This document contains minutes from a forum held at the National Security Agency in June 2009. The minutes describe various programs involving NSA collaboration with other Five Eyes intelligence agencies such as Australia's Defense Signals…
This is an NSA document announcing the TEMPORA program. TEMPORA gives qualified NSA analysts access to a large GCHQ XKEYSCORE (Computer Network Exploitation) system for targeted and bulk metadata collection.
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications from 3rd party surveillance relationships 30 day period between December 10…
This document contains one slide from a NSA presentation detailing the benefits of the TURBINE program for automating computer network exploitation programs, suggesting that it allows for "industrial-scale exploitation."
This document is an internal presentated prepared by an official within the NSA. it describes the basics of HTTP protocol and how to target and exploit this using the XKEYSCORE query and analysis tool.
This document is a briefing memo prepared by the NSA in preparation of "Hr. Dietmar B.", Director of SIGINT Analysis of Production at the BND, the German Intelligence Service. The memo describes the purpose of the official's visit, security requests,…
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It details the information gathered for specific NSA surveillance projects.
This document is a NSA classification guide for Operation STATEROOM. It details elements of the NSA's surveillance program concerning covert SIGINT collection from Diplomatic facilities overseas. The German component of this project is presumably…
This document is an extract from a presentation prepared by the NSA's site in Griesheim, Germany. It details the variety of different sources of intelligence on suspected terrorists in Europe.