Browse Items (626 total)

20150701-intercept-un_secretary_general_xks.pdf
This document is an extract from an internal NSA presentation. It outlines how NSA analysts used the data analysis tool XKEYSCORE to gain access to the talking points of the U.N. Secretary General prior to their meeting with President Barack Obama.

20140318-wapo-mystic_program.pdf
This document is a cover slide from a NSA Special Source briefing presentation for the MYSTIC voice call surveillance program.

20131126-wapo-microsoft_cloud_exploitation.pdf
This document is an extract from an NSA presentation. It describes SERENDIPITY, which was seemingly an effort by the NSA to target Microsoft for similar SIGINT sourcing programs that affected Google and Yahoo. These slides show efforts to intercept…

20141010-intercept-eci_whipgenie_classification_guide.pdf
This document is a NSA classification guide for the WHIPGENIE program. WHIPGENIE has a security classification of ECI (Exceptionally Controlled Information). The program covers Special Source Operations (SSO) relationships with U.S. Corporate…

20131021-monde-wanadoo_alcatel.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…

20130629-wapo-prism.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…

20140519-intercept-mystic.pdf
This document is an entry in an internal NSA wiki. It describes the MYSTIC program, developed by Special Source Operations (SSO) for the installation of embedded collection systems into target networks. The program primarily focuses upon the…

20150815-nyt-att-fairview-stormbrew.pdf
This collection of documents, which range from 2003 to 2013, includes NSA presentations and internal communications concerning Special Source Operations (SSO). The presentations provide information about the main commercial telecommunications…

20130608-guard-prism.pdf
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from several U.S. Internet companies: Microsoft (since 2007), Yahoo!…

20141010-intercept-eci_whipgenie_classification_guide.pdf
This document is a NSA classification guide for the WHIPGENIE program. WHIPGENIE has a security classification of ECI (Exceptionally Controlled Information). The program covers Special Source Operations (SSO) relationships with U.S. Corporate…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2