AMERICAN NSA LOGOTYPE


- NO OTHER FUCKER THAN THE AMERICAN WOULD SHOOT PEOPLE WHEN THEY SLEEP WITH A SATELLITE BASED MAGNETRON CANNON - A BRAIN DESTROYER - READ THE FULL AMERICAN PATENTS ABOUT IT HERE ON SITE - AND VIEW THE PHOTO OF SUCH A SATELLITE IN SPACE ABOVE - SEE MILITARY SAT PHOTO AT BOTTOM OF THIS PAGE -


Most files found on this website are still classified as TOP SECRET/NOFORN up to this day. Some are hard classified up until the year 2036.
And on that date - in 2036 - they might classify it again for another 25 years. And just because a secret document has leaked - it doesn't mean it's unclassified.
— Extraterrestials are on this site seen as telepathic assholes that ruins everyones day. They are aiming at becoming God. And U.S.A. helps them.
The aliens are like the Soviet Union equipped with space ships. —Fuck off to another celestial body.
And to United States - you can also fuck off to another celestial body. You think that when UFO aliens talk to your head — IT'S GOD.
Your satellite technology harms peoples brains worldwide, so fuck off to any other place than Planet Earth™. See yourself as deported.
Your whole civilization has to take the blame for what your technicians do. Your alien friends can probably drop you off somewhere or something. You can ask.
— Good Bye and Merry Christmas From the European Population! — Meaning US — the animals, bacteria, waterbeings and humans.


Exemption for Americans: If you play in the right ballpark and our Creator likes you, you are exempt from deportation.


Before I wrote the above text, I actually visited the American Consulate in Krakow, Poland, 5 days ago. Tuesday 29:th of November 2022.
I had bought 4 USB memory sticks that morning, 32 GB each, which I had then filled with the same good classified U.F.O content.
Videos and photos. —But they didn't want a copy of it.
So I repeated again: "On this USB memory stick, there are videos and photos of UFO's that you have not seen.
I bought the USB memory I hold in my hand this morning."
He still wouldn't accept it. So the Americans didn't want it. They actually REFUSED to take it. "—Okey, skit it då!" (Why did I bother?)
I happened to run into a guy that came out from the Consulate that 'lives' next door, namely Germany's.
—Are you working at the German Consulate? (I asked). —Yes I am, he said!
Then I explained what kind of content that was on the USB stick. "Roswell 1947 original U.S. Army film footage and stuff like that".
He replied: Sure, of course I can take a look at it.
—Thank you very much. —The Americans didn't want it.
I added and repeated what was on it: —It's videos and photos of U.F.O's that you have not seen.
—Have a great day, I said! And then we left each other and walked in different directions. And never saw each other again. To this date.
So the Americans can shuffle their attitude up their ass!
—Have you left yet? Struggling in upper orbit? The video below misses an R. Spaying/Spraying. Otherwise 100%. I also own The PoliticalAvenue.com.
—This website I programmed myself because I have tons of more new information to publish and to put in context. / security.terminal@gustavnorstrom.com










































To have something to compare with, regarding older documents: A revolver made in 1944 are still lethal. And you can upgrade the ammo and firing mechanism.
The word blacked out in the above photograph are (radio communication) BEAM. The arrow in one above picture comes from when newstickers are closed.
Just close the newsticker by holding your mousepointer above a ticker, and click the far right arrow in it. — And you will see what appears in the above image.
The image are taken from an earlier website I did. It's a screenshot from it, when tickers were closed.
Just press the arrow picture once, to get up the old website frontpage, saved as a PDF. Videos don't work though. The frontpage are from 2021.







ANY REDACTED (BLACKED OUT) INFORMATION IN THE DOCUMENTS ARE DONE BY THE SOURCE THAT HAD THE PDF FILE BEFORE ME. PROBABLY A NEWS AGENCY.

HERE ARE SOME TERMS YOU NEED TO KNOW ABOUT BEFORE READING THE CLASSIFIED DOCUMENTS YOU FIND HERE ON THIS WEBSITE.
BELOW ARE THE MOST COMMON DOCUMENT OR PROJECTION SLIDE SECRET CLASSIFICATION LABELS THAT YOU WILL FIND IN THE RESTRICTED PDF DOCUMENTS:
TS =TOP SECRET.
NOFORN =NO FOREIGNERS. MOSTLY MEANS WHEN USA DENIES ALLIES LIKE UNITED KINGDOM ANY KNOWLEDGE OR INFORMATION.
SI =INFORMATION CLASSED AS SPECIAL INTELLIGENCE. ONE SECRECY POINT ABOVE TOP SECRET AND MORE RARE TO BE APPROVED OF.
FVEY =ONLY MEANT FOR THE FIVE EYES (SPYRING). They are the USA/UNITED KINGDOM/AUSTRALIA/NEW ZEALAND/CANADA.
ORCON =ORIGINATOR CONTROLLED. You ALSO need the original document owners permisssion before you can view the specific classified information document.
S =SECRET INFORMATION. A LEVEL OF CLASSIFICATION COMMONLY USED IN MILITARY OFFICES.
U =UNCLASSIFIED INFORMATION. YOU CAN SPEAK FREELY ABOUT THIS.
SSO =SPECIAL SOURCE OPERATIONS. See their logotype on next projection slide image below.
FOUO or CONFIDENTIAL =FOR OFFICIAL USE ONLY. THE DOCUMENT CONTAINS GOVERNMENT INFORMATION THAT SHOULD NOT BE RELEASED TO THE PUBLIC.
SIGINT =SIGNALS INTELLIGENCE. TRACKS INTERNET, RADIO TRANSMISSIONS, COMMUNICATIONS, GPS LOCATIONS, INDIVIDUAL PERSON TRACKING ET CETERA.
COMINT =COMINT is the Communication Intelligence part of SIGINT (Signals Intelligence), dedicated to Electronic Warfare Operations.
SC =SECRET CODEWORD.
TSC =TOP SECRET CODEWORD.
COMINT CODEWORD =A FIVELETTER WORD THAT PRIMARILY IDENTIFIES THE SOURCE OF THE COMINT INFORMATION THAT WAS RELAYED OR DOCUMENTED.
UMBRA =IF USED TOGETHER WITH TS IN A DOCUMENT - IT'S THE FIVELETTER CODEWORD THAT IDENTIFIES THE COMINT INFORMATION AS THE HIGHEST - CLASS 3.
CCO =HANDLE VIA COMINT CHANNELS ONLY. INFORMATION ONLY FOR PEOPLE WHO HAVE ACCESS TO READ COMINT MESSAGES AND DOCUMENTS NORMALLY.
PAPERTRAILS =SOMETHING YOU CAN GET RID OF. PAPERS THAT POINT TO THAT YOU WERE A CRIMINAL WHEN AT WORK.
GOD =SOMETHING YOU CAN NOT GET RID OF.

Why are one interested in you? Or in your communications? Otherwise one do not have world control.
You can try and see if you can translate and understand the shortened classification labels that appears in red text, on the next original image, below.








How does COMINT work?

COMINT among other functions, targets communication signals to improve "everyones fields of awareness". Including informing aliens with U.F.O's.
COMINT systems uses electronic signals detection, automatic analyze, and also direction finding (GPS) of targeted communication emissions.

COMINTS are heavy users of satellites. Read spysatellites and worse, like Microwave Magnetron Cannons.
It acts as "the voice of God technology" via the radio frequency hearing effect.
Read more on this website under PATENTS. Read them all.
Persons, or inventors, do not generally discuss the eventual military advantages, in the Patent Applications, sent to Patent Registrations Offices worldwide.

One specific patent discuss the radio frequency hearing effect in mammals, but illustrations shows a human head. CLICK HERE TO VIEW SAVED U.S. PATENTS .






CLICK HERE FOR MAGNETRON EQUIPPED SPYSATELLITE IMAGE.

CLICK HERE FOR MAGNETRON CANNON EFFECTS - NEW YORK DAILY NEWS FRONTPAGE.



CLICK HERE FOR ALL U.F.O.


CLICK HERE to read the start of USA COMINT activities from the 24:th October 1952.


One of the United States most secret organisations are the Central Intelligence Agency.
They arrange coups in Banana Republics, targets your computers, and are involved in U.S.A. spying against other Nations.
They are afraid of other humans. They think that we all come from the wild.
They are into doing shit dirt work that you will punch them in the face for. Therefore they classify everything they do.
Get the Encyclopedia of the CIA - CLICK HERE . An Encyclopedia empties a topic from A to Z.






THE RESTRICTED DOCUMENTS™ NSA/CIA SERVER FILE INDEX




  • CIA document about extraterrestial craft and fusion engine dated 1950.pdf
  • CIA MJ12 document about other world visitations.pdf
  • DOCUMENT-FRAGMENT-THAT-MENTIONS-MURDER-of-DEFENSE-SECRETARY-FORRESTAL-that wished to go public with U.F.O.pdf
  • UAV-Technology.pdf Although unclassified - the document still shows secret classified content.
  • Copenhagen 15_interception_document.pdf
  • 01-31-2014---cbc-csec_airport_wifi_tracking.pdf
  • 2009-OIG_Report_on_Bulk_Collection.pdf
  • 2011-OIG_Report_on_Bulk_Collection.pdf
  • 2013-08-30 US_Congressional_budget_-N A T I O N A L I N T E L L I G E N C E P R O G R A M S U M M A R Y.pdf
  • 2013-watchlist-guidance.pdf
  • 2013-06-05-guard-verizon_215_secondary_order.pdf
  • 20130606-wapo-prism.pdf
  • 20130608-guard-boundless_informant_capabilities-(1).pdf
  • 2013-06-08-guard-boundless_informant_faq.pdf
  • 2013-06-08-guard-prism.pdf
  • 2013-06-20-guard-702_minimization_procedures.pdf
  • 2013-06-20-guard-702_targeting_procedures.pdf
  • 2013-06-27-guard-2007_memo_on_us_person_metadata.pdf
  • 2013-06-27-guard-nsa_oig_2009_report.pdf
  • 2013-062-9-wapo-prism.pdf
  • 20130630-guard-dropmire_.pdf
  • 20130710-wapo-upstream.pdf
  • 20130731-guard-xkeyscore_training_slides.pdf
  • 20130809-guard-702_glossary.pdf
  • 20130816-wapo-sid_oversight.pdf
  • 20130816-wapo-so_you_got_a_us_person.pdf
  • 20130816-wapo-sso_news_article.pdf
  • 20130816-wapo-targeting_rationale.pdf
  • 20130830_cryptome_congressional_budget_2013.pdf
  • 20130903-globo-satc.pdf
  • 20130905-guard-bullrun.pdf
  • 20130905-guard-cryptanalysis_classification.pdf
  • 20130905-guard-sigint_enabling.pdf
  • 20130908-globo-stormbew_tv.pdf
  • 20130908-globo-stormbrew_tv.pdf
  • 20130908-globo-tv.pdf
  • 20130909-spiegel-smartphones-(1).pdf
  • 20130911-guard-israel_sharing_0.pdf
  • 20130916-spiegel-credit_card_transactions.pdf
  • 20130920-spiegel-belgacom.pdf
  • 20130928-nyt-contact_chaining.pdf
  • 20130928-nyt-syanpse.pdf
  • 20131004-guard-egotistical_giraffe-(1).pdf
  • 20131004-guard-iat_tor.pdf
  • 20131004-guard-tor_stinks.pdf
  • 20131004-wapo-gchq_mullenize.pdf
  • 20131004-wapo-tor.pdf
  • 20131014-wapo-collection_optimization.pdf
  • 20131014-wapo-content_acquisition_optimization1.pdf
  • 20131014-wapo-content_acquisition_optimization2.pdf
  • 20131020-spiegel-mexican_president.pdf
  • 20131021-monde-boundless_informant_france.pdf
  • 20131021-monde-close_access_sigads.pdf
  • 20131021-monde-wanadoo_alcatel.pdf
  • 20131022-monde-prism_april_2013.pdf
  • 20131024-guard-phones_world_leaders.pdf
  • 20131025-monde-french_cyberattacks.pdf
  • 20131027-spiegel-embassy.pdf
  • 20131028-mundo-spain_collections-(1).pdf
  • 20131028-mundo-spain_collections.pdf
  • 20131030-wapo-muscular.pdf
  • 20131030-wapo-muscular_smiley.pdf
  • 20131101-guard-corporate_reporting.pdf
  • 20131104-mundo-boundless_informant.pdf
  • 20131104-mundo-info_sharing_partners.pdf
  • 20131104-nyt-collection_accesses.pdf
  • 20131104-nyt-sigint_goals.pdf
  • 20131104-nyt-sigint_strategic_plan.pdf
  • 20131104-wapo-optimization_google.pdf
  • 20131104-wapo-sso_overview.pdf
  • 20131104-wapo-windstop.pdf
  • 20131117-guardian-dsd_3g.pdf
  • 20131117-spiegel-royal_concierge.pdf
  • 20131119-dagbladet-norway_collection_0.pdf
  • 20131119-odni-ag_guidelines_for_domestic_fbi_operations-(1).pdf
  • 20131119-odni-interim_competency_test_for_access_to_fisa_data.pdf
  • 20131119-odni-nsa_core_intelligence_oversight_training.pdf
  • 20131119-odni-nsa_course_materials_intro_v.13.pdf
  • 20131119-odni-nsa_course_materials_module_1_v.17.pdf
  • 20131119-odni-nsa_course_materials_module_2_v.16.pdf
  • 20131119-odni-nsa_course_materials_module_3_v.22.pdf
  • 20131119-odni-nsa_course_materials_module_4_v.28.pdf
  • 20131119-odni-nsa_course_materials_module_5_v.24.pdf
  • 20131119-odni-nsa_course_materials_module_6_analytic_personal_v.18.pdf
  • 20131119-odni-nsa_course_materials_module_6_tech_personnel_v.25.pdf
  • 20131119-odni-nsa_cryptological_school_course_slides_on_legal_compliance_and_minimization_procedures.pdf
  • 20131119-odni-nsa_guidance_memo_on_legal_standards_for_searching_bulk_metadata.pdf
  • 20131119-odni-nsa_metadata_collection_training_slides_.pdf
  • 20131119-odni-nsa_summary_of_requirements_for_collection_of_bulk_metadata.pdf
  • 20131119-odni-office_of_general_council_business_record_analyst_training_slides.pdf
  • 20131119-odni-united_states_signals_intelligence_directive_18_appendix_j.pdf
  • 20131119-odni-united_states_signals_intelligence_directive_18_jan_25_2011.pdf
  • 20131119-odni-verification_slide.pdf
  • 20131120-guard-collection_processing_and_dissemination_of_allied_communications.pdf
  • 20131122-dagbladet-afghanistan_collection.pdf
  • 20131122-dagbladet-boundless_informant.pdf
  • 20131122-dagbladet-boundless_informant_faq.pdf
  • 20131123-nrc-nsa_malware.pdf
  • 20131123-nyt-sigint_strategy_feb_2012.pdf
  • 20131126-huffpo-radicalizers_pornography.pdf
  • 20131126-wapo-microsoft_cloud_exploitation.pdf
  • 20131126-wapo-microsoft_monkey_puzzle.pdf
  • 20131130-GlobeandMail-csec-br-spy.pdf
  • 20131202-cbc-g20.pdf
  • 20131202-guard-dsd_data.pdf
  • 20131204-wapo-chalkfun_foreignness.pdf
  • 20131204-wapo-fascia-(1).pdf
  • 20131204-wapo-fascia.pdf
  • 20131205-espresso-italy_spying.pdf
  • 20131205-svt-fra_russia.pdf
  • 20131209-nyt-nsa_games.pdf
  • 20131210-cbc-nsa_csec_partnership-(1).pdf
  • 20131210-cbc-nsa_csec_partnership.pdf
  • 20131210-wapo-cotraveler_overview.pdf
  • 20131210-wapo-ghost_machine.pdf
  • 20131210-wapo-gsm_classification_guide.pdf
  • 20131210-wapo-location_cookies.pdf
  • 20131210-wapo-target_location-(1).pdf
  • 20131210-wapo-target_location.pdf
  • 20131211-svt-accomplishments_from_nsa.pdf
  • 20131211-svt-baltic_region-(1).pdf
  • 20131211-svt-baltic_region.pdf
  • 20131211-svt-final_agenda_sweden_usa.pdf
  • 20131211-svt-legal_issues_uk_regarding_sweden_and_quantum.pdf
  • 20131211-svt-nsa_internal_pm_on_fra.pdf
  • 20131211-svt-nsa_slides_xkeyscore.pdf
  • 20131211-svt-quantum_from_gchq.pdf
  • 20131211-svt-sweden_neutral.pdf
  • 20131211-svt-xkeyscore_slide_with_swedish_example.pdf
  • 20131211-svt-xkeyscore_sources.pdf
  • 20131211-svt-xkeyscore_sweden_meeting.pdf
  • 20131223-wapo-nsacss-mission.pdf
  • 20131230-appelbaum-nsa_ant_catalo.pdf
  • 20131230-appelbaum-nsa_ant_catalog.pdf
  • 20131230-spiegel-qfire.pdf
  • 20131230-spiegel-tao_intro.pdf
  • 20131230-spiegel-tao_quantum_tasking.pdf
  • 20131230-spiegel-tao_quantum_theory.pdf
  • 20140102-wapo-quantum_computers_hard_targets.pdf
  • 20140102-wapo-quantum_computing.pdf
  • 20140116-guard-dishfire_presentation.pdf
  • 20140127-nbc-squeaky_dolphin.pdf
  • 20140127-nyt-converged_analysis_on_smartphone_devices.pdf
  • 20140127-nyt-mobile_theme_briefing.pdf
  • 20140128-guard-leaky_phone_apps.pdf
  • 20140128-guard-leaky_phone_apps_0.pdf
  • 20140130-information_dk-cop15_interception_document.pdf
  • 20140131-cbc-csec_airport_wifi_tracking.pdf
  • 20140204-nbc-british_spies_attacked_hactivist_anonymous.pdf
  • 20140207-nbc-gchq_honey_trap_cyber_attack_background_on_jtrig.pdf
  • 20140207-nbc-gchq_honey_trap_cyber_attack_leveraging_foreign_journalists_via_jtrig.pdf
  • 20140207-nrc-boundless_nederland.pdf
  • 20140211-intercept-drones_intercepting_communications.pdf
  • 20140218-intercept-discovery_sigint_targeting_scenarios_and_compliance.pdf
  • 20140218-intercept-gchq_sigdev_.pdf
  • 20140224-intercept-training_for_covert_online_operations.pdf
  • 20140227-guard-gchq_optic.pdf
  • 20140303-epic-doj_report_on_pen_register_fisa_orders.pdf
  • 20140305-nrc-dutch_shares_collected_anti-piracy_information_with_nsa.pdf
  • 20140307-intercept-nsa_ask_zelda_an_interview_with_zelda.pdf
  • 20140307-intercept-nsa_ask_zelda_guilty_until_proven_innocent.pdf
  • 20140307-intercept-nsa_ask_zelda_is_bain_de_soleil_a_bane_on_the_nsa.pdf
  • 20140307-intercept-nsa_ask_zelda_watching_every_word_in_snitch_city.pdf
  • 20140311-nyt-ashcroft_memo_on_intelligence_sharing_procedures.pdf
  • 20140311-nyt-classification_guide_for_fisa_the_protect_america_act_and_the_fisa_amendments_act.pdf
  • 20140311-nyt-classification_guide_for_stellarwind_program_0.pdf
  • 20140311-nyt-nsa_memo_expands_access_to_fisa_information.pdf
  • 20140311-nyt-nsa_timeline_of_surveillance_law_developments.pdf
  • 20140312-intercept-five_eyes_hacking_large_routers.pdf
  • 20140312-intercept-increasing_collection_capacity_by_increasing_implants.pdf
  • 20140312-intercept-mhs_leverages_xkeyscore_for_quantum.pdf
  • 20140312-intercept-multiple_methods_of_quantum.pdf
  • 20140312-intercept-nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf
  • 20140312-intercept-nsa_selector_types.pdf
  • 20140312-intercept-nsa_technology_directorate_analysis_of_converged_data.pdf
  • 20140312-intercept-quantum_insert_diagrams.pdf
  • 20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf
  • 20140312-intercept-turbine_and_turmoil.pdf
  • 20140312-intercept-turbine_industrial_scale_exploitation.pdf
  • 20140312-intercept-vpn_and_voip_exploitation_with_hammerchant_and_hammerstein.pdf
  • 20140313-intercept-nsa_cooperative_third_party_relationships.pdf
  • 20140315-intercept-turbine_intelligence_command_and_control-(1).pdf
  • 20140315-intercept-turbine_intelligence_command_and_control-(2).pdf
  • 20140315-intercept-turbine_intelligence_command_and_control.pdf
  • 20140318-wapo-adding_another_country_to_mystic_program.pdf
  • 20140318-wapo-description_of_data_collection_under_mystic-(1).pdf
  • 20140318-wapo-description_of_data_collection_under_mystic.pdf
  • 20140318-wapo-mystic_program.pdf
  • 20140320-intercept-targeting_system_administrator_accounts.pdf
  • 20140321-le_monde-french_intelligence_e-mail_spying_operation-(1).pdf
  • 20140321-le_monde-french_intelligence_e-mail_spying_operation.pdf
  • 20140322-nyt-operation_shotgiant_objectives.pdf
  • 20140329-der_spiegel-gchq_and_nsa_spy_on_heads_of_state.pdf
  • 20140404-intercept-2009_sigdev_conference.pdf
  • 20140404-intercept-gchq_full_spectrum_cyber_effects.pdf
  • 20140430-intercept-gchq_visit.pdf
  • 20140430-intercept-ghostmachine.pdf
  • 20140430-intercept-prism_olympics.pdf
  • 20140513-greenwald-noplacetohidedocuments.pdf
  • 20140519-intercept-black_budget.pdf
  • 20140519-intercept-dea_warfighter.pdf
  • 20140519-intercept-mystic.pdf
  • 20140519-intercept-somalget.pdf
  • 20140519-intercept-sso_dictionary_excerpt.pdf
  • 20140519-intercept-sso_mystic_charts.pdf
  • 20140531-nyt-identity-intelligence.pdf
  • 20140610-Cryptome-dea-nsa-sandkey.pdf - Voice intercepts are translated and gisted by immigrant Hispanics.
  • 20140616-der_spiegel-analytics_for_targets_in_europe_0.pdf
  • 20140616-der_spiegel-xkeyscore_fingerprints_1.pdf
  • 20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker-(1).pdf
  • 20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker.pdf
  • 20140618-DerSpiegel-agenda_for_the_visit_of_bsi_vice_president_andreas_konen_to_the_nsa.pdf
  • 20140618-DerSpiegel-internal_nsa_discussion_guidelines_relating_to_cooperation_with_the_bnd_and_bfv.pdf
  • 20140618-DerSpiegel-presentation_on_the_nsacia_unit_special_collection_service.pdf
  • 20140618-DerSpiegel-zoom_of_a_boundless_informant_document_with_project_names.pdf
  • 20140618-dagbladet-black_budget.pdf
  • 20140618-dagbladet-keith_alexander_talking_points.pdf
  • 20140618-der_spiegel-boundless_informant_overview_global.pdf
  • 20140618-der_spiegel-boundless_informant_statistics_for_so-called_third_parties.pdf
  • 20140618-der_spiegel-boundless_informant_statistics_on_data_from_22foreign_partners22.pdf
  • 20140618-der_spiegel-boundless_informant_statistics_on_germany.pdf
  • 20140618-der_spiegel-boundless_informant_statistics_on_the_uk.pdf
  • 20140618-der_spiegel-briefing_on_the_visit_to_the_nsa_of_a_high-ranking_bnd_official.pdf
  • 20140618-der_spiegel-cooperation_between_the_nsa_bnd_and_bfv.pdf
  • 20140618-der_spiegel-details_on_xkeyscore_from_an_internal_gchq_website.pdf
  • 20140618-der_spiegel-excerpt_on_the_sharing_of_xkeyscore_with_german_intelligence_agency_bfv.pdf
  • 20140618-der_spiegel-explanation_of_nymrod_a_system_for_searching_for_people_and_places_in_databases_and_documents.pdf
  • 20140618-der_spiegel-faqs_on_the_boundless_informant_program.pdf
  • 20140618-der_spiegel-final_agenda_of_a_meeting_between_high-ranking_nsa_and_bnd_officials.pdf
  • 20140618-der_spiegel-gchq_report_on_the_technical_abilities_of_tempora.pdf
  • 20140618-der_spiegel-guidelines_for_the_classification_of_nsa_sigint_details_1945-1967.pdf
  • 20140618-der_spiegel-guidelines_for_the_classification_of_suslag_details_and_the_nsa-bnd_cooperation.pdf
  • 20140618-der_spiegel-internal_nsa_presentation_on_the_bnds_organization_0.pdf
  • 20140618-der_spiegel-logo_of_nsa-bnd_cooperation.pdf
  • 20140618-der_spiegel-nostalgic_recollections_from_nsa_workers_formerly_stationed_in_bad_aibling.pdf
  • 20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod-(1).pdf
  • 20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod.pdf
  • 20140618-der_spiegel-nsacss_europe-_report_on_the_experiences_of_one_nsa_worker.pdf
  • 20140618-der_spiegel-nsacss_presentation_on_technical_surveillance_in_europe_and_africa.pdf
  • 20140618-der_spiegel-overview_of_the_use_of_boundless_informant_world_map.pdf
  • 20140618-der_spiegel-preliminary_agenda_of_a_meeting_between_nsa_and_bnd_officials.pdf
  • 20140618-der_spiegel-report_on_a_wharpdrive_incident_in_an_sso_presentation.pdf
  • 20140618-der_spiegel-report_on_an_nsa_sigdev_training_course_for_allied_countries_.pdf
  • 20140618-der_spiegel-report_on_an_nsa_visit_to_bnd_site_and_on_data_transfer_from_the_bnd_to_the_nsa.pdf
  • 20140618-der_spiegel-report_on_an_unexploded_ordnance_alarm_at_european_technical_centern.pdf
  • 20140618-der_spiegel-report_on_an_xkeyscore_training_session_at_the_ecc_dagger_complex.pdf
  • 20140618-der_spiegel-report_on_data_exchange_between_the_nsa_and_bnd_within_the_jsa_framework.pdf
  • 20140618-der_spiegel-report_on_the_beginnings_of_the_european_security_center_esc_in_the_dagger_complex.pdf
  • 20140618-der_spiegel-report_on_the_changing_of_the_escs_name_to_european_security_operations_center_esoc.pdf
  • 20140618-der_spiegel-report_on_the_nsas_access_to_tempora.pdf
  • 20140618-der_spiegel-report_on_the_one-year_anniversary_of_the_nsa_liaison_unit_suslag_in_bad_aibling.pdf
  • 20140618-der_spiegel-report_on_the_surveillance_of_african_countries_by_jsa.pdf
  • 20140618-der_spiegel-report_on_the_technical_expansion_of_the_european_technical_center_in_wiesbaden.pdf
  • 20140618-der_spiegel-report_on_the_work_of_nsacss_europe.pdf
  • 20140618-der_spiegel-restrictions_on_the_technical_surveillance_performed_by_jsa.pdf
  • 20140618-der_spiegel-us_sites_with_nsa_personnel_in_germany.pdf
  • 20140618-der_spiegel-world_map_from_the_boundless_informant_program.pdf
  • 20140630-WaPo-affidavit_of_keith_alexander_regarding_spying_on_foreign_entities.pdf
  • 20140630-WaPo-fisa_amendments_act_summary_document_1.pdf
  • 20140630-WaPo-fisa_judges_order_authorizing_surveillance_of_foreign_governments_and_organizations.pdf
  • 20140630-WaPo-list_of_governments_and_organizations_authorized_for_surveillance.pdf
  • 20140630-WaPo-odni_certification_regarding_foreign_entities.pdf
  • 20140709-Intercept-spying_on_muslim-american_leaders.pdf
  • 20140714-Intercept-jtrigall.pdf
  • 20140723-Intercept-March-2013-Watchlisting-Guidance.pdf
  • 20140723-WaPo-Post-Signals-Intelligence-Authority-Decision-Tree.pdf
  • 20140725-Intercept-Saudi-Arabia-Information-Paper.pdf
  • 20140803-Intercept-Israel-US-1999-Agreement.pdf
  • 20140803-Intercept-NSA-Intelligence-Relationship-With-Israel.pdf
  • 20140805-Intercept-Directorate-of-Terrorist-Identities-Strategic-Accomplishments-2013.pdf
  • 20140812-Intercept-GCHQ-Covert-Mobile-Phones-Policy.pdf
  • 20140815-Heise-HACIENDA-Program.pdf
  • 20140825-Intercept-CIA-Colleagues-Enthusiastically-Welcome-NSA-Training.pdf
  • 20140825-Intercept-CRISSCROSSPROTON-Point-Paper.pdf
  • 20140825-Intercept-DNI-Decision-Memorandum-on-ICREACH.pdf
  • 20140825-Intercept-ICREACH-Black-Budget-Extract.pdf
  • 20140825-Intercept-ICREACH-Sharing-SIGINT-Comms-Metadata-with-the-Intel-Community-Memo.pdf
  • 20140825-Intercept-ICREACH-Wholesale-Sharing.pdf
  • 20140825-Intercept-Metadata-Policy-Conference.pdf
  • 20140825-Intercept-Metadata-Sharing-Memorandum.pdf
  • 20140825-The-Intercept-Sharing-Communications-Metadata-Across-the-USIC-ICREACH.pdf
  • 20140831-Spiegel-NCRs-with-Foreign-Relations-Missions-Become-SUSLAs.pdf
  • 20140831-spiegel-collaboration_in_overdrive.pdf
  • 20140831-spiegel-iraq_uk_load_sharing_carriers.pdf
  • 20140831-spiegel-jordan_belgium.pdf
  • 20140831-spiegel-kurdistan_regional_government.pdf
  • 20140831-spiegel-nsa_intelligence_relationship_with_turkey.pdf
  • 20140831-spiegel-nsas_oldest_third_party_partnership-(1).pdf
  • 20140831-spiegel-nsas_oldest_third_party_partnership.pdf
  • 20140831-spiegel-sinio_seminar_tough_times_for_turkey-(1).pdf
  • 20140831-spiegel-sinio_seminar_tough_times_for_turkey.pdf
  • 20140831-spiegel-sinio_seminar_turkey_and_the_kurds.pdf
  • 20140831-spiegel-sinio_seminar_turkish_elections.pdf
  • 20140831-spiegel-turkey_and_the_pkk.pdf
  • 20140831-spiegel-turkey_at_the_g20_pre-meeting.pdf
  • 20140831-spiegel-turkey_energy_company_development.pdf
  • 20140831-spiegel-turkish_signal_intelligence_chief_agenda.pdf
  • 20140905-intercept-quadrennial_intelligence_community_review_final_report.pdf
  • 20140914-intercept-ferguson_visit_precis.pdf
  • 20140914-intercept-key_activities_in_progress.pdf
  • 20140914-intercept-speargun_phase_one.pdf
  • 20140914-intercept-speargun_underway.pdf
  • 20140914-spiegel-satellite_teleport_knowledge.pdf
  • 20140914-spiegel-treasure_map_announces_a_new_release-(1).pdf
  • 20140914-spiegel-treasure_map_announces_a_new_release.pdf
  • 20140914-spiegel-treasure_map_presentation-(1).pdf
  • 20140914-spiegel-treasure_map_presentation.pdf
  • 20141010-intercept-cno_core_secrets_security_structure.pdf
  • 20141010-intercept-cno_core_secrets_slide_slices.pdf
  • 20141010-intercept-computer_network_exploitation_classification_guide.pdf
  • 20141010-intercept-eci_compartments.pdf
  • 20141010-intercept-eci_pawleys_classification_guide.pdf
  • 20141010-intercept-eci_whipgenie_classification_guide.pdf
  • 20141010-intercept-exceptionally_controlled_information_listing.pdf
  • 20141010-intercept-sentry_eagle_brief_sheet.pdf
  • 20141010-intercept-tarex_classification_guide.pdf
  • 20141125-sueddeutsche-access_breakdown.pdf
  • 20141125-sz-cable_master_list_ac.pdf
  • 20141125-sz-cable_master_list_fea.pdf
  • 20141125-sz-cable_regions.pdf
  • 20141125-sz-cables_no_current_access.pdf
  • 20141125-sz-cables_where_we_are.pdf
  • 20141125-sz-cables_where_we_want_to_be.pdf
  • 20141125-sz-cne_endpoint_project_load.pdf
  • 20141125-sz-mti_access_project_weekly_status_february_6_2009.pdf
  • 20141125-sz-mti_access_project_weekly_status_june_27_2008.pdf
  • 20141125-sz-mti_access_project_weekly_status_november_28_2008.pdf
  • 20141125-sz-partner_cables.pdf
  • 20141125-sz-ptc_glossary.pdf
  • 20141125-sz-windstop_system_highlights.pdf
  • 20141204-intercept-auroragold_project_overview.pdf
  • 20141204-intercept-auroragold_target_technology_trends_center_support_to_wpmo_0.pdf
  • 20141204-intercept-auroragold_working_aid.pdf
  • 20141204-intercept-auroragold_working_group.pdf
  • 20141204-intercept-ir21_a_technology_warning_mechanism_0.pdf
  • 20141204-intercept-nsa_first_ever_collect_of_high_interest_4g_cellular_signal.pdf
  • 20141204-intercept-nsa_gchq_csec_network_tradecraft_advancement.pdf
  • 20141204-intercept-opulant_pup_encryption_attack.pdf
  • 20141204-intercept-wolframite_encryption_attack-(1).pdf
  • 20141204-intercept-wolframite_encryption_attack.pdf
  • 20141214-Intercept-gchq-mobile-networks-in-my-noc-world.pdf
  • 20141214-intercept-gchq_automated_noc_detection.pdf
  • 20141214-intercept-gchq_hopscotch.pdf
  • 20141214-intercept-gchq_making_network_sense_of_the_encryption.pdf
  • 20141214-intercept-gchq_nac_review_april_june_2011.pdf
  • 20141214-intercept-gchq_nac_review_january_march_2012.pdf
  • 20141214-intercept-gchq_nac_review_july_sept_2011.pdf
  • 20141214-intercept-gchq_nac_review_october_december_2011.pdf
  • 20141214-intercept-gchq_stargate_cne_requirements.pdf
  • 20141228-speigel-a_potential_technique_to_deanonymise_users_of_the_tor_network_0.pdf
  • 20141228-speigel-analysis_from_ssl-tls_connections_through_gchq_in_the_flying_pig_database_0.pdf
  • 20141228-speigel-analytic_challenges_from_active-passive_integration_when_nsa_attacks_ipsec_vpns_0.pdf
  • 20141228-speigel-analytics_on_security_of_tor_hidden_services_0.pdf
  • 20141228-speigel-bluesnort_program_on_net_defense_from_encrypted_communications_0.pdf
  • 20141228-speigel-canadian_document_from_ces_on_tls_trends_0.pdf
  • 20141228-speigel-classification_guide_for_cryptanalysis_0.pdf
  • 20141228-speigel-decryption_of_vpn_connections_within_the_valiantsurf_program_0.pdf
  • 20141228-speigel-description_of_existing_projects_on_vpn_decryption_0.pdf
  • 20141228-spiegel-_national_information_assurance_research_laboratory_niarl_tundra.pdf
  • 20141228-spiegel-description_of_voip_telephony_encryption_methods_and_other_ways_to_attack.pdf
  • 20141228-spiegel-description_on_the_processing_of_vpn_data_packets_within_the_turmoil_program.pdf
  • 20141228-spiegel-explanation_of_a_potential_technique_to_deanonymise_users_of_the_tor_network.pdf
  • 20141228-spiegel-explanation_of_the_gallantwave_that_decrypts_vpn_traffic_within_longhaul.pdf
  • 20141228-spiegel-explanation_of_the_poisennut_product_and_its_role_when_attacking_vpn.pdf
  • 20141228-spiegel-explanation_of_the_transform_engine_emulator_when_attacking_vpn.pdf
  • 20141228-spiegel-explanation_of_the_turmoil_gallantwave_program_and_its_role_when_attacking_vpn_0.pdf
  • 20141228-spiegel-explanation_on_the_spin9_program_on_end-to-end_attacks_on_vpn.pdf
  • 20141228-spiegel-gchq_briefing_on_the_bullrun_program.pdf
  • 20141228-spiegel-gchq_presentation_on_the_bullrun_programs_decryption_capabilities.pdf
  • 20141228-spiegel-general_description_how_nsa_handles_encrypted_traffic.pdf
  • 20141228-spiegel-guide_for_analysts_on_how_to_use_the_prism_skype_collection.pdf
  • 20141228-spiegel-intercept_with_otr_encrypted_chat.pdf
  • 20141228-spiegel-intercept_with_pgp_encrypted_message.pdf
  • 20141228-spiegel-intro_to_the_vpn_exploitation_process_mentioning_the_protocols_attacked_-_pptp_ipsec_ssl_ssh.pdf
  • 20141228-spiegel-malibu_architecture_overview_to_exploit_vpn_communication.pdf
  • 20150117-speigel-analysis_of_chinese_methods_and_performed_actions_in_the_context_of_computer_network_exploitation.pdf
  • 20150117-speigel-classification_guide_for_computer_network_exploitation_cne.pdf
  • 20150117-speigel-combination_of_offensive_and_defensive_missions_-_how_fourth-party_missions_are_being_performed.pdf
  • 20150117-speigel-csec_document_about_the_recognition_of_trojans_and_other_network_based_anomaly_.pdf
  • 20150117-speigel-csec_document_on_the_handling_of_existing_trojans_when_trojanizing_computers.pdf
  • 20150117-speigel-document_about_the_expansion_of_the_remote_operations_center_roc_on_endpoint_operations.pdf
  • 20150117-speigel-document_explaining_the_role_of_the_remote_operations_center_roc.pdf
  • 20150117-Snowglobe_in_which_a_suspected_french_government_trojan_is_analyzed_to_find_out_if_it_can_be_helpful_for_own_interests_0.pdf
  • 20150117-spiegel-nsa_fourth_party_access_-_i_drink_your_milkshake_.pdf
  • 20150117-spiegel-nsa_program_tutelage_to_instrumentalize_third_party_attack_tools.pdf
  • 20150117-spiegel-nsa_project_description_to_recognize_and_process_data_that_comes_from_third_party_attacks_on_computers.pdf
  • 20150117-spiegel-nsa_training_course_material_on_computer_network_operations-(1).pdf
  • 20150117-spiegel-nsa_training_course_material_on_computer_network_operations.pdf
  • 20150117-spiegel-overview_of_methods_for_nsa_integrated_cyber_operations_0.pdf
  • 20150117-spiegel-overview_of_the_transgression_program_to_analyze_and_exploit_foreign_cna-cne_exploits.pdf
  • 20150117-spiegel-overview_on_the_nsa_use_of_bots_and_the_defiantwarrior_program.pdf
  • 20150117-spiegel-process_analysts_choose_their_data_requirement_and_then_get_to_know_the_tools_that_can_do_the_job_0.pdf
  • 20150117-spiegel-projects_of_the_tao-ato_department_such_as_the_remote_destruction_of_network_cards.pdf
  • 20150117-spiegel-quantumtheory_is_a_set_of_technologies_allowing_man-on-the-side_interference_attacks_on_tcp-ip_connections_includes_straightbizarre_and_daredev.pdf
  • 20150117-spiegel-report_of_an_nsa_employee_about_a_backdoor_in_the_openssh_daemon.pdf
  • 20150117-spiegel-sample_code_of_a_malware_program_from_the_five_eyes_alliance.pdf
  • 20150117-spiegel-supply-chain_interdiction_-_stealthy_techniques_can_crack_some_of_sigints_hardest_targets.pdf
  • 20150117-spiegel-technical_description_of_the_fashioncleft_protocol_.pdf
  • 20150117-spiegel-the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa_0.pdf
  • 20150128-cbc-cse_presentation_on_the_levitation_project.pdf
  • 20150128-intercept-cse_presentation_on_the_levitation_project.pdf
  • 20150204-intercept-lovely_horse_0.pdf
  • 20150204-intercept-nato_civilian_intelligence_council_cyber_panel.pdf
  • 20150204-intercept-open_source_for_cyber_defence_progress.pdf
  • 20150204-intercept-who_else_is_targeting_your_target_collecting.pdf
  • 20150210-intercept-iran_current_topics_-_interactions_with_gchq.pdf
  • 20150219-Intercept-CCNE-Email-Addresses-Jan10-Mar10-Trial.pdf
  • 20150219-Intercept-CCNE-Email-Harvesting-Jan10-Mar10-Trial.pdf
  • 20150219-Intercept-CCNE-Stats-Summaries-Jan10-Mar10-Trial.pdf
  • 20150219-Intercept-CCNE-Successes-Jan10-Mar10-Trial.pdf
  • 20150219-Intercept-CNE-Access-to-Core-Mobile-Networks.pdf
  • 20150219-Intercept-Dapino-Gamma-CNE-Presence-Wiki.pdf
  • 20150219-Intercept-Dapino-Gamma-Gemalto-Yuaawaa-Wiki.pdf
  • 20150219-Intercept-Dapino-Gamma-Target-Personalisation-Centres.pdf
  • 20150219-Intercept-IMSIs-Identified-With-Ki-Data-For-Network.pdf
  • 20150219-Intercept-PCS-Harvesting-At-Scale.pdf
  • 20150219-Intercept-Where-are-These-Keys.pdf
  • CLEANED004.-Cover_Memo-Sealed.pdf
  • CLEANED007.-CongNotificationInfoMemoSSCI_10_Apr_09-Sealedpdf.pdf
  • CLEANED032.-Basket_2_-_NSA_training.log.pdf
  • CLEANED096.-NSA_summary_of_BR_requirements_(maybe_Feb_2009)-.pdf
  • CLEANEDFinal-USSID_SP0018.pdf
  • CLEANEDFinal-USSID_SP0018_Annex_J.pdf
  • CLEANEDPRTT-1.pdf
  • CLEANEDPRTT-2.pdf
  • EDVARD SNOWDEN COVERPHOTO.jpg
  • FAA-Certification-Renewals-with-Caveats.pdf
  • FAA-Certification_Renewals_with_Caveats.pdf
  • FAA-Minimization-Procedures.pdf
  • FAA-Minimization_Procedures.pdf
  • FAA-Targeting_Procedures.pdf
  • FISC-Order,-BR-06-12.pdf
  • FISC-Order,_BR_06-12.pdf
  • General-Alexander-Letter-re-NSA-Fact-Sheet-Inaccuracy.pdf
  • General-Alexander_Letter_re_NSA_Fact_Sheet_Inaccuracy.pdf
  • Judge-Walton-Answers-to-Questions-re-FISC.pdf
  • Judge-Walton_Answers_to_Questions_re_FISC.pdf
  • Lesson-4_-_So_you_got_US_Person_Information.pdf
  • NSA broke privacy rules thousands of times per year, audit finds - The Washington Post.pdf
  • NSA-Boundless-Informant-Frequently-Asked-Questions.pdf
  • NSA-Boundless_Informant_Frequently_Asked_Questions.pdf
  • NSA-Boundless_Informant_Powerpoint_Slides.pdf
  • NSA-IG_Report.pdf
  • NSA-Memo-to-DOD---Proposed-Amendment-to-Conduct-Analysis-of-Metadata.pdf
  • NSA-Memo_to_DOD_-_Proposed_Amendment_to_Conduct_Analysis_of_Metadata.pdf
  • NSA-Missions-Authorities-Oversight-and-Partnerships.pdf
  • NSA-Missions_Authorities_Oversight_and_Partnerships.pdf
  • NSA-Section-702-and-Section-215-Factsheets.pdf
  • NSA-Section_702_'Loop_Hole'.pdf
  • NSA-Section_702_and_Section_215_Factsheets.pdf
  • NSA-XKeyscore-Powerpoint.pdf
  • NSA-XKeyscore_Powerpoint.pdf
  • PRISM-Overview-Powerpoint-Slides.pdf
  • PRISM-Overview_Powerpoint_Slides.pdf
  • PRISM-Powerpoint-Slides-re-Data-Acquisition.pdf
  • PRISM-Powerpoint_Slides_re_Data_Acquisition.pdf
  • README.txt
  • SECRET-FISA-Court-Warrant-Authorising-NSA-Surveillance-Procedures.pdf
  • SECRET-Justice-Department-NSA-Memos-Proposing-Broader-Powers-for-NSA-to-Collect-Data.pdf
  • SID-Oversight-and-Compliance.pdf
  • SID-Oversight_and_Compliance.pdf
  • Section-215---Obama-Administration-White-Paper.pdf
  • Section-215---Primary-Order.pdf
  • Section-215---Secondary-Order---Verizon.pdf
  • Section-215_-_Obama_Administration_White_Paper.pdf
  • Section-215_-_Primary_Order.pdf
  • Section-215_-_Secondary_Order_-_Verizon.pdf
  • TOP SECRET-1qcy12-violations.pdf
  • TOP SECRET-sso-news-article.pdf
  • TOP SECRET-target-analyst-rationale-instructions-final.pdf
  • TOP-SECRET-FISA-Court-Order-Requiring-Verizon-to-Hand-Over-All-Customer-Call-Data-to-NSA.pdf
  • TOP-SECRET-NSA PRISM slide show.pdf
  • TOP-SECRET-NSA-Boundless-Informant-Slides.pdf
  • TOP-SECRET-NSA-XKeyscore-Presentation-2008.pdf
  • TOP-SECRET-Presidential-Directive-Obama-Orders-US-to-Draw-Up-Overseas-List-for-Cyber-Attacks.pdf
  • TOP-SECRET-Procedures-Used-by-NSA-to-Target-Non-US-Persons-Exhibit-A.pdf
  • Targeting-Rationale---TAR.pdf
  • Targeting-Rationale_-_TAR.pdf
  • UNCLASSIFIED-NSA-Boundless-Informant-FAQ.pdf
  • UNCLASSIFIED-lesson-4-job-aid-usp-info.pdf
  • UPSTREAM-Powerpoint-Slide.pdf
  • UPSTREAM-Powerpoint_Slide.pdf
  • What_We_Need_to_Learn_from_Snowden.pdf
  • Wyden-Udall-Letter-on-NSA-Fact-Sheet-Inaccuracy.pdf
  • Wyden-Udall-Letter_on_NSA_Fact_Sheet_Inaccuracy.pdf
  • _20131119-odni-nsa_course_materials_module_4_v.28.pdf
  • ambassadesFrance.pdf
  • blackhat-Alexander-keynote.pdf
  • bullrun-briefing-sheet-from-gchq.pdf
  • ccne-email-addresses-jan10-mar10-trial.pdf
  • ccne-email-harvesting-jan10-mar10-trial.pdf
  • ccne-stats-summaries-jan10-mar10-trial.pdf
  • ccne-successes-jan10-mar10-trial.pdf
  • cne-access-to-core-mobile-networks.pdf
  • csec-br-spy.pdf
  • dapino-gamma-cne-presence-wiki.pdf
  • dapino-gamma-gemalto-yuaawaa-wiki.pdf
  • dapino-gamma-target-personalisation-centres.pdf
  • discovery-sigint-targeting-scenarios-and.pdf
  • doc-6-cyber-threat-capabilities.pdf
  • doj-nsa-memo.pdf
  • doody.pdf
  • dsd-3g.pdf
  • ericsson_reply.pdf
  • europebriefingnote_en.pdf
  • eyes_wide_open_v1.pdf
  • gchq-g20-spy.pdf
  • gchq-mullenize.pdf
  • gchq-royal-concierge-de.pdf
  • gchq-se-fra-quantum-3.pdf
  • i-hunt-sys-admins.pdf
  • identity-intelligence.pdf
  • imsis-identified-with-ki-data-for-network.pdf
  • invisibility-report-9-0-final.pdf
  • jtrigall.pdf
  • letter_to_companies.pdf
  • media-34093.pdf
  • media-35509.pdf Cryptanalytic Services - TOP SECRET - STRAP ONE
  • media-35510.pdf
  • media-35511.pdf
  • media-35512.pdf
  • media-35513.pdf
  • media-35514.pdf
  • media-35515.pdf
  • media-35516.pdf Network Implants. TAO/TURMOIL/BRAVENICKEL/HAMMERMILL/HAMMERSTEIN.
  • media-35517.pdf
  • media-35518.pdf
  • media-35519.pdf
  • media-35520.pdf
  • media-35521.pdf
  • media-35522.pdf
  • media-35523.pdf
  • media-35524.pdf
  • media-35525.pdf
  • media-35526.pdf
  • media-35527.pdf
  • media-35528.pdf
  • media-35529.pdf
  • media-35530.pdf
  • media-35531.pdf
  • media-35532.pdf
  • media-35533.pdf
  • media-35534.pdf
  • media-35535.pdf
  • media-35536.pdf
  • media-35537.pdf
  • media-35538.pdf
  • media-35539.pdf
  • media-35540.pdf
  • media-35541.pdf
  • media-35542.pdf
  • media-35543.pdf
  • media-35544.pdf
  • media-35545.pdf
  • media-35546.pdf
  • media-35547.pdf
  • media-35548.pdf
  • media-35549.pdf
  • media-35550.pdf
  • media-35551.pdf
  • media-35552.pdf
  • media-35653.pdf
  • media-35654.pdf
  • media-35655.pdf
  • media-35656.pdf
  • media-35657.pdf
  • media-35658.pdf
  • media-35659.pdf
  • media-35661.pdf
  • media-35662.pdf
  • media-35663.pdf
  • media-35664.pdf
  • media-35665.pdf
  • media-35666.pdf
  • media-35667.pdf
  • media-35668.pdf
  • media-35669.pdf
  • media-35670.pdf
  • media-35671.pdf
  • media-35672.pdf
  • media-35673.pdf
  • media-35674.pdf
  • media-35675.pdf
  • media-35676.pdf
  • media-35677.pdf
  • media-35678.pdf
  • media-35680.pdf
  • media-35681.pdf
  • media-35682.pdf
  • media-35683.pdf
  • media-35684.pdf
  • media-35685.pdf
  • media-35686.pdf
  • media-35687.pdf
  • media-35688.pdf
  • media-35689.pdf
  • no-place-to-hide.pdf
  • nokia_reply.pdf
  • nsa-5-eyes-partners.pdf
  • nsa-5-eyes-spy-g20-dk.pdf
  • nsa-boundless-informant-faq.pdf
  • nsa-boundless-informant-slides.pdf
  • nsa-boundless-informant.pdf
  • nsa-boundlessinformant-no-33m.pdf
  • nsa-bullrun-2-16-guardian-13-0905.pdf
  • nsa-bullrun-brief-nyt-13-0905.pdf
  • nsa-bullrun-brief-propublica-13-0905.pdf
  • nsa-cable-spy-types.pdf
  • nsa-catalog-appelbaum.pdf
  • nsa-chalkfun.pdf
  • nsa-close-access-sigads.pdf
  • nsa-cotraveler.pdf
  • nsa-cryptanalysis-2-12-guardian-13-0905.pdf
  • nsa-csec-partners.pdf
  • nsa-css-mission.pdf
  • nsa-dutch-sigint.pdf
  • nsa-egotisticalgiraffe.pdf
  • nsa-fascia.pdf
  • nsa-finance-spy-de.pdf
  • nsa-fisa-certification.pdf
  • nsa-fisa-minimization.pdf
  • nsa-fisa-targeting.pdf
  • nsa-g8-g20-spying-02.pdf
  • nsa-g8-g20-spying.pdf
  • nsa-gchq-fra-quantum.pdf
  • nsa-gchq-se-fra-comint.pdf
  • nsa-gchq-spy-games.pdf
  • nsa-ghost-machine.pdf
  • nsa-gsm-tracking.pdf
  • nsa-hosts-fr-spies.pdf
  • nsa-iat-tor.pdf
  • nsa-israel-spy.pdf
  • nsa-microsoft-cloud-exploit.pdf
  • nsa-muslim-porn.pdf
  • nsa-overcollection.pdf
  • nsa-ppd-20.pdf
  • nsa-prism-13-1021.pdf
  • nsa-prism-dk.pdf
  • nsa-prism-guardian-13-1101.pdf
  • nsa-quantum-computer-2.pdf
  • nsa-quantum-computer.pdf
  • nsa-quantum-tasking.pdf
  • nsa-quantumtheory.pdf
  • nsa-scissors-2.pdf
  • nsa-scissors.pdf
  • nsa-se-fra-quantum-2.pdf
  • nsa-se-fra-relationship.pdf
  • nsa-se-fra-ru-baltic.pdf
  • nsa-se-fra-spying-agenda.pdf
  • nsa-se-fra-xkeyscore-slide.pdf
  • nsa-se-fra-xkeyscore.pdf
  • nsa-se-spies.pdf
  • nsa-sigint-cryptologic-platform.pdf
  • nsa-sigint-enabling-guardian-13-0905.pdf
  • nsa-sigint-enabling-nyt-13-0905.pdf
  • nsa-sigint-enabling-propublica-13-0905.pdf
  • nsa-sigint-strategic-mission-2007.pdf
  • nsa-sigint-strategic-mission-2013.pdf
  • nsa-sigint-strategy-2012-2016.pdf
  • nsa-sigint-successes.pdf
  • nsa-smartphones-analysis.pdf
  • nsa-smartphones.pdf
  • nsa-sms-exploit.pdf
  • nsa-spy-games.pdf
  • nsa-sso-content.pdf
  • nsa-sso-dk.pdf
  • nsa-sso-overview.pdf
  • nsa-sso-slides.pdf
  • nsa-sso1-guardian-13-1101.pdf
  • nsa-sso2-guardian-13-1101.pdf
  • nsa-stellar-wind.pdf
  • nsa-tao-ant-pdf.pdf
  • nsa-tao-ant.pdf
  • nsa-tao-intro.pdf
  • nsa-target-location.pdf
  • nsa-tor-stinks.pdf
  • nsa-tor.pdf
  • nsa-verizon-spy.pdf
  • nsa-wanadoo-alcatel.pdf
  • nsa-windstop-muscular-incenser.pdf
  • nsa-windstop.pdf
  • nsa-xkeyscore-sources.pdf
  • nsa-xkeyscore-tor-slides.pdf
  • nsa-xkeyscore.pdf
  • nsa-yahoo-google-exploit.pdf
  • nsabullrun.pdf
  • pcs-harvesting-at-scale.pdf
  • phonesgchq.pdf
  • phonesnsa.pdf
  • psychology-a-new-kind-of-sigdev.pdf
  • rcs-9-admin-final.pdf
  • rcs-9-analyst-final.pdf
  • rcs-9-sysadmin-final.pdf
  • rcs-9-technician-final.pdf
  • remote-control-system-9-0-changelog-final.pdf
  • remote-control-system-9-1-changelog-final.pdf
  • samsung_reply.pdf
  • samsung_reply_2.pdf
  • saudi-arabia-information-paper.pdf
  • secret-procedures-used-by-nsa-to-minimize-data-collection-from-us-persons-exhibit-b.pdf
  • sigint-enabling-project.pdf
  • sigint-enabling-project2.pdf
  • spy-budget-fy13.pdf
  • the-art-of-deception-training-for-a-new.pdf
  • the-nsa-and-gchqs-quantumtheory-hacking-tactics.pdf
  • top-secret-gchq-g20-summit-spying-4-slides.pdf
  • top-secret-nsa-inspector-general-report-on-email-internet-data-collection-under-stellar-wind.pdf
  • turbine-and-turmoil.pdf
  • vpn-and-voip-exploitation-with-hammerchant.pdf
  • where-are-these-keys.pdf

  • https://restricteddocuments.com/nsadocuments/700-secret-pdf/index.htm







    The Federal Reserve are not FEDERAL at all.
    It's private. Owned by Rockefeller, Chemical Trust, a jewish bank and 5 more.
    But I don't have time to write about it.
    Basically, they can order the U.S. Mint to print any dollar value they wish to have in new $ 100 USD dollar money bills.
    So, as you can expect, the dollar value are almost down to zero. Air money. A giant worthless bubble that can pop the world economy.





    GO TO THE MAINFRAME FRONTPAGE HERE

    GO TO WORLDNEWS INTELLIGENCE RSS HERE









    USA-SELLS-AND-BUYS-THE-PLANET







    Apache Website Server at RESTRICTED DOCUMENTS™ Port 443 ENCRYPTED Communication Webserver Link.