Open Access To The Snowden Archive

Emulating the Panama Papers Archive, Edward Snowden and The Intercept Magazine have made a searchable archive of the secret documents he illegally exfiltrated from the NSA while working there.

The Intercept is announcing two innovations in how they report on and publish these materials. Both measures are designed to ensure that reporting on the archive continues in as expeditious and informative a manner as possible, in accordance with the agreements entered into with Snowden about how these materials would be disclosed.

The first measure involves the publication of large batches of documents.

They will begin publishing installments of the NSA’s internal SIDtoday newsletters, which span more than a decade beginning after 9/11. We are starting with the oldest SIDtoday articles, from 2003, and working through the most recent in our archive, from 2012. The first release today contains 166 documents, all from 2003, and they will periodically release batches until the entire set is made public. 

The documents are available on a special section of The Intercept.The SIDtoday documents run a wide gamut: from serious, detailed reports on top secret NSA surveillance programs to breezy, trivial meanderings of analysts’ trips and vacations, with much in between. Many are self-serving and boastful, designed to justify budgets or impress supervisors. Others contain obvious errors or mindless parroting of public source material. But some SIDtoday articles have been the basis of significant revelations from the archive.

Accompanying the release of these documents are summaries of the content of each, along with a story about NSA’s role in Guantánamo interrogations, a lengthy roundup of other intriguing information gleaned from these files, and a profile of SIDtoday. Journalists, researchers, and interested parties are invited to comb through these documents, along with future published batches, to find additional material of interest. 

Intercept editors and reporters have carefully examined each document, redacted names of low-level functionaries and other information that could impose serious harm on innocent individuals, and given the NSA an opportunity to comment on the documents to be published (the NSA’s comments resulted in no redactions other than two names of relatively low-level employees. The Intercept say these releases will enhance public understanding of these extremely powerful and secretive surveillance agencies.

The second innovation is to invite outside journalists, including from foreign media outlets, to work with The Intercept to explore the full Snowden archive.

So far, The Intercept has shared documents with more than two dozen media outlets, and teams of journalists in numerous countries have thus worked with and reported on Snowden documents (that’s independent of the other media outlets which have long possessed large portions of the Snowden archive, the Washington Post, the New York Times, The Guardian, ProPublica). 

The Intercept say there are still many documents of legitimate public interest that should be disclosed. There are also documents in the archive they do not think should be published because of the severe harm they would cause innocent people (e.g., private communications intercepted by NSA, the disclosure of which would destroy privacy rights; and documents containing government speculation about bad acts committed by private individuals (typically from marginalized communities), the disclosure of which would permanently destroy reputations).

An archive of this significance and size obviously presents complicated questions about how best to report on it. The Intercept claim they have navigated these difficult and sometimes conflicting values in deciding how best to report on this massive archive. 

Intercept: http://bit.ly/1Uhf8EM

 

« Both US Presidential Campaigns Hacked
US Must Prepare For Cyber Warfare In Space »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Hitachi ID Systems

Hitachi ID Systems

Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management and password management solutions.

Messageware

Messageware

Messageware is the market leader in securing, enhancing, and customizing Microsoft Exchange and Outlook Web App.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

CIRCL

CIRCL

CIRCL is the national Computer Incident Response Center of Luxembourg

SonicWall

SonicWall

SonicWall provide products for network security, access security, email security & encryption.

Nixu

Nixu

Nixu is the largest Nordic specialist company in information security consulting.

SEWORKS

SEWORKS

SEWORKS provides offensive and defensive app security that ensures mobile and web apps are safe from dangerous hacking threats.

BrainChip

BrainChip

BrainChip is the leading provider of neuromorphic computing solutions, a type of artificial intelligence that is inspired by the biology of the human neuron - spiking neural networks.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

ThreatGen

ThreatGen

ThreatGEN™ works with your team to improve your resiliency and industrial cybersecurity capabilities through an innovative and modernized approach to training and services.

SecureLayer7

SecureLayer7

SecureLayer7 is an international provider of integrated business information security solutions with an innovative approach to IT security.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

Kiteworks

Kiteworks

Kiteworks (formerly Accellion) creates a dedicated Private Content Network that ensures zero-trust private content protection and compliance.

CyberSecureRIA

CyberSecureRIA

We founded CyberSecureRIA specifically to secure and support RIAs. We exist to secure SEC-registered RIAs, and keep them compliant with cybersecurity regulations.

SECTA5

SECTA5

SECTA5 is a cybersecurity company building a next-generation Continuous Threat and Exposure Management platform, leveraging the expertise of offensively trained cyber defenders.