Index of /SnowdenFiles/2014

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]20141228-derspiegel__potential_technique_to_deanonymise_users_of_tor_network.pdf2025-08-31 14:20 2.0M 
[   ]20141228-derspiegel__national_information_assurance_research_laboratory_niarl_tundra.pdf2025-08-31 14:20 2.0M 
[   ]20141228-derspiegel__malibu_architecture_overview_to_exploit_vpn_communication.pdf2025-08-31 14:20 621K 
[   ]20141228-derspiegel__intro_to_the_vpn_exploitation_process_mentioning_the_protocols_attacked_pptp_ipsec_ssl_ssh.pdf2025-08-31 14:20 5.9M 
[   ]20141228-derspiegel__intercept_with_pgp_encrypted_message.pdf2025-08-31 14:20 101K 
[   ]20141228-derspiegel__intercept_with_otr_encrypted_chat.pdf2025-08-31 14:20 170K 
[   ]20141228-derspiegel__guide_for_analysts_on_how_to_use_the_prism_skype_collection.pdf2025-08-31 14:20 896K 
[   ]20141228-derspiegel__general_description_how_nsa_handles_encrypted_traffic.pdf2025-08-31 14:20 230K 
[   ]20141228-derspiegel__gchq_presentation_on_the_bullrun_programs_decryption_capabilities.pdf2025-08-31 14:20 844K 
[   ]20141228-derspiegel__gchq_briefing_on_the_bullrun_program.pdf2025-08-31 14:20 429K 
[   ]20141228-derspiegel__explanation_on_the_spin9_program_on_end_to_end_attacks_on_vpn.pdf2025-08-31 14:20 6.5M 
[   ]20141228-derspiegel__explanation_of_the_turmoil_gallantwave_program_and_its_role_when_attacking_vpn.pdf2025-08-31 14:20 258K 
[   ]20141228-derspiegel__explanation_of_the_transform_engine_emulator_when_attacking_vpn.pdf2025-08-31 14:20 187K 
[   ]20141228-derspiegel__explanation_of_the_poisennut_product_and_its_role_when_attacking_vpn.pdf2025-08-31 14:20 250K 
[   ]20141228-derspiegel__explanation_of_the_gallantwave_that_decrypts_vpn_traffic_within_longhaul.pdf2025-08-31 14:20 570K 
[   ]20141228-derspiegel__explanation_of_a_potential_technique_to_deanonymise_users_of_the_tor_network.pdf2025-08-31 14:20 2.4M 
[   ]20141228-derspiegel__description_on_the_processing_of_vpn_data_packets_within_the_turmoil_program.pdf2025-08-31 14:20 1.6M 
[   ]20141228-derspiegel__description_of_voip_telephony_encryption_methods_and_other_ways_to_attack.pdf2025-08-31 14:20 285K 
[   ]20141228-derspiegel__description_of_existing_projects_on_vpn_decryption.pdf2025-08-31 14:20 488K 
[   ]20141228-derspiegel__decryption_of_vpn_connections_within_the_valiantsurf_program.pdf2025-08-31 14:20 2.0M 
[   ]20141228-derspiegel__classification_guide_for_cryptanalysis.pdf2025-08-31 14:20 277K 
[   ]20141228-derspiegel__canadian_document_from_ces_on_tls_trends.pdf2025-08-31 14:20 1.9M 
[   ]20141228-derspiegel__bluesnort_program_on_net_defense_from_encrypted_communications.pdf2025-08-31 14:20 1.3M 
[   ]20141228-derspiegel__analytic_challenges_from_active_passive_integration_when_nsa_attacks_ipsec_vpns.pdf2025-08-31 14:20 2.0M 
[   ]20141228-derspiegel__analytics_on_security_of_tor_hidden_services.pdf2025-08-31 14:20 3.6M 
[   ]20141228-derspiegel__analysis_from_ssl-tls_connections_through_gchq_in_the_flying_pig_database.pdf2025-08-31 14:20 1.5M 
[   ]20141214-theintercept__gchq_stargate_cne_requirements.pdf2025-08-31 14:20 270K 
[   ]20141214-theintercept__gchq_nac_review_october_december_2011.pdf2025-08-31 14:20 81K 
[   ]20141214-theintercept__gchq_nac_review_july_sept_2011.pdf2025-08-31 14:20 26K 
[   ]20141214-theintercept__gchq_nac_review_january_march_2012.pdf2025-08-31 14:20 18K 
[   ]20141214-theintercept__gchq_nac_review_april_june_2011.pdf2025-08-31 14:20 30K 
[   ]20141214-theintercept__gchq_mobile_networks_in_my_noc_world.pdf2025-08-31 14:20 1.9M 
[   ]20141214-theintercept__gchq_making_network_sense_of_the_encryption.pdf2025-08-31 14:20 2.3M 
[   ]20141214-theintercept__gchq_hopscotch.pdf2025-08-31 14:20 11K 
[   ]20141214-theintercept__gchq_automated_noc_detection.pdf2025-08-31 14:20 3.7M 
[   ]20141204-theintercept__wolframite_encryption_attack.pdf2025-08-31 14:20 72K 
[   ]20141204-theintercept__opulant_pup_encryption_attack.pdf2025-08-31 14:20 36K 
[   ]20141204-theintercept__nsa_gchq_csec_network_tradecraft_advancement.pdf2025-08-31 14:20 239K 
[   ]20141204-theintercept__nsa_first_ever_collect_of_high_interest_4g_cellular_signal.pdf2025-08-31 14:20 15K 
[   ]20141204-theintercept__ir21_a_technology_warning_mechanism.pdf2025-08-31 14:20 1.7M 
[   ]20141204-theintercept__auroragold_working_group.pdf2025-08-31 14:20 23M 
[   ]20141204-theintercept__auroragold_working_aid.pdf2025-08-31 14:20 428K 
[   ]20141204-theintercept__auroragold_target_technology_trends_center_support_to_wpmo.pdf2025-08-31 14:20 1.6M 
[   ]20141204-theintercept__auroragold_project_overview.pdf2025-08-31 14:20 418K 
[   ]20141125-suddeutschezeitung__windstop_system_highlights.pdf2025-08-31 14:20 137K 
[   ]20141125-suddeutschezeitung__ptc_glossary.pdf2025-08-31 14:20 121K 
[   ]20141125-suddeutschezeitung__partner_cables.pdf2025-08-31 14:20 152K 
[   ]20141125-suddeutschezeitung__mti_access_project_weekly_status_november_28_2008.pdf2025-08-31 14:20 92K 
[   ]20141125-suddeutschezeitung__mti_access_project_weekly_status_june_27_2008.pdf2025-08-31 14:20 96K 
[   ]20141125-suddeutschezeitung__mti_access_project_weekly_status_february_6_2009.pdf2025-08-31 14:20 71K 
[   ]20141125-suddeutschezeitung__cne_endpoint_project_load.pdf2025-08-31 14:20 61K 
[   ]20141125-suddeutschezeitung__cable_regions.pdf2025-08-31 14:20 33K 
[   ]20141125-suddeutschezeitung__cable_master_list_fea.pdf2025-08-31 14:20 60K 
[   ]20141125-suddeutschezeitung__cable_master_list_ac.pdf2025-08-31 14:20 159K 
[   ]20141125-suddeutschezeitung__cables_where_we_want_to_be.pdf2025-08-31 14:20 27K 
[   ]20141125-suddeutschezeitung__cables_where_we_are.pdf2025-08-31 14:20 28K 
[   ]20141125-suddeutschezeitung__cables_no_current_access.pdf2025-08-31 14:20 28K 
[   ]20141125-suddeutschezeitung__access_breakdown.pdf2025-08-31 14:20 26K 
[   ]20141010-theintercept__tarex_classification_guide.pdf2025-08-31 14:20 758K 
[   ]20141010-theintercept__sentry_eagle_brief_sheet.pdf2025-08-31 14:20 1.2M 
[   ]20141010-theintercept__exceptionally_controlled_information_listing.pdf2025-08-31 14:20 935K 
[   ]20141010-theintercept__eci_whipgenie_classification_guide.pdf2025-08-31 14:20 684K 
[   ]20141010-theintercept__eci_pawleys_classification_guide.pdf2025-08-31 14:20 435K 
[   ]20141010-theintercept__eci_compartments.pdf2025-08-31 14:20 535K 
[   ]20141010-theintercept__computer_network_exploitation_classification_guide.pdf2025-08-31 14:20 966K 
[   ]20141010-theintercept__cno_core_secrets_slide_slices.pdf2025-08-31 14:20 1.1M 
[   ]20141010-theintercept__cno_core_secrets_security_structure.pdf2025-08-31 14:20 329K 
[   ]20140914-theintercept__speargun_underway.pdf2025-08-31 14:20 127K 
[   ]20140914-theintercept__speargun_phase_one.pdf2025-08-31 14:20 54K 
[   ]20140914-theintercept__key_activities_in_progress.pdf2025-08-31 14:20 228K 
[   ]20140914-theintercept__ferguson_visit_precis.pdf2025-08-31 14:20 232K 
[   ]20140914-derspiegel__treasure_map_presentation.pdf2025-08-31 14:20 5.7M 
[   ]20140914-derspiegel__treasure_map_announces_a_new_release.pdf2025-08-31 14:20 552K 
[   ]20140914-derspiegel__satellite_teleport_knowledge.pdf2025-08-31 14:20 4.4M 
[   ]20140905-theintercept__quadrennial_intelligence_community_review_final_report.pdf2025-08-31 14:20 3.5M 
[   ]20140831-derspiegel__turkish_signal_intelligence_chief_agenda.pdf2025-08-31 14:20 375K 
[   ]20140831-derspiegel__turkey_energy_company_development.pdf2025-08-31 14:20 150K 
[   ]20140831-derspiegel__turkey_at_the_g20_pre_meeting.pdf2025-08-31 14:20 207K 
[   ]20140831-derspiegel__turkey_and_the_pkk.pdf2025-08-31 14:20 670K 
[   ]20140831-derspiegel__sinio_seminar_turkish_elections.pdf2025-08-31 14:20 273K 
[   ]20140831-derspiegel__sinio_seminar_turkey_and_the_kurds.pdf2025-08-31 14:20 271K 
[   ]20140831-derspiegel__sinio_seminar_tough_times_for_turkey.pdf2025-08-31 14:20 256K 
[   ]20140831-derspiegel__nsa_intelligence_relationship_with_turkey.pdf2025-08-31 14:20 783K 
[   ]20140831-derspiegel__nsas_oldest_third_party_partnership.pdf2025-08-31 14:20 398K 
[   ]20140831-derspiegel__ncrs_with_foreign_relations_missions_become_suslas.pdf2025-08-31 14:20 375K 
[   ]20140831-derspiegel__kurdistan_regional_government.pdf2025-08-31 14:20 623K 
[   ]20140831-derspiegel__jordan_belgium.pdf2025-08-31 14:20 609K 
[   ]20140831-derspiegel__iraq_uk_load_sharing_carriers.pdf2025-08-31 14:20 377K 
[   ]20140831-derspiegel__collaboration_in_overdrive.pdf2025-08-31 14:20 335K 
[   ]20140825-theintercept__sharing_communications_metadata_across_the_usic_icreach.pdf2025-08-31 14:20 3.9M 
[   ]20140825-theintercept__metadata_sharing_memorandum.pdf2025-08-31 14:20 393K 
[   ]20140825-theintercept__metadata_policy_conference.pdf2025-08-31 14:20 181K 
[   ]20140825-theintercept__icreach_wholesale_sharing.pdf2025-08-31 14:20 34K 
[   ]20140825-theintercept__icreach_sharing_sigint_comms_metadata_with_the_intel_community_memo.pdf2025-08-31 14:20 195K 
[   ]20140825-theintercept__icreach_black_budget_extract.pdf2025-08-31 14:20 37K 
[   ]20140825-theintercept__dni_decision_memorandum_on_icreach.pdf2025-08-31 14:20 255K 
[   ]20140825-theintercept__crisscrossproton_point_paper.pdf2025-08-31 14:20 289K 
[   ]20140825-theintercept__cia_colleagues_enthusiastically_welcome_nsa_training.pdf2025-08-31 14:20 88K 
[   ]20140815-heiseonline__hacienda_program.pdf2025-08-31 14:20 1.8M 
[   ]20140812-theintercept__gchq_covert_mobile_phones_policy.pdf2025-08-31 14:20 86K 
[   ]20140805-theintercept__directorate_of_terrorist_identities_strategic_accomplishments_2013.pdf2025-08-31 14:20 1.7M 
[   ]20140803-theintercept__nsa_intelligence_relationship_with_israel.pdf2025-08-31 14:20 212K 
[   ]20140803-theintercept__israel_us_1999_agreement.pdf2025-08-31 14:20 2.0M 
[   ]20140725-theintercept__saudi_arabia_information_paper.pdf2025-08-31 14:20 325K 
[   ]20140723-thewashingtonpost__post_signals_intelligence_authority_decision_tree.pdf2025-08-31 14:20 59K 
[   ]20140723-theintercept__watchlist_guidance_march_2013_2.pdf2025-08-31 14:20 26M 
[   ]20140723-theintercept__watchlist_guidance_march_2013_1.pdf2025-08-31 14:20 29M 
[   ]20140714-theintercept__jtrigall.pdf2025-08-31 14:20 1.1M 
[   ]20140709-theintercept__spying_on_muslim_american_leaders.pdf2025-08-31 14:20 294K 
[   ]20140630-thewashingtonpost__odni_certification_regarding_foreign_entities.pdf2025-08-31 14:20 269K 
[   ]20140630-thewashingtonpost__list_of_governments_and_organizations_authorized_for_surveillance.pdf2025-08-31 14:20 120K 
[   ]20140630-thewashingtonpost__fisa_judges_order_authorizing_surveillance_of_foreign_governments_and_organizations.pdf2025-08-31 14:20 37K 
[   ]20140630-thewashingtonpost__fisa_amendments_act_summary_document.pdf2025-08-31 14:20 52K 
[   ]20140630-thewashingtonpost__affidavit_of_keith_alexander_regarding_spying_on_foreign_entities.pdf2025-08-31 14:20 19K 
[   ]20140618-derspiegel__zoom_of_a_boundless_informant_document_with_project_names.pdf2025-08-31 14:20 126K 
[   ]20140618-derspiegel__world_map_from_the_boundless_informant_program.pdf2025-08-31 14:20 303K 
[   ]20140618-derspiegel__us_sites_with_nsa_personnel_in_germany.pdf2025-08-31 14:20 85K 
[   ]20140618-derspiegel__restrictions_on_the_technical_surveillance_performed_by_jsa.pdf2025-08-31 14:20 214K 
[   ]20140618-derspiegel__report_on_the_work_of_nsacss_europe.pdf2025-08-31 14:20 300K 
[   ]20140618-derspiegel__report_on_the_technical_expansion_of_the_european_technical_center_in_wiesbaden.pdf2025-08-31 14:20 219K 
[   ]20140618-derspiegel__report_on_the_surveillance_of_african_countries_by_jsa.pdf2025-08-31 14:20 255K 
[   ]20140618-derspiegel__report_on_the_one_year_anniversary_of_nsa_liaison_unit_suslag_in_bad_aibling.pdf2025-08-31 14:20 335K 
[   ]20140618-derspiegel__report_on_the_nsas_access_to_tempora.pdf2025-08-31 14:20 280K 
[   ]20140618-derspiegel__report_on_the_changing_of_the_escs_name_to_european_security_operations_center_esoc.pdf2025-08-31 14:20 274K 
[   ]20140618-derspiegel__report_on_the_beginnings_of_the_european_security_center_esc_in_the_dagger_complex.pdf2025-08-31 14:20 287K 
[   ]20140618-derspiegel__report_on_data_exchange_between_the_nsa_and_bnd_within_the_jsa_framework.pdf2025-08-31 14:20 150K 
[   ]20140618-derspiegel__report_on_a_wharpdrive_incident_in_an_sso_presentation.pdf2025-08-31 14:20 261K 
[   ]20140618-derspiegel__report_on_an_xkeyscore_training_session_at_the_ecc_dagger_complex.pdf2025-08-31 14:20 402K 
[   ]20140618-derspiegel__report_on_an_unexploded_ordnance_alarm_at_european_technical_centern.pdf2025-08-31 14:20 270K 
[   ]20140618-derspiegel__report_on_an_nsa_visit_to_bnd_site_and_on_data_transfer_from_the_bnd_to_the_nsa.pdf2025-08-31 14:20 306K 
[   ]20140618-derspiegel__report_on_an_nsa_sigdev_training_course_for_allied_countries.pdf2025-08-31 14:20 250K 
[   ]20140618-derspiegel__presentation_on_the_nsacia_unit_special_collection_service.pdf2025-08-31 14:20 1.8M 
[   ]20140618-derspiegel__preliminary_agenda_of_meeting_between_nsa_and_bnd_officials.pdf2025-08-31 14:20 349K 
[   ]20140618-derspiegel__overview_of_the_use_of_boundless_informant_world_map.pdf2025-08-31 14:20 220K 
[   ]20140618-derspiegel__nsa_presentation_on_the_work_of_nymrod.pdf2025-08-31 14:20 418K 
[   ]20140618-derspiegel__nsacss_presentation_on_technical_surveillance_in_europe_and_africa.pdf2025-08-31 14:20 1.5M 
[   ]20140618-derspiegel__nsacss_europe_report_on_the_experiences_of_one_nsa_worker.pdf2025-08-31 14:20 363K 
[   ]20140618-derspiegel__nostalgic_recollections_from_nsa_workers_formerly_stationed_in_bad_aibling.pdf2025-08-31 14:20 266K 
[   ]20140618-derspiegel__logo_of_nsa_bnd_cooperation.pdf2025-08-31 14:20 30K 
[   ]20140618-derspiegel__internal_nsa_presentation_on_the_bnds_organization.pdf2025-08-31 14:20 1.1M 
[   ]20140618-derspiegel__internal_nsa_discussion_guidelines_relating_to_cooperation_with_the_bnd_and_bfv.pdf2025-08-31 14:20 327K 
[   ]20140618-derspiegel__guidelines_for_the_classification_of_suslag_details_and_the_nsa_bnd_cooperation.pdf2025-08-31 14:20 778K 
[   ]20140618-derspiegel__guidelines_for_the_classification_of_nsa_sigint_details_1945_1967.pdf2025-08-31 14:20 2.6M 
[   ]20140618-derspiegel__gchq_report_on_the_technical_abilities_of_tempora.pdf2025-08-31 14:20 293K 
[   ]20140618-derspiegel__final_agenda_of_meeting_between_high_ranking_nsa_and_bnd_officials.pdf2025-08-31 14:20 525K 
[   ]20140618-derspiegel__faqs_on_the_boundless_informant_program.pdf2025-08-31 14:20 232K 
[   ]20140618-derspiegel__explanation_of_nymrod_a_system_for_searching_for_people_and_places_in_databases_and_documents.pdf2025-08-31 14:20 263K 
[   ]20140618-derspiegel__excerpt_on_the_sharing_of_xkeyscore_with_german_intelligence_agency_bfv.pdf2025-08-31 14:20 67K 
[   ]20140618-derspiegel__european_technical_center_report_on_the_experiences_of_one_nsa_worker.pdf2025-08-31 14:20 205K 
[   ]20140618-derspiegel__details_on_xkeyscore_from_an_internal_gchq_website.pdf2025-08-31 14:20 414K 
[   ]20140618-derspiegel__cooperation_between_the_nsa_bnd_and_bfv.pdf2025-08-31 14:20 328K 
[   ]20140618-derspiegel__briefing_on_the_visit_to_the_nsa_of_high_ranking_bnd_official.pdf2025-08-31 14:20 492K 
[   ]20140618-derspiegel__boundless_informant_statistics_on_the_uk.pdf2025-08-31 14:20 157K 
[   ]20140618-derspiegel__boundless_informant_statistics_on_germany.pdf2025-08-31 14:20 289K 
[   ]20140618-derspiegel__boundless_informant_statistics_on_data_from_foreign_partners.pdf2025-08-31 14:20 356K 
[   ]20140618-derspiegel__boundless_informant_statistics_for_so-called_third_parties.pdf2025-08-31 14:20 354K 
[   ]20140618-derspiegel__boundless_informant_overview_global.pdf2025-08-31 14:20 317K 
[   ]20140618-derspiegel__agenda_for_the_visit_of_bsi_vice_president_andreas_konen_to_the_nsa.pdf2025-08-31 14:20 120K 
[   ]20140618-dagbladet__keith_alexander_talking_points.pdf2025-08-31 14:20 47K 
[   ]20140618-dagbladet__black_budget.pdf2025-08-31 14:20 108K 
[   ]20140616-derspiegel__xkeyscore_fingerprints.pdf2025-08-31 14:20 54K 
[   ]20140616-derspiegel__analytics_for_targets_in_europe.pdf2025-08-31 14:20 54K 
[   ]20140610-cryptome__dea-nsa-sandkey.pdf2025-08-31 14:20 361K 
[   ]20140531-thenewyorktimes__identity-intelligence.pdf2025-08-31 14:20 1.2M 
[   ]20140519-theintercept__sso_mystic_charts.pdf2025-08-31 14:20 563K 
[   ]20140519-theintercept__sso_dictionary_excerpt.pdf2025-08-31 14:20 34K 
[   ]20140519-theintercept__somalget.pdf2025-08-31 14:20 131K 
[   ]20140519-theintercept__mystic.pdf2025-08-31 14:20 79K 
[   ]20140519-theintercept__dea_warfighter.pdf2025-08-31 14:20 143K 
[   ]20140519-theintercept__black_budget.pdf2025-08-31 14:20 53K 
[   ]20140513-glenngreenwald__no_place_to_hide_documents.pdf2025-08-31 14:20 87M 
[   ]20140430-theintercept__prism_olympics.pdf2025-08-31 14:20 581K 
[   ]20140430-theintercept__ghostmachine.pdf2025-08-31 14:20 6.4M 
[   ]20140430-theintercept__gchq_visit.pdf2025-08-31 14:20 29K 
[   ]20140404-theintercept__gchq_full_spectrum_cyber_effects.pdf2025-08-31 14:20 1.7M 
[   ]20140404-theintercept__2009_sigdev_conference.pdf2025-08-31 14:20 41K 
[   ]20140329-derspiegel__gchq_and_nsa_spy_on_heads_of_state.pdf2025-08-31 14:20 103K 
[   ]20140322-thenewyorktimes__operation_shotgiant_objectives.pdf2025-08-31 14:20 385K 
[   ]20140321-lemonde__french_intelligence_email_spying_operation.pdf2025-08-31 14:20 1.1M 
[   ]20140320-theintercept__targeting_system_administrator_accounts.pdf2025-08-31 14:20 491K 
[   ]20140318-thewashingtonpost__mystic_program.pdf2025-08-31 14:20 73K 
[   ]20140318-thewashingtonpost__description_of_data_collection_under_mystic.pdf2025-08-31 14:20 62K 
[   ]20140318-thewashingtonpost__adding_another_country_to_mystic_program.pdf2025-08-31 14:20 48K 
[   ]20140315-theintercept__turbine_intelligence_command_and_control.pdf2025-08-31 14:20 122K 
[   ]20140313-theintercept__nsa_cooperative_third_party_relationships.pdf2025-08-31 14:20 312K 
[   ]20140312-theintercept__vpn_and_voip_exploitation_with_hammerchant_and_hammerstein.pdf2025-08-31 14:20 459K 
[   ]20140312-theintercept__turbine_industrial_scale_exploitation.pdf2025-08-31 14:20 81K 
[   ]20140312-theintercept__turbine_and_turmoil.pdf2025-08-31 14:20 218K 
[   ]20140312-theintercept__the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf2025-08-31 14:20 1.1M 
[   ]20140312-theintercept__quantum_insert_diagrams.pdf2025-08-31 14:20 514K 
[   ]20140312-theintercept__nsa_technology_directorate_analysis_of_converged_data.pdf2025-08-31 14:20 116K 
[   ]20140312-theintercept__nsa_selector_types.pdf2025-08-31 14:20 117K 
[   ]20140312-theintercept__nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf2025-08-31 14:20 354K 
[   ]20140312-theintercept__multiple_methods_of_quantum.pdf2025-08-31 14:20 121K 
[   ]20140312-theintercept__mhs_leverages_xkeyscore_for_quantum.pdf2025-08-31 14:20 46K 
[   ]20140312-theintercept__increasing_collection_capacity_by_increasing_implants.pdf2025-08-31 14:20 21K 
[   ]20140312-theintercept__five_eyes_hacking_large_routers.pdf2025-08-31 14:20 23K 
[   ]20140311-thenewyorktimes__nsa_timeline_of_surveillance_law_developments.pdf2025-08-31 14:20 195K 
[   ]20140311-thenewyorktimes__nsa_memo_expands_access_to_fisa_information.pdf2025-08-31 14:20 440K 
[   ]20140311-thenewyorktimes__classification_guide_for_stellarwind_program_0.pdf2025-08-31 14:20 2.2M 
[   ]20140311-thenewyorktimes__classification_guide_for_fisa_the_protect_america_act_and_the_fisa_amendments_act.pdf2025-08-31 14:20 877K 
[   ]20140311-thenewyorktimes__ashcroft_memo_on_intelligence_sharing_procedures.pdf2025-08-31 14:20 118K 
[   ]20140307-theintercept__nsa_ask_zelda_watching_every_word_in_snitch_city.pdf2025-08-31 14:20 40K 
[   ]20140307-theintercept__nsa_ask_zelda_is_bain_de_soleil_a_bane_on_the_nsa.pdf2025-08-31 14:20 55K 
[   ]20140307-theintercept__nsa_ask_zelda_guilty_until_proven_innocent.pdf2025-08-31 14:20 48K 
[   ]20140307-theintercept__nsa_ask_zelda_an_interview_with_zelda.pdf2025-08-31 14:20 65K 
[   ]20140305-nrchandelsblad__dutch_shares_collected_anti_piracy_information_with_nsa.pdf2025-08-31 14:20 536K 
[   ]20140303-epicfoia__not-snowden__doj_report_on_pen_register_fisa_orders.pdf2025-08-31 14:20 3.7M 
[   ]20140227-theguardian__gchq_optic.pdf2025-08-31 14:20 241K 
[   ]20140224-theintercept__training_for_covert_online_operations.pdf2025-08-31 14:20 4.3M 
[   ]20140218-theintercept__gchq_sigdev.pdf2025-08-31 14:20 28M 
[   ]20140218-theintercept__discovery_sigint_targeting_scenarios_and_compliance.pdf2025-08-31 14:20 631K 
[   ]20140211-theintercept__drones_intercepting_communications.pdf2025-08-31 14:20 366K 
[   ]20140207-nrchandelsblad__boundless_nederland.pdf2025-08-31 14:20 1.1M 
[   ]20140207-nbc__gchq_honey_trap_cyber_attack_leveraging_foreign_journalists_via_jtrig.pdf2025-08-31 14:20 591K 
[   ]20140207-nbc__gchq_honey_trap_cyber_attack_background_on_jtrig.pdf2025-08-31 14:20 1.1M 
[   ]20140204-nbc__british_spies_attacked_hacktivist_anonymous.pdf2025-08-31 14:20 1.1M 
[   ]20140131-cbc__csec_airport_wifi_tracking.pdf2025-08-31 14:20 2.1M 
[   ]20140130-informationdk__cop15_interception_document.pdf2025-08-31 14:20 60K 
[   ]20140128-theguardian__leaky_phone_apps_2.pdf2025-08-31 14:20 222K 
[   ]20140128-theguardian__leaky_phone_apps_1.pdf2025-08-31 14:20 82K 
[   ]20140127-thenewyorktimes__mobile_theme_briefing.pdf2025-08-31 14:20 132K 
[   ]20140127-thenewyorktimes__converged_analysis_on_smartphone_devices.pdf2025-08-31 14:20 848K 
[   ]20140127-nbc__squeaky_dolphin.pdf2025-08-31 14:20 17M 
[   ]20140116-theguardian__dishfire_presentation.pdf2025-08-31 14:20 862K 
[   ]20140102-thewashingtonpost__quantum_computing.pdf2025-08-31 14:20 140K 
[   ]20140102-thewashingtonpost__quantum_computers_hard_targets.pdf2025-08-31 14:20 375K