This item is a collection of documents released by The New York Times. They cover a wide range of surveillance activities within the NSA. It includes: Extracts from a slide presentation detailing major developments in the Special Source Operations…
This document is a presentation describing forms of Open Source Multi-Hop Networks. The most famous of these is TOR, The Onion Router, a service designed to protect online anonymity partially funded by the US due to its use by dissents in repressive…
This document contains excerpts from an internal NSA presentation describing the NSA's cloud analytics platform, code-named GHOSTMACHINE. It is administered by Special Source Operations (SSO).
This document is a test used in NSA training. It contains questions and answers determining analyst's competency in accessing information collected pursuant to FISA.
This document is a read me for the NSA's Atomic SIGINT Data Format (ASDF). This is a data foramt that is used by the XKEYSCORE data storage and analysis program. ASDF is used to provide other organizations with the ability to configure their own…
This document is an internal NSA presentation. It documents the data analysis tool XKEYSCORE's ability to create and manage User Agents (UAs). UAs are strings of data sent to visited websites, providing XKEYSCORE with a means of gleaning various…
This document is an internal NSA presentation. It draws the distinction between retrieving full logs of digital network intelligence (DNI) data and retrieving HTTP activity requests when using the NSA's XKEYSCORE data analysis tool.
This document is an internal NSA presentation. It outlines the best strategies for targeting web forums for surveillance using the XKEYSCORE and PINWALE query systems.