This document is a NSA diagram describing the security classification of various components of the SENTRY EAGLE program. SENTRY EAGLE is a blanket term for the NSA's surveillance programs with a security clearance of ECI (Exceptionally Controlled…
This document is an internal NSA presentation describing the security classification of various components of the SENTRY EAGLE program. SENTRY EAGLE is an blanket umbrella program containing the NSA's surveillance programs with a security clearance…
This NSA document gives an overview of the JSA - Joint Signals Activity - an NSA/BND intelligence partnership and their joint intelligence work in North Africa.
This document is a NSA brief outlining the intelligence relationship operating between the NSA and Communications Security Establishment Canada (CSEC). A more detailed analysis of this document has been written by Christopher Parsons and is available…
This document is a NSA release announcing the official title changes of NSA/CSS Representatives for major Third-Parties, such as Turkey. The new title is Special US Liasion Advisor (SUSLA).
This document is a brief outlining key targets and timelines for a MHS/GCHQ project that seeks to improve intelligence "access and collection" for Turkish Energy Companies, especially the Ministry of Energy and Natural Resources (MENR).
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…
This document is a report from GCHQ. It details the scope and capabilities of the agency's DIGINT (Digtital Intelligence) program. It reveals the challenges the agency faced when collecting and exploting communications intelligence from targets for…
This document is an article from a NSA internal newsletter, SIDtoday. Originating from the Human Lanaguage Technology division of the NSA, the artice discusses the future of Human Language Technology (HLT) as an aid in bulk data collection. Two major…