This document is a presentation describing the mission statement BOUNDLESSINFORMANT, the NSA's tool used to track and visualize global surveillance data. This document is an expanded version of that released by the Guardian.
This document is a presentation giving an overview of a new branch within the NSA, "Custom Thread Development for Network Encryption," in which a team "OTP VPN Exploitation" will aid diverse SIGINT teams in decryption. The document goes over the…
This document is a presentation deck from the NSA's Threat Operations Center (NTOC) outlining TUTELAGE, an application that instrumentalizes 3rd party attacks. The presentation goes over TUTELAGE's current and future capabilities of alerting,…
This document is an internal GCHQ presentation. It describes the legal and regulatory framework that UK based intelligence services operate within. It describes key pieces of legislation, key commissions and regulatory watchdogs, and also compares…
This document is a presentation on "shaping:" Active implant copies traffic and directs a copy past a passive collector, such as TURMOIL. It allows for decryption, collecting metadata records and analysis of internet key exhanges, selection of VPNs,…
This document is a report created by the NSA's Signals Intelligence Directorate (SID)'s Office of Oversight and Compliance. This report evaluates the incidents of "incidents" (described as "collection, dissemination, unauthorized access, and…
This document is an NSA article from the internal NSA newsletter SIDtoday. Written by the SIDtoday editor, the article is an interview with Jon Darby, Signals Intelligence (SID) Associate Deputy Director for Counterterrorism. The interview dicusses…
This document is an extract from a newsletter created by GCHQ. It describes the Overhead constellation, which was a series of programs designed to collect high-priority Argentinian military and leadership communications.