Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/eirsvi/snowden-sidtoday-exspose
SIDtoday គឺជាព្រឹត្តិប័ត្រព័ត៌មានផ្ទៃក្នុងសម្រាប់ផ្នែកដ៏សំខាន់បំផុតរបស់ NSA ដែលជានាយកផ្នែកស៊ើបការណ៍សញ្ញា។
https://github.com/eirsvi/snowden-sidtoday-exspose
documentation exspose leak nsa sidtoday snowden
Last synced: 1 day ago
JSON representation
SIDtoday គឺជាព្រឹត្តិប័ត្រព័ត៌មានផ្ទៃក្នុងសម្រាប់ផ្នែកដ៏សំខាន់បំផុតរបស់ NSA ដែលជានាយកផ្នែកស៊ើបការណ៍សញ្ញា។
- Host: GitHub
- URL: https://github.com/eirsvi/snowden-sidtoday-exspose
- Owner: EIRSVi
- Created: 2024-10-02T13:05:09.000Z (about 1 month ago)
- Default Branch: docs
- Last Pushed: 2024-10-02T16:30:12.000Z (about 1 month ago)
- Last Synced: 2024-10-22T14:48:44.456Z (17 days ago)
- Topics: documentation, exspose, leak, nsa, sidtoday, snowden
- Homepage: https://theintercept.com/snowden-sidtoday/
- Size: 68.4 MB
- Stars: 1
- Watchers: 0
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
This repository, maintained in collaboration with Margot Williams, contains a simple index of every document published from the Snowden archive.
[EFF](https://www.eff.org/nsa-spying/nsadocs) and [ACLU](https://www.aclu.org/nsa-documents-search) have done the bulk of this work to date. [Let us know](mailto:[email protected]) if you notice something that's missing.
Date | Article/Document | Publication
---|---------|-------------
April 2, 2015 | [Britain Used Spy Team to Shape Latin American Public Opinion on Falklands](https://firstlook.org/theintercept/2015/04/02/gchq-argentina-falklands/) | `Intercept`
April 2, 2015 | [NSA Extended Enterprise Report – July 2008](https://firstlook.org/theintercept/document/2015/04/02/nsa-extended-enterprise/) | `Intercept`
April 2, 2015 | [Behavioural Science Support for JTRIG](https://firstlook.org/theintercept/document/2015/04/02/behavioural/) | `Intercept`
April 2, 2015 | [Op QUITO – JTRIG Wiki Highlights – August 2009](https://firstlook.org/theintercept/document/2015/04/02/jtrig-wiki-highlights-august-2009/) | `Intercept`
April 2, 2015 | [GCHQ Mission Driven Access Workshop](https://firstlook.org/theintercept/document/2015/04/02/gchq-mission-driven-access-workshop/) | `Intercept`
April 2, 2015 | [NAC 2Q 2011 Business Review](https://firstlook.org/theintercept/document/2015/04/02/nac-2q-2011-business-review/) | `Intercept`
April 2, 2015 | [Comet News – March 2010](https://firstlook.org/theintercept/document/2015/04/02/comet-news-march-2010/) | `Intercept`
March 23, 2015 | [Communication Security Establishment's cyberwarfare toolbox revealed](http://www.cbc.ca/news/canada/communication-security-establishment-s-cyberwarfare-toolbox-revealed-1.3002978) | `CBC`
March 23, 2015 | [CASCADE: Joint Cyber Sensor Architecture](https://s3.amazonaws.com/s3.documentcloud.org/documents/1690204/cascade-2011.pdf) | `CBC`
March 23, 2015 | [NSA memo on intelligence relationship with CSE](http://s3.documentcloud.org/documents/1691676/odni3april2013-canada-v1-0.pdf) | `CBC`
March 23, 2015 | [CSEC Cyber Threat Capabilities](http://www.documentcloud.org/documents/1690224/doc-6-cyber-threat-capabilities.pdf) | `CBC`
March 23, 2015 | [Cyber Threat Detection](http://www.documentcloud.org/documents/1690222/doc-5-cyber-csec-sdf-gchq-nov2009.pdf) | `CBC`
March 23, 2015 | [CSEC SIGINT Cyber Discovery ](http://www.documentcloud.org/documents/1690221/doc-4-csec-sigint-discocon-2010.pdf) | `CBC`
March 23, 2015 | [CSE response to CBC's questions](http://s3.documentcloud.org/documents/1690243/csestatements.pdf) | `CBC`
March 11, 2015 | [NZ's spy reach stretches across globe](http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11415172) | `NZ Herald`
March 11, 2015 | [NSA Intelligence Relationship with New Zealand](https://s3.amazonaws.com/s3.documentcloud.org/documents/1683920/nzodnipaperapr13-v1-0-pdf-redacted.pdf) | `NZ Herald`
March 11, 2015 | [SIGINT Development Forum Minutes - June 2009](https://s3.amazonaws.com/s3.documentcloud.org/documents/1683921/sdf-mins-09-redacted.pdf) | `NZ Herald`
March 11, 2015 | [SUSLOW Monthly Report for March 2013](https://s3.amazonaws.com/s3.documentcloud.org/documents/1684763/suslow-march-2013.pdf) | `NZ Herald`
March 10, 2015 | [iSpy: The CIA Campaign to Steal Apple's Secrets](https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/) | `Intercept`
March 10, 2015 | [Black Budget: Cryptanalysis and Exploitation Services – Analysis of Target Systems](https://firstlook.org/theintercept/document/2015/03/10/black-budget-cryptanalysis-exploitation-services-analysis-target-systems/) | `Intercept`
March 10, 2015 | [TCB Jamboree 2012 Invitation](https://firstlook.org/theintercept/document/2015/03/10/tcb-jamboree-2012-invitation/) | `Intercept`
March 10, 2015 | [Strawhorse: Attacking the MacOS and iOS Software Development Kit](https://firstlook.org/theintercept/document/2015/03/10/strawhorse-attacking-macos-ios-software-development-kit/) | `Intercept`
March 10, 2015 | [TPM Vulnerabilities to Power Analysis and An Exposed Exploit to Bitlocker](https://firstlook.org/theintercept/document/2015/03/10/tpm-vulnerabilities-power-analysis-exposed-exploit-bitlocker/) | `Intercept`
March 10, 2015 | [TCB Jamboree 2012](https://firstlook.org/theintercept/document/2015/03/10/tcb-jamboree-2012/) | `Intercept`
March 10, 2015 | [Apple A4/A5 Application Processors Analysis](https://firstlook.org/theintercept/document/2015/03/10/apple-a4a5-application-processors-analysis/) | `Intercept`
March 10, 2015 | [Differential Power Analysis on the Apple A4 Processor](https://firstlook.org/theintercept/document/2015/03/10/differential-power-analysis-apple-a4-processor/) | `Intercept`
March 10, 2015 | [Secure Key Extraction by Physical De-Processing of Apple's A4 Processor](https://firstlook.org/theintercept/document/2015/03/10/secure-key-extraction-physical-de-processing-apples-a4-processor/) | `Intercept`
March 10, 2015 | [Rocoto: Implanting the iPhone](https://firstlook.org/theintercept/document/2015/03/10/rocoto-implanting-iphone/) | `Intercept`
March 10, 2015 | [Smurf Capability – iPhone](https://firstlook.org/theintercept/document/2015/03/10/smurf-capability-iphone/) | `Intercept`
March 7, 2015 | [Inside Waihopai's domes](http://www.stuff.co.nz/national/67082905/snowden-files-inside-waihopais-domes) | `Sunday Star Times`
March 7, 2015 | [GCSB update 2012](http://static.stuff.co.nz/files/GCSBMarch2012.pdf) | `Sunday Star Times`
March 7, 2015 | [GCSB update 2010](http://static.stuff.co.nz/files/GCSBApril2010.pdf) | `Sunday Star Times`
March 7, 2015 | [Second Party National Identity Rules](http://static.stuff.co.nz/files/NationalIDrules.pdf) | `Sunday Star Times`
February 26, 2015 | [CSE monitors millions of Canadian emails to government](http://www.cbc.ca/news/cse-monitors-millions-of-canadian-emails-to-government-1.2969687) | `CBC`
February 26, 2015 | [CSEC ITS/N2E Cyber Threat Discovery](https://s3.amazonaws.com/s3.documentcloud.org/documents/1676153/csec-its-dsco-2010-20101026-final.pdf) | `CBC`
February 26, 2015 | [CSE Cyber Network Defence R&D Activities](https://www.documentcloud.org/documents/1676540-5iiarc-conference-september-2010-csec-briefing.html) | `CBC`
February 19, 2015 | [The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle](https://firstlook.org/theintercept/2015/02/19/great-sim-heist/) | `Intercept`
February 19, 2015 | [PCS Harvesting at Scale](https://firstlook.org/theintercept/document/2015/02/19/pcs-harvesting-scale/) | `Intercept`
February 19, 2015 | [CNE Access to Core Mobile Networks](https://firstlook.org/theintercept/document/2015/02/19/cne-access-core-mobile-networks-2/) | `Intercept`
February 19, 2015 | [Where Are These Keys?](https://firstlook.org/theintercept/document/2015/02/19/keys/) | `Intercept`
February 19, 2015 | [CCNE Successes Jan10-Mar10 Trial](https://firstlook.org/theintercept/document/2015/02/19/ccne-successes-jan10-mar10-trial/) | `Intercept`
February 19, 2015 | [DAPINO GAMMA CNE Presence Wiki](https://firstlook.org/theintercept/document/2015/02/19/dapino-gamma-cne-presence-wiki/) | `Intercept`
February 19, 2015 | [DAPINO GAMMA Gemalto Yuaawaa Wiki](https://firstlook.org/theintercept/document/2015/02/19/dapino-gamma-gemalto-yuaawaa-wiki/) | `Intercept`
February 19, 2015 | [DAPINO GAMMA Target Personalisation Centres Gemalto Wiki](https://firstlook.org/theintercept/document/2015/02/19/dapino-gamma-target-personalisation-centres-gemalto-wiki/) | `Intercept`
February 19, 2015 | [IMSIs Identified with Ki Data for Network Providers Jan10-Mar10 Trial](https://firstlook.org/theintercept/document/2015/02/19/imsis-identified-ki-data-network-providers-jan10-mar10-trial/) | `Intercept`
February 19, 2015 | [CCNE Stats Summaries Jan10-Mar10 Trial](https://firstlook.org/theintercept/document/2015/02/19/ccne-stats-summaries-jan10-mar10-trial/) | `Intercept`
February 19, 2015 | [CCNE Email Harvesting Jan10-Mar10 Trial](https://firstlook.org/theintercept/document/2015/02/19/ccne-email-harvesting-jan10-mar10-trial/) | `Intercept`
February 19, 2015 | [CCNE Email Addresses Jan10-Mar10 Trial](https://firstlook.org/theintercept/document/2015/02/19/ccne-email-addresses-jan10-mar10-trial/) | `Intercept`
February 10, 2015 | [NSA Claims Iran Learned From Western Cyberattacks](https://firstlook.org/theintercept/2015/02/10/nsa-iran-developing-sophisticated-cyber-attacks-learning-attacks/) | `Intercept`
February 10, 2015 | [Iran – Current Topics, Interaction with GCHQ](https://firstlook.org/theintercept/document/2015/02/10/iran-current-topics-interaction-gchq) | `Intercept`
February 4, 2015 | [Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise](https://firstlook.org/theintercept/2015/02/04/demonize-prosecute-hackers-nsa-gchq-rely-intel-expertise/) | `Intercept`
February 4, 2015 | [NATO Civilian Intelligence Council – Cyber Panel – US Talking Points](https://firstlook.org/theintercept/document/2015/02/04/nato-civilian-intelligence-council-cyber-panel-us-talking-points/) | `Intercept`
February 4, 2015 | [INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers](https://firstlook.org/theintercept/document/2015/02/04/intolerant-else-targeting-target-collecting-data-stolen-hackers/) | `Intercept`
February 4, 2015 | [LOVELY HORSE – GCHQ Wiki Overview](https://firstlook.org/theintercept/document/2015/02/04/lovely-horse-gchq-wiki-overview/) | `Intercept`
February 4, 2015 | [HAPPY TRIGGER/LOVELY HORSE/Zool/TWO FACE – Open Source for Cyber Defence/Progress](https://firstlook.org/theintercept/document/2015/02/04/happy-triggerlovely-horsezooltwo-face-open-source-cyber-defenceprogress/) | `Intercept`
January 28, 2015 | [CSE tracks millions of downloads daily: Snowden documents](http://www.cbc.ca/news/canada/cse-tracks-millions-of-downloads-daily-snowden-documents-1.2930120) | `CBC`
January 28, 2015 | [CSE presentation: Levitation](https://www.documentcloud.org/documents/1510163-cse-presentation-on-the-levitation-project.html) | `CBC`
January 17, 2015 | [Part 2: How the NSA Reads Over Shoulders of Other Spies](http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409-2.html) | `Der Spiegel`
January 17, 2015 | [Description of an NSA employee on fifth party access / When the targeted fourth party has someone under surveillance who puts others under surveillance](http://www.spiegel.de/media/media-35679.pdf) | `Der Spiegel`
January 17, 2015 | [4th party collection / Taking advantage of non-partner computer network exploitation activity](http://www.spiegel.de/media/media-35680.pdf) | `Der Spiegel`
January 17, 2015 | [Combination of offensive and defensive missions / How fourth-party missions are being performed](http://www.spiegel.de/media/media-35681.pdf) | `Der Spiegel`
January 17, 2015 | [Overview of the TRANSGRESSION program to analyze and exploit foreign CNA/CNE exploits](http://www.spiegel.de/media/media-35682.pdf) | `Der Spiegel`
January 17, 2015 | [NSA example SNOWGLOBE, in which a suspected French government trojan is analyzed to find out if it can be helpful for own interests](http://www.spiegel.de/media/media-35683.pdf) | `Der Spiegel`
January 17, 2015 | [NSA fourth party access / "I drink your milkshake"](http://www.spiegel.de/media/media-35684.pdf) | `Der Spiegel`
January 17, 2015 | [NSA Program TUTELAGE to instrumentalize third party attack tools](http://www.spiegel.de/media/media-35685.pdf) | `Der Spiegel`
January 17, 2015 | [Codename BYZANTINE HADES / NSA research on the targets of Chinese network exploitation tools, the targets and actors](http://www.spiegel.de/media/media-35686.pdf) | `Der Spiegel`
January 17, 2015 | [CSEC document on the handling of existing trojans when trojanizing computers](http://www.spiegel.de/media/media-35688.pdf) | `Der Spiegel`
January 17, 2015 | [Analysis of Chinese methods and performed actions in the context of computer network exploitation](http://www.spiegel.de/media/media-35687.pdf) | `Der Spiegel`
January 17, 2015 | [Overview on the NSA use of bots and the DEFIANTWARRIOR program](http://www.spiegel.de/media/media-35689.pdf) | `Der Spiegel`
January 17, 2015 | [HIDDENSALAMANDER / Program for the recognition of botnet activity and options for takeover of clients and data](http://www.spiegel.de/media/media-35678.pdf) | `Der Spiegel`
January 17, 2015 | [The Digital Arms Race: NSA Preps America for Future Battle](http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html) | `Der Spiegel`
January 17, 2015 | [Excerpt from the secret NSA budget on computer network operations / Code word GENIE](http://www.spiegel.de/media/media-35660.pdf) | `Der Spiegel`
January 17, 2015 | [Document about the expansion of the Remote Operations Center (ROC) on endpoint operations](http://www.spiegel.de/media/media-35653.pdf) | `Der Spiegel`
January 17, 2015 | [Document explaining the role of the Remote Operations Center (ROC)](http://www.spiegel.de/media/media-35654.pdf) | `Der Spiegel`
January 17, 2015 | [Interview with an employee of NSA's department for Tailored Access Operations about his field of work](http://www.spiegel.de/media/media-35655.pdf) | `Der Spiegel`
January 17, 2015 | [Supply-chain interdiction / Stealthy techniques can crack some of SIGINT's hardest targets](http://www.spiegel.de/media/media-35669.pdf) | `Der Spiegel`
January 17, 2015 | [Classification guide for computer network exploitation (CNE)](http://www.spiegel.de/media/media-35656.pdf) | `Der Spiegel`
January 17, 2015 | [NSA training course material on computer network operations](http://www.spiegel.de/media/media-35657.pdf) | `Der Spiegel`
January 17, 2015 | [Overview of methods for NSA integrated cyber operations](http://www.spiegel.de/media/media-35658.pdf) | `Der Spiegel`
January 17, 2015 | [NSA project description to recognize and process data that comes from third party attacks on computers](http://www.spiegel.de/media/media-35659.pdf) | `Der Spiegel`
January 17, 2015 | [Exploring and exploiting leaky mobile apps with BADASS](http://www.spiegel.de/media/media-35670.pdf) | `Der Spiegel`
January 17, 2015 | [Overview of projects of the TAO/ATO department such as the remote destruction of network cards](http://www.spiegel.de/media/media-35661.pdf) | `Der Spiegel`
January 17, 2015 | [iPhone target analysis and exploitation with Apple's unique device identifiers (UDID)](http://www.spiegel.de/media/media-35662.pdf) | `Der Spiegel`
January 17, 2015 | [Report of an NSA Employee about a Backdoor in the OpenSSH Daemon](http://www.spiegel.de/media/media-35663.pdf) | `Der Spiegel`
January 17, 2015 | [NSA document on QUANTUMSHOOTER, an implant to remote-control computers with good network connections from unknown third parties](http://www.spiegel.de/media/media-35664.pdf) | `Der Spiegel`
January 17, 2015 | [CSEC document about the recognition of trojans and other "network based anomaly"](http://www.spiegel.de/media/media-35665.pdf) | `Der Spiegel`
January 17, 2015 | [The formalized process through which analysts choose their data requirement and then get to know the tools that can do the job](http://www.spiegel.de/media/media-35666.pdf) | `Der Spiegel`
January 17, 2015 | [QUANTUMTHEORY is a set of technologies allowing man-on-the-side interference attacks on TCP/IP connections (includes STRAIGHTBIZARRE and DAREDEVIL)](http://www.spiegel.de/media/media-35667.pdf) | `Der Spiegel`
January 17, 2015 | [Sample code of a malware program from the Five Eyes alliance](http://www.spiegel.de/media/media-35668.pdf) | `Der Spiegel`
January 17, 2015 | [Explanation of the APEX method of combining passive with active methods to exfiltrate data from networks attacked](http://www.spiegel.de/media/media-35671.pdf) | `Der Spiegel`
January 17, 2015 | [Explanation of APEX shaping to put exfiltrating network traffic into patterns that allow plausible deniability](http://www.spiegel.de/media/media-35672.pdf) | `Der Spiegel`
January 17, 2015 | [Presentation on the FASHIONCLEFT protocol that the NSA uses to exfiltrate data from trojans and implants to the NSA](http://www.spiegel.de/media/media-35673.pdf) | `Der Spiegel`
January 17, 2015 | [Methods to exfiltrate data even from devices which are supposed to be offline](http://www.spiegel.de/media/media-35674.pdf) | `Der Spiegel`
January 17, 2015 | [Document detailing SPINALTAP, an NSA project to combine data from active operations and passive signals intelligence](http://www.spiegel.de/media/media-35675.pdf) | `Der Spiegel`
January 17, 2015 | [Technical description of the FASHIONCLEFT protocol the NSA uses to exfiltrate data from Trojans and implants to the NSA](http://www.spiegel.de/media/media-35676.pdf) | `Der Spiegel`
December 28, 2014 | [Prying Eyes: Inside the NSA's War on Internet Security](http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html) | `Der Spiegel`
December 28, 2014 | [NSA Documents: Attacks on VPN, SSL, TLS, SSH, Tor](http://www.spiegel.de/international/world/nsa-documents-attacks-on-vpn-ssl-tls-ssh-tor-a-1010525.html) | `Der Spiegel`
December 28, 2014 | [Guide for Analysts on how to use the PRISM Skype Collection](http://www.spiegel.de/media/media-35530.pdf) | `Der Spiegel`
December 28, 2014 | [GCHQ Briefing on the BULLRUN Program](http://www.spiegel.de/media/media-35531.pdf) | `Der Spiegel`
December 28, 2014 | [GCHQ Presentation on the BULLRUN Programs Decryption Capabilities](http://www.spiegel.de/media/media-35532.pdf) | `Der Spiegel`
December 28, 2014 | [NSA LONGHAUL program for end-to-end attack orchestration and key recovery service](http://www.spiegel.de/media/media-35533.pdf) | `Der Spiegel`
December 28, 2014 | [BLUESNORT program on "Net Defense" from Encrypted Communications](http://www.spiegel.de/media/media-35534.pdf) | `Der Spiegel`
December 28, 2014 | [Presentation from the SIGDEV Conference 2012 explaining which encryption protocols and techniques can be attacked and which not](http://www.spiegel.de/media/media-35535.pdf) | `Der Spiegel`
December 28, 2014 | [NSA program SCARLETFEVER explaining how attacks on encrypted connections are orchestrated](http://www.spiegel.de/media/media-35536.pdf) | `Der Spiegel`
December 28, 2014 | [Description of VOIP Telephony Encryption methods and cryptanalytic and other ways to attack](http://www.spiegel.de/media/media-35537.pdf) | `Der Spiegel`
December 28, 2014 | [NSA Experiment for massive SSL/TLS Decryption](http://www.spiegel.de/media/media-35509.pdf) | `Der Spiegel`
December 28, 2014 | [Canadian Document from CES on TLS Trends](http://www.spiegel.de/media/media-35510.pdf) | `Der Spiegel`
December 28, 2014 | [Details on how NSA uses the SCARLETFEVER program to attack Scure Sockets Layer (SSL)/Transport Layer Scurity (TLS)](http://www.spiegel.de/media/media-35511.pdf) | `Der Spiegel`
December 28, 2014 | [Analysis from SSL/TLS Connections through GCHQ in the flying pig database](http://www.spiegel.de/media/media-35512.pdf) | `Der Spiegel`
December 28, 2014 | [NSA High Level Description on TURMOIL / APEX Programs on Attacking VPN](http://www.spiegel.de/media/media-35513.pdf) | `Der Spiegel`
December 28, 2014 | [Explanation of the GALLANTWAVE that decrypts VPN Traffic within LONGHAUL](http://www.spiegel.de/media/media-35514.pdf) | `Der Spiegel`
December 28, 2014 | [Intro to the VPN Exploitation Process mentioning the protocols attacked - PPTP, IPSEC, SSL, SSH)](http://www.spiegel.de/media/media-35515.pdf) | `Der Spiegel`
December 28, 2014 | [Analytic Challenges from Active-Passive Integration when NSA attacks IPSEC VPNs](http://www.spiegel.de/media/media-35516.pdf) | `Der Spiegel`
December 28, 2014 | [Overview of the capabilities of the VALIANTSURF program](http://www.spiegel.de/media/media-35517.pdf) | `Der Spiegel`
December 28, 2014 | [MALIBU Architecture Overview to exploit VPN Communication](http://www.spiegel.de/media/media-35518.pdf) | `Der Spiegel`
December 28, 2014 | [POISENNUT Virtual Private Network Attack Orchestrator (VAO)](http://www.spiegel.de/media/media-35519.pdf) | `Der Spiegel`
December 28, 2014 | [NSA Presentation on the development of Attacks on VPN](http://www.spiegel.de/media/media-35520.pdf) | `Der Spiegel`
December 28, 2014 | [NSA Presentation on the Analysis and Contextualisation of data from VPN](http://www.spiegel.de/media/media-35521.pdf) | `Der Spiegel`
December 28, 2014 | [Description of existing projects on VPN decryption](http://www.spiegel.de/media/media-35522.pdf) | `Der Spiegel`
December 28, 2014 | [Explanation of the Transform Engine Emulator when attacking VPN](http://www.spiegel.de/media/media-35523.pdf) | `Der Spiegel`
December 28, 2014 | [Explanation of the POISENNUT Product and its role when attacking VPN](http://www.spiegel.de/media/media-35524.pdf) | `Der Spiegel`
December 28, 2014 | [Explanation of the TURMOIL GALLANTWAVE Program and its role when attacking VPN](http://www.spiegel.de/media/media-35525.pdf) | `Der Spiegel`
December 28, 2014 | [Processing of data from exploited VPN in the TURMOIL program](http://www.spiegel.de/media/media-35526.pdf) | `Der Spiegel`
December 28, 2014 | [Decryption of VPN Connections within the VALIANTSURF program](http://www.spiegel.de/media/media-35527.pdf) | `Der Spiegel`
December 28, 2014 | [Description on the processing of VPN data packets within the TURMOIL program](http://www.spiegel.de/media/media-35528.pdf) | `Der Spiegel`
December 28, 2014 | [Explanation on the SPIN9 program on end-to-end attacks on VPN](http://www.spiegel.de/media/media-35529.pdf) | `Der Spiegel`
December 28, 2014 | [Explanation of a potential technique to deanonymise users of the TOR network](http://www.spiegel.de/media/media-35538.pdf) | `Der Spiegel`
December 28, 2014 | [Analytics on security of TOR hidden services](http://www.spiegel.de/media/media-35539.pdf) | `Der Spiegel`
December 28, 2014 | [Overview on Internet Anonymization Services on how they work](http://www.spiegel.de/media/media-35540.pdf) | `Der Spiegel`
December 28, 2014 | [TOR deanonymisation research](http://www.spiegel.de/media/media-35541.pdf) | `Der Spiegel`
December 28, 2014 | [TOR Overview of Existing Techniques](http://www.spiegel.de/media/media-35542.pdf) | `Der Spiegel`
December 28, 2014 | [A potential technique to deanonymise users of the TOR network](http://www.spiegel.de/media/media-35543.pdf) | `Der Spiegel`
December 28, 2014 | [General Description how NSA handles encrypted traffic](http://www.spiegel.de/media/media-35544.pdf) | `Der Spiegel`
December 28, 2014 | [Intercept with PGP encrypted message](http://www.spiegel.de/media/media-35545.pdf) | `Der Spiegel`
December 28, 2014 | [Classification Guide for Cryptanalysis](http://www.spiegel.de/media/media-35546.pdf) | `Der Spiegel`
December 28, 2014 | [Procedural GCHQ Document on how analysts are to handle encrypted traffic](http://www.spiegel.de/media/media-35547.pdf) | `Der Spiegel`
December 28, 2014 | [NSA / GCHQ Crypt Discovery Joint Collaboration Activity](http://www.spiegel.de/media/media-35548.pdf) | `Der Spiegel`
December 28, 2014 | [NSA Cryptographic Modernization (CryptoMod) Classification Guide](http://www.spiegel.de/media/media-35549.pdf) | `Der Spiegel`
December 28, 2014 | [National Information Assurance Research Laboratory (NIARL): Newsletter, Keyword TUNDRA](http://www.spiegel.de/media/media-35550.pdf) | `Der Spiegel`
December 28, 2014 | [What Your Mother Never Told You About the development of Signal Intelligence](http://www.spiegel.de/media/media-35551.pdf) | `Der Spiegel`
December 28, 2014 | [Intercept with OTR encrypted chat](http://www.spiegel.de/media/media-35552.pdf) | `Der Spiegel`
December 28, 2014 | [Obama's Lists: A Dubious History of Targeted Killings in Afghanistan](http://www.spiegel.de/international/world/secret-docs-reveal-dubious-details-of-targeted-killings-in-afghanistan-a-1010358.html) | `Der Spiegel`
December 28, 2014 | [US Document from 2009: Including the Drug Trade in the War Against the Taliban](http://www.spiegel.de/media/media-35506.pdf) | `Der Spiegel`
December 28, 2014 | [Report about Operation Doody: The Child of the Neighbor Shot By Accident](http://www.spiegel.de/media/media-35507.pdf) | `Der Spiegel`
December 28, 2014 | [The JPEL List in Anonymized Form](http://www.spiegel.de/media/media-35508.pdf) | `Der Spiegel`
December 28, 2014 | [Take-Down Operation; U.S. SIGINT Provides Key Support](http://www.spiegel.de/media/media-35553.pdf) | `Der Spiegel`
December 13, 2014 | [Operation Socialist: The Inside Story of How British Spies Hacked Belgium's Largest Telco](https://firstlook.org/theintercept/2014/12/13/belgacom-hack-gchq-inside-story/) | `Intercept`
December 13, 2014 | [Automated NOC detection](https://firstlook.org/theintercept/document/2014/12/13/gchq-automated-noc-detection-2011) | `Intercept`
December 13, 2014 | [Mobile Networks in My NOC World](https://firstlook.org/theintercept/document/2014/12/13/gchq-mobile-networks-noc-world) | `Intercept`
December 13, 2014 | [Making network sense of the encryption problem](https://firstlook.org/theintercept/document/2014/12/13/gchq-making-network-sense-encryption-problem-2011) | `Intercept`
December 13, 2014 | [Stargate CNE requirements](https://firstlook.org/theintercept/document/2014/12/13/gchq-stargate-cne-requirements) | `Intercept`
December 13, 2014 | [NAC review – October to December 2011](https://firstlook.org/theintercept/document/2014/12/13/gchq-nac-review-october-december-2011) | `Intercept`
December 13, 2014 | [GCHQ NAC review – January to March 2011](https://firstlook.org/theintercept/document/2014/12/13/gchq-nac-business-review-january-march-2011) | `Intercept`
December 13, 2014 | [GCHQ NAC review – April to June 2011](https://firstlook.org/theintercept/document/2014/12/13/gchq-nac-review-april-june-2011) | `Intercept`
December 13, 2014 | [GCHQ NAC review – July to September 2011](https://firstlook.org/theintercept/document/2014/12/13/gchq-nac-review-july-september-2011) | `Intercept`
December 13, 2014 | [GCHQ NAC review – January to March 2012](https://firstlook.org/theintercept/document/2014/12/13/gchq-nac-review-january-march-2012) | `Intercept`
December 13, 2014 | [GCHQ Hopscotch](https://firstlook.org/theintercept/document/2014/12/13/hopscotch) | `Intercept`
December 13, 2014 | [Belgacom connections](https://firstlook.org/theintercept/document/2014/12/13/gchq-belgacom-connections) | `Intercept`
December 4, 2014 | [AURORAGOLD – Project Overview](https://firstlook.org/theintercept/document/2014/12/04/auroragold-project-overview) | `Intercept`
December 4, 2014 | [AURORAGOLD Working Group](https://firstlook.org/theintercept/document/2014/12/04/auroragold-working-group/) | `Intercept`
December 4, 2014 | [IR.21 – A Technology Warning Mechanism](https://firstlook.org/theintercept/document/2014/12/04/ir-21-technology-warning-mechanism) | `Intercept`
December 4, 2014 | [AURORAGOLD – Target Technology Trends Center support to WPMO](https://firstlook.org/theintercept/document/2014/12/04/auroragold-target-technology-trends-center-support-wpmo) | `Intercept`
December 4, 2014 | [NSA First-Ever Collect of High-Interest 4G Cellular Signal](https://firstlook.org/theintercept/document/2014/12/04/first-ever-collect-high-interest-4g-cellular-signal) | `Intercept`
December 4, 2014 | [AURORAGOLD Working Aid](https://firstlook.org/theintercept/document/2014/12/04/auroragold-working-aid) | `Intercept`
December 4, 2014 | [WOLFRAMITE Encryption Attack](https://firstlook.org/theintercept/document/2014/12/04/wolframite-encryption-attack) | `Intercept`
December 4, 2014 | [OPULENT PUP Encryption Attack](https://firstlook.org/theintercept/document/2014/12/04/opulent-pup-encryption-attack) | `Intercept`
December 4, 2014 | [NSA/GCHQ/CSEC Network Tradecraft Advancement Team](https://firstlook.org/theintercept/document/2014/12/04/nsa-gchq-csec-network-tradecraft-advancement-team) | `Intercept`
December 4, 2014 | [Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide](https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/) | `Intercept`
November 20, 2014 | [Vodafone-Linked Company Aided British Mass Surveillance](https://firstlook.org/theintercept/2014/11/20/vodafone-surveillance-gchq-snowden/) | `Intercept`
November 20, 2014 | [Special Source Operations (SSO) Weekly Brief 25.04.2013 - Windstop System Highlights](https://netzpolitik.org/wp-upload/2014-11-Snowden-Gerontic/25_apr_2013_sso_weekly_brief.pdf) | `Suddeutsche Zeitung`
November 20, 2014 | [Mastering the Internet (MTI) Access Project 27.06.2008 - Weekly Status](https://netzpolitik.org/wp-upload/2014-11-Snowden-Gerontic/27_June_08_redacted.pdf) | `Suddeutsche Zeitung`
November 20, 2014 | [Mastering the Internet (MTI) Access Project 28.11.2008 - Weekly Status](https://netzpolitik.org/wp-upload/2014-11-Snowden-Gerontic/28_November_08_redacted.pdf) | `Suddeutsche Zeitung`
November 20, 2014 | [Mastering the Internet (MTI) Access Project 06.02.2009 - Weekly Status](https://netzpolitik.org/wp-upload/2014-11-Snowden-Gerontic/6_February_09_redacted.pdf) | `Suddeutsche Zeitung`
November 20, 2014 | [Computer Network Exploitation (CNE) EndPoint Project Load - Pfenning](https://netzpolitik.org/wp-upload/2014-11-Snowden-Gerontic/CNE_PFENNING_ALPHA_redacted.pdf) | `Suddeutsche Zeitung`
November 20, 2014 | [Cable Master List: Flag EA](https://netzpolitik.org/wp-upload/2014-11-Snowden-Gerontic/FEA_cable_list.pdf) | `Suddeutsche Zeitung`
November 20, 2014 | [PTC Glossary: INCENSER](https://netzpolitik.org/wp-upload/2014-11-Snowden-Gerontic/PTC_Glossary_redacted.pdf) | `Suddeutsche Zeitung`
November 20, 2014 | [Access Breakdown](https://netzpolitik.org/wp-upload/2014-11-Snowden-Cable-Master-List/access_breakdown.pdf) | `Suddeutsche Zeitung`
November 20, 2014 | [Cable Master List - Data](https://netzpolitik.org/wp-upload/2014-11-Snowden-Cable-Master-List/data.pdf) | `Suddeutsche Zeitung`
November 20, 2014 | [Cables we do not currently have good access](https://netzpolitik.org/wp-upload/2014-11-Snowden-Cable-Master-List/no_current_access.pdf) | `Suddeutsche Zeitung`
November 20, 2014 | [Partner Cables](https://netzpolitik.org/wp-upload/2014-11-Snowden-Cable-Master-List/partner_cables.pdf) | `Suddeutsche Zeitung`
November 20, 2014 | [Regions](https://netzpolitik.org/wp-upload/2014-11-Snowden-Cable-Master-List/regions.pdf) | `Suddeutsche Zeitung`
November 20, 2014 | [Where we are](https://netzpolitik.org/wp-upload/2014-11-Snowden-Cable-Master-List/WHERE_WE_ARE.pdf) | `Suddeutsche Zeitung`
November 20, 2014 | [Where we want to be](https://netzpolitik.org/wp-upload/2014-11-Snowden-Cable-Master-List/WHERE_WE_WANT_TO_BE.pdf) | `Suddeutsche Zeitung`
November 20, 2014 | [How Vodafone-Subsidiary Cable & Wireless Aided GCHQ's Spying Efforts](http://international.sueddeutsche.de/post/103543418200/snowden-leaks-how-vodafone-subsidiary-cable) | `Suddeutsche Zeitung`
October 10, 2014 | [Core Secrets: NSA Saboteurs in China and Germany](https://firstlook.org/theintercept/2014/10/10/core-secrets/) | `Intercept`
October 10, 2014 | [Sentry Eagle Brief Sheet](https://firstlook.org/theintercept/document/2014/10/10/national-initiative-protection-program-sentry-eagle/) | `Intercept`
October 10, 2014 | [TAREX Classification Guide](https://firstlook.org/theintercept/document/2014/10/10/target-exploitation-classification-guide/) | `Intercept`
October 10, 2014 | [Exceptionally Controlled Information Listing](https://firstlook.org/theintercept/document/2014/10/10/nsa-exceptionally-controlled-information-listing-12-september-2003/) | `Intercept`
October 10, 2014 | [ECI WHIPGENIE Classification Guide](https://firstlook.org/theintercept/document/2014/10/10/eci-whipgenie-classification-guide/) | `Intercept`
October 10, 2014 | [ECI Pawleys Classification Guide](https://firstlook.org/theintercept/document/2014/10/10/nsa-classification-guide-eci-pawleys/) | `Intercept`
October 10, 2014 | [ECI Compartments](https://firstlook.org/theintercept/document/2014/10/10/eci-control-authorities/) | `Intercept`
October 10, 2014 | [CNO Core Secrets Slide Slices](https://firstlook.org/theintercept/document/2014/10/10/cno-core-secrets/) | `Intercept`
October 10, 2014 | [CNO Core Secrets Security Structure](https://firstlook.org/theintercept/document/2014/10/10/cno-core-secrets-security-structure/) | `Intercept`
October 10, 2014 | [Computer Network Exploitation Classification Guide](https://firstlook.org/theintercept/document/2014/10/10/computer-network-exploitation-classification-guide/) | `Intercept`
October 10, 2014 | [CNO Core Secrets](https://firstlook.org/theintercept/document/2014/10/10/cno-core-secrets-2/) | `Intercept`
September 15, 2014 | [Treasure Map Announces a New Release](https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/) | `Intercept`
September 15, 2014 | [Treasure Map Presentation](https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/) | `Intercept`
September 15, 2014 | [New Zealand Visit Precis](https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/) | `Intercept`
September 15, 2014 | [Key Activities In Progress](https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/) | `Intercept`
September 15, 2014 | [Speargun Phase One](http://www.spiegel.de/international/world/snowden-documents-indicate-nsa-has-breached-deutsche-telekom-a-991503.html) | `Der Spiegel`
September 15, 2014 | [Speargun Underway](http://www.spiegel.de/international/world/snowden-documents-indicate-nsa-has-breached-deutsche-telekom-a-991503.html) | `Der Spiegel`
September 5, 2014 | [Satellite Teleport Knowledge](http://www.spiegel.de/international/world/snowden-documents-indicate-nsa-has-breached-deutsche-telekom-a-991503.html) | `Der Spiegel`
August 31, 2014 | [Collaboration in Overdrive: A CNE Success (NSA)](http://www.spiegel.de/media/media-34650.pdf) | `Der Spiegel`
August 31, 2014 | [Turkey and the PKK (NSA)](http://www.spiegel.de/media/media-34651.pdf) | `Der Spiegel`
August 31, 2014 | [NCRs with Foreign Relations Missions Become 'SUSLAs' (NSA)](http://www.spiegel.de/media/media-34652.pdf) | `Der Spiegel`
August 31, 2014 | [SINIO Seminar: Turkish Presidential and Parliamentary Elections (NSA)](http://www.spiegel.de/media/media-34653.pdf) | `Der Spiegel`
August 31, 2014 | [NSA Intelligence Relationship with Turkey - Turkish National Intelligence Organization (MIT) and the Turkish Intelligence Directorate (SIB) (NSA)](http://www.spiegel.de/media/media-34654.pdf) | `Der Spiegel`
August 31, 2014 | [NSAs Oldest Third Party Partnership (NSA)](http://www.spiegel.de/media/media-34655.pdf) | `Der Spiegel`
August 31, 2014 | [Agenda 14-15 May 2013: Brigadier general XXXXXXX YYYY - Turkish Signal Intelligence Chief (NSA)](http://www.spiegel.de/media/media-34656.pdf) | `Der Spiegel`
August 31, 2014 | [SINIO Series of Strategic Intelligence Issue Seminars Begins with Tough Times for Turkey (NSA)](http://www.spiegel.de/media/media-34657.pdf) | `Der Spiegel`
August 31, 2014 | [JORDAN-BELGIUM (GCHQ)](http://www.spiegel.de/media/media-34658.pdf) | `Der Spiegel`
August 31, 2014 | [Load Sharing Carriers R.O.W. (via UK) in IRAQ plus RLEs (GCHQ)](http://www.spiegel.de/media/media-34659.pdf) | `Der Spiegel`
August 31, 2014 | [Turkey at the G20 Pre-Meeting in London September 2-5 2009 (GCHQ)](http://www.spiegel.de/media/media-34660.pdf) | `Der Spiegel`
August 31, 2014 | [MHS/GCHQ Projects - Turkey Energy Company Development (GCHQ)](http://www.spiegel.de/media/media-34661.pdf) | `Der Spiegel`
August 31, 2014 | [Kurdistan Regional Government (GCHQ)](http://www.spiegel.de/media/media-34662.pdf) | `Der Spiegel`
August 31, 2014 | [SINIO Seminar: Turkey and the Kurds (NSA)](http://www.spiegel.de/media/media-34649.pdf) | `Der Spiegel`
August 31, 2014 | [A Two-Faced Friendship: Turkey Is 'Partner and Target' for the NSA](http://www.spiegel.de/international/world/documents-show-nsa-and-gchq-spied-on-partner-turkey-a-989011.html) | `Der Spiegel`
August 25, 2014 | [CIA Colleagues Enthusiastically Welcome NSA Training](https://firstlook.org/theintercept/document/2014/08/25/cia-colleagues-enthusiastically-welcome-nsa-training) | `Intercept`
August 25, 2014 | [Sharing Communications Metadata Across the U.S. Intelligence Community](https://firstlook.org/theintercept/document/2014/08/25/sharing-communications-metadata-across-u-s-intelligence-community) | `Intercept`
August 25, 2014 | [CRISSCROSS/PROTON Point Paper](https://firstlook.org/theintercept/document/2014/08/25/crisscross-proton-point-paper) | `Intercept`
August 25, 2014 | [Decision Memorandum for the DNI on ICREACH](https://firstlook.org/theintercept/document/2014/08/25/decision-memorandum-dni-icreach) | `Intercept`
August 25, 2014 | [Metadata Sharing Memorandum](https://firstlook.org/theintercept/document/2014/08/25/metadata-sharing-memorandum-2005) | `Intercept`
August 25, 2014 | [Sharing SIGINT metadata on ICREACH](https://firstlook.org/theintercept/document/2014/08/25/sharing-sigint-metadata-icreach) | `Intercept`
August 25, 2014 | [Metadata Policy Conference](https://firstlook.org/theintercept/document/2014/08/25/metadata-policy-conference) | `Intercept`
August 25, 2014 | [ICREACH Wholesale Sharing](https://firstlook.org/theintercept/document/2014/08/25/icreach-wholesale-sharing-2007) | `Intercept`
August 25, 2014 | [Black Budget Extracts](https://firstlook.org/theintercept/document/2014/08/25/black-budget-extracts) | `Intercept`
August 25, 2014 | [The Surveillance Engine: How the NSA Built Its Own Secret Google](https://firstlook.org/theintercept/article/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton) | `Intercept`
August 12, 2014 | [HACIENDA Program](http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html) | `Heise`
August 5, 2014 | [GCHQ Covert Mobile Phones Policy](https://firstlook.org/theintercept/2014/08/12/nprs-dina-temple-raston-passed-cia-funded-nsa-contractor-independent-fear-monger-snowden-reporting/) | `Intercept`
August 3, 2014 | [Directorate of Terrorist Identities (DTI) Strategic Accomplishments 2013](https://firstlook.org/theintercept/article/2014/08/05/watch-commander/) | `Intercept`
August 3, 2014 | [Israel-US 1999 Agreement](https://firstlook.org/theintercept/2014/08/04/cash-weapons-surveillance/) | `Intercept`
July 25, 2014 | [NSA Intelligence Relationship With Israel](https://firstlook.org/theintercept/2014/08/04/cash-weapons-surveillance/) | `Intercept`
July 23, 2014 | [Saudi Arabia Information Paper](https://firstlook.org/theintercept/2014/07/25/nsas-new-partner-spying-saudi-arabias-brutal-state-police/) | `Intercept`
July 23, 2014 | [Signals Intelligence Authority Decision Tree](http://www.washingtonpost.com/blogs/the-switch/wp/2014/07/23/privacy-watchdogs-next-target-the-least-known-but-biggest-aspect-of-nsa-surveillance/) | `Washington Post`
July 14, 2014 | [GCHQ’s Joint Threat Research Intelligence Group](https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/) | `Intercept`
July 9, 2014 | [Spying on Muslim-American Leaders](https://firstlook.org/theintercept/article/2014/07/09/under-surveillance/) | `Intercept`
June 30, 2014 | [NSA document on targeting Five Eyes countries and territories](http://apps.washingtonpost.com/g/page/world/nsa-document-on-targeting-five-eyes-countries-and-territories/1142/) | `Washington Post`
June 30, 2014 | [DNI, attorney general certify surveillance targets 'reasonably believed' to be outside U.S.](http://apps.washingtonpost.com/g/page/world/dni-attorney-general-certify-surveillance-targets-will-be-reasonably-believed-to-be-outside-united-states/1134/) | `Washington Post`
June 30, 2014 | [FISA Amendments Act of 2008 Section 702 summary document](http://apps.washingtonpost.com/g/page/world/fisa-amendments-act-of-2008-section-702-summary-document/1141/) | `Washington Post`
June 30, 2014 | [NSA director Keith Alexander's Affidavit Regarding Spying on Foreign Entities](http://apps.washingtonpost.com/g/page/world/nsa-directors-affidavit-on-foreign-surveillance/1135/) | `Washington Post`
June 30, 2014 | [FISA Judge's Order Authorizing Surveillance of Foreign Entities ](http://apps.washingtonpost.com/g/page/world/fisa-judges-order-authorizing-surveillance-of-foreign-governments-and-organizations/1132/) | `Washington Post`
June 30, 2014 | [List of Foreign Entities Authorized for Surveillance](http://www.washingtonpost.com/world/national-security/court-gave-nsa-broad-leeway-in-surveillance-documents-show/2014/06/30/32b872ec-fae4-11e3-8176-f2c941cf35f1_story.html?hpid=z5) | `Washington Post`
June 30, 2014 | [ODNI Certification Regarding Foreign Entities](http://www.washingtonpost.com/world/national-security/court-gave-nsa-broad-leeway-in-surveillance-documents-show/2014/06/30/32b872ec-fae4-11e3-8176-f2c941cf35f1_story.html?hpid=z5) | `Washington Post`
June 30, 2014 | [Court gave NSA broad leeway in surveillance, documents show](http://www.washingtonpost.com/world/national-security/court-gave-nsa-broad-leeway-in-surveillance-documents-show/2014/06/30/32b872ec-fae4-11e3-8176-f2c941cf35f1_story.html) | `Washington Post`
June 18, 2014 | [Nostalgic recollections out of the NSA intranet from NSA workers formerly stationed in Bad Aibling](http://www.spiegel.de/media/media-34044.pdf) | `Der Spiegel`
June 18, 2014 | [Document excerpt on the sharing of the NSA spy tool XKeyscore with the Federal Office for the Protection of the Constitution (BfV), Germany’s domestic intelligence agency](http://www.spiegel.de/media/media-34045.pdf) | `Der Spiegel`
June 18, 2014 | [Secret document on the cooperation between the NSA, BND and BfV in the fight against terrorism](http://www.spiegel.de/media/media-34046.pdf) | `Der Spiegel`
June 18, 2014 | [Preliminary agenda of a meeting between high-ranking NSA and BND officials](http://www.spiegel.de/media/media-34116.pdf) | `Der Spiegel`
June 18, 2014 | [Briefing on the visit to the NSA of a high-ranking BND official](http://www.spiegel.de/media/media-34117.pdf) | `Der Spiegel`
June 18, 2014 | [Final agenda of a meeting between high-ranking NSA and BND officials](http://www.spiegel.de/media/media-34118.pdf) | `Der Spiegel`
June 18, 2014 | [Internal NSA presentation on the BND's organization](http://www.spiegel.de/media/media-34050.pdf) | `Der Spiegel`
June 18, 2014 | [Internal NSA discussion guidelines relating to cooperation with the BND and BfV](http://www.spiegel.de/media/media-34051.pdf) | `Der Spiegel`
June 18, 2014 | [Internal NSA discussion guidelines in preparation for a meeting with high-ranking BND officials](http://www.spiegel.de/media/media-34119.pdf) | `Der Spiegel`
June 18, 2014 | [Comprehensive internal summary of the history and current state of cooperation between the NSA and BND](http://www.spiegel.de/media/media-34053.pdf) | `Der Spiegel`
June 18, 2014 | [FAQs on the Boundless Informant program](http://www.spiegel.de/media/media-34054.pdf) | `Der Spiegel`
June 18, 2014 | [Boundless Informant statistics on Germany](http://www.spiegel.de/media/media-34055.pdf) | `Der Spiegel`
June 18, 2014 | [Boundless Informant overview (global)](http://www.spiegel.de/media/media-34058.pdf) | `Der Spiegel`
June 18, 2014 | [Boundless Informant statistics for so-called Third Parties, which includes Germany](http://www.spiegel.de/media/media-34059.pdf) | `Der Spiegel`
June 18, 2014 | [Boundless Informant statistics on data from "Foreign Partners"](http://www.spiegel.de/media/media-34060.pdf) | `Der Spiegel`
June 18, 2014 | [Overview of the use of Boundless Informant (world map)](http://www.spiegel.de/media/media-34061.pdf) | `Der Spiegel`
June 18, 2014 | [World map from the Boundless Informant program](http://www.spiegel.de/media/media-34062.pdf) | `Der Spiegel`
June 18, 2014 | [Zoom of a Boundless Informant document, with project names](http://www.spiegel.de/media/media-34064.pdf) | `Der Spiegel`
June 18, 2014 | [Agenda for the visit of BSI Vice President Andreas Könen to the NSA](http://www.spiegel.de/media/media-34067.pdf) | `Der Spiegel`
June 18, 2014 | [Report on the beginnings of the European Security Center (ESC) in the Dagger Complex](http://www.spiegel.de/media/media-34070.pdf) | `Der Spiegel`
June 18, 2014 | [Report on the changing of the ESC’s name to European Security Operations Center (ESOC)](http://www.spiegel.de/media/media-34072.pdf) | `Der Spiegel`
June 18, 2014 | [ESOC: Report on the experiences of one NSA worker](http://www.spiegel.de/media/media-34074.pdf) | `Der Spiegel`
June 18, 2014 | [Report on the changing of the ESOC’s name to European Cryptologic Center (ECC) including details on missions launched from there](http://www.spiegel.de/media/media-34076.pdf) | `Der Spiegel`
June 18, 2014 | [Report on an XKeyscore training session at the ECC / Dagger Complex](http://www.spiegel.de/media/media-34077.pdf) | `Der Spiegel`
June 18, 2014 | [Presentation on the spying program PRISM and ECC's participation](http://www.spiegel.de/media/media-34078.pdf) | `Der Spiegel`
June 18, 2014 | [NSA/CSS presentation on technical surveillance in Europe and Africa](http://www.spiegel.de/media/media-34079.pdf) | `Der Spiegel`
June 18, 2014 | [Report on an unexploded ordnance alarm at the European Technical Center in the Mainz-Kastel neighborhood of Wiesbaden](http://www.spiegel.de/media/media-34081.pdf) | `Der Spiegel`
June 18, 2014 | [Report on an NSA SIGDEV training course for allied countries](http://www.spiegel.de/media/media-34082.pdf) | `Der Spiegel`
June 18, 2014 | [Report on the technical expansion of the European Technical Center in the Mainz-Kastel neighborhood of Wiesbaden](http://www.spiegel.de/media/media-34083.pdf) | `Der Spiegel`
June 18, 2014 | [Report on the NSA-BND cooperation known as Joint SIGINT Activity (JSA)](http://www.spiegel.de/media/media-34084.pdf) | `Der Spiegel`
June 18, 2014 | [Report on the surveillance of African countries by JSA](http://www.spiegel.de/media/media-34085.pdf) | `Der Spiegel`
June 18, 2014 | [Restrictions on the technical surveillance performed by JSA](http://www.spiegel.de/media/media-34086.pdf) | `Der Spiegel`
June 18, 2014 | [Report on data exchange between the NSA and BND within the JSA framework](http://www.spiegel.de/media/media-34087.pdf) | `Der Spiegel`
June 18, 2014 | [Merkel in the database: Presentation from the Center for Content Extraction](http://www.spiegel.de/media/media-34089.pdf) | `Der Spiegel`
June 18, 2014 | [Report on the NSA’s access to TEMPORA](http://www.spiegel.de/media/media-34090.pdf) | `Der Spiegel`
June 18, 2014 | [Report on the work of NSA/CSS Europe, including the capture or killing of 40 terror suspects](http://www.spiegel.de/media/media-34091.pdf) | `Der Spiegel`
June 18, 2014 | [Guidelines for the classification of NSA SIGINT details (1945-1967)](http://www.spiegel.de/media/media-34093.pdf) | `Der Spiegel`
June 18, 2014 | [Slide: Worldwide locations of the Cryptologic Services Groups](http://www.spiegel.de/media/media-34094.pdf) | `Der Spiegel`
June 18, 2014 | [Slide: Worldwide locations of NSA/CSS satellite surveillance](http://www.spiegel.de/media/media-34095.pdf) | `Der Spiegel`
June 18, 2014 | [US sites with NSA personnel in Germany](http://www.spiegel.de/media/media-34096.pdf) | `Der Spiegel`
June 18, 2014 | [Logo of NSA-BND cooperation](http://www.spiegel.de/media/media-34088.pdf) | `Der Spiegel`
June 18, 2014 | [Explanation of Nymrod, a system for searching for people and places in databases and documents](http://www.spiegel.de/media/media-34097.pdf) | `Der Spiegel`
June 18, 2014 | [NSA presentation on the work of Nymrod](http://www.spiegel.de/media/media-34098.pdf) | `Der Spiegel`
June 18, 2014 | [Report on an NSA visit to the BND site in Schöningen and on data transfer from the BND to the NSA](http://www.spiegel.de/media/media-34099.pdf) | `Der Spiegel`
June 18, 2014 | [Presentation on the NSA/CIA unit Special Collection Service (SCS), active in US embassies around the world](http://www.spiegel.de/media/media-34100.pdf) | `Der Spiegel`
June 18, 2014 | [Report on the one-year anniversary of the NSA liaison unit SUSLAG at the new site in the Mangfall Kaserne in Bad Aibling](http://www.spiegel.de/media/media-34101.pdf) | `Der Spiegel`
June 18, 2014 | [Guidelines for the classification of SUSLAG details and the NSA-BND cooperation](http://www.spiegel.de/media/media-34102.pdf) | `Der Spiegel`
June 18, 2014 | [GCHQ report on the technical abilities of the powerful spying program TEMPORA, which allows for a "full take"](http://www.spiegel.de/media/media-34103.pdf) | `Der Spiegel`
June 18, 2014 | [Report on a WHARPDRIVE incident in an SSO presentation](http://www.spiegel.de/media/media-34104.pdf) | `Der Spiegel`
June 18, 2014 | [Details on XKeyscore from an internal GCHQ website](http://www.spiegel.de/media/media-34105.pdf) | `Der Spiegel`
June 18, 2014 | [Boundless Informant statistics on Great Britain](http://www.spiegel.de/media/media-34056.pdf) | `Der Spiegel`
June 18, 2014 | [European Technical Center: Report on the experiences of one NSA](http://www.spiegel.de/media/media-34080.pdf) | `Der Spiegel`
June 18, 2014 | [NSA/CSS Europe: Report on the experiences of one NSA worker](http://www.spiegel.de/media/media-34092.pdf) | `Der Spiegel`
June 18, 2014 | [The NSA in Germany: Snowden's Documents Available for Download](http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html) | `Der Spiegel`
June 18, 2014 | [Boundless Informant statistics on the UK](http://www.information.dk/databloggen/501278) | `Dagbladet`
June 18, 2014 | [Report on data exchange between the NSA and BND within the JSA framework](http://www.information.dk/databloggen/501278) | `Dagbladet`
June 18, 2014 | [Black Budget](http://www.information.dk/databloggen/501278) | `Dagbladet`
June 18, 2014 | [Keith Alexander Talking Points](http://www.information.dk/databloggen/501278) | `Dagbladet`
June 18, 2014 | [RAMPART-A Overview](http://www.information.dk/databloggen/501278) | `Dagbladet`
June 16, 2014 | [Analytics for targets in Europe](http://www.spiegel.de/fotostrecke/photo-gallery-the-nsa-s-german-presence-fotostrecke-115738-4.html) | `Der Spiegel`
June 10, 2014 | [Xkeyscore Fingerprints](http://www.spiegel.de/fotostrecke/photo-gallery-the-nsa-s-german-presence-fotostrecke-115738-2.html) | `Der Spiegel`
June 10, 2014 | [SANDKEY](https://www.eff.org/files/2014/06/10/dea-nsa-sandkey.pdf) | `Cryptome`
May 19, 2014 | [SOMALGET memo](https://firstlook.org/theintercept/document/2014/05/19/somalget-memo/) | `Intercept`
May 19, 2014 | [SIDToday: DEA – The "Other" Warfighter](https://firstlook.org/theintercept/document/2014/05/19/sidtoday-dea-warfighter/) | `Intercept`
May 19, 2014 | [SSO Dictionary Excerpt](https://firstlook.org/theintercept/document/2014/05/19/sso-dictionary-excerpt/) | `Intercept`
May 19, 2014 | [MYSTIC](https://firstlook.org/theintercept/document/2014/05/19/mystic/) | `Intercept`
May 19, 2014 | [SSO March 14, 2013](https://firstlook.org/theintercept/document/2014/05/19/sso-march-14-2013/) | `Intercept`
May 19, 2014 | [SSO April 18, 2013 – What's New](https://firstlook.org/theintercept/document/2014/05/19/sso-april-18-2013-whats-new/) | `Intercept`
May 19, 2014 | [SSO May 2, 2013](https://firstlook.org/theintercept/document/2014/05/19/sso-may-2-2013/) | `Intercept`
May 19, 2014 | [SSO May 3, 2013 – MYSTIC](https://firstlook.org/theintercept/document/2014/05/19/sso-may-3-2013-mystic/) | `Intercept`
May 19, 2014 | [SSO May 3, 2012](https://firstlook.org/theintercept/document/2014/05/19/sso-may-3-2012/) | `Intercept`
May 19, 2014 | [Black Budget Excerpt](https://firstlook.org/theintercept/document/2014/05/19/black-budget/) | `Intercept`
May 19, 2014 | [Data Pirates of the Caribbean: The NSA is Recording Every Cell Phone Call in the Bahamas](https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/) | `Intercept`
April 30, 2014| [No Place to Hide Documents](http://glenngreenwald.net/#BookDocuments) | `Glenn Greenwald`
April 30, 2014 | [Prism Olympics](https://firstlook.org/theintercept/article/2014/04/30/gchq-prism-nsa-fisa-unsupervised-access-snowden/) | `Intercept`
April 30, 2014 | [Ghostmachine](https://firstlook.org/theintercept/article/2014/04/30/gchq-prism-nsa-fisa-unsupervised-access-snowden/) | `Intercept`
April 30, 2014 | [GCHQ Visit](https://firstlook.org/theintercept/article/2014/04/30/gchq-prism-nsa-fisa-unsupervised-access-snowden/) | `Intercept`
April 4, 2014 | [GCHQ Full Spectrum Cyber Effects](https://firstlook.org/theintercept/2014/04/04/cuban-twitter-scam-social-media-tool-disseminating-government-propaganda/) | `Intercept`
April 4, 2014 | [2009 SIGDEV Conference](https://firstlook.org/theintercept/2014/04/04/cuban-twitter-scam-social-media-tool-disseminating-government-propaganda/) | `Intercept`
March 29, 2014 | [GCHQ and NSA Spy on Heads of State](http://www.spiegel.de/international/germany/gchq-and-nsa-targeted-private-german-companies-a-961444.html) | `Der Spiegel`
March 22, 2014 | [Operation Shotgiant Objectives](http://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html) | `NY Times`
March 21, 2014 | [French Intelligence E-Mail Spying Operation](http://www.lemonde.fr/international/article/2014/03/21/la-france-suspectee-de-cyberattaque_4387232_3210.html) | `Le Monde`
March 20, 2014 | [Targeting System Administrator Accounts to Access Networks](https://firstlook.org/theintercept/article/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/) | `Intercept`
March 18, 2014 | [Adding Another Country to Mystic Program](http://www.washingtonpost.com/world/national-security/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls/2014/03/18/226d2646-ade9-11e3-a49e-76adc9210f19_story.html) | `Washington Post`
March 18, 2014 | [Description of Data Collection Under Mystic](http://www.washingtonpost.com/world/national-security/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls/2014/03/18/226d2646-ade9-11e3-a49e-76adc9210f19_story.html) | `Washington Post`
March 18, 2014 | [Mystic Program](http://www.washingtonpost.com/world/national-security/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls/2014/03/18/226d2646-ade9-11e3-a49e-76adc9210f19_story.html) | `Washington Post`
March 15, 2014 | [How NSA Servers Masquerade In Order to Infect Target with Malware](https://firstlook.org/theintercept/document/2014/03/17/nsa-secretly-masqueraded-facebook-hack-computers-surveillance/) | `Intercept`
March 15, 2014 | [TURBINE Intelligence Command and Control](https://firstlook.org/theintercept/2014/03/15/nsa-facebook-malware-turbine-non-denial-denial/) | `Intercept`
March 13, 2014 | [NSA Cooperative Third Party Relationships](https://firstlook.org/theintercept/article/2014/03/13/nsa-elected-officials-foreign-countries-unaware-countries-cooperation-us/) | `Intercept`
March 12, 2014 | [TURBINE and TURMOIL](https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/) | `Intercept`
March 12, 2014 | [VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN](https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/) | `Intercept`
March 12, 2014 | [TURBINE Industrial Scale Exploitation](https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/) | `Intercept`
March 12, 2014 | [MHS Leverages XKeyscore for Quantum](https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/) | `Intercept`
March 12, 2014 | [Increasing Collection Capacity by Increasing Implants](https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/) | `Intercept`
March 12, 2014 | [Five Eyes Hacking Large Routers](https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/) | `Intercept`
March 12, 2014 | [NSA Technology Directorate Analysis of Converged Data](https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/) | `Intercept`
March 12, 2014 | [NSA Selector Types](https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/) | `Intercept`
March 12, 2014 | [Multiple Methods of Quantum](https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/) | `Intercept`
March 12, 2014 | [NSA Phishing Tactics and Man in the Middle Attacks](https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/) | `Intercept`
March 12, 2014 | [Quantum Insert Diagrams](https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/) | `Intercept`
March 12, 2014 | [The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics](https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/) | `Intercept`
March 11, 2014 | [NSA Timeline of Surveillance Law Developments](http://www.nytimes.com/2014/03/12/us/how-a-courts-secret-evolution-extended-spies-reach.html?_r=0) | `NY Times`
March 11, 2014 | [Classification Guide for FISA, the Protect America Act and the FISA Amendments Act ](http://www.nytimes.com/2014/03/12/us/how-a-courts-secret-evolution-extended-spies-reach.html?_r=0) | `NY Times`
March 11, 2014 | [Ashcroft Memo on Intelligence Sharing Procedures](http://www.nytimes.com/2014/03/12/us/how-a-courts-secret-evolution-extended-spies-reach.html?_r=0) | `NY Times`
March 11, 2014 | [NSA Memo Expands Access to FISA Information](http://www.nytimes.com/2014/03/12/us/how-a-courts-secret-evolution-extended-spies-reach.html?_r=0) | `NY Times`
March 11, 2014 | [Classification Guide for Stellarwind Program](http://www.nytimes.com/2014/03/12/us/how-a-courts-secret-evolution-extended-spies-reach.html?_r=0) | `NY Times`
March 7, 2014 | [NSA Ask Zelda - Guilty Until Proven Innocent](https://firstlook.org/theintercept/document/2014/03/07/guilty-proven-innocent/) | `Intercept`
March 7, 2014 | [NSA Ask Zelda - An Interview with Zelda](https://firstlook.org/theintercept/document/2014/03/07/an-interview-with-zelda/) | `Intercept`
March 7, 2014 | [NSA Ask Zelda - Is Bain de Soleil a Bane on the NSA](https://firstlook.org/theintercept/document/2014/03/07/bain-de-soleil-bane-nsa/) | `Intercept`
March 7, 2014 | [NSA Ask Zelda - Watching Every Word in Snitch City](https://firstlook.org/theintercept/document/2014/03/07/silenced-sid/) | `Intercept`
March 7, 2014 | [Ask Zelda - The NSA Has An Advice Columnist. Seriously.](https://firstlook.org/theintercept/article/2014/03/07/nsa-advice-columnist-seriously/) | `Intercept`
March 5, 2014 | [Dutch Shares Collected Anti-Piracy Information with NSA](http://www.nrc.nl/nieuws/2014/03/05/the-secret-role-of-the-dutch-in-the-american-war-on-terror/) | `NRC Handelsblad`
March 3, 2014 | [DOJ Report on Pen Register FISA Orders](http://epic.org/2014/03/in-foia-lawsuit-epic-obtains-s.html) | `EPIC`
February 27, 2014 | [GCHQ Optic Nerve](http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo) | `Guardian`
February 24, 2014 | [Training for Covert Online Operations](https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/) | `Intercept`
February 18, 2014 | [GCHQ SIGDEV](https://firstlook.org/theintercept/article/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/) | `Intercept`
February 18, 2014 | [Discovery Sigint Targeting Scenarios and Compliance](https://firstlook.org/theintercept/article/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/) | `Intercept`
February 15, 2014 | [SUSLOC Trade Document](http://www.nytimes.com/2014/02/16/us/document-describes-eavesdropping-on-american-law-firm.html) | `NY Times`
February 11, 2014 | [Drones Intercepting Communications](https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/) | `Intercept`
February 8, 2014 | [Boundless Nederland](http://electrospaces.blogspot.com/2014/02/boundlessinformant-metadata-collection.html) | `NRC Handelsblad`
February 7, 2014 | [GCHQ Honey Trap Cyber Attack - Background on JTRIG](http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-sex-dirty-tricks-n23091) | `NBC`
February 7, 2014 | [GCHQ Honey Trap Cyber Attack - Leveraging Foreign Journalists via JTRIG](http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-sex-dirty-tricks-n23091) | `NBC`
February 4, 2014 | [British Spies Attacked Hactivist Anonymous](http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361) | `NBC`
January 31, 2014 | [CSEC Airport WiFi Tracking](http://www.cbc.ca/news/politics/csec-used-airport-wi-fi-to-track-canadian-travellers-edward-snowden-documents-1.2517881) | `CBC`
January 30, 2014 | [COP15 Interception Document](http://www.information.dk/486360) | `Information DK`
January 30, 2014 | [COP15 Interception Document](http://www.information.dk/486360) | `Information DK`
January 28, 2014 | [Leaky Phone Apps](http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data) | `Guardian`
January 27, 2014 | [Converged Analysis on Smartphone Devices](http://investigations.nbcnews.com/_news/2014/01/27/22469304-snowden-docs-reveal-british-spies-snooped-on-youtube-and-facebook) | `NBC`
January 27, 2014 | [Squeaky Dolphin](http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html) | `NY Times`
January 27, 2014 | [Mobile Theme Briefing ](http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html) | `NY Times`
January 16, 2014 | [Dishfire Presentation](http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep) | `Guardian`
January 2, 2014 | [Quantum Computing](http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_story.html) | `Washington Post`
January 2, 2014 | [Quantum Computers Hard Targets](http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_story.html) | `Washington Post`
December 30, 2013 | [TAO Quantum Tasking](http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html) | `Der Spiegel`
December 30, 2013 | [TAO Intro](http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html) | `Der Spiegel`
December 30, 2013 | [QFIRE](http://cryptome.org/2013/12/nsa-catalog.zip) | `Jacob Appelbaum`
December 30, 2013 | [NSA ANT Catalog](http://www.spiegel.de/politik/deutschland/nsa-fdp-politiker-baum-fuer-eingreifen-des-generalbundesanwalts-a-941418.html) | `Der Spiegel`
December 30, 2013 | [TAO Quantum Theory](http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html) | `Der Spiegel`
December 29, 2013 | [Inside TAO: Documents Reveal Top NSA Hacking Unit](http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html) | `Der Spiegel`
December 29, 2013 | [TAO ANT Cottonmouth](http://cryptome.org/2013/12/nsa-tao-ant-pdf.pdf) | `Der Spiegel`
December 23, 2013 | [NSA/CSS Mission](http://www.washingtonpost.com/world/national%20-security/edward-snowden-after-months-of-nsa-revelations-says-his-missions-accomplished/2013/12/23/49fc36de-6c1c-11e3-a523-fe73f0ff6b8d_story.html) | `Washington Post`
December 11, 2013 | [Xkeyscore Sources](http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa) | `SVT`
December 11, 2013 | [Xkeyscore Sweden Meeting](http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa) | `SVT`
December 11, 2013 | [Quantum from GCHQ](http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa) | `SVT`
December 11, 2013 | [NSA Slides Xkeyscore](http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa) | `SVT`
December 11, 2013 | [Baltic Region](http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa) | `SVT`
December 11, 2013 | [Final Agenda Sweden USA](http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa) | `SVT`
December 11, 2013 | [Legal Issues UK Regarding Sweden and Quantum](http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa) | `SVT`
December 11, 2013 | [NSA Internal PM on FRA](http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa) | `SVT`
December 11, 2013 | [Accomplishments from NSA](http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa) | `SVT`
December 11, 2013 | [Sweden Neutral](http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa) | `SVT`
December 11, 2013 | [Xkeyscore Slide with Swedish Example](http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa) | `SVT`
December 10, 2013 | [Ghost Machine](http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/) | `Washington Post`
December 10, 2013 | [Target Location](http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/) | `Washington Post`
December 10, 2013 | [NSA CSEC Partnership](http://www.cbc.ca/news/politics/snowden-document-shows-canada-set-up-spy-posts-for-nsa-1.2456886) | `CBC`
December 10, 2013 | [Location Cookies](http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-targets-for-hacking/) | `Washington Post`
December 10, 2013 | [GSM Classification Guide](http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/) | `Washington Post`
December 10, 2013 | [Cotraveler Overview](http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/) | `Washington Post`
December 9, 2013 | [NSA Video Games Paper](http://www.nytimes.com/2013/12/10/world/spies-dragnet-reaches-a-playing-field-of-elves-and-trolls.html) | `NY Times`
December 5, 2013 | [Italy Spying](http://nsa.gov1.info/dni/) | `SVT`
December 5, 2013 | [FRA Russia](http://espresso.repubblica.it/inchieste/2013/12/05/news/revealed-how-the-nsa-targets-italy-1.144428) | `L'Espresso`
December 4, 2013 | [Chalkfun Foreignness](http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html) | `Washington Post`
December 4, 2013 | [Fascia](http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html) | `Washington Post`
December 2, 2013 | [G20 Summit](http://www.cbc.ca/news/politics/new-snowden-docs-show-u-s-spied-during-g20-in-toronto-1.2442448) | `CBC`
December 2, 2013 | [DSD Data](http://www.theguardian.com/world/2013/dec/02/revealed-australian-spy-agency-offered-to-share-data-about-ordinary-citizens) | `Guardian`
November 30, 2013 | [AIVD SIGINT](http://www.scribd.com/doc/188094600/CSEC-Presentation) | `Globe and Mail`
November 30, 2013 | [CSEC Brazil](http://issuu.com/pimvandendool/docs/document03?e=7781744/5822935) | `NRC Handelsblad`
November 26, 2013 | [Microsoft Cloud Exploitation](http://www.washingtonpost.com/business/technology/microsoft-suspecting-nsa-spying-to-ramp-up-efforts-to-encrypt-its-internet-traffic/2013/11/26/44236b48-56a9-11e3-8304-caf30787c0a9_story.html) | `Washington Post`
November 26, 2013 | [Microsoft Monkey Puzzle](http://www.washingtonpost.com/business/technology/microsoft-suspecting-nsa-spying-to-ramp-up-efforts-to-encrypt-its-internet-traffic/2013/11/26/44236b48-56a9-11e3-8304-caf30787c0a9_story.html) | `Washington Post`
November 26, 2013 | [Radicalizers Pornography](http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html?utm_hp_ref=tw#slide=3074349) | `Huffington Post`
November 23, 2013 | [SIGINT Strategy 2012](http://www.nytimes.com/2013/11/23/us/politics/nsa-report-outlined-goals-for-more-power.html) | `NY Times`
November 23, 2013 | [NSA Malware](http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/) | `NRC Handelsblad`
November 22, 2013 | [Boundless Informant](http://www.dagbladet.no/2013/11/22/nyheter/edward_snowden/utenriks/usa/nsa/30444117/) | `Dagbladet`
November 22, 2013 | [Boundless Informant FAQ](http://www.dagbladet.no/2013/11/22/nyheter/edward_snowden/utenriks/usa/nsa/30444117/) | `Dagbladet`
November 22, 2013 | [Afghanistan Collection](http://www.dagbladet.no/2013/11/22/nyheter/edward_snowden/utenriks/usa/nsa/30444117/) | `Dagbladet`
November 20, 2013 | [Collection, Processing and Dissemination of Allied Communications](http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-personal-data) | `Guardian`
November 19, 2013 | [Norway Collection](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [Interim Competency Test for Access to FISA Data](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [NSA Course Materials Module 5 v.24](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [Office of General Council Business Record Analyst Training Slides](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [NSA Course Materials Module 6 Analytic Personal v.18](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [NSA Cryptological School Course Slides on Legal, Compliance, and Minimization Procedures](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [NSA Course Materials Module 6 Tech Personnel v.25](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [NSA Guidance Memo on Legal Standards for Searching Bulk Metadata](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [United States Signals Intelligence Directive 18 Jan 25 2011](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [AG Guidelines for Domestic FBI Operations](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [United States Signals Intelligence Directive 18 Appendix J](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [NSA Core Intelligence Oversight Training](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [NSA Course Materials Intro v.13](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [NSA Course Materials Module 1 v.17](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [Verification Slide](http://www.dagbladet.no/2013/11/19/nyheter/pluss/edward_snowden/innenriks/snowden_i_norge/30338184/) | `Dagbladet`
November 19, 2013 | [NSA Course Materials Module 2 v.16](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [NSA Summary of Requirements for Collection of Bulk Metadata](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [NSA Course Materials Module 3 v.22](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [NSA Metadata Collection Training Slides](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 19, 2013 | [NSA Course Materials Module 4 v.28](http://icontherecord.tumblr.com/post/67419963949/dni-clapper-declassifies-additional-intelligence) | `US Government`
November 17, 2013 | [DSD 3G](http://www.theguardian.com/world/2013/nov/18/australia-tried-to-monitor-indonesian-presidents-phone) | `Guardian`
November 17, 2013 | [Royal Concierge ](http://www.spiegel.de/international/europe/gchq-monitors-hotel-reservations-to-track-diplomats-a-933914.html) | `Guardian`
November 4, 2013 | [Boundless Informant](http://www.elmundo.es/internacional/2013/11/04/52769eb561fd3d6d0a8b4582.html) | `El Mundo`
November 4, 2013 | [Info Sharing Partners](http://www.elmundo.es/internacional/2013/11/04/52769eb561fd3d6d0a8b4582.html) | `El Mundo`
November 4, 2013 | [Special Source Operations (SSO) Collection Optimization 'Midpoint' Slides - Google and Yahoo! exploitations ](http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/how-we-know-the-nsa-had-access-to-internal-google-and-yahoo-cloud-data/) | `Washington Post`
November 4, 2013 | [Special Source Operations (SSO) Intercept Program Slides -- cable programs, details of MUSCULAR](http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/how-we-know-the-nsa-had-access-to-internal-google-and-yahoo-cloud-data/) | `Washington Post`
November 4, 2013 | [WINDSTOP Collection 30 day period December 2012 - January 2013](http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/how-we-know-the-nsa-had-access-to-internal-google-and-yahoo-cloud-data/) | `Washington Post`
November 3, 2013 | [Collection Accesses 30 Nov 2009](http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html) | `NY Times`
November 3, 2013 | [NSA SIGINT Mission Strategic Plan 2008-2013 ](http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html) | `NY Times`
November 3, 2013 | [NSA SIGINT January 2007 Strategic Mission List](http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html) | `NY Times`
November 1, 2013 | [Corporate FAA Reporting Metrics](http://www.theguardian.com/world/2013/nov/01/nsa-data-collection-tech-firms) | `Guardian`
October 30, 2013 | [MUSCULAR slide 'Current Efforts on Google'](http://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html) | `Washington Post`
October 30, 2013 | [Slides on MUSCULAR program possibly from February 28, 2013](http://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html) | `Washington Post`
October 28, 2013 | [Graphic showing phone calls intercepted in Spain December 2012](http://www.elmundo.es/espana/2013/10/28/526dcbad61fd3d07678b456b.html) | `El Mundo`
October 27, 2013 | [NSA SCS Slides on embassy spying (slides 3-6)](http://www.spiegel.de/international/germany/cover-story-how-nsa-spied-on-merkel-cell-phone-from-berlin-embassy-a-930205.html) | `Der Spiegel`
October 25, 2013 | [Close Access Sigads September 10, 2010 (listing French Embassy)](http://www.lemonde.fr/technologies/article/2013/10/22/the-nsa-wiretapped-french-diplomats-in-the-us_3500733_651865.html) | `Le Monde`
October 25, 2013 | [Cable regarding cyber attacks on French Presidential Network April 12, 2013](http://www.lemonde.fr/technologies/article/2013/10/22/the-nsa-wiretapped-french-diplomats-in-the-us_3500733_651865.html) | `Le Monde`
October 24, 2013 | [NSA memo to Signals Intelligence Division (SID) staff October 27, 2006 regarding monitoring of phones of world leaders](http://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-calls) | `Guardian`
October 22, 2013 | [Prism April 2013](http://www.lemonde.fr/international/article/2013/10/24/affaire-prism-une-ligne-rouge-a-ete-franchie-denonce-la-cnil_3501948_3210.html) | `Le Monde`
October 21, 2013 | [NSA PRISM slide undated - alcatel / wanadoo](http://www.lemonde.fr/technologies/article/2013/10/21/france-in-the-nsa-s-crosshair-phone-networks-under-surveillance_3499741_651865.html) | `Le Monde`
October 21, 2013 | [Boundless Informant France](http://www.lemonde.fr/technologies/article/2013/10/21/france-in-the-nsa-s-crosshair-phone-networks-under-surveillance_3499741_651865.html) | `Le Monde`
October 20, 2013 | [NSA Cable dated November 10, 2010 discussing hacking of Mexican President's email](http://www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html) | `Der Spiegel`
October 14, 2013 | [Intellipedia entry - Special Source Organization (SSO) Collection Optimization Overview](http://www.washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html) | `Washington Post`
October 14, 2013 | [NSA Special Source Organization (SSO) Slides on Content Optimization - Address Books (SCISSORS)](http://www.washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html) | `Washington Post`
October 14, 2013 | [NSA Special Source Organization (SSO) slides on Content Acquisition Optimization](http://www.washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html) | `Washington Post`
October 6, 2013 | [Presentation on Brazilian Ministry of Mines and Energy](http://g1.globo.com/fantastico/noticia/2013/10/american-and-canadian-spies-target-brazilian-energy-and-mining-ministry.html) | `O Globo Fantastico`
October 4, 2013 | [Tor Stinks Presentation June 2012](http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption) | `Guardian`
October 4, 2013 | [Peeling Back the Layers of Tor with Egotistical Giraffe January 8, 2007](http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption) | `Guardian`
October 4, 2013 | [Types of IAT (how Tor works)](http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption) | `Guardian`
October 4, 2013 | [NSA Notes from talk on Tor by Roger Dingledine November 2007](http://articles.washingtonpost.com/2013-10-04/world/42704372_1_ramp-statistics-steganography) | `Washington Post`
October 4, 2013 | [NSA Cryptanalysis and Exploitation Services Report on TOR 2006](http://js.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html) | `Washington Post`
October 4, 2013 | [GCHQ Mullenize](http://js.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html) | `Washington Post`
September 28, 2013 | [NSA memo from January 3, 2011 on contact chaining](http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html) | `NY Times`
September 28, 2013 | [Slide on contact chaining (SYANPSE)](http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html) | `NY Times`
September 20, 2013 | [GCHQ Slides on Belgacom](http://www.spiegel.de/international/europe/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html) | `Der Spiegel`
September 16, 2013 | [NSA Network Analysis Center 2010 SIGDEV Conference on credit card authorization network mapping](http://www.spiegel.de/international/world/how-the-nsa-spies-on-international-bank-transactions-a-922430.html) | `Der Spiegel`
September 11, 2013 | [Israel Sharing](http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents) | `Guardian`
September 9, 2013 | [NSA slides on smartphones](http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security) | `Der Spiegel`
September 8, 2013 | [Stormbrew TV](http://g1.globo.com/fantastico/noticia/2013/09/nsa-documents-show-united-states-spied-brazilian-oil-giant.html) | `O Globo Fantastico`
September 8, 2013 | [NSA slides on Petrobras and private networks](http://g1.globo.com/fantastico/noticia/2013/09/nsa-documents-show-united-states-spied-brazilian-oil-giant.html) | `O Globo Fantastico`
September 5, 2013 | [NSA Classification Guide for Cryptanalysis from September 13, 2005](http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security) | `Guardian`
September 5, 2013 | [NSA SIGINT Enabling Project Description - engaging companies to covertly leverage product designs (no date)](http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security) | `Guardian`
September 5, 2013 | [Project Bullrun Description June 16, 2010](http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security) | `Guardian`
September 3, 2013 | [SATC slides Mexico and Brazil Case Studies](http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html) | `O Globo Fantastico`
September 1, 2013 | [NSA document dated June 2010 (not released) discussing targeting of French Foreign Ministry](http://www.spiegel.de/international/world/nsa-targeted-french-foreign-ministry-a-919693.html) | `Der Spiegel`
August 31, 2013 | [NSA document dated March 23, 2006 (not released) showing that Al Jazeera was surveilled](http://www.spiegel.de/international/world/nsa-spied-on-al-jazeera-communications-snowden-document-a-919681.html) | `Der Spiegel`
August 30, 2013 | [FY 2013 Congressional Budget Summary February 2012 National Intelligence Program Summary ('black budget')](http://www.washingtonpost.com/world/national-security/black-budget-summary-details-us-spy-networks-successes-failures-and-objectives/2013/08/29/7e57bb78-10ab-11e3-8cdd-bcdc09410972_story.html) | `Washington Post`
August 23, 2013 | [Prism Payments](http://www.theguardian.com/world/2013/aug/23/nsa-prism-costs-tech-companies-paid) | `Guardian`
August 16, 2013 | ['So You Got a US Person?' training slide November 8, 2011](http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story.html) | `Washington Post`
August 16, 2013 | [NSA Signals Intelligence Division (SID) Oversight and Compliance Report May 31, 2012 discussing privacy violations for the preceding year](http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story.html) | `Washington Post`
August 16, 2013 | [NSA Special Source Organization (SSO) news article from October 12, 2011 discussing FISC ruling holding NSA surveillance unconstitutional](http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story.html) | `Washington Post`
August 16, 2013 | [NSA Targeting Analyst Rationale slides (undated)](http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story.html) | `Washington Post`
August 9, 2013 | [NSA Special Source Organization (SSO) glossary on Section 702](http://www.theguardian.com/world/2013/aug/09/nsa-loophole-warrantless-searches-email-calls) | `Guardian`
July 31, 2013 | [NSA Xkeyscore Training Slides Feb 25, 2008](http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data) | `Guardian`
July 10, 2013 | [PRISM slides (Updated) ](http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/) | `Washington Post`
June 30, 2013 | [Dropmire](http://www.theguardian.com/world/2013/jun/30/nsa-leaks-us-bugging-european-allies) | `Guardian`
June 29, 2013 | [PRISM slides ](http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/) | `Washington Post`
June 27, 2013 | [NSA OIG Working Draft Report from March 24, 2009 on Stellar Wind (PSP)](http://www.theguardian.com/world/2013/jun/27/nsa-data-mining-authorised-obama) | `Guardian`
June 27, 2013 | [DOJ Memo from November 20, 2007 Proposing Amendment to DOD procedures to allow NSA to do contact chaining of metadata related to US Persons](http://www.theguardian.com/world/2013/jun/27/nsa-data-mining-authorised-obama) | `Guardian`
June 20, 2013 | [Procedures Used by NSA for Targeting Non-US Persons Reasonably Believed to Be Outside the US to Acquire Foreign Intelligence Pursuant to 702 FISC July 29, 2009](http://www.theguardian.com/world/2013/jun/20/fisa-court-nsa-without-warrant) | `Guardian`
June 20, 2013 | [Minimization Procedures used by NSA in Connection with Data Acquisitions Pursuant to 702 FISC July 29, 2009](http://www.theguardian.com/world/2013/jun/20/fisa-court-nsa-without-warrant) | `Guardian`
June 8, 2013 | [PRISM/Upstream explanation slides ](http://www.theguardian.com/world/2013/jun/08/nsa-surveillance-prism-obama-live#block-51b36893e4b0cc6424372292) | `Guardian`
June 8, 2013 | [Boundless Informant Introduction Slides July 13, 2012](http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining) | `Guardian`
June 8, 2013 | [Boundless Informant Explanation/FAQ Slides September 6, 2012](http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining) | `Guardian`
June 6, 2013 | [PRISM slides ](http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/) | `Washington Post`
June 6, 2013 | [NSA collecting phone records of millions of Verizon customers daily](http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order) | `Guardian`
June 6, 2013 | [Verizon Foreign Intelligence Surveillance Court Order](http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order) | `Guardian`