This document is an internal NSA presentation. It explains the syntax behind the construction of AppIds and Fingerprints in the NSA's XKEYSCORE data analysis program. AppIds and Fingerprints are methods to make searches of intelligence information…
This document is a presentation demonstrating the NSA's Special Source Operation's efforts to optimize their collection of Google's internal network traffic.
This document is a NSA brief describing the NSA's SIGINT strategies circa February 2012. It describes their mission with broad goals, including a desire to push for changes to the law enabling expanded surveillance powers, and a desire to…
This document is a NSA wikiInfo page outlining potential intern projects under the NSA CNA (Computer Network Attack) team. Most of the projects are "tasked to remotely degrade or destroy opponent computers, routers, servers and network enabled…
This document is a presentation by CSEC that was presented to GCHQ at teh Discovery Conference in November 2010. It summarizes CSEC's current state of SIGINT Cyber Discovery operations. It also describes the WARRIORPRIDE, REPLICANTFARM, EONBLUE and…
This document is a selection of presentation slides prepared by GCHQ's Joint Threat Research Intelligence Group (JTRIG), CSEC and the NSA. They describe several surveillance programs. The first of these is HACIENDA, a program that involved port…
This document is a briefing posted to the NSA's internal website detailing the upcoming UN Climate Control Conference and the broad goals for overcoming a divide between developed and developing countries. The document refers to surveillance…
This document is a presentation demonstrating the NSA's mass untargeted collection and analysis of SMS text messages. It gives figures demostrating the programs reach. Collection data includes VCARDS, Geocoordinates, Missed Calls, SIM Card Changes,…
This document is a NSA presentation from the 2010 SIGDEV Conference, which discusses tracking a "carrier's technical evolution" using IR.21 and other data. This informaiton is aimed to help forecast targets.
This document is a memo detailing the composition and operations of GCHQ's Intrusion Analysis (IA) team. It forms part of the Joint Electronic Attack Cell (JeAC).