This is an extract from an internal NSA presentation. It relates to the provision of XKEYSCORE analytics program to the German BfV (Federal Office for the Protection of the Constitution).
This article, from the NSA's SIDtoday newsletter, describes the success of a hands-on interception program. Shipments of computer network devices (servers, routers, etc.), en route to target locations, are intercepted and physically implanted with…
This document is a presentation that reviews in detail the capabilities and constraints of the GCHQ program VPN SPIN 9 - a VPN decryption program. The document shows how the VPN service is connected to other SIGINT programs, maps out several…
This document contains internal NSA training material, explaining in detail the legal and procedural rules underlying the assumption of "Reasonable Articulable Suspicion (RAS)" as it relates to the NSA's Business Records (BR) and Pen Register Trap…
This document is allegedly an extract from the 2013 NSA Black Budget, requesting funding to expand the ICREACH program to access a "wider set of shareable dala." The request includes expanding IC access to digital network intelligence metadata,…
This document is a heavily redacted intercepted chat conversation. The document shows that OTR (Off-the-Record chat encryption protocol) could not be decrypted by the NSA.
This document is an internal NSA presentation. It describes the workflow of using the XKEYSCORE data analysis tool in conjunction with the PINWALE, MARINA and TRAFFICTHIEF databases to provide actionable intelligence on targets. It includes a…
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Norway in a 30 day period between December 10 2012 and Janurary 8 2013.
This document is an image of two flow charts that visualize the workflows of analysts gathering digial network intelligence (DNI) using the XKEYSCORE data analysis tool.