
Analyzing Mobile/Cellular DNI in XKEYSCORE

Ant Catalog

Broadcast/Internet Radio Exploitation and Analysis

C1-030-05 Close Out for "Bush Lets U.S. Spy on Callers without Courts" - Action Memorandum

CASCADE : Joint Cyber Sensor Architecture

Classification Guide for ECI PAWLEYS (PAW) 02-19

Classification Guide for ECI WHIPGENIE 02-05

Close Access SIGADS

Collection Accesses : 30 Nov - 06 Dec 2009

Communications Capability Development Programme

Content or Metadata? Categorisation of aspects of intercepted communications - GCHQ policy guideance

Corporate FAA Reporting Metrics

CSEC Cyber Threat Capabilities : SIGINT and ITS : an end-to-end approach

CSEC SIGINT Cyber Discovery : Summary of the current effort

Cyber Defence Operations Legal and Policy

Cyber Integration : The Art of the Possible

Cyber Threat Detection

Data stored in BLACK HOLE

Driver 1: Worldwide SIGINT/Defense Cryptologic Platform

An Easy Win: Using SIGINT to Learn about New Viruses

Email Address vs User Activity

Event {SIGINT}

Exceptionally Controlled Information (ECI) As Of 12 September 2003

FASCIA : Example of Current Volumes and Limits

Finding and Querying on Document Metadata

FISA Amendments Act of 2008 Section 702 Summary Document

FISA Recap

Free File Uploaders (FFU)

Full Log vs. HTTP

Guide to using Contexts in XKS Fingerprints

Hacktivism: Online Covert Action

How Do I Begin Analyzing a Target's Email Address?

How to configure category throttling in XKEYSCORE

HRA auditing

HTTP Activity in XKEYSCORE

HTTP Activity vs. User Activity

Intelligence Oversight (IO) Quarterly Report - First Calendar Year 2012 (1 January - 31 March 2012)

Intelligently filtering your data: Brazil and Mexico case studies

Interim Competency Test for Access to BR FISA Data

Introduction to BADDECISION

Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints

Introduction to WLAN / 802.11 Active CNE Operations

Introduction to XKS Appliaction IDs and Fingerprints

Iran - Current Topics, Interaction with GCHQ

JTRIG Tools and Techniques

Kapersky User-Agent Strings

LOVELY HORSE

Medical Pattern of Life : Targeting High Value Individual #1 (SIGINT Enabling HUMINT / Targeting)

Memorandum for the Attorney General : Proposed Amendment to Department of Defence Procedures to Permit the NSA to Conduct Analysis of Communications Metadata Associated with Persons in the United States

Memorandum of Understanding Between the National Security Agency and the Israeli SIGINT National Unit

Minimization Procedures Used by the National Security Agency in Connection With Acquisitions of Foreign Intelligence Information

Mobile Apps - Checkpoint meeting Archives

MTI Access Project - Weekly Status w/e 27 June 08

MTI Access Project - Weekly Status w/e 28 November 08

MTI Access Project - Weekly Status w/e 6 February 09

National Initiative Protection Program - Sentry Eagle

NSA Central Security Service: FOXACID SOP for Operational Management of FOXACID Infrastructure (Draft)

NSA Core Intelligence Oversight Training

NSA / CSS and JFCC-NW National Initiative Task - Security Framework

NSA/CSS and JFCC-NW National Initiative Task - Security Framework

NSA / CSS Mission: PROVIDE AND PROTECT VITAL INFORMATION FOR THE NATION

NSA: Expeditionary Access Operations: NSA’s Close Access Network Exploitation Program (“CNO Course – EAO”)

NSA: Expeditionary Access Operations: NSA’s Close Access Network Exploitation Program (“CNO Course – EAO”)

NSA Intelligence Relationship with Sweden

NSA Intelligence Relationship with Sweden

NSA Remote Operations Center: FOXACID Overall Briefing

Op MULLENIZE and beyond - Staining Machines

OSINT Fusion Project

Pacific SIGDEV Conference March 2011

Peeling Back the Layers of TOR with EGOTISTICAL GIRAFFE

Phone Number Extractor

Procedures Used by the National Security Agency for Targeting Non-United States Persons

PTC Glossary

QFDs and BLACHOLE Technology behind GCHQ/INOC

Recommended Requirements for Cryptanalysts at CCs at Texas, Georgia and Hawaii to Access NSA and FBI FISA Material

Reverse Engineering

Select Accomplishments: Production

SENTRY EAGLE : National Initiative - Security Framework

Sharing Computer Network Operations Cryptologic Information With Foreign Partners

SIGINT Development Forum (SDF) Minutes

SIGINT Mission Strategic Plan FY2008-2013

Special Source Operations: The Cryptologic Provider of Intelligence from Global High-Capacity Telecommunications Systems

SSO GHOSTMACHINE Analytics

Summary of DNR and DNI Co-Travel Analytics

SWEDUSA 2013 Strategic Planning Conference (SPC)

Tailored Access Operations

Target Detection Identifiers

Targeting Rationale (TAR)

Targets visiting specific websites

TECA Product Centre

Tony Fullman NSA Files

TOR Log

Tracking Targets on Online Social Networks

Types of IAT - Advanced Open Source Multi-Hop

United States SINGINT System January 2007 Strategic Mission List

The Unofficial XKEYSCORE User Guide

User-agents: Why and How and How to

Using XKS to find and search for logos embedded in documents

VOIP in XKEYSCORE

Web Forum Exploitation using XKEYSCORE

What is HACIENDA?

Wireless LAN / CNE Tool Training - Course Introduction

Writing XKS Fingerprints

XKEYSCORE

XKEYSCORE

XKEYSCORE Appids & Fingerprints

X-KEYSCORE as a SIGDEV tool

XKEYSCORE, Cipher Detection, and You!

XKEYSCORE Data Sources

XKEYSCORE for Counter-CNE