.

Revelations (red = not Snowden)Date Story BrokeBreaking Articles and Documents

.

NSA collecting Verizon customer metadata6/5/2013NSA collecting phone records of millions of Verizon customers daily (June 5) (The Guardian)Verizon forced to hand over telephone data – full court ruling (June 5) (The Guardian)

.

"PRISM"6/6/2013NSA Prism program taps in to user data of Apple, Google and others (June 6) (The Guardian)UK gathering secret intelligence via covert NSA operation (June 7) (The Guardian)How Microsoft handed the NSA access to encrypted messages (July 11) (The Guardian)NSA paid millions to cover Prism compliance costs for tech companies (August 22) (The Guardian)U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program (June 6) (Washington Post)NSA slides explain the PRISM data-collection program: Original slides published June 6 (June 6) (Washington Post)NSA slides explain the PRISM data-collection program: Slides published June 29 (June 29) (Washington Post)

.

US cyber attack list6/7/2013Obama orders US to draw up overseas target list for cyber-attacks (June 7) (The Guardian)Obama tells intelligence chiefs to draw up cyber target list – full document text (June 7) (The Guardian)

.

"Boundless Informant"6/8/2013Boundless Informant: the NSA's secret tool to track global surveillance data (June 8) (The Guardian)Boundless Informant NSA data-mining tool – four key slides (June 8) (The Guardian)Boundless Informant: NSA explainer – full document text (June8) (The Guardian)El desmentido falso de la NSA (October 31) (El Mundo)

.

"Upstream"6/8/2013NSA's Prism surveillance program: how it works and what it can do (June 8) (The Guardian)NSA slides explain the PRISM data collection program: New slide published July 10 (July 10) (Washington Post)

.

AIVD (Netherlands) receives PRISM data6/11/2013Ook AIVD bespiedt internetter (June 11) (Der Telegraaf)

.

NSA spying on citizens of Hong Kong6/14/2013Edward Snowden: US government has been hacking Hong Kong and China for years (June 14) (South China Morning Post)EXCLUSIVE: US hacked Pacnet, Asia Pacific fibre-optic network operator, in 2009 (June 23) (South China Morning Post)EXCLUSIVE: NSA targeted China's Tsinghua University in extensive hacking attacks, says Snowden (June 23) (South China Morning Post)EXCLUSIVE: US spies on Chinese mobile phone companies, steals SMS data: Edward Snowden (June23) (South China Morning Post)

.

NSA domestic metadata collection6/15/2013US surveillance architecture includes collection of revealing Internet, phone metadata (June 15) (Washington Post)

.

NSA and GCHQ spying on G20 summit6/16/2013GCHQ intercepted foreign politicians' communications at G20 summits (June 16) (The Guardian)G20 summit: NSA targeted Russian president Medvedev in London (June 16) (The Guardian)GCHQ surveillance – the documents (June 16) (The Guardian)

.

GCHQ spying on Commonwealth summit6/16/2013UK intelligence agencies planned to spy on Commonwealth summit delegates (June 16) (The Guardian)

.

GCHQ (Britain) spying on South African Ministry of Foreign Affairs6/16/2013How GCHQ stepped up spying on South African foreign ministry (June 16) (The Guardian)

.

FISC Procedures6/19/2013Fisa court oversight: a look inside a secret and empty process (June 19) (The Guardian)

.

Skype's "Project Chess"6/19/2013Web’s reach binds N.S.A. and Silicon Valley leaders (June 19) (New York Times)

.

NSA data retention and minimization rules6/20/2013The top secret rules that allow NSA to use US data without a warrant (June 20) (The Guardian)Procedures used by NSA to target non-US persons: Exhibit A – full document (June 21) (The Guardian)Procedures used by NSA to minimize data collection from US persons: Exhibit B – full document (June 21) (The Guardian)Fisa court warrant authorising NSA surveillance procedures – full document (June 21) (The Guardian)

.

GCHQ's "Tempura"6/21/2013GCHQ taps fibre-optic cables for secret access to world's communications (June 21) (The Guardian)Mastering the internet: how GCHQ set out to spy on the world wide web (June 21) (The Guardian)The legal loopholes that allow GCHQ to spy on the world (June 21)MI5 feared GCHQ went 'too far' over phone and internet monitoring (June 22) (The Guardian)

.

NSA's "Evil Olive" and "Shell Trumpet," GCHQ's Transient Thurible6/27/2013How the NSA is still harvesting your online data (June 27) (The Guardian)

.

NSA's "Stellar Wind"NSA collected US email records in bulk for more than two years under Obama (June 27) (The Guardian)NSA inspector general report on email and internet data collection under Stellar Wind – full document (June 27) (The Guardian)Justice Department and NSA memos proposing broader powers for NSA to collect data (June 27) (The Guardian)National Security Agency inspector general draft report (June 27) (Washington Post)

.

NSA cell phone call spying and storage capabilities6/28/2013Glenn Greenwald speaks out (June 28) (Keynote to Socialism 2013 conference—39:48 minute mark)

.

NSA spying on EU and other foreign embassies ("Dropmire," "Predido," "Blackfoot," "Wabash," "Klondyke")6/30/2013New NSA leaks show how US is bugging its European allies (June 30) (The Guardian)Attacks from America: NSA spied on European Union offices (June 29) (Der Spiegel)Codename 'Apalachee': how America spies on Europe and the UN (August 26) (Der Spiegel)

.

NSA spying on German citizens6/30/2013Partner and target: NSA snoops on 500 million German data connections (June 30) (Der Spiegel)

.

DGSE mass surveilance (France)7/4/2013Révélations sur le Big Brother français (July 4) (Le Monde)

.

NSA spying on citizens of Brazil7/6/2013EUA espionaram milhões de e-mails e ligações de brasileiros (July 6) (O Globo)

.

DSD (Australia) and New Zealand helping NSA spying7/6/2013EUA expandem o aparato de vigilância continuamente (July 6) (O Globo)Snowden reveals Australia's links to US spy web (July 8) (Sydney Morning Herald)

.

Germany helping NSA spying7/8/2013Edward Snowden interview: The NSA and its willing helpers (July 8) (Der Spiegel)'Prolific Partner': German intelligence used NSA spy program (July 20) (Der Spiegel)

.

NSA spying on citizens of Latin America7/9/2013Espionagem dos EUA se espalhou pela América Latina (July 9) (O Globo)Capitais de 4 países também abrigaram escritório da NSA e CIA (July 9) (O Globo)

.

FBI and DOJ (USA) spying on underground internet cables owned by companies based in Australia and Hong Kong7/12/2013Telstra’s deal with the devil: FBI access to its undersea cables (July 12) (Crikey)Agreement among FBI, DOJ, Telestra and Pacific Century CyberWorks Limited (July 12) (Crikey)

.

XKeyscore7/31/2013XKeyscore: NSA tool collects 'nearly everything a user does on the internet' (July 31) (The Guardian)XKeyscore presentation from 2008 – read in full (July 31) (The Guardian)

.

NSA funding GCHQ8/1/2013Exclusive: NSA pays £100m in secret funding for GCHQ (August 1) (The Guardian)

.

BT, Vodafone, and Verizon give GCHQ unlimited access to fiber optic cables8/2/2013BT and Vodafone among telecoms companies passing details to GCHQ (August 2) (The Guardian)Snowden enthüllt Namen der spähenden Telekomfirmen (August 2) (Süddeutsche Zeitung)

.

NSA provided intelligence to give US advantage at 2009 Summit of the Americas8/2/2013A carta em que o embaixador americano no Brasil agradece o apoio da NSA (August 2) (Época)

.

NSA provided intelligence to give US advantage in negotions over sactions with Iran at the UN8/2/2013Spies of the digital age (August 2) (Época)

.

Other US agencies fight over NSA data8/3/2013Other agencies clamor for data NSA ompiles (August 3) (New York Times)

.

DEA getting info from NSA and covering up source8/5/2013Exclusive: U.S. directs agents to cover up program used to investigate Americans (August 5) (Reuters)

.

NSA monitoring cross-border communications8/8/2013NSA said to search content of messages to and from US (August 8) (New York Times)Exhibit A (August 8) (New York Times via Document Cloud)

.

IRS and DEA getting info from NSA the covering up source8/7/2013Exclusive: IRS manual detailed DEA's use of hidden intel evidence (August 7) (Reuters)

.

NSA minimization rules allow it to search for communications of individual US citizens without a warrant8/9/2013NSA loophole allows warrantless search for US citizens' emails and phone calls (August 9) (The Guardian)

.

NSA breaking privacy rules8/15/2013NSA broke privacy rules thousands of times per year, audit finds (August 15) (Washington Post)NSA report on privacy violations in the first quarter of 2012 (August 15) (Washington Post)What to say, and not to say, to 'our overseers' (August 15) (Washington Post)

.

NSA and FBI spied on Salt Lake City during Winter Olympics8/20/2013New Details Show Broader NSA Surveillance Reach (August 20) (Wall Street Journal)

.

US Director of National Intelligence declassifies FISC documents8/21/2013NSA gathered thousands of Americans’ e-mails before court ordered it to revise its tactics (August 21) (Washington Post)FISA court ruling on illegal NSA e-mail collection program (August 21) (Washington Post)Obama administration had restrictions on NSA reversed in 2011 (September 7) (Washington Post)Declassified court documents highlight NSA violations (September 10) (Washington Post)Declassified FISA court documents on intelligence collection (September 10) (Washington Post)

.

GCHQ spy station in Middle East8/23/2013Snowden: UK government now leaking documents about itself (August 23) (The Guardian)Exclusive: UK’s secret Mid-East internet surveillance base is revealed in Edward Snowden leaks (August 23) (The Independent)

.

NSA employees engage in LOVEINT (spying on love interests)8/23/2013NSA officers spy on love interests (August 23) (Wall Street Journal Blog)Grassley Presses for Details about Intentional Abuse of NSA Authorities (August 28) (Sen. Chuck Grassley)Response from IG to Intentional Misuse of NSA Authority (September 11) (Sen. Churck Grassley)NSA Inspector General Responds to Grassley about Intentional Surveillance of Americans (September 26) (Sen. Chuck Grassley)

.

NSA black budget8/29/2013U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary (August 29) (Washington Post)The black budget (August 29) (Washington Post)Inside the 2013 U.S. intelligence 'black budget' (August 29) (Washington Post)Inside the 2013 U.S. intelligence 'black budget' (August 29) (Washington Post)America’s secret intelligence budget, in 11 (nay, 13) charts (August 29) (Washington Post)2013 U.S. intelligence budget: additional resources (August 29)

.

NSA and hunt for Osama bin Laden8/29/2013To hunt Osama bin Laden, satellites watched over Abbottabad, Pakistan, and Navy SEALs (August 29) (Washington Post)

.

NSA paying for access to comm networks8/29/2013NSA paying U.S. companies for access to communications networks (August 29) (Washington Post)

.

2011 cyber attacks8/30/2013U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show (August 30) (Washington Post)

.

Insider threats8/30/2013U.S. intelligence agencies spend millions to hunt for insider threats, document shows (August 30) (Washington Post)

.

NSA spying on Al Jazeera8/31/2013Snowden document: NSA spied on Al Jazeera communications (August 31) (Der Spiegel)

.

Distrust of Pakistan9/1/2013Top-secret U.S. intelligence files show new levels of distrust of Pakistan (September 1) (Washington Post)

.

NSA spying on president of Brazil and Mexican presidential candidate9/1/2013Documentos revelam esquema de agência dos EUA para espionar Dilma (September 1) (Fantástico)Veja os documentos ultrassecretos que comprovam espionagem a Dilma (September 2) (Fantástico)

.

NSA spied on Petrobras, French Ministry of Foreign Affairs, Google, and SWIFT9/2/2013NSA Documents Show United States Spied Brazilian Oil Giant (September 2) (Fantástico)Petrobras foi alvo de espionagem de agência dos EUA, aponta documento (September 8) (G1)

.

Al Qaeda targeting US drones9/3/2013U.S. documents detail al-Qaeda’s efforts to fight back against drones (September 3) (Washington Post)

.

NSA blocking online encryption9/5/2013US and UK spy agencies defeat privacy and security on the internet (September 5) (The Guardian)NSA: classification guide for cryptanalysis (September 5) (The Guardian)Project Bullrun—classification guide to the NSA's decryption program (September 5) (The Guardian)Sigint—how the NSA collaborates with technology companies (September 5) (The Guardian)NSA foils much Internet encryption (September 5) (New York Times)Unlocking private communications (September 5) (New York Times)Revealed: the NSA’s secret campaign to crack, undermine Internet security (September 5) (ProPublica)

.

FRA (Sweden) give NSA access to Baltic underseas fiber optic cables9/5/2013Sverige deltog i NSA-övervakning (September 6) (SvD Nyheter)

.

NSA can spy on smartphone data9/7/2013Privacy scandal: NSA can spy on smart phone data (September 7) (Der Spiegel)iSpy: How the NSA Accesses Smartphone Data (September 9) (Der Spiegel)

.

CIA and Germany collaborate on database of terrorists9/9/2013'Project 6': CIA spies operating in the heart of Germany (September 9) (Der Spiegel)

.

NSA sharing data with Israel9/11/2013NSA shares raw intelligence including Americans' data with Israel (September 11) (The Guardian)NSA and Israeli intelligence: memorandum of understanding – full document (September 11) (The Guardian)

.

BFV (Germany) provide data to and meet weekly with NSA9/13/2013Verfassungsschutz beliefert NSA (September 13) (Süddeutsche Zeitung)

.

NSA spied on financial networks9/15/2013'Follow the Money': NSA Spies on International Payments (September 15) (Der Spiegel)''Follow the money': NSA monitors financial world (September 16) (Der Spiegel)

.

NDB (Switzerland), PET (Denmark), and German telecom company "Level 3" share data with NSA9/15/2013'Geheimdienst-Aufsicht will Kooperation des NDB mit der NSA prüfen (September 14) (Schweiz am Sonntag)'World Wide War (September 10) (ZDFzoom)

.

GCHQ spied on Belgacom9/20/2013Belgacom attack: Britain's GCHQ hacked Belgian telecoms firm (September 20) (Der Spiegel)Quantum Spying: GCHQ Used Fake LinkedIn Pages to Target Engineers (November 11) (Der Spiegel)Snowden-Dokumente: Britischer Geheimdienst greift über gefälschte LinkedIn-Seiten an (November 11) (Der Spiegel)Passively 'Sniffing' Data: How Mobile Network Spying Works (November 15) (Der Spiegel)

.

NSA spying on Indian diplomats and leaders9/23/2013India among top targets of spying by NSA (September 23) (The Hindu)'Not surprising India has become an important surveillance target' (September 24) (The Hindu)NSA targets Indian politics, space & n-programmes (September 24) (The Hindu)NSA planted bugs at Indian missions in D.C., U.N. (September 25) (The Hindu)

.

NSA spied on senators, civil rights leaders, anti-war activists in 1960s and 1970s9/25/2013Secret Cold War documents reveal NSA spied on senators (September 25) (Foreign Policy)

.

NSA calls drone opponens "threats" and "adversaries"9/25/2013UK detention of Reprieve activist consistent with NSA's view of drone opponents as 'threats' and 'adversaries' (August 25) (The Guardian)

.

NSA creates maps of Americans' social connections9/28/2013NSA gathers data on social connections of U.S. citizens (September 28) (New York Times)Documents on NSA efforts to diagram social networks of U.S. citizens (September 28) (New York Times)

.

NSA stores metadata on millions of web users9/30/2013NSA stores metadata of millions of web users for up to a year, secret files show (September 30) (The Guardian)

.

NSA tested mass collection of US cell phone location data10/2/2013NSA had test project to collect data on Americans’ cellphone locations, director says (October 2) (Washington Post)

.

China employs two million people to monitor microblogs10/3/2013正式成为官方认可职业,全国约200万从业者,在党政宣传机构、门户网站等处任职 (October 3) (Beijing Daily News)

.

NSA and GCHQ targeted TOR network10/4/2013NSA and GCHQ target Tor network that protects anonymity of web users (October 4) (The Guardian)Attacking Tor: how the NSA targets users' online anonymity (October 4) (The Guardian)'Tor Stinks' presentation—read the full document (October 4) (The Guardian)Tor: 'The king of high-secure, low-latency anonymity' (October 4) (The Guardian)'Peeling back the layers of Tor with EgotisticalGiraffe'—read the document (October 4) (The Guardian)

.

BND (Germany) mass surviellance10/4/2013German intelligence service is as bad as the NSA (October 4) (The Guardian)

.

Australian government knew about PRISM two months before publication10/7/2013Australian government withheld knowledge of Prism program (October 7) (The Guardian)

.

CSEC (Canada) spied on Brazilian Ministry of Mines and Energy10/7/2013Ministério de Minas e Energia está na mira de espiões americanos e canadenses (October 7) (Fantástico)Read a CSEC document that was first acquired by Edward Snowden (November 30) (Globe and Mail)

.

NSA collecting online contact lists en masse10/14/2013NSA collects millions of e-mail address books globally (October 14) (Washington Post)The NSA's problem? Too much data (October 14) (Washington Post)SCISSORS: How the NSA collects less data (October 14) (Washington Post)An excerpt from the NSA's Wikipedia (October 14) (Washington Post)

.

NSA involved in US targeted killings program10/16/2013Documents reveal NSA’s extensive involvement in targeted killing program (October 16) (Washington Post)

.

NSA spied on Mexican president10/20/2013'Fresh leak on US spying: NSA accessed Mexican president's email (October 20) (Der Spiegel)

.

NSA spied on French citizens, companies, diplomats, and leaders10/21/2013Comment la NSA espionne la France (October 21) (Le Monde)France in the NSA's crosshair : phone networks under surveillance (October 21) (Le Monde)L'ampleur de l'espionnage mondial par la NSA (October 21) (Le Monde)France in the NSA's crosshair : Wanadoo and Alcatel targeted (October 22) (Le Monde)The NSA wiretapped French diplomats in the US (October 22) (Le Monde)Espionnage de la NSA : tous les documents publiés par Le Monde (October 22) (Le Monde)Boundless Monde (October 22) (Le Monde via DocumentCloud)The NSA's intern inquiry about the Elysée hacking revealed (October 25) (Le Monde)

.

NSA may have spied on German chancellor Merkel10/23/2013'Berlin Complains: Did US Tap Chancellor Merkel's Mobile Phone? (October 23) (Der Spiegel)

.

NSA monitored phone calls of 35 world leaders10/24/2013NSA monitored calls of 35 world leaders after US official handed over contacts (October 24) (The Guardian)

.

NSA and GCHQ spied on Italian politicians, companies, and citizens10/24/2013Datagate, così ci spiano Stati Uniti e Gran Bretagna (October 24) (L'Espresso)

.

NSA spying on Spanish citizens10/25/2013NSA revelations: Spain also a victim of US espionage (October 25) (El País)La NSA espió 60 millones de llamadas en España en sólo un mes (October 28) (El Mundo)

.

GCHQ feared public debate on surveillance would lead to legal challenges10/25/2013Leaked memos reveal GCHQ efforts to keep mass surveillance secret (October 25) (The Guardian)

.

France, Italy, Sweden, and Israel cooperate with the NSA10/26/2013Frankreich liefert Informationen an britische und US-Geheimdienste (October 26) (Süddeutsche Zeitung)

.

Joint NSA and CIA surveillance teams in 80 US embassies, 19 in Europe10/27/2013Embassy espionage: The NSA's secret spy hub in Berlin (October 27) (Der Spiegel)Esclusiva Panorama: Datagate, coinvolta anche l'ambasciata Usa a Roma (October 30) (Panorama)Revealed: Britain's 'secret listening post in the heart of Berlin' (November 5) (The Independent)

.

NSA asked Japanese government to intercept data from Asian fiber optic cables (they declined) 10/27/2013NSA asked Japan to tap regionwide fiber-optic cables in 2011 (October 27) (Japan Times)

.

France and Spain give data to NSA10/29/2013Europeans Shared Spy Data With U.S. (October 29) (Wall Street Journal)

.

NSA infiltrates Yahoo, Google, and Microsoft datacenters worldwide10/30/2013NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say (October 30)How the NSA is infiltrating private networks (October 30) (Washington Post)How the NSA's MUSCULAR program collects too much data from Yahoo and Google (October 30) (Washington Post)Microsoft, suspecting NSA spying, to ramp up efforts to encrypt its internet traffic (November 26) (Washington Post)Did the NSA target Microsoft too? (November 26) (Washington Post)Evidence of Microsoft's vulnerability (November 26) (Washington Post)

.

NSA recommended officials use 9-11 to justify surveillance programs10/30/2013Revealed: NSA pushed 9/11 as key 'sound bite' to justify surveillance (October 30) (Al Jazeera America)NSA Talking Points (October 30) (Al Jazeera America via Document Cloud)

.

NSA spied on Vatican10/30/2013Esclusiva Panorama: Datagate, anche il Papa è stato intercettato (October 30) (Panorama)Papa Francesco intercettato: ecco come gli 007 spiano il Vaticano da anni (October 31) (Panorama)

.

Obama orders NSA to stop spying on World Bank and IMF10/31/2013Obama halted NSA spying on IMF and World Bank headquarters (October 31) (Reuters)

.

ASD uses embassies for surveillance across Asia10/31/2013Exposed: Australia's Asia spy network (October 31) (Sydney Morning Herald)Revealed: How Australia spies on its neighbours (October 31) (Sydney Morning Herald)

.

NSA relies on participation of private companies for surveillance11/1/2013Snowden document reveals key role of companies in NSA data collection (November 1) (The Guardian)Tapping fiber-optic cables: 'Leverage unique key corporate partnerships' (November 1) (The Guardian)NSA: SSO intelligence reports by company (November 1) (The Guardian)

.

Germany, France, Spain, and Sweden work closely with GCHQ on mass surveillance11/1/2013GCHQ and European spy agencies worked together on mass surveillance (November 1) (The Guardian)

.

NSA's vast strategic mission grabs everything it can11/2/2013No morsel too minuscule for all-consuming NSA (November 2) (New York Times)Documents show NSA efforts to spy on both enemies and allies (November 2) (New York Times)

.

ASD spied on Indonesian officialsNSA: Australia and US used climate change conference to spy on Indonesia (November 2) (The Guardian)

.

FBI monitored antiwar.com "by mistake"11/6/2013FBI monitored anti-war website in error for six years, documents show (November 6) (The Guardian)

.

ASD helped Australian companies in trade deals11/7/2013Australian spy agency helped BHP negotiate trade deals (November 7) (Sydney Morning Herald)

.

NSA spied on OPEC11/11/2013Oil Espionage: How the NSA and GCHQ Spied on OPEC (November 11) (Der Spiegel)

.

CIA collects mass data on money transfers in and out of US11/14/2013CIA's Financial Spying Bags Data on Americans (November 14) (Wall Street Journal)CIA collects global data on transfers of money (November 14) (New York Times)

.

Automated GCHQ system tracks diplomats' hotel reservations11/17/2013'Royal Concierge': GCHQ monitors diplomats' hotel bookings (November 17) (Der Spiegel)Photo gallery: The GCHQ's special room service (November 17) (Der Spiegel)

.

ASD spied on Indonesian president11/17/2013Australia's spy agencies targeted Indonesian president's mobile phone (November 17) (The Guardian)The slides that show Australian attempts to monitor Yudhoyono's phone (November 17) (The Guardian)Australia spied on Indonesian president Susilo Bambang Yudhoyono, leaked Edward Snowden documents reveal (November 18) (Australian Broadcasting Corporation)Leaked DSD slides: Australia's attempts to spy on Indonesian president (November 18) (Australian Broadcasting Corporation)

.

NSA spied on 33 million Norwegian cell phone calls11/19/2013USA overvåket 33 millioner norske mobilsamtaler (November 19) (Dagbladet)Dette sier Snowden-dokumentet om USAs overvåkning av norske telefonsamtaler (November 19) (Dagbladet)NSA files repeatedly show collection of data «against» countries—not «from» (November 22) (Dagbladet)

.

US spying on citizens of "Five Eyes" countries11/20/2013US and UK struck secret deal to allow NSA to 'unmask' Britons' personal data (November 20) (The Guardian)Documents show Blair government let US spy on Britons (November 20) (Channel 4 News)

.

FBI works closely with NSA11/21/2013Meet the spies doing the NSA's dirty work (November 21) (Foreign Policy)

.

NSA attempts to gain more power11/22/2013NSA. report outlined goals for more power (November 22) (New York Times)A Strategy for Surveillance Powers (November 23) (New York Times)

.

NSA infected 50,000 networks with malware11/23/2013NSA infected 50,000 computer networks with malicious software (November 23) (NRC)

.

NSA spied on Mulsims' porn habits11/26/2013Top-secret document reveals NSA spied on porn habits as part of plan to discredit 'radicalizers' (November 27) (Huffington Post)

.

NSA spied on G20 summit in Toronto11/28/2013New Snowden docs show US spied during G20 in Toronto (November 27) (CBC)Exclusive: New Snowden docs show U.S. spied during G20 in Toronto (November 27) (CBC)Exclusive: Read Snowden NSA document on G8, G20 summit surveillance(December 1) (CBC)US spying at Toronto's G20 summit (November 27) (CBC)

.

AIVD (Netherlands) gathers mass information on web forum users11/30/2013Dutch intelligence agency AIVD hacks internet forums (November 30) (NRC)

.

DSD offered to share data on Australian citizens12/1/2013Revealed: Australian spy agency offered to share data about ordinary citizens (December 1) (The Guardian)

.

NSA tracks cell phone locations worldwide12/4/2013NSA tracking cellphone locations worldwide, Snowden documents show (December 4)FASCIA: The NSA's huge trove of location records (December 4) (Washington Post)How to tell if a target is 'foreign' (December 4) (Washington Post)How the NSA is tracking people right now (December 4) (Washington Post)How the NSA uses cellphone tracking to find and 'develop' targets (December 4) (Washington Post)Reporter explains NSA collection of cellphone data (December 4) (Washington Post)

.

NSA maintains two spy stations in Italy12/5/2013Revealed: How the NSA targets Italy (December 5) (L'Espresso)

.

Massive collaboration between FRA (Sweden) and NSA, especially in spying on Russia12/5/2013Snowden files reveal Swedish-American surveillance of Russia (December 5) (SVT)SVT avslöjar: USA hyllar FRA:s ryss-spionage (December 5) (SVT)FRA:s fartygs arbetsuppgifter hemliga (December 6) (SVT)FRA spying on “energy” and “Baltics” for USA (December 7) (SVT)NSA 'asking for' specific exchanges from FRA - Secret treaty since 1954 (December 8) (SVT)USA har tillgång till FRA:s kabelavlyssning(December 8) (SVT)Dokument avslöjar: FRA:s hemliga avtal med USA (December 8) (SVT)FRA förutsåg kriget i Georgien (December 8) (SVT)FRA part of top-secret hacker project (December 11) (SVT)FRA har tillgång till kontroversiellt övervakningssystem (December 11) (SVT)Read the Snowden Documents From the NSA (December 11) (SVT)The Snowden Documents and Sweden with English subtitles (December 11) (SVT)NSA ber FRA om språklig hjälp (December 13) (SVT)

.

FBI uses malware for surveillance12/6/2013FBI’s search for ‘Mo,’ suspect in bomb threats, highlights use of malware for surveillance (December 6) (Washington Post)FBI files Colorado search warrant request (December 6) (Washington Post)FBI uses surveillance software (December 6) (Washington Post)

.

NSA spies on online games12/9/2013Spy agencies in covert push to infiltrate virtual world of online gaming (December 9) (The Guardian)NSA files: games and virtual environments paper (December 9) (The Guardian)World of spycraft: NSA and CIA spied in online games (December 9) (ProPublica)NSA documents on games and virtual worlds (December 9) (ProPublica)Iarpa Reynard summary Nov2013 (December 9) (ProPublica)Through the Azerothian looking glass (December 9) (ProPublica)SRI International (December 9) (ProPublica)Spies’ dragnet reaches a playing field of elves and trolls (December 9) (New York Times)Infiltrating a virtual gaming world (December 9) (New York Times)World of spycraft (December 9) (New York Times)

.

CSEC (Canada) helped NSA spy on 20 countries12/9/2013Exclusive: Snowden document shows Canada set up spy posts for NSA (December 9) (CBC)Read a redacted version of the lastet Snowden NSA doc (December 9) (CBC)

.

NSA using commercial browser cookies to hack targets, collecting location data leaked by mobile apps12/10/2013NSA uses Google cookies to pinpoint targets for hacking (December 10) (Washington Post)NSA signal-surveillance success stories (December 10) (Washington Post)

.

NSA can crack A5/1 cell phone encryption12/13/2013By cracking cellphone code, NSA has capacity for decoding private conversations (December 13) (Washington Post)How the NSA pinpoints a mobile device (December 13) (Washington Post)

.

NSA and GCHQ spied on Israeli prime minister, UNICEF, energy and finance ministries, etc.12/20/2013GCHQ and NSA targeted charities, Germans, Israeli PM and EU chief (December 20) (The Guardian)Friendly Fire: How GCHQ Monitors Germany, Israel and the EU (December 20) (Der Spiegel)NSA dragnet included allies, aid groups and business elite (December 20) (New York Times)

.

NSA gave RSA money to weaken encryption12/20/2013Exclusive: Secret contract tied NSA and security industry pioneer (December 20) (Reuters)

.

NSA possesses massive hacking capabilities12/29/2013Inside TAO: Documents Reveal Top NSA Hacking Unit (December 29) (Der Spiegel)Shopping for Spy Gear: Catalog Advertises NSA Toolbox (December 29) (Der Spiegel)NSA's secret toolbox: Unit offers spy gadgets for every need (December 30) (Der Spiegel)Photo gallery: How the intelligence service cracks Internet hubs (December 30) (Der Spiegel)Photo gallery: How the NSA infiltrates computers (December 30) (Der Spiegel)

.

NSA seeking quantum computer that could break almost any encryption1/2/2014NSA seeks to build quantum computer that could crack most types of encryption (January 2) (Washington Post)A description of the Penetrating Hard Targets project (January 2) (Washington Post)Classifying NSA quantum computing efforts (January 2) (Washington Post)

.

NSA can access computers not connected to an outside network1/14/2014N.S.A. Devises Radio Pathway Into Computers (January 14) (New York Times)

.

NSA collects text messages en masse worldwide1/16/2014NSA collects millions of text messages daily in 'untargeted' global sweep (January 16) (The Guardian)NSA Dishfire presentation on text message collection – key extracts (January 16) (The Guardian)Revealed: UK and US spied on text messages of Brits (January 16) (Channel 4)

.

NSA collecs smartphone app data en masse worldwide1/27/2014NSA and GCHQ target 'leaky' phone apps like Angry Birds to scoop user data (January 27) (The Guardian)Spy agencies scour phone apps for personal data (January 27) (New York Times)Spy agencies probe angry birds and other apps for personal data (January 27) (ProPublica)

.

GCHQ spies on Facebook, Youtube traffic1/28/2014Snowden docs reveal British spies snooped on YouTube and Facebook (January 28) (NBC)Squeaky Dolphin (January 28) (NBC)

.

NSA spied on 2009 Copenhagen climate negotiations1/29/2014Snowden docs: U.S. spied on negotiators at 2009 climate summit (January 29) (Huffington Post)UN climate conference in Copenhagen (January 29) (Huffington Post)For the NSA, espionage was a means to strengthen the US position in climate negotiations (January 30) (Informatíon)Dokumentet: NSA spionerede mod COP15 (January 30) (Informatíon)

.

CSEC tracked airline passengers using airport wifi1/30/2014CSEC used airport Wi-Fi to track Canadian travellers: Edward Snowden documents (January 30) (CBC)IP profiling analytics and mission impacts (January 30) (CBC)Airport wifi used to track Canadians (January 30) (The National)

.

GCHQ targeted Anonymous2/4/2014War on Anonymous: British spies attacked hackers, Snowden docs show (February 4) (NBC)Hacktivism: Online covert action (February 4) (NBC)

.

NSA may have spied on German chancellor Schröder2/5/2014Zielobjekt Kanzler (February 5) (Süddeutsche Zeitung)

.

GCHQ's dirty tricks2/7/2014Snowden Docs: British Spies Used Sex and 'Dirty Tricks' (February 7) (NBC)

.

NSA collecting less than 30 percent of U.S. phone metadata2/7/2014NSA Is Collecting Less than 30 Percent of U.S. Call Data, Officials Say (February 7) (Washington Post)

.

U.S. bases drone strikes on unreliable NSA metadata2/10/2014The NSA’s secret role in the U.S. assassination program (February 10) (The Intercept)

.

ASD spied on U.S. law firms for NSA2/15/2014Spying by NSA ally entangled US law firm (February 15) (New York Times)

.

NSA targeted Wikileaks2/18/2014Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters (February 18) (The Intercept)Psychology: A new kind of SIGDEV (February 18) (The Intercept)Discovery SIGINT Targeting Scenarios and Compliance (February 18) (The Intercept)

.

GCHQ "manipulate online discourse"2/24/2014How covert agents infiltrate the internet to manipulate, deceive, and destroy reputations (February 24) (The Intercept)The art of deception: Training for a new generation of online covert operations (February 24) (The Intercept)

.

GCHQ storing Yahoo webcam chats en masse2/27/2014Optic Nerve: millions of Yahoo webcam images intercepted by GCHQ (February 27) (The Guardian)

.

AIVD spying on Somalia for NSA3/5/2014The secret role of the Dutch in the American war on terror (March 7) (NRC)

.

NSA has an internal advice columnist3/7/2014The NSA Has An Advice Columnist. Seriously. (March 7) (The Intercept)Silenced in SID (March 7) (The Intercept)An Interview with Zelda (March 7) (The Intercept)Is Bain De Soleil a Bane on NSA? (March 7) (The Intercept)Guilty Until Proven Innocent (March 7) (The Intercept)

.

Secret FISA rulings exanded intelligence agencies' reach3/11/2014How a court secretly evolved, extending US spies’ reach (March 11) (New York Times)NSA timeline of surveillance law developments (March 11) (New York Times)Classification guide for Stellarwind program (March 11) (New York Times)Ashcroft memo on intelligence sharing procedures (March 11) (New York Times)Classification guide for FISA, the Protect America Act and the FISA Amendments Act (March 11) (New York Times)NSA memo expands access to FISA information (March 11) (New York Times)

.

NSA automating malware on millions of computers worldwide3/12/2014How the NSA plans to infect ‘millions’ of computers with malware (March 12) (The Intercept)Menwith Hill Station leverages XKeyscore for Quantum against Yahoo and Hotmail (March 12) (The Intercept)Five Eyes hacking large routers (March 12) (The Intercept)NSA Technology Directorate analysis of converged data (March 12) (The Intercept)Selector types (March 12) (The Intercept)There is more than one way to quantum (March 12) (The Intercept)NSA phishing tactics and man in the middle attacks (March 12) (The Intercept)Quantum insert diagrams (March 12) (The Intercept)The NSA and GCHQ’s QUANTUMTHEORY hacking tactics (March 12) (The Intercept)TURBINE and TURMOIL (March 12) (The Intercept)VPN and VOIP exploitation with HAMMERCHANT and HAMMERSTEIN (March 12) (The Intercept)Industrial-scale exploitation (March 12) (The Intercept)Thousands of implants (March 12) (The Intercept)

.

Many foreign political leaders are unaware their governments cooperate with the NSA3/13/2014Foreign officials in the dark about their own spy agencies’ cooperation with NSA (March 13) (The Intercept)Third party relationships (March 13) (The Intercept)

.

NSA collects and stores one month of telephone content from several countries3/18/2014NSA Surveillance Program Reaches ‘Into the Past’ to Retrieve, Replay Phone Calls (March 18) (Washington Post)NSA Symbolizes Data-Collection Program with Wizard (March 18) (Washington Post)Description of Data Collection by NSA Under MYSTIC (March 18) (Washington Post)Adding a Country to MYSTIC Efforts Mentioned(March 18) (Washington Post)

.

NSA targets systems administrators3/20/2014Inside the NSA’s secret efforts to hunt and hack system administrators (March 20) (The Intercept)I hunt sys admins (March 20) (The Intercept)

.

NSA spied on Huawei, other Chinese targets3/22/2014Targeting Huawei: NSA spied on Chinese government and networking firm (March 22) (Der Spiegel)NSA breached Chinese servers seen as security threat (March 22) (New York Times)Slides describe mission involving Huawei (March 22) (New York Times)

.

GCHQ targeted German Chancellor Merkel, German telecom companies, and other world leaders3/29/2014''A' for Angela: GCHQ and NSA targeted private german companies and Merkel (March 27) (Der Spiegel)Der Spiegel: NSA put Merkel on list of 122 targeted leaders (March 29) (The Intercept)

.

GCHQ discussed using social media to push propaganda4/4/2014The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket (April 4) (The Intercept)Full-Spectrum Cyber Effects (April 4) (The Intercept)2009 SigDev Conference (April 4) (The Intercept)

.

U.S. rallied other countries to counter cyber attack4/11/2014U.S. Rallied 120 Nations in Response to 2012 Cyberattack on American Banks (April 11) (Washington Post)

.

Norwegian Intelligence Service (NIS) working with NSA on supercomputer4/26/2014NIS Aquires Supercompute (April 26) (Dagblodet)

.

GCHQ requested "unsupervised access" to data collected by NSA4/30/2014British Spy Chiefs Secretly Begged to Play in NSA’s Data Pools (April 30) (The Intercept)Lobban NSA Visit Précis (April 30) (The Intercept)GHOSTMACHINE: Identifier Lead Triage with ECHOBASE (April 30) (The Intercept)PRISM Olympic Option (April 30) (The Intercept)

.

NSA implanted back doors in U.S.-made routers headed to foreign markets5/12/2014Glenn Greenwald: How the NSA Tampers with U.S.-Made Internet Routers (May 12) (The Guardian)

.

NSA targets dissenters5/12/2014From Martin Luther King to Anonymous, the State Targets Dissenters Not Just 'Bad Guys' (May 12) (The Guardian)

.

NSA collects content of all phone calls in Bahamas, other county5/19/2014Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas (May 19) (The Intercept)SOMALGET Memo (May 19) (The Intercept)SIDToday: DEA – The “Other” Warfighter (May 19) (The Intercept)SSO Dictionary Excerpt (May 19) (The Intercept)MYSTIC (May 19) (The Intercept)SSO March 14, 2013 (May 19) (The Intercept)SSO April 18, 2013 – What’s New (May 19) (The Intercept)SSO May 2, 2013 (May 19) (The Intercept)SSO May 3, 2013 – MYSTIC (May 19) (The Intercept)SSO May 3, 2012 (May 19) (The Intercept)Black Budget (May 19) (The Intercept)

.

NSA collects images worldwide for facial recognition database5/31/2014NSA Collecting Millions of Faces From Web Images (May 31) (New York Times)

.

NSA has massive surveillance infrastructure in Germany6/18/2014New NSA Revelations: Inside Snowden's Germany File (June 18) (Der Spiegel)Spying Together: Germany's Deep Cooperation with the NSA (June 18) (Der Spiegel)The NSA in Germany: Snowden's Documents Available for Download (June 18) (Der Spiegel)

.

NSA relies on 'third-party' countries for access to fiber optic cables6/18/2014How Secret Partners Expand NSA’s Surveillance Dragnet (June 18) (The Intercept)NSA ‘Third Party’ Partners Tap the Internet Backbone in Global Surveillance Program (June 18) (Informatíon)Documentation: The Snowden Files (June 18) (Informatíon)

.

NSA has court authority to collect information "concerning" all but 4 countries and several international bodies7/1/2014Court Gave NSA Broad Leeway in Surveillance, Documents Show (July 1) (Washington Post)FISA Judge's Order Authorizing Surveillance of Foreign Governments and Organizations (July 1) (Washington Post)List of Foreign Governments and Organizations Authorized for Surveillance (July 1) (Washington Post)DNI, Attorney General Certify Surveillance Targets 'Reasonably Believed' to Be Outside US (July 1) (Washington Post)NSA Director's Affidavit on Foreign Surveillance (July 1) (Washington Post)

.

XKeyscore targets servers in Germany and at MIT, users of Tor and Tales, and readers of Linux Journal7/3/2014NSA Targets the Privacy-Conscious (July 3) (NDR)XKeyscore Rules (July 3) (NDR)

.

NSA collects masses of personal information incidentally7/5/2014In NSA-Intercepted Data, Those Not Targeted Far Outnumber the Foreigners Who Are (July 5) (Washington Post)Target Package Prepared by the NSA Prior to the Capture of Muhammad Tahir Shahzad in January 2011 (July 5) (Washington Post)How 160,000 Intercepted Communications Led to Our Latest NSA Story (July 11) (Washington Post)

.

NSA surveilling Muslim-American leaders7/9/2014Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On (July 9) (The Intercept)

.

GCHQ tools for manipulating, disrupting online discourse7/14/2014Hacking Online Polls and Other Ways British Spies Seek to Control the Internet (July 14) (The Intercept)JTRIG Tools and Techniques (July 14) (The Intercept)

.

NSA collection authorities7/23/2014Privacy Watchdog’s Next Target: The Least-Known but Biggest Aspect of NSA Surveillance (July 23) (Washington Post)

.

NSA working with Saudi secret police7/25/2014The NSA’s New Partner in Spying: Saudi Arabia’s Brutal State Police (July 30) (The Intercept)Saudi Arabia Information Paper (July 30) (The Intercept)

.

NSA and Israel work closely together8/4/2014Cash, Weapons and Surveillance: The US is a Key Party to Every Israeli Attack (August 4) (The Intercept)Israel-US 1999 Agreement (August 4) (The Intercept)NSA Intelligence Relationship with Israel (August 4) (The Intercept)

.

GCHQ and terrorist cell phone security procedures8/12/2014NPR Is Laundering CIA Talking Points to Make You Scared of NSA Reporting (August 12) (The Intercept)GCHQ Covert Mobile Phones Policy (August 12) (The Intercept)

.

NSA accidentally bricked Syrian router; MonsterMind program8/13/2014Edward Snowden: The Untold Story (August 13) (Wired)

.

Hacienda8/15/2014NSA/GCHQ: The HACIENDA Program for Internet Colonization (August 15) (CT)

.

ICReach8/25/2014The Surveillance Engine: How the NSA Built Its Own Secret Google (August 25) (The Intercept)ICREACH Wholesale Sharing (2007) (August 25) (The Intercept)Black Budget Extracts (August 25) (The Intercept)Sharing SIGINT metadata on ICREACH (August 25) (The Intercept)CRISSCROSS/PROTON Point Paper (August 25) (The Intercept)Metadata Sharing Memorandum (2005) (August 25) (The Intercept)Decision Memorandum for the DNI on ICREACH (August 25) (The Intercept)Sharing Communications Metadata Across the U.S. Intelligence Community (August 25) (The Intercept)CIA Colleagues Enthusiastically Welcome NSA Training (August 25) (The Intercept)Metadata Policy Conference (2008) (August 25) (The Intercept)

.

NSA helped Turkey spy on Kurdish rebels8/31/2014How the NSA Helped Turkey Kill Kurdish Rebels (August 31) (The Intercept)Two-Faced Friendship: Turkey Is 'Partner and Target' for the NSA (August 31) (Der Spiegel)

.

U.S. government spying for American corporations9/5/2014The US Government’s Secret Plans to Spy for American Corporations (September 5) (The Intercept)Quadrennial Intelligence Review Final Report, 2009 (September 5) (The Intercept)

.

NSA and GCHQ hacked German telecoms9/14/2014Map of the Stars: The NSA and GCHQ Campaign Against German Satellite Companies (September 14) (The Intercept)Treasure Map Presentation (September 14) (The Intercept)GCHQ Attack on Stellar PCS (September 14) (The Intercept)Treasure Map: The NSA Breach of Telekom and Other German Firms (September 14) (Der Spiegel)Satellite Teleport Knowledge (September 14) (Der Spiegel)A New Home in HafenCity (September 14) (Der Spiegel)

.

NSA helping New Zealand with mass surveillance9/15/2014New Zealand Launched Mass Surveillance Project While Publicly Denying It (September 15) (The Intercept)Snowden: New Zealand’s Prime Minister Isn’t Telling the Truth About Mass Surveillance (September 15) (The Intercept)New Zealand Visit Precis (September 15) (The Intercept)