NSA Leak Dokumente Liste
Inhaltsverzeichnis
Snowden-Dokumente (Links) (201 - 300)
- Stand: 04.12.2014 Update
Tabelle Links (101 - 200)
Tabelle Links (1 - 100)
Nr | Datum | DocDatum | Org | Doc Titel | Inhalt | ACLU | EFF | FreeSnoden | Cryptome | Seite | Typ |
---|---|---|---|---|---|---|---|---|---|---|---|
100 | 2013-12-11 | - | NSA | Sweden FRA Quantum Accomplishments | - | - | Accomplishments from NSA | Select Accomplishments: Production | NSA Sweden FRA Quantum Accomplishments | 2 | |
99 | 2013-12-10 | - | - | - | - | - | - | - | G8-G20 Spying (Duplikat von Nr.86) | 4 | |
98 | 2013-12-10 | 2006-09-20 | - | GSM Classification Guide | Internal NSA document outlining the agency 'sability to intercept, process and discern location data from mobilephone calls. | GMS Classification Guide | GSM Classification Guide | GSM Classification Guide | GSM Tracking | 2 | |
97 | 2013-12-10 | 2012-10-01 | NSA | Summary of DNR and DNI Co-Travel Analytics | Study overviewing key elements of the co-traveler analytics both under development and operational at NSA. | Cotraveler Overview | Cotraveler Overview | Summary of DNR and DNI Co-Travel Analytics GSM classification guide | Co-Traveler | 24 | |
96 | 2013-12-10 | - | NSA | GhostMachine | Excerpts from slides describing the NSA's Special Source Operations cloud analytics platform, code-named GHOSTMACHINE. | Ghost Machine | GhostMachine | SSO GHOSTMACHINE Analytics | GHOSTMACHINE | 4 | |
95 | 2013-12-10 | - | NSA | Target Location | An excerpt from a transcript of National Security Agency training videos that describe how to verify the location of a targeted device. | Target Location | Target Location | - | Target Location | 1 | |
94 | 2013-12-10 | 2013-04-03 | - | NSA CSEC Partnership | Information paper from the NSA detailing the NSA's intelligence relationship with Canada's Communications Security Establishment Canada (CSEC). | NSA CSEC Partnership | NSA CSEC Partnership | - | - | 2 | |
93 | 2013-12-10 | 2013-04 | NSA | Location Cookies | NSA internal presentation slides detailing signal surveillance techniques and successes. | Location Cookies | Location Cookies | - | - | 4 | |
92 | 2013-12-09 | 2008 | GCHQ | Video Games Paper | NSA paper entitled "Games: A look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities," stressing the risk of leaving games communities under-monitored. | NSA Video Games Paper | NSA Video Games Paper | MHS and GCHQ “Get in the Game with Target Development for World of Warcraft Online Gaming” Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities |
Spying on Games | 82 | |
91 | 2013-12-09 | - | NSA | Spying on Games | - | - | - | Exploiting Terrorist Use of Games & Virtual Environments | Spying on Games | 2 | |
90 | 2013-12-05 | 2013-04-18 | NSA | Spionage-Beziehungen zu Schweden | Excerpts from a document related to Swedish-American surveillance of Russia | FRA Russia | FRARussia | Spionage-Beziehungen der NSA in Schweden | Sweden Spied Russia for NSA | 2 | |
89 | 2013-12-05 | 2010-09-10 | NSA | NSA Italy Spying | Excerpts from slides describing spying against the Italian Embassy in Washington DC. | Italy Spying | Italy Spying | Italy – last 30 days SCS Operations in Italy Close Access Sigads |
NSA Spies Italy [3 S.] | 4 | htm |
88 | 2013-12-04 | - | NSA | CHALKFUN | Excerpt from NSA Agency training manual explaining how to determine if a targeted device is "foreign". | Chalkfun Foreignness | Chalkfun Foreignness | CHALKFUN and TAPERLAY | CHALKFUN | 1 | |
87 | 2013-12-04 | - | NSA | FASCIA | NSA slides about the FASCIA program, including the volume and type of device-location data collected by the agency. | FASCIA Slides | Fascia | FASCIA | FASCIA | 2 | |
86 | 2013-12-02 | 2010-06-23 | - | Spying G8 & G20 Meeting Canada | Briefing notes on NSA operational plans to conduct surveillance during the 2010 G8 and G20 summits in Canada. | NSA Lends Support to Upcoming G8 and G20 Summits in Canada | G20 Summit [4 S.] | NSA lends support to upcoming G8 and G20 meetings in Canada | G8 - G20 Spying [3 S.] | 4 | |
85 | 2013-12-02 | - | CSEC | - | - | - | DSD Data | - | - | 4 | |
84 | 2013-11-30 | - | NSA | Dutch SIGINT | AIVD SIGINT | - | AIVD SIGINT | Notes for Dutch SIGINT/Cyber Analytic Exchange | Dutch SIGINT | 3 | |
83 | 2013-11-30 | 2013-11-30 | CSEC | CSEC Brazil Spying | Presentation by Communications Security Establishment Canada on surveillance of Brazil's Ministry of Mines and Energy. | CSEC Presentation | CSEC Brazil | CSEC – Advanced Network Tradecraft | CSEC Brazil Spying | 18 | htm |
82 | 2013-11-26 | - | - | Evidence of Microsoft's vulnerability | Slides describing collection of data from Internetproviders. | Address Books/Serendipity/HTTP-Demux - apps.washingtonpost.com | - | - | - | 3 | htm |
81 | 2013-11-26 | 2009-11-24 | GCHQ NSA |
Microsoft Monkey Puzzle | E-Mail von GCHQ an NSA die darauf hindeutet, dass von Microsoft für NSA-Programm der Zugriff auf Google und Yahoo Verkehr ausgerichtet wurde. | Did the NSA target Microsoft too? | Microsoft Monkey Puzzle | MUSCULAR and realms | - | 1 | |
80 | 2013-11-26 | - | NSA | Microsoft Cloud Exploitation | - | Did the NSA target Microsoft too? | Microsoft Cloud Exploitation | Microsoft data | Microsoft Cloud Exploit | 4 | |
79 | 2013-11-26 | 2013-10-03 | NSA | Muslim Porn Viewing | Excerpts from document detailing collection of information on targets' online sexual activity, intended to be used to discredit them. | Program to discredit "radicals" through use of online sexual activity | Radicalizers Pornography | Global Radicalizers Vulnerable in Terms of Authority | Muslim Porn Viewing | 3 | htm |
78 | 2013-11-23 | 2012-02-23 | NSA | SIGINT Strategy 2012-2016 | Strategy document detailing NSA mission statement and goals. | SIGINT Strategy 2012-2016 | SIGINT Strategy 2012 | SIGINT Strategy 2012-2016 | SIGINT Strategy 2012-2016 | 5 | htm |
77 | 2013-11-23 | 2012 | NSA | SIGINT Cryptologic Platform | Presentation demonstrating NSA infected 50,000 computers worldwide with malware. | Worldwide SIGINT / Defense Cryptologic Platform | NSA Malware | Worldwide SIGINT / Defense Cryptologic Platform | SIGINT Cryptologic Platform | 1 | htm |
76 | 2013-11-22 | - | - | Boundless Informant | Presentation describing Boundless Informant's "Mission Capabilities from Metadata Records." | Boundless Informant [Duplicate of June 2013] | Boundless Informant [Duplicate of June 2013] | - | [Duplicate of June 2013] | 8 | |
75 | 2013-11-22 | - | - | Boundless Informant FAQ | - | - | Boundless Informant FAQ [Duplicate of June 2013] | - | [Duplicate of June 2013] | 3 | |
74 | 2013-11-22 | - | NSA | - | Slides detailing the collection of call records from Afghanistan and Norway over a period of 30 days. | Afghanistan, Norway, Boundless Informant, Boundless Informant FAQ | Afghanistan Collection | Afghanistan – last 30 days Norway – last 30 days |
- | 2 | htm |
73 | 2013-11-20 | 2013-02-14 | - | - | Notes on a meeting with Dutch intelligence services, whose officials described their use of Computer Network Exploitation technology to hack web forums and collect data of users. | Notes for Dutch SIGINT/Cyber Analytic Exchange | Collection, Processing and Dissemination of Allied Communications [4 S.] | Collection, Processing and Dissemination of Allied Communications | - | 3 | |
72 | 2013-11-20 | 2007 | - | UK Phone Data | Memo detailing UK-U.S. deal allowing NSA to store data of UK citizens not suspected of wrong doing. | SID Analysts Can Now Unminimize [UK Phone Data] | - | 2007 agreement on UK contact identifiers | - | 1 | jpg |
71 | 2013-11-19 | - | - | Boundless Informant / FAQ | - | - | - | - | BOUNDLESS INFORMANT incl. FAQ | 13 | |
70 | 2013-11-19 | - | NSA | Norway - Last 30 Days | - | - | Norway Collection | - | Norway | 1 | |
69 | 2013-11-17 | - | - | DSD 3G-Handsets Impact and Update | - | - | DSD3G | 3G: impact and update | DSD-3G | 6 | |
68 | 2013-11-17 | - | GCHQ | Royal Concierge | - | - | Royal Concierge | Royal Concierge | Royal Concierge (de) Royal Concierge (en) |
4 | |
67 | 2013-11-04 | - | - | Boundless Informant | - | - | Boundless Informant (Duplikat von Nr.6) | - | - | 8 | |
66 | 2013-11-04 | - | NSA | Special Source Operations (SSO) - Details of MUSCULAR | - | - | Special Source Operations (SSO) Collection Optimization "Midpoint" Slides - Google and Yahoo! exploitations [6 S.] | - | WINDSTOP, SSO, Yahoo - Google MUSCULAR - INCENSOR Google and Yahoo |
14 | htm |
65 | 2013-11-04 | - | NSA | Special Source Operations Collection Optimizazion | - | - | Special Source Operations (SSO) Intercept Program Slides -- cable programs, details of MUSCULAR | Special Source Operations overview | Cable Spying Types [7 S.] | 4 | |
64 | 2013-11-04 | - | - | - | - | - | WINDSTOP Collection 30 day period December 2012 - January 2013 | WINDSTOP – last 30 days | - | 1 | |
63 | 2013-11-03 | - | - | Collection Accesses | - | - | Collection Accesses 30 Nov 2009 | Collection accesses | - | 1 | htm |
62 | 2013-11-03 | 2007-10-03 | NSA | SIGINT Mission Strategic Plan 2008-2013 | - | - | NSA SIGINT Mission Strategic Plan 2008-2013 | 2008-13 Strategic Plan | SIGINT Mission 2013 | 11 | htm |
61 | 2013-11-033 | 2007-01 | NSA | 2007 Strategic Mission List | - | - | NSA SIGINT January 2007 Strategic Mission List | January 2007 Strategic Mission List | SIGINT Mission 2007 | 11 | htm |
60 | 2013-11-01 | - | NSA | Corporate FAA Reporting Metrics | Corporate FAA Reporting Metrics | - | Corporate FAA Reporting Metrics | Corporate FAA Reporting Metrics | SSO2 Slide (Corporate FAA Reporting Metrics) | 1 | |
59 | 2013-11-01 | 2013-04 | - | - | - | - | - | Relationships & Authorities Corporate FAA Reporting Metrics |
PRISM, SSO [11 S.] SSO1 Slide (Relationships & Authorities) SSO2 Slide (Corporate FAA Reporting Metrics) |
13 | |
58 | 2013-10-30 | 2013-03-14 | NSA | Project Muscular | An excerpt from the Special Operations Weekly -- an internal NSA publication -- describing data collection via the MUSCULAR program. | NSA: Special Operations Weekly Excerpt | Slideson MUSCULAR program possibly from February 28, 2013 | Project Muscular | - | 3 | |
57 | 2013-10-30 | - | - | Current Efforts - Google | An NSA Powerpoint slide showing the intersection of "Public Internet" and internal "Google Cloud" user data. | NSA Powerpoint Slide: Google Cloud Exploitation | MUSCULAR slide "Current Efforts - Google" pdf-fail | - | - | 1 | |
56 | 2013-10-28 | - | NSA | Spain - Last 30 Days | - | - | Graphic showing phone calls intercepted in Spain December 2012 | - | - | 1 | |
55 | 2013-10-27 | - | NSA | - | - | - | NSA SCS Slides on embassy spying [Slides 3-6] | - | NSA-CIASCS [3 S.] NSA-CIASCS [2 S.] |
5 | ?? |
54 | 2013-10-25 | 2010-09-10 | NSA | Close Access Sigads | - | - | Close Access Sigads September 10, 2010 (listing French Embassy) | NSA codenames | Close Access Sigads | 2 | |
53 | 2013-10-25 | - | NSA | Cable attacks French Presidential Network | - | - | Cable regarding cyber attacks on French Presidential Network April 12, 2013 | Four-page internal memo | NSA Hosts FRSpies | 4 | |
52 | 2013-10/24 | - | NSA | Phones World Leaders | - | - | NSA memo to Signals Intelligence Division (SID) staff October 27, 2006 regarding monitoring of phones of world leaders | - | - | 1 | |
51 | 2013-10-22 | 2013-04 | NSA | PRISM 4.2013 | PRISM ist ein Top Secret eingestuftes Programm zur Überwachung und Auswertung elektronischer Medien und elektronisch gespeicherter Daten der National Security Agency und gehört zum dem großen Überwachungsprogramm „Stellar Wind“. An dem Programm sind neun der größten Internetkonzerne und Dienste der USA beteiligt: Microsoft (u. a. mit Skype), Google (u. a. mit YouTube), Facebook, Yahoo, Apple, AOL und Paltalk. | - | Prism April 2013 | - | PRISM | 11 | |
50 | 2013-10-21 | - | NSA | PRISM Wanadoo-Alcatel | - | - | NSA PRISM slide - alcatel / wanadoo (undated) | - | Wanadoo - Alcatel | 1 | |
49 | 2013-10-21 | - | NSA | Boundless Informant France | - | - | Boundless Informant France | PRISM overview and Boundless Informant on France Boundless Informant on France |
Boundless Informant | 2 | |
48 | 2013-10-20 | - | NSA | - | - | - | NSA Cable dated November 10, 2010 discussing hacking of Mexican President's email | - | - | 1 | |
47 | 2013-10-14 | 2011-09 | NSA | Content Aquisition | - | - | NSA Special Source Organization (SSO) slides on Content Acquisition Optimization | Content Aquisition Optimization | SSO Content Slides | 9 | |
46 | 2013-10-14 | 2013-01-07 | NSA | SSO Overview | - | - | Intellipedia entry-Special Source Organization (SSO) Collection Optimization Overview | - | SSO Overview | 4 | |
45 | 2013-10-14 | 2012 | NSA | Content Optimization | Internal NSA presentation detailing the collection of hundreds of millions of contactlists from around of the world. | Content Acquisition Optimization PowerPoint Slides | NSA Special Source Organization (SSO) Slides on Content Optimization - Address Books (SCISSORS) | SSO Collection Optimization | SSO Slides [7 S.] | 9 | |
44 | 2013-10-06 | - | CSEC | - | Presentation on Brazilian Ministry of Mines and Energy | - | - | - | CSE Brazil Ministry | 7 | htm |
43 | 2013-10-04 | 2012-06 | NSA | Tor Stinks Presentation | Presentation on de-anonymizing users of Tor,a tool meant to protect online anonymity. | "Tor Stinks" | "Tor Stinks" Presentation June 2012 | "Tor Stinks" Presentation | "Tor Stinks" | 23 | |
42 | 2013-10-04 | - | NSA | Tor Egotistical Giraffe | Presentation on EgotisticalGiraffe, a technique designed by the NSA to attack Tor users. | Peeling back the layers of Tor with Egotistical Giraffe | Peeling Back the Layers of Tor with Egotistical Giraffe January 8, 2007 | Peeling back the layers of Tor with Egotistical Giraffe | Egotistical Giraffe | 20 | |
41 | 2013-10-04 | - | NSA | Tor Types of IAT | Extracts from an NSA document on Tor. | Extracts from an NSA document on Tor | Types of IAT (how Tor works) | Tor: ‘The king of high-secure, low-latency anonymity’ | Types of IAT Tor | 9 | |
40 | 2013-10-04 | - | - | - | NSA Notes from talk on Tor by Roger Dingledine November 2007 | - | - | - | Roger Dingledine [Not Snowden document] |
2 | htm |
39 | 2013-10-04 | - | NSA | Tor Report 2006 | - | - | NSA Crypt analysis and Exploitation Services Report on TOR 2006 | NSA report on the Tor encrypted network | Tor | 49 | |
38 | 2013-10-04 | - | GCHQ | Tor Op Mullenize and beyond | GCHQ report on ‘MULLENIZE’ program to ‘stain’ anonymous electronic traffic | - | GCHQ Mullenize | GCHQ report on ‘MULLENIZE’ program to ‘stain’ anonymous electronic traffic | GCHQ MULLENIZE | 2 | |
37 | 2013-09-28 | 2011-01-03 | - | - | NSA memo on "new contact-chaining procedures to allow better, faster analysis" of foreign intelligence targets. | NSA Contact-Chaining Memo | NSA memo from January 3, 2011 on contact chaining | - | Contact Chaining Social Networks [1] | 3 | |
36 | 2013-09-28 | - | NSA | - | An NSA powerpoint slide illustrating how phone and email data are used to graph the relationships of foreign intelligence targets. | NSA Social Network Graph Powerpoint Slide | Slide on contact chaining (SYANPSE) | - | SYANPSE | 1 | |
35 | 2013-09-20 | - | GCHQ | GCHQ Belgacom Hack | - | - | GCHQ Slides on Belgacom | - | Belgacom | 3 | htm |
34 | 2013-09-16 | - | NSA | - | - | - | NSA Network Analysis Center 2010 SIGDEV Conference on creditcard authorization net workmapping | - | SWIFT | 3 | |
33 | 2013-09-11 | - | NSA | NSA-Israel: Memorandum of Understanding | - | - | IsraelSharing | NSA and Israeli intelligence: memorandum of understanding | NSA-Israel Spy | 5 | |
32 | 2013-09-09 | - | NSA | - | - | - | NSA slides on smartphones | - | Smartphones | 5 | |
31 | 2013-09-08 | - | - | - | (WP) STORMBREW | - | StormbrewTV | - | - | - | - |
30 | 2013-09-08 | - | - | Petrobas | - | - | NSA slides on Petrobras and private networks | - | Petrobas | ~60 | - |
29 | 2013-09-05 | - | NSA | Classification Guide for Cryptanalysis | - | - | NSA Classification Guide for Crypt analysis from September 13, 2005 | NSA classification guide for cryptanalysis | NSA classification guide | 3 | |
28 | 2013-09-05 | - | NSA | SIGINT Enabling Project | - | - | NSA SIGINT Enabling Project Description - engaging companies to covertly leverage product designs (nodate) | SIGINT Enabling Project | SIGINT Enabling SIGINT Enabling [NYT 3] SIGINT Enabling [PP 3] |
3 | |
27 | 2013-09-05 | - | NSA | Bullrun – Classification Guide | - | - | Project Bullrun Description June 16, 2010 | Project Bullrun – classification guide to the NSA’s decryption program | BULLRUN BULLRUN [NYT 4] BULLRUN [PP 4] |
5 | |
26 | 2013-09-03 | - | NSA | Brazil and Mexico case studies | - | - | SATC slides Mexico and Brazil Case Studies | Intelligently filtering your data: Brazil and Mexico case studies | Brazil and Mexico | 20 | htm |
25 | 2013-09-01 | - | NSA | - | NSA document dated June 2010 (notreleased) discussing targeting of French Foreign Ministry | - | - | - | French Foreign Ministry | 0 | - |
24 | 2013-08-31 | - | NSA | - | NSA document dated March 23,2006 (notreleased) showingt hat AlJazeera was surveilled | - | - | - | Al Jazeera | 0 | - |
23 | 2013-08-30 | - | NSA | Black Budget | - | - | FY 2013 Congressional Budget Summary February 2012 National Intelligence Program Summary ("black budget") | Inside the 2013 U.S. intelligence ‘black budget’ [17 S.] 2013 U.S. intelligence budget tables [26 S.] |
Budget | 43 | |
22 | 2013-08-23 | - | NSA | - | - | - | Prism Payments | - | - | - | - |
21 | 2013-08-15 | 2007-01-08 | NSA | Targeting Rationale (TAR) | An NSA document describing how analysts should explaint heir targeting decisions under the FISA Amendments Act. | NSA Memo: Targeting Rationale (TAR) | NSA Targeting Analyst Rationale slides (undated) | NSA Auditing: Targeting Rationale | - | 4 | |
20 | 2013-08-15 | 2011-10-12 | NSA | - | An NSA document describing the FISACourt's 2011 FAA Certifications and noting the FISC ruling that certain procedures for the collection of "Multiple Communications Transactions" were "deficienton statut oryand constitutional grounds." | FAA Certification Renewals with Caveats | NSA Special Source Organization (SSO) news article from October 12, 2011 discussing FISC ruling holding NSA surveillance unconstitutional | SSO transitions following FISA Court ruling | - | 1 | |
19 | 2013-08-15 | 2011-11-01 | NSA | U.S. Person Information | An NSA training slide about what analysts should do when they acquire "U.S.person information". | Slide: So you got U.S. Person Information? | "So You Got a US Person?" training slide November 8, 2011 | Training material: US Person Information | - | 1 | |
18 | 2013-08-15 | 2012-05-03 | NSA | SID Oversight & Compliance | A2012 quarterly audit of the NSA's surveillance activities, which describes 2.766 violations by the NSA of the surveillance laws and its internal rules and regulations. | SID Oversight and Compliance | NSA Signals Intelligence Division (SID) Oversight & Compliance Report May 31, 2012 discussing privacy violations for the preceding year | 2012 SID Auditing report | - | 13 | |
17 | 2013-08-09 | 2011 | NSA | - | An NSA Section 702 rule change expanding NSA targeting/surveillance authorities. | NSA Section 702 'Loop Hole' | NSA Special Source Organization (SSO) glossary on Section 702 | - | - | 1 | |
16 | 2013-07-31 | 2008-02-25 | NSA | XKeyScore Training Slides | Eine NSA Ausbildungs- präsentation die den Zweck und Umfang des XKeyScore Programms beschreibt. |
NSA XKeyscore Powerpoint | NSA XKeyScore Training Slides, 2.2008 | XKeyScore training presentation, 2008 | XKeyScore | 32 | |
15 | 2013-07-10 | 2013-04-13 | NSA | PRISM UPSTREAM Slide | An NSA training slide about the collection of internet and phonedata from fiber-optic cablenet works via the UPSTREAM program. | UPSTREAM Powerpoint Slide | PRISM Slide | - | PRISM Slide | 1 | htm |
14 | 2013-06-30 | - | NSA | Dropmire | - | - | Dropmire | - | Dropmire | 1 | |
13 | 2013-06-29 | 2013-04-13 | NSA | PRISM | NSA training slides about the acquisition of surveillance information through the PRISM program. | PRISM Powerpoint Slides re Data Acquisition | PRISM Slides | PRISM Powerpoint Slides re Data Acquisition | PRISM [8 S.] | 4 | pdf htm |
12 | 2013-06-27 | 2007-11-20 | NSA | - | A memo from the NSA to the DOD seeking approval of a proposed amendment to procedures governing the NSA's metadata analysis | NSA Memo to DOD - Proposed Amendment to Conduct Analysis of Metadata | DOJ Memo from November 20, 2007 Proposing Amendment to DOD procedures to allow NSA todo contact chaining of metadata related to US Persons | Justice Department and NSA memos proposing broader powers for NSA to collect data | DoJ Memo on NSA | 16 | |
11 | 2013-06-27 | 2009-03-24 | NSA | President Bush's post-9/11 surveillance programs | A2009 NSA IG Report reviewing President Bush's post-9/11 surveillance programs. | Draft NSA IG Report | NSA OIG Working Draft Report from March 24, 2009 on StellarWind (PSP) | NSA Inspector General review of government surveillance programs after 9/11 | StellarWind | 51 | |
10 | 2013-06-27 | 2011-02-02 | - | - | ADOJ report to the Senate Intelligence Committee describing the government's bulk collection program under Section 215. | 2011 OIG Report on Bulk Collection | - | - | [NotSnowden] | 9 | - |
9 | 2013-06-23 | 2009-12-14 | - | - | ADOJ report to the Senate Intelligence Committee describing the government's bulk collection program under Section 215. | 2009 OIG Report on Bulk Collection | - | - | [NotSnowden] | 7 | |
8 | 2013-06-20 | 2009-07-29 | NSA | FAA Minimization Exhibit B | FISC document describing the NSA'sminimization procedures under Section 702 of FISA (the FISAAmendments Act). | FAA Minimization Procedures | Minimization Procedures used by NSA in Connection with Data Acquisitions Pursuant to 702 FISC July 29, 2009 | FAA Minimization Procedures | Minimization Exhibit B | 9 | |
7 | 2013-06-20 | 2009-07-29 | NSA | FAA Targeting Exhibit A | FISC document describing the NSA's targeting procedures under Section 702 of FISA (the FISA Amendments Act). | FAA Targeting Procedures | Procedures Used by NSA for Targeting Non-US Persons Reasonably Believed to Be Outside the US to Acquire Foreign Intelligence Pursuant to 702 FISC July 29, 2009 | FAA Targeting Procedures | Minimization Exhibit A | 9 | |
6 | 2013-06-08 | 2012-07-13 | NSA | Boundless Informant | NSA training slides describing the Boundless Informant tool and "mission capabilities from metadata records." | NSA Boundless Informant Powerpoint Slides [8 S.] | Boundless Informant Introduction Slides July 13, 2012 | Boundless Informant slides [8 S.] Describing Mission Capabilities from Metadata Records [4 S.] |
Boundless Informant Slides | 8 4 |
|
5 | 2013-06-08 | 2012-06-09 | NSA | Boundless Informant - FAQ | An NSA "Work-in-Progress" factsheet describing the Boundless Informant dataminingtool. | NSA Boundless Informant Frequently Asked Questions | Boundless Informant Explanation/FAQ Slides September 6, 2012 | Boundless Informant – Frequently Asked Questions | Boundless Informant FAQ | 3 | |
4 | 2013-06-08 | - | NSA | - | - | - | PRISM/Upstream explanation slide | - | - | 1 | - |
3 | 2013-06-07 | - | NSA | Presidential Policy Directive (PPD-20) | Presidential Policy Directive PPD-20 on US Cyber Operations Policy | - | - | Presidential Policy Directive PPD-20 on US Cyber Operations Policy | PRESIDENTIAL POLICY DIRECTIVE (PPD-20) | 18 | |
2 | 2013-06-06 | 2013-04-13 | NSA | PRISM Overview | NSA training slides providing an introduction and overview of the PRISM program. | PRISM Overview Powerpoint Slides [4 S.] | PRISM Slides [4 S.] PRISM (4.2013) [11 S.] |
PRISM/US-984XN Overview [12 S.] | PRISM [9 S.] | 4 | pdf htm |
1 | 2013-06-05 | 2013-04-25 | - | Verizon SECONDARY ORDER | AFIS Corder approving the application of Section 215 for Verizon metadata collection. | Section 215 - Secondary Order (Verizon) | Verizon 215 Secondary Order April 25, 2013 | Verizon FISA Court order | Verizon | 4 |
Tabelle Snowdens Deutschland-Akte
Snowdens Deutschland-Akte: Die Dokumente im PDF-Format (hier verlinkt)
Im Fundus von Edward Snowden finden sich zahlreiche Dokumente mit Deutschland-Bezug. SPIEGEL ONLINE veröffentlicht 53 Snowden Dokumente - als PDF zum Download
Tabelle Greenwald - No Place To Hide - Links
Nr | Datum | DocDatum | Org | Doc Titel | Inhalt | - | EFF | - | Cryptome | Seite | Typ |
---|---|---|---|---|---|---|---|---|---|---|---|
12 | 2014-06-21 | 2014-05-13 | - | No Place To Hide Penguin | Glenn Greenwald - No Place To Hide Das Buch - Gesamt als Penguin Book - wikileaks.com.br |
- | - | - | - | 966 | |
11 | 2014-05-22 | 2014-05-13 | - | No Place To Hide Torrent | Glenn Greenwald - No Place To Hide Das Buch - Gesamt als Torrent oder auch als E-Book (epub, mobi) - thepiratebay.se |
- | - | - | - | - | |
10 | 2014-05-22 | 2014-05-13 | - | No Place To Hide Download | Glenn Greenwald - No Place To Hide Das Buch - Gesamt als Download (Komplett - gepackt als 7z-File) Alternativ als PDF |
- | - | - | No Place to Hide (27MB) | 310 | |
9 | 2014-05-22 | 2014-05-13 | - | No Place To Hide Intro, Parts 1-5, Epilogue, |
Glenn Greenwald - No Place To Hide Intro, Parts 1-5, Epilogue (Komplett - Compressed 7z-File) |
- | - | - | No Place to Hide Intro Parts 1-5 Epilogue | 310 | |
8 | 2014-05-22 | 2014-05-13 | - | No Place To Hide Ten Days in Hong Kong |
Glenn Greenwald - No Place To Hide 10 Tage in Hong Kong |
- | - | - | No Place to Hide Part 2 Ten Days in Hong Kong | 37 | |
7 | 2014-05-22 | 2014-05-13 | - | No Place To Hide The Harm of Surveillance |
Glenn Greenwald - No Place To Hide Der Nachteil der Überwachung |
- | - | - | No Place to Hide Part 4 The Harm of Surveillance | 24 | |
6 | 2014-05-22 | 2014-05-13 | - | No Place To Hide The 4th Estate Epilogue |
Glenn Greenwald - No Place To Hide Der 4. Staat, Nachwort |
- | - | - | No Place to Hide Part 5 The 4th Estate Epilogue | 28 | |
5 | 2014-05-21 | 2014-05-13 | - | No Place To Hide Introduction Contact |
Glenn Greenwald - No Place To Hide Einleitung, Kontakt |
- | - | - | No Place to Hide Introduction Part 1 Contact | 22 | |
4 | 2014-05-20 | 2014-05-13 | - | No Place To Hide Collect It All |
Glenn Greenwald - No Place To Hide Collect It All |
- | - | - | No Place to Hide Part 3 Collect It All | 44 | |
3 | 2014-05-19 | 2014-05-13 | - | No Place To Hide 12 Various Pages |
Glenn Greenwald - No Place To Hide 12 Various Pages |
- | - | - | 12 Various Pages | 12 | |
2 | 2014-05-16 | 2014-05-13 | - | No Place To Hide Folienübersicht |
Glenn Greenwald - No Place To Hide Übersicht veröffentlicht Folien / bislang unbekannte Folien |
- | - | - | No Place to Hide Documents Compared to Previous | 47 | |
1 | 2014-05-13 | 2014-05-13 | - | No Place To Hide Documents |
Glenn Greenwald - No Place To Hide Documents (Uncompressed) Documents (Compressed) No Place To Hide - Index No Place To Hide - Notes |
- | 20140513-Greenwald-NoPlaceToHideDocuments | - | - | 108 | |
0 | 2014-05-13 | 2014-05-13 | - | No Place To Hide (Website) |
Glenn Greenwald - No Place To Hide Edward Snowden, the NSA, and the U.S. Surveillance State |
- | - | - | - | - | Html |
Einzelnachweise
Dropzone
.
Top⇑