NSA Documents
The ACLU long suspected that the NSA has gone far beyond its counterterrorism and foreign intelligence mandate, implementing a massive system to conduct bulk surveillance of millions of innocent Americans.
About the collectionKeywords
Document Date
Release Date
Legal Authority
Type of Document
- Internal NSA Documents/Presentations Remove Internal NSA Documents/Presentations filter (-)
Records Collected
- Telephony Metadata Remove Telephony Metadata filter (-)
- Internet Metadata (30) Apply Internet Metadata filter
- Telephone Content (13) Apply Telephone Content filter
- Internet Content (11) Apply Internet Content filter
- Location Information (8) Apply Location Information filter
- Financial Records (3) Apply Financial Records filter
Your search results
- Released: 2014 Remove Released: 2014 filter (-)
- Telephony Metadata Remove Telephony Metadata filter (-)
- Internal NSA Documents/Presentations Remove Internal NSA Documents/Presentations filter (-)
Showing 31 - 40 of 45 Results
-
Communications Metadata Fields in ICREACH
May 13, 2014Released: May 13, 2014 -
(U//FOUO) S2C42 and S2C41 Surge Effort (U) Goal
May 13, 2014Released: May 13, 2014 -
Large Scale Expansion of NSA Metadata Sharing
May 13, 2014Released: May 13, 2014 -
What XKS Does With the Sessions
May 13, 2014Released: May 13, 2014 -
In Camera, Ex Parte Declaration of Lieutenant General Keith B. Alexander, Director, National Security Agency
May 12, 2006Released: May 6, 2014 -
Adding a Country to MYSTIC Efforts Mentioned
Document Date UnknownReleased: Mar 18, 2014 -
Description of Data Collection by NSA Under Mystic
Document Date UnknownReleased: Mar 18, 2014 -
NSA Symbolizes Data-Collection Program With Wizard
Document Date UnknownReleased: Mar 18, 2014 -
GCHQ Cyber Attack Honey Trap (2)
Jan 1, 2010Released: Feb 25, 2014 -
Boundless Nederland
Document Date UnknownReleased: Feb 8, 2014