Tailored Access Operations : QUANTUMTHEORY
Microsoft Windows
This document is an internal NSA presentation that describes the functioning of QUANTUM. It also describes the operation of FOXACID in the QUANTUM tasking process, and how it infects machines with malicious programs.
National Security Agency - Tailored Access Operations
20131230-spiegel-tao_quantum_theory.pdf
Der Spiegel
Snowden
PDF
en
HASHb275f636e6d3ab010ef9be
FASHIONCLEFT Interface Control Document
Common System Architecture (CSA)
This document is a technical description of the FASHIONCLEFT computer network exploitation (CNE) collection protocol. It "enables raw data packets from the external internet to interface to the Common Data Receptor (CDR) of Data Network Technology's (DNT's) Common System Architecture (CSA)." The document includes "includes conceptual data flow diagrams and network diagrams to define the system [and] detailed data format examples, data field definitions, and a description of the protocol."
National Security Agency - Tailored Access Operations
20150117-spiegel-technical_description_of_the_fashioncleft_protocol_.pdf
Der Spiegel
Snowden
PDF
en
HASH7c2491510f2d134ae5ae
ROCKRIDGE
ROUGH DIAMOND
This document is an internal GCHQ presentation. It describes ROCKRIDGE, which is a GCHQ program that seeks to improve the agency's capabilities to ingest more data and provide more comprehensive analytics utilizing the BLACK HOLE content depository.
Government Communications Headquarters (GCHQ)
20150925-intercept-demystifying_nge_rock_ridge.pdf
The Intercept
Snowden
PDF
en
HASH0823c28ed3fbbd493b3317
Intelligently filtering your data: Brazil and Mexico case studies
Greece
This document contains two presentations and one article relating to the NSA's foreign surveillance programs. The first describes case studies of operations against the staff of Enrique Pena Nieto, formerly a leading Mexican Presidential candidate, and Dilma Rousseff, Brazillian President. These slides contain visualizations of the target networks created by the NSA. The second presentation describes some of the geopolitical trends seen likely to impact the NSA's operations in the future. The article describes the International Security Issues (ISI) division, a financial surveillance operation that is responsible for 13 nations deemed significant because of their importance to the US economy.
National Security Agency
20130903-globo-satc.pdf
O Globo Fantastico
Snowden
PDF
en
HASH30125212bbf5673c3e3758
SWEDUSA 2013 Final Agenda
NSA - National Security Agency, Special Source Operations (SSO)
This document is the final agenda of the SWEDUSA Strategic Planning Conference, hosted on 24 - 26th April 2013. Attending this meeting was Ingvar Akesson, Director General of Sweden's FRA (National Defence Radio Establishment / Forsvarets Radioanstalt) and other high ranking Swedish intelligence officers. The agenda covers all aspects of the intelligence relationship between the USA and Sweden, including access to the XKEYSCORE data analysis tool, and cooperation between the FRA and the NSA's TAO (Tailored Access Operations) division.
National Security Agency
20131211-svt-final_agenda_sweden_usa.pdf
SVT
Snowden
PDF
en
HASH78169c2e34d4ec83b7f9ea
NSA Intelligence Relationship with Sweden
NSA - Threat Operations Center (NTOC)
This document is a NSA memo describing the nature and extent between the NSA and Sweden's National Defence Radio Establishment (FRA).
National Security Agency
20131211-svt-nsa_internal_pm_on_fra.pdf
SVT
Snowden
PDF
en
HASHfaf0ac412eb406cbf7c91c
Metadata Policy Conference
DNH
This document contains a rough draft of a conference summary outlining the definitions of collection content under the authority of the Executive Order 12333 and FISA. The draft document refers to the difficulty to differentiate between comminications data and content, and thus provide oversight and proper minimization of US identifiers. The author of the document is not clear.
United States Intelligence Community
20140825-Intercept-Metadata-Policy-Conference.pdf
The Intercept
Snowden
PDF
en
HASHead6a00f7f47f03dd7aa0f
SYNAPSE
Google+
This document is a slide from an NSA presentation illustrating one of the ways in which the agency uses e-mail and telephony metadata to analyze the relationship networks of foreign intelligence targets. Connections between people are illustrated using visualization software. If this graphic were using real data, the "agent" field would be the actual name of the foreign person (or organization) under investigation.
National Security Agency
20130928-nyt-syanpse.pdf
The New York Times
Snowden
PDF
en
HASHc438fa01c0a34383595dd5
DIR Opening Remarks Guidance for DP1
DDIS - Danish Defence Intelligence Service
This document contains notes for the opening remarks offered by former NSA Director, Keith Alexander at the 2013 DENUSA conference in Copenhagen, Denmark.
National Security Agency
20140618-dagbladet-keith_alexander_talking_points.pdf
Dagbladet
Snowden
PDF
en
HASH2d16ed22275116b235b3a8
Trying to Find Potential Matches for a Garbled or Misspelled Name? Get Help from NYMROD
FASTSCOPE
This document is an internal NSA memo. It describes the operation of NYMROD, an automatic name recognition tool.
National Security Agency - Center for Content Extraction
20140618-der_spiegel-explanation_of_nymrod_a_system_for_searching_for_people_and_places_in_databases_and_documents.pdf
Der Spiegel
Snowden
PDF
en
HASHd777bc4557b70ed0f259c5