2013 LEAKS          2014 LEAKS          2015 LEAKS          2016 LEAKS         2017 LEAKS          2018 LEAKS          2019 LEAKS         2020+ LEAKS  
IC off the Record - Complete listing of all the NSA leaks

Direct access to leaked information related to the surveillance activities of the U.S. Intelligence Community and their partners.


2013 INDEX:



2020+   (View all)

2019   (View all)

2018   (View all)

2017   (View all)

2016   (View all)

2015   (View all)

2014   (View all)


View all  of his interviews, statements, testimony and appearances in 2013, 2014, 2015



ANT Product Catalog
Black Budget
Boundless Informant
Petrobras Screenshots
PRISM slides

About this website


Too much information? Visit the redacted IC ON THE RECORD website instead.

Your NSA dictionary:
NSA Nicknames and Codewords

NSA Files:  Decoded
What the revelations mean for you

Snowden Documents:
Snowden document search

Open Letter to Intelligence Employees



Five Eyes (FVEY)

Nine Eyes (+4)
DK:   FE

Fourteen Eyes (+5)

TAO: Tailored Access Operations - NSA's Hacking Unit

December 29-30, 2013

Inside TAO: Documents Reveal Top NSA Hacking Unit

Quantum Theory: How US intelligence cracks computers worldwide (in German - translated)

Foxfire, quantum, validator, and olympusfire NSA slides


NSA quantum tasking techniques slides

DOCUMENTS:  NSA QUANTUM Tasking Techniques (28 slides)

nsa css Texas tao slides

DOCUMENTS:  NSA/CSS Texas - Tailored Access Operations (16 slides)

NSA qfire quantum slides

DOCUMENTS:  Forward-based Defense with QFIRE (16 slides)


Related:  NSA's TAO Division Codewords - Electrospaces.net



Edward Snowden's Christmas Message

December 25, 2013


More:  Edward Snowden - Interviews, Statements, and Appearances

Edward Snowden Interview / NSA Mission

December 23, 2013

Edward Snowden, after months of NSA revelations, says his mission’s accomplished

NSA internal October 2001 presentation about September 11 attacks
Two slides from an NSA internal presentation in October 2001 in response to the al-Qaeda attacks on the World Trade Center and the Pentagon

GCHQ:  Monitoring Germany, Israel, EU, and Aid Groups

December 20, 2013

Friendly Fire: How GCHQ Monitors Germany, Israel and the EU  (Der Spiegel)

N.S.A. Dragnet Included Allies, Aid Groups and Business Elite  (New York Times)

GCHQ and NSA targeted charities, Germans, Israeli PM and EU chief  (Guardian)

GCHQ DRUMROLL report targets - EU comm. Joaquín Almunia, Total, Thales, and UNIDIR United Nations Institute for Disarmament
Excerpt of GCHQ report published by Der Spiegel  (via @koenrh)



NIS:  Norway Spying for NSA

December 18, 2013

Snowden documents: Norway is NSA's dream partner

NSA Intelligence Relationship with Norway - 2013 Information paper
NSA Information Paper:  NSA Intelligence Relationship with Norway

December 17, 2013

Norway´s secret surveillance of Russian politics for the NSA

NSA Intelligence Relationship with Norway - 2013
Excerpts from the NSA Intelligence Relationship with Norway


VIEW RELATED LEAK:  Norway's NIS Acquires Supercomputer for Surveillance Data


Snowden quote - Today, a secret program authorized by a secret court was, when exposed to the light of day, found to violate Americans’ rights.

Edward Snowden on the Federal Court ruling re: NSA's phone data gathering program (Source)

FRA:  Sweden's Role in NSA Hacking;  FRA Uses XKEYSCORE

December 11, 2013

FRA part of top-secret hacker project

FRA has access to controversial surveillance system

VIDEO:  The Snowden Documents and Sweden with English subtitles

DOCUMENTS:  Read the Snowden Documents From the NSA

  1. Five Eyes and Third Party partners
  2. NSA Intelligence relationship with Sweden  (Previously revealed in related link)
  3. Legal issues UK regarding Sweden and Quantum
  4. Ingvar Åkesson/DIRNSA meeting 2013
  5. 2004 – the SE NEUTRAL agreement  (Previously revealed in related link)
  6. XKeyscore slide with Swedish example
  7. Sweden FRA collection in Russia and Baltic region  (Previously revealed in related link)
  8. Accomplishments - from NSA doc dated circa April 2013
  10. Quantum - from GCHQ documents dates October 2012
  11. NSA XKEYSCORE slides
  12. Xkeyscore Sources
NSA third party partners -  Denmark, Sweden, Norway, Belgium, Germany, France, Italy, the Netherlands and Spain.
Sweden status in the Intelligence Community: Sweden is a third-party partner

legal issues with UK and Sweden using Quantum Xkeyscore slide showing Swedish extremist website visitors Sweden accomplishment of trilateral Quantum
UK legal issues related to Sweden; XKEYSCORE slide with Swedish example; Accomplishments slide

NSA planning memo for SWEDUSA
Strategic planning memo for April 2013 SWEDUSA meeting between FRA and DIRNSA

Agenda for 2013 meeting between FRE and NSA
Final agenda for April 2013 SWEDUSA top-level meeting between the FRA and NSA

GCHQ memo about Quantum attacks
GCHQ memo describing how Quantum was used to attack computers in an African country where the users had visited extremist websites

Xkeyscore slides - tor log - slowing down the internet Xkeyscore sources
Xkeyscore slides describing Tor logs, storing 3-5 days content; Xkeyscore sources


VIEW RELATED LEAK:  Sweden Spying for NSA



NSA Uses Google Cookies for Targeting

December 10, 2013

NSA uses Google cookies to pinpoint targets for hacking

DOCUMENT:  NSA signal-surveillance success stories

NSA GCHQ presentation about HAPPYFOOT and detailing signal surveillance techniques
NSA signal-surveillance success stories

NSA Worldwide Cellphone Tracking

December 13, 2013

By cracking cellphone code, NSA has capacity for decoding private conversations

December 10, 2013

New documents show how the NSA infers relationships based on mobile location data

DOCUMENT:  Summary of DNR and DNI Co-Travel Analytics

DOCUMENT:  GHOSTMACHINE: The NSA's cloud analytics platform

DOCUMENT:  NSA classification guide outlining abilities to intercept mobile cellular communications

Summary of DNI DNR Co-traveler analytics document - NSA
Summary of DNR and DNI Co-Travel Analytics (24 pages)

NSA ghostmachine sso slides showing fascia limit - hadoop sitestore analytics
GHOSTMACHINE: The NSA's cloud analytics platform

How the NSA targets a mobile device
NSA GSM classification guide outlining abilities to intercept mobile cellular communications


December 4, 2013

NSA tracking cellphone locations worldwide, Snowden documents show

How the NSA is tracking people right now

DOCUMENT:  FASCIA - The NSA's huge trove of location records

DOCUMENT:  How to tell if a target is 'foreign'

DOCUMENT:  How the NSA verifies a target's location

NSA - What does FASCIA collect - DUPE Methodology TAPERLY and CHALKFUN document - How to tell if target is foreign NSA training video that describes how to verify the location of a targeted device
FASCIA slides; Excerpt from training manual; Excerpt from a transcript of NSA training video describing how to verify location of targeted device



CSEC:   Canada Set up Foreign Spy Posts in 20 Countries for NSA

December 9, 2013

Snowden document shows Canada set up spy posts for NSA

DOCUMENT:  NSA Intelligence Relationship with Canada's CSEC

NSA Intelligence Relationship with Canada CSEC - Information paper
NSA Information Paper (April 2013):  NSA Intelligence Relationship with CSEC

CSEC - Canada set up secret foreign spy posts for NSA - U.S. - video
CBC News Video: Canada Spying for the NSA

FRA:  Sweden Spying for NSA

December 8, 2013

NSA "asking for" specific exchanges from FRA - Secret treaty since 1954

DOCUMENT:  NSA Intelligence Relationship with Sweden

NSA secret memo about Sweden FRA spying agreement
NSA Intelligence relationship with Sweden

NSA collaboration with FRA cable access program
Additional excerpt from document: NSA collaboration with FRA cable access program

December 7, 2013

FRA spying on “energy” and “Baltics” for USA

December 5, 2013

SVT reveals: FRA spying on Russia for USA (Video)

Snowden files reveal Swedish-American surveillance of Russia (in English)

NSA memo on intelligence relationship with Sweden
Excerpts from document related to FRA spying on Russia


VIEW RELATED LEAK:  Sweden's Role in NSA Hacking;  FRA Uses XKEYSCORE

How NSA Targets Italy

December 6, 2013

Revealed: How the NSA Targets Italy

DOCUMENTS:  Boundless Informant - Italy; SCS map; Close Access SIGADS

NSA Italy - Special Collection Services map and close access sigads NSA SCS Special Collection Services map NSA Italy Close Access SIGADS - BRUNEAU, HEMLOCK, STARRUBY
SCS Special Collection Services map; NSA Italy Close Access SIGADS

Boundless Informant Italy
Boundless Informant report - Italy

View additional Boundless Informant charts targeting other countries



ASD:  Australian Spy Agency Offered to Share Citizen Data

December 1, 2013

Revealed: Australian spy agency offered to share data about ordinary citizens

Australia DSD memo about sharing bulk metadata of citizens with partners - CSEC NSA
Excerpts from an Australian DSD memo about sharing bulk metadata of citizens with partners

CSEC:  Additional Olympia slides revealed

November 30, 2013

Read a CSEC document that was first acquired by Edward Snowden

Communications Security Establishment Canada – CSEC slides showing CSEC Olympia program targeting Brazil Energy and Mining Ministry

Analysis:  Interpreting the CSEC Presentation: Watch Out Olympians in the House!


VIEW RELATED LEAK:   CSEC:  Brazilian Ministry of Mines and Energy Targeted


Dutch Intelligence AIVD Hacks into Internet Forums

November 30, 2013

Dutch intelligence agency AIVD hacks internet fora

NSA notes for Dutch AIVD hacking of internet forums - webfora tor
Notes for Dutch SIGINT/Cyber Analytic Exchange

CSEC:  Canada Allowed NSA to Spy During 2010 G20 Summit

November 27, 2013

New Snowden docs show U.S. spied during G20 in Toronto

Read Snowden NSA document on G8, G20 summit surveillance

NSA G8 G20 Summit spying memo - Toronto 2010
NSA briefing note on the 2010 G8 and G20 Summits

NSA spying on G20 in Toronto video
CBC News video: U.S. spying at Toronto's G20 summit

NSA Spied on Porn Habits of 'Radicalizers' to Discredit Them

November 26, 2013

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radicalizers'

NSA list - Terrorism Islamic radicalization - Global radicalizers vulnerable in terms of authority
Document describing ways to undermine a target's credibility, reputation and authority

Microsoft May Have Been Targeted Along with Google/Yahoo

November 26, 2013

Microsoft, suspecting NSA spying, to ramp up efforts to encrypt its Internet traffic

DOCUMENTS:  Additional slides referencing Hotmail and Windows Live Messenger services

DOCUMENT:  GCHQ email to NSA mentioning Microsoft Passport

Muscular slides about Microsoft hotmail and windows live messenger GCHQ memo to NSA - Microsoft
Two of three SSO slides referencing Hotmail and Windows Live Messenger; GCHQ email to NSA


VIEW RELATED LEAK:   NSA Taps Into Google and Yahoo Data Centers


NSA Computer Network Exploitation: Over 50,000 Implants

November 23, 2013

NSA infected 50,000 computer networks with malicious software

NSA Worldwide SIGINT Defense Cryptologic Platform map - cables FORNSAT
NSA Worldwide SIGINT Defense Cryptologic Platform map

More about:  NSA's global interception network



Netherlands and other EU Countries Targeted Since 1946

November 23, 2013

Netherlands an NSA target since 1946

NSA document describing NSA spying history of Algeria, Belgium, France, Netherlands, Germany, Norway, Sweden, Tunisia from 1947 - 1967
Excepts from an NSA document dated Dec. 21, 2011 and signed by head of NSA technical surveillance


RELATED STORY:   Top German Prosecutor Considers NSA Investigation

NSA's Strategy: Expand Its Power in the "Golden Age of SIGINT"

November 22, 2013

N.S.A. Report Outlined Goals for More Power

DOCUMENT:  NSA SIGINT Strategy 2012 - 2016

NSA SIGINT Strategy - 2012 - 2016 - document
NSA SIGINT Strategy 2012 - 2016



Secret Agreement Allows NSA to Unmask U.K. Citizens' Data

November 20, 2013

US and UK struck secret deal to allow NSA to 'unmask' Britons' personal data

Documents show Blair government let US spy on Britons (Video)

Channel 4 News - NSA spying on UK Great Britain video
Britain's Channel 4 News video: US Spying on Britons

Documents showing US and UK policy to allow NSA to unmask and spy on Great Britain citizens
Documents showing US and UK policy to allow NSA to unmask and spy on citizens of Great Britain


RELATED STORY:   NSA considered spying on Australians 'unilaterally', leaked paper reveals

GCHQ:  Monitoring Hotel Reservations to Track Diplomats

November 17, 2013

'Royal Concierge': GCHQ Monitors Hotel Reservations to Track Diplomats

GCHQ slides - Royal Concierge - tracking diplomats from hotel reservations



GCHQ 2011 vision - Any mobile device, anywhere, anytime

How GCHQ described their "vision" in a 2011 document (Source)

GCHQ:  MyNOC Uses Fake LinkedIn Pages to Target Belgacom, Mobile Billing Companies (Comfone and MACH), and OPEC

November 10, 2013

Quantum Spying: GCHQ Targeted Engineers with Fake LinkedIn Pages

Oil Espionage: How the NSA and GCHQ Spied on OPEC

GCHQ slide - Linkedin slashdot Belgacom and OPEC quantum insert Prince Charles and Duchess Camilla visiting GCHQ's MyNOC hacking unit
GCHQ slides published by Der Spiegel  (via @koenrh)


Quantum Insert; Mutant Broth; Wylekey

Edward Snowden manifesto - Telling the truth is not a crime

Edward Snowden in "A Manifesto for the Truth” published in Der Spiegel on 11/3/2013
(Original English text)

NSA Corporate Partners

November 1, 2013

NSA Files Decoded: Part 3 - A Digital Revolution

Snowden document reveals key role of companies in NSA data collection

NSA relationships and authorities NSA FAA reports by provider


Artifice; Lithium; Serenade; Steelknight

GCHQ:  Partnership With German, French, Spanish and Swedish Intelligence Services

November 1, 2013

GCHQ and European spy agencies worked together on mass surveillance

Google Eric Schmidt NSA spying quote - I was shocked. This is clearly an overstep

Google Chairman Eric Schmidt in response to reports about the NSA tapping into communication links between Google's data centers (Source)

NSA Taps Into Google and Yahoo Data Centers

October 30, 2013

NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say

DOCUMENT:  How the NSA's MUSCULAR program collects too much data from Yahoo and Google

NSA Google Cloud exploitation slide

NSA Windstop Muscular slide
Special Source Operations slide about MUSCULAR and the related Speaker's Notes describing proposed improvements in the filtering of intercepted Yahoo data traffic


November 4, 2013

How we know the NSA had access to internal Google and Yahoo cloud data

DOCUMENT:  SSO Slides - The NSA's three types of cable interception programs

DOCUMENT:  SSO Slides - What Yahoo and Google did not think the NSA could see

DOCUMENT:  WINDSTOP - One month, hundreds of millions of records collected

NSA SSO programs NSA Serendipity slides
Set of 7 SSO slides describing the 3 access portfolios;   Set of 6 SSO slides related to Google/Yahoo data

NSA Windstop data collection report
Boundless Informant report showing WINDSTOP data collection statistics


VIEW RELATED LEAK:   Microsoft May Have Been Targeted Along with Google/Yahoo


NSA Spying in Berlin / Chancellor Merkel's Cell Phone

October 27, 2013

Embassy Espionage: The NSA's Secret Spy Hub in Berlin

NSA Surveillance: Merkel's cell phone was on U.S. eavesdropping list since 2002

NSA SCS antenna Einstein Castanet
Special Collection Service: Einstein/Castanet (embassy antenna system) and SCS Cyber Advantage


NSA SIGINT SCS collection from diplomatic facilities - Stateroom
STATEROOM Guide - Covert SIGINT collection from diplomatic facilities overseas (2 slides)


NSA SCS Global Map - Spiegel
SCS Global Presence map (Redacted version published in Der Spiegel)


Related:  Merkel Phone Tasking Information Published by Bild.de

Eavesdropping attack against Merkel | THIS NSA paper proves the bugging

NSA octave database record targeting Angela Merkel cell phone - SYN_0044
Excerpt from an NSA database file showing the targeting of Chancellor Merkel's phone

Note: The above excerpt is a transcription of information in an NSA database, not an original document (See this follow-up story published by Spiegel on 12/13/2014)

More on this: Update on tapping German chancellor Merkel's phone



Keith Alexeander quote - We ought to come up with a way of stopping it

NSA chief General Keith Alexander in an interview with the Defense Department's Armed with Science blog on 10/21/2013 on the reporting of the NSA leaks (Source)

GCHQ:  How GCHQ Tried to Keep Mass Surveillance Secret

October 25, 2013

Leaked memos reveal GCHQ efforts to keep mass surveillance secret

NSA Monitored Phones of 35 World Leaders

October 24, 2013

NSA monitored calls of 35 world leaders after US official handed over contacts

NSA memo targeting Rolodexes for spying on world leader phones



NSA Targeted Mexican President's Email

October 20, 2013

Fresh Leak on US Spying: NSA Accessed Mexican President's Email

NSA TAO hacking memo - Mexico



NSA's Role in the CIA's Drone Program

October 16, 2013

Documents reveal NSA’s extensive involvement in targeted killing program



NSA Collection of Email Address Books and Buddy Lists

October 14, 2013

NSA collects millions of e-mail address books globally

DOCUMENT:  The NSA's overcollection problem

DOCUMENT:  How the NSA tried to collect less

DOCUMENT:  An excerpt from 'Intellipedia'

NSA slide - Email address book harvesting NSA slide - Email scissors program NSA intellipedia



Edward Snowden Speaks About NSA Programs at Sam Adams Award Presentation in Moscow

October 9, 2013

View more Edward Snowden videos from the Sam Adams award presentation in Moscow


More:  Edward Snowden - Interviews, Statements, and Appearances

CSEC:  Brazilian Ministry of Mines and Energy Targeted

October 6, 2013

American and Canadian Spies target Brazilian Energy and Mining Ministry

Fantastico NSA video of Canada CSEC spying on Brazil Energy and Mining

Communications Security Establishment Canada – CSEC slides showing CSEC Olympian program targeting Brazil Energy and Mining Ministry
CSEC (Communications Security Establishment Canada) slides from a June 2012 'Five Eyes' meeting


Analysis:  OLYMPIA: How Canada's CSEC maps phone and internet connections


VIEW RELATED LEAK:   CSEC:  Additional Olympia slides revealed



How NSA Targets Tor

October 4, 2013

NSA and GCHQ target Tor network that protects anonymity of web users

Attacking Tor: how the NSA targets users' online anonymity

DOCUMENT:  Peeling back the layers of Tor with EgotisticalGiraffe

DOCUMENT:  Tor Stinks

DOCUMENT:  Tor: The king of high-secure, low-latency anonymity

How the NSA Thinks About Secrecy and Risk

terrorist using tor browser to anonymously access the internet

NSA egotistical giraffe NSA GCHQ Tor stinks powerpoint slides NSA Tor slides


Secret NSA documents show campaign against Tor encrypted network

DOCUMENT:  NSA report on the Tor encryption program

DOCUMENT:  GCHQ report on 'MULLENIZE' program to 'stain' anonymous electronic traffic

NSA Tor research paper and GCHQ Op Mullenize NSA Tor research report GCHQ Op Mullenize


RELATED LEAK:  NSA/GCHQ Attacks On Internet Security


EgotisticalGiraffe; EgotisticalGoat; MothMonster; ErroneousIngenuity; FoxAcid; Validator; UnitedRake; FerretCannon; PeddleCheap; PacketWrench; BeachHead; FinkDifferent; Great Expectations; Quantum; DireScallop; FrugalShot; QuickAnt; Newtons Cradle; OnionBreath; EpicFail; ShortSheet; Mjolnir; Mullenize; StuntWorm

GCHQ quote - Very naughty people use Tor

From a GCHQ presentation on Tor (Source)

NSA Marina: Internet Activity Metadata Repository

September 30, 2013

NSA stores metadata of millions of web users for up to a year, secret files show



GCHQ:  Hacking of Belgian telecom Belgacom

September 20, 2013

Belgacom Attack: Britain's GCHQ Hacked Belgian Telecoms Firm

Photo Gallery: 'Operation Socialist' Cyber Attack on Belgacom

GHCQ powerpoint slides showing Belgacom telecom hacking


Operation Socialist; Merion Zeta (Belgacom)

NSA Monitoring of International Payments, Banking and Credit Card Transactions

September 15, 2013

Follow the Money: NSA Spies on International Payments

'Follow the Money': NSA Monitors Financial World

NSA financial credit cards spying powerpoint slides - Spiegel


Tracfin; Dishfire

James Clapper quote

James Clapper, Director of National Intelligence, addressing a defense and intelligence contractor trade group about Edward Snowden's disclosures of secret surveillance programs. (Source)

NSA Targets Private Computer Networks Belonging to Petrobras, Google, and Others

September 8, 2013

NSA Documents Show United States Spied on Brazilian Oil Giant  (Video)

New Snowden Documents Show NSA Deemed Google Networks a "Target"

Fantastico video of NSA spying on Petrobras
Numerous new NSA and GCHQ slides are disclosed in the video (View these screenshots) Fantastico video of NSA spying on Petrobras

Analysis:  Slides about NSA's Upstream collection

Analysis:  FLYING PIG: GCHQ’s TLS/SSL knowledge base


Blackpearl; Flying Pig; Hush Puppy; Quick Ant; Yachtshop; Orangecrush; Shiftingshadow; Monkeyrocket; MADCAPOCELOT; SILVERZEPHYR; Blarney; Prism; Fairview; Stormbrew; Oakstar; Turmoil; Xkeyscore; Pinwale; Windstop, Mystic

NSA Big Brother slide

Secret NSA presentation on iPhone Location Services (Source)

How NSA Has Compromised Internet Encryption

September 5, 2013

US and UK spy agencies defeat privacy and security on the internet  (Guardian)

NSA Foils Much Internet Encryption  (New York Times)

Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security  (ProPublica)

Cryptanalysis Classification Guide     NSA SIGINT Enabling Project     BULLRUN Classification Guide

NSA crpto guide NSA SIGINT enabling project Bullrun Classification NSA Bullrun guide       NSA exploitation of internet encryption diagram - GCHQ Turmoil

NSA BULLRUN Briefing Sheet

GCHQ NSA Bullrun slides


2016 Update:

Unredacted NSA document
This passage in the Black Budget "Sigint Enabling Project" description was unredacted by The Intercept on January 4, 2016 (Read the Intercept story)


RELATED LEAK:  NSA/GCHQ Attacks On Internet Security


Bullrun; Edgehill; Cheesy Name; Turmoil

GCHQ gobsmacked quote

From an internal NSA memo describing British GCHQ analysts shown a presentation on the NSA's progress in breaking widely used internet encryption technologies (Source)

NSA Spying on Brazilian and Mexican Presidents

September 1, 2013

How the greatest spy system in the world has its eye on Brazil.

Secret documents that prove Dilma espionage

NSA slides on Brazil and Mexico spying on Presidents


Mainway; Dishfire; DNI Selectors

NSA Targets Al Jazeera

August 31, 2013

Snowden Document: NSA Spied On Al Jazeera Communications

Spying at the United Nations

August 26, 2013

How America Spies on Europe and the UN

Secret United Nations floor plan for European Union in New York City -Apalachee


Apalachee; Rampart-T; Magothy

Financial Relationship Between PRISM Tech Companies and NSA

August 23, 2013

NSA paid millions to cover Prism compliance costs for tech companies

NSA Prism compliance document

NSA Loophole in Section 702 of FISA Amendments Act (FAA)

August 9, 2013

NSA loophole allows warrantless search for US citizens' emails and phone calls

FAA Section 702 document

GCHQ: TEMPORA Telecom Partners (BT, Verizon Business, Vodafone Cable, Global Crossing, Level 3, Viatel, Interoute)

August 2, 2013

BT and Vodafone among telecoms companies passing details to GCHQ  (Guardian)

Snowden revealed names of spying telecom companies  (Süddeutsche Zeitung)


CODENAMES FOR GCHQ TELECOM PARTNERS:   REMEDY (BT); DACRON (Verizon Business), GERONTIC (Vodafone Cable); PINNAGE (Global Crossing); LITTLE (Level 3); VITREOUS (Viatel); STREETCAR (Interoute)

NSA Spying on the Fifth Summit of Americas in 2009

August 2, 2013

The American ambassador in Brazil thanks the NSA for its support

State Dept letter to NSA Keith Alexander - Summit of Americas spying

NSA Secret Payments to GCHQ

August 1, 2013

Exclusive: NSA pays £100m in secret funding for GCHQ

NSA video of secret payments to GCHQ


July 31, 2013

XKeyscore: NSA tool collects 'nearly everything a user does on the internet'


NSA XKEYSCORE powerpoint slides


Ten additional XKEYSCORE slides not included in the above set of 32 slides:

additional Xkeyscore powerpoint slides


View additional XKEYSCORE slides



NSA Boundless Informant: Germany, Spain, Italy, Netherlands, and France

July 29, 2013

Photo Gallery: NSA Documentation of Spying in Germany

NSA Boundless Informant reports - Germany, Spain, Italy, Netherlands, France

August 5, 2013

Mass Data: Transfers from Germany Aid US Surveillance

Document describing cooperation between NSA and Germany BND



NSA Spying on UN Security Council - Iran Sanctions Resolution

July 27, 2013

Spies of the digital age

NSA SIGINT memo on UN Security Council spying related to Iran

NSA Access to Microsoft's Outlook, Hotmail, SkyDrive, and Skype

July 11, 2013

Microsoft handed the NSA access to encrypted messages

PRISIM is a team sport quote

NSA document describing how the FBI and CIA can make PRISM requests (Source)

UPSTREAM Powerpoint Slide

July 10, 2013

NSA slides explain the PRISM data-collection program

NSA Prism upstream powerpoint slide

View full set of PRISM slides



NSA Targets 38 Embassies and Missions Including EU, France, Italy, Japan, Mexico, South Korea, India, Turkey

June 30, 2013

New NSA leaks show how US is bugging its European allies

Attacks from America: NSA Spied on European Union Offices

How the NSA Targets Germany and Europe

NSA Dropmire


Dropmire; Perdido; Blackfoot; Wabash; Bruneau; Hemlock; Powell; Klondyke

Four Additional PRISM Slides

June 29, 2013

NSA slides explain the PRISM data-collection program

NSA prism slides - tasking process and collection dataflow

NSA prism slides - Prism case notations and REPRISMFISA tips

View full set of PRISM slides



NSA Online User Metadata Collection

June 27, 2013

How the NSA is still harvesting your online data


EvilOlive; ShellTrumpet; MoonLightPath; Spinneret; Transient Thurible

Keith Alexander Collect it all quote

NSA chief General Keith Alexander on a visit to Menwith Hill in June 2008 (Source)

GCHQ:  Spying at the G20 Summit in London 2009

June 16, 2013

G20 summit: NSA targeted Russian president Medvedev in London

GCHQ intercepted foreign politicians' communications at G20 summits

DOCUMENTS:  Extracts from documents describing 'recent successes'

GCHQ slide showing Real Life Stats from GPRS work - London G20
GCHQ slide from May 2010 Mobile Theme Briefing
View additional slides from a related leak in 2014


GCHQ G20 London Blackberry spying Top Secret STRAP1 documents
Extracts from the leaked documents describing the agency's 'recent successes'

Glenn Greenwald - The dam has broke let the water and sunshine flow

Guardian columnist Glenn Greenwald on Twitter - June 6, 2013 (Source)