Browse Items (626 total)

20140531-nyt-identity-intelligence.pdf
This document is an internal NSA presentation describing the agencies efforts in Identity Intelligence, a surveillance technique based on "exploiting pieces of information that are unique to an individual to track, exploit and identify targets of…

20140430-intercept-ghostmachine.pdf
This document contains presentation slides from the NSA Office of SIGINT Development detailing bulk data collection and analysis protocol improvements for greater efficiency and prioritzation of targets.

20140825-Intercept-ICREACH-Sharing-SIGINT-Comms-Metadata-with-the-Intel-Community-Memo.pdf
This document is a NSA release announcing the status of ICREACH, the NSA producediIntelligence community-wide communications metadata search engine. The document states that the purpose of the program is for "situational awareness and target…

20140825-Intercept-ICREACH-Black-Budget-Extract.pdf
This document is allegedly an extract from the 2013 NSA Black Budget, requesting funding to expand the ICREACH program to access a "wider set of shareable dala." The request includes expanding IC access to digital network intelligence metadata,…

20140322-nyt-operation_shotgiant_objectives.pdf
This document contains NSA presentation slides and notes describing Huawei Corp, a Chinese telecommunications company, as a potential surveillance threat and link to the PRC. The document dicusses operations to exploit Huawei equipment globally and…

20150701-intercept-http_activity_vs_user_activity.pdf
This document is an internal NSA presentation. It outlines the features of the XKEYSCORE data analysis application, specifically, its ability to retrieve data based on both HTTP traffic and user activity metadata.

20150701-intercept-http_activity_in_xks.pdf
This document is an internal NSA presentation. It outlines the utility of the XKEYSCORE data analysis tool used by the NSA to gather digital network intelligence (DNI) on the basis of analysis of target's HTTP activity while using the internet.

20150925-intercept-hra_auditing.pdf
This document is an article from GCHQ's internal Wiki, GCWiki. It describes the purpose and policies underlying the agency's HRA {Human Rights Act} audit process. The standards were designed to ensure that these audits prove that GCHQ meets the legal…

20150701-intercept-category_throttling.pdf
This memo outlines how to configure XKEYSCORE to support category throttling.

20150701-intercept-category_throttling.pdf
This memo outlines how to configure XKEYSCORE to support category throttling.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2