Browse Items (626 total)

20150701-intercept-un_secretary_general_xks.pdf
This document is an extract from an internal NSA presentation. It outlines how NSA analysts used the data analysis tool XKEYSCORE to gain access to the talking points of the U.N. Secretary General prior to their meeting with President Barack Obama.

20150701-intercept-intro_to_connect_sensitive_scanning_with_xks_fingerprints.pdf
This document is an internal NSA presentation. It introduces users of the XKEYSCORE data analysis system to Context Sensitive Scanning. This feature of XKEYSCORE allows analysts to surgically target traggic, by only applying keywords in the context…

20150811-intercept-sigint-philosopher-lessons-for-civil-servants.pdf
This article, from the internal NSA newsletter, SIDtoday, is one in a series written about ethics for NSA analysts. The author, likens intelligence analysis to the American Civil War, encouraging fellow analysts to trust the chain of command when…

20141010-intercept-exceptionally_controlled_information_listing.pdf
This document is a NSA list of programs that have a security classification of ECI (Exceptionally Controlled Information). It provides an abstract for each program, as well as identifying potentially overlapping programs.

20140630-WaPo-list_of_governments_and_organizations_authorized_for_surveillance.pdf
This document is a briefing prepared by the Attorney General of the United States. It identifies foreign governments, foreign factions, entities controlled by foreign governments, foreign-based policial organizations. These entities are potentially…

This document is a slide from a NSA presentation describing the NSA's collection activities worldwide. Specifically, it illustrates that the NSA used a technique called "Computer Network Exploitation" (CNE) to install malware onto over 50,000 devices…

20131119-odni-united_states_signals_intelligence_directive_18_appendix_j.pdf
This document is an appendix to United States Signals Intelligence Directive 18. It prescribes policies and procedures, and assigns responsibilities to ensure that the NSA's signals intelligence activities are aligned with the U.S. Constitution's 4th…

20150518_intercept_2007-07-18-sidtoday-sigint-obtains-deta-r.pdf
This document is a newsletter article from the NSA internal publication SIDtoday. It relays an update from the Global Jihad Support Network Branch on the recent interception of a message from Usama bin Laden to Abu-Ayyub al-Misri which, according to…

20150925-intercept-next_generation_events_redacted.pdf
This document is an internal GCHQ presentation. It describes the Next Generation Events plan. This plan involves a series of different programs and projects all aimed at scaling the agency's capabilities of dealing with SIGINT events. Among others,…

This document is an affidavit by the former director of the National Security Agency, General Keith B. Alexander created in adherence to subsection 702(g)(2)(C) of the Foreign Intelligence Surveillance Act. It describes the procedures enabling the…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2