one article relating to the NSA's foreign surveillance programs. The first describes case studies of operations against the staff of Enrique Pena Nieto, formerly a leading Mexican Presidential candidate,…
This document is a heavily redacted intercepted chat conversation. The document shows that OTR (Off-the-Record chat encryption protocol) could not be decrypted by the NSA.
This document is a heavily redacted intercepted chat log. The log shows that the NSA was not able to decrypt the message that was encrypted with PGP (Pretty Good Privacy).
This document is a test used in NSA training. It contains questions and answers determining analyst's competency in accessing information collected pursuant to FISA.