Index of /gov/Snowden archive

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]01302014-dagbladet-cop15_interception_document.pdf2022-12-07 09:02 60K 
[   ]01312014-cbc-csec_airport_wifi_tracking.pdf2022-12-07 09:02 2.1M 
[   ]15th-702Joint-Assessment-Nov2016-FINAL-REDACTED1517.pdf2022-12-07 09:02 492K 
[   ]18th_Joint_Assessment.pdf2022-12-07 09:02 1.3M 
[   ]20th Joint Assessment 4.2.2021.pdf2022-12-07 09:03 4.9M 
[   ]2009-OIG_Report_on_Bulk_Collection.pdf2022-12-07 09:02 3.8M 
[   ]2011-OIG_Report_on_Bulk_Collection.pdf2022-12-07 09:02 4.3M 
[   ]2013-08-30_cryptome_congressional_budget_2013.pdf2022-12-07 09:02 2.3M 
[   ]2013-watchlist-guidance.pdf2022-12-07 09:02 26M 
[   ]2018_Cert_NSA_Targeting_27Mar18.pdf2022-12-07 09:03 3.3M 
[   ]19610217_1960_Doc_3978427_Memorandum.pdf2022-12-07 09:02 2.5M 
[   ]20130605-guard-verizon_215_secondary_order.pdf2022-12-07 09:02 128K 
[   ]20130606-wapo-prism.pdf2022-12-07 09:02 562K 
[   ]20130608-guard-boundless_informant_capabilities.pdf2022-12-07 09:02 719K 
[   ]20130608-guard-boundless_informant_faq.pdf2022-12-07 09:02 532K 
[   ]20130608-guard-prism.pdf2022-12-07 09:02 132K 
[   ]20130620-guard-702_minimization_procedures.pdf2022-12-07 09:02 510K 
[   ]20130620-guard-702_targeting_procedures.pdf2022-12-07 09:02 539K 
[   ]20130627-guard-2007_memo_on_us_person_metadata.pdf2022-12-07 09:02 1.0M 
[   ]20130627-guard-nsa_oig_2009_report.pdf2022-12-07 09:02 7.3M 
[   ]20130629-wapo-prism.pdf2022-12-07 09:02 603K 
[   ]20130630-guard-dropmire_.pdf2022-12-07 09:02 16K 
[   ]20130710-wapo-upstream.pdf2022-12-07 09:02 208K 
[   ]20130731-guard-xkeyscore_training_slides.pdf2022-12-07 09:02 27M 
[   ]20130809-guard-702_glossary.pdf2022-12-07 09:02 152K 
[   ]20130816-wapo-sid_oversight.pdf2022-12-07 09:02 1.2M 
[   ]20130816-wapo-so_you_got_a_us_person.pdf2022-12-07 09:02 147K 
[   ]20130816-wapo-sso_news_article.pdf2022-12-07 09:02 95K 
[   ]20130816-wapo-targeting_rationale.pdf2022-12-07 09:02 457K 
[   ]20130830_cryptome_congressional_budget_2013.pdf2022-12-07 09:02 2.3M 
[   ]20130903-globo-satc.pdf2022-12-07 09:02 1.6M 
[   ]20130905-guard-bullrun.pdf2022-12-07 09:02 687K 
[   ]20130905-guard-cryptanalysis_classification.pdf2022-12-07 09:02 248K 
[   ]20130905-guard-sigint_enabling.pdf2022-12-07 09:02 382K 
[   ]20130908-globo-stormbew_tv.pdf2022-12-07 09:02 91K 
[   ]20130908-globo-stormbrew_tv.pdf2022-12-07 09:02 91K 
[   ]20130908-globo-tv.pdf2022-12-07 09:02 650K 
[   ]20130909-spiegel-smartphones.pdf2022-12-07 09:02 520K 
[   ]20130911-guard-israel_sharing_0.pdf2022-12-07 09:02 808K 
[   ]20130916-spiegel-credit_card_transactions.pdf2022-12-07 09:02 422K 
[   ]20130920-spiegel-belgacom.pdf2022-12-07 09:02 318K 
[   ]20130928-nyt-contact_chaining.pdf2022-12-07 09:02 280K 
[   ]20130928-nyt-syanpse.pdf2022-12-07 09:02 186K 
[   ]20131004-guard-egotistical_giraffe.pdf2022-12-07 09:02 2.0M 
[   ]20131004-guard-iat_tor.pdf2022-12-07 09:02 1.0M 
[   ]20131004-guard-tor_stinks.pdf2022-12-07 09:02 2.0M 
[   ]20131004-wapo-gchq_mullenize.pdf2022-12-07 09:02 1.3M 
[   ]20131004-wapo-tor.pdf2022-12-07 09:02 311K 
[   ]20131014-wapo-collection_optimization.pdf2022-12-07 09:02 60K 
[   ]20131014-wapo-content_acquisition_optimization1.pdf2022-12-07 09:02 2.7M 
[   ]20131014-wapo-content_acquisition_optimization2.pdf2022-12-07 09:02 2.5M 
[   ]20131020-spiegel-mexican_president.pdf2022-12-07 09:02 181K 
[   ]20131021-monde-boundless_informant_france.pdf2022-12-07 09:02 137K 
[   ]20131021-monde-close_access_sigads.pdf2022-12-07 09:02 199K 
[   ]20131021-monde-wanadoo_alcatel.pdf2022-12-07 09:02 115K 
[   ]20131022-monde-prism_april_2013.pdf2022-12-07 09:02 1.3M 
[   ]20131024-guard-phones_world_leaders.pdf2022-12-07 09:02 148K 
[   ]20131025-monde-french_cyberattacks.pdf2022-12-07 09:02 666K 
[   ]20131027-spiegel-embassy.pdf2022-12-07 09:02 632K 
[   ]20131028-mundo-spain_collections.pdf2022-12-07 09:02 15K 
[   ]20131030-wapo-muscular.pdf2022-12-07 09:02 96K 
[   ]20131030-wapo-muscular_smiley.pdf2022-12-07 09:02 244K 
[   ]20131101-guard-corporate_reporting.pdf2022-12-07 09:02 121K 
[   ]20131104-mundo-boundless_informant.pdf2022-12-07 09:02 621K 
[   ]20131104-mundo-info_sharing_partners.pdf2022-12-07 09:02 103K 
[   ]20131104-nyt-collection_accesses.pdf2022-12-07 09:02 49K 
[   ]20131104-nyt-sigint_goals.pdf2022-12-07 09:02 1.7M 
[   ]20131104-nyt-sigint_strategic_plan.pdf2022-12-07 09:02 2.4M 
[   ]20131104-wapo-optimization_google.pdf2022-12-07 09:02 2.1M 
[   ]20131104-wapo-sso_overview.pdf2022-12-07 09:02 465K 
[   ]20131104-wapo-windstop.pdf2022-12-07 09:02 94K 
[   ]20131117-guardian-dsd_3g.pdf2022-12-07 09:02 340K 
[   ]20131117-spiegel-royal_concierge.pdf2022-12-07 09:02 94K 
[   ]20131119-dagbladet-norway_collection_0.pdf2022-12-07 09:02 54K 
[   ]20131119-odni-ag_guidelines_for_domestic_fbi_operations.pdf2022-12-07 09:02 7.3M 
[   ]20131119-odni-interim_competency_test_for_access_to_fisa_data.pdf2022-12-07 09:02 171K 
[   ]20131119-odni-nsa_core_intelligence_oversight_training.pdf2022-12-07 09:02 16M 
[   ]20131119-odni-nsa_course_materials_intro_v.13.pdf2022-12-07 09:02 378K 
[   ]20131119-odni-nsa_course_materials_module_1_v.17.pdf2022-12-07 09:02 1.0M 
[   ]20131119-odni-nsa_course_materials_module_2_v.16.pdf2022-12-07 09:02 812K 
[   ]20131119-odni-nsa_course_materials_module_3_v.22.pdf2022-12-07 09:02 1.3M 
[   ]20131119-odni-nsa_course_materials_module_4_v.28.pdf2022-12-07 09:02 2.7M 
[   ]20131119-odni-nsa_course_materials_module_5_v.24.pdf2022-12-07 09:02 906K 
[   ]20131119-odni-nsa_course_materials_module_6_analytic_personal_v.18.pdf2022-12-07 09:02 1.0M 
[   ]20131119-odni-nsa_course_materials_module_6_tech_personnel_v.25.pdf2022-12-07 09:02 2.4M 
[   ]20131119-odni-nsa_cryptological_school_course_slides_on_legal_compliance_and_minimization_procedures.pdf2022-12-07 09:02 17M 
[   ]20131119-odni-nsa_guidance_memo_on_legal_standards_for_searching_bulk_metadata.pdf2022-12-07 09:02 1.8M 
[   ]20131119-odni-nsa_metadata_collection_training_slides_.pdf2022-12-07 09:02 7.5M 
[   ]20131119-odni-nsa_summary_of_requirements_for_collection_of_bulk_metadata.pdf2022-12-07 09:02 294K 
[   ]20131119-odni-office_of_general_council_business_record_analyst_training_slides.pdf2022-12-07 09:02 2.1M 
[   ]20131119-odni-united_states_signals_intelligence_directive_18_appendix_j.pdf2022-12-07 09:02 4.3M 
[   ]20131119-odni-united_states_signals_intelligence_directive_18_jan_25_2011.pdf2022-12-07 09:02 9.3M 
[   ]20131119-odni-verification_slide.pdf2022-12-07 09:02 87K 
[   ]20131120-guard-collection_processing_and_dissemination_of_allied_communications.pdf2022-12-07 09:02 246K 
[   ]20131122-dagbladet-afghanistan_collection.pdf2022-12-07 09:02 30K 
[   ]20131122-dagbladet-boundless_informant.pdf2022-12-07 09:02 5.7M 
[   ]20131122-dagbladet-boundless_informant_faq.pdf2022-12-07 09:02 274K 
[   ]20131123-nrc-nsa_malware.pdf2022-12-07 09:02 146K 
[   ]20131123-nyt-sigint_strategy_feb_2012.pdf2022-12-07 09:02 373K 
[   ]20131126-huffpo-radicalizers_pornography.pdf2022-12-07 09:02 795K 
[   ]20131126-wapo-microsoft_cloud_exploitation.pdf2022-12-07 09:03 2.4M 
[   ]20131126-wapo-microsoft_monkey_puzzle.pdf2022-12-07 09:03 46K 
[   ]20131130-GlobeandMail-csec-br-spy.pdf2022-12-07 09:03 617K 
[   ]20131202-cbc-g20.pdf2022-12-07 09:03 136K 
[   ]20131202-guard-dsd_data.pdf2022-12-07 09:03 153K 
[   ]20131204-wapo-chalkfun_foreignness.pdf2022-12-07 09:03 61K 
[   ]20131204-wapo-fascia.pdf2022-12-07 09:03 233K 
[   ]20131205-espresso-italy_spying.pdf2022-12-07 09:03 169K 
[   ]20131205-svt-fra_russia.pdf2022-12-07 09:03 94K 
[   ]20131209-nyt-nsa_games.pdf2022-12-07 09:03 294K 
[   ]20131210-cbc-nsa_csec_partnership.pdf2022-12-07 09:03 91K 
[   ]20131210-wapo-cotraveler_overview.pdf2022-12-07 09:03 1.3M 
[   ]20131210-wapo-ghost_machine.pdf2022-12-07 09:03 860K 
[   ]20131210-wapo-gsm_classification_guide.pdf2022-12-07 09:03 143K 
[   ]20131210-wapo-location_cookies.pdf2022-12-07 09:03 255K 
[   ]20131210-wapo-target_location.pdf2022-12-07 09:03 133K 
[   ]20131211-svt-accomplishments_from_nsa.pdf2022-12-07 09:03 191K 
[   ]20131211-svt-baltic_region.pdf2022-12-07 09:03 152K 
[   ]20131211-svt-final_agenda_sweden_usa.pdf2022-12-07 09:03 1.0M 
[   ]20131211-svt-legal_issues_uk_regarding_sweden_and_quantum.pdf2022-12-07 09:03 28K 
[   ]20131211-svt-nsa_internal_pm_on_fra.pdf2022-12-07 09:03 190K 
[   ]20131211-svt-nsa_slides_xkeyscore.pdf2022-12-07 09:03 563K 
[   ]20131211-svt-quantum_from_gchq.pdf2022-12-07 09:03 38K 
[   ]20131211-svt-sweden_neutral.pdf2022-12-07 09:03 183K 
[   ]20131211-svt-xkeyscore_slide_with_swedish_example.pdf2022-12-07 09:03 196K 
[   ]20131211-svt-xkeyscore_sources.pdf2022-12-07 09:03 37K 
[   ]20131211-svt-xkeyscore_sweden_meeting.pdf2022-12-07 09:03 905K 
[   ]20131223-wapo-nsacss-mission.pdf2022-12-07 09:03 100K 
[   ]20131230-appelbaum-nsa_ant_catalo.pdf2022-12-07 09:03 6.9M 
[   ]20131230-appelbaum-nsa_ant_catalog.pdf2022-12-07 09:03 6.9M 
[   ]20131230-spiegel-qfire.pdf2022-12-07 09:03 2.1M 
[   ]20131230-spiegel-tao_intro.pdf2022-12-07 09:03 2.2M 
[   ]20131230-spiegel-tao_quantum_tasking.pdf2022-12-07 09:03 3.5M 
[   ]20131230-spiegel-tao_quantum_theory.pdf2022-12-07 09:03 728K 
[   ]20140102-wapo-quantum_computers_hard_targets.pdf2022-12-07 09:03 375K 
[   ]20140102-wapo-quantum_computing.pdf2022-12-07 09:03 140K 
[   ]20140116-guard-dishfire_presentation.pdf2022-12-07 09:03 862K 
[   ]20140127-nbc-squeaky_dolphin.pdf2022-12-07 09:03 17M 
[   ]20140127-nyt-converged_analysis_on_smartphone_devices.pdf2022-12-07 09:03 848K 
[   ]20140127-nyt-mobile_theme_briefing.pdf2022-12-07 09:03 132K 
[   ]20140128-guard-leaky_phone_apps.pdf2022-12-07 09:03 82K 
[   ]20140128-guard-leaky_phone_apps_0.pdf2022-12-07 09:03 222K 
[   ]20140130-information_dk-cop15_interception_document.pdf2022-12-07 09:03 60K 
[   ]20140131-cbc-csec_airport_wifi_tracking.pdf2022-12-07 09:03 2.1M 
[   ]20140204-nbc-british_spies_attacked_hactivist_anonymous.pdf2022-12-07 09:03 1.1M 
[   ]20140207-nbc-gchq_honey_trap_cyber_attack_background_on_jtrig.pdf2022-12-07 09:03 1.1M 
[   ]20140207-nbc-gchq_honey_trap_cyber_attack_leveraging_foreign_journalists_via_jtrig.pdf2022-12-07 09:03 591K 
[   ]20140207-nrc-boundless_nederland.pdf2022-12-07 09:03 1.1M 
[   ]20140211-intercept-drones_intercepting_communications.pdf2022-12-07 09:03 366K 
[   ]20140218-intercept-discovery_sigint_targeting_scenarios_and_compliance.pdf2022-12-07 09:03 631K 
[   ]20140218-intercept-gchq_sigdev_.pdf2022-12-07 09:03 28M 
[   ]20140224-intercept-training_for_covert_online_operations.pdf2022-12-07 09:03 4.3M 
[   ]20140227-guard-gchq_optic.pdf2022-12-07 09:03 241K 
[   ]20140303-epic-doj_report_on_pen_register_fisa_orders.pdf2022-12-07 09:03 3.7M 
[   ]20140305-nrc-dutch_shares_collected_anti-piracy_information_with_nsa.pdf2022-12-07 09:03 536K 
[   ]20140307-intercept-nsa_ask_zelda_an_interview_with_zelda.pdf2022-12-07 09:03 65K 
[   ]20140307-intercept-nsa_ask_zelda_guilty_until_proven_innocent.pdf2022-12-07 09:03 48K 
[   ]20140307-intercept-nsa_ask_zelda_is_bain_de_soleil_a_bane_on_the_nsa.pdf2022-12-07 09:03 55K 
[   ]20140307-intercept-nsa_ask_zelda_watching_every_word_in_snitch_city.pdf2022-12-07 09:03 40K 
[   ]20140311-nyt-ashcroft_memo_on_intelligence_sharing_procedures.pdf2022-12-07 09:03 118K 
[   ]20140311-nyt-classification_guide_for_fisa_the_protect_america_act_and_the_fisa_amendments_act.pdf2022-12-07 09:03 877K 
[   ]20140311-nyt-classification_guide_for_stellarwind_program_0.pdf2022-12-07 09:03 2.2M 
[   ]20140311-nyt-nsa_memo_expands_access_to_fisa_information.pdf2022-12-07 09:03 440K 
[   ]20140311-nyt-nsa_timeline_of_surveillance_law_developments.pdf2022-12-07 09:03 195K 
[   ]20140312-intercept-five_eyes_hacking_large_routers.pdf2022-12-07 09:03 23K 
[   ]20140312-intercept-increasing_collection_capacity_by_increasing_implants.pdf2022-12-07 09:03 21K 
[   ]20140312-intercept-mhs_leverages_xkeyscore_for_quantum.pdf2022-12-07 09:03 46K 
[   ]20140312-intercept-multiple_methods_of_quantum.pdf2022-12-07 09:03 121K 
[   ]20140312-intercept-nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf2022-12-07 09:03 354K 
[   ]20140312-intercept-nsa_selector_types.pdf2022-12-07 09:03 117K 
[   ]20140312-intercept-nsa_technology_directorate_analysis_of_converged_data.pdf2022-12-07 09:03 116K 
[   ]20140312-intercept-quantum_insert_diagrams.pdf2022-12-07 09:03 514K 
[   ]20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf2022-12-07 09:03 1.1M 
[   ]20140312-intercept-turbine_and_turmoil.pdf2022-12-07 09:03 218K 
[   ]20140312-intercept-turbine_industrial_scale_exploitation.pdf2022-12-07 09:03 81K 
[   ]20140312-intercept-vpn_and_voip_exploitation_with_hammerchant_and_hammerstein.pdf2022-12-07 09:03 459K 
[   ]20140313-intercept-nsa_cooperative_third_party_relationships.pdf2022-12-07 09:03 312K 
[   ]20140315-intercept-turbine_intelligence_command_and_control.pdf2022-12-07 09:03 122K 
[   ]20140318-wapo-adding_another_country_to_mystic_program.pdf2022-12-07 09:03 48K 
[   ]20140318-wapo-description_of_data_collection_under_mystic.pdf2022-12-07 09:03 62K 
[   ]20140318-wapo-mystic_program.pdf2022-12-07 09:03 73K 
[   ]20140320-intercept-targeting_system_administrator_accounts.pdf2022-12-07 09:03 491K 
[   ]20140321-le_monde-french_intelligence_e-mail_spying_operation.pdf2022-12-07 09:03 1.1M 
[   ]20140322-nyt-operation_shotgiant_objectives.pdf2022-12-07 09:03 385K 
[   ]20140329-der_spiegel-gchq_and_nsa_spy_on_heads_of_state.pdf2022-12-07 09:03 103K 
[   ]20140404-intercept-2009_sigdev_conference.pdf2022-12-07 09:03 41K 
[   ]20140404-intercept-gchq_full_spectrum_cyber_effects.pdf2022-12-07 09:03 1.7M 
[   ]20140430-intercept-gchq_visit.pdf2022-12-07 09:03 29K 
[   ]20140430-intercept-ghostmachine.pdf2022-12-07 09:03 6.4M 
[   ]20140430-intercept-prism_olympics.pdf2022-12-07 09:03 581K 
[   ]20140513-greenwald-noplacetohidedocuments.pdf2022-12-07 09:03 87M 
[   ]20140519-intercept-black_budget.pdf2022-12-07 09:03 53K 
[   ]20140519-intercept-dea_warfighter.pdf2022-12-07 09:03 143K 
[   ]20140519-intercept-mystic.pdf2022-12-07 09:03 79K 
[   ]20140519-intercept-somalget.pdf2022-12-07 09:03 131K 
[   ]20140519-intercept-sso_dictionary_excerpt.pdf2022-12-07 09:03 34K 
[   ]20140519-intercept-sso_mystic_charts.pdf2022-12-07 09:03 563K 
[   ]20140531-nyt-identity-intelligence.pdf2022-12-07 09:03 1.2M 
[   ]20140610-cryptome-dea-nsa-sandkey.pdf2022-12-07 09:03 361K 
[   ]20140616-der_spiegel-analytics_for_targets_in_europe_0.pdf2022-12-07 09:03 54K 
[   ]20140616-der_spiegel-xkeyscore_fingerprints_1.pdf2022-12-07 09:03 54K 
[   ]20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker.pdf2022-12-07 09:03 205K 
[   ]20140618-DerSpiegel-agenda_for_the_visit_of_bsi_vice_president_andreas_konen_to_the_nsa.pdf2022-12-07 09:03 120K 
[   ]20140618-DerSpiegel-internal_nsa_discussion_guidelines_relating_to_cooperation_with_the_bnd_and_bfv.pdf2022-12-07 09:03 327K 
[   ]20140618-DerSpiegel-presentation_on_the_nsacia_unit_special_collection_service.pdf2022-12-07 09:03 1.8M 
[   ]20140618-DerSpiegel-zoom_of_a_boundless_informant_document_with_project_names.pdf2022-12-07 09:03 126K 
[   ]20140618-dagbladet-black_budget.pdf2022-12-07 09:03 108K 
[   ]20140618-dagbladet-keith_alexander_talking_points.pdf2022-12-07 09:03 47K 
[   ]20140618-der_spiegel-boundless_informant_overview_global.pdf2022-12-07 09:03 317K 
[   ]20140618-der_spiegel-boundless_informant_statistics_for_so-called_third_parties.pdf2022-12-07 09:03 354K 
[   ]20140618-der_spiegel-boundless_informant_statistics_on_data_from_22foreign_partners22.pdf2022-12-07 09:03 356K 
[   ]20140618-der_spiegel-boundless_informant_statistics_on_germany.pdf2022-12-07 09:03 289K 
[   ]20140618-der_spiegel-boundless_informant_statistics_on_the_uk.pdf2022-12-07 09:03 157K 
[   ]20140618-der_spiegel-briefing_on_the_visit_to_the_nsa_of_a_high-ranking_bnd_official.pdf2022-12-07 09:03 492K 
[   ]20140618-der_spiegel-cooperation_between_the_nsa_bnd_and_bfv.pdf2022-12-07 09:03 328K 
[   ]20140618-der_spiegel-details_on_xkeyscore_from_an_internal_gchq_website.pdf2022-12-07 09:03 414K 
[   ]20140618-der_spiegel-excerpt_on_the_sharing_of_xkeyscore_with_german_intelligence_agency_bfv.pdf2022-12-07 09:03 67K 
[   ]20140618-der_spiegel-explanation_of_nymrod_a_system_for_searching_for_people_and_places_in_databases_and_documents.pdf2022-12-07 09:03 263K 
[   ]20140618-der_spiegel-faqs_on_the_boundless_informant_program.pdf2022-12-07 09:03 232K 
[   ]20140618-der_spiegel-final_agenda_of_a_meeting_between_high-ranking_nsa_and_bnd_officials.pdf2022-12-07 09:03 525K 
[   ]20140618-der_spiegel-gchq_report_on_the_technical_abilities_of_tempora.pdf2022-12-07 09:03 293K 
[   ]20140618-der_spiegel-guidelines_for_the_classification_of_nsa_sigint_details_1945-1967.pdf2022-12-07 09:03 2.6M 
[   ]20140618-der_spiegel-guidelines_for_the_classification_of_suslag_details_and_the_nsa-bnd_cooperation.pdf2022-12-07 09:03 778K 
[   ]20140618-der_spiegel-internal_nsa_presentation_on_the_bnds_organization_0.pdf2022-12-07 09:03 1.1M 
[   ]20140618-der_spiegel-logo_of_nsa-bnd_cooperation.pdf2022-12-07 09:03 30K 
[   ]20140618-der_spiegel-nostalgic_recollections_from_nsa_workers_formerly_stationed_in_bad_aibling.pdf2022-12-07 09:03 266K 
[   ]20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod.pdf2022-12-07 09:03 418K 
[   ]20140618-der_spiegel-nsacss_europe-_report_on_the_experiences_of_one_nsa_worker.pdf2022-12-07 09:03 363K 
[   ]20140618-der_spiegel-nsacss_presentation_on_technical_surveillance_in_europe_and_africa.pdf2022-12-07 09:03 1.5M 
[   ]20140618-der_spiegel-overview_of_the_use_of_boundless_informant_world_map.pdf2022-12-07 09:03 220K 
[   ]20140618-der_spiegel-preliminary_agenda_of_a_meeting_between_nsa_and_bnd_officials.pdf2022-12-07 09:03 349K 
[   ]20140618-der_spiegel-report_on_a_wharpdrive_incident_in_an_sso_presentation.pdf2022-12-07 09:03 261K 
[   ]20140618-der_spiegel-report_on_an_nsa_sigdev_training_course_for_allied_countries_.pdf2022-12-07 09:03 250K 
[   ]20140618-der_spiegel-report_on_an_nsa_visit_to_bnd_site_and_on_data_transfer_from_the_bnd_to_the_nsa.pdf2022-12-07 09:03 306K 
[   ]20140618-der_spiegel-report_on_an_unexploded_ordnance_alarm_at_european_technical_centern.pdf2022-12-07 09:03 270K 
[   ]20140618-der_spiegel-report_on_an_xkeyscore_training_session_at_the_ecc_dagger_complex.pdf2022-12-07 09:03 402K 
[   ]20140618-der_spiegel-report_on_data_exchange_between_the_nsa_and_bnd_within_the_jsa_framework.pdf2022-12-07 09:03 150K 
[   ]20140618-der_spiegel-report_on_the_beginnings_of_the_european_security_center_esc_in_the_dagger_complex.pdf2022-12-07 09:03 287K 
[   ]20140618-der_spiegel-report_on_the_changing_of_the_escs_name_to_european_security_operations_center_esoc.pdf2022-12-07 09:03 274K 
[   ]20140618-der_spiegel-report_on_the_nsas_access_to_tempora.pdf2022-12-07 09:03 280K 
[   ]20140618-der_spiegel-report_on_the_one-year_anniversary_of_the_nsa_liaison_unit_suslag_in_bad_aibling.pdf2022-12-07 09:03 335K 
[   ]20140618-der_spiegel-report_on_the_surveillance_of_african_countries_by_jsa.pdf2022-12-07 09:03 255K 
[   ]20140618-der_spiegel-report_on_the_technical_expansion_of_the_european_technical_center_in_wiesbaden.pdf2022-12-07 09:03 219K 
[   ]20140618-der_spiegel-report_on_the_work_of_nsacss_europe.pdf2022-12-07 09:03 300K 
[   ]20140618-der_spiegel-restrictions_on_the_technical_surveillance_performed_by_jsa.pdf2022-12-07 09:03 214K 
[   ]20140618-der_spiegel-us_sites_with_nsa_personnel_in_germany.pdf2022-12-07 09:03 85K 
[   ]20140618-der_spiegel-world_map_from_the_boundless_informant_program.pdf2022-12-07 09:03 303K 
[   ]20140630-WaPo-affidavit_of_keith_alexander_regarding_spying_on_foreign_entities.pdf2022-12-07 09:03 19K 
[   ]20140630-WaPo-fisa_amendments_act_summary_document_1.pdf2022-12-07 09:03 52K 
[   ]20140630-WaPo-fisa_judges_order_authorizing_surveillance_of_foreign_governments_and_organizations.pdf2022-12-07 09:03 37K 
[   ]20140630-WaPo-list_of_governments_and_organizations_authorized_for_surveillance.pdf2022-12-07 09:03 120K 
[   ]20140630-WaPo-odni_certification_regarding_foreign_entities.pdf2022-12-07 09:03 269K 
[   ]20140709-Intercept-spying_on_muslim-american_leaders.pdf2022-12-07 09:03 294K 
[   ]20140714-Intercept-jtrigall.pdf2022-12-07 09:03 1.1M 
[   ]20140723-Intercept-March-2013-Watchlisting-Guidance.pdf2022-12-07 09:03 29M 
[   ]20140723-WaPo-Post-Signals-Intelligence-Authority-Decision-Tree.pdf2022-12-07 09:03 59K 
[   ]20140725-Intercept-Saudi-Arabia-Information-Paper.pdf2022-12-07 09:03 325K 
[   ]20140803-Intercept-Israel-US-1999-Agreement.pdf2022-12-07 09:03 2.0M 
[   ]20140803-Intercept-NSA-Intelligence-Relationship-With-Israel.pdf2022-12-07 09:03 212K 
[   ]20140805-Intercept-Directorate-of-Terrorist-Identities-Strategic-Accomplishments-2013.pdf2022-12-07 09:03 1.7M 
[   ]20140812-Intercept-GCHQ-Covert-Mobile-Phones-Policy.pdf2022-12-07 09:03 86K 
[   ]20140815-Heise-HACIENDA-Program.pdf2022-12-07 09:03 1.8M 
[   ]20140825-Intercept-CIA-Colleagues-Enthusiastically-Welcome-NSA-Training.pdf2022-12-07 09:03 88K 
[   ]20140825-Intercept-CRISSCROSSPROTON-Point-Paper.pdf2022-12-07 09:03 289K 
[   ]20140825-Intercept-DNI-Decision-Memorandum-on-ICREACH.pdf2022-12-07 09:03 255K 
[   ]20140825-Intercept-ICREACH-Black-Budget-Extract.pdf2022-12-07 09:03 37K 
[   ]20140825-Intercept-ICREACH-Sharing-SIGINT-Comms-Metadata-with-the-Intel-Community-Memo.pdf2022-12-07 09:03 195K 
[   ]20140825-Intercept-ICREACH-Wholesale-Sharing.pdf2022-12-07 09:03 34K 
[   ]20140825-Intercept-Metadata-Policy-Conference.pdf2022-12-07 09:03 181K 
[   ]20140825-Intercept-Metadata-Sharing-Memorandum.pdf2022-12-07 09:03 393K 
[   ]20140825-The-Intercept-Sharing-Communications-Metadata-Across-the-USIC-ICREACH.pdf2022-12-07 09:03 3.9M 
[   ]20140831-Spiegel-NCRs-with-Foreign-Relations-Missions-Become-SUSLAs.pdf2022-12-07 09:03 375K 
[   ]20140831-spiegel-collaboration_in_overdrive.pdf2022-12-07 09:03 335K 
[   ]20140831-spiegel-iraq_uk_load_sharing_carriers.pdf2022-12-07 09:03 377K 
[   ]20140831-spiegel-jordan_belgium.pdf2022-12-07 09:03 609K 
[   ]20140831-spiegel-kurdistan_regional_government.pdf2022-12-07 09:03 623K 
[   ]20140831-spiegel-nsa_intelligence_relationship_with_turkey.pdf2022-12-07 09:03 783K 
[   ]20140831-spiegel-nsas_oldest_third_party_partnership.pdf2022-12-07 09:03 398K 
[   ]20140831-spiegel-sinio_seminar_tough_times_for_turkey.pdf2022-12-07 09:03 256K 
[   ]20140831-spiegel-sinio_seminar_turkey_and_the_kurds.pdf2022-12-07 09:03 271K 
[   ]20140831-spiegel-sinio_seminar_turkish_elections.pdf2022-12-07 09:03 273K 
[   ]20140831-spiegel-turkey_and_the_pkk.pdf2022-12-07 09:03 670K 
[   ]20140831-spiegel-turkey_at_the_g20_pre-meeting.pdf2022-12-07 09:03 207K 
[   ]20140831-spiegel-turkey_energy_company_development.pdf2022-12-07 09:03 150K 
[   ]20140831-spiegel-turkish_signal_intelligence_chief_agenda.pdf2022-12-07 09:03 375K 
[   ]20140905-intercept-quadrennial_intelligence_community_review_final_report.pdf2022-12-07 09:03 3.5M 
[   ]20140914-intercept-ferguson_visit_precis.pdf2022-12-07 09:03 232K 
[   ]20140914-intercept-key_activities_in_progress.pdf2022-12-07 09:03 228K 
[   ]20140914-intercept-speargun_phase_one.pdf2022-12-07 09:03 54K 
[   ]20140914-intercept-speargun_underway.pdf2022-12-07 09:03 127K 
[   ]20140914-spiegel-satellite_teleport_knowledge.pdf2022-12-07 09:03 4.4M 
[   ]20140914-spiegel-treasure_map_announces_a_new_release.pdf2022-12-07 09:03 552K 
[   ]20140914-spiegel-treasure_map_presentation.pdf2022-12-07 09:03 5.7M 
[   ]20141010-intercept-cno_core_secrets_security_structure.pdf2022-12-07 09:03 329K 
[   ]20141010-intercept-cno_core_secrets_slide_slices.pdf2022-12-07 09:03 1.1M 
[   ]20141010-intercept-computer_network_exploitation_classification_guide.pdf2022-12-07 09:03 966K 
[   ]20141010-intercept-eci_compartments.pdf2022-12-07 09:03 535K 
[   ]20141010-intercept-eci_pawleys_classification_guide.pdf2022-12-07 09:03 435K 
[   ]20141010-intercept-eci_whipgenie_classification_guide.pdf2022-12-07 09:03 684K 
[   ]20141010-intercept-exceptionally_controlled_information_listing.pdf2022-12-07 09:03 935K 
[   ]20141010-intercept-sentry_eagle_brief_sheet.pdf2022-12-07 09:03 1.2M 
[   ]20141010-intercept-tarex_classification_guide.pdf2022-12-07 09:03 758K 
[   ]20141125-sueddeutsche-access_breakdown.pdf2022-12-07 09:03 26K 
[   ]20141125-sz-cable_master_list_ac.pdf2022-12-07 09:03 159K 
[   ]20141125-sz-cable_master_list_fea.pdf2022-12-07 09:03 60K 
[   ]20141125-sz-cable_regions.pdf2022-12-07 09:03 33K 
[   ]20141125-sz-cables_no_current_access.pdf2022-12-07 09:03 28K 
[   ]20141125-sz-cables_where_we_are.pdf2022-12-07 09:03 28K 
[   ]20141125-sz-cables_where_we_want_to_be.pdf2022-12-07 09:03 27K 
[   ]20141125-sz-cne_endpoint_project_load.pdf2022-12-07 09:03 61K 
[   ]20141125-sz-mti_access_project_weekly_status_february_6_2009.pdf2022-12-07 09:03 71K 
[   ]20141125-sz-mti_access_project_weekly_status_june_27_2008.pdf2022-12-07 09:03 96K 
[   ]20141125-sz-mti_access_project_weekly_status_november_28_2008.pdf2022-12-07 09:03 92K 
[   ]20141125-sz-partner_cables.pdf2022-12-07 09:03 152K 
[   ]20141125-sz-ptc_glossary.pdf2022-12-07 09:03 121K 
[   ]20141125-sz-windstop_system_highlights.pdf2022-12-07 09:03 137K 
[   ]20141204-intercept-auroragold_project_overview.pdf2022-12-07 09:03 418K 
[   ]20141204-intercept-auroragold_target_technology_trends_center_support_to_wpmo_0.pdf2022-12-07 09:03 1.6M 
[   ]20141204-intercept-auroragold_working_aid.pdf2022-12-07 09:03 428K 
[   ]20141204-intercept-auroragold_working_group.pdf2022-12-07 09:03 23M 
[   ]20141204-intercept-ir21_a_technology_warning_mechanism_0.pdf2022-12-07 09:03 1.7M 
[   ]20141204-intercept-nsa_first_ever_collect_of_high_interest_4g_cellular_signal.pdf2022-12-07 09:03 15K 
[   ]20141204-intercept-nsa_gchq_csec_network_tradecraft_advancement.pdf2022-12-07 09:03 239K 
[   ]20141204-intercept-opulant_pup_encryption_attack.pdf2022-12-07 09:03 36K 
[   ]20141204-intercept-wolframite_encryption_attack.pdf2022-12-07 09:03 72K 
[   ]20141214-Intercept-gchq-mobile-networks-in-my-noc-world.pdf2022-12-07 09:03 1.9M 
[   ]20141214-intercept-gchq_automated_noc_detection.pdf2022-12-07 09:03 3.7M 
[   ]20141214-intercept-gchq_hopscotch.pdf2022-12-07 09:03 11K 
[   ]20141214-intercept-gchq_making_network_sense_of_the_encryption.pdf2022-12-07 09:03 2.3M 
[   ]20141214-intercept-gchq_nac_review_april_june_2011.pdf2022-12-07 09:03 30K 
[   ]20141214-intercept-gchq_nac_review_january_march_2012.pdf2022-12-07 09:03 18K 
[   ]20141214-intercept-gchq_nac_review_july_sept_2011.pdf2022-12-07 09:03 26K 
[   ]20141214-intercept-gchq_nac_review_october_december_2011.pdf2022-12-07 09:03 81K 
[   ]20141214-intercept-gchq_stargate_cne_requirements.pdf2022-12-07 09:03 270K 
[   ]20141228-speigel-a_potential_technique_to_deanonymise_users_of_the_tor_network_0.pdf2022-12-07 09:03 2.0M 
[   ]20141228-speigel-analysis_from_ssl-tls_connections_through_gchq_in_the_flying_pig_database_0.pdf2022-12-07 09:03 1.5M 
[   ]20141228-speigel-analytic_challenges_from_active-passive_integration_when_nsa_attacks_ipsec_vpns_0.pdf2022-12-07 09:03 2.0M 
[   ]20141228-speigel-analytics_on_security_of_tor_hidden_services_0.pdf2022-12-07 09:03 3.6M 
[   ]20141228-speigel-bluesnort_program_on_net_defense_from_encrypted_communications_0.pdf2022-12-07 09:03 1.3M 
[   ]20141228-speigel-canadian_document_from_ces_on_tls_trends_0.pdf2022-12-07 09:03 1.9M 
[   ]20141228-speigel-classification_guide_for_cryptanalysis_0.pdf2022-12-07 09:03 277K 
[   ]20141228-speigel-decryption_of_vpn_connections_within_the_valiantsurf_program_0.pdf2022-12-07 09:03 2.0M 
[   ]20141228-speigel-description_of_existing_projects_on_vpn_decryption_0.pdf2022-12-07 09:03 488K 
[   ]20141228-spiegel-_national_information_assurance_research_laboratory_niarl_tundra.pdf2022-12-07 09:03 2.0M 
[   ]20141228-spiegel-description_of_voip_telephony_encryption_methods_and_other_ways_to_attack.pdf2022-12-07 09:03 285K 
[   ]20141228-spiegel-description_on_the_processing_of_vpn_data_packets_within_the_turmoil_program.pdf2022-12-07 09:03 1.6M 
[   ]20141228-spiegel-explanation_of_a_potential_technique_to_deanonymise_users_of_the_tor_network.pdf2022-12-07 09:03 2.4M 
[   ]20141228-spiegel-explanation_of_the_gallantwave_that_decrypts_vpn_traffic_within_longhaul.pdf2022-12-07 09:03 570K 
[   ]20141228-spiegel-explanation_of_the_poisennut_product_and_its_role_when_attacking_vpn.pdf2022-12-07 09:03 250K 
[   ]20141228-spiegel-explanation_of_the_transform_engine_emulator_when_attacking_vpn.pdf2022-12-07 09:03 187K 
[   ]20141228-spiegel-explanation_of_the_turmoil_gallantwave_program_and_its_role_when_attacking_vpn_0.pdf2022-12-07 09:03 258K 
[   ]20141228-spiegel-explanation_on_the_spin9_program_on_end-to-end_attacks_on_vpn.pdf2022-12-07 09:03 6.5M 
[   ]20141228-spiegel-gchq_briefing_on_the_bullrun_program.pdf2022-12-07 09:03 429K 
[   ]20141228-spiegel-gchq_presentation_on_the_bullrun_programs_decryption_capabilities.pdf2022-12-07 09:03 844K 
[   ]20141228-spiegel-general_description_how_nsa_handles_encrypted_traffic.pdf2022-12-07 09:03 230K 
[   ]20141228-spiegel-guide_for_analysts_on_how_to_use_the_prism_skype_collection.pdf2022-12-07 09:03 896K 
[   ]20141228-spiegel-intercept_with_otr_encrypted_chat.pdf2022-12-07 09:03 170K 
[   ]20141228-spiegel-intercept_with_pgp_encrypted_message.pdf2022-12-07 09:03 101K 
[   ]20141228-spiegel-intro_to_the_vpn_exploitation_process_mentioning_the_protocols_attacked_-_pptp_ipsec_ssl_ssh.pdf2022-12-07 09:03 5.9M 
[   ]20141228-spiegel-malibu_architecture_overview_to_exploit_vpn_communication.pdf2022-12-07 09:03 621K 
[   ]20150117-speigel-analysis_of_chinese_methods_and_performed_actions_in_the_context_of_computer_network_exploitation.pdf2022-12-07 09:03 1.3M 
[   ]20150117-speigel-classification_guide_for_computer_network_exploitation_cne.pdf2022-12-07 09:03 1.0M 
[   ]20150117-speigel-combination_of_offensive_and_defensive_missions_-_how_fourth-party_missions_are_being_performed.pdf2022-12-07 09:03 226K 
[   ]20150117-speigel-csec_document_about_the_recognition_of_trojans_and_other_network_based_anomaly_.pdf2022-12-07 09:03 3.4M 
[   ]20150117-speigel-csec_document_on_the_handling_of_existing_trojans_when_trojanizing_computers.pdf2022-12-07 09:03 3.9M 
[   ]20150117-speigel-document_about_the_expansion_of_the_remote_operations_center_roc_on_endpoint_operations.pdf2022-12-07 09:03 228K 
[   ]20150117-speigel-document_explaining_the_role_of_the_remote_operations_center_roc.pdf2022-12-07 09:03 168K 
[   ]20150117-spiegel-nsa_example_snowglobe_in_which_a_suspected_french_government_trojan_is_analyzed_to_find_out_if_it_can_be_helpful_for_own_interests_0.pdf2022-12-07 09:03 3.3M 
[   ]20150117-spiegel-nsa_fourth_party_access_-_i_drink_your_milkshake_.pdf2022-12-07 09:03 3.6M 
[   ]20150117-spiegel-nsa_program_tutelage_to_instrumentalize_third_party_attack_tools.pdf2022-12-07 09:03 4.1M 
[   ]20150117-spiegel-nsa_project_description_to_recognize_and_process_data_that_comes_from_third_party_attacks_on_computers.pdf2022-12-07 09:03 352K 
[   ]20150117-spiegel-nsa_training_course_material_on_computer_network_operations.pdf2022-12-07 09:03 6.9M 
[   ]20150117-spiegel-overview_of_methods_for_nsa_integrated_cyber_operations_0.pdf2022-12-07 09:03 2.5M 
[   ]20150117-spiegel-overview_of_the_transgression_program_to_analyze_and_exploit_foreign_cna-cne_exploits.pdf2022-12-07 09:03 2.1M 
[   ]20150117-spiegel-overview_on_the_nsa_use_of_bots_and_the_defiantwarrior_program.pdf2022-12-07 09:03 9.4M 
[   ]20150117-spiegel-process_analysts_choose_their_data_requirement_and_then_get_to_know_the_tools_that_can_do_the_job_0.pdf2022-12-07 09:03 1.6M 
[   ]20150117-spiegel-projects_of_the_tao-ato_department_such_as_the_remote_destruction_of_network_cards.pdf2022-12-07 09:03 1.4M 
[   ]20150117-spiegel-quantumtheory_is_a_set_of_technologies_allowing_man-on-the-side_interference_attacks_on_tcp-ip_connections_includes_straightbizarre_and_daredev.pdf2022-12-07 09:03 1.6M 
[   ]20150117-spiegel-report_of_an_nsa_employee_about_a_backdoor_in_the_openssh_daemon.pdf2022-12-07 09:03 403K 
[   ]20150117-spiegel-sample_code_of_a_malware_program_from_the_five_eyes_alliance.pdf2022-12-07 09:03 185K 
[   ]20150117-spiegel-supply-chain_interdiction_-_stealthy_techniques_can_crack_some_of_sigints_hardest_targets.pdf2022-12-07 09:03 213K 
[   ]20150117-spiegel-technical_description_of_the_fashioncleft_protocol_.pdf2022-12-07 09:03 2.9M 
[   ]20150117-spiegel-the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa_0.pdf2022-12-07 09:03 2.6M 
[   ]20150128-cbc-cse_presentation_on_the_levitation_project.pdf2022-12-07 09:03 3.7M 
[   ]20150128-intercept-cse_presentation_on_the_levitation_project.pdf2022-12-07 09:03 3.7M 
[   ]20150204-intercept-lovely_horse_0.pdf2022-12-07 09:03 67K 
[   ]20150204-intercept-nato_civilian_intelligence_council_cyber_panel.pdf2022-12-07 09:03 236K 
[   ]20150204-intercept-open_source_for_cyber_defence_progress.pdf2022-12-07 09:03 66K 
[   ]20150204-intercept-who_else_is_targeting_your_target_collecting.pdf2022-12-07 09:03 52K 
[   ]20150210-intercept-iran_current_topics_-_interactions_with_gchq.pdf2022-12-07 09:03 382K 
[   ]20150219-Intercept-CCNE-Email-Addresses-Jan10-Mar10-Trial.pdf2022-12-07 09:03 77K 
[   ]20150219-Intercept-CCNE-Email-Harvesting-Jan10-Mar10-Trial.pdf2022-12-07 09:03 77K 
[   ]20150219-Intercept-CCNE-Stats-Summaries-Jan10-Mar10-Trial.pdf2022-12-07 09:03 77K 
[   ]20150219-Intercept-CCNE-Successes-Jan10-Mar10-Trial.pdf2022-12-07 09:03 72K 
[   ]20150219-Intercept-CNE-Access-to-Core-Mobile-Networks.pdf2022-12-07 09:03 78K 
[   ]20150219-Intercept-Dapino-Gamma-CNE-Presence-Wiki.pdf2022-12-07 09:03 55K 
[   ]20150219-Intercept-Dapino-Gamma-Gemalto-Yuaawaa-Wiki.pdf2022-12-07 09:03 64K 
[   ]20150219-Intercept-Dapino-Gamma-Target-Personalisation-Centres.pdf2022-12-07 09:03 89K 
[   ]20150219-Intercept-IMSIs-Identified-With-Ki-Data-For-Network.pdf2022-12-07 09:03 83K 
[   ]20150219-Intercept-PCS-Harvesting-At-Scale.pdf2022-12-07 09:03 2.8M 
[   ]20150219-Intercept-Where-are-These-Keys.pdf2022-12-07 09:03 80K 
[   ]BR 13-109 Order-1.pdf2022-12-07 09:03 15M 
[   ]CLEANED004.-Cover_Memo-Sealed.pdf2022-12-07 09:03 1.1M 
[   ]CLEANED007.-CongNotificationInfoMemoSSCI_10_Apr_09-Sealedpdf.pdf2022-12-07 09:03 2.1M 
[   ]CLEANED032.-Basket_2_-_NSA_training.log.pdf2022-12-07 09:03 16M 
[   ]CLEANED096.-NSA_summary_of_BR_requirements_(maybe_Feb_2009)-.pdf2022-12-07 09:03 237K 
[   ]CLEANEDFinal-USSID_SP0018.pdf2022-12-07 09:03 6.6M 
[   ]CLEANEDFinal-USSID_SP0018_Annex_J.pdf2022-12-07 09:03 533K 
[   ]CLEANEDPRTT-1.pdf2022-12-07 09:03 25M 
[   ]CLEANEDPRTT-2.pdf2022-12-07 09:03 3.6M 
[   ]EC-121.pdf2022-12-07 09:03 39M 
[   ]FAA-Certification_Renewals_with_Caveats.pdf2022-12-07 09:03 138K 
[   ]FAA-Minimization-Procedures.pdf2022-12-07 09:03 575K 
[   ]FAA-Targeting_Procedures.pdf2022-12-07 09:03 616K 
[   ]FISC-Order,-BR-06-12.pdf2022-12-07 09:03 292K 
[   ]General-Alexander-Letter-re-NSA-Fact-Sheet-Inaccuracy.pdf2022-12-07 09:03 184K 
[   ]Judge-Walton_Answers_to_Questions_re_FISC.pdf2022-12-07 09:03 1.6M 
[   ]Lesson-4_-_So_you_got_US_Person_Information.pdf2022-12-07 09:03 147K 
[   ]NSA-Boundless-Informant-Frequently-Asked-Questions.pdf2022-12-07 09:04 1.4M 
[   ]NSA-Boundless_Informant_Frequently_Asked_Questions.pdf2022-12-07 09:04 1.4M 
[   ]NSA-Boundless_Informant_Powerpoint_Slides.pdf2022-12-07 09:04 72M 
[   ]NSA-IG_Report.pdf2022-12-07 09:04 19M 
[   ]NSA-Memo-to-DOD---Proposed-Amendment-to-Conduct-Analysis-of-Metadata.pdf2022-12-07 09:04 1.2M 
[   ]NSA-Memo_to_DOD_-_Proposed_Amendment_to_Conduct_Analysis_of_Metadata.pdf2022-12-07 09:04 1.2M 
[   ]NSA-Missions-Authorities-Oversight-and-Partnerships.pdf2022-12-07 09:04 114K 
[   ]NSA-Missions_Authorities_Oversight_and_Partnerships.pdf2022-12-07 09:04 114K 
[   ]NSA-Section-702-and-Section-215-Factsheets.pdf2022-12-07 09:04 1.8M 
[   ]NSA-Section_702_'Loop_Hole'.pdf2022-12-07 09:04 65K 
[   ]NSA-Section_702_and_Section_215_Factsheets.pdf2022-12-07 09:04 1.8M 
[   ]NSA-XKeyscore-Powerpoint.pdf2022-12-07 09:04 12M 
[   ]NSA-XKeyscore_Powerpoint.pdf2022-12-07 09:04 12M 
[   ]NSA Report on Russia Spearphishing.pdf2022-12-07 09:04 5.5M 
[   ]PRISM-Overview-Powerpoint-Slides.pdf2022-12-07 09:04 266K 
[   ]PRISM-Overview_Powerpoint_Slides.pdf2022-12-07 09:04 266K 
[   ]PRISM-Powerpoint-Slides-re-Data-Acquisition.pdf2022-12-07 09:04 295K 
[   ]PRISM-Powerpoint_Slides_re_Data_Acquisition.pdf2022-12-07 09:04 295K 
[   ]SID-Oversight-and-Compliance.pdf2022-12-07 09:04 1.1M 
[   ]SID-Oversight_and_Compliance.pdf2022-12-07 09:04 1.1M 
[   ]Section-215---Obama-Administration-White-Paper.pdf2022-12-07 09:04 156K 
[   ]Section-215---Primary-Order.pdf2022-12-07 09:04 5.6M 
[   ]Section-215---Secondary-Order---Verizon.pdf2022-12-07 09:04 1.1M 
[   ]Section-215_-_Obama_Administration_White_Paper.pdf2022-12-07 09:04 156K 
[   ]Section-215_-_Primary_Order.pdf2022-12-07 09:04 5.6M 
[   ]Section-215_-_Secondary_Order_-_Verizon.pdf2022-12-07 09:04 1.1M 
[   ]Targeting-Rationale---TAR.pdf2022-12-07 09:04 517K 
[   ]Targeting-Rationale_-_TAR.pdf2022-12-07 09:04 517K 
[   ]UPSTREAM-Powerpoint-Slide.pdf2022-12-07 09:04 78K 
[   ]UPSTREAM-Powerpoint_Slide.pdf2022-12-07 09:04 78K 
[   ]What_We_Need_to_Learn_from_Snowden.pdf2022-12-07 09:04 41K 
[   ]Wyden-Udall-Letter-on-NSA-Fact-Sheet-Inaccuracy.pdf2022-12-07 09:04 174K 
[   ]Wyden-Udall-Letter_on_NSA_Fact_Sheet_Inaccuracy.pdf2022-12-07 09:04 174K 
[   ]_20131119-odni-nsa_course_materials_module_4_v.28.pdf2022-12-07 09:04 2.7M 
[   ]ambassadesFrance.pdf2022-12-07 09:03 320K 
[   ]blackhat-Alexander-keynote.pdf2022-12-07 09:03 15M 
[   ]bullrun-briefing-sheet-from-gchq.pdf2022-12-07 09:03 2.6M 
[   ]ccne-email-addresses-jan10-mar10-trial.pdf2022-12-07 09:03 82K 
[   ]ccne-email-harvesting-jan10-mar10-trial.pdf2022-12-07 09:03 81K 
[   ]ccne-stats-summaries-jan10-mar10-trial.pdf2022-12-07 09:03 80K 
[   ]ccne-successes-jan10-mar10-trial.pdf2022-12-07 09:03 64K 
[   ]cne-access-to-core-mobile-networks.pdf2022-12-07 09:03 466K 
[   ]csec-br-spy.pdf2022-12-07 09:03 617K 
[   ]dapino-gamma-cne-presence-wiki.pdf2022-12-07 09:03 73K 
[   ]dapino-gamma-gemalto-yuaawaa-wiki.pdf2022-12-07 09:03 103K 
[   ]dapino-gamma-target-personalisation-centres.pdf2022-12-07 09:03 117K 
[   ]discovery-sigint-targeting-scenarios-and.pdf2022-12-07 09:03 727K 
[   ]doc-6-cyber-threat-capabilities.pdf2022-12-07 09:03 20M 
[   ]doj-nsa-memo.pdf2022-12-07 09:03 1.4M 
[   ]doody.pdf2022-12-07 09:03 1.3M 
[   ]dsd-3g.pdf2022-12-07 09:03 886K 
[   ]ericsson_reply.pdf2022-12-07 09:03 64K 
[   ]europebriefingnote_en.pdf2022-12-07 09:03 798K 
[   ]eyes_wide_open_v1.pdf2022-12-07 09:03 4.2M 
[   ]gchq-g20-spy.pdf2022-12-07 09:03 3.2M 
[   ]gchq-mullenize.pdf2022-12-07 09:03 22K 
[   ]gchq-royal-concierge-de.pdf2022-12-07 09:03 121K 
[   ]gchq-se-fra-quantum-3.pdf2022-12-07 09:03 31K 
[   ]i-hunt-sys-admins.pdf2022-12-07 09:03 22M 
[   ]identity-intelligence.pdf2022-12-07 09:03 2.1M 
[   ]imsis-identified-with-ki-data-for-network.pdf2022-12-07 09:03 75K 
[   ]invisibility-report-9-0-final.pdf2022-12-07 09:03 90K 
[   ]jtrigall.pdf2022-12-07 09:03 1.3M 
[   ]letter_to_companies.pdf2022-12-07 09:03 100K 
[   ]media-34093.pdf2022-12-07 09:03 1.2M 
[   ]media-35509.pdf2022-12-07 09:03 1.5M 
[   ]media-35510.pdf2022-12-07 09:03 4.3M 
[   ]media-35511.pdf2022-12-07 09:03 9.9M 
[   ]media-35512.pdf2022-12-07 09:03 1.3M 
[   ]media-35513.pdf2022-12-07 09:03 3.4M 
[   ]media-35514.pdf2022-12-07 09:03 835K 
[   ]media-35515.pdf2022-12-07 09:03 24M 
[   ]media-35516.pdf2022-12-07 09:03 5.8M 
[   ]media-35517.pdf2022-12-07 09:03 576K 
[   ]media-35518.pdf2022-12-07 09:03 2.8M 
[   ]media-35519.pdf2022-12-07 09:03 892K 
[   ]media-35520.pdf2022-12-07 09:03 4.3M 
[   ]media-35521.pdf2022-12-07 09:03 16M 
[   ]media-35522.pdf2022-12-07 09:03 1.1M 
[   ]media-35523.pdf2022-12-07 09:03 366K 
[   ]media-35524.pdf2022-12-07 09:03 508K 
[   ]media-35525.pdf2022-12-07 09:03 665K 
[   ]media-35526.pdf2022-12-07 09:03 12M 
[   ]media-35527.pdf2022-12-07 09:03 7.9M 
[   ]media-35528.pdf2022-12-07 09:03 2.3M 
[   ]media-35529.pdf2022-12-07 09:03 21M 
[   ]media-35530.pdf2022-12-07 09:03 2.3M 
[   ]media-35531.pdf2022-12-07 09:03 494K 
[   ]media-35532.pdf2022-12-07 09:03 1.4M 
[   ]media-35533.pdf2022-12-07 09:03 4.1M 
[   ]media-35534.pdf2022-12-07 09:03 2.1M 
[   ]media-35535.pdf2022-12-07 09:03 6.9M 
[   ]media-35536.pdf2022-12-07 09:03 571K 
[   ]media-35537.pdf2022-12-07 09:03 574K 
[   ]media-35538.pdf2022-12-07 09:03 3.8M 
[   ]media-35539.pdf2022-12-07 09:03 15M 
[   ]media-35540.pdf2022-12-07 09:03 44M 
[   ]media-35541.pdf2022-12-07 09:03 426K 
[   ]media-35542.pdf2022-12-07 09:03 3.5M 
[   ]media-35543.pdf2022-12-07 09:03 3.9M 
[   ]media-35544.pdf2022-12-07 09:03 535K 
[   ]media-35545.pdf2022-12-07 09:03 178K 
[   ]media-35546.pdf2022-12-07 09:03 599K 
[   ]media-35547.pdf2022-12-07 09:03 383K 
[   ]media-35548.pdf2022-12-07 09:03 767K 
[   ]media-35549.pdf2022-12-07 09:03 1.0M 
[   ]media-35550.pdf2022-12-07 09:03 4.5M 
[   ]media-35551.pdf2022-12-07 09:03 5.1M 
[   ]media-35552.pdf2022-12-07 09:03 405K 
[   ]media-35653.pdf2022-12-07 09:03 620K 
[   ]media-35654.pdf2022-12-07 09:03 394K 
[   ]media-35655.pdf2022-12-07 09:03 808K 
[   ]media-35656.pdf2022-12-07 09:03 2.4M 
[   ]media-35657.pdf2022-12-07 09:03 17M 
[   ]media-35658.pdf2022-12-07 09:03 12M 
[   ]media-35659.pdf2022-12-07 09:03 1.0M 
[   ]media-35661.pdf2022-12-07 09:03 3.5M 
[   ]media-35662.pdf2022-12-07 09:03 2.9M 
[   ]media-35663.pdf2022-12-07 09:03 1.0M 
[   ]media-35664.pdf2022-12-07 09:03 1.5M 
[   ]media-35665.pdf2022-12-07 09:03 8.7M 
[   ]media-35666.pdf2022-12-07 09:03 2.7M 
[   ]media-35667.pdf2022-12-07 09:03 6.6M 
[   ]media-35668.pdf2022-12-07 09:03 167K 
[   ]media-35669.pdf2022-12-07 09:03 1.1M 
[   ]media-35670.pdf2022-12-07 09:03 26M 
[   ]media-35671.pdf2022-12-07 09:03 30M 
[   ]media-35672.pdf2022-12-07 09:03 5.1M 
[   ]media-35673.pdf2022-12-07 09:03 6.6M 
[   ]media-35674.pdf2022-12-07 09:03 37M 
[   ]media-35675.pdf2022-12-07 09:03 19M 
[   ]media-35676.pdf2022-12-07 09:03 6.6M 
[   ]media-35677.pdf2022-12-07 09:03 28M 
[   ]media-35678.pdf2022-12-07 09:03 7.1M 
[   ]media-35680.pdf2022-12-07 09:03 603K 
[   ]media-35681.pdf2022-12-07 09:03 524K 
[   ]media-35682.pdf2022-12-07 09:03 3.3M 
[   ]media-35683.pdf2022-12-07 09:03 8.9M 
[   ]media-35684.pdf2022-12-07 09:03 6.2M 
[   ]media-35685.pdf2022-12-07 09:03 40M 
[   ]media-35686.pdf2022-12-07 09:03 19M 
[   ]media-35687.pdf2022-12-07 09:03 2.5M 
[   ]media-35688.pdf2022-12-07 09:04 11M 
[   ]media-35689.pdf2022-12-07 09:04 28M 
[   ]no-place-to-hide.pdf2022-12-07 09:04 87M 
[   ]nokia_reply.pdf2022-12-07 09:04 101K 
[   ]nsa-5-eyes-partners.pdf2022-12-07 09:04 21K 
[   ]nsa-5-eyes-spy-g20-dk.pdf2022-12-07 09:04 188K 
[   ]nsa-boundless-informant-faq.pdf2022-12-07 09:04 1.7M 
[   ]nsa-boundless-informant-slides.pdf2022-12-07 09:04 72M 
[   ]nsa-boundless-informant.pdf2022-12-07 09:04 189K 
[   ]nsa-boundlessinformant-no-33m.pdf2022-12-07 09:04 6.0M 
[   ]nsa-bullrun-2-16-guardian-13-0905.pdf2022-12-07 09:04 9.6M 
[   ]nsa-bullrun-brief-nyt-13-0905.pdf2022-12-07 09:04 93K 
[   ]nsa-bullrun-brief-propublica-13-0905.pdf2022-12-07 09:04 2.6M 
[   ]nsa-cable-spy-types.pdf2022-12-07 09:04 1.0M 
[   ]nsa-catalog-appelbaum.pdf2022-12-07 09:04 951K 
[   ]nsa-chalkfun.pdf2022-12-07 09:04 68K 
[   ]nsa-close-access-sigads.pdf2022-12-07 09:04 379K 
[   ]nsa-cotraveler.pdf2022-12-07 09:04 603K 
[   ]nsa-cryptanalysis-2-12-guardian-13-0905.pdf2022-12-07 09:04 4.0M 
[   ]nsa-csec-partners.pdf2022-12-07 09:04 93K 
[   ]nsa-css-mission.pdf2022-12-07 09:04 100K 
[   ]nsa-dutch-sigint.pdf2022-12-07 09:04 668K 
[   ]nsa-egotisticalgiraffe.pdf2022-12-07 09:04 3.1M 
[   ]nsa-fascia.pdf2022-12-07 09:04 141K 
[   ]nsa-finance-spy-de.pdf2022-12-07 09:04 727K 
[   ]nsa-fisa-certification.pdf2022-12-07 09:04 46K 
[   ]nsa-fisa-minimization.pdf2022-12-07 09:04 799K 
[   ]nsa-fisa-targeting.pdf2022-12-07 09:04 859K 
[   ]nsa-g8-g20-spying-02.pdf2022-12-07 09:04 196K 
[   ]nsa-g8-g20-spying.pdf2022-12-07 09:04 192K 
[   ]nsa-gchq-fra-quantum.pdf2022-12-07 09:04 295K 
[   ]nsa-gchq-se-fra-comint.pdf2022-12-07 09:04 398K 
[   ]nsa-gchq-spy-games.pdf2022-12-07 09:04 2.2M 
[   ]nsa-ghost-machine.pdf2022-12-07 09:04 2.7M 
[   ]nsa-gsm-tracking.pdf2022-12-07 09:04 326K 
[   ]nsa-hosts-fr-spies.pdf2022-12-07 09:04 922K 
[   ]nsa-iat-tor.pdf2022-12-07 09:04 2.6M 
[   ]nsa-israel-spy.pdf2022-12-07 09:04 3.5M 
[   ]nsa-microsoft-cloud-exploit.pdf2022-12-07 09:04 567K 
[   ]nsa-muslim-porn.pdf2022-12-07 09:04 1.3M 
[   ]nsa-overcollection.pdf2022-12-07 09:04 3.0M 
[   ]nsa-ppd-20.pdf2022-12-07 09:04 1.3M 
[   ]nsa-prism-13-1021.pdf2022-12-07 09:04 2.1M 
[   ]nsa-prism-dk.pdf2022-12-07 09:04 918K 
[   ]nsa-prism-guardian-13-1101.pdf2022-12-07 09:04 2.1M 
[   ]nsa-quantum-computer-2.pdf2022-12-07 09:04 138K 
[   ]nsa-quantum-computer.pdf2022-12-07 09:04 515K 
[   ]nsa-quantum-tasking.pdf2022-12-07 09:04 5.5M 
[   ]nsa-quantumtheory.pdf2022-12-07 09:04 2.4M 
[   ]nsa-scissors-2.pdf2022-12-07 09:04 3.0M 
[   ]nsa-scissors.pdf2022-12-07 09:04 295K 
[   ]nsa-se-fra-quantum-2.pdf2022-12-07 09:04 34K 
[   ]nsa-se-fra-relationship.pdf2022-12-07 09:04 551K 
[   ]nsa-se-fra-ru-baltic.pdf2022-12-07 09:04 50K 
[   ]nsa-se-fra-spying-agenda.pdf2022-12-07 09:04 2.0M 
[   ]nsa-se-fra-xkeyscore-slide.pdf2022-12-07 09:04 570K 
[   ]nsa-se-fra-xkeyscore.pdf2022-12-07 09:04 1.2M 
[   ]nsa-se-spies.pdf2022-12-07 09:04 455K 
[   ]nsa-sigint-cryptologic-platform.pdf2022-12-07 09:04 545K 
[   ]nsa-sigint-enabling-guardian-13-0905.pdf2022-12-07 09:04 5.4M 
[   ]nsa-sigint-enabling-nyt-13-0905.pdf2022-12-07 09:04 348K 
[   ]nsa-sigint-enabling-propublica-13-0905.pdf2022-12-07 09:04 2.0M 
[   ]nsa-sigint-strategic-mission-2007.pdf2022-12-07 09:04 1.9M 
[   ]nsa-sigint-strategic-mission-2013.pdf2022-12-07 09:04 2.6M 
[   ]nsa-sigint-strategy-2012-2016.pdf2022-12-07 09:04 372K 
[   ]nsa-sigint-successes.pdf2022-12-07 09:04 3.5M 
[   ]nsa-smartphones-analysis.pdf2022-12-07 09:04 848K 
[   ]nsa-smartphones.pdf2022-12-07 09:04 741K 
[   ]nsa-sms-exploit.pdf2022-12-07 09:04 1.7M 
[   ]nsa-spy-games.pdf2022-12-07 09:04 79K 
[   ]nsa-sso-content.pdf2022-12-07 09:04 551K 
[   ]nsa-sso-dk.pdf2022-12-07 09:04 222K 
[   ]nsa-sso-overview.pdf2022-12-07 09:04 20K 
[   ]nsa-sso-slides.pdf2022-12-07 09:04 1.0M 
[   ]nsa-sso1-guardian-13-1101.pdf2022-12-07 09:04 183K 
[   ]nsa-sso2-guardian-13-1101.pdf2022-12-07 09:04 107K 
[   ]nsa-stellar-wind.pdf2022-12-07 09:04 8.0M 
[   ]nsa-tao-ant-pdf.pdf2022-12-07 09:04 963K 
[   ]nsa-tao-ant.pdf2022-12-07 09:04 165K 
[   ]nsa-tao-intro.pdf2022-12-07 09:04 3.1M 
[   ]nsa-target-location.pdf2022-12-07 09:04 132K 
[   ]nsa-tor-stinks.pdf2022-12-07 09:04 4.0M 
[   ]nsa-tor.pdf2022-12-07 09:04 266K 
[   ]nsa-verizon-spy.pdf2022-12-07 09:04 130K 
[   ]nsa-wanadoo-alcatel.pdf2022-12-07 09:04 275K 
[   ]nsa-windstop-muscular-incenser.pdf2022-12-07 09:04 1.0M 
[   ]nsa-windstop.pdf2022-12-07 09:04 597K 
[   ]nsa-xkeyscore-sources.pdf2022-12-07 09:04 29K 
[   ]nsa-xkeyscore-tor-slides.pdf2022-12-07 09:04 161K 
[   ]nsa-xkeyscore.pdf2022-12-07 09:04 3.5M 
[   ]nsa-yahoo-google-exploit.pdf2022-12-07 09:04 3.0M 
[   ]nsabullrun.pdf2022-12-07 09:04 2.6M 
[   ]pcs-harvesting-at-scale.pdf2022-12-07 09:04 3.4M 
[   ]phonesgchq.pdf2022-12-07 09:04 1.8M 
[   ]phonesnsa.pdf2022-12-07 09:04 4.6M 
[   ]psychology-a-new-kind-of-sigdev.pdf2022-12-07 09:04 28M 
[   ]quantum_computing.pdf2022-12-07 09:04 3.9M 
[   ]rcs-9-admin-final.pdf2022-12-07 09:04 4.3M 
[   ]rcs-9-analyst-final.pdf2022-12-07 09:04 8.2M 
[   ]rcs-9-sysadmin-final.pdf2022-12-07 09:04 11M 
[   ]rcs-9-technician-final.pdf2022-12-07 09:04 13M 
[   ]remote-control-system-9-0-changelog-final.pdf2022-12-07 09:04 83K 
[   ]remote-control-system-9-1-changelog-final.pdf2022-12-07 09:04 46K 
[   ]samsung_reply.pdf2022-12-07 09:04 2.8M 
[   ]samsung_reply_2.pdf2022-12-07 09:04 2.6M 
[   ]saudi-arabia-information-paper.pdf2022-12-07 09:04 335K 
[   ]sigint-enabling-project.pdf2022-12-07 09:04 2.1M 
[   ]sigint-enabling-project2.pdf2022-12-07 09:04 2.0M 
[   ]spy-budget-fy13.pdf2022-12-07 09:04 2.3M 
[   ]the-art-of-deception-training-for-a-new.pdf2022-12-07 09:04 28M 
[   ]the-nsa-and-gchqs-quantumtheory-hacking-tactics.pdf2022-12-07 09:04 451K 
[   ]turbine-and-turmoil.pdf2022-12-07 09:04 441K 
[   ]vpn-and-voip-exploitation-with-hammerchant.pdf2022-12-07 09:04 551K 
[   ]where-are-these-keys.pdf2022-12-07 09:04 86K 
[TXT]www.google.ro_18th_May_2022.txt2022-12-07 09:04 784  

Apache/2.4.52 (Ubuntu) Server at 161.97.88.200 Port 80