This document is an extract from internal NSA training material. It shows the user-interface of XKEYSCORE, the NSA's tool for retrieving surveillance data. It shows an example query on Sweden, and methods to assure compliance with USSID-18.
This document is an excerpt from an NSA Special Source Operations glossary which provides the code names, countries and details for the audio data and bulk collection programs generally known as MYSTIC.
This document is an internal NSA presentation giving a detailde description of the systems adminstration of the XKEYSCORE data analysis tool. It provides a comprehensive outline of the tool's data architecture, GUI (Graphical User Interface), and…
This document is a budget request for the SIGINT Enabling project for the financial year of 2013. This budget involves engaging the US and foreign IT industries to covertly and overtly change their commercial product's designs to make them more…
This document contains a presentation slide detailing NSA collaboration with the Dutch Defence Intelligence and Security Service (MIVD) in anti-piracy operations in and around Somalia. It specifically talks about intercept operations against a…
This document is an excerpt from a transcript of an NSA training video. It describes how to verify the location of a targeted mobile device. It describes how the NSA monitors different types of mobile signaling information known as HLR and VLR…
This document contains one slide from a NSA presentation detailing the benefits of the TURBINE program for automating computer network exploitation programs, suggesting that it allows for "industrial-scale exploitation."
This document contains an excerpted and heavily redacted NSA presentation slide. Slide is a progress report from the NSA; the information provided refers the New Zealand cable access partner program, allegedly SPEARGUN, and confirms that phase 1 is…
This document is a slide from a NSA presentation describing the NSA's collection activities worldwide. Specifically, it illustrates that the NSA used a technique called "Computer Network Exploitation" (CNE) to install malware onto over 50,000 devices…
This document is a NSA list of programs that have a security classification of ECI (Exceptionally Controlled Information). It provides an abstract for each program, as well as identifying potentially overlapping programs.