6/5/2013 |
Verizon 215 Secondary Order April 25, 2013 |
6/6/2013 |
PRISM slides |
6/8/2013 |
PRISM/Upstream explanation slides |
6/8/2013 |
Boundless Informant Introduction Slides July 13, 2012 |
6/8/2013 |
Boundless Informant Explanation/FAQ Slides September 6, 2012 |
6/20/2013 |
Minimization Procedures used by NSA in Connection with Data Acquisitions Pursuant to 702 FISC July 29, 2009 |
6/20/2013 |
Procedures Used by NSA for Targeting Non-US Persons Reasonably Believed to Be Outside the US to Acquire Foreign Intelligence Pursuant to 702 FISC July 29, 2009 |
6/27/2013 |
NSA OIG Working Draft Report from March 24, 2009 on Stellar Wind (PSP) |
6/27/2013 |
DOJ Memo from November 20, 2007 Proposing Amendment to DOD procedures to allow NSA to do contact chaining of metadata related to US Persons |
6/29/2013 |
PRISM slides |
6/30/2013 |
Dropmire |
7/10/2013 |
PRISM slides |
7/31/2013 |
NSA Xkeyscore Training Slides Feb 25, 2008 |
8/9/2013 |
NSA Special Source Organization (SSO) glossary on Section 702 |
8/16/2013 |
"So You Got a US Person?" training slide November 8, 2011 |
8/16/2013 |
NSA Signals Intelligence Division (SID) Oversight & Compliance Report May 31, 2012 discussing privacy violations for the preceding year |
8/16/2013 |
NSA Special Source Organization (SSO) news article from October 12, 2011 discussing FISC ruling holding NSA surveillance unconstitutional |
8/16/2013 |
NSA Targeting Analyst Rationale slides (undated) |
8/23/2013 |
Prism Payments |
8/30/2013 |
FY 2013 Congressional Budget Summary February 2012 National Intelligence Program Summary ("black budget") |
8/31/2013 |
NSA document dated March 23, 2006 (not released) showing that Al Jazeera was surveilled |
9/1/2013 |
NSA document dated June 2010 (not released) discussing targeting of French Foreign Ministry |
9/3/2013 |
SATC slides Mexico and Brazil Case Studies |
9/5/2013 |
NSA Classification Guide for Cryptanalysis from September 13, 2005 |
9/5/2013 |
NSA SIGINT Enabling Project Description - engaging companies to covertly leverage product designs (no date) |
9/5/2013 |
Project Bullrun Description June 16, 2010 |
9/8/2013 |
NSA slides on Petrobras and private networks |
9/8/2013 |
Stormbrew TV |
9/9/2013 |
NSA slides on smartphones |
9/11/2013 |
Israel Sharing |
9/16/2013 |
NSA Network Analysis Center 2010 SIGDEV Conference on credit card authorization network mapping |
9/20/2013 |
GCHQ Slides on Belgacom |
9/28/2013 |
NSA memo from January 3, 2011 on contact chaining |
9/28/2013 |
Slide on contact chaining (SYANPSE) |
10/4/2013 |
Types of IAT (how Tor works) |
10/4/2013 |
NSA Notes from talk on Tor by Roger Dingledine November 2007 |
10/4/2013 |
NSA Cryptanalysis and Exploitation Services Report on TOR 2006 |
10/4/2013 |
Tor Stinks Presentation June 2012 |
10/4/2013 |
GCHQ Mullenize |
10/4/2013 |
Peeling Back the Layers of Tor with Egotistical Giraffe January 8, 2007 |
10/6/2013 |
Presentation on Brazilian Ministry of Mines and Energy |
10/14/2013 |
NSA Special Source Organization (SSO) Slides on Content Optimization - Address Books (SCISSORS) |
10/14/2013 |
NSA Special Source Organization (SSO) slides on Content Acquisition Optimization |
10/14/2013 |
Intellipedia entry - Special Source Organization (SSO) Collection Optimization Overview |
10/20/2013 |
NSA Cable dated November 10, 2010 discussing hacking of Mexican President's email |
10/21/2013 |
NSA PRISM slide undated - alcatel / wanadoo |
10/21/2013 |
Boundless Informant France |
10/22/2013 |
Prism April 2013 |
10/24/2013 |
NSA memo to Signals Intelligence Division (SID) staff October 27, 2006 regarding monitoring of phones of world leaders |
10/25/2013 |
Close Access Sigads September 10, 2010 (listing French Embassy) |