snowden-archive

Portrait Constituents

6 Directories, 474 Files


├── 2013
│   ├── 20130605-theguardian__verizon_215_secondary_order.pdf
│   ├── 20130606-thewashingtonpost__prism.pdf
│   ├── 20130608-theguardian__boundless_informant_capabilities.pdf
│   ├── 20130608-theguardian__boundless_informant_faq.pdf
│   ├── 20130608-theguardian__prism.pdf
│   ├── 20130620-theguardian__702_minimization_procedures.pdf
│   ├── 20130620-theguardian__702_targeting_procedures.pdf
│   ├── 20130627-theguardian__2007_memo_on_us_person_metadata.pdf
│   ├── 20130627-theguardian__nsa_oig_2009_report.pdf
│   ├── 20130629-thewashingtonpost__prism.pdf
│   ├── 20130630-theguardian__dropmire.pdf
│   ├── 20130710-thewashingtonpost__upstream.pdf
│   ├── 20130731-theguardian__xkeyscore_training_slides.pdf
│   ├── 20130809-theguardian__702_glossary.pdf
│   ├── 20130816-thewashingtonpost__sid_oversight.pdf
│   ├── 20130816-thewashingtonpost__so_you_got_a_us_person.pdf
│   ├── 20130816-thewashingtonpost__sso_news_article.pdf
│   ├── 20130816-thewashingtonpost__targeting_rationale.pdf
│   ├── 20130830-cryptome__congressional_budget_2013.pdf
│   ├── 20130903-oglobo__satc.pdf
│   ├── 20130905-theguardian__bullrun.pdf
│   ├── 20130905-theguardian__cryptanalysis_classification.pdf
│   ├── 20130905-theguardian__sigint_enabling.pdf
│   ├── 20130908-oglobo__stormbew_tv.pdf
│   ├── 20130908-oglobo__stormbrew_tv.pdf
│   ├── 20130908-oglobo__tv.pdf
│   ├── 20130909-derspiegel__smartphones.pdf
│   ├── 20130911-theguardian__israel_sharing.pdf
│   ├── 20130916-derspiegel__credit_card_transactions.pdf
│   ├── 20130920-derspiegel__belgacom.pdf
│   ├── 20130928-thenewyorktimes__contact_chaining.pdf
│   ├── 20130928-thenewyorktimes__syanpse.pdf
│   ├── 20131004-theguardian__egotistical_giraffe.pdf
│   ├── 20131004-theguardian__iat_tor.pdf
│   ├── 20131004-theguardian__tor_stinks.pdf
│   ├── 20131004-thewashingtonpost__gchq_mullenize.pdf
│   ├── 20131004-thewashingtonpost__tor.pdf
│   ├── 20131014-thewashingtonpost__sso_collection_optimization.pdf
│   ├── 20131014-thewashingtonpost__sso_collection_optimization_overview.pdf
│   ├── 20131014-thewashingtonpost__sso_content_acquisition_optimization.pdf
│   ├── 20131020-derspiegel__mexican_president.pdf
│   ├── 20131021-lemonde__boundless_informant_france.pdf
│   ├── 20131021-lemonde__close_access_sigads.pdf
│   ├── 20131021-lemonde__wanadoo_alcatel.pdf
│   ├── 20131022-lemonde__prism_april_2013.pdf
│   ├── 20131024-theguardian__phones_world_leaders.pdf
│   ├── 20131025-lemonde__french_cyberattacks.pdf
│   ├── 20131027-derspiegel__embassy.pdf
│   ├── 20131028-elmundo__spain_collections.pdf
│   ├── 20131030-thewashingtonpost__muscular.pdf
│   ├── 20131030-thewashingtonpost__muscular_smiley.pdf
│   ├── 20131101-theguardian__corporate_reporting.pdf
│   ├── 20131104-elmundo__boundless_informant.pdf
│   ├── 20131104-elmundo__info_sharing_partners.pdf
│   ├── 20131104-thenewyorktimes__collection_accesses.pdf
│   ├── 20131104-thenewyorktimes__sigint_goals.pdf
│   ├── 20131104-thenewyorktimes__sigint_strategic_plan.pdf
│   ├── 20131104-thewashingtonpost__sso_collection_optimization_google.pdf
│   ├── 20131104-thewashingtonpost__sso_overview.pdf
│   ├── 20131104-thewashingtonpost__windstop.pdf
│   ├── 20131117-derspiegel__royal_concierge.pdf
│   ├── 20131117-theguardian__dsd_3g.pdf
│   ├── 20131119-dagbladet__norway_collection.pdf
│   ├── 20131119-odni__ag_guidelines_for_domestic_fbi_operations.pdf
│   ├── 20131119-odni__interim_competency_test_for_access_to_fisa_data.pdf
│   ├── 20131119-odni__nsa_core_intelligence_oversight_training.pdf
│   ├── 20131119-odni__nsa_course_materials_intro_v_13.pdf
│   ├── 20131119-odni__nsa_course_materials_module_1_v_17.pdf
│   ├── 20131119-odni__nsa_course_materials_module_2_v_16.pdf
│   ├── 20131119-odni__nsa_course_materials_module_3_v_22.pdf
│   ├── 20131119-odni__nsa_course_materials_module_4_v_28.pdf
│   ├── 20131119-odni__nsa_course_materials_module_5_v_24.pdf
│   ├── 20131119-odni__nsa_course_materials_module_6_analytic_personal_v_18.pdf
│   ├── 20131119-odni__nsa_course_materials_module_6_tech_personnel_v_25.pdf
│   ├── 20131119-odni__nsa_cryptological_school_course_slides_on_legal_compliance_and_minimization_procedures.pdf
│   ├── 20131119-odni__nsa_guidance_memo_on_legal_standards_for_searching_bulk_metadata.pdf
│   ├── 20131119-odni__nsa_metadata_collection_training_slides.pdf
│   ├── 20131119-odni__nsa_summary_of_requirements_for_collection_of_bulk_metadata.pdf
│   ├── 20131119-odni__office_of_general_council_business_record_analyst_training_slides.pdf
│   ├── 20131119-odni__united_states_signals_intelligence_directive_18_appendix_j.pdf
│   ├── 20131119-odni__united_states_signals_intelligence_directive_18_january_25_2011.pdf
│   ├── 20131119-odni__verification_slide.pdf
│   ├── 20131120-theguardian__collection_processing_and_dissemination_of_allied_communications.pdf
│   ├── 20131122-dagbladet__afghanistan_collection.pdf
│   ├── 20131122-dagbladet__boundless_informant.pdf
│   ├── 20131122-dagbladet__boundless_informant_faq.pdf
│   ├── 20131123-nrchandelsblad__nsa_malware.pdf
│   ├── 20131123-thenewyorktimes__sigint_strategy_23_february_2012.pdf
│   ├── 20131126-thehuffingtonpost__radicalizers_pornography.pdf
│   ├── 20131126-thewashingtonpost__microsoft_cloud_exploitation.pdf
│   ├── 20131126-thewashingtonpost__microsoft_monkey_puzzle.pdf
│   ├── 20131130-theglobeandmail__csec_br_spy.pdf
│   ├── 20131202-cbc__g20.pdf
│   ├── 20131202-theguardian__dsd_data.pdf
│   ├── 20131204-thewashingtonpost__chalkfun_foreignness.pdf
│   ├── 20131204-thewashingtonpost__fascia.pdf
│   ├── 20131205-espresso__italy_spying.pdf
│   ├── 20131205-svt__fra_russia.pdf
│   ├── 20131209-thenewyorktimes__nsa_games.pdf
│   ├── 20131210-cbc__nsa_csec_partnership.pdf
│   ├── 20131210-thewashingtonpost__cotraveler_overview.pdf
│   ├── 20131210-thewashingtonpost__ghost_machine.pdf
│   ├── 20131210-thewashingtonpost__gsm_classification_guide.pdf
│   ├── 20131210-thewashingtonpost__location_cookies.pdf
│   ├── 20131210-thewashingtonpost__target_location.pdf
│   ├── 20131211-svt__accomplishments_from_nsa.pdf
│   ├── 20131211-svt__baltic_region.pdf
│   ├── 20131211-svt__final_agenda_sweden_usa.pdf
│   ├── 20131211-svt__legal_issues_uk_regarding_sweden_and_quantum.pdf
│   ├── 20131211-svt__nsa_internal_pm_on_fra.pdf
│   ├── 20131211-svt__nsa_slides_xkeyscore.pdf
│   ├── 20131211-svt__quantum_from_gchq.pdf
│   ├── 20131211-svt__sweden_neutral.pdf
│   ├── 20131211-svt__xkeyscore_slide_with_swedish_example.pdf
│   ├── 20131211-svt__xkeyscore_sources.pdf
│   ├── 20131211-svt__xkeyscore_sweden_meeting.pdf
│   ├── 20131223-thewashingtonpost__nsacss_mission.pdf
│   ├── 20131230-derspiegel__qfire.pdf
│   ├── 20131230-derspiegel__tao_intro.pdf
│   ├── 20131230-derspiegel__tao_quantum_tasking.pdf
│   ├── 20131230-derspiegel__tao_quantum_theory.pdf
│   └── 20131230-jacobappelbaum__nsa_ant_catalog.pdf
├── 2014
│   ├── 20140102-thewashingtonpost__quantum_computers_hard_targets.pdf
│   ├── 20140102-thewashingtonpost__quantum_computing.pdf
│   ├── 20140116-theguardian__dishfire_presentation.pdf
│   ├── 20140127-nbc__squeaky_dolphin.pdf
│   ├── 20140127-thenewyorktimes__converged_analysis_on_smartphone_devices.pdf
│   ├── 20140127-thenewyorktimes__mobile_theme_briefing.pdf
│   ├── 20140128-theguardian__leaky_phone_apps_1.pdf
│   ├── 20140128-theguardian__leaky_phone_apps_2.pdf
│   ├── 20140130-informationdk__cop15_interception_document.pdf
│   ├── 20140131-cbc__csec_airport_wifi_tracking.pdf
│   ├── 20140204-nbc__british_spies_attacked_hacktivist_anonymous.pdf
│   ├── 20140207-nbc__gchq_honey_trap_cyber_attack_background_on_jtrig.pdf
│   ├── 20140207-nbc__gchq_honey_trap_cyber_attack_leveraging_foreign_journalists_via_jtrig.pdf
│   ├── 20140207-nrchandelsblad__boundless_nederland.pdf
│   ├── 20140211-theintercept__drones_intercepting_communications.pdf
│   ├── 20140218-theintercept__discovery_sigint_targeting_scenarios_and_compliance.pdf
│   ├── 20140218-theintercept__gchq_sigdev.pdf
│   ├── 20140224-theintercept__training_for_covert_online_operations.pdf
│   ├── 20140227-theguardian__gchq_optic.pdf
│   ├── 20140303-epicfoia__not-snowden__doj_report_on_pen_register_fisa_orders.pdf
│   ├── 20140305-nrchandelsblad__dutch_shares_collected_anti_piracy_information_with_nsa.pdf
│   ├── 20140307-theintercept__nsa_ask_zelda_an_interview_with_zelda.pdf
│   ├── 20140307-theintercept__nsa_ask_zelda_guilty_until_proven_innocent.pdf
│   ├── 20140307-theintercept__nsa_ask_zelda_is_bain_de_soleil_a_bane_on_the_nsa.pdf
│   ├── 20140307-theintercept__nsa_ask_zelda_watching_every_word_in_snitch_city.pdf
│   ├── 20140311-thenewyorktimes__ashcroft_memo_on_intelligence_sharing_procedures.pdf
│   ├── 20140311-thenewyorktimes__classification_guide_for_fisa_the_protect_america_act_and_the_fisa_amendments_act.pdf
│   ├── 20140311-thenewyorktimes__classification_guide_for_stellarwind_program_0.pdf
│   ├── 20140311-thenewyorktimes__nsa_memo_expands_access_to_fisa_information.pdf
│   ├── 20140311-thenewyorktimes__nsa_timeline_of_surveillance_law_developments.pdf
│   ├── 20140312-theintercept__five_eyes_hacking_large_routers.pdf
│   ├── 20140312-theintercept__increasing_collection_capacity_by_increasing_implants.pdf
│   ├── 20140312-theintercept__mhs_leverages_xkeyscore_for_quantum.pdf
│   ├── 20140312-theintercept__multiple_methods_of_quantum.pdf
│   ├── 20140312-theintercept__nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf
│   ├── 20140312-theintercept__nsa_selector_types.pdf
│   ├── 20140312-theintercept__nsa_technology_directorate_analysis_of_converged_data.pdf
│   ├── 20140312-theintercept__quantum_insert_diagrams.pdf
│   ├── 20140312-theintercept__the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf
│   ├── 20140312-theintercept__turbine_and_turmoil.pdf
│   ├── 20140312-theintercept__turbine_industrial_scale_exploitation.pdf
│   ├── 20140312-theintercept__vpn_and_voip_exploitation_with_hammerchant_and_hammerstein.pdf
│   ├── 20140313-theintercept__nsa_cooperative_third_party_relationships.pdf
│   ├── 20140315-theintercept__turbine_intelligence_command_and_control.pdf
│   ├── 20140318-thewashingtonpost__adding_another_country_to_mystic_program.pdf
│   ├── 20140318-thewashingtonpost__description_of_data_collection_under_mystic.pdf
│   ├── 20140318-thewashingtonpost__mystic_program.pdf
│   ├── 20140320-theintercept__targeting_system_administrator_accounts.pdf
│   ├── 20140321-lemonde__french_intelligence_email_spying_operation.pdf
│   ├── 20140322-thenewyorktimes__operation_shotgiant_objectives.pdf
│   ├── 20140329-derspiegel__gchq_and_nsa_spy_on_heads_of_state.pdf
│   ├── 20140404-theintercept__2009_sigdev_conference.pdf
│   ├── 20140404-theintercept__gchq_full_spectrum_cyber_effects.pdf
│   ├── 20140430-theintercept__gchq_visit.pdf
│   ├── 20140430-theintercept__ghostmachine.pdf
│   ├── 20140430-theintercept__prism_olympics.pdf
│   ├── 20140513-glenngreenwald__no_place_to_hide_documents.pdf
│   ├── 20140519-theintercept__black_budget.pdf
│   ├── 20140519-theintercept__dea_warfighter.pdf
│   ├── 20140519-theintercept__mystic.pdf
│   ├── 20140519-theintercept__somalget.pdf
│   ├── 20140519-theintercept__sso_dictionary_excerpt.pdf
│   ├── 20140519-theintercept__sso_mystic_charts.pdf
│   ├── 20140531-thenewyorktimes__identity-intelligence.pdf
│   ├── 20140610-cryptome__dea-nsa-sandkey.pdf
│   ├── 20140616-derspiegel__analytics_for_targets_in_europe.pdf
│   ├── 20140616-derspiegel__xkeyscore_fingerprints.pdf
│   ├── 20140618-dagbladet__black_budget.pdf
│   ├── 20140618-dagbladet__keith_alexander_talking_points.pdf
│   ├── 20140618-derspiegel__agenda_for_the_visit_of_bsi_vice_president_andreas_konen_to_the_nsa.pdf
│   ├── 20140618-derspiegel__boundless_informant_overview_global.pdf
│   ├── 20140618-derspiegel__boundless_informant_statistics_for_so-called_third_parties.pdf
│   ├── 20140618-derspiegel__boundless_informant_statistics_on_data_from_foreign_partners.pdf
│   ├── 20140618-derspiegel__boundless_informant_statistics_on_germany.pdf
│   ├── 20140618-derspiegel__boundless_informant_statistics_on_the_uk.pdf
│   ├── 20140618-derspiegel__briefing_on_the_visit_to_the_nsa_of_high_ranking_bnd_official.pdf
│   ├── 20140618-derspiegel__cooperation_between_the_nsa_bnd_and_bfv.pdf
│   ├── 20140618-derspiegel__details_on_xkeyscore_from_an_internal_gchq_website.pdf
│   ├── 20140618-derspiegel__european_technical_center_report_on_the_experiences_of_one_nsa_worker.pdf
│   ├── 20140618-derspiegel__excerpt_on_the_sharing_of_xkeyscore_with_german_intelligence_agency_bfv.pdf
│   ├── 20140618-derspiegel__explanation_of_nymrod_a_system_for_searching_for_people_and_places_in_databases_and_documents.pdf
│   ├── 20140618-derspiegel__faqs_on_the_boundless_informant_program.pdf
│   ├── 20140618-derspiegel__final_agenda_of_meeting_between_high_ranking_nsa_and_bnd_officials.pdf
│   ├── 20140618-derspiegel__gchq_report_on_the_technical_abilities_of_tempora.pdf
│   ├── 20140618-derspiegel__guidelines_for_the_classification_of_nsa_sigint_details_1945_1967.pdf
│   ├── 20140618-derspiegel__guidelines_for_the_classification_of_suslag_details_and_the_nsa_bnd_cooperation.pdf
│   ├── 20140618-derspiegel__internal_nsa_discussion_guidelines_relating_to_cooperation_with_the_bnd_and_bfv.pdf
│   ├── 20140618-derspiegel__internal_nsa_presentation_on_the_bnds_organization.pdf
│   ├── 20140618-derspiegel__logo_of_nsa_bnd_cooperation.pdf
│   ├── 20140618-derspiegel__nostalgic_recollections_from_nsa_workers_formerly_stationed_in_bad_aibling.pdf
│   ├── 20140618-derspiegel__nsa_presentation_on_the_work_of_nymrod.pdf
│   ├── 20140618-derspiegel__nsacss_europe_report_on_the_experiences_of_one_nsa_worker.pdf
│   ├── 20140618-derspiegel__nsacss_presentation_on_technical_surveillance_in_europe_and_africa.pdf
│   ├── 20140618-derspiegel__overview_of_the_use_of_boundless_informant_world_map.pdf
│   ├── 20140618-derspiegel__preliminary_agenda_of_meeting_between_nsa_and_bnd_officials.pdf
│   ├── 20140618-derspiegel__presentation_on_the_nsacia_unit_special_collection_service.pdf
│   ├── 20140618-derspiegel__report_on_a_wharpdrive_incident_in_an_sso_presentation.pdf
│   ├── 20140618-derspiegel__report_on_an_nsa_sigdev_training_course_for_allied_countries.pdf
│   ├── 20140618-derspiegel__report_on_an_nsa_visit_to_bnd_site_and_on_data_transfer_from_the_bnd_to_the_nsa.pdf
│   ├── 20140618-derspiegel__report_on_an_unexploded_ordnance_alarm_at_european_technical_centern.pdf
│   ├── 20140618-derspiegel__report_on_an_xkeyscore_training_session_at_the_ecc_dagger_complex.pdf
│   ├── 20140618-derspiegel__report_on_data_exchange_between_the_nsa_and_bnd_within_the_jsa_framework.pdf
│   ├── 20140618-derspiegel__report_on_the_beginnings_of_the_european_security_center_esc_in_the_dagger_complex.pdf
│   ├── 20140618-derspiegel__report_on_the_changing_of_the_escs_name_to_european_security_operations_center_esoc.pdf
│   ├── 20140618-derspiegel__report_on_the_nsas_access_to_tempora.pdf
│   ├── 20140618-derspiegel__report_on_the_one_year_anniversary_of_nsa_liaison_unit_suslag_in_bad_aibling.pdf
│   ├── 20140618-derspiegel__report_on_the_surveillance_of_african_countries_by_jsa.pdf
│   ├── 20140618-derspiegel__report_on_the_technical_expansion_of_the_european_technical_center_in_wiesbaden.pdf
│   ├── 20140618-derspiegel__report_on_the_work_of_nsacss_europe.pdf
│   ├── 20140618-derspiegel__restrictions_on_the_technical_surveillance_performed_by_jsa.pdf
│   ├── 20140618-derspiegel__us_sites_with_nsa_personnel_in_germany.pdf
│   ├── 20140618-derspiegel__world_map_from_the_boundless_informant_program.pdf
│   ├── 20140618-derspiegel__zoom_of_a_boundless_informant_document_with_project_names.pdf
│   ├── 20140630-thewashingtonpost__affidavit_of_keith_alexander_regarding_spying_on_foreign_entities.pdf
│   ├── 20140630-thewashingtonpost__fisa_amendments_act_summary_document.pdf
│   ├── 20140630-thewashingtonpost__fisa_judges_order_authorizing_surveillance_of_foreign_governments_and_organizations.pdf
│   ├── 20140630-thewashingtonpost__list_of_governments_and_organizations_authorized_for_surveillance.pdf
│   ├── 20140630-thewashingtonpost__odni_certification_regarding_foreign_entities.pdf
│   ├── 20140709-theintercept__spying_on_muslim_american_leaders.pdf
│   ├── 20140714-theintercept__jtrigall.pdf
│   ├── 20140723-theintercept__watchlist_guidance_march_2013_1.pdf
│   ├── 20140723-theintercept__watchlist_guidance_march_2013_2.pdf
│   ├── 20140723-thewashingtonpost__post_signals_intelligence_authority_decision_tree.pdf
│   ├── 20140725-theintercept__saudi_arabia_information_paper.pdf
│   ├── 20140803-theintercept__israel_us_1999_agreement.pdf
│   ├── 20140803-theintercept__nsa_intelligence_relationship_with_israel.pdf
│   ├── 20140805-theintercept__directorate_of_terrorist_identities_strategic_accomplishments_2013.pdf
│   ├── 20140812-theintercept__gchq_covert_mobile_phones_policy.pdf
│   ├── 20140815-heiseonline__hacienda_program.pdf
│   ├── 20140825-theintercept__cia_colleagues_enthusiastically_welcome_nsa_training.pdf
│   ├── 20140825-theintercept__crisscrossproton_point_paper.pdf
│   ├── 20140825-theintercept__dni_decision_memorandum_on_icreach.pdf
│   ├── 20140825-theintercept__icreach_black_budget_extract.pdf
│   ├── 20140825-theintercept__icreach_sharing_sigint_comms_metadata_with_the_intel_community_memo.pdf
│   ├── 20140825-theintercept__icreach_wholesale_sharing.pdf
│   ├── 20140825-theintercept__metadata_policy_conference.pdf
│   ├── 20140825-theintercept__metadata_sharing_memorandum.pdf
│   ├── 20140825-theintercept__sharing_communications_metadata_across_the_usic_icreach.pdf
│   ├── 20140831-derspiegel__collaboration_in_overdrive.pdf
│   ├── 20140831-derspiegel__iraq_uk_load_sharing_carriers.pdf
│   ├── 20140831-derspiegel__jordan_belgium.pdf
│   ├── 20140831-derspiegel__kurdistan_regional_government.pdf
│   ├── 20140831-derspiegel__ncrs_with_foreign_relations_missions_become_suslas.pdf
│   ├── 20140831-derspiegel__nsa_intelligence_relationship_with_turkey.pdf
│   ├── 20140831-derspiegel__nsas_oldest_third_party_partnership.pdf
│   ├── 20140831-derspiegel__sinio_seminar_tough_times_for_turkey.pdf
│   ├── 20140831-derspiegel__sinio_seminar_turkey_and_the_kurds.pdf
│   ├── 20140831-derspiegel__sinio_seminar_turkish_elections.pdf
│   ├── 20140831-derspiegel__turkey_and_the_pkk.pdf
│   ├── 20140831-derspiegel__turkey_at_the_g20_pre_meeting.pdf
│   ├── 20140831-derspiegel__turkey_energy_company_development.pdf
│   ├── 20140831-derspiegel__turkish_signal_intelligence_chief_agenda.pdf
│   ├── 20140905-theintercept__quadrennial_intelligence_community_review_final_report.pdf
│   ├── 20140914-derspiegel__satellite_teleport_knowledge.pdf
│   ├── 20140914-derspiegel__treasure_map_announces_a_new_release.pdf
│   ├── 20140914-derspiegel__treasure_map_presentation.pdf
│   ├── 20140914-theintercept__ferguson_visit_precis.pdf
│   ├── 20140914-theintercept__key_activities_in_progress.pdf
│   ├── 20140914-theintercept__speargun_phase_one.pdf
│   ├── 20140914-theintercept__speargun_underway.pdf
│   ├── 20141010-theintercept__cno_core_secrets_security_structure.pdf
│   ├── 20141010-theintercept__cno_core_secrets_slide_slices.pdf
│   ├── 20141010-theintercept__computer_network_exploitation_classification_guide.pdf
│   ├── 20141010-theintercept__eci_compartments.pdf
│   ├── 20141010-theintercept__eci_pawleys_classification_guide.pdf
│   ├── 20141010-theintercept__eci_whipgenie_classification_guide.pdf
│   ├── 20141010-theintercept__exceptionally_controlled_information_listing.pdf
│   ├── 20141010-theintercept__sentry_eagle_brief_sheet.pdf
│   ├── 20141010-theintercept__tarex_classification_guide.pdf
│   ├── 20141125-suddeutschezeitung__access_breakdown.pdf
│   ├── 20141125-suddeutschezeitung__cable_master_list_ac.pdf
│   ├── 20141125-suddeutschezeitung__cable_master_list_fea.pdf
│   ├── 20141125-suddeutschezeitung__cable_regions.pdf
│   ├── 20141125-suddeutschezeitung__cables_no_current_access.pdf
│   ├── 20141125-suddeutschezeitung__cables_where_we_are.pdf
│   ├── 20141125-suddeutschezeitung__cables_where_we_want_to_be.pdf
│   ├── 20141125-suddeutschezeitung__cne_endpoint_project_load.pdf
│   ├── 20141125-suddeutschezeitung__mti_access_project_weekly_status_february_6_2009.pdf
│   ├── 20141125-suddeutschezeitung__mti_access_project_weekly_status_june_27_2008.pdf
│   ├── 20141125-suddeutschezeitung__mti_access_project_weekly_status_november_28_2008.pdf
│   ├── 20141125-suddeutschezeitung__partner_cables.pdf
│   ├── 20141125-suddeutschezeitung__ptc_glossary.pdf
│   ├── 20141125-suddeutschezeitung__windstop_system_highlights.pdf
│   ├── 20141204-theintercept__auroragold_project_overview.pdf
│   ├── 20141204-theintercept__auroragold_target_technology_trends_center_support_to_wpmo.pdf
│   ├── 20141204-theintercept__auroragold_working_aid.pdf
│   ├── 20141204-theintercept__auroragold_working_group.pdf
│   ├── 20141204-theintercept__ir21_a_technology_warning_mechanism.pdf
│   ├── 20141204-theintercept__nsa_first_ever_collect_of_high_interest_4g_cellular_signal.pdf
│   ├── 20141204-theintercept__nsa_gchq_csec_network_tradecraft_advancement.pdf
│   ├── 20141204-theintercept__opulant_pup_encryption_attack.pdf
│   ├── 20141204-theintercept__wolframite_encryption_attack.pdf
│   ├── 20141214-theintercept__gchq_automated_noc_detection.pdf
│   ├── 20141214-theintercept__gchq_hopscotch.pdf
│   ├── 20141214-theintercept__gchq_making_network_sense_of_the_encryption.pdf
│   ├── 20141214-theintercept__gchq_mobile_networks_in_my_noc_world.pdf
│   ├── 20141214-theintercept__gchq_nac_review_april_june_2011.pdf
│   ├── 20141214-theintercept__gchq_nac_review_january_march_2012.pdf
│   ├── 20141214-theintercept__gchq_nac_review_july_sept_2011.pdf
│   ├── 20141214-theintercept__gchq_nac_review_october_december_2011.pdf
│   ├── 20141214-theintercept__gchq_stargate_cne_requirements.pdf
│   ├── 20141228-derspiegel__analysis_from_ssl-tls_connections_through_gchq_in_the_flying_pig_database.pdf
│   ├── 20141228-derspiegel__analytic_challenges_from_active_passive_integration_when_nsa_attacks_ipsec_vpns.pdf
│   ├── 20141228-derspiegel__analytics_on_security_of_tor_hidden_services.pdf
│   ├── 20141228-derspiegel__bluesnort_program_on_net_defense_from_encrypted_communications.pdf
│   ├── 20141228-derspiegel__canadian_document_from_ces_on_tls_trends.pdf
│   ├── 20141228-derspiegel__classification_guide_for_cryptanalysis.pdf
│   ├── 20141228-derspiegel__decryption_of_vpn_connections_within_the_valiantsurf_program.pdf
│   ├── 20141228-derspiegel__description_of_existing_projects_on_vpn_decryption.pdf
│   ├── 20141228-derspiegel__description_of_voip_telephony_encryption_methods_and_other_ways_to_attack.pdf
│   ├── 20141228-derspiegel__description_on_the_processing_of_vpn_data_packets_within_the_turmoil_program.pdf
│   ├── 20141228-derspiegel__explanation_of_a_potential_technique_to_deanonymise_users_of_the_tor_network.pdf
│   ├── 20141228-derspiegel__explanation_of_the_gallantwave_that_decrypts_vpn_traffic_within_longhaul.pdf
│   ├── 20141228-derspiegel__explanation_of_the_poisennut_product_and_its_role_when_attacking_vpn.pdf
│   ├── 20141228-derspiegel__explanation_of_the_transform_engine_emulator_when_attacking_vpn.pdf
│   ├── 20141228-derspiegel__explanation_of_the_turmoil_gallantwave_program_and_its_role_when_attacking_vpn.pdf
│   ├── 20141228-derspiegel__explanation_on_the_spin9_program_on_end_to_end_attacks_on_vpn.pdf
│   ├── 20141228-derspiegel__gchq_briefing_on_the_bullrun_program.pdf
│   ├── 20141228-derspiegel__gchq_presentation_on_the_bullrun_programs_decryption_capabilities.pdf
│   ├── 20141228-derspiegel__general_description_how_nsa_handles_encrypted_traffic.pdf
│   ├── 20141228-derspiegel__guide_for_analysts_on_how_to_use_the_prism_skype_collection.pdf
│   ├── 20141228-derspiegel__intercept_with_otr_encrypted_chat.pdf
│   ├── 20141228-derspiegel__intercept_with_pgp_encrypted_message.pdf
│   ├── 20141228-derspiegel__intro_to_the_vpn_exploitation_process_mentioning_the_protocols_attacked_pptp_ipsec_ssl_ssh.pdf
│   ├── 20141228-derspiegel__malibu_architecture_overview_to_exploit_vpn_communication.pdf
│   ├── 20141228-derspiegel__national_information_assurance_research_laboratory_niarl_tundra.pdf
│   └── 20141228-derspiegel__potential_technique_to_deanonymise_users_of_tor_network.pdf
├── 2015
│   ├── 20150117-derspeigel__analysis_of_chinese_methods_and_performed_actions_in_the_context_of_computer_network_exploitation.pdf
│   ├── 20150117-derspeigel__classification_guide_for_computer_network_exploitation_cne.pdf
│   ├── 20150117-derspeigel__combination_of_offensive_and_defensive_missions_how_fourth-party_missions_are_being_performed.pdf
│   ├── 20150117-derspeigel__csec_document_about_the_recognition_of_trojans_and_other_network_based_anomaly.pdf
│   ├── 20150117-derspeigel__csec_document_on_the_handling_of_existing_trojans_when_trojanizing_computers.pdf
│   ├── 20150117-derspeigel__document_explaining_the_role_of_the_remote_operations_center_roc.pdf
│   ├── 20150117-derspeigel__expansion_of_the_remote_operations_center_roc_on_endpoint_operations.pdf
│   ├── 20150117-derspeigel__nsa_example_snowglobe_in_which_a_suspected_french_government_trojan_is_analyzed_to_find_out_if_it_can_be_helpful_for_own_interests.pdf
│   ├── 20150117-derspeigel__nsa_fourth_party_access.pdf
│   ├── 20150117-derspeigel__nsa_program_tutelage_to_instrumentalize_third_party_attack_tools.pdf
│   ├── 20150117-derspeigel__nsa_project_description_to_recognize_and_process_data_that_comes_from_third_party_attacks_on_computers.pdf
│   ├── 20150117-derspeigel__nsa_training_course_material_on_computer_network_operations.pdf
│   ├── 20150117-derspeigel__overview_of_methods_for_nsa_integrated_cyber_operations.pdf
│   ├── 20150117-derspeigel__overview_of_the_transgression_program_to_analyze_and_exploit_foreign_cna-cne_exploits.pdf
│   ├── 20150117-derspeigel__overview_on_the_nsa_use_of_bots_and_the_defiantwarrior_program.pdf
│   ├── 20150117-derspeigel__process_analysts_choose_their_data_requirement_and_then_get_to_know_the_tools_that_can_do_the_job.pdf
│   ├── 20150117-derspeigel__projects_of_the_tao-ato_department_such_as_the_remote_destruction_of_network_cards.pdf
│   ├── 20150117-derspeigel__quantumtheory_is_a_set_of_technologies_allowing_man_on_the_side_interference_attacks_on_tcp_ip_connections_includes_straightbizarre_and_daredev.pdf
│   ├── 20150117-derspeigel__report_of_nsa_employee_about_backdoor_in_the_openssh_daemon.pdf
│   ├── 20150117-derspeigel__sample_code_of_malware_program_from_five_eyes_alliance.pdf
│   ├── 20150117-derspeigel__supply-chain_interdiction_stealthy_techniques_can_crack_some_of_sigints_hardest_targets.pdf
│   ├── 20150117-derspeigel__technical_description_of_the_fashioncleft_protocol.pdf
│   ├── 20150117-derspeigel__the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa.pdf
│   ├── 20150128-cbc__cse_presentation_on_the_levitation_project.pdf
│   ├── 20150128-theintercept__cse_presentation_on_the_levitation_project.pdf
│   ├── 20150204-theintercept__lovely_horse.pdf
│   ├── 20150204-theintercept__nato_civilian_intelligence_council_cyber_panel.pdf
│   ├── 20150204-theintercept__open_source_for_cyber_defence_progress.pdf
│   ├── 20150204-theintercept__who_else_is_targeting_your_target_collecting.pdf
│   ├── 20150210-theintercept__iran_current_topics_interactions_with_gchq.pdf
│   ├── 20150219-theintercept__ccne_email_addresses_jan10_mar10_trial.pdf
│   ├── 20150219-theintercept__ccne_email_harvesting_jan10_mar10_trial.pdf
│   ├── 20150219-theintercept__ccne_stats_summaries_jan10_mar10_trial.pdf
│   ├── 20150219-theintercept__ccne_successes_jan10_mar10_trial.pdf
│   ├── 20150219-theintercept__cne_access_to_core_mobile_networks.pdf
│   ├── 20150219-theintercept__dapino_gamma_cne_presence_wiki.pdf
│   ├── 20150219-theintercept__dapino_gamma_gemalto_yuaawaa_wiki.pdf
│   ├── 20150219-theintercept__dapino_gamma_target_personalisation_centres.pdf
│   ├── 20150219-theintercept__imsis_identified_with_ki_data_for_network.pdf
│   ├── 20150219-theintercept__pcs_harvesting_at_scale.pdf
│   └── 20150219-theintercept__where_are_these_keys.pdf
├── 2016
│   ├── 20160129-theintercept__gchq_nsa_il_uav.pdf
│   ├── 20160202-boingboing__gchq_malware.pdf
│   ├── 20160511-theintercept__nsa_sigint_humint.pdf
│   ├── 20160606-theintercept__communications_capability_development_programme.pdf
│   ├── 20160606-theintercept__digint_imbalance.pdf
│   ├── 20160606-theintercept__digint_narrative.pdf
│   ├── 20160606-theintercept__milkwhite.pdf
│   ├── 20160606-theintercept__mobile_apps_checkpoint_meeting_archives.pdf
│   ├── 20160606-theintercept__ntac__overview.pdf
│   ├── 20160606-theintercept__preston_architecture.pdf
│   ├── 20160606-theintercept__preston_business_processes.pdf
│   ├── 20160606-theintercept__preston_study.pdf
│   ├── 20160819-theintercept__cno_course_eao_redacted.pdf
│   ├── 20160819-theintercept__course__introduction_nohidden_redacted.pdf
│   ├── 20160819-theintercept__foxacid_overall_briefing_third_revision_redacted.pdf
│   ├── 20160819-theintercept__foxacid_server_sop_redacted.pdf
│   ├── 20160819-theintercept__introduction_to_baddecision_redacted.pdf
│   ├── 20160819-theintercept__introduction_to_wlan_cne_operations_redacted.pdf
│   ├── 20160819-theintercept__nsa_fullman.pdf
│   ├── 20160819-theintercept__sigint_development_program_management_review_redacted.pdf
│   ├── 20160819-theintercept__sso_news_excerpt_redacted.pdf
│   ├── 20160906-theintercept__afghanistan_30_enemy_killed_january_february_2012.pdf
│   ├── 20160906-theintercept__apparition_becomes_a_reality_new_corporate_vsat.pdf
│   ├── 20160906-theintercept__apparition_ghosthunter_tasking_info.pdf
│   ├── 20160906-theintercept__elegant_chaos_collect_it_all_exploit_it_all.pdf
│   ├── 20160906-theintercept__elegant_chaos_collect_it_all_exploit_it_all_plus_notes.pdf
│   ├── 20160906-theintercept__ghosthunter_and_the_geolocating_of_internet_cafes.pdf
│   ├── 20160906-theintercept__ghosthunter_future_capabilities_2008.pdf
│   ├── 20160906-theintercept__ghosthunter_goes_global.pdf
│   ├── 20160906-theintercept__ghosthunter_only_capability_of_its_kind.pdf
│   ├── 20160906-theintercept__ghosthunter_tasking_process.pdf
│   ├── 20160906-theintercept__gsm_tower_geolocation.pdf
│   ├── 20160906-theintercept__gsm_tower_mapping_made_easier_and_more_accurate.pdf
│   ├── 20160906-theintercept__menwith_satellite_classification_guide.pdf
│   ├── 20160906-theintercept__mhs_collection_assets.pdf
│   ├── 20160906-theintercept__mhs_continues_successful_counterterrorism_survey.pdf
│   ├── 20160906-theintercept__mhs_databases_as_of_14_august_2008.pdf
│   ├── 20160906-theintercept__mhs_initiatives_maximizing_our_access.pdf
│   ├── 20160906-theintercept__new_ops_building_at_mhs_completed_fit_up_begins.pdf
│   ├── 20160906-theintercept__new_technique_geolocates_targets_active_at.pdf
│   ├── 20160906-theintercept__new_tool_combines_multi_int_multi_agency.pdf
│   ├── 20160906-theintercept__project_sandstorm_wifi_geolocation_january_2011.pdf
│   ├── 20160906-theintercept__sigint_target_package_leads_to_usmc_capture_of_alqaeda_weapons_procurer.pdf
│   ├── 20160906-theintercept__too_much_of_a_good_thing.pdf
│   ├── 20160906-theintercept__traffic_series_is_your_collection_surveyed_or.pdf
│   ├── 20160906-theintercept__uk_special_forces_reaper_drone_january_february_2012.pdf
│   ├── 20160906-theintercept__work_is_progressing_on_menwith_hill_station_s.pdf
│   ├── 20160906-theintercept__yemen_backhaul_comms_collected_january_2011.pdf
│   ├── 20161116-theintercept__blarney_program_overview.pdf
│   ├── 20161116-theintercept__blarney_report_april_2013.pdf
│   ├── 20161116-theintercept__blarney_site_book.pdf
│   ├── 20161116-theintercept__fairview_dataflow_charts_april_2012.pdf
│   ├── 20161116-theintercept__fairview_site_book.pdf
│   ├── 20161116-theintercept__skidrowe_program.pdf
│   ├── 20161116-theintercept__sso_corporate_overview.pdf
│   └── 20161229-theintercept__anna_politkovskaya_intellipedia_redacted.pdf
├── 2017
│   ├── 20170410-theintercept__10th_anniversary_edition_ep_3_damage_assessment.pdf
│   ├── 20170606-theintercept__nsa_uss_liberty_incident_classification_guide.pdf
│   ├── 20170606-theintercept__pages_from_denial_and_deception_except_redacted.pdf
│   ├── 20170819-theintercept__m7600_m8300_sigint_guide.pdf
│   ├── 20170819-theintercept__nro_sigint_guide_pine_gap.pdf
│   ├── 20170819-theintercept__nsa_intelligence_relationship_with_australia.pdf
│   ├── 20170819-theintercept__pine_gap_site_profile.pdf
│   ├── 20170819-theintercept__rainfall_pine_gap_classification_guide.pdf
│   ├── 20171025-theintercept__cuban_missile_crisis_redacted.pdf
│   ├── 20171025-theintercept__nsa_jfk_assassination_records_classification_declassification_guide.pdf
│   ├── 20171130-theintercept__fisa_guide.pdf
│   ├── 20171130-theintercept__pinwale_slides.pdf
│   ├── 20171130-theintercept__sso_weekly_brief_25_april_2013_excerpt.pdf
│   └── 20171130-theintercept__u_re_ehsanul_sadequee_fisa_request.pdf
└── 2018
    ├── 20180301-theintercept__canyondust_coverage_regions_nsa.pdf
    ├── 20180301-theintercept__fornsat_technologies_nsa.pdf
    ├── 20180301-theintercept__global_collaboration_environment_directors_talking_points_nsa.pdf
    ├── 20180301-theintercept__nsa_intelligence_relationship_with_norway_april_2013.pdf
    ├── 20180320-theintercept__entries_from_sample_sso_accesses.pdf
    ├── 20180320-theintercept__entry_from_sso_dictionary_v1_0.pdf
    ├── 20180320-theintercept__entry_from_sso_news.pdf
    ├── 20180320-theintercept__pages_from_oakstar_site_book_v1_0.pdf
    ├── 20180320-theintercept__pages_from_oakstar_weekly_2013_03_08.pdf
    ├── 20180320-theintercept__pages_from_oakstar_weekly_2013_03_15.pdf
    ├── 20180320-theintercept__pages_from_oakstar_weekly_2013_03_22.pdf
    ├── 20180320-theintercept__pages_from_oakstar_weekly_2013_03_29.pdf
    ├── 20180320-theintercept__pages_from_oakstar_weekly_2013_03_30.pdf
    └── 20180320-theintercept__second_look_sso_20mar2012_wstormbrewmap.pdf