NSA Documents
The ACLU long suspected that the NSA has gone far beyond its counterterrorism and foreign intelligence mandate, implementing a massive system to conduct bulk surveillance of millions of innocent Americans.
About the collectionKeywords
Document Date
- January 2014 (2) Apply January 2014 filter
- February 2014 (1) Apply February 2014 filter
- March 2014 (3) Apply March 2014 filter
- April 2014 (4) Apply April 2014 filter
- May 2014 (32) Apply May 2014 filter
- June 2014 (25) Apply June 2014 filter
- July 2014 (1) Apply July 2014 filter
- August 2014 (37) Apply August 2014 filter
- September 2014 (1) Apply September 2014 filter
- October 2014 (2) Apply October 2014 filter
- December 2014 (32) Apply December 2014 filter
- 2014 Remove 2014 filter (-)
Release Date
- March 2014 (1) Apply March 2014 filter
- April 2014 (7) Apply April 2014 filter
- May 2014 (33) Apply May 2014 filter
- June 2014 (26) Apply June 2014 filter
- August 2014 (37) Apply August 2014 filter
- October 2014 (2) Apply October 2014 filter
- November 2014 (2) Apply November 2014 filter
- December 2014 (32) Apply December 2014 filter
- 2014 Remove 2014 filter (-)
Legal Authority
Type of Document
- Internal NSA Documents/Presentations (44) Apply Internal NSA Documents/Presentations filter
- FISA Court Filings (6) Apply FISA Court Filings filter
- FISA Court Orders/Opinions (6) Apply FISA Court Orders/Opinions filter
- Non-FISC Orders/Opinions (1) Apply Non-FISC Orders/Opinions filter
- Reports to Congress (1) Apply Reports to Congress filter
Your search results
- 2014 Remove 2014 filter (-)
- Released: 2014 Remove Released: 2014 filter (-)
Showing 1 - 10 of 140 Results
-
GCHQ Briefing on the BULLRUN Program
Dec 28, 2014Released: Dec 28, 2014 -
GCHQ Presentation on the BULLRUN Program's Decryption Capabilities
Dec 28, 2014Released: Dec 28, 2014 -
NSA LONGHAUL Program for End-to-End Attack Orchestration and Key Recovery Service
Dec 28, 2014Released: Dec 28, 2014 -
NSA Program SCARLETFEVER
Dec 28, 2014Released: Dec 28, 2014 -
Description of VOIP Telephony Encryption Methods
Dec 28, 2014Released: Dec 28, 2014 -
How the NSA Handles Encrypted Traffic
Dec 28, 2014Released: Dec 28, 2014 -
GCHQ Document on How to Handle Encrypted Traffic
Dec 28, 2014Released: Dec 28, 2014 -
Intercept with OTR Encrypted Chat
Dec 28, 2014Released: Dec 28, 2014 -
Explanation of a Potential Technique to Deanonymise Users of the TOR Network
Dec 28, 2014Released: Dec 28, 2014 -
Analytics on Security of TOR Hidden Services
Dec 28, 2014Released: Dec 28, 2014