This document is an internal NSA presentation giving a detailde description of the systems adminstration of the XKEYSCORE data analysis tool. It provides a comprehensive outline of the tool's data architecture, GUI (Graphical User Interface), and…
This document is an NSA presentation prepared by the Special Collection Service division in preparation for the Pacific Sigdev Conference held in March 2011. It describes the organizational structure of the division, including key strategic…
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Afghanistan in a 30 day period between December 10 2012 and Janurary 8…
This document is an excerpt from the Budget Justification for the FY 2013, prepared by the US Intelligence Community. This excerpt details the raid on Osama bin Laden's compound, generally referencing the many technologies and applications of imagery…
This document is a summary of a report prepared by GCHQ. It analyzes GCHQ's broader surveillance architecture in light of "changes in mission and changes in external environment", and how the agency should repsond to these changes over time.
This document appears to be an extract from an NSA wiki. It describes the XKEYSCORE analytics program and its relationship with other NSA repositories such as PINWALEand TURMOIL, as well as GCHQ's MUSCULAR.
This document is an assessment report from the SIRDCC Speech Technology Working Group on the current state of speech to text (STT) technology. The working group was established by the Securiy Service and the GCHQ. The report discusses competing…
This document is an internal NSA presentation. It further describes the syntax underlying Application IDs in the NSA's ZKEYSCORE data analysis tools. Application IDs are designed to increase the efficiency of queries to repositories of intelligence…