Skip to main content
About
Contact
Press
People
Opportunities
Issues
Free Speech
Privacy
Creativity and Innovation
Transparency
International
Security
Our Work
Deeplinks Blog
Press Releases
Events
Legal Cases
Whitepapers
Podcast
Annual Reports
Take Action
Action Center
Electronic Frontier Alliance
Volunteer
Tools
Privacy Badger
Surveillance Self-Defense
Certbot
Atlas of Surveillance
Cover Your Tracks
Street Level Surveillance
apkeep
Donate
Donate to EFF
Giving Societies
Shop
Org. Membership
Other Ways to Give
Membership FAQ
Donate
Donate to EFF
Shop
Other Ways to Give
Search form
Search
Email updates on news, actions,
and events in your area.
Join EFF Lists
Electronic Frontier Foundation
Donate
Electronic Frontier Foundation
About
Contact
Press
People
Opportunities
Issues
Free Speech
Privacy
Creativity and Innovation
Transparency
International
Security
Our Work
Deeplinks Blog
Press Releases
Events
Legal Cases
Whitepapers
Podcast
Annual Reports
Take Action
Action Center
Electronic Frontier Alliance
Volunteer
Tools
Privacy Badger
Surveillance Self-Defense
Certbot
Atlas of Surveillance
Cover Your Tracks
Street Level Surveillance
apkeep
Donate
Donate to EFF
Giving Societies
Shop
Org. Membership
Other Ways to Give
Membership FAQ
Donate
Donate to EFF
Shop
Other Ways to Give
Search form
Search
NSA Primary Sources
PAGE
NSA Spying
FAQ
How It Works
Key Officials
NSA Primary Sources
State Secrets Privilege
NSA Timeline 1791–2015
Word Games
NSA Primary Sources
Search Terms
Date
Document
Date
Document
10/22/2013
Prism April 2013
11/20/2013
Collection, Processing and Dissemination of Allied Communications
11/19/2013
United States Signals Intelligence Directive 18 Appendix J
11/19/2013
United States Signals Intelligence Directive 18 Jan 25 2011
11/19/2013
NSA Course Materials Module 6 Tech Personnel v.25
11/19/2013
NSA Course Materials Module 6 Analytic Personal v.18
11/19/2013
NSA Course Materials Module 5 v.24
11/19/2013
NSA Course Materials Module 4 v.28
11/19/2013
NSA Course Materials Module 3 v.22
11/19/2013
NSA Course Materials Module 2 v.16
11/19/2013
NSA Course Materials Module 1 v.17
11/19/2013
NSA Course Materials Intro v.13
11/19/2013
NSA Core Intelligence Oversight Training
11/19/2013
AG Guidelines for Domestic FBI Operations
11/19/2013
NSA Guidance Memo on Legal Standards for Searching Bulk Metadata
11/19/2013
NSA Cryptological School Course Slides on Legal, Compliance, and Minimization Procedures
11/19/2013
Office of General Council Business Record Analyst Training Slides
11/19/2013
Interim Competency Test for Access to FISA Data
11/19/2013
NSA Metadata Collection Training Slides
11/19/2013
NSA Summary of Requirements for Collection of Bulk Metadata
11/19/2013
Verification Slide
11/3/2013
Collection Accesses 30 Nov 2009
11/3/2013
NSA SIGINT January 2007 Strategic Mission List
11/3/2013
NSA SIGINT Mission Strategic Plan 2008-2013
11/4/2013
Special Source Operations (SSO) Collection Optimization "Midpoint" Slides - Google and Yahoo! exploitations
11/4/2013
Special Source Operations (SSO) Intercept Program Slides -- cable programs, details of MUSCULAR
11/4/2013
WINDSTOP Collection 30 day period December 2012 - January 2013
8/16/2013
"So You Got a US Person?" training slide November 8, 2011
6/8/2013
Boundless Informant Explanation/FAQ Slides September 6, 2012
10/21/2013
Boundless Informant France
6/8/2013
Boundless Informant Introduction Slides July 13, 2012
10/25/2013
Cable regarding cyber attacks on French Presidential Network April 12, 2013
10/25/2013
Close Access Sigads September 10, 2010 (listing French Embassy)
11/1/2013
Corporate FAA Reporting Metrics
6/27/2013
DOJ Memo from November 20, 2007 Proposing Amendment to DOD procedures to allow NSA to do contact chaining of metadata related to US Persons
8/30/2013
FY 2013 Congressional Budget Summary February 2012 National Intelligence Program Summary ("black budget")
9/20/2013
GCHQ Slides on Belgacom
10/28/2013
Graphic showing phone calls intercepted in Spain December 2012
10/14/2013
Intellipedia entry - Special Source Organization (SSO) Collection Optimization Overview
6/20/2013
Minimization Procedures used by NSA in Connection with Data Acquisitions Pursuant to 702 FISC July 29, 2009
10/30/2013
MUSCULAR slide "Current Efforts on Google"
10/20/2013
NSA Cable dated November 10, 2010 discussing hacking of Mexican President's email
9/5/2013
NSA Classification Guide for Cryptanalysis from September 13, 2005
10/4/2013
NSA Cryptanalysis and Exploitation Services Report on TOR 2006
9/1/2013
NSA document dated June 2010 (not released) discussing targeting of French Foreign Ministry
8/31/2013
NSA document dated March 23, 2006 (not released) showing that Al Jazeera was surveilled
9/28/2013
NSA memo from January 3, 2011 on contact chaining
10/24/2013
NSA memo to Signals Intelligence Division (SID) staff October 27, 2006 regarding monitoring of phones of world leaders
9/16/2013
NSA Network Analysis Center 2010 SIGDEV Conference on credit card authorization network mapping
10/4/2013
NSA Notes from talk on Tor by Roger Dingledine November 2007
Pages
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »
Back to top
JavaScript license information