(1 page) Excerpt from the FY13 Congressional Budget Justification for the National Intelligence Program indicating that an additional country will be brought online under MYSTIC by the end of 2013.
The NSA Archive
Search Options
(2 pages) Excerpt from an NSA weekly briefing memo that describes the collection of data under MYSTIC.
(1 page) Cover slide from an NSA weekly briefing deck on the agency's voice interception program, MYSTIC.
(1 page) NSA slide setting forth the various selectors by which the agency identifies surveillance targets.
(4 pages) NSA slides describing two implants the agency injects into network routers to help them intercept and perform "exploitation attacks" against data sent through Virtual Private Networks.
(1 page) NSA document describing how the GCHQ's Menwith Hill base is an integral component of the TURBINE malware infrastructure
(2 pages) NSA diagram showing how the TURBINE implants system relies upon a large network of clandestine surveillance "sensors" that the agency has installed around the world
(5 pages) NSA diagram that lays out how the TURBINE system targets computer IP addressess.
(3 pages) NSA document describing how the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link.
(1 page) NSA document describing the use of TURBINE, the sytem designed to make deploying malware earlier for NSA's hackers.
(1 page) Secret internal record describing the NSA's increase in malware tools from 150 to tens of thousands.
(1 page) NSA document which lays out the use of TURBINE, described as an "intelligent command and control capability" that enables "industrial-scale exploitation."
(1 page) Classified list featuring nine NSA hacking tools, six of which are used for intelligence gathering.
(4 pages) NSA memo seeking to expand access to FISA information to its code-breakers in Georgia, Texas and Hawaii.
(1 page) NSA chart listing milestones in surveillance rules over four decades.
(50 pages) A GCHQ slideshow that lays out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes .
(5 pages) Document describing NSA testing of a new technique for UAVs (Unnamed Aerial Vehicle)
(1 page) Document from NSA metadata database detailing the inteception of telephone and internet communications from the Netherlands
(3 pages) Excerpts from the
(22 pages) Public declaration of James R. Clapper disclosing information regarding the government
(30 pages) Unclassified declaration of Frances J. Fleisch disclosing information regarding the government
(308 pages) Report and recommendations of President Obama's review group on intelligence and communication technologies.
(4 pages) Excerpts from slides describing the NSA's Special Source Operations cloud analytics platform, code-named GHOSTMACHINE.
(1 page) Excerpt from a transcript of NSA training videos describing how to verify the location of a targeted device.
(1 page) Excerpt from NSA Agency training manual explaining how to determine if a targeted device is "foreign."
(2 pages) NSA slides about the FASCIA program, including the volume and type of device-location data collected by the agency.
(3 pages) Slides describing collection of data from Internet providers.
(13 pages) Slides detailing the collection of call records from Afghanistan and Norway over a period of 30 days.
(8 pages) Presentation describing Boundless Informant's "Mission Capabilities from Metadata Records."
(87 pages) A FISC opinion granting the government
(87 pages) A FISC opinion granting the government
(12 pages) A FISC order and supplemental order in response to the government
(1 page) An undated NSA PowerPoint slide describing requirements for the collection of metadata versus content.
(3 pages) An undated NSA summary on requirements for the collection of bulk telephony metadata under Section 501 of FISA.
(1 page) An NSA Powerpoint slide showing the intersection of "Public Internet" and internal "Google Cloud" user data.
(9 pages) Internal NSA presentation detailing the collection of hundreds of millions of contact lists from around of the world.
(23 pages) FISC memorandum and primary order granting the government's request for ongoing daily production to the NSA of "certain telephone call detail records in bulk"
(20 pages) Presentation on EgotisticalGiraffe, a technique designed by the NSA to attack Tor users.
(9 pages) Extracts from an NSA document on Tor.
(7 pages) Excerpts from document detailing collection of information on targets' online sexual activity, intended to be used to discredit them.
(1 page) An NSA powerpoint slide illustrating how phone and email data are used to graph the relationships of foreign intelligence targets.
(46 pages) FISC opinion justifying the NSA's phone metadata collection program.
(7 pages) An NSA document released under the Obama administration's guidance explaining the agency's mission, authorities, oversight, and partnerships.
(23 pages) An Obama Administration white paper on the bulk collection of telephony metadata under Section 215 of the USA Patriot Act.
(30 pages) Judge Walton's response to Senate Judiciary Committee questions about FISC operations.
(2 pages) A letter from General Alexander responding to Senators Wyden and Udall about the NSA's Section 702 fact sheet inaccuracy.
(2 pages) A letter from Senators Wyden and Udall to General Alexander on a "significant" inaccuracy in the NSA's Section 702 fact sheet.
(4 pages) NSA factsheets on Section 702 of FISA and Section 215 of the Patriot Act that were later withdrawn after Senators Wyden and Udall complained of Section 702 inaccuracies.
(17 pages) A FISC order approving the application of Section 215 for telephony metadata collection.
(4 pages) A FISC order approving the application of Section 215 for Verizon metadata collection.
(2 pages) Excerpts from a document related to Swedish-American surveillance of Russia
(1 page) An NSA training slide about the collection of internet and phone data from fiber-optic cable networks via the UPSTREAM program.
(4 pages) NSA training slides about the acquisition of surveillance information through the PRISM program.
(4 pages) NSA training slides providing an introduction and overview of the PRISM program.
(2 pages) Information paper from the NSA detailing the NSA
(4 pages) NSA internal presentation slides detailing signal surveillance techniques and successes.
(3 pages) An excerpt from the Special Operations Weekly
(3 pages) Notes on a meeting with Dutch intelligence services, whose officials described their use of
(1 page) Excerpt from an NSA document suggesting that hacking routers has been "good business" for the NSA and their 5-eyes partners.
(2 pages) Zelda responds to an NSA worker who goes by the pen name
(24 pages) Study overviewing key elements of the co-traveler analytics both under development and operational at NSA.
(9 pages) A FISC opinion concluding the government has resolved the deficiencies identified in the FISC
(33 pages) Classified declaration of James R. Clapper disclosing information regarding the government
(80 pages) Classified declaration of Frances J. Fleisch disclosing information regarding the government
(3 pages) An NSA "Work-in-Progress" factsheet describing the Boundless Informant datamining tool.
(4 pages) NSA training slides describing the Boundless Informant tool and "mission capabilities from metadata records."
(23 pages) Presentation on de-anonymizing users of Tor, a tool meant to protect online anonymity.
(18 pages) Presentation by Communications Security Establishment Canada on surveillance of Brazil's Ministry of Mines and Energy.
(27 pages) Document revealing how CSEC used airport WiFi to track Canadian travelers with help from the NSA
(15 pages) Letter to HPSCI Chairman Rogers and Permanent Member Ruppersberger on collection programs under FAA.
(13 pages) A 2012 quarterly audit of the NSA's surveillance activities, which describes 2,766 violations by the NSA of the surveillance laws and its internal rules and regulations.
(5 pages) Strategy document detailing NSA mission statement and goals.
(14 pages) Statement by intelligence officials before Senate Select Committee on Intelligence on FAA reauthorization.
(44 pages) Documents detailing the Squeaky Dolphin program where British intelligence monitors YouTube and Blogger to collect addresses and other information for analysis
(16 pages) Slides from a 2012 spy conference detailing the cyber operations used by JTRIG, including sexual
(1 page) Presentation demonstrating NSA infected 50,000 computers worldwide with malware.
(15 pages) NSA document revealing British spy unit attacks on the hacktivists of Anonymous
(3 pages) An annual report from the Attorney General to the Senate Select Committee on Intelligence (SSCI), House Permanent Select Committee on Intelligence (HPSCI), Senate Judiciary Committee, and House Judiciary Committee concerning requests for access to business records under Section 215
(15 pages) Statement by intelligence officials before House Select Committee on Intelligence on FAA reauthorization.
(24 pages) A FISC opinion concluding the NSA
(1 page) An NSA training slide about what analysts should do when they acquire "U.S. person information."
(13 pages) A description of the "minimization procedures"
(1 page) An NSA document describing the FISA Court's 2011 FAA Certifications and noting the FISC ruling that certain procedures for the collection of "Multiple Communications Transactions" were "deficient on statutory and constitutional grounds."
(85 pages) A FISC opinion ruling one electronic communications collection program unconstitutional.
(10 pages) This NSA document describes classification levels of information related to the NSA
(2 pages) An NSA official's "Ask Zelda!" column describing how his/her boss spies on employees.
(4 pages) An NSA memo to notify the House and Senate Committees on the Judiciary of the collection of telephony metadata under Section 501 of FISA
(52 pages) Report by attorney general and director of national intelligence on compliance with procedures and guidelines issued pursuant to Section 702 FISA.
(1 page) This page from the NSA intranet dated July 2011 supplies advice from the NSA Offices of General Counsel (OGC) and Oversight and Compliance (NOC) on the admissibility of targeting strategies against the users of popular websites (including WikiLeaks and the Pirate Bay)
(15 pages) Order of the FISC approving the Government
(1 page) Supplemental Order ordering NSA reports to include a discussion of NSA
(8 pages) NSA documents revealing a program codenamed 'Dishfire' that collects up to 200 million text messages a day from around the globe. A further program known as 'Prefer' conducted automated analysis on the texts
(16 pages) Document revealing how the NSA routinely intercepted Americans' electronics to plant spying devices in them.
(2 pages) An NSA official's "Ask Zelda!" column explaining its origins as a forum for supervisors in the Signals Intelligence Directorate, and how that, now, non-supervisory workers began submitting questions
(15 pages) Order of the FISC approving the Government
(1 page) Supplemental Order ordering NSA reports to include a discussion of the NSA
(2 pages) An NSA Memo to the Senate Select Committee on Intelligence regarding receipt of cell site location information and test results
(2 pages) Amendment to Primary Order BR 11-07, ordering that footnote 5 of the Court
(9 pages) A DOJ report to the Senate Intelligence Committee describing the government's bulk collection program under Section 215.
(52 pages) United States Intelligence Directive 18 (USSID 18) dated January 25, 2011 prescribing NSA policies and procedures as they relate to the Fourth Amendment of the Constitution and minimization procedures/rules governing the collection, retention, and dissemination of information about US persons