NSA Documents
The ACLU long suspected that the NSA has gone far beyond its counterterrorism and foreign intelligence mandate, implementing a massive system to conduct bulk surveillance of millions of innocent Americans.
About the collectionKeywords
Document Date
- 2014 (140) Apply 2014 filter
- 2013 (21) Apply 2013 filter
- 2012 (31) Apply 2012 filter
- 2011 (22) Apply 2011 filter
- 2010 (39) Apply 2010 filter
- 2009 (17) Apply 2009 filter
- 2008 (18) Apply 2008 filter
- 2007 (24) Apply 2007 filter
- 2006 (26) Apply 2006 filter
- 2005 (15) Apply 2005 filter
- 2004 (11) Apply 2004 filter
- 2003 (5) Apply 2003 filter
- 2002 (4) Apply 2002 filter
- 2001 (1) Apply 2001 filter
- 1905 (3) Apply 1905 filter
Release Date
- January 2014 (31) Apply January 2014 filter
- February 2014 (10) Apply February 2014 filter
- March 2014 (31) Apply March 2014 filter
- April 2014 (12) Apply April 2014 filter
- May 2014 (72) Apply May 2014 filter
- June 2014 (56) Apply June 2014 filter
- August 2014 (52) Apply August 2014 filter
- September 2014 (3) Apply September 2014 filter
- October 2014 (11) Apply October 2014 filter
- November 2014 (3) Apply November 2014 filter
- December 2014 (118) Apply December 2014 filter
- 2014 Remove 2014 filter (-)
Legal Authority
Type of Document
- Internal NSA Documents/Presentations (188) Apply Internal NSA Documents/Presentations filter
- FISA Court Orders/Opinions (37) Apply FISA Court Orders/Opinions filter
- Non-FISC Orders/Opinions (10) Apply Non-FISC Orders/Opinions filter
- FISA Court Filings (6) Apply FISA Court Filings filter
- Compliance Reports (1) Apply Compliance Reports filter
- Reports to Congress (1) Apply Reports to Congress filter
Records Collected
- Telephony Metadata (98) Apply Telephony Metadata filter
- Internet Metadata (91) Apply Internet Metadata filter
- Internet Content (56) Apply Internet Content filter
- Telephone Content (29) Apply Telephone Content filter
- Location Information (20) Apply Location Information filter
- Financial Records (8) Apply Financial Records filter
- Address Books (3) Apply Address Books filter
-
Guide for Analysts on How to Use the PRISM Skype Collection
Aug 1, 2012Released: Dec 28, 2014 -
GCHQ Briefing on the BULLRUN Program
Dec 28, 2014Released: Dec 28, 2014 -
GCHQ Presentation on the BULLRUN Program's Decryption Capabilities
Dec 28, 2014Released: Dec 28, 2014 -
NSA LONGHAUL Program for End-to-End Attack Orchestration and Key Recovery Service
Dec 28, 2014Released: Dec 28, 2014 -
BLUESNORT Program on "Net Defense" from Encrypted Communications
Feb 1, 2012Released: Dec 28, 2014 -
Presentation from the SIGDEV Conference 2012
Jun 1, 2012Released: Dec 28, 2014 -
NSA Program SCARLETFEVER
Dec 28, 2014Released: Dec 28, 2014 -
Description of VOIP Telephony Encryption Methods
Dec 28, 2014Released: Dec 28, 2014 -
How the NSA Handles Encrypted Traffic
Dec 28, 2014Released: Dec 28, 2014 -
Intercept with PGP Encrypted Message
Jan 30, 2012Released: Dec 28, 2014