Snowden archive
- Type:
- Other > Other
- Files:
- 665
- Size:
- 1.84 GiB (1975078848 Bytes)
- Tag(s):
- snowden
- Uploaded:
- 2019-05-01 00:42:38 GMT
- By:
- Anonymous
- Seeders:
- 3
- Leechers:
- 1
- Comments
- 0
- Info Hash: 174187E47484B3A46D34ACCEC66245F504932081
(Problems with magnets links are fixed by upgrading your torrent client!)
Snowden archive 1,83 GB
20140513-greenwald-noplacetohidedocuments.pdf | 86.95 MiB |
no-place-to-hide.pdf | 86.95 MiB |
NSA-Boundless_Informant_Powerpoint_Slides.pdf | 72.09 MiB |
nsa-boundless-informant-slides.pdf | 72.08 MiB |
media-35540.pdf | 44.17 MiB |
media-35685.pdf | 40.27 MiB |
media-35674.pdf | 36.53 MiB |
media-35671.pdf | 30.24 MiB |
20140723-Intercept-March-2013-Watchlisting-Guidance.pdf | 29.39 MiB |
psychology-a-new-kind-of-sigdev.pdf | 27.85 MiB |
20140218-intercept-gchq_sigdev_.pdf | 27.83 MiB |
the-art-of-deception-training-for-a-new.pdf | 27.76 MiB |
media-35689.pdf | 27.61 MiB |
media-35677.pdf | 27.61 MiB |
20130731-guard-xkeyscore_training_slides.pdf | 27.26 MiB |
2013-watchlist-guidance.pdf | 26.49 MiB |
media-35670.pdf | 26.27 MiB |
CLEANEDPRTT-1.pdf | 24.7 MiB |
media-35515.pdf | 24.3 MiB |
20141204-intercept-auroragold_working_group.pdf | 22.6 MiB |
i-hunt-sys-admins.pdf | 21.81 MiB |
media-35529.pdf | 20.99 MiB |
doc-6-cyber-threat-capabilities.pdf | 19.82 MiB |
media-35686.pdf | 18.77 MiB |
NSA-IG_Report.pdf | 18.77 MiB |
media-35675.pdf | 18.74 MiB |
20140127-nbc-squeaky_dolphin.pdf | 17.36 MiB |
20131119-odni-nsa_cryptological_school_course_slides_on_legal_compliance_and_minimization_procedures.pdf | 17.02 MiB |
media-35657.pdf | 16.9 MiB |
media-35521.pdf | 15.91 MiB |
CLEANED032.-Basket_2_-_NSA_training.log.pdf | 15.75 MiB |
20131119-odni-nsa_core_intelligence_oversight_training.pdf | 15.62 MiB |
media-35539.pdf | 15.45 MiB |
blackhat-Alexander-keynote.pdf | 15.36 MiB |
rcs-9-technician-final.pdf | 13.42 MiB |
media-35526.pdf | 12.28 MiB |
NSA-XKeyscore_Powerpoint.pdf | 12.23 MiB |
NSA-XKeyscore-Powerpoint.pdf | 12.23 MiB |
media-35658.pdf | 12.19 MiB |
media-35688.pdf | 11.49 MiB |
rcs-9-sysadmin-final.pdf | 11.45 MiB |
media-35511.pdf | 9.92 MiB |
nsa-bullrun-2-16-guardian-13-0905.pdf | 9.64 MiB |
20150117-spiegel-overview_on_the_nsa_use_of_bots_and_the_defiantwarrior_program.pdf | 9.43 MiB |
20131119-odni-united_states_signals_intelligence_directive_18_jan_25_2011.pdf | 9.34 MiB |
media-35683.pdf | 8.9 MiB |
media-35665.pdf | 8.68 MiB |
rcs-9-analyst-final.pdf | 8.22 MiB |
nsa-stellar-wind.pdf | 7.99 MiB |
media-35527.pdf | 7.86 MiB |
20131119-odni-nsa_metadata_collection_training_slides_.pdf | 7.46 MiB |
20130627-guard-nsa_oig_2009_report.pdf | 7.34 MiB |
20131119-odni-ag_guidelines_for_domestic_fbi_operations.pdf | 7.34 MiB |
media-35678.pdf | 7.11 MiB |
20150117-spiegel-nsa_training_course_material_on_computer_network_operations.pdf | 6.95 MiB |
20131230-appelbaum-nsa_ant_catalog.pdf | 6.87 MiB |
20131230-appelbaum-nsa_ant_catalo.pdf | 6.87 MiB |
media-35535.pdf | 6.85 MiB |
media-35676.pdf | 6.65 MiB |
media-35667.pdf | 6.63 MiB |
CLEANEDFinal-USSID_SP0018.pdf | 6.6 MiB |
media-35673.pdf | 6.59 MiB |
20141228-spiegel-explanation_on_the_spin9_program_on_end-to-end_attacks_on_vpn.pdf | 6.52 MiB |
20140430-intercept-ghostmachine.pdf | 6.43 MiB |
media-35684.pdf | 6.22 MiB |
nsa-boundlessinformant-no-33m.pdf | 5.96 MiB |
20141228-spiegel-intro_to_the_vpn_exploitation_process_mentioning_the_protocols_attacked_-_pptp_ipsec_ssl_ssh.pdf | 5.89 MiB |
media-35516.pdf | 5.85 MiB |
20140914-spiegel-treasure_map_presentation.pdf | 5.73 MiB |
20131122-dagbladet-boundless_informant.pdf | 5.71 MiB |
Section-215_-_Primary_Order.pdf | 5.61 MiB |
Section-215---Primary-Order.pdf | 5.61 MiB |
nsa-quantum-tasking.pdf | 5.46 MiB |
nsa-sigint-enabling-guardian-13-0905.pdf | 5.42 MiB |
media-35672.pdf | 5.11 MiB |
media-35551.pdf | 5.06 MiB |
phonesnsa.pdf | 4.62 MiB |
media-35550.pdf | 4.49 MiB |
20140914-spiegel-satellite_teleport_knowledge.pdf | 4.38 MiB |
20131119-odni-united_states_signals_intelligence_directive_18_appendix_j.pdf | 4.34 MiB |
media-35520.pdf | 4.34 MiB |
media-35510.pdf | 4.33 MiB |
2011-OIG_Report_on_Bulk_Collection.pdf | 4.3 MiB |
20140224-intercept-training_for_covert_online_operations.pdf | 4.28 MiB |
rcs-9-admin-final.pdf | 4.27 MiB |
eyes_wide_open_v1.pdf | 4.19 MiB |
media-35533.pdf | 4.11 MiB |
20150117-spiegel-nsa_program_tutelage_to_instrumentalize_third_party_attack_tools.pdf | 4.11 MiB |
nsa-cryptanalysis-2-12-guardian-13-0905.pdf | 4 MiB |
nsa-tor-stinks.pdf | 3.99 MiB |
20140825-The-Intercept-Sharing-Communications-Metadata-Across-the-USIC-ICREACH.pdf | 3.92 MiB |
media-35543.pdf | 3.89 MiB |
20150117-speigel-csec_document_on_the_handling_of_existing_trojans_when_trojanizing_computers.pdf | 3.87 MiB |
media-35538.pdf | 3.84 MiB |
2009-OIG_Report_on_Bulk_Collection.pdf | 3.75 MiB |
20150128-cbc-cse_presentation_on_the_levitation_project.pdf | 3.73 MiB |
20150128-intercept-cse_presentation_on_the_levitation_project.pdf | 3.73 MiB |
20140303-epic-doj_report_on_pen_register_fisa_orders.pdf | 3.7 MiB |
20141214-intercept-gchq_automated_noc_detection.pdf | 3.69 MiB |
20141228-speigel-analytics_on_security_of_tor_hidden_services_0.pdf | 3.65 MiB |
20150117-spiegel-nsa_fourth_party_access_-_i_drink_your_milkshake_.pdf | 3.6 MiB |
CLEANEDPRTT-2.pdf | 3.56 MiB |
20131230-spiegel-tao_quantum_tasking.pdf | 3.51 MiB |
20140905-intercept-quadrennial_intelligence_community_review_final_report.pdf | 3.49 MiB |
nsa-xkeyscore.pdf | 3.48 MiB |
media-35661.pdf | 3.48 MiB |
nsa-sigint-successes.pdf | 3.47 MiB |
media-35542.pdf | 3.47 MiB |
nsa-israel-spy.pdf | 3.46 MiB |
pcs-harvesting-at-scale.pdf | 3.4 MiB |
media-35513.pdf | 3.39 MiB |
20150117-speigel-csec_document_about_the_recognition_of_trojans_and_other_network_based_anomaly_.pdf | 3.37 MiB |
20150117-spiegel-nsa_example_snowglobe_in_which_a_suspected_french_government_trojan_is_analyzed_to_find_out_if_it_can_be_helpful_for_own_interests_0.pdf | 3.3 MiB |
media-35682.pdf | 3.26 MiB |
gchq-g20-spy.pdf | 3.23 MiB |
nsa-tao-intro.pdf | 3.08 MiB |
nsa-egotisticalgiraffe.pdf | 3.06 MiB |
nsa-overcollection.pdf | 3.03 MiB |
nsa-scissors-2.pdf | 3.02 MiB |
nsa-yahoo-google-exploit.pdf | 2.99 MiB |
media-35662.pdf | 2.89 MiB |
20150117-spiegel-technical_description_of_the_fashioncleft_protocol_.pdf | 2.86 MiB |
media-35518.pdf | 2.8 MiB |
samsung_reply.pdf | 2.77 MiB |
20150219-Intercept-PCS-Harvesting-At-Scale.pdf | 2.75 MiB |
20131014-wapo-content_acquisition_optimization1.pdf | 2.7 MiB |
media-35666.pdf | 2.7 MiB |
20131119-odni-nsa_course_materials_module_4_v.28.pdf | 2.67 MiB |
_20131119-odni-nsa_course_materials_module_4_v.28.pdf | 2.67 MiB |
nsa-ghost-machine.pdf | 2.66 MiB |
samsung_reply_2.pdf | 2.64 MiB |
nsa-iat-tor.pdf | 2.61 MiB |
nsa-bullrun-brief-propublica-13-0905.pdf | 2.6 MiB |
nsabullrun.pdf | 2.6 MiB |
bullrun-briefing-sheet-from-gchq.pdf | 2.6 MiB |
20150117-spiegel-the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa_0.pdf | 2.6 MiB |
20140618-der_spiegel-guidelines_for_the_classification_of_nsa_sigint_details_1945-1967.pdf | 2.59 MiB |
nsa-sigint-strategic-mission-2013.pdf | 2.58 MiB |
20150117-spiegel-overview_of_methods_for_nsa_integrated_cyber_operations_0.pdf | 2.55 MiB |
media-35687.pdf | 2.5 MiB |
20131014-wapo-content_acquisition_optimization2.pdf | 2.5 MiB |
20141228-spiegel-explanation_of_a_potential_technique_to_deanonymise_users_of_the_tor_network.pdf | 2.41 MiB |
20131119-odni-nsa_course_materials_module_6_tech_personnel_v.25.pdf | 2.4 MiB |
20131104-nyt-sigint_strategic_plan.pdf | 2.38 MiB |
media-35656.pdf | 2.38 MiB |
20131126-wapo-microsoft_cloud_exploitation.pdf | 2.37 MiB |
nsa-quantumtheory.pdf | 2.36 MiB |
media-35530.pdf | 2.33 MiB |
20141214-intercept-gchq_making_network_sense_of_the_encryption.pdf | 2.33 MiB |
media-35528.pdf | 2.27 MiB |
20130830_cryptome_congressional_budget_2013.pdf | 2.26 MiB |
spy-budget-fy13.pdf | 2.26 MiB |
2013-08-30_cryptome_congressional_budget_2013.pdf | 2.26 MiB |
nsa-gchq-spy-games.pdf | 2.24 MiB |
20131230-spiegel-tao_intro.pdf | 2.23 MiB |
20140311-nyt-classification_guide_for_stellarwind_program_0.pdf | 2.17 MiB |
CLEANED007.-CongNotificationInfoMemoSSCI_10_Apr_09-Sealedpdf.pdf | 2.15 MiB |
identity-intelligence.pdf | 2.14 MiB |
20131230-spiegel-qfire.pdf | 2.14 MiB |
20131119-odni-office_of_general_council_business_record_analyst_training_slides.pdf | 2.13 MiB |
media-35534.pdf | 2.13 MiB |
20131104-wapo-optimization_google.pdf | 2.12 MiB |
01312014-cbc-csec_airport_wifi_tracking.pdf | 2.11 MiB |
20140131-cbc-csec_airport_wifi_tracking.pdf | 2.11 MiB |
nsa-prism-13-1021.pdf | 2.06 MiB |
sigint-enabling-project.pdf | 2.06 MiB |
20150117-spiegel-overview_of_the_transgression_program_to_analyze_and_exploit_foreign_cna-cne_exploits.pdf | 2.06 MiB |
nsa-prism-guardian-13-1101.pdf | 2.06 MiB |
20141228-speigel-a_potential_technique_to_deanonymise_users_of_the_tor_network_0.pdf | 2.05 MiB |
nsa-sigint-enabling-propublica-13-0905.pdf | 2.02 MiB |
sigint-enabling-project2.pdf | 2.02 MiB |
20141228-speigel-decryption_of_vpn_connections_within_the_valiantsurf_program_0.pdf | 2.01 MiB |
20140803-Intercept-Israel-US-1999-Agreement.pdf | 2.01 MiB |
20131004-guard-tor_stinks.pdf | 2 MiB |
nsa-se-fra-spying-agenda.pdf | 1.99 MiB |
20141228-spiegel-_national_information_assurance_research_laboratory_niarl_tundra.pdf | 1.97 MiB |
20141228-speigel-analytic_challenges_from_active-passive_integration_when_nsa_attacks_ipsec_vpns_0.pdf | 1.96 MiB |
20131004-guard-egotistical_giraffe.pdf | 1.96 MiB |
20141228-speigel-canadian_document_from_ces_on_tls_trends_0.pdf | 1.91 MiB |
nsa-sigint-strategic-mission-2007.pdf | 1.89 MiB |
20141214-Intercept-gchq-mobile-networks-in-my-noc-world.pdf | 1.86 MiB |
phonesgchq.pdf | 1.84 MiB |
20140618-DerSpiegel-presentation_on_the_nsacia_unit_special_collection_service.pdf | 1.83 MiB |
20140815-Heise-HACIENDA-Program.pdf | 1.83 MiB |
20131119-odni-nsa_guidance_memo_on_legal_standards_for_searching_bulk_metadata.pdf | 1.79 MiB |
NSA-Section_702_and_Section_215_Factsheets.pdf | 1.76 MiB |
NSA-Section-702-and-Section-215-Factsheets.pdf | 1.76 MiB |
nsa-boundless-informant-faq.pdf | 1.75 MiB |
20141204-intercept-ir21_a_technology_warning_mechanism_0.pdf | 1.75 MiB |
20140404-intercept-gchq_full_spectrum_cyber_effects.pdf | 1.74 MiB |
20140805-Intercept-Directorate-of-Terrorist-Identities-Strategic-Accomplishments-2013.pdf | 1.72 MiB |
20131104-nyt-sigint_goals.pdf | 1.68 MiB |
nsa-sms-exploit.pdf | 1.66 MiB |
20141204-intercept-auroragold_target_technology_trends_center_support_to_wpmo_0.pdf | 1.6 MiB |
20141228-spiegel-description_on_the_processing_of_vpn_data_packets_within_the_turmoil_program.pdf | 1.58 MiB |
20150117-spiegel-process_analysts_choose_their_data_requirement_and_then_get_to_know_the_tools_that_can_do_the_job_0.pdf | 1.57 MiB |
20130903-globo-satc.pdf | 1.56 MiB |
Judge-Walton_Answers_to_Questions_re_FISC.pdf | 1.56 MiB |
20150117-spiegel-quantumtheory_is_a_set_of_technologies_allowing_man-on-the-side_interference_attacks_on_tcp-ip_connections_includes_straightbizarre_and_daredev.pdf | 1.55 MiB |
20140618-der_spiegel-nsacss_presentation_on_technical_surveillance_in_europe_and_africa.pdf | 1.54 MiB |
media-35509.pdf | 1.51 MiB |
media-35664.pdf | 1.51 MiB |
20141228-speigel-analysis_from_ssl-tls_connections_through_gchq_in_the_flying_pig_database_0.pdf | 1.46 MiB |
media-35532.pdf | 1.43 MiB |
NSA-Boundless-Informant-Frequently-Asked-Questions.pdf | 1.4 MiB |
NSA-Boundless_Informant_Frequently_Asked_Questions.pdf | 1.4 MiB |
20150117-spiegel-projects_of_the_tao-ato_department_such_as_the_remote_destruction_of_network_cards.pdf | 1.38 MiB |
doj-nsa-memo.pdf | 1.36 MiB |
20131210-wapo-cotraveler_overview.pdf | 1.35 MiB |
20131119-odni-nsa_course_materials_module_3_v.22.pdf | 1.35 MiB |
20150117-speigel-analysis_of_chinese_methods_and_performed_actions_in_the_context_of_computer_network_exploitation.pdf | 1.34 MiB |
media-35512.pdf | 1.34 MiB |
nsa-muslim-porn.pdf | 1.32 MiB |
doody.pdf | 1.31 MiB |
20141228-speigel-bluesnort_program_on_net_defense_from_encrypted_communications_0.pdf | 1.31 MiB |
jtrigall.pdf | 1.3 MiB |
nsa-ppd-20.pdf | 1.28 MiB |
20131004-wapo-gchq_mullenize.pdf | 1.26 MiB |
20131022-monde-prism_april_2013.pdf | 1.26 MiB |
NSA-Memo-to-DOD---Proposed-Amendment-to-Conduct-Analysis-of-Metadata.pdf | 1.23 MiB |
NSA-Memo_to_DOD_-_Proposed_Amendment_to_Conduct_Analysis_of_Metadata.pdf | 1.23 MiB |
20141010-intercept-sentry_eagle_brief_sheet.pdf | 1.22 MiB |
20130816-wapo-sid_oversight.pdf | 1.2 MiB |
20140531-nyt-identity-intelligence.pdf | 1.19 MiB |
nsa-se-fra-xkeyscore.pdf | 1.16 MiB |
media-34093.pdf | 1.15 MiB |
20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf | 1.15 MiB |
20140204-nbc-british_spies_attacked_hactivist_anonymous.pdf | 1.13 MiB |
media-35669.pdf | 1.13 MiB |
20140207-nbc-gchq_honey_trap_cyber_attack_background_on_jtrig.pdf | 1.12 MiB |
media-35522.pdf | 1.11 MiB |
SID-Oversight-and-Compliance.pdf | 1.11 MiB |
SID-Oversight_and_Compliance.pdf | 1.11 MiB |
20141010-intercept-cno_core_secrets_slide_slices.pdf | 1.1 MiB |
20140618-der_spiegel-internal_nsa_presentation_on_the_bnds_organization_0.pdf | 1.08 MiB |
20140207-nrc-boundless_nederland.pdf | 1.07 MiB |
20140321-le_monde-french_intelligence_e-mail_spying_operation.pdf | 1.07 MiB |
Section-215---Secondary-Order---Verizon.pdf | 1.06 MiB |
Section-215_-_Secondary_Order_-_Verizon.pdf | 1.06 MiB |
20140714-Intercept-jtrigall.pdf | 1.06 MiB |
CLEANED004.-Cover_Memo-Sealed.pdf | 1.05 MiB |
media-35663.pdf | 1.02 MiB |
nsa-windstop-muscular-incenser.pdf | 1.01 MiB |
20131119-odni-nsa_course_materials_module_1_v.17.pdf | 1.01 MiB |
nsa-cable-spy-types.pdf | 1.01 MiB |
20150117-speigel-classification_guide_for_computer_network_exploitation_cne.pdf | 1 MiB |
20131119-odni-nsa_course_materials_module_6_analytic_personal_v.18.pdf | 1019.92 KiB |
20131211-svt-final_agenda_sweden_usa.pdf | 1015.03 KiB |
media-35549.pdf | 1012.75 KiB |
20131004-guard-iat_tor.pdf | 1000.26 KiB |
nsa-sso-slides.pdf | 986.06 KiB |
media-35659.pdf | 980.05 KiB |
20130627-guard-2007_memo_on_us_person_metadata.pdf | 974.1 KiB |
20141010-intercept-computer_network_exploitation_classification_guide.pdf | 965.8 KiB |
nsa-tao-ant-pdf.pdf | 962.52 KiB |
nsa-catalog-appelbaum.pdf | 950.64 KiB |
20141010-intercept-exceptionally_controlled_information_listing.pdf | 934.86 KiB |
nsa-hosts-fr-spies.pdf | 921.6 KiB |
nsa-prism-dk.pdf | 918.28 KiB |
20131119-odni-nsa_course_materials_module_5_v.24.pdf | 906.48 KiB |
20131211-svt-xkeyscore_sweden_meeting.pdf | 905.2 KiB |
20141228-spiegel-guide_for_analysts_on_how_to_use_the_prism_skype_collection.pdf | 896.28 KiB |
media-35519.pdf | 892.1 KiB |
dsd-3g.pdf | 886.34 KiB |
20140311-nyt-classification_guide_for_fisa_the_protect_america_act_and_the_fisa_amendments_act.pdf | 876.96 KiB |
20140116-guard-dishfire_presentation.pdf | 861.66 KiB |
20131210-wapo-ghost_machine.pdf | 859.54 KiB |
nsa-fisa-targeting.pdf | 859.04 KiB |
nsa-smartphones-analysis.pdf | 848.49 KiB |
20140127-nyt-converged_analysis_on_smartphone_devices.pdf | 848.49 KiB |
20141228-spiegel-gchq_presentation_on_the_bullrun_programs_decryption_capabilities.pdf | 844.2 KiB |
media-35514.pdf | 835.07 KiB |
20131119-odni-nsa_course_materials_module_2_v.16.pdf | 811.74 KiB |
20130911-guard-israel_sharing_0.pdf | 808.09 KiB |
media-35655.pdf | 807.87 KiB |
nsa-fisa-minimization.pdf | 799.14 KiB |
europebriefingnote_en.pdf | 797.51 KiB |
20131126-huffpo-radicalizers_pornography.pdf | 795.25 KiB |
20140831-spiegel-nsa_intelligence_relationship_with_turkey.pdf | 782.88 KiB |
20140618-der_spiegel-guidelines_for_the_classification_of_suslag_details_and_the_nsa-bnd_cooperation.pdf | 777.93 KiB |
media-35548.pdf | 766.9 KiB |
20141010-intercept-tarex_classification_guide.pdf | 757.56 KiB |
nsa-smartphones.pdf | 741.38 KiB |
20131230-spiegel-tao_quantum_theory.pdf | 727.72 KiB |
nsa-finance-spy-de.pdf | 726.98 KiB |
discovery-sigint-targeting-scenarios-and.pdf | 726.84 KiB |
20130608-guard-boundless_informant_capabilities.pdf | 719.29 KiB |
20130905-guard-bullrun.pdf | 686.8 KiB |
20141010-intercept-eci_whipgenie_classification_guide.pdf | 684.37 KiB |
20140831-spiegel-turkey_and_the_pkk.pdf | 669.6 KiB |
nsa-dutch-sigint.pdf | 667.61 KiB |
20131025-monde-french_cyberattacks.pdf | 666.39 KiB |
media-35525.pdf | 665.46 KiB |
20130908-globo-tv.pdf | 649.75 KiB |
20131027-spiegel-embassy.pdf | 632.37 KiB |
20140218-intercept-discovery_sigint_targeting_scenarios_and_compliance.pdf | 631.45 KiB |
20140831-spiegel-kurdistan_regional_government.pdf | 623.14 KiB |
20131104-mundo-boundless_informant.pdf | 621.45 KiB |
20141228-spiegel-malibu_architecture_overview_to_exploit_vpn_communication.pdf | 620.61 KiB |
media-35653.pdf | 620.45 KiB |
csec-br-spy.pdf | 616.64 KiB |
20131130-GlobeandMail-csec-br-spy.pdf | 616.64 KiB |
FAA-Targeting_Procedures.pdf | 615.65 KiB |
20140831-spiegel-jordan_belgium.pdf | 608.65 KiB |
nsa-cotraveler.pdf | 602.83 KiB |
media-35680.pdf | 602.64 KiB |
20130629-wapo-prism.pdf | 602.62 KiB |
media-35546.pdf | 599.27 KiB |
nsa-windstop.pdf | 596.92 KiB |
20140207-nbc-gchq_honey_trap_cyber_attack_leveraging_foreign_journalists_via_jtrig.pdf | 590.87 KiB |
20140430-intercept-prism_olympics.pdf | 581.23 KiB |
media-35517.pdf | 575.91 KiB |
FAA-Minimization-Procedures.pdf | 574.83 KiB |
media-35537.pdf | 574.47 KiB |
media-35536.pdf | 571.16 KiB |
20141228-spiegel-explanation_of_the_gallantwave_that_decrypts_vpn_traffic_within_longhaul.pdf | 570.28 KiB |
nsa-se-fra-xkeyscore-slide.pdf | 570.25 KiB |
nsa-microsoft-cloud-exploit.pdf | 567.25 KiB |
20140519-intercept-sso_mystic_charts.pdf | 563.22 KiB |
20131211-svt-nsa_slides_xkeyscore.pdf | 562.66 KiB |
20130606-wapo-prism.pdf | 562.03 KiB |
20140914-spiegel-treasure_map_announces_a_new_release.pdf | 551.96 KiB |
nsa-se-fra-relationship.pdf | 551.45 KiB |
nsa-sso-content.pdf | 551.25 KiB |
vpn-and-voip-exploitation-with-hammerchant.pdf | 551.01 KiB |
nsa-sigint-cryptologic-platform.pdf | 544.77 KiB |
20130620-guard-702_targeting_procedures.pdf | 539.17 KiB |
20140305-nrc-dutch_shares_collected_anti-piracy_information_with_nsa.pdf | 535.99 KiB |
media-35544.pdf | 535.29 KiB |
20141010-intercept-eci_compartments.pdf | 534.56 KiB |
CLEANEDFinal-USSID_SP0018_Annex_J.pdf | 532.64 KiB |
20130608-guard-boundless_informant_faq.pdf | 532.16 KiB |
20140618-der_spiegel-final_agenda_of_a_meeting_between_high-ranking_nsa_and_bnd_officials.pdf | 525.17 KiB |
media-35681.pdf | 523.64 KiB |
20130909-spiegel-smartphones.pdf | 519.64 KiB |
Targeting-Rationale_-_TAR.pdf | 516.77 KiB |
Targeting-Rationale---TAR.pdf | 516.77 KiB |
nsa-quantum-computer.pdf | 515.03 KiB |
20140312-intercept-quantum_insert_diagrams.pdf | 514.41 KiB |
20130620-guard-702_minimization_procedures.pdf | 509.84 KiB |
media-35524.pdf | 508.05 KiB |
media-35531.pdf | 494.42 KiB |
20140618-der_spiegel-briefing_on_the_visit_to_the_nsa_of_a_high-ranking_bnd_official.pdf | 491.7 KiB |
20140320-intercept-targeting_system_administrator_accounts.pdf | 490.67 KiB |
20141228-speigel-description_of_existing_projects_on_vpn_decryption_0.pdf | 487.65 KiB |
cne-access-to-core-mobile-networks.pdf | 465.85 KiB |
20131104-wapo-sso_overview.pdf | 465.47 KiB |
20140312-intercept-vpn_and_voip_exploitation_with_hammerchant_and_hammerstein.pdf | 459.06 KiB |
20130816-wapo-targeting_rationale.pdf | 457.02 KiB |
nsa-se-spies.pdf | 455.42 KiB |
the-nsa-and-gchqs-quantumtheory-hacking-tactics.pdf | 451.06 KiB |
turbine-and-turmoil.pdf | 441.18 KiB |
20140311-nyt-nsa_memo_expands_access_to_fisa_information.pdf | 44 KiB |
20141010-intercept-eci_pawleys_classification_guide.pdf | 434.74 KiB |
20141228-spiegel-gchq_briefing_on_the_bullrun_program.pdf | 429.34 KiB |
20141204-intercept-auroragold_working_aid.pdf | 427.75 KiB |
media-35541.pdf | 426.04 KiB |
20130916-spiegel-credit_card_transactions.pdf | 422.18 KiB |
20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod.pdf | 418.41 KiB |
20141204-intercept-auroragold_project_overview.pdf | 418.03 KiB |
20140618-der_spiegel-details_on_xkeyscore_from_an_internal_gchq_website.pdf | 413.65 KiB |
media-35552.pdf | 404.7 KiB |
20150117-spiegel-report_of_an_nsa_employee_about_a_backdoor_in_the_openssh_daemon.pdf | 402.93 KiB |
20140618-der_spiegel-report_on_an_xkeyscore_training_session_at_the_ecc_dagger_complex.pdf | 402.49 KiB |
20140831-spiegel-nsas_oldest_third_party_partnership.pdf | 397.78 KiB |
nsa-gchq-se-fra-comint.pdf | 397.64 KiB |
media-35654.pdf | 394.03 KiB |
20140825-Intercept-Metadata-Sharing-Memorandum.pdf | 392.62 KiB |
20140322-nyt-operation_shotgiant_objectives.pdf | 384.5 KiB |
media-35547.pdf | 383.11 KiB |
20130905-guard-sigint_enabling.pdf | 382.13 KiB |
20150210-intercept-iran_current_topics_-_interactions_with_gchq.pdf | 381.91 KiB |
nsa-close-access-sigads.pdf | 378.97 KiB |
20131119-odni-nsa_course_materials_intro_v.13.pdf | 378.08 KiB |
20140831-spiegel-iraq_uk_load_sharing_carriers.pdf | 376.78 KiB |
20140831-spiegel-turkish_signal_intelligence_chief_agenda.pdf | 374.93 KiB |
20140831-Spiegel-NCRs-with-Foreign-Relations-Missions-Become-SUSLAs.pdf | 374.82 KiB |
20140102-wapo-quantum_computers_hard_targets.pdf | 374.72 KiB |
20131123-nyt-sigint_strategy_feb_2012.pdf | 372.73 KiB |
nsa-sigint-strategy-2012-2016.pdf | 372.29 KiB |
media-35523.pdf | 366.46 KiB |
20140211-intercept-drones_intercepting_communications.pdf | 365.83 KiB |
20140618-der_spiegel-nsacss_europe-_report_on_the_experiences_of_one_nsa_worker.pdf | 362.97 KiB |
20140610-cryptome-dea-nsa-sandkey.pdf | 361.37 KiB |
20140618-der_spiegel-boundless_informant_statistics_on_data_from_22foreign_partners22.pdf | 356.05 KiB |
20140312-intercept-nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf | 353.62 KiB |
20140618-der_spiegel-boundless_informant_statistics_for_so-called_third_parties.pdf | 353.5 KiB |
20150117-spiegel-nsa_project_description_to_recognize_and_process_data_that_comes_from_third_party_attacks_on_computers.pdf | 352.45 KiB |
20140618-der_spiegel-preliminary_agenda_of_a_meeting_between_nsa_and_bnd_officials.pdf | 349.48 KiB |
nsa-sigint-enabling-nyt-13-0905.pdf | 347.68 KiB |
20131117-guardian-dsd_3g.pdf | 340.47 KiB |
20140831-spiegel-collaboration_in_overdrive.pdf | 335.35 KiB |
saudi-arabia-information-paper.pdf | 335.03 KiB |
20140618-der_spiegel-report_on_the_one-year_anniversary_of_the_nsa_liaison_unit_suslag_in_bad_aibling.pdf | 334.72 KiB |
20141010-intercept-cno_core_secrets_security_structure.pdf | 329.13 KiB |
20140618-der_spiegel-cooperation_between_the_nsa_bnd_and_bfv.pdf | 327.92 KiB |
20140618-DerSpiegel-internal_nsa_discussion_guidelines_relating_to_cooperation_with_the_bnd_and_bfv.pdf | 326.75 KiB |
nsa-gsm-tracking.pdf | 326.47 KiB |
20140725-Intercept-Saudi-Arabia-Information-Paper.pdf | 325.13 KiB |
ambassadesFrance.pdf | 319.96 KiB |
20130920-spiegel-belgacom.pdf | 317.78 KiB |
20140618-der_spiegel-boundless_informant_overview_global.pdf | 316.56 KiB |
20140313-intercept-nsa_cooperative_third_party_relationships.pdf | 312.2 KiB |
20131004-wapo-tor.pdf | 310.58 KiB |
20140618-der_spiegel-report_on_an_nsa_visit_to_bnd_site_and_on_data_transfer_from_the_bnd_to_the_nsa.pdf | 305.8 KiB |
20140618-der_spiegel-world_map_from_the_boundless_informant_program.pdf | 302.62 KiB |
20140618-der_spiegel-report_on_the_work_of_nsacss_europe.pdf | 299.81 KiB |
nsa-scissors.pdf | 295.16 KiB |
PRISM-Powerpoint_Slides_re_Data_Acquisition.pdf | 294.85 KiB |
PRISM-Powerpoint-Slides-re-Data-Acquisition.pdf | 294.85 KiB |
nsa-gchq-fra-quantum.pdf | 294.63 KiB |
20140709-Intercept-spying_on_muslim-american_leaders.pdf | 294.37 KiB |
20131209-nyt-nsa_games.pdf | 293.91 KiB |
20131119-odni-nsa_summary_of_requirements_for_collection_of_bulk_metadata.pdf | 293.91 KiB |
20140618-der_spiegel-gchq_report_on_the_technical_abilities_of_tempora.pdf | 293.41 KiB |
FISC-Order,-BR-06-12.pdf | 292.11 KiB |
20140618-der_spiegel-boundless_informant_statistics_on_germany.pdf | 289.02 KiB |
20140825-Intercept-CRISSCROSSPROTON-Point-Paper.pdf | 288.89 KiB |
20140618-der_spiegel-report_on_the_beginnings_of_the_european_security_center_esc_in_the_dagger_complex.pdf | 287.03 KiB |
20141228-spiegel-description_of_voip_telephony_encryption_methods_and_other_ways_to_attack.pdf | 284.65 KiB |
20130928-nyt-contact_chaining.pdf | 280.44 KiB |
20140618-der_spiegel-report_on_the_nsas_access_to_tempora.pdf | 280.23 KiB |
20141228-speigel-classification_guide_for_cryptanalysis_0.pdf | 276.64 KiB |
nsa-wanadoo-alcatel.pdf | 274.59 KiB |
20131122-dagbladet-boundless_informant_faq.pdf | 274.13 KiB |
20140618-der_spiegel-report_on_the_changing_of_the_escs_name_to_european_security_operations_center_esoc.pdf | 273.93 KiB |
20140831-spiegel-sinio_seminar_turkish_elections.pdf | 272.57 KiB |
20140831-spiegel-sinio_seminar_turkey_and_the_kurds.pdf | 271.21 KiB |
20140618-der_spiegel-report_on_an_unexploded_ordnance_alarm_at_european_technical_centern.pdf | 269.94 KiB |
20141214-intercept-gchq_stargate_cne_requirements.pdf | 269.85 KiB |
20140630-WaPo-odni_certification_regarding_foreign_entities.pdf | 269.07 KiB |
PRISM-Overview_Powerpoint_Slides.pdf | 266.34 KiB |
PRISM-Overview-Powerpoint-Slides.pdf | 266.34 KiB |
nsa-tor.pdf | 265.66 KiB |
20140618-der_spiegel-nostalgic_recollections_from_nsa_workers_formerly_stationed_in_bad_aibling.pdf | 265.5 KiB |
20140618-der_spiegel-explanation_of_nymrod_a_system_for_searching_for_people_and_places_in_databases_and_documents.pdf | 263.31 KiB |
20140618-der_spiegel-report_on_a_wharpdrive_incident_in_an_sso_presentation.pdf | 261.12 KiB |
20141228-spiegel-explanation_of_the_turmoil_gallantwave_program_and_its_role_when_attacking_vpn_0.pdf | 257.89 KiB |
20140831-spiegel-sinio_seminar_tough_times_for_turkey.pdf | 255.96 KiB |
20131210-wapo-location_cookies.pdf | 255.29 KiB |
20140618-der_spiegel-report_on_the_surveillance_of_african_countries_by_jsa.pdf | 254.78 KiB |
20140825-Intercept-DNI-Decision-Memorandum-on-ICREACH.pdf | 254.53 KiB |
20141228-spiegel-explanation_of_the_poisennut_product_and_its_role_when_attacking_vpn.pdf | 250.23 KiB |
20140618-der_spiegel-report_on_an_nsa_sigdev_training_course_for_allied_countries_.pdf | 249.86 KiB |
20130905-guard-cryptanalysis_classification.pdf | 248.25 KiB |
20131120-guard-collection_processing_and_dissemination_of_allied_communications.pdf | 246.38 KiB |
20131030-wapo-muscular_smiley.pdf | 244.01 KiB |
20140227-guard-gchq_optic.pdf | 240.64 KiB |
20141204-intercept-nsa_gchq_csec_network_tradecraft_advancement.pdf | 239.41 KiB |
CLEANED096.-NSA_summary_of_BR_requirements_(maybe_Feb_2009)-.pdf | 236.94 KiB |
20150204-intercept-nato_civilian_intelligence_council_cyber_panel.pdf | 236.11 KiB |
20131204-wapo-fascia.pdf | 233.23 KiB |
20140618-der_spiegel-faqs_on_the_boundless_informant_program.pdf | 231.88 KiB |
20140914-intercept-ferguson_visit_precis.pdf | 231.71 KiB |
20141228-spiegel-general_description_how_nsa_handles_encrypted_traffic.pdf | 230.49 KiB |
20150117-speigel-document_about_the_expansion_of_the_remote_operations_center_roc_on_endpoint_operations.pdf | 228.14 KiB |
20140914-intercept-key_activities_in_progress.pdf | 228.1 KiB |
20150117-speigel-combination_of_offensive_and_defensive_missions_-_how_fourth-party_missions_are_being_performed.pdf | 226.21 KiB |
20140128-guard-leaky_phone_apps_0.pdf | 222.27 KiB |
nsa-sso-dk.pdf | 222.05 KiB |
20140618-der_spiegel-overview_of_the_use_of_boundless_informant_world_map.pdf | 219.75 KiB |
20140618-der_spiegel-report_on_the_technical_expansion_of_the_european_technical_center_in_wiesbaden.pdf | 218.91 KiB |
20140312-intercept-turbine_and_turmoil.pdf | 217.97 KiB |
20140618-der_spiegel-restrictions_on_the_technical_surveillance_performed_by_jsa.pdf | 214.19 KiB |
20150117-spiegel-supply-chain_interdiction_-_stealthy_techniques_can_crack_some_of_sigints_hardest_targets.pdf | 212.91 KiB |
20140803-Intercept-NSA-Intelligence-Relationship-With-Israel.pdf | 212.07 KiB |
20130710-wapo-upstream.pdf | 207.76 KiB |
20140831-spiegel-turkey_at_the_g20_pre-meeting.pdf | 206.81 KiB |
20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker.pdf | 204.84 KiB |
20131021-monde-close_access_sigads.pdf | 198.53 KiB |
nsa-g8-g20-spying-02.pdf | 196.25 KiB |
20131211-svt-xkeyscore_slide_with_swedish_example.pdf | 195.51 KiB |
20140311-nyt-nsa_timeline_of_surveillance_law_developments.pdf | 194.96 KiB |
20140825-Intercept-ICREACH-Sharing-SIGINT-Comms-Metadata-with-the-Intel-Community-Memo.pdf | 194.58 KiB |
nsa-g8-g20-spying.pdf | 191.56 KiB |
20131211-svt-accomplishments_from_nsa.pdf | 191.24 KiB |
20131211-svt-nsa_internal_pm_on_fra.pdf | 189.71 KiB |
nsa-boundless-informant.pdf | 189.4 KiB |
nsa-5-eyes-spy-g20-dk.pdf | 188.35 KiB |
20141228-spiegel-explanation_of_the_transform_engine_emulator_when_attacking_vpn.pdf | 186.96 KiB |
20130928-nyt-syanpse.pdf | 186.37 KiB |
20150117-spiegel-sample_code_of_a_malware_program_from_the_five_eyes_alliance.pdf | 184.88 KiB |
General-Alexander-Letter-re-NSA-Fact-Sheet-Inaccuracy.pdf | 184.3 KiB |
20131211-svt-sweden_neutral.pdf | 182.87 KiB |
nsa-sso1-guardian-13-1101.pdf | 182.69 KiB |
20140825-Intercept-Metadata-Policy-Conference.pdf | 181 KiB |
20131020-spiegel-mexican_president.pdf | 180.92 KiB |
media-35545.pdf | 177.57 KiB |
Wyden-Udall-Letter-on-NSA-Fact-Sheet-Inaccuracy.pdf | 173.96 KiB |
Wyden-Udall-Letter_on_NSA_Fact_Sheet_Inaccuracy.pdf | 173.96 KiB |
20131119-odni-interim_competency_test_for_access_to_fisa_data.pdf | 171.14 KiB |
20141228-spiegel-intercept_with_otr_encrypted_chat.pdf | 169.56 KiB |
20131205-espresso-italy_spying.pdf | 168.78 KiB |
20150117-speigel-document_explaining_the_role_of_the_remote_operations_center_roc.pdf | 167.81 KiB |
media-35668.pdf | 167.47 KiB |
nsa-tao-ant.pdf | 164.54 KiB |
nsa-xkeyscore-tor-slides.pdf | 160.53 KiB |
20141125-sz-cable_master_list_ac.pdf | 158.76 KiB |
20140618-der_spiegel-boundless_informant_statistics_on_the_uk.pdf | 157.08 KiB |
Section-215---Obama-Administration-White-Paper.pdf | 156.48 KiB |
Section-215_-_Obama_Administration_White_Paper.pdf | 156.48 KiB |
20131202-guard-dsd_data.pdf | 152.84 KiB |
20131211-svt-baltic_region.pdf | 152.42 KiB |
20141125-sz-partner_cables.pdf | 151.74 KiB |
20130809-guard-702_glossary.pdf | 151.72 KiB |
20140618-der_spiegel-report_on_data_exchange_between_the_nsa_and_bnd_within_the_jsa_framework.pdf | 150.04 KiB |
20140831-spiegel-turkey_energy_company_development.pdf | 149.69 KiB |
20131024-guard-phones_world_leaders.pdf | 147.73 KiB |
Lesson-4_-_So_you_got_US_Person_Information.pdf | 147.08 KiB |
20130816-wapo-so_you_got_a_us_person.pdf | 147.08 KiB |
20131123-nrc-nsa_malware.pdf | 145.98 KiB |
20131210-wapo-gsm_classification_guide.pdf | 143.1 KiB |
20140519-intercept-dea_warfighter.pdf | 142.78 KiB |
nsa-fascia.pdf | 141.09 KiB |
20140102-wapo-quantum_computing.pdf | 139.98 KiB |
nsa-quantum-computer-2.pdf | 138.46 KiB |
FAA-Certification_Renewals_with_Caveats.pdf | 138.31 KiB |
20141125-sz-windstop_system_highlights.pdf | 137.21 KiB |
20131021-monde-boundless_informant_france.pdf | 136.65 KiB |
20131202-cbc-g20.pdf | 136.32 KiB |
20131210-wapo-target_location.pdf | 133.22 KiB |
20130608-guard-prism.pdf | 132.25 KiB |
nsa-target-location.pdf | 132.19 KiB |
20140127-nyt-mobile_theme_briefing.pdf | 131.5 KiB |
20140519-intercept-somalget.pdf | 131.46 KiB |
nsa-verizon-spy.pdf | 129.72 KiB |
20130605-guard-verizon_215_secondary_order.pdf | 127.79 KiB |
20140914-intercept-speargun_underway.pdf | 127.01 KiB |
20140618-DerSpiegel-zoom_of_a_boundless_informant_document_with_project_names.pdf | 125.61 KiB |
20140315-intercept-turbine_intelligence_command_and_control.pdf | 121.95 KiB |
20140312-intercept-multiple_methods_of_quantum.pdf | 121.12 KiB |
20131101-guard-corporate_reporting.pdf | 121.06 KiB |
20141125-sz-ptc_glossary.pdf | 121.02 KiB |
gchq-royal-concierge-de.pdf | 120.85 KiB |
20140618-DerSpiegel-agenda_for_the_visit_of_bsi_vice_president_andreas_konen_to_the_nsa.pdf | 120.15 KiB |
20140630-WaPo-list_of_governments_and_organizations_authorized_for_surveillance.pdf | 120.12 KiB |
20140311-nyt-ashcroft_memo_on_intelligence_sharing_procedures.pdf | 117.86 KiB |
20140312-intercept-nsa_selector_types.pdf | 117.08 KiB |
dapino-gamma-target-personalisation-centres.pdf | 116.97 KiB |
20140312-intercept-nsa_technology_directorate_analysis_of_converged_data.pdf | 115.66 KiB |
20131021-monde-wanadoo_alcatel.pdf | 115.18 KiB |
NSA-Missions_Authorities_Oversight_and_Partnerships.pdf | 114.04 KiB |
NSA-Missions-Authorities-Oversight-and-Partnerships.pdf | 114.04 KiB |
20140618-dagbladet-black_budget.pdf | 107.79 KiB |
nsa-sso2-guardian-13-1101.pdf | 107.27 KiB |
20131104-mundo-info_sharing_partners.pdf | 103.45 KiB |
dapino-gamma-gemalto-yuaawaa-wiki.pdf | 103.25 KiB |
20140329-der_spiegel-gchq_and_nsa_spy_on_heads_of_state.pdf | 102.7 KiB |
nokia_reply.pdf | 101.41 KiB |
20141228-spiegel-intercept_with_pgp_encrypted_message.pdf | 100.87 KiB |
letter_to_companies.pdf | 100.29 KiB |
20131223-wapo-nsacss-mission.pdf | 100.25 KiB |
nsa-css-mission.pdf | 100.25 KiB |
20131030-wapo-muscular.pdf | 96.5 KiB |
20141125-sz-mti_access_project_weekly_status_june_27_2008.pdf | 95.64 KiB |
20130816-wapo-sso_news_article.pdf | 94.89 KiB |
20131104-wapo-windstop.pdf | 94 KiB |
20131117-spiegel-royal_concierge.pdf | 93.92 KiB |
20131205-svt-fra_russia.pdf | 93.61 KiB |
nsa-csec-partners.pdf | 93.1 KiB |
nsa-bullrun-brief-nyt-13-0905.pdf | 92.52 KiB |
20141125-sz-mti_access_project_weekly_status_november_28_2008.pdf | 92.08 KiB |
20131210-cbc-nsa_csec_partnership.pdf | 91.15 KiB |
20130908-globo-stormbew_tv.pdf | 90.66 KiB |
20130908-globo-stormbrew_tv.pdf | 90.66 KiB |
invisibility-report-9-0-final.pdf | 89.54 KiB |
20150219-Intercept-Dapino-Gamma-Target-Personalisation-Centres.pdf | 89.38 KiB |
20140825-Intercept-CIA-Colleagues-Enthusiastically-Welcome-NSA-Training.pdf | 87.82 KiB |
20131119-odni-verification_slide.pdf | 86.98 KiB |
20140812-Intercept-GCHQ-Covert-Mobile-Phones-Policy.pdf | 86.05 KiB |
where-are-these-keys.pdf | 85.63 KiB |
20140618-der_spiegel-us_sites_with_nsa_personnel_in_germany.pdf | 84.77 KiB |
remote-control-system-9-0-changelog-final.pdf | 82.99 KiB |
20150219-Intercept-IMSIs-Identified-With-Ki-Data-For-Network.pdf | 82.55 KiB |
ccne-email-addresses-jan10-mar10-trial.pdf | 82.49 KiB |
20140128-guard-leaky_phone_apps.pdf | 81.85 KiB |
20140312-intercept-turbine_industrial_scale_exploitation.pdf | 81.13 KiB |
ccne-email-harvesting-jan10-mar10-trial.pdf | 81.02 KiB |
20141214-intercept-gchq_nac_review_october_december_2011.pdf | 80.96 KiB |
20150219-Intercept-Where-are-These-Keys.pdf | 80.28 KiB |
ccne-stats-summaries-jan10-mar10-trial.pdf | 79.57 KiB |
nsa-spy-games.pdf | 78.79 KiB |
20140519-intercept-mystic.pdf | 78.5 KiB |
UPSTREAM-Powerpoint-Slide.pdf | 78.22 KiB |
UPSTREAM-Powerpoint_Slide.pdf | 78.22 KiB |
20150219-Intercept-CNE-Access-to-Core-Mobile-Networks.pdf | 77.86 KiB |
20150219-Intercept-CCNE-Email-Harvesting-Jan10-Mar10-Trial.pdf | 77.15 KiB |
20150219-Intercept-CCNE-Stats-Summaries-Jan10-Mar10-Trial.pdf | 77.06 KiB |
20150219-Intercept-CCNE-Email-Addresses-Jan10-Mar10-Trial.pdf | 76.75 KiB |
imsis-identified-with-ki-data-for-network.pdf | 75.32 KiB |
20140318-wapo-mystic_program.pdf | 73.36 KiB |
dapino-gamma-cne-presence-wiki.pdf | 73.11 KiB |
20150219-Intercept-CCNE-Successes-Jan10-Mar10-Trial.pdf | 71.99 KiB |
20141204-intercept-wolframite_encryption_attack.pdf | 71.9 KiB |
20141125-sz-mti_access_project_weekly_status_february_6_2009.pdf | 70.59 KiB |
nsa-chalkfun.pdf | 68 KiB |
20150204-intercept-lovely_horse_0.pdf | 66.96 KiB |
20140618-der_spiegel-excerpt_on_the_sharing_of_xkeyscore_with_german_intelligence_agency_bfv.pdf | 66.89 KiB |
20150204-intercept-open_source_for_cyber_defence_progress.pdf | 65.69 KiB |
20140307-intercept-nsa_ask_zelda_an_interview_with_zelda.pdf | 65.09 KiB |
NSA-Section_702_'Loop_Hole'.pdf | 64.72 KiB |
ccne-successes-jan10-mar10-trial.pdf | 64.17 KiB |
ericsson_reply.pdf | 64.13 KiB |
20150219-Intercept-Dapino-Gamma-Gemalto-Yuaawaa-Wiki.pdf | 63.68 KiB |
20140318-wapo-description_of_data_collection_under_mystic.pdf | 61.93 KiB |
20131204-wapo-chalkfun_foreignness.pdf | 61.37 KiB |
20141125-sz-cne_endpoint_project_load.pdf | 61.16 KiB |
01302014-dagbladet-cop15_interception_document.pdf | 60.12 KiB |
20140130-information_dk-cop15_interception_document.pdf | 60.12 KiB |
20131014-wapo-collection_optimization.pdf | 59.96 KiB |
20141125-sz-cable_master_list_fea.pdf | 59.73 KiB |
20140723-WaPo-Post-Signals-Intelligence-Authority-Decision-Tree.pdf | 58.95 KiB |
20150219-Intercept-Dapino-Gamma-CNE-Presence-Wiki.pdf | 55.26 KiB |
20140307-intercept-nsa_ask_zelda_is_bain_de_soleil_a_bane_on_the_nsa.pdf | 55.21 KiB |
20140616-der_spiegel-analytics_for_targets_in_europe_0.pdf | 54.22 KiB |
20140914-intercept-speargun_phase_one.pdf | 54.17 KiB |
20131119-dagbladet-norway_collection_0.pdf | 53.53 KiB |
20140616-der_spiegel-xkeyscore_fingerprints_1.pdf | 53.51 KiB |
20140519-intercept-black_budget.pdf | 53.22 KiB |
20140630-WaPo-fisa_amendments_act_summary_document_1.pdf | 52.44 KiB |
20150204-intercept-who_else_is_targeting_your_target_collecting.pdf | 52.44 KiB |
nsa-se-fra-ru-baltic.pdf | 49.54 KiB |
20131104-nyt-collection_accesses.pdf | 48.94 KiB |
20140318-wapo-adding_another_country_to_mystic_program.pdf | 48.08 KiB |
20140307-intercept-nsa_ask_zelda_guilty_until_proven_innocent.pdf | 47.54 KiB |
20140618-dagbladet-keith_alexander_talking_points.pdf | 46.54 KiB |
remote-control-system-9-1-changelog-final.pdf | 46.49 KiB |
20140312-intercept-mhs_leverages_xkeyscore_for_quantum.pdf | 46.38 KiB |
20131126-wapo-microsoft_monkey_puzzle.pdf | 46.12 KiB |
nsa-fisa-certification.pdf | 45.84 KiB |
What_We_Need_to_Learn_from_Snowden.pdf | 41.31 KiB |
20140404-intercept-2009_sigdev_conference.pdf | 40.92 KiB |
20140307-intercept-nsa_ask_zelda_watching_every_word_in_snitch_city.pdf | 40.11 KiB |
20131211-svt-quantum_from_gchq.pdf | 37.53 KiB |
20131211-svt-xkeyscore_sources.pdf | 37.27 KiB |
20140630-WaPo-fisa_judges_order_authorizing_surveillance_of_foreign_governments_and_organizations.pdf | 37.12 KiB |
20140825-Intercept-ICREACH-Black-Budget-Extract.pdf | 36.61 KiB |
20141204-intercept-opulant_pup_encryption_attack.pdf | 35.96 KiB |
20140519-intercept-sso_dictionary_excerpt.pdf | 34.05 KiB |
nsa-se-fra-quantum-2.pdf | 34.04 KiB |
20140825-Intercept-ICREACH-Wholesale-Sharing.pdf | 33.73 KiB |
20141125-sz-cable_regions.pdf | 32.99 KiB |
gchq-se-fra-quantum-3.pdf | 31.02 KiB |
20131122-dagbladet-afghanistan_collection.pdf | 30.26 KiB |
20140618-der_spiegel-logo_of_nsa-bnd_cooperation.pdf | 29.78 KiB |
20141214-intercept-gchq_nac_review_april_june_2011.pdf | 29.74 KiB |
nsa-xkeyscore-sources.pdf | 29.48 KiB |
20140430-intercept-gchq_visit.pdf | 28.59 KiB |
20141125-sz-cables_no_current_access.pdf | 27.72 KiB |
20131211-svt-legal_issues_uk_regarding_sweden_and_quantum.pdf | 27.63 KiB |
20141125-sz-cables_where_we_are.pdf | 27.59 KiB |
20141125-sz-cables_where_we_want_to_be.pdf | 26.76 KiB |
20141125-sueddeutsche-access_breakdown.pdf | 25.87 KiB |
20141214-intercept-gchq_nac_review_july_sept_2011.pdf | 25.55 KiB |
20140312-intercept-five_eyes_hacking_large_routers.pdf | 22.54 KiB |
gchq-mullenize.pdf | 21.97 KiB |
20140312-intercept-increasing_collection_capacity_by_increasing_implants.pdf | 21.13 KiB |
nsa-5-eyes-partners.pdf | 20.61 KiB |
nsa-sso-overview.pdf | 19.81 KiB |
20140630-WaPo-affidavit_of_keith_alexander_regarding_spying_on_foreign_entities.pdf | 19.19 KiB |
20141214-intercept-gchq_nac_review_january_march_2012.pdf | 17.74 KiB |
20130630-guard-dropmire_.pdf | 16.25 KiB |
20141204-intercept-nsa_first_ever_collect_of_high_interest_4g_cellular_signal.pdf | 15.35 KiB |
20131028-mundo-spain_collections.pdf | 15.12 KiB |
20141214-intercept-gchq_hopscotch.pdf | 10.9 KiB |