This document is a classification guide prepared by the NSA's Human Language Technology project. It gives the classification levels for the different models of human language analysis, including speaker recognition, gender recognition and anomaly…
This document is a classification guide prepared by the NSA's Human Language Technology project. It gives the classification levels for the different models of human language analysis, including speaker recognition, gender recognition and anomaly…
This document is a NSA classification guide relating to intelligence operations performed by the NSA under the authority of the Foreign Intelligence Surveillance Act (FISA), the Protect America Act (PAA), and the Fisa Amendments Act (FAA).
This document is a NSA classification guide for the WHIPGENIE program. WHIPGENIE has a security classification of ECI (Exceptionally Controlled Information). The program covers Special Source Operations (SSO) relationships with U.S. Corporate…
This document is a NSA classification guide for the WHIPGENIE program. WHIPGENIE has a security classification of ECI (Exceptionally Controlled Information). The program covers Special Source Operations (SSO) relationships with U.S. Corporate…
This document is a classification guide for the NSA's PAWLEYS program, which has a security classification of ECI (Exceptionally Controlled Information). PAWLEYS is a program aiming to protect clandestine HUMINT and computer network access intended…
This document is a classification guide that describes the appropriate security classificiations to be used when describing different elements of the operations of the NSA's Office of Cryptanalysis and Exploitation Services, including the…
This document is a NSA news release giving a summary of the ongoing success of NSA-led training initiatives for the CIA. These efforts help in the "development of a cadre of CIA Target Analysts who are capable of using SIGINT target-development…
This document contains three slides from a presentation from the SIGINT Development branch of the NSA, detailing the damage and data loss during a Chinese cyber attack on the Department of Defense. The presentation also sets out goals for…
This document is an excerpt from an NSA training tool explaining how to determine whether a targeted device is being used outside the United States. It illustrates a hypothetical example involving a query to CHALKFUN, the tool used to search FASCIA,…