10/22/2013 |
Prism April 2013 |
11/20/2013 |
Collection, Processing and Dissemination of Allied Communications |
11/19/2013 |
United States Signals Intelligence Directive 18 Appendix J |
11/19/2013 |
United States Signals Intelligence Directive 18 Jan 25 2011 |
11/19/2013 |
NSA Course Materials Module 6 Tech Personnel v.25 |
11/19/2013 |
NSA Course Materials Module 6 Analytic Personal v.18 |
11/19/2013 |
NSA Course Materials Module 5 v.24 |
11/19/2013 |
NSA Course Materials Module 4 v.28 |
11/19/2013 |
NSA Course Materials Module 3 v.22 |
11/19/2013 |
NSA Course Materials Module 2 v.16 |
11/19/2013 |
NSA Course Materials Module 1 v.17 |
11/19/2013 |
NSA Course Materials Intro v.13 |
11/19/2013 |
NSA Core Intelligence Oversight Training |
11/19/2013 |
AG Guidelines for Domestic FBI Operations |
11/19/2013 |
NSA Guidance Memo on Legal Standards for Searching Bulk Metadata |
11/19/2013 |
NSA Cryptological School Course Slides on Legal, Compliance, and Minimization Procedures |
11/19/2013 |
Office of General Council Business Record Analyst Training Slides |
11/19/2013 |
Interim Competency Test for Access to FISA Data |
11/19/2013 |
NSA Metadata Collection Training Slides |
11/19/2013 |
NSA Summary of Requirements for Collection of Bulk Metadata |
11/19/2013 |
Verification Slide |
11/3/2013 |
Collection Accesses 30 Nov 2009 |
11/3/2013 |
NSA SIGINT January 2007 Strategic Mission List |
11/3/2013 |
NSA SIGINT Mission Strategic Plan 2008-2013 |
11/4/2013 |
Special Source Operations (SSO) Collection Optimization "Midpoint" Slides - Google and Yahoo! exploitations |
11/4/2013 |
Special Source Operations (SSO) Intercept Program Slides -- cable programs, details of MUSCULAR |
11/4/2013 |
WINDSTOP Collection 30 day period December 2012 - January 2013 |
8/16/2013 |
"So You Got a US Person?" training slide November 8, 2011 |
6/8/2013 |
Boundless Informant Explanation/FAQ Slides September 6, 2012 |
10/21/2013 |
Boundless Informant France |
6/8/2013 |
Boundless Informant Introduction Slides July 13, 2012 |
10/25/2013 |
Cable regarding cyber attacks on French Presidential Network April 12, 2013 |
10/25/2013 |
Close Access Sigads September 10, 2010 (listing French Embassy) |
11/1/2013 |
Corporate FAA Reporting Metrics |
6/27/2013 |
DOJ Memo from November 20, 2007 Proposing Amendment to DOD procedures to allow NSA to do contact chaining of metadata related to US Persons |
8/30/2013 |
FY 2013 Congressional Budget Summary February 2012 National Intelligence Program Summary ("black budget") |
9/20/2013 |
GCHQ Slides on Belgacom |
10/28/2013 |
Graphic showing phone calls intercepted in Spain December 2012 |
10/14/2013 |
Intellipedia entry - Special Source Organization (SSO) Collection Optimization Overview |
6/20/2013 |
Minimization Procedures used by NSA in Connection with Data Acquisitions Pursuant to 702 FISC July 29, 2009 |
10/30/2013 |
MUSCULAR slide "Current Efforts on Google" |
10/20/2013 |
NSA Cable dated November 10, 2010 discussing hacking of Mexican President's email |
9/5/2013 |
NSA Classification Guide for Cryptanalysis from September 13, 2005 |
10/4/2013 |
NSA Cryptanalysis and Exploitation Services Report on TOR 2006 |
9/1/2013 |
NSA document dated June 2010 (not released) discussing targeting of French Foreign Ministry |
8/31/2013 |
NSA document dated March 23, 2006 (not released) showing that Al Jazeera was surveilled |
9/28/2013 |
NSA memo from January 3, 2011 on contact chaining |
10/24/2013 |
NSA memo to Signals Intelligence Division (SID) staff October 27, 2006 regarding monitoring of phones of world leaders |
9/16/2013 |
NSA Network Analysis Center 2010 SIGDEV Conference on credit card authorization network mapping |
10/4/2013 |
NSA Notes from talk on Tor by Roger Dingledine November 2007 |