2013 LEAKS          2014 LEAKS          2015 LEAKS          2016 LEAKS          2017 LEAKS  
IC off the Record 2017 - Complete list of 2017 NSA leaks
IC OFF THE RECORD:

Direct access to leaked information related to the surveillance activities of the U.S. Intelligence Community and their partners.

 

2017 INDEX:

 

OTHER YEARS:

2016   (View all)

2015   (View all)

2014   (View all)

2013   (View all)

 

EDWARD SNOWDEN:
View all  of his interviews, statements, testimony and appearances in 2013, 2014, 2015

 

RELATED CONTENT:

ANT Product Catalog
Black Budget
Boundless Informant
Petrobras Screenshots
PRISM slides
XKeyscore

About this website

 


Too much information? Visit the redacted IC ON THE RECORD website instead.

Your NSA dictionary:
NSA Nicknames and Codewords

NSA Files:  Decoded
What the revelations mean for you

Snowden Documents:
Snowden document search


Open Letter to Intelligence Employees

 


PARTNERS:

Five Eyes (FVEY)
US:   NSA
UK:   GCHQ
CA:   CSE
AU:   ASD
NZ:   GCSB

Nine Eyes (+4)
DK:   FE
FR:   DGSE
NL:   AIVD
NO:   NIS

Fourteen Eyes (+5)
BE:   GISS
DE:   BND
IT:   AISE
SP:   CNI
SE:   FRA

Vault 8: Source Code for CIA Software Projects

November 9, 2017

Vault 8 - WikiLeaks

RELATED: Vault 7: CIA Hacking Tools Revealed

 

HIVE

NSA JFK Assassination and Cuban Missile Crisis Classification Guides

October 25, 2017

NSA Concealed Records on JFK Assassination for Decades - The Intercept

NSA JFK Assassination guide
NSA JFK Assassination Records Classification Guide (4 pages)

 

NSA Cuban Missile Crisis guide
NSA Cuban Missile Crisis Classification Guide (5 pages)

PRISM Skype Collection Showed Saudi Prince Ordered Damascus Attack in 2013

October 24, 2017

NSA Document Says Saudi Prince Directly Ordered Coordinated Attack By Syrian Rebels On Damascus - The Intercept

NSA PRISIM Skype collection - Saudi Prince ordered Damascus attack
PRISM FAA Reporting Highlight (1 slide)

 

PRISM

Phone Data Downloaded at UK Border Searches Sent to GCHQ

September 23, 2017

Airport Police Demanded an Activist’s Passwords - The Intercept

GCHQ Phantom Parrot - phone data downloaded at border
GCWiki: PHANTOM PARROT (4 pages)

 

GCHQ FININT tasking - Lucky Strike and TRACFIN
GCWiki: FININT Tasking (4 pages)

 

PHANTOM PARROT; LUCKY STRIKE; LUCKY ESCAPE; TRACFIN

NSA Broke the Encryption on Some File-Sharing Apps

September 13, 2017

NSA Broke the Encryption on File-Sharing Apps Kazaa and eDonkey - The Intercept

NSA GRIMPLATE slides
GRIMPLATE: FIrst Steps Toward Identifying Adversarial Use of BitTorrent (16 slides)

 

SEBACIUM
GCWiki: SEBACIUM (5 pages)

 

Additional related documents in the SIDtoday - 2005 Collection below

 

GRIMPLATE; PACKAGEGOODS; SEBACIUM

NSA Base in Digby England

September 13, 2017

NSA’s Quiet Presence at a Base in England’s Countryside - The Intercept

SIGINT on Sudan
Producing best possible SIGINT on Sudan (2 pages)
NSA GCHQ Virtual teaming
Virtual teaming pays off (2 pages)

 

UK AIRHANDLER trainees
UK AIRHANDLER trainees (2 pages)
Digby geolocation
Digby geolocation (2 pages)

 

AIRHANDLER
AIRHANDLER missions Feb 2010 (1 page)
Cryptologic shore support
Cryptologic shore support (1 page)

 

NSA posture on Syria
NSA posture on Syria (3 pages)

 

NSA RARE weekly summaries
Event RARE weekly summaries (8 pages)

 

Additional related documents in the SIDtoday - 2005 Collection below

 

AIRHANDLER; RUM PUNCH; DISTILLARY

How the NSA Built a Secret Surveillance Network for Ethiopia

September 13, 2017

How the NSA Built a Secret Surveillance Network for Ethiopia - The Intercept

counter-terrorism targets
Opportunity against CT targets (2 pages)
NSA-Ethiopian relationship
NSA-Ethiopian relationship (3 pages)

 

US-Ethiopian SIGINT collection
US-Ethiopian SIGINT collection (2 pages)
NSA and Ethiopians SIGINT partnership
NSA and Ethiopians SIGINT partnership (2 pages)

 

Additional related documents in the SIDtoday - 2005 Collection below

   NSA's SIDtoday - 2005 Collection (Part 1)

September 13, 2017

The Snowden Archive - SIDtoday Files - The Intercept


Related stories:

Sloppy U.S. Spies Misused a Covert Network for Personal Shopping — and Other Stories

 

Download a zip file containing the 294 SIDToday articles



Pine Gap

August 18, 2017

The U.S. Spy Hub in the Heart of Australia - The Intercept

Pine Gap plays crucial role in America's wars - Australian Broadcasting Corporation

NSA Pine Gap profile
Pine Gap Site Profile (11 pages)

 

NSA Intelligence Relationship with Australia
NSA Intelligence Relationship with Australia (3 pages)

 

NSA RAINFALL (Pine Gap) Classification Guide
RAINFALL (Pine Gap) Classification Guide (4 pages)

 

NSA M7600 M8300 SIGINT Guide
M7600 M8300 SIGINT Guide (3 pages)

 

NRO SIGINT Guide Pine Gap
NRO SIGINT Guide Pine Gap (1 page)

 

RAINFALL

CSE Tracking Russian CNE Hackers (MAKERSMARK)

August 2, 2017

WH Says Russia’s Hackers Are Too Good But NSA Partner Called Them “Morons” - The Intercept

CSEC slides - Russian hackers
CSE: Hackers are Human Too (13 slide)

 

MAKERSMARK

Russian Hacking During the 2016 Election

June 5, 2017

Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election” - The Intercept

NSA document showing Russian Hacking during 2016 election
NSA Report on Russia Spearphishing (5 pages)

 



Japan's Secretive Relationship with the NSA

April 24, 2017

Japan Made Secret Deals with the NSA that Expanded Global Surveillance - The Intercept

NSA document showing SIGINT relationship with Japan
What Are the Japanese Like as SIGINTers (3 pages)
NSA document showing engineering facility in Japan
NSA opens new engineering support facility in Japan (2 pages)
NSA document showing relationship with Japan
The story behind the move (2 pages)

 

NSA document showing KAL airplane shootdown
The KAL 007 shootdown (1 page)
NSA document showing XKEYSCORE use by Japan
NSA Staff Processing form: XKEYSCORE (1 page)
NSA document showing relationship with Japan
NSA special SIGINT delivery (2 pages)

 

NSA document showing relationship with Japan
U.S. and Japan now exchanging collection from reconnaissance missions (1 page)
NSA document - MSOC - Misawa
Shift to software demodulation in Misawa expands collection, saves money (2 pages)
NSA SUSLAJ
NSA liaison in Tokyo opens new office (1 page)

 

NSA CROSSHAIR
CROSSHAIR: foreign partners filling HFDF gaps for the U.S. (1 page)
NSA document showing trade surveillance in Japan
NSA policy and trade surveillance of Japan (1 page)
NSA document showing cyber briefing with Japan
Japan official NSA visit, cyber briefing (2 pages)

 

NSA document high frequency HF collaboration with Japan
NSA High Frequency Collaboration (2 pages)

 



The NSA compromised the SWIFT Network

April 14, 2017

ShadowBrokers: The NSA compromised the SWIFT Network - Matt Suiche (Comae)

Shadow Brokers leak about NSA SWIFT network
NSA Texas Cryptologic Center slides (3 slides)

 

JEEPFLEA

NSA Report on 2001 Spy Plane Incident in China

April 10, 2017

Snowden Documents Reveal Scope of Secrets Exposed to China in 2001 Spy Plane Incident

NSA report on US spy plane incident in China
EP-3E Collision: Cryptologic Damage Assessment and Incident Review (117 pages)



How Palantir Helps the NSA and GCHQ

February 22, 2017

How Peter Thiel’s Palantir Helped the NSA Spy on the Whole World - The Intercept

GCHQ VisWeek 2008
GCHQ VisWeek 2008 Conference Report (14 pages)

 

Palantir Executive Summary
Palantir Executive Summary (5 pages)

 

NDIST Cyber Defence
NDIST Cyber Defence (2 pages)
TCP Innovation Forum
Mastering the Internet (1 page)

 

The Tale of Two Sources
The Tale of Two Sources (43 pages)

 

TWO FACE on GCHQ Wiki
GCWiki: TWO FACE (5 pages)

 

XKEYSCORE Helper Notes
XKEYSCORE Helper Notes (6 pages)

 

SDSG Integrated Analytics Workshop
SDSG Integrated Analytics Workshop (3 pages)

 

TWO FACE; LOVELY HORSE; XKEYSCORE

How the FBI Determines if Someone is a Likely Terrorist

February 13, 2017

48 Questions the FBI Uses to Determine if Someone Is a Likely Terrorist - The Intercept

FBI IMV terrorist survey - SECRET NOFORN
FBI: Indicators of Mobilization to Violence (IMV) Questions (7 pages)

 



FBI's Secret Rules

January 31, 2017

The FBI's Secret Rules - The Intercept



FBI Confidential Human Source Policy Guide - SECRET NOFORN
FBI Confidential Human Source Policy Guide (195 pages)

 

FBI Counterterrorism Policy Guide - SECRET NOFORN
FBI Counterterrorism Policy Directive and Policy Guide (76 pages)

 

FBI Domestic Investigations and Operations Guide - unredacted version
FBI Domestic Investigations and Operations Guide - with previous FBI redactions highlighted (656 pages)

 

FBI DIOG Profiling Rules 2016
2016 updates to FBI Domestic Investigations and Operations Guide related to profiling (4 pages)

 

FBI DIOG Classified Appendix G - Secret Noforn
FBI DIOG - Classified Appendix G - NSL's for news media (4 pages)

 

FBI Guidance on Guardian Assessments 2013
FBI Guidance Regarding Investigative Steps for Guardian Assessments (4 pages)

 

FBI CHS Confidential Human Source Assessing Aid - Anchorage Field Office
FBI Confidential Human Source Assessing Aid (11 pages)

 

FBI National Security Letters
FBI National Security Letters (5 pages)