This document is a heavily redacted intercepted chat conversation. The document shows that OTR (Off-the-Record chat encryption protocol) could not be decrypted by the NSA.
This document is a NSA classification guide for the WHIPGENIE program. WHIPGENIE has a security classification of ECI (Exceptionally Controlled Information). The program covers Special Source Operations (SSO) relationships with U.S. Corporate…
These documents are presentation slides prepared for the 2010 SIGDEV conference. The presentation describes the NSA's attempts to use network mapping to target various credit card authorization networks, with the aim to create actionable intelligence…
This document is an internal NSA presentation. It describes the workflow of using the XKEYSCORE data analysis tool in conjunction with the PINWALE, MARINA and TRAFFICTHIEF databases to provide actionable intelligence on targets. It includes a…
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Norway in a 30 day period between December 10 2012 and Janurary 8 2013.
This document is an image of two flow charts that visualize the workflows of analysts gathering digial network intelligence (DNI) using the XKEYSCORE data analysis tool.
This document is a report prepared in conjunction between the NSA and GCHQ. It documents a collaborative plan to develop and use various surveillance tools aimed at subverting encryption technologies.
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Germany in a 30 day period between December 10 2012 and Janurary 8 2013.
This document is a page from GCHQ's internal wiki, GCWiki. It is an extract from a glossary describing terms relating to INCENSER, a component of the GERONTIC program supplying data with assistance from Cable and Wireless using a rival company's…