This document is a course outline used in training new NSA analysts and technicians in the (now defunct) Business Records (BR) and Pen Register Trap and Trace (PR/TT) Bulk Metadata Programs.
This document is an article from the NSA's internal Wiki, Intellipedia. It documents various manhunting operations occuring around the world in 2008. Notably, it mentions the assassination of Syrian Brigadier General Muhammad Sulayman in Tartous,…
This document is an internal NSA presentation. It explains the syntax behind the construction of AppIds and Fingerprints in the NSA's XKEYSCORE data analysis program. AppIds and Fingerprints are methods to make searches of intelligence information…
This document is an internal NSA presentation. It describes utilizing the XKEYSCORE data analysis tool as a resource supporting CNE (Computer Network Exploitation) operations, in distinction to XKEYSCORE's traditional use for DNI (Digital Network…
This document is a report detailing the National Security Agency's policy for sharing cryptologic intelligence with the intelligence agencies of different countries. Western countries are divided into "Tier A" nations, which receive "comprehensive…
This document is an article from an internal NSA wiki. It describes an analysts methodology and process of collecting and analyzing data gleaned from employees of Petroleos de Venezuela, the primary oil producer of Venezuela.
This document is an internal NSA presentation. It outlines the features of the XKEYSCORE data analysis application, specifically, its ability to retrieve data based on both HTTP traffic and user activity metadata.
This document is an NSA article from the internal NSA newsletter SIDtoday. Written by the SIDtoday editor, the article is an interview with Jon Darby, Signals Intelligence (SID) Associate Deputy Director for Counterterrorism. The interview dicusses…
This document is a memo prepared by the NSA. It outlines procedures to change the default statistic configurations of the NSA's XKEYSCORE data analysis program.