The Snwden Files





Title Creating Agency Date Created Classification Surveillance Program Genre Date Published Journalist(s) Originating News Outlet
Events Product Centre Government Communications Headquarters (GCHQ)ca.2015-09-25SECRET / STRAP 1SOCIAL ANTHROPOID : GUIDING LIGHT : SAMUEL PEPYSPresentation slides : 37 p.2010-11Ryan GallagherThe Intercept
Getting Close to the Adversary : Forward-based Defense with QFIRE National Security Agency - Technology Directorate2011-06-03Top Secret : Classified / 5VEYQUANTUMTHEORY : QFIREPresentation slides : 16 p.2013-12-30UnknownDer Spiegel
NSA QUANTUM Tasking Techniques National Security Agency - Office of SIGINT Developmentca.2013Top Secret : SI / 5VEYQUANTUM : FOXACIDPresentation slides : 28 p.2013-12-30Jacob Appelbaum : Marcel Rosenbach : Jorg Schindler : Holger Stark : Christian StockerDer Spiegel
Ant Catalog National Security Agency - Tailored Access Operations2006-08-20Secret : COMINT / 5VEYANT DivisionProduct catalog : 48 p.2013-12-30Jacob Appelbaum : Judith Horchert : Christian StockerJacob Appelbaum
Tailored Access Operations National Security Agency - Tailored Access Operationsca.2008-11-03Top Secret : COMINT / 5VEYWHITETAMALE : FOXACID : QUANTUMPresentation slides : 17 p.2013-12-30UnknownDer Spiegel
Tailored Access Operations : QUANTUMTHEORY National Security Agency - Tailored Access Operationsca.2013Top Secret : SI : COMINT / NOFORNQUANTUM : FOXACID : VALIDATOR : OLYMPUSFIREPresentation Slides: 14 p.2013-12-30Severin WeilandDer Spiegel
NSA - CSS Mission: PROVIDE AND PROTECT VITAL INFORMATION FOR THE NATION National Security Agencyca.2001-10Top Secret : COMINT : X1 / NOFORNGeneral intelligencePresentation slides : 3 p.2013-12-23Barton GellmanThe Washington Post
XKEYSCORE - Swedish Example National Security Agencyca.2009-01-20Unclassified / UnknownXKEYSCORETeaching materials : 1 p.2013-12-11Gunnar RensfeldtSVT
TOR Log National Security Agencyca.2008Secret : COMINT / 5VEYXKEYSCORE : MARINA : PINWALEPresentation slides : 3 p.2013-12-11Gunnar RensfeldtSVT
SWEDUSA 2013 Strategic Planning Conference (SPC) National Security Agencyca.2013-03-24Top Secret : COMINT / NOFORNGeneral intelligenceMemo : 5 p.2013-12-11Gunnar RensfeldtSVT
NSA's relationship with the FRA National Security Agency2013Top Secret : SI / NOFORNGeneral intelligenceMemo : 1 p.2013-12-11Gunnar RensfeldtSVT
The SE NEUTRAL Agreement National Security Agencyca.2006-06-06Top Secret : SI / UnknownGeneral intelligenceMemo : 1 p.2013-12-11Gunnar RensfeldtSVT
NSA Intelligence Relationship with Sweden National Security Agency2013-03-18Top Secret : COMINT / NOFORNGeneral intelligenceMemo : 1 p.2013-12-11Gunnar RensfeldtSVT
XKEYSCORE Data Sources National Security Agencyca.2010Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 1 p.2013-12-11Gunnar RensfeldtSVT
QUANTUM Memo Government Communications Headquarters (GCHQ)ca.2012Unknown / UnknownQUANTUM : SOUNDERPresentation slides : 1 p.2013-12-11Gunnar RensfeldtSVT
SWEDUSA 2013 Final Agenda National Security Agency2013-03-23Top Secret : SI / NOFORNXKEYSCORE : QUANTUM : TURTLEPOWER : TURMOIL : WINTERLIGHTMeeting agenda : 8 p.2013-12-11Gunnar RensfeldtSVT
Select Accomplishments: Production National Security Agencyca.2013-03Top Secret : COMINT / 5VEYQUANTUMPresentation slides : 2 p.2013-12-11Gunnar RensfeldtSVT
SID's Goals for this Quarterly National Security Agency - Signals Intelligence Directorateca.2013-03Top Secret : SI / NOFORNGeneral intelligencePresentation notes : 1 p.2013-12-11Gunnar RensfeldtSVT
Summary of DNR and DNI Co-Travel Analytics National Security Agency2012-10-01Top Secret : COMINT / 5VEYCO - TRAVELER : CHALKFUN : FASCIAReport : 24 p.2013-12-10Ashkan Soltani : Barton GellmanThe Washington Post
SSO GHOSTMACHINE Analytics National Security Agencyca.2010Top Secret : COMINT / NOFORNGHOSTMACHINE : FASCIA : TUSKATTIRE : JUGGERNAUTPresentation slides : 4 p.2013-12-10Ashkan Soltani : Barton GellmanThe Washington Post
Signal - Surveillance Success Stories National Security Agencyca.2013-03Secret : SI / 5VEYHAPPYFOOTPresentation Slides 4 p.2013-12-10Ashkan Soltani : Andrea Peterson : Barton GellmanThe Washington Post
GSM Classification Guide National Security Agency2012Top Secret : COMINT / 5VEYGSM Surveillance Programs : CHALKFUN : FASCIAClassification guide : 2 p.2013-12-10Ashkan Soltani : Barton GellmanThe Washington Post
NSA Intelligence Relationship with Canada's Communications Security Establishment Canada (CSEC) National Security Agency2013-03-03Top Secret : SI / 5VEYGeneral intelligenceMemo : 2 p.2013-12-09Greg Weston : Glenn Greenwald : Ryan GallagherCBC
Games : A Look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities Government Communications Headquarters (GCHQ)2007-01-08Top Secret : Classified / 5VEYVideo Game Surveillance ProgramsReport : 3 p.2013-12-09Mark Mazzetti : Justin ElliottThe New York Times
NSA Intelligence Relationship with Sweden National Security Agency2013-03-18Top Secret : COMINT / NOFORNDiplomatic Surveillance ProgramsReport : 2 p.2013-12-05Ryan Gallagher : Glenn GreenwaldSVT
Boundless Informant : Italy , Dec 18 - 24 2012 National Security Agency2012-12-24Unknown / UnknownBOUNDLESS INFORMANTReport : 4 p.2013-12-05Glenn Greenwald : Stefania Maurizil'Espresso
FASCIA : Example of Current Volumes and Limits National Security Agencyca.2012-05-06Top Secret : COMINT / 5VEYFASCIA : CHALKFUNPresentation slides : 2 p.2013-12-04Barton Gellman : Ashkan SoltaniThe Washington Post
Target Location Issues National Security Agencyca.2011Top Secret : SI / NOFORNGeneral intelligenceTeaching materials : 1 p.2013-12-04Ashkan Soltani : Barton GellmanThe Washington Post
CHALKFUN Foreignness Determination National Security Agency2009-02Unknown / UnknownCHALKFUN : FASCIATeaching materials : 1 p.2013-12-04Barton Gellman : Ashkan SoltaniThe Washington Post
DSD CSEC Surveillance Agreement Defence Signals Directorate (DSD / ASD)2007-01-08Secret / UnknownAustralian - Canadian Communications Intelligence AgreementReport : 4 p.2013-12-02Ewen MacAskill : James Ball : Katharine MurphyThe Guardian
And They Said To The Titans: "Watch Out Olympians In The House" (sic) Communications Security Establishment Canada2012-06Top Secret : SI / UnknownOLYMPIAPresentation slides : 19 p.2013-11-30Colin Freeze : Glenn GreenwaldThe Globe and Mail
NSA Lends Support to Upcoming G8 and G20 Summits in Canada National Security Agency - Signals Intelligence Directorate2010-06-23Top Secret : SI : TK / 5VEY2010 G8 Summit SIGINT Operations : 2010 G20 Summit SIGINT OperationsReport : 4 p.2013-11-27Greg Weston : Glenn GreenwaldCBC
Memo : Islamic Radicalization National Security Agency2013-10-03Top Secret : SI / 5VEYUnknownMemo : 7 p.2013-11-26Glenn Greenwald : Ryan Grim : Ryan GallagherThe Huffington Post
RE: MUSCULAR and realms Government Communications Headquarters (GCHQ) - TDB : Residential Contractor2009-11-24Unknown / UnclassifiedMUSCULAR : MONKEY PUZZLECorrespondence : 1 p.2013-11-26Craig Timberg : Barton Gellman : Ashkan SoltaniThe Washington Post
Serendipity Briefing Slides National Security Agency - Special Source Operationsca.2012Top Secret : SI / NOFORNSERENDIPITYPresentation slides : 3 p.2013-11-26Craig Timberg : Barton Gellman : Ashkan SoltaniThe Washington Post
SIGINT Strategy National Security Agency2012-02-23Top Secret : SI / 5VEYSIGINT ProgramsReport : 5 p.2013-11-23James Risen : Laura PoitrasThe New York Times
Driver 1: Worldwide SIGINT-Defense Cryptologic Platform National Security Agencyca.2012Top Secret : COMINT / 5VEYComputer Network Exploitation (CNE)Presentation slides : 1 p.2013-11-23Floor Boon : Steven Derix : Huib ModderkolkNRC
BOUNDLESSINFORMANT - Frequently Asked Questions National Security Agency2012-09-06Unclassified / FOUOBOUNDLESS INFORMANTFactsheet : 3 p.2013-11-22Glenn GreenwaldDagbladet
BOUNDLESSINFORMANT : Describing Mission Capabilities from Metadata Records National Security Agency - Global Access Operationsca.2012-07-13Top Secret : SI / NOFORNBOUNDLESS INFORMANTPresentation slides : 8 p.2013-11-22Glenn GreenwaldDagbladet
Boundless Informant : Afghanistan , Dec 10 2012 - Jan 8 2013 National Security Agency2013-01-08Unknown / UnknownBOUNDLESS INFORMANTReport : 1 p.2013-11-22Glenn GreenwaldDagbladet
British - U.S. Communications Intelligence Agreement Memo National Security Agencyca.2005Secret : SI / NOFORNBritish - U.S. Communications Intelligence AgreementMemo : 4 p.2013-11-20James BallThe Guardian
Legal Compliance and U.S. Persons Minimization Procedures National Security Agency - Signals Intelligence Directorate2011-01-25Unclassified / UnclassifiedGeneral intelligenceMemo : 52 p.2013-11-19James R. Clapper U.S. Government (Office of Director of National Intelligence)
Welcome to OVSC2104 : Business Records (BR) FISA National Security Agency - Office of General Counsel2007-01-08Unclassified / UnclassifiedBulk Electronic Communications Metadata ProgramTeaching materials : 18 p.2013-11-19James R. Clapper U.S. Government (Office of Director of National Intelligence)
NSA Core Intelligence Oversight Training National Security Agency2007-01-08Secret : COMINT / UnknownGeneral intelligenceTeaching materials : 141 p.2013-11-19James R. Clapper U.S. Government (Office of Director of National Intelligence)
Welcome to OVSC1205 National Security Agency2009-07-11Unclassified / UnclassifiedOVSC1205: Special Training on FISA (Analytical) : OVSC2106: Special Training on FISA (Technical) : Bulk Electronic Communications Metadata ProgramTeaching materials : 7 p.2013-11-19James R. Clapper U.S. Government (Office of Director of National Intelligence)
Boundless Informant : Norway , Dec 10 2012 - Jan 8 2013 National Security Agency2013-01-08Unknown / UnknownBOUNDLESS INFORMANTReport : 1 p.2013-11-19Glenn Greenwald : Arne Halvorsen : Kjetil Magne Sorenes : Tore Bergsaker : Bjorn S. Kristiansen : Torgeir P. Krokfjord : Gunnar Hultgreen : Anne Marte Blindheim : Morten StrandDagbladet
The Analytical Work Role National Security Agency2011-10-17Unclassified / UnclassifiedOVSC1205: Special Training on FISA (Analytical) : OVSC2106: Special Training on FISA (Technical) : Bulk Electronic Communications Metadata ProgramTeaching materials : 12 p.2013-11-19James R. Clapper U.S. Government (Office of Director of National Intelligence)
The Attorney General's Guidelines for Domestic FBI Operations Attorney General of the United States2008-09-29Secret / NOFORNGeneral intelligenceReport : 48 p.2013-11-19James R. Clapper U.S. Government (Office of Director of National Intelligence)
Cryptological School Course on Legal, Compliance and Minimization Procedures National Security Agency - Office of General Counselca.2009-08Unclassified / UnclassifiedGeneral intelligenceTeaching materials : 133 p.2013-11-19James R. Clapper U.S. Government (Office of Director of National Intelligence)
The Technical Work Role National Security Agency2011-10-13Unclassified / UnclassifiedOVSC1205: Special Training on FISA (Analytical) : OVSC2106: Special Training on FISA (Technical) : Bulk Electronic Communications Metadata ProgramTeaching materials : 31 p.2013-11-19James R. Clapper U.S. Government (Office of Director of National Intelligence)
Memorandum for the Deputy Program Manager for Counterterrorism Special Projects, Analysis and Production Attorney General of the United States2008-08-29Unclassified / UnclassifiedBulk Electronic Communications Metadata ProgramMemo : 17 p.2013-11-19James R. Clapper U.S. Government (Office of Director of National Intelligence)
USSID 18 - Procedures for Monitoring Radio Communications of Suspected International Narcotics Traffickers National Security Agency - Signals Intelligence Directorate1986-04-24Unclassified / UnclassifiedGeneral intelligenceMemo : 8 p.2013-11-19James R. Clapper U.S. Government (Office of Director of National Intelligence)
Verification Requirement National Security Agencyca.2010-01Unclassified / UnclassifiedBulk Electronic Communications Metadata ProgramPresentation slides : 1 p.2013-11-18James R. Clapper U.S. Government (Office of Director of National Intelligence)
Establishing Reasonable Articulable Suspicion (RAS) National Security Agency2011-11-17Unknown / UnclassifiedOVSC1205: Special Training on FISA (Analytical) : OVSC2106: Special Training on FISA (Technical) : Bulk Electronic Communications Metadata ProgramTeaching materials : 17 p.2013-11-18James R. Clapper U.S. Government (Office of Director of National Intelligence)
Access, Sharing, Dissemination, and Retention Under the BR and PR-TT FISC Orders National Security Agency2010-10-17Unclassified / UnclassifiedOVSC1205: Special Training on FISA (Analytical) : OVSC2106: Special Training on FISA (Technical)Teaching materials : 41 p.2013-11-18James R. Clapper U.S. Government (Office of Director of National Intelligence)
3G : Impact and update Defence Signals Directorate (DSD / ASD)ca.2009-11Top Secret : COMINT / UnknownDiplomatic Surveillance ProgramsPresentation slides : 6 p.2013-11-18Ewen MacAskill : Lenore TaylorThe Guardian
The Analytical and Technical Work Roles National Security Agency2011-10-06Unclassified / UnclassifiedOVSC1205: Special Training on FISA (Analytical) : OVSC2106: Special Training on FISA (Technical) : Bulk Electronic Communications Metadata ProgramTeaching materials : 10 p.2013-11-18James R. Clapper U.S. Government (Office of Director of National Intelligence)
Business Records (BR) FISA- Course Welcome National Security Agency2001-01-08Unclassified / UnclassifiedOVSC1205: Special Training on FISA (Analytical) : OVSC2106: Special Training on FISA (Technical) : Bulk Electronic Communications Metadata ProgramTeaching materials : 40 p.2013-11-18James R. Clapper U.S. Government (Office of Director of National Intelligence)
Business Records (BR) and Pen Register Tap and Trace (PR-TT) Bulk Metadata Programs National Security Agency2011-09-07Unclassified / UnclassifiedOVSC1205: Special Training on FISA (Analytical) : OVSC2106: Special Training on FISA (Technical) : Bulk Electronic Communications Metadata ProgramTeaching materials : 14 p.2013-11-18James R. Clapper U.S. Government (Office of Director of National Intelligence)
Interim Competency Test for Access to BR FISA Data National Security Agency2007-01-08Top Secret : COMINT / UnknownGeneral intelligenceTeaching materials : 3 p.2013-11-18James R. Clapper U.S. Government (Office of Director of National Intelligence)
FISA Business Records Telephony Metadata Collection National Security Agency - Office of General Counsel2004-11-23Unclassified / UnclassifiedBulk Electronic Communications Metadata ProgramReport : 3 p.2013-11-18James R. Clapper U.S. Government (Office of Director of National Intelligence)
Business Records (BR) and Pen Register Tap and Trace (PR-TT) Metadata National Security Agency2011-10-11Unclassified / UnclassifiedOVSC1205: Special Training on FISA (Analytical) : OVSC2106: Special Training on FISA (Technical) : Bulk Electronic Communications Metadata ProgramTeaching materials : 12 p.2013-11-18James R. Clapper U.S. Government (Office of Director of National Intelligence)
Contact mapping - tip-off to Diplomatic travel plans Government Communications Headquarters (GCHQ) - Office of SIGINT Developmentca.2010-01Top Secret : COMINT / 5VEYROYAL CONCIERGEPresentation slides : 2 p.2013-11-17Laura Poitras : Marcel Rosenbach : Holger StarkDer Spiegel
BOUNDLESSINFORMANT : Describing Mission Capabilities from Metadata Records National Security Agency - Global Access Operations2012-07-13Top Secret : SI / NOFORNBOUNDLESS INFORMANTPresentation slides : 8 p.2013-11-04German ArandaEl Mundo
Windstop : Dec 10 2012 - Jan 08 2013 National Security Agency2013-01-08Unknown / UnknownWINDSTOP : MUSCULAR : TURMOIL : INCENSERReport : 1 p.2013-11-04Barton Gellman : Ashkan Soltani : Andrea PetersonThe Washington Post
Sharing Computer Network Operations Cryptologic Information With Foreign Partners National Security Agencyca.2009-01Secret : COMINT / NOFORNGeneral intelligenceReport : 1 p.2013-11-04German ArandaEl Mundo
SSO Collection Optimization National Security Agency - Special Source Operationsca.2012-01Top Secret : SI / NOFORNMUSCULARPresentation slides : 6 p.2013-11-04Barton Gellman : Ashkan Soltani : Andrea PetersonThe Washington Post
Special Source Operations: The Cryptologic Provider of Intelligence from Global High-Capacity Telecommunications Systems National Security Agency - Special Source Operationsca.2010-01Top Secret : COMINT / NOFORNMUSCULAR : WINDSTOP : INCENSER : TURMOILPresentation slides : 7 p.2013-11-04Barton Gellman : Ashkan Soltani : Andrea PetersonThe Washington Post
Collection Accesses : 30 Nov - 06 Dec 2009 National Security Agency2009-12-06Top Secret : COMINT / 5VEYGeneral intelligenceReport : 1 p.2013-11-02Scott ShaneThe New York Times
SIGINT Mission Strategic Plan FY2008-2013 National Security Agency2007-10-03Top Secret : COMINT / 5VEYGeneral intelligenceReport : 11 p.2013-11-02Scott ShaneThe New York Times
United States SINGINT System January 2007 Strategic Mission List National Security Agencyca.2007-01Secret : COMINT / REL USA, AUS, CAN, GBRGeneral intelligenceReport : 9 p.2013-11-02Scott ShaneThe New York Times
Corporate FAA Reporting Metrics National Security Agency - Special Source Operationsca.2010-06-03Top Secret : COMINT / NOFORNGeneral intelligenceReport : 1 p.2013-11-01Ewen MacAskill : Dominic RusheThe Guardian
MUSCULAR : Current Efforts - Google National Security Agency - Special Source Operationsca.2013-02-28Top Secret : SI / NOFORNMUSCULAR : INCENSER : TURMOIL : WINDSTOPPresentation slides : 1 p.2013-10-30Barton Gellman : Ashkan SoltaniThe Washington Post
WINDSTOP-2P System Highlights National Security Agency - Special Source Operations2013-02-28Secret : SI / REL USA, GBRMUSCULAR : WINDSTOP : INCENSER : TURMOILPresentation slides : 3 p.2013-10-30Barton Gellman : Ashkan SoltaniThe Washington Post
Boundless Informant : Spain , Dec 10 2012 - Jan 8 2013 National Security Agency2012-01-08Unknown / UnknownBOUNDLESS INFORMANTReport : 1 p.2013-10-28Glenn Greenwald : German ArandaEl Mundo
EINSTEIN - CASTANET National Security Agencyca.2010-01Top Secret : COMINT / 5VEYSTATEROOM : EINSTEIN : CASTANETPresentation slides : 4 p.2013-10-27UnknownDer Spiegel
Customers Can Help SID Obtain Targetable Phone Numbers National Security Agency - Signals Intelligence Directorateca.2006-10-27Classified / UnknownDiplomatic Surveillance ProgramsReport : 1 p.2013-10-25James BallThe Guardian
Close Access SIGADS National Security Agency - Tailored Access Operations2010-09-10Top Secret : COMINT / NOFORNBLACKFOOT : WABASH : DROPMIRE : GENIEMemo : 2 p.2013-10-25Jacques FollorouLe Monde
April 12 2013 French Presidential Networks Cyberattacks Briefing Agenda National Security Agencyca.2013-04-12Top Secret : SI / NOFORNUnknownMeeting agenda : 4 p.2013-10-22Jacques FollorouLe Monde
PRISM-US-984XN Overview: The SIGAD Used Most in NSA Reporting National Security Agency - Special Source Operationsca.2013-04Top Secret : SI : ORCON / NOFORNPRISMPresentation slides : 11 p.2013-10-21Jacques Follorou : Glenn GreenwaldLe Monde
PRISM - Some Higher Volume Domains Collected from FAA Passive National Security Agency - Special Source Operationsca.2013-04Top Secret : SI / NOFORNPRISMPresentation slides : 1 p.2013-10-21Jacques Follorou : Glenn GreenwaldLe Monde
Boundless Informant : France, December 10 2012 - January 8 2013 National Security Agencyca.2013-01Unknown / UnknownUS-985DReport : 1 p.2013-10-21Jacques Follorou : Glenn GreenwaldLe Monde
Computer-Network Exploitation Successes South of the Border National Security Agency - Special Source Operations2010-11-15Top Secret : SI / RELFLATLIQUIDMemo : 1 p.2013-10-20Jens Glusing : Laura Poitras : Marcel Rosenbach : Holger StarkDer Spiegel
SSO Acquisition Optimization National Security Agency - Special Source Operationsca.2012-08Top Secret : SI / NOFORNSCISSORSPresentation slides : 7 p.2013-10-14Barton Gellman : Ashkan SoltaniThe Washington Post
Content Acquisition Optimization National Security Agency - Special Source Operationsca.2012-08Top Secret : SI / NOFORNPINWALE : MARINA : MAINWAY : CLOUDsPresentation slides : 9 p.2013-10-14Barton Gellman : Ashkan SoltaniThe Washington Post
SSO Collection Optimization Overview National Security Agency - Special Source Operations2013-01-07Secret : SI : SI-GAMMA : TALENT KEYHOLE : ORCON : PROPIN : RELIDO / 5VEYMARINA : PINWALE : PRESSUREWAVE : MAINWAY : SCISSORS : XKEYSCORE : FALLOUT : YELLOWSTONEWiki article : 4 p.2013-10-14Barton Gellman : Ashkan SoltaniThe Washington Post
Types of IAT - Advanced Open Source Multi-Hop National Security Agencyca.2012-01Top Secret : COMINT / 5VEYEGOTISTICALGIRAFFEPresentation slides : 9 p.2013-10-04James Ball : Bruce Schneier : Glenn GreenwaldThe Guardian
Op MULLENIZE and beyond - Staining Machines Government Communications Headquarters (GCHQ)2012-10-10Top Secret : COMINT / STRAP 1Operation MULLENIZENewsletter : 11 p.2013-10-04Barton Gellman : Craig Timberg : Steven RichThe Washington Post
TOR Stinks National Security Agencyca.2012-06Top Secret : COMINT / 5VEYEGOTISTICALGIRAFFE : NEWTONS CRADLE : QUICKANT : ONIONBREATH : REMATION IIPresentation slides : 23 p.2013-10-04James Ball : Bruce Schneier : Glenn GreenwaldThe Guardian
TOR - 2006 CES Summer Program National Security Agencyca.2006-01Top Secret : SI / FOUOMJOLNIR : EGOTISTICALGIRAFFE : MOTHMONSTER : EGOTISTICALGOAT : STUNT WORMReport : 49 p.2013-10-04Barton Gellman : Craig Timberg : Steven RichThe Washington Post
Peeling Back the Layers of TOR with EGOTISTICAL GIRAFFE National Security Agency - Tailored Access Operationsca.2013-01Top Secret : SI : COMINT / 5VEYEGOTISTICALGIRAFFE : EGOTISTICALGOATPresentation slides : 20 p.2013-10-04James Ball : Bruce Schneier : Glenn GreenwaldThe Guardian
SYANPSE [sic] Data Model National Security Agencyca.2010-01Secret : SI / 5VEYMAINWAYPresentation slides : 1 p.2013-09-28James Risen : Laura PoitrasThe New York Times
New Contact-Chaining Procedures Allow Better, Faster Access National Security Agency - Signals Intelligence Directorate2011-03-01Secret : SI / RELMAINWAY : GATEKEEPERMemo : 3 p.2013-09-28James Risen : Laura PoitrasThe New York Times
OP SOCIALIST Defence Signals Directorate (DSD / ASD)ca.2010-01Top Secret / STRAP 2Operation SOCIALISTPresentation slides : 2 p.2013-09-20UnknownDer Spiegel
NSA: How Network Mapping is Helping to Target the Credit Card Authorization Networks National Security Agency - Network Analysis Centerca.2010-01Top Secret : COMINT / 5VEYFollow The Money : DISHFIREPresentation slides : 3 p.2013-09-16Laura Poitras : Marcel Rosenbach : Greg MillerDer Spiegel
Memorandum of Understanding Between the National Security Agency and the Israeli SIGINT National Unit National Security Agency - Office of the Directorca.2009-03Top Secret : COMINT / USA, ISRUSA - Israeli surveillance partnershipsMemo : 5 p.2013-09-11Glenn Greenwald : Laura Poitras : Ewen MacAskillThe Guardian
iPhone Location Services National Security Agencyca.2010-01Top Secret : SI / 5VEYSmartphone Surveillance ProgramsPresentation slides : 5 p.2013-09-09Marcel Rosenbach : Laura Poitras : Holger StarkDer Spiegel
Motivations for FLYING PIG National Security Agencyca.2010-01Top Secret : SI / 5VEYFLYING PIGPresentation slides : 3 p.2013-09-08UnknownO Globo Fantastico
US-983 STORMBREW National Security Agency - Special Source Operations2012-05Unknown / UnknownSTORMBREWPresentation slides : 7 p.2013-09-08UnknownO Globo Fantastico
Computer Network Operations SIGINT Enabling National Security Agencyca.2012-01Top Secret : SI : TK / NOFORNSIGINT Enabling ProjectBudget request : 3 p.2013-09-06James Ball : Julian Borger : Glenn GreenwaldThe Guardian
PROJECT BULLRUN-2-16 Classification Guide National Security Agency - Cryptanalysis and Exploitation Services2010-06-16Top Secret : SI / 5VEYBULLRUNClassification guide : 6 p.2013-09-05James Ball : Julian Borger : Glenn GreenwaldThe Guardian
Classification Guide for Cryptanalysis, 2-12 National Security Agency - Cryptanalysis and Exploitation Services2004-11-23Top Secret / UnknownCryptanalysis ExploitationClassification guide : 3 p.2013-09-05James Ball : Julian Borger : Glenn GreenwaldThe Guardian
Intelligently filtering your data: Brazil and Mexico case studies National Security Agency2007-08-01Top Secret : COMINT / 5VEYDiplomatic Surveillance Programs : Financial Surveillance ProgramsPresentation slides : 19 p.2013-09-02UnknownO Globo Fantastico
FY2013 Congressional Budget Justification : Volume I - National Intelligence Program Summary United States Intelligence Community - Office of the Director of National Intelligence (ODNI)2012-02Top Secret : SI : TK / NOFORNGeneral intelligenceBudget justification : 43 p.2013-08-29Barton Gellman : Greg MillerThe Washington Post
Targeting Rationale (TAR) National Security Agency2007-01-08Top Secret : COMINT : MR / NOFORNGeneral IntelligenceMemo : 4 p.2013-08-15Barton GellmanThe Washington Post
Intelligence Oversight (IO) Quarterly Report - First Calendar Year 2012 (1 January - 31 March 2012) National Security Agency - Signals Intelligence Directorate2012-05-03Top Secret : COMINT / NOFORNGeneral IntelligenceReport : 13 p.2013-08-15Barton GellmanThe Washington Post
Dual Authorities (SIGINT-IA) Online Training Job Aid National Security Agency2011-11-01Unclassified / FOUOGeneral IntelligencePresentation slides : 1 p.2013-08-15Barton GellmanThe Washington Post
FAA Certification Renewals With Caveats National Security Agency - Special Source Operations2011-10-12Top Secret : SI / NOFORNFAIRVIEW : BLARNEY : STORMBREW : OAKSTARNewsletter : 1 p.2013-08-15Barton GellmanThe Washington Post
Glossary : FAA Section 702 National Security Agencyca.2012-06Top Secret : SI / NOFORNMARINA : MAINWAY : NUCLEON : PINWALEGlossary : 1 p.2013-08-09James Ball : Spencer AckermanThe Guardian
XKEYSCORE National Security Agency2008-02-25Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 32 p.2013-07-31Glenn GreenwaldThe Guardian
PRISM : FAA702 Operations National Security Agency - Special Source Operationsca.2013-04Top Secret : SI : ORCON / NOFORNPRISMPresentation slides : 1 p.2013-07-10Barton Gellman : Laura PoitrasThe Washington Post
DROPMIRE National Security Agency2007-01-06Unknown / UnknownPerdido : DROPMIREPresentation slides : 1 p.2013-06-30Ewen MacAskillThe Guardian
Memorandum for the Attorney General : Proposed Amendment to Department of Defence Procedures to Permit the NSA to Conduct Analysis of Communications Metadata Associated with Persons in the United States U.S. Department of Justice - National Security Division2007-11-20Secret : COMINT : ORCON / NOFORNGeneral IntelligenceMemo : 16 p.2013-06-27Glenn Greenwald : Spencer AckermanThe Guardian
ST-09-0002 Working Draft : Review of the President's Surveillance Program National Security Agency - Office of the Inspector General2009-03-24Top Secret : STLW : COMINT : ORCON / NOFORNPresident's Surveillance Program : Terrorist Surveillance Program : STELLARWINDDraft report : 51 p.2013-06-27Glenn Greenwald : Spencer AckermanThe Guardian
Minimization Procedures Used by the National Security Agency in Connection With Acquisitions of Foreign Intelligence Information Attorney General of the United States2007-01-08Secret : COMINT / NOFORNGeneral IntelligenceMemo : 9 p.2013-06-20Glenn Greenwald : James BallThe Guardian
Procedures Used by the National Security Agency for Targeting Non-United States Persons Attorney General of the United States2007-01-08Top Secret : COMINT / NOFORNGeneral IntelligenceMemo : 9 p.2013-06-20Glenn Greenwald : James BallThe Guardian
BOUNDLESSINFORMANT : Describing Mission Capabilities from Metadata Records National Security Agency - Global Access Operations2012-07-13Top Secret : SI / NOFORNBOUNDLESS INFORMANTPresentation slides : 4 p.2013-06-11Glenn Greenwald : Ewen MacAskillThe Guardian
BOUNDLESSINFORMANT - Frequently Asked Questions National Security Agency - Global Access Operations2012-09-06Unclassified / FOUOBOUNDLESS INFORMANTFactsheet : 3 p.2013-06-11Glenn Greenwald : Ewen MacAskillThe Guardian
PRISM : FAA702 Operations National Security Agency - Special Source Operationsca.2013-04Top Secret : SI : ORCON / NOFORNPRISMPresentation slides : 1 p.2013-06-08James BallThe Guardian
PRISM - US-984XN Overview, or The SIGAD Used Most in NSA Reporting Overview National Security Agency : Special Source Operations2013-04Top Secret : SI : ORCON / NOFORNPRISMPresentation slides : 4 p.2013-06-07Barton Gellman : Laura PoitrasThe Washington Post
PRISM Tasking Process National Security Agency - Special Source Operationsca.2013-04Top Secret : SI : ORCON / NOFORNPRISMPresentation slides : 4 p.2013-06-07Barton Gellman : Laura PoitrasThe Washington Post
In re Application of the Federal Bureau of Investigation for an Order Requiring the Production of Tangible Things Foreign Intelligence Surveillance Court (FISC)2013-04-23Top Secret : SI / NOFORNGeneral intelligenceCourt order : 4 p.2013-06-06Glenn GreenwaldThe Guardian
A potential technique to deanonymise users of the TOR network - Slides Government Communications Headquarters (GCHQ)ca.2011Top Secret / STRAP 1SIGINT Enabling ProjectPresentation slides : 23 p.2014-12-28Spiegel StaffDer Spiegel
Analytic Challenges from Active-Passive Integration National Security Agency - Technology Directorateca.2007-01-08Top Secret / 5VEYTURMOILPresentation slides : 14 p.2014-12-28Spiegel StaffDer Spiegel
The Edge - NIARL Highlights - September Edition National Information Assurance Research Laboratory2008-09Top Secret / 5VEY Newsletter : 15 p.2014-12-28Spiegel StaffDer Spiegel
TURMOIL IPSEC VPN SESSIONIZATION National Security Agencyca.2008Top Secret / 5VEYTURMOILDraft report : 18 p.2014-12-28Spiegel StaffDer Spiegel
TURMOIL GALLANTWAVE - WikInfo National Security Agencyca.2011Top Secret / 5VEYTURMOIL : GALLANTWAVEWiki article : 2 p.2014-12-28Spiegel StaffDer Spiegel
SIGINT Strategy Threads 4 and 7 National Security Agency - Cryptanalysis and Exploitation Servicesca.2011-09-14Top Secret / 5VEYBULLRUNNewsletter : 3 p.2014-12-28Spiegel StaffDer Spiegel
Intercept with OTR encrypted chat National Security Agencyca.2012Top Secret / REL USA, AUSSIGINT Enabling ProjectChat Log : 2 p.2014-12-28Spiegel StaffDer Spiegel
Fielded Capability: End-to-End VPN National Security Agencyca.2011Top Secret / 5VEYWEALTHYCLUSTER : TURBULENCE : PRESSUREWAVE : TOYGRIPPEPresentation slides : 47 p.2014-12-28Spiegel StaffDer Spiegel
VS MALIBU IKE And ESP Metadata Flows National Security Agency Top Secret / 5VEYTURMOIL : VALIANTSURFPresentation slides : 4 p.2014-12-28Spiegel StaffDer Spiegel
Net Defense from Encrypted Communications National Security Agency - Technology Directorateca.2012-02Top Secret / 5VEYTURMOIL : GALLANTWAVE : XKEYSCOREPresentation slides : 16 p.2014-12-28Spiegel StaffDer Spiegel
User's Guide For PRISM Skype Collection National Security Agencyca.2012-08 Top Secret / NOFORNPRISMFactsheet : 9 p.2014-12-28Spiegel StaffDer Spiegel
Template: POISONNUT Product - WikiInfo National Security Agencyca.2007-01-08Top Secret / 5VEYPOSIONNUTWiki article : 2 p.2014-12-28Spiegel StaffDer Spiegel
TLS Trends: A roundtable discussion on current usage and future directions Communications Security Establishment Canadaca.2012Top Secret / 5VEYSIGINT Enabling ProjectPresentation slides : 15 p.2014-12-28Spiegel StaffDer Spiegel
VoIP NSA alias - IETF conference Government Communications Headquarters (GCHQ)ca.2006Top Secret / STRAP 1 Newsletter : 5 p.2014-12-28Spiegel StaffDer Spiegel
Intercept with PGP encrypted message National Security Agencyca.2012Top Secret / REL USA, AUSSIGINT Enabling ProjectChat Log : 1 p.2014-12-28Spiegel StaffDer Spiegel
Intro to the VPN Exploitation Process National Security Agency - Office of Target Pursuit Top Secret / 5VEYBLEAKINQUIRYPresentation slides : 43 p.2014-12-28Spiegel StaffDer Spiegel
Virtual Private Network Transform Engine Emulator National Security Agencyca.2007-01-08Top Secret : TALENT KEYHOLE / 5VEYVULCANDEATHGRIP : POISONNUT : TURMOILWiki article : 2 p.2014-12-28Spiegel StaffDer Spiegel
BULLRUN Government Communications Headquarters (GCHQ) Top Secret / STRAP 1BULLRUNPresentation slides : 10 p.2014-12-28Spiegel StaffDer Spiegel
Tor Hidden Services How Hidden is 'Hidden'? Government Communications Headquarters (GCHQ) - Applied Researchca.2011Top Secret / STRAP 1SIGINTPresentation slides : 26 p.2014-12-28Spiegel StaffDer Spiegel
A potential technique to deanonymise users of the TOR network Government Communications Headquarters (GCHQ)2011-06-13Top Secret / STRAP 1SIGINTBriefing : 18 p.2014-12-28Spiegel StaffDer Spiegel
TLS trends at GCHQ National Security Agencyca.2012Top Secret / RELFLYING PIG : BULLRUN : BROAD OAK : TargeTLSPresentation slides : 11 p.2014-12-28Spiegel StaffDer Spiegel
VALIANTSURF WikiInfo National Security Agencyca.2009Top Secret / 5VEYVALIANTSURFWiki article : 13 p.2014-12-28Spiegel StaffDer Spiegel
GALLANTWAVE@scale GALLANTWAVE @ volume National Security Agency - Digital Network Crypt Applications2007-01-08Top Secret / 5VEYGALLANTWAVEPresentation slides : 5 p.2014-12-28Spiegel StaffDer Spiegel
BULLRUN Col - Briefing Sheet Government Communications Headquarters (GCHQ)ca.2011Top Secret / STRAP 1BULLRUN : ENDUE : NOCONBriefing : 4 p.2014-12-28Spiegel StaffDer Spiegel
STARGATE CNE Requirements Government Communications Headquarters (GCHQ)ca.2012Secret / STRAP 1STARGATEWiki article : 2 p.2014-12-14Ryan GallagherThe Intercept
Mobile Networks in MyNoc World Government Communications Headquarters (GCHQ) - Network Analysis Centreca.2011Top Secret / STRAP 2QUANTUM INSERT : OPERATION SOCIALISTPresentation slides : 22 p.2014-12-14Ryan GallagherThe Intercept
Making Network Sense of the encryption problem: Roundtable Government Communications Headquarters (GCHQ) - Network Analysis Centreca.2011Top Secret / REL USA, AUS, CAN, GBR, NZL : STRAP 2Computer Network Exploitation (CNE)Presentation slides : 11 p.2014-12-14Ryan GallagherThe Intercept
CNE Access to BELGACOM GRX Operator I Government Communications Headquarters (GCHQ) - Network Analysis Centreca.2011-09Unknown / UnknownOPERATION SOCIALISTReport : 1 p.2014-12-14Ryan GallagherThe Intercept
CNE Access tp BELGACOM GRX Operator III Government Communications Headquarters (GCHQ) - Network Analysis Centreca.2012-03Unknown / UnknownOPERATION SOCIALISTReport : 1 p.2014-12-14Ryan GallagherThe Intercept
CNE Access tp BELGACOM GRX Operator II Government Communications Headquarters (GCHQ) - Network Analysis Centreca.2011-12Unknown / UnknownOPERATION SOCIALIST : OPERATION SOCIALIST IIReport : 1 p.2014-12-14Ryan GallagherThe Intercept
Automated NOC Detection Government Communications Headquarters (GCHQ) - Network Analysis Centreca.2011Top Secret / STRAP 2NOCTURNAL SURGE : QUANTUM INSERTPresentation slides : 25 p.2014-12-14Ryan GallagherThe Intercept
HOPSCOTCH Government Communications Headquarters (GCHQ) - Network Analysis Centreca.2011Unknown / Unknown Report : 1 p.2014-12-14Ryan GallagherThe Intercept
Programme Outcome-Target Capabilities WOLFRAMITE Government Communications Headquarters (GCHQ)2011-03-09Top Secret / STRAP 1WOLFRAMITEReport : 1 p.2014-12-04Ryan GallagherThe Intercept
Site Make First-Ever Collect of High-Interest 4G Cellular Signal National Security Agency2010-02-23Top Secret / 5VEYRAINFALLNewsletter : 1 p.2014-12-04Ryan GallagherThe Intercept
AURORAGOLD: Two Synergistic Efforts National Security Agency - Office of SIGINT Developmentca.2012Secret / 5VEYAURORAGOLDPresentation slides : 6 p.2014-12-04Ryan GallagherThe Intercept
AURORAGOLD WORKING AID Government Communications Headquarters (GCHQ) - Office of SIGINT Development2012-05-17Secret / 5VEYAURORAGOLDWorking Aid : 4 p.2014-12-04Ryan GallagherThe Intercept
IR.21 – A Technology Warning Mechanism National Security Agency - Office of SIGINT Developmentca.2010Top Secret / 5VEYIR.21Presentation slides : 19 p.2014-12-04Ryan GallagherThe Intercept
2nd SCAMP at CSEC process National Security Agency - Network Tradecraft Advancement Team ca.2010Top Secret / 5VEYOLYMPIA : TOYGRIPPEPresentation slides : 1 p.2014-12-04Ryan GallagherThe Intercept
AURORAGOLD Project Overview National Security Agency - Office of SIGINT Developmentca.2011Secret / 5VEYAURORAGOLDPresentation slides : 4 p.2014-12-04Ryan GallagherThe Intercept
A5-3 crypt attack proof-of-concept Government Communications Headquarters (GCHQ)2009-09-13Top Secret / STRAP 1OPULENT PUPReport : 1 p.2014-12-04Ryan GallagherThe Intercept
WINDSTOP System Highlights National Security Agency - Special Source Operationsca.2013Secret : SI / REL USA, GBRWINDSTOP : INCENSER : MUSCULAR : TRANSIENT THURIBLEPresentation slides : 1 p.2014-11-25Frederick Obermaier : Henrik Moltke : Laura Poitras : Jan StrozykSüddeutsche Zeitung
Start Generating SIGINT from VPNs at SMK National Security Agency - Cryptanalysis and Exploitation Servicesca.2009-03Top Secret / 5VEYTURMOIL : PRESSUREWAVE : XKEYSCOREDraft report : 4 p.2014-11-25Spiegel StaffDer Spiegel
Cable Master List Government Communications Headquarters (GCHQ)ca.2012Unknown / UnknownREMEDY : GERONTICReport : 58 p.2014-11-25Frederick Obermaier : Henrik Moltke : Laura Poitras : Jan StrozykSüddeutsche Zeitung
MTI Access Project - Weekly Status w-e 27 June 08 Government Communications Headquarters (GCHQ)2008-06-27Top Secret : COMINT / STRAP 1MTI Access Project : GERONTICWiki article : 1 p.2014-11-25Frederick Obermaier : Henrik Moltke : Laura Poitras : Jan StrozykSüddeutsche Zeitung
MTI Access Project - Weekly Status w-e 6 February 09 Government Communications Headquarters (GCHQ)2009-02-06Top Secret : COMINT / STRAP 1MTI Access Project : GERONTICWiki article : 1 p.2014-11-25Frederick Obermaier : Henrik Moltke : Laura Poitras : Jan StrozykSüddeutsche Zeitung
Partner Cables Government Communications Headquarters (GCHQ)ca.2012Unknown / UnknownREMEDY : GERONTIC : DACRON : LITTLE : STREET CAR : PINNAGE : VITREOUSReport : 1 p.2014-11-25Frederick Obermaier : Henrik Moltke : Laura Poitras : Jan StrozykSüddeutsche Zeitung
Cables we do not currently have good access Government Communications Headquarters (GCHQ)ca.2012Unknown / UnknownGERONTIC : REMEDYReport : 2 p.2014-11-25Frederick Obermaier : Henrik Moltke : Laura Poitras : Jan StrozykSüddeutsche Zeitung
MTI Access Project - Weekly Status w-e 28 November 08 Government Communications Headquarters (GCHQ)2008-11-28Top Secret : COMINT / STRAP 1MTI Access Project : GERONTIC : VISAGEWiki article : 1 p.2014-11-25Frederick Obermaier : Henrik Moltke : Laura Poitras : Jan StrozykSüddeutsche Zeitung
Access Breakdown Government Communications Headquarters (GCHQ)ca.2012Unknown / UnknownREMEDY : GERONTICReport : 1 p.2014-11-25Frederick Obermaier : Henrik Moltke : Laura Poitras : Jan StrozykSüddeutsche Zeitung
Cable Regions Government Communications Headquarters (GCHQ)ca.2012Unknown / UnknownGERONTIC : REMEDYReport : 2 p.2014-11-25Frederick Obermaier : Henrik Moltke : Laura Poitras : Jan StrozykSüddeutsche Zeitung
Where we want to be Government Communications Headquarters (GCHQ)ca.2012Unknown / UnknownREMEDY : GERONTICReport : 1 p.2014-11-25Frederick Obermaier : Henrik Moltke : Laura Poitras : Jan StrozykSüddeutsche Zeitung
CNE EndPoint Project Load Government Communications Headquarters (GCHQ)ca.2012Top Secret / STRAP 1EndPoint : PFENNING ALPHAReport : 1 p.2014-11-25Frederick Obermaier : Henrik Moltke : Laura Poitras : Jan StrozykSüddeutsche Zeitung
Where we are Government Communications Headquarters (GCHQ)ca.2012Unknown / UnknownREMEDY : GERONTICReport : 1 p.2014-11-25Frederick Obermaier : Henrik Moltke : Laura Poitras : Jan StrozykSüddeutsche Zeitung
PTC Glossary Government Communications Headquarters (GCHQ)ca.2012Top Secret : COMINT / STRAP 1INCENSER : GERONTICWiki article : 1 p.2014-11-25Frederick Obermaier : Henrik Moltke : Laura Poitras : Jan StrozykSüddeutsche Zeitung
Cable Master List Government Communications Headquarters (GCHQ)ca.2012Unknown / UnknownGERONTICReport : 1 p.2014-11-25Frederick Obermaier : Henrik Moltke : Laura Poitras : Jan StrozykSüddeutsche Zeitung
Exceptionally Controlled Information (ECI) As Of 12 September 2003 National Security Agency2003-09-12Top Secret : COMINT : ORCON : X1 / NOFORNGeneral intelligenceReport : 6 p.2014-10-10Peter Maass : Laura PoitrasThe Intercept
Classification Guide for the NSA-CSS Target Exploitation (TAREX) Program 2-52 National Security Agency2012-02-06Secret : SI / NOFORNTAREXClassification guide : 7 p.2014-10-10The Intercept
Computer Network Exploitation (CNE) Classification Guide - 2-59 National Security Agency - Tailored Access Operations2010-03-01Top Secret : SI / 5VEYGeneral intelligence8 p.2014-10-10 The Intercept
NSA - CSS and JFCC-NW National Initiative Task - Security Framework National Security Agency2004Top Secret : COMINT / NOFORNSENTRY EAGLE : SENTRY HAWK : SENTRY FALCON : SENTRY OSPREY : SENTRY RAVEN : SENTRY CONDOR : SENTRY OWLPresentation slides : 10 p.2014-10-10Peter Maass : Laura PoitrasThe Intercept
Exceptionally Controlled Information (ECI) Compartments National Security Agencyca.2013-01Confidential / 5VEYGeneral intelligenceReport : 4 p.2014-10-10Peter Maass : Laura PoitrasThe Intercept
NSA-CSS and JFCC-NW National Initiative Task - Security Framework National Security Agencyca.2004Top Secret : COMINT / NOFORNGeneral intelligenceDiagram2014-10-10Peter Maas : Laura PoitrasThe Intercept
SENTRY EAGLE : National Initiative - Security Framework National Security Agency2004-11-23Top Secret : COMINT / NOFORNSENTRY EAGLEClassification guide : 3 p.2014-10-10Peter Maas : Laura PoitrasThe Intercept
Classification Guide for ECI PAWLEYS (PAW) 02-19 National Security Agency - Cryptanalysis and Exploitation Services2006-11-14Top Secret : COMINT / 5VEYPAWLEYSClassification guide : 4 p.2014-10-10Peter Maass : Laura PoitrasThe Intercept
National Initiative Protection Program - Sentry Eagle National Security Agency2004-11-23Top Secret : COMINT / NOFORNSENTRY EAGLE : SENTRY OWL : SENTRY CONDOR : SENTRY OSPREY : SENTRY FALCON : SENTRY HAWK : SENTRY RAVENBriefing : 13 p.2014-10-10Peter Maass : Laura PoitrasThe Intercept
Classification Guide for ECI WHIPGENIE 02-05 National Security Agency - Special Source Operations2004-05-21Top Secret : COMINT / 5VEYWHIPGENIEClassification guide : 7 p.2014-10-10Peter Maass : Laura PoitrasThe Intercept
TREASUREMAP Announces a New Release National Security Agency - Office of Technology Development2011-11-01Top Secret / 5VEYTREASUREMAPNewsletter : 4 p.2014-09-14Andy Müller-Maguhn : Laura Poitras : Marcel Rosenbach : Michael Sontheimer : Christian GrothoffDer Spiegel
Bad guys are everywhere, good guys are somewhere: NTOC technology development National Security Agency - Threat Operations Centerca.2010Top Secret : SI / 5VEYTREASUREMAPPresentation slides : 38 p.2014-09-14Spiegel StaffDer Spiegel
Visit Précis - Ambassoador Roy Ferguson National Security Agencyca.2013-03Secret / 5VEYSPEARGUNMeeting agenda : 2 p.2014-09-14Glenn Greenwald : Ryan GallagherThe Intercept
NAC BUDE Partnership - Satellite Teleport Knowledge Government Communications Headquarters (GCHQ) - BUDE SIGINT Developmentca.2008Top Secret / STRAP 1TREASUREMAPBriefing : 26 p.2014-09-14Andy Müller-Maguhn : Laura Poitras : Christian Grothoff : Marcel Rosenbach : Michael SontheimerDer Spiegel
IRONSAND Mission Government Communications Security Bureauca.2012Unknown / UnknownIRONSAND : SPEARGUNPresentation slides : 1 p.2014-09-14Glenn Greenwald : Ryan GallagherThe Intercept
GCSB Cable Access Program Update National Security Agencyca.2013Top Secret / NOFORNSPEARGUNBriefing : 1 p.2014-09-14Glenn Greenwald : Ryan GallagherThe Intercept
Key Activities in Progress: Access National Security Agencyca.2013Top Secret / NOFORNSPEARGUNPresentation slides : 1 p.2014-09-14Glenn Greenwald : Ryan GallagherThe Intercept
Quadrennial Intelligence Community Review - Final Report United States Intelligence Community - Office of the Director of National Intelligence2009-04Secret / 5VEY Report : 32 p.2014-09-05Glenn GreenwaldThe Intercept
SINIO Seminar: Turkish Presidential and Parliamentary Elections National Security Agency - Strategic Intelligence Issues2007-08-13Top Secret / 5VEYSIGINTNewsletter : 2 p.2014-08-31Holger Stark : Marcel Rosenbach : Laura Poitras : Michael SontheimerDer Spiegel
SINIO Seminar: Turkey and the Kurds National Security Agency - Strategic Intelligence Issues2006-05-18Classified / FOUOSIGINTNewsletter : 1 p.2014-08-31Michael Sontheimer : Holger Stark : Laura Poitras : Marcel RosenbachDer Spiegel
NCRs with Foreign Relations Missions Becom e 'SUSIAs' National Security Agency - Foriegn Affairs Directorate2006-08-30Top Secret / 5VEY Newsletter : 2 p.2014-08-31Michael Sontheimer : Laura Poitras : Holger Stark : Marcel RosenbachDer Spiegel
Turkey and the PKK National Security Agency - Foreign Affairs Directorate (Central/Eastern Europe Office)2005-12-20Top Secret / 5VEYFollow The MoneyNewsletter : 3 p.2014-08-31Holger Stark : Laura Poitras : Michael Sontheimer : Marcel RosenbachDer Spiegel
Kurdistan Regional Government Government Communications Headquarters (GCHQ)ca.2008Secret / Unknown Briefing : 3 p.2014-08-31Laura Poitras : Marcel Rosenbach : Michael Sontheimer : Holger StarkDer Spiegel
DTX 600 Load Sharing Carriers R.O.W (via UK) to IRAQ plus RLEs Government Communications Headquarters (GCHQ)2008-10-15Secret / STRAP 1SIGINTReport : 2 p.2014-08-31Holger Stark : Laura Poitras : Marcel Rosenbach : Michael SontheimerDer Spiegel
Turkey at the G20 pre-meeting in London September 2-5 2009 Government Communications Headquarters (GCHQ)ca.2009-08Top Secret / STRAP 1 Briefing : 2 p.2014-08-31Holger Stark : Laura Poitras : Michael Sontheimer : Marcel RosenbachDer Spiegel
SINIO Summer 2003 Series of Strategic Intelligence Issue Seminars Begins with Tough Times for Turkey National Security Agency - Strategic Intelligence Issues2003-06-10Top Secret / 5VEYSIGINT ProgramsNewsletter : 2 p.2014-08-31 Der Spiegel
NSA Visit Agenda for Turkish Signals Intelligence Chief National Security Agency2013-04-30Secret / NOFORNSEA SENTRY II : PHANTOMNOVAMeeting agenda : 2 p.2014-08-31Marcel Rosenbach : Laura Poitras : Michael Sontheimer : Holger StarkDer Spiegel
JORDAN-BELGIUM Government Communications Headquarters (GCHQ)2008-01-12Secret / STRAP 1SIGINTReport : 6 p.2014-08-31Holger Stark : Laura Poitras : Michael Sontheimer : Marcel RosenbachDer Spiegel
Information Paper: NSA Intelligence Relationship with Turkey National Security Agency2013-04-15Top Secret / NOFORNCROSSHAIRInformation paper : 4 p.2014-08-31Holger Stark : Michael Sontheimer : Laura Poitras : Marcel RosenbachDer Spiegel
Collaboration in Overdrive: A CNE Success National Security Agency - International Security Issues2006-11-13Top Secret / 5VEYSIGINTNewsletter : 2 p.2014-08-31Michael Sontheimer : Holger Stark : Laura Poitras : Marcel RosenbachDer Spiegel
MHS-GCHQ Projects - Turkey Energy Company Development National Security Agency - Menwith Hill Stationca.2008-10Top Secret / STRAP 1SIGINTBriefing : 1 p.2014-08-31Holger Stark : Laura Poitras : Marcel Rosenbach : Michael SontheimerDer Spiegel
NSA's Oldest Third Party SIGINT Partnership National Security Agency - Country Desk Officer (CDO) Turkey2005-10-07Top Secret / 5VEYSEA SENTRY : SIGINTNewsletter : 2 p.2014-08-31Holger Stark : Laura Poitras : Michael Sontheimer : Marcel RosenbachDer Spiegel
ICREACH: Sharing SIGINT Comms Metadata with the Intel Community National Security Agency - Target Analysis Center2007-09-27Secret / FOUOICREACHNewsletter : 2 p.2014-08-25Ryan GallagherThe Intercept
INTELLIGENCE COMMUNITY (IC) REACH TEAM National Security Agency - Signals Intelligence Development Techical Directorca.2007-12Top Secret / 5VEYICREACHMemo : 1 p.2014-08-25Ryan GallagherThe Intercept
Metadata Policy Conference United States Intelligence Community2008Unknown / UnknownCRISSCROSS : ICREACH : NSCID5Draft report : 2 p.2014-08-25Ryan GallagherThe Intercept
Memorandum of Understanding United States Government2005-07-06Secret / NOFORNCRISSCROSS : PROTONMemo : 4 p.2014-08-25Ryan GallagherThe Intercept
CIA Colleagues Enthusiastically Welcome NSA Training National Security Agency - Support Liason Group at CIA2010-09-21Secret / FOUO Newsletter : 1 p.2014-08-25Ryan GallagherThe Intercept
Sharing Communications Metadata Across the Intelligence Community - DECISION MEMORANDUM National Security Agency - Office of the Director of National Intelligence 2004-11-23Secret / NOFORNICREACH : CRISSCROSS : PROTONMemo : 3 p.2014-08-25Ryan GallagherThe Intercept
CRISSCROSS-PROTON Point Paper National Security Agencyca.2006-02-22Top Secret / NOFORNCRISSCROSS : PROTONPoint Paper : 4 p.2014-08-25Ryan GallagherThe Intercept
ICREACH Black Budget Extracts National Security Agencyca.2013Secret / 5VEYICREACHBudget request : 2 p.2014-08-25Ryan GallagherThe Intercept
Sharing Communications Metadata Across the U.S. Intelligence Community - ICREACH National Security Agency - Office of the Director of National Intelligence 2007-05-15Top Secret / NOFORNICREACH : PROTON : SIGINTPresentation slides : 36 p.2014-08-25Ryan GallagherThe Intercept
What is HACIENDA? Government Communications Headquarters (GCHQ) - Joint Threat Research Intelligence Group2010Top Secret : COMINT / STRAP 1 : 5VEYHACIENDA : LANDMARK : OLYMPIAPresentation slides : 29 p.2014-08-15Julian Kirsh : Christian Grothoff : Monika Ermert : Jacob Appelbaum : Laura Poitras : Henrik MoltkeHeise
OPA~TAS Covert Mobile Phones Policy Government Communications Headquarters (GCHQ)2010-06-28Secret / UnknownTryst TravellerBriefing : 6 p.2014-08-12Glenn Greenwald : Andrew FishmanThe Intercept
Strategic Accomplishments 2013 National Counterterrorism Center (NCTC) - Directorate of Terrorist Identitiesca.2013Secret / NOFORNGeneral intelligenceReport : 12 p.2014-08-05NoneThe Intercept
NSA Intelligence Relationship with Israel National Security Agency2013-03-19Top Secret : SI / NOFORNGeneral intelligenceReport : 3 p.2014-08-03Glenn GreenwaldThe Intercept
Israel U.S. Intelligence Agreement Defense Intelligence Agency1999-07-15Top Secret : HVCCO / REL USA, ISRGeneral intelligenceInternational Agreement : 16 p.2014-08-03Glenn GreenwaldThe Intercept
NSA Intelligence Relationship with Saudi Arabia National Security Agency2013-03-08Top Secret : SI / NOFORNGeneral intelligenceReport : 4 p.2014-07-25Glenn Greenwald : Murtaza HussainThe Intercept
Watchlisting Guidance National Counterterrorism Center (NCTC)2013-03SSI / FOUOGeneral intelligenceReport : 166 p.2014-07-23NoneThe Intercept
SIGINT Authority Decision Tree National Security Agencyca.2012Unknown / UnknownGeneral intelligenceTeaching materials : 1 p.2014-07-23Ellen Nakashima : Ashkan SoltaniThe Washington Post
JTRIG Tools and Techniques Government Communications Headquarters (GCHQ)2012-07-05Top Secret : COMINT / STRAP 1General intelligenceWiki article : 8 p.2014-07-14Glenn GreenwaldThe Intercept
FISA Recap National Security Agencyca.2008Top Secret : COMINT / 5VEYRAGTIME : PALMCARTEPresentation slides : 8 p.2014-07-09Glenn Greenwald : Murtaza HussainThe Intercept
Certification of the Director of National Intelligence and the Attorney General Pursuant to Subsection 702(g) of the Foreign Intelligence Surveillance Act of 1978, as Amended Attorney General of the United States2010-07-15Secret : ORCON / NOFORNGeneral intelligenceCertification : 6 p.2014-06-30Ellen Nakashima : Barton GellmanThe Washington Post
IN RE DNI - AG Certification 2010-A Foreign Intelligence Surveillance Court2010-08-19Secret / UnknownGeneral intelligenceCourt order : 1 p.2014-06-30Ellen Nakashima : Barton GellmanThe Washington Post
Affidavit of General Keith B. Alexander in the Matter of Foreign Governments, Foreign Factions, Foreign Entities, and Foreign-Based Political Organizations National Security Agency - Office of the Directorca.2010-07Top Secret : COMINT / NOFORNGeneral intelligenceAffidavit : 4 p.2014-06-30Ellen Nakashima : Barton GellmanThe Washington Post
In the Matter of Foreign Governments, Foreign Factions, Foreign Entities, and Foreign-Based Political Organizations Attorney General of the United States2010-07-16Top Secret / NOFORNGeneral intelligenceBriefing : 2 p.2014-06-30Ellen Nakashima : Barton GellmanThe Washington Post
FISA Amendments Act of 2008 Section 702 Summary Document National Security Agency - Office of General Counsel2008-12-23Top Secret : COMINT / NOFORNGeneral intelligenceBriefing : 17 p.2014-06-30Ellen Nakashima : Barton GellmanThe Washington Post
TEMPORA -- "The World's Largest XKEYSCORE" -- Is Now Available to Qualified NSA Users National Security Agency2012-09-19Top Secret / FOUOTEMPORA : XKEYSCORENewsletter : 4 p.2014-06-18Spiegel StaffDer Spiegel
Foward Production at NCEUR NSA/CSS Europe 2005-01-14Secret / UnknownForward ProductionNewsletter : 3 p.2014-06-18Spiegel StaffDer Spiegel
BOUNDLESSINFORMANT : 3rd Parties, Dec 10 2012 - Jan 8 2013 National Security Agency2013-01-08Unknown / UnknownBOUNDLESS INFORMANTReport : 1 p.2014-06-18Spiegel StaffDer Spiegel
Dragons, Shrimp and XKEYSCORE: Tales from the Land of Brothers Grimm National Security Agency - European Cryptologic Center2012-04-13Top Secret / RELXKEYSCORE : SIGINT : PINWALE : TransXNewsletter : 4 p.2014-06-18Spiegel StaffDer Spiegel
BOUNDLESSINFORMANT - United States, Collection Information National Security Agencyca.2010Unknown / UnknownBOUNDLESS INFORMANTReport : 1 p.2014-06-18Spiegel StaffDer Spiegel
The European Security Center to Become the "ESOC" National Security Agency - European Security Operations2006-11-09Top Secret / FOUOSIGINT ProgramsNewsletter : 4 p.2014-06-18Spiegel StaffDer Spiegel
On the Road Again: SID Team Visits Germany National Security Agency - Analysis and Production2006-01-02Classified / FOUOSIGINTNewsletter : 4 p.2014-06-18Spiegel StaffDer Spiegel
Pacific SIGDEV Conference March 2011 National Security Agency - Special Collections Service2011-03Top Secret : COMINT / 5VEYEINSTEIN / CASTANET : INTERQUAKEPresentation slides : 12 p.2014-06-18Spiegel StaffDer Spiegel
European Security Center to Begin Operations Army Cryptologic Operations - Operations Division2004-03-29Secret / FOUOSIGINTNewsletter : 3 p.2014-06-18Spiegel StaffDer Spiegel
Classification Guide for SIGINT Material Dating from 16 August 1945 - 31 December 1967 National Security Agency2011-12-21Top Secret : SI : TK / NOFORNGeneral intelligenceClassification guide : 35 p.2014-06-18Spiegel StaffDer Spiegel
Logo of the Joint SIGINT Activity (JSA) Joint SIGINT Activity ca.2006Unknown / UnknownSIGINTImage : 1 p.2014-06-18Spiegel StaffDer Spiegel
German, NSA SIGINTers Share DNI Processing Knowledge National Security Agency - Special US Liason Activity Germany2006-05-22Secret / UnknownWEALTHYCLUSTER : TURMOIL : GRANDMASTER : BLACKNIGHTNewsletter : 3 p.2014-06-18Spiegel StaffDer Spiegel
World Map from Boundless Informant Program National Security Agency2007-01-08Top Secret / NOFORNBOUNDLESS INFORMANTPresentation slides : 2 p.2014-06-18Spiegel StaffDer Spiegel
NSA Communications Hub in Europe is Modernized National Security Agency - European Technical Center2011-10-20Classified / FOUOSIGINTNewsletter : 3 p.2014-06-18Spiegel StaffDer Spiegel
SUSLAG-JSA-DCIG Classification Guide National Security Agency - Foriegn Affairs Directorate2005-02-16Secret / REL USA, AUS, CAN, DEU, GBR, NZLFIFTYEXCLAIMClassification guide : 6 p.2014-06-18Spiegel StaffDer Spiegel
BOUNDLESSINFORMANT : Global Overview National Security Agencyca.2013Unknown / UnknownBOUNDLESS INFORMANTImage : 1 p.2014-06-18Spiegel StaffDer Spiegel
First-Ever Formal SIGINT Development (SIGDEV) Training Is Provided to SIGINT Seniors Europe (SSEUR) Partners National Security Agency - SIGINT Development Strategy and Governance2010-10-25Secret / RELSIGINTNewsletter : 3 p.2014-06-18Spiegel StaffDer Spiegel
XKeyscore Tabs XKS Development National Security Agencyca.2010Unknown / UnknownXKEYSCORE : PINWALE : MUSCULAR : TURMOILWiki article : 3 p.2014-06-18Spiegel StaffDer Spiegel
DIR Opening Remarks Guidance for DP1 National Security Agency2013-03-04Top Secret : SI / REL USA, DNKNoneSpeech remarks : 3 p.2014-06-18Kristian JensenDagbladet
Bundesnachrichtendienst - Structure of the BND National Security Agencyca.2012Secret / REL DEU, DNK, ESP, FRA, ITA, GBR, NLD, NOR, SWE, USANonePresentation slides : 6 p.2014-06-18Spiegel StaffDer Spiegel
Draft Agenda for Meeting Between NSA and BND Officials National Security Agency2013-04-22Secret / NOFORNSIGINTMeeting agenda : 3 p.2014-06-18Spiegel StaffDer Spiegel
Counterterrorism (CT) Relationship with the German Federal Intelligence Service (BND) and the German Federal Office for the President of the Constitution (BfV) National Security Agency2013-03-08Top Secret : SI / NOFORNNoneMemo : 4 p.2014-06-18Spiegel StaffDer Spiegel
One-Year Anniversary for SUSLAG National Security Agency - Special US Liason Activity Germany2005-06-10Secret / FOUOSIGINTNewsletter : 4 p.2014-06-18Spiegel StaffDer Spiegel
BOUNDLESSINFORMANT - Frequently Asked Questions National Security Agency2012-09-06Unclassified / FOUOBOUNDLESS INFORMANTFactsheet : 3 p.2014-06-18Spiegel StaffDer Spiegel
Agenda for the Visit of BSI Vice President Andreas Konen to the NSA National Security Agencyca.2007-03-22Secret : SI / REL USA, FRANoneAgenda : 1 p.2014-06-18Spiegel StaffDer Spiegel
Trying to Find Potential Matches for a Garbled or Misspelled Name? Get Help from NYMROD National Security Agency - Center for Content Extraction2008-11-06Secret : SI / RELNYMRODMemo : 3 p.2014-06-18Spiegel StaffDer Spiegel
Special Source Weekly - Operational Highlight WHARPDRIVE National Security Agency - Special Source Operations2013-03-14Top Secret / NOFORNWHARPDRIVEPresentation slides : 2 p.2014-06-18Spiegel StaffDer Spiegel
2013 U.S. Intelligence Black Budget : Foreign Partner Access Project United States Intelligence Communityca.2013Top Secret : SI : TK / NOFORNRAMPART-A : WINDSTOPBudget request : 4 p.2014-06-18Kristian JensenDagbladet
Provision of XKEYSCORE to BfV National Security Agencyca.2012Top Secret : SI / NOFORNXKEYSCOREPresentation slides : 1 p.2014-06-18Spiegel StaffDer Spiegel
US, German SIGINTers Increase Cooperation on African Targets National Security Agency2007-12-13Secret / RELSIGINTNewsletter : 3 p.2014-06-18Spiegel StaffDer Spiegel
Running Strategic Analytics Affecting Europe and Africa National Security Agencyca.2012-03Top Secret / 5VEYXKEYSCORE : DISTILLERY : RTRG : GHOSTMACHINEPresentation slides : 14 p.2014-06-18Spiegel StaffDer Spiegel
BOUNDLESSINFORMANT : Germany, Dec 10 2012 - Jan 8 2013 National Security Agency2013-01-08Unknown / UnknownBOUNDLESS INFORMANTReport : 1 p.2014-06-18Spiegel StaffDer Spiegel
SID Around the World: The Rheinland National Security Agency - Signals Intelligence Directorate2003-09-16Unknown : Unclassified / FOUONoneNewsletter : 3 p.2014-06-18Spiegel StaffDer Spiegel
BOUNDLESSINFORMANT : Foreign Partners, Dec 10 2012 - Jan 8 2013 National Security Agency2013-01-08Unknown / UnknownBOUNDLESS INFORMANTReport : 1 p.2014-06-18Spiegel StaffDer Spiegel
Briefing on the Visit to the NSA of a High Ranking BND Official National Security Agencyca.2013-03-30Top Secret : SI / NOFORNNoneMemo : 4 p.2014-06-18Spiegel StaffDer Spiegel
NSAers Make First-Ever Trip to FORNSAT Collection Site in Schöningen, Germany Joint SIGINT Activity 2006-10-31Secret / RELThuraya : INMARSAT : SIGINTNewsletter : 4 p.2014-06-18Spiegel StaffDer Spiegel
TEMPORA Government Communications Headquarters (GCHQ)ca.2012-05Unknown / UnknownTEMPORAReport : 3 p.2014-06-18Spiegel StaffDer Spiegel
A Little Bad Aibling Nostalgia National Security Agency2004-04-06Unclassified / FOUONoneNewsletter : 3 p.2014-06-18Spiegel StaffDer Spiegel
BOUNDLESSINFORMANT : United Kingdom - Collection Information National Security Agencyca.2013Unknown / UnknownBOUNDLESS INFORMANT : ACRIDMINI : LUTEUSICARUS : HEADMOVIES : APERTURESCIENCE : CROSSEYEDSLOTH : KOALAPUNCH : BALLOONKNOT : MAGNUMOPUS : WAXTITAN : WILDCOUGAR : MURPHYSLAW : DARKFIREReport : 1 p.2014-06-18Spiegel StaffDer Spiegel
European Technical Center Area Checked for Unexploded WWII Ordnance National Security Agency - European Technical Center2006-03-15Secret / FOUO3 p.2014-06-18 Der Spiegel
Final Agenda of a Meeting Between High Ranking NSA and BND Officials National Security Agencyca.2013-03-30Secret / NOFORNNoneAgenda : 5 p.2014-06-18 Der Spiegel
NSA SIGINT Presence in Germany National Security Agency Top Secret / 5VEYSIGINT ProgramsReport : 1 p.2014-06-18Spiegel StaffDer Spiegel
World Map from Boundless Informant Program with Top 5 Targets National Security Agency2007-01-08Top Secret / NOFORNBOUNDLESS INFORMANTPresentation slides : 1 p.2014-06-18Spiegel StaffDer Spiegel
Counterterrorism (CT) Relationship with the German Federal Intelligence Service (BND) anf the German Federal Office for the Protection of the Constitution (BfV) National Security Agency2013-03-08Top Secret : SI / NOFORNNoneBriefing : 4 p.2014-06-18Spiegel StaffDer Spiegel
Center for Content Extraction National Security Agencyca.2008-07Top Secret / 5VEYNYMRODPresentation slides : 3 p.2014-06-18Spiegel StaffDer Spiegel
Analytics for Targets in Europe National Security Agencyca.2012Top Secret : SI / 5VEYGeneral intelligencePresentation slides : 1 p.2014-06-16Spiegel StaffDer Spiegel
XKEYSCORE Fingerprints National Security Agencyca.2012Unclassified / UnclassifiedXKEYSCOREPresentation slides : 1 p.2014-06-16Spiegel StaffDer Spiegel
DEA - NSA SANDKEY Voice Intercepts National Security Agencyca.2012Confidential / 5VEYSANDKEYPresentation slides : 4 p.2014-06-10NoneCryptome
Identity Intelligence: Image is Everything National Security Agencyca.2012Top Secret / 5VEYGeneral intelligencePresentation slides : 4 p.2014-05-31James Risen : Laura PoitrasThe New York Times
DEA - The "Other" Warfighter Drug Enforcement Agency2004-04-20Secret : SI / FOUOGeneral intelligenceNewsletter : 2 p.2014-05-19Ryan Devereaux : Glenn Greenwald : Laura PoitrasThe Intercept
2013 U.S. Intelligence Black Budget : Special Source Operations Project United States Intelligence Communityca.2013Top Secret : SI / NOFORNRAMPART-1 : RAMPART-X : MYSTICBudget request : 1 p.2014-05-19Ryan Devereaux : Glenn Greenwald : Laura PoitrasThe Intercept
MYSTIC Reporting National Security Agency - Special Source Operationsca.2013-04Top Secret / NOFORNMYSTICPresentation slides : 5 p.2014-05-19Glenn Greenwald : Laura Poitras : Ryan DevereauxThe Intercept
Somalget National Security Agency - International Crime and Narcoticsca.2012-05Top Secret / RELMYSTIC : SOMALGETMemo : 2 p.2014-05-19Laura Poitras : Glenn Greenwald : Ryan DevereauxThe Intercept
MYSTIC National Security Agency - Special Source Operationsca.2009Top Secret : SI / NOFORNMYSTIC : DUSKPALLET : EVENINGEASEL : SOMALGET : BASECOATWiki article : 1 p.2014-05-19Ryan Devereaux : Glenn Greenwald : Laura PoitrasThe Intercept
SSO Dictionary - Mystic Program Names National Security Agencyca.2011Top Secret / NOFORNMYSTIC : SOMALGETGlossary : 1 p.2014-05-19Laura Poitras : Glenn Greenwald : Ryan DevereauxThe Intercept
Identifier Lead Triage with ECHOBASE National Security Agency - Office of SIGINT Development2012-06Top Secret / 5VEYGHOSTMACHINE : ECHOBASEPresentation slides : 14 p.2014-04-30Ryan GallagherThe Intercept
Lobban VISIT PRÉCIS National Security Agencyca.2013-04Top Secret / NOFORNTriage 2.0Briefing : 2 p.2014-04-30Ryan GallagherThe Intercept
PRISM Highlight - Olympics Support - GCHQ Using PRISM Acecess National Security Agency - Special Source Operationsca.2012-05-24Top Secret / NOFORNPRISMPresentation slides : 1 p.2014-04-30Ryan GallagherThe Intercept
2009 SIGDEV Conference National Security Agency - SIGINT Development Strategy and Governance2009-08-14Secret / FOUOSIGINT ProgramsNewsletter : 2 p.2014-04-04Glenn GreenwaldThe Intercept
Full-Spectrum Cyber Effects Government Communications Headquarters (GCHQ)ca.2010Top Secret / STRAP 1INFINITE CURVATURE : MOUNTAIN SLOPE : BLACKHOLE : ROYAL CONCIERGEPresentation slides : 19 p.2014-04-04Glenn GreenwaldThe Intercept
Machine vs. Manuel Chief-of-State Citations National Security Agency - Center for Content Extractionca.2009Top Secret / 5VEYCOMINTPresentation slides : 1 p.2014-03-29Laura Poitras : Marcel Rosenbach : Holger StarkDer Spiegel
Huawei Surveillance Program notes National Security Agencyca.2010Top Secret / 5VEYComputer Network Exploitation (CNE)Presentation slides and notes : 2 p.2014-03-22David E. Sanger : Nicole PerlrothThe New York Times
SNOWGLOBE: From Discovery to Attribution Communications Security Establishment Canadaca.2011Top Secret / 5VEYSNOWGLOBEPresentation slides : 9 p.2014-03-21Jacques Follorou : Martin UntersingerLe Monde
"I hunt sys admins" NSA discussion forum posts National Security Agencyca.2012-12Top Secret / FOUOQUANTUMInternal message board posts : 6 p.2014-03-20Ryan Gallagher : Peter MaassThe Intercept
MYSTIC National Security Agency - Special Source Operationsca.2011Unclassified / FOUOMYSTICPresentation slides : 1 p.2014-03-18Barton Gellman : Ashkan SoltaniThe Washington Post
Tasking of SCALAWAG National Security Agency - Special Source Operationsca.2011-12Top Secret / 5VEYSCALAWAG : MYSTICMemo : 2 p.2014-03-18Ashkan Soltani : Barton GellmanThe Washington Post
Project Description National Security Agency - Special Source Operationsca.2013Top Secret / 5VEYMYSTICBudget justification : 1 p.2014-03-18Barton Gellman : Ashkan SoltaniThe Washington Post
Intelligent command and control National Security Agencyca.2010Top Secret / RELTURBINEReport : 1 p.2014-03-15Ryan GallagherThe Intercept
What Are We After with Our Third Party Relationships? National Security Agency - Office of SIGINT Development2009-09-15Top Secret / 5VEYSIGINT ProgramsNewsletter : 1 p.2014-03-13Glenn GreenwaldThe Intercept
QUANTUMTHEORY National Security Agency - Menwith Hill Stationca.2010Top Secret / 5VEYQUANTUMTHEORYPresentation slides : 11 p.2014-03-12Glenn Greenwald : Ryan GallagherThe Intercept
Analysis of Converged Data National Security Agency - Technology Directorateca.2009Unknown / UnknownTURBINE : MARINAPresentation slides : 1 p.2014-03-12Glenn Greenwald : Ryan GallagherThe Intercept
Automation National Security Agencyca.2009Top Secret / 5VEYTURBINEPresentation slides : 1 p.2014-03-12Glenn Greenwald : Ryan GallagherThe Intercept
There is more than one way to QUANTUM National Security Agency - Office of SIGINT Developmentca.2010Top Secret / 5VEYQUANTUMFactsheet : 1 p.2014-03-12Glenn Greenwald : Ryan GallagherThe Intercept
Sensors Government Communications Headquarters (GCHQ)ca.2007Top Secret / 5VEYTURBINE : TURBULENCEPresentation slides : 2 p.2014-03-12Glenn Greenwald : Ryan GallagherThe Intercept
Hacking Large Routers National Security Agencyca.2012Top Secret : SI / RELGeneral intelligenceMemo : 1 p.2014-03-12Ryan Gallagher : Glenn GreenwaldThe Intercept
Apex VPN and VoIP Exploitation National Security Agencyca.2010Top Secret / 5VEYAPEX : TURBINE : TURMOIL : TURBULENCEPresentation slides : 4 p.2014-03-12Glenn Greenwald : Ryan GallagherThe Intercept
Selector Types National Security Agency - Menwith Hill Stationca.2011Top Secret / 5VEYComputer Network Exploitation (CNE)Presentation slides : 1 p.2014-03-12Glenn Greenwald : Ryan GallagherThe Intercept
Increasing Collection Capacity National Security Agency - Tailored Access Operationsca.2012Secret : SI / UnknownGeneral intelligenceMemo : 1 p.2014-03-12Ryan Gallagher : Glenn GreenwaldThe Intercept
QUANTUMINSERT National Security Agencyca.2005Top Secret / RELQUANTUMPresentation slides : 5 p.2014-03-12Glenn Greenwald : Ryan GallagherThe Intercept
MHS Leverages XKS for QUANTUM Against Yahoo and Hotmail National Security Agency - Menwith Hill Stationca.2010Top Secret / 5VEYXKEYSCORE : QUANTUMTHEORY1 p.2014-03-12Glenn Greenwald : Ryan GallagherThe Intercept
FOXACID these days... National Security Agencyca.2012Top Secret / NOFORNFOXACID : WILLOWVIXEN : SECONDDATE : QUANTUMPresentation slides : 3 p.2014-03-12Glenn Greenwald : Ryan GallagherThe Intercept
Procedures for the Dissemination by NSA to Foreign Governments of Information from FISA Electronic Surveillance or Physical Search Conducted by the FBI Attorney General of the United States2002-08-20Secret : X1 / UnknownGeneral intelligenceMemo : 2 p.2014-03-11Charlie Savage : Laura PoitrasThe New York Times
Recommended Requirements for Cryptanalysts at CCs at Texas, Georgia and Hawaii to Access NSA and FBI FISA Material National Security Agency - Cryptanalysis and Exploitation Services2006-06-20Top Secret : COMINT / NOFORNFOURSCORE : ZAP : CAPRICORN : SOAPOPERAMemo : 5 p.2014-03-11Charlie Savage : Laura PoitrasThe New York Times
Timeline of Surveillance Law Developments National Security Agencyca.2010Unclassified / FOUOGeneral intelligenceMemo : 1 p.2014-03-11Charlie Savage : Laura PoitrasThe New York Times
STELLARWIND Classification Guide National Security Agency2009-01-21Top Secret : SI : ORCON / NOFORNSTELLARWIND : President's Surveillance ProgramClassification guide : 37 p.2014-03-11Charlie Savage : Laura PoitrasThe New York Times
Classification Guide for Foreign Intelligence Surveillance Act (FISA) - Protect America Act (PAA) - FISA Amendments Act (FAA) Activities National Security Agency2012-02-08Top Secret : SI / NOFORNGeneral intelligenceClassification guide : 18 p.2014-03-11Charlie Savage : Laura PoitrasThe New York Times
An Interview with Zelda National Security Agency - Signals Intelligence Directorate2011-05-05Unclassified / UnclassifiedNoneArticle : 2 p.2014-03-07Peter MaassThe Intercept
"Ask Zelda!" : Watching Every Word in Snitch City National Security Agency - Signals Intelligence Directorate2011-09-09Unclassified / UnclassifiedNoneArticle : 2 p.2014-03-07Peter MaassThe Intercept
Have a Supervisory Dilemma? Ask Zelda (Topic: 'Is Bain de Soleil a Bane on NSA??') National Security Agency - Signals Intelligence Directorate2010-06-15Unclassified / UnclassifiedNoneArticle : 2 p.2014-03-07Peter MaassThe Intercept
"Ask Zelda" : Guilty Until Proven Innocent National Security Agency - Signals Intelligence Directorate2012-11-08Unclassified / UnclassifiedNoneArticle : 2 p.2014-03-07Peter MaassThe Intercept
Mission Management Success Stories ; FAD Success Stories Sample National Security Agency2013-01-25Top Secret : SI / NOFORN : REL NLDOCEANSHIELD : ATALANTAPresentation slides and notes : 3 p.2014-03-05NRC
The Attorney General's Report on the Use of Pen Registers and Trap and Trace Devices Under the Foreign Intelligence Surveillance Act Attorney General of the United Statesca.2013-09Unclassified / UnclassifiedGeneral intelligenceReport : 24 p.2014-03-03Unknown EPIC
OPTIC NERVE - Yahoo Webcam display and target discovery Government Communications Headquarters (GCHQ)ca.2008-12Secret / STRAP 1OPTIC NERVEReport : 3 p.2014-02-27Spencer Ackerman : James BallThe Guardian
The ART of DECEPTION : Training for a New Generation of Online Covert Operations Government Communications Headquarters (GCHQ)ca.2012Secret : SI / 5VEYOnline HUMINT programsPresentation slides : 52 p.2014-02-24Glenn GreenwaldThe Intercept
Discovery SIGINT Targeting Scenarios and Compliance National Security Agency - Office of General Counsel2013-03-01Top Secret : SI-GAMMA : TALENT KEYHOLE : ORCON : PROPIN / 5VEYSIGINT ProgramsWiki article : 1 p.2014-02-18Glenn Greenwald : Ryan GallagherThe Intercept
Psychology : A New Kind of SIGDEV Government Communications Headquarters (GCHQ)ca.2012Top Secret : SI / 5VEYSQUEAKY DOLPHIN : ANTICRISISGIRLPresentation slides : 44 p.2014-02-18Glenn Greenwald : Ryan GallagherThe Intercept
UAV Geolocation Programs National Security Agencyca.2011Top Secret : SI / NOFORNCIA Drone Assassination Program : VICTORYDANCE : GILGAMESHReport : 5 p.2014-02-10Jeremy Scahill : Glenn GreenwaldThe Intercept
Cyber Integration : The Art of the Possible Government Communications Headquarters (GCHQ) - Joint Threat Research Intelligence Groupca.2012Top Secret : COMINT / 5VEYGeneral intelligencePresentation slides and notes : 16 p.2014-02-07Matthew Cole : Richard Esposito : Mark Schone : Glenn GreenwaldNBC
Boundless Informant : Netherlands, Dec 10 2012 - Jan 8 2013 National Security Agencyca.2012Unknown / UnknownBOUNDLESS INFORMANTReport : 1 p.2014-02-07Steven Derix : Huib ModderkolkNRC
Full-Spectrum Cyber Effects Government Communications Headquarters (GCHQ) - Joint Threat Research Intelligence Groupca.2010Top Secret / STRAP 1ROYAL CONCIERGE : INFINITE CURVATURE / MOUNTAIN SLOPEPresentation slides : 12 p.2014-02-07Matthew Cole : Richard Esposito : Mark Schone : Glenn GreenwaldNBC
Hacktivism: Online Covert Action Government Communications Headquarters (GCHQ) - Joint Threat Research Intelligence Groupca.2012Top Secret : COMINT / 5VEYRolling Thunder : WEALTHPresentation slides : 15 p.2014-02-04Mark Schone : Richard Esposito : Matthew Cole : Glenn GreenwaldNBC
UN Climate Change Conference in Copenhagen - Will the Developed and Developing World Agree on Climate Change? National Security Agency2009-07-12Top Secret / RELSIGINT ProgramsMemo : 2 p.2014-01-30Henrik MontgomeryInformation DK
IP Profiling Analytics & Mission Impacts Communications Security Establishment Canada2012-05-10Top Secret / UnknownTradecraft : CARE - Collaborative Analytics Research EnvironmentPresentation slides : 27 p.2014-01-30Glenn Greenwald : Greg Weston : Ryan GallagherCBC
Extracts from Mobile Device Surveillance presentations National Security Agencyca.2010-05Top Secret : Secret / 5VEY : STRAP 1DREAMY SMURF : TRACKER SMURF : NOSEY SMURF : PARANOID SMURF : Mobile Applications Project : WARRIOR PRIDE : PORUSPresentation slides : 4 p.2014-01-28James BallThe Guardian
Psychology: A New Kind of SIGDEV Government Communications Headquarters (GCHQ) - Office of SIGINT Developmentca.2012Top Secret / 5VEYSQUEAKY DOLPHIN : GTE - GLOBAL TELECOMS EXPLOITATIONPresentation slides : 49 p.2014-01-27Richard Esposito : Glenn Greenwald : Matthew Cole : Mark SchoneNBC
Mobile Theme Briefing Government Communications Headquarters (GCHQ)2010-05-28Secret / STRAP 1Mobile Applications ProjectPresentation slides : 4 p.2014-01-27James Glanz : Andrew W. Lehren : Jeff LarsonThe New York Times
Converged Analysis of Smartphone Devices National Security Agency2010-05Top Secret / 5VEYCOMINT : General IntelligencePresentation slides : 14 p.2014-01-27 The New York Times
Content Extraction Enhancements for Target Analytics National Security Agency2011-06-09Top Secret / 5VEYDISHFIRE : PREFER : SPYDER : MILKBONEPresentation slides : 8 p.2014-01-16James BallThe Guardian
Classification Guide for NSA-CSS Quantum Computing Research National Security Agency2011-09-21Top Secret / 5VEY Classification guide : 10 p.2014-01-02Barton Gellman : Steven RichThe Washington Post
Excerpts from the "black budjet," Volume 2 "Combined Cryptologic Program" National Security Agencyca. 2012Top Secret : SI / 5VEYCCP - Combined Cryptologic Program : OWN - Owning the Net : Pentrating Hard TargetsBudget justification : 3 p.2014-01-02Steven Rich : Barton GellmanThe Washington Post
Assessment of Intelligence Opportunity - Juniper Government Communications Headquarters (GCHQ) - Access Strategy Team (OPA-ACD)2011-02-03Top Secret / STRAP 1HEADRESS NUReport : 7 p.2015-12-23Ryan Gallagher : Glenn GreenwaldThe Intercept
Is It Time for a 'Target Reboot'? National Security Agency2012-11-10Top Secret : SI : TK / 5VEYPINWALE : CADENCEWiki article : 5 p.2015-11-17Andrew Fishman : Glenn GreenwaldThe Intercept
NSA Team Selected for Olympics Support National Security Agency2003-12-15TOP SECRET : SI : TK / REL USA, AUS, CAN, GBR, NZLNewsletter : 2 p.2015-09-28James BamfordThe Intercept
Exploiting Foreign Lawful Intercept (LI) Roundtable National Security Agency TOP SECRET / 5VEYPresentation slides : 12 p.2015-09-28James BamfordThe Intercept
Another Successful Olympics Story National Security Agency - Collection Strategies and Requirements Center2004-10-06TOP SECRET : TK : SI / REL USA, AUS, CAN, GBR, NZLGreece : AthenNewsletter : 2 p.2015-09-28James BamfordThe Intercept
Gold Medal Support to the Summer Games National Security Agency - Link Access Programs2004-09-14TOP SECRET : SI : TK / REL USA, AUS, CAN, GBR, NZL Newsletter : 3 p.2015-09-28James BamfordThe Intercept
SID Trains for Athens Olympics National Security Agency - SIGINT Communications2003-08-15TOP SECRET : SI : TK / REL USA, AUS, CAN, GBR, NZL Newsletter : 2 p.2015-09-28James BamfordThe Intercept
Legalities - GCHQ Databases eg Pilbeam, Salamanca, UDAQ etc Government Communications Headquarters (GCHQ)2007-10Unknown / UnknownPILBEAM : SALAMANCA : UDAQ : MARINA : MAINWAY : DISHFIREChart : 1 p.2015-09-25Ryan GallagherThe Intercept
Next Generation Events Government Communications Headquarters (GCHQ)2009-09-29TOP SECRET / STRAP 1NGE - Next Generation Events : BLAZING SADDLES : HAUSTORIUM : MUTANT BROTH : AUTO ASSOC : KARMA POLICE : SOCIAL ANIMAL : INFINITE MONKEYS : HRMAP : MEMORY HOLE : MARBLED GECKO : SIMMER : ROCK RIDGEPresentation Slides : 10 p.2015-09-25Ryan GallagherThe Intercept
Cyber Defence Operations Legal and Policy Government Communications Headquarters (GCHQ)ca.2012TOP SECRET : COMINT / STRAP 1GORDIAN KNOT : XKEYSCOREWiki Article : 16 p.2015-09-25Ryan GallagherThe Intercept
Laws on Interception Oversight - Implications for JCE Government Communications Headquarters (GCHQ)ca.2009Unknown / UnknownGeneral IntelligencePresentation Slides and Notes : 10 p.2015-09-25Ryan GallagherThe Intercept
HRA auditing Government Communications Headquarters (GCHQ)ca.2012TOP SECRET : COMINT / STRAP 1General IntelligenceWiki Article : 5 p.2015-09-25Ryan GallagherThe Intercept
Data stored in BLACK HOLE Government Communications Headquarters (GCHQ)ca.2011TOP SECRET : COMINT / STRAP 1BLACK HOLE : MUTANT BROTH : KARMA POLICE : MEMORY HOLE : AUTOASSOC : SOCIAL ANIMAL : HRMAP : INFINITE MONKEYSWiki Article : 2 p.2015-09-25Ryan GallagherThe Intercept
PullThrough Steering Group Meeting #16 Government Communications Headquarters (GCHQ)2008-02-29TOP SECRET / STRAP 1KARMA POLICE : LIGHTWOOD : MOOSE MILK : ORB FINDERMeeting minutes : 3 p.2015-09-25Ryan GallagherThe Intercept
Events Analysis Government Communications Headquarters (GCHQ)ca.2012Unknown / UnknownSALAMANCA : HAUSTORIUM : THUGGEE : IMMINGLEPresentation Slides : 1 p.2015-09-25Ryan GallagherThe Intercept
Report on Architectural Risk 2012 - Summary Government Communications Headquarters (GCHQ)2012-12-03TOP SECRET / STRAP 1General IntelligenceReport : 6 p.2015-09-25Ryan GallagherThe Intercept
Sensitive Targeting Authorisation (STA) Reference COP5377 Government Communications Headquarters (GCHQ) Unknown / Unknown 4 p.2015-09-25Ryan GallagherThe Intercept
SOCIAL ANTHROPOID Government Communications Headquarters (GCHQ)ca. 2011-02SECRET / STRAP 1SOCIAL ANTHROPOID : SOCIAL ANIMAL : REFORMERPresentation slides : 27 p.2015-09-25Ryan GallagherThe Intercept
Blazing Saddles Government Communications Headquarters (GCHQ)2011TOP SECRET : COMINT / STRAP 1BLAZING SADDLES : AUTOASSOC : HRMap : INFINITE MONKEYS : KARMA POLICE : MARBLED GECKO : MEMORY HOLE : MUTANT BROTH : SAMUEL PEPYS : SOCIAL ANIMAL : SOCIAL ANTHROPOID : GOLDEN AXEWiki article : 4 p.2015-09-25Ryan GallagherThe Intercept
Event {SIGINT} Government Communications Headquarters (GCHQ)ca.2012SECRET : COMINT / STRAP 1HAUSTORIUM : SOCIAL ANTHROPOID : GEOFUSION : SAMREF : HARD ASSOC : SALAMANCA : ASSOCIATION : BANYAN : MAINWAY : FASCIA : CULTWEAVE II : TEEDALE : PILBEAM : INTERSTELLAR DUSTWiki Article : 5 p.2015-09-25Ryan GallagherThe Intercept
Access: The Vision Government Communications Headquarters (GCHQ)ca.2010-07Secret / UnknownGeneral IntelligencePresentation Slides : 2 p.2015-09-25Ryan GallagherThe Intercept
Next Generation Events {NGE} - Black Hole ConOp Government Communications Headquarters (GCHQ)2009-08-18SECRET / STRAP 1BLACK HOLE : BLAZING SADDLES : MUTANT BROTH : KARMA POLICE : SOCIAL ANIMALReport : 13 p.2015-09-25Ryan GallagherThe Intercept
BLACK HOLE Government Communications Headquarters (GCHQ)ca.2009-07Unknown / UnknownBLACK HOLEChart : 1 p.2015-09-25Ryan GallagherThe Intercept
Content or Metadata? Categorisation of aspects of intercepted communications - GCHQ policy guideance Government Communications Headquarters (GCHQ)2010-01-20Top Secret : STRAP 1 : COMINT : ORCON / 5VEYGeneral IntelligencePolicy Guidance Matrix : 3 p.2015-09-25Ryan GallagherThe Intercept
Broadcast-Internet Radio Exploitation and Analysis Government Communications Headquarters (GCHQ)2015-09-25TOP SECRET : COMINT / 5VEYBLAZING SADDLES : KARMA POLICE : GEOFUSIONReport : 17 p.2015-09-25Ryan GallagherThe Intercept
OP HIGHLAND FLING - Event Log Government Communications Headquarters (GCHQ)ca.2011-01-19TOP SECRET / STRAP 1Mutant BrothWiki article : 3 p.2015-09-25Ryan GallagherThe Intercept
Crypt Discovery - Joint Collaboration Activity National Security Agency2011-01-20TOP SECRET / UnknownMUTANT BROTH : BEARDED PIGGY : KARMA POLICE : MEMORY HOLE : MARBLED GECKO : SOCIAL ANIMALReport : 3 p.2015-09-25Ryan GallagherThe Intercept
Target Detection Identifiers Government Communications Headquarters (GCHQ) - Applied Research2009-03COMINT : ORCON : SECRET / STRAP 2MUTANT BROTH : KARMA POLICE : SOCIAL ANIMAL : INFINITE MONKEYS : MEMORY HOLE : MARBLED GECKOPresentation slides : 18 p.2015-09-25Ryan GallagherThe Intercept
ROCKRIDGE Government Communications Headquarters (GCHQ)ca. 2012SECRET / STRAP 1BLACK HOLE : MUTANT BROTH : HRMAP : KARMA POLICE : SOCIAL ANIMAL : AUTOASSOC : MARBLED GECKO : SAMUEL PEPYS : MEMORY HOLE : INFINITE MONKEYSPresentation Slides : 9 p.2015-09-25Ryan GallagherThe Intercept
"ITCR Cloud Efforts" developing "canonical" SIGINT analytics, finding hard targets and exploratory data analysis at scale Government Communications Headquarters (GCHQ)ca.2011-07TOP SECRET / STRAP 1 : 5VEYEVERY ASSOC : BotGraph : PROBABILITY CLOUD : SILVER LIVING : KARMA POLICE : AWKWARD TURTLE : GORDIAN KNOT : FIVE ALIVE : BLOOD HOUNDPresentation Slides : 29 p.2015-09-25Ryan GallagherThe Intercept
Supporting Internet Operations : Special Source Access Government Communications Headquarters (GCHQ)ca.2010TOP SECRET / STRAP 1GERONTIC : HIASCO : ARCANO : PINNAGE : VISAGE : SOSTRUM : GRASPPresentation Slides : 9 p.2015-09-25Ryan GallagherThe Intercept
QFDs and BLACHOLE Technology behind GCHQ-INOC Government Communications Headquarters (GCHQ) - Applied Research2009-03SECRET : COMINT : ORCON / STRAP 2KARMA POLICE : MUTANT BROTH : INFINITE MONKEYS : MARBLED GECKOPresentation : 8 p.2015-09-25Ryan GallagherThe Intercept
Terms of Reference between the Bundesnachtrictendiest Sigint Department and the Bundesamt fur Verfassungsschutz of Germany and the United States National Security Agency for the XKeyscore Computer Network Exploitation Software National Security Agency2013-08-04Secret : SI / REL USA, DEUXKEYSCORETerms of Agreement : 5 p.2015-08-26Zeit OnlineZeit Online
NSA Special Source Operations - Various Documents National Security Agency - Special Source Operationsca.VariousTop Secret / NOFORNBLARNEY : Special Source Operations : FAIRVIEW : STORMBREWPresentation slides and notes : 74 p.2015-08-15Julia Angwin : Laura Poitras : James Risen : Henrik Moltke : Charlie Savage : Jeff LarsonThe New York Times
The SIGINT Philosopher: In Praise of Not Knowing National Security Agency - SIGINT Development2012-08-18Secret / RELNewsletter : 4 p.2015-08-11Peter MaassThe Intercept
The SIGINT Philiosopher: Lessons for Civil Servants from the American Civil War National Security Agency - SIGINT Development2012-10-22Unclassified / FOUONewsletter : 4 p.2015-08-11Peter MaassThe Intercept
The SIGINT Philosopher: Unlike all of My Terribe Teammates, I am a Wonderful Teammate National Security Agency - SIGINT Development2012-09-17Unclassified / FOUONewsletter : 4 p.2015-08-11Peter MaassThe Intercept
The SIGINT Philosopher Is Back -- with a New Face! National Security Agency - SIGINT Development2012-05-29TOP SECRET : TK / REL USA, AUS, CAN, GBR, NZLNewsletter : 4 p.2015-08-11Peter MaassThe Intercept
Are Obscure Languages Still... Obscure? National Security Agency2012-11-10Secret / FOUONewsletter : 3 p.2015-08-11Peter MaassThe Intercept
The SIGINT Philiosopher: Descartes Would Have Been a Lousy SIGINT Reporter National Security Agency - SIGINT Development2012-06-15SECRET / RELSIGINTNewsletter : 4 p.2015-08-11Peter MaassThe Intercept
Are YOU the SIGINT Philosopher? National Security Agency - SIGINT Development2010-11-30Unclassified / FOUONewsletter : 3 p.2015-08-11Peter MaassThe Intercept
The SIGINT Philosopher: When Brevity Is Just the Soul of ''Huh?'' National Security Agency - SIGINT Development2012-07-16TOP SECRET : SI : TK / REL USA, AUS, CAN, GBR, NZLNewsletter : 3 p.2015-08-11Peter MaassThe Intercept
ECHELON Dictionary ca.2010-11Unknown / UnknownECHELONSpreadsheet : 1 p.2015-08-03Duncan CampbellThe Intercept
COMSAT Background Government Communications Headquarters (GCHQ)2010-07-02Secret / UnknownCOMSAT : CARBOY : SNICK : SOUNDER : SHAREDVISION : SHAREDQUEST : CONVERSION QUESTInformation paper : 1 p.2015-08-03Duncan CampbellThe Intercept
Cyprus GCHQ Government Communications Headquarters (GCHQ) TOP SECRET / STRAP 1ECHELONDraft report : 2 p.2015-08-03Duncan CampbellThe Intercept
Blast from the past: YRS in the beginning National Security Agency - Yakima Research Stationca.2011-01Top Secret / 5VEYECHELON : FROSTINGNewsletter : 3 p.2015-08-03Duncan CampbellThe Intercept
YRS GEARS UP TO CELEBRATE 40 YEARS National Security Agency - Yakima Research Station2012-07Top Secret / 5VEYECHELONNewsletter : 1 p.2015-08-03Duncan CampbellThe Intercept
Back in Time: The ECHELON Story National Security Agency - Foriegn Affairs Directorate2005-07-19Secret / FOUOECHELONNewsletter : 2 p.2015-08-03Duncan CampbellThe Intercept
Tracking Targets on Online Social Networks National Security Agency2009-09Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 21 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Writing XKS Fingerprints National Security Agency2010-11Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 67 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
User-agents: Why and How and How to National Security Agency2010-07Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 42 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Web Forum Exploitation using XKEYSCORE National Security Agency2009-07Top Secret : COMINT / 5VEYXKEYSCORE : PINWALEPresentation slides : 7 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
XKEYSCORE National Security Agency2008-02-25Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 30 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
CADENCE Read Me National Security Agencyca.2010Confidential : SI / UnknownXKEYSCORE : CADENCEPresentation slides : 4 p.2015-07-01 The Intercept
HTTP Activity in XKEYSCORE National Security Agency2009-03Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 21 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
DEEPDIVE Configuration Read Me National Security Agencyca.2010Confidential / UnknownXKEYSCOREReadme : 6 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
HTTP Activity vs. User Activity National Security Agency2009-06-19Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 36 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
How Do I Begin Analyzing a Target's Email Address? National Security Agencyca.2010Top Secret : COMINT / UnknownXKEYSCOREDiagrams : 2 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
XKEYSCORE Appids & Fingerprints National Security Agencyca.2010Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 42 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Guide to using Contexts in XKS Fingerprints National Security Agencyca.2010Secret : COMINT / 5VEYXKEYSCOREMemo : 24 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Atomic SIGINT Data Format (ASDF) Configuration Read Me National Security Agencyca.2010Secret / UnknownXKEYSCOREReadme : 2 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Free File Uploaders (FFU) National Security Agency2009-08-13Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 33 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
How to configure category throttling in XKEYSCORE National Security Agencyca.2010Secret : COMINT / 5VEYXKEYSCOREMemo : 2 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Statistics Configuration Read Me National Security Agencyca.2010Secret / 5VEYXKEYSCOREMemo : 4 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Operational Highlight National Security Agency - Special Source Operationsca.2010Top Secret : SI / NOFORNXKEYSCOREPresentation slides : 1 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
X-KEYSCORE Application IDs National Security Agencyca.2010Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 21 p.2015-07-01 The Intercept
XKEYSCORE for Counter-CNE National Security Agency2011-03Top Secret : COMINT / 5VEY21 p.2015-07-01 The Intercept
Full Log vs. HTTP National Security Agency2009-06-11Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 33 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
TRAFFICTHIEF Configuration Read Me National Security Agencyca.2010Secret / 5VEYXKEYSCOREMemo : 5 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
VOIP in XKEYSCORE National Security Agency2009-03Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 13 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
UTT Configuration READ ME National Security Agency2010Secret / 5VEYTURBULENCE : XKEYSCOREMemo : 5 p.2015-07-01The Intercept
VoIP Configuration and Forwarding Read Me National Security Agencyca.2010Secret / 5VEYXKEYSCOREReadme : 3 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
The Unofficial XKEYSCORE User Guide Booz Allen Hamiltonca.2010Top Secret : COMINT / 5VEYXKEYSCOREReport : 27 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Analyzing Mobile-Cellular DNI in XKEYSCORE National Security Agency2009-05Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 17 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Forwarding Selected MAILORDER Files Read Me National Security Agencyca.2010Classified / FOUOXKEYSCOREMemo : 2 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
X-KEYSCORE as a SIGDEV tool National Security Agencyca.2009Top Secret : COMINT : ORCON / 5VEYXKEYSCOREPresentation slides : 44 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Finding and Querying on Document Metadata National Security Agency2009-03Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 24 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Introduction to XKS Appliaction IDs and Fingerprints National Security Agency2009-08-27Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 60 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Using XKS to find and search for logos embedded in documents National Security Agencyca.2009Top Secret : COMINT / 5VEYXKEYSCOREMemo : 2 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Advanced HTTP Activity Analysis National Security Agency2009Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 114 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
XKEYSCORE, Cipher Detection, and You! National Security Agency - Mathematics Research Group2008-08-21Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 17 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Targets visiting specific websites National Security Agencyca.2009Top Secret : COMINT / 5VEYXKEYSCOREPresentation Slides : 3 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints National Security Agency2010-05Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 61 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Email Address vs User Activity National Security Agency2009-06-24Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 20 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Communications System How To Guide National Security Agencyca.2010Top Secret / UnknownXKEYSCOREReadme : 8 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
OSINT Fusion Project Lockheed Martin IS&GS Intelligenceca.2009-05Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 24 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Royale with Cheese Updater : How to Guide National Security Agencyca.2010Secret / 5VEYXKEYSCOREReadme : 13 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
Phone Number Extractor National Security Agency2009-10Top Secret : COMINT / 5VEYXKEYSCOREPresentation slides : 20 p.2015-07-01Morgan Marquis-Boire : Glenn Greenwald : Micah LeeThe Intercept
C1-030-05 Close Out for "Bush Lets U.S. Spy on Callers without Courts" - Action Memorandum National Security Agency - Signals Intelligence Directorate2005-12-19Top Secret : COMINT : ORCON / NOFORNNoneCorrespondence : 13 p.2015-06-26NoneThe Intercept
GCHQ's developing Cyber Defence Mission Government Communications Headquarters (GCHQ) - Network Defence Intelligence and Security Teamca.2007Top Secret : STRAP 1 / 5VEYGeneral intelligencePresentation : 3 p.2015-06-22Andrew Fishman : Morgan Marquis-BoireThe Intercept
Operational Legalities Government Communications Headquarters (GCHQ)ca.2010Unknown / UnknownGeneral intelligencePresentation slides : 156 p.2015-06-22Andrew Fishman : Glenn GreenwaldThe Intercept
Software Reverse Engineering Government Communications Headquarters (GCHQ)2008-07-15Top Secret / UnknownSoftware Reverse EngineeringReport : 2 p.2015-06-22Andrew Fishman : Morgan Marquis-BoireThe Intercept
Malware Analysis & Reverse Engineering Government Communications Headquarters (GCHQ)2010Secret / UnknownGeneral intelligenceReport : 2 p.2015-06-22Andrew Fishman : Morgan Marquis-BoireThe Intercept
TECA Product Centre Government Communications Headquarters (GCHQ)2011-03-28Top Secret : COMINT / STRAP 1SYRINGE : PORRIDGE (STAIN / VAGRANT) : HELMAGEWiki article : 4 p.2015-06-22Andrew Fishman : Morgan Marquis-BoireThe Intercept
Intrusion Analysis - JeAC Government Communications Headquarters (GCHQ)2008-07-23Secret : STRAP 1 / UnknownGeneral intelligenceMemo : 2 p.2015-06-22Andrew Fishman : Glenn GreenwaldThe Intercept
Kapersky User-Agent Strings National Security Agency2008-09Top Secret : Comint / 5VEYGeneral intelligenceReport : 14 p.2015-06-22Andrew Fishman : Morgan Marquis-BoireThe Intercept
Reverse Engineering Government Communications Headquarters (GCHQ)2011-11-18Top Secret : COMINT / STRAP 1General intelligenceWiki article : 4 p.2015-06-22Andrew Fishman : Morgan Marquis-BoireThe Intercept
An Easy Win: Using SIGINT to Learn about New Viruses National Security Agencyca.2010Top Secret : COMINT / 5VEYCAMPERDADAPresentation Slides : 13 p.2015-06-22Andrew Fishman : Morgan Marquis-BoireThe Intercept
GCHQ - U.K. Ministry Stakeholder Relationships Spreadsheets Government Communications Headquarters (GCHQ)ca.2008Unknown / UnknownGeneral intelligenceSpreadsheet : 28 p.2015-06-22Andrew Fishman : Glenn GreenwaldThe Intercept
Interview with a SID "Hacker" -- Part 2: Hacker Culture and Worker Retention National Security Agency - Signals Intelligence Directorate2012-11-10Top Secret : RELIDO : TK / 5VEYGeneral intelligenceArticle : 4 p.2015-06-12NoneThe Intercept
Key SSO Cyber Milstone Dates ; New FAA702 Certification in the Works ; CNO Legal Authorities ; Cyberspace Policy Review National Security Agencyca.2010Secret / 5VEYPRISMPresentation Slides : 90 p.2015-06-04Charlie Savage : Julia Angwin : Jeff Larson : Henrik MoltkeThe New York Times
"Signal v Noise" Column: Do We Need a Bigger SIGINT Truck? National Security Agency - Signals Intelligence Directorate2012-01-23FOUO : Unclassified / UnknownNoneMemo : 2 p.2015-05-28Peter MaassThe Intercept
"Signal v. Noise" Column: Summit Fever National Security Agency - Signals Intelligence Directorate2012-06-25Unclassified : FOUO / UnknownNoneMemo : 2 p.2015-05-28Peter MaassThe Intercept
Op-ed: Leave Bright Pebbles, Not Breadcrumbs, for Those Coming After You National Security Agency - Signals Intelligence Directorate2010-09-24Unclassified : FOUO / UnknownNoneMemo : 2 p.2015-05-28Peter MaassThe Intercept
The SIGINT Philosopher: In Praise of Not Knowing National Security Agency - Signals Intelligence Directorate2012-08-16Unclassifed : FOUO / UnknownNoneMemo : 2 p.2015-05-28Peter MaassThe Intercept
The SIGINT Philospher: The Fallacies Behind the Scenes National Security Agency - Signals Intelligence Directorate2011-03-15Unclassified : FOUO / UnknownNoneMemo : 2 p.2015-05-28Peter MaassThe Intercept
ELINT Analysts - Overcome by Overload? Help is Here with IM&S National Security Agency - Signals Intelligence Directorate2011-03-10Unclassified : FOUO / UnknownNoneMemo : 1 p.2015-05-28Peter MaassThe Intercept
The SIGINT Philosopher: Too Many Choices National Security Agency - Signals Intelligence Directorate2011-01-18Unclassified : FOUO / UnknownNoneMemo : 2 p.2015-05-28Peter MaassThe Intercept
The SIGINT Philosopher: Cognitive Overflow? National Security Agency - Signals Intelligence Directorate2011-04-15FOUO : Unclassified / UnknownNoneMemo : 1 p.2015-05-28Peter MaassThe Intercept
Medical Pattern of Life : Targeting High Value Individual #1 (SIGINT Enabling HUMINT - Targeting) National Security Agency2010-06Top Secret : COMINT / RELSIGINT : HUMINTPresentation slides : 10 p.2015-05-21Cora CurrierThe Intercept
Synergising Network Analysis Tradecraft : Network Tradecraft Advancement Team (NTAT) Communications Security Establishment Canadaca.2012Top Secret : SI / UnknownXKEYSCORE : IRRITANT HORNPresentation Slides : 52 p.2015-05-21Amber Hildebrandt : Dave SeglinsCBC
SIGINT Year in Review, November 2011 National Security Agency - Signals Intelligence Directorate2011-11-22Top Secret / REL USA, AUS, CAN, GBR, NZLSIGINTNewsletter : 2 p.2015-05-18Andrew Fishman : Cora Currier : Margot WilliamsThe Intercept
International Security Assistance (ISAF) - Afghanistan, June 1 2011 NATO : Supreme Headquarters Allied Powers Europe2011-06-01Secret / UnknownGeneral IntelligenceReport : 2 p.2015-05-18Cora Currier : Andrew Fishman : Margot WilliamsThe Intercept
Afghanistan: Intelligence Summary, 23 June - 24 June Regional Command Southwest RC(SW)2011-06-24Secret : FGI GBR / REL USA, ISAF, NATOGeneral intelligenceBriefing : 3 p.2015-05-18Cora Currier : Andrew Fishman : Margot WilliamsThe Intercept
Afghanistan: Intelligence Summary, 19 June - 20 June Regional Command Southwest RC(SW)2011-06-19Secret : FGI GBR / REL USA, ISAF, NATOGeneral IntelligenceBriefing : 4 p.2015-05-18Cora Currier : Andrew Fishman : Margot WilliamsThe Intercept
What does the Death of Usama bin Laden Mean? National Security Agency2011-05-17Top Secret / FOUOSIGINT : HUMINT : IMINTNewsletter : 3 p.2015-05-18Cora Currier : Andrew Fishman : Margot WilliamsThe Intercept
Current Status of Major Terrorism Figures National Security Agency2008-06Top Secret : HCS : SI : ORCON : MR / NOFORNGeneral SurveillanceReport : 1 p.2015-05-18Cora Currier : Andrew Fishman : Margot WilliamsThe Intercept
SIGINT Obtains Details of Usama bin Laden Message to Top al-Qa'ida Leader in Iraq National Security Agency - Global Jihad Support Network Branch2007-07-18Top Secret / REL USA, AUS, CAN, GBR, NZLSIGINTNewsletter : 2 p.2015-05-18Cora Currier : Andrew Fishman : Margot WilliamsThe Intercept
International Security Assistance (ISAF) - Afghanistan, May 13 2011 NATO : Supreme Headquarters Allied Powers Europeca.2011-05-13Secret / UnknownGeneral IntellignceReport : 3 p.2015-05-18Cora Currier : Andrew Fishman : Margot WilliamsThe Intercept
JTAC Attack Methodology Team Government Communications Headquarters (GCHQ) - JTACca.2011-09-08Top Secret / STRAP 1 Wiki article : 3 p.2015-05-18Andrew Fishman : Cora Currier : Margot WilliamsThe Intercept
FY 2013 Congressional Budget Justification United States Intelligence Community - Office of the Director of National Intelligenceca.2012-02Top Secret / NOFORNIMINT : HUMINT : SIGINTBudget justification : 1 p.2015-05-18Andrew Fishman : Cora Currier : Margot WilliamsThe Intercept
SKYNET: Applying Advanced Cloud-based Behavior Analytics National Security Agency - SIGINT Developmentca.2012TOP SECRET / REL USA, AUS, CAN, GBR, NZLSKYNET : DEMONSPIT : SIGINT Enabling ProjectPresentation slides : 20 p.2015-05-08Glenn Greenwald : Cora Currier : Andrew FishmanThe Intercept
SKYNET: Courier Detection via Machine Learning National Security Agencyca.2012TOP SECRET / 5VEYSKYNET : SIGINT Enabling ProjectPresentation slides : 20 p.2015-05-08Andrew Fishman : Cora Currier : Glenn GreenwaldThe Intercept
For Media Mining, the Future Is Now! National Security Agency - Human Language Technology Research 2006-08-01TOP SECRET / UnknownRHINEHART : REAL TIME - RT-10 : SIGINT Enabling ProjectNewsletter : 2 p.2015-05-05Dan FroomkinThe Intercept
Dealing with a "Tsunami" of Intercept National Security Agency - Human Language Technology Research 2006-08-29TOP SECRET / RELSIGINT Enabling ProjectNewsletter : 2 p.2015-05-05Dan FroomkinThe Intercept
SIRDCC Speech Technology WG assessment of current STT technology Government Communications Headquarters - SIRDCC Speech Technology Working Group2009-12-07Secret / STRAP 1SIGINT Enabling ProjectReport : 11 p.2015-05-05Dan FroomkinThe Intercept
Black Budget for 2013 p.360-364 United States Intelligence Communityca.2012TOP SECRET / NOFORNSIGINTBudget justification : 5 p.2015-05-05Dan FroomkinThe Intercept
How is Human Language Technology (HLT) Progressing National Security Agency - Human Language Technology Research 2011-09-06TOP SECRET / FOUOSIGINT Enabling ProjectNewsletter : 2 p.2015-05-05Dan FroomkinThe Intercept
For Media Mining, the Future Is Now! (conclusion) National Security Agency - Human Language Technology Research 2006-08-07TOP SECRET / UnknownSIGINT Enabling ProjectNewsletter : 2 p.2015-05-05Dan FroomkinThe Intercept
Coming Soon! A Tool that Enables Non-Linguists to Analyze Foreign-TV News Programs National Security Agency - Center for Time-Sensitive Information2008-10-23Unclassified / FOUOSIGINTNewsletter : 1 p.2015-05-05Dan FroomkinThe Intercept
Finding Nuggets - Quickly - in a Heap of Voice Collection, From Mexico to Afghanistan National Security Agency - Texas2011-05-25TOP SECRET / FOUOSIGINT Enabling ProjectNewsletter : 2 p.2015-05-05Dan FroomkinThe Intercept
Black Budget for 2013 p.262 United States Intelligence Communityca.2012TOP SECRET / NOFORNSIGINTBudget justification : 1 p.2015-05-05Dan FroomkinThe Intercept
Classification Guide for Human Language Technology Models 2-20 National Security Agency - Human Language Technology Research ca.2011-05-18Unclassified / FOUOSIGINTClassification guide : 4 p.2015-05-05Dan FroomkinThe Intercept
RT10 Overview National Security Agencyca.2006-06TOP SECRET / UnknownSIGINT : HUMINTPresentation slides : 15 p.2015-05-05Dan FroomkinThe Intercept
Comet News Government Communications Headquarters (GCHQ)ca.2010-03Top Secret / STRAP 1Overhead : QUITONewsletter : 1 p.2015-04-02Andrew Fishman : Glenn GreenwaldThe Intercept
Welcome to Mission Driven Access Workshop Government Communications Headquarters (GCHQ) - BUDE SIGINT Developmentca.2010Confidential / ConfidentialDiplomatic Surveillance ProgramsPresentation slides : 2 p.2015-04-02Andrew Fishman : Glenn GreenwaldThe Intercept
Operational Highlights, August 2009 Government Communications Headquarters (GCHQ) - Joint Threat Research Intelligence Groupca.2009-08Top Secret / STRAP 1QUITONewsletter : 1 p.2015-04-02Andrew Fishman : Glenn GreenwaldThe Intercept
Behavioural Science Support for JTRIG's (Joint Threat Research and Intelligence Group's) Effects and Online HUMINT Operations Government Communications Headquarters (GCHQ) - Joint Threat Research Intelligence Group2011-03-10Unknown / UnknownQUITOReport : 1 p.2015-04-02Andrew Fishman : Glenn GreenwaldThe Intercept
Extended Enterprise Report: July 2009=8 Government Communications Headquarters (GCHQ)ca.2008-07Top Secret / 5VEYDiplomatic Surveillance ProgramsReport : 1 p.2015-04-02Andrew Fishman : Glenn GreenwaldThe Intercept
Offensive Cyber Status Network Access Centre (NAC)ca.2011-07STRAP 1 / 5VEYWHICHED : REDReport : 1 p.2015-04-02Andrew Fishman : Glenn GreenwaldThe Intercept
CASCADE : Joint Cyber Sensor Architecture Communications Security Establishment Canada - Cyber Defence Operationsca.2011Top Secret : COMINT / 5VEYCASCASEReport : 67 p.2015-03-23Amber Hildebrandt : Dave Seglins : Michael PereiraCBC
CSEC SIGINT Cyber Discovery : Summary of the current effort Communications Security Establishment Canada2010-10Top Secret : COMINT / 5VEYWARRIORPRIDE : REPLICANTFARM : EONBLUE : QUANTUMPresentation slides : 22 p.2015-03-23Amber Hildebrandt : Dave Seglins : Michael PereiraCBC
An excerpt of CSE's response to CBC's operations Communications Security Establishment Canada2015-03-06Unclassified / UnclassifiedGeneral intelligenceMemo : 5 p.2015-03-23Amber Hildebrandt : Dave Seglins : Michael Pereira CBC
NSA Intelligence Relationship with Canada's Communications Security Establishment Canada (CSEC) National Security Agency2013-03-03Top Secret : SI / 5VEYGeneral intelligenceReport : 4 p.2015-03-23Amber Hildebrandt : Dave Seglins : Michael PereiraCBC
CSEC Cyber Threat Capabilities : SIGINT and ITS : an end-to-end approach Communications Security Establishment Canadaca.2011Top Secret : COMINT / 5VEYEONBLUE : SPEEDSHAREPresentation slides : 46 p.2015-03-23Amber Hildebrandt : Dave Seglins : Michael Pereira CBC
Cyber Threat Detection Communications Security Establishment Canadaca.2010Top Secret : COMINT / 5VEYEONBLUE : SPECIALSOURCE : CROSSBOWPresentation slides : 14 p.2015-03-23Amber Hildebrandt : Dave Seglins : Michael PereiraCBC
XKEYSCORE Search Query Government Communications Security Bureau2013-01-06Unknown / UnknownXKEYSCORECode : 1 p.2015-03-16Ryan GallagherThe Intercept
SIGINT Development Forum (SDF) Minutes National Security Agency2009-06-08Top Secret : Comint / 5VEYGeneral intelligenceMeeting minutes : 3 p.2015-03-11Mark NippertNZ Herald
SUSLOW Monthly Report for March 2013 National Security Agency - Analysis and Productionca.2013-03Top Secret : SI / 5VEYWARRIORPRIDEReport : 2 p.2015-03-11Matt NippertNZ Herald
NSA Intelligence Relationship with New Zealand National Security Agencyca.2013-03Top Secret : SI / 5VEYGeneral intelligenceInformation paper : 3 p.2015-03-11Matt NippertNZ Herald
Cryptanalysis & Exploitation Services : Analysis of Target Systems National Security Agency - Cryptanalysis and Exploitation Servicesca.2011Top Secret : SI : TK / NOFORNTarget Systems ProjectReport : 3 p.2015-03-10Jeremy Scahill : Josh BegleyThe Intercept
Apple A4-A5 Application Processors Analysis Central Intelligence Agency (CIA)ca.2010Secret / NOFORNCIA Apple OperationsPresentation slides : 1 p.2015-03-10Jeremy Scahill : Josh BegleyThe Intercept
Capability - iPhone Government Communications Headquarters (GCHQ)ca.2008Top Secret / STRAP 1WARRIOR PRIDE : DREAMY SMURF : NOSEY SMURF : TRACKER SMURF : PORUS : PARANOID SMURFPresentation slides : 1 p.2015-03-10Jeremy Scahill : Josh BegleyThe Intercept
Secure key extraction by physical de-processing of Apple's A4 processor Central Intelligence Agency (CIA)ca.2008Secret / NOFORNCIA Apple OperationsPresentation Abstract : 1 p.2015-03-10Jeremy Scahill : Judith HorchertThe Intercept
TCB Jamboree 2012 Central Intelligence Agency (CIA)ca.2012-02-07Secret / NOFORNTCB JamboreeMemo : 1 p.2015-03-10Jeremy Scahill : Josh BegleyThe Intercept
TCB Jamboree Central Intelligence Agency (CIA)2012-02-07Top Secret : SI / NOFORNTCB JamboreeMemo : 1 p.2015-03-10Jeremy Scahill : Josh BegleyThe Intercept
TPM Vulnerabilities to Power Analysis and an Exposed Exploit to Bitlocker Central Intelligence Agency (CIA)2012-03-16Secret : ORCON / NOFORNCIA Microsoft OperationsPresentation abstract : 1 p.2015-03-10Jeremy Scahill : Josh BegleyThe Intercept
Differential Power Analysis on the Apple A4 Processor Central Intelligence Agency (CIA)2011-03-15Secret / NOFORNCIA Apple OperationsPresentation abstract : 1 p.2015-03-10Jeremy Scahill : Josh BegleyThe Intercept
Strawhorse: Attacking the MacOS and iOS Software Development Kit Central Intelligence Agency (CIA)ca.2008Secret / NOFORNSTRAWHORSEPresentation abstract : 1 p.2015-03-10Jeremy Scahill : Josh BegleyThe Intercept
Rocoto: Implanting the iPhone Central Intelligence Agency (CIA)ca.2009Top Secret : SI : ORCON / NOFORNROCOTOPresentation Abstract : 1 p.2015-03-10Jeremy Scahill : Josh BegleyThe Intercept
GCSB SIGINT Development Quarterly Report Government Communications Security Bureauca.2009-07Top Secret : Comint / 5VEYGeneral intelligenceReport : 6 p.2015-03-05Nicky Hager : Ryan GallagherNZ Herald
UDAQ item referenced from automated results Government Communications Headquarters (GCHQ)ca.2011Top Secret / STRAP 1Gemalto SIM AttackPresentation slides : 1 p.2015-02-19Jeremy Scahill : Josh BegleyThe Intercept
Where are these keys? Government Communications Headquarters (GCHQ)ca.2011Top Secret / STRAP 1Gemalto SIM AttackPresentation slides : 1 p.2015-02-19Jeremy Scahill : Josh BegleyThe Intercept
Gemalto Yuaawaa Government Communications Headquarters (GCHQ)ca.2011Unknown / UnknownGemalto SIM AttackWiki article : 1 p.2015-02-19Jeremy Scahill : Josh BegleyThe Intercept
DAPINO GAMME CNE Presence and IPT keys : Our workshops aims Government Communications Headquarters (GCHQ)ca.2011Unknown / UnknownGemalto SIM AttackWiki article : 1 p.2015-02-19Jeremy Scahill : Josh BegleyThe Intercept
PCS Harvesting at Scale Government Communications Headquarters (GCHQ)2010-03-27Top Secret / STRAP 1Gemalto SIM AttackReport : 24 p.2015-02-19Jeremy Scahill : Josh BegleyThe Intercept
Target Personalisation Centres (non 5 eyes) Government Communications Headquarters (GCHQ)ca.2011Unknown / UnknownGemalto SIM AttackWiki article : 1 p.2015-02-19Jeremy Scahill : Josh BegleyThe Intercept
ISMIs Identified with KI data for Network Providers Government Communications Headquarters (GCHQ)ca.2011TOP SECRET / STRAP 1Gemalto SIM AttackPresentation slides : 1 p.2015-02-19Jeremy Scahill : Josh BegleyThe Intercept
Successes Government Communications Headquarters (GCHQ)ca.2011Top Secret / STRAP 1Gemalto SIM AttackPresentation slides : 1 p.2015-02-19Jeremy Scahill : Josh BegleyThe Intercept
CNE access to core mobile networks Government Communications Headquarters (GCHQ)ca.2011Secret / STRAP 1Gemalto SIM AttackPresentation slides : 1 p.2015-02-19Jeremy Scahill : Josh BegleyThe Intercept
Stats - Summaries Government Communications Headquarters (GCHQ)ca.2011Top Secret / STRAP 1Gemalto SIM AttackPresentation slides : 1 p.2015-02-19Jeremy Scahill : Josh BegleyThe Intercept
Associated Email Addresses Government Communications Headquarters (GCHQ)ca.2011Top Secret / STRAP 1Gemalto SIM AttackPresentation slides : 1 p.2015-02-19Jeremy Scahill : Josh BegleyThe Intercept
Iran - Current Topics, Interaction with GCHQ National Security Agency2013-03-12Top Secret : COMINT / NOFORNGeneral intelligenceMemo : 2 p.2015-02-10Glenn GreenwaldThe Intercept
Open Source for Cyber Defence - Progress Government Communications Headquarters (GCHQ)2012-06-25Top Secret : COMINT / STRAP 1LOVELY HORSE : HAPPY TRIGGER : ZooL : TWO FACEWiki article : 2 p.2015-02-04Glenn GreenwaldThe Intercept
LOVELY HORSE Government Communications Headquarters (GCHQ)2012-02-06Top Secret : Comint / STRAP 1LOVELY HORSEWiki article : 2 p.2015-02-04Glenn GreenwaldThe Intercept
Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers Government Communications Headquarters (GCHQ)2012-11-10Top Secret : SI : TK / 5VEYINTOLERANTArticle : 1 p.2015-02-04Glenn GreenwaldThe Intercept
NATO Civilian Intelligence Council - Cyber Panel National Input United States Intelligence Community - Office of the Director of National Intelligence2011-09-14Secret / REL USA, NATOGeneral intelligenceBriefing : 3 p.2015-02-04Glenn GreenwaldThe Intercept
LEVITATION and the FFU Hypothesis Communications Security Establishment Canada Top Secret / 5VEYLEVITATIONPresentation slides : 21 p.2015-01-28Amber Hildebrandt : Michael Pereira : Dave SeglinsCBC
Levitation and the FFU Hypothesis Communications Security Establishment Canadaca.2012Top Secret : SI / 5VEYLEVITATION : OLYMPIAPresentation slides : 21 p.2015-01-27Amber Hildebrandt : Michael Pereira : Dave SeglinsCBC
TUTELAGE 411 National Security Agency - Threat Operations Centerca.2011Top Secret / 5VEYTUTELAGEPresentation slides : 30 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Jacob Appelbaum : Marcel Rosenbach : Laura Poitras : Leif Ryge : Michael SontheimerDer Spiegel
The FASHIONCLEFT Protocol National Security Agency - Tailored Access Operations2008-10-16Top Secret / 5VEYFASHIONCLEFT : TURMOILPresentation slides : 19 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Jacob Appelbaum : Laura Poitras : Leif Ryge : Marcel Rosenbach : Michael SontheimerDer Spiegel
CNE Presence in CT10 Status Report National Security Agency - Tailored Access Operationsca.2008-04Top Secret / NOFORNSIGINTReport : 4 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Jacob Appelbaum : Laura Poitras : Leif Ryge : Marcel Rosenbach : Michael SontheimerDer Spiegel
The ROC: NSA's Epicenter for Computer Network Operations National Security Agency - Remote Operations Center2006-09-06Top Secret / 5VEYSIGINTNewsletter : 3 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Jacob Appelbaum : Laura Poitras : Leif Ryge : Marcel Rosenbach : Michael SontheimerDer Spiegel
NSA's Offensive and Defensive Missions: The Twain Have Met National Security Agency - Threat Operations Center2011-04-26Top Secret / 5VEYSIGINTNewsletter : 3 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Jacob Appelbaum : Leif Ryge : Laura Poitras : Marcel Rosenbach : Michael SontheimerDer Spiegel
Pay attention to that man behind the curtain: Discovering aliens on CNE infrastructure Communications Security Establishment Canada2010-06Top Secret / UnknownWARRIORPRIDE : REPLICANTFARMPresentation slides : 30 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Jacob Appelbaum : Laura Poitras : Leif Ryge : Marcel Rosenbach : Michael SontheimerDer Spiegel
Malware from the Five Eyes Five Eyes Network Unclassified / UnknownWARRIORPRIDE : QWERTYCode : 13 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Jacob Appelbaum : Laura Poitras : Leif Ryge : Marcel Rosenbach : Michael SontheimerDer Spiegel
FASHIONCLEFT Interface Control Document National Security Agency - Tailored Access Operations2005-03-28Top Secret / UnknownFASHIONCLEFTTechnical Paper : 28 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Jacob Appelbaum : Hilmar Schmundt : Laura Poitras : Michael Sontheimer : Marcel Rosenbach : Leif RygeDer Spiegel
QUANTUMTHEORY Government Communications Headquarters (GCHQ)ca.2010Top Secret / 5VEYQUANTUMTHEORYPresentation slides : 11 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Jacob Appelbaum : Laura Poitras : Leif Ryge : Marcel Rosenbach : Michael SontheimerDer Spiegel
DEFIANTWARRIOR and the NSA's Use of Bots National Security Agency2010-05-24Top Secret / 5VEYQUANTUMBOT : TURMOIL : TURBINEPresentation slides : 65 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Jacob Appelbaum : Laura Poitras : Leif Ryge : Marcel Rosenbach : Michael SontheimerDer Spiegel
NIOC Maryland Advanced Computer Network Operations Course Navy Information Operations Command Marylandca.2012Top Secret / 5VEYSIGINT Enabling ProjectTeaching materials : 57 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Jacob Appelbaum : Laura Poitras : Leif Ryge : Marcel Rosenbach : Michael SontheimerDer Spiegel
Fourth Party Opportunities - I drink your milkshake National Security Agency - Tailored Access Operations Top Secret / 5VEYFourth Party CollectionPresentation slides : 26 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Jacob Appelbaum : Laura Poitras : Leif Ryge : Marcel Rosenbach : Michael SontheimerDer Spiegel
TRANSGRESSION Overview for Pod58 National Security Agencyca.2010-02-07Top Secret / 5VEYFourth Party CollectionPresentation slides : 16 p.2015-01-17Andy Müller-Maguhn : Aaron Gibson : Hilmar Schmundt : Claudio Guarnieri : Jacob Appelbaum : Laura Poitras : Leif Ryge : Michael Sontheimer : Marcel RosenbachDer Spiegel
CSEC SIGINT Cyber Discovery: Summary of the current effort Communications Security Establishment Canada - Covert Network Threats2010-11Top Secret / UnknownWARRIORPRIDE : EONBLUE : REPLICANTFARMPresentation slides : 22 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Jacob Appelbaum : Laura Poitras : Leif Ryge : Marcel Rosenbach : Michael SontheimerDer Spiegel
SNOWGLOBE: From Discovery to Attribution II Communications Security Establishment Canada - Covert Network Threatsca.2011Top Secret / 5VEYWARRIORPRIDE : REPLICANTFARM : SNOWGLOBEPresentation slides : 25 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Jacob Appelbaum : Hilmar Schmundt : Laura Poitras : Leif Ryge : Marcel Rosenbach : Michael SontheimerDer Spiegel
CNE End Point Requirements Government Communications Headquarters (GCHQ)Top Secret / STRAP 1SIGINT Enabling ProjectSpreadsheet : 9 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Jacob Appelbaum : Laura Poitras : Leif Ryge : Michael Sontheimer : Marcel RosenbachDer Spiegel
Chinese Exfiltrate Sensitive Military Technology National Security Agency - Office of SIGINT Developmentca.2011Top Secret / 5VEYSIGINTPresentation slides : 4 p.2015-01-17Aaron Gibson : Claudio Guarnieri : Andy Müller-Maguhn : Jacob Appelbaum : Laura Poitras : Marcel Rosenbach : Leif Ryge : Hilmar Schmundt : Michael SontheimerDer Spiegel
Expanding Endpoint Operations National Security Agency - Remote Operations Center2004-09-17Top Secret / 5VEYSIGINT Enabling ProjectNewsletter : 3 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Jacob Appelbaum : Laura Poitras : Leif Ryge : Marcel Rosenbach : Michael SontheimerDer Spiegel
Computer Network Exploitation (CNE) Classification Guide National Security Agency - Tailored Access Operations2010-03-01Top Secret / 5VEYSIGINTClassification guide : 8 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Jacob Appelbaum : Laura Poitras : Leif Ryge : Marcel Rosenbach : Michael SontheimerDer Spiegel
SNIPs of SIGINT: Monthly Notes for June 2012 National Security Agency2012-06TALENT KEYHOLE : Top Secret / 5VEYPITIED FOOL : PANT SPARTYReport : 5 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Jacob Appelbaum : Laura Poitras : Leif Ryge : Michael Sontheimer : Marcel RosenbachDer Spiegel
Case Studies of Integrated Cyber Operation Techniques National Security Agency - Office of SIGINT DevelopmentTop Secret / 5VEYCounter CNE : Fourth Party CollectionPresentation slides : 19 p.2015-01-17 Der Spiegel
InternProjects National Security Agencyca.2006-01-11Top Secret : TALENT KEYHOLE / 5VEYPOLITERAINWiki article : 13 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Laura Poitras : Leif Ryge : Marcel Rosenbach : Michael Sontheimer : Jacob AppelbaumDer Spiegel
Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets National Security Agency2010-06Top Secret / NOFORNSIGINT Enabling ProjectNewsletter : 2 p.2015-01-17Aaron Gibson : Andy Müller-Maguhn : Claudio Guarnieri : Hilmar Schmundt : Jacob Appelbaum : Laura Poitras : Leif Ryge : Marcel Rosenbach : Michael SontheimerDer Spiegel
Introduction to WLAN - 802.11 Active CNE Operations National Security Agency - Close Access2010-12-15Top Secret : COMINT / NOFORNCommunications IntelligencePresentation Slides : 16 p.2016-08-19Sam BiddleThe Intercept
Introduction to BADDECISION National Security Agency - Close Access2010-12-15Top Secret : COMINT / NOFORNCommunications IntelligencePresentation Slides : 31 p.2016-08-19Sam BiddleThe Intercept
Wireless LAN - CNE Tool Training - Course Introduction National Security Agency - Close Accessca.2010-12-15Top Secret : COMINT / NOFORNCommunications IntelligencePresentation Slides : 9 p.2016-08-19Sam BiddleThe Intercept
NSA: Expeditionary Access Operations: NSA’s Close Access Network Exploitation Program (“CNO Course – EAO”) National Security Agency - Expeditionary Access OperationsUnknownTOP SECRET : COMINT / 5VEYCommunications IntelligencePresentation Slides : 15 p.2016-08-19Sam BiddleThe Intercept
NSA SIGINT Development (SIGDEV): SIGINT Development Support II Program Management Review, 24 April 2013 (select slides) National Security Agency - Signals Intelligence Development2013-04-24Top Secret : Si / NOFORNCommunications IntelligencePresentation Slides : 4 p.2016-08-19Sam BiddleThe Intercept
NSA Remote Operations Center: FOXACID Overall Briefing National Security Agency - ROC2007-01-08Top Secret : COMINT / NOFORNCommunications IntelligencePresentation Slides : 23 p.2016-08-19Sam BiddleThe Intercept
NSA Central Security Service: FOXACID SOP for Operational Management of FOXACID Infrastructure (Draft) National Security Agency - Central Security Service ca.2010Top Secret : COMINT / REL USA, AUS, CAN, GBR, NZLCommunications IntelligenceOperations Manual : 31 p.2016-08-19Sam BiddleThe Intercept
Tony Fullman NSA Files National Security Agency2012Top Secret : COMINT / REL US, AUS, NZPRISMTarget Profiles : 6 p.2016-08-14Ryan Gallagher : Nicky HagerThe Intercept
PRESTON Architecture Government Communications Headquarters (GCHQ) - National Threat Assessment Centre2007-07-05Secret / STRAP 1 : EYESPRESTONReport : 47 p.2016-06-07Ryan GallagherThe Intercept
NTAC Mission Government Communications Headquarters (GCHQ) - National Threat Assessment Centreca.2010Unknown / UnknownGeneral IntelligencePresentation Slide : 11 p.2016-06-07Ryan GallagherThe Intercept
Mobile Apps - Checkpoint meeting Archives Government Communications Headquarters (GCHQ)ca.2011-02-11Top Secret : Comint / STRAP 1Mobile Applications ProjectWiki Article : 20 p.2016-06-07Ryan GallagherThe Intercept
E. MILKWHITE Enrichment Service (MES) Programme Government Communications Headquarters (GCHQ)2011-03-09Top Secret / STRAP 1MILKWHITEReport : 2 p.2016-06-07Ryan GallagherThe Intercept
Communications Capability Development Programme Government Communications Headquarters (GCHQ)ca.2012TOP SECRET : COMINT / STRAP 1CCD - Communications Capaility Development Program : IMP - Intercept Modernisation ProgrammeWiki Article : 3 p.2016-06-07Ryan GallagherThe Intercept
2010-11 Investigative Challenges Government Communications Headquarters (GCHQ)ca.2009SECRET / UnknownGeneral IntelligenceReport : 2 p.2016-06-07Ryan GallagherThe Intercept
ArteMIS: DGO and DOC Special Government Communications Headquarters (GCHQ)ca.2009-03-30Top Secret / STRAP 1PRESTONPresentation Slides : 6 p.2016-06-07Ryan GallagherThe Intercept
The DIGINT Programme (DRAFT VERSION 0.11) Government Communications Headquarters (GCHQ)ca.2010SECRET / UnknownDIGINT ProgrammeReport : 8 p.2016-06-07Ryan GallagherThe Intercept
PRESTON Business Processes Government Communications Headquarters (GCHQ) - National Threat Assessment Centre2007-05-08Secret / STRAP 1PRESTONReport : 24 p.2016-06-07Ryan GallagherThe Intercept

This page is a snapshot of ZeroNet. Start your own ZeroNet for complete experience. Learn More