This document is an excerpt from an NSA Special Source Operations glossary which provides the code names, countries and details for the audio data and bulk collection programs generally known as MYSTIC.
This document contains excerpts from an internal NSA presentation describing the NSA's cloud analytics platform, code-named GHOSTMACHINE. It is administered by Special Source Operations (SSO).
This document is a draft report by the NSA's inspector general. It shows the development and operations of the Presidents Surveillance Program, a collection of surveillance programs began by George W Bush in the aftermath of September 11, 2001 and…
This document is a memo prepared by the NSA. It outlines procedures to change the default statistic configurations of the NSA's XKEYSCORE data analysis program.
This document is an extract from an internal GCHQ presentation. It provides statistics and summaries for the data identified in various mobile phone networks retrieved using compromised SIM encyption keys gained from an attack on the SIM card…
This article, from the NSA's SIDtoday newsletter, describes the success of a hands-on interception program. Shipments of computer network devices (servers, routers, etc.), en route to target locations, are intercepted and physically implanted with…
This report documents the strategic accomplishments of the National Counterterrorism Center's Directorate of Terrorist Identities (DTI) for 2013. It refers to the expansion of the TIDE (Terrorist Identities Datamart Environment) system, biometric…