boyaxxx / NSA-Stories

Every document published from the Snowden archive

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

This repository, maintained in collaboration with Margot Williams, contains a simple index of every document published from the Snowden archive.

EFF and ACLU have done the bulk of this work to date. Let us know if you notice something that's missing.

Date Article/Document Publication
April 2, 2015 Britain Used Spy Team to Shape Latin American Public Opinion on Falklands Intercept
April 2, 2015 NSA Extended Enterprise Report – July 2008 Intercept
April 2, 2015 Behavioural Science Support for JTRIG Intercept
April 2, 2015 Op QUITO – JTRIG Wiki Highlights – August 2009 Intercept
April 2, 2015 GCHQ Mission Driven Access Workshop Intercept
April 2, 2015 NAC 2Q 2011 Business Review Intercept
April 2, 2015 Comet News – March 2010 Intercept
March 23, 2015 Communication Security Establishment's cyberwarfare toolbox revealed CBC
March 23, 2015 CASCADE: Joint Cyber Sensor Architecture CBC
March 23, 2015 NSA memo on intelligence relationship with CSE CBC
March 23, 2015 CSEC Cyber Threat Capabilities CBC
March 23, 2015 Cyber Threat Detection CBC
March 23, 2015 CSEC SIGINT Cyber Discovery CBC
March 23, 2015 CSE response to CBC's questions CBC
March 11, 2015 NZ's spy reach stretches across globe NZ Herald
March 11, 2015 NSA Intelligence Relationship with New Zealand NZ Herald
March 11, 2015 SIGINT Development Forum Minutes - June 2009 NZ Herald
March 11, 2015 SUSLOW Monthly Report for March 2013 NZ Herald
March 10, 2015 iSpy: The CIA Campaign to Steal Apple's Secrets Intercept
March 10, 2015 Black Budget: Cryptanalysis and Exploitation Services – Analysis of Target Systems Intercept
March 10, 2015 TCB Jamboree 2012 Invitation Intercept
March 10, 2015 Strawhorse: Attacking the MacOS and iOS Software Development Kit Intercept
March 10, 2015 TPM Vulnerabilities to Power Analysis and An Exposed Exploit to Bitlocker Intercept
March 10, 2015 TCB Jamboree 2012 Intercept
March 10, 2015 Apple A4/A5 Application Processors Analysis Intercept
March 10, 2015 Differential Power Analysis on the Apple A4 Processor Intercept
March 10, 2015 Secure Key Extraction by Physical De-Processing of Apple's A4 Processor Intercept
March 10, 2015 Rocoto: Implanting the iPhone Intercept
March 10, 2015 Smurf Capability – iPhone Intercept
March 7, 2015 Inside Waihopai's domes Sunday Star Times
March 7, 2015 GCSB update 2012 Sunday Star Times
March 7, 2015 GCSB update 2010 Sunday Star Times
March 7, 2015 Second Party National Identity Rules Sunday Star Times
February 26, 2015 CSE monitors millions of Canadian emails to government CBC
February 26, 2015 CSEC ITS/N2E Cyber Threat Discovery CBC
February 26, 2015 CSE Cyber Network Defence R&D Activities CBC
February 19, 2015 The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle Intercept
February 19, 2015 PCS Harvesting at Scale Intercept
February 19, 2015 CNE Access to Core Mobile Networks Intercept
February 19, 2015 Where Are These Keys? Intercept
February 19, 2015 CCNE Successes Jan10-Mar10 Trial Intercept
February 19, 2015 DAPINO GAMMA CNE Presence Wiki Intercept
February 19, 2015 DAPINO GAMMA Gemalto Yuaawaa Wiki Intercept
February 19, 2015 DAPINO GAMMA Target Personalisation Centres Gemalto Wiki Intercept
February 19, 2015 IMSIs Identified with Ki Data for Network Providers Jan10-Mar10 Trial Intercept
February 19, 2015 CCNE Stats Summaries Jan10-Mar10 Trial Intercept
February 19, 2015 CCNE Email Harvesting Jan10-Mar10 Trial Intercept
February 19, 2015 CCNE Email Addresses Jan10-Mar10 Trial Intercept
February 10, 2015 NSA Claims Iran Learned From Western Cyberattacks Intercept
February 10, 2015 Iran – Current Topics, Interaction with GCHQ Intercept
February 4, 2015 Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise Intercept
February 4, 2015 NATO Civilian Intelligence Council – Cyber Panel – US Talking Points Intercept
February 4, 2015 INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers Intercept
February 4, 2015 LOVELY HORSE – GCHQ Wiki Overview Intercept
February 4, 2015 HAPPY TRIGGER/LOVELY HORSE/Zool/TWO FACE – Open Source for Cyber Defence/Progress Intercept
January 28, 2015 CSE tracks millions of downloads daily: Snowden documents CBC
January 28, 2015 CSE presentation: Levitation CBC
January 17, 2015 Part 2: How the NSA Reads Over Shoulders of Other Spies Der Spiegel
January 17, 2015 Description of an NSA employee on fifth party access / When the targeted fourth party has someone under surveillance who puts others under surveillance Der Spiegel
January 17, 2015 4th party collection / Taking advantage of non-partner computer network exploitation activity Der Spiegel
January 17, 2015 Combination of offensive and defensive missions / How fourth-party missions are being performed Der Spiegel
January 17, 2015 Overview of the TRANSGRESSION program to analyze and exploit foreign CNA/CNE exploits Der Spiegel
January 17, 2015 NSA example SNOWGLOBE, in which a suspected French government trojan is analyzed to find out if it can be helpful for own interests Der Spiegel
January 17, 2015 NSA fourth party access / "I drink your milkshake" Der Spiegel
January 17, 2015 NSA Program TUTELAGE to instrumentalize third party attack tools Der Spiegel
January 17, 2015 Codename BYZANTINE HADES / NSA research on the targets of Chinese network exploitation tools, the targets and actors Der Spiegel
January 17, 2015 CSEC document on the handling of existing trojans when trojanizing computers Der Spiegel
January 17, 2015 Analysis of Chinese methods and performed actions in the context of computer network exploitation Der Spiegel
January 17, 2015 Overview on the NSA use of bots and the DEFIANTWARRIOR program Der Spiegel
January 17, 2015 HIDDENSALAMANDER / Program for the recognition of botnet activity and options for takeover of clients and data Der Spiegel
January 17, 2015 The Digital Arms Race: NSA Preps America for Future Battle Der Spiegel
January 17, 2015 Excerpt from the secret NSA budget on computer network operations / Code word GENIE Der Spiegel
January 17, 2015 Document about the expansion of the Remote Operations Center (ROC) on endpoint operations Der Spiegel
January 17, 2015 Document explaining the role of the Remote Operations Center (ROC) Der Spiegel
January 17, 2015 Interview with an employee of NSA's department for Tailored Access Operations about his field of work Der Spiegel
January 17, 2015 Supply-chain interdiction / Stealthy techniques can crack some of SIGINT's hardest targets Der Spiegel
January 17, 2015 Classification guide for computer network exploitation (CNE) Der Spiegel
January 17, 2015 NSA training course material on computer network operations Der Spiegel
January 17, 2015 Overview of methods for NSA integrated cyber operations Der Spiegel
January 17, 2015 NSA project description to recognize and process data that comes from third party attacks on computers Der Spiegel
January 17, 2015 Exploring and exploiting leaky mobile apps with BADASS Der Spiegel
January 17, 2015 Overview of projects of the TAO/ATO department such as the remote destruction of network cards Der Spiegel
January 17, 2015 iPhone target analysis and exploitation with Apple's unique device identifiers (UDID) Der Spiegel
January 17, 2015 Report of an NSA Employee about a Backdoor in the OpenSSH Daemon Der Spiegel
January 17, 2015 NSA document on QUANTUMSHOOTER, an implant to remote-control computers with good network connections from unknown third parties Der Spiegel
January 17, 2015 CSEC document about the recognition of trojans and other "network based anomaly" Der Spiegel
January 17, 2015 The formalized process through which analysts choose their data requirement and then get to know the tools that can do the job Der Spiegel
January 17, 2015 QUANTUMTHEORY is a set of technologies allowing man-on-the-side interference attacks on TCP/IP connections (includes STRAIGHTBIZARRE and DAREDEVIL) Der Spiegel
January 17, 2015 Sample code of a malware program from the Five Eyes alliance Der Spiegel
January 17, 2015 Explanation of the APEX method of combining passive with active methods to exfiltrate data from networks attacked Der Spiegel
January 17, 2015 Explanation of APEX shaping to put exfiltrating network traffic into patterns that allow plausible deniability Der Spiegel
January 17, 2015 Presentation on the FASHIONCLEFT protocol that the NSA uses to exfiltrate data from trojans and implants to the NSA Der Spiegel
January 17, 2015 Methods to exfiltrate data even from devices which are supposed to be offline Der Spiegel
January 17, 2015 Document detailing SPINALTAP, an NSA project to combine data from active operations and passive signals intelligence Der Spiegel
January 17, 2015 Technical description of the FASHIONCLEFT protocol the NSA uses to exfiltrate data from Trojans and implants to the NSA Der Spiegel
December 28, 2014 Prying Eyes: Inside the NSA's War on Internet Security Der Spiegel
December 28, 2014 NSA Documents: Attacks on VPN, SSL, TLS, SSH, Tor Der Spiegel
December 28, 2014 Guide for Analysts on how to use the PRISM Skype Collection Der Spiegel
December 28, 2014 GCHQ Briefing on the BULLRUN Program Der Spiegel
December 28, 2014 GCHQ Presentation on the BULLRUN Programs Decryption Capabilities Der Spiegel
December 28, 2014 NSA LONGHAUL program for end-to-end attack orchestration and key recovery service Der Spiegel
December 28, 2014 BLUESNORT program on "Net Defense" from Encrypted Communications Der Spiegel
December 28, 2014 Presentation from the SIGDEV Conference 2012 explaining which encryption protocols and techniques can be attacked and which not Der Spiegel
December 28, 2014 NSA program SCARLETFEVER explaining how attacks on encrypted connections are orchestrated Der Spiegel
December 28, 2014 Description of VOIP Telephony Encryption methods and cryptanalytic and other ways to attack Der Spiegel
December 28, 2014 NSA Experiment for massive SSL/TLS Decryption Der Spiegel
December 28, 2014 Canadian Document from CES on TLS Trends Der Spiegel
December 28, 2014 Details on how NSA uses the SCARLETFEVER program to attack Scure Sockets Layer (SSL)/Transport Layer Scurity (TLS) Der Spiegel
December 28, 2014 Analysis from SSL/TLS Connections through GCHQ in the flying pig database Der Spiegel
December 28, 2014 NSA High Level Description on TURMOIL / APEX Programs on Attacking VPN Der Spiegel
December 28, 2014 Explanation of the GALLANTWAVE that decrypts VPN Traffic within LONGHAUL Der Spiegel
December 28, 2014 Intro to the VPN Exploitation Process mentioning the protocols attacked - PPTP, IPSEC, SSL, SSH) Der Spiegel
December 28, 2014 Analytic Challenges from Active-Passive Integration when NSA attacks IPSEC VPNs Der Spiegel
December 28, 2014 Overview of the capabilities of the VALIANTSURF program Der Spiegel
December 28, 2014 MALIBU Architecture Overview to exploit VPN Communication Der Spiegel
December 28, 2014 POISENNUT Virtual Private Network Attack Orchestrator (VAO) Der Spiegel
December 28, 2014 NSA Presentation on the development of Attacks on VPN Der Spiegel
December 28, 2014 NSA Presentation on the Analysis and Contextualisation of data from VPN Der Spiegel
December 28, 2014 Description of existing projects on VPN decryption Der Spiegel
December 28, 2014 Explanation of the Transform Engine Emulator when attacking VPN Der Spiegel
December 28, 2014 Explanation of the POISENNUT Product and its role when attacking VPN Der Spiegel
December 28, 2014 Explanation of the TURMOIL GALLANTWAVE Program and its role when attacking VPN Der Spiegel
December 28, 2014 Processing of data from exploited VPN in the TURMOIL program Der Spiegel
December 28, 2014 Decryption of VPN Connections within the VALIANTSURF program Der Spiegel
December 28, 2014 Description on the processing of VPN data packets within the TURMOIL program Der Spiegel
December 28, 2014 Explanation on the SPIN9 program on end-to-end attacks on VPN Der Spiegel
December 28, 2014 Explanation of a potential technique to deanonymise users of the TOR network Der Spiegel
December 28, 2014 Analytics on security of TOR hidden services Der Spiegel
December 28, 2014 Overview on Internet Anonymization Services on how they work Der Spiegel
December 28, 2014 TOR deanonymisation research Der Spiegel
December 28, 2014 TOR Overview of Existing Techniques Der Spiegel
December 28, 2014 A potential technique to deanonymise users of the TOR network Der Spiegel
December 28, 2014 General Description how NSA handles encrypted traffic Der Spiegel
December 28, 2014 Intercept with PGP encrypted message Der Spiegel
December 28, 2014 Classification Guide for Cryptanalysis Der Spiegel
December 28, 2014 Procedural GCHQ Document on how analysts are to handle encrypted traffic Der Spiegel
December 28, 2014 NSA / GCHQ Crypt Discovery Joint Collaboration Activity Der Spiegel
December 28, 2014 NSA Cryptographic Modernization (CryptoMod) Classification Guide Der Spiegel
December 28, 2014 National Information Assurance Research Laboratory (NIARL): Newsletter, Keyword TUNDRA Der Spiegel
December 28, 2014 What Your Mother Never Told You About the development of Signal Intelligence Der Spiegel
December 28, 2014 Intercept with OTR encrypted chat Der Spiegel
December 28, 2014 Obama's Lists: A Dubious History of Targeted Killings in Afghanistan Der Spiegel
December 28, 2014 US Document from 2009: Including the Drug Trade in the War Against the Taliban Der Spiegel
December 28, 2014 Report about Operation Doody: The Child of the Neighbor Shot By Accident Der Spiegel
December 28, 2014 The JPEL List in Anonymized Form Der Spiegel
December 28, 2014 Take-Down Operation; U.S. SIGINT Provides Key Support Der Spiegel
December 13, 2014 Operation Socialist: The Inside Story of How British Spies Hacked Belgium's Largest Telco Intercept
December 13, 2014 Automated NOC detection Intercept
December 13, 2014 Mobile Networks in My NOC World Intercept
December 13, 2014 Making network sense of the encryption problem Intercept
December 13, 2014 Stargate CNE requirements Intercept
December 13, 2014 NAC review – October to December 2011 Intercept
December 13, 2014 GCHQ NAC review – January to March 2011 Intercept
December 13, 2014 GCHQ NAC review – April to June 2011 Intercept
December 13, 2014 GCHQ NAC review – July to September 2011 Intercept
December 13, 2014 GCHQ NAC review – January to March 2012 Intercept
December 13, 2014 GCHQ Hopscotch Intercept
December 13, 2014 Belgacom connections Intercept
December 4, 2014 AURORAGOLD – Project Overview Intercept
December 4, 2014 AURORAGOLD Working Group Intercept
December 4, 2014 IR.21 – A Technology Warning Mechanism Intercept
December 4, 2014 AURORAGOLD – Target Technology Trends Center support to WPMO Intercept
December 4, 2014 NSA First-Ever Collect of High-Interest 4G Cellular Signal Intercept
December 4, 2014 AURORAGOLD Working Aid Intercept
December 4, 2014 WOLFRAMITE Encryption Attack Intercept
December 4, 2014 OPULENT PUP Encryption Attack Intercept
December 4, 2014 NSA/GCHQ/CSEC Network Tradecraft Advancement Team Intercept
December 4, 2014 Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide Intercept
November 20, 2014 Vodafone-Linked Company Aided British Mass Surveillance Intercept
November 20, 2014 Special Source Operations (SSO) Weekly Brief 25.04.2013 - Windstop System Highlights Suddeutsche Zeitung
November 20, 2014 Mastering the Internet (MTI) Access Project 27.06.2008 - Weekly Status Suddeutsche Zeitung
November 20, 2014 Mastering the Internet (MTI) Access Project 28.11.2008 - Weekly Status Suddeutsche Zeitung
November 20, 2014 Mastering the Internet (MTI) Access Project 06.02.2009 - Weekly Status Suddeutsche Zeitung
November 20, 2014 Computer Network Exploitation (CNE) EndPoint Project Load - Pfenning Suddeutsche Zeitung
November 20, 2014 Cable Master List: Flag EA Suddeutsche Zeitung
November 20, 2014 PTC Glossary: INCENSER Suddeutsche Zeitung
November 20, 2014 Access Breakdown Suddeutsche Zeitung
November 20, 2014 Cable Master List - Data Suddeutsche Zeitung
November 20, 2014 Cables we do not currently have good access Suddeutsche Zeitung
November 20, 2014 Partner Cables Suddeutsche Zeitung
November 20, 2014 Regions Suddeutsche Zeitung
November 20, 2014 Where we are Suddeutsche Zeitung
November 20, 2014 Where we want to be Suddeutsche Zeitung
November 20, 2014 How Vodafone-Subsidiary Cable & Wireless Aided GCHQ's Spying Efforts Suddeutsche Zeitung
October 10, 2014 Core Secrets: NSA Saboteurs in China and Germany Intercept
October 10, 2014 Sentry Eagle Brief Sheet Intercept
October 10, 2014 TAREX Classification Guide Intercept
October 10, 2014 Exceptionally Controlled Information Listing Intercept
October 10, 2014 ECI WHIPGENIE Classification Guide Intercept
October 10, 2014 ECI Pawleys Classification Guide Intercept
October 10, 2014 ECI Compartments Intercept
October 10, 2014 CNO Core Secrets Slide Slices Intercept
October 10, 2014 CNO Core Secrets Security Structure Intercept
October 10, 2014 Computer Network Exploitation Classification Guide Intercept
October 10, 2014 CNO Core Secrets Intercept
September 15, 2014 Treasure Map Announces a New Release Intercept
September 15, 2014 Treasure Map Presentation Intercept
September 15, 2014 New Zealand Visit Precis Intercept
September 15, 2014 Key Activities In Progress Intercept
September 15, 2014 Speargun Phase One Der Spiegel
September 15, 2014 Speargun Underway Der Spiegel
September 5, 2014 Satellite Teleport Knowledge Der Spiegel
August 31, 2014 Collaboration in Overdrive: A CNE Success (NSA) Der Spiegel
August 31, 2014 Turkey and the PKK (NSA) Der Spiegel
August 31, 2014 NCRs with Foreign Relations Missions Become 'SUSLAs' (NSA) Der Spiegel
August 31, 2014 SINIO Seminar: Turkish Presidential and Parliamentary Elections (NSA) Der Spiegel
August 31, 2014 NSA Intelligence Relationship with Turkey - Turkish National Intelligence Organization (MIT) and the Turkish Intelligence Directorate (SIB) (NSA) Der Spiegel
August 31, 2014 NSAs Oldest Third Party Partnership (NSA) Der Spiegel
August 31, 2014 Agenda 14-15 May 2013: Brigadier general XXXXXXX YYYY - Turkish Signal Intelligence Chief (NSA) Der Spiegel
August 31, 2014 SINIO Series of Strategic Intelligence Issue Seminars Begins with Tough Times for Turkey (NSA) Der Spiegel
August 31, 2014 JORDAN-BELGIUM (GCHQ) Der Spiegel
August 31, 2014 Load Sharing Carriers R.O.W. (via UK) in IRAQ plus RLEs (GCHQ) Der Spiegel
August 31, 2014 Turkey at the G20 Pre-Meeting in London September 2-5 2009 (GCHQ) Der Spiegel
August 31, 2014 MHS/GCHQ Projects - Turkey Energy Company Development (GCHQ) Der Spiegel
August 31, 2014 Kurdistan Regional Government (GCHQ) Der Spiegel
August 31, 2014 SINIO Seminar: Turkey and the Kurds (NSA) Der Spiegel
August 31, 2014 A Two-Faced Friendship: Turkey Is 'Partner and Target' for the NSA Der Spiegel
August 25, 2014 CIA Colleagues Enthusiastically Welcome NSA Training Intercept
August 25, 2014 Sharing Communications Metadata Across the U.S. Intelligence Community Intercept
August 25, 2014 CRISSCROSS/PROTON Point Paper Intercept
August 25, 2014 Decision Memorandum for the DNI on ICREACH Intercept
August 25, 2014 Metadata Sharing Memorandum Intercept
August 25, 2014 Sharing SIGINT metadata on ICREACH Intercept
August 25, 2014 Metadata Policy Conference Intercept
August 25, 2014 ICREACH Wholesale Sharing Intercept
August 25, 2014 Black Budget Extracts Intercept
August 25, 2014 The Surveillance Engine: How the NSA Built Its Own Secret Google Intercept
August 12, 2014 HACIENDA Program Heise
August 5, 2014 GCHQ Covert Mobile Phones Policy Intercept
August 3, 2014 Directorate of Terrorist Identities (DTI) Strategic Accomplishments 2013 Intercept
August 3, 2014 Israel-US 1999 Agreement Intercept
July 25, 2014 NSA Intelligence Relationship With Israel Intercept
July 23, 2014 Saudi Arabia Information Paper Intercept
July 23, 2014 Signals Intelligence Authority Decision Tree Washington Post
July 14, 2014 GCHQ’s Joint Threat Research Intelligence Group Intercept
July 9, 2014 Spying on Muslim-American Leaders Intercept
June 30, 2014 NSA document on targeting Five Eyes countries and territories Washington Post
June 30, 2014 DNI, attorney general certify surveillance targets 'reasonably believed' to be outside U.S. Washington Post
June 30, 2014 FISA Amendments Act of 2008 Section 702 summary document Washington Post
June 30, 2014 NSA director Keith Alexander's Affidavit Regarding Spying on Foreign Entities Washington Post
June 30, 2014 FISA Judge's Order Authorizing Surveillance of Foreign Entities Washington Post
June 30, 2014 List of Foreign Entities Authorized for Surveillance Washington Post
June 30, 2014 ODNI Certification Regarding Foreign Entities Washington Post
June 30, 2014 Court gave NSA broad leeway in surveillance, documents show Washington Post
June 18, 2014 Nostalgic recollections out of the NSA intranet from NSA workers formerly stationed in Bad Aibling Der Spiegel
June 18, 2014 Document excerpt on the sharing of the NSA spy tool XKeyscore with the Federal Office for the Protection of the Constitution (BfV), Germany’s domestic intelligence agency Der Spiegel
June 18, 2014 Secret document on the cooperation between the NSA, BND and BfV in the fight against terrorism Der Spiegel
June 18, 2014 Preliminary agenda of a meeting between high-ranking NSA and BND officials Der Spiegel
June 18, 2014 Briefing on the visit to the NSA of a high-ranking BND official Der Spiegel
June 18, 2014 Final agenda of a meeting between high-ranking NSA and BND officials Der Spiegel
June 18, 2014 Internal NSA presentation on the BND's organization Der Spiegel
June 18, 2014 Internal NSA discussion guidelines relating to cooperation with the BND and BfV Der Spiegel
June 18, 2014 Internal NSA discussion guidelines in preparation for a meeting with high-ranking BND officials Der Spiegel
June 18, 2014 Comprehensive internal summary of the history and current state of cooperation between the NSA and BND Der Spiegel
June 18, 2014 FAQs on the Boundless Informant program Der Spiegel
June 18, 2014 Boundless Informant statistics on Germany Der Spiegel
June 18, 2014 Boundless Informant overview (global) Der Spiegel
June 18, 2014 Boundless Informant statistics for so-called Third Parties, which includes Germany Der Spiegel
June 18, 2014 Boundless Informant statistics on data from "Foreign Partners" Der Spiegel
June 18, 2014 Overview of the use of Boundless Informant (world map) Der Spiegel
June 18, 2014 World map from the Boundless Informant program Der Spiegel
June 18, 2014 Zoom of a Boundless Informant document, with project names Der Spiegel
June 18, 2014 Agenda for the visit of BSI Vice President Andreas Könen to the NSA Der Spiegel
June 18, 2014 Report on the beginnings of the European Security Center (ESC) in the Dagger Complex Der Spiegel
June 18, 2014 Report on the changing of the ESC’s name to European Security Operations Center (ESOC) Der Spiegel
June 18, 2014 ESOC: Report on the experiences of one NSA worker Der Spiegel
June 18, 2014 Report on the changing of the ESOC’s name to European Cryptologic Center (ECC) including details on missions launched from there Der Spiegel
June 18, 2014 Report on an XKeyscore training session at the ECC / Dagger Complex Der Spiegel
June 18, 2014 Presentation on the spying program PRISM and ECC's participation Der Spiegel
June 18, 2014 NSA/CSS presentation on technical surveillance in Europe and Africa Der Spiegel
June 18, 2014 Report on an unexploded ordnance alarm at the European Technical Center in the Mainz-Kastel neighborhood of Wiesbaden Der Spiegel
June 18, 2014 Report on an NSA SIGDEV training course for allied countries Der Spiegel
June 18, 2014 Report on the technical expansion of the European Technical Center in the Mainz-Kastel neighborhood of Wiesbaden Der Spiegel
June 18, 2014 Report on the NSA-BND cooperation known as Joint SIGINT Activity (JSA) Der Spiegel
June 18, 2014 Report on the surveillance of African countries by JSA Der Spiegel
June 18, 2014 Restrictions on the technical surveillance performed by JSA Der Spiegel
June 18, 2014 Report on data exchange between the NSA and BND within the JSA framework Der Spiegel
June 18, 2014 Merkel in the database: Presentation from the Center for Content Extraction Der Spiegel
June 18, 2014 Report on the NSA’s access to TEMPORA Der Spiegel
June 18, 2014 Report on the work of NSA/CSS Europe, including the capture or killing of 40 terror suspects Der Spiegel
June 18, 2014 Guidelines for the classification of NSA SIGINT details (1945-1967) Der Spiegel
June 18, 2014 Slide: Worldwide locations of the Cryptologic Services Groups Der Spiegel
June 18, 2014 Slide: Worldwide locations of NSA/CSS satellite surveillance Der Spiegel
June 18, 2014 US sites with NSA personnel in Germany Der Spiegel
June 18, 2014 Logo of NSA-BND cooperation Der Spiegel
June 18, 2014 Explanation of Nymrod, a system for searching for people and places in databases and documents Der Spiegel
June 18, 2014 NSA presentation on the work of Nymrod Der Spiegel
June 18, 2014 Report on an NSA visit to the BND site in Schöningen and on data transfer from the BND to the NSA Der Spiegel
June 18, 2014 Presentation on the NSA/CIA unit Special Collection Service (SCS), active in US embassies around the world Der Spiegel
June 18, 2014 Report on the one-year anniversary of the NSA liaison unit SUSLAG at the new site in the Mangfall Kaserne in Bad Aibling Der Spiegel
June 18, 2014 Guidelines for the classification of SUSLAG details and the NSA-BND cooperation Der Spiegel
June 18, 2014 GCHQ report on the technical abilities of the powerful spying program TEMPORA, which allows for a "full take" Der Spiegel
June 18, 2014 Report on a WHARPDRIVE incident in an SSO presentation Der Spiegel
June 18, 2014 Details on XKeyscore from an internal GCHQ website Der Spiegel
June 18, 2014 Boundless Informant statistics on Great Britain Der Spiegel
June 18, 2014 European Technical Center: Report on the experiences of one NSA Der Spiegel
June 18, 2014 NSA/CSS Europe: Report on the experiences of one NSA worker Der Spiegel
June 18, 2014 The NSA in Germany: Snowden's Documents Available for Download Der Spiegel
June 18, 2014 Boundless Informant statistics on the UK Dagbladet
June 18, 2014 Report on data exchange between the NSA and BND within the JSA framework Dagbladet
June 18, 2014 Black Budget Dagbladet
June 18, 2014 Keith Alexander Talking Points Dagbladet
June 18, 2014 RAMPART-A Overview Dagbladet
June 16, 2014 Analytics for targets in Europe Der Spiegel
June 10, 2014 Xkeyscore Fingerprints Der Spiegel
June 10, 2014 SANDKEY Cryptome
May 19, 2014 SOMALGET memo Intercept
May 19, 2014 SIDToday: DEA – The "Other" Warfighter Intercept
May 19, 2014 SSO Dictionary Excerpt Intercept
May 19, 2014 MYSTIC Intercept
May 19, 2014 SSO March 14, 2013 Intercept
May 19, 2014 SSO April 18, 2013 – What's New Intercept
May 19, 2014 SSO May 2, 2013 Intercept
May 19, 2014 SSO May 3, 2013 – MYSTIC Intercept
May 19, 2014 SSO May 3, 2012 Intercept
May 19, 2014 Black Budget Excerpt Intercept
May 19, 2014 Data Pirates of the Caribbean: The NSA is Recording Every Cell Phone Call in the Bahamas Intercept
April 30, 2014 No Place to Hide Documents Glenn Greenwald
April 30, 2014 Prism Olympics Intercept
April 30, 2014 Ghostmachine Intercept
April 30, 2014 GCHQ Visit Intercept
April 4, 2014 GCHQ Full Spectrum Cyber Effects Intercept
April 4, 2014 2009 SIGDEV Conference Intercept
March 29, 2014 GCHQ and NSA Spy on Heads of State Der Spiegel
March 22, 2014 Operation Shotgiant Objectives NY Times
March 21, 2014 French Intelligence E-Mail Spying Operation Le Monde
March 20, 2014 Targeting System Administrator Accounts to Access Networks Intercept
March 18, 2014 Adding Another Country to Mystic Program Washington Post
March 18, 2014 Description of Data Collection Under Mystic Washington Post
March 18, 2014 Mystic Program Washington Post
March 15, 2014 How NSA Servers Masquerade In Order to Infect Target with Malware Intercept
March 15, 2014 TURBINE Intelligence Command and Control Intercept
March 13, 2014 NSA Cooperative Third Party Relationships Intercept
March 12, 2014 TURBINE and TURMOIL Intercept
March 12, 2014 VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Intercept
March 12, 2014 TURBINE Industrial Scale Exploitation Intercept
March 12, 2014 MHS Leverages XKeyscore for Quantum Intercept
March 12, 2014 Increasing Collection Capacity by Increasing Implants Intercept
March 12, 2014 Five Eyes Hacking Large Routers Intercept
March 12, 2014 NSA Technology Directorate Analysis of Converged Data Intercept
March 12, 2014 NSA Selector Types Intercept
March 12, 2014 Multiple Methods of Quantum Intercept
March 12, 2014 NSA Phishing Tactics and Man in the Middle Attacks Intercept
March 12, 2014 Quantum Insert Diagrams Intercept
March 12, 2014 The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics Intercept
March 11, 2014 NSA Timeline of Surveillance Law Developments NY Times
March 11, 2014 Classification Guide for FISA, the Protect America Act and the FISA Amendments Act NY Times
March 11, 2014 Ashcroft Memo on Intelligence Sharing Procedures NY Times
March 11, 2014 NSA Memo Expands Access to FISA Information NY Times
March 11, 2014 Classification Guide for Stellarwind Program NY Times
March 7, 2014 NSA Ask Zelda - Guilty Until Proven Innocent Intercept
March 7, 2014 NSA Ask Zelda - An Interview with Zelda Intercept
March 7, 2014 NSA Ask Zelda - Is Bain de Soleil a Bane on the NSA Intercept
March 7, 2014 NSA Ask Zelda - Watching Every Word in Snitch City Intercept
March 7, 2014 Ask Zelda - The NSA Has An Advice Columnist. Seriously. Intercept
March 5, 2014 Dutch Shares Collected Anti-Piracy Information with NSA NRC Handelsblad
March 3, 2014 DOJ Report on Pen Register FISA Orders EPIC
February 27, 2014 GCHQ Optic Nerve Guardian
February 24, 2014 Training for Covert Online Operations Intercept
February 18, 2014 GCHQ SIGDEV Intercept
February 18, 2014 Discovery Sigint Targeting Scenarios and Compliance Intercept
February 15, 2014 SUSLOC Trade Document NY Times
February 11, 2014 Drones Intercepting Communications Intercept
February 8, 2014 Boundless Nederland NRC Handelsblad
February 7, 2014 GCHQ Honey Trap Cyber Attack - Background on JTRIG NBC
February 7, 2014 GCHQ Honey Trap Cyber Attack - Leveraging Foreign Journalists via JTRIG NBC
February 4, 2014 British Spies Attacked Hactivist Anonymous NBC
January 31, 2014 CSEC Airport WiFi Tracking CBC
January 30, 2014 COP15 Interception Document Information DK
January 30, 2014 COP15 Interception Document Information DK
January 28, 2014 Leaky Phone Apps Guardian
January 27, 2014 Converged Analysis on Smartphone Devices NBC
January 27, 2014 Squeaky Dolphin NY Times
January 27, 2014 Mobile Theme Briefing NY Times
January 16, 2014 Dishfire Presentation Guardian
January 2, 2014 Quantum Computing Washington Post
January 2, 2014 Quantum Computers Hard Targets Washington Post
December 30, 2013 TAO Quantum Tasking Der Spiegel
December 30, 2013 TAO Intro Der Spiegel
December 30, 2013 QFIRE Jacob Appelbaum
December 30, 2013 NSA ANT Catalog Der Spiegel
December 30, 2013 TAO Quantum Theory Der Spiegel
December 29, 2013 Inside TAO: Documents Reveal Top NSA Hacking Unit Der Spiegel
December 29, 2013 TAO ANT Cottonmouth Der Spiegel
December 23, 2013 NSA/CSS Mission Washington Post
December 11, 2013 Xkeyscore Sources SVT
December 11, 2013 Xkeyscore Sweden Meeting SVT
December 11, 2013 Quantum from GCHQ SVT
December 11, 2013 NSA Slides Xkeyscore SVT
December 11, 2013 Baltic Region SVT
December 11, 2013 Final Agenda Sweden USA SVT
December 11, 2013 Legal Issues UK Regarding Sweden and Quantum SVT
December 11, 2013 NSA Internal PM on FRA SVT
December 11, 2013 Accomplishments from NSA SVT
December 11, 2013 Sweden Neutral SVT
December 11, 2013 Xkeyscore Slide with Swedish Example SVT
December 10, 2013 Ghost Machine Washington Post
December 10, 2013 Target Location Washington Post
December 10, 2013 NSA CSEC Partnership CBC
December 10, 2013 Location Cookies Washington Post
December 10, 2013 GSM Classification Guide Washington Post
December 10, 2013 Cotraveler Overview Washington Post
December 9, 2013 NSA Video Games Paper NY Times
December 5, 2013 Italy Spying SVT
December 5, 2013 FRA Russia L'Espresso
December 4, 2013 Chalkfun Foreignness Washington Post
December 4, 2013 Fascia Washington Post
December 2, 2013 G20 Summit CBC
December 2, 2013 DSD Data Guardian
November 30, 2013 AIVD SIGINT Globe and Mail
November 30, 2013 CSEC Brazil NRC Handelsblad
November 26, 2013 Microsoft Cloud Exploitation Washington Post
November 26, 2013 Microsoft Monkey Puzzle Washington Post
November 26, 2013 Radicalizers Pornography Huffington Post
November 23, 2013 SIGINT Strategy 2012 NY Times
November 23, 2013 NSA Malware NRC Handelsblad
November 22, 2013 Boundless Informant Dagbladet
November 22, 2013 Boundless Informant FAQ Dagbladet
November 22, 2013 Afghanistan Collection Dagbladet
November 20, 2013 Collection, Processing and Dissemination of Allied Communications Guardian
November 19, 2013 Norway Collection US Government
November 19, 2013 Interim Competency Test for Access to FISA Data US Government
November 19, 2013 NSA Course Materials Module 5 v.24 US Government
November 19, 2013 Office of General Council Business Record Analyst Training Slides US Government
November 19, 2013 NSA Course Materials Module 6 Analytic Personal v.18 US Government
November 19, 2013 NSA Cryptological School Course Slides on Legal, Compliance, and Minimization Procedures US Government
November 19, 2013 NSA Course Materials Module 6 Tech Personnel v.25 US Government
November 19, 2013 NSA Guidance Memo on Legal Standards for Searching Bulk Metadata US Government
November 19, 2013 United States Signals Intelligence Directive 18 Jan 25 2011 US Government
November 19, 2013 AG Guidelines for Domestic FBI Operations US Government
November 19, 2013 United States Signals Intelligence Directive 18 Appendix J US Government
November 19, 2013 NSA Core Intelligence Oversight Training US Government
November 19, 2013 NSA Course Materials Intro v.13 US Government
November 19, 2013 NSA Course Materials Module 1 v.17 US Government
November 19, 2013 Verification Slide Dagbladet
November 19, 2013 NSA Course Materials Module 2 v.16 US Government
November 19, 2013 NSA Summary of Requirements for Collection of Bulk Metadata US Government
November 19, 2013 NSA Course Materials Module 3 v.22 US Government
November 19, 2013 NSA Metadata Collection Training Slides US Government
November 19, 2013 NSA Course Materials Module 4 v.28 US Government
November 17, 2013 DSD 3G Guardian
November 17, 2013 Royal Concierge Guardian
November 4, 2013 Boundless Informant El Mundo
November 4, 2013 Info Sharing Partners El Mundo
November 4, 2013 Special Source Operations (SSO) Collection Optimization 'Midpoint' Slides - Google and Yahoo! exploitations Washington Post
November 4, 2013 Special Source Operations (SSO) Intercept Program Slides -- cable programs, details of MUSCULAR Washington Post
November 4, 2013 WINDSTOP Collection 30 day period December 2012 - January 2013 Washington Post
November 3, 2013 Collection Accesses 30 Nov 2009 NY Times
November 3, 2013 NSA SIGINT Mission Strategic Plan 2008-2013 NY Times
November 3, 2013 NSA SIGINT January 2007 Strategic Mission List NY Times
November 1, 2013 Corporate FAA Reporting Metrics Guardian
October 30, 2013 MUSCULAR slide 'Current Efforts on Google' Washington Post
October 30, 2013 Slides on MUSCULAR program possibly from February 28, 2013 Washington Post
October 28, 2013 Graphic showing phone calls intercepted in Spain December 2012 El Mundo
October 27, 2013 NSA SCS Slides on embassy spying (slides 3-6) Der Spiegel
October 25, 2013 Close Access Sigads September 10, 2010 (listing French Embassy) Le Monde
October 25, 2013 Cable regarding cyber attacks on French Presidential Network April 12, 2013 Le Monde
October 24, 2013 NSA memo to Signals Intelligence Division (SID) staff October 27, 2006 regarding monitoring of phones of world leaders Guardian
October 22, 2013 Prism April 2013 Le Monde
October 21, 2013 NSA PRISM slide undated - alcatel / wanadoo Le Monde
October 21, 2013 Boundless Informant France Le Monde
October 20, 2013 NSA Cable dated November 10, 2010 discussing hacking of Mexican President's email Der Spiegel
October 14, 2013 Intellipedia entry - Special Source Organization (SSO) Collection Optimization Overview Washington Post
October 14, 2013 NSA Special Source Organization (SSO) Slides on Content Optimization - Address Books (SCISSORS) Washington Post
October 14, 2013 NSA Special Source Organization (SSO) slides on Content Acquisition Optimization Washington Post
October 6, 2013 Presentation on Brazilian Ministry of Mines and Energy O Globo Fantastico
October 4, 2013 Tor Stinks Presentation June 2012 Guardian
October 4, 2013 Peeling Back the Layers of Tor with Egotistical Giraffe January 8, 2007 Guardian
October 4, 2013 Types of IAT (how Tor works) Guardian
October 4, 2013 NSA Notes from talk on Tor by Roger Dingledine November 2007 Washington Post
October 4, 2013 NSA Cryptanalysis and Exploitation Services Report on TOR 2006 Washington Post
October 4, 2013 GCHQ Mullenize Washington Post
September 28, 2013 NSA memo from January 3, 2011 on contact chaining NY Times
September 28, 2013 Slide on contact chaining (SYANPSE) NY Times
September 20, 2013 GCHQ Slides on Belgacom Der Spiegel
September 16, 2013 NSA Network Analysis Center 2010 SIGDEV Conference on credit card authorization network mapping Der Spiegel
September 11, 2013 Israel Sharing Guardian
September 9, 2013 NSA slides on smartphones Der Spiegel
September 8, 2013 Stormbrew TV O Globo Fantastico
September 8, 2013 NSA slides on Petrobras and private networks O Globo Fantastico
September 5, 2013 NSA Classification Guide for Cryptanalysis from September 13, 2005 Guardian
September 5, 2013 NSA SIGINT Enabling Project Description - engaging companies to covertly leverage product designs (no date) Guardian
September 5, 2013 Project Bullrun Description June 16, 2010 Guardian
September 3, 2013 SATC slides Mexico and Brazil Case Studies O Globo Fantastico
September 1, 2013 NSA document dated June 2010 (not released) discussing targeting of French Foreign Ministry Der Spiegel
August 31, 2013 NSA document dated March 23, 2006 (not released) showing that Al Jazeera was surveilled Der Spiegel
August 30, 2013 FY 2013 Congressional Budget Summary February 2012 National Intelligence Program Summary ('black budget') Washington Post
August 23, 2013 Prism Payments Guardian
August 16, 2013 'So You Got a US Person?' training slide November 8, 2011 Washington Post
August 16, 2013 NSA Signals Intelligence Division (SID) Oversight and Compliance Report May 31, 2012 discussing privacy violations for the preceding year Washington Post
August 16, 2013 NSA Special Source Organization (SSO) news article from October 12, 2011 discussing FISC ruling holding NSA surveillance unconstitutional Washington Post
August 16, 2013 NSA Targeting Analyst Rationale slides (undated) Washington Post
August 9, 2013 NSA Special Source Organization (SSO) glossary on Section 702 Guardian
July 31, 2013 NSA Xkeyscore Training Slides Feb 25, 2008 Guardian
July 10, 2013 PRISM slides (Updated) Washington Post
June 30, 2013 Dropmire Guardian
June 29, 2013 PRISM slides Washington Post
June 27, 2013 NSA OIG Working Draft Report from March 24, 2009 on Stellar Wind (PSP) Guardian
June 27, 2013 DOJ Memo from November 20, 2007 Proposing Amendment to DOD procedures to allow NSA to do contact chaining of metadata related to US Persons Guardian
June 20, 2013 Procedures Used by NSA for Targeting Non-US Persons Reasonably Believed to Be Outside the US to Acquire Foreign Intelligence Pursuant to 702 FISC July 29, 2009 Guardian
June 20, 2013 Minimization Procedures used by NSA in Connection with Data Acquisitions Pursuant to 702 FISC July 29, 2009 Guardian
June 8, 2013 PRISM/Upstream explanation slides Guardian
June 8, 2013 Boundless Informant Introduction Slides July 13, 2012 Guardian
June 8, 2013 Boundless Informant Explanation/FAQ Slides September 6, 2012 Guardian
June 6, 2013 PRISM slides Washington Post
June 6, 2013 NSA collecting phone records of millions of Verizon customers daily Guardian
June 6, 2013 Verizon Foreign Intelligence Surveillance Court Order Guardian

About

Every document published from the Snowden archive