This document contains notes from a NSA employee on their work and travel to the DSD. The notes include progress reports on two projects, the first being a tool to use against Windows file systems, and the second involving an implant that grants…
This document is a memo describing key "talking points" relating to the NSA's surveillance activities against Iran, and the NSA's understanding of Iran's surveillance and information warfare capabilities.
This document is a series of extracts from an NSA report. It describes the GILGAMESH and VICTORYDANCE programs, which were efforts to use new geolocation algorithms in collaboration with the CIA's drone assassination program. It describes the…
This document contains internal NSA training material, explaining in detail the role of the intelligence analyst as it relates to the NSA's Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.
This document consists of three NSA presentation slides outlining Content Extraction goals and challenges, including a redacted list of the top ten most frequent mentionend targets in their collection.
This document is an extract from internal NSA training material. It shows the user-interface of XKEYSCORE, the NSA's tool for retrieving surveillance data. It shows an example query on Sweden, and methods to assure compliance with USSID-18.
This document is an NSA powerpoint presentation from June 2012 that discusses the metadata collection and anylsis program SKYNET. The presentation shows the results of the statistical analysis of cell phone metadata to show travel behaviour, social…
This document contains training materials relating to NSA signals intelligence collection activities, including: Executive Order 12333, December 1982 DoD Procedures Governing the Activities of DoD Intelligence Components, NSA Policy 1-23, and DoD…