Torrent Info
Title Snowden archive
Category Books
Size 1.84GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
_20131119-odni-nsa_course_materials_module_4_v.28.pdf 2.67MB
01302014-dagbladet-cop15_interception_document.pdf 60.12KB
01312014-cbc-csec_airport_wifi_tracking.pdf 2.11MB
2009-OIG_Report_on_Bulk_Collection.pdf 3.75MB
2011-OIG_Report_on_Bulk_Collection.pdf 4.30MB
20130605-guard-verizon_215_secondary_order.pdf 127.79KB
20130606-wapo-prism.pdf 562.03KB
20130608-guard-boundless_informant_capabilities.pdf 719.29KB
20130608-guard-boundless_informant_faq.pdf 532.16KB
20130608-guard-prism.pdf 132.25KB
20130620-guard-702_minimization_procedures.pdf 509.84KB
20130620-guard-702_targeting_procedures.pdf 539.17KB
20130627-guard-2007_memo_on_us_person_metadata.pdf 974.10KB
20130627-guard-nsa_oig_2009_report.pdf 7.34MB
20130629-wapo-prism.pdf 602.62KB
20130630-guard-dropmire_.pdf 16.25KB
20130710-wapo-upstream.pdf 207.76KB
20130731-guard-xkeyscore_training_slides.pdf 27.26MB
20130809-guard-702_glossary.pdf 151.72KB
20130816-wapo-sid_oversight.pdf 1.20MB
20130816-wapo-so_you_got_a_us_person.pdf 147.08KB
20130816-wapo-sso_news_article.pdf 94.89KB
20130816-wapo-targeting_rationale.pdf 457.02KB
20130830_cryptome_congressional_budget_2013.pdf 2.26MB
2013-08-30_cryptome_congressional_budget_2013.pdf 2.26MB
20130903-globo-satc.pdf 1.56MB
20130905-guard-bullrun.pdf 686.80KB
20130905-guard-cryptanalysis_classification.pdf 248.25KB
20130905-guard-sigint_enabling.pdf 382.13KB
20130908-globo-stormbew_tv.pdf 90.66KB
20130908-globo-stormbrew_tv.pdf 90.66KB
20130908-globo-tv.pdf 649.75KB
20130909-spiegel-smartphones.pdf 519.64KB
20130911-guard-israel_sharing_0.pdf 808.09KB
20130916-spiegel-credit_card_transactions.pdf 422.18KB
20130920-spiegel-belgacom.pdf 317.78KB
20130928-nyt-contact_chaining.pdf 280.44KB
20130928-nyt-syanpse.pdf 186.37KB
20131004-guard-egotistical_giraffe.pdf 1.96MB
20131004-guard-iat_tor.pdf 1000.26KB
20131004-guard-tor_stinks.pdf 2.00MB
20131004-wapo-gchq_mullenize.pdf 1.26MB
20131004-wapo-tor.pdf 310.58KB
20131014-wapo-collection_optimization.pdf 59.96KB
20131014-wapo-content_acquisition_optimization1.pdf 2.70MB
20131014-wapo-content_acquisition_optimization2.pdf 2.50MB
20131020-spiegel-mexican_president.pdf 180.92KB
20131021-monde-boundless_informant_france.pdf 136.65KB
20131021-monde-close_access_sigads.pdf 198.53KB
20131021-monde-wanadoo_alcatel.pdf 115.18KB
20131022-monde-prism_april_2013.pdf 1.26MB
20131024-guard-phones_world_leaders.pdf 147.73KB
20131025-monde-french_cyberattacks.pdf 666.39KB
20131027-spiegel-embassy.pdf 632.37KB
20131028-mundo-spain_collections.pdf 15.12KB
20131030-wapo-muscular_smiley.pdf 244.01KB
20131030-wapo-muscular.pdf 96.50KB
20131101-guard-corporate_reporting.pdf 121.06KB
20131104-mundo-boundless_informant.pdf 621.45KB
20131104-mundo-info_sharing_partners.pdf 103.45KB
20131104-nyt-collection_accesses.pdf 48.94KB
20131104-nyt-sigint_goals.pdf 1.68MB
20131104-nyt-sigint_strategic_plan.pdf 2.38MB
20131104-wapo-optimization_google.pdf 2.12MB
20131104-wapo-sso_overview.pdf 465.47KB
20131104-wapo-windstop.pdf 94.00KB
20131117-guardian-dsd_3g.pdf 340.47KB
20131117-spiegel-royal_concierge.pdf 93.92KB
20131119-dagbladet-norway_collection_0.pdf 53.53KB
20131119-odni-ag_guidelines_for_domestic_fbi_operations.pdf 7.34MB
20131119-odni-interim_competency_test_for_access_to_fisa_data.pdf 171.14KB
20131119-odni-nsa_core_intelligence_oversight_training.pdf 15.62MB
20131119-odni-nsa_course_materials_intro_v.13.pdf 378.08KB
20131119-odni-nsa_course_materials_module_1_v.17.pdf 1.01MB
20131119-odni-nsa_course_materials_module_2_v.16.pdf 811.74KB
20131119-odni-nsa_course_materials_module_3_v.22.pdf 1.35MB
20131119-odni-nsa_course_materials_module_4_v.28.pdf 2.67MB
20131119-odni-nsa_course_materials_module_5_v.24.pdf 906.48KB
20131119-odni-nsa_course_materials_module_6_analytic_personal_v.18.pdf 1019.92KB
20131119-odni-nsa_course_materials_module_6_tech_personnel_v.25.pdf 2.40MB
20131119-odni-nsa cryptological school course slides on legal compliance and minimization procedures pdf 17.02MB
20131119-odni-nsa guidance memo on legal standards for searching bulk metadata pdf 1.79MB
20131119-odni-nsa_metadata_collection_training_slides_.pdf 7.46MB
20131119-odni-nsa summary of requirements for collection of bulk metadata pdf 293.91KB
20131119-odni-office of general council business record analyst training slides pdf 2.13MB
20131119-odni-united states signals intelligence directive 18 appendix j pdf 4.34MB
20131119-odni-united states signals intelligence directive 18 jan 25 2011 pdf 9.34MB
20131119-odni-verification_slide.pdf 86.98KB
20131120-guard-collection processing and dissemination of allied communications pdf 246.38KB
20131122-dagbladet-afghanistan_collection.pdf 30.26KB
20131122-dagbladet-boundless_informant_faq.pdf 274.13KB
20131122-dagbladet-boundless_informant.pdf 5.71MB
20131123-nrc-nsa_malware.pdf 145.98KB
20131123-nyt-sigint_strategy_feb_2012.pdf 372.73KB
20131126-huffpo-radicalizers_pornography.pdf 795.25KB
20131126-wapo-microsoft_cloud_exploitation.pdf 2.37MB
20131126-wapo-microsoft_monkey_puzzle.pdf 46.12KB
20131130-GlobeandMail-csec-br-spy.pdf 616.64KB
20131202-cbc-g20.pdf 136.32KB
20131202-guard-dsd_data.pdf 152.84KB
20131204-wapo-chalkfun_foreignness.pdf 61.37KB
20131204-wapo-fascia.pdf 233.23KB
20131205-espresso-italy_spying.pdf 168.78KB
20131205-svt-fra_russia.pdf 93.61KB
20131209-nyt-nsa_games.pdf 293.91KB
20131210-cbc-nsa_csec_partnership.pdf 91.15KB
20131210-wapo-cotraveler_overview.pdf 1.35MB
20131210-wapo-ghost_machine.pdf 859.54KB
20131210-wapo-gsm_classification_guide.pdf 143.10KB
20131210-wapo-location_cookies.pdf 255.29KB
20131210-wapo-target_location.pdf 133.22KB
20131211-svt-accomplishments_from_nsa.pdf 191.24KB
20131211-svt-baltic_region.pdf 152.42KB
20131211-svt-final_agenda_sweden_usa.pdf 1015.03KB
20131211-svt-legal_issues_uk_regarding_sweden_and_quantum.pdf 27.63KB
20131211-svt-nsa_internal_pm_on_fra.pdf 189.71KB
20131211-svt-nsa_slides_xkeyscore.pdf 562.66KB
20131211-svt-quantum_from_gchq.pdf 37.53KB
20131211-svt-sweden_neutral.pdf 182.87KB
20131211-svt-xkeyscore_slide_with_swedish_example.pdf 195.51KB
20131211-svt-xkeyscore_sources.pdf 37.27KB
20131211-svt-xkeyscore_sweden_meeting.pdf 905.20KB
20131223-wapo-nsacss-mission.pdf 100.25KB
20131230-appelbaum-nsa_ant_catalo.pdf 6.87MB
20131230-appelbaum-nsa_ant_catalog.pdf 6.87MB
20131230-spiegel-qfire.pdf 2.14MB
20131230-spiegel-tao_intro.pdf 2.23MB
20131230-spiegel-tao_quantum_tasking.pdf 3.51MB
20131230-spiegel-tao_quantum_theory.pdf 727.72KB
2013-watchlist-guidance.pdf 26.49MB
20140102-wapo-quantum_computers_hard_targets.pdf 374.72KB
20140102-wapo-quantum_computing.pdf 139.98KB
20140116-guard-dishfire_presentation.pdf 861.66KB
20140127-nbc-squeaky_dolphin.pdf 17.36MB
20140127-nyt-converged_analysis_on_smartphone_devices.pdf 848.49KB
20140127-nyt-mobile_theme_briefing.pdf 131.50KB
20140128-guard-leaky_phone_apps_0.pdf 222.27KB
20140128-guard-leaky_phone_apps.pdf 81.85KB
20140130-information_dk-cop15_interception_document.pdf 60.12KB
20140131-cbc-csec_airport_wifi_tracking.pdf 2.11MB
20140204-nbc-british_spies_attacked_hactivist_anonymous.pdf 1.13MB
20140207-nbc-gchq_honey_trap_cyber_attack_background_on_jtrig.pdf 1.12MB
20140207-nbc-gchq honey trap cyber attack leveraging foreign journalists via jtrig pdf 590.87KB
20140207-nrc-boundless_nederland.pdf 1.07MB
20140211-intercept-drones_intercepting_communications.pdf 365.83KB
20140218-intercept-discovery_sigint_targeting_scenarios_and_compliance.pdf 631.45KB
20140218-intercept-gchq_sigdev_.pdf 27.83MB
20140224-intercept-training_for_covert_online_operations.pdf 4.28MB
20140227-guard-gchq_optic.pdf 240.64KB
20140303-epic-doj_report_on_pen_register_fisa_orders.pdf 3.70MB
20140305-nrc-dutch_shares_collected_anti-piracy_information_with_nsa.pdf 535.99KB
20140307-intercept-nsa_ask_zelda_an_interview_with_zelda.pdf 65.09KB
20140307-intercept-nsa_ask_zelda_guilty_until_proven_innocent.pdf 47.54KB
20140307-intercept-nsa_ask_zelda_is_bain_de_soleil_a_bane_on_the_nsa.pdf 55.21KB
20140307-intercept-nsa_ask_zelda_watching_every_word_in_snitch_city.pdf 40.11KB
20140311-nyt-ashcroft_memo_on_intelligence_sharing_procedures.pdf 117.86KB
20140311-nyt-classification guide for fisa the protect america act and the fisa amendments act pdf 876.96KB
20140311-nyt-classification_guide_for_stellarwind_program_0.pdf 2.17MB
20140311-nyt-nsa_memo_expands_access_to_fisa_information.pdf 440.00KB
20140311-nyt-nsa_timeline_of_surveillance_law_developments.pdf 194.96KB
20140312-intercept-five_eyes_hacking_large_routers.pdf 22.54KB
20140312-intercept-increasing collection capacity by increasing implants pdf 21.13KB
20140312-intercept-mhs_leverages_xkeyscore_for_quantum.pdf 46.38KB
20140312-intercept-multiple_methods_of_quantum.pdf 121.12KB
20140312-intercept-nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf 353.62KB
20140312-intercept-nsa_selector_types.pdf 117.08KB
20140312-intercept-nsa technology directorate analysis of converged data pdf 115.66KB
20140312-intercept-quantum_insert_diagrams.pdf 514.41KB
20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf 1.15MB
20140312-intercept-turbine_and_turmoil.pdf 217.97KB
20140312-intercept-turbine_industrial_scale_exploitation.pdf 81.13KB
20140312-intercept-vpn and voip exploitation with hammerchant and hammerstein pdf 459.06KB
20140313-intercept-nsa_cooperative_third_party_relationships.pdf 312.20KB
20140315-intercept-turbine_intelligence_command_and_control.pdf 121.95KB
20140318-wapo-adding_another_country_to_mystic_program.pdf 48.08KB
20140318-wapo-description_of_data_collection_under_mystic.pdf 61.93KB
20140318-wapo-mystic_program.pdf 73.36KB
20140320-intercept-targeting_system_administrator_accounts.pdf 490.67KB
20140321-le_monde-french_intelligence_e-mail_spying_operation.pdf 1.07MB
20140322-nyt-operation_shotgiant_objectives.pdf 384.50KB
20140329-der_spiegel-gchq_and_nsa_spy_on_heads_of_state.pdf 102.70KB
20140404-intercept-2009_sigdev_conference.pdf 40.92KB
20140404-intercept-gchq_full_spectrum_cyber_effects.pdf 1.74MB
20140430-intercept-gchq_visit.pdf 28.59KB
20140430-intercept-ghostmachine.pdf 6.43MB
20140430-intercept-prism_olympics.pdf 581.23KB
20140513-greenwald-noplacetohidedocuments.pdf 86.95MB
20140519-intercept-black_budget.pdf 53.22KB
20140519-intercept-dea_warfighter.pdf 142.78KB
20140519-intercept-mystic.pdf 78.50KB
20140519-intercept-somalget.pdf 131.46KB
20140519-intercept-sso_dictionary_excerpt.pdf 34.05KB
20140519-intercept-sso_mystic_charts.pdf 563.22KB
20140531-nyt-identity-intelligence.pdf 1.19MB
20140610-cryptome-dea-nsa-sandkey.pdf 361.37KB
20140616-der_spiegel-analytics_for_targets_in_europe_0.pdf 54.22KB
20140616-der_spiegel-xkeyscore_fingerprints_1.pdf 53.51KB
20140618-dagbladet-black_budget.pdf 107.79KB
20140618-dagbladet-keith_alexander_talking_points.pdf 46.54KB
20140618-der_spiegel-boundless_informant_overview_global.pdf 316.56KB
20140618-der spiegel-boundless informant statistics for so-called third parties pdf 353.50KB
20140618-der spiegel-boundless informant statistics on data from 22foreign partners22 pdf 356.05KB
20140618-der_spiegel-boundless_informant_statistics_on_germany.pdf 289.02KB
20140618-der_spiegel-boundless_informant_statistics_on_the_uk.pdf 157.08KB
20140618-der spiegel-briefing on the visit to the nsa of a high-ranking bnd official pdf 491.70KB
20140618-der_spiegel-cooperation_between_the_nsa_bnd_and_bfv.pdf 327.92KB
20140618-der_spiegel-details_on_xkeyscore_from_an_internal_gchq_website.pdf 413.65KB
20140618-der spiegel-excerpt on the sharing of xkeyscore with german intelligence agency bfv pdf 66.89KB
20140618-der spiegel-explanation of nymrod a system for searching for people and places in databases and documents pdf 263.31KB
20140618-der_spiegel-faqs_on_the_boundless_informant_program.pdf 231.88KB
20140618-der spiegel-final agenda of a meeting between high-ranking nsa and bnd officials pdf 525.17KB
20140618-der_spiegel-gchq_report_on_the_technical_abilities_of_tempora.pdf 293.41KB
20140618-der spiegel-guidelines for the classification of nsa sigint details 1945-1967 pdf 2.59MB
20140618-der spiegel-guidelines for the classification of suslag details and the nsa-bnd cooperation pdf 777.93KB
20140618-der spiegel-internal nsa presentation on the bnds organization 0 pdf 1.08MB
20140618-der_spiegel-logo_of_nsa-bnd_cooperation.pdf 29.78KB
20140618-der spiegel-nostalgic recollections from nsa workers formerly stationed in bad aibling pdf 265.50KB
20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod.pdf 418.41KB
20140618-der spiegel-nsacss europe- report on the experiences of one nsa worker pdf 362.97KB
20140618-der spiegel-nsacss presentation on technical surveillance in europe and africa pdf 1.54MB
20140618-der spiegel-overview of the use of boundless informant world map pdf 219.75KB
20140618-der spiegel-preliminary agenda of a meeting between nsa and bnd officials pdf 349.48KB
20140618-der spiegel-report on a wharpdrive incident in an sso presentation pdf 261.12KB
20140618-der spiegel-report on an nsa sigdev training course for allied countries pdf 249.86KB
20140618-der spiegel-report on an nsa visit to bnd site and on data transfer from the bnd to the nsa pdf 305.80KB
20140618-der spiegel-report on an unexploded ordnance alarm at european technical centern pdf 269.94KB
20140618-der spiegel-report on an xkeyscore training session at the ecc dagger complex pdf 402.49KB
20140618-der spiegel-report on data exchange between the nsa and bnd within the jsa framework pdf 150.04KB
20140618-der spiegel-report on the beginnings of the european security center esc in the dagger complex pdf 287.03KB
20140618-der spiegel-report on the changing of the escs name to european security operations center esoc pdf 273.93KB
20140618-der_spiegel-report_on_the_nsas_access_to_tempora.pdf 280.23KB
20140618-der spiegel-report on the one-year anniversary of the nsa liaison unit suslag in bad aibling pdf 334.72KB
20140618-der spiegel-report on the surveillance of african countries by jsa pdf 254.78KB
20140618-der spiegel-report on the technical expansion of the european technical center in wiesbaden pdf 218.91KB
20140618-der_spiegel-report_on_the_work_of_nsacss_europe.pdf 299.81KB
20140618-der spiegel-restrictions on the technical surveillance performed by jsa pdf 214.19KB
20140618-der_spiegel-us_sites_with_nsa_personnel_in_germany.pdf 84.77KB
20140618-der_spiegel-world_map_from_the_boundless_informant_program.pdf 302.62KB
20140618-DerSpiegel-agenda for the visit of bsi vice president andreas konen to the nsa pdf 120.15KB
20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker pdf 204.84KB
20140618-DerSpiegel-internal nsa discussion guidelines relating to cooperation with the bnd and bfv pdf 326.75KB
20140618-DerSpiegel-presentation on the nsacia unit special collection service pdf 1.83MB
20140618-DerSpiegel-zoom of a boundless informant document with project names pdf 125.61KB
20140630-WaPo-affidavit of keith alexander regarding spying on foreign entities pdf 19.19KB
20140630-WaPo-fisa_amendments_act_summary_document_1.pdf 52.44KB
20140630-WaPo-fisa judges order authorizing surveillance of foreign governments and organizations pdf 37.12KB
20140630-WaPo-list of governments and organizations authorized for surveillance pdf 120.12KB
20140630-WaPo-odni_certification_regarding_foreign_entities.pdf 269.07KB
20140709-Intercept-spying_on_muslim-american_leaders.pdf 294.37KB
20140714-Intercept-jtrigall.pdf 1.06MB
20140723-Intercept-March-2013-Watchlisting-Guidance.pdf 29.39MB
20140723-WaPo-Post-Signals-Intelligence-Authority-Decision-Tree.pdf 58.95KB
20140725-Intercept-Saudi-Arabia-Information-Paper.pdf 325.13KB
20140803-Intercept-Israel-US-1999-Agreement.pdf 2.01MB
20140803-Intercept-NSA-Intelligence-Relationship-With-Israel.pdf 212.07KB
20140805-Intercept-Directorate-of-Terrorist-Identities-Strategic-Accomplishments-2013 pdf 1.72MB
20140812-Intercept-GCHQ-Covert-Mobile-Phones-Policy.pdf 86.05KB
20140815-Heise-HACIENDA-Program.pdf 1.83MB
20140825-Intercept-CIA-Colleagues-Enthusiastically-Welcome-NSA-Training.pdf 87.82KB
20140825-Intercept-CRISSCROSSPROTON-Point-Paper.pdf 288.89KB
20140825-Intercept-DNI-Decision-Memorandum-on-ICREACH.pdf 254.53KB
20140825-Intercept-ICREACH-Black-Budget-Extract.pdf 36.61KB
20140825-Intercept-ICREACH-Sharing-SIGINT-Comms-Metadata-with-the-Intel-Community-Memo pdf 194.58KB
20140825-Intercept-ICREACH-Wholesale-Sharing.pdf 33.73KB
20140825-Intercept-Metadata-Policy-Conference.pdf 181.00KB
20140825-Intercept-Metadata-Sharing-Memorandum.pdf 392.62KB
20140825-The-Intercept-Sharing-Communications-Metadata-Across-the-USIC-ICREACH pdf 3.92MB
20140831-spiegel-collaboration_in_overdrive.pdf 335.35KB
20140831-spiegel-iraq_uk_load_sharing_carriers.pdf 376.78KB
20140831-spiegel-jordan_belgium.pdf 608.65KB
20140831-spiegel-kurdistan_regional_government.pdf 623.14KB
20140831-Spiegel-NCRs-with-Foreign-Relations-Missions-Become-SUSLAs.pdf 374.82KB
20140831-spiegel-nsa_intelligence_relationship_with_turkey.pdf 782.88KB
20140831-spiegel-nsas_oldest_third_party_partnership.pdf 397.78KB
20140831-spiegel-sinio_seminar_tough_times_for_turkey.pdf 255.96KB
20140831-spiegel-sinio_seminar_turkey_and_the_kurds.pdf 271.21KB
20140831-spiegel-sinio_seminar_turkish_elections.pdf 272.57KB
20140831-spiegel-turkey_and_the_pkk.pdf 669.60KB
20140831-spiegel-turkey_at_the_g20_pre-meeting.pdf 206.81KB
20140831-spiegel-turkey_energy_company_development.pdf 149.69KB
20140831-spiegel-turkish_signal_intelligence_chief_agenda.pdf 374.93KB
20140905-intercept-quadrennial intelligence community review final report pdf 3.49MB
20140914-intercept-ferguson_visit_precis.pdf 231.71KB
20140914-intercept-key_activities_in_progress.pdf 228.10KB
20140914-intercept-speargun_phase_one.pdf 54.17KB
20140914-intercept-speargun_underway.pdf 127.01KB
20140914-spiegel-satellite_teleport_knowledge.pdf 4.38MB
20140914-spiegel-treasure_map_announces_a_new_release.pdf 551.96KB
20140914-spiegel-treasure_map_presentation.pdf 5.73MB
20141010-intercept-cno_core_secrets_security_structure.pdf 329.13KB
20141010-intercept-cno_core_secrets_slide_slices.pdf 1.10MB
20141010-intercept-computer_network_exploitation_classification_guide.pdf 965.80KB
20141010-intercept-eci_compartments.pdf 534.56KB
20141010-intercept-eci_pawleys_classification_guide.pdf 434.74KB
20141010-intercept-eci_whipgenie_classification_guide.pdf 684.37KB
20141010-intercept-exceptionally_controlled_information_listing.pdf 934.86KB
20141010-intercept-sentry_eagle_brief_sheet.pdf 1.22MB
20141010-intercept-tarex_classification_guide.pdf 757.56KB
20141125-sueddeutsche-access_breakdown.pdf 25.87KB
20141125-sz-cable_master_list_ac.pdf 158.76KB
20141125-sz-cable_master_list_fea.pdf 59.73KB
20141125-sz-cable_regions.pdf 32.99KB
20141125-sz-cables_no_current_access.pdf 27.72KB
20141125-sz-cables_where_we_are.pdf 27.59KB
20141125-sz-cables_where_we_want_to_be.pdf 26.76KB
20141125-sz-cne_endpoint_project_load.pdf 61.16KB
20141125-sz-mti_access_project_weekly_status_february_6_2009.pdf 70.59KB
20141125-sz-mti_access_project_weekly_status_june_27_2008.pdf 95.64KB
20141125-sz-mti_access_project_weekly_status_november_28_2008.pdf 92.08KB
20141125-sz-partner_cables.pdf 151.74KB
20141125-sz-ptc_glossary.pdf 121.02KB
20141125-sz-windstop_system_highlights.pdf 137.21KB
20141204-intercept-auroragold_project_overview.pdf 418.03KB
20141204-intercept-auroragold target technology trends center support to wpmo 0 pdf 1.60MB
20141204-intercept-auroragold_working_aid.pdf 427.75KB
20141204-intercept-auroragold_working_group.pdf 22.60MB
20141204-intercept-ir21_a_technology_warning_mechanism_0.pdf 1.75MB
20141204-intercept-nsa first ever collect of high interest 4g cellular signal pdf 15.35KB
20141204-intercept-nsa_gchq_csec_network_tradecraft_advancement.pdf 239.41KB
20141204-intercept-opulant_pup_encryption_attack.pdf 35.96KB
20141204-intercept-wolframite_encryption_attack.pdf 71.90KB
20141214-intercept-gchq_automated_noc_detection.pdf 3.69MB
20141214-intercept-gchq_hopscotch.pdf 10.90KB
20141214-intercept-gchq_making_network_sense_of_the_encryption.pdf 2.33MB
20141214-intercept-gchq_nac_review_april_june_2011.pdf 29.74KB
20141214-intercept-gchq_nac_review_january_march_2012.pdf 17.74KB
20141214-intercept-gchq_nac_review_july_sept_2011.pdf 25.55KB
20141214-intercept-gchq_nac_review_october_december_2011.pdf 80.96KB
20141214-intercept-gchq_stargate_cne_requirements.pdf 269.85KB
20141214-Intercept-gchq-mobile-networks-in-my-noc-world.pdf 1.86MB
20141228-speigel-a potential technique to deanonymise users of the tor network 0 pdf 2.05MB
20141228-speigel-analysis from ssl-tls connections through gchq in the flying pig database 0 pdf 1.46MB
20141228-speigel-analytic challenges from active-passive integration when nsa attacks ipsec vpns 0 pdf 1.96MB
20141228-speigel-analytics_on_security_of_tor_hidden_services_0.pdf 3.65MB
20141228-speigel-bluesnort program on net defense from encrypted communications 0 pdf 1.31MB
20141228-speigel-canadian_document_from_ces_on_tls_trends_0.pdf 1.91MB
20141228-speigel-classification_guide_for_cryptanalysis_0.pdf 276.64KB
20141228-speigel-decryption of vpn connections within the valiantsurf program 0 pdf 2.01MB
20141228-speigel-description_of_existing_projects_on_vpn_decryption_0.pdf 487.65KB
20141228-spiegel- national information assurance research laboratory niarl tundra pdf 1.97MB
20141228-spiegel-description of voip telephony encryption methods and other ways to attack pdf 284.65KB
20141228-spiegel-description on the processing of vpn data packets within the turmoil program pdf 1.58MB
20141228-spiegel-explanation of a potential technique to deanonymise users of the tor network pdf 2.41MB
20141228-spiegel-explanation of the gallantwave that decrypts vpn traffic within longhaul pdf 570.28KB
20141228-spiegel-explanation of the poisennut product and its role when attacking vpn pdf 250.23KB
20141228-spiegel-explanation of the transform engine emulator when attacking vpn pdf 186.96KB
20141228-spiegel-explanation of the turmoil gallantwave program and its role when attacking vpn 0 pdf 257.89KB
20141228-spiegel-explanation on the spin9 program on end-to-end attacks on vpn pdf 6.52MB
20141228-spiegel-gchq_briefing_on_the_bullrun_program.pdf 429.34KB
20141228-spiegel-gchq presentation on the bullrun programs decryption capabilities pdf 844.20KB
20141228-spiegel-general_description_how_nsa_handles_encrypted_traffic.pdf 230.49KB
20141228-spiegel-guide for analysts on how to use the prism skype collection pdf 896.28KB
20141228-spiegel-intercept_with_otr_encrypted_chat.pdf 169.56KB
20141228-spiegel-intercept_with_pgp_encrypted_message.pdf 100.87KB
20141228-spiegel-intro to the vpn exploitation process mentioning the protocols attacked - pptp ipsec ssl ssh pdf 5.89MB
20141228-spiegel-malibu architecture overview to exploit vpn communication pdf 620.61KB
20150117-speigel-analysis of chinese methods and performed actions in the context of computer network exploitation pdf 1.34MB
20150117-speigel-classification guide for computer network exploitation cne pdf 1.00MB
20150117-speigel-combination of offensive and defensive missions - how fourth-party missions are being performed pdf 226.21KB
20150117-speigel-csec document about the recognition of trojans and other network based anomaly pdf 3.37MB
20150117-speigel-csec document on the handling of existing trojans when trojanizing computers pdf 3.87MB
20150117-speigel-document about the expansion of the remote operations center roc on endpoint operations pdf 228.14KB
20150117-speigel-document explaining the role of the remote operations center roc pdf 167.81KB
20150117-spiegel-nsa example snowglobe in which a suspected french government trojan is analyzed to find out if it can be helpful for own interests 0 pdf 3.30MB
20150117-spiegel-nsa_fourth_party_access_-_i_drink_your_milkshake_.pdf 3.60MB
20150117-spiegel-nsa program tutelage to instrumentalize third party attack tools pdf 4.11MB
20150117-spiegel-nsa project description to recognize and process data that comes from third party attacks on computers pdf 352.45KB
20150117-spiegel-nsa training course material on computer network operations pdf 6.95MB
20150117-spiegel-overview of methods for nsa integrated cyber operations 0 pdf 2.55MB
20150117-spiegel-overview of the transgression program to analyze and exploit foreign cna-cne exploits pdf 2.06MB
20150117-spiegel-overview on the nsa use of bots and the defiantwarrior program pdf 9.43MB
20150117-spiegel-process analysts choose their data requirement and then get to know the tools that can do the job 0 pdf 1.57MB
20150117-spiegel-projects of the tao-ato department such as the remote destruction of network cards pdf 1.38MB
20150117-spiegel-quantumtheory is a set of technologies allowing man-on-the-side interference attacks on tcp-ip connections includes straightbizarre and daredev pdf 1.55MB
20150117-spiegel-report of an nsa employee about a backdoor in the openssh daemon pdf 402.93KB
20150117-spiegel-sample code of a malware program from the five eyes alliance pdf 184.88KB
20150117-spiegel-supply-chain interdiction - stealthy techniques can crack some of sigints hardest targets pdf 212.91KB
20150117-spiegel-technical_description_of_the_fashioncleft_protocol_.pdf 2.86MB
20150117-spiegel-the fashioncleft protocol nsa uses to exfiltrate data from trojans and implants to the nsa 0 pdf 2.60MB
20150128-cbc-cse_presentation_on_the_levitation_project.pdf 3.73MB
20150128-intercept-cse_presentation_on_the_levitation_project.pdf 3.73MB
20150204-intercept-lovely_horse_0.pdf 66.96KB
20150204-intercept-nato_civilian_intelligence_council_cyber_panel.pdf 236.11KB
20150204-intercept-open_source_for_cyber_defence_progress.pdf 65.69KB
20150204-intercept-who_else_is_targeting_your_target_collecting.pdf 52.44KB
20150210-intercept-iran_current_topics_-_interactions_with_gchq.pdf 381.91KB
20150219-Intercept-CCNE-Email-Addresses-Jan10-Mar10-Trial.pdf 76.75KB
20150219-Intercept-CCNE-Email-Harvesting-Jan10-Mar10-Trial.pdf 77.15KB
20150219-Intercept-CCNE-Stats-Summaries-Jan10-Mar10-Trial.pdf 77.06KB
20150219-Intercept-CCNE-Successes-Jan10-Mar10-Trial.pdf 71.99KB
20150219-Intercept-CNE-Access-to-Core-Mobile-Networks.pdf 77.86KB
20150219-Intercept-Dapino-Gamma-CNE-Presence-Wiki.pdf 55.26KB
20150219-Intercept-Dapino-Gamma-Gemalto-Yuaawaa-Wiki.pdf 63.68KB
20150219-Intercept-Dapino-Gamma-Target-Personalisation-Centres.pdf 89.38KB
20150219-Intercept-IMSIs-Identified-With-Ki-Data-For-Network.pdf 82.55KB
20150219-Intercept-PCS-Harvesting-At-Scale.pdf 2.75MB
20150219-Intercept-Where-are-These-Keys.pdf 80.28KB
ambassadesFrance.pdf 319.96KB
blackhat-Alexander-keynote.pdf 15.36MB
bullrun-briefing-sheet-from-gchq.pdf 2.60MB
ccne-email-addresses-jan10-mar10-trial.pdf 82.49KB
ccne-email-harvesting-jan10-mar10-trial.pdf 81.02KB
ccne-stats-summaries-jan10-mar10-trial.pdf 79.57KB
ccne-successes-jan10-mar10-trial.pdf 64.17KB
CLEANED004.-Cover_Memo-Sealed.pdf 1.05MB
CLEANED007.-CongNotificationInfoMemoSSCI_10_Apr_09-Sealedpdf.pdf 2.15MB
CLEANED032.-Basket_2_-_NSA_training.log.pdf 15.75MB
CLEANED096.-NSA_summary_of_BR_requirements_(maybe_Feb_2009)-.pdf 236.94KB
CLEANEDFinal-USSID_SP0018_Annex_J.pdf 532.64KB
CLEANEDFinal-USSID_SP0018.pdf 6.60MB
CLEANEDPRTT-1.pdf 24.70MB
CLEANEDPRTT-2.pdf 3.56MB
cne-access-to-core-mobile-networks.pdf 465.85KB
csec-br-spy.pdf 616.64KB
dapino-gamma-cne-presence-wiki.pdf 73.11KB
dapino-gamma-gemalto-yuaawaa-wiki.pdf 103.25KB
dapino-gamma-target-personalisation-centres.pdf 116.97KB
discovery-sigint-targeting-scenarios-and.pdf 726.84KB
doc-6-cyber-threat-capabilities.pdf 19.82MB
doj-nsa-memo.pdf 1.36MB
doody.pdf 1.31MB
dsd-3g.pdf 886.34KB
ericsson_reply.pdf 64.13KB
europebriefingnote_en.pdf 797.51KB
eyes_wide_open_v1.pdf 4.19MB
FAA-Certification_Renewals_with_Caveats.pdf 138.31KB
FAA-Minimization-Procedures.pdf 574.83KB
FAA-Targeting_Procedures.pdf 615.65KB
FISC-Order,-BR-06-12.pdf 292.11KB
gchq-g20-spy.pdf 3.23MB
gchq-mullenize.pdf 21.97KB
gchq-royal-concierge-de.pdf 120.85KB
gchq-se-fra-quantum-3.pdf 31.02KB
General-Alexander-Letter-re-NSA-Fact-Sheet-Inaccuracy.pdf 184.30KB
identity-intelligence.pdf 2.14MB
i-hunt-sys-admins.pdf 21.81MB
imsis-identified-with-ki-data-for-network.pdf 75.32KB
invisibility-report-9-0-final.pdf 89.54KB
jtrigall.pdf 1.30MB
Judge-Walton_Answers_to_Questions_re_FISC.pdf 1.56MB
Lesson-4_-_So_you_got_US_Person_Information.pdf 147.08KB
letter_to_companies.pdf 100.29KB
media-34093.pdf 1.15MB
media-35509.pdf 1.51MB
media-35510.pdf 4.33MB
media-35511.pdf 9.92MB
media-35512.pdf 1.34MB
media-35513.pdf 3.39MB
media-35514.pdf 835.07KB
media-35515.pdf 24.30MB
media-35516.pdf 5.85MB
media-35517.pdf 575.91KB
media-35518.pdf 2.80MB
media-35519.pdf 892.10KB
media-35520.pdf 4.34MB
media-35521.pdf 15.91MB
media-35522.pdf 1.11MB
media-35523.pdf 366.46KB
media-35524.pdf 508.05KB
media-35525.pdf 665.46KB
media-35526.pdf 12.28MB
media-35527.pdf 7.86MB
media-35528.pdf 2.27MB
media-35529.pdf 20.99MB
media-35530.pdf 2.33MB
media-35531.pdf 494.42KB
media-35532.pdf 1.43MB
media-35533.pdf 4.11MB
media-35534.pdf 2.13MB
media-35535.pdf 6.85MB
media-35536.pdf 571.16KB
media-35537.pdf 574.47KB
media-35538.pdf 3.84MB
media-35539.pdf 15.45MB
media-35540.pdf 44.17MB
media-35541.pdf 426.04KB
media-35542.pdf 3.47MB
media-35543.pdf 3.89MB
media-35544.pdf 535.29KB
media-35545.pdf 177.57KB
media-35546.pdf 599.27KB
media-35547.pdf 383.11KB
media-35548.pdf 766.90KB
media-35549.pdf 1012.75KB
media-35550.pdf 4.49MB
media-35551.pdf 5.06MB
media-35552.pdf 404.70KB
media-35653.pdf 620.45KB
media-35654.pdf 394.03KB
media-35655.pdf 807.87KB
media-35656.pdf 2.38MB
media-35657.pdf 16.90MB
media-35658.pdf 12.19MB
media-35659.pdf 980.05KB
media-35661.pdf 3.48MB
media-35662.pdf 2.89MB
media-35663.pdf 1.02MB
media-35664.pdf 1.51MB
media-35665.pdf 8.68MB
media-35666.pdf 2.70MB
media-35667.pdf 6.63MB
media-35668.pdf 167.47KB
media-35669.pdf 1.13MB
media-35670.pdf 26.27MB
media-35671.pdf 30.24MB
media-35672.pdf 5.11MB
media-35673.pdf 6.59MB
media-35674.pdf 36.53MB
media-35675.pdf 18.74MB
media-35676.pdf 6.65MB
media-35677.pdf 27.61MB
media-35678.pdf 7.11MB
media-35680.pdf 602.64KB
media-35681.pdf 523.64KB
media-35682.pdf 3.26MB
media-35683.pdf 8.90MB
media-35684.pdf 6.22MB
media-35685.pdf 40.27MB
media-35686.pdf 18.77MB
media-35687.pdf 2.50MB
media-35688.pdf 11.49MB
media-35689.pdf 27.61MB
nokia_reply.pdf 101.41KB
no-place-to-hide.pdf 86.95MB
nsa-5-eyes-partners.pdf 20.61KB
nsa-5-eyes-spy-g20-dk.pdf 188.35KB
NSA-Boundless_Informant_Frequently_Asked_Questions.pdf 1.40MB
NSA-Boundless_Informant_Powerpoint_Slides.pdf 72.09MB
nsa-boundless-informant.pdf 189.40KB
nsa-boundless-informant-faq.pdf 1.75MB
NSA-Boundless-Informant-Frequently-Asked-Questions.pdf 1.40MB
nsa-boundlessinformant-no-33m.pdf 5.96MB
nsa-boundless-informant-slides.pdf 72.08MB
nsabullrun.pdf 2.60MB
nsa-bullrun-2-16-guardian-13-0905.pdf 9.64MB
nsa-bullrun-brief-nyt-13-0905.pdf 92.52KB
nsa-bullrun-brief-propublica-13-0905.pdf 2.60MB
nsa-cable-spy-types.pdf 1.01MB
nsa-catalog-appelbaum.pdf 950.64KB
nsa-chalkfun.pdf 68.00KB
nsa-close-access-sigads.pdf 378.97KB
nsa-cotraveler.pdf 602.83KB
nsa-cryptanalysis-2-12-guardian-13-0905.pdf 4.00MB
nsa-csec-partners.pdf 93.10KB
nsa-css-mission.pdf 100.25KB
nsa-dutch-sigint.pdf 667.61KB
nsa-egotisticalgiraffe.pdf 3.06MB
nsa-fascia.pdf 141.09KB
nsa-finance-spy-de.pdf 726.98KB
nsa-fisa-certification.pdf 45.84KB
nsa-fisa-minimization.pdf 799.14KB
nsa-fisa-targeting.pdf 859.04KB
nsa-g8-g20-spying.pdf 191.56KB
nsa-g8-g20-spying-02.pdf 196.25KB
nsa-gchq-fra-quantum.pdf 294.63KB
nsa-gchq-se-fra-comint.pdf 397.64KB
nsa-gchq-spy-games.pdf 2.24MB
nsa-ghost-machine.pdf 2.66MB
nsa-gsm-tracking.pdf 326.47KB
nsa-hosts-fr-spies.pdf 921.60KB
nsa-iat-tor.pdf 2.61MB
NSA-IG_Report.pdf 18.77MB
nsa-israel-spy.pdf 3.46MB
NSA-Memo_to_DOD_-_Proposed_Amendment_to_Conduct_Analysis_of_Metadata.pdf 1.23MB
NSA-Memo-to-DOD---Proposed-Amendment-to-Conduct-Analysis-of-Metadata.pdf 1.23MB
nsa-microsoft-cloud-exploit.pdf 567.25KB
NSA-Missions_Authorities_Oversight_and_Partnerships.pdf 114.04KB
NSA-Missions-Authorities-Oversight-and-Partnerships.pdf 114.04KB
nsa-muslim-porn.pdf 1.32MB
nsa-overcollection.pdf 3.03MB
nsa-ppd-20.pdf 1.28MB
nsa-prism-13-1021.pdf 2.06MB
nsa-prism-dk.pdf 918.28KB
nsa-prism-guardian-13-1101.pdf 2.06MB
nsa-quantum-computer.pdf 515.03KB
nsa-quantum-computer-2.pdf 138.46KB
nsa-quantum-tasking.pdf 5.46MB
nsa-quantumtheory.pdf 2.36MB
nsa-scissors.pdf 295.16KB
nsa-scissors-2.pdf 3.02MB
NSA-Section_702_'Loop_Hole'.pdf 64.72KB
NSA-Section_702_and_Section_215_Factsheets.pdf 1.76MB
NSA-Section-702-and-Section-215-Factsheets.pdf 1.76MB
nsa-se-fra-quantum-2.pdf 34.04KB
nsa-se-fra-relationship.pdf 551.45KB
nsa-se-fra-ru-baltic.pdf 49.54KB
nsa-se-fra-spying-agenda.pdf 1.99MB
nsa-se-fra-xkeyscore.pdf 1.16MB
nsa-se-fra-xkeyscore-slide.pdf 570.25KB
nsa-se-spies.pdf 455.42KB
nsa-sigint-cryptologic-platform.pdf 544.77KB
nsa-sigint-enabling-guardian-13-0905.pdf 5.42MB
nsa-sigint-enabling-nyt-13-0905.pdf 347.68KB
nsa-sigint-enabling-propublica-13-0905.pdf 2.02MB
nsa-sigint-strategic-mission-2007.pdf 1.89MB
nsa-sigint-strategic-mission-2013.pdf 2.58MB
nsa-sigint-strategy-2012-2016.pdf 372.29KB
nsa-sigint-successes.pdf 3.47MB
nsa-smartphones.pdf 741.38KB
nsa-smartphones-analysis.pdf 848.49KB
nsa-sms-exploit.pdf 1.66MB
nsa-spy-games.pdf 78.79KB
nsa-sso1-guardian-13-1101.pdf 182.69KB
nsa-sso2-guardian-13-1101.pdf 107.27KB
nsa-sso-content.pdf 551.25KB
nsa-sso-dk.pdf 222.05KB
nsa-sso-overview.pdf 19.81KB
nsa-sso-slides.pdf 986.06KB
nsa-stellar-wind.pdf 7.99MB
nsa-tao-ant.pdf 164.54KB
nsa-tao-ant-pdf.pdf 962.52KB
nsa-tao-intro.pdf 3.08MB
nsa-target-location.pdf 132.19KB
nsa-tor.pdf 265.66KB
nsa-tor-stinks.pdf 3.99MB
nsa-verizon-spy.pdf 129.72KB
nsa-wanadoo-alcatel.pdf 274.59KB
nsa-windstop.pdf 596.92KB
nsa-windstop-muscular-incenser.pdf 1.01MB
NSA-XKeyscore_Powerpoint.pdf 12.23MB
nsa-xkeyscore.pdf 3.48MB
NSA-XKeyscore-Powerpoint.pdf 12.23MB
nsa-xkeyscore-sources.pdf 29.48KB
nsa-xkeyscore-tor-slides.pdf 160.53KB
nsa-yahoo-google-exploit.pdf 2.99MB
pcs-harvesting-at-scale.pdf 3.40MB
phonesgchq.pdf 1.84MB
phonesnsa.pdf 4.62MB
PRISM-Overview_Powerpoint_Slides.pdf 266.34KB
PRISM-Overview-Powerpoint-Slides.pdf 266.34KB
PRISM-Powerpoint_Slides_re_Data_Acquisition.pdf 294.85KB
PRISM-Powerpoint-Slides-re-Data-Acquisition.pdf 294.85KB
psychology-a-new-kind-of-sigdev.pdf 27.85MB
rcs-9-admin-final.pdf 4.27MB
rcs-9-analyst-final.pdf 8.22MB
rcs-9-sysadmin-final.pdf 11.45MB
rcs-9-technician-final.pdf 13.42MB
remote-control-system-9-0-changelog-final.pdf 82.99KB
remote-control-system-9-1-changelog-final.pdf 46.49KB
samsung_reply_2.pdf 2.64MB
samsung_reply.pdf 2.77MB
saudi-arabia-information-paper.pdf 335.03KB
Section-215_-_Obama_Administration_White_Paper.pdf 156.48KB
Section-215_-_Primary_Order.pdf 5.61MB
Section-215_-_Secondary_Order_-_Verizon.pdf 1.06MB
Section-215---Obama-Administration-White-Paper.pdf 156.48KB
Section-215---Primary-Order.pdf 5.61MB
Section-215---Secondary-Order---Verizon.pdf 1.06MB
SID-Oversight_and_Compliance.pdf 1.11MB
SID-Oversight-and-Compliance.pdf 1.11MB
sigint-enabling-project.pdf 2.06MB
sigint-enabling-project2.pdf 2.02MB
spy-budget-fy13.pdf 2.26MB
Targeting-Rationale_-_TAR.pdf 516.77KB
Targeting-Rationale---TAR.pdf 516.77KB
the-art-of-deception-training-for-a-new.pdf 27.76MB
the-nsa-and-gchqs-quantumtheory-hacking-tactics.pdf 451.06KB
turbine-and-turmoil.pdf 441.18KB
UPSTREAM-Powerpoint_Slide.pdf 78.22KB
UPSTREAM-Powerpoint-Slide.pdf 78.22KB
vpn-and-voip-exploitation-with-hammerchant.pdf 551.01KB
What_We_Need_to_Learn_from_Snowden.pdf 41.31KB
where-are-these-keys.pdf 85.63KB
Wyden-Udall-Letter_on_NSA_Fact_Sheet_Inaccuracy.pdf 173.96KB
Wyden-Udall-Letter-on-NSA-Fact-Sheet-Inaccuracy.pdf 173.96KB
Distribution statistics by country
Netherlands (NL) 4
Sweden (SE) 2
Russia (RU) 2
United States (US) 2
Bolivia (BO) 1
Switzerland (CH) 1
Hungary (HU) 1
Canada (CA) 1
United Kingdom (GB) 1
Israel (IL) 1
China (CN) 1
Iran (IR) 1
Total 18
IP List List of IP addresses which were distributed this torrent