READ NSA/CIA/UFO WEBSERVER MAINFRAME FILES HERE - WE DO NOT WANT TO HAVE 20 AMERICANS INSIDE OUR SOULS - TO YOU WE ARE ONLY FOREIGNERS -


Most files found on this website are still classified as TOP SECRET/NOFORN up to this day. Some are hard classified up until the year 2036.
And on that date - in 2036 - they might classify it again for another 25 years. And just because a secret document has leaked - it doesn't mean it's unclassified.
— Extraterrestials are on this site seen as telepathic assholes that ruins everyones day. They are aiming at becoming God. And U.S.A. helps them.
The aliens are like the Soviet Union equipped with space ships. Fuck off to another celestial body.
And to United States - you can also fuck off to another celestial body. You think that when UFO aliens talk to your head — IT'S GOD.
Your satellite technology harms peoples brains worldwide, so fuck off to any other place than Planet Earth™. See yourself as deported.
Your whole civilization has to take the blame for what your technicians do. Your alien friends can probably drop you off somewhere or something. You can ask.
— Good Bye and Merry Christmas From the European Population! — Meaning US — the animals, bacteria, waterbeings and humans.


























To have something to compare with, regarding older documents: A revolver made in 1944 are still lethal. And you can upgrade the ammo and firing mechanism.
The word blacked out in the above photograph are (radio communication) BEAM. The arrow in one above picture comes from when newstickers are closed.
Just close the newsticker by holding your mousepointer above a ticker, and click the far right arrow in it. — And you will see what appears in the above image.
The image are taken from an earlier website I did. It's a screenshot from it, when tickers were closed.
Just press the arrow picture once, to get up the old website frontpage, saved as a PDF. Videos don't work though. The frontpage are from 2021.

ANY REDACTED (BLACKED OUT) INFORMATION IN THE DOCUMENTS ARE DONE BY THE SOURCE THAT HAD THE PDF FILE BEFORE ME. PROBABLY A NEWS AGENCY.

HERE ARE SOME TERMS YOU NEED TO KNOW ABOUT BEFORE READING THE CLASSIFIED DOCUMENTS YOU FIND HERE ON THIS WEBSITE.
BELOW ARE THE MOST COMMON DOCUMENT OR PROJECTION SLIDE SECRET CLASSIFICATION LABELS THAT YOU WILL FIND IN THE RESTRICTED PDF DOCUMENTS:
TS =TOP SECRET.
NOFORN =NO FOREIGNERS. MOSTLY MEANS WHEN USA DENIES ALLIES LIKE UNITED KINGDOM ANY KNOWLEDGE OR INFORMATION.
SI =INFORMATION CLASSED AS SPECIAL INTELLIGENCE. ONE SECRECY POINT ABOVE TOP SECRET AND MORE RARE TO BE APPROVED OF.
FVEY =ONLY MEANT FOR THE FIVE EYES (SPYRING). They are the USA/UNITED KINGDOM/AUSTRALIA/NEW ZEALAND/CANADA.
ORCON =ORIGINATOR CONTROLLED. You ALSO need the original document owners permisssion before you can view the specific classified information document.
S =SECRET INFORMATION. A LEVEL OF CLASSIFICATION COMMONLY USED IN MILITARY OFFICES.
U =UNCLASSIFIED INFORMATION. YOU CAN SPEAK FREELY ABOUT THIS.
SSO =SPECIAL SOURCE OPERATIONS. See their logotype on next projection slide image below.
FOUO or CONFIDENTIAL =FOR OFFICIAL USE ONLY. THE DOCUMENT CONTAINS GOVERNMENT INFORMATION THAT SHOULD NOT BE RELEASED TO THE PUBLIC.
SIGINT =SIGNALS INTELLIGENCE. TRACKS INTERNET, RADIO TRANSMISSIONS, COMMUNICATIONS, GPS LOCATIONS, INDIVIDUAL PERSON TRACKING ET CETERA.
COMINT =COMINT is the Communication Intelligence part of SIGINT (Signals Intelligence), dedicated to Electronic Warfare Operations.
SC =SECRET CODEWORD.
TSC =TOP SECRET CODEWORD.
COMINT CODEWORD =A FIVELETTER WORD THAT PRIMARILY IDENTIFIES THE SOURCE OF THE COMINT INFORMATION THAT WAS RELAYED OR DOCUMENTED.
UMBRA =IF USED TOGETHER WITH TS IN A DOCUMENT - IT'S THE FIVELETTER CODEWORD THAT IDENTIFIES THE COMINT INFORMATION AS THE HIGHEST - CLASS 3.
CCO =HANDLE VIA COMINT CHANNELS ONLY. INFORMATION ONLY FOR PEOPLE WHO HAVE ACCESS TO READ COMINT MESSAGES AND DOCUMENTS NORMALLY.
PAPERTRAILS =SOMETHING YOU CAN GET RID OF. PAPERS THAT POINT TO THAT YOU WERE A CRIMINAL WHEN AT WORK.
GOD =SOMETHING YOU CAN NOT GET RID OF.

Why are one interested in you? Or in your communications? Otherwise one do not have world control.
You can try and see if you can translate and understand the shortened classification labels that appears in red text, on the next original image, below.








How does COMINT work?

COMINT among other functions, targets communication signals to improve "everyones fields of awareness". Including informing aliens with U.F.O's.
COMINT systems uses electronic signals detection, automatic analyze, and also direction finding (GPS) of targeted communication emissions.

COMINTS are heavy users of satellites. Read spysatellites and worse, like Microwave Magnetron Cannons.
It acts as "the voice of God technology" via the radio frequency hearing effect.
Read more on this website under PATENTS. Read them all.
Persons, or inventors, do not generally discuss the eventual military advantages, in the Patent Applications, sent to Patent Registrations Offices worldwide.

One specific patent discuss the radio frequency hearing effect in mammals, but illustrations shows a human head. CLICK HERE TO VIEW SAVED U.S. PATENTS .






CLICK HERE FOR MAGNETRON EQUIPPED SPYSATELLITE IMAGE.

CLICK HERE FOR MAGNETRON CANNON EFFECTS - NEW YORK DAILY NEWS FRONTPAGE.



CLICK HERE FOR ALL U.F.O.


CLICK HERE to read the start of USA COMINT activities from the 24:th October 1952.


One of the United States most secret organisations are the Central Intelligence Agency.
They arrange coups in Banana Republics, targets your computers, and are involved in U.S.A. spying against other Nations.
They are afraid of other humans. They think that we all come from the wild.
They are into doing shit dirt work that you will punch them in the face for. Therefore they classify everything they do.
Get the Encyclopedia of the CIA - CLICK HERE . An Encyclopedia empties a topic from A to Z.






THE RESTRICTED DOCUMENTS™ NSA/CIA SERVER FILE INDEX




  • CIA document about extraterrestial craft and fusion engine dated 1950.pdf
  • CIA MJ12 document about other world visitations.pdf
  • DOCUMENT-FRAGMENT-THAT-MENTIONS-DEFENSE-SECRETARY-FORRESTALS-MURDER.pdf
  • Cop15_interception_document.pdf
  • 01-31-2014---cbc-csec_airport_wifi_tracking.pdf
  • 2009-OIG_Report_on_Bulk_Collection.pdf
  • 2011-OIG_Report_on_Bulk_Collection.pdf
  • 2013-08-30 US_Congressional_budget_-N A T I O N A L I N T E L L I G E N C E P R O G R A M S U M M A R Y.pdf
  • 2013-watchlist-guidance.pdf
  • 2013-06-05-guard-verizon_215_secondary_order.pdf
  • 20130606-wapo-prism.pdf
  • 20130608-guard-boundless_informant_capabilities-(1).pdf
  • 2013-06-08-guard-boundless_informant_faq.pdf
  • 2013-06-08-guard-prism.pdf
  • 2013-06-20-guard-702_minimization_procedures.pdf
  • 2013-06-20-guard-702_targeting_procedures.pdf
  • 2013-06-27-guard-2007_memo_on_us_person_metadata.pdf
  • 2013-06-27-guard-nsa_oig_2009_report.pdf
  • 2013-062-9-wapo-prism.pdf
  • 20130630-guard-dropmire_.pdf
  • 20130710-wapo-upstream.pdf
  • 20130731-guard-xkeyscore_training_slides.pdf
  • 20130809-guard-702_glossary.pdf
  • 20130816-wapo-sid_oversight.pdf
  • 20130816-wapo-so_you_got_a_us_person.pdf
  • 20130816-wapo-sso_news_article.pdf
  • 20130816-wapo-targeting_rationale.pdf
  • 20130830_cryptome_congressional_budget_2013.pdf
  • 20130903-globo-satc.pdf
  • 20130905-guard-bullrun.pdf
  • 20130905-guard-cryptanalysis_classification.pdf
  • 20130905-guard-sigint_enabling.pdf
  • 20130908-globo-stormbew_tv.pdf
  • 20130908-globo-stormbrew_tv.pdf
  • 20130908-globo-tv.pdf
  • 20130909-spiegel-smartphones-(1).pdf
  • 20130911-guard-israel_sharing_0.pdf
  • 20130916-spiegel-credit_card_transactions.pdf
  • 20130920-spiegel-belgacom.pdf
  • 20130928-nyt-contact_chaining.pdf
  • 20130928-nyt-syanpse.pdf
  • 20131004-guard-egotistical_giraffe-(1).pdf
  • 20131004-guard-iat_tor.pdf
  • 20131004-guard-tor_stinks.pdf
  • 20131004-wapo-gchq_mullenize.pdf
  • 20131004-wapo-tor.pdf
  • 20131014-wapo-collection_optimization.pdf
  • 20131014-wapo-content_acquisition_optimization1.pdf
  • 20131014-wapo-content_acquisition_optimization2.pdf
  • 20131020-spiegel-mexican_president.pdf
  • 20131021-monde-boundless_informant_france.pdf
  • 20131021-monde-close_access_sigads.pdf
  • 20131021-monde-wanadoo_alcatel.pdf
  • 20131022-monde-prism_april_2013.pdf
  • 20131024-guard-phones_world_leaders.pdf
  • 20131025-monde-french_cyberattacks.pdf
  • 20131027-spiegel-embassy.pdf
  • 20131028-mundo-spain_collections-(1).pdf
  • 20131028-mundo-spain_collections.pdf
  • 20131030-wapo-muscular.pdf
  • 20131030-wapo-muscular_smiley.pdf
  • 20131101-guard-corporate_reporting.pdf
  • 20131104-mundo-boundless_informant.pdf
  • 20131104-mundo-info_sharing_partners.pdf
  • 20131104-nyt-collection_accesses.pdf
  • 20131104-nyt-sigint_goals.pdf
  • 20131104-nyt-sigint_strategic_plan.pdf
  • 20131104-wapo-optimization_google.pdf
  • 20131104-wapo-sso_overview.pdf
  • 20131104-wapo-windstop.pdf
  • 20131117-guardian-dsd_3g.pdf
  • 20131117-spiegel-royal_concierge.pdf
  • 20131119-dagbladet-norway_collection_0.pdf
  • 20131119-odni-ag_guidelines_for_domestic_fbi_operations-(1).pdf
  • 20131119-odni-interim_competency_test_for_access_to_fisa_data.pdf
  • 20131119-odni-nsa_core_intelligence_oversight_training.pdf
  • 20131119-odni-nsa_course_materials_intro_v.13.pdf
  • 20131119-odni-nsa_course_materials_module_1_v.17.pdf
  • 20131119-odni-nsa_course_materials_module_2_v.16.pdf
  • 20131119-odni-nsa_course_materials_module_3_v.22.pdf
  • 20131119-odni-nsa_course_materials_module_4_v.28.pdf
  • 20131119-odni-nsa_course_materials_module_5_v.24.pdf
  • 20131119-odni-nsa_course_materials_module_6_analytic_personal_v.18.pdf
  • 20131119-odni-nsa_course_materials_module_6_tech_personnel_v.25.pdf
  • 20131119-odni-nsa_cryptological_school_course_slides_on_legal_compliance_and_minimization_procedures.pdf
  • 20131119-odni-nsa_guidance_memo_on_legal_standards_for_searching_bulk_metadata.pdf
  • 20131119-odni-nsa_metadata_collection_training_slides_.pdf
  • 20131119-odni-nsa_summary_of_requirements_for_collection_of_bulk_metadata.pdf
  • 20131119-odni-office_of_general_council_business_record_analyst_training_slides.pdf
  • 20131119-odni-united_states_signals_intelligence_directive_18_appendix_j.pdf
  • 20131119-odni-united_states_signals_intelligence_directive_18_jan_25_2011.pdf
  • 20131119-odni-verification_slide.pdf
  • 20131120-guard-collection_processing_and_dissemination_of_allied_communications.pdf
  • 20131122-dagbladet-afghanistan_collection.pdf
  • 20131122-dagbladet-boundless_informant.pdf
  • 20131122-dagbladet-boundless_informant_faq.pdf
  • 20131123-nrc-nsa_malware.pdf
  • 20131123-nyt-sigint_strategy_feb_2012.pdf
  • 20131126-huffpo-radicalizers_pornography.pdf
  • 20131126-wapo-microsoft_cloud_exploitation.pdf
  • 20131126-wapo-microsoft_monkey_puzzle.pdf
  • 20131130-GlobeandMail-csec-br-spy.pdf
  • 20131202-cbc-g20.pdf
  • 20131202-guard-dsd_data.pdf
  • 20131204-wapo-chalkfun_foreignness.pdf
  • 20131204-wapo-fascia-(1).pdf
  • 20131204-wapo-fascia.pdf
  • 20131205-espresso-italy_spying.pdf
  • 20131205-svt-fra_russia.pdf
  • 20131209-nyt-nsa_games.pdf
  • 20131210-cbc-nsa_csec_partnership-(1).pdf
  • 20131210-cbc-nsa_csec_partnership.pdf
  • 20131210-wapo-cotraveler_overview.pdf
  • 20131210-wapo-ghost_machine.pdf
  • 20131210-wapo-gsm_classification_guide.pdf
  • 20131210-wapo-location_cookies.pdf
  • 20131210-wapo-target_location-(1).pdf
  • 20131210-wapo-target_location.pdf
  • 20131211-svt-accomplishments_from_nsa.pdf
  • 20131211-svt-baltic_region-(1).pdf
  • 20131211-svt-baltic_region.pdf
  • 20131211-svt-final_agenda_sweden_usa.pdf
  • 20131211-svt-legal_issues_uk_regarding_sweden_and_quantum.pdf
  • 20131211-svt-nsa_internal_pm_on_fra.pdf
  • 20131211-svt-nsa_slides_xkeyscore.pdf
  • 20131211-svt-quantum_from_gchq.pdf
  • 20131211-svt-sweden_neutral.pdf
  • 20131211-svt-xkeyscore_slide_with_swedish_example.pdf
  • 20131211-svt-xkeyscore_sources.pdf
  • 20131211-svt-xkeyscore_sweden_meeting.pdf
  • 20131223-wapo-nsacss-mission.pdf
  • 20131230-appelbaum-nsa_ant_catalo.pdf
  • 20131230-appelbaum-nsa_ant_catalog.pdf
  • 20131230-spiegel-qfire.pdf
  • 20131230-spiegel-tao_intro.pdf
  • 20131230-spiegel-tao_quantum_tasking.pdf
  • 20131230-spiegel-tao_quantum_theory.pdf
  • 20140102-wapo-quantum_computers_hard_targets.pdf
  • 20140102-wapo-quantum_computing.pdf
  • 20140116-guard-dishfire_presentation.pdf
  • 20140127-nbc-squeaky_dolphin.pdf
  • 20140127-nyt-converged_analysis_on_smartphone_devices.pdf
  • 20140127-nyt-mobile_theme_briefing.pdf
  • 20140128-guard-leaky_phone_apps.pdf
  • 20140128-guard-leaky_phone_apps_0.pdf
  • 20140130-information_dk-cop15_interception_document.pdf
  • 20140131-cbc-csec_airport_wifi_tracking.pdf
  • 20140204-nbc-british_spies_attacked_hactivist_anonymous.pdf
  • 20140207-nbc-gchq_honey_trap_cyber_attack_background_on_jtrig.pdf
  • 20140207-nbc-gchq_honey_trap_cyber_attack_leveraging_foreign_journalists_via_jtrig.pdf
  • 20140207-nrc-boundless_nederland.pdf
  • 20140211-intercept-drones_intercepting_communications.pdf
  • 20140218-intercept-discovery_sigint_targeting_scenarios_and_compliance.pdf
  • 20140218-intercept-gchq_sigdev_.pdf
  • 20140224-intercept-training_for_covert_online_operations.pdf
  • 20140227-guard-gchq_optic.pdf
  • 20140303-epic-doj_report_on_pen_register_fisa_orders.pdf
  • 20140305-nrc-dutch_shares_collected_anti-piracy_information_with_nsa.pdf
  • 20140307-intercept-nsa_ask_zelda_an_interview_with_zelda.pdf
  • 20140307-intercept-nsa_ask_zelda_guilty_until_proven_innocent.pdf
  • 20140307-intercept-nsa_ask_zelda_is_bain_de_soleil_a_bane_on_the_nsa.pdf
  • 20140307-intercept-nsa_ask_zelda_watching_every_word_in_snitch_city.pdf
  • 20140311-nyt-ashcroft_memo_on_intelligence_sharing_procedures.pdf
  • 20140311-nyt-classification_guide_for_fisa_the_protect_america_act_and_the_fisa_amendments_act.pdf
  • 20140311-nyt-classification_guide_for_stellarwind_program_0.pdf
  • 20140311-nyt-nsa_memo_expands_access_to_fisa_information.pdf
  • 20140311-nyt-nsa_timeline_of_surveillance_law_developments.pdf
  • 20140312-intercept-five_eyes_hacking_large_routers.pdf
  • 20140312-intercept-increasing_collection_capacity_by_increasing_implants.pdf
  • 20140312-intercept-mhs_leverages_xkeyscore_for_quantum.pdf
  • 20140312-intercept-multiple_methods_of_quantum.pdf
  • 20140312-intercept-nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf
  • 20140312-intercept-nsa_selector_types.pdf
  • 20140312-intercept-nsa_technology_directorate_analysis_of_converged_data.pdf
  • 20140312-intercept-quantum_insert_diagrams.pdf
  • 20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf
  • 20140312-intercept-turbine_and_turmoil.pdf
  • 20140312-intercept-turbine_industrial_scale_exploitation.pdf
  • 20140312-intercept-vpn_and_voip_exploitation_with_hammerchant_and_hammerstein.pdf
  • 20140313-intercept-nsa_cooperative_third_party_relationships.pdf
  • 20140315-intercept-turbine_intelligence_command_and_control-(1).pdf
  • 20140315-intercept-turbine_intelligence_command_and_control-(2).pdf
  • 20140315-intercept-turbine_intelligence_command_and_control.pdf
  • 20140318-wapo-adding_another_country_to_mystic_program.pdf
  • 20140318-wapo-description_of_data_collection_under_mystic-(1).pdf
  • 20140318-wapo-description_of_data_collection_under_mystic.pdf
  • 20140318-wapo-mystic_program.pdf
  • 20140320-intercept-targeting_system_administrator_accounts.pdf
  • 20140321-le_monde-french_intelligence_e-mail_spying_operation-(1).pdf
  • 20140321-le_monde-french_intelligence_e-mail_spying_operation.pdf
  • 20140322-nyt-operation_shotgiant_objectives.pdf
  • 20140329-der_spiegel-gchq_and_nsa_spy_on_heads_of_state.pdf
  • 20140404-intercept-2009_sigdev_conference.pdf
  • 20140404-intercept-gchq_full_spectrum_cyber_effects.pdf
  • 20140430-intercept-gchq_visit.pdf
  • 20140430-intercept-ghostmachine.pdf
  • 20140430-intercept-prism_olympics.pdf
  • 20140513-greenwald-noplacetohidedocuments.pdf
  • 20140519-intercept-black_budget.pdf
  • 20140519-intercept-dea_warfighter.pdf
  • 20140519-intercept-mystic.pdf
  • 20140519-intercept-somalget.pdf
  • 20140519-intercept-sso_dictionary_excerpt.pdf
  • 20140519-intercept-sso_mystic_charts.pdf
  • 20140531-nyt-identity-intelligence.pdf
  • 20140610-Cryptome-dea-nsa-sandkey.pdf - Voice intercepts are translated and gisted by immigrant Hispanics.
  • 20140616-der_spiegel-analytics_for_targets_in_europe_0.pdf
  • 20140616-der_spiegel-xkeyscore_fingerprints_1.pdf
  • 20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker-(1).pdf
  • 20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker.pdf
  • 20140618-DerSpiegel-agenda_for_the_visit_of_bsi_vice_president_andreas_konen_to_the_nsa.pdf
  • 20140618-DerSpiegel-internal_nsa_discussion_guidelines_relating_to_cooperation_with_the_bnd_and_bfv.pdf
  • 20140618-DerSpiegel-presentation_on_the_nsacia_unit_special_collection_service.pdf
  • 20140618-DerSpiegel-zoom_of_a_boundless_informant_document_with_project_names.pdf
  • 20140618-dagbladet-black_budget.pdf
  • 20140618-dagbladet-keith_alexander_talking_points.pdf
  • 20140618-der_spiegel-boundless_informant_overview_global.pdf
  • 20140618-der_spiegel-boundless_informant_statistics_for_so-called_third_parties.pdf
  • 20140618-der_spiegel-boundless_informant_statistics_on_data_from_22foreign_partners22.pdf
  • 20140618-der_spiegel-boundless_informant_statistics_on_germany.pdf
  • 20140618-der_spiegel-boundless_informant_statistics_on_the_uk.pdf
  • 20140618-der_spiegel-briefing_on_the_visit_to_the_nsa_of_a_high-ranking_bnd_official.pdf
  • 20140618-der_spiegel-cooperation_between_the_nsa_bnd_and_bfv.pdf
  • 20140618-der_spiegel-details_on_xkeyscore_from_an_internal_gchq_website.pdf
  • 20140618-der_spiegel-excerpt_on_the_sharing_of_xkeyscore_with_german_intelligence_agency_bfv.pdf
  • 20140618-der_spiegel-explanation_of_nymrod_a_system_for_searching_for_people_and_places_in_databases_and_documents.pdf
  • 20140618-der_spiegel-faqs_on_the_boundless_informant_program.pdf
  • 20140618-der_spiegel-final_agenda_of_a_meeting_between_high-ranking_nsa_and_bnd_officials.pdf
  • 20140618-der_spiegel-gchq_report_on_the_technical_abilities_of_tempora.pdf
  • 20140618-der_spiegel-guidelines_for_the_classification_of_nsa_sigint_details_1945-1967.pdf
  • 20140618-der_spiegel-guidelines_for_the_classification_of_suslag_details_and_the_nsa-bnd_cooperation.pdf
  • 20140618-der_spiegel-internal_nsa_presentation_on_the_bnds_organization_0.pdf
  • 20140618-der_spiegel-logo_of_nsa-bnd_cooperation.pdf
  • 20140618-der_spiegel-nostalgic_recollections_from_nsa_workers_formerly_stationed_in_bad_aibling.pdf
  • 20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod-(1).pdf
  • 20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod.pdf
  • 20140618-der_spiegel-nsacss_europe-_report_on_the_experiences_of_one_nsa_worker.pdf
  • 20140618-der_spiegel-nsacss_presentation_on_technical_surveillance_in_europe_and_africa.pdf
  • 20140618-der_spiegel-overview_of_the_use_of_boundless_informant_world_map.pdf
  • 20140618-der_spiegel-preliminary_agenda_of_a_meeting_between_nsa_and_bnd_officials.pdf
  • 20140618-der_spiegel-report_on_a_wharpdrive_incident_in_an_sso_presentation.pdf
  • 20140618-der_spiegel-report_on_an_nsa_sigdev_training_course_for_allied_countries_.pdf
  • 20140618-der_spiegel-report_on_an_nsa_visit_to_bnd_site_and_on_data_transfer_from_the_bnd_to_the_nsa.pdf
  • 20140618-der_spiegel-report_on_an_unexploded_ordnance_alarm_at_european_technical_centern.pdf
  • 20140618-der_spiegel-report_on_an_xkeyscore_training_session_at_the_ecc_dagger_complex.pdf
  • 20140618-der_spiegel-report_on_data_exchange_between_the_nsa_and_bnd_within_the_jsa_framework.pdf
  • 20140618-der_spiegel-report_on_the_beginnings_of_the_european_security_center_esc_in_the_dagger_complex.pdf
  • 20140618-der_spiegel-report_on_the_changing_of_the_escs_name_to_european_security_operations_center_esoc.pdf
  • 20140618-der_spiegel-report_on_the_nsas_access_to_tempora.pdf
  • 20140618-der_spiegel-report_on_the_one-year_anniversary_of_the_nsa_liaison_unit_suslag_in_bad_aibling.pdf
  • 20140618-der_spiegel-report_on_the_surveillance_of_african_countries_by_jsa.pdf
  • 20140618-der_spiegel-report_on_the_technical_expansion_of_the_european_technical_center_in_wiesbaden.pdf
  • 20140618-der_spiegel-report_on_the_work_of_nsacss_europe.pdf
  • 20140618-der_spiegel-restrictions_on_the_technical_surveillance_performed_by_jsa.pdf
  • 20140618-der_spiegel-us_sites_with_nsa_personnel_in_germany.pdf
  • 20140618-der_spiegel-world_map_from_the_boundless_informant_program.pdf
  • 20140630-WaPo-affidavit_of_keith_alexander_regarding_spying_on_foreign_entities.pdf
  • 20140630-WaPo-fisa_amendments_act_summary_document_1.pdf
  • 20140630-WaPo-fisa_judges_order_authorizing_surveillance_of_foreign_governments_and_organizations.pdf
  • 20140630-WaPo-list_of_governments_and_organizations_authorized_for_surveillance.pdf
  • 20140630-WaPo-odni_certification_regarding_foreign_entities.pdf
  • 20140709-Intercept-spying_on_muslim-american_leaders.pdf
  • 20140714-Intercept-jtrigall.pdf
  • 20140723-Intercept-March-2013-Watchlisting-Guidance.pdf
  • 20140723-WaPo-Post-Signals-Intelligence-Authority-Decision-Tree.pdf
  • 20140725-Intercept-Saudi-Arabia-Information-Paper.pdf
  • 20140803-Intercept-Israel-US-1999-Agreement.pdf
  • 20140803-Intercept-NSA-Intelligence-Relationship-With-Israel.pdf
  • 20140805-Intercept-Directorate-of-Terrorist-Identities-Strategic-Accomplishments-2013.pdf
  • 20140812-Intercept-GCHQ-Covert-Mobile-Phones-Policy.pdf
  • 20140815-Heise-HACIENDA-Program.pdf
  • 20140825-Intercept-CIA-Colleagues-Enthusiastically-Welcome-NSA-Training.pdf
  • 20140825-Intercept-CRISSCROSSPROTON-Point-Paper.pdf
  • 20140825-Intercept-DNI-Decision-Memorandum-on-ICREACH.pdf
  • 20140825-Intercept-ICREACH-Black-Budget-Extract.pdf
  • 20140825-Intercept-ICREACH-Sharing-SIGINT-Comms-Metadata-with-the-Intel-Community-Memo.pdf
  • 20140825-Intercept-ICREACH-Wholesale-Sharing.pdf
  • 20140825-Intercept-Metadata-Policy-Conference.pdf
  • 20140825-Intercept-Metadata-Sharing-Memorandum.pdf
  • 20140825-The-Intercept-Sharing-Communications-Metadata-Across-the-USIC-ICREACH.pdf
  • 20140831-Spiegel-NCRs-with-Foreign-Relations-Missions-Become-SUSLAs.pdf
  • 20140831-spiegel-collaboration_in_overdrive.pdf
  • 20140831-spiegel-iraq_uk_load_sharing_carriers.pdf
  • 20140831-spiegel-jordan_belgium.pdf
  • 20140831-spiegel-kurdistan_regional_government.pdf
  • 20140831-spiegel-nsa_intelligence_relationship_with_turkey.pdf
  • 20140831-spiegel-nsas_oldest_third_party_partnership-(1).pdf
  • 20140831-spiegel-nsas_oldest_third_party_partnership.pdf
  • 20140831-spiegel-sinio_seminar_tough_times_for_turkey-(1).pdf
  • 20140831-spiegel-sinio_seminar_tough_times_for_turkey.pdf
  • 20140831-spiegel-sinio_seminar_turkey_and_the_kurds.pdf
  • 20140831-spiegel-sinio_seminar_turkish_elections.pdf
  • 20140831-spiegel-turkey_and_the_pkk.pdf
  • 20140831-spiegel-turkey_at_the_g20_pre-meeting.pdf
  • 20140831-spiegel-turkey_energy_company_development.pdf
  • 20140831-spiegel-turkish_signal_intelligence_chief_agenda.pdf
  • 20140905-intercept-quadrennial_intelligence_community_review_final_report.pdf
  • 20140914-intercept-ferguson_visit_precis.pdf
  • 20140914-intercept-key_activities_in_progress.pdf
  • 20140914-intercept-speargun_phase_one.pdf
  • 20140914-intercept-speargun_underway.pdf
  • 20140914-spiegel-satellite_teleport_knowledge.pdf
  • 20140914-spiegel-treasure_map_announces_a_new_release-(1).pdf
  • 20140914-spiegel-treasure_map_announces_a_new_release.pdf
  • 20140914-spiegel-treasure_map_presentation-(1).pdf
  • 20140914-spiegel-treasure_map_presentation.pdf
  • 20141010-intercept-cno_core_secrets_security_structure.pdf
  • 20141010-intercept-cno_core_secrets_slide_slices.pdf
  • 20141010-intercept-computer_network_exploitation_classification_guide.pdf
  • 20141010-intercept-eci_compartments.pdf
  • 20141010-intercept-eci_pawleys_classification_guide.pdf
  • 20141010-intercept-eci_whipgenie_classification_guide.pdf
  • 20141010-intercept-exceptionally_controlled_information_listing.pdf
  • 20141010-intercept-sentry_eagle_brief_sheet.pdf
  • 20141010-intercept-tarex_classification_guide.pdf
  • 20141125-sueddeutsche-access_breakdown.pdf
  • 20141125-sz-cable_master_list_ac.pdf
  • 20141125-sz-cable_master_list_fea.pdf
  • 20141125-sz-cable_regions.pdf
  • 20141125-sz-cables_no_current_access.pdf
  • 20141125-sz-cables_where_we_are.pdf
  • 20141125-sz-cables_where_we_want_to_be.pdf
  • 20141125-sz-cne_endpoint_project_load.pdf
  • 20141125-sz-mti_access_project_weekly_status_february_6_2009.pdf
  • 20141125-sz-mti_access_project_weekly_status_june_27_2008.pdf
  • 20141125-sz-mti_access_project_weekly_status_november_28_2008.pdf
  • 20141125-sz-partner_cables.pdf
  • 20141125-sz-ptc_glossary.pdf
  • 20141125-sz-windstop_system_highlights.pdf
  • 20141204-intercept-auroragold_project_overview.pdf
  • 20141204-intercept-auroragold_target_technology_trends_center_support_to_wpmo_0.pdf
  • 20141204-intercept-auroragold_working_aid.pdf
  • 20141204-intercept-auroragold_working_group.pdf
  • 20141204-intercept-ir21_a_technology_warning_mechanism_0.pdf
  • 20141204-intercept-nsa_first_ever_collect_of_high_interest_4g_cellular_signal.pdf
  • 20141204-intercept-nsa_gchq_csec_network_tradecraft_advancement.pdf
  • 20141204-intercept-opulant_pup_encryption_attack.pdf
  • 20141204-intercept-wolframite_encryption_attack-(1).pdf
  • 20141204-intercept-wolframite_encryption_attack.pdf
  • 20141214-Intercept-gchq-mobile-networks-in-my-noc-world.pdf
  • 20141214-intercept-gchq_automated_noc_detection.pdf
  • 20141214-intercept-gchq_hopscotch.pdf
  • 20141214-intercept-gchq_making_network_sense_of_the_encryption.pdf
  • 20141214-intercept-gchq_nac_review_april_june_2011.pdf
  • 20141214-intercept-gchq_nac_review_january_march_2012.pdf
  • 20141214-intercept-gchq_nac_review_july_sept_2011.pdf
  • 20141214-intercept-gchq_nac_review_october_december_2011.pdf
  • 20141214-intercept-gchq_stargate_cne_requirements.pdf
  • 20141228-speigel-a_potential_technique_to_deanonymise_users_of_the_tor_network_0.pdf
  • 20141228-speigel-analysis_from_ssl-tls_connections_through_gchq_in_the_flying_pig_database_0.pdf
  • 20141228-speigel-analytic_challenges_from_active-passive_integration_when_nsa_attacks_ipsec_vpns_0.pdf
  • 20141228-speigel-analytics_on_security_of_tor_hidden_services_0.pdf
  • 20141228-speigel-bluesnort_program_on_net_defense_from_encrypted_communications_0.pdf
  • 20141228-speigel-canadian_document_from_ces_on_tls_trends_0.pdf
  • 20141228-speigel-classification_guide_for_cryptanalysis_0.pdf
  • 20141228-speigel-decryption_of_vpn_connections_within_the_valiantsurf_program_0.pdf
  • 20141228-speigel-description_of_existing_projects_on_vpn_decryption_0.pdf
  • 20141228-spiegel-_national_information_assurance_research_laboratory_niarl_tundra.pdf
  • 20141228-spiegel-description_of_voip_telephony_encryption_methods_and_other_ways_to_attack.pdf
  • 20141228-spiegel-description_on_the_processing_of_vpn_data_packets_within_the_turmoil_program.pdf
  • 20141228-spiegel-explanation_of_a_potential_technique_to_deanonymise_users_of_the_tor_network.pdf
  • 20141228-spiegel-explanation_of_the_gallantwave_that_decrypts_vpn_traffic_within_longhaul.pdf
  • 20141228-spiegel-explanation_of_the_poisennut_product_and_its_role_when_attacking_vpn.pdf
  • 20141228-spiegel-explanation_of_the_transform_engine_emulator_when_attacking_vpn.pdf
  • 20141228-spiegel-explanation_of_the_turmoil_gallantwave_program_and_its_role_when_attacking_vpn_0.pdf
  • 20141228-spiegel-explanation_on_the_spin9_program_on_end-to-end_attacks_on_vpn.pdf
  • 20141228-spiegel-gchq_briefing_on_the_bullrun_program.pdf
  • 20141228-spiegel-gchq_presentation_on_the_bullrun_programs_decryption_capabilities.pdf
  • 20141228-spiegel-general_description_how_nsa_handles_encrypted_traffic.pdf
  • 20141228-spiegel-guide_for_analysts_on_how_to_use_the_prism_skype_collection.pdf
  • 20141228-spiegel-intercept_with_otr_encrypted_chat.pdf
  • 20141228-spiegel-intercept_with_pgp_encrypted_message.pdf
  • 20141228-spiegel-intro_to_the_vpn_exploitation_process_mentioning_the_protocols_attacked_-_pptp_ipsec_ssl_ssh.pdf
  • 20141228-spiegel-malibu_architecture_overview_to_exploit_vpn_communication.pdf
  • 20150117-speigel-analysis_of_chinese_methods_and_performed_actions_in_the_context_of_computer_network_exploitation.pdf
  • 20150117-speigel-classification_guide_for_computer_network_exploitation_cne.pdf
  • 20150117-speigel-combination_of_offensive_and_defensive_missions_-_how_fourth-party_missions_are_being_performed.pdf
  • 20150117-speigel-csec_document_about_the_recognition_of_trojans_and_other_network_based_anomaly_.pdf
  • 20150117-speigel-csec_document_on_the_handling_of_existing_trojans_when_trojanizing_computers.pdf
  • 20150117-speigel-document_about_the_expansion_of_the_remote_operations_center_roc_on_endpoint_operations.pdf
  • 20150117-speigel-document_explaining_the_role_of_the_remote_operations_center_roc.pdf
  • 20150117-Snowglobe_in_which_a_suspected_french_government_trojan_is_analyzed_to_find_out_if_it_can_be_helpful_for_own_interests_0.pdf
  • 20150117-spiegel-nsa_fourth_party_access_-_i_drink_your_milkshake_.pdf
  • 20150117-spiegel-nsa_program_tutelage_to_instrumentalize_third_party_attack_tools.pdf
  • 20150117-spiegel-nsa_project_description_to_recognize_and_process_data_that_comes_from_third_party_attacks_on_computers.pdf
  • 20150117-spiegel-nsa_training_course_material_on_computer_network_operations-(1).pdf
  • 20150117-spiegel-nsa_training_course_material_on_computer_network_operations.pdf
  • 20150117-spiegel-overview_of_methods_for_nsa_integrated_cyber_operations_0.pdf
  • 20150117-spiegel-overview_of_the_transgression_program_to_analyze_and_exploit_foreign_cna-cne_exploits.pdf
  • 20150117-spiegel-overview_on_the_nsa_use_of_bots_and_the_defiantwarrior_program.pdf
  • 20150117-spiegel-process_analysts_choose_their_data_requirement_and_then_get_to_know_the_tools_that_can_do_the_job_0.pdf
  • 20150117-spiegel-projects_of_the_tao-ato_department_such_as_the_remote_destruction_of_network_cards.pdf
  • 20150117-spiegel-quantumtheory_is_a_set_of_technologies_allowing_man-on-the-side_interference_attacks_on_tcp-ip_connections_includes_straightbizarre_and_daredev.pdf
  • 20150117-spiegel-report_of_an_nsa_employee_about_a_backdoor_in_the_openssh_daemon.pdf
  • 20150117-spiegel-sample_code_of_a_malware_program_from_the_five_eyes_alliance.pdf
  • 20150117-spiegel-supply-chain_interdiction_-_stealthy_techniques_can_crack_some_of_sigints_hardest_targets.pdf
  • 20150117-spiegel-technical_description_of_the_fashioncleft_protocol_.pdf
  • 20150117-spiegel-the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa_0.pdf
  • 20150128-cbc-cse_presentation_on_the_levitation_project.pdf
  • 20150128-intercept-cse_presentation_on_the_levitation_project.pdf
  • 20150204-intercept-lovely_horse_0.pdf
  • 20150204-intercept-nato_civilian_intelligence_council_cyber_panel.pdf
  • 20150204-intercept-open_source_for_cyber_defence_progress.pdf
  • 20150204-intercept-who_else_is_targeting_your_target_collecting.pdf
  • 20150210-intercept-iran_current_topics_-_interactions_with_gchq.pdf
  • 20150219-Intercept-CCNE-Email-Addresses-Jan10-Mar10-Trial.pdf
  • 20150219-Intercept-CCNE-Email-Harvesting-Jan10-Mar10-Trial.pdf
  • 20150219-Intercept-CCNE-Stats-Summaries-Jan10-Mar10-Trial.pdf
  • 20150219-Intercept-CCNE-Successes-Jan10-Mar10-Trial.pdf
  • 20150219-Intercept-CNE-Access-to-Core-Mobile-Networks.pdf
  • 20150219-Intercept-Dapino-Gamma-CNE-Presence-Wiki.pdf
  • 20150219-Intercept-Dapino-Gamma-Gemalto-Yuaawaa-Wiki.pdf
  • 20150219-Intercept-Dapino-Gamma-Target-Personalisation-Centres.pdf
  • 20150219-Intercept-IMSIs-Identified-With-Ki-Data-For-Network.pdf
  • 20150219-Intercept-PCS-Harvesting-At-Scale.pdf
  • 20150219-Intercept-Where-are-These-Keys.pdf
  • CLEANED004.-Cover_Memo-Sealed.pdf
  • CLEANED007.-CongNotificationInfoMemoSSCI_10_Apr_09-Sealedpdf.pdf
  • CLEANED032.-Basket_2_-_NSA_training.log.pdf
  • CLEANED096.-NSA_summary_of_BR_requirements_(maybe_Feb_2009)-.pdf
  • CLEANEDFinal-USSID_SP0018.pdf
  • CLEANEDFinal-USSID_SP0018_Annex_J.pdf
  • CLEANEDPRTT-1.pdf
  • CLEANEDPRTT-2.pdf
  • EDVARD SNOWDEN COVERPHOTO.jpg
  • FAA-Certification-Renewals-with-Caveats.pdf
  • FAA-Certification_Renewals_with_Caveats.pdf
  • FAA-Minimization-Procedures.pdf
  • FAA-Minimization_Procedures.pdf
  • FAA-Targeting_Procedures.pdf
  • FISC-Order,-BR-06-12.pdf
  • FISC-Order,_BR_06-12.pdf
  • General-Alexander-Letter-re-NSA-Fact-Sheet-Inaccuracy.pdf
  • General-Alexander_Letter_re_NSA_Fact_Sheet_Inaccuracy.pdf
  • Judge-Walton-Answers-to-Questions-re-FISC.pdf
  • Judge-Walton_Answers_to_Questions_re_FISC.pdf
  • Lesson-4_-_So_you_got_US_Person_Information.pdf
  • NSA broke privacy rules thousands of times per year, audit finds - The Washington Post.pdf
  • NSA-Boundless-Informant-Frequently-Asked-Questions.pdf
  • NSA-Boundless_Informant_Frequently_Asked_Questions.pdf
  • NSA-Boundless_Informant_Powerpoint_Slides.pdf
  • NSA-IG_Report.pdf
  • NSA-Memo-to-DOD---Proposed-Amendment-to-Conduct-Analysis-of-Metadata.pdf
  • NSA-Memo_to_DOD_-_Proposed_Amendment_to_Conduct_Analysis_of_Metadata.pdf
  • NSA-Missions-Authorities-Oversight-and-Partnerships.pdf
  • NSA-Missions_Authorities_Oversight_and_Partnerships.pdf
  • NSA-Section-702-and-Section-215-Factsheets.pdf
  • NSA-Section_702_'Loop_Hole'.pdf
  • NSA-Section_702_and_Section_215_Factsheets.pdf
  • NSA-XKeyscore-Powerpoint.pdf
  • NSA-XKeyscore_Powerpoint.pdf
  • PRISM-Overview-Powerpoint-Slides.pdf
  • PRISM-Overview_Powerpoint_Slides.pdf
  • PRISM-Powerpoint-Slides-re-Data-Acquisition.pdf
  • PRISM-Powerpoint_Slides_re_Data_Acquisition.pdf
  • README.txt
  • SECRET-FISA-Court-Warrant-Authorising-NSA-Surveillance-Procedures.pdf
  • SECRET-Justice-Department-NSA-Memos-Proposing-Broader-Powers-for-NSA-to-Collect-Data.pdf
  • SID-Oversight-and-Compliance.pdf
  • SID-Oversight_and_Compliance.pdf
  • Section-215---Obama-Administration-White-Paper.pdf
  • Section-215---Primary-Order.pdf
  • Section-215---Secondary-Order---Verizon.pdf
  • Section-215_-_Obama_Administration_White_Paper.pdf
  • Section-215_-_Primary_Order.pdf
  • Section-215_-_Secondary_Order_-_Verizon.pdf
  • TOP SECRET-1qcy12-violations.pdf
  • TOP SECRET-sso-news-article.pdf
  • TOP SECRET-target-analyst-rationale-instructions-final.pdf
  • TOP-SECRET-FISA-Court-Order-Requiring-Verizon-to-Hand-Over-All-Customer-Call-Data-to-NSA.pdf
  • TOP-SECRET-NSA PRISM slide show.pdf
  • TOP-SECRET-NSA-Boundless-Informant-Slides.pdf
  • TOP-SECRET-NSA-XKeyscore-Presentation-2008.pdf
  • TOP-SECRET-Presidential-Directive-Obama-Orders-US-to-Draw-Up-Overseas-List-for-Cyber-Attacks.pdf
  • TOP-SECRET-Procedures-Used-by-NSA-to-Target-Non-US-Persons-Exhibit-A.pdf
  • Targeting-Rationale---TAR.pdf
  • Targeting-Rationale_-_TAR.pdf
  • UNCLASSIFIED-NSA-Boundless-Informant-FAQ.pdf
  • UNCLASSIFIED-lesson-4-job-aid-usp-info.pdf
  • UPSTREAM-Powerpoint-Slide.pdf
  • UPSTREAM-Powerpoint_Slide.pdf
  • What_We_Need_to_Learn_from_Snowden.pdf
  • Wyden-Udall-Letter-on-NSA-Fact-Sheet-Inaccuracy.pdf
  • Wyden-Udall-Letter_on_NSA_Fact_Sheet_Inaccuracy.pdf
  • _20131119-odni-nsa_course_materials_module_4_v.28.pdf
  • ambassadesFrance.pdf
  • blackhat-Alexander-keynote.pdf
  • bullrun-briefing-sheet-from-gchq.pdf
  • ccne-email-addresses-jan10-mar10-trial.pdf
  • ccne-email-harvesting-jan10-mar10-trial.pdf
  • ccne-stats-summaries-jan10-mar10-trial.pdf
  • ccne-successes-jan10-mar10-trial.pdf
  • cne-access-to-core-mobile-networks.pdf
  • csec-br-spy.pdf
  • dapino-gamma-cne-presence-wiki.pdf
  • dapino-gamma-gemalto-yuaawaa-wiki.pdf
  • dapino-gamma-target-personalisation-centres.pdf
  • discovery-sigint-targeting-scenarios-and.pdf
  • doc-6-cyber-threat-capabilities.pdf
  • doj-nsa-memo.pdf
  • doody.pdf
  • dsd-3g.pdf
  • ericsson_reply.pdf
  • europebriefingnote_en.pdf
  • eyes_wide_open_v1.pdf
  • gchq-g20-spy.pdf
  • gchq-mullenize.pdf
  • gchq-royal-concierge-de.pdf
  • gchq-se-fra-quantum-3.pdf
  • i-hunt-sys-admins.pdf
  • identity-intelligence.pdf
  • imsis-identified-with-ki-data-for-network.pdf
  • invisibility-report-9-0-final.pdf
  • jtrigall.pdf
  • letter_to_companies.pdf
  • media-34093.pdf
  • media-35509.pdf Cryptanalytic Services - TOP SECRET - STRAP ONE
  • media-35510.pdf
  • media-35511.pdf
  • media-35512.pdf
  • media-35513.pdf
  • media-35514.pdf
  • media-35515.pdf
  • media-35516.pdf Network Implants. TAO/TURMOIL/BRAVENICKEL/HAMMERMILL/HAMMERSTEIN.
  • media-35517.pdf
  • media-35518.pdf
  • media-35519.pdf
  • media-35520.pdf
  • media-35521.pdf
  • media-35522.pdf
  • media-35523.pdf
  • media-35524.pdf
  • media-35525.pdf
  • media-35526.pdf
  • media-35527.pdf
  • media-35528.pdf
  • media-35529.pdf
  • media-35530.pdf
  • media-35531.pdf
  • media-35532.pdf
  • media-35533.pdf
  • media-35534.pdf
  • media-35535.pdf
  • media-35536.pdf
  • media-35537.pdf
  • media-35538.pdf
  • media-35539.pdf
  • media-35540.pdf
  • media-35541.pdf
  • media-35542.pdf
  • media-35543.pdf
  • media-35544.pdf
  • media-35545.pdf
  • media-35546.pdf
  • media-35547.pdf
  • media-35548.pdf
  • media-35549.pdf
  • media-35550.pdf
  • media-35551.pdf
  • media-35552.pdf
  • media-35653.pdf
  • media-35654.pdf
  • media-35655.pdf
  • media-35656.pdf
  • media-35657.pdf
  • media-35658.pdf
  • media-35659.pdf
  • media-35661.pdf
  • media-35662.pdf
  • media-35663.pdf
  • media-35664.pdf
  • media-35665.pdf
  • media-35666.pdf
  • media-35667.pdf
  • media-35668.pdf
  • media-35669.pdf
  • media-35670.pdf
  • media-35671.pdf
  • media-35672.pdf
  • media-35673.pdf
  • media-35674.pdf
  • media-35675.pdf
  • media-35676.pdf
  • media-35677.pdf
  • media-35678.pdf
  • media-35680.pdf
  • media-35681.pdf
  • media-35682.pdf
  • media-35683.pdf
  • media-35684.pdf
  • media-35685.pdf
  • media-35686.pdf
  • media-35687.pdf
  • media-35688.pdf
  • media-35689.pdf
  • no-place-to-hide.pdf
  • nokia_reply.pdf
  • nsa-5-eyes-partners.pdf
  • nsa-5-eyes-spy-g20-dk.pdf
  • nsa-boundless-informant-faq.pdf
  • nsa-boundless-informant-slides.pdf
  • nsa-boundless-informant.pdf
  • nsa-boundlessinformant-no-33m.pdf
  • nsa-bullrun-2-16-guardian-13-0905.pdf
  • nsa-bullrun-brief-nyt-13-0905.pdf
  • nsa-bullrun-brief-propublica-13-0905.pdf
  • nsa-cable-spy-types.pdf
  • nsa-catalog-appelbaum.pdf
  • nsa-chalkfun.pdf
  • nsa-close-access-sigads.pdf
  • nsa-cotraveler.pdf
  • nsa-cryptanalysis-2-12-guardian-13-0905.pdf
  • nsa-csec-partners.pdf
  • nsa-css-mission.pdf
  • nsa-dutch-sigint.pdf
  • nsa-egotisticalgiraffe.pdf
  • nsa-fascia.pdf
  • nsa-finance-spy-de.pdf
  • nsa-fisa-certification.pdf
  • nsa-fisa-minimization.pdf
  • nsa-fisa-targeting.pdf
  • nsa-g8-g20-spying-02.pdf
  • nsa-g8-g20-spying.pdf
  • nsa-gchq-fra-quantum.pdf
  • nsa-gchq-se-fra-comint.pdf
  • nsa-gchq-spy-games.pdf
  • nsa-ghost-machine.pdf
  • nsa-gsm-tracking.pdf
  • nsa-hosts-fr-spies.pdf
  • nsa-iat-tor.pdf
  • nsa-israel-spy.pdf
  • nsa-microsoft-cloud-exploit.pdf
  • nsa-muslim-porn.pdf
  • nsa-overcollection.pdf
  • nsa-ppd-20.pdf
  • nsa-prism-13-1021.pdf
  • nsa-prism-dk.pdf
  • nsa-prism-guardian-13-1101.pdf
  • nsa-quantum-computer-2.pdf
  • nsa-quantum-computer.pdf
  • nsa-quantum-tasking.pdf
  • nsa-quantumtheory.pdf
  • nsa-scissors-2.pdf
  • nsa-scissors.pdf
  • nsa-se-fra-quantum-2.pdf
  • nsa-se-fra-relationship.pdf
  • nsa-se-fra-ru-baltic.pdf
  • nsa-se-fra-spying-agenda.pdf
  • nsa-se-fra-xkeyscore-slide.pdf
  • nsa-se-fra-xkeyscore.pdf
  • nsa-se-spies.pdf
  • nsa-sigint-cryptologic-platform.pdf
  • nsa-sigint-enabling-guardian-13-0905.pdf
  • nsa-sigint-enabling-nyt-13-0905.pdf
  • nsa-sigint-enabling-propublica-13-0905.pdf
  • nsa-sigint-strategic-mission-2007.pdf
  • nsa-sigint-strategic-mission-2013.pdf
  • nsa-sigint-strategy-2012-2016.pdf
  • nsa-sigint-successes.pdf
  • nsa-smartphones-analysis.pdf
  • nsa-smartphones.pdf
  • nsa-sms-exploit.pdf
  • nsa-spy-games.pdf
  • nsa-sso-content.pdf
  • nsa-sso-dk.pdf
  • nsa-sso-overview.pdf
  • nsa-sso-slides.pdf
  • nsa-sso1-guardian-13-1101.pdf
  • nsa-sso2-guardian-13-1101.pdf
  • nsa-stellar-wind.pdf
  • nsa-tao-ant-pdf.pdf
  • nsa-tao-ant.pdf
  • nsa-tao-intro.pdf
  • nsa-target-location.pdf
  • nsa-tor-stinks.pdf
  • nsa-tor.pdf
  • nsa-verizon-spy.pdf
  • nsa-wanadoo-alcatel.pdf
  • nsa-windstop-muscular-incenser.pdf
  • nsa-windstop.pdf
  • nsa-xkeyscore-sources.pdf
  • nsa-xkeyscore-tor-slides.pdf
  • nsa-xkeyscore.pdf
  • nsa-yahoo-google-exploit.pdf
  • nsabullrun.pdf
  • pcs-harvesting-at-scale.pdf
  • phonesgchq.pdf
  • phonesnsa.pdf
  • psychology-a-new-kind-of-sigdev.pdf
  • rcs-9-admin-final.pdf
  • rcs-9-analyst-final.pdf
  • rcs-9-sysadmin-final.pdf
  • rcs-9-technician-final.pdf
  • remote-control-system-9-0-changelog-final.pdf
  • remote-control-system-9-1-changelog-final.pdf
  • samsung_reply.pdf
  • samsung_reply_2.pdf
  • saudi-arabia-information-paper.pdf
  • secret-procedures-used-by-nsa-to-minimize-data-collection-from-us-persons-exhibit-b.pdf
  • sigint-enabling-project.pdf
  • sigint-enabling-project2.pdf
  • spy-budget-fy13.pdf
  • the-art-of-deception-training-for-a-new.pdf
  • the-nsa-and-gchqs-quantumtheory-hacking-tactics.pdf
  • top-secret-gchq-g20-summit-spying-4-slides.pdf
  • top-secret-nsa-inspector-general-report-on-email-internet-data-collection-under-stellar-wind.pdf
  • turbine-and-turmoil.pdf
  • vpn-and-voip-exploitation-with-hammerchant.pdf
  • where-are-these-keys.pdf




  • NSA


    GO TO THE MAINFRAME FRONTPAGE HERE

    GO TO WORLDNEWS INTELLIGENCE RSS HERE







    USA-SELLS-AND-BUYS-THE-PLANET







    Apache Website Server at RESTRICTED DOCUMENTS™ Port 443 ENCRYPTED Communication Webserver Link.