This document is a slide deck introducing a "Close Access" NSA training course to "familiarize, educate, and certify students in the operational usage" of various computer network exploitation tools.
This document is an internal NSA presentation. It describes using the NSA's XKEYSCORE data analysis tool to create "Fingerprints", improving the utility to searching repositories of intelligence information.
This document is an internal NSA presentation. It further describes the syntax underlying Application IDs in the NSA's ZKEYSCORE data analysis tools. Application IDs are designed to increase the efficiency of queries to repositories of intelligence…
This document is an internal NSA presentation. It describes the workflow of using the XKEYSCORE data analysis tool in conjunction with the PINWALE, MARINA and TRAFFICTHIEF databases to provide actionable intelligence on targets. It includes a…
This document is an internal NSA presentation. It describes the NSA's data analysis tool, XKEYSCORE. The presentation outlines the structure of the tool, its relation to other data NSA repositories, and examples of its real-life use as an…
This document is a presentation describing the NSA's query program, XKeyscore. The program's structure, appearance and technical architecture are described and compared to other tools available to the NSA. The document also contains examples of the…
This document is an extract from internal NSA training material. It shows the user-interface of XKEYSCORE, the NSA's tool for retrieving surveillance data. It shows an example query on Sweden, and methods to assure compliance with USSID-18.