NSA Primary Sources

Datesort ascending Document Media Outlet
4/2/2015 GCHQ Operation QUITO to Shape Falklands Public Opinion (Collection) Intercept
3/23/2015 CSE Cyberwarfare Toolbox (Collection) CBC
3/16/2015 GCSB XKEYSCORE Search Query Intercept
3/11/2015 New Zealand GCSB Spying (Collection) NZ Herald
3/10/2015 TCB Jamboree and Apple Vulnerability Targeting (Collection) Intercept
3/5/2015 GCSB SIGINT Development Quarterly Report NZ Herald
2/19/2015 SIM Card Encryption Key Theft and Mobile Network Access (Collection) Intercept
2/10/2015 Iran Current Topics - Interactions with GCHQ Intercept
2/4/2015 Lovely Horse Intercept
2/4/2015 NATO Civilian Intelligence Council Cyber Panel Intercept
2/4/2015 Who Else Is Targeting Your Target Collecting Intercept
2/4/2015 Open Source For Cyber Defence Progress Intercept
1/28/2015 CSE Presentation on the LEVITATION Project CBC
1/17/2015 Sample Code of A Malware Program From the Five Eyes Alliance Der Spiegel
1/17/2015 Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline Der Spiegel
1/17/2015 Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job Der Spiegel
1/17/2015 iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID) Der Spiegel
1/17/2015 Analysis of Chinese Methods and Performed Actions In the Context of Computer Network Exploitation Der Spiegel
1/17/2015 Report of An NSA Employee About a Backdoor In the OpenSSH Daemon Der Spiegel
1/17/2015 HIDDENSALAMANDER -Recognition of Botnet Activity and Options For Takeover of Clients and Data Der Spiegel
1/17/2015 Classification Guide For Computer Network Exploitation (CNE) Der Spiegel
1/17/2015 QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL) Der Spiegel
1/17/2015 Exploring and Exploiting Leaky Mobile Apps With BADASS Der Spiegel
1/17/2015 The FASHIONCLEFT Protocol NSA Uses to Exfiltrate Data From Trojans and Implants to the NSA Der Spiegel
1/17/2015 Combination of Offensive and Defensive Missions - How Fourth-party Missions are Being Performed Der Spiegel
1/17/2015 NSA Training Course Material on Computer Network Operations Der Spiegel
1/17/2015 Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE Der Spiegel
1/17/2015 Overview on the NSA Use of Bots and the DEFIANTWARRIOR Program Der Spiegel
1/17/2015 CSEC Document About the Recognition of Trojans and Other network Based Anomaly Der Spiegel
1/17/2015 Document About the Expansion of the Remote Operations Center (ROC) on Endpoint Operations Der Spiegel
1/17/2015 NSA SNOWGLOBE, French Government Trojan Der Spiegel
1/17/2015 Interview With NSA's Department For Tailored Access Operations Der Spiegel
1/17/2015 BYZANTINE HADES - NSA Research on Targets of Chinese Network Exploitation Tools Der Spiegel
1/17/2015 Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards Der Spiegel
1/17/2015 CSEC Document on the Handling of Existing Trojans When Trojanizing Computers Der Spiegel
1/17/2015 Document Explaining the Role of the Remote Operations Center (ROC) Der Spiegel
1/17/2015 Recognize and Process Data From Third Party Attacks Der Spiegel
1/17/2015 Fifth Party Access - When Fourth Party Puts Others Under Surveillance Der Spiegel
1/17/2015 Overview of the TRANSGRESSION Program to Analyze and Exploit Foreign CNA-CNE Exploits Der Spiegel
1/17/2015 APEX Method of Combining Passive With Active Methods to Exfiltrate Data From Networks Attacked Der Spiegel
1/17/2015 NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools Der Spiegel
1/17/2015 APEX Shaping to Put Exfiltrating Network Traffic Into Plausible Deniability Der Spiegel
1/17/2015 Overview of Methods For NSA Integrated Cyber Operations Der Spiegel
1/17/2015 4th Party Collection - Taking Advantage of Non-partner Exploitation Der Spiegel
1/17/2015 NSA Fourth Party Access - I Drink Your Milkshake Der Spiegel
1/17/2015 Supply-chain Interdiction - Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets Der Spiegel
1/17/2015 SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence Der Spiegel
1/17/2015 Technical Description of the FASHIONCLEFT Protocol Der Spiegel
1/17/2015 QUANTUMSHOOTER Implant to Remote-control Computers From Unknown Third Parties Der Spiegel
12/28/2014 TOR Deanonymisation Research Der Spiegel
12/28/2014 A Potential Technique to Deanonymise Users of the TOR Network Der Spiegel
12/28/2014 Intro to the VPN Exploitation Process Mentioning the Protocols Attacked - PPTP, IPSEC, SSL, SSH) Der Spiegel
12/28/2014 NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN Der Spiegel
12/28/2014 Description on the Processing of VPN Data Packets Within the TURMOIL Program Der Spiegel
12/28/2014 SCARLETFEVER Program to Attack Secure Sockets Layer (SSL) - (TLS) Der Spiegel
12/28/2014 Canadian Document From CES on TLS Trends Der Spiegel
12/28/2014 MALIBU Architecture Overview to Exploit VPN Communication Der Spiegel
12/28/2014 NSA Experiment For Massive SSL-TLS Decryption Der Spiegel
12/28/2014 Description of VOIP Telephony Encryption Methods and Other Ways to Attack Der Spiegel
12/28/2014 SCARLETFEVER How Attacks on Encrypted Connections are Orchestrated Der Spiegel
12/28/2014 Classification Guide For Cryptanalysis Der Spiegel
12/28/2014 NSA Cryptographic Modernization (CryptoMod) Classification Guide Der Spiegel
12/28/2014 National Information Assurance Research Laboratory (NIARL) TUNDRA Der Spiegel
12/28/2014 Explanation of the TURMOIL GALLANTWAVE Program and Its Role When Attacking VPN Der Spiegel
12/28/2014 Processing of Data From Exploited VPN In the TURMOIL Program Der Spiegel
12/28/2014 Decryption of VPN Connections Within the VALIANTSURF Program Der Spiegel
12/28/2014 NSA - GCHQ Crypt Discovery Joint Collaboration Activity Der Spiegel
12/28/2014 Explanation on the SPIN9 Program on End-to-end Attacks on VPN Der Spiegel
12/28/2014 Procedural GCHQ Document on How Analysts are to Handle Encrypted Traffic Der Spiegel
12/28/2014 Description of Existing Projects on VPN Decryption Der Spiegel
12/28/2014 Which Encryption Protocols and Techniques Can Be Attacked Der Spiegel
12/28/2014 GCHQ Briefing on the BULLRUN Program Der Spiegel
12/28/2014 POISENNUT Virtual Private Network Attack Orchestrator (VAO) Der Spiegel
12/28/2014 GCHQ Presentation on the BULLRUN Programs Decryption Capabilities Der Spiegel
12/28/2014 Overview on Internet Anonymization Services on How They Work Der Spiegel
12/28/2014 Analysis From SSL-TLS Connections Through GCHQ In the Flying Pig Database Der Spiegel
12/28/2014 General Description How NSA Handles Encrypted Traffic Der Spiegel
12/28/2014 Overview of the Capabilities of the VALIANTSURF Program Der Spiegel
12/28/2014 Explanation of the Transform Engine Emulator When Attacking VPN Der Spiegel
12/28/2014 Analytic Challenges From Active-Passive Integration When NSA Attacks IPSEC VPNs Der Spiegel
12/28/2014 Guide For Analysts on How to Use the PRISM Skype Collection Der Spiegel
12/28/2014 NSA Presentation on the Development of Attacks on VPN Der Spiegel
12/28/2014 Explanation of the POISENNUT Product and Its Role When Attacking VPN Der Spiegel
12/28/2014 What Your Mother Never Told You About the Development of Signal Intelligence Der Spiegel
12/28/2014 Analytics on Security of TOR Hidden Services Der Spiegel
12/28/2014 Intercept With OTR Encrypted Chat Der Spiegel
12/28/2014 NSA Presentation on the Analysis and Contextualisation of Data From VPN Der Spiegel
12/28/2014 Explanation of the GALLANTWAVE That Decrypts VPN Traffic Within LONGHAUL Der Spiegel
12/28/2014 TOR Overview of Existing Techniques Der Spiegel
12/28/2014 BLUESNORT Program on Net Defense From Encrypted Communications Der Spiegel
12/28/2014 Intercept With PGP Encrypted Message Der Spiegel
12/28/2014 NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service Der Spiegel
12/28/2014 Explanation of A Potential Technique to Deanonymise Users of the TOR Network Der Spiegel
12/14/2014 GCHQ Stargate CNE Requirements Intercept
12/14/2014 Senate Intelligence Committee Study of Detention and Interrogation Program Intercept
12/14/2014 GCHQ Automated NOC Detection Intercept
12/14/2014 GCHQ Hopscotch Intercept
12/14/2014 GCHQ Making Network Sense of the Encryption Intercept
12/14/2014 GCHQ Mobile Networks In My NOC World Intercept
12/14/2014 GCHQ NAC Review April June 2011 Intercept
12/14/2014 GCHQ NAC Review January March 2012 Intercept
12/14/2014 GCHQ NAC Review July Sept 2011 Intercept
12/14/2014 GCHQ NAC Review October December 2011 Intercept
12/4/2014 Opulant Pup Encryption Attack Intercept
12/4/2014 Wolframite Encryption Attack Intercept
12/4/2014 Auroragold Project Overview Intercept
12/4/2014 Auroragold Target Technology Trends Center Support to WPMO Intercept
12/4/2014 Auroragold Working Aid Intercept
12/4/2014 Auroragold Working Group Intercept
12/4/2014 IR21 A Technology Warning Mechanism Intercept
12/4/2014 NSA First Ever Collect of High Interest 4G Cellular Signal Intercept
12/4/2014 NSA GCHQ CSEC Network Tradecraft Advancement Intercept
11/25/2014 MTI Access Project Weekly Status November 28 2008 Süddeutsche Zeitung
11/25/2014 Access Breakdown Süddeutsche Zeitung
11/25/2014 Partner Cables Süddeutsche Zeitung
11/25/2014 Cable Master List AC Süddeutsche Zeitung
11/25/2014 PTC Glossary Süddeutsche Zeitung
11/25/2014 Cable Master List FEA Süddeutsche Zeitung
11/25/2014 Windstop System Highlights Süddeutsche Zeitung
11/25/2014 Cable Regions Süddeutsche Zeitung
11/25/2014 Cables No Current Access Süddeutsche Zeitung
11/25/2014 Cables Where We Are Süddeutsche Zeitung
11/25/2014 Cables Where We Want to Be Süddeutsche Zeitung
11/25/2014 CNE EndPoint Project Load Süddeutsche Zeitung
11/25/2014 MTI Access Project Weekly Status February 6 2009 Süddeutsche Zeitung
11/25/2014 MTI Access Project Weekly Status June 27 2008 Süddeutsche Zeitung
10/10/2014 TAREX Classification Guide Intercept
10/10/2014 CNO Core Secrets Security Structure Intercept
10/10/2014 CNO Core Secrets Slide Slices Intercept
10/10/2014 CNO Core Secrets Intercept
10/10/2014 Computer Network Exploitation Classification Guide Intercept
10/10/2014 ECI Compartments Intercept
10/10/2014 ECI Pawleys Classification Guide Intercept
10/10/2014 ECI WHIPGENIE Classification Guide Intercept
10/10/2014 Exceptionally Controlled Information Listing Intercept
10/10/2014 Sentry Eagle Brief Sheet Intercept
9/14/2014 Satellite Teleport Knowledge Der Spiegel
9/14/2014 Treasure Map Announces a New Release Der Spiegel
9/14/2014 Treasure Map Presentation Der Spiegel
9/14/2014 Ferguson Visit Precis Intercept
9/14/2014 Key Activities In Progress Intercept
9/14/2014 Speargun Phase One Intercept
9/14/2014 Speargun Underway Intercept
9/5/2014 Quadrennial Intelligence Community Review Final Report Intercept
8/31/2014 Turkey and the PKK Der Spiegel
8/31/2014 Collaboration in Overdrive Der Spiegel
8/31/2014 Turkey at the G20 Pre-Meeting Der Spiegel
8/31/2014 Iraq UK Load Sharing Carriers Der Spiegel
8/31/2014 Turkish Signal Intelligence Chief Agenda Der Spiegel
8/31/2014 Jordan Belgium Der Spiegel
8/31/2014 Turkey Energy Company Development Der Spiegel
8/31/2014 Kurdistan Regional Government Der Spiegel
8/31/2014 NCRs with Foreign Relations Missions Become SUSLAs Der Spiegel
8/31/2014 NSA Intelligence Relationship with Turkey Der Spiegel
8/31/2014 NSAs Oldest Third Party Partnership Der Spiegel
8/31/2014 SINIO Seminar Tough Times for Turkey Der Spiegel
8/31/2014 SINIO Seminar Turkey and the Kurds Der Spiegel
8/31/2014 SINIO Seminar Turkish Elections Der Spiegel
8/25/2014 ICREACH: Sharing SIGINT Comms Metadata with the Intel Community Memo Intercept
8/25/2014 Sharing Communications Metadata Across the U.S. Intelligence Community - ICREACH Intercept
8/25/2014 CIA Colleagues Enthusiastically Welcome NSA Training Intercept
8/25/2014 CRISSCROSS/PROTON Point Paper Intercept
8/25/2014 DNI Decision Memorandum on ICREACH Intercept
8/25/2014 ICREACH Black Budget Extract Intercept
8/25/2014 ICREACH Wholesale Sharing Intercept
8/25/2014 Metadata Policy Conference Intercept
8/25/2014 Metadata Sharing Memorandum Intercept
8/15/2014 HACIENDA Program Heise
8/12/2014 GCHQ Covert Mobile Phones Policy Intercept
8/5/2014 Directorate of Terrorist Identities (DTI) Strategic Accomplishments 2013 Intercept
8/3/2014 Israel-US 1999 Agreement Intercept
8/3/2014 NSA Intelligence Relationship With Israel Intercept
7/25/2014 Saudi Arabia Information Paper Intercept
7/23/2014 Signals Intelligence Authority Decision Tree Washington Post
7/23/2014 March 2013 Watchlisting Guidance Intercept
7/14/2014 GCHQ’s Joint Threat Research Intelligence Group Intercept
7/9/2014 Spying on Muslim-American Leaders Intercept
6/30/2014 List of Foreign Entities Authorized for Surveillance Washington Post
6/30/2014 ODNI Certification Regarding Foreign Entities Washington Post
6/30/2014 FISA Amendments Act Summary Document Washington Post
6/30/2014 Affidavit of Keith Alexander Regarding Spying on Foreign Entities Washington Post
6/30/2014 FISA Judge's Order Authorizing Surveillance of Foreign Entities Washington Post
6/18/2014 Final agenda of a meeting between high-ranking NSA and BND officials Der Spiegel
6/18/2014 Report on the work of NSA/CSS Europe Der Spiegel
6/18/2014 NSA/CSS Europe- Report on the experiences of one NSA worker Der Spiegel
6/18/2014 Boundless Informant statistics on the UK Der Spiegel
6/18/2014 Report on an XKeyscore training session at the ECC / Dagger Complex Der Spiegel
6/18/2014 GCHQ report on the technical abilities of TEMPORA Der Spiegel
6/18/2014 Restrictions on the technical surveillance performed by JSA Der Spiegel
6/18/2014 NSA/CSS presentation on technical surveillance in Europe and Africa Der Spiegel
6/18/2014 Briefing on the visit to the NSA of a high-ranking BND official Der Spiegel
6/18/2014 Report on data exchange between the NSA and BND within the JSA framework Der Spiegel
6/18/2014 Guidelines for the classification of NSA SIGINT details (1945-1967) Der Spiegel
6/18/2014 US sites with NSA personnel in Germany Der Spiegel
6/18/2014 Black Budget Dagbladet
6/18/2014 Overview of the use of Boundless Informant (world map) Der Spiegel
6/18/2014 Cooperation between the NSA, BND and BfV Der Spiegel
6/18/2014 Report on the beginnings of the European Security Center (ESC) in the Dagger Complex Der Spiegel
6/18/2014 Guidelines for the classification of SUSLAG details and the NSA-BND cooperation Der Spiegel
6/18/2014 World map from the Boundless Informant program Der Spiegel
6/18/2014 Keith Alexander Talking Points Dagbladet
6/18/2014 Preliminary agenda of a meeting between NSA and BND officials Der Spiegel
6/18/2014 Details on XKeyscore from an internal GCHQ website Der Spiegel
6/18/2014 Report on the changing of the ESC’s name to European Security Operations Center (ESOC) Der Spiegel
6/18/2014 History and current state of cooperation between the NSA and BND Der Spiegel
6/18/2014 Worldwide locations of NSA/CSS satellite surveillance Der Spiegel
6/18/2014 Presentation from the Center for Content Extraction Der Spiegel
6/18/2014 RAMPART-A Overview Dagbladet
6/18/2014 ESOC- Report on the experiences of one NSA worker Der Spiegel
6/18/2014 Report on the changing of the ESOC’s name to European Cryptologic Center (ECC) Der Spiegel
6/18/2014 Internal NSA discussion guidelines in preparation for a meeting with high-ranking BND officials Der Spiegel
6/18/2014 Worldwide locations of the Cryptologic Services Groups Der Spiegel
6/18/2014 Presentation on PRISM and ECC's participation Der Spiegel
6/18/2014 Special Source Operations Dagbladet
6/18/2014 ESOC- Report on the experiences of one NSA worker Der Spiegel
6/18/2014 Report on the NSA-BND cooperation known as Joint SIGINT Activity (JSA) Der Spiegel
6/18/2014 Internal NSA discussion guidelines relating to cooperation with the BND and BfV Der Spiegel
6/18/2014 Zoom of a Boundless Informant document, with project names Der Spiegel
6/18/2014 Presentation on the NSA/CIA unit Special Collection Service Der Spiegel
6/18/2014 Agenda for the visit of BSI Vice President Andreas Könen to the NSA Der Spiegel
6/18/2014 European Technical Center- Report on the experiences of one NSA worker Der Spiegel
6/18/2014 Report on the NSA’s access to TEMPORA Der Spiegel
6/18/2014 Internal NSA presentation on the BND's organization Der Spiegel
6/18/2014 Report on a WHARPDRIVE incident in an SSO presentation Der Spiegel
6/18/2014 Boundless Informant overview (global) Der Spiegel
6/18/2014 Excerpt on the sharing of XKeyscore with German intelligence agency BfV Der Spiegel
6/18/2014 Report on the one-year anniversary of the NSA liaison unit SUSLAG in Bad Aibling Der Spiegel
6/18/2014 Logo of NSA-BND cooperation Der Spiegel
6/18/2014 Boundless Informant statistics for so-called Third Parties Der Spiegel
6/18/2014 Report on an NSA SIGDEV training course for allied countries Der Spiegel
6/18/2014 Explanation of Nymrod Der Spiegel
6/18/2014 Report on the surveillance of African countries by JSA Der Spiegel
6/18/2014 Nostalgic recollections from NSA workers formerly stationed in Bad Aibling Der Spiegel
6/18/2014 Boundless Informant statistics on data from "Foreign Partners" Der Spiegel
6/18/2014 Report on an NSA visit to BND site and on data transfer from the BND to the NSA Der Spiegel
6/18/2014 FAQs on the Boundless Informant program Der Spiegel
6/18/2014 Report on the technical expansion of the European Technical Center in Wiesbaden Der Spiegel
6/18/2014 NSA presentation on Nymrod Der Spiegel
6/18/2014 Boundless Informant statistics on Germany Der Spiegel
6/18/2014 Report on an unexploded ordnance alarm at European Technical Centern Der Spiegel
6/16/2014 Analytics for targets in Europe Der Spiegel
6/16/2014 Xkeyscore Fingerprints Der Spiegel
6/10/2014 SANDKEY Cryptome
5/31/2014 Identity Intelligence New York Times
5/19/2014 Black Budget Intercept
5/19/2014 DEA Warfighter Intercept
5/19/2014 Mystic Intercept
5/19/2014 Somalget Intercept
5/19/2014 SSO Dictionary Excerpt Intercept
5/19/2014 20140519-Intercept-SSO Mystic Charts Intercept
5/13/2014 No Place to Hide Documents Glenn Greenwald
4/30/2014 Prism Olympics Intercept
4/30/2014 Ghostmachine Intercept
4/30/2014 GCHQ Visit Intercept
4/4/2014 2009 SIGDEV Conference Intercept
4/4/2014 GCHQ Full Spectrum Cyber Effects Intercept
3/29/2014 GCHQ and NSA Spy on Heads of State Der Spiegel
3/22/2014 Operation Shotgiant Objectives NY Times
3/21/2014 French Intelligence E-Mail Spying Operation Le Monde
3/20/2014 Targeting System Administrator Accounts to Access Networks Intercept
3/18/2014 Adding Another Country to Mystic Program Washington Post
3/18/2014 Description of Data Collection Under Mystic Washington Post
3/18/2014 Mystic Program Washington Post
3/15/2014 How NSA Servers Masquerade In Order to Infect Target with Malware Intercept
3/15/2014 TURBINE Intelligence Command and Control Intercept
3/13/2014 NSA Cooperative Third Party Relationships Intercept
3/12/2014 NSA Selector Types Intercept
3/12/2014 Multiple Methods of Quantum Intercept
3/12/2014 NSA Phishing Tactics and Man in the Middle Attacks Intercept
3/12/2014 Quantum Insert Diagrams Intercept
3/12/2014 The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics Intercept
3/12/2014 TURBINE and TURMOIL Intercept
3/12/2014 VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Intercept
3/12/2014 TURBINE Industrial Scale Exploitation Intercept
3/12/2014 MHS Leverages XKeyscore for Quantum Intercept
3/12/2014 Increasing Collection Capacity by Increasing Implants Intercept
3/12/2014 Five Eyes Hacking Large Routers Intercept
3/12/2014 NSA Technology Directorate Analysis of Converged Data Intercept
3/11/2014 Ashcroft Memo on Intelligence Sharing Procedures NY Times
3/11/2014 NSA Memo Expands Access to FISA Information NY Times
3/11/2014 Classification Guide for Stellarwind Program NY Times
3/11/2014 NSA Timeline of Surveillance Law Developments NY Times
3/11/2014 Classification Guide for FISA, the Protect America Act and the FISA Amendments Act NY Times
3/7/2014 NSA Ask Zelda_Watching Every Word in Snitch City Intercept
3/7/2014 NSA Ask Zelda_Guilty Until Proven Innocent Intercept
3/7/2014 NSA Ask Zelda_An Interview with Zelda Intercept
3/7/2014 NSA Ask Zelda_Is Bain de Soleil a Bane on the NSA Intercept
3/5/2014 Dutch Shares Collected Anti-Piracy Information with NSA NRC Handelsblad
3/3/2014 DOJ Report on Pen Register FISA Orders EPIC
2/27/2014 GCHQ Optic Nerve Guardian
2/24/2014 Training for Covert Online Operations Intercept
2/18/2014 GCHQ SIGDEV Intercept
2/18/2014 Discovery Sigint Targeting Scenarios and Compliance Intercept
2/15/2014 SUSLOC Trade Document NY Times
2/11/2014 Drones Intercepting Communications Intercept
2/8/2014 Boundless Nederland NRC Handelsblad
2/7/2014 GCHQ Honey Trap Cyber Attack_Background on JTRIG NBC
2/7/2014 GCHQ Honey Trap Cyber Attack_Leveraging Foreign Journalists via JTRIG NBC
2/4/2014 British Spies Attacked Hactivist Anonymous NBC
1/31/2014 CSEC Airport WiFi Tracking CBC
1/30/2014 COP15 Interception Document Information DK
1/30/2014 COP15 Interception Document Information DK
1/28/2014 Leaky Phone Apps Guardian
1/27/2014 Squeaky Dolphin NBC
1/27/2014 Mobile Theme Briefing NY Times
1/27/2014 Converged Analysis on Smartphone Devices NY Times
1/16/2014 Dishfire Presentation Guardian
1/2/2014 Quantum Computing Washington Post
1/2/2014 Quantum Computers Hard Targets Washington Post
12/30/2013 NSA ANT Catalog Jacob Appelbaum
12/30/2013 TAO Quantum Theory Der Spiegel
12/30/2013 TAO Quantum Tasking Der Spiegel
12/30/2013 TAO Intro Der Spiegel
12/30/2013 QFIRE Der Spiegel
12/29/2013 TAO ANT Cottonmouth Der Spiegel
12/23/2013 NSA/CSS Mission Washington Post
12/11/2013 Legal Issues UK Regarding Sweden and Quantum SVT
12/11/2013 NSA Internal PM on FRA SVT
12/11/2013 Accomplishments from NSA SVT
12/11/2013 Sweden Neutral SVT
12/11/2013 Xkeyscore Slide with Swedish Example SVT
12/11/2013 Xkeyscore Sources SVT
12/11/2013 Xkeyscore Sweden Meeting SVT
12/11/2013 Quantum from GCHQ SVT
12/11/2013 NSA Slides Xkeyscore SVT
12/11/2013 Baltic Region SVT
12/11/2013 Final Agenda Sweden USA SVT
12/10/2013 GSM Classification Guide Washington Post
12/10/2013 Cotraveler Overview Washington Post
12/10/2013 Ghost Machine Washington Post
12/10/2013 Target Location Washington Post
12/10/2013 NSA CSEC Partnership CBC
12/10/2013 Location Cookies Washington Post
12/9/2013 NSA Video Games Paper NY Times
12/5/2013 FRA Russia SVT
12/5/2013 Italy Spying L'Espresso
12/4/2013 Chalkfun Foreignness Washington Post
12/4/2013 Fascia Washington Post
12/2/2013 G20 Summit CBC
12/2/2013 DSD Data Guardian
11/30/2013 CSEC Brazil Globe and Mail
11/30/2013 AIVD SIGINT NRC Handelsblad
11/26/2013 Microsoft Monkey Puzzle Washington Post
11/26/2013 Radicalizers Pornography Huffington Post
11/26/2013 Microsoft Cloud Exploitation Washington Post
11/23/2013 SIGINT Strategy 2012 NY Times
11/23/2013 NSA Malware NRC Handelsblad
11/22/2013 Afghanistan Collection Dagbladet
11/22/2013 Boundless Informant Dagbladet
11/22/2013 Boundless Informant FAQ Dagbladet
11/20/2013 Collection, Processing and Dissemination of Allied Communications Guardian
11/19/2013 NSA Course Materials Intro v.13 US Government
11/19/2013 NSA Course Materials Module 1 v.17 US Government
11/19/2013 Verification Slide US Government
11/19/2013 NSA Course Materials Module 2 v.16 US Government
11/19/2013 NSA Summary of Requirements for Collection of Bulk Metadata US Government
11/19/2013 NSA Course Materials Module 3 v.22 US Government
11/19/2013 NSA Metadata Collection Training Slides US Government
11/19/2013 NSA Course Materials Module 4 v.28 US Government
11/19/2013 Norway Collection Dagbladet
11/19/2013 Interim Competency Test for Access to FISA Data US Government
11/19/2013 NSA Course Materials Module 5 v.24 US Government
11/19/2013 Office of General Council Business Record Analyst Training Slides US Government
11/19/2013 NSA Course Materials Module 6 Analytic Personal v.18 US Government
11/19/2013 NSA Cryptological School Course Slides on Legal, Compliance, and Minimization Procedures US Government
11/19/2013 NSA Course Materials Module 6 Tech Personnel v.25 US Government
11/19/2013 NSA Guidance Memo on Legal Standards for Searching Bulk Metadata US Government
11/19/2013 United States Signals Intelligence Directive 18 Jan 25 2011 US Government
11/19/2013 AG Guidelines for Domestic FBI Operations US Government
11/19/2013 United States Signals Intelligence Directive 18 Appendix J US Government
11/19/2013 NSA Core Intelligence Oversight Training US Government
11/17/2013 DSD 3G Guardian
11/17/2013 Royal Concierge Guardian
11/4/2013 Special Source Operations (SSO) Intercept Program Slides -- cable programs, details of MUSCULAR Washington Post
11/4/2013 WINDSTOP Collection 30 day period December 2012 - January 2013 Washington Post
11/4/2013 Boundless Informant El Mundo
11/4/2013 Info Sharing Partners El Mundo
11/4/2013 Special Source Operations (SSO) Collection Optimization "Midpoint" Slides - Google and Yahoo! exploitations Washington Post
11/3/2013 Collection Accesses 30 Nov 2009 NY Times
11/3/2013 NSA SIGINT Mission Strategic Plan 2008-2013 NY Times
11/3/2013 NSA SIGINT January 2007 Strategic Mission List NY Times
11/1/2013 Corporate FAA Reporting Metrics Guardian
10/30/2013 Slides on MUSCULAR program possibly from February 28, 2013 Washington Post
10/30/2013 MUSCULAR slide "Current Efforts on Google" Washington Post
10/28/2013 Graphic showing phone calls intercepted in Spain December 2012 El Mundo
10/27/2013 NSA SCS Slides on embassy spying (slides 3-6) Der Spiegel
10/25/2013 Close Access Sigads September 10, 2010 (listing French Embassy) Le Monde
10/25/2013 Cable regarding cyber attacks on French Presidential Network April 12, 2013 Le Monde
10/24/2013 NSA memo to Signals Intelligence Division (SID) staff October 27, 2006 regarding monitoring of phones of world leaders Guardian
10/22/2013 Prism April 2013 Le Monde
10/21/2013 NSA PRISM slide undated - alcatel / wanadoo Le Monde
10/21/2013 Boundless Informant France Le Monde
10/20/2013 NSA Cable dated November 10, 2010 discussing hacking of Mexican President's email Der Spiegel
10/14/2013 NSA Special Source Organization (SSO) Slides on Content Optimization - Address Books (SCISSORS) Washington Post
10/14/2013 NSA Special Source Organization (SSO) slides on Content Acquisition Optimization Washington Post
10/14/2013 Intellipedia entry - Special Source Organization (SSO) Collection Optimization Overview Washington Post
10/6/2013 Presentation on Brazilian Ministry of Mines and Energy O Globo Fantastico
10/4/2013 NSA Notes from talk on Tor by Roger Dingledine November 2007 Washington Post
10/4/2013 NSA Cryptanalysis and Exploitation Services Report on TOR 2006 Washington Post
10/4/2013 GCHQ Mullenize Washington Post
10/4/2013 Tor Stinks Presentation June 2012 Guardian
10/4/2013 Peeling Back the Layers of Tor with Egotistical Giraffe January 8, 2007 Guardian
10/4/2013 Types of IAT (how Tor works) Guardian
9/28/2013 NSA memo from January 3, 2011 on contact chaining NY Times
9/28/2013 Slide on contact chaining (SYANPSE) NY Times
9/20/2013 GCHQ Slides on Belgacom Der Spiegel
9/16/2013 NSA Network Analysis Center 2010 SIGDEV Conference on credit card authorization network mapping Der Spiegel
9/11/2013 Israel Sharing Guardian
9/9/2013 NSA slides on smartphones Der Spiegel
9/8/2013 Stormbrew TV O Globo Fantastico
9/8/2013 NSA slides on Petrobras and private networks O Globo Fantastico
9/5/2013 NSA SIGINT Enabling Project Description - engaging companies to covertly leverage product designs (no date) Guardian
9/5/2013 Project Bullrun Description June 16, 2010 Guardian
9/5/2013 NSA Classification Guide for Cryptanalysis from September 13, 2005 Guardian
9/3/2013 SATC slides Mexico and Brazil Case Studies O Globo Fantastico
9/1/2013 NSA document dated June 2010 (not released) discussing targeting of French Foreign Ministry Der Spiegel
8/31/2013 NSA document dated March 23, 2006 (not released) showing that Al Jazeera was surveilled Der Spiegel
8/30/2013 FY 2013 Congressional Budget Summary February 2012 National Intelligence Program Summary ("black budget") Washington Post
8/23/2013 Prism Payments Guardian
8/16/2013 NSA Signals Intelligence Division (SID) Oversight & Compliance Report May 31, 2012 discussing privacy violations for the preceding year Washington Post
8/16/2013 NSA Special Source Organization (SSO) news article from October 12, 2011 discussing FISC ruling holding NSA surveillance unconstitutional Washington Post
8/16/2013 NSA Targeting Analyst Rationale slides (undated) Washington Post
8/16/2013 "So You Got a US Person?" training slide November 8, 2011 Washington Post
8/9/2013 NSA Special Source Organization (SSO) glossary on Section 702 Guardian
7/31/2013 NSA Xkeyscore Training Slides Feb 25, 2008 Guardian
7/10/2013 PRISM slides Washington Post
6/30/2013 Dropmire Guardian
6/29/2013 PRISM slides Washington Post
6/27/2013 NSA OIG Working Draft Report from March 24, 2009 on Stellar Wind (PSP) Guardian
6/27/2013 DOJ Memo from November 20, 2007 Proposing Amendment to DOD procedures to allow NSA to do contact chaining of metadata related to US Persons Guardian
6/20/2013 Minimization Procedures used by NSA in Connection with Data Acquisitions Pursuant to 702 FISC July 29, 2009 Guardian
6/20/2013 Procedures Used by NSA for Targeting Non-US Persons Reasonably Believed to Be Outside the US to Acquire Foreign Intelligence Pursuant to 702 FISC July 29, 2009 Guardian
6/8/2013 PRISM/Upstream explanation slides Guardian
6/8/2013 Boundless Informant Introduction Slides July 13, 2012 Guardian
6/8/2013 Boundless Informant Explanation/FAQ Slides September 6, 2012 Guardian
6/6/2013 PRISM slides Washington Post
6/5/2013 Verizon 215 Secondary Order April 25, 2013 Guardian
Subscribe to NSA Primary Sources

Stay in Touch

NSA Spying

EFF is leading the fight against the NSA's illegal mass surveillance program. Learn more about what the program is, how it works, and what you can do.

Follow EFF

Snowden's legacy grows in South America: Brazil’s crypto movement marches on. https://eff.org/r.a7l1

Apr 27 @ 2:51pm

After 8 years, our dancing baby case is dancing to court: oral arguments in Lenz v. Universal scheduled for July 7 in San Francisco.

Apr 27 @ 2:51pm

Obama claims TPP critics don't know what we're talking about—while his administration keeps the entire deal secret. https://eff.org/r.q5w5

Apr 27 @ 2:40pm
JavaScript license information