Advertisement
Guest User

github censorship - snowden

a guest
Aug 19th, 2018
525
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
WHOIS 42.81 KB | None | 0 0
  1. root@ws50p:/home/devel/src/snowden-archive# git status
  2. On branch master
  3. Your branch is up to date with 'origin/master'.
  4.  
  5. Changes not staged for commit:
  6.   (use "git add/rm <file>..." to update what will be committed)
  7.   (use "git checkout -- <file>..." to discard changes in working directory)
  8.  
  9.     deleted:    documents/2013/20131014-thewashingtonpost__sso_collection_optimization.pdf
  10.     deleted:    documents/2013/20131014-thewashingtonpost__sso_collection_optimization_overview.pdf
  11.     deleted:    documents/2013/20131014-thewashingtonpost__sso_content_acquisition_optimization.pdf
  12.     deleted:    documents/2013/20131104-thewashingtonpost__sso_collection_optimization_google.pdf
  13.     deleted:    documents/2013/20131119-odni__ag_guidelines_for_domestic_fbi_operations.pdf
  14.     deleted:    documents/2013/20131119-odni__interim_competency_test_for_access_to_fisa_data.pdf
  15.     deleted:    documents/2013/20131119-odni__nsa_core_intelligence_oversight_training.pdf
  16.     deleted:    documents/2013/20131119-odni__nsa_course_materials_module_6_analytic_personal_v_18.pdf
  17.     deleted:    documents/2013/20131119-odni__nsa_course_materials_module_6_tech_personnel_v_25.pdf
  18.     deleted:    documents/2013/20131119-odni__nsa_cryptological_school_course_slides_on_legal_compliance_and_minimization_procedures.pdf
  19.     deleted:    documents/2013/20131119-odni__nsa_guidance_memo_on_legal_standards_for_searching_bulk_metadata.pdf
  20.     deleted:    documents/2013/20131119-odni__nsa_summary_of_requirements_for_collection_of_bulk_metadata.pdf
  21.     deleted:    documents/2013/20131119-odni__office_of_general_council_business_record_analyst_training_slides.pdf
  22.     deleted:    documents/2013/20131119-odni__united_states_signals_intelligence_directive_18_appendix_j.pdf
  23.     deleted:    documents/2013/20131119-odni__united_states_signals_intelligence_directive_18_january_25_2011.pdf
  24.     deleted:    documents/2013/20131120-theguardian__collection_processing_and_dissemination_of_allied_communications.pdf
  25.     deleted:    documents/2013/20131123-thenewyorktimes__sigint_strategy_23_february_2012.pdf
  26.     deleted:    documents/2013/20131126-thewashingtonpost__microsoft_cloud_exploitation.pdf
  27.     deleted:    documents/2013/20131211-svt__legal_issues_uk_regarding_sweden_and_quantum.pdf
  28.     deleted:    documents/2014/20140102-thewashingtonpost__quantum_computers_hard_targets.pdf
  29.     deleted:    documents/2014/20140127-thenewyorktimes__converged_analysis_on_smartphone_devices.pdf
  30.     deleted:    documents/2014/20140204-nbc__british_spies_attacked_hacktivist_anonymous.pdf
  31.     deleted:    documents/2014/20140207-nbc__gchq_honey_trap_cyber_attack_background_on_jtrig.pdf
  32.     deleted:    documents/2014/20140207-nbc__gchq_honey_trap_cyber_attack_leveraging_foreign_journalists_via_jtrig.pdf
  33.     deleted:    documents/2014/20140211-theintercept__drones_intercepting_communications.pdf
  34.     deleted:    documents/2014/20140218-theintercept__discovery_sigint_targeting_scenarios_and_compliance.pdf
  35.     deleted:    documents/2014/20140224-theintercept__training_for_covert_online_operations.pdf
  36.     deleted:    documents/2014/20140303-epicfoia__not-snowden__doj_report_on_pen_register_fisa_orders.pdf
  37.     deleted:    documents/2014/20140305-nrchandelsblad__dutch_shares_collected_anti_piracy_information_with_nsa.pdf
  38.     deleted:    documents/2014/20140307-theintercept__nsa_ask_zelda_an_interview_with_zelda.pdf
  39.     deleted:    documents/2014/20140307-theintercept__nsa_ask_zelda_guilty_until_proven_innocent.pdf
  40.     deleted:    documents/2014/20140307-theintercept__nsa_ask_zelda_is_bain_de_soleil_a_bane_on_the_nsa.pdf
  41.     deleted:    documents/2014/20140307-theintercept__nsa_ask_zelda_watching_every_word_in_snitch_city.pdf
  42.     deleted:    documents/2014/20140311-thenewyorktimes__ashcroft_memo_on_intelligence_sharing_procedures.pdf
  43.     deleted:    documents/2014/20140311-thenewyorktimes__classification_guide_for_fisa_the_protect_america_act_and_the_fisa_amendments_act.pdf
  44.     deleted:    documents/2014/20140311-thenewyorktimes__classification_guide_for_stellarwind_program_0.pdf
  45.     deleted:    documents/2014/20140311-thenewyorktimes__nsa_memo_expands_access_to_fisa_information.pdf
  46.     deleted:    documents/2014/20140311-thenewyorktimes__nsa_timeline_of_surveillance_law_developments.pdf
  47.     deleted:    documents/2014/20140312-theintercept__increasing_collection_capacity_by_increasing_implants.pdf
  48.     deleted:    documents/2014/20140312-theintercept__mhs_leverages_xkeyscore_for_quantum.pdf
  49.     deleted:    documents/2014/20140312-theintercept__nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf
  50.     deleted:    documents/2014/20140312-theintercept__nsa_technology_directorate_analysis_of_converged_data.pdf
  51.     deleted:    documents/2014/20140312-theintercept__the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf
  52.     deleted:    documents/2014/20140312-theintercept__turbine_industrial_scale_exploitation.pdf
  53.     deleted:    documents/2014/20140312-theintercept__vpn_and_voip_exploitation_with_hammerchant_and_hammerstein.pdf
  54.     deleted:    documents/2014/20140313-theintercept__nsa_cooperative_third_party_relationships.pdf
  55.     deleted:    documents/2014/20140315-theintercept__turbine_intelligence_command_and_control.pdf
  56.     deleted:    documents/2014/20140318-thewashingtonpost__adding_another_country_to_mystic_program.pdf
  57.     deleted:    documents/2014/20140318-thewashingtonpost__description_of_data_collection_under_mystic.pdf
  58.     deleted:    documents/2014/20140320-theintercept__targeting_system_administrator_accounts.pdf
  59.     deleted:    documents/2014/20140321-lemonde__french_intelligence_email_spying_operation.pdf
  60.     deleted:    documents/2014/20140322-thenewyorktimes__operation_shotgiant_objectives.pdf
  61.     deleted:    documents/2014/20140329-derspiegel__gchq_and_nsa_spy_on_heads_of_state.pdf
  62.     deleted:    documents/2014/20140404-theintercept__gchq_full_spectrum_cyber_effects.pdf
  63.     deleted:    documents/2014/20140618-derspiegel__agenda_for_the_visit_of_bsi_vice_president_andreas_konen_to_the_nsa.pdf
  64.     deleted:    documents/2014/20140618-derspiegel__boundless_informant_overview_global.pdf
  65.     deleted:    documents/2014/20140618-derspiegel__boundless_informant_statistics_for_so-called_third_parties.pdf
  66.     deleted:    documents/2014/20140618-derspiegel__boundless_informant_statistics_on_data_from_foreign_partners.pdf
  67.     deleted:    documents/2014/20140618-derspiegel__boundless_informant_statistics_on_germany.pdf
  68.     deleted:    documents/2014/20140618-derspiegel__boundless_informant_statistics_on_the_uk.pdf
  69.     deleted:    documents/2014/20140618-derspiegel__briefing_on_the_visit_to_the_nsa_of_high_ranking_bnd_official.pdf
  70.     deleted:    documents/2014/20140618-derspiegel__cooperation_between_the_nsa_bnd_and_bfv.pdf
  71.     deleted:    documents/2014/20140618-derspiegel__details_on_xkeyscore_from_an_internal_gchq_website.pdf
  72.     deleted:    documents/2014/20140618-derspiegel__european_technical_center_report_on_the_experiences_of_one_nsa_worker.pdf
  73.     deleted:    documents/2014/20140618-derspiegel__excerpt_on_the_sharing_of_xkeyscore_with_german_intelligence_agency_bfv.pdf
  74.     deleted:    documents/2014/20140618-derspiegel__explanation_of_nymrod_a_system_for_searching_for_people_and_places_in_databases_and_documents.pdf
  75.     deleted:    documents/2014/20140618-derspiegel__faqs_on_the_boundless_informant_program.pdf
  76.     deleted:    documents/2014/20140618-derspiegel__final_agenda_of_meeting_between_high_ranking_nsa_and_bnd_officials.pdf
  77.     deleted:    documents/2014/20140618-derspiegel__gchq_report_on_the_technical_abilities_of_tempora.pdf
  78.     deleted:    documents/2014/20140618-derspiegel__guidelines_for_the_classification_of_nsa_sigint_details_1945_1967.pdf
  79.     deleted:    documents/2014/20140618-derspiegel__guidelines_for_the_classification_of_suslag_details_and_the_nsa_bnd_cooperation.pdf
  80.     deleted:    documents/2014/20140618-derspiegel__internal_nsa_discussion_guidelines_relating_to_cooperation_with_the_bnd_and_bfv.pdf
  81.     deleted:    documents/2014/20140618-derspiegel__internal_nsa_presentation_on_the_bnds_organization.pdf
  82.     deleted:    documents/2014/20140618-derspiegel__nostalgic_recollections_from_nsa_workers_formerly_stationed_in_bad_aibling.pdf
  83.     deleted:    documents/2014/20140618-derspiegel__nsa_presentation_on_the_work_of_nymrod.pdf
  84.     deleted:    documents/2014/20140618-derspiegel__nsacss_europe_report_on_the_experiences_of_one_nsa_worker.pdf
  85.     deleted:    documents/2014/20140618-derspiegel__nsacss_presentation_on_technical_surveillance_in_europe_and_africa.pdf
  86.     deleted:    documents/2014/20140618-derspiegel__overview_of_the_use_of_boundless_informant_world_map.pdf
  87.     deleted:    documents/2014/20140618-derspiegel__preliminary_agenda_of_meeting_between_nsa_and_bnd_officials.pdf
  88.     deleted:    documents/2014/20140618-derspiegel__presentation_on_the_nsacia_unit_special_collection_service.pdf
  89.     deleted:    documents/2014/20140618-derspiegel__report_on_a_wharpdrive_incident_in_an_sso_presentation.pdf
  90.     deleted:    documents/2014/20140618-derspiegel__report_on_an_nsa_sigdev_training_course_for_allied_countries.pdf
  91.     deleted:    documents/2014/20140618-derspiegel__report_on_an_nsa_visit_to_bnd_site_and_on_data_transfer_from_the_bnd_to_the_nsa.pdf
  92.     deleted:    documents/2014/20140618-derspiegel__report_on_an_unexploded_ordnance_alarm_at_european_technical_centern.pdf
  93.     deleted:    documents/2014/20140618-derspiegel__report_on_an_xkeyscore_training_session_at_the_ecc_dagger_complex.pdf
  94.     deleted:    documents/2014/20140618-derspiegel__report_on_data_exchange_between_the_nsa_and_bnd_within_the_jsa_framework.pdf
  95.     deleted:    documents/2014/20140618-derspiegel__report_on_the_beginnings_of_the_european_security_center_esc_in_the_dagger_complex.pdf
  96.     deleted:    documents/2014/20140618-derspiegel__report_on_the_changing_of_the_escs_name_to_european_security_operations_center_esoc.pdf
  97.     deleted:    documents/2014/20140618-derspiegel__report_on_the_nsas_access_to_tempora.pdf
  98.     deleted:    documents/2014/20140618-derspiegel__report_on_the_one_year_anniversary_of_nsa_liaison_unit_suslag_in_bad_aibling.pdf
  99.     deleted:    documents/2014/20140618-derspiegel__report_on_the_surveillance_of_african_countries_by_jsa.pdf
  100.     deleted:    documents/2014/20140618-derspiegel__report_on_the_technical_expansion_of_the_european_technical_center_in_wiesbaden.pdf
  101.     deleted:    documents/2014/20140618-derspiegel__report_on_the_work_of_nsacss_europe.pdf
  102.     deleted:    documents/2014/20140618-derspiegel__restrictions_on_the_technical_surveillance_performed_by_jsa.pdf
  103.     deleted:    documents/2014/20140618-derspiegel__us_sites_with_nsa_personnel_in_germany.pdf
  104.     deleted:    documents/2014/20140618-derspiegel__world_map_from_the_boundless_informant_program.pdf
  105.     deleted:    documents/2014/20140618-derspiegel__zoom_of_a_boundless_informant_document_with_project_names.pdf
  106.     deleted:    documents/2014/20140630-thewashingtonpost__affidavit_of_keith_alexander_regarding_spying_on_foreign_entities.pdf
  107.     deleted:    documents/2014/20140630-thewashingtonpost__fisa_amendments_act_summary_document.pdf
  108.     deleted:    documents/2014/20140630-thewashingtonpost__fisa_judges_order_authorizing_surveillance_of_foreign_governments_and_organizations.pdf
  109.     deleted:    documents/2014/20140630-thewashingtonpost__list_of_governments_and_organizations_authorized_for_surveillance.pdf
  110.     deleted:    documents/2014/20140630-thewashingtonpost__odni_certification_regarding_foreign_entities.pdf
  111.     deleted:    documents/2014/20140709-theintercept__spying_on_muslim_american_leaders.pdf
  112.     deleted:    documents/2014/20140723-thewashingtonpost__post_signals_intelligence_authority_decision_tree.pdf
  113.     deleted:    documents/2014/20140803-theintercept__nsa_intelligence_relationship_with_israel.pdf
  114.     deleted:    documents/2014/20140805-theintercept__directorate_of_terrorist_identities_strategic_accomplishments_2013.pdf
  115.     deleted:    documents/2014/20140812-theintercept__gchq_covert_mobile_phones_policy.pdf
  116.     deleted:    documents/2014/20140825-theintercept__cia_colleagues_enthusiastically_welcome_nsa_training.pdf
  117.     deleted:    documents/2014/20140825-theintercept__dni_decision_memorandum_on_icreach.pdf
  118.     deleted:    documents/2014/20140825-theintercept__icreach_sharing_sigint_comms_metadata_with_the_intel_community_memo.pdf
  119.     deleted:    documents/2014/20140825-theintercept__sharing_communications_metadata_across_the_usic_icreach.pdf
  120.     deleted:    documents/2014/20140831-derspiegel__ncrs_with_foreign_relations_missions_become_suslas.pdf
  121.     deleted:    documents/2014/20140831-derspiegel__nsa_intelligence_relationship_with_turkey.pdf
  122.     deleted:    documents/2014/20140831-derspiegel__nsas_oldest_third_party_partnership.pdf
  123.     deleted:    documents/2014/20140831-derspiegel__sinio_seminar_tough_times_for_turkey.pdf
  124.     deleted:    documents/2014/20140831-derspiegel__sinio_seminar_turkey_and_the_kurds.pdf
  125.     deleted:    documents/2014/20140831-derspiegel__turkish_signal_intelligence_chief_agenda.pdf
  126.     deleted:    documents/2014/20140905-theintercept__quadrennial_intelligence_community_review_final_report.pdf
  127.     deleted:    documents/2014/20140914-derspiegel__treasure_map_announces_a_new_release.pdf
  128.     deleted:    documents/2014/20141010-theintercept__cno_core_secrets_security_structure.pdf
  129.     deleted:    documents/2014/20141010-theintercept__computer_network_exploitation_classification_guide.pdf
  130.     deleted:    documents/2014/20141010-theintercept__eci_pawleys_classification_guide.pdf
  131.     deleted:    documents/2014/20141010-theintercept__eci_whipgenie_classification_guide.pdf
  132.     deleted:    documents/2014/20141010-theintercept__exceptionally_controlled_information_listing.pdf
  133.     deleted:    documents/2014/20141125-suddeutschezeitung__cables_where_we_want_to_be.pdf
  134.     deleted:    documents/2014/20141125-suddeutschezeitung__mti_access_project_weekly_status_february_6_2009.pdf
  135.     deleted:    documents/2014/20141125-suddeutschezeitung__mti_access_project_weekly_status_june_27_2008.pdf
  136.     deleted:    documents/2014/20141125-suddeutschezeitung__mti_access_project_weekly_status_november_28_2008.pdf
  137.     deleted:    documents/2014/20141125-suddeutschezeitung__windstop_system_highlights.pdf
  138.     deleted:    documents/2014/20141204-theintercept__auroragold_target_technology_trends_center_support_to_wpmo.pdf
  139.     deleted:    documents/2014/20141204-theintercept__ir21_a_technology_warning_mechanism.pdf
  140.     deleted:    documents/2014/20141204-theintercept__nsa_first_ever_collect_of_high_interest_4g_cellular_signal.pdf
  141.     deleted:    documents/2014/20141204-theintercept__nsa_gchq_csec_network_tradecraft_advancement.pdf
  142.     deleted:    documents/2014/20141214-theintercept__gchq_making_network_sense_of_the_encryption.pdf
  143.     deleted:    documents/2014/20141214-theintercept__gchq_mobile_networks_in_my_noc_world.pdf
  144.     deleted:    documents/2014/20141214-theintercept__gchq_nac_review_january_march_2012.pdf
  145.     deleted:    documents/2014/20141214-theintercept__gchq_nac_review_october_december_2011.pdf
  146.     deleted:    documents/2014/20141228-derspiegel__analysis_from_ssl-tls_connections_through_gchq_in_the_flying_pig_database.pdf
  147.     deleted:    documents/2014/20141228-derspiegel__analytic_challenges_from_active_passive_integration_when_nsa_attacks_ipsec_vpns.pdf
  148.     deleted:    documents/2014/20141228-derspiegel__analytics_on_security_of_tor_hidden_services.pdf
  149.     deleted:    documents/2014/20141228-derspiegel__bluesnort_program_on_net_defense_from_encrypted_communications.pdf
  150.     deleted:    documents/2014/20141228-derspiegel__canadian_document_from_ces_on_tls_trends.pdf
  151.     deleted:    documents/2014/20141228-derspiegel__classification_guide_for_cryptanalysis.pdf
  152.     deleted:    documents/2014/20141228-derspiegel__decryption_of_vpn_connections_within_the_valiantsurf_program.pdf
  153.     deleted:    documents/2014/20141228-derspiegel__description_of_existing_projects_on_vpn_decryption.pdf
  154.     deleted:    documents/2014/20141228-derspiegel__description_of_voip_telephony_encryption_methods_and_other_ways_to_attack.pdf
  155.     deleted:    documents/2014/20141228-derspiegel__description_on_the_processing_of_vpn_data_packets_within_the_turmoil_program.pdf
  156.     deleted:    documents/2014/20141228-derspiegel__explanation_of_a_potential_technique_to_deanonymise_users_of_the_tor_network.pdf
  157.     deleted:    documents/2014/20141228-derspiegel__explanation_of_the_gallantwave_that_decrypts_vpn_traffic_within_longhaul.pdf
  158.     deleted:    documents/2014/20141228-derspiegel__explanation_of_the_poisennut_product_and_its_role_when_attacking_vpn.pdf
  159.     deleted:    documents/2014/20141228-derspiegel__explanation_of_the_transform_engine_emulator_when_attacking_vpn.pdf
  160.     deleted:    documents/2014/20141228-derspiegel__explanation_of_the_turmoil_gallantwave_program_and_its_role_when_attacking_vpn.pdf
  161.     deleted:    documents/2014/20141228-derspiegel__explanation_on_the_spin9_program_on_end_to_end_attacks_on_vpn.pdf
  162.     deleted:    documents/2014/20141228-derspiegel__gchq_briefing_on_the_bullrun_program.pdf
  163.     deleted:    documents/2014/20141228-derspiegel__gchq_presentation_on_the_bullrun_programs_decryption_capabilities.pdf
  164.     deleted:    documents/2014/20141228-derspiegel__general_description_how_nsa_handles_encrypted_traffic.pdf
  165.     deleted:    documents/2014/20141228-derspiegel__guide_for_analysts_on_how_to_use_the_prism_skype_collection.pdf
  166.     deleted:    documents/2014/20141228-derspiegel__intercept_with_pgp_encrypted_message.pdf
  167.     deleted:    documents/2014/20141228-derspiegel__intro_to_the_vpn_exploitation_process_mentioning_the_protocols_attacked_pptp_ipsec_ssl_ssh.pdf
  168.     deleted:    documents/2014/20141228-derspiegel__malibu_architecture_overview_to_exploit_vpn_communication.pdf
  169.     deleted:    documents/2014/20141228-derspiegel__national_information_assurance_research_laboratory_niarl_tundra.pdf
  170.     deleted:    documents/2014/20141228-derspiegel__potential_technique_to_deanonymise_users_of_tor_network.pdf
  171.     deleted:    documents/2015/20150117-derspeigel__analysis_of_chinese_methods_and_performed_actions_in_the_context_of_computer_network_exploitation.pdf
  172.     deleted:    documents/2015/20150117-derspeigel__classification_guide_for_computer_network_exploitation_cne.pdf
  173.     deleted:    documents/2015/20150117-derspeigel__combination_of_offensive_and_defensive_missions_how_fourth-party_missions_are_being_performed.pdf
  174.     deleted:    documents/2015/20150117-derspeigel__csec_document_about_the_recognition_of_trojans_and_other_network_based_anomaly.pdf
  175.     deleted:    documents/2015/20150117-derspeigel__csec_document_on_the_handling_of_existing_trojans_when_trojanizing_computers.pdf
  176.     deleted:    documents/2015/20150117-derspeigel__document_explaining_the_role_of_the_remote_operations_center_roc.pdf
  177.     deleted:    documents/2015/20150117-derspeigel__expansion_of_the_remote_operations_center_roc_on_endpoint_operations.pdf
  178.     deleted:    documents/2015/20150117-derspeigel__nsa_example_snowglobe_in_which_a_suspected_french_government_trojan_is_analyzed_to_find_out_if_it_can_be_helpful_for_own_interests.pdf
  179.     deleted:    documents/2015/20150117-derspeigel__nsa_program_tutelage_to_instrumentalize_third_party_attack_tools.pdf
  180.     deleted:    documents/2015/20150117-derspeigel__nsa_project_description_to_recognize_and_process_data_that_comes_from_third_party_attacks_on_computers.pdf
  181.     deleted:    documents/2015/20150117-derspeigel__nsa_training_course_material_on_computer_network_operations.pdf
  182.     deleted:    documents/2015/20150117-derspeigel__overview_of_methods_for_nsa_integrated_cyber_operations.pdf
  183.     deleted:    documents/2015/20150117-derspeigel__overview_of_the_transgression_program_to_analyze_and_exploit_foreign_cna-cne_exploits.pdf
  184.     deleted:    documents/2015/20150117-derspeigel__overview_on_the_nsa_use_of_bots_and_the_defiantwarrior_program.pdf
  185.     deleted:    documents/2015/20150117-derspeigel__process_analysts_choose_their_data_requirement_and_then_get_to_know_the_tools_that_can_do_the_job.pdf
  186.     deleted:    documents/2015/20150117-derspeigel__projects_of_the_tao-ato_department_such_as_the_remote_destruction_of_network_cards.pdf
  187.     deleted:    documents/2015/20150117-derspeigel__quantumtheory_is_a_set_of_technologies_allowing_man_on_the_side_interference_attacks_on_tcp_ip_connections_includes_straightbizarre_and_daredev.pdf
  188.     deleted:    documents/2015/20150117-derspeigel__report_of_nsa_employee_about_backdoor_in_the_openssh_daemon.pdf
  189.     deleted:    documents/2015/20150117-derspeigel__sample_code_of_malware_program_from_five_eyes_alliance.pdf
  190.     deleted:    documents/2015/20150117-derspeigel__supply-chain_interdiction_stealthy_techniques_can_crack_some_of_sigints_hardest_targets.pdf
  191.     deleted:    documents/2015/20150117-derspeigel__technical_description_of_the_fashioncleft_protocol.pdf
  192.     deleted:    documents/2015/20150117-derspeigel__the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa.pdf
  193.     deleted:    documents/2015/20150128-cbc__cse_presentation_on_the_levitation_project.pdf
  194.     deleted:    documents/2015/20150128-theintercept__cse_presentation_on_the_levitation_project.pdf
  195.     deleted:    documents/2015/20150204-theintercept__nato_civilian_intelligence_council_cyber_panel.pdf
  196.     deleted:    documents/2015/20150204-theintercept__open_source_for_cyber_defence_progress.pdf
  197.     deleted:    documents/2015/20150204-theintercept__who_else_is_targeting_your_target_collecting.pdf
  198.     deleted:    documents/2015/20150210-theintercept__iran_current_topics_interactions_with_gchq.pdf
  199.     deleted:    documents/2015/20150219-theintercept__ccne_email_addresses_jan10_mar10_trial.pdf
  200.     deleted:    documents/2015/20150219-theintercept__ccne_email_harvesting_jan10_mar10_trial.pdf
  201.     deleted:    documents/2015/20150219-theintercept__ccne_stats_summaries_jan10_mar10_trial.pdf
  202.     deleted:    documents/2015/20150219-theintercept__ccne_successes_jan10_mar10_trial.pdf
  203.     deleted:    documents/2015/20150219-theintercept__cne_access_to_core_mobile_networks.pdf
  204.     deleted:    documents/2015/20150219-theintercept__dapino_gamma_gemalto_yuaawaa_wiki.pdf
  205.     deleted:    documents/2015/20150219-theintercept__dapino_gamma_target_personalisation_centres.pdf
  206.     deleted:    documents/2015/20150219-theintercept__imsis_identified_with_ki_data_for_network.pdf
  207.     deleted:    documents/2016/20160606-theintercept__communications_capability_development_programme.pdf
  208.     deleted:    documents/2016/20160606-theintercept__mobile_apps_checkpoint_meeting_archives.pdf
  209.     deleted:    documents/2016/20160819-theintercept__course__introduction_nohidden_redacted.pdf
  210.     deleted:    documents/2016/20160819-theintercept__foxacid_overall_briefing_third_revision_redacted.pdf
  211.     deleted:    documents/2016/20160819-theintercept__introduction_to_baddecision_redacted.pdf
  212.     deleted:    documents/2016/20160819-theintercept__introduction_to_wlan_cne_operations_redacted.pdf
  213.     deleted:    documents/2016/20160819-theintercept__sigint_development_program_management_review_redacted.pdf
  214.     deleted:    documents/2016/20160906-theintercept__afghanistan_30_enemy_killed_january_february_2012.pdf
  215.     deleted:    documents/2016/20160906-theintercept__apparition_becomes_a_reality_new_corporate_vsat.pdf
  216.     deleted:    documents/2016/20160906-theintercept__apparition_ghosthunter_tasking_info.pdf
  217.     deleted:    documents/2016/20160906-theintercept__elegant_chaos_collect_it_all_exploit_it_all.pdf
  218.     deleted:    documents/2016/20160906-theintercept__elegant_chaos_collect_it_all_exploit_it_all_plus_notes.pdf
  219.     deleted:    documents/2016/20160906-theintercept__ghosthunter_and_the_geolocating_of_internet_cafes.pdf
  220.     deleted:    documents/2016/20160906-theintercept__ghosthunter_future_capabilities_2008.pdf
  221.     deleted:    documents/2016/20160906-theintercept__ghosthunter_only_capability_of_its_kind.pdf
  222.     deleted:    documents/2016/20160906-theintercept__gsm_tower_mapping_made_easier_and_more_accurate.pdf
  223.     deleted:    documents/2016/20160906-theintercept__menwith_satellite_classification_guide.pdf
  224.     deleted:    documents/2016/20160906-theintercept__mhs_continues_successful_counterterrorism_survey.pdf
  225.     deleted:    documents/2016/20160906-theintercept__mhs_databases_as_of_14_august_2008.pdf
  226.     deleted:    documents/2016/20160906-theintercept__mhs_initiatives_maximizing_our_access.pdf
  227.     deleted:    documents/2016/20160906-theintercept__new_ops_building_at_mhs_completed_fit_up_begins.pdf
  228.     deleted:    documents/2016/20160906-theintercept__new_technique_geolocates_targets_active_at.pdf
  229.     deleted:    documents/2016/20160906-theintercept__new_tool_combines_multi_int_multi_agency.pdf
  230.     deleted:    documents/2016/20160906-theintercept__project_sandstorm_wifi_geolocation_january_2011.pdf
  231.     deleted:    documents/2016/20160906-theintercept__sigint_target_package_leads_to_usmc_capture_of_alqaeda_weapons_procurer.pdf
  232.     deleted:    documents/2016/20160906-theintercept__traffic_series_is_your_collection_surveyed_or.pdf
  233.     deleted:    documents/2016/20160906-theintercept__uk_special_forces_reaper_drone_january_february_2012.pdf
  234.     deleted:    documents/2016/20160906-theintercept__work_is_progressing_on_menwith_hill_station_s.pdf
  235.     deleted:    documents/2016/20160906-theintercept__yemen_backhaul_comms_collected_january_2011.pdf
  236.     deleted:    documents/2016/20161116-theintercept__fairview_dataflow_charts_april_2012.pdf
  237.     deleted:    documents/2016/20161229-theintercept__anna_politkovskaya_intellipedia_redacted.pdf
  238.     deleted:    documents/2017/20170410-theintercept__10th_anniversary_edition_ep_3_damage_assessment.pdf
  239.  
  240. Untracked files:
  241.   (use "git add <file>..." to include in what will be committed)
  242.  
  243.     documents/2013/20131014-thewashingtonpost__sso_collection_optimization.pd
  244.     documents/2013/20131014-thewashingtonpost__sso_collection_optimization_ov
  245.     documents/2013/20131014-thewashingtonpost__sso_content_acquisition_optimi
  246.     documents/2013/20131104-thewashingtonpost__sso_collection_optimization_go
  247.     documents/2013/20131119-odni__ag_guidelines_for_domestic_fbi_operations.p
  248.     documents/2013/20131119-odni__interim_competency_test_for_access_to_fisa_
  249.     documents/2013/20131119-odni__nsa_core_intelligence_oversight_training.pd
  250.     documents/2013/20131119-odni__nsa_course_materials_module_6_analytic_pers
  251.     documents/2013/20131119-odni__nsa_course_materials_module_6_tech_personne
  252.     documents/2013/20131119-odni__nsa_cryptological_school_course_slides_on_l
  253.     documents/2013/20131119-odni__nsa_guidance_memo_on_legal_standards_for_se
  254.     documents/2013/20131119-odni__nsa_summary_of_requirements_for_collection_
  255.     documents/2013/20131119-odni__office_of_general_council_business_record_a
  256.     documents/2013/20131119-odni__united_states_signals_intelligence_directiv
  257.     documents/2013/20131120-theguardian__collection_processing_and_disseminat
  258.     documents/2013/20131123-thenewyorktimes__sigint_strategy_23_february_2012
  259.     documents/2013/20131126-thewashingtonpost__microsoft_cloud_exploitation.p
  260.     documents/2013/20131211-svt__legal_issues_uk_regarding_sweden_and_quantum
  261.     documents/2014/20140102-thewashingtonpost__quantum_computers_hard_targets
  262.     documents/2014/20140127-thenewyorktimes__converged_analysis_on_smartphone
  263.     documents/2014/20140204-nbc__british_spies_attacked_hacktivist_anonymous.
  264.     documents/2014/20140207-nbc__gchq_honey_trap_cyber_attack_background_on_j
  265.     documents/2014/20140207-nbc__gchq_honey_trap_cyber_attack_leveraging_fore
  266.     documents/2014/20140211-theintercept__drones_intercepting_communications.
  267.     documents/2014/20140218-theintercept__discovery_sigint_targeting_scenario
  268.     documents/2014/20140224-theintercept__training_for_covert_online_operatio
  269.     documents/2014/20140303-epicfoia__not-snowden__doj_report_on_pen_register
  270.     documents/2014/20140305-nrchandelsblad__dutch_shares_collected_anti_pirac
  271.     documents/2014/20140307-theintercept__nsa_ask_zelda_an_interview_with_zel
  272.     documents/2014/20140307-theintercept__nsa_ask_zelda_guilty_until_proven_i
  273.     documents/2014/20140307-theintercept__nsa_ask_zelda_is_bain_de_soleil_a_b
  274.     documents/2014/20140307-theintercept__nsa_ask_zelda_watching_every_word_i
  275.     documents/2014/20140311-thenewyorktimes__ashcroft_memo_on_intelligence_sh
  276.     documents/2014/20140311-thenewyorktimes__classification_guide_for_fisa_th
  277.     documents/2014/20140311-thenewyorktimes__classification_guide_for_stellar
  278.     documents/2014/20140311-thenewyorktimes__nsa_memo_expands_access_to_fisa_
  279.     documents/2014/20140311-thenewyorktimes__nsa_timeline_of_surveillance_law
  280.     documents/2014/20140312-theintercept__increasing_collection_capacity_by_i
  281.     documents/2014/20140312-theintercept__mhs_leverages_xkeyscore_for_quantum
  282.     documents/2014/20140312-theintercept__nsa_phishing_tactics_and_man_in_the
  283.     documents/2014/20140312-theintercept__nsa_technology_directorate_analysis
  284.     documents/2014/20140312-theintercept__the_nsa_and_gchqs_quantumtheory_hac
  285.     documents/2014/20140312-theintercept__turbine_industrial_scale_exploitati
  286.     documents/2014/20140312-theintercept__vpn_and_voip_exploitation_with_hamm
  287.     documents/2014/20140313-theintercept__nsa_cooperative_third_party_relatio
  288.     documents/2014/20140315-theintercept__turbine_intelligence_command_and_co
  289.     documents/2014/20140318-thewashingtonpost__adding_another_country_to_myst
  290.     documents/2014/20140318-thewashingtonpost__description_of_data_collection
  291.     documents/2014/20140320-theintercept__targeting_system_administrator_acco
  292.     documents/2014/20140321-lemonde__french_intelligence_email_spying_operati
  293.     documents/2014/20140322-thenewyorktimes__operation_shotgiant_objectives.p
  294.     documents/2014/20140329-derspiegel__gchq_and_nsa_spy_on_heads_of_state.pd
  295.     documents/2014/20140404-theintercept__gchq_full_spectrum_cyber_effects.pd
  296.     documents/2014/20140618-derspiegel__agenda_for_the_visit_of_bsi_vice_pres
  297.     documents/2014/20140618-derspiegel__boundless_informant_overview_global.p
  298.     documents/2014/20140618-derspiegel__boundless_informant_statistics_for_so
  299.     documents/2014/20140618-derspiegel__boundless_informant_statistics_on_dat
  300.     documents/2014/20140618-derspiegel__boundless_informant_statistics_on_ger
  301.     documents/2014/20140618-derspiegel__boundless_informant_statistics_on_the
  302.     documents/2014/20140618-derspiegel__briefing_on_the_visit_to_the_nsa_of_h
  303.     documents/2014/20140618-derspiegel__cooperation_between_the_nsa_bnd_and_b
  304.     documents/2014/20140618-derspiegel__details_on_xkeyscore_from_an_internal
  305.     documents/2014/20140618-derspiegel__european_technical_center_report_on_t
  306.     documents/2014/20140618-derspiegel__excerpt_on_the_sharing_of_xkeyscore_w
  307.     documents/2014/20140618-derspiegel__explanation_of_nymrod_a_system_for_se
  308.     documents/2014/20140618-derspiegel__faqs_on_the_boundless_informant_progr
  309.     documents/2014/20140618-derspiegel__final_agenda_of_meeting_between_high_
  310.     documents/2014/20140618-derspiegel__gchq_report_on_the_technical_abilitie
  311.     documents/2014/20140618-derspiegel__guidelines_for_the_classification_of_
  312.     documents/2014/20140618-derspiegel__internal_nsa_discussion_guidelines_re
  313.     documents/2014/20140618-derspiegel__internal_nsa_presentation_on_the_bnds
  314.     documents/2014/20140618-derspiegel__nostalgic_recollections_from_nsa_work
  315.     documents/2014/20140618-derspiegel__nsa_presentation_on_the_work_of_nymro
  316.     documents/2014/20140618-derspiegel__nsacss_europe_report_on_the_experienc
  317.     documents/2014/20140618-derspiegel__nsacss_presentation_on_technical_surv
  318.     documents/2014/20140618-derspiegel__overview_of_the_use_of_boundless_info
  319.     documents/2014/20140618-derspiegel__preliminary_agenda_of_meeting_between
  320.     documents/2014/20140618-derspiegel__presentation_on_the_nsacia_unit_speci
  321.     documents/2014/20140618-derspiegel__report_on_a_wharpdrive_incident_in_an
  322.     documents/2014/20140618-derspiegel__report_on_an_nsa_sigdev_training_cour
  323.     documents/2014/20140618-derspiegel__report_on_an_nsa_visit_to_bnd_site_an
  324.     documents/2014/20140618-derspiegel__report_on_an_unexploded_ordnance_alar
  325.     documents/2014/20140618-derspiegel__report_on_an_xkeyscore_training_sessi
  326.     documents/2014/20140618-derspiegel__report_on_data_exchange_between_the_n
  327.     documents/2014/20140618-derspiegel__report_on_the_beginnings_of_the_europ
  328.     documents/2014/20140618-derspiegel__report_on_the_changing_of_the_escs_na
  329.     documents/2014/20140618-derspiegel__report_on_the_nsas_access_to_tempora.
  330.     documents/2014/20140618-derspiegel__report_on_the_one_year_anniversary_of
  331.     documents/2014/20140618-derspiegel__report_on_the_surveillance_of_african
  332.     documents/2014/20140618-derspiegel__report_on_the_technical_expansion_of_
  333.     documents/2014/20140618-derspiegel__report_on_the_work_of_nsacss_europe.p
  334.     documents/2014/20140618-derspiegel__restrictions_on_the_technical_surveil
  335.     documents/2014/20140618-derspiegel__us_sites_with_nsa_personnel_in_german
  336.     documents/2014/20140618-derspiegel__world_map_from_the_boundless_informan
  337.     documents/2014/20140618-derspiegel__zoom_of_a_boundless_informant_documen
  338.     documents/2014/20140630-thewashingtonpost__affidavit_of_keith_alexander_r
  339.     documents/2014/20140630-thewashingtonpost__fisa_amendments_act_summary_do
  340.     documents/2014/20140630-thewashingtonpost__fisa_judges_order_authorizing_
  341.     documents/2014/20140630-thewashingtonpost__list_of_governments_and_organi
  342.     documents/2014/20140630-thewashingtonpost__odni_certification_regarding_f
  343.     documents/2014/20140709-theintercept__spying_on_muslim_american_leaders.p
  344.     documents/2014/20140723-thewashingtonpost__post_signals_intelligence_auth
  345.     documents/2014/20140803-theintercept__nsa_intelligence_relationship_with_
  346.     documents/2014/20140805-theintercept__directorate_of_terrorist_identities
  347.     documents/2014/20140812-theintercept__gchq_covert_mobile_phones_policy.pd
  348.     documents/2014/20140825-theintercept__cia_colleagues_enthusiastically_wel
  349.     documents/2014/20140825-theintercept__dni_decision_memorandum_on_icreach.
  350.     documents/2014/20140825-theintercept__icreach_sharing_sigint_comms_metada
  351.     documents/2014/20140825-theintercept__sharing_communications_metadata_acr
  352.     documents/2014/20140831-derspiegel__ncrs_with_foreign_relations_missions_
  353.     documents/2014/20140831-derspiegel__nsa_intelligence_relationship_with_tu
  354.     documents/2014/20140831-derspiegel__nsas_oldest_third_party_partnership.p
  355.     documents/2014/20140831-derspiegel__sinio_seminar_tough_times_for_turkey.
  356.     documents/2014/20140831-derspiegel__sinio_seminar_turkey_and_the_kurds.pd
  357.     documents/2014/20140831-derspiegel__turkish_signal_intelligence_chief_age
  358.     documents/2014/20140905-theintercept__quadrennial_intelligence_community_
  359.     documents/2014/20140914-derspiegel__treasure_map_announces_a_new_release.
  360.     documents/2014/20141010-theintercept__cno_core_secrets_security_structure
  361.     documents/2014/20141010-theintercept__computer_network_exploitation_class
  362.     documents/2014/20141010-theintercept__eci_pawleys_classification_guide.pd
  363.     documents/2014/20141010-theintercept__eci_whipgenie_classification_guide.
  364.     documents/2014/20141010-theintercept__exceptionally_controlled_informatio
  365.     documents/2014/20141125-suddeutschezeitung__cables_where_we_want_to_be.pd
  366.     documents/2014/20141125-suddeutschezeitung__mti_access_project_weekly_sta
  367.     documents/2014/20141125-suddeutschezeitung__windstop_system_highlights.pd
  368.     documents/2014/20141204-theintercept__auroragold_target_technology_trends
  369.     documents/2014/20141204-theintercept__ir21_a_technology_warning_mechanism
  370.     documents/2014/20141204-theintercept__nsa_first_ever_collect_of_high_inte
  371.     documents/2014/20141204-theintercept__nsa_gchq_csec_network_tradecraft_ad
  372.     documents/2014/20141214-theintercept__gchq_making_network_sense_of_the_en
  373.     documents/2014/20141214-theintercept__gchq_mobile_networks_in_my_noc_worl
  374.     documents/2014/20141214-theintercept__gchq_nac_review_january_march_2012.
  375.     documents/2014/20141214-theintercept__gchq_nac_review_october_december_20
  376.     documents/2014/20141228-derspiegel__analysis_from_ssl-tls_connections_thr
  377.     documents/2014/20141228-derspiegel__analytic_challenges_from_active_passi
  378.     documents/2014/20141228-derspiegel__analytics_on_security_of_tor_hidden_s
  379.     documents/2014/20141228-derspiegel__bluesnort_program_on_net_defense_from
  380.     documents/2014/20141228-derspiegel__canadian_document_from_ces_on_tls_tre
  381.     documents/2014/20141228-derspiegel__classification_guide_for_cryptanalysi
  382.     documents/2014/20141228-derspiegel__decryption_of_vpn_connections_within_
  383.     documents/2014/20141228-derspiegel__description_of_existing_projects_on_v
  384.     documents/2014/20141228-derspiegel__description_of_voip_telephony_encrypt
  385.     documents/2014/20141228-derspiegel__description_on_the_processing_of_vpn_
  386.     documents/2014/20141228-derspiegel__explanation_of_a_potential_technique_
  387.     documents/2014/20141228-derspiegel__explanation_of_the_gallantwave_that_d
  388.     documents/2014/20141228-derspiegel__explanation_of_the_poisennut_product_
  389.     documents/2014/20141228-derspiegel__explanation_of_the_transform_engine_e
  390.     documents/2014/20141228-derspiegel__explanation_of_the_turmoil_gallantwav
  391.     documents/2014/20141228-derspiegel__explanation_on_the_spin9_program_on_e
  392.     documents/2014/20141228-derspiegel__gchq_briefing_on_the_bullrun_program.
  393.     documents/2014/20141228-derspiegel__gchq_presentation_on_the_bullrun_prog
  394.     documents/2014/20141228-derspiegel__general_description_how_nsa_handles_e
  395.     documents/2014/20141228-derspiegel__guide_for_analysts_on_how_to_use_the_
  396.     documents/2014/20141228-derspiegel__intercept_with_pgp_encrypted_message.
  397.     documents/2014/20141228-derspiegel__intro_to_the_vpn_exploitation_process
  398.     documents/2014/20141228-derspiegel__malibu_architecture_overview_to_explo
  399.     documents/2014/20141228-derspiegel__national_information_assurance_resear
  400.     documents/2014/20141228-derspiegel__potential_technique_to_deanonymise_us
  401.     documents/2015/20150117-derspeigel__analysis_of_chinese_methods_and_perfo
  402.     documents/2015/20150117-derspeigel__classification_guide_for_computer_net
  403.     documents/2015/20150117-derspeigel__combination_of_offensive_and_defensiv
  404.     documents/2015/20150117-derspeigel__csec_document_about_the_recognition_o
  405.     documents/2015/20150117-derspeigel__csec_document_on_the_handling_of_exis
  406.     documents/2015/20150117-derspeigel__document_explaining_the_role_of_the_r
  407.     documents/2015/20150117-derspeigel__expansion_of_the_remote_operations_ce
  408.     documents/2015/20150117-derspeigel__nsa_example_snowglobe_in_which_a_susp
  409.     documents/2015/20150117-derspeigel__nsa_program_tutelage_to_instrumentali
  410.     documents/2015/20150117-derspeigel__nsa_project_description_to_recognize_
  411.     documents/2015/20150117-derspeigel__nsa_training_course_material_on_compu
  412.     documents/2015/20150117-derspeigel__overview_of_methods_for_nsa_integrate
  413.     documents/2015/20150117-derspeigel__overview_of_the_transgression_program
  414.     documents/2015/20150117-derspeigel__overview_on_the_nsa_use_of_bots_and_t
  415.     documents/2015/20150117-derspeigel__process_analysts_choose_their_data_re
  416.     documents/2015/20150117-derspeigel__projects_of_the_tao-ato_department_su
  417.     documents/2015/20150117-derspeigel__quantumtheory_is_a_set_of_technologie
  418.     documents/2015/20150117-derspeigel__report_of_nsa_employee_about_backdoor
  419.     documents/2015/20150117-derspeigel__sample_code_of_malware_program_from_f
  420.     documents/2015/20150117-derspeigel__supply-chain_interdiction_stealthy_te
  421.     documents/2015/20150117-derspeigel__technical_description_of_the_fashionc
  422.     documents/2015/20150117-derspeigel__the_fashioncleft_protocol_nsa_uses_to
  423.     documents/2015/20150128-cbc__cse_presentation_on_the_levitation_project.p
  424.     documents/2015/20150128-theintercept__cse_presentation_on_the_levitation_
  425.     documents/2015/20150204-theintercept__nato_civilian_intelligence_council_
  426.     documents/2015/20150204-theintercept__open_source_for_cyber_defence_progr
  427.     documents/2015/20150204-theintercept__who_else_is_targeting_your_target_c
  428.     documents/2015/20150210-theintercept__iran_current_topics_interactions_wi
  429.     documents/2015/20150219-theintercept__ccne_email_addresses_jan10_mar10_tr
  430.     documents/2015/20150219-theintercept__ccne_email_harvesting_jan10_mar10_t
  431.     documents/2015/20150219-theintercept__ccne_stats_summaries_jan10_mar10_tr
  432.     documents/2015/20150219-theintercept__ccne_successes_jan10_mar10_trial.pd
  433.     documents/2015/20150219-theintercept__cne_access_to_core_mobile_networks.
  434.     documents/2015/20150219-theintercept__dapino_gamma_gemalto_yuaawaa_wiki.p
  435.     documents/2015/20150219-theintercept__dapino_gamma_target_personalisation
  436.     documents/2015/20150219-theintercept__imsis_identified_with_ki_data_for_n
  437.     documents/2016/20160606-theintercept__communications_capability_developme
  438.     documents/2016/20160606-theintercept__mobile_apps_checkpoint_meeting_arch
  439.     documents/2016/20160819-theintercept__course__introduction_nohidden_redac
  440.     documents/2016/20160819-theintercept__foxacid_overall_briefing_third_revi
  441.     documents/2016/20160819-theintercept__introduction_to_baddecision_redacte
  442.     documents/2016/20160819-theintercept__introduction_to_wlan_cne_operations
  443.     documents/2016/20160819-theintercept__sigint_development_program_manageme
  444.     documents/2016/20160906-theintercept__afghanistan_30_enemy_killed_january
  445.     documents/2016/20160906-theintercept__apparition_becomes_a_reality_new_co
  446.     documents/2016/20160906-theintercept__apparition_ghosthunter_tasking_info
  447.     documents/2016/20160906-theintercept__elegant_chaos_collect_it_all_exploi
  448.     documents/2016/20160906-theintercept__ghosthunter_and_the_geolocating_of_
  449.     documents/2016/20160906-theintercept__ghosthunter_future_capabilities_200
  450.     documents/2016/20160906-theintercept__ghosthunter_only_capability_of_its_
  451.     documents/2016/20160906-theintercept__gsm_tower_mapping_made_easier_and_m
  452.     documents/2016/20160906-theintercept__menwith_satellite_classification_gu
  453.     documents/2016/20160906-theintercept__mhs_continues_successful_counterter
  454.     documents/2016/20160906-theintercept__mhs_databases_as_of_14_august_2008.
  455.     documents/2016/20160906-theintercept__mhs_initiatives_maximizing_our_acce
  456.     documents/2016/20160906-theintercept__new_ops_building_at_mhs_completed_f
  457.     documents/2016/20160906-theintercept__new_technique_geolocates_targets_ac
  458.     documents/2016/20160906-theintercept__new_tool_combines_multi_int_multi_a
  459.     documents/2016/20160906-theintercept__project_sandstorm_wifi_geolocation_
  460.     documents/2016/20160906-theintercept__sigint_target_package_leads_to_usmc
  461.     documents/2016/20160906-theintercept__traffic_series_is_your_collection_s
  462.     documents/2016/20160906-theintercept__uk_special_forces_reaper_drone_janu
  463.     documents/2016/20160906-theintercept__work_is_progressing_on_menwith_hill
  464.     documents/2016/20160906-theintercept__yemen_backhaul_comms_collected_janu
  465.     documents/2016/20161116-theintercept__fairview_dataflow_charts_april_2012
  466.     documents/2016/20161229-theintercept__anna_politkovskaya_intellipedia_red
  467.     documents/2017/20170410-theintercept__10th_anniversary_edition_ep_3_damag
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement