Download link
File List
-
文件过大导致无法格式化,将以元数据展示。
[{"path": "Snowden/Articles/Greenwald.mp4", "length": 112674540}, {"path": "NSA Dokuments/files/pdf/no-place-to-hide.pdf", "length": 91178544}, {"path": "NSA Dokuments/files/pdf/20140513-greenwald-noplacetohidedocuments.pdf", "length": 91178544}, {"path": "NSA Files (Raw Documents + Whistleblower Edward Snowden Interview)/TOP-SECRET-NSA-Boundless-Informant-Slides.pdf", "length": 75589855}, {"path": "Snowden/Info/Original Documents/BoundlessInformantPP.pdf", "length": 75589855}, {"path": "NSA Dokuments/files/pdf/NSA-Boundless_Informant_Powerpoint_Slides.pdf", "length": 75589855}, {"path": "NSA Dokuments/files/pdf/nsa-boundless-informant-slides.pdf", "length": 75585495}, {"path": "NSA Files (Raw Documents + Whistleblower Edward Snowden Interview)/Edward Snowden interview_ 'The US government will say I aided our enemies' - NSA whistleblower.mp4", "length": 66164817}, {"path": "NSA Dokuments/files/pdf/media-35540.pdf", "length": 46317357}, {"path": "NSA Dokuments/files/pdf/media-35685.pdf", "length": 42231082}, {"path": "NSA Files (Raw Documents + Whistleblower Edward Snowden Interview)/Meet Edward Snowden_ NSA PRISM Whistleblower.flv", "length": 40819258}, {"path": "NSA Dokuments/files/pdf/media-35674.pdf", "length": 38308716}, {"path": "Snowden/Info/Snowden Info/Snowden.mp4", "length": 34078388}, {"path": "NSA Dokuments/files/pdf/media-35671.pdf", "length": 31703729}, {"path": "NSA Dokuments/files/pdf/20140723-Intercept-March-2013-Watchlisting-Guidance.pdf", "length": 30822287}, {"path": "NSA Dokuments/files/pdf/psychology-a-new-kind-of-sigdev.pdf", "length": 29199203}, {"path": "NSA Dokuments/files/pdf/20140218-intercept-gchq_sigdev_.pdf", "length": 29180317}, {"path": "NSA Dokuments/files/pdf/the-art-of-deception-training-for-a-new.pdf", "length": 29110640}, {"path": "NSA Dokuments/files/pdf/media-35689.pdf", "length": 28952417}, {"path": "NSA Dokuments/files/pdf/media-35677.pdf", "length": 28952417}, {"path": "Snowden/Info/Original Documents/nsa-pdfs-redacted-ed.pdf", "length": 28585222}, {"path": "NSA Dokuments/files/pdf/20130731-guard-xkeyscore_training_slides.pdf", "length": 28585222}, {"path": "NSA Files (Raw Documents + Whistleblower Edward Snowden Interview)/TOP-SECRET-NSA-XKeyscore-Presentation-2008.pdf", "length": 28585222}, {"path": "NSA Dokuments/files/pdf/2013-watchlist-guidance.pdf", "length": 27771662}, {"path": "NSA Dokuments/files/pdf/media-35670.pdf", "length": 27545551}, {"path": "Snowden/Info/Original Documents/StellarWind.pdf", "length": 26593090}, {"path": "NSA Files (Raw Documents + Whistleblower Edward Snowden Interview)/top-secret-nsa-inspector-general-report-on-email-internet-data-collection-under-stellar-wind.pdf", "length": 26593090}, {"path": "NSA Dokuments/files/pdf/CLEANEDPRTT-1.pdf", "length": 25903409}, {"path": "NSA Dokuments/files/pdf/media-35515.pdf", "length": 25478738}, {"path": "NSA Dokuments/files/pdf/20141204-intercept-auroragold_working_group.pdf", "length": 23699773}, {"path": "NSA Dokuments/files/pdf/i-hunt-sys-admins.pdf", "length": 22868468}, {"path": "NSA Dokuments/files/pdf/media-35529.pdf", "length": 22013265}, {"path": "NSA Dokuments/files/pdf/doc-6-cyber-threat-capabilities.pdf", "length": 20782168}, {"path": "NSA Dokuments/files/pdf/media-35686.pdf", "length": 19685182}, {"path": "NSA Dokuments/files/pdf/NSA-IG_Report.pdf", "length": 19682510}, {"path": "NSA Dokuments/files/pdf/media-35675.pdf", "length": 19646070}, {"path": "NSA Dokuments/files/pdf/20140127-nbc-squeaky_dolphin.pdf", "length": 18208145}, {"path": "NSA Dokuments/files/pdf/20131119-odni-nsa_cryptological_school_course_slides_on_legal_compliance_and_minimization_procedures.pdf", "length": 17848024}, {"path": "NSA Dokuments/files/pdf/media-35657.pdf", "length": 17721595}, {"path": "NSA Dokuments/files/pdf/media-35521.pdf", "length": 16685982}, {"path": "NSA Dokuments/files/pdf/CLEANED032.-Basket_2_-_NSA_training.log.pdf", "length": 16516904}, {"path": "NSA Dokuments/files/pdf/20131119-odni-nsa_core_intelligence_oversight_training.pdf", "length": 16373868}, {"path": "NSA Dokuments/files/pdf/media-35539.pdf", "length": 16199615}, {"path": "NSA Dokuments/files/pdf/blackhat-Alexander-keynote.pdf", "length": 16105242}, {"path": "NSA Dokuments/files/pdf/rcs-9-technician-final.pdf", "length": 14067926}, {"path": "NSA Dokuments/files/pdf/media-35526.pdf", "length": 12875452}, {"path": "NSA Dokuments/files/pdf/NSA-XKeyscore_Powerpoint.pdf", "length": 12828023}, {"path": "NSA Dokuments/files/pdf/NSA-XKeyscore-Powerpoint.pdf", "length": 12828023}, {"path": "NSA Dokuments/files/pdf/media-35658.pdf", "length": 12786889}, {"path": "Snowden/Info/Snowden Info/Snowden announces he will seek asylum in Russia.mp4", "length": 12211027}, {"path": "NSA Dokuments/files/pdf/media-35688.pdf", "length": 12049517}, {"path": "NSA Dokuments/files/pdf/rcs-9-sysadmin-final.pdf", "length": 12007239}, {"path": "NSA Dokuments/files/pdf/media-35511.pdf", "length": 10403507}, {"path": "Snowden/Info/Original Documents/bullrun-guide-final.pdf", "length": 10112949}, {"path": "NSA Dokuments/files/pdf/nsa-bullrun-2-16-guardian-13-0905.pdf", "length": 10103711}, {"path": "NSA Dokuments/files/pdf/20150117-spiegel-overview_on_the_nsa_use_of_bots_and_the_defiantwarrior_program.pdf", "length": 9893313}, {"path": "NSA Dokuments/files/pdf/20131119-odni-united_states_signals_intelligence_directive_18_jan_25_2011.pdf", "length": 9789893}, {"path": "NSA Dokuments/files/pdf/media-35683.pdf", "length": 9333718}, {"path": "NSA Dokuments/files/pdf/media-35665.pdf", "length": 9100985}, {"path": "NSA Dokuments/files/pdf/rcs-9-analyst-final.pdf", "length": 8622433}, {"path": "NSA Dokuments/files/pdf/nsa-stellar-wind.pdf", "length": 8376344}, {"path": "NSA Dokuments/files/pdf/media-35527.pdf", "length": 8236689}, {"path": "NSA Dokuments/files/pdf/20131119-odni-nsa_metadata_collection_training_slides_.pdf", "length": 7821819}, {"path": "NSA Dokuments/files/pdf/20130627-guard-nsa_oig_2009_report.pdf", "length": 7693075}, {"path": "NSA Dokuments/files/pdf/20131119-odni-ag_guidelines_for_domestic_fbi_operations-(1).pdf", "length": 7693072}, {"path": "Snowden/Info/Original Documents/Tor.pdf", "length": 7638239}, {"path": "NSA Dokuments/files/pdf/media-35678.pdf", "length": 7460595}, {"path": "NSA Dokuments/files/pdf/20150117-spiegel-nsa_training_course_material_on_computer_network_operations-(1).pdf", "length": 7286915}, {"path": "NSA Dokuments/files/pdf/20150117-spiegel-nsa_training_course_material_on_computer_network_operations.pdf", "length": 7286915}, {"path": "NSA Dokuments/files/pdf/20131230-appelbaum-nsa_ant_catalo.pdf", "length": 7198723}, {"path": "NSA Dokuments/files/pdf/20131230-appelbaum-nsa_ant_catalog.pdf", "length": 7198723}, {"path": "NSA Dokuments/files/pdf/media-35535.pdf", "length": 7186065}, {"path": "NSA Dokuments/files/pdf/media-35676.pdf", "length": 6972811}, {"path": "NSA Dokuments/files/pdf/media-35667.pdf", "length": 6949528}, {"path": "NSA Dokuments/files/pdf/CLEANEDFinal-USSID_SP0018.pdf", "length": 6923017}, {"path": "NSA Dokuments/files/pdf/media-35673.pdf", "length": 6907229}, {"path": "NSA Dokuments/files/pdf/20141228-spiegel-explanation_on_the_spin9_program_on_end-to-end_attacks_on_vpn.pdf", "length": 6839376}, {"path": "NSA Dokuments/files/pdf/20140430-intercept-ghostmachine.pdf", "length": 6738761}, {"path": "NSA Dokuments/files/pdf/media-35684.pdf", "length": 6521522}, {"path": "NSA Dokuments/files/pdf/nsa-boundlessinformant-no-33m.pdf", "length": 6253846}, {"path": "NSA Dokuments/files/pdf/20141228-spiegel-intro_to_the_vpn_exploitation_process_mentioning_the_protocols_attacked_-_pptp_ipsec_ssl_ssh.pdf", "length": 6171972}, {"path": "NSA Dokuments/files/pdf/media-35516.pdf", "length": 6131170}, {"path": "NSA Dokuments/files/pdf/20140914-spiegel-treasure_map_presentation.pdf", "length": 6012595}, {"path": "NSA Dokuments/files/pdf/20140914-spiegel-treasure_map_presentation-(1).pdf", "length": 6012595}, {"path": "NSA Dokuments/files/pdf/20131122-dagbladet-boundless_informant.pdf", "length": 5987286}, {"path": "NSA Dokuments/files/pdf/Section-215_-_Primary_Order.pdf", "length": 5881754}, {"path": "NSA Dokuments/files/pdf/Section-215---Primary-Order.pdf", "length": 5881754}, {"path": "NSA Dokuments/files/pdf/nsa-quantum-tasking.pdf", "length": 5723884}, {"path": "Snowden/Info/Original Documents/sigintenabling-clean-1.pdf", "length": 5686205}, {"path": "NSA Dokuments/files/pdf/nsa-sigint-enabling-guardian-13-0905.pdf", "length": 5685657}, {"path": "NSA Dokuments/files/pdf/media-35672.pdf", "length": 5358664}, {"path": "NSA Dokuments/files/pdf/media-35551.pdf", "length": 5307272}, {"path": "NSA Dokuments/files/pdf/phonesnsa.pdf", "length": 4844370}, {"path": "NSA Dokuments/files/pdf/media-35550.pdf", "length": 4710858}, {"path": "NSA Dokuments/files/pdf/20140914-spiegel-satellite_teleport_knowledge.pdf", "length": 4587753}, {"path": "NSA Dokuments/files/pdf/20131119-odni-united_states_signals_intelligence_directive_18_appendix_j.pdf", "length": 4549280}, {"path": "NSA Dokuments/files/pdf/media-35520.pdf", "length": 4546293}, {"path": "NSA Dokuments/files/pdf/media-35510.pdf", "length": 4538972}, {"path": "NSA Dokuments/files/pdf/2011-OIG_Report_on_Bulk_Collection.pdf", "length": 4506991}, {"path": "NSA Dokuments/files/pdf/20140224-intercept-training_for_covert_online_operations.pdf", "length": 4491663}, {"path": "NSA Dokuments/files/pdf/rcs-9-admin-final.pdf", "length": 4481028}, {"path": "NSA Dokuments/files/pdf/eyes_wide_open_v1.pdf", "length": 4394880}, {"path": "NSA Dokuments/files/pdf/media-35533.pdf", "length": 4314173}, {"path": "NSA Dokuments/files/pdf/20150117-spiegel-nsa_program_tutelage_to_instrumentalize_third_party_attack_tools.pdf", "length": 4308780}, {"path": "NSA Dokuments/files/pdf/nsa-cryptanalysis-2-12-guardian-13-0905.pdf", "length": 4198271}, {"path": "Snowden/Info/Original Documents/crypt-guide2.pdf", "length": 4197991}, {"path": "NSA Dokuments/files/pdf/nsa-tor-stinks.pdf", "length": 4185517}, {"path": "NSA Dokuments/files/pdf/20140825-The-Intercept-Sharing-Communications-Metadata-Across-the-USIC-ICREACH.pdf", "length": 4114881}, {"path": "NSA Dokuments/files/pdf/media-35543.pdf", "length": 4080761}, {"path": "NSA Dokuments/files/pdf/20150117-speigel-csec_document_on_the_handling_of_existing_trojans_when_trojanizing_computers.pdf", "length": 4053891}, {"path": "NSA Dokuments/files/pdf/media-35538.pdf", "length": 4021880}, {"path": "NSA Dokuments/files/pdf/2009-OIG_Report_on_Bulk_Collection.pdf", "length": 3935404}, {"path": "NSA Dokuments/files/pdf/20150128-cbc-cse_presentation_on_the_levitation_project.pdf", "length": 3909102}, {"path": "NSA Dokuments/files/pdf/20150128-intercept-cse_presentation_on_the_levitation_project.pdf", "length": 3909102}, {"path": "NSA Dokuments/files/pdf/20140303-epic-doj_report_on_pen_register_fisa_orders.pdf", "length": 3875175}, {"path": "NSA Dokuments/files/pdf/20141214-intercept-gchq_automated_noc_detection.pdf", "length": 3867262}, {"path": "NSA Dokuments/files/pdf/20141228-speigel-analytics_on_security_of_tor_hidden_services_0.pdf", "length": 3827291}, {"path": "NSA Dokuments/files/pdf/20150117-spiegel-nsa_fourth_party_access_-_i_drink_your_milkshake_.pdf", "length": 3774954}, {"path": "NSA Dokuments/files/pdf/CLEANEDPRTT-2.pdf", "length": 3735691}, {"path": "NSA Dokuments/files/pdf/20131230-spiegel-tao_quantum_tasking.pdf", "length": 3676057}, {"path": "NSA Dokuments/files/pdf/20140905-intercept-quadrennial_intelligence_community_review_final_report.pdf", "length": 3659972}, {"path": "NSA Dokuments/files/pdf/nsa-xkeyscore.pdf", "length": 3648474}, {"path": "NSA Dokuments/files/pdf/media-35661.pdf", "length": 3644512}, {"path": "NSA Dokuments/files/pdf/nsa-sigint-successes.pdf", "length": 3639647}, {"path": "NSA Dokuments/files/pdf/media-35542.pdf", "length": 3638653}, {"path": "NSA Dokuments/files/pdf/nsa-israel-spy.pdf", "length": 3631098}, {"path": "Snowden/Info/Original Documents/Memo-US-Isreal.pdf", "length": 3626192}, {"path": "NSA Dokuments/files/pdf/pcs-harvesting-at-scale.pdf", "length": 3569686}, {"path": "NSA Dokuments/files/pdf/media-35513.pdf", "length": 3555865}, {"path": "NSA Dokuments/files/pdf/20150117-speigel-csec_document_about_the_recognition_of_trojans_and_other_network_based_anomaly_.pdf", "length": 3530637}, {"path": "NSA Dokuments/files/pdf/20150117-spiegel-nsa_example_snowglobe_in_which_a_suspected_french_government_trojan_is_analyzed_to_find_out_if_it_can_be_helpful_for_own_interests_0.pdf", "length": 3456844}, {"path": "NSA Dokuments/files/pdf/media-35682.pdf", "length": 3414781}, {"path": "NSA Files (Raw Documents + Whistleblower Edward Snowden Interview)/top-secret-gchq-g20-summit-spying-4-slides.pdf", "length": 3393930}, {"path": "Snowden/Info/Original Documents/GCHQ-Intel.pdf", "length": 3393930}, {"path": "NSA Dokuments/files/pdf/gchq-g20-spy.pdf", "length": 3390375}, {"path": "Snowden/Info/Original Documents/pmr.pdf", "length": 3271725}, {"path": "NSA Dokuments/files/pdf/nsa-tao-intro.pdf", "length": 3232803}, {"path": "NSA Dokuments/files/pdf/nsa-egotisticalgiraffe.pdf", "length": 3209177}, {"path": "NSA Dokuments/files/pdf/nsa-overcollection.pdf", "length": 3174770}, {"path": "NSA Dokuments/files/pdf/nsa-scissors-2.pdf", "length": 3170744}, {"path": "NSA Dokuments/files/pdf/nsa-yahoo-google-exploit.pdf", "length": 3131215}, {"path": "NSA Dokuments/files/pdf/media-35662.pdf", "length": 3025609}, {"path": "NSA Dokuments/files/pdf/20150117-spiegel-technical_description_of_the_fashioncleft_protocol_.pdf", "length": 2995872}, {"path": "NSA Dokuments/files/pdf/media-35518.pdf", "length": 2939198}, {"path": "NSA Dokuments/files/pdf/samsung_reply.pdf", "length": 2907449}, {"path": "NSA Dokuments/files/pdf/20150219-Intercept-PCS-Harvesting-At-Scale.pdf", "length": 2885787}, {"path": "NSA Dokuments/files/pdf/20131014-wapo-content_acquisition_optimization1.pdf", "length": 2834928}, {"path": "NSA Dokuments/files/pdf/media-35666.pdf", "length": 2830741}, {"path": "NSA Dokuments/files/pdf/20131119-odni-nsa_course_materials_module_4_v.28.pdf", "length": 2801998}, {"path": "NSA Dokuments/files/pdf/_20131119-odni-nsa_course_materials_module_4_v.28.pdf", "length": 2801998}, {"path": "NSA Dokuments/files/pdf/nsa-ghost-machine.pdf", "length": 2786733}, {"path": "NSA Dokuments/files/pdf/samsung_reply_2.pdf", "length": 2763937}, {"path": "NSA Dokuments/files/pdf/nsa-iat-tor.pdf", "length": 2733647}, {"path": "NSA Dokuments/files/pdf/nsa-bullrun-brief-propublica-13-0905.pdf", "length": 2728370}, {"path": "NSA Dokuments/files/pdf/bullrun-briefing-sheet-from-gchq.pdf", "length": 2722481}, {"path": "NSA Dokuments/files/pdf/nsabullrun.pdf", "length": 2722481}, {"path": "NSA Dokuments/files/pdf/20150117-spiegel-the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa_0.pdf", "length": 2721907}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-guidelines_for_the_classification_of_nsa_sigint_details_1945-1967.pdf", "length": 2717834}, {"path": "NSA Dokuments/files/pdf/nsa-sigint-strategic-mission-2013.pdf", "length": 2700364}, {"path": "NSA Dokuments/files/pdf/20150117-spiegel-overview_of_methods_for_nsa_integrated_cyber_operations_0.pdf", "length": 2670429}, {"path": "NSA Dokuments/files/pdf/media-35687.pdf", "length": 2626173}, {"path": "NSA Dokuments/files/pdf/20131014-wapo-content_acquisition_optimization2.pdf", "length": 2616405}, {"path": "Snowden/Info/Original Documents/a-sso-content-optimization-detailed-redacted.pdf", "length": 2616405}, {"path": "NSA Dokuments/files/pdf/20141228-spiegel-explanation_of_a_potential_technique_to_deanonymise_users_of_the_tor_network.pdf", "length": 2522537}, {"path": "NSA Dokuments/files/pdf/20131119-odni-nsa_course_materials_module_6_tech_personnel_v.25.pdf", "length": 2512492}, {"path": "NSA Dokuments/files/pdf/20131104-nyt-sigint_strategic_plan.pdf", "length": 2496996}, {"path": "NSA Dokuments/files/pdf/media-35656.pdf", "length": 2491558}, {"path": "NSA Dokuments/files/pdf/20131126-wapo-microsoft_cloud_exploitation.pdf", "length": 2487249}, {"path": "NSA Dokuments/files/pdf/nsa-quantumtheory.pdf", "length": 2470519}, {"path": "NSA Dokuments/files/pdf/media-35530.pdf", "length": 2446981}, {"path": "NSA Dokuments/files/pdf/20141214-intercept-gchq_making_network_sense_of_the_encryption.pdf", "length": 2442054}, {"path": "NSA Dokuments/files/pdf/media-35528.pdf", "length": 2376604}, {"path": "NSA Dokuments/files/pdf/2013-08-30_cryptome_congressional_budget_2013.pdf", "length": 2374297}, {"path": "NSA Dokuments/files/pdf/spy-budget-fy13.pdf", "length": 2374297}, {"path": "NSA Dokuments/files/pdf/20130830_cryptome_congressional_budget_2013.pdf", "length": 2374297}, {"path": "NSA Dokuments/files/pdf/nsa-gchq-spy-games.pdf", "length": 2349226}, {"path": "NSA Dokuments/files/pdf/20131230-spiegel-tao_intro.pdf", "length": 2335937}, {"path": "NSA Dokuments/files/pdf/20140311-nyt-classification_guide_for_stellarwind_program_0.pdf", "length": 2278050}, {"path": "Snowden/Info/Original Documents/Blackbudget.pdf", "length": 2260212}, {"path": "NSA Dokuments/files/pdf/CLEANED007.-CongNotificationInfoMemoSSCI_10_Apr_09-Sealedpdf.pdf", "length": 2253919}, {"path": "NSA Dokuments/files/pdf/identity-intelligence.pdf", "length": 2246857}, {"path": "NSA Dokuments/files/pdf/20131230-spiegel-qfire.pdf", "length": 2245572}, {"path": "NSA Dokuments/files/pdf/20131119-odni-office_of_general_council_business_record_analyst_training_slides.pdf", "length": 2230682}, {"path": "NSA Dokuments/files/pdf/media-35534.pdf", "length": 2229942}, {"path": "NSA Dokuments/files/pdf/20131104-wapo-optimization_google.pdf", "length": 2221610}, {"path": "NSA Dokuments/files/pdf/01312014-cbc-csec_airport_wifi_tracking.pdf", "length": 2214379}, {"path": "NSA Dokuments/files/pdf/20140131-cbc-csec_airport_wifi_tracking.pdf", "length": 2214379}, {"path": "NSA Dokuments/files/pdf/nsa-prism-13-1021.pdf", "length": 2162372}, {"path": "NSA Dokuments/files/pdf/sigint-enabling-project.pdf", "length": 2161626}, {"path": "NSA Dokuments/files/pdf/20150117-spiegel-overview_of_the_transgression_program_to_analyze_and_exploit_foreign_cna-cne_exploits.pdf", "length": 2157883}, {"path": "NSA Dokuments/files/pdf/nsa-prism-guardian-13-1101.pdf", "length": 2157523}, {"path": "Snowden/Info/Original Documents/Jun6-PRISM.pdf", "length": 2154964}, {"path": "NSA Dokuments/files/pdf/20141228-speigel-a_potential_technique_to_deanonymise_users_of_the_tor_network_0.pdf", "length": 2145735}, {"path": "NSA Dokuments/files/pdf/nsa-sigint-enabling-propublica-13-0905.pdf", "length": 2116982}, {"path": "NSA Dokuments/files/pdf/sigint-enabling-project2.pdf", "length": 2115675}, {"path": "NSA Dokuments/files/pdf/20141228-speigel-decryption_of_vpn_connections_within_the_valiantsurf_program_0.pdf", "length": 2107084}, {"path": "NSA Dokuments/files/pdf/20140803-Intercept-Israel-US-1999-Agreement.pdf", "length": 2104053}, {"path": "NSA Dokuments/files/pdf/20131004-guard-tor_stinks.pdf", "length": 2096132}, {"path": "NSA Dokuments/files/pdf/nsa-se-fra-spying-agenda.pdf", "length": 2090141}, {"path": "NSA Dokuments/files/pdf/20141228-spiegel-_national_information_assurance_research_laboratory_niarl_tundra.pdf", "length": 2062420}, {"path": "NSA Dokuments/files/pdf/20141228-speigel-analytic_challenges_from_active-passive_integration_when_nsa_attacks_ipsec_vpns_0.pdf", "length": 2057609}, {"path": "NSA Dokuments/files/pdf/20131004-guard-egotistical_giraffe-(1).pdf", "length": 2050204}, {"path": "NSA Dokuments/files/pdf/20141228-speigel-canadian_document_from_ces_on_tls_trends_0.pdf", "length": 2000209}, {"path": "NSA Dokuments/files/pdf/nsa-sigint-strategic-mission-2007.pdf", "length": 1985036}, {"path": "NSA Dokuments/files/pdf/20141214-Intercept-gchq-mobile-networks-in-my-noc-world.pdf", "length": 1947788}, {"path": "NSA Dokuments/files/pdf/phonesgchq.pdf", "length": 1931272}, {"path": "NSA Dokuments/files/pdf/20140618-DerSpiegel-presentation_on_the_nsacia_unit_special_collection_service.pdf", "length": 1916110}, {"path": "NSA Dokuments/files/pdf/20140815-Heise-HACIENDA-Program.pdf", "length": 1914471}, {"path": "NSA Dokuments/files/pdf/20131119-odni-nsa_guidance_memo_on_legal_standards_for_searching_bulk_metadata.pdf", "length": 1873823}, {"path": "NSA Dokuments/files/pdf/NSA-Section_702_and_Section_215_Factsheets.pdf", "length": 1844383}, {"path": "NSA Dokuments/files/pdf/NSA-Section-702-and-Section-215-Factsheets.pdf", "length": 1844383}, {"path": "NSA Dokuments/files/pdf/nsa-boundless-informant-faq.pdf", "length": 1834922}, {"path": "NSA Dokuments/files/pdf/20141204-intercept-ir21_a_technology_warning_mechanism_0.pdf", "length": 1832415}, {"path": "Snowden/Info/Original Documents/BoundlessInformant.pdf", "length": 1829964}, {"path": "NSA Files (Raw Documents + Whistleblower Edward Snowden Interview)/UNCLASSIFIED-NSA-Boundless-Informant-FAQ.pdf", "length": 1829964}, {"path": "NSA Dokuments/files/pdf/20140404-intercept-gchq_full_spectrum_cyber_effects.pdf", "length": 1829303}, {"path": "NSA Dokuments/files/pdf/20140805-Intercept-Directorate-of-Terrorist-Identities-Strategic-Accomplishments-2013.pdf", "length": 1801356}, {"path": "NSA Dokuments/files/pdf/20131104-nyt-sigint_goals.pdf", "length": 1758820}, {"path": "NSA Dokuments/files/pdf/nsa-sms-exploit.pdf", "length": 1735854}, {"path": "NSA Dokuments/files/pdf/20141204-intercept-auroragold_target_technology_trends_center_support_to_wpmo_0.pdf", "length": 1680855}, {"path": "NSA Dokuments/files/pdf/20141228-spiegel-description_on_the_processing_of_vpn_data_packets_within_the_turmoil_program.pdf", "length": 1652466}, {"path": "NSA Dokuments/files/pdf/20150117-spiegel-process_analysts_choose_their_data_requirement_and_then_get_to_know_the_tools_that_can_do_the_job_0.pdf", "length": 1650709}, {"path": "NSA Dokuments/files/pdf/20130903-globo-satc.pdf", "length": 1639477}, {"path": "NSA Dokuments/files/pdf/Judge-Walton-Answers-to-Questions-re-FISC.pdf", "length": 1634156}, {"path": "NSA Dokuments/files/pdf/Judge-Walton_Answers_to_Questions_re_FISC.pdf", "length": 1634156}, {"path": "NSA Dokuments/files/pdf/20150117-spiegel-quantumtheory_is_a_set_of_technologies_allowing_man-on-the-side_interference_attacks_on_tcp-ip_connections_includes_straightbizarre_and_daredev.pdf", "length": 1626795}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-nsacss_presentation_on_technical_surveillance_in_europe_and_africa.pdf", "length": 1618051}, {"path": "NSA Dokuments/files/pdf/media-35509.pdf", "length": 1585775}, {"path": "NSA Dokuments/files/pdf/media-35664.pdf", "length": 1583563}, {"path": "NSA Dokuments/files/pdf/20141228-speigel-analysis_from_ssl-tls_connections_through_gchq_in_the_flying_pig_database_0.pdf", "length": 1528939}, {"path": "Snowden/Articles/Jun6-Jul10-WashingtonPost.pdf", "length": 1528650}, {"path": "NSA Dokuments/files/pdf/media-35532.pdf", "length": 1500768}, {"path": "NSA Dokuments/files/pdf/NSA-Boundless_Informant_Frequently_Asked_Questions.pdf", "length": 1472001}, {"path": "NSA Dokuments/files/pdf/NSA-Boundless-Informant-Frequently-Asked-Questions.pdf", "length": 1472001}, {"path": "NSA Dokuments/files/pdf/20150117-spiegel-projects_of_the_tao-ato_department_such_as_the_remote_destruction_of_network_cards.pdf", "length": 1447828}, {"path": "NSA Dokuments/files/pdf/doj-nsa-memo.pdf", "length": 1429151}, {"path": "NSA Dokuments/files/pdf/20131210-wapo-cotraveler_overview.pdf", "length": 1413029}, {"path": "NSA Dokuments/files/pdf/20131119-odni-nsa_course_materials_module_3_v.22.pdf", "length": 1410592}, {"path": "NSA Dokuments/files/pdf/20150117-speigel-analysis_of_chinese_methods_and_performed_actions_in_the_context_of_computer_network_exploitation.pdf", "length": 1409944}, {"path": "NSA Dokuments/files/pdf/media-35512.pdf", "length": 1406327}, {"path": "NSA Files (Raw Documents + Whistleblower Edward Snowden Interview)/SECRET-Justice-Department-NSA-Memos-Proposing-Broader-Powers-for-NSA-to-Collect-Data.pdf", "length": 1393227}, {"path": "Snowden/Info/Original Documents/nsa-memo.pdf", "length": 1393227}, {"path": "NSA Dokuments/files/pdf/nsa-muslim-porn.pdf", "length": 1385051}, {"path": "NSA Dokuments/files/pdf/doody.pdf", "length": 1378336}, {"path": "NSA Dokuments/files/pdf/20141228-speigel-bluesnort_program_on_net_defense_from_encrypted_communications_0.pdf", "length": 1374150}, {"path": "NSA Dokuments/files/pdf/jtrigall.pdf", "length": 1360416}, {"path": "NSA Dokuments/files/pdf/nsa-ppd-20.pdf", "length": 1338802}, {"path": "NSA Files (Raw Documents + Whistleblower Edward Snowden Interview)/TOP-SECRET-Presidential-Directive-Obama-Orders-US-to-Draw-Up-Overseas-List-for-Cyber-Attacks.pdf", "length": 1334366}, {"path": "Snowden/Info/Original Documents/PPD20.pdf", "length": 1334366}, {"path": "NSA Dokuments/files/pdf/20131022-monde-prism_april_2013.pdf", "length": 1323563}, {"path": "NSA Dokuments/files/pdf/20131004-wapo-gchq_mullenize.pdf", "length": 1323563}, {"path": "NSA Dokuments/files/pdf/NSA-Memo-to-DOD---Proposed-Amendment-to-Conduct-Analysis-of-Metadata.pdf", "length": 1294692}, {"path": "NSA Dokuments/files/pdf/NSA-Memo_to_DOD_-_Proposed_Amendment_to_Conduct_Analysis_of_Metadata.pdf", "length": 1294692}, {"path": "NSA Dokuments/files/pdf/20141010-intercept-sentry_eagle_brief_sheet.pdf", "length": 1280347}, {"path": "NSA Files (Raw Documents + More Top Secrets)/TOP SECRET-1qcy12-violations.pdf", "length": 1256603}, {"path": "NSA Dokuments/files/pdf/20130816-wapo-sid_oversight.pdf", "length": 1256603}, {"path": "Snowden/Info/Original Documents/PrivacyViolations2012.pdf", "length": 1256603}, {"path": "NSA Dokuments/files/pdf/20140531-nyt-identity-intelligence.pdf", "length": 1244464}, {"path": "NSA Dokuments/files/pdf/nsa-se-fra-xkeyscore.pdf", "length": 1213600}, {"path": "NSA Dokuments/files/pdf/media-34093.pdf", "length": 1206509}, {"path": "NSA Dokuments/files/pdf/20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf", "length": 1203785}, {"path": "NSA Dokuments/files/pdf/20140204-nbc-british_spies_attacked_hactivist_anonymous.pdf", "length": 1187542}, {"path": "NSA Dokuments/files/pdf/media-35669.pdf", "length": 1179993}, {"path": "NSA Dokuments/files/pdf/20140207-nbc-gchq_honey_trap_cyber_attack_background_on_jtrig.pdf", "length": 1170734}, {"path": "NSA Dokuments/files/pdf/media-35522.pdf", "length": 1165957}, {"path": "NSA Dokuments/files/pdf/SID-Oversight-and-Compliance.pdf", "length": 1161853}, {"path": "NSA Dokuments/files/pdf/SID-Oversight_and_Compliance.pdf", "length": 1161853}, {"path": "NSA Dokuments/files/pdf/20141010-intercept-cno_core_secrets_slide_slices.pdf", "length": 1149372}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-internal_nsa_presentation_on_the_bnds_organization_0.pdf", "length": 1133289}, {"path": "NSA Dokuments/files/pdf/20140207-nrc-boundless_nederland.pdf", "length": 1126474}, {"path": "NSA Dokuments/files/pdf/20140321-le_monde-french_intelligence_e-mail_spying_operation.pdf", "length": 1124138}, {"path": "NSA Dokuments/files/pdf/20140321-le_monde-french_intelligence_e-mail_spying_operation-(1).pdf", "length": 1124138}, {"path": "NSA Dokuments/files/pdf/Section-215_-_Secondary_Order_-_Verizon.pdf", "length": 1110465}, {"path": "NSA Dokuments/files/pdf/Section-215---Secondary-Order---Verizon.pdf", "length": 1110465}, {"path": "NSA Dokuments/files/pdf/20140714-Intercept-jtrigall.pdf", "length": 1107844}, {"path": "NSA Dokuments/files/pdf/CLEANED004.-Cover_Memo-Sealed.pdf", "length": 1102372}, {"path": "NSA Dokuments/files/pdf/media-35663.pdf", "length": 1067838}, {"path": "NSA Dokuments/files/pdf/nsa-windstop-muscular-incenser.pdf", "length": 1058940}, {"path": "NSA Dokuments/files/pdf/20131119-odni-nsa_course_materials_module_1_v.17.pdf", "length": 1056628}, {"path": "NSA Dokuments/files/pdf/nsa-cable-spy-types.pdf", "length": 1053983}, {"path": "NSA Dokuments/files/pdf/20150117-speigel-classification_guide_for_computer_network_exploitation_cne.pdf", "length": 1051875}, {"path": "NSA Dokuments/files/pdf/20131119-odni-nsa_course_materials_module_6_analytic_personal_v.18.pdf", "length": 1044395}, {"path": "Snowden/Info/Original Documents/nsa-talking-points.pdf", "length": 1040134}, {"path": "NSA Dokuments/files/pdf/20131211-svt-final_agenda_sweden_usa.pdf", "length": 1039395}, {"path": "NSA Dokuments/files/pdf/media-35549.pdf", "length": 1037061}, {"path": "NSA Dokuments/files/pdf/20131004-guard-iat_tor.pdf", "length": 1024271}, {"path": "NSA Dokuments/files/pdf/nsa-sso-slides.pdf", "length": 1009721}, {"path": "NSA Dokuments/files/pdf/media-35659.pdf", "length": 1003569}, {"path": "NSA Dokuments/files/pdf/20130627-guard-2007_memo_on_us_person_metadata.pdf", "length": 997482}, {"path": "NSA Dokuments/files/pdf/20141010-intercept-computer_network_exploitation_classification_guide.pdf", "length": 988978}, {"path": "NSA Dokuments/files/pdf/nsa-tao-ant-pdf.pdf", "length": 985623}, {"path": "NSA Dokuments/files/pdf/nsa-catalog-appelbaum.pdf", "length": 973455}, {"path": "NSA Files (Raw Documents + Whistleblower Edward Snowden Interview)/TOP-SECRET-NSA PRISM slide show.pdf", "length": 964914}, {"path": "NSA Dokuments/files/pdf/20141010-intercept-exceptionally_controlled_information_listing.pdf", "length": 957295}, {"path": "NSA Dokuments/files/pdf/nsa-hosts-fr-spies.pdf", "length": 943714}, {"path": "NSA Dokuments/files/pdf/nsa-prism-dk.pdf", "length": 940319}, {"path": "NSA Dokuments/files/pdf/20131119-odni-nsa_course_materials_module_5_v.24.pdf", "length": 928231}, {"path": "NSA Dokuments/files/pdf/20131211-svt-xkeyscore_sweden_meeting.pdf", "length": 926927}, {"path": "NSA Dokuments/files/pdf/20141228-spiegel-guide_for_analysts_on_how_to_use_the_prism_skype_collection.pdf", "length": 917792}, {"path": "NSA Dokuments/files/pdf/media-35519.pdf", "length": 913508}, {"path": "NSA Dokuments/files/pdf/dsd-3g.pdf", "length": 907612}, {"path": "NSA Dokuments/files/pdf/20140311-nyt-classification_guide_for_fisa_the_protect_america_act_and_the_fisa_amendments_act.pdf", "length": 898002}, {"path": "NSA Dokuments/files/pdf/20140116-guard-dishfire_presentation.pdf", "length": 882339}, {"path": "NSA Dokuments/files/pdf/20131210-wapo-ghost_machine.pdf", "length": 880174}, {"path": "NSA Dokuments/files/pdf/nsa-fisa-targeting.pdf", "length": 879657}, {"path": "NSA Files (Raw Documents + Whistleblower Edward Snowden Interview)/TOP-SECRET-Procedures-Used-by-NSA-to-Target-Non-US-Persons-Exhibit-A.pdf", "length": 874836}, {"path": "Snowden/Info/Original Documents/exhibit-a.pdf", "length": 874836}, {"path": "NSA Dokuments/files/pdf/nsa-smartphones-analysis.pdf", "length": 868858}, {"path": "NSA Dokuments/files/pdf/20140127-nyt-converged_analysis_on_smartphone_devices.pdf", "length": 868858}, {"path": "NSA Dokuments/files/pdf/20141228-spiegel-gchq_presentation_on_the_bullrun_programs_decryption_capabilities.pdf", "length": 864459}, {"path": "NSA Dokuments/files/pdf/media-35514.pdf", "length": 855108}, {"path": "NSA Dokuments/files/pdf/20131119-odni-nsa_course_materials_module_2_v.16.pdf", "length": 831219}, {"path": "NSA Dokuments/files/pdf/20130911-guard-israel_sharing_0.pdf", "length": 827489}, {"path": "NSA Dokuments/files/pdf/media-35655.pdf", "length": 827256}, {"path": "NSA Dokuments/files/pdf/nsa-fisa-minimization.pdf", "length": 818317}, {"path": "NSA Dokuments/files/pdf/europebriefingnote_en.pdf", "length": 816654}, {"path": "NSA Dokuments/files/pdf/20131126-huffpo-radicalizers_pornography.pdf", "length": 814331}, {"path": "NSA Files (Raw Documents + Whistleblower Edward Snowden Interview)/secret-procedures-used-by-nsa-to-minimize-data-collection-from-us-persons-exhibit-b.pdf", "length": 813503}, {"path": "Snowden/Info/Original Documents/exhibit-b.pdf", "length": 813503}, {"path": "NSA Dokuments/files/pdf/20140831-spiegel-nsa_intelligence_relationship_with_turkey.pdf", "length": 801665}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-guidelines_for_the_classification_of_suslag_details_and_the_nsa-bnd_cooperation.pdf", "length": 796605}, {"path": "NSA Dokuments/files/pdf/media-35548.pdf", "length": 785307}, {"path": "Snowden/Articles/Jun6-TheGuardian.pdf", "length": 779743}, {"path": "NSA Dokuments/files/pdf/20141010-intercept-tarex_classification_guide.pdf", "length": 775743}, {"path": "NSA Dokuments/files/pdf/nsa-smartphones.pdf", "length": 759173}, {"path": "NSA Dokuments/files/pdf/20131230-spiegel-tao_quantum_theory.pdf", "length": 745183}, {"path": "NSA Dokuments/files/pdf/nsa-finance-spy-de.pdf", "length": 744428}, {"path": "NSA Dokuments/files/pdf/discovery-sigint-targeting-scenarios-and.pdf", "length": 744287}, {"path": "NSA Dokuments/files/pdf/20130608-guard-boundless_informant_capabilities-(1).pdf", "length": 736548}, {"path": "NSA Dokuments/files/pdf/20130905-guard-bullrun.pdf", "length": 703279}, {"path": "NSA Dokuments/files/pdf/20141010-intercept-eci_whipgenie_classification_guide.pdf", "length": 700796}, {"path": "NSA Dokuments/files/pdf/20140831-spiegel-turkey_and_the_pkk.pdf", "length": 685670}, {"path": "NSA Dokuments/files/pdf/nsa-dutch-sigint.pdf", "length": 683635}, {"path": "NSA Dokuments/files/pdf/20131025-monde-french_cyberattacks.pdf", "length": 682381}, {"path": "NSA Dokuments/files/pdf/media-35525.pdf", "length": 681426}, {"path": "NSA Dokuments/files/pdf/20130908-globo-tv.pdf", "length": 665348}, {"path": "NSA Dokuments/files/pdf/20131027-spiegel-embassy.pdf", "length": 647548}, {"path": "NSA Dokuments/files/pdf/20140218-intercept-discovery_sigint_targeting_scenarios_and_compliance.pdf", "length": 646602}, {"path": "NSA Dokuments/files/pdf/20140831-spiegel-kurdistan_regional_government.pdf", "length": 638091}, {"path": "NSA Dokuments/files/pdf/20131104-mundo-boundless_informant.pdf", "length": 636360}, {"path": "NSA Dokuments/files/pdf/20141228-spiegel-malibu_architecture_overview_to_exploit_vpn_communication.pdf", "length": 635507}, {"path": "NSA Dokuments/files/pdf/media-35653.pdf", "length": 635340}, {"path": "NSA Dokuments/files/pdf/20131130-GlobeandMail-csec-br-spy.pdf", "length": 631438}, {"path": "NSA Dokuments/files/pdf/csec-br-spy.pdf", "length": 631438}, {"path": "NSA Dokuments/files/pdf/FAA-Targeting_Procedures.pdf", "length": 630424}, {"path": "NSA Dokuments/files/pdf/20140831-spiegel-jordan_belgium.pdf", "length": 623259}, {"path": "Snowden/Articles/www_washingtonpost_com_blogs_wonkblog_wp_2013_08_29_your-cheat-sheet-to-americas-secret-intelligence-budget.pdf", "length": 618920}, {"path": "Snowden/Articles/Jun5-TheGuardian.pdf", "length": 618154}, {"path": "NSA Dokuments/files/pdf/nsa-cotraveler.pdf", "length": 617294}, {"path": "NSA Dokuments/files/pdf/media-35680.pdf", "length": 617106}, {"path": "NSA Dokuments/files/pdf/20130629-wapo-prism.pdf", "length": 617080}, {"path": "Snowden/Articles/Jul11-TheGuardian.pdf", "length": 613850}, {"path": "NSA Dokuments/files/pdf/media-35546.pdf", "length": 613648}, {"path": "NSA Dokuments/files/pdf/nsa-windstop.pdf", "length": 611246}, {"path": "NSA Dokuments/files/pdf/20140207-nbc-gchq_honey_trap_cyber_attack_leveraging_foreign_journalists_via_jtrig.pdf", "length": 605049}, {"path": "NSA Dokuments/files/pdf/20140430-intercept-prism_olympics.pdf", "length": 595175}, {"path": "NSA Dokuments/files/pdf/media-35517.pdf", "length": 589731}, {"path": "NSA Dokuments/files/pdf/FAA-Minimization-Procedures.pdf", "length": 588628}, {"path": "NSA Dokuments/files/pdf/FAA-Minimization_Procedures.pdf", "length": 588628}, {"path": "NSA Dokuments/files/pdf/media-35537.pdf", "length": 588260}, {"path": "NSA Dokuments/files/pdf/media-35536.pdf", "length": 584864}, {"path": "NSA Dokuments/files/pdf/20141228-spiegel-explanation_of_the_gallantwave_that_decrypts_vpn_traffic_within_longhaul.pdf", "length": 583965}, {"path": "NSA Dokuments/files/pdf/nsa-se-fra-xkeyscore-slide.pdf", "length": 583938}, {"path": "NSA Dokuments/files/pdf/nsa-microsoft-cloud-exploit.pdf", "length": 580868}, {"path": "NSA Dokuments/files/pdf/20140519-intercept-sso_mystic_charts.pdf", "length": 576738}, {"path": "NSA Dokuments/files/pdf/20131211-svt-nsa_slides_xkeyscore.pdf", "length": 576159}, {"path": "NSA Dokuments/files/pdf/20130606-wapo-prism.pdf", "length": 575516}, {"path": "NSA Dokuments/files/pdf/20140914-spiegel-treasure_map_announces_a_new_release-(1).pdf", "length": 565207}, {"path": "NSA Dokuments/files/pdf/20140914-spiegel-treasure_map_announces_a_new_release.pdf", "length": 565207}, {"path": "NSA Dokuments/files/pdf/nsa-se-fra-relationship.pdf", "length": 564680}, {"path": "NSA Dokuments/files/pdf/nsa-sso-content.pdf", "length": 564482}, {"path": "NSA Dokuments/files/pdf/vpn-and-voip-exploitation-with-hammerchant.pdf", "length": 564231}, {"path": "NSA Dokuments/files/pdf/nsa-sigint-cryptologic-platform.pdf", "length": 557841}, {"path": "NSA Dokuments/files/pdf/20130620-guard-702_targeting_procedures.pdf", "length": 552106}, {"path": "NSA Dokuments/files/pdf/20140305-nrc-dutch_shares_collected_anti-piracy_information_with_nsa.pdf", "length": 548849}, {"path": "NSA Dokuments/files/pdf/media-35544.pdf", "length": 548136}, {"path": "NSA Dokuments/files/pdf/20141010-intercept-eci_compartments.pdf", "length": 547386}, {"path": "NSA Dokuments/files/pdf/CLEANEDFinal-USSID_SP0018_Annex_J.pdf", "length": 545421}, {"path": "NSA Dokuments/files/pdf/20130608-guard-boundless_informant_faq.pdf", "length": 544932}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-final_agenda_of_a_meeting_between_high-ranking_nsa_and_bnd_officials.pdf", "length": 537778}, {"path": "NSA Dokuments/files/pdf/media-35681.pdf", "length": 536210}, {"path": "NSA Dokuments/files/pdf/20130909-spiegel-smartphones-(1).pdf", "length": 532109}, {"path": "NSA Dokuments/files/pdf/Targeting-Rationale_-_TAR.pdf", "length": 529174}, {"path": "NSA Dokuments/files/pdf/Targeting-Rationale---TAR.pdf", "length": 529174}, {"path": "NSA Dokuments/files/pdf/nsa-quantum-computer.pdf", "length": 527392}, {"path": "NSA Dokuments/files/pdf/20140312-intercept-quantum_insert_diagrams.pdf", "length": 526759}, {"path": "NSA Dokuments/files/pdf/20130620-guard-702_minimization_procedures.pdf", "length": 522075}, {"path": "Snowden/Articles/www_cbc_ca_news_politics_new-snowden-docs-show-u-s-spied-during-g20-in-toronto-1_2442448.pdf", "length": 520800}, {"path": "NSA Dokuments/files/pdf/media-35524.pdf", "length": 520241}, {"path": "NSA Dokuments/files/pdf/media-35531.pdf", "length": 506289}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-briefing_on_the_visit_to_the_nsa_of_a_high-ranking_bnd_official.pdf", "length": 503500}, {"path": "NSA Dokuments/files/pdf/20140320-intercept-targeting_system_administrator_accounts.pdf", "length": 502451}, {"path": "NSA Dokuments/files/pdf/20141228-speigel-description_of_existing_projects_on_vpn_decryption_0.pdf", "length": 499351}, {"path": "NSA Dokuments/files/pdf/cne-access-to-core-mobile-networks.pdf", "length": 477033}, {"path": "NSA Dokuments/files/pdf/20131104-wapo-sso_overview.pdf", "length": 476644}, {"path": "NSA Dokuments/files/pdf/20140312-intercept-vpn_and_voip_exploitation_with_hammerchant_and_hammerstein.pdf", "length": 470080}, {"path": "NSA Dokuments/files/pdf/20130816-wapo-targeting_rationale.pdf", "length": 467990}, {"path": "NSA Dokuments/files/pdf/nsa-se-spies.pdf", "length": 466351}, {"path": "NSA Dokuments/files/pdf/the-nsa-and-gchqs-quantumtheory-hacking-tactics.pdf", "length": 461882}, {"path": "NSA Dokuments/files/pdf/turbine-and-turmoil.pdf", "length": 451771}, {"path": "NSA Dokuments/files/pdf/20140311-nyt-nsa_memo_expands_access_to_fisa_information.pdf", "length": 450560}, {"path": "NSA Dokuments/files/pdf/20141010-intercept-eci_pawleys_classification_guide.pdf", "length": 445177}, {"path": "NSA Dokuments/files/pdf/20141228-spiegel-gchq_briefing_on_the_bullrun_program.pdf", "length": 439648}, {"path": "NSA Files (Raw Documents + More Top Secrets)/TOP SECRET-target-analyst-rationale-instructions-final.pdf", "length": 438835}, {"path": "NSA Dokuments/files/pdf/20141204-intercept-auroragold_working_aid.pdf", "length": 438016}, {"path": "NSA Dokuments/files/pdf/media-35541.pdf", "length": 436268}, {"path": "NSA Dokuments/files/pdf/20130916-spiegel-credit_card_transactions.pdf", "length": 432315}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod-(1).pdf", "length": 428452}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod.pdf", "length": 428452}, {"path": "NSA Dokuments/files/pdf/20141204-intercept-auroragold_project_overview.pdf", "length": 428061}, {"path": "Snowden/Articles/www_theguardian_com_world_2013_nov_20_us-uk-secret-deal-surveillance-personal-data.pdf", "length": 427907}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-details_on_xkeyscore_from_an_internal_gchq_website.pdf", "length": 423576}, {"path": "Snowden/Articles/Jun18-TheGuardian.pdf", "length": 420296}, {"path": "NSA Dokuments/files/pdf/media-35552.pdf", "length": 414415}, {"path": "NSA Dokuments/files/pdf/20150117-spiegel-report_of_an_nsa_employee_about_a_backdoor_in_the_openssh_daemon.pdf", "length": 412601}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-report_on_an_xkeyscore_training_session_at_the_ecc_dagger_complex.pdf", "length": 412145}, {"path": "NSA Dokuments/files/pdf/20140831-spiegel-nsas_oldest_third_party_partnership.pdf", "length": 407322}, {"path": "NSA Dokuments/files/pdf/20140831-spiegel-nsas_oldest_third_party_partnership-(1).pdf", "length": 407322}, {"path": "NSA Dokuments/files/pdf/nsa-gchq-se-fra-comint.pdf", "length": 407181}, {"path": "Snowden/Info/Snowden Info/Jun17-PublicQ&A.pdf", "length": 403793}, {"path": "NSA Dokuments/files/pdf/media-35654.pdf", "length": 403489}, {"path": "NSA Dokuments/files/pdf/20140825-Intercept-Metadata-Sharing-Memorandum.pdf", "length": 402039}, {"path": "NSA Dokuments/files/pdf/20140322-nyt-operation_shotgiant_objectives.pdf", "length": 393731}, {"path": "NSA Dokuments/files/pdf/media-35547.pdf", "length": 392308}, {"path": "NSA Dokuments/files/pdf/20130905-guard-sigint_enabling.pdf", "length": 391299}, {"path": "NSA Dokuments/files/pdf/20150210-intercept-iran_current_topics_-_interactions_with_gchq.pdf", "length": 391075}, {"path": "NSA Dokuments/files/pdf/nsa-close-access-sigads.pdf", "length": 388067}, {"path": "NSA Dokuments/files/pdf/20131119-odni-nsa_course_materials_intro_v.13.pdf", "length": 387153}, {"path": "NSA Dokuments/files/pdf/20140831-spiegel-iraq_uk_load_sharing_carriers.pdf", "length": 385825}, {"path": "NSA Dokuments/files/pdf/20140831-spiegel-turkish_signal_intelligence_chief_agenda.pdf", "length": 383925}, {"path": "NSA Dokuments/files/pdf/20140831-Spiegel-NCRs-with-Foreign-Relations-Missions-Become-SUSLAs.pdf", "length": 383819}, {"path": "NSA Dokuments/files/pdf/20140102-wapo-quantum_computers_hard_targets.pdf", "length": 383716}, {"path": "NSA Dokuments/files/pdf/20131123-nyt-sigint_strategy_feb_2012.pdf", "length": 381677}, {"path": "NSA Dokuments/files/pdf/nsa-sigint-strategy-2012-2016.pdf", "length": 381220}, {"path": "Snowden/Articles/Jun10-TheGuardian.pdf", "length": 375275}, {"path": "NSA Dokuments/files/pdf/media-35523.pdf", "length": 375259}, {"path": "NSA Dokuments/files/pdf/20140211-intercept-drones_intercepting_communications.pdf", "length": 374614}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-nsacss_europe-_report_on_the_experiences_of_one_nsa_worker.pdf", "length": 371680}, {"path": "NSA Dokuments/files/pdf/20140610-cryptome-dea-nsa-sandkey.pdf", "length": 370038}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-boundless_informant_statistics_on_data_from_22foreign_partners22.pdf", "length": 364591}, {"path": "NSA Dokuments/files/pdf/20140312-intercept-nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf", "length": 362109}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-boundless_informant_statistics_for_so-called_third_parties.pdf", "length": 361988}, {"path": "NSA Dokuments/files/pdf/20150117-spiegel-nsa_project_description_to_recognize_and_process_data_that_comes_from_third_party_attacks_on_computers.pdf", "length": 360912}, {"path": "Snowden/Articles/Jun7-TheGuardian.pdf", "length": 360091}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-preliminary_agenda_of_a_meeting_between_nsa_and_bnd_officials.pdf", "length": 357869}, {"path": "NSA Dokuments/files/pdf/nsa-sigint-enabling-nyt-13-0905.pdf", "length": 356022}, {"path": "Snowden/Articles/Jun16-TheGuardian[3].pdf", "length": 349871}, {"path": "NSA Dokuments/files/pdf/20131117-guardian-dsd_3g.pdf", "length": 348641}, {"path": "Snowden/Articles/Jun16-TheGuardian[4].pdf", "length": 346272}, {"path": "NSA Dokuments/files/pdf/20140831-spiegel-collaboration_in_overdrive.pdf", "length": 343402}, {"path": "NSA Dokuments/files/pdf/saudi-arabia-information-paper.pdf", "length": 343075}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-report_on_the_one-year_anniversary_of_the_nsa_liaison_unit_suslag_in_bad_aibling.pdf", "length": 342756}, {"path": "NSA Dokuments/files/pdf/20141010-intercept-cno_core_secrets_security_structure.pdf", "length": 337031}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-cooperation_between_the_nsa_bnd_and_bfv.pdf", "length": 335793}, {"path": "NSA Dokuments/files/pdf/20140618-DerSpiegel-internal_nsa_discussion_guidelines_relating_to_cooperation_with_the_bnd_and_bfv.pdf", "length": 334597}, {"path": "Snowden/Info/Snowden Info/GordenHumphrey.pdf", "length": 334504}, {"path": "NSA Dokuments/files/pdf/nsa-gsm-tracking.pdf", "length": 334309}, {"path": "NSA Dokuments/files/pdf/20140725-Intercept-Saudi-Arabia-Information-Paper.pdf", "length": 332938}, {"path": "NSA Dokuments/files/pdf/ambassadesFrance.pdf", "length": 327644}, {"path": "NSA Dokuments/files/pdf/20130920-spiegel-belgacom.pdf", "length": 325409}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-boundless_informant_overview_global.pdf", "length": 324155}, {"path": "NSA Dokuments/files/pdf/20140313-intercept-nsa_cooperative_third_party_relationships.pdf", "length": 319692}, {"path": "NSA Dokuments/files/pdf/20131004-wapo-tor.pdf", "length": 318031}, {"path": "Snowden/Articles/Jun27-TheGuardian-Datamine.pdf", "length": 314172}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-report_on_an_nsa_visit_to_bnd_site_and_on_data_transfer_from_the_bnd_to_the_nsa.pdf", "length": 313136}, {"path": "Snowden/Info/Snowden Info/Jun10-TheGuardianQ&A.pdf", "length": 309908}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-world_map_from_the_boundless_informant_program.pdf", "length": 309886}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-report_on_the_work_of_nsacss_europe.pdf", "length": 307007}, {"path": "Snowden/Articles/Jun16-TheGuardian[1].pdf", "length": 306505}, {"path": "Snowden/Articles/Jun8-TheGuardian.pdf", "length": 304704}, {"path": "Snowden/Articles/Jun21-TheGuardian[1].pdf", "length": 304347}, {"path": "Snowden/Info/Snowden Info/Jul1-LetterToEcuador.pdf", "length": 303422}, {"path": "Snowden/Articles/www_theguardian_com_world_2013_oct_24_nsa-surveillance-world-leaders-calls#.pdf", "length": 303329}, {"path": "NSA Dokuments/files/pdf/nsa-scissors.pdf", "length": 302247}, {"path": "NSA Dokuments/files/pdf/PRISM-Powerpoint_Slides_re_Data_Acquisition.pdf", "length": 301922}, {"path": "NSA Dokuments/files/pdf/PRISM-Powerpoint-Slides-re-Data-Acquisition.pdf", "length": 301922}, {"path": "NSA Dokuments/files/pdf/nsa-gchq-fra-quantum.pdf", "length": 301700}, {"path": "NSA Dokuments/files/pdf/20140709-Intercept-spying_on_muslim-american_leaders.pdf", "length": 301432}, {"path": "NSA Dokuments/files/pdf/20131209-nyt-nsa_games.pdf", "length": 300966}, {"path": "NSA Dokuments/files/pdf/20131119-odni-nsa_summary_of_requirements_for_collection_of_bulk_metadata.pdf", "length": 300966}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-gchq_report_on_the_technical_abilities_of_tempora.pdf", "length": 300455}, {"path": "Snowden/Articles/Jun23-TheGuardian.pdf", "length": 299637}, {"path": "Snowden/Articles/Jun21-TheGuardian.pdf", "length": 299520}, {"path": "NSA Dokuments/files/pdf/FISC-Order,_BR_06-12.pdf", "length": 299124}, {"path": "NSA Dokuments/files/pdf/FISC-Order,-BR-06-12.pdf", "length": 299124}, {"path": "Snowden/Articles/www_theguardian_com_world_2013_dec_09_nsa-spies-online-games-world-warcraft-second-life.pdf", "length": 296590}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-boundless_informant_statistics_on_germany.pdf", "length": 295953}, {"path": "Snowden/Articles/Jun30-TheGuardian.pdf", "length": 295850}, {"path": "NSA Dokuments/files/pdf/20140825-Intercept-CRISSCROSSPROTON-Point-Paper.pdf", "length": 295824}, {"path": "Snowden/Articles/Jun16-TheGuardian[2].pdf", "length": 294856}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-report_on_the_beginnings_of_the_european_security_center_esc_in_the_dagger_complex.pdf", "length": 293922}, {"path": "Snowden/Articles/www_theguardian_com_world_2013_aug_09_nsa-loophole-warrantless-searches-email-calls.pdf", "length": 293460}, {"path": "NSA Dokuments/files/pdf/20141228-spiegel-description_of_voip_telephony_encryption_methods_and_other_ways_to_attack.pdf", "length": 291482}, {"path": "Snowden/Articles/www_theguardian_com_world_2013_sep_30_nsa-americans-metadata-year-documents.pdf", "length": 289176}, {"path": "NSA Dokuments/files/pdf/20130928-nyt-contact_chaining.pdf", "length": 287173}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-report_on_the_nsas_access_to_tempora.pdf", "length": 286952}, {"path": "NSA Dokuments/files/pdf/20141228-speigel-classification_guide_for_cryptanalysis_0.pdf", "length": 283282}, {"path": "NSA Dokuments/files/pdf/nsa-wanadoo-alcatel.pdf", "length": 281180}, {"path": "NSA Dokuments/files/pdf/20131122-dagbladet-boundless_informant_faq.pdf", "length": 280710}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-report_on_the_changing_of_the_escs_name_to_european_security_operations_center_esoc.pdf", "length": 280506}, {"path": "Snowden/Articles/Jun27-TheGuardian.pdf", "length": 279355}, {"path": "NSA Dokuments/files/pdf/20140831-spiegel-sinio_seminar_turkish_elections.pdf", "length": 279111}, {"path": "NSA Dokuments/files/pdf/20140831-spiegel-sinio_seminar_turkey_and_the_kurds.pdf", "length": 277716}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-report_on_an_unexploded_ordnance_alarm_at_european_technical_centern.pdf", "length": 276417}, {"path": "NSA Dokuments/files/pdf/20141214-intercept-gchq_stargate_cne_requirements.pdf", "length": 276323}, {"path": "NSA Dokuments/files/pdf/20140630-WaPo-odni_certification_regarding_foreign_entities.pdf", "length": 275527}, {"path": "NSA Dokuments/files/pdf/PRISM-Overview-Powerpoint-Slides.pdf", "length": 272732}, {"path": "NSA Dokuments/files/pdf/PRISM-Overview_Powerpoint_Slides.pdf", "length": 272732}, {"path": "NSA Dokuments/files/pdf/nsa-tor.pdf", "length": 272040}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-nostalgic_recollections_from_nsa_workers_formerly_stationed_in_bad_aibling.pdf", "length": 271874}, {"path": "Snowden/Articles/Jun20-TheGuardian.pdf", "length": 270406}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-explanation_of_nymrod_a_system_for_searching_for_people_and_places_in_databases_and_documents.pdf", "length": 269625}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-report_on_a_wharpdrive_incident_in_an_sso_presentation.pdf", "length": 267390}, {"path": "NSA Dokuments/files/pdf/20141228-spiegel-explanation_of_the_turmoil_gallantwave_program_and_its_role_when_attacking_vpn_0.pdf", "length": 264078}, {"path": "Snowden/Info/Snowden Info/StatementToGerman.pdf", "length": 263928}, {"path": "NSA Dokuments/files/pdf/20140831-spiegel-sinio_seminar_tough_times_for_turkey.pdf", "length": 262106}, {"path": "NSA Dokuments/files/pdf/20140831-spiegel-sinio_seminar_tough_times_for_turkey-(1).pdf", "length": 262106}, {"path": "NSA Dokuments/files/pdf/20131210-wapo-location_cookies.pdf", "length": 261412}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-report_on_the_surveillance_of_african_countries_by_jsa.pdf", "length": 260895}, {"path": "NSA Dokuments/files/pdf/20140825-Intercept-DNI-Decision-Memorandum-on-ICREACH.pdf", "length": 260641}, {"path": "Snowden/Articles/www_nytimes_com_2013_09_06_us_nsa-foils-much-internet-encryption.pdf", "length": 257587}, {"path": "NSA Dokuments/files/pdf/20141228-spiegel-explanation_of_the_poisennut_product_and_its_role_when_attacking_vpn.pdf", "length": 256236}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-report_on_an_nsa_sigdev_training_course_for_allied_countries_.pdf", "length": 255853}, {"path": "NSA Dokuments/files/pdf/20130905-guard-cryptanalysis_classification.pdf", "length": 254213}, {"path": "NSA Dokuments/files/pdf/20131120-guard-collection_processing_and_dissemination_of_allied_communications.pdf", "length": 252290}, {"path": "NSA Dokuments/files/pdf/20131030-wapo-muscular_smiley.pdf", "length": 249865}, {"path": "Snowden/Articles/Jun21-TheGuardian[2].pdf", "length": 247193}, {"path": "NSA Dokuments/files/pdf/20140227-guard-gchq_optic.pdf", "length": 246413}, {"path": "NSA Dokuments/files/pdf/20141204-intercept-nsa_gchq_csec_network_tradecraft_advancement.pdf", "length": 245153}, {"path": "NSA Dokuments/files/pdf/CLEANED096.-NSA_summary_of_BR_requirements_(maybe_Feb_2009)-.pdf", "length": 242626}, {"path": "NSA Dokuments/files/pdf/20150204-intercept-nato_civilian_intelligence_council_cyber_panel.pdf", "length": 241772}, {"path": "Snowden/Articles/Jun19-NYTimes-P1.pdf", "length": 240948}, {"path": "NSA Dokuments/files/pdf/20131204-wapo-fascia-(1).pdf", "length": 238828}, {"path": "NSA Dokuments/files/pdf/20131204-wapo-fascia.pdf", "length": 238828}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-faqs_on_the_boundless_informant_program.pdf", "length": 237441}, {"path": "NSA Dokuments/files/pdf/20140914-intercept-ferguson_visit_precis.pdf", "length": 237266}, {"path": "NSA Dokuments/files/pdf/20141228-spiegel-general_description_how_nsa_handles_encrypted_traffic.pdf", "length": 236017}, {"path": "NSA Dokuments/files/pdf/20150117-speigel-document_about_the_expansion_of_the_remote_operations_center_roc_on_endpoint_operations.pdf", "length": 233619}, {"path": "NSA Dokuments/files/pdf/20140914-intercept-key_activities_in_progress.pdf", "length": 233574}, {"path": "NSA Dokuments/files/pdf/20150117-speigel-combination_of_offensive_and_defensive_missions_-_how_fourth-party_missions_are_being_performed.pdf", "length": 231642}, {"path": "Snowden/Articles/Jun9-WashingtonPost.pdf", "length": 230959}, {"path": "NSA Dokuments/files/pdf/20140128-guard-leaky_phone_apps_0.pdf", "length": 227601}, {"path": "NSA Dokuments/files/pdf/nsa-sso-dk.pdf", "length": 227379}, {"path": "Snowden/Info/Snowden Info/SnowdenMaassTranscript.pdf", "length": 227127}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-overview_of_the_use_of_boundless_informant_world_map.pdf", "length": 225029}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-report_on_the_technical_expansion_of_the_european_technical_center_in_wiesbaden.pdf", "length": 224164}, {"path": "Snowden/Articles/Jun9-WashingtonPost[2].pdf", "length": 223669}, {"path": "NSA Dokuments/files/pdf/20140312-intercept-turbine_and_turmoil.pdf", "length": 223198}, {"path": "Snowden/Info/Original Documents/FASCIA.pdf", "length": 221638}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-restrictions_on_the_technical_surveillance_performed_by_jsa.pdf", "length": 219329}, {"path": "NSA Dokuments/files/pdf/20150117-spiegel-supply-chain_interdiction_-_stealthy_techniques_can_crack_some_of_sigints_hardest_targets.pdf", "length": 218017}, {"path": "NSA Dokuments/files/pdf/20140803-Intercept-NSA-Intelligence-Relationship-With-Israel.pdf", "length": 217162}, {"path": "NSA Dokuments/files/pdf/20130710-wapo-upstream.pdf", "length": 212747}, {"path": "NSA Dokuments/files/pdf/20140831-spiegel-turkey_at_the_g20_pre-meeting.pdf", "length": 211771}, {"path": "NSA Dokuments/files/pdf/20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker-(1).pdf", "length": 209754}, {"path": "NSA Dokuments/files/pdf/20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker.pdf", "length": 209754}, {"path": "Snowden/Articles/Jun19-NYTimes-P2.pdf", "length": 205375}, {"path": "NSA Dokuments/files/pdf/20131021-monde-close_access_sigads.pdf", "length": 203292}, {"path": "NSA Dokuments/files/pdf/nsa-g8-g20-spying-02.pdf", "length": 200957}, {"path": "NSA Dokuments/files/pdf/20131211-svt-xkeyscore_slide_with_swedish_example.pdf", "length": 200199}, {"path": "NSA Dokuments/files/pdf/20140311-nyt-nsa_timeline_of_surveillance_law_developments.pdf", "length": 199641}, {"path": "NSA Dokuments/files/pdf/20140825-Intercept-ICREACH-Sharing-SIGINT-Comms-Metadata-with-the-Intel-Community-Memo.pdf", "length": 199255}, {"path": "NSA Dokuments/files/pdf/nsa-g8-g20-spying.pdf", "length": 196156}, {"path": "NSA Dokuments/files/pdf/20131211-svt-accomplishments_from_nsa.pdf", "length": 195825}, {"path": "NSA Dokuments/files/pdf/20131211-svt-nsa_internal_pm_on_fra.pdf", "length": 194266}, {"path": "NSA Dokuments/files/pdf/nsa-boundless-informant.pdf", "length": 193949}, {"path": "NSA Dokuments/files/pdf/nsa-5-eyes-spy-g20-dk.pdf", "length": 192867}, {"path": "NSA Dokuments/files/pdf/20141228-spiegel-explanation_of_the_transform_engine_emulator_when_attacking_vpn.pdf", "length": 191450}, {"path": "NSA Dokuments/files/pdf/20130928-nyt-syanpse.pdf", "length": 190847}, {"path": "NSA Dokuments/files/pdf/20150117-spiegel-sample_code_of_a_malware_program_from_the_five_eyes_alliance.pdf", "length": 189313}, {"path": "NSA Dokuments/files/pdf/General-Alexander_Letter_re_NSA_Fact_Sheet_Inaccuracy.pdf", "length": 188725}, {"path": "NSA Dokuments/files/pdf/General-Alexander-Letter-re-NSA-Fact-Sheet-Inaccuracy.pdf", "length": 188725}, {"path": "NSA Dokuments/files/pdf/20131211-svt-sweden_neutral.pdf", "length": 187258}, {"path": "NSA Dokuments/files/pdf/nsa-sso1-guardian-13-1101.pdf", "length": 187070}, {"path": "Snowden/Info/Original Documents/CableTaps.pdf", "length": 187070}, {"path": "NSA Dokuments/files/pdf/20140825-Intercept-Metadata-Policy-Conference.pdf", "length": 185348}, {"path": "NSA Dokuments/files/pdf/20131020-spiegel-mexican_president.pdf", "length": 185261}, {"path": "NSA Files (Raw Documents + More Top Secrets)/NSA broke privacy rules thousands of times per year, audit finds - The Washington Post.pdf", "length": 182381}, {"path": "NSA Dokuments/files/pdf/media-35545.pdf", "length": 181827}, {"path": "Snowden/Info/Original Documents/MUSCULAR.pdf", "length": 180471}, {"path": "Snowden/Articles/South China Morning Post 12Jun-25Jun/Jun22-SCMP-Pacnet.pdf", "length": 179701}, {"path": "NSA Dokuments/files/pdf/Wyden-Udall-Letter_on_NSA_Fact_Sheet_Inaccuracy.pdf", "length": 178135}, {"path": "NSA Dokuments/files/pdf/Wyden-Udall-Letter-on-NSA-Fact-Sheet-Inaccuracy.pdf", "length": 178135}, {"path": "NSA Dokuments/files/pdf/20131119-odni-interim_competency_test_for_access_to_fisa_data.pdf", "length": 175250}, {"path": "NSA Dokuments/files/pdf/20141228-spiegel-intercept_with_otr_encrypted_chat.pdf", "length": 173633}, {"path": "NSA Dokuments/files/pdf/20131205-espresso-italy_spying.pdf", "length": 172835}, {"path": "NSA Dokuments/files/pdf/20150117-speigel-document_explaining_the_role_of_the_remote_operations_center_roc.pdf", "length": 171841}, {"path": "NSA Dokuments/files/pdf/media-35668.pdf", "length": 171491}, {"path": "NSA Dokuments/files/pdf/nsa-tao-ant.pdf", "length": 168489}, {"path": "NSA Dokuments/files/pdf/nsa-xkeyscore-tor-slides.pdf", "length": 164383}, {"path": "NSA Dokuments/files/pdf/20141125-sz-cable_master_list_ac.pdf", "length": 162573}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-boundless_informant_statistics_on_the_uk.pdf", "length": 160846}, {"path": "NSA Dokuments/files/pdf/Section-215---Obama-Administration-White-Paper.pdf", "length": 160237}, {"path": "NSA Dokuments/files/pdf/Section-215_-_Obama_Administration_White_Paper.pdf", "length": 160237}, {"path": "NSA Dokuments/files/pdf/20131202-guard-dsd_data.pdf", "length": 156510}, {"path": "NSA Dokuments/files/pdf/20131211-svt-baltic_region.pdf", "length": 156074}, {"path": "NSA Dokuments/files/pdf/20131211-svt-baltic_region-(1).pdf", "length": 156074}, {"path": "NSA Dokuments/files/pdf/20141125-sz-partner_cables.pdf", "length": 155377}, {"path": "NSA Dokuments/files/pdf/20130809-guard-702_glossary.pdf", "length": 155360}, {"path": "NSA Dokuments/files/pdf/20140618-der_spiegel-report_on_data_exchange_between_the_nsa_and_bnd_within_the_jsa_framework.pdf", "length": 153646}, {"path": "NSA Dokuments/files/pdf/20140831-spiegel-turkey_energy_company_development.pdf", "length": 153281}, {"path": "NSA Dokuments/files/pdf/20131024-guard-phones_world_leaders.pdf", "length": 151276}, {"path": "NSA Dokuments/files/pdf/Lesson-4_-_So_you_got_US_Person_Information.pdf", "length": 150606}, {"path": "NSA Dokuments/files/pdf/20130816-wapo-so_you_got_a_us_person.pdf", "length": 150606}, {"path": "NSA Files (Raw Documents + More Top Secrets)/UNCLASSIFIED-lesson-4-job-aid-usp-info.pdf", "length": 150606}, {"path": "NSA Dokuments/files/pdf/20131123-nrc-nsa_malware.pdf", "length": 149479}, {"path": "NSA Dokuments/files/pdf/20131210-wapo-gsm_classification_guide.pdf", "length": 146538}, {"path": "NSA Dokuments/files/pdf/20140519-intercept-dea_warfighter.pdf", "length": 146210}, {"path": "NSA Dokuments/files/pdf/nsa-fascia.pdf", "length": 144474}, {"path": "NSA Dokuments/files/pdf/20140102-wapo-quantum_computing.pdf", "length": 143339}, {"path": "NSA Dokuments/files/pdf/nsa-quantum-computer-2.pdf", "length": 141783}, {"path": "NSA Dokuments/files/pdf/FAA-Certification_Renewals_with_Caveats.pdf", "length": 141627}, {"path": "NSA Dokuments/files/pdf/FAA-Certification-Renewals-with-Caveats.pdf", "length": 141627}, {"path": "NSA Dokuments/files/pdf/20141125-sz-windstop_system_highlights.pdf", "length": 140503}, {"path": "NSA Dokuments/files/pdf/20131021-monde-boundless_informant_france.pdf", "length": 139933}, {"path": "NSA Dokuments/files/pdf/20131202-cbc-g20.pdf", "length": 139594}, {"path": "NSA Dokuments/files/pdf/20131210-wapo-target_location.pdf", "length": 136418}, {"path": "NSA Dokuments/files/pdf/20131210-wapo-target_location-(1).pdf", "length": 136418}, {"path": "NSA Dokuments/files/pdf/20130608-guard-prism.pdf", "length": 135422}, {"path": "NSA Dokuments/files/pdf/nsa-target-location.pdf", "length": 135361}, {"path": "NSA Dokuments/files/pdf/20140127-nyt-mobile_theme_briefing.pdf", "length": 134660}, {"path": "NSA Dokuments/files/pdf/20140519-intercept-somalget.pdf", "length": 134610}, {"path": "NSA Dokuments/files/pdf/nsa-verizon-spy.pdf", "length": 132830}, {"path": "NSA Files (Raw Documents + Whistleblower Edward Snowden Interview)/TOP-SECRET-FISA-Court-Order-Requiring-Verizon-to-Hand-Over-All-Customer-Call-Data-to-NSA.pdf", "length": 130853}, {"path": "Snowden/Info/Original Documents/Jun5-Verizon.pdf", "length": 130853}, {"path": "NSA Dokuments/files/pdf/20130605-guard-verizon_215_secondary_order.pdf", "length": 130853}, {"path": "NSA Files (Raw Documents + More Top Secrets)/TOP SECRET-sso-news-article.pdf", "length": 130238}, {"path": "NSA Dokuments/files/pdf/20140914-intercept-speargun_underway.pdf", "length": 130060}, {"path": "NSA Dokuments/files/pdf/20140618-DerSpiegel-zoom_of_a_boundless_informant_document_with_project_names.pdf", "length": 128624}, {"path": "NSA Dokuments/files/pdf/20140315-intercept-turbine_intelligence_command_and_control-(1).pdf", "length": 124876}, {"path": "NSA Dokuments/files/pdf/20140315-intercept-turbine_intelligence_command_and_control-(2).pdf", "length": 124876}, {"path": "NSA Dokuments/files/pdf/20140315-intercept-turbine_intelligence_command_and_control.pdf", "length": 124876}, {"path": "NSA Dokuments/files/pdf/20140312-intercept-multiple_methods_of_quantum.pdf", "length": 124031}, {"path": "NSA Dokuments/files/pdf/20131101-guard-corporate_reporting.pdf", "length": 123968}, {"path": "NSA Dokuments/files/pdf/20141125-sz-ptc_glossary.pdf", "length": 123927}, {"path": "NSA Dokuments/files/pdf/gchq-royal-concierge-de.pdf", "length": 123753}, {"path": "NSA Dokuments/files/pdf/20140618-DerSpiegel-agenda_for_the_visit_of_bsi_vice_president_andreas_konen_to_the_nsa.pdf", "length": 123030}, {"path": "NSA Dokuments/files/pdf/20140630-WaPo-list_of_governments_and_organizations_authorized_for_surveillance.pdf", "length": 122998}, {"path": "NSA Dokuments/files/pdf/20140311-nyt-ashcroft_memo_on_intelligence_sharing_procedures.pdf", "length": 120690}, {"path": "NSA Dokuments/files/pdf/20140312-intercept-nsa_selector_types.pdf", "length": 119886}, {"path": "NSA Dokuments/files/pdf/dapino-gamma-target-personalisation-centres.pdf", "length": 119773}, {"path": "NSA Dokuments/files/pdf/20140312-intercept-nsa_technology_directorate_analysis_of_converged_data.pdf", "length": 118431}, {"path": "NSA Dokuments/files/pdf/20131021-monde-wanadoo_alcatel.pdf", "length": 117948}, {"path": "NSA Dokuments/files/pdf/NSA-Missions_Authorities_Oversight_and_Partnerships.pdf", "length": 116772}, {"path": "NSA Dokuments/files/pdf/NSA-Missions-Authorities-Oversight-and-Partnerships.pdf", "length": 116772}, {"path": "NSA Dokuments/files/pdf/20140618-dagbladet-black_budget.pdf", "length": 110375}, {"path": "Snowden/Articles/South China Morning Post 12Jun-25Jun/Jun25-SCMP.pdf", "length": 110007}, {"path": "NSA Dokuments/files/pdf/nsa-sso2-guardia
Download Info
-
Tips
“Ultimate NSA File archive (RAW Docs + Fully Snowden Docs + NSA Documents )” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.