NSA Documents
The ACLU long suspected that the NSA has gone far beyond its counterterrorism and foreign intelligence mandate, implementing a massive system to conduct bulk surveillance of millions of innocent Americans.
About the collectionKeywords
Document Date
- January 2014 (7) Apply January 2014 filter
- February 2014 (2) Apply February 2014 filter
- March 2014 (6) Apply March 2014 filter
- April 2014 (4) Apply April 2014 filter
- May 2014 (33) Apply May 2014 filter
- June 2014 (27) Apply June 2014 filter
- July 2014 (10) Apply July 2014 filter
- August 2014 (40) Apply August 2014 filter
- September 2014 (2) Apply September 2014 filter
- October 2014 (4) Apply October 2014 filter
- November 2014 (1) Apply November 2014 filter
- December 2014 (34) Apply December 2014 filter
- 2014 Remove 2014 filter (-)
Release Date
Legal Authority
Type of Document
- Internal NSA Documents/Presentations (44) Apply Internal NSA Documents/Presentations filter
- FISA Court Filings (10) Apply FISA Court Filings filter
- FISA Court Orders/Opinions (9) Apply FISA Court Orders/Opinions filter
- FOIA Record (5) Apply FOIA Record filter
- Compliance Reports (3) Apply Compliance Reports filter
- Reports to Congress (2) Apply Reports to Congress filter
- Non-FISC Orders/Opinions (1) Apply Non-FISC Orders/Opinions filter
Records Collected
- Internet Metadata (28) Apply Internet Metadata filter
- Telephony Metadata (26) Apply Telephony Metadata filter
- Internet Content (19) Apply Internet Content filter
- Telephone Content (9) Apply Telephone Content filter
- Location Information (7) Apply Location Information filter
- Bank Records (1) Apply Bank Records filter
-
GCHQ Presentation on the BULLRUN Program's Decryption Capabilities
Dec 28, 2014Released: Dec 28, 2014 -
NSA LONGHAUL Program for End-to-End Attack Orchestration and Key Recovery Service
Dec 28, 2014Released: Dec 28, 2014 -
NSA Program SCARLETFEVER
Dec 28, 2014Released: Dec 28, 2014 -
Description of VOIP Telephony Encryption Methods
Dec 28, 2014Released: Dec 28, 2014 -
How the NSA Handles Encrypted Traffic
Dec 28, 2014Released: Dec 28, 2014 -
GCHQ Document on How to Handle Encrypted Traffic
Dec 28, 2014Released: Dec 28, 2014 -
Intercept with OTR Encrypted Chat
Dec 28, 2014Released: Dec 28, 2014 -
Explanation of a Potential Technique to Deanonymise Users of the TOR Network
Dec 28, 2014Released: Dec 28, 2014 -
Analytics on Security of TOR Hidden Services
Dec 28, 2014Released: Dec 28, 2014 -
TOR Deanonymisation Research
Dec 28, 2014Released: Dec 28, 2014