From afb64f15dbebfbbfe60fa6abb84616b2990d4fe9 Mon Sep 17 00:00:00 2001 From: boite Date: Mon, 29 Jun 2015 16:42:50 +0100 Subject: [PATCH] Add data/catalogue.json which catalogues the Primary Sources. Add a script which takes as input the data/discovered.jsoml and data/doenloaded.jsonl files and outputs the catalogue. Update the methodology. --- data/catalogue.json | 18209 ++++++++++++++++++++++++++++++++++++++++++ doc/METHODOLOGY.md | 37 + script/discodown.py | 220 + 3 files changed, 18466 insertions(+) create mode 100644 data/catalogue.json create mode 100644 script/discodown.py diff --git a/data/catalogue.json b/data/catalogue.json new file mode 100644 index 0000000..0c9e289 --- /dev/null +++ b/data/catalogue.json @@ -0,0 +1,18209 @@ +[ + { + "pubdate": "2013-06-06", + "url": "http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/images/prism-slide-1.jpg", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html", + "pubdate": "2013-06-07" + } + ], + "alternative_files": [], + "presentation_url": "http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "prism-slide-1.jpg", + "name": "2013-06-06_3c5af4e3_prism-slide-1.jpg", + "digest": "3c5af4e3687b33e5ae0d6f74bced40e122d3384aada53c19cf642418281ecc29" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-06", + "url": "http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/images/prism-slide-2.jpg", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html", + "pubdate": "2013-06-07" + } + ], + "alternative_files": [], + "presentation_url": "http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "prism-slide-2.jpg", + "name": "2013-06-06_2c9e7ec3_prism-slide-2.jpg", + "digest": "2c9e7ec38a3adbcb656606be4a15ebfadf72f4660f0de7acad2ea44752066a39" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-06", + "url": "http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/images/prism-slide-4.jpg", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html", + "pubdate": "2013-06-07" + } + ], + "alternative_files": [], + "presentation_url": "http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "prism-slide-4.jpg", + "name": "2013-06-06_405deb0b_prism-slide-4.jpg", + "digest": "405deb0b29762c3864840815b091fe3edb7dcbf25578b187db9632004cd4d054" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-06", + "url": "http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/images/prism-slide-5.jpg", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html", + "pubdate": "2013-06-07" + } + ], + "alternative_files": [], + "presentation_url": "www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "prism-slide-5.jpg", + "name": "2013-06-06_7ea92bed_prism-slide-5.jpg", + "digest": "7ea92bede4141a8bd27f75fd2313f66fefd52d9c6d1f41257bc1fb7f9ac85cdf" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-06", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/709012/verizon.pdf", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order", + "pubdate": "2013-06-06" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "verizon.pdf", + "name": "2013-06-06_e17a6824_verizon.pdf", + "digest": "e17a68240b91627c40e65e8e6738a5a16962dc0024669aa950cb6b54f17b6488" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-07", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/710230/presidential-policy-directive.pdf", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jun/07/obama-china-targets-cyber-overseas", + "pubdate": "2013-06-07" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/interactive/2013/jun/07/obama-cyber-directive-full-text", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "presidential-policy-directive.pdf", + "name": "2013-06-07_88b4544e_presidential-policy-directive.pdf", + "digest": "88b4544eb58e6b920066defaf8b6a243c70c7f7c1996c226cb00fb83c4efd527" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-08", + "url": "http://i.guim.co.uk/static/w-1225/h--/q-95/sys-images/Guardian/Pix/pictures/2013/6/8/1370715185657/boundless-heatmap-large-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining", + "pubdate": "2013-06-08" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining#img-1", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "boundless-heatmap-large-001.jpg", + "name": "2013-06-08_df10068b_boundless-heatmap-large-001.jpg", + "digest": "df10068b5680d3ac82f93193e445eddc4e7b8e8316d8373bc24b3f7103a471e3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-08", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/pictures/2013/6/8/1370710424658/new-prism-slide-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jun/08/nsa-surveillance-prism-obama-live#block-51b36893e4b0cc6424372292", + "pubdate": "2013-06-08" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/jun/08/nsa-prism-server-collection-facebook-google", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "new-prism-slide-001.jpg", + "name": "2013-06-08_ad2a822d_new-prism-slide-001.jpg", + "digest": "ad2a822dcab47609b157878d1c4644cb81771f45a941a1ac9fac3c56ba9013b4" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-08", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/710558/doc01187620130608104422.pdf", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining", + "pubdate": "2013-06-08" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/interactive/2013/jun/08/boundless-informant-nsa-full-text", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "doc01187620130608104422.pdf", + "name": "2013-06-08_5a70496c_doc01187620130608104422.pdf", + "digest": "5a70496c6afdd7d75cb181f24419bdcc06a55dc89c5fb6de5a10b918529e2940" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-08", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/710559/doc01187820130608104742.pdf", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining", + "pubdate": "2013-06-08" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/interactive/2013/jun/08/nsa-boundless-informant-data-mining-slides", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "doc01187820130608104742.pdf", + "name": "2013-06-08_f2bf6c38_doc01187820130608104742.pdf", + "digest": "f2bf6c384f900e164c97896d0df84e0b9569953a42b275dd9b935179bcc85649" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-20", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/716633/exhibit-a.pdf", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jun/20/fisa-court-nsa-without-warrant", + "pubdate": "2013-06-20" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/interactive/2013/jun/20/exhibit-a-procedures-nsa-document", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "exhibit-a.pdf", + "name": "2013-06-20_06d662bb_exhibit-a.pdf", + "digest": "06d662bbb694b9f2a84eb74422d09b059912c75844594792e25cfb507c58e25b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-20", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/716634/exhibit-b.pdf", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jun/20/fisa-court-nsa-without-warrant", + "pubdate": "2013-06-20" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/interactive/2013/jun/20/exhibit-b-nsa-procedures-document", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "exhibit-b.pdf", + "name": "2013-06-20_4fed2dd9_exhibit-b.pdf", + "digest": "4fed2dd99c78b763dfa4c4f6c42180eaab73208e90d73d5019b72826409cff8a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-27", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/717974/nsa-memo.pdf", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jun/27/nsa-data-mining-authorised-obama", + "pubdate": "2013-06-27" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/interactive/2013/jun/27/nsa-data-collection-justice-department", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-memo.pdf", + "name": "2013-06-27_cfed5d66_nsa-memo.pdf", + "digest": "cfed5d667669f7542a6e9f2dd3f1a0ba989aeb1db6f84848da5c24d3d39bd16e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-27", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/719116/doc03.pdf", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jun/27/nsa-data-mining-authorised-obama", + "pubdate": "2013-06-27" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/interactive/2013/jun/27/nsa-inspector-general-report-document-data-collection", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "doc03.pdf", + "name": "2013-06-27_052740e7_doc03.pdf", + "digest": "052740e7d9a7ef780441e4674b5006ee388222ef1bf3ff7c87c4a7399cfa1319" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-29", + "url": "http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/images/prism-slide-6.jpg", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html", + "pubdate": "2013-06-07" + } + ], + "alternative_files": [], + "presentation_url": "www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "prism-slide-6.jpg", + "name": "2013-06-29_9dbb155d_prism-slide-6.jpg", + "digest": "9dbb155dc72b95d30d294cfe6f62b4e9007504e457ef92c5aa9f5aa3900b3ee5" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-29", + "url": "http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/images/prism-slide-7.jpg", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html", + "pubdate": "2013-06-07" + } + ], + "alternative_files": [], + "presentation_url": "www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "prism-slide-7.jpg", + "name": "2013-06-29_0f547f0e_prism-slide-7.jpg", + "digest": "0f547f0e142491628e7660e6c5353010815694ea2ff1bb089cd54e3ef5350118" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-29", + "url": "http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/images/prism-slide-8.jpg", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html", + "pubdate": "2013-06-07" + } + ], + "alternative_files": [], + "presentation_url": "www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "prism-slide-8.jpg", + "name": "2013-06-29_2d116e0d_prism-slide-8.jpg", + "digest": "2d116e0d59d97e36f398384c9632ee0f1cfa946d82d942a1335a587d98d1cce1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-29", + "url": "http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/images/prism-slide-9.jpg", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html", + "pubdate": "2013-06-07" + } + ], + "alternative_files": [], + "presentation_url": "www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "prism-slide-9.jpg", + "name": "2013-06-29_0908f341_prism-slide-9.jpg", + "digest": "0908f341673f230e313be5d7ef789ffda62da35cd354f4a6e7fdb8853936d376" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-06-30", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/pictures/2013/6/30/1372617718275/Dropmire-document-image.-011.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jun/30/nsa-leaks-us-bugging-european-allies", + "pubdate": "2013-06-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/jun/30/nsa-leaks-us-bugging-european-allies", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Dropmire-document-image.-011.jpg", + "name": "2013-06-30_f62eb2d9_Dropmire-document-image.-011.jpg", + "digest": "f62eb2d9603b0bf38a1a0e855a8d232c52e2b37c0c15cadb3908f29bbcda948d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-07-01", + "url": "http://cdn1.spiegel.de/images/image-515224-galleryV9-kjgl.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/secret-documents-nsa-targeted-germany-and-eu-buildings-a-908609.html", + "pubdate": "2013-07-01" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/bild-908609-515224.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-515224-galleryV9-kjgl.jpg", + "name": "2013-07-01_f93f165b_image-515224-galleryV9-kjgl.jpg", + "digest": "f93f165b6e776a499b53cabe2ed3fa2167691980974d49d90b9d98c456321d20" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-07-01", + "url": "http://cdn3.spiegel.de/images/image-515222-galleryV9-qvfh.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/secret-documents-nsa-targeted-germany-and-eu-buildings-a-908609.html", + "pubdate": "2013-07-01" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/bild-908609-515222.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-515222-galleryV9-qvfh.jpg", + "name": "2013-07-01_653b4a44_image-515222-galleryV9-qvfh.jpg", + "digest": "653b4a447349c332267fad0d444eea9e70b23ea8c6fe20ae59776a0a3aabccf3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-07-10", + "url": "http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/images/upstream-slide.jpg", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html", + "pubdate": "2013-06-07" + } + ], + "alternative_files": [], + "presentation_url": "www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "upstream-slide.jpg", + "name": "2013-07-10_ec8f17b1_upstream-slide.jpg", + "digest": "ec8f17b182328dbf06b693b52013f533f0908f565b02ccb283b222b3951b49ff" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-07-27", + "url": "http://s2.glbimg.com/GYiIGgJeDe7cA-AdRrPUzA9aKFlrqDL5quUK55n-37dIoz-HdGixxa_8qOZvMp3w/e.glbimg.com/og/ed/f/original/2013/07/26/investiga_2.jpg", + "accomp_articles": [ + { + "url": "http://epoca.globo.com//tempo/noticia/2013/07/spies-bdigital-ageb.html", + "pubdate": "2013-07-27" + } + ], + "alternative_files": [], + "presentation_url": "http://epoca.globo.com//tempo/noticia/2013/07/spies-bdigital-ageb.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "investiga_2.jpg", + "name": "2013-07-27_de3d9a5e_investiga_2.jpg", + "digest": "de3d9a5e7969d280975eec6c118ee590eedda407e8057f278b9cc27a4402e7ab" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-07-27", + "url": "http://s2.glbimg.com/qZbuyE02h4JRUo5R6fEkgKXb8WMqf5mP6iptmbOH181Ioz-HdGixxa_8qOZvMp3w/e.glbimg.com/og/ed/f/original/2013/07/26/investiga_3.jpg", + "accomp_articles": [ + { + "url": "http://epoca.globo.com//tempo/noticia/2013/07/spies-bdigital-ageb.html", + "pubdate": "2013-07-27" + } + ], + "alternative_files": [], + "presentation_url": "http://epoca.globo.com//tempo/noticia/2013/07/spies-bdigital-ageb.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "investiga_3.jpg", + "name": "2013-07-27_fbe75647_investiga_3.jpg", + "digest": "fbe75647ed03a1de84c5aa28ea2c2928bdf6efbad8981908a72f87341e929abc" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-07-27", + "url": "http://s2.glbimg.com/rpA80Nq9NDdFoKEuhbv5tQPskSmD71Xa06UO-AX5A1BIoHwzzNFb_mmldQ1t33_J/e.glbimg.com/og/ed/f/original/2013/07/26/investiga_1.jpg", + "accomp_articles": [ + { + "url": "http://epoca.globo.com//tempo/noticia/2013/07/spies-bdigital-ageb.html", + "pubdate": "2013-07-27" + } + ], + "alternative_files": [], + "presentation_url": "http://epoca.globo.com//tempo/noticia/2013/07/spies-bdigital-ageb.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "investiga_1.jpg", + "name": "2013-07-27_48ec64be_investiga_1.jpg", + "digest": "48ec64be138c7a3a5c15d7e7ea4178c9142754935d6dd002a5c34292ad408705" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-07-31", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/7/31/1375269316245/KS4-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "pubdate": "2013-07-31" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "KS4-001.jpg", + "name": "2013-07-31_215685b6_KS4-001.jpg", + "digest": "215685b64e081a17bc1d0e33573b9c9e85f29164593b0037902d2cc84ab0007f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-07-31", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/7/31/1375269436464/KS6-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "pubdate": "2013-07-31" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "KS6-001.jpg", + "name": "2013-07-31_4f072ceb_KS6-001.jpg", + "digest": "4f072ceb78a9fb7af6d3dd977153ea027cf9cf27de61244814e0afbd7b6bede4" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-07-31", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/7/31/1375269549334/KS7-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "pubdate": "2013-07-31" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "KS7-001.jpg", + "name": "2013-07-31_48d16d7b_KS7-001.jpg", + "digest": "48d16d7b7c2220f467b73109f0d56de7eead96b5eb49e234d84e6b5eb75681f9" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-07-31", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/7/31/1375269604628/KS8-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "pubdate": "2013-07-31" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "KS8-001.jpg", + "name": "2013-07-31_aa43640f_KS8-001.jpg", + "digest": "aa43640f2e4aeb5d7bff5bf75d10eb25da846b69fcabaf356cd537c543f158a1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-07-31", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/7/31/1375269682670/KS9-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "pubdate": "2013-07-31" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "KS9-001.jpg", + "name": "2013-07-31_2bee2061_KS9-001.jpg", + "digest": "2bee206139970b8f2a53e1ec5ebbf5af3b727b0645f114eb081b4a9be2bafc5c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-07-31", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/7/31/1375269777576/KS10-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "pubdate": "2013-07-31" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "KS10-001.jpg", + "name": "2013-07-31_97aacf75_KS10-001.jpg", + "digest": "97aacf7549bd59eef8b0e5e4be26246104820eb3dc518e8a944ef786870837bd" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-07-31", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/7/31/1375269905543/KS12-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "pubdate": "2013-07-31" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "KS12-001.jpg", + "name": "2013-07-31_1541b419_KS12-001.jpg", + "digest": "1541b419bdb76f072f9b5ac16ac906839fb556cf702bc0a09bccaee6abb87f60" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-07-31", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/7/31/1375270036263/KS2-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "pubdate": "2013-07-31" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "KS2-001.jpg", + "name": "2013-07-31_9113b03b_KS2-001.jpg", + "digest": "9113b03b6fd47f485a0f0a32bc6d5d662fa93f849bdf0a43acbe7d3bbbc0debd" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-07-31", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/7/31/1375282759484/KS3edit2-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "pubdate": "2013-07-31" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "KS3edit2-001.jpg", + "name": "2013-07-31_6718dbd8_KS3edit2-001.jpg", + "digest": "6718dbd8c41d81e8995e51473437baebde736ca35a28240842163edcef055a94" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-07-31", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/7/31/1375283612456/KS55edit-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "pubdate": "2013-07-31" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "KS55edit-001.jpg", + "name": "2013-07-31_980a33fc_KS55edit-001.jpg", + "digest": "980a33fc98f365eafcc9bc0105015cd9d2a5ad28bbe3360cbd3fb04d987455de" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-07-31", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/743252/nsa-pdfs-redacted-ed.pdf", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data", + "pubdate": "2013-07-31" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-pdfs-redacted-ed.pdf", + "name": "2013-07-31_ab4e1ccd_nsa-pdfs-redacted-ed.pdf", + "digest": "ab4e1ccd75797a85b49e08e9421e62047ccae78e41db2bcf70e4b727a72b16e6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-08-09", + "url": "http://i.guim.co.uk/static/w-1225/h--/q-95/sys-images/Guardian/Pix/pictures/2013/8/9/1376060880108/FAA-document-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/aug/09/nsa-loophole-warrantless-searches-email-calls", + "pubdate": "2013-08-09" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/aug/09/nsa-loophole-warrantless-searches-email-calls#img-1", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "FAA-document-001.jpg", + "name": "2013-08-09_3ae4ea8b_FAA-document-001.jpg", + "digest": "3ae4ea8b326730130a8dedb9f15abc984f545cbf9d8d5b1c967c9caf2f83fa6c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-08-15", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/750577/target-analyst-rationale-instructions-final.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story.html", + "pubdate": "2013-08-16" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/national/what-to-say-and-not-to-say-to-our-overseers/390/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "target-analyst-rationale-instructions-final.pdf", + "name": "2013-08-15_0b61b26e_target-analyst-rationale-instructions-final.pdf", + "digest": "0b61b26e3ed1a7eff2a6d67908f810c54d9dec9f74851fd7467c9846ec7b23b9" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-08-15", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/758651/1qcy12-violations.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story.html", + "pubdate": "2013-08-16" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/national/nsa-report-on-privacy-violations-in-the-first-quarter-of-2012/395/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "1qcy12-violations.pdf", + "name": "2013-08-15_c644ac06_1qcy12-violations.pdf", + "digest": "c644ac064f9248e358af403e63e9feb1a5ccdfff74065dc0103ae52edf84f566" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-08-23", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/pictures/2013/8/23/1377265514895/Fisa-1-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/aug/23/nsa-prism-costs-tech-companies-paid", + "pubdate": "2013-08-23" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/aug/23/nsa-prism-costs-tech-companies-paid", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Fisa-1-001.jpg", + "name": "2013-08-23_57e7c6eb_Fisa-1-001.jpg", + "digest": "57e7c6eb533470c0a18fd15384f76ac2d6b5af05b17b16ef3161969c50d460e0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-08-23", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/pictures/2013/8/23/1377265542241/Fisa-2-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/aug/23/nsa-prism-costs-tech-companies-paid", + "pubdate": "2013-08-23" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/aug/23/nsa-prism-costs-tech-companies-paid", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Fisa-2-001.jpg", + "name": "2013-08-23_125bbb6c_Fisa-2-001.jpg", + "digest": "125bbb6cecf1a0c221ca2675fee096c33b606f060a987e4850ed6a242adc6faa" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-08-29", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/781537/cbjb-fy13-v1-extract.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/black-budget-summary-details-us-spy-networks-successes-failures-and-objectives/2013/08/29/7e57bb78-10ab-11e3-8cdd-bcdc09410972_story.html", + "pubdate": "2013-08-30" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/national/inside-the-2013-us-intelligence-black-budget/420/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "cbjb-fy13-v1-extract.pdf", + "name": "2013-08-29_dbb816d4_cbjb-fy13-v1-extract.pdf", + "digest": "dbb816d4525d04273dd6d1524b976b5ea64f42daa2dc5edd42811e3bb9d88605" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/0KtjiFVfEgvrJV5iprTPa4IHLHw=/s.glbimg.com/jo/g1/f/original/2013/09/02/slide3.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "slide3.jpg", + "name": "2013-09-02_5d17aa37_slide3.jpg", + "digest": "5d17aa37abff07ef6601a56d6dd241fd848040b010625034daab9fc07ee068c6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/54oQYnwK-ewbLLAOiuTFTMEqw2k=/s.glbimg.com/jo/g1/f/original/2013/09/02/glenn1-30.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "glenn1-30.jpg", + "name": "2013-09-02_0f04e471_glenn1-30.jpg", + "digest": "0f04e4716f365dbc7778399b44375df02b7a0eb4e2f76cb70f4c961362c6039a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/7kMAL1L9OII7Yvh4JBpF9LczXDQ=/s.glbimg.com/jo/g1/f/original/2013/09/02/glenn1-45-copy.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "glenn1-45-copy.jpg", + "name": "2013-09-02_4024ec23_glenn1-45-copy.jpg", + "digest": "4024ec238b308547fdc035440bd7ebac2fd9dae09eaa6306e8194a47d21a7d0e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/AOKkKnemMWZcBSBtAte3sEYGkak=/s.glbimg.com/jo/g1/f/original/2013/09/02/glenn1-39-copy.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "glenn1-39-copy.jpg", + "name": "2013-09-02_20b8b78b_glenn1-39-copy.jpg", + "digest": "20b8b78bbc25e9c88d0ed68851178ba224a40ac78f2e3a6cca65d160c9fa4e5f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/JWD5aD1cFyy4yKL732O5QkPkrIE=/s.glbimg.com/jo/g1/f/original/2013/09/02/glenn1-36-copy.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "glenn1-36-copy.jpg", + "name": "2013-09-02_e1dba5cb_glenn1-36-copy.jpg", + "digest": "e1dba5cb2ce9fee10df4ff7aaaf9ae1ef6483fe85597c2369aa3a9030b375ef4" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/JmOzQYsuGg37rEbSP_lsh7ThUQ0=/s.glbimg.com/jo/g1/f/original/2013/09/02/glenn1-31.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "glenn1-31.jpg", + "name": "2013-09-02_fd7041a1_glenn1-31.jpg", + "digest": "fd7041a1f5c5a64e4ba9f02b8b902906c75470595ccc8696f1a8e74800d18167" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/JoOLCicFhwQAvLUBMq2tQXu87mc=/s.glbimg.com/jo/g1/f/original/2013/09/02/glenn1-50-copy.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "glenn1-50-copy.jpg", + "name": "2013-09-02_b51c5a1d_glenn1-50-copy.jpg", + "digest": "b51c5a1d703b0f615a26ddbf021c67d03676ae53f545b94060edd01f20e9ff06" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/N6hgt_V463FlaNKqTaPMXDGsob0=/s.glbimg.com/jo/g1/f/original/2013/09/02/glenn1-48-copy.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "glenn1-48-copy.jpg", + "name": "2013-09-02_3f523e9c_glenn1-48-copy.jpg", + "digest": "3f523e9ca70ef1b000026189b695c261239de2a96f880a6249830e75471be929" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/NPpuXY9qrOVuyr7rmFW15-TAYjI=/s.glbimg.com/jo/g1/f/original/2013/09/02/texto.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "texto.jpg", + "name": "2013-09-02_30b7095b_texto.jpg", + "digest": "30b7095b468e68aef8d4f57fd5e3e126a44c7dc7b3b1559c7dfec56f19a04dee" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/RA3-h9M_Npb2sHo3I8ATFfGVX-g=/s.glbimg.com/jo/g1/f/original/2013/09/02/glenn1-53-copy.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "glenn1-53-copy.jpg", + "name": "2013-09-02_c18c4709_glenn1-53-copy.jpg", + "digest": "c18c4709570b4b366ad5521b3731860490adc97d526e6bb5b1132ddf089446af" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/XlzgruXRT2oFGb5iORJGzdg-2s4=/s.glbimg.com/jo/g1/f/original/2013/09/02/glenn1-49-copy.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "glenn1-49-copy.jpg", + "name": "2013-09-02_e74f1e57_glenn1-49-copy.jpg", + "digest": "e74f1e57af2256076f7e0a9c9e59631a60eb053abeae06d6c6840a8ce289abb6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/e9WtK0fZoukCvLTJjr-X6lfsPGk=/s.glbimg.com/jo/g1/f/original/2013/09/02/glenn1-35.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "glenn1-35.jpg", + "name": "2013-09-02_8f3b1ab0_glenn1-35.jpg", + "digest": "8f3b1ab0c647dd45568d4d7c9498f604d83bd4437366ff83505e7a6d3990adfb" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/eUxchOOAmXyzUheMR3QbFfQigEA=/s.glbimg.com/jo/g1/f/original/2013/09/02/glenn1-44-copy.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "glenn1-44-copy.jpg", + "name": "2013-09-02_43107de0_glenn1-44-copy.jpg", + "digest": "43107de0278d72e1f73a713ee065f1c08a151d895481ec5443716b163dab4194" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/h73_I9uhktwHMzM9eES3nxVY0xU=/s.glbimg.com/jo/g1/f/original/2013/09/02/slide1.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "slide1.jpg", + "name": "2013-09-02_8b8cba74_slide1.jpg", + "digest": "8b8cba74208835f81be9c7bbf6bfa89a5ea5367449a8cec6588f9ba08bfb9b40" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/hgjkid5qFwMtELh6QS3Wjwtj9JU=/s.glbimg.com/jo/g1/f/original/2013/09/02/slide2.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "slide2.jpg", + "name": "2013-09-02_0b05ade0_slide2.jpg", + "digest": "0b05ade060806af6a86a0ba7445b23f81ae7efd45bdd3372fa723df3dda6ad27" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/qgObLrwHnCCFYePMnadYIHUhAFg=/s.glbimg.com/jo/g1/f/original/2013/09/02/glenn1-38-copy.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "glenn1-38-copy.jpg", + "name": "2013-09-02_2115de1c_glenn1-38-copy.jpg", + "digest": "2115de1c4135b064d1b4305141f2cbde5419bcf5f66225aff62fdeb16d7511b1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/qo3khm0C57yp9y8XH8SUWofyW9g=/s.glbimg.com/jo/g1/f/original/2013/09/02/glenn1-46-copy.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "glenn1-46-copy.jpg", + "name": "2013-09-02_2d2e7ae0_glenn1-46-copy.jpg", + "digest": "2d2e7ae0dea7c9f4797b87579493877e0e48147e7485f9db7ce7e74a7fdc0b57" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/uCupxHC5akHKbn_STClWQw6YGbU=/s.glbimg.com/jo/g1/f/original/2013/09/02/friends-and-enemies.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "friends-and-enemies.jpg", + "name": "2013-09-02_b10ae05d_friends-and-enemies.jpg", + "digest": "b10ae05d68fd5a5abd6100979a17c6fe6960c9cea484ff0533a095be1d33f78d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-02", + "url": "http://s2.glbimg.com/zo1JT9WakU5rRxt8LYkBvlrN3uk=/s.glbimg.com/jo/g1/f/original/2013/09/02/glenn1-52-copy.jpg", + "accomp_articles": [ + { + "url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "pubdate": "2013-09-02" + } + ], + "alternative_files": [], + "presentation_url": "http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "glenn1-52-copy.jpg", + "name": "2013-09-02_1a05e77f_glenn1-52-copy.jpg", + "digest": "1a05e77f74593551295d683d714e84b95c1179c9ffe3b7443302893f7583506b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-06", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/9/5/1378396323881/NSA-Bullrun-1-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security", + "pubdate": "2013-09-06" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "NSA-Bullrun-1-001.jpg", + "name": "2013-09-06_4cc5e0d0_NSA-Bullrun-1-001.jpg", + "digest": "4cc5e0d08969d8380d0a32bfe6fa0a3c9d8323ea6b5c33693a19cc027bf42dee" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-06", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/9/5/1378396354932/NSA-Bullrun-2-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security", + "pubdate": "2013-09-06" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "NSA-Bullrun-2-001.jpg", + "name": "2013-09-06_2552ade2_NSA-Bullrun-2-001.jpg", + "digest": "2552ade2fd29dda42b2dae24d933516e0e992dec694ed7229affad50b914c918" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-06", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/9/5/1378396387829/NSA-diagram-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security", + "pubdate": "2013-09-06" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "NSA-diagram-001.jpg", + "name": "2013-09-06_f7a2bd53_NSA-diagram-001.jpg", + "digest": "f7a2bd53e1850b2100404f8fdd41efd6b742ec8ff059854da3a662cc8d0c9ba5" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-09", + "url": "http://cdn2.spiegel.de/images/image-541991-galleryV9-gxcl.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/how-the-nsa-spies-on-smartphones-including-the-blackberry-a-921161.html", + "pubdate": "2013-09-09" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-spying-on-smartphones-fotostrecke-101201-2.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-541991-galleryV9-gxcl.jpg", + "name": "2013-09-09_4faa6765_image-541991-galleryV9-gxcl.jpg", + "digest": "4faa6765afc550b62b683f3d54cedf7b8c7c10a2c57f15a81424864271022b78" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-09", + "url": "http://cdn2.spiegel.de/images/image-542019-galleryV9-hheg.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/how-the-nsa-spies-on-smartphones-including-the-blackberry-a-921161.html", + "pubdate": "2013-09-09" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-spying-on-smartphones-fotostrecke-101201-4.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-542019-galleryV9-hheg.jpg", + "name": "2013-09-09_a3f832aa_image-542019-galleryV9-hheg.jpg", + "digest": "a3f832aa4b5fa783c093b8acf3c1e023351ea211ff92a9fb53859804a7b28ea9" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-09", + "url": "http://cdn3.spiegel.de/images/image-541976-galleryV9-tixi.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/how-the-nsa-spies-on-smartphones-including-the-blackberry-a-921161.html", + "pubdate": "2013-09-09" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-spying-on-smartphones-fotostrecke-101201-3.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-541976-galleryV9-tixi.jpg", + "name": "2013-09-09_c2eb3832_image-541976-galleryV9-tixi.jpg", + "digest": "c2eb38324c46b85d4c860a2ebe4bba590bd32b001e7aceab9e5f69e22a7dfcf6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-09", + "url": "http://cdn3.spiegel.de/images/image-541996-galleryV9-uueh.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/how-the-nsa-spies-on-smartphones-including-the-blackberry-a-921161.html", + "pubdate": "2013-09-09" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-spying-on-smartphones-fotostrecke-101201.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-541996-galleryV9-uueh.jpg", + "name": "2013-09-09_28f518ad_image-541996-galleryV9-uueh.jpg", + "digest": "28f518ad4f7a533949ddc0219f5ce659bd7f166e6c815a46726371c258a84fe0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-09", + "url": "http://cdn4.spiegel.de/images/image-542023-galleryV9-tfwq.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/how-the-nsa-spies-on-smartphones-including-the-blackberry-a-921161.html", + "pubdate": "2013-09-09" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-spying-on-smartphones-fotostrecke-101201-5.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-542023-galleryV9-tfwq.jpg", + "name": "2013-09-09_f4548b6c_image-542023-galleryV9-tfwq.jpg", + "digest": "f4548b6c7e25abc33af86fde6b0805a45faa05020b839edd610dc587a1779639" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-11", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/9/11/1378909828609/newtear1-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents", + "pubdate": "2013-09-11" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "newtear1-001.jpg", + "name": "2013-09-11_69570801_newtear1-001.jpg", + "digest": "695708011ea590422b369b1680270083351a3f2c1c24285d86c3659ff6ee80a9" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-11", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/9/11/1378909850994/newtear2-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents", + "pubdate": "2013-09-11" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "newtear2-001.jpg", + "name": "2013-09-11_c454a266_newtear2-001.jpg", + "digest": "c454a266a5a8122a06ae10243c9e77fdef7e653c1dd9ffcd7481a799d32f2510" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-11", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/9/11/1378909869874/newtear3-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents", + "pubdate": "2013-09-11" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "newtear3-001.jpg", + "name": "2013-09-11_80d7cbcb_newtear3-001.jpg", + "digest": "80d7cbcb3b436f5623524570f819d003273e6949239ebbabec13e5803a58a821" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/785495/doc1.pdf", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents", + "pubdate": "2013-09-11" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/interactive/2013/sep/11/nsa-israel-intelligence-memorandum-understanding-document", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "doc1.pdf", + "name": "2013-09-11_43f5bc59_doc1.pdf", + "digest": "43f5bc59cfbb57681d2728e77ed744a0c103baada3631d695f4a489c708cd487" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-16", + "url": "http://cdn3.spiegel.de/images/image-544912-galleryV9-qurx.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/how-the-nsa-spies-on-international-bank-transactions-a-922430.html", + "pubdate": "2013-09-16" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-nsa-spying-on-credit-card-and-bank-transactions-fotostrecke-101468.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-544912-galleryV9-qurx.jpg", + "name": "2013-09-16_0f533ab5_image-544912-galleryV9-qurx.jpg", + "digest": "0f533ab5d93cbd1c66ae392fcba1bf11036ad8725369950360c087d2d4286903" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-20", + "url": "http://cdn2.spiegel.de/images/image-546815-galleryV9-latt.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/europe/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html", + "pubdate": "2013-09-20" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-operation-socialist-fotostrecke-101663.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-546815-galleryV9-latt.jpg", + "name": "2013-09-20_c1f7e788_image-546815-galleryV9-latt.jpg", + "digest": "c1f7e788c5982aeca3a06fd374897e89b49b4f3d2116fc2aac07835703ad5758" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-20", + "url": "http://cdn2.spiegel.de/images/image-546899-galleryV9-qsif.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/europe/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html", + "pubdate": "2013-09-20" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-operation-socialist-fotostrecke-101663-3.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-546899-galleryV9-qsif.jpg", + "name": "2013-09-20_1ebfd803_image-546899-galleryV9-qsif.jpg", + "digest": "1ebfd80315e940b1d8fe5c42a3cd76da8241629eb1c23ac24c19e6ca54ec0ca9" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-20", + "url": "http://cdn3.spiegel.de/images/image-546812-galleryV9-toca.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/europe/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html", + "pubdate": "2013-09-20" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-operation-socialist-fotostrecke-101663-2.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-546812-galleryV9-toca.jpg", + "name": "2013-09-20_aa7a30f6_image-546812-galleryV9-toca.jpg", + "digest": "aa7a30f60664c35335ef9b7c5b8bc990ca85974b8d0cbe640c05948cd6ed8f98" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-28", + "url": "http://static01.nyt.com/images/2013/09/29/us/JP-NSA/JP-NSA-superJumbo.jpg", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html", + "pubdate": "2013-09-28" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "JP-NSA-superJumbo.jpg", + "name": "2013-09-28_b8b9922e_JP-NSA-superJumbo.jpg", + "digest": "b8b9922ea4657c8ea8181c14a1beb415a0297d2af4bab2f01c6fda514236c151" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-09-29", + "url": "", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html", + "pubdate": "2013-09-28" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/09/29/us/documents-on-nsa-efforts-to-diagram-social-networks-of-us-citizens.html", + "published_files": [] + }, + { + "pubdate": "2013-10-04", + "url": "http://articles.washingtonpost.com/2013-10-04/world/42704372_1_ramp-statistics-steganography", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html", + "pubdate": "2013-10-04" + } + ], + "alternative_files": [], + "presentation_url": "http://articles.washingtonpost.com/2013-10-04/world/42704372_1_ramp-statistics-steganography", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "42704372_1_ramp-statistics-steganography", + "name": "2013-10-04_3528b9f7_42704372_1_ramp-statistics-steganography.html", + "digest": "3528b9f7a9bbed7250977b237857ba0897901d5ffd3bfbb3964d46539887ee9f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/801433/doc1-1.pdf", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption", + "pubdate": "2013-10-04" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/interactive/2013/oct/04/egotistical-giraffe-nsa-tor-document", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "doc1-1.pdf", + "name": "2013-10-04_39a27194_doc1-1.pdf", + "digest": "39a27194a4dc5c4d10b3ab7da1611a433af66c5bcd36a19a1ba007cec20329f5" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/801434/doc2.pdf", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption", + "pubdate": "2013-10-04" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "doc2.pdf", + "name": "2013-10-04_c3c7f931_doc2.pdf", + "digest": "c3c7f93100e0542a8e55d3ab347547e8f8f456ea8babcc7a6a4ff4339264f649" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/801435/doc3.pdf", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption", + "pubdate": "2013-10-04" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "doc3.pdf", + "name": "2013-10-04_e62a602a_doc3.pdf", + "digest": "e62a602a4bacc625a82eecda733bb4278c7ed68f5a4e099ba78046d1484ae6c4" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/802061/ces-summer-2006-tor-paper-28redacted-29-1.pdf", + "accomp_articles": [ + { + "url": "http://js.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html", + "pubdate": "2013-10-04" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/nsa-research-report-on-the-tor-encryption-program/501/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "ces-summer-2006-tor-paper-28redacted-29-1.pdf", + "name": "2013-10-04_2aa5c64d_ces-summer-2006-tor-paper-28redacted-29-1.pdf", + "digest": "2aa5c64d1cc7dd8b12a69c8b92ab507600d30d8d6c7dc6dce664531ec8e6ed4a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-14", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/804763/a-sso-content-optimization-detailed-redacted.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html", + "pubdate": "2013-10-14" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/the-nsas-overcollection-problem/517/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "a-sso-content-optimization-detailed-redacted.pdf", + "name": "2013-10-14_ca3a440c_a-sso-content-optimization-detailed-redacted.pdf", + "digest": "ca3a440cc785f518f23f99106b95878da5a8c3a3287d1560c552e3c97474322e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-14", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/804765/b-midpoint-tlc-optimization-redacted.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html", + "pubdate": "2013-10-14" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/how-the-nsa-tried-to-collect-less/518/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "b-midpoint-tlc-optimization-redacted.pdf", + "name": "2013-10-14_5a284ca9_b-midpoint-tlc-optimization-redacted.pdf", + "digest": "5a284ca9984f135405402d22c9730f0c1a5e6a90330a940d2f28f08f125737ea" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-14", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/804766/c-collection-optimization-excerpted.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html", + "pubdate": "2013-10-14" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/an-excerpt-from-intellipedia/519/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "c-collection-optimization-excerpted.pdf", + "name": "2013-10-14_8f0f11c0_c-collection-optimization-excerpted.pdf", + "digest": "8f0f11c05a78f86bb5c2f60dc3772041315a44e0441f70796f768d464a4a57d1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-20", + "url": "http://cdn1.spiegel.de/images/image-558290-galleryV9-pynn.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html", + "pubdate": "2013-10-20" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-nsa-hacked-into-mexican-president-s-email-account-fotostrecke-102797-2.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-558290-galleryV9-pynn.jpg", + "name": "2013-10-20_16b3417e_image-558290-galleryV9-pynn.jpg", + "digest": "16b3417ea1ec0b11360e231380c4d9faaf149b9039fe8c55831e455e9cf96ac0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-22", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/807030/ambassade.pdf", + "accomp_articles": [ + { + "url": "http://www.lemonde.fr/technologies/article/2013/10/22/the-nsa-wiretapped-french-diplomats-in-the-us_3500733_651865.html", + "pubdate": "2013-10-22" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "ambassade.pdf", + "name": "2013-10-22_e8323914_ambassade.pdf", + "digest": "e83239145969e34cf4bedaf95214110fbced06ab4479c89609c32ec0dc8ea651" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-25", + "url": "http://i.guim.co.uk/static/w-1225/h--/q-95/sys-images/Guardian/Pix/pictures/2013/10/24/1382628116324/SID_800-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-calls", + "pubdate": "2013-10-25" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-calls#img-1", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "SID_800-001.jpg", + "name": "2013-10-25_aed655d0_SID_800-001.jpg", + "digest": "aed655d0b3d48f1040baee9dfbbd8def8fa0b32bf05c8e27b4f9b3f8f26c1429" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-25", + "url": "http://s1.lemde.fr/image/2013/10/25/534x0/3502776_5_b9e6_requete-a-la-nsa-css-des-donnees_42b9e10c63c071b033f9037fc99c16ff.jpg", + "accomp_articles": [ + { + "url": "http://www.lemonde.fr/technologies/article/2013/10/25/the-nsa-s-intern-inquiry-about-the-elysee-hacking-revealed_3502734_651865.html", + "pubdate": "2013-10-25" + } + ], + "alternative_files": [], + "presentation_url": "http://www.lemonde.fr/technologies/article/2013/10/25/the-nsa-s-intern-inquiry-about-the-elysee-hacking-revealed_3502734_651865.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "3502776_5_b9e6_requete-a-la-nsa-css-des-donnees_42b9e10c63c071b033f9037fc99c16ff.jpg", + "name": "2013-10-25_98454abb_3502776_5_b9e6_requete-a-la-nsa-css-des-donnees_42b9e10c63c071b033f9037fc99c16ff.jpg", + "digest": "98454abbdf8cae95c0ef1a23f94bb11607ad2f5873e3c16b9eaaf94a69e77a6a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-25", + "url": "http://s1.lemde.fr/image/2013/10/25/534x0/3502778_5_0532_terrain-mine-potentiel-il-est-possible_a6d70000962dea46cc25c9d6ad0eea67.jpg", + "accomp_articles": [ + { + "url": "http://www.lemonde.fr/technologies/article/2013/10/25/the-nsa-s-intern-inquiry-about-the-elysee-hacking-revealed_3502734_651865.html", + "pubdate": "2013-10-25" + } + ], + "alternative_files": [], + "presentation_url": "http://www.lemonde.fr/technologies/article/2013/10/25/the-nsa-s-intern-inquiry-about-the-elysee-hacking-revealed_3502734_651865.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "3502778_5_0532_terrain-mine-potentiel-il-est-possible_a6d70000962dea46cc25c9d6ad0eea67.jpg", + "name": "2013-10-25_b9161689_3502778_5_0532_terrain-mine-potentiel-il-est-possible_a6d70000962dea46cc25c9d6ad0eea67.jpg", + "digest": "b9161689161d9327ea9ba52741f4ca331975bede4b4fbe8abc0d5206418f075b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-25", + "url": "http://s2.lemde.fr/image/2013/10/25/534x0/3502777_5_08b6_autre-information-tao-a-confirme-que-ce_86bb54021b6dd414a6e24e93914ce1dd.jpg", + "accomp_articles": [ + { + "url": "http://www.lemonde.fr/technologies/article/2013/10/25/the-nsa-s-intern-inquiry-about-the-elysee-hacking-revealed_3502734_651865.html", + "pubdate": "2013-10-25" + } + ], + "alternative_files": [], + "presentation_url": "http://www.lemonde.fr/technologies/article/2013/10/25/the-nsa-s-intern-inquiry-about-the-elysee-hacking-revealed_3502734_651865.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "3502777_5_08b6_autre-information-tao-a-confirme-que-ce_86bb54021b6dd414a6e24e93914ce1dd.jpg", + "name": "2013-10-25_da366206_3502777_5_08b6_autre-information-tao-a-confirme-que-ce_86bb54021b6dd414a6e24e93914ce1dd.jpg", + "digest": "da366206bd4ae9ffe265c6d4515472a38ab652f6718f8bb67bcb77e4796f523f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-25", + "url": "http://s2.lemde.fr/image/2013/10/25/534x0/3502779_5_f6ea_historique-m-barbier-et-m-patrick-pailloux_d10fe66f9bedcbe36d88d41ac4cc8f0e.jpg", + "accomp_articles": [ + { + "url": "http://www.lemonde.fr/technologies/article/2013/10/25/the-nsa-s-intern-inquiry-about-the-elysee-hacking-revealed_3502734_651865.html", + "pubdate": "2013-10-25" + } + ], + "alternative_files": [], + "presentation_url": "http://www.lemonde.fr/technologies/article/2013/10/25/the-nsa-s-intern-inquiry-about-the-elysee-hacking-revealed_3502734_651865.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "3502779_5_f6ea_historique-m-barbier-et-m-patrick-pailloux_d10fe66f9bedcbe36d88d41ac4cc8f0e.jpg", + "name": "2013-10-25_8c2cffbf_3502779_5_f6ea_historique-m-barbier-et-m-patrick-pailloux_d10fe66f9bedcbe36d88d41ac4cc8f0e.jpg", + "digest": "8c2cffbfb3af413787a6dc8d6b85be8de3c268435905f012ee363205fc6552cc" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-27", + "url": "http://cdn2.spiegel.de/images/image-561285-galleryV9-bhii.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/cover-story-how-nsa-spied-on-merkel-cell-phone-from-berlin-embassy-a-930205.html", + "pubdate": "2013-10-27" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-spies-in-the-embassy-fotostrecke-103079-3.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-561285-galleryV9-bhii.jpg", + "name": "2013-10-27_917092d5_image-561285-galleryV9-bhii.jpg", + "digest": "917092d52d199512c5afedcf78d016545c6437fad61039b47e792f0667525926" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-27", + "url": "http://cdn3.spiegel.de/images/image-561286-galleryV9-snix.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/cover-story-how-nsa-spied-on-merkel-cell-phone-from-berlin-embassy-a-930205.html", + "pubdate": "2013-10-27" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-spies-in-the-embassy-fotostrecke-103079-4.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-561286-galleryV9-snix.jpg", + "name": "2013-10-27_a3d4ee33_image-561286-galleryV9-snix.jpg", + "digest": "a3d4ee3362e8a615e8cbc4e258e0d63a42c8b797112d59e60876ce562cfb5ce8" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-27", + "url": "http://cdn4.spiegel.de/images/image-561283-galleryV9-evyw.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/cover-story-how-nsa-spied-on-merkel-cell-phone-from-berlin-embassy-a-930205.html", + "pubdate": "2013-10-27" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-spies-in-the-embassy-fotostrecke-103079-2.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-561283-galleryV9-evyw.jpg", + "name": "2013-10-27_6e8dcaf3_image-561283-galleryV9-evyw.jpg", + "digest": "6e8dcaf3e1fb01467dd149ce59912d7795e65ed0e75a3923c3a7f468ed4ebbbc" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-27", + "url": "http://cdn4.spiegel.de/images/image-561287-galleryV9-dcjf.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/cover-story-how-nsa-spied-on-merkel-cell-phone-from-berlin-embassy-a-930205.html", + "pubdate": "2013-10-27" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-spies-in-the-embassy-fotostrecke-103079-5.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-561287-galleryV9-dcjf.jpg", + "name": "2013-10-27_77b1f743_image-561287-galleryV9-dcjf.jpg", + "digest": "77b1f743f7a007e60ea19aa48836a35265da31cc29ea72fe8bf0c09984b6784b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-10-30", + "url": "https://img.washingtonpost.com/rf/image_1484w/2010-2019/WashingtonPost/2013/10/30/Local/Images/GOOGLE-CLOUD-EXPLOITATION1383148810.jpg", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html", + "pubdate": "2013-10-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "GOOGLE-CLOUD-EXPLOITATION1383148810.jpg", + "name": "2013-10-30_cc42c178_GOOGLE-CLOUD-EXPLOITATION1383148810.jpg", + "digest": "cc42c178a894d809f7bbda391d1a423107aacbff0c364241e78c83d33d4302aa" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-01", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/813848/sso1.pdf", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/nov/01/nsa-data-collection-tech-firms", + "pubdate": "2013-11-01" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/interactive/2013/nov/01/nsa-tapping-cables-document", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sso1.pdf", + "name": "2013-11-01_58b5d2d6_sso1.pdf", + "digest": "58b5d2d61e73c43c6d023cdd827fc712e73976504156dd712cfc582db0adcbdb" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-chart.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-chart.png", + "name": "2013-11-02_477dcfb8_nsa-chart.png", + "digest": "477dcfb835c881cfa23b4fb6ff5dfd2f90c488a382b730a9ca3509eb516f5b40" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-list-1.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-list-1.png", + "name": "2013-11-02_5787b3dc_nsa-mission-list-1.png", + "digest": "5787b3dc5afed1b9034c65856a265b93ee64664ccb0563886f0be9ced136f616" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-list-2.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-list-2.png", + "name": "2013-11-02_de6ff50c_nsa-mission-list-2.png", + "digest": "de6ff50cac5d6e6c81ddb3dde576490f47d916194a283c6868a0b58b2c398d82" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-list-3.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-list-3.png", + "name": "2013-11-02_6526b0ff_nsa-mission-list-3.png", + "digest": "6526b0ff168ecdea01b4e46a2c2356b47e155370e85e3306d6a822ccd5f87624" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-list-4.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-list-4.png", + "name": "2013-11-02_920e8883_nsa-mission-list-4.png", + "digest": "920e8883c3a6c8f60b1ad53c7c5d7c5c659bc2e5eeee131338fb042d7e488c72" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-list-5.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-list-5.png", + "name": "2013-11-02_f557e53a_nsa-mission-list-5.png", + "digest": "f557e53ac783c4d554d6e829f85fadb604c58dd1b487ca136c9b977fbd33bd53" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-list-6.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-list-6.png", + "name": "2013-11-02_5da5e15a_nsa-mission-list-6.png", + "digest": "5da5e15a680297b27038a732e5e8ffea47f1078b14d903278b0e04010e8383f6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-list-7.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-list-7.png", + "name": "2013-11-02_38e34287_nsa-mission-list-7.png", + "digest": "38e34287e1f2388e3c2033ffea2bb3eb5a76bb105c31206aa6f2baf676df0262" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-list-8.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-list-8.png", + "name": "2013-11-02_a2bc14b6_nsa-mission-list-8.png", + "digest": "a2bc14b64250cf7dbe1e24fedc61ef25ec9df4e5f6f929c6eb6c4a697fdad92e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-list-9.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-list-9.png", + "name": "2013-11-02_88496197_nsa-mission-list-9.png", + "digest": "884961971c47bfa6e4a98f6890f7ba2d50a96449f17733da22a2afe3ef38421c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-plan-1.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-plan-1.png", + "name": "2013-11-02_2b81b3be_nsa-mission-plan-1.png", + "digest": "2b81b3bebb6df5a286478fef1febe094961e444877c85dc40dd73ca58fdfbfb2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-plan-10.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-plan-10.png", + "name": "2013-11-02_d3fa2ada_nsa-mission-plan-10.png", + "digest": "d3fa2adaba068eecc790b05f292c3f3ef5b36e6ea56e3613e3c01b5ab7a705f7" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-plan-11.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-plan-11.png", + "name": "2013-11-02_6c10507e_nsa-mission-plan-11.png", + "digest": "6c10507e35f7873be21f518cbb756d78bb374a461aecbc4aa5593ec1d12e406a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-plan-2.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-plan-2.png", + "name": "2013-11-02_3da2c201_nsa-mission-plan-2.png", + "digest": "3da2c201bd6999aea0c10bbbe098b927e87ced2950a44cbfdd934558025580bf" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-plan-3.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-plan-3.png", + "name": "2013-11-02_a21c01d0_nsa-mission-plan-3.png", + "digest": "a21c01d0f0eb3b71b9cc6798c8ccdab2ee8b1f720ce43e50466073344793dab6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-plan-4.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-plan-4.png", + "name": "2013-11-02_6da23e8a_nsa-mission-plan-4.png", + "digest": "6da23e8ae8f9c3b1b4fd1ac09c8b3023ca87d3047ab992f38644c3fa7417c175" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-plan-5.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-plan-5.png", + "name": "2013-11-02_2819ec95_nsa-mission-plan-5.png", + "digest": "2819ec95eacfcd5a1576f3162e08fa81bc3fe105d11d1aac97d1ad6802d808e2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-plan-6.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-plan-6.png", + "name": "2013-11-02_9ae08a83_nsa-mission-plan-6.png", + "digest": "9ae08a83b649253c2152edb6a62e905cc069fcd718fecf21fcf871b8b3811f4e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-plan-7.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-plan-7.png", + "name": "2013-11-02_997ff718_nsa-mission-plan-7.png", + "digest": "997ff718f2ab9d444177df68c3ff2d2d6639e31a29c141db3b3886b4bbbfc1f7" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-plan-8.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-plan-8.png", + "name": "2013-11-02_eb95b5ba_nsa-mission-plan-8.png", + "digest": "eb95b5bac13f5fb2fae8a7aa886c09003ce91bacdbf45c607ecbda52d0a92573" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-02", + "url": "http://graphics8.nytimes.com/newsgraphics/2013/09/13/powerpoint2/c8174a0f9c7457fc351d8399f486f4ceed478f13/nsa-mission-plan-9.png", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html", + "pubdate": "2013-11-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/03/world/documents-show-nsa-efforts-to-spy-on-both-enemies-and-allies.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-mission-plan-9.png", + "name": "2013-11-02_fe22e6f2_nsa-mission-plan-9.png", + "digest": "fe22e6f270980c0c9830134d7f724b7550f2263e31ab58843732f1b31607d760" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-04", + "url": "http://estaticos02.elmundo.es/assets/multimedia/imagenes/2013/11/03/13835123693806.jpg", + "accomp_articles": [ + { + "url": "http://www.elmundo.es/internacional/2013/11/04/52769eb561fd3d6d0a8b4582.html", + "pubdate": "2013-11-04" + } + ], + "alternative_files": [], + "presentation_url": "http://www.elmundo.es/internacional/2013/11/04/52769eb561fd3d6d0a8b4582.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "13835123693806.jpg", + "name": "2013-11-04_d7253df2_13835123693806.jpg", + "digest": "d7253df204d4100e5a01feafc2086f6e6a1d0d2f1211cef425ace7bd59aef94f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-04", + "url": "http://estaticos03.elmundo.es/assets/multimedia/imagenes/2013/11/03/13835065619984_464x0.jpg", + "accomp_articles": [ + { + "url": "http://www.elmundo.es/internacional/2013/11/04/52769eb561fd3d6d0a8b4582.html", + "pubdate": "2013-11-04" + } + ], + "alternative_files": [], + "presentation_url": "http://www.elmundo.es/internacional/2013/11/04/52769eb561fd3d6d0a8b4582.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "13835065619984_464x0.jpg", + "name": "2013-11-04_824b77c9_13835065619984_464x0.jpg", + "digest": "824b77c95905ba7ab80903f9891c61be32c539707b7d63a37a594d3089ee5940" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-04", + "url": "http://estaticos04.elmundo.es/assets/multimedia/imagenes/2013/11/03/13835069001182_464x0.jpg", + "accomp_articles": [ + { + "url": "http://www.elmundo.es/internacional/2013/11/04/52769eb561fd3d6d0a8b4582.html", + "pubdate": "2013-11-04" + } + ], + "alternative_files": [], + "presentation_url": "http://www.elmundo.es/internacional/2013/11/04/52769eb561fd3d6d0a8b4582.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "13835069001182_464x0.jpg", + "name": "2013-11-04_a8f11b58_13835069001182_464x0.jpg", + "digest": "a8f11b58c6f9e1cec0472bc2e6922af4fe5df21ca574fc71c8caf89068cb1c0f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/813465/midpoint-tlc-optimization-w-google-exploitation.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/how-we-know-the-nsa-had-access-to-internal-google-and-yahoo-cloud-data/", + "pubdate": "2013-11-04" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/what-yahoo-and-google-did-not-think-the-nsa-could-see/555/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "midpoint-tlc-optimization-w-google-exploitation.pdf", + "name": "2013-11-04_4123a126_midpoint-tlc-optimization-w-google-exploitation.pdf", + "digest": "4123a126dc7ebff1237f4a58cad0d1e4ccf1e9fab50dffc4aa9b593667de2a05" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/813466/uodds2overview-redacted.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/how-we-know-the-nsa-had-access-to-internal-google-and-yahoo-cloud-data/", + "pubdate": "2013-11-04" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/the-nsas-three-types-of-cable-interception-programs/553/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "uodds2overview-redacted.pdf", + "name": "2013-11-04_5dd1a8e1_uodds2overview-redacted.pdf", + "digest": "5dd1a8e13c500024de973100c399e17a19a7bf2a06229295e9dde77df58b6129" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/814819/windstop-last-30-days-01092013.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/how-we-know-the-nsa-had-access-to-internal-google-and-yahoo-cloud-data/", + "pubdate": "2013-11-04" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/one-month-hundreds-of-millions-of-records-collected/554/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "windstop-last-30-days-01092013.pdf", + "name": "2013-11-04_97453bbf_windstop-last-30-days-01092013.pdf", + "digest": "97453bbf9fa1489a1bffb6fac929db745662a3a2c7c2149ad6c25b824f1c5947" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-17", + "url": "http://cdn1.spiegel.de/images/image-568950-galleryV9-jyyk.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/europe/gchq-monitors-hotel-reservations-to-track-diplomats-a-933914.html", + "pubdate": "2013-11-17" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-the-gchq-s-special-room-service-fotostrecke-103860.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-568950-galleryV9-jyyk.jpg", + "name": "2013-11-17_6262d254_image-568950-galleryV9-jyyk.jpg", + "digest": "6262d2546eb7bd3441da59ed81f91882b471f91661655e13f20c1e46ca15f5e1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-17", + "url": "http://cdn2.spiegel.de/images/image-568949-galleryV9-sitq.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/europe/gchq-monitors-hotel-reservations-to-track-diplomats-a-933914.html", + "pubdate": "2013-11-17" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-the-gchq-s-special-room-service-fotostrecke-103860-2.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-568949-galleryV9-sitq.jpg", + "name": "2013-11-17_54441a08_image-568949-galleryV9-sitq.jpg", + "digest": "54441a0806c401c93a45bbce2ed737c48c42b7ff784d336c801e712cab7c72ec" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-18", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/835792/dsd.pdf", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/nov/18/australia-tried-to-monitor-indonesian-presidents-phone", + "pubdate": "2013-11-18" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/interactive/2013/nov/18/slides-australian-yudhoyono-phone-indonesia", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "dsd.pdf", + "name": "2013-11-18_d8bda6a2_dsd.pdf", + "digest": "d8bda6a2b4f77d1971cdd18a4f901625299830192a404608b896c5de2110a3d6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-19", + "url": "https://gfx.dagbladet.no/labrador/303/303870/30387028/jpg/active/978x.jpg", + "accomp_articles": [ + { + "url": "http://www.dagbladet.no/2013/11/19/nyheter/pluss/edward_snowden/innenriks/snowden_i_norge/30338184/", + "pubdate": "2013-11-19" + } + ], + "alternative_files": [], + "presentation_url": "http://www.dagbladet.no/2013/11/19/nyheter/pluss/edward_snowden/innenriks/snowden_i_norge/30338184/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "978x.jpg", + "name": "2013-11-19_b9a01651_978x.jpg", + "digest": "b9a01651dac1d35654088fb7980f37ae4bf65eaf8f306b35653bf63f1fecac9c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-20", + "url": "http://i.guim.co.uk/static/w-1225/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/11/20/1384967623196/nsatear900-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-personal-data", + "pubdate": "2013-11-20" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-personal-data#img-1", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsatear900-001.jpg", + "name": "2013-11-20_a392d9ce_nsatear900-001.jpg", + "digest": "a392d9cec7d24497803455c779b8ddff9979a9c85dd9cc95efec9eb75326913c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-20", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/11/20/1384967779141/nsatear2-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-personal-data", + "pubdate": "2013-11-20" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-personal-data", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsatear2-001.jpg", + "name": "2013-11-20_8b9d7a17_nsatear2-001.jpg", + "digest": "8b9d7a1778829a8556bcef7103e66353778e245e7a3318feec0edd6aafc6d60c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-20", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/11/20/1384967804851/NSAtear3-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-personal-data", + "pubdate": "2013-11-20" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-personal-data", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "NSAtear3-001.jpg", + "name": "2013-11-20_aca6d7c4_NSAtear3-001.jpg", + "digest": "aca6d7c446bfea49879f0b8d6e5fd635b0ec7e26ace992477b63db653a9da40d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-20", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/audio/video/2013/11/20/1384967830162/NSAtear4-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-personal-data", + "pubdate": "2013-11-20" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-personal-data", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "NSAtear4-001.jpg", + "name": "2013-11-20_3887001c_NSAtear4-001.jpg", + "digest": "3887001c7bb6cd9a07d335e7f72c8d6348c4781fc5396b432fe19f65a2865cd8" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-22", + "url": "http://gfx.dagbladet.no/labrador/304/304457/30445734/jpg/active/480x.jpg", + "accomp_articles": [ + { + "url": "http://www.dagbladet.no/2013/11/22/nyheter/edward_snowden/utenriks/usa/nsa/30444117/", + "pubdate": "2013-11-22" + } + ], + "alternative_files": [], + "presentation_url": "http://www.dagbladet.no/2013/11/22/nyheter/edward_snowden/utenriks/usa/nsa/30444117/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "480x.jpg", + "name": "2013-11-22_66e1cecd_480x.jpg", + "digest": "66e1cecde2da302bbdd47d3a8beba6a65ada7dae8659be3822b118f4efc0ab3d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-22", + "url": "http://gfx.dagbladet.no/labrador/304/304457/30445736/jpg/active/480x.jpg", + "accomp_articles": [ + { + "url": "http://www.dagbladet.no/2013/11/22/nyheter/edward_snowden/utenriks/usa/nsa/30444117/", + "pubdate": "2013-11-22" + } + ], + "alternative_files": [], + "presentation_url": "http://www.dagbladet.no/2013/11/22/nyheter/edward_snowden/utenriks/usa/nsa/30444117/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "480x.jpg", + "name": "2013-11-22_569fc184_480x.jpg", + "digest": "569fc184fa49472f5ab6829f71e8a65e6a1760019fa9ceb2376bd01486d05888" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-22", + "url": "http://gfx.dagbladet.no/labrador/304/304478/30447802/jpg/active/729x.jpg", + "accomp_articles": [ + { + "url": "http://www.dagbladet.no/2013/11/22/nyheter/edward_snowden/utenriks/usa/nsa/30444117/", + "pubdate": "2013-11-22" + } + ], + "alternative_files": [], + "presentation_url": "http://www.dagbladet.no/2013/11/22/nyheter/edward_snowden/utenriks/usa/nsa/30444117/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "729x.jpg", + "name": "2013-11-22_9705e96c_729x.jpg", + "digest": "9705e96caac11d3118a9f853d28d77ff3886318676ae90882d6b4ec2a337b715" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-22", + "url": "http://www.dagbladet.no/f/officialonboundless.pdf", + "accomp_articles": [ + { + "url": "http://www.dagbladet.no/2013/11/22/nyheter/edward_snowden/utenriks/usa/nsa/30444117/", + "pubdate": "2013-11-22" + } + ], + "alternative_files": [], + "presentation_url": "http://www.dagbladet.no/2013/11/22/nyheter/edward_snowden/utenriks/usa/nsa/30444117/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "officialonboundless.pdf", + "name": "2013-11-22_de417fe4_officialonboundless.pdf", + "digest": "de417fe4f8d6c2fc405072fddc0d4e8b0ed4f7a82447a50bdd1391654934c01b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-22", + "url": "http://www.dagbladet.no/f/pdfombound.pdf", + "accomp_articles": [ + { + "url": "http://www.dagbladet.no/2013/11/22/nyheter/edward_snowden/utenriks/usa/nsa/30444117/", + "pubdate": "2013-11-22" + } + ], + "alternative_files": [], + "presentation_url": "http://www.dagbladet.no/2013/11/22/nyheter/edward_snowden/utenriks/usa/nsa/30444117/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "pdfombound.pdf", + "name": "2013-11-22_681497e1_pdfombound.pdf", + "digest": "681497e1abb29ebe927fc907f16650c9a0f3207c065cd1f83c896c4ded909fef" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-23", + "url": "http://www.nrc.nl/wp-content/uploads/2013/11/nsa1024.jpg", + "accomp_articles": [ + { + "url": "http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/", + "pubdate": "2013-11-23" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa1024.jpg", + "name": "2013-11-23_9968f744_nsa1024.jpg", + "digest": "9968f744dcd4720ec28c411103baa468150657f1def1af896cc5b1314314c0e2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-23", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/838324/2012-2016-sigint-strategy-23-feb-12.pdf", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/11/23/us/politics/nsa-report-outlined-goals-for-more-power.html", + "pubdate": "2013-11-22" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/11/23/us/politics/23nsa-sigint-strategy-document.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "2012-2016-sigint-strategy-23-feb-12.pdf", + "name": "2013-11-23_7aa6dfe9_2012-2016-sigint-strategy-23-feb-12.pdf", + "digest": "7aa6dfe9696dbf4a146d51235e52b92472bec60e3f54b70c104a6856e1b1beea" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-26", + "url": "http://i.huffpost.com/gen/1484357/original.jpg", + "accomp_articles": [ + { + "url": "http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html", + "pubdate": "2013-11-26" + } + ], + "alternative_files": [], + "presentation_url": "http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "original.jpg", + "name": "2013-11-26_3393f447_original.jpg", + "digest": "3393f44771b014b828f9d73e218f6e558d461f580bdb7f8adac742da4170284a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-26", + "url": "http://i.huffpost.com/gen/1484386/original.jpg", + "accomp_articles": [ + { + "url": "http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html", + "pubdate": "2013-11-26" + } + ], + "alternative_files": [], + "presentation_url": "http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "original.jpg", + "name": "2013-11-26_cde59929_original.jpg", + "digest": "cde59929df91d0156af46fb81c09518207470d2e909105c044872a1d72251e5b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-26", + "url": "http://i.huffpost.com/gen/1484410/original.jpg", + "accomp_articles": [ + { + "url": "http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html", + "pubdate": "2013-11-26" + } + ], + "alternative_files": [], + "presentation_url": "http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "original.jpg", + "name": "2013-11-26_6694893d_original.jpg", + "digest": "6694893da51ef9607793e214043982d6c10b31721755132600ad6f38431e19c2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-26", + "url": "http://i.huffpost.com/gen/1484413/original.jpg", + "accomp_articles": [ + { + "url": "http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html", + "pubdate": "2013-11-26" + } + ], + "alternative_files": [], + "presentation_url": "http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "original.jpg", + "name": "2013-11-26_f730cfe9_original.jpg", + "digest": "f730cfe9b6a785102ff6717822929ab84b796217511e912cd0f22b3131387269" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-26", + "url": "http://i.huffpost.com/gen/1484431/original.jpg", + "accomp_articles": [ + { + "url": "http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html", + "pubdate": "2013-11-26" + } + ], + "alternative_files": [], + "presentation_url": "http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "original.jpg", + "name": "2013-11-26_6d48db0c_original.jpg", + "digest": "6d48db0cbda90194f49f2f8eb3a932a6dc29eb01d4262e0293b1362a561262bc" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-26", + "url": "http://i.huffpost.com/gen/1484434/original.jpg", + "accomp_articles": [ + { + "url": "http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html", + "pubdate": "2013-11-26" + } + ], + "alternative_files": [], + "presentation_url": "http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "original.jpg", + "name": "2013-11-26_195e7417_original.jpg", + "digest": "195e7417962d8e877345db2da542f3b4c16d0bf8b384e2851d68feb88d28140b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-26", + "url": "http://i.huffpost.com/gen/1484855/original.jpg", + "accomp_articles": [ + { + "url": "http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html", + "pubdate": "2013-11-26" + } + ], + "alternative_files": [], + "presentation_url": "http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "original.jpg", + "name": "2013-11-26_e0747ec7_original.jpg", + "digest": "e0747ec769230230fff9ad7472b00888710ac7eba2aa387a4c85593e23688d0e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-26", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/841654/microsoft-in-cloud-exploitation-redacted.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/business/technology/microsoft-suspecting-nsa-spying-to-ramp-up-efforts-to-encrypt-its-internet-traffic/2013/11/26/44236b48-56a9-11e3-8304-caf30787c0a9_story.html", + "pubdate": "2013-11-26" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/hints-of-microsofts-vulnerability/621/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "microsoft-in-cloud-exploitation-redacted.pdf", + "name": "2013-11-26_508b01ff_microsoft-in-cloud-exploitation-redacted.pdf", + "digest": "508b01ff2f5230c6ad2389e87d99548b5edfcce976ce390d824a3a6819528b6e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-11-26", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/841655/microsoft-realms-redacted.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/business/technology/microsoft-suspecting-nsa-spying-to-ramp-up-efforts-to-encrypt-its-internet-traffic/2013/11/26/44236b48-56a9-11e3-8304-caf30787c0a9_story.html", + "pubdate": "2013-11-26" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/did-the-nsa-target-microsoft-too/620/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "microsoft-realms-redacted.pdf", + "name": "2013-11-26_b8d6690e_microsoft-realms-redacted.pdf", + "digest": "b8d6690e4084cb84f89ed3628d0939e0a82f40085b9060452fc795ca23680048" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-02", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/pictures/2013/12/1/1385937582864/4b7aa122-b9b8-4f47-8954-4e0f3e394990-620x403.jpeg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/dec/02/revealed-australian-spy-agency-offered-to-share-data-about-ordinary-citizens", + "pubdate": "2013-12-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/dec/02/revealed-australian-spy-agency-offered-to-share-data-about-ordinary-citizens", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "4b7aa122-b9b8-4f47-8954-4e0f3e394990-620x403.jpeg", + "name": "2013-12-02_e143f039_4b7aa122-b9b8-4f47-8954-4e0f3e394990-620x403.jpeg", + "digest": "e143f039469a2df70e92293440ef691d008866bc3e8db57a01e4c1421065a9ab" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-02", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/pictures/2013/12/1/1385937668393/bc81f79a-0f52-4877-a47c-cf311f6e538c-620x130.jpeg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/dec/02/revealed-australian-spy-agency-offered-to-share-data-about-ordinary-citizens", + "pubdate": "2013-12-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/dec/02/revealed-australian-spy-agency-offered-to-share-data-about-ordinary-citizens", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "bc81f79a-0f52-4877-a47c-cf311f6e538c-620x130.jpeg", + "name": "2013-12-02_c2bccde1_bc81f79a-0f52-4877-a47c-cf311f6e538c-620x130.jpeg", + "digest": "c2bccde1ef676f443d3e710f15b2cd460bb55d524b93745e3d83b91207db066b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-02", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/pictures/2013/12/1/1385937870662/a373b8d0-679e-4dba-869c-5cadf89d240e-620x207.jpeg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/dec/02/revealed-australian-spy-agency-offered-to-share-data-about-ordinary-citizens", + "pubdate": "2013-12-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/dec/02/revealed-australian-spy-agency-offered-to-share-data-about-ordinary-citizens", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "a373b8d0-679e-4dba-869c-5cadf89d240e-620x207.jpeg", + "name": "2013-12-02_277b0860_a373b8d0-679e-4dba-869c-5cadf89d240e-620x207.jpeg", + "digest": "277b0860f880e2f19c0cea0b7cfe58e23025841f7598bd21e0900a2ce345983f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-02", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/pictures/2013/12/1/1385937982472/e0aa728c-798d-44db-86e9-d96e3391740a-620x135.jpeg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2013/dec/02/revealed-australian-spy-agency-offered-to-share-data-about-ordinary-citizens", + "pubdate": "2013-12-02" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2013/dec/02/revealed-australian-spy-agency-offered-to-share-data-about-ordinary-citizens", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "e0aa728c-798d-44db-86e9-d96e3391740a-620x135.jpeg", + "name": "2013-12-02_6b4635e4_e0aa728c-798d-44db-86e9-d96e3391740a-620x135.jpeg", + "digest": "6b4635e40cc6633a577cd31037d2fbeeff1bb9ec799ea7b2a6b81198df732732" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-02", + "url": "http://www.cbc.ca/news2/pdf/summit-doc.pdf", + "accomp_articles": [ + { + "url": "http://www.cbc.ca/news/politics/new-snowden-docs-show-u-s-spied-during-g20-in-toronto-1.2442448", + "pubdate": "2013-11-28" + } + ], + "alternative_files": [], + "presentation_url": "http://www.cbc.ca/news/politics/read-snowden-nsa-document-on-g8-g20-summit-surveillance-1.2447387", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "summit-doc.pdf", + "name": "2013-12-02_38e302bc_summit-doc.pdf", + "digest": "38e302bc645fa41209e8b8d6073bb362032c9ba29fa5bbb491375865a693d7df" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/885509/foreignness-examples-redacted.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html", + "pubdate": "2013-12-04" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/how-to-tell-if-a-target-is-foreign/635/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "foreignness-examples-redacted.pdf", + "name": "2013-12-04_4820c6de_foreignness-examples-redacted.pdf", + "digest": "4820c6de9ac479d0ad8cca7834a5a3b121c37b6a86bece2b2045a5c7443d69f7" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/885511/sdc20120510.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html", + "pubdate": "2013-12-04" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/what-is-fascia/637/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sdc20120510.pdf", + "name": "2013-12-04_7e3dfc44_sdc20120510.pdf", + "digest": "7e3dfc44c3356218369a0ba2596a8b5cfada28890c57b8a23d5e21bbd71c2919" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-05", + "url": "http://espresso.repubblica.it/polopoly_fs/1.144397!/httpImage/image._gen/derivatives/gallery_990/image.", + "accomp_articles": [ + { + "url": "http://espresso.repubblica.it/inchieste/2013/12/05/news/da-qui-ci-spiano-gli-americani-1.144421", + "pubdate": "2013-12-05" + } + ], + "alternative_files": [], + "presentation_url": "http://espresso.repubblica.it/foto/2013/12/05/galleria/nsa-intercettazioni-1.144400#1", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image.", + "name": "2013-12-05_e376f895_image..jpeg", + "digest": "e376f8959e141a8496992d57d1e0cd8a5fe7f55c344b0d962ecd8d09c5c01ff9" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-05", + "url": "http://espresso.repubblica.it/polopoly_fs/1.144398!/httpImage/image._gen/derivatives/gallery_990/image.", + "accomp_articles": [ + { + "url": "http://espresso.repubblica.it/inchieste/2013/12/05/news/da-qui-ci-spiano-gli-americani-1.144421", + "pubdate": "2013-12-05" + } + ], + "alternative_files": [], + "presentation_url": "http://espresso.repubblica.it/foto/2013/12/05/galleria/nsa-intercettazioni-1.144400#2", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image.", + "name": "2013-12-05_dcaa8915_image..jpeg", + "digest": "dcaa89152378458f4b373d40a7d72144b7f7999b0fdb47bc045dba9afb173380" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-05", + "url": "http://espresso.repubblica.it/polopoly_fs/1.144399!/httpImage/image._gen/derivatives/gallery_990/image.", + "accomp_articles": [ + { + "url": "http://espresso.repubblica.it/inchieste/2013/12/05/news/da-qui-ci-spiano-gli-americani-1.144421", + "pubdate": "2013-12-05" + } + ], + "alternative_files": [], + "presentation_url": "http://espresso.repubblica.it/foto/2013/12/05/galleria/nsa-intercettazioni-1.144400#3", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image.", + "name": "2013-12-05_0e631d9f_image..jpeg", + "digest": "0e631d9ff462de5c9b91c319d1339fcbfd649e0163d865e1d790b614f8458efd" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-08", + "url": "http://www.svt.se/cachable_image/1386497281/ug/article1659425.svt/alternates/large/sondag.dok.7.jpg", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/nsafra4", + "pubdate": "2013-12-08" + } + ], + "alternative_files": [], + "presentation_url": "http://www.svt.se/ug/nsafra4", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sondag.dok.7.jpg", + "name": "2013-12-08_86965cee_sondag.dok.7.jpg", + "digest": "86965cee1624b073d5b3e8ee67d8a4490d81074c071e9c4e819ae1a7d361e00a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-08", + "url": "http://www.svt.se/cachable_image/1386497493/ug/article1659430.svt/alternates/large/sondag7.dok.1.jpg", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/nsafra4", + "pubdate": "2013-12-08" + } + ], + "alternative_files": [], + "presentation_url": "http://www.svt.se/ug/nsafra4", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sondag7.dok.1.jpg", + "name": "2013-12-08_d317ce87_sondag7.dok.1.jpg", + "digest": "d317ce87328166bafc9507b08a4f7510e09274a6d3b946e45b8c40d3e34b1ec7" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-08", + "url": "http://www.svt.se/cachable_image/1386497843/ug/article1659439.svt/alternates/large/sondag.dok.1_3.jpg", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/nsafra4", + "pubdate": "2013-12-08" + } + ], + "alternative_files": [], + "presentation_url": "http://www.svt.se/ug/nsafra4", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sondag.dok.1_3.jpg", + "name": "2013-12-08_e9dda6dc_sondag.dok.1_3.jpg", + "digest": "e9dda6dc97ee3cb1439e3fe87de17849a7d04584979f548d71a53aef31685ed2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-08", + "url": "http://www.svt.se/cachable_image/1386498063/ug/article1659447.svt/alternates/large/sondag.dok.2_1.jpg", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/nsafra4", + "pubdate": "2013-12-08" + } + ], + "alternative_files": [], + "presentation_url": "http://www.svt.se/ug/nsafra4", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sondag.dok.2_1.jpg", + "name": "2013-12-08_9d9ffc7e_sondag.dok.2_1.jpg", + "digest": "9d9ffc7eb2a3beb43283c8d91e517ad358377e23f538f9affe05e92652fdab38" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-08", + "url": "http://www.svt.se/cachable_image/1386498286/ug/article1659451.svt/alternates/large/sondag8.dok._1.jpg", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/nsafra4", + "pubdate": "2013-12-08" + } + ], + "alternative_files": [], + "presentation_url": "http://www.svt.se/ug/nsafra4", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sondag8.dok._1.jpg", + "name": "2013-12-08_b18f66ac_sondag8.dok._1.jpg", + "digest": "b18f66acffd334920ff8b4e5527bd3fbfc28525481d42655e46115bfc848a050" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-08", + "url": "http://www.svt.se/cachable_image/1386498498/ug/article1659461.svt/alternates/large/sondag8.dok.2.jpg", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/nsafra4", + "pubdate": "2013-12-08" + } + ], + "alternative_files": [], + "presentation_url": "http://www.svt.se/ug/nsafra4", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sondag8.dok.2.jpg", + "name": "2013-12-08_1cc2cd21_sondag8.dok.2.jpg", + "digest": "1cc2cd2136c53de0695df51496b83299e6251aab5f4a88d95e100a42820255dc" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-08", + "url": "http://www.svt.se/cachable_image/1386503250/ug/article1659568.svt/alternates/large/UG-deduped-FRA_0.jpg", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/nsafra4", + "pubdate": "2013-12-08" + } + ], + "alternative_files": [], + "presentation_url": "http://www.svt.se/ug/nsafra4", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "UG-deduped-FRA_0.jpg", + "name": "2013-12-08_5b3051c3_UG-deduped-FRA_0.jpg", + "digest": "5b3051c364833a603dde7b3a43ef769b5f5e87f31d39cb2961f03f279c51f2ee" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-09", + "url": "http://www.cbc.ca/news2/pdf/nsa-canada-april32013.pdf", + "accomp_articles": [ + { + "url": "http://www.cbc.ca/news/politics/snowden-document-shows-canada-set-up-spy-posts-for-nsa-1.2456886", + "pubdate": "2013-12-09" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-canada-april32013.pdf", + "name": "2013-12-09_b9710080_nsa-canada-april32013.pdf", + "digest": "b97100801c45edfd1db75b32fa007511682df64fb1d1be06976c7a726e496d37" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-09", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/889128/games.pdf", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2013/12/10/world/spies-dragnet-reaches-a-playing-field-of-elves-and-trolls.html", + "pubdate": "2013-12-09" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2013/12/10/us/politics/games-docs.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "games.pdf", + "name": "2013-12-09_e3a35025_games.pdf", + "digest": "e3a35025535f8b20806fc09c42127ea411f56267e22c93c7dc5ba96da2099355" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-10", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/886091/ghost-machine.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/", + "pubdate": "2013-12-10" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/ghostmachine-the-nsas-cloud-analytics-platform/644/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "ghost-machine.pdf", + "name": "2013-12-10_d178b4df_ghost-machine.pdf", + "digest": "d178b4df88d6aa2d9ed57283a89fb89e80858b3fd96af4733be1b2930ec1f2f2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-10", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/886160/pmr.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/", + "pubdate": "2013-12-10" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/national/nsa-signal-surveillance-success-stories/647/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "pmr.pdf", + "name": "2013-12-10_7a0c24b8_pmr.pdf", + "digest": "7a0c24b8d8e2f361c1eafff7fd913f2cc9d651c938dbd61680d6701742612675" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-10", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/888710/gsm-classification-guide-20-sept-2006.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/", + "pubdate": "2013-12-10" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/how-the-nsa-pinpoints-a-mobile-device/645/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gsm-classification-guide-20-sept-2006.pdf", + "name": "2013-12-10_048e735d_gsm-classification-guide-20-sept-2006.pdf", + "digest": "048e735da265dfdbb3d66262546c900393a190c0d267feb5a3dea1e679bf053f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-10", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/888734/cotraveler-tracking-redacted.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/", + "pubdate": "2013-12-10" + } + ], + "alternative_files": [], + "presentation_url": "http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "cotraveler-tracking-redacted.pdf", + "name": "2013-12-10_1e6062db_cotraveler-tracking-redacted.pdf", + "digest": "1e6062db9ab206abd5846c5c788a1476371f36d3cd25bd786b36eb5bbc3f86d1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/894384/nsa-internal-pm-on-fra-and-sweden-relations.pdf", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa", + "pubdate": "2013-12-11" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/894384-nsa-internal-pm-on-fra-and-sweden-relations.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-internal-pm-on-fra-and-sweden-relations.pdf", + "name": "2013-12-11_ac975a76_nsa-internal-pm-on-fra-and-sweden-relations.pdf", + "digest": "ac975a76012e5089d97990578a4fe4757a9186b4406a8dc111f4bcf50e1e66f8" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/894385/se-status-in-the-intelligence-community.pdf", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa", + "pubdate": "2013-12-11" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/894385-se-status-in-the-intelligence-community.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "se-status-in-the-intelligence-community.pdf", + "name": "2013-12-11_5be546e1_se-status-in-the-intelligence-community.pdf", + "digest": "5be546e1421fd608292c0cee2b6ba02e03029fb68dfdd827b66bbdbcfdcd75a4" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/894386/legal-issues-uk-regarding-sweden-and-quantum.pdf", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/fra-part-of-top-secret-hacker-project", + "pubdate": "2013-12-11" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/894386-legal-issues-uk-regarding-sweden-and-quantum.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "legal-issues-uk-regarding-sweden-and-quantum.pdf", + "name": "2013-12-11_91b835ae_legal-issues-uk-regarding-sweden-and-quantum.pdf", + "digest": "91b835ae98fa1afdb4e2b2439fbf197155bdfbaa0209164d1300a59f98d7a4ef" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/894387/se-xkeyscore-ingvar-akesson-dirnsa-meeting-2013.pdf", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/fra-part-of-top-secret-hacker-project", + "pubdate": "2013-12-11" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/894387-se-xkeyscore-ingvar-akesson-dirnsa-meeting-2013.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "se-xkeyscore-ingvar-akesson-dirnsa-meeting-2013.pdf", + "name": "2013-12-11_2b60468c_se-xkeyscore-ingvar-akesson-dirnsa-meeting-2013.pdf", + "digest": "2b60468cf93c7e8361868b97e5ae73a204ef39744330ed218a07d3365fb2954d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/894388/2004-avtalet-se-neutral.pdf", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa", + "pubdate": "2013-12-11" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/894388-2004-avtalet-se-neutral.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "2004-avtalet-se-neutral.pdf", + "name": "2013-12-11_17ffe60b_2004-avtalet-se-neutral.pdf", + "digest": "17ffe60b745e6cf99a9923758d12f611dd14bc0bd67ab3ac8f377084ff6fadb0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/894389/xkeyscore-slide-with-swedish-example.pdf", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa", + "pubdate": "2013-12-11" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/894389-xkeyscore-slide-with-swedish-example.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "xkeyscore-slide-with-swedish-example.pdf", + "name": "2013-12-11_87dfa6bf_xkeyscore-slide-with-swedish-example.pdf", + "digest": "87dfa6bf88fb7ec4129fce7b88cb17eb0f47a5d2499cecefa5b9306e59986a25" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/894390/baltic-region.pdf", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa", + "pubdate": "2013-12-11" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/894390-baltic-region.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "baltic-region.pdf", + "name": "2013-12-11_755552d2_baltic-region.pdf", + "digest": "755552d2b0b03f6f23f16fa73f3e1e566fda2b3c420a50b5e8177f1848aab124" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/894401/accomplishments-from-nsa-doc-dated-circa-april.pdf", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/fra-part-of-top-secret-hacker-project", + "pubdate": "2013-12-11" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/894401-accomplishments-from-nsa-doc-dated-circa-april.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "accomplishments-from-nsa-doc-dated-circa-april.pdf", + "name": "2013-12-11_41687598_accomplishments-from-nsa-doc-dated-circa-april.pdf", + "digest": "416875985a6452df22f81cb383bc5f4720384aacb00828c961d72d84090e9e3b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/894403/finalagendaswedusa.pdf", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/fra-part-of-top-secret-hacker-project", + "pubdate": "2013-12-11" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/894403-finalagendaswedusa.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "finalagendaswedusa.pdf", + "name": "2013-12-11_80dfc5c6_finalagendaswedusa.pdf", + "digest": "80dfc5c6aa6b2b16a6b2d7ef1198b6a6af006af27bbee2ff46d10c6417e92a0b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/894404/quantum-from-gchq-doc-dates-october-2012.pdf", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa", + "pubdate": "2013-12-11" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/894404-quantum-from-gchq-doc-dates-october-2012.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "quantum-from-gchq-doc-dates-october-2012.pdf", + "name": "2013-12-11_b524a5c8_quantum-from-gchq-doc-dates-october-2012.pdf", + "digest": "b524a5c89eff96968a782b39ba1373c53222747191eddd758d13b86683f65be7" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/894406/nsa-slides-xkeyscore.pdf", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/fra-has-access-to-controversial-surveillance-system", + "pubdate": "2013-12-11" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/894406-nsa-slides-xkeyscore.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-slides-xkeyscore.pdf", + "name": "2013-12-11_05397b91_nsa-slides-xkeyscore.pdf", + "digest": "05397b912612a684f937469e66c5a8290b58aa3569b8a2adea2e3a74f36236ff" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/894407/xkeyscore-sources-dated-2008.pdf", + "accomp_articles": [ + { + "url": "http://www.svt.se/ug/fra-part-of-top-secret-hacker-project", + "pubdate": "2013-12-11" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/894407-xkeyscore-sources-dated-2008.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "xkeyscore-sources-dated-2008.pdf", + "name": "2013-12-11_f0dcfae8_xkeyscore-sources-dated-2008.pdf", + "digest": "f0dcfae86d9c6837a4542ede41f5e4c7cb9c977553fe49f121ecf97c158febec" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-583944-galleryV9-blpr.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-6.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583944-galleryV9-blpr.jpg", + "name": "2013-12-30_54b58efe_image-583944-galleryV9-blpr.jpg", + "digest": "54b58efe39b09bbfe9cd17490a7597c3378a3ec7d38ce9f02abefef2b7f25f3a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-583948-galleryV9-gvpa.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-9.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583948-galleryV9-gvpa.jpg", + "name": "2013-12-30_d9ba60c7_image-583948-galleryV9-gvpa.jpg", + "digest": "d9ba60c7516fd78d748a5e6d7deeddd314f7478c2adff2301c7a73c0763fa03b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-583968-galleryV9-nnqh.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-2.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583968-galleryV9-nnqh.jpg", + "name": "2013-12-30_55a93175_image-583968-galleryV9-nnqh.jpg", + "digest": "55a93175a2f441ba377aed3ab9b6defa8f196f701e57eb0a0792bc4b70b491a6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-583970-galleryV9-oxkj.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-12.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583970-galleryV9-oxkj.jpg", + "name": "2013-12-30_3792fad2_image-583970-galleryV9-oxkj.jpg", + "digest": "3792fad2af2c10ed794645f93053da09bbcd52c68c697ab42e1b124a26ae98e3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-583974-galleryV9-tlyw.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-17.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583974-galleryV9-tlyw.jpg", + "name": "2013-12-30_caa951d4_image-583974-galleryV9-tlyw.jpg", + "digest": "caa951d4ebe3e4118e64f920db93c5180761ad3e6d36e8cdcaaea5f63d21be39" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-583978-galleryV9-kbic.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-20.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583978-galleryV9-kbic.jpg", + "name": "2013-12-30_096c5377_image-583978-galleryV9-kbic.jpg", + "digest": "096c5377897b5e06f14640c7f6e7655f57286051c621f8bd09ed7b7aa347d0ab" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-583990-galleryV9-qkjn.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-23.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583990-galleryV9-qkjn.jpg", + "name": "2013-12-30_34c18fe5_image-583990-galleryV9-qkjn.jpg", + "digest": "34c18fe52bc8b284573c6fcc2e46e3b294e4018f2f967bc366f8c206c868e287" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-583994-galleryV9-evib.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-25.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583994-galleryV9-evib.jpg", + "name": "2013-12-30_b024fc39_image-583994-galleryV9-evib.jpg", + "digest": "b024fc398b4f476e141965f7547309866c7cdb4627542269ac01159ea2a63d52" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-583998-galleryV9-hfwa.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-26.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583998-galleryV9-hfwa.jpg", + "name": "2013-12-30_6a04e962_image-583998-galleryV9-hfwa.jpg", + "digest": "6a04e9629f5a5081d3a15486c17580dccda87a309460f0785e7f354ec55f5b94" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-584024-galleryV9-zkjy.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/nsa-dokumente-die-abteilung-tao-der-nsa-fotostrecke-105355-4.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584024-galleryV9-zkjy.jpg", + "name": "2013-12-30_05bcdf49_image-584024-galleryV9-zkjy.jpg", + "digest": "05bcdf493a67bd28edc25a7f56bce73a6ddee6eaa3c9ba6c60da2527089b43da" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-584028-galleryV9-ekzl.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/nsa-dokumente-die-abteilung-tao-der-nsa-fotostrecke-105355-5.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584028-galleryV9-ekzl.jpg", + "name": "2013-12-30_bec23a6b_image-584028-galleryV9-ekzl.jpg", + "digest": "bec23a6b7049ab4b7d2da1c6c9128ab3333bc020355a43a384cb855c3e4d7d52" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-584038-galleryV9-nmhc.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/nsa-dokumente-die-abteilung-tao-der-nsa-fotostrecke-105355-9.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584038-galleryV9-nmhc.jpg", + "name": "2013-12-30_62b960d6_image-584038-galleryV9-nmhc.jpg", + "digest": "62b960d626bf423bea204c96a42093bb7257e3f497df1cb7bd75d3a047842262" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-584048-galleryV9-xsli.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/nsa-dokumente-die-abteilung-tao-der-nsa-fotostrecke-105355-15.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584048-galleryV9-xsli.jpg", + "name": "2013-12-30_92cd8c29_image-584048-galleryV9-xsli.jpg", + "digest": "92cd8c298f876e8c07942ed13482cd7f93c21397b62b0145f78450403fbcc6ff" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-584078-galleryV9-ptao.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-intelligence-service-cracks-internet-hubs-fotostrecke-105336-2.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584078-galleryV9-ptao.jpg", + "name": "2013-12-30_230186d9_image-584078-galleryV9-ptao.jpg", + "digest": "230186d9fad312a3156f5e6d22bc6036144b443519fec992e0a1a18300bf10a2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-584094-galleryV9-juar.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358-3.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584094-galleryV9-juar.jpg", + "name": "2013-12-30_26e01a76_image-584094-galleryV9-juar.jpg", + "digest": "26e01a761deae93e79e057f7ff77def01c69cba6e204b5cd89e508292419c7b5" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-584098-galleryV9-jsgn.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358-7.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584098-galleryV9-jsgn.jpg", + "name": "2013-12-30_c0decd86_image-584098-galleryV9-jsgn.jpg", + "digest": "c0decd8643388797b74ac72865768e88c4cd8061e11495a3a6161e547ba1da59" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-584100-galleryV9-uvlt.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358-9.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584100-galleryV9-uvlt.jpg", + "name": "2013-12-30_9d15c3be_image-584100-galleryV9-uvlt.jpg", + "digest": "9d15c3be968d1962194affa1400d4d613beb937cfbe5a860dea0e17c65a7644a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn1.spiegel.de/images/image-584104-galleryV9-rzyg.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358-13.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584104-galleryV9-rzyg.jpg", + "name": "2013-12-30_1b515a2b_image-584104-galleryV9-rzyg.jpg", + "digest": "1b515a2b64250ff6081a6f905885f7f3a48e21cb6bf6834bc8f35d3f7612e053" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-583939-galleryV9-bitv.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-13.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583939-galleryV9-bitv.jpg", + "name": "2013-12-30_196204f1_image-583939-galleryV9-bitv.jpg", + "digest": "196204f17aea3e1695305f2792662e7054f67c5d2e8f08e7599f6e4e1f7bfc53" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-583941-galleryV9-cphn.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-4.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583941-galleryV9-cphn.jpg", + "name": "2013-12-30_f72f7a58_image-583941-galleryV9-cphn.jpg", + "digest": "f72f7a5814c0ba49743444b026fcd320daa12c073a768bd00a02153a38a77906" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-583945-galleryV9-vpvp.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-7.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583945-galleryV9-vpvp.jpg", + "name": "2013-12-30_49bf5829_image-583945-galleryV9-vpvp.jpg", + "digest": "49bf5829298b40d2313980a07fc070d0e4557308f6a52653834e7f65c09d60d7" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-583949-galleryV9-ihsx.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-10.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583949-galleryV9-ihsx.jpg", + "name": "2013-12-30_da5b5417_image-583949-galleryV9-ihsx.jpg", + "digest": "da5b5417fd48b4225b4e968bbd53a8102e04e7ec49c456b2debe0e639cef3cc1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-583951-galleryV9-gsyo.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-11.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583951-galleryV9-gsyo.jpg", + "name": "2013-12-30_8cdc05b2_image-583951-galleryV9-gsyo.jpg", + "digest": "8cdc05b2a9ca5e4ce3157fc87107e0bd386bb2f04fe0b8ad16f902f27f91cd4b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-583969-galleryV9-ygjs.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-3.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583969-galleryV9-ygjs.jpg", + "name": "2013-12-30_e5503f4d_image-583969-galleryV9-ygjs.jpg", + "digest": "e5503f4da14ab151476f27098d095ff337a565e2d00754719000a5f50b71c67b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-583971-galleryV9-laup.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-14.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583971-galleryV9-laup.jpg", + "name": "2013-12-30_4a4113b0_image-583971-galleryV9-laup.jpg", + "digest": "4a4113b09fd267724e451b3daf9209141971e0fdf04691e27d89aae072d1bdc3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-583975-galleryV9-kbuj.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-18.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583975-galleryV9-kbuj.jpg", + "name": "2013-12-30_40c9636b_image-583975-galleryV9-kbuj.jpg", + "digest": "40c9636b9d106f3214d1ae30bfb5e13cd810bf922ccb4415da2472c6e46a57bb" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-583991-galleryV9-upud.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-24.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583991-galleryV9-upud.jpg", + "name": "2013-12-30_e2733478_image-583991-galleryV9-upud.jpg", + "digest": "e27334782a650e3ab0308939714d49df004a27461b377aa3a123b4c186eb583d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-584001-galleryV9-qufn.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-27.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584001-galleryV9-qufn.jpg", + "name": "2013-12-30_bc2483e9_image-584001-galleryV9-qufn.jpg", + "digest": "bc2483e9aed2368c48a21baeeb5bdcade7d62da2ee107a09297d835f853aeae3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-584021-galleryV9-yenq.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + }, + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-intelligence-service-cracks-internet-hubs-fotostrecke-105336.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584021-galleryV9-yenq.jpg", + "name": "2013-12-30_d4c68f47_image-584021-galleryV9-yenq.jpg", + "digest": "d4c68f477cc40e2bee4a6049dac628d0c13868eccb652c863eabbb4ba8dd7a07" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-584031-galleryV9-qyuj.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/nsa-dokumente-die-abteilung-tao-der-nsa-fotostrecke-105355-6.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584031-galleryV9-qyuj.jpg", + "name": "2013-12-30_e20d5d7e_image-584031-galleryV9-qyuj.jpg", + "digest": "e20d5d7e3b89752dfe7a4ea9f4dc447d179006e64bcd753b71038d85a90cc512" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-584035-galleryV9-spot.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/nsa-dokumente-die-abteilung-tao-der-nsa-fotostrecke-105355-8.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584035-galleryV9-spot.jpg", + "name": "2013-12-30_df3b67cd_image-584035-galleryV9-spot.jpg", + "digest": "df3b67cdc2b589f540b8e3123ee615f12a808f9bddae29a038d70f00ff0fa0da" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-584041-galleryV9-xjkn.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/nsa-dokumente-die-abteilung-tao-der-nsa-fotostrecke-105355-10.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584041-galleryV9-xjkn.jpg", + "name": "2013-12-30_67f42924_image-584041-galleryV9-xjkn.jpg", + "digest": "67f4292452a4425098914d72e6c750395994e5a9d00ece6e642fda0f4c88a38f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-584045-galleryV9-rovn.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/nsa-dokumente-die-abteilung-tao-der-nsa-fotostrecke-105355-12.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584045-galleryV9-rovn.jpg", + "name": "2013-12-30_881a5f11_image-584045-galleryV9-rovn.jpg", + "digest": "881a5f11eac655da74f1950f7ccc8f8362a86045e57696dd62f10ed97eb96397" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-584049-galleryV9-iywb.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/nsa-dokumente-die-abteilung-tao-der-nsa-fotostrecke-105355-16.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584049-galleryV9-iywb.jpg", + "name": "2013-12-30_1f448cbb_image-584049-galleryV9-iywb.jpg", + "digest": "1f448cbb70dad307efd959dda859c6c6298cee82d01790ea60c168ca1c41ec3f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-584095-galleryV9-lblc.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358-4.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584095-galleryV9-lblc.jpg", + "name": "2013-12-30_4ccd0be6_image-584095-galleryV9-lblc.jpg", + "digest": "4ccd0be61987150ecb0fa0df2e9a5b4b306da376f3342172a7f36deed811edc1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-584099-galleryV9-xqko.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358-8.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584099-galleryV9-xqko.jpg", + "name": "2013-12-30_1787c3c8_image-584099-galleryV9-xqko.jpg", + "digest": "1787c3c88be97f541bc5308ec5a9d382cb0574dd1f2eee32b2776b44d381ad8a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-584101-galleryV9-svrs.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358-10.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584101-galleryV9-svrs.jpg", + "name": "2013-12-30_d7a2e172_image-584101-galleryV9-svrs.jpg", + "digest": "d7a2e1721bd0d88180756a2385b0c5171ac5f9c43020efda60c0c3d258237383" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn2.spiegel.de/images/image-584105-galleryV9-uocp.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358-14.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584105-galleryV9-uocp.jpg", + "name": "2013-12-30_e693e21c_image-584105-galleryV9-uocp.jpg", + "digest": "e693e21ca337f62311d8c5e5013bb3718f4c36f2b170e3e20ad09a6fb85f0b1a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn3.spiegel.de/images/image-583936-galleryV9-hpue.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-intelligence-service-cracks-internet-hubs-fotostrecke-105336-13.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583936-galleryV9-hpue.jpg", + "name": "2013-12-30_de2b067f_image-583936-galleryV9-hpue.jpg", + "digest": "de2b067f87cc33bf91ea93f9d9c4aac184901d04f1564ac90d1c227b05659aa3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn3.spiegel.de/images/image-583942-galleryV9-tsxf.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-5.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583942-galleryV9-tsxf.jpg", + "name": "2013-12-30_5689da9b_image-583942-galleryV9-tsxf.jpg", + "digest": "5689da9ba4e97c7a4cbd8d861d0902b87c2e95573caa99ea9d1a10aab41ccba8" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn3.spiegel.de/images/image-583946-galleryV9-jmwl.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-8.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583946-galleryV9-jmwl.jpg", + "name": "2013-12-30_561a8190_image-583946-galleryV9-jmwl.jpg", + "digest": "561a8190062f567c814d564fb3afa405edd156d1a73b99fad6719f66711b4c16" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn3.spiegel.de/images/image-583972-galleryV9-mmeg.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-15.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583972-galleryV9-mmeg.jpg", + "name": "2013-12-30_93ee7db4_image-583972-galleryV9-mmeg.jpg", + "digest": "93ee7db45336cae035781f064d9f93b17a1d0777ef83e8ebca9b49236d70f717" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn3.spiegel.de/images/image-583976-galleryV9-pznd.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-19.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583976-galleryV9-pznd.jpg", + "name": "2013-12-30_6a9474fe_image-583976-galleryV9-pznd.jpg", + "digest": "6a9474fe62a8e2656825253bc56b089bbbd8541c9585f75a94ca4994de3a2e4c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn3.spiegel.de/images/image-583982-galleryV9-rhve.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-21.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583982-galleryV9-rhve.jpg", + "name": "2013-12-30_bcb57b8e_image-583982-galleryV9-rhve.jpg", + "digest": "bcb57b8e7e673f90285e390f5ce6386370d0e6f6dea73f69a5ce9c8b1dcffc0e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn3.spiegel.de/images/image-583986-galleryV9-brdj.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-22.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583986-galleryV9-brdj.jpg", + "name": "2013-12-30_39317bfa_image-583986-galleryV9-brdj.jpg", + "digest": "39317bfaa574d51c8901d5afc2b3c80c7bc7fbeac567306356bb8eae155a6d1a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn3.spiegel.de/images/image-584002-galleryV9-siwx.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-28.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584002-galleryV9-siwx.jpg", + "name": "2013-12-30_baccbf22_image-584002-galleryV9-siwx.jpg", + "digest": "baccbf22a57bc184eca40da9b14ed2c2f4f1a26da4c84af35eeff970cd4924d0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn3.spiegel.de/images/image-584022-galleryV9-qplk.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/nsa-dokumente-die-abteilung-tao-der-nsa-fotostrecke-105355-2.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584022-galleryV9-qplk.jpg", + "name": "2013-12-30_5b5dfd1b_image-584022-galleryV9-qplk.jpg", + "digest": "5b5dfd1b60dac5cf16c8e0dec0cfe2592724f861f9fcedea208ec7b76576785a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn3.spiegel.de/images/image-584046-galleryV9-maof.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/nsa-dokumente-die-abteilung-tao-der-nsa-fotostrecke-105355-13.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584046-galleryV9-maof.jpg", + "name": "2013-12-30_8520e976_image-584046-galleryV9-maof.jpg", + "digest": "8520e976c799272a877529636ba529ff847790b1f3b30e72c0170b729496b667" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn3.spiegel.de/images/image-584092-galleryV9-icxm.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584092-galleryV9-icxm.jpg", + "name": "2013-12-30_fa8167fb_image-584092-galleryV9-icxm.jpg", + "digest": "fa8167fbc30e119d8656c1c8f70cd9041f3acd2a5a302ce5d82a83c85acc42e1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn3.spiegel.de/images/image-584096-galleryV9-pmmx.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358-5.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584096-galleryV9-pmmx.jpg", + "name": "2013-12-30_3c9d9c72_image-584096-galleryV9-pmmx.jpg", + "digest": "3c9d9c72c26464ae0ea6c5d12488a9f1dc193e858bf0e943d7bd694dbfd693f8" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn3.spiegel.de/images/image-584102-galleryV9-ylox.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358-11.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584102-galleryV9-ylox.jpg", + "name": "2013-12-30_c13ea3f5_image-584102-galleryV9-ylox.jpg", + "digest": "c13ea3f5abd8793fae28684c4a7b73797800a21e652734f43b1cd950d0410b54" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn3.spiegel.de/images/image-584106-galleryV9-zynb.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358-15.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584106-galleryV9-zynb.jpg", + "name": "2013-12-30_a73d4d4d_image-584106-galleryV9-zynb.jpg", + "digest": "a73d4d4de21f7fde144913a48ae27a473fd61719b1bc483d9a3fb87c56c9228a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn4.spiegel.de/images/image-583937-galleryV9-damh.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-intelligence-service-cracks-internet-hubs-fotostrecke-105336-14.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583937-galleryV9-damh.jpg", + "name": "2013-12-30_4b41ff30_image-583937-galleryV9-damh.jpg", + "digest": "4b41ff30334d3f8ea447a9d28ba1c98599ea19297aba6244dc74c96ca62659a1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn4.spiegel.de/images/image-583967-galleryV9-quqn.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583967-galleryV9-quqn.jpg", + "name": "2013-12-30_ad1dcdbd_image-583967-galleryV9-quqn.jpg", + "digest": "ad1dcdbd796fa62c148cda38dfaf5b9f71139332c6e2392c0abaa7c506cdec40" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn4.spiegel.de/images/image-583973-galleryV9-ccse.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-16.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-583973-galleryV9-ccse.jpg", + "name": "2013-12-30_bfe564a8_image-583973-galleryV9-ccse.jpg", + "digest": "bfe564a8ffeb990550d3b6de3d8d553df6b6fdc8db236569ddcc06e6907b8ef0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn4.spiegel.de/images/image-584023-galleryV9-korm.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/nsa-dokumente-die-abteilung-tao-der-nsa-fotostrecke-105355-3.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584023-galleryV9-korm.jpg", + "name": "2013-12-30_1d8a498b_image-584023-galleryV9-korm.jpg", + "digest": "1d8a498b38387eb9b67553844cc710f70ab8ff4d98f2974ad996c8b5dd3df34b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn4.spiegel.de/images/image-584033-galleryV9-ytyl.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/nsa-dokumente-die-abteilung-tao-der-nsa-fotostrecke-105355-7.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584033-galleryV9-ytyl.jpg", + "name": "2013-12-30_cdef61fe_image-584033-galleryV9-ytyl.jpg", + "digest": "cdef61fef6c1c14d0423e9908d65bd3f4eac441550ad721423020efca5851da3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn4.spiegel.de/images/image-584043-galleryV9-srlv.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/nsa-dokumente-die-abteilung-tao-der-nsa-fotostrecke-105355-11.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584043-galleryV9-srlv.jpg", + "name": "2013-12-30_28b51515_image-584043-galleryV9-srlv.jpg", + "digest": "28b51515a1a42b79d0756c0391c5bb96dab91988bfde200f743ccd0920d50986" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn4.spiegel.de/images/image-584047-galleryV9-ohdz.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/nsa-dokumente-die-abteilung-tao-der-nsa-fotostrecke-105355-14.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584047-galleryV9-ohdz.jpg", + "name": "2013-12-30_251941ff_image-584047-galleryV9-ohdz.jpg", + "digest": "251941ffe735c57f9d3a48d10bcf746107d391d15a3ecc4a444caaea87b3e023" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn4.spiegel.de/images/image-584093-galleryV9-ccbo.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358-2.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584093-galleryV9-ccbo.jpg", + "name": "2013-12-30_540c22ab_image-584093-galleryV9-ccbo.jpg", + "digest": "540c22abeed028fe3c1d3d45fd52d33c6f5e29a71ba72826590a13c03f78bb6b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn4.spiegel.de/images/image-584097-galleryV9-imwp.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358-6.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584097-galleryV9-imwp.jpg", + "name": "2013-12-30_158d560f_image-584097-galleryV9-imwp.jpg", + "digest": "158d560f663b07db1ce2e0136ccdfe8ecae85c79a55e761beede4a8e0ef6a377" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn4.spiegel.de/images/image-584103-galleryV9-jhol.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358-12.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584103-galleryV9-jhol.jpg", + "name": "2013-12-30_4a5dfe53_image-584103-galleryV9-jhol.jpg", + "digest": "4a5dfe53dc38cda13f224fdcd96a2a364b168e1d9ee1c7c89d953e938492b25e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://cdn4.spiegel.de/images/image-584107-galleryV9-wrgn.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html", + "pubdate": "2013-12-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358-16.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-584107-galleryV9-wrgn.jpg", + "name": "2013-12-30_c2ea0d33_image-584107-galleryV9-wrgn.jpg", + "digest": "c2ea0d33ab36a4156db06f1057c2bb6df63137c9b80e5d73652cfde58d107276" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Bildschirm/S3224_RAGEMASTER.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_RAGEMASTER.jpg", + "name": "2013-12-30_beb143d7_S3224_RAGEMASTER.jpg", + "digest": "beb143d7a4993ce27e671422686f705aa0123abb99e6e0c71b5ff7a523d10383" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Firewalls_Cisco/S3222_JETPLOW.cleaned.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_JETPLOW.cleaned.jpg", + "name": "2013-12-30_3c6a2ee8_S3222_JETPLOW.cleaned.jpg", + "digest": "3c6a2ee8775db112891b3371767add720586426809cbb1c7872f1a88d84b215e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Firewalls_Huawei/S3222_HALLUXWATER.cleaned.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_HALLUXWATER.cleaned.jpg", + "name": "2013-12-30_e8137702_S3222_HALLUXWATER.cleaned.jpg", + "digest": "e81377024fd0993c43914e53a54b30aafa44147acf31d042ae2d66e762056d96" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Firewalls_Juniper/S3222_FEEDTROUGH.cleaned.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_FEEDTROUGH.cleaned.jpg", + "name": "2013-12-30_1f919003_S3222_FEEDTROUGH.cleaned.jpg", + "digest": "1f919003350cb3c0721e22c58d15e81bd009270970f297af72f3b77e569e83d3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Firewalls_Juniper/S3222_GOURMETTROUGH.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_GOURMETTROUGH.jpg", + "name": "2013-12-30_31d3794b_S3222_GOURMETTROUGH.jpg", + "digest": "31d3794bdf6d79f73ada5e0c7b3917893905993f7a9f3de4e365d9ea29dc1d38" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Firewalls_Juniper/S3222_SOUFFLETROUGH.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_SOUFFLETROUGH.jpg", + "name": "2013-12-30_613ddb43_S3222_SOUFFLETROUGH.jpg", + "digest": "613ddb438b52f5e9fa6ce749082d116c3741f7fbf088d8dce9c7203c9addc85b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Handy/S3222_DROPOUTJEEP.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_DROPOUTJEEP.jpg", + "name": "2013-12-30_593c6089_S3222_DROPOUTJEEP.jpg", + "digest": "593c6089b956ae1d12a974b704c7168c2d8a1424c2a48c0c8e2a1d229d219b76" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Handy/S3222_GOPHERSET.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_GOPHERSET.jpg", + "name": "2013-12-30_6e6cf8d0_S3222_GOPHERSET.jpg", + "digest": "6e6cf8d081a231916cd60c82ce664990c3bdbabeb9f0be23422914aa60bc3827" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Handy/S3222_MONKEYCALENDAR.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_MONKEYCALENDAR.jpg", + "name": "2013-12-30_73d469d4_S3222_MONKEYCALENDAR.jpg", + "digest": "73d469d4782004d9af0e44b11872f753aa1c324baa8d2b5adb05e7773e5da988" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Handy/S3222_TOTECHASER.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_TOTECHASER.jpg", + "name": "2013-12-30_afeed3b5_S3222_TOTECHASER.jpg", + "digest": "afeed3b5aeb6f5ead9f51f37e2118e453b90718010fb7de127ad7ca5036b1d26" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Handy/S3222_TOTEGHOSTLY.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_TOTEGHOSTLY.jpg", + "name": "2013-12-30_942122d2_S3222_TOTEGHOSTLY.jpg", + "digest": "942122d2bea25311db9fa3b043eec6ab72ba07e2ccf73e5dab5edfe93b4749ad" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Handy/S3224_PICASSO.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_PICASSO.jpg", + "name": "2013-12-30_152a81cf_S3224_PICASSO.jpg", + "digest": "152a81cf40a3c51c4357da572ff4bd012e85d912d898bfe68928d0973895b940" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Mobilfunk/S3223_CROSSBEAM.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3223_CROSSBEAM.jpg", + "name": "2013-12-30_bdced57f_S3223_CROSSBEAM.jpg", + "digest": "bdced57ffeabadd374e31bf5729ed4d810ae5163b60a2fdc405e67063432c5e4" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Mobilfunk/S3224_CANDYGRAM.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_CANDYGRAM.jpg", + "name": "2013-12-30_a85d4049_S3224_CANDYGRAM.jpg", + "digest": "a85d404970953eff03f9687da24c38a6c51cedfb30d39f3ec23b8214b1252d52" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Mobilfunk/S3224_CYCLONE_Hx9.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_CYCLONE_Hx9.jpg", + "name": "2013-12-30_54ba9dd7_S3224_CYCLONE_Hx9.jpg", + "digest": "54ba9dd79f87f58dba4c7e6d35dfd8c8fae3b54a24fdf5cd9dce2bce1a6c8b26" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Mobilfunk/S3224_EBSR.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_EBSR.jpg", + "name": "2013-12-30_04fd9e6c_S3224_EBSR.jpg", + "digest": "04fd9e6c68bc40b643afb00e82a43e4f5003f5f6cd37497cab400187a2e60691" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Mobilfunk/S3224_ENTOURAGE.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_ENTOURAGE.jpg", + "name": "2013-12-30_794500bb_S3224_ENTOURAGE.jpg", + "digest": "794500bb6ed2d28ebc68ef6923ef789668118ce8a9aeaeaaef92a511ef584cf1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Mobilfunk/S3224_GENISIS.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_GENISIS.jpg", + "name": "2013-12-30_57f9a63f_S3224_GENISIS.jpg", + "digest": "57f9a63f5078c32306808db4a2f76138f9f5f2b5174e62e5105d282f546e5eba" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Mobilfunk/S3224_NEBULA.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_NEBULA.jpg", + "name": "2013-12-30_b4d2c123_S3224_NEBULA.jpg", + "digest": "b4d2c12309f4eda38362d9ebef8572aad113505d112f0f515ddf88040b809ca0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Mobilfunk/S3224_TYPHON_HX.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_TYPHON_HX.jpg", + "name": "2013-12-30_4284dcda_S3224_TYPHON_HX.jpg", + "digest": "4284dcda2a29f564005560f09e2e2b0ffb36b9a11f89c42917072ba4629c3cb1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Mobilfunk/S3224_WATERWITCH.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_WATERWITCH.jpg", + "name": "2013-12-30_a281561b_S3224_WATERWITCH.jpg", + "digest": "a281561b89ccbf0f2684e6e4a89b31dc1327d883f05332ecb3ec10f769535e77" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Raumueberwachung/S3224_CTX4000.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_CTX4000.jpg", + "name": "2013-12-30_ec0a311e_S3224_CTX4000.jpg", + "digest": "ec0a311e40bb88f0ef69a04be4c370c4a3e6700dfe3527e004bc97cc7bc89540" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Raumueberwachung/S3224_LOUDAUTO.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_LOUDAUTO.jpg", + "name": "2013-12-30_860a4b74_S3224_LOUDAUTO.jpg", + "digest": "860a4b743d78f1d6bed42bdfa0d377df0165dfe58b6c3cace675e4c17dc24d7c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Raumueberwachung/S3224_NIGHTWATCH.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_NIGHTWATCH.jpg", + "name": "2013-12-30_4962501e_S3224_NIGHTWATCH.jpg", + "digest": "4962501e826edb69a6564361f76c2ad6a81fcb90a422f3365e5af40ec48c1eff" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Raumueberwachung/S3224_PHOTOANGLO.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_PHOTOANGLO.jpg", + "name": "2013-12-30_060362bd_S3224_PHOTOANGLO.jpg", + "digest": "060362bd0444c60b23e35b449a58141ba173b0a0e3dffd79ee5c76e236c4db7d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Raumueberwachung/S3224_TAWDRYYARD.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_TAWDRYYARD.jpg", + "name": "2013-12-30_d179de68_S3224_TAWDRYYARD.jpg", + "digest": "d179de68021afc39a11678a0a6e6afb69c4d5445dc79863b5113664fd391ee52" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Rechner/S3222_GINSU.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_GINSU.jpg", + "name": "2013-12-30_5e39b6a2_S3222_GINSU.jpg", + "digest": "5e39b6a26f33861ce938ba8b2da7a2cb019587c67b16566a51b3c56a28f47d57" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Rechner/S3222_IRATEMONK.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_IRATEMONK.jpg", + "name": "2013-12-30_ee8149bb_S3222_IRATEMONK.jpg", + "digest": "ee8149bbafe62f6e1f94b98b7ba1898c7a05e598fbb921a195f336bb2da684f0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Rechner/S3222_SWAP.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_SWAP.jpg", + "name": "2013-12-30_7c31407e_S3222_SWAP.jpg", + "digest": "7c31407ea8faf508c057f3413d5876ccc32a48b9d4b80858cfc5015dcd08e944" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Rechner/S3222_WISTFULTOLL.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_WISTFULTOLL.jpg", + "name": "2013-12-30_14c61a0c_S3222_WISTFULTOLL.jpg", + "digest": "14c61a0c5a2e19835fdfd90f3114c7252bcdd6e1cebcec1f2102214fc7c9440f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Rechner/S3223_HOWLERMONKEY.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3223_HOWLERMONKEY.jpg", + "name": "2013-12-30_6fd934bf_S3223_HOWLERMONKEY.jpg", + "digest": "6fd934bff44f4ca03406e12f8a44c4fbf382633863a56b296c8348cc96a74261" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Rechner/S3223_JUNIORMINT.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3223_JUNIORMINT.jpg", + "name": "2013-12-30_7da59450_S3223_JUNIORMINT.jpg", + "digest": "7da594509efef4b31eefeed445ffe8256e5930841f867ad29f11d5c8a7c565f2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Rechner/S3223_MAESTRO-II.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3223_MAESTRO-II.jpg", + "name": "2013-12-30_166c2261_S3223_MAESTRO-II.jpg", + "digest": "166c2261fcd00e4bd0a90eaac03d69761c4510b0063f98ada2a4e4cebb7a5656" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Rechner/S3223_SOMBERKNAVE.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3223_SOMBERKNAVE.jpg", + "name": "2013-12-30_9e950d31_S3223_SOMBERKNAVE.jpg", + "digest": "9e950d311adbb784ad77e5563dba3501aaca4fca15a1808fc0be8633d3f32e5a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Rechner/S3223_TRINITY.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3223_TRINITY.jpg", + "name": "2013-12-30_76439ad9_S3223_TRINITY.jpg", + "digest": "76439ad9c763ba2b4becdc280f5d66e9b39c6189fbf0ff06068945cc91d1fe55" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Router_Huawei/S3222_HEADWATER.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_HEADWATER.jpg", + "name": "2013-12-30_13940a24_S3222_HEADWATER.jpg", + "digest": "13940a24f61a7a4c216edd22d669f9782160ff50d19a40410cd12b09073b255e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Router_Juniper/S3222_SCHOOLMONTANA.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_SCHOOLMONTANA.jpg", + "name": "2013-12-30_6984ab15_S3222_SCHOOLMONTANA.jpg", + "digest": "6984ab15a664df60fbfe6e1a4d5601a8f96f8dd915b4bd460d516a97a91051f7" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Router_Juniper/S3222_SIERRAMONTANA.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_SIERRAMONTANA.jpg", + "name": "2013-12-30_965cff2c_S3222_SIERRAMONTANA.jpg", + "digest": "965cff2cca0f8eea4c69dac86ccdce589a599408b23b93b709e972c428b3669b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Router_Juniper/S3222_STUCCOMONTANA.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_STUCCOMONTANA.jpg", + "name": "2013-12-30_d585c86f_S3222_STUCCOMONTANA.jpg", + "digest": "d585c86f726934c50e1d8885cb6612b07455dced5443ead080666496fedad28b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Server_Dell/S3222_DEITYBOUNCE.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_DEITYBOUNCE.jpg", + "name": "2013-12-30_9c2c18c5_S3222_DEITYBOUNCE.jpg", + "digest": "9c2c18c577ba755c10bdb42fd9a857fe95c8faed196e3275b6525d95ac0d70cd" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Server_HP/S3222_IRONCHEF.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3222_IRONCHEF.jpg", + "name": "2013-12-30_c46d2260_S3222_IRONCHEF.jpg", + "digest": "c46d22605386fa295552a3c7a634d9534b1ffbfac434fce375dbd25639fe3814" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Tastatur/S3224_SURLYSPAWN.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_SURLYSPAWN.jpg", + "name": "2013-12-30_3a23f353_S3224_SURLYSPAWN.jpg", + "digest": "3a23f35331854fed5cc8611060d9750a9208b1f2849d7cd035e87e93a43d8f6a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/USB/S3223_COTTONMOUTH-I.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3223_COTTONMOUTH-I.jpg", + "name": "2013-12-30_53279c79_S3223_COTTONMOUTH-I.jpg", + "digest": "53279c79eaa3e492ab72e529d3ddea248459dbc94cf314538115276f0482fbb3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/USB/S3223_COTTONMOUTH-II.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3223_COTTONMOUTH-II.jpg", + "name": "2013-12-30_0aaf37eb_S3223_COTTONMOUTH-II.jpg", + "digest": "0aaf37ebb27813c4ce3a4413c9f45c82783b46c8c916314ba1d3a006f1ab7df2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/USB/S3223_COTTONMOUTH-III.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3223_COTTONMOUTH-III.jpg", + "name": "2013-12-30_85396d93_S3223_COTTONMOUTH-III.jpg", + "digest": "85396d93df54ed9ad8490d5c356338f2f84a1ab98be05fdfb55428398ad4bbbe" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/USB/S3223_FIREWALK.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3223_FIREWALK.jpg", + "name": "2013-12-30_f904f9e9_S3223_FIREWALK.jpg", + "digest": "f904f9e9260a64720e90c3bea0f07687ddba430c15add4e7234fa3242b4e3ef5" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Wlan/S3224_NIGHTSTAND.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_NIGHTSTAND.jpg", + "name": "2013-12-30_4894ce94_S3224_NIGHTSTAND.jpg", + "digest": "4894ce94db856f9bef6465cd017b4cbd7352050d26b4fb8896cd2cb98508a090" + }, + "index": "" + } + ] + }, + { + "pubdate": "2013-12-30", + "url": "http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Wlan/S3224_SPARROW_II.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html", + "pubdate": "2013-12-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/world/a-941262.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "S3224_SPARROW_II.jpg", + "name": "2013-12-30_205cb373_S3224_SPARROW_II.jpg", + "digest": "205cb373d78fa6399e3921275d3a4ee4c4906a567d3fa6f8ba8e44f83dfd0c73" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-01-02", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1001086/quantum-computing-21sep11-redacted.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_story.html", + "pubdate": "2014-01-02" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/classifying-nsa-quantum-computing-efforts/692/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "quantum-computing-21sep11-redacted.pdf", + "name": "2014-01-02_012438bf_quantum-computing-21sep11-redacted.pdf", + "digest": "012438bfaca38746ecb963ec9828137e18b1c7c76273e6ff16602dc7cf946608" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-01-02", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1001087/cbjb-quantum-excerpts.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_story.html", + "pubdate": "2014-01-02" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/a-description-of-the-penetrating-hard-targets-project/691/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "cbjb-quantum-excerpts.pdf", + "name": "2014-01-02_7d014f5b_cbjb-quantum-excerpts.pdf", + "digest": "7d014f5baba84ea8895a78ead2dd7c4e0c3c9d57d0c71927aa519186cae1f478" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-01-16", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1006111/sms.pdf", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep", + "pubdate": "2014-01-16" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/interactive/2014/jan/16/nsa-dishfire-text-messages-documents", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sms.pdf", + "name": "2014-01-16_1ec806c7_sms.pdf", + "digest": "1ec806c77619310f63bae9109ff55ace02901c263cd963802062e86963f6aaa8" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-01-27", + "url": "http://media1.s-nbcnews.com/i/msnbc/Sections/NEWS/snowden_youtube_nbc_document.pdf", + "accomp_articles": [ + { + "url": "http://investigations.nbcnews.com/_news/2014/01/27/22469304-snowden-docs-reveal-british-spies-snooped-on-youtube-and-facebook", + "pubdate": "2014-01-27" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "snowden_youtube_nbc_document.pdf", + "name": "2014-01-27_e1d4947b_snowden_youtube_nbc_document.pdf", + "digest": "e1d4947ba93946fefd1f4882166a46a24e8b52c247c7d7db884ed4bab1c172ec" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-01-27", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1009551/mobile-theme-briefing-gchq-may-2010.pdf", + "accomp_articles": [ + { + "url": "https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data", + "pubdate": "2014-01-27" + } + ], + "alternative_files": [], + "presentation_url": "https://www.propublica.org/documents/item/1009551-mobile-theme-briefing-gchq-may-2010", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "mobile-theme-briefing-gchq-may-2010.pdf", + "name": "2014-01-27_f883847c_mobile-theme-briefing-gchq-may-2010.pdf", + "digest": "f883847cb1b0460c5dea3249003ef3dc1c1da4538e22caf1fcb21f6918f55212" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-01-27", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1009660/nsa.pdf", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html", + "pubdate": "2014-01-27" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2014/01/28/world/28mobile-annotateA.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa.pdf", + "name": "2014-01-27_7b5d4fad_nsa.pdf", + "digest": "7b5d4fada15691dd29e6e5d397485c06b7034795f7b40cee66a36fdfa0fd1f87" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-01-28", + "url": "http://i.guim.co.uk/static/w-1225/h--/q-95/sys-images/Guardian/Pix/pictures/2014/1/27/1390841078201/aa827a97-1d33-49e4-a83d-6ff153a15ea2-1024x768.jpeg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data", + "pubdate": "2014-01-28" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data#img-3", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "aa827a97-1d33-49e4-a83d-6ff153a15ea2-1024x768.jpeg", + "name": "2014-01-28_99474f06_aa827a97-1d33-49e4-a83d-6ff153a15ea2-1024x768.jpeg", + "digest": "99474f06eda4686df2f0af81bf9a0f1696210d8c4a356f952a33469fde242af5" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-01-28", + "url": "http://i.guim.co.uk/static/w-1225/h--/q-95/sys-images/Guardian/Pix/pictures/2014/1/27/1390841104101/892404f0-f5d8-4c99-90d9-d33a1e225249-1024x768.jpeg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data", + "pubdate": "2014-01-28" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data#img-4", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "892404f0-f5d8-4c99-90d9-d33a1e225249-1024x768.jpeg", + "name": "2014-01-28_e39b2cca_892404f0-f5d8-4c99-90d9-d33a1e225249-1024x768.jpeg", + "digest": "e39b2ccad1f44118505c7a29bf12ae6b4de3dc1b61f83e141f59c617091221ac" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-01-29", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1010488/un-climate-change-conference-in-copenhagen-will.pdf", + "accomp_articles": [ + { + "url": "http://www.information.dk/486323", + "pubdate": "2014-01-30" + } + ], + "alternative_files": [], + "presentation_url": "http://www.information.dk/databloggen/486321", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "un-climate-change-conference-in-copenhagen-will.pdf", + "name": "2014-01-29_667fdebc_un-climate-change-conference-in-copenhagen-will.pdf", + "digest": "667fdebca33c2fca8eaf775b512d00853e11d48352205af43bebc124b24732e0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-01-30", + "url": "http://www.cbc.ca/news2/pdf/airports_redacted.pdf", + "accomp_articles": [ + { + "url": "http://www.cbc.ca/news/politics/csec-used-airport-wi-fi-to-track-canadian-travellers-edward-snowden-documents-1.2517881", + "pubdate": "2014-01-30" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "airports_redacted.pdf", + "name": "2014-01-30_24962536_airports_redacted.pdf", + "digest": "249625365ba028b7e7462ec27c246b970e73f9c733e4a304c61b7a8d412b5485" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-04", + "url": "http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_anonymous_nbc_document.pdf", + "accomp_articles": [ + { + "url": "http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361", + "pubdate": "2014-02-04" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "snowden_anonymous_nbc_document.pdf", + "name": "2014-02-04_2c71f853_snowden_anonymous_nbc_document.pdf", + "digest": "2c71f853e9574635d1c530ee117690acd3257ccde113f8b1f530bd7600c73b88" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-07", + "url": "http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_cyber_offensive1_nbc_document.pdf", + "accomp_articles": [ + { + "url": "http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-sex-dirty-tricks-n23091", + "pubdate": "2014-02-07" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "snowden_cyber_offensive1_nbc_document.pdf", + "name": "2014-02-07_377fce2e_snowden_cyber_offensive1_nbc_document.pdf", + "digest": "377fce2e29823e6b7a83f42257123d3b7f642be02c2029595f716beb35ba7fc2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-07", + "url": "http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_cyber_offensive2_nbc_document.pdf", + "accomp_articles": [ + { + "url": "http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-sex-dirty-tricks-n23091", + "pubdate": "2014-02-07" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "snowden_cyber_offensive2_nbc_document.pdf", + "name": "2014-02-07_2d8316f2_snowden_cyber_offensive2_nbc_document.pdf", + "digest": "2d8316f202fa93aa49e831c350cc42dd1f4ea2f786052f5b7f00d27f292c833e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-08", + "url": "http://1.bp.blogspot.com/-R90ncvxIN90/UvWcZRSwZcI/AAAAAAAABTE/cMQuoelSv9o/s1600/boundless+nederland-medium.jpg", + "accomp_articles": [ + { + "url": "http://electrospaces.blogspot.com/2014/02/boundlessinformant-metadata-collection.html", + "pubdate": "2014-02-08" + } + ], + "alternative_files": [], + "presentation_url": "http://electrospaces.blogspot.com/2014/02/boundlessinformant-metadata-collection.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "boundless+nederland-medium.jpg", + "name": "2014-02-08_ae489208_boundless+nederland-medium.jpg", + "digest": "ae489208b07702931c6c87e471826ea2c2241b41d4f00ca8fad131662fcc50b6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-10", + "url": "https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2014/02/DT-1.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/02/10/the-nsas-secret-role/", + "pubdate": "2014-02-10" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/02/10/the-nsas-secret-role/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "DT-1.png", + "name": "2014-02-10_18618dae_DT-1.png", + "digest": "18618daeb943efe8052c72221f45ed80338574c7b0260095c5bbdf9d033b7b66" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-10", + "url": "https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2014/02/DT-4.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/02/10/the-nsas-secret-role/", + "pubdate": "2014-02-10" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/02/10/the-nsas-secret-role/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "DT-4.png", + "name": "2014-02-10_a5bebca6_DT-4.png", + "digest": "a5bebca61911da20db738d02448e13fa775e6c6bbf32b3d702f3f495138db6b2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-10", + "url": "https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2014/02/DT-5.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/02/10/the-nsas-secret-role/", + "pubdate": "2014-02-10" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/02/10/the-nsas-secret-role/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "DT-5.png", + "name": "2014-02-10_52ff50f3_DT-5.png", + "digest": "52ff50f39504707ae43eac7c192b22eba20c8a6d99af746d46962da7bbe9bf7b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-10", + "url": "https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2014/02/DT-6.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/02/10/the-nsas-secret-role/", + "pubdate": "2014-02-10" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/02/10/the-nsas-secret-role/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "DT-6.png", + "name": "2014-02-10_f51d7391_DT-6.png", + "digest": "f51d739143caece6f1df7a728f7603e0d4ade3454fc6146da79a6a9c4dffb5a8" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-10", + "url": "https://prod01-cdn03.cdn.firstlook.org/wp-uploads/sites/1/2014/02/DT-3-1.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/02/10/the-nsas-secret-role/", + "pubdate": "2014-02-10" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/02/10/the-nsas-secret-role/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "DT-3-1.png", + "name": "2014-02-10_f0f89567_DT-3-1.png", + "digest": "f0f89567c0f05df850dde0b8604c40441da5d67492035b114d47a0ad314f1b7c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-15", + "url": "", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2014/02/16/us/document-describes-eavesdropping-on-american-law-firm.html", + "pubdate": "2014-02-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/2014/02/16/us/document-describes-eavesdropping-on-american-law-firm.html", + "published_files": [] + }, + { + "pubdate": "2014-02-18", + "url": "https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2014/02/manhunting1.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/", + "pubdate": "2014-02-18" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "manhunting1.png", + "name": "2014-02-18_d2a7a514_manhunting1.png", + "digest": "d2a7a514945c5a13c2d482b716ec9f3b0421bb51b72995bb67cff7fab76229e4" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-18", + "url": "https://prod01-cdn03.cdn.firstlook.org/wp-uploads/sites/1/2014/02/assange_pressure.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/", + "pubdate": "2014-02-18" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "assange_pressure.png", + "name": "2014-02-18_526fe3da_assange_pressure.png", + "digest": "526fe3da7534fd1eed57a1e1332463f45dbeddb8decc9fb6b876c1abb215ee22" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-18", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1019062/discovery-sigint-targeting-scenarios-and.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/", + "pubdate": "2014-02-18" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/02/18/discovery-sigint-targeting-scenarios-compliance/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "discovery-sigint-targeting-scenarios-and.pdf", + "name": "2014-02-18_3540338c_discovery-sigint-targeting-scenarios-and.pdf", + "digest": "3540338cffe288d8ea271578fe89db93be07bccf6685b0d2c5f79c75896ff286" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-18", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1019236/psychology-a-new-kind-of-sigdev.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/", + "pubdate": "2014-02-18" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/02/18/psychology-new-kind-sigdev/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "psychology-a-new-kind-of-sigdev.pdf", + "name": "2014-02-18_c8728ec7_psychology-a-new-kind-of-sigdev.pdf", + "digest": "c8728ec7fc71bad0496530b58aac5839968a061e99c197777a34ee0d24ccd8a0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-24", + "url": "https://prod01-cdn01.cdn.firstlook.org/wp-uploads/sites/1/2014/02/Screenshot2.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/", + "pubdate": "2014-02-24" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Screenshot2.png", + "name": "2014-02-24_b00d58d9_Screenshot2.png", + "digest": "b00d58d99206d0edd347eb13aac012531c53ab4e6506b64d126ab5540d340df4" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-24", + "url": "https://prod01-cdn01.cdn.firstlook.org/wp-uploads/sites/1/2014/02/Screenshot3.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/", + "pubdate": "2014-02-24" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Screenshot3.png", + "name": "2014-02-24_b8aeb78c_Screenshot3.png", + "digest": "b8aeb78c62fb426445a8330aff08390fc14ca6636bc53a5943b11c3c24c4c77b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-24", + "url": "https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2014/02/deception_hacktivism.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/", + "pubdate": "2014-02-24" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "deception_hacktivism.png", + "name": "2014-02-24_026ec9e6_deception_hacktivism.png", + "digest": "026ec9e664b73af5ff087fcb1691c0bc5064f7675c6635498d7cc4b85c0264a1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-24", + "url": "https://prod01-cdn03.cdn.firstlook.org/wp-uploads/sites/1/2014/02/screenshot4.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/", + "pubdate": "2014-02-24" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "screenshot4.png", + "name": "2014-02-24_79ea01c9_screenshot4.png", + "digest": "79ea01c988f37327d4aead1ac84567b696844f701d02bee09aedaed00a75c782" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-25", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1021430/the-art-of-deception-training-for-a-new.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/", + "pubdate": "2014-02-24" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "the-art-of-deception-training-for-a-new.pdf", + "name": "2014-02-25_a806aa4c_the-art-of-deception-training-for-a-new.pdf", + "digest": "a806aa4cb4c372e120b2a01bc44c6dd884468c73873d656023c4540d8a295f48" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-28", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/pictures/2014/2/26/1393452001667/NSA-ragout-1-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo", + "pubdate": "2014-02-28" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "NSA-ragout-1-001.jpg", + "name": "2014-02-28_00d46bba_NSA-ragout-1-001.jpg", + "digest": "00d46bba8810164b26a25575714412b016e961cd4f990f457011830545f92ef3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-28", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/pictures/2014/2/26/1393452030724/NSA-ragout-2-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo", + "pubdate": "2014-02-28" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "NSA-ragout-2-001.jpg", + "name": "2014-02-28_a39ae2df_NSA-ragout-2-001.jpg", + "digest": "a39ae2df52f879fdae60c0380b3432bea952481c397b13d5ad6ad9bc489eed58" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-28", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/pictures/2014/2/26/1393452051275/NSA-ragout-3-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo", + "pubdate": "2014-02-28" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "NSA-ragout-3-001.jpg", + "name": "2014-02-28_80362fe8_NSA-ragout-3-001.jpg", + "digest": "80362fe807b4d6aaacddc5218d0b52b32b69f26b29c7231baadf8d2b16ce5ce9" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-02-28", + "url": "http://i.guim.co.uk/static/w-620/h--/q-95/sys-images/Guardian/Pix/pictures/2014/2/26/1393452070858/NSA-ragout-4-001.jpg", + "accomp_articles": [ + { + "url": "http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo", + "pubdate": "2014-02-28" + } + ], + "alternative_files": [], + "presentation_url": "http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "NSA-ragout-4-001.jpg", + "name": "2014-02-28_4b664a4b_NSA-ragout-4-001.jpg", + "digest": "4b664a4b86f9c15e12e1b6926f82addce88895353a2f7da62df1efdefbef473f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-05", + "url": "http://www.nrc.nl/wp-content/uploads/2014/03/Sheet3.jpg", + "accomp_articles": [ + { + "url": "http://www.nrc.nl/nieuws/2014/03/05/the-secret-role-of-the-dutch-in-the-american-war-on-terror/", + "pubdate": "2014-03-05" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nrc.nl/nieuws/2014/03/05/the-secret-role-of-the-dutch-in-the-american-war-on-terror/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Sheet3.jpg", + "name": "2014-03-05_0b7e84ab_Sheet3.jpg", + "digest": "0b7e84ab1827950da4f6a122a5e7cb1c31f1ef8c9e88c3230aff7e59ac2a3ba0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-05", + "url": "http://www.nrc.nl/wp-content/uploads/2014/03/nsa11.jpg", + "accomp_articles": [ + { + "url": "http://www.nrc.nl/nieuws/2014/03/05/the-secret-role-of-the-dutch-in-the-american-war-on-terror/", + "pubdate": "2014-03-05" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nrc.nl/nieuws/2014/03/05/the-secret-role-of-the-dutch-in-the-american-war-on-terror/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa11.jpg", + "name": "2014-03-05_369d4cce_nsa11.jpg", + "digest": "369d4cce0954625164ae806299f3c6e0105c3867fd3e456d16f71b483fa5b69c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-05", + "url": "http://www.nrc.nl/wp-content/uploads/2014/03/sheet21.jpg", + "accomp_articles": [ + { + "url": "http://www.nrc.nl/nieuws/2014/03/05/the-secret-role-of-the-dutch-in-the-american-war-on-terror/", + "pubdate": "2014-03-05" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nrc.nl/nieuws/2014/03/05/the-secret-role-of-the-dutch-in-the-american-war-on-terror/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sheet21.jpg", + "name": "2014-03-05_c0c0d131_sheet21.jpg", + "digest": "c0c0d131df586de40b1ca86ad7aa735dba1e766b9c95b4086ad84684ccdc77e6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-07", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1059976/an-interview-with-zelda.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/07/nsa-advice-columnist-seriously/", + "pubdate": "2014-03-07" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/07/an-interview-with-zelda/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "an-interview-with-zelda.pdf", + "name": "2014-03-07_5b020688_an-interview-with-zelda.pdf", + "digest": "5b02068819b54f7c1e3942cbb02a19e71a757b2cb72ecad3f74c7041f0546bec" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-07", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1059978/guilty-until-proven-innocent.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/07/nsa-advice-columnist-seriously/", + "pubdate": "2014-03-07" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/07/guilty-proven-innocent/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "guilty-until-proven-innocent.pdf", + "name": "2014-03-07_57a21e01_guilty-until-proven-innocent.pdf", + "digest": "57a21e01c3d380009a065d79678f40ea21748c6c86c4cf2b5171d54eae61f65c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-07", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1059979/is-bain-de-soleil-a-bane-on-nsa.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/07/nsa-advice-columnist-seriously/", + "pubdate": "2014-03-07" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/07/bain-de-soleil-bane-nsa/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "is-bain-de-soleil-a-bane-on-nsa.pdf", + "name": "2014-03-07_5ce1531f_is-bain-de-soleil-a-bane-on-nsa.pdf", + "digest": "5ce1531f411d6a458f55310336a5dc563d3174085784f28a0bdec35abe4ec0be" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-07", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1059980/silenced-in-sid.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/07/nsa-advice-columnist-seriously/", + "pubdate": "2014-03-07" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/07/silenced-sid/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "silenced-in-sid.pdf", + "name": "2014-03-07_c48c8cb2_silenced-in-sid.pdf", + "digest": "c48c8cb28b563c5f851d654168de338d5d60cdbb5d9fe3159cf9aa6239ad5505" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1061347/ashcroft-new-dissemination-procedures.pdf", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2014/03/12/us/how-a-courts-secret-evolution-extended-spies-reach.html", + "pubdate": "2014-03-11" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2014/03/12/us/ashcroft-dissemination-doc.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "ashcroft-new-dissemination-procedures.pdf", + "name": "2014-03-11_28c25e40_ashcroft-new-dissemination-procedures.pdf", + "digest": "28c25e408be8c3a06b6e681a7ab4485c3b83aa7acec0e30a69607af3c22900bf" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1061348/fisa-faa-classification-guide.pdf", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2014/03/12/us/how-a-courts-secret-evolution-extended-spies-reach.html", + "pubdate": "2014-03-11" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2014/03/12/us/fisa-classification-doc.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "fisa-faa-classification-guide.pdf", + "name": "2014-03-11_1734f398_fisa-faa-classification-guide.pdf", + "digest": "1734f398b628f688891a0cce4284d41b6dde66abeb90ea35820eb75901fc1f33" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1061351/stellarwind-classification-guide.pdf", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2014/03/12/us/how-a-courts-secret-evolution-extended-spies-reach.html", + "pubdate": "2014-03-11" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2014/03/12/us/stellarwind-guidance-doc.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "stellarwind-classification-guide.pdf", + "name": "2014-03-11_1f2450eb_stellarwind-classification-guide.pdf", + "digest": "1f2450eb1e07694034a2cb64318991128adb1609b459932a20b777054e647e01" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1061386/nsa-cryptanalysts-fisa-sharing-expansion.pdf", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2014/03/12/us/how-a-courts-secret-evolution-extended-spies-reach.html", + "pubdate": "2014-03-11" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2014/03/12/us/NSA-internal-access-memo.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-cryptanalysts-fisa-sharing-expansion.pdf", + "name": "2014-03-11_ca1e5c09_nsa-cryptanalysts-fisa-sharing-expansion.pdf", + "digest": "ca1e5c097aaa08e9c821916bf5b5e41a48afc2d2235793b1c4b85468df1a0e92" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1061406/untitled-nsa-timeline-of-surveillance-milestones.pdf", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2014/03/12/us/how-a-courts-secret-evolution-extended-spies-reach.html", + "pubdate": "2014-03-11" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2014/03/12/us/nsa-timeline.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "untitled-nsa-timeline-of-surveillance-milestones.pdf", + "name": "2014-03-11_9c9ca24b_untitled-nsa-timeline-of-surveillance-milestones.pdf", + "digest": "9c9ca24b761f4f14fc471a4d458c17ae3c84a91f6a65da71652485c1d7cd88c2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-12", + "url": "https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2014/03/intelligent-command-and-control.jpg", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/12/nsa-plans-infect-millions-computers-malware/", + "pubdate": "2014-03-12" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/03/12/nsa-plans-infect-millions-computers-malware/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "intelligent-command-and-control.jpg", + "name": "2014-03-12_cb77fc50_intelligent-command-and-control.jpg", + "digest": "cb77fc501ef7498d8604e2b5c8ff018fee85ba516b051ba694be743b29650169" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-12", + "url": "https://prod01-cdn03.cdn.firstlook.org/wp-uploads/sites/1/2014/03/turbine-large.jpg", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/12/nsa-plans-infect-millions-computers-malware/", + "pubdate": "2014-03-12" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/03/12/nsa-plans-infect-millions-computers-malware/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "turbine-large.jpg", + "name": "2014-03-12_c55c7568_turbine-large.jpg", + "digest": "c55c7568d134f25c66b151efc15e7dc5ef0b503386438c95c08a0cc04fc803fb" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-12", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1076859/nsa-phishing-tactics-and-man-in-the-middle-attacks.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/12/nsa-plans-infect-millions-computers-malware/", + "pubdate": "2014-03-12" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/12/nsa-phishing-tactics-man-middle-attacks/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-phishing-tactics-and-man-in-the-middle-attacks.pdf", + "name": "2014-03-12_f22eadbf_nsa-phishing-tactics-and-man-in-the-middle-attacks.pdf", + "digest": "f22eadbfe9e08558f75d343371aa0669fd5269f50012bc56b2ea72637fe4960d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-12", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1076862/quantum-insert-diagrams.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/12/nsa-plans-infect-millions-computers-malware/", + "pubdate": "2014-03-12" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/12/quantum-insert-diagrams/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "quantum-insert-diagrams.pdf", + "name": "2014-03-12_8448e223_quantum-insert-diagrams.pdf", + "digest": "8448e223237cb65bb8496265ccdae1804704c30a261d1444e630f3f2180df14c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-12", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1076864/the-nsa-and-gchqs-quantumtheory-hacking-tactics.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/12/nsa-plans-infect-millions-computers-malware/", + "pubdate": "2014-03-12" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/12/nsa-gchqs-quantumtheory-hacking-tactics/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "the-nsa-and-gchqs-quantumtheory-hacking-tactics.pdf", + "name": "2014-03-12_d4b513a7_the-nsa-and-gchqs-quantumtheory-hacking-tactics.pdf", + "digest": "d4b513a72b7e01a42a5b38696054d42061f8f7e41c67214ceebd7868a27e014b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-12", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1076867/turbine-and-turmoil.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/12/nsa-plans-infect-millions-computers-malware/", + "pubdate": "2014-03-12" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/12/turbine-turmoil/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "turbine-and-turmoil.pdf", + "name": "2014-03-12_33247d70_turbine-and-turmoil.pdf", + "digest": "33247d70ada0238c8008e7a42fd6ee614281d7545aec76a85429c6fc60da192d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-12", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1076868/vpn-and-voip-exploitation-with-hammerchant-and.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/12/nsa-plans-infect-millions-computers-malware/", + "pubdate": "2014-03-12" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/12/vpn-voip-exploitation-hammerchant-hammerstein/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "vpn-and-voip-exploitation-with-hammerchant-and.pdf", + "name": "2014-03-12_95ed5897_vpn-and-voip-exploitation-with-hammerchant-and.pdf", + "digest": "95ed5897381d993b469b4b13cb6a467b50b57745e29d5dc241e878307e23afc5" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-12", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1076889/nsa-technology-directorate-analysis-of-converged.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/12/nsa-plans-infect-millions-computers-malware/", + "pubdate": "2014-03-12" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/12/nsa-technology-directorate-analysis-converged-data/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-technology-directorate-analysis-of-converged.pdf", + "name": "2014-03-12_d962b98d_nsa-technology-directorate-analysis-of-converged.pdf", + "digest": "d962b98da21a61d10e105b37463ddc855a17dc4281a2de719c7cac1f76f4ea28" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-12", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1076890/selector-types.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/12/nsa-plans-infect-millions-computers-malware/", + "pubdate": "2014-03-12" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/12/selector-types/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "selector-types.pdf", + "name": "2014-03-12_f64deb43_selector-types.pdf", + "digest": "f64deb43715cbf89aa998c101489e0b5a308ab671b4c9c06b38b9b22c510c821" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-12", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/12/nsa-plans-infect-millions-computers-malware/", + "pubdate": "2014-03-12" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/12/one-way-quantum/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "there-is-more-than-one-way-to-quantum.pdf", + "name": "2014-03-12_cfe0cbee_there-is-more-than-one-way-to-quantum.pdf", + "digest": "cfe0cbee3ef870ae637daf4518c652ebe0cd3a59870182330e779d6e242064d3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-12", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1076902/five-eyes-hacking-large-routers.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/12/nsa-plans-infect-millions-computers-malware/", + "pubdate": "2014-03-12" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/12/five-eyes-hacking-large-routers/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "five-eyes-hacking-large-routers.pdf", + "name": "2014-03-12_cdbfced4_five-eyes-hacking-large-routers.pdf", + "digest": "cdbfced4fe57d9829da4ea34ed8a728f560349451b12ed24113aefd23320c346" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-12", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1076903/menwith-hill-station-leverages-xkeyscore-for.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/12/nsa-plans-infect-millions-computers-malware/", + "pubdate": "2014-03-12" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/12/menwith-hill-station-leverages-xkeyscore-quantum-yahoo-hotmail/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "menwith-hill-station-leverages-xkeyscore-for.pdf", + "name": "2014-03-12_098c4176_menwith-hill-station-leverages-xkeyscore-for.pdf", + "digest": "098c417695977c52f198027064d6ae1b5e5151de9c878becb70e23e6791c48dc" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-12", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1077721/thousands-of-implants.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/12/nsa-plans-infect-millions-computers-malware/", + "pubdate": "2014-03-12" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/12/thousands-implants/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "thousands-of-implants.pdf", + "name": "2014-03-12_88ec7101_thousands-of-implants.pdf", + "digest": "88ec71017d34881b6674220507d4fdf749aa2ed23559571c080de6ad5f5dbe4d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-12", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1077724/industry-scale-exploitation.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/12/nsa-plans-infect-millions-computers-malware/", + "pubdate": "2014-03-12" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/12/industrial-scale-exploitation/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "industry-scale-exploitation.pdf", + "name": "2014-03-12_bbff126e_industry-scale-exploitation.pdf", + "digest": "bbff126e8f369f04294137c6e73fdeb703f8598c893733aae836ee6f188b69c2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-13", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1084762/third-party-relationships.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/13/nsa-elected-officials-foreign-countries-unaware-countries-cooperation-us/", + "pubdate": "2014-03-13" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/13/third-party-relationships/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "third-party-relationships.pdf", + "name": "2014-03-13_3ed810be_third-party-relationships.pdf", + "digest": "3ed810beb56621acd27c05c083103cdfa3544c3e5d3f49f14f68b2e71ea4a963" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-15", + "url": "http://4.bp.blogspot.com/-J_CgRsvw2sw/Uxvkx-UJPpI/AAAAAAAABYA/-JN4vGko5JM/s1600/nrc-somalia2.jpg", + "accomp_articles": [ + { + "url": "http://electrospaces.blogspot.com/2014/02/boundlessinformant-metadata-collection.html", + "pubdate": "2014-02-08" + } + ], + "alternative_files": [], + "presentation_url": "http://electrospaces.blogspot.com/2014/02/boundlessinformant-metadata-collection.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nrc-somalia2.jpg", + "name": "2014-03-15_1368dfe0_nrc-somalia2.jpg", + "digest": "1368dfe0fcf9494533c5869ac9a53069e2d0a5f1ed82948f8984bf8e0d9b8c63" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-15", + "url": "https://1.bp.blogspot.com/-fpOIREDy2K8/UxvkphJ8YQI/AAAAAAAABX4/wAFGGs2AlIc/s1600/nrc-somalia1.jpg", + "accomp_articles": [ + { + "url": "http://electrospaces.blogspot.com/2014/02/boundlessinformant-metadata-collection.html", + "pubdate": "2014-02-08" + } + ], + "alternative_files": [], + "presentation_url": "http://electrospaces.blogspot.com/2014/02/boundlessinformant-metadata-collection.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nrc-somalia1.jpg", + "name": "2014-03-15_fe3105db_nrc-somalia1.jpg", + "digest": "fe3105dbca26985138fdb1becff3bf3ffeae71a37c00ca8ab70f21f6137fb28b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-15", + "url": "https://prod01-cdn03.cdn.firstlook.org/wp-uploads/sites/1/2014/03/fb-article-display-b.jpg", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/15/nsa-facebook-malware-turbine-non-denial-denial/", + "pubdate": "2014-03-15" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/03/15/nsa-facebook-malware-turbine-non-denial-denial/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "fb-article-display-b.jpg", + "name": "2014-03-15_7cb08365_fb-article-display-b.jpg", + "digest": "7cb083653abbd3ca95dc22db9eecb351af9eca4aa3c915d6f085655819a12ff0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-15", + "url": "https://prod01-cdn03.cdn.firstlook.org/wp-uploads/sites/1/2014/03/quantumhand-server.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/15/nsa-facebook-malware-turbine-non-denial-denial/", + "pubdate": "2014-03-15" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/03/15/nsa-facebook-malware-turbine-non-denial-denial/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "quantumhand-server.png", + "name": "2014-03-15_f7914abd_quantumhand-server.png", + "digest": "f7914abdceb8df6b49cbfd06de6ced818c95d44cb3cce33ded12062314f0f530" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-18", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1086616/fromsso-key-brief-overview.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls/2014/03/18/226d2646-ade9-11e3-a49e-76adc9210f19_story.html", + "pubdate": "2014-03-18" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/description-of-data-collection-by-nsa-under-mystic/879/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "fromsso-key-brief-overview.pdf", + "name": "2014-03-18_be763a77_fromsso-key-brief-overview.pdf", + "digest": "be763a77c54b2ed0b2f4cb69d60c805e238e2744c15caf764203629731b7b69e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-18", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1086618/mysticssoweeklybrief.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls/2014/03/18/226d2646-ade9-11e3-a49e-76adc9210f19_story.html", + "pubdate": "2014-03-18" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/nsa-symbolizes-data-collection-program-with-wizard/880/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "mysticssoweeklybrief.pdf", + "name": "2014-03-18_d8ddafef_mysticssoweeklybrief.pdf", + "digest": "d8ddafef4cc4c1ab0a7e344c984c10ea500ecc44f462f5f862faaf0ef53b914e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-18", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1088934/mystic-tearsheet-cropped-v2.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls/2014/03/18/226d2646-ade9-11e3-a49e-76adc9210f19_story.html", + "pubdate": "2014-03-18" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/adding-a-country-to-mystic-efforts-mentioned/881/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "mystic-tearsheet-cropped-v2.pdf", + "name": "2014-03-18_b08b7eeb_mystic-tearsheet-cropped-v2.pdf", + "digest": "b08b7eeb2673a0879907f269f0e1d2e18d510a07b0d5dfc4ede1d1c86a3cd55d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-20", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1094387/i-hunt-sys-admins.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/", + "pubdate": "2014-03-20" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/03/20/hunt-sys-admins/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "i-hunt-sys-admins.pdf", + "name": "2014-03-20_ffe460f5_i-hunt-sys-admins.pdf", + "digest": "ffe460f51d3762447b69d4e8126b247cfc2a553a8bd9f9f916e3fe0216193dd4" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-21", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1094526/babarfull.pdf", + "accomp_articles": [ + { + "url": "http://www.lemonde.fr/international/article/2014/03/21/la-france-suspectee-de-cyberattaque_4387232_3210.html", + "pubdate": "2014-03-21" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "babarfull.pdf", + "name": "2014-03-21_48c30d12_babarfull.pdf", + "digest": "48c30d12164ffc65f66960d344eb8d3a085250a1222db9cde62731b1e78d6cd2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-22", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1094880/huawei-powerpoint-slides.pdf", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html", + "pubdate": "2014-03-22" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2014/03/23/world/asia/23nsa-docs.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "huawei-powerpoint-slides.pdf", + "name": "2014-03-22_35e93992_huawei-powerpoint-slides.pdf", + "digest": "35e9399201db67e343e6c92dbb8bc6f2afb237f7596c134c3e739c1581f62c2e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-29", + "url": "http://cdn1.spiegel.de/images/image-677028-galleryV9-fmkg.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/gchq-and-nsa-targeted-private-german-companies-a-961444.html", + "pubdate": "2014-03-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/germany/bild-961444-677028.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-677028-galleryV9-fmkg.jpg", + "name": "2014-03-29_eb8a8710_image-677028-galleryV9-fmkg.jpg", + "digest": "eb8a87108bc6b7af8e9c339e5c004d3fc2171eebdacf9a3831c03b4a09f4e2d6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-03-29", + "url": "http://cdn2.spiegel.de/images/image-677389-galleryV9-etgq.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/gchq-and-nsa-targeted-private-german-companies-a-961444.html", + "pubdate": "2014-03-29" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/international/germany/bild-961444-677389.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-677389-galleryV9-etgq.jpg", + "name": "2014444-03-29_0d8fedc4_image-677389-galleryV9-etgq.jpg", + "digest": "0d8fedc429ad10a6692917c99f0802344fdd47677229366dfd0110588f5ae51a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-04-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1102569/2009-sigdev-conference.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/04/04/cuban-twitter-scam-social-media-tool-disseminating-government-propaganda/", + "pubdate": "2014-04-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/04/04/2009-sigdev-conference/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "2009-sigdev-conference.pdf", + "name": "2014-04-04_76b7df67_2009-sigdev-conference.pdf", + "digest": "76b7df6744aee47addd65f666843ad910472b544e1cec2610097b29f967bd7e7" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-04-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1102570/full-spectrum-cyber-effects-final.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/04/04/cuban-twitter-scam-social-media-tool-disseminating-government-propaganda/", + "pubdate": "2014-04-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/04/04/full-spectrum-cyber-effects/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "full-spectrum-cyber-effects-final.pdf", + "name": "2014-04-04_a78bb5b6_full-spectrum-cyber-effects-final.pdf", + "digest": "a78bb5b6643d0a0891c9d17cb947690d4626b4a58683e3b4263b28de6bd0e65e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-04-26", + "url": "http://gfx.dagbladet.no/labrador/329/329975/32997543/jpg/active/480x.jpg", + "accomp_articles": [ + { + "url": "http://www.dagbladet.no/2014/04/26/nyheter/snowden_i_norge/edward_snowden/nsa/etterretningstjenesten/32991102/", + "pubdate": "2014-04-26" + } + ], + "alternative_files": [], + "presentation_url": "http://www.dagbladet.no/2014/04/26/nyheter/snowden_i_norge/edward_snowden/nsa/etterretningstjenesten/32991102/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "480x.jpg", + "name": "2014-04-26_b5e9aeb6_480x.jpg", + "digest": "b5e9aeb6f04adffe76bff82d0d72ed1c68fa778ca0012c5bba2c010f5942c282" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-04-26", + "url": "http://gfx.dagbladet.no/labrador/329/329975/32997556/jpg/active/729x.jpg", + "accomp_articles": [ + { + "url": "http://www.dagbladet.no/2014/04/26/nyheter/snowden_i_norge/edward_snowden/nsa/etterretningstjenesten/32991102/", + "pubdate": "2014-04-26" + } + ], + "alternative_files": [], + "presentation_url": "http://www.dagbladet.no/2014/04/26/nyheter/snowden_i_norge/edward_snowden/nsa/etterretningstjenesten/32991102/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "729x.jpg", + "name": "2014-04-26_ccaadfde_729x.jpg", + "digest": "ccaadfde31275e0bb34730352a127b8c6d2a21d6a67368cd742c64479faa88f1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-04-26", + "url": "http://gfx.dagbladet.no/labrador/329/329975/32997561/jpg/active/729x.jpg", + "accomp_articles": [ + { + "url": "http://www.dagbladet.no/2014/04/26/nyheter/snowden_i_norge/edward_snowden/nsa/etterretningstjenesten/32991102/", + "pubdate": "2014-04-26" + } + ], + "alternative_files": [], + "presentation_url": "http://www.dagbladet.no/2014/04/26/nyheter/snowden_i_norge/edward_snowden/nsa/etterretningstjenesten/32991102/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "729x.jpg", + "name": "2014-04-26_9b21454e_729x.jpg", + "digest": "9b21454ed05e6594f818ff1b65a9fb50bc744553be99172cec1e3e8929bb5ead" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-04-30", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1150433/lobban-nsa-visit-precis.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/04/30/gchq-prism-nsa-fisa-unsupervised-access-snowden/", + "pubdate": "2014-04-30" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/04/30/lobban-nsa-visit-precis/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "lobban-nsa-visit-precis.pdf", + "name": "2014-04-30_9f8a5de6_lobban-nsa-visit-precis.pdf", + "digest": "9f8a5de6659c2b86681d191503c3ace5e1e7193e5bb350a6813831ae6f7ef6fe" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-04-30", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1150434/prism-olympic-option.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/04/30/gchq-prism-nsa-fisa-unsupervised-access-snowden/", + "pubdate": "2014-04-30" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/04/30/prism-olympic-option/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "prism-olympic-option.pdf", + "name": "2014-04-30_cd4e5a85_prism-olympic-option.pdf", + "digest": "cd4e5a8571eff44f9b517a820d06a145b9658d88ead497f6b6f5065d9d915d0a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-04-30", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1150436/ghostmachine-identifier-lead-triage-with-echobase.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/04/30/gchq-prism-nsa-fisa-unsupervised-access-snowden/", + "pubdate": "2014-04-30" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/04/30/ghostmachine-identifier-lead-triage-echobase", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "ghostmachine-identifier-lead-triage-with-echobase.pdf", + "name": "2014-04-30_5a3fffc3_ghostmachine-identifier-lead-triage-with-echobase.pdf", + "digest": "5a3fffc3563686b5f39974f65e0e1930c2a852b2b6a0e25eb81a22e2e72eff44" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-05-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1164079/02may2013-sso.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/", + "pubdate": "2014-05-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/05/19/sso-may-2-2013/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "02may2013-sso.pdf", + "name": "2014-05-19_cf8e1939_02may2013-sso.pdf", + "digest": "cf8e1939cd527e3f72c2ab789264ec7eccc07e9a867b2b60ce92eeb95c9c76e7" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-05-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1164080/03may2013-sso-mystic.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/", + "pubdate": "2014-05-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/05/19/sso-may-3-2013-mystic/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "03may2013-sso-mystic.pdf", + "name": "2014-05-19_a2f82383_03may2013-sso-mystic.pdf", + "digest": "a2f8238333a77a58441aa0f916939076687cd1269a539132a8676564c2623ca2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-05-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1164081/03may2013-sso.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/", + "pubdate": "2014-05-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/05/19/sso-may-3-2012/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "03may2013-sso.pdf", + "name": "2014-05-19_47b09a56_03may2013-sso.pdf", + "digest": "47b09a56bda64a28e143ee53bc5e9ea0ad0f29b18f67bdb881468767c9f4991f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-05-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1164082/14mar2013-sso.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/", + "pubdate": "2014-05-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/05/19/sso-march-14-2013/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "14mar2013-sso.pdf", + "name": "2014-05-19_bf7e6a0c_14mar2013-sso.pdf", + "digest": "bf7e6a0c8e0deef474ab1156dfff68d0228bd34321884b47ead1d7d54de0fd71" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-05-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1164083/18april2013-sso-whats-new.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/", + "pubdate": "2014-05-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/05/19/sso-april-18-2013-whats-new/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "18april2013-sso-whats-new.pdf", + "name": "2014-05-19_c2247f16_18april2013-sso-whats-new.pdf", + "digest": "c2247f169b310c7cfc49b8426191aa1d0e7ff66b55e3180bd0ecb15275dd4bcf" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-05-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1164084/black-budget.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/", + "pubdate": "2014-05-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/05/19/black-budget/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "black-budget.pdf", + "name": "2014-05-19_dca30c54_black-budget.pdf", + "digest": "dca30c5427b5c9edec22f55c90fad8dae204b5d78f134d7b6d898a00de41a27b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-05-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1164085/sidtoday-dea-the-other-warfighter.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/", + "pubdate": "2014-05-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/05/19/sidtoday-dea-warfighter/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sidtoday-dea-the-other-warfighter.pdf", + "name": "2014-05-19_8f0aaf5d_sidtoday-dea-the-other-warfighter.pdf", + "digest": "8f0aaf5dc7a778ce1b81545c6a8e196ad555cb319d019539440278415098a04c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-05-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1164086/sso-dictionary-excerpt.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/", + "pubdate": "2014-05-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/05/19/sso-dictionary-excerpt/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sso-dictionary-excerpt.pdf", + "name": "2014-05-19_cb26ec5b_sso-dictionary-excerpt.pdf", + "digest": "cb26ec5b939d637778d27471a6d8948e7439a236f89f8ba41b2b45222b18c7b9" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-05-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1164087/mystic.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/", + "pubdate": "2014-05-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/05/19/mystic/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "mystic.pdf", + "name": "2014-05-19_25f3847e_mystic.pdf", + "digest": "25f3847e4589a1cb58eb0c5556bb5a2e1304f86ca70ffa1f571308acb33f232e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-05-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1164088/somalget.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/", + "pubdate": "2014-05-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/05/19/somalget-memo/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "somalget.pdf", + "name": "2014-05-19_3c08d3ec_somalget.pdf", + "digest": "3c08d3ec24d76d67be6b2e574659fb60286d260aefc2f35d10087e132f577745" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-05-31", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1175482/identity-intelligence.pdf", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-web-images.html", + "pubdate": "2014-05-31" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2014/06/01/us/nsa-document.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "identity-intelligence.pdf", + "name": "2014-05-31_fc3728e0_identity-intelligence.pdf", + "digest": "fc3728e0dbe4ab8627c25ffcfd601fc89fba29e89f42a849ddb1fe6b5b1c1c6b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34044.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34044.pdf", + "name": "2014-06-18_49c7a8ce_media-34044.pdf", + "digest": "49c7a8ceebabc23a06750fb4b0267687dd78a1d4f8017a2bf857e125b214fa58" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34045.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34045.pdf", + "name": "2014-06-18_e51938e7_media-34045.pdf", + "digest": "e51938e7748d407d528ffa8857b318a2a461ca913075824ed494e7219df06a16" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34046.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34046.pdf", + "name": "2014-06-18_db9e4218_media-34046.pdf", + "digest": "db9e421892bd0c38f80d91cdc6a1dfd436d39a99f3219fc96531ec4ca5289222" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34050.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34050.pdf", + "name": "2014-06-18_f86bddb5_media-34050.pdf", + "digest": "f86bddb551a6ee17bce39093f37e6584d825947b1e301b72715bc2c0e7038c10" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34051.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34051.pdf", + "name": "2014-06-18_3fd3de92_media-34051.pdf", + "digest": "3fd3de9267c5ac4d9b32943f5db9e2214f7cf70d9262f969a81e72fab6ca0261" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34053.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34053.pdf", + "name": "2014-06-18_841e1dc8_media-34053.pdf", + "digest": "841e1dc816b6251271b30e09cf727b2f0858b9bb0e3df97149fe2b7ae2bc7142" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34054.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34054.pdf", + "name": "2014-06-18_94f5c4ba_media-34054.pdf", + "digest": "94f5c4ba5f89eb23bfb1b2aacbcb1438d1b37ed17ebe59ac69c1e5f1135805fd" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34055.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34055.pdf", + "name": "2014-06-18_7240abc1_media-34055.pdf", + "digest": "7240abc138174c3b6cc8e542a38e6ab725f67c7e77d111fa8f30dc8dba809066" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34056.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34056.pdf", + "name": "2014-06-18_a7654aba_media-34056.pdf", + "digest": "a7654aba93622fe9bab4e472a57206a6ef49ab3eda7474005d00b5bdf8b7882a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34058.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34058.pdf", + "name": "2014-06-18_19d4072c_media-34058.pdf", + "digest": "19d4072c96f8b7cff667d7cb0a0df28ffa62563e8359cd617a35f86d69f135b8" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34059.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34059.pdf", + "name": "2014-06-18_dd1f5efe_media-34059.pdf", + "digest": "dd1f5efec96d097c30a44af3ed2143cac0553de4cfc306c43b4fe73c6d8050de" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34060.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34060.pdf", + "name": "2014-06-18_9481818b_media-34060.pdf", + "digest": "9481818b5795022fe5ee97b5d438a37736fc2f87166ddf614d99a9038c8b2b55" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34061.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34061.pdf", + "name": "2014-06-18_173c0fcb_media-34061.pdf", + "digest": "173c0fcbb86d70304342badb283b0a982e535dc9a765af0487d99200b7aa7ed2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34062.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34062.pdf", + "name": "2014-06-18_9aec5428_media-34062.pdf", + "digest": "9aec54285ff325ba559df07c664813de89b4cd949578dfceb050bdc129f2fcac" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34064.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34064.pdf", + "name": "2014-06-18_9c32a045_media-34064.pdf", + "digest": "9c32a0450a3a57f304df365647ddd674d0aa3c7f27455eb0de987624d152a453" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34067.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34067.pdf", + "name": "2014-06-18_3ed4acda_media-34067.pdf", + "digest": "3ed4acda87a20eddb7ff98125b2ea8e8889d8f6d0233c35a6f737be6b6b08570" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34070.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34070.pdf", + "name": "2014-06-18_d5a4c78e_media-34070.pdf", + "digest": "d5a4c78e629189a94007a9618df962aa6a7c282950dd974e36bfb2b4ddd56fd0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34072.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34072.pdf", + "name": "2014-06-18_56513755_media-34072.pdf", + "digest": "5651375546ff273e9b67d340b199860f6784f2f47f3380a366b01c8349b17954" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34074.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34074.pdf", + "name": "2014-06-18_cf87a049_media-34074.pdf", + "digest": "cf87a049f8b45ed7e2233683f102a053ced6ddba63f2fecc81513487ac2e7296" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34076.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34076.pdf", + "name": "2014-06-18_f739ba63_media-34076.pdf", + "digest": "f739ba637b18afa7b2a9a2d61e6a52a41f71e28355f9bd309be57eeebb33b00b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34077.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34077.pdf", + "name": "2014-06-18_2f709cfb_media-34077.pdf", + "digest": "2f709cfb371000405d9fda54dc236aeea973d4d3b62cc6e46c68af0eef0dc4d0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34078.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34078.pdf", + "name": "2014-06-18_d6b8b4ab_media-34078.pdf", + "digest": "d6b8b4ab969990895fbf9d01c4373b54afa990042c6f986da06176715efbb722" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34079.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34079.pdf", + "name": "2014-06-18_90bc647b_media-34079.pdf", + "digest": "90bc647bbbd5e321ae259a040373b3c802cbcc1e724e89eea7819761fc6e9c12" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34080.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34080.pdf", + "name": "2014-06-18_c352f730_media-34080.pdf", + "digest": "c352f730fa8d1e274b8cda4cd5a6be4c862fde40206eba246f0fb3630c8e8b83" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34081.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34081.pdf", + "name": "2014-06-18_326e7eb9_media-34081.pdf", + "digest": "326e7eb9dd57bdcba2fb51c7dc1152183e0dbb80eb75d2bb445fc639aa371b50" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34082.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34082.pdf", + "name": "2014-06-18_2bd1ee4d_media-34082.pdf", + "digest": "2bd1ee4df85a8acff6346aff9c7b1299f86b29b29aec4fe741e3ad4a5517ab9b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34083.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34083.pdf", + "name": "2014-06-18_8c3da4c1_media-34083.pdf", + "digest": "8c3da4c18805ad75f67e4f0cf7b6b9460a42a5da1b323774cac6727d64519b55" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34084.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34084.pdf", + "name": "2014-06-18_456945c9_media-34084.pdf", + "digest": "456945c943ffa12eae7a84bf002d386c128e2e1ae77ca46eb89d26a293c3a8fb" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34085.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34085.pdf", + "name": "2014-06-18_0d3f1bb9_media-34085.pdf", + "digest": "0d3f1bb9e50a168aa3c1b442c383f562eba0307bdc7d2b3c5d16e1c032beade6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34086.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34086.pdf", + "name": "2014-06-18_a44562cf_media-34086.pdf", + "digest": "a44562cf549051913ff4044b4094df1d86d95661587f2d9b45ba3a23b2322749" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34087.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34087.pdf", + "name": "2014-06-18_7739e7fd_media-34087.pdf", + "digest": "7739e7fd0a6e8fedbe2e089567c2b9a075352212d1e9583ab6568a929c422995" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34088.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34088.pdf", + "name": "2014-06-18_d46f1b3f_media-34088.pdf", + "digest": "d46f1b3f1c3b9a894191f0836b9a0fe8094faea7fff59915ec6423f7ee980ea7" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34089.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34089.pdf", + "name": "2014-06-18_0cbdeee7_media-34089.pdf", + "digest": "0cbdeee72f36e9126918a966f7bec15d15e1cf04f728c16efefac7fa2557a1ca" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34090.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34090.pdf", + "name": "2014-06-18_338ee1fe_media-34090.pdf", + "digest": "338ee1feeecb4ec036000d89f1b23e10b849a0bb73730cd57dec2f25205d9c8e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34091.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34091.pdf", + "name": "2014-06-18_e19fb0b7_media-34091.pdf", + "digest": "e19fb0b74cfcbdb313c0fc5bce50ce9e21ec8acb5b413db8444adeea37eee16f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34092.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34092.pdf", + "name": "2014-06-18_ef7836df_media-34092.pdf", + "digest": "ef7836df6a424239de3bd979ec0a32504a3fe330dd95d5f048d4f7b660d56d23" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34093.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34093.pdf", + "name": "2014-06-18_27fef6d1_media-34093.pdf", + "digest": "27fef6d1165176cb0ba97fa62b476c4b4b9e32d51c563384e041e47b9203f77e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34094.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34094.pdf", + "name": "2014-06-18_d9743be7_media-34094.pdf", + "digest": "d9743be7c5510c1b2b7432e437796a2426cb2e127098060fbe479ea63c43a22e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34095.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34095.pdf", + "name": "2014-06-18_b33c477a_media-34095.pdf", + "digest": "b33c477a4afe72cb9d23c19f535af1e132845fb83799daff4fe915f7ca9155b7" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34096.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34096.pdf", + "name": "2014-06-18_767dfed4_media-34096.pdf", + "digest": "767dfed4d8b014f8eef877b1f0245a4651814e1787a6b18f1e4502848458861c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34097.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34097.pdf", + "name": "2014-06-18_36bf9419_media-34097.pdf", + "digest": "36bf941916e98ceff84838fae891d907ea22657d36c5017effb86311bf958b80" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34098.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34098.pdf", + "name": "2014-06-18_f44e7904_media-34098.pdf", + "digest": "f44e79044c044129a5334ae3c20ff047611f7823fa25153954d0a4e4aeb78765" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34099.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34099.pdf", + "name": "2014-06-18_a0eb2219_media-34099.pdf", + "digest": "a0eb221928d57abc593b0dda715a4a24a985edea6c6170760f423df29929ce5d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34100.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34100.pdf", + "name": "2014-06-18_ef8f7e7d_media-34100.pdf", + "digest": "ef8f7e7d502877972eb2951a7e89eaf9f9ac0a8054eb00aa2a924dabd7799ce8" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34101.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34101.pdf", + "name": "2014-06-18_f986c8c8_media-34101.pdf", + "digest": "f986c8c80987dddbfd252e3638e6b033e1461b2d293955bf5b18c72cec073905" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34102.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34102.pdf", + "name": "2014-06-18_f7b35c31_media-34102.pdf", + "digest": "f7b35c31beae15ed77640b0fd1cf33b89be8763116f32620634b31269246a27b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34103.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34103.pdf", + "name": "2014-06-18_94204df6_media-34103.pdf", + "digest": "94204df6b2141f666c6974381cce9a7f07266b0f571218005084ca03abde29bd" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34104.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34104.pdf", + "name": "2014-06-18_7f83600b_media-34104.pdf", + "digest": "7f83600b570e7c660821fb05b911a7e35925292c889b72c1b8d6b89fd26dde9d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34105.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34105.pdf", + "name": "2014-06-18_ef7ed461_media-34105.pdf", + "digest": "ef7ed46170b6d6e1f454f3f63aeb985819c2b8223198fb55242bd4f21a83a06c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34116.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34116.pdf", + "name": "2014-06-18_a2f2556d_media-34116.pdf", + "digest": "a2f2556dc34bd152e7a3ae9f3d70bb9afd3fd032a579d38c0522c6f3c7027e6f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34117.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34117.pdf", + "name": "2014-06-18_148cd97a_media-34117.pdf", + "digest": "148cd97ac1fb86173df600438ea7193fb6242debb536640ac92df5d4859f0c5f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34118.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34118.pdf", + "name": "2014-06-18_38e5eb4d_media-34118.pdf", + "digest": "38e5eb4d55914f41a93e8c986e1dece70926fc3802d6270b363bfe932d8e3903" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-18", + "url": "http://www.spiegel.de/media/media-34119.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html", + "pubdate": "2014-06-18" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34119.pdf", + "name": "2014-06-18_2c3e7325_media-34119.pdf", + "digest": "2c3e73255dd7045399012765ecfb93b3a5260f448c9ec067d7e4fd49803ea8a8" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1200859/diropeningremarksguidancefordp1-v1-1-v1-0.pdf", + "accomp_articles": [ + { + "url": "http://www.information.dk/501280", + "pubdate": "2014-06-19" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "diropeningremarksguidancefordp1-v1-1-v1-0.pdf", + "name": "2014-06-19_5402b783_diropeningremarksguidancefordp1-v1-1-v1-0.pdf", + "digest": "5402b783febf840120511d1d02d6dbbb98a57aad7b7bd304f7048d5917678b56" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1200860/odd-s3-overviewnov2011-v1-0-redacted-information.pdf", + "accomp_articles": [ + { + "url": "http://www.information.dk/501280", + "pubdate": "2014-06-19" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/1200860-odd-s3-overviewnov2011-v1-0-redacted-information.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "odd-s3-overviewnov2011-v1-0-redacted-information.pdf", + "name": "2014-06-19_ef27fb96_odd-s3-overviewnov2011-v1-0-redacted-information.pdf", + "digest": "ef27fb96c997e3012f8e5a34e970ffdf563ef4b4f7b99078fc02111858d2186f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1200864/tssinframpartaoverview-v1-0-redacted-information.pdf", + "accomp_articles": [ + { + "url": "http://www.information.dk/501280", + "pubdate": "2014-06-19" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "tssinframpartaoverview-v1-0-redacted-information.pdf", + "name": "2014-06-19_52a36c94_tssinframpartaoverview-v1-0-redacted-information.pdf", + "digest": "52a36c94147d15161735d4f03ab87d5d7f99a9220b5a4e998f8a4d9046943013" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1200865/uodds2overview-v1-1-redacted-information-dk.pdf", + "accomp_articles": [ + { + "url": "http://www.information.dk/501280", + "pubdate": "2014-06-19" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/1200865-uodds2overview-v1-1-redacted-information-dk.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "uodds2overview-v1-1-redacted-information-dk.pdf", + "name": "2014-06-19_1c40618e_uodds2overview-v1-1-redacted-information-dk.pdf", + "digest": "1c40618ef37935afcdf306b35bbd3ae2fa417b478cf912fc1fda461a0d070f2f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1200866/foreignpartneraccessbudgetfy2013-redacted.pdf", + "accomp_articles": [ + { + "url": "http://www.information.dk/501280", + "pubdate": "2014-06-19" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "foreignpartneraccessbudgetfy2013-redacted.pdf", + "name": "2014-06-19_e401e51c_foreignpartneraccessbudgetfy2013-redacted.pdf", + "digest": "e401e51cc07f3557c4cebab76265b20fe4b0acf7d2d61b4bf3237bb11a36f7b7" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-30", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1211012/faa-fg-cert-2010-a-dni-ag-certification.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/court-gave-nsa-broad-leeway-in-surveillance-documents-show/2014/06/30/32b872ec-fae4-11e3-8176-f2c941cf35f1_story.html", + "pubdate": "2014-06-30" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/dni-attorney-general-certify-surveillance-targets-will-be-reasonably-believed-to-be-outside-united-states/1134/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "faa-fg-cert-2010-a-dni-ag-certification.pdf", + "name": "2014-06-30_eea4ee44_faa-fg-cert-2010-a-dni-ag-certification.pdf", + "digest": "eea4ee444ccdd7590de691285fc8c7baab21d2c0cd8bce5aade5c7a7e6de4712" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-30", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1211013/faa-fg-cert-2010-a-nsa-dirnsa-affidavit-training.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/court-gave-nsa-broad-leeway-in-surveillance-documents-show/2014/06/30/32b872ec-fae4-11e3-8176-f2c941cf35f1_story.html", + "pubdate": "2014-06-30" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/nsa-directors-affidavit-on-foreign-surveillance/1135/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "faa-fg-cert-2010-a-nsa-dirnsa-affidavit-training.pdf", + "name": "2014-06-30_de5eb1d3_faa-fg-cert-2010-a-nsa-dirnsa-affidavit-training.pdf", + "digest": "de5eb1d37c726045992c2350ae82e025c780126512f98900c9615c2ef4c988d1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-30", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1211014/faa-lesson-1c-faa-section-702-summary-by-ogc.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/court-gave-nsa-broad-leeway-in-surveillance-documents-show/2014/06/30/32b872ec-fae4-11e3-8176-f2c941cf35f1_story.html", + "pubdate": "2014-06-30" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/fisa-amendments-act-of-2008-section-702-summary-document/1141/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "faa-lesson-1c-faa-section-702-summary-by-ogc.pdf", + "name": "2014-06-30_c069e8d5_faa-lesson-1c-faa-section-702-summary-by-ogc.pdf", + "digest": "c069e8d578240bc3098de4236c7fdfe252f0f2bdb89facfbea76f0a2bb3e51f2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-30", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1211015/faa-fg-cert-2010-a-exhibit-f-foreign-power-list.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/court-gave-nsa-broad-leeway-in-surveillance-documents-show/2014/06/30/32b872ec-fae4-11e3-8176-f2c941cf35f1_story.html", + "pubdate": "2014-06-30" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/list-of-foreign-governments-and-organizations-authorized-for-surveillance/1133/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "faa-fg-cert-2010-a-exhibit-f-foreign-power-list.pdf", + "name": "2014-06-30_34492cce_faa-fg-cert-2010-a-exhibit-f-foreign-power-list.pdf", + "digest": "34492cceaf43416b8b8be3a9b6efeb7315e9203293d4b7d03c04b3bcec5050fc" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-30", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1211016/faa-fg-cert-2010-a-court-order-plbunts-shared.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/court-gave-nsa-broad-leeway-in-surveillance-documents-show/2014/06/30/32b872ec-fae4-11e3-8176-f2c941cf35f1_story.html", + "pubdate": "2014-06-30" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/fisa-judges-order-authorizing-surveillance-of-foreign-governments-and-organizations/1132/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "faa-fg-cert-2010-a-court-order-plbunts-shared.pdf", + "name": "2014-06-30_4a01b358_faa-fg-cert-2010-a-court-order-plbunts-shared.pdf", + "digest": "4a01b35808a4c4528c3528684626f706faec958e66bcde3f40d1fb05a2417f45" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-06-30", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1211050/targeting-2nd-party-countries.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/court-gave-nsa-broad-leeway-in-surveillance-documents-show/2014/06/30/32b872ec-fae4-11e3-8176-f2c941cf35f1_story.html", + "pubdate": "2014-06-30" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/page/world/nsa-document-on-targeting-five-eyes-countries-and-territories/1142/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "targeting-2nd-party-countries.pdf", + "name": "2014-06-30_83179923_targeting-2nd-party-countries.pdf", + "digest": "8317992394eccbc871cff24224d2bf26a041052123cbc85006d6bad009aee7ad" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-07-05", + "url": "https://img.washingtonpost.com/rw/2010-2019/WashingtonPost/2014/07/05/National-Security/Images/fisa03201404590770.jpg", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-who-are/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html", + "pubdate": "2014-07-05" + } + ], + "alternative_files": [], + "presentation_url": "http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-who-are/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "fisa03201404590770.jpg", + "name": "2014-07-05_325dd3f1_fisa03201404590770.jpg", + "digest": "325dd3f180fce2a2338f04c51beb6a749ba501f32f1bc5db52266ade2ada0de5" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-07-05", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1212760/ordinary-web-users-far-outnumber-foreign-targets.pdf", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-who-are/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html", + "pubdate": "2014-07-05" + } + ], + "alternative_files": [], + "presentation_url": "http://apps.washingtonpost.com/g/documents/world/ordinary-web-users-far-outnumber-foreign-targets-in-conversations-intercepted-by-the-nsa/1091/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "ordinary-web-users-far-outnumber-foreign-targets.pdf", + "name": "2014-07-05_db469be6_ordinary-web-users-far-outnumber-foreign-targets.pdf", + "digest": "db469be6b7bddf30640bdf2e89b4345e66880bb6e8a132a8d9d0707951960233" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-07-09", + "url": "https://prod01-cdn00.cdn.firstlook.org/wp-uploads/sites/1/2014/06/agha.jpg", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/07/09/under-surveillance/", + "pubdate": "2014-07-09" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/07/09/under-surveillance/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "agha.jpg", + "name": "2014-07-09_7f88f6b6_agha.jpg", + "digest": "7f88f6b6bbe634427443d08751fa52b1471c7a1f77a8e5f4b0316eb42c95a043" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-07-09", + "url": "https://prod01-cdn00.cdn.firstlook.org/wp-uploads/sites/1/2014/06/raghead1.jpg", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/07/09/under-surveillance/", + "pubdate": "2014-07-09" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/07/09/under-surveillance/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "raghead1.jpg", + "name": "2014-07-09_4c6723f1_raghead1.jpg", + "digest": "4c6723f1d8f0c5e1b7b30a15d02e804981e867fb72b483f0a2ddf6fcbce52f0d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-07-09", + "url": "https://prod01-cdn01.cdn.firstlook.org/wp-uploads/sites/1/2014/06/asim.jpg", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/07/09/under-surveillance/", + "pubdate": "2014-07-09" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/07/09/under-surveillance/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "asim.jpg", + "name": "2014-07-09_fb93264d_asim.jpg", + "digest": "fb93264d24f98ef769a2dcd2fa14908ff88d47d0cb7e295ca030b2881c69911a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-07-09", + "url": "https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2014/06/faisal.jpg", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/07/09/under-surveillance/", + "pubdate": "2014-07-09" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/07/09/under-surveillance/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "faisal.jpg", + "name": "2014-07-09_783615ec_faisal.jpg", + "digest": "783615ece5b0500c979ae4dd9b8e9c252a4093c85654451c6b86d6566f247f5a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-07-09", + "url": "https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2014/06/nihad.jpg", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/07/09/under-surveillance/", + "pubdate": "2014-07-09" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/07/09/under-surveillance/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nihad.jpg", + "name": "2014-07-09_77a8c458_nihad.jpg", + "digest": "77a8c458c469dbd3b0ad09c5228b5fae60d8627d7ec8953d2a8f9ace8b976794" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-07-09", + "url": "https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2014/07/namesgrabredacted.jpg", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/07/09/under-surveillance/", + "pubdate": "2014-07-09" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/07/09/under-surveillance/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "namesgrabredacted.jpg", + "name": "2014-07-09_908ae1ef_namesgrabredacted.jpg", + "digest": "908ae1efb0fee0ef1815124a0b5a7b8a26abd24b545429539a26cfb507f665b8" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-07-09", + "url": "https://prod01-cdn03.cdn.firstlook.org/wp-uploads/sites/1/2014/06/hooshang.jpg", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/07/09/under-surveillance/", + "pubdate": "2014-07-09" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/07/09/under-surveillance/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "hooshang.jpg", + "name": "2014-07-09_259cdf72_hooshang.jpg", + "digest": "259cdf7226e08ccccc56c74a1de7f23d8c0d9e9bf16e8766468cdeb6db54bcd3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-07-09", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1213555/slide-redacted.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/07/09/under-surveillance/", + "pubdate": "2014-07-09" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/07/08/fisa-dataflow/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "slide-redacted.pdf", + "name": "2014-07-09_b688c463_slide-redacted.pdf", + "digest": "b688c463d09b52c9cfca8b45c70aeb7b796cacaded9b76c5b76a61b8bc1996b9" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-07-14", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1217406/jtrigall.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/", + "pubdate": "2014-07-14" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/07/14/jtrig-tools-techniques/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "jtrigall.pdf", + "name": "2014-07-14_be14a752_jtrigall.pdf", + "digest": "be14a752c77880df86aa964762474f0ac573bbc58b398f58fd8740a0f894fd17" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-07-23", + "url": "https://img.washingtonpost.com/blogs/the-switch/files/2014/07/12333flowchart.jpg", + "accomp_articles": [ + { + "url": "http://www.washingtonpost.com/blogs/the-switch/wp/2014/07/23/privacy-watchdogs-next-target-the-least-known-but-biggest-aspect-of-nsa-surveillance/", + "pubdate": "2014-07-23" + } + ], + "alternative_files": [], + "presentation_url": "http://www.washingtonpost.com/blogs/the-switch/wp/2014/07/23/privacy-watchdogs-next-target-the-least-known-but-biggest-aspect-of-nsa-surveillance/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "12333flowchart.jpg", + "name": "2014-07-23_c1f5db8b_12333flowchart.jpg", + "digest": "c1f5db8b10b4b7af21e8a99de0b8675a0c42ed50dc26eada3dc0c48015853aeb" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-07-25", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1236112/saudi-arabia-information-paper.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/07/25/nsas-new-partner-spying-saudi-arabias-brutal-state-police/", + "pubdate": "2014-07-25" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/07/25/saudi-arabia-information-paper/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "saudi-arabia-information-paper.pdf", + "name": "2014-07-25_67798095_saudi-arabia-information-paper.pdf", + "digest": "6779809517ecc50b95821234e84720656d9b99f1210932be1298c19c57e92954" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-04", + "url": "https://prod01-cdn01.cdn.firstlook.org/wp-uploads/sites/1/2014/08/israel_receipt1.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/04/cash-weapons-surveillance/", + "pubdate": "2014-08-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/08/04/cash-weapons-surveillance/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "israel_receipt1.png", + "name": "2014-08-04_9b346633_israel_receipt1.png", + "digest": "9b34663324a2b0d92083babfcdb52a4bce462041e64eb013112fd5cffd9b9670" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-04", + "url": "https://prod01-cdn01.cdn.firstlook.org/wp-uploads/sites/1/2014/08/israel_receipt2.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/04/cash-weapons-surveillance/", + "pubdate": "2014-08-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/08/04/cash-weapons-surveillance/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "israel_receipt2.png", + "name": "2014-08-04_75dc4fdc_israel_receipt2.png", + "digest": "75dc4fdc71f8629bc16dc32abd03d79dcf96c138d8a45c985aab91aff2e82b45" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-04", + "url": "https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2014/08/GCHQ_PSAF_edited.jpg", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/04/cash-weapons-surveillance/", + "pubdate": "2014-08-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/08/04/cash-weapons-surveillance/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "GCHQ_PSAF_edited.jpg", + "name": "2014-08-04_595bf3d4_GCHQ_PSAF_edited.jpg", + "digest": "595bf3d405e8f3b67fb798b70f59d390ae777b13a6444d731c9d381e0c52c860" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-04", + "url": "https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2014/08/israel.jpg", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/04/cash-weapons-surveillance/", + "pubdate": "2014-08-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/08/04/cash-weapons-surveillance/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "israel.jpg", + "name": "2014-08-04_b161ac4b_israel.jpg", + "digest": "b161ac4bfc2218c9a2a4b5210f0e1daf2d4faef7fce651cfe63770cdbe4e7fe6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1240001/israel-us-1999-agreement.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/04/cash-weapons-surveillance/", + "pubdate": "2014-08-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/03/israel-us-1999-agreement/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "israel-us-1999-agreement.pdf", + "name": "2014-08-04_497d5948_israel-us-1999-agreement.pdf", + "digest": "497d5948bb79850da3de32dbfd33a00ab515aca7a683e971905d63d6347a06e0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1240002/nsa-intelligence-relationship-with-israel-april.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/04/cash-weapons-surveillance/", + "pubdate": "2014-08-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/03/nsa-intelligence-relationship-israel/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-intelligence-relationship-with-israel-april.pdf", + "name": "2014-08-04_c3834bfc_nsa-intelligence-relationship-with-israel-april.pdf", + "digest": "c3834bfc7adc9e8d839da5d2128425a264b65ea2771158803601b9b8f6ed9ab5" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-12", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1273603/gchq-covert-mobile-phones-policy.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/12/nprs-dina-temple-raston-passed-cia-funded-nsa-contractor-independent-fear-monger-snowden-reporting/", + "pubdate": "2014-08-12" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/12/gchq-covert-mobile-phones-policy/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gchq-covert-mobile-phones-policy.pdf", + "name": "2014-08-12_22a27a6f_gchq-covert-mobile-phones-policy.pdf", + "digest": "22a27a6fbfc30373f42460097092833635381c34d5088d9b4f0706a742591fe6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://1.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung03-07abce3ee1863e4b.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=2", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung03-07abce3ee1863e4b.png", + "name": "2014-08-15_7825740b_Abbildung03-07abce3ee1863e4b.png", + "digest": "7825740b4de1976293479a980428d82a34b99bb069a319e083c4d42f5ad8d7b8" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://1.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung04-64d4254cbde88a8e.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=3", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung04-64d4254cbde88a8e.png", + "name": "2014-08-15_3e633f10_Abbildung04-64d4254cbde88a8e.png", + "digest": "3e633f10471e506c87177ad7c6abc5f93374335bb0fd7c8af7939464db80f9ee" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://1.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung05-15bc2ad35ac1702a.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=4", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung05-15bc2ad35ac1702a.png", + "name": "2014-08-15_89709e94_Abbildung05-15bc2ad35ac1702a.png", + "digest": "89709e941160299d352002f01e63392efd32f6244e517036bc182f1b86e0f756" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://1.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung09-ac51d29297309215.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=8", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung09-ac51d29297309215.png", + "name": "2014-08-15_7f8e47c0_Abbildung09-ac51d29297309215.png", + "digest": "7f8e47c038944195c6985b39e2aaaf08a28b6339ee07172a9db275274ec124f2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://1.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung10-3fb6ba214cddf334.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=9", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung10-3fb6ba214cddf334.png", + "name": "2014-08-15_02b18a30_Abbildung10-3fb6ba214cddf334.png", + "digest": "02b18a307dfe0616979cb3c071792aca9855e80e92b6d924f5b3a5e28381fb4d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://1.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung12-2d5686157fc14696.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=11", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung12-2d5686157fc14696.png", + "name": "2014-08-15_16cc02a3_Abbildung12-2d5686157fc14696.png", + "digest": "16cc02a301d4af98191b36a3f43ddce63f0fa81a63481c6fdc7b66a85b6743cc" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://1.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung14-fb134df4588bba23.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=13", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung14-fb134df4588bba23.png", + "name": "2014-08-15_8122c873_Abbildung14-fb134df4588bba23.png", + "digest": "8122c87334eba787ee75494548167b5b4c2c7c837137f7d73831116544f2252d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://1.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung17-4271ef23aec87e86.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=16", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung17-4271ef23aec87e86.png", + "name": "2014-08-15_6157f5cd_Abbildung17-4271ef23aec87e86.png", + "digest": "6157f5cdd02783ff0994a9660a7689af3a6793ba7c172de85b6e70201b439286" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://1.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung21-6d5c0274874ca75c.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=20", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung21-6d5c0274874ca75c.png", + "name": "2014-08-15_f3f94c1b_Abbildung21-6d5c0274874ca75c.png", + "digest": "f3f94c1bc96218eff3eff77b0b8d5a21f27197649ba7e0a6a8f0a8e328a13803" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://1.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung23-1298aca890a5439a.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=22", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung23-1298aca890a5439a.png", + "name": "2014-08-15_d7e8b97f_Abbildung23-1298aca890a5439a.png", + "digest": "d7e8b97fd1839a713bca4a55a089ee9b931d7524299627a607170848ec2b8873" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://1.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung24-900db32885f0cc0f.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=23", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung24-900db32885f0cc0f.png", + "name": "2014-08-15_fe30df4f_Abbildung24-900db32885f0cc0f.png", + "digest": "fe30df4f41b328cfa9d20a07431b483e62c6b0126387b2d9996f0678981f98a1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://1.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung26-2987618656b228f7.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=25", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung26-2987618656b228f7.png", + "name": "2014-08-15_dc5c9a27_Abbildung26-2987618656b228f7.png", + "digest": "dc5c9a27e7d09e2de1a52053631f9dcfd0397f319d01cab2d973bb988d1faad3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://2.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung02-6b01394b0be0086e.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=1", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung02-6b01394b0be0086e.png", + "name": "2014-08-15_23962a27_Abbildung02-6b01394b0be0086e.png", + "digest": "23962a27584649b6fca5d480bdb83a8fea08580171318ce096ba8106035fc2ad" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://2.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung07-7a4e9f24e3b280b6.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=6", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung07-7a4e9f24e3b280b6.png", + "name": "2014-08-15_82e38c48_Abbildung07-7a4e9f24e3b280b6.png", + "digest": "82e38c48b05a52406f8d9d2971fa381b0ff43750787f7daa5f7bf38dec19bc7a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://2.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung08-6bb47473ef0955e7.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=7", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung08-6bb47473ef0955e7.png", + "name": "2014-08-15_b8da0eae_Abbildung08-6bb47473ef0955e7.png", + "digest": "b8da0eae74b76a611a1f689ce89561743ddb144e1348585bcad5bcb7ebe574ad" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://2.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung13-2e22b19fc512334d.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=12", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung13-2e22b19fc512334d.png", + "name": "2014-08-15_1e960345_Abbildung13-2e22b19fc512334d.png", + "digest": "1e960345ea5b4a5795afcf4e561c1b827a0f173f150531103d3a29e8fa70ae33" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://2.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung15-4fa35803621ded74.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=14", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung15-4fa35803621ded74.png", + "name": "2014-08-15_c3db1819_Abbildung15-4fa35803621ded74.png", + "digest": "c3db1819f40fa5e614439cb1dba0947936276f937e7251e514b7a0b8d27e308c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://2.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung16-c668de19f0d46cbd.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=15", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung16-c668de19f0d46cbd.png", + "name": "2014-08-15_2d1afaa4_Abbildung16-c668de19f0d46cbd.png", + "digest": "2d1afaa492657ba6f4f95f72bdaae7b11b92c59216a985d9792e536a045e5e2c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://2.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung18-632df782fe449c6f.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=17", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung18-632df782fe449c6f.png", + "name": "2014-08-15_e410a18a_Abbildung18-632df782fe449c6f.png", + "digest": "e410a18a6d77536daf69fb292cfb9372f6bf0933affcdcd364a9e0dea3b33e04" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://2.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung25-471d6e46623a02d3.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=24", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung25-471d6e46623a02d3.png", + "name": "2014-08-15_17759359_Abbildung25-471d6e46623a02d3.png", + "digest": "177593599f18cc8f93f5846413206fc09dfd5c9b45919fd45d86b4d35a44042f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://3.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung01-dc8cb7bf5376218d.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung01-dc8cb7bf5376218d.png", + "name": "2014-08-15_d2cef361_Abbildung01-dc8cb7bf5376218d.png", + "digest": "d2cef361b55983f6208a9cf1ce6c7d7dfdd7954f5362c471d37d380098b3afc0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://3.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung06-ab3cf72dde5ffacb.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=5", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung06-ab3cf72dde5ffacb.png", + "name": "2014-08-15_f1dee8b4_Abbildung06-ab3cf72dde5ffacb.png", + "digest": "f1dee8b4e2d0a65e69894d1e2564ef7eff2d164182830f486caaa4c8fa005db9" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://3.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung11-77cfd09f31b83ba9.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=10", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung11-77cfd09f31b83ba9.png", + "name": "2014-08-15_fa9f6292_Abbildung11-77cfd09f31b83ba9.png", + "digest": "fa9f6292ba2373b4980dd7cd5931ab711f87eefd1eca87d53399add934876138" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://3.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung19-7e51ea450ded8b67.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=18", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung19-7e51ea450ded8b67.png", + "name": "2014-08-15_24db5115_Abbildung19-7e51ea450ded8b67.png", + "digest": "24db5115f34855cada09b9c59bd8e34ec7c84ae267e32d54d29b453a6a9af5d4" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://3.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung20-61ff4bfacd891ebc.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=19", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung20-61ff4bfacd891ebc.png", + "name": "2014-08-15_12947ae2_Abbildung20-61ff4bfacd891ebc.png", + "digest": "12947ae2c57515a46b3b7f27aab078433ce2231766757a2b162c7c4cd2a769e3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-15", + "url": "http://3.f.ix.de/imgs/71/1/2/8/8/7/5/9/Abbildung22-9cc784f4f26425fc.png", + "accomp_articles": [ + { + "url": "http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html", + "pubdate": "2014-08-15" + } + ], + "alternative_files": [], + "presentation_url": "http://www.heise.de/ct/bilderstrecke/bilderstrecke_2292370.html?back=2292681;back_artikelseite=1;bild=21", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Abbildung22-9cc784f4f26425fc.png", + "name": "2014-08-15_87a01d5f_Abbildung22-9cc784f4f26425fc.png", + "digest": "87a01d5f7a9da16d2ed4f81b6bf9eda7a1860d78e923587e7a3be8b9fb89acaf" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-25", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1278878/cia-colleagues-enthusiastically-welcome-nsa.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton/", + "pubdate": "2014-08-25" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/25/cia-colleagues-enthusiastically-welcome-nsa-training/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "cia-colleagues-enthusiastically-welcome-nsa.pdf", + "name": "2014-08-25_45314d21_cia-colleagues-enthusiastically-welcome-nsa.pdf", + "digest": "45314d214d9e24e651fbebd0b6222c6d19334cfa2d80c003a4c58ad2301e45a1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-25", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1278885/crisscross-proton-point-paper.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton/", + "pubdate": "2014-08-25" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/25/crisscross-proton-point-paper/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "crisscross-proton-point-paper.pdf", + "name": "2014-08-25_39fc418a_crisscross-proton-point-paper.pdf", + "digest": "39fc418a6278ffb38dcd7093f2ffbddbc8d33935b694eb9f49c9e859a36cadb3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-25", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1278888/decision-memorandum-for-dni-on-icreach.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton/", + "pubdate": "2014-08-25" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/25/decision-memorandum-dni-icreach/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "decision-memorandum-for-dni-on-icreach.pdf", + "name": "2014-08-25_5c9ca5bf_decision-memorandum-for-dni-on-icreach.pdf", + "digest": "5c9ca5bf466e5453ac651632ce6d26065f5145c1077b05186f4e5b5484ad1574" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-25", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1278896/metadata-policy-conference-1.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton/", + "pubdate": "2014-08-25" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/25/metadata-policy-conference/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "metadata-policy-conference-1.pdf", + "name": "2014-08-25_2348c397_metadata-policy-conference-1.pdf", + "digest": "2348c39767be48f2bb4ac29efbc1c8a1647fc97f952087d9dccb4c26714bc17d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-25", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1278900/metadata-sharing-memorandum.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton/", + "pubdate": "2014-08-25" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/25/metadata-sharing-memorandum-2005/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "metadata-sharing-memorandum.pdf", + "name": "2014-08-25_7f92013b_metadata-sharing-memorandum.pdf", + "digest": "7f92013bb68d395f3dc9b9f28040d4489eea9fd6aedcd45fe4c9110b0fada7d6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-25", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1278904/sharing-sigint-metadata-on-icreach.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton/", + "pubdate": "2014-08-25" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/25/sharing-sigint-metadata-icreach/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sharing-sigint-metadata-on-icreach.pdf", + "name": "2014-08-25_79f5e7e7_sharing-sigint-metadata-on-icreach.pdf", + "digest": "79f5e7e769784a2634747921a16f37b9dea4c49351a48db335eb764113d21665" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-25", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1278905/sharing-communications-metadata-across-the-u-s.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton/", + "pubdate": "2014-08-25" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/25/sharing-communications-metadata-across-u-s-intelligence-community/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sharing-communications-metadata-across-the-u-s.pdf", + "name": "2014-08-25_63c3f5a8_sharing-communications-metadata-across-the-u-s.pdf", + "digest": "63c3f5a8d197412a7a9d732d2d024432d055cfd32805143b017f5f636bb78174" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-25", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1278912/icreach-black-budget-extract.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton/", + "pubdate": "2014-08-25" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/25/black-budget-extracts/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "icreach-black-budget-extract.pdf", + "name": "2014-08-25_5e198897_icreach-black-budget-extract.pdf", + "digest": "5e1988977aed3d94174b21703e1bcb3518675c4a89696a098683e18cc46b3248" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-25", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1278913/icreach-wholesale-sharing.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton/", + "pubdate": "2014-08-25" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/25/icreach-wholesale-sharing-2007/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "icreach-wholesale-sharing.pdf", + "name": "2014-08-25_06f033c3_icreach-wholesale-sharing.pdf", + "digest": "06f033c37a644df5a9b6e854c2c322dcacf573bba78ae767e366cc73f6a12191" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-31", + "url": "http://cdn2.spiegel.de/images/image-743175-galleryV9-ivue.jpg", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/documents-show-nsa-and-gchq-spied-on-partner-turkey-a-989011.html", + "pubdate": "2014-08-31" + } + ], + "alternative_files": [], + "presentation_url": "http://www.spiegel.de/fotostrecke/photo-gallery-more-interesting-than-cuba-fotostrecke-118477-3.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "image-743175-galleryV9-ivue.jpg", + "name": "2014-08-31_6b97aae7_image-743175-galleryV9-ivue.jpg", + "digest": "6b97aae7655029efaa8ede6958d51e1bf7e0d96bc979ed540fb85e45e33391ae" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-31", + "url": "http://www.spiegel.de/media/media-34649.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/documents-show-nsa-and-gchq-spied-on-partner-turkey-a-989011.html", + "pubdate": "2014-08-31" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34649.pdf", + "name": "2014-08-31_7cd2a44b_media-34649.pdf", + "digest": "7cd2a44b4b7bad6da53467d22981efdb7357477e66e3307a42dffb883dbf6a04" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-31", + "url": "http://www.spiegel.de/media/media-34650.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/documents-show-nsa-and-gchq-spied-on-partner-turkey-a-989011.html", + "pubdate": "2014-08-31" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34650.pdf", + "name": "2014-08-31_33485c08_media-34650.pdf", + "digest": "33485c08ba503fe8f99398964808d6d079a683f8f4e0c5eec07353efd307ff7f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-31", + "url": "http://www.spiegel.de/media/media-34653.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/documents-show-nsa-and-gchq-spied-on-partner-turkey-a-989011.html", + "pubdate": "2014-08-31" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34653.pdf", + "name": "2014-08-31_875502a2_media-34653.pdf", + "digest": "875502a243db48d1c4117023c1c55021a29c7d7e41c1f32f374d153b46b99699" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-31", + "url": "http://www.spiegel.de/media/media-34656.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/documents-show-nsa-and-gchq-spied-on-partner-turkey-a-989011.html", + "pubdate": "2014-08-31" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34656.pdf", + "name": "2014-08-31_7bc6a7a4_media-34656.pdf", + "digest": "7bc6a7a4968cc5a5676bac1345f1ea0a375f18890d6d3e4cce28fad3730def11" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-31", + "url": "http://www.spiegel.de/media/media-34657.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/documents-show-nsa-and-gchq-spied-on-partner-turkey-a-989011.html", + "pubdate": "2014-08-31" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34657.pdf", + "name": "2014-08-31_21ec5fb0_media-34657.pdf", + "digest": "21ec5fb05ac0694d1ab79896df0f3518ea9abd0cc90c84e3208d063473e96daa" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-31", + "url": "http://www.spiegel.de/media/media-34658.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/documents-show-nsa-and-gchq-spied-on-partner-turkey-a-989011.html", + "pubdate": "2014-08-31" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34658.pdf", + "name": "2014-08-31_c6eb7cd2_media-34658.pdf", + "digest": "c6eb7cd254596bf76761fb6acee63e7970558bbbb0aba2f0719b2777a02886e6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-31", + "url": "http://www.spiegel.de/media/media-34659.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/documents-show-nsa-and-gchq-spied-on-partner-turkey-a-989011.html", + "pubdate": "2014-08-31" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34659.pdf", + "name": "2014-08-31_2371de55_media-34659.pdf", + "digest": "2371de5505c3c2b5a3ab7ada7f153b4b06f73c8ba8ea1984e6305d03ba46ac64" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-31", + "url": "http://www.spiegel.de/media/media-34662.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/documents-show-nsa-and-gchq-spied-on-partner-turkey-a-989011.html", + "pubdate": "2014-08-31" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34662.pdf", + "name": "2014-08-31_315e3c42_media-34662.pdf", + "digest": "315e3c42eb99cb48ce9dd6658e9cd951a24a885e9eb837356cedce4a38b1ef65" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-31", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1282645/gchq-tr-603.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/31/nsaturkeyspiegel/", + "pubdate": "2014-08-31" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/31/turkey-g20-pre-meeting-london-september-2-5-2009/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gchq-tr-603.pdf", + "name": "2014-08-31_656c6cd7_gchq-tr-603.pdf", + "digest": "656c6cd7562b514ec457a842f1c8d5b7bb7eda1314a9011c833021793fc41a95" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-31", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1282646/gchq-tr-604.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/31/nsaturkeyspiegel/", + "pubdate": "2014-08-31" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/31/turkey-energy-company-development/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gchq-tr-604.pdf", + "name": "2014-08-31_b7bacfc0_gchq-tr-604.pdf", + "digest": "b7bacfc0624ee339fc602ba0e3659ec0d1712be69ac728cbc02506731ed1a754" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-31", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1282650/nsa-tr-603.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/31/nsaturkeyspiegel/", + "pubdate": "2014-08-31" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/31/turkey-pkk/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-tr-603.pdf", + "name": "2014-08-31_4a26bee9_nsa-tr-603.pdf", + "digest": "4a26bee929d9b6bd06a412dd981114f92a4d790010a0f96bed7e9ed17cedfc56" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-31", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1282651/nsa-tr-604.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/31/nsaturkeyspiegel/", + "pubdate": "2014-08-31" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/31/foreign-relations-mission-titles/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-tr-604.pdf", + "name": "2014-08-31_2ac4d3a6_nsa-tr-604.pdf", + "digest": "2ac4d3a6d0c9af118458c128b497c70cd988a6fc9774314f91edd5368d08eb79" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-31", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1282653/nsa-tr-606.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/31/nsaturkeyspiegel/", + "pubdate": "2014-08-31" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/31/information-paper-nsa-intelligence-relationship-turkey/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-tr-606.pdf", + "name": "2014-08-31_c3d7dba3_nsa-tr-606.pdf", + "digest": "c3d7dba37181c7b8c40b246ada9a086d0a612fb1a82fb5562bbd8e5b5a182266" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-08-31", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1282654/nsa-tr-607.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/08/31/nsaturkeyspiegel/", + "pubdate": "2014-08-31" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/08/31/nsas-oldest-third-party-sigint-relationship/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-tr-607.pdf", + "name": "2014-08-31_f3273100_nsa-tr-607.pdf", + "digest": "f3273100c9cd177efbf54fbeb145b43bc1ed850a91f6f28d131438ff1e65c552" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-09-05", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1283939/qicr-final-report-2009.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/09/05/us-governments-plans-use-economic-espionage-benefit-american-corporations/", + "pubdate": "2014-09-05" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/09/05/quadrennial-intelligence-review-final-report-2009/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "qicr-final-report-2009.pdf", + "name": "2014-09-05_99e8014c_qicr-final-report-2009.pdf", + "digest": "99e8014cd966cd327a1f9067fb6ec15c65b887df8ad6d69dd0e85b925246aedd" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-09-14", + "url": "http://www.spiegel.de/media/media-34756.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/snowden-documents-indicate-nsa-has-breached-deutsche-telekom-a-991503.html", + "pubdate": "2014-09-14" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34756.pdf", + "name": "2014-09-14_3a593fcb_media-34756.pdf", + "digest": "3a593fcb331cd8bed8e14de7e192cf43f4b93e7a3e0a80e8de54fc863fde71b3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-09-14", + "url": "http://www.spiegel.de/media/media-34757.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/snowden-documents-indicate-nsa-has-breached-deutsche-telekom-a-991503.html", + "pubdate": "2014-09-14" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34757.pdf", + "name": "2014-09-14_296888ad_media-34757.pdf", + "digest": "296888adf7b6473d7917907f952d12e4e8f973cbc0c5d22b82b56095897f4369" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-09-14", + "url": "http://www.spiegel.de/media/media-34758.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/snowden-documents-indicate-nsa-has-breached-deutsche-telekom-a-991503.html", + "pubdate": "2014-09-14" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-34758.pdf", + "name": "2014-09-14_dd41eb3a_media-34758.pdf", + "digest": "dd41eb3ad9537ee59ae4bb71e2087a2201d3308cee8b659355e9bd4ca8042b6c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-09-14", + "url": "https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2014/09/NSA-Doc-1.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/", + "pubdate": "2014-09-14" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "NSA-Doc-1.pdf", + "name": "2014-09-14_5f096f14_NSA-Doc-1.pdf", + "digest": "5f096f14f5ba7a84af1538c1d0c2f37bb1a9926179c1cd106d2838cb32354348" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-09-15", + "url": "https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2014/09/nz2.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/", + "pubdate": "2014-09-15" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nz2.png", + "name": "2014-09-15_0ba03dcf_nz2.png", + "digest": "0ba03dcfe5762fe0b58ecb507f6cb8fb7e176110d0e8ec3c4df313663a636e0b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-09-15", + "url": "https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2014/09/nz3.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/", + "pubdate": "2014-09-15" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nz3.png", + "name": "2014-09-15_48527e53_nz3.png", + "digest": "48527e53aeb412f7dd09d7d166a77ce2490497b6894fa531f9c71935c48c6c2b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-09-15", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1301562/ferguson-nsa-visit-precis.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/", + "pubdate": "2014-09-15" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/09/15/new-zealand-visit-precis/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "ferguson-nsa-visit-precis.pdf", + "name": "2014-09-15_010e3dab_ferguson-nsa-visit-precis.pdf", + "digest": "010e3dab1d834792ad990f2e5ae2af0eee4c1062f3ec671e80810b62f1972dc5" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-10-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1312012/cne-declass-guide.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/10/10/core-secrets/", + "pubdate": "2014-10-11" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/10/10/computer-network-exploitation-classification-guide/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "cne-declass-guide.pdf", + "name": "2014-10-11_d94a4480_cne-declass-guide.pdf", + "digest": "d94a4480f43cc5c4bd37ba3f77f538ea396ecbaaa33eba915ef44abab042545c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-10-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1312013/cno-core-secrets-security-structure-23-june-06.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/10/10/core-secrets/", + "pubdate": "2014-10-11" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/10/10/cno-core-secrets-security-structure/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "cno-core-secrets-security-structure-23-june-06.pdf", + "name": "2014-10-11_d33e5def_cno-core-secrets-security-structure-23-june-06.pdf", + "digest": "d33e5defb46a02038bc6dd5729afd2dcda36b92bd422faef428e2c676bc1788d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-10-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1312014/cno-core-secrets-slide-slices-14-june-06.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/10/10/core-secrets/", + "pubdate": "2014-10-11" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/10/10/cno-core-secrets/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "cno-core-secrets-slide-slices-14-june-06.pdf", + "name": "2014-10-11_a16fb7e5_cno-core-secrets-slide-slices-14-june-06.pdf", + "digest": "a16fb7e509165e7838cd0899b2d9be8da5e5d44cfbc08c194b3d791a00482c0b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-10-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1312015/cno-core-secrets.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/10/10/core-secrets/", + "pubdate": "2014-10-11" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/10/10/cno-core-secrets-2/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "cno-core-secrets.pdf", + "name": "2014-10-11_acf4ef6d_cno-core-secrets.pdf", + "digest": "acf4ef6d78035095db38415a44d27cb87618c2870f562e49b89959ddee786dd2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-10-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1312016/eci-control-authorities.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/10/10/core-secrets/", + "pubdate": "2014-10-11" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/10/10/eci-control-authorities/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "eci-control-authorities.pdf", + "name": "2014-10-11_61afd948_eci-control-authorities.pdf", + "digest": "61afd948ae3b2c1bbe15ab25c11bb678b6431fb2c4fcdb0b6f7efe5f788ea447" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-10-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1312017/eci-pawleys-class-guide.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/10/10/core-secrets/", + "pubdate": "2014-10-11" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/10/10/nsa-classification-guide-eci-pawleys/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "eci-pawleys-class-guide.pdf", + "name": "2014-10-11_a99edefd_eci-pawleys-class-guide.pdf", + "digest": "a99edefd1edc19c17110e021a332a4334af8a29091f268a5b4d7e28b56899557" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-10-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1312018/file3057546454184113062.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/10/10/core-secrets/", + "pubdate": "2014-10-11" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/10/10/nsa-exceptionally-controlled-information-listing-12-september-2003/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "file3057546454184113062.pdf", + "name": "2014-10-11_87ecbd69_file3057546454184113062.pdf", + "digest": "87ecbd690b1d705bb6cd76b90dc3fbf461c523ceb0b1a051c239386ceed7e101" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-10-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1312019/national-initiative-nsacss-core-secrets.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/10/10/core-secrets/", + "pubdate": "2014-10-11" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/10/10/national-initiative-protection-program-sentry-eagle/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "national-initiative-nsacss-core-secrets.pdf", + "name": "2014-10-11_df22d085_national-initiative-nsacss-core-secrets.pdf", + "digest": "df22d085e77b63c6de0ea2bf24cc4bbb8762b7f3fce6d2ba7453badeb8544c4c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-10-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1312020/tarex-class-guide.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/10/10/core-secrets/", + "pubdate": "2014-10-11" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/10/10/target-exploitation-classification-guide/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "tarex-class-guide.pdf", + "name": "2014-10-11_e282ed80_tarex-class-guide.pdf", + "digest": "e282ed80d8d0d3e082a6fb5ba8805e71744a9e3b82307c1c22a26a2a896a46de" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-10-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1312021/whipgenie-classification-guide25jan05.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/10/10/core-secrets/", + "pubdate": "2014-10-11" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/10/10/eci-whipgenie-classification-guide/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "whipgenie-classification-guide25jan05.pdf", + "name": "2014-10-11_ed8ccbc8_whipgenie-classification-guide25jan05.pdf", + "digest": "ed8ccbc852959ad4a86371f0f58c2a6bb441177957b35a0ba9e016095b577956" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-11-01", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1350176/20110405-cancun-amp-reqs-redacted-small.pdf", + "accomp_articles": [ + { + "url": "http://www.information.dk/514369", + "pubdate": "2014-11-01" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/1350176-20110405-cancun-amp-reqs-redacted-small.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "20110405-cancun-amp-reqs-redacted-small.pdf", + "name": "2014-11-01_5ca19129_20110405-cancun-amp-reqs-redacted-small.pdf", + "digest": "5ca191299219e43006cd91a224e23fc80d68ad5cdc2cd82f944f141bfd94f0b4" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-11-25", + "url": "", + "accomp_articles": [ + { + "url": "http://international.sueddeutsche.de/post/103543418200/snowden-leaks-how-vodafone-subsidiary-cable", + "pubdate": "2014-11-25" + } + ], + "alternative_files": [], + "presentation_url": "https://drive.google.com/file/d/0B9F6ub8wD7gqaDJIOEhfaG9PQzA/view?usp=sharing", + "published_files": [] + }, + { + "pubdate": "2014-12-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1374175/auroragold-project-overview.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/", + "pubdate": "2014-12-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/04/auroragold-project-overview/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "auroragold-project-overview.pdf", + "name": "2014-12-04_d624dd5f_auroragold-project-overview.pdf", + "digest": "d624dd5f601bda8978045f99e55823b214b1a8c5aba097ea5183b660f814d9dd" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1374176/auroragold-target-technology-trends-center.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/", + "pubdate": "2014-12-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/04/auroragold-target-technology-trends-center-support-wpmo/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "auroragold-target-technology-trends-center.pdf", + "name": "2014-12-04_43425671_auroragold-target-technology-trends-center.pdf", + "digest": "434256715c679e587dd50c6f2af640ea9ce7972b681d0ae4d19a5741aed5700a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1374177/auroragold-working-aid.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/", + "pubdate": "2014-12-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/04/auroragold-working-aid/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "auroragold-working-aid.pdf", + "name": "2014-12-04_3326d533_auroragold-working-aid.pdf", + "digest": "3326d5334f8510ec4213d562ec87b223b326ec56282f452f1d33bf7e2d8bdc11" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1374178/auroragold-working-group.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/", + "pubdate": "2014-12-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/04/auroragold-working-group/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "auroragold-working-group.pdf", + "name": "2014-12-04_48a11cdc_auroragold-working-group.pdf", + "digest": "48a11cdce0477a3fe385864f8ff64b6f89d9f7dc6eea1af68ff170520b978298" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1374179/ir21-a-technology-warning-mechanism.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/", + "pubdate": "2014-12-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/04/ir-21-technology-warning-mechanism/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "ir21-a-technology-warning-mechanism.pdf", + "name": "2014-12-04_75d6d3ad_ir21-a-technology-warning-mechanism.pdf", + "digest": "75d6d3ad035c7a9f0a91250db2a7e37872aee92478f13677c52f4fd0983aec8f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1374180/site-makes-first-ever-collect-of-high-interest.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/", + "pubdate": "2014-12-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/04/first-ever-collect-high-interest-4g-cellular-signal/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "site-makes-first-ever-collect-of-high-interest.pdf", + "name": "2014-12-04_2713a3b9_site-makes-first-ever-collect-of-high-interest.pdf", + "digest": "2713a3b940e5512a4759a9f9934ae72ecb6657b986444a3efb7a3c62c73e4184" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1374188/opulant-pup-encryption-attack.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/", + "pubdate": "2014-12-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/04/opulent-pup-encryption-attack/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "opulant-pup-encryption-attack.pdf", + "name": "2014-12-04_99641820_opulant-pup-encryption-attack.pdf", + "digest": "9964182030373c819eb98c98a27a5a1c6a64d1cf8d5fcdc8a4e697a01616ffc2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1374189/wolframite-encryption-attack.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/", + "pubdate": "2014-12-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/04/wolframite-encryption-attack/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "wolframite-encryption-attack.pdf", + "name": "2014-12-04_657c4d7d_wolframite-encryption-attack.pdf", + "digest": "657c4d7d1d5ea2450ee303c04a263d11a03969006339c2296fdf442383ea6fe9" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1374191/gchq-nsa-csec-network-tradecraft-advancement-team.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/", + "pubdate": "2014-12-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/04/nsa-gchq-csec-network-tradecraft-advancement-team/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gchq-nsa-csec-network-tradecraft-advancement-team.pdf", + "name": "2014-12-04_81a43819_gchq-nsa-csec-network-tradecraft-advancement-team.pdf", + "digest": "81a43819dfb90b8f6156d76746c83eb665f7d20d9f90827d390369806c0ebea5" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-13", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1379026/gchq-stargate-cne-requirements.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/13/belgacom-hack-gchq-inside-story/", + "pubdate": "2014-12-13" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/13/gchq-stargate-cne-requirements/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gchq-stargate-cne-requirements.pdf", + "name": "2014-12-13_195db560_gchq-stargate-cne-requirements.pdf", + "digest": "195db5604df1b163af573b9d4fed65cdf495ed63edd66a78bb081a6ae15a65a3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-13", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1379027/gchq-making-network-sense-of-the-encryption.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/13/belgacom-hack-gchq-inside-story/", + "pubdate": "2014-12-13" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/13/gchq-making-network-sense-encryption-problem-2011/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gchq-making-network-sense-of-the-encryption.pdf", + "name": "2014-12-13_f8c0bddd_gchq-making-network-sense-of-the-encryption.pdf", + "digest": "f8c0bddde8ebcb4c73068bb517708125b3a74abf07f3b60b10991b0590b01cb9" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-13", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1379028/gchq-mobile-networks-in-my-noc-world.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/13/belgacom-hack-gchq-inside-story/", + "pubdate": "2014-12-13" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/13/gchq-mobile-networks-noc-world/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gchq-mobile-networks-in-my-noc-world.pdf", + "name": "2014-12-13_60472333_gchq-mobile-networks-in-my-noc-world.pdf", + "digest": "604723338128317d6e28835f42dcd19317cf76798bca306b07b6d645502cc53f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-13", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1379029/gchq-automated-noc-detection.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/13/belgacom-hack-gchq-inside-story/", + "pubdate": "2014-12-13" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/13/gchq-automated-noc-detection-2011/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gchq-automated-noc-detection.pdf", + "name": "2014-12-13_5776d077_gchq-automated-noc-detection.pdf", + "digest": "5776d07736307256c3d1b03bc6e9f274fae8aca6f3ac2d901e3f644bcf89dd4b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-13", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1379048/gchq-nac-review-october-december-2011.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/13/belgacom-hack-gchq-inside-story/", + "pubdate": "2014-12-13" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/13/gchq-nac-review-october-december-2011/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gchq-nac-review-october-december-2011.pdf", + "name": "2014-12-13_60b10610_gchq-nac-review-october-december-2011.pdf", + "digest": "60b1061002c42e554c25dfb66b6882a00a9cd7fdca1e2c7bd13fd2aa081ad813" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-13", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1379049/gchq-nac-business-review-january-march-2011.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/13/belgacom-hack-gchq-inside-story/", + "pubdate": "2014-12-13" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/13/gchq-nac-business-review-january-march-2011/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gchq-nac-business-review-january-march-2011.pdf", + "name": "2014-12-13_e0f68dc2_gchq-nac-business-review-january-march-2011.pdf", + "digest": "e0f68dc269cb8c9d99a81818b5b624fb684385ada31ea4451d7c0b4013c49935" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-13", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1379050/gchq-nac-review-april-june-2011.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/13/belgacom-hack-gchq-inside-story/", + "pubdate": "2014-12-13" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/13/gchq-nac-review-april-june-2011/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gchq-nac-review-april-june-2011.pdf", + "name": "2014-12-13_33ecb1ea_gchq-nac-review-april-june-2011.pdf", + "digest": "33ecb1eaf530c21301f8d8cdfe814870e990aca4dad3f5c55c78adc90c8d4ee6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-13", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1379052/gchq-nac-review-july-sept-2011.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/13/belgacom-hack-gchq-inside-story/", + "pubdate": "2014-12-13" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/13/gchq-nac-review-july-september-2011/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gchq-nac-review-july-sept-2011.pdf", + "name": "2014-12-13_df324a22_gchq-nac-review-july-sept-2011.pdf", + "digest": "df324a228c1926bc91539870591ade0fb7353494ef1f2031ba69255c0d252179" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-13", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1379053/gchq-nac-review-january-march-2012.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/13/belgacom-hack-gchq-inside-story/", + "pubdate": "2014-12-13" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/13/gchq-nac-review-january-march-2012/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gchq-nac-review-january-march-2012.pdf", + "name": "2014-12-13_30e9158a_gchq-nac-review-january-march-2012.pdf", + "digest": "30e9158a079e27a2f91d6408a38f34e2fdefd247df6b04469eaea5267aec2cf9" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-13", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1379058/gchq-hopscotch.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/13/belgacom-hack-gchq-inside-story/", + "pubdate": "2014-12-13" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/13/hopscotch/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gchq-hopscotch.pdf", + "name": "2014-12-13_9a4d3ac0_gchq-hopscotch.pdf", + "digest": "9a4d3ac06fd4e094258f6558e641a7aed90100becd37b5b6da21b8ce4c80ef85" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-13", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1379059/gchq-belgacom-connections.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2014/12/13/belgacom-hack-gchq-inside-story/", + "pubdate": "2014-12-13" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2014/12/13/gchq-belgacom-connections/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gchq-belgacom-connections.pdf", + "name": "2014-12-13_ab99e606_gchq-belgacom-connections.pdf", + "digest": "ab99e606817a22a9bc5539513da8efc6d6a2011f063d904d42ae061d59261846" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-21", + "url": "http://static01.nyt.com/images/2014/12/21/world/asia/22mumbai-doc/22mumbai-doc-articleLarge.jpg", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2014/12/22/world/asia/in-2008-mumbai-attacks-piles-of-spy-data-but-an-uncompleted-puzzle.html", + "pubdate": "2014-12-21" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/2014/12/22/world/asia/in-2008-mumbai-attacks-piles-of-spy-data-but-an-uncompleted-puzzle.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "22mumbai-doc-articleLarge.jpg", + "name": "2014-12-21_141b8f6e_22mumbai-doc-articleLarge.jpg", + "digest": "141b8f6e807e177c83e42d14bef0e173856fcf1375bbcc29e64e9917186708ad" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35506.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/secret-docs-reveal-dubious-details-of-targeted-killings-in-afghanistan-a-1010358.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35506.pdf", + "name": "2014-12-28_9bfe1ba9_media-35506.pdf", + "digest": "9bfe1ba99347f6cd52bb2e2648398599c5e42ea0d356022fb816c5c5533079c1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35507.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/secret-docs-reveal-dubious-details-of-targeted-killings-in-afghanistan-a-1010358.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35507.pdf", + "name": "2014-12-28_a1b090d8_media-35507.pdf", + "digest": "a1b090d8fa7adb5341f1fc834995f64a56cc3d98cabc806d9b941cc63266dff9" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35508.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/secret-docs-reveal-dubious-details-of-targeted-killings-in-afghanistan-a-1010358.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35508.pdf", + "name": "2014-12-28_d9af10b2_media-35508.pdf", + "digest": "d9af10b293dfbe80bedd00312be00968a3feab515b3581fb07e25f8f2b116328" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35509.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35509.pdf", + "name": "2014-12-28_14a99ba3_media-35509.pdf", + "digest": "14a99ba305b166c0d68b31832e8398e5d7053d3030cd0de7214671b4af2cba9e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35510.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35510.pdf", + "name": "2014-12-28_ab070a1e_media-35510.pdf", + "digest": "ab070a1e6f12ed7c440e01428fd963581e2e47a7976d5f0ce8a78a9e6734e87e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35511.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35511.pdf", + "name": "2014-12-28_6f7a9bfc_media-35511.pdf", + "digest": "6f7a9bfc997bfe65aa59fa3989149bfb14cb389592bc2a9768ebbef6cae0d460" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35512.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35512.pdf", + "name": "2014-12-28_f31fec30_media-35512.pdf", + "digest": "f31fec30296fe6f57080ccde51211ecd1254dc809f76bafe48750bb621c47e50" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35513.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35513.pdf", + "name": "2014-12-28_33160bd4_media-35513.pdf", + "digest": "33160bd4a728c2e204c4ff2e8573998b2b10099044a3b725b92c136c671510b0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35514.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35514.pdf", + "name": "2014-12-28_8a53be36_media-35514.pdf", + "digest": "8a53be36db1d732ff63d29ac9fcff6e6952025ec74bcbe5bb1e96f445eb98cbf" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35515.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35515.pdf", + "name": "2014-12-28_8190d999_media-35515.pdf", + "digest": "8190d99943f96df590d5c8232b98cca31abdb8672aecc3e26448374e90bdf3fa" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35516.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35516.pdf", + "name": "2014-12-28_bb46dc0b_media-35516.pdf", + "digest": "bb46dc0b004707c4905d52940e4e3a8e9867a478df036c384cfbbc96b9809613" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35517.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35517.pdf", + "name": "2014-12-28_250c306a_media-35517.pdf", + "digest": "250c306a6de9237268e71cf012c42c11e110832e71960d01e940a86d1ce139f0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35518.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35518.pdf", + "name": "2014-12-28_ac291fcf_media-35518.pdf", + "digest": "ac291fcf2b099d6222f872d4dfebef120fea0e15cc3377b4716840f7e1b53a82" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35519.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35519.pdf", + "name": "2014-12-28_67e95af3_media-35519.pdf", + "digest": "67e95af301387bc55a75bf7575ad801dbe14fc5c308c77a889ee388fca1e49e4" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35520.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35520.pdf", + "name": "2014-12-28_950e3014_media-35520.pdf", + "digest": "950e3014ea368e740b45c4f59377131365a3e0e3a217516cf669b885b01cba6b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35521.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35521.pdf", + "name": "2014-12-28_539f335c_media-35521.pdf", + "digest": "539f335cbb51a8a57fa415d6702f658bdbd75d5f3174c244979d45adbe3431ad" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35522.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35522.pdf", + "name": "2014-12-28_55c866a2_media-35522.pdf", + "digest": "55c866a264e5d212e535c11615dd7cf117571fbcfed18c58f37ff3d909695662" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35523.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35523.pdf", + "name": "2014-12-28_e902616c_media-35523.pdf", + "digest": "e902616cf734e45b2665e4414691c98bbd18f611161b7178b39c8db8195af153" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35524.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35524.pdf", + "name": "2014-12-28_95b74768_media-35524.pdf", + "digest": "95b7476893926e464b3b8f48fee2af01066bef0179669eb838ab9101dccf1f86" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35525.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35525.pdf", + "name": "2014-12-28_f50b5c34_media-35525.pdf", + "digest": "f50b5c3496a3ea4bb2f202b4265ffe9f27d35d889c562fe933dbe6029db6d26b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35526.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35526.pdf", + "name": "2014-12-28_c3002773_media-35526.pdf", + "digest": "c3002773957d4c8d6df7fa6210cec8f94b8403ad6fe1d2e85c8c9188fbd49cfb" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35527.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35527.pdf", + "name": "2014-12-28_d4e4b4d9_media-35527.pdf", + "digest": "d4e4b4d9e2ebfaeb4962fffa35175adda16f28bc063eedf65957475c3523171c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35528.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35528.pdf", + "name": "2014-12-28_aeada037_media-35528.pdf", + "digest": "aeada037c8b18a7a81a1a15a3f7ba166100c883f0b8322e5de5cd6cb7a1145e9" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35529.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35529.pdf", + "name": "2014-12-28_3b73f559_media-35529.pdf", + "digest": "3b73f559d5bce1088c27633ff0b1cab3a3eb0f1abce8fd8bbaecad7978a24dae" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35530.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35530.pdf", + "name": "2014-12-28_19da060a_media-35530.pdf", + "digest": "19da060aa4c3c848df92ad72eddc4e47d70f342654c2bfd4f4001b4e10f75d67" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35531.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35531.pdf", + "name": "2014-12-28_830cb311_media-35531.pdf", + "digest": "830cb311574fd6631328a3e49ea2a01cca472156f10a84e5adcaacfa450a5528" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35532.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35532.pdf", + "name": "2014-12-28_02a7d150_media-35532.pdf", + "digest": "02a7d15051d59497ef28c51ab7dfc32affcf680277e4933f934cd88650ad568b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35533.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35533.pdf", + "name": "2014-12-28_8ceb153d_media-35533.pdf", + "digest": "8ceb153dec3f31ac40f1aafe72cc35f5af6fa9e070e9e03d676c113dab74955b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35534.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35534.pdf", + "name": "2014-12-28_4bc901d6_media-35534.pdf", + "digest": "4bc901d64e3ece9cc32ff3ebbadcb555e1057a4f5e8a690c8196045340028035" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35535.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35535.pdf", + "name": "2014-12-28_f84d0b64_media-35535.pdf", + "digest": "f84d0b64eb23f55d137963ce5e11c67862a15d621b490ec9c797acd4a8be2ddd" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35536.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35536.pdf", + "name": "2014-12-28_b23c9178_media-35536.pdf", + "digest": "b23c9178547189e2a11efc07ef0b0c223d322c901b981c9e85fc18a3219a7c96" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35537.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35537.pdf", + "name": "2014-12-28_25d034e2_media-35537.pdf", + "digest": "25d034e21fbc9b8e6ef71e5250bdad43f3e06aafd2678ab38f44e44da988a4d5" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35538.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35538.pdf", + "name": "2014-12-28_990706c8_media-35538.pdf", + "digest": "990706c8cb0ae6f0d4cbbda031f3ad5a5426ba91e2e34a9972b1af8ae571c08d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35539.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35539.pdf", + "name": "2014-12-28_6471c8cc_media-35539.pdf", + "digest": "6471c8cc6e3fd20cf83aff483a1575d4c6c41355ec6aada09dedf254d3d54113" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35540.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35540.pdf", + "name": "2014-12-28_0b027be1_media-35540.pdf", + "digest": "0b027be1646548ed2b1046052068a79b87175f5e49b7e66111cab655dbcd5c44" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35541.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35541.pdf", + "name": "2014-12-28_0f04c772_media-35541.pdf", + "digest": "0f04c7724d5677c31b6a2b99a4ad6152ff75ec07ed63707f30acc52d0ac3b6b6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35542.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35542.pdf", + "name": "2014-12-28_1ebc9a3a_media-35542.pdf", + "digest": "1ebc9a3a5cc54590f2420292071de2fe48681d1794a1f18545cd57ef415b2bba" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35543.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35543.pdf", + "name": "2014-12-28_c8491827_media-35543.pdf", + "digest": "c8491827ffabe5817d4579d21255eb128c184abd6e71fc99a8cef7f5279eacb1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35544.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35544.pdf", + "name": "2014-12-28_0289f540_media-35544.pdf", + "digest": "0289f540294bc148e201344bcd71b0a0fa603049bf3414fa5f15ed504e436a04" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35545.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35545.pdf", + "name": "2014-12-28_1199da75_media-35545.pdf", + "digest": "1199da758f285a34bc299b1995c6315ef4371fa99c290e25e6689b2afbb5e30f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35546.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35546.pdf", + "name": "2014-12-28_a857e0ae_media-35546.pdf", + "digest": "a857e0ae1ebcf66420f264de5c5b7b1a0bb83c1e779854fe9d9ffd8abfde976f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35547.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35547.pdf", + "name": "2014-12-28_bcee86e4_media-35547.pdf", + "digest": "bcee86e47723cbeb878398729099cd47609233548dab28b8cdab2d84933fda02" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35548.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35548.pdf", + "name": "2014-12-28_ba76c51d_media-35548.pdf", + "digest": "ba76c51d66d616e36f2a15569ddfb4bf99dbae14d5751b09e6af4b7b68845cbe" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35549.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35549.pdf", + "name": "2014-12-28_d9d585cf_media-35549.pdf", + "digest": "d9d585cf3376d69878deaf1260c77d043f54ff7bfba4ca5162ddd880727072ed" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35550.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35550.pdf", + "name": "2014-12-28_97a7b794_media-35550.pdf", + "digest": "97a7b79405f32520506fcd1dca8695944c23701589c488d0b63eced7b3767b89" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35551.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35551.pdf", + "name": "2014-12-28_496de62a_media-35551.pdf", + "digest": "496de62ae34e685952863a233026f3fbccf0806d451abc5c3a3559cc930d7ee6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35552.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35552.pdf", + "name": "2014-12-28_35542d33_media-35552.pdf", + "digest": "35542d335ea9547d348b5d9dd0aa57234f46da13395a3102e4e27f675b6e2971" + }, + "index": "" + } + ] + }, + { + "pubdate": "2014-12-28", + "url": "http://www.spiegel.de/media/media-35553.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/secret-docs-reveal-dubious-details-of-targeted-killings-in-afghanistan-a-1010358.html", + "pubdate": "2014-12-28" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35553.pdf", + "name": "2014-12-28_17c666c8_media-35553.pdf", + "digest": "17c666c89738b5d4338cd24c42d77e7d9b2d17bb35d371a8ebadc90c03e68765" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35653.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35653.pdf", + "name": "2015-01-17_6ba54f4f_media-35653.pdf", + "digest": "6ba54f4f5e67ad484482e4d7e681e8685e0db1eddf78219d355aff091d98479a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35654.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35654.pdf", + "name": "2015-01-17_60db4e20_media-35654.pdf", + "digest": "60db4e206e6094c4b2e515653d0e5ba8e058ef5f2027fe7ca681dc4e049b89fb" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35655.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35655.pdf", + "name": "2015-01-17_5972e63d_media-35655.pdf", + "digest": "5972e63d9a1c434369aaf779293445fa210a5b17c9c637b20fd1288de48190ac" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35656.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35656.pdf", + "name": "2015-01-17_d3af2fe9_media-35656.pdf", + "digest": "d3af2fe9139eea9fddf7104af2b14fbd0cdfff4521cf4888d0c03b1d379e70e9" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35657.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35657.pdf", + "name": "2015-01-17_71c24da3_media-35657.pdf", + "digest": "71c24da33bcbe80b9f09ac455925a148aaff118766d9840730781aeebc6b7c80" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35658.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35658.pdf", + "name": "2015-01-17_cc581eb9_media-35658.pdf", + "digest": "cc581eb95a70b9d7dac0c71c00a37b60cdb753d4b06fe5fff01db7f8a0da9d86" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35659.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35659.pdf", + "name": "2015-01-17_f4f9171f_media-35659.pdf", + "digest": "f4f9171fb6c6273499bc75406c3fe348efac0a45ec3e676406454233dbb5568e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35660.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35660.pdf", + "name": "2015-01-17_0a6d406e_media-35660.pdf", + "digest": "0a6d406e7af5f72f8bf9ed835cee075209c3561230100754838e5af4efa2fc5b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35661.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35661.pdf", + "name": "2015-01-17_5c33a3db_media-35661.pdf", + "digest": "5c33a3db6aa721a8ce07436c64085fcf36afe7bb2163427d7d26644f201bec20" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35662.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35662.pdf", + "name": "2015-01-17_fafc316a_media-35662.pdf", + "digest": "fafc316a1e2a347a0c3ec05d452e4d9bd4d4eade482736f779154f8a77078ab0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35663.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35663.pdf", + "name": "2015-01-17_dca225fd_media-35663.pdf", + "digest": "dca225fd88f9b1547e867f3949d675cb42bd43372137677dab78463a42bf8d2e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35664.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35664.pdf", + "name": "2015-01-17_f9403e0b_media-35664.pdf", + "digest": "f9403e0bd7b2ac3681cc6587ef53e172bf670ee39b34e7a849d7034de5e8df7b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35665.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35665.pdf", + "name": "2015-01-17_6f0e0217_media-35665.pdf", + "digest": "6f0e0217de387eaedddc719b5236858dfdbc009e16ac0afbbada7247157c1d9b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35666.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35666.pdf", + "name": "2015-01-17_1661d9a2_media-35666.pdf", + "digest": "1661d9a2c7bbdb1a8d89ade048b26ecea73fae3538ae81d2511bd28fca328e50" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35667.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35667.pdf", + "name": "2015-01-17_9487674d_media-35667.pdf", + "digest": "9487674d639288353ada7ae8eb7ccf89309483452a74efb3475bee0bab1b16bf" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35668.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35668.pdf", + "name": "2015-01-17_c70e2e83_media-35668.pdf", + "digest": "c70e2e83df51fcca8f22540704b2752ae994d5b372fada55d99d7acd4c8e507e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35669.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35669.pdf", + "name": "2015-01-17_94a4a5fe_media-35669.pdf", + "digest": "94a4a5feb429262322315cd16b7967990ca43d139e57e44423fc2e3233d18d7b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35670.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35670.pdf", + "name": "2015-01-17_48b1b42c_media-35670.pdf", + "digest": "48b1b42ce450bc40a0bd2021d2be8f1747aaf5cacfc356c2fe81ed4f7aea4d3c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35671.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35671.pdf", + "name": "2015-01-17_c881e76e_media-35671.pdf", + "digest": "c881e76eeac8448695f1f87ff1634d09ef1ae8cadf3f03072656a336b33d449f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35672.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35672.pdf", + "name": "2015-01-17_5e31b555_media-35672.pdf", + "digest": "5e31b555ea4eb410be0ae845b60b758ea2cfebacd62a28810f194171703f2bc7" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35673.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35673.pdf", + "name": "2015-01-17_be3be3f7_media-35673.pdf", + "digest": "be3be3f7845f9ea43e0670e7cb19f2c99ebc32a2b3d4f65b227033863a4b83c6" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35674.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35674.pdf", + "name": "2015-01-17_fe03c9ec_media-35674.pdf", + "digest": "fe03c9ecd48cdfac3e95e5139ee4054e2183be0c50d9a48d6f60b39da296d811" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35675.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35675.pdf", + "name": "2015-01-17_e02146cf_media-35675.pdf", + "digest": "e02146cf08df53fd05682e04d8a19fe5fb44d1d82eb45d2d93f011972ae96f45" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35676.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35676.pdf", + "name": "2015-01-17_60faaf3f_media-35676.pdf", + "digest": "60faaf3f5b15dd17fbac29cb50ef87cd4ea5cd620bbd36ad3ce8ac8b7d49800e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35678.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35678.pdf", + "name": "2015-01-17_87ff2fad_media-35678.pdf", + "digest": "87ff2fadec0e451b6940f19b9a568b0a559174ddab6a631a7c96e3ae6d5ba059" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35679.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35679.pdf", + "name": "2015-01-17_b0690b98_media-35679.pdf", + "digest": "b0690b987acb46a2dbe8ad31b3e7f9a773819a73f4d6066176f10fcdb702348e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35680.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35680.pdf", + "name": "2015-01-17_741c5635_media-35680.pdf", + "digest": "741c5635361199c5e3f5c2a9475b156cabeca87a31cafefdf9c0df01c1a2a9b9" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35681.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35681.pdf", + "name": "2015-01-17_6c1d5602_media-35681.pdf", + "digest": "6c1d5602cc02f3698f01655fc989852b4d4461447243108de29f4dcbdccc2080" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35682.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35682.pdf", + "name": "2015-01-17_1b69d0a0_media-35682.pdf", + "digest": "1b69d0a059274d889a7c45601d05bcf41b6428173543e6f48c057d2d605fd2cd" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35683.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35683.pdf", + "name": "2015-01-17_c31a53c0_media-35683.pdf", + "digest": "c31a53c0a24aab022733bef4c6f3e9af66c58df30be65418a9b738f3a6925fff" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35684.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35684.pdf", + "name": "2015-01-17_e64d8443_media-35684.pdf", + "digest": "e64d8443bc9674dd2c0bd6dae1364aa13187511997634dc244b976a21d1ee00f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35685.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35685.pdf", + "name": "2015-01-17_06b8ecd7_media-35685.pdf", + "digest": "06b8ecd79df482ab8ee6dd3d26289cecee2929716172397876fc100ce1eac800" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35686.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35686.pdf", + "name": "2015-01-17_e6b2cb33_media-35686.pdf", + "digest": "e6b2cb3387b287c8e72eb51985a8f8864f154bdede4808f93b227975c6923f58" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35687.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35687.pdf", + "name": "2015-01-17_bef3a1fa_media-35687.pdf", + "digest": "bef3a1fa5e7f848e58ffc89cb396f91aa417e0506f0d4e092391c58a7749ecd1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35688.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35688.pdf", + "name": "2015-01-17_521fc860_media-35688.pdf", + "digest": "521fc860f7aa763352fd7677696e04568a25d585ada4fbbfa83b8a20623aefda" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-17", + "url": "http://www.spiegel.de/media/media-35689.pdf", + "accomp_articles": [ + { + "url": "http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html", + "pubdate": "2015-01-17" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "media-35689.pdf", + "name": "2015-01-17_6bcb3b41_media-35689.pdf", + "digest": "6bcb3b4191ffe655f9c1158222bbbbb87915a6d3f3ab8724cd00cca0d2b2fe4e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-01-28", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1510163/cse-presentation-on-the-levitation-project.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/01/28/canada-cse-levitation-mass-surveillance/", + "pubdate": "2015-01-28" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/1510163-cse-presentation-on-the-levitation-project.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "cse-presentation-on-the-levitation-project.pdf", + "name": "2015-01-28_fa7dfd9c_cse-presentation-on-the-levitation-project.pdf", + "digest": "fa7dfd9cb9d6479ba65162a044f003a481fd8dcee4d9c70260e17d44a7dcf44d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1588694/who-else-is-targeting-your-target-collecting.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/02/04/demonize-prosecute-hackers-nsa-gchq-rely-intel-expertise/", + "pubdate": "2015-02-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/02/04/intolerant-else-targeting-target-collecting-data-stolen-hackers/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "who-else-is-targeting-your-target-collecting.pdf", + "name": "2015-02-04_9e1b1ff4_who-else-is-targeting-your-target-collecting.pdf", + "digest": "9e1b1ff46b222483bd699a40aeb3d41211f3828f9fa233345970ca1174767e4b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1588715/open-source-for-cyber-defence-progress.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/02/04/demonize-prosecute-hackers-nsa-gchq-rely-intel-expertise/", + "pubdate": "2015-02-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/02/04/happy-triggerlovely-horsezooltwo-face-open-source-cyber-defenceprogress/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "open-source-for-cyber-defence-progress.pdf", + "name": "2015-02-04_e15661f8_open-source-for-cyber-defence-progress.pdf", + "digest": "e15661f8d24015e1230331042cda04840c148b9d965fde39bc6d52e6b552cd6d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1588722/lovely-horse.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/02/04/demonize-prosecute-hackers-nsa-gchq-rely-intel-expertise/", + "pubdate": "2015-02-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/02/04/lovely-horse-gchq-wiki-overview/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "lovely-horse.pdf", + "name": "2015-02-04_cd18fa4d_lovely-horse.pdf", + "digest": "cd18fa4daa0e4a551ef9450d14dbc742848481d1d8e1ec2d95d3974c4f22a43c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1598330/nato-civilian-intelligence-council-cyber-panel.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/02/04/demonize-prosecute-hackers-nsa-gchq-rely-intel-expertise/", + "pubdate": "2015-02-04" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/02/04/nato-civilian-intelligence-council-cyber-panel-us-talking-points/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nato-civilian-intelligence-council-cyber-panel.pdf", + "name": "2015-02-04_af4de47b_nato-civilian-intelligence-council-cyber-panel.pdf", + "digest": "af4de47bb692f3eb2175035bd30ad6945806096775408fce646d5d5c0ab5deda" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-10", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1658374/iran-current-topics-interaction-with-gchq.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/02/10/nsa-iran-developing-sophisticated-cyber-attacks-learning-attacks/", + "pubdate": "2015-02-10" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/02/10/iran-current-topics-interaction-gchq/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "iran-current-topics-interaction-with-gchq.pdf", + "name": "2015-02-10_7857876b_iran-current-topics-interaction-with-gchq.pdf", + "digest": "7857876b92f90f67424b569f5a80e9c22b892316ba7982d620adefa124b8ed99" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1670892/cne-access-to-core-mobile-networks.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/02/19/great-sim-heist/", + "pubdate": "2015-02-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/02/19/cne-access-core-mobile-networks-2/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "cne-access-to-core-mobile-networks.pdf", + "name": "2015-02-19_dda7747f_cne-access-to-core-mobile-networks.pdf", + "digest": "dda7747fc01fd87a1bae54caf9ca8bd380a0bd2ab48e423351eb365ad4856f73" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1670893/where-are-these-keys.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/02/19/great-sim-heist/", + "pubdate": "2015-02-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/02/19/keys/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "where-are-these-keys.pdf", + "name": "2015-02-19_e6fd9619_where-are-these-keys.pdf", + "digest": "e6fd96197c119e8cba6414c4cb6b521ac36b4b33d94ec7428e83975723115d59" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1670894/ccne-successes-jan10-mar10-trial.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/02/19/great-sim-heist/", + "pubdate": "2015-02-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/02/19/ccne-successes-jan10-mar10-trial/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "ccne-successes-jan10-mar10-trial.pdf", + "name": "2015-02-19_46daf2e6_ccne-successes-jan10-mar10-trial.pdf", + "digest": "46daf2e60c64e44e6cc4ebcf309c82ba69926199711bf38e1e992f33bd8c87f1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1670895/imsis-identified-with-ki-data-for-network.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/02/19/great-sim-heist/", + "pubdate": "2015-02-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/02/19/imsis-identified-ki-data-network-providers-jan10-mar10-trial/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "imsis-identified-with-ki-data-for-network.pdf", + "name": "2015-02-19_fac580e0_imsis-identified-with-ki-data-for-network.pdf", + "digest": "fac580e0987a9fca62daa28a3a1f1373cfc66287eec9f255418bf27b51bea91d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1670896/ccne-stats-summaries-jan10-mar10-trial.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/02/19/great-sim-heist/", + "pubdate": "2015-02-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/02/19/ccne-stats-summaries-jan10-mar10-trial/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "ccne-stats-summaries-jan10-mar10-trial.pdf", + "name": "2015-02-19_5b36a38d_ccne-stats-summaries-jan10-mar10-trial.pdf", + "digest": "5b36a38dc9b8364188c709dc1cf850a92c05ec0ef814296d96834bc59a59f772" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1670897/dapino-gamma-cne-presence-wiki.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/02/19/great-sim-heist/", + "pubdate": "2015-02-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/02/19/dapino-gamma-cne-presence-wiki/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "dapino-gamma-cne-presence-wiki.pdf", + "name": "2015-02-19_fa3153ea_dapino-gamma-cne-presence-wiki.pdf", + "digest": "fa3153ea057dd369ae0cb6fe6aea83b35001fd7c18a3032c0246ee452e7eb13e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1670898/dapino-gamma-gemalto-yuaawaa-wiki.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/02/19/great-sim-heist/", + "pubdate": "2015-02-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/02/19/dapino-gamma-gemalto-yuaawaa-wiki/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "dapino-gamma-gemalto-yuaawaa-wiki.pdf", + "name": "2015-02-19_c1146fd5_dapino-gamma-gemalto-yuaawaa-wiki.pdf", + "digest": "c1146fd5cc3a6833aeaebd351c3d73283d4a38b73b3ccee9187deadc04869921" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1670899/dapino-gamma-target-personalisation-centres.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/02/19/great-sim-heist/", + "pubdate": "2015-02-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/02/19/dapino-gamma-target-personalisation-centres-gemalto-wiki/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "dapino-gamma-target-personalisation-centres.pdf", + "name": "2015-02-19_e5cb966b_dapino-gamma-target-personalisation-centres.pdf", + "digest": "e5cb966b5d44125c23eab1c3c2849ff4f93644135003e003eb44fce4a618512f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1670900/ccne-email-harvesting-jan10-mar10-trial.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/02/19/great-sim-heist/", + "pubdate": "2015-02-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/02/19/ccne-email-harvesting-jan10-mar10-trial/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "ccne-email-harvesting-jan10-mar10-trial.pdf", + "name": "2015-02-19_c5b80188_ccne-email-harvesting-jan10-mar10-trial.pdf", + "digest": "c5b80188288fffff0025e8e89325b4a45835a13e2b73af8fb1fe7c7be8dd98cc" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1670901/ccne-email-addresses-jan10-mar10-trial.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/02/19/great-sim-heist/", + "pubdate": "2015-02-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/02/19/ccne-email-addresses-jan10-mar10-trial/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "ccne-email-addresses-jan10-mar10-trial.pdf", + "name": "2015-02-19_b7b45110_ccne-email-addresses-jan10-mar10-trial.pdf", + "digest": "b7b45110da3b62fdbadea28d269de949b912442e181b84b81b3f35ddcbb28327" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-19", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1670902/pcs-harvesting-at-scale.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/02/19/great-sim-heist/", + "pubdate": "2015-02-19" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/02/19/pcs-harvesting-scale/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "pcs-harvesting-at-scale.pdf", + "name": "2015-02-19_0d86d74d_pcs-harvesting-at-scale.pdf", + "digest": "0d86d74d6fd30e5d8936fbdaa77d3d81a6d0cf0d27b7d7704f003e6acad1bcbc" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-25", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1676153/csec-its-dsco-2010-20101026-final.pdf", + "accomp_articles": [ + { + "url": "http://www.cbc.ca/news/canada/cse-monitors-millions-of-canadian-emails-to-government-1.2969687", + "pubdate": "2015-02-25" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/1676153-csec-its-dsco-2010-20101026-final.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "csec-its-dsco-2010-20101026-final.pdf", + "name": "2015-02-25_c7050209_csec-its-dsco-2010-20101026-final.pdf", + "digest": "c70502094c8635bf7679bccb35e937d0b05aab3d201f227b2c2ed8a876d8b946" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-02-25", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1676540/5iiarc-conference-september-2010-csec-briefing.pdf", + "accomp_articles": [ + { + "url": "http://www.cbc.ca/news/canada/cse-monitors-millions-of-canadian-emails-to-government-1.2969687", + "pubdate": "2015-02-25" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/1676540-5iiarc-conference-september-2010-csec-briefing.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "5iiarc-conference-september-2010-csec-briefing.pdf", + "name": "2015-02-25_adf29ba3_5iiarc-conference-september-2010-csec-briefing.pdf", + "digest": "adf29ba32d024e2bef92b06040d3146103fc7bdfc0b6cb25226e1042f7a0d15a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-06", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1682099/gcsb-signit-development-quartery-report.pdf", + "accomp_articles": [ + { + "url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11411759", + "pubdate": "2015-03-05" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/1682099-gcsb-signit-development-quartery-report.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gcsb-signit-development-quartery-report.pdf", + "name": "2015-03-06_9cb481af_gcsb-signit-development-quartery-report.pdf", + "digest": "9cb481af82be9cdb83431ac18492bf437c06a9f2329189e75bce2bb9fabed855" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-06", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1682103/auditing-from-june-2009-minutes.pdf", + "accomp_articles": [ + { + "url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11411759", + "pubdate": "2015-03-05" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/1682103-auditing-from-june-2009-minutes.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "auditing-from-june-2009-minutes.pdf", + "name": "2015-03-06_5748c42f_auditing-from-june-2009-minutes.pdf", + "digest": "5748c42f545da1a832637b184f1ad76f0f1ab7019a116b26fde67f0ae5935d35" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-06", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1682105/sp2-from-june-2009-minutes.pdf", + "accomp_articles": [ + { + "url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11411759", + "pubdate": "2015-03-05" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/1682105-sp2-from-june-2009-minutes.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sp2-from-june-2009-minutes.pdf", + "name": "2015-03-06_31b0a623_sp2-from-june-2009-minutes.pdf", + "digest": "31b0a623fe576caeb7c6ae284fd89bb38b0a33d97fc64b4cc297eba9d792ed3b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-06", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1682106/xks-ironsand-full-take-1.pdf", + "accomp_articles": [ + { + "url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11411759", + "pubdate": "2015-03-05" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/1682106-xks-ironsand-full-take-1.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "xks-ironsand-full-take-1.pdf", + "name": "2015-03-06_7d4a9f5f_xks-ironsand-full-take-1.pdf", + "digest": "7d4a9f5f641e6f75cdb7bea2e38fda12d65c97421afe62d191b4e89bfd8e6ac3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-06", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1682107/where-is-xkeyscore.pdf", + "accomp_articles": [ + { + "url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11411759", + "pubdate": "2015-03-05" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/1682107-where-is-xkeyscore.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "where-is-xkeyscore.pdf", + "name": "2015-03-06_2625ba8f_where-is-xkeyscore.pdf", + "digest": "2625ba8fd2d2ec6d5ca2805281e01c48e25178dc645d9c389357063623659602" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-08", + "url": "http://static.stuff.co.nz/files/GCSBApril2010.pdf", + "accomp_articles": [ + { + "url": "http://www.stuff.co.nz/national/67082905/snowden-files-inside-waihopais-domes", + "pubdate": "2015-03-08" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "GCSBApril2010.pdf", + "name": "2015-03-08_b2290914_GCSBApril2010.pdf", + "digest": "b2290914dae7162d6529dca99567ddecbbd7dd910221691326e757d0364ed22e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-08", + "url": "http://static.stuff.co.nz/files/GCSBMarch2012.pdf", + "accomp_articles": [ + { + "url": "http://www.stuff.co.nz/national/67082905/snowden-files-inside-waihopais-domes", + "pubdate": "2015-03-08" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "GCSBMarch2012.pdf", + "name": "2015-03-08_294c99f6_GCSBMarch2012.pdf", + "digest": "294c99f630c825da184c0fb056518ff8254872252ef10014cc84c37b1284c869" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-08", + "url": "http://static.stuff.co.nz/files/NationalIDrules.pdf", + "accomp_articles": [ + { + "url": "http://www.stuff.co.nz/national/67082905/snowden-files-inside-waihopais-domes", + "pubdate": "2015-03-08" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "NationalIDrules.pdf", + "name": "2015-03-08_dff279b8_NationalIDrules.pdf", + "digest": "dff279b807e4119cf2aec01c6eb6d8ae6690f990c7535a459916fd3e9db1be5b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-10", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1683805/tcb-jamboree-2012.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/", + "pubdate": "2015-03-10" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/03/10/tcb-jamboree-2012/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "tcb-jamboree-2012.pdf", + "name": "2015-03-10_825b9634_tcb-jamboree-2012.pdf", + "digest": "825b96349981bdf977efabab35f7060e1563a9b4db6a58e456b88022e85bc38d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-10", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1683807/tcb-jamboree-2012-invitation.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/", + "pubdate": "2015-03-10" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/03/10/tcb-jamboree-2012-invitation/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "tcb-jamboree-2012-invitation.pdf", + "name": "2015-03-10_63f7e077_tcb-jamboree-2012-invitation.pdf", + "digest": "63f7e0777ed9b699f11d5ab04f8be396ae6be4e7fe81c3b18be99d46ca6aab87" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-10", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1683808/apple-a4-a5-application-processors-analysis.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/", + "pubdate": "2015-03-10" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/03/10/apple-a4a5-application-processors-analysis/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "apple-a4-a5-application-processors-analysis.pdf", + "name": "2015-03-10_1b187a8a_apple-a4-a5-application-processors-analysis.pdf", + "digest": "1b187a8a87c6962ee507d57b378db6bdfd6fbe04b840bfb77721007242530d64" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-10", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1683809/strawhorse-attacking-the-macos-and-ios-software.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/", + "pubdate": "2015-03-10" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/03/10/strawhorse-attacking-macos-ios-software-development-kit/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "strawhorse-attacking-the-macos-and-ios-software.pdf", + "name": "2015-03-10_15e8a573_strawhorse-attacking-the-macos-and-ios-software.pdf", + "digest": "15e8a573d14cb6a9f92af045ec2a8c407c92a16cbd12ae6de840b1c8f9d104b3" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-10", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1683810/differential-power-analysis-on-the-apple-a4.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/", + "pubdate": "2015-03-10" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/03/10/differential-power-analysis-apple-a4-processor/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "differential-power-analysis-on-the-apple-a4.pdf", + "name": "2015-03-10_302de927_differential-power-analysis-on-the-apple-a4.pdf", + "digest": "302de9278a862dd212e50b318b5f160455da47b42a69b0a83b5a9121415f493f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-10", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1683811/secure-key-extraction-by-physical-de-processing.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/", + "pubdate": "2015-03-10" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/03/10/secure-key-extraction-physical-de-processing-apples-a4-processor/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "secure-key-extraction-by-physical-de-processing.pdf", + "name": "2015-03-10_335693a9_secure-key-extraction-by-physical-de-processing.pdf", + "digest": "335693a9a9462be8159d14541077d3edc433525904776771fb6ffcc591104bf2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-10", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1683812/tpm-vulnerabilities-to-power-analysis-and-an.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/", + "pubdate": "2015-03-10" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/03/10/tpm-vulnerabilities-power-analysis-exposed-exploit-bitlocker/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "tpm-vulnerabilities-to-power-analysis-and-an.pdf", + "name": "2015-03-10_fbc1f0f4_tpm-vulnerabilities-to-power-analysis-and-an.pdf", + "digest": "fbc1f0f432da204bb9bdbca382233be38fc9674c63bd52b2f160bbf181733570" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-10", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1683813/rocoto-implanting-the-iphone.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/", + "pubdate": "2015-03-10" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/03/10/rocoto-implanting-iphone/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "rocoto-implanting-the-iphone.pdf", + "name": "2015-03-10_23a3cf1b_rocoto-implanting-the-iphone.pdf", + "digest": "23a3cf1bffb70e3f9c3edf4f66ed6561821fb90521a88541c63f4d89397fbbf1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-10", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1683814/black-budget-cryptanalysis-amp-exploitation.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/", + "pubdate": "2015-03-10" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/03/10/black-budget-cryptanalysis-exploitation-services-analysis-target-systems/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "black-budget-cryptanalysis-amp-exploitation.pdf", + "name": "2015-03-10_8fbe6aca_black-budget-cryptanalysis-amp-exploitation.pdf", + "digest": "8fbe6aca9aa5946719edc327bc24e3886a2cde7b5b1035e8c64094ead9ba3f68" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-10", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1683815/smurf-capability-iphone.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/", + "pubdate": "2015-03-10" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/03/10/smurf-capability-iphone/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "smurf-capability-iphone.pdf", + "name": "2015-03-10_33eadfcd_smurf-capability-iphone.pdf", + "digest": "33eadfcd31ee8622c8bac04f112f48ea39e3b8cc5c8efcf093f61f2000e197e7" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-10", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1683920/nzodnipaperapr13-v1-0-pdf-redacted.pdf", + "accomp_articles": [ + { + "url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11415172", + "pubdate": "2015-03-11" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/1683920-nzodnipaperapr13-v1-0-pdf-redacted.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nzodnipaperapr13-v1-0-pdf-redacted.pdf", + "name": "2015-03-10_912066cf_nzodnipaperapr13-v1-0-pdf-redacted.pdf", + "digest": "912066cf00ae12862aff5a6885449bb1c1a9ffb8213d22c69f52263deb2cb350" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-10", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1683921/sdf-mins-09-redacted.pdf", + "accomp_articles": [ + { + "url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11415172", + "pubdate": "2015-03-11" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/1683921-sdf-mins-09-redacted.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sdf-mins-09-redacted.pdf", + "name": "2015-03-10_c4e4a9f6_sdf-mins-09-redacted.pdf", + "digest": "c4e4a9f679801cb7b4135b44a463e005b37c58793cbada01d6801bc4152c3203" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1684763/suslow-march-2013.pdf", + "accomp_articles": [ + { + "url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11415172", + "pubdate": "2015-03-11" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/1684763-suslow-march-2013.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "suslow-march-2013.pdf", + "name": "2015-03-11_07473076_suslow-march-2013.pdf", + "digest": "0747307606a4f93379f70c3606e7637bb8942ff33395c610805a32867c84a410" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-14", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1687162/solomon.pdf", + "accomp_articles": [ + { + "url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11417386", + "pubdate": "2015-03-15" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/1687162-solomon.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "solomon.pdf", + "name": "2015-03-14_ecb8983a_solomon.pdf", + "digest": "ecb8983abc3e589ae1479a36060339e62d83bce442e8b1ff21c9d9c21d8215a7" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-14", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1687163/si-decrypt.pdf", + "accomp_articles": [ + { + "url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11417386", + "pubdate": "2015-03-15" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/1687163-si-decrypt.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "si-decrypt.pdf", + "name": "2015-03-14_8cadb15f_si-decrypt.pdf", + "digest": "8cadb15f91de76ee220c6daa832d643ba6d9b2bcc695b831f559c71d7651c076" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-23", + "url": "http://media.nzherald.co.nz/webcontent/document/pdf/201513/WTO%20document.pdf", + "accomp_articles": [ + { + "url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11421370", + "pubdate": "2015-03-23" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "WTO%20document.pdf", + "name": "2015-03-23_ccdc83b7_WTO%20document.pdf", + "digest": "ccdc83b71880c670f9420b45013dca1b04e71013dd24ebfcee1c37ab9feb71ad" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-23", + "url": "http://s3.documentcloud.org/documents/1691676/odni3april2013-canada-v1-0.pdf", + "accomp_articles": [ + { + "url": "http://www.cbc.ca/news/canada/communication-security-establishment-s-cyberwarfare-toolbox-revealed-1.3002978", + "pubdate": "2015-03-23" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "odni3april2013-canada-v1-0.pdf", + "name": "2015-03-23_8018cecd_odni3april2013-canada-v1-0.pdf", + "digest": "8018cecd5e15b38683f66b620166bb7440ac1e61d68b62f3e523325d52e97f8b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-23", + "url": "http://www.documentcloud.org/documents/1690221/doc-4-csec-sigint-discocon-2010.pdf", + "accomp_articles": [ + { + "url": "http://www.cbc.ca/news/canada/communication-security-establishment-s-cyberwarfare-toolbox-revealed-1.3002978", + "pubdate": "2015-03-23" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "doc-4-csec-sigint-discocon-2010.pdf", + "name": "2015-03-23_bcfc5fa7_doc-4-csec-sigint-discocon-2010.pdf", + "digest": "bcfc5fa7b2d85343e0719b1d7d9fcf05c6455c1fe451189e0655bf5a071d67d4" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-23", + "url": "http://www.documentcloud.org/documents/1690222/doc-5-cyber-csec-sdf-gchq-nov2009.pdf", + "accomp_articles": [ + { + "url": "http://www.cbc.ca/news/canada/communication-security-establishment-s-cyberwarfare-toolbox-revealed-1.3002978", + "pubdate": "2015-03-23" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "doc-5-cyber-csec-sdf-gchq-nov2009.pdf", + "name": "2015-03-23_63d5973a_doc-5-cyber-csec-sdf-gchq-nov2009.pdf", + "digest": "63d5973a87ed13d29e237861844d520a13378971add9606fe9d7a2aab1ad3a87" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-23", + "url": "http://www.documentcloud.org/documents/1690224/doc-6-cyber-threat-capabilities.pdf", + "accomp_articles": [ + { + "url": "http://www.cbc.ca/news/canada/communication-security-establishment-s-cyberwarfare-toolbox-revealed-1.3002978", + "pubdate": "2015-03-23" + } + ], + "alternative_files": [], + "presentation_url": "", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "doc-6-cyber-threat-capabilities.pdf", + "name": "2015-03-23_a64ecccb_doc-6-cyber-threat-capabilities.pdf", + "digest": "a64ecccb73459ea1e32da7a0ec1c478388dace28b07648673c00ec6e482c512a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-23", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1690204/cascade-2011.pdf", + "accomp_articles": [ + { + "url": "http://www.cbc.ca/news/canada/communication-security-establishment-s-cyberwarfare-toolbox-revealed-1.3002978", + "pubdate": "2015-03-23" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/1690204-cascade-2011.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "cascade-2011.pdf", + "name": "2015-03-23_00d5c835_cascade-2011.pdf", + "digest": "00d5c835d96de889d113fc392303c8db1b4e768bb72c6646a0aa0c432d961406" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-25", + "url": "https://prod01-cdn00.cdn.firstlook.org/wp-uploads/sites/1/2015/03/Isr3.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/03/25/netanyahus-spying-denial-directly-contradicted-secret-nsa-documents/", + "pubdate": "2015-03-25" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2015/03/25/netanyahus-spying-denial-directly-contradicted-secret-nsa-documents/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Isr3.png", + "name": "2015-03-25_3ed99292_Isr3.png", + "digest": "3ed99292fd056c441913822e6f63b1966fe391456b5cf1efd07140bb2ffb100d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-25", + "url": "https://prod01-cdn00.cdn.firstlook.org/wp-uploads/sites/1/2015/03/Screen-Shot-2015-03-25-at-11.53.05-AM.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/03/25/netanyahus-spying-denial-directly-contradicted-secret-nsa-documents/", + "pubdate": "2015-03-25" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2015/03/25/netanyahus-spying-denial-directly-contradicted-secret-nsa-documents/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Screen-Shot-2015-03-25-at-11.53.05-AM.png", + "name": "2015-03-25_827e4e1e_Screen-Shot-2015-03-25-at-11.53.05-AM.png", + "digest": "827e4e1e56464ddbb5bd0de1b6b21f0d0fb3bfb2e3457bb5fab352aa1a2ed67e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-25", + "url": "https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2015/03/1Isr-540x258.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/03/25/netanyahus-spying-denial-directly-contradicted-secret-nsa-documents/", + "pubdate": "2015-03-25" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2015/03/25/netanyahus-spying-denial-directly-contradicted-secret-nsa-documents/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "1Isr-540x258.png", + "name": "2015-03-25_12198e2f_1Isr-540x258.png", + "digest": "12198e2f55249503c09f65e9f8cd345bd2a025ca85e49bad401bbe9fce1ab354" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-03-25", + "url": "https://prod01-cdn03.cdn.firstlook.org/wp-uploads/sites/1/2015/03/israel1-540x164.png", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/03/25/netanyahus-spying-denial-directly-contradicted-secret-nsa-documents/", + "pubdate": "2015-03-25" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2015/03/25/netanyahus-spying-denial-directly-contradicted-secret-nsa-documents/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "israel1-540x164.png", + "name": "2015-03-25_3b4c8683_israel1-540x164.png", + "digest": "3b4c8683e219c8b4a99e3dc9e790d9c2a82ac353d8464e83804b7c5132b1612b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-04-02", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1700030/extended-enterprise-docs.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/04/02/gchq-argentina-falklands/", + "pubdate": "2015-04-02" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/04/02/nsa-extended-enterprise/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "extended-enterprise-docs.pdf", + "name": "2015-04-02_cda4ec24_extended-enterprise-docs.pdf", + "digest": "cda4ec24fbd64cb2e04739cc57c7dfce57e11947397c1ca1ba0d5e9f6e86b775" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-04-02", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1700031/behavioral.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/04/02/gchq-argentina-falklands/", + "pubdate": "2015-04-02" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/04/02/behavioural/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "behavioral.pdf", + "name": "2015-04-02_16c4208e_behavioral.pdf", + "digest": "16c4208e87cd022a0ef4d2d3877eed96d1110d36ea92f5432877ccf2c24231a0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-04-02", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1700032/comet.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/04/02/gchq-argentina-falklands/", + "pubdate": "2015-04-02" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/04/02/comet-news-march-2010/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "comet.pdf", + "name": "2015-04-02_49eb9a9a_comet.pdf", + "digest": "49eb9a9a731432a2690759b290fc2450dc6cd6ecb56ede2c44a406d6bdf8bd15" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-04-02", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1700033/jtrig.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/04/02/gchq-argentina-falklands/", + "pubdate": "2015-04-02" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/04/02/jtrig-wiki-highlights-august-2009/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "jtrig.pdf", + "name": "2015-04-02_e45a564f_jtrig.pdf", + "digest": "e45a564f6972dac1ed9c099c1f75f963ee5b8dcb50868e3dba1c8e74f900a57e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-04-02", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1700034/nac-review.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/04/02/gchq-argentina-falklands/", + "pubdate": "2015-04-02" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/04/02/nac-2q-2011-business-review/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nac-review.pdf", + "name": "2015-04-02_d440175f_nac-review.pdf", + "digest": "d440175fa15a30e086cb2dd7972e879b1cddac97d52db08a08a6e39d72d097d2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-04-02", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/1700040/mda-workshop-ppt-pg1-and-19.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/04/02/gchq-argentina-falklands/", + "pubdate": "2015-04-02" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/04/02/gchq-mission-driven-access-workshop/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "mda-workshop-ppt-pg1-and-19.pdf", + "name": "2015-04-02_b1a82493_mda-workshop-ppt-pg1-and-19.pdf", + "digest": "b1a82493ed5e728629b646e97f4e7b33b2d1e42e7e0bd633854fd7a08ca8101d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-04-19", + "url": "http://media.nzherald.co.nz/webcontent/infographics/357/Snowden1.png", + "accomp_articles": [ + { + "url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11434886", + "pubdate": "2015-04-19" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11434886", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Snowden1.png", + "name": "2015-04-19_5219f9a7_Snowden1.png", + "digest": "5219f9a715d481c9bc669016979f319b87adf825a960a6d1c67676a82f9bb48e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-04-19", + "url": "http://media.nzherald.co.nz/webcontent/infographics/357/Snowden2.png", + "accomp_articles": [ + { + "url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11434886", + "pubdate": "2015-04-19" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11434886", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Snowden2.png", + "name": "2015-04-19_0ff113c6_Snowden2.png", + "digest": "0ff113c60ee7cbc41788935c74357bb1d3e4d7c9f7e0db4431ee65b680516f3e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-04-19", + "url": "http://media.nzherald.co.nz/webcontent/infographics/357/Snowden3.png", + "accomp_articles": [ + { + "url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11434886", + "pubdate": "2015-04-19" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11434886", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Snowden3.png", + "name": "2015-04-19_5c8c6d77_Snowden3.png", + "digest": "5c8c6d77258541d02c459ef47ac990799a81bf76203a6fd2805686e650983a83" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-04-19", + "url": "http://media.nzherald.co.nz/webcontent/infographics/357/Snowden4.png", + "accomp_articles": [ + { + "url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11434886", + "pubdate": "2015-04-19" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11434886", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Snowden4.png", + "name": "2015-04-19_90e789cc_Snowden4.png", + "digest": "90e789ccbc3c9880d96a23ba00fe4d9d60cc2a991778bb18fa1b06dec5250433" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-04-19", + "url": "http://media.nzherald.co.nz/webcontent/infographics/357/Snowden5.png", + "accomp_articles": [ + { + "url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11434886", + "pubdate": "2015-04-19" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11434886", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "Snowden5.png", + "name": "2015-04-19_f6aadc37_Snowden5.png", + "digest": "f6aadc37958b5d06c64be790a4fc9608d12f5446cdce64e3fdf99159eae78944" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-05", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2072013/black-budget-262.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/", + "pubdate": "2015-05-05" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/05/black-budget-fy-2013-congressional-budget-justificationnational-intelligence-program-p-262/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "black-budget-262.pdf", + "name": "2015-05-05_73701e50_black-budget-262.pdf", + "digest": "73701e5015a3c7e27951ba5f9d3748a756c25143b8c7aaa3e62c5037ba1b24b5" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-05", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2072015/human-language-technology.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/", + "pubdate": "2015-05-05" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/05/classification-guide-human-language-technology-hlt-models/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "human-language-technology.pdf", + "name": "2015-05-05_f4d5d14a_human-language-technology.pdf", + "digest": "f4d5d14adf05036715c2d5036cf9ff000534381e9904e394ff21e19c3085d66d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-05", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2072016/wg-advice-to-security-service.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/", + "pubdate": "2015-05-05" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/05/sirdcc-speech-technology-wg-assessment-current-stt-technology/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "wg-advice-to-security-service.pdf", + "name": "2015-05-05_6957e104_wg-advice-to-security-service.pdf", + "digest": "6957e1047faa2eff7d868c911ef21571ce4139214a6cc7eb7fecf162436ca2bd" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-05", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2072017/sidtoday-finding-nuggets-final.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/", + "pubdate": "2015-05-05" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/05/finding-nuggets-quickly-heap-voice-collection-mexico-afghanistan/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sidtoday-finding-nuggets-final.pdf", + "name": "2015-05-05_5b962e76_sidtoday-finding-nuggets-final.pdf", + "digest": "5b962e76a08bce4c79d0241600a988218d6316841b3c66449eefe86949375691" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-05", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2072018/sidtoday-future-is-now-conclusion-final.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/", + "pubdate": "2015-05-05" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/05/media-mining-future-now-conclusion/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sidtoday-future-is-now-conclusion-final.pdf", + "name": "2015-05-05_034fca32_sidtoday-future-is-now-conclusion-final.pdf", + "digest": "034fca327205d005c45fb22d2f5df3967cae7547525b8e0fdafa9f8c5beb080d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-05", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2072019/sidtoday-future-is-now-final.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/", + "pubdate": "2015-05-05" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/05/media-mining-future-now/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sidtoday-future-is-now-final.pdf", + "name": "2015-05-05_57890dbd_sidtoday-future-is-now-final.pdf", + "digest": "57890dbde2c24619c71f3fbf2d4e477a5cfe80c3de3ebf3309c3f08c1e26cdad" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-05", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2072020/sidtoday-is-hlt-progressing-final.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/", + "pubdate": "2015-05-05" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/05/human-language-hlt-progressing/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sidtoday-is-hlt-progressing-final.pdf", + "name": "2015-05-05_00e9b1a4_sidtoday-is-hlt-progressing-final.pdf", + "digest": "00e9b1a43f1ef11dca4a6eea47f4453898a37f03e05f3695bce7b14a7c969bbd" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-05", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2072021/sidtoday-non-linguists-final.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/", + "pubdate": "2015-05-05" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/05/coming-soon-tool-enables-non-linguists-analyze-foreign-tv-news-programs/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sidtoday-non-linguists-final.pdf", + "name": "2015-05-05_3bdd20eb_sidtoday-non-linguists-final.pdf", + "digest": "3bdd20eb870dc9d6ee998a11bccbd7d2f6b2976813fdc3c09695486233d31abf" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-05", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2072022/sidtoday-tsunami-of-intercept-final.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/", + "pubdate": "2015-05-05" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/05/dealing-tsunami-intercept/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sidtoday-tsunami-of-intercept-final.pdf", + "name": "2015-05-05_b81ec776_sidtoday-tsunami-of-intercept-final.pdf", + "digest": "b81ec7760cbeb69e13cf382ede1e502b2c8a89530856082117f0f894402e2161" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-05", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2072024/rt10-overview.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/", + "pubdate": "2015-05-05" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/05/rt10-overview/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "rt10-overview.pdf", + "name": "2015-05-05_d965e7b2_rt10-overview.pdf", + "digest": "d965e7b2be55a01c3d6fe6fda0531ab6f9467a7766adf905f717eb9d0aa8caaf" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-05", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2072025/black-budget-360-364.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/", + "pubdate": "2015-05-05" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/05/black-budget-fy-2013-congressional-budget-justificationnational-intelligence-program-pp-360-364/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "black-budget-360-364.pdf", + "name": "2015-05-05_d19cc161_black-budget-360-364.pdf", + "digest": "d19cc161ef41a099879d9fc0a24e47a97479a1e9580f8eeeb0e68df47a448343" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-08", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2074620/skynet-courier-detection-via-machine-learning.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/08/u-s-government-designated-prominent-al-jazeera-journalist-al-qaeda-member-put-watch-list/", + "pubdate": "2015-05-08" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/08/skynet-courier/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "skynet-courier-detection-via-machine-learning.pdf", + "name": "2015-05-08_d64b2a68_skynet-courier-detection-via-machine-learning.pdf", + "digest": "d64b2a68973e894fb1564d7ee8b691362a97f8812508341464d3d2ded20fa34c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-08", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2074625/skynet-applying-advanced-cloud-based-behavior.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/08/u-s-government-designated-prominent-al-jazeera-journalist-al-qaeda-member-put-watch-list/", + "pubdate": "2015-05-08" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/08/skynet-applying-advanced-cloud-based-behavior-analytics/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "skynet-applying-advanced-cloud-based-behavior.pdf", + "name": "2015-05-08_d3699e74_skynet-applying-advanced-cloud-based-behavior.pdf", + "digest": "d3699e74af2ba8c621452d3dcc07bacdf8b0846060fc020793b8b364dd330b59" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-18", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2082576/2007-07-18-sidtoday-sigint-obtains-deta-r.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/18/snowden-osama-bin-laden-raid/", + "pubdate": "2015-05-18" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/18/2007-sidtoday-bin-laden-message/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "2007-07-18-sidtoday-sigint-obtains-deta-r.pdf", + "name": "2015-05-18_6e43928e_2007-07-18-sidtoday-sigint-obtains-deta-r.pdf", + "digest": "6e43928eb443f163395cd203f469078e6a76da6740d09536b42671ceede20bd5" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-18", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2082577/2011-05-17-sidtoday-what-does-the-death-of-usama.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/18/snowden-osama-bin-laden-raid/", + "pubdate": "2015-05-18" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/18/sidtoday-interview-ubl/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "2011-05-17-sidtoday-what-does-the-death-of-usama.pdf", + "name": "2015-05-18_397fdca7_2011-05-17-sidtoday-what-does-the-death-of-usama.pdf", + "digest": "397fdca7c4874e632f7f9b5d17ab8e6a5c3e04860ef49093967d8c723c8fcde1" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-18", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2082578/2011-11-22-sidtoday-sigint-year-in-review.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/18/snowden-osama-bin-laden-raid/", + "pubdate": "2015-05-18" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/18/sidtoday-2011-review/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "2011-11-22-sidtoday-sigint-year-in-review.pdf", + "name": "2015-05-18_cd1a825b_2011-11-22-sidtoday-sigint-year-in-review.pdf", + "digest": "cd1a825b8d0d5c0265397697bcf7e12860237758188876b76bcf39844553e40e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-18", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2082580/rc-sw-intsum-20110619-20110620-r.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/18/snowden-osama-bin-laden-raid/", + "pubdate": "2015-05-18" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/18/rcsw-intel-june-19-2011/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "rc-sw-intsum-20110619-20110620-r.pdf", + "name": "2015-05-18_7b8e87e1_rc-sw-intsum-20110619-20110620-r.pdf", + "digest": "7b8e87e16de6adaacdd9534eafefe31ca75a1f3de650db6b0c01b1dc322a0df0" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-18", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2082581/rc-sw-intsum-20110623-20110624-r.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/18/snowden-osama-bin-laden-raid/", + "pubdate": "2015-05-18" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/18/rcsw-intel-report-june-23-2011/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "rc-sw-intsum-20110623-20110624-r.pdf", + "name": "2015-05-18_d9cb874e_rc-sw-intsum-20110623-20110624-r.pdf", + "digest": "d9cb874e326e58f7b00db0e458693894ee4c6eefebc049fe75a871bfeaa7d6dd" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-18", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2082582/shape-weekly-report-01-jun-2011-r.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/18/snowden-osama-bin-laden-raid/", + "pubdate": "2015-05-18" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/18/june-nato-afg-intel/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "shape-weekly-report-01-jun-2011-r.pdf", + "name": "2015-05-18_1c2ddf8f_shape-weekly-report-01-jun-2011-r.pdf", + "digest": "1c2ddf8f25b5b81a2b65d50d8823aa8023b242d69893ced6cdc267a96751b272" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-18", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2082583/shape-weekly-report-13-may-2011-r.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/18/snowden-osama-bin-laden-raid/", + "pubdate": "2015-05-18" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/18/may-nato-afg-intel/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "shape-weekly-report-13-may-2011-r.pdf", + "name": "2015-05-18_29dd7b49_shape-weekly-report-13-may-2011-r.pdf", + "digest": "29dd7b49827958672528c0125238afde2ac2037733d188ac61e91dea6cc67430" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-18", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2082901/nctc-current-status-of-major-terrorism-figures.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/18/snowden-osama-bin-laden-raid/", + "pubdate": "2015-05-18" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/18/nctc-terrorism-figures/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nctc-current-status-of-major-terrorism-figures.pdf", + "name": "2015-05-18_64bdae27_nctc-current-status-of-major-terrorism-figures.pdf", + "digest": "64bdae27e747cf3d214f670001c25e5013d3d5604f6de6c2fb516f620871b069" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-18", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2082989/fy13-black-budget-on-bin-laden-raid.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/18/snowden-osama-bin-laden-raid/", + "pubdate": "2015-05-18" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/18/fy2013-congressional-budget-justification-bin-laden-excerpts/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "fy13-black-budget-on-bin-laden-raid.pdf", + "name": "2015-05-18_5764b8b7_fy13-black-budget-on-bin-laden-raid.pdf", + "digest": "5764b8b79586768e392ccce94a6e7e23d26c5128a5cfa54f2246f8de45a8a17c" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-18", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2083025/jtac-attack-methodology-team.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/18/snowden-osama-bin-laden-raid/", + "pubdate": "2015-05-18" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/05/18/jtac-attack-methodology/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "jtac-attack-methodology-team.pdf", + "name": "2015-05-18_cc01ae60_jtac-attack-methodology-team.pdf", + "digest": "cc01ae60420c3613c034c7690833e62776b2b714445aebb80eaa6b118967dfab" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-21", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2083944/uc-web-report-final-for-dc.pdf", + "accomp_articles": [ + { + "url": "http://www.cbc.ca/news/canada/spy-agencies-target-mobile-phones-app-stores-to-implant-spyware-1.3076546", + "pubdate": "2015-05-21" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/2083944-uc-web-report-final-for-dc.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "uc-web-report-final-for-dc.pdf", + "name": "2015-05-21_b98fcfe3_uc-web-report-final-for-dc.pdf", + "digest": "b98fcfe388dc0a550027f854541f239692fc407f26a40059f8645f9c8f69d7fa" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-05-21", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2084666/medical-pattern-of-life-targeting-high-value.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/21/nsa-plan-find-osama-bin-laden-infiltrating-medical-supply-chain/", + "pubdate": "2015-05-21" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/2084666-medical-pattern-of-life-targeting-high-value.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "medical-pattern-of-life-targeting-high-value.pdf", + "name": "2015-05-21_03473c0d_medical-pattern-of-life-targeting-high-value.pdf", + "digest": "03473c0d2f3de02e3654feebc60308c4816f8ac3529954450a80b202cd9d229f" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2091502/snfsidconcur2012704-fbicyberfisas-v1-0-redacted.pdf", + "accomp_articles": [ + { + "url": "https://www.propublica.org/article/new-snowden-documents-reveal-secret-memos-expanding-spying", + "pubdate": "2015-06-04" + } + ], + "alternative_files": [], + "presentation_url": "https://www.propublica.org/documents/item/2091502-snfsidconcur2012704-fbicyberfisas-v1-0-redacted.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "snfsidconcur2012704-fbicyberfisas-v1-0-redacted.pdf", + "name": "2015-06-04_acf3226a_snfsidconcur2012704-fbicyberfisas-v1-0-redacted.pdf", + "digest": "acf3226af3e0f944308cbc28c92a484e89b55d1eb017974ac83cd7f6df4d32d4" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2092794/cyber-surveillance-documents.pdf", + "accomp_articles": [ + { + "url": "http://www.nytimes.com/2015/06/05/us/hunting-for-hackers-nsa-secretly-expands-internet-spying-at-us-border.html", + "pubdate": "2015-06-04" + } + ], + "alternative_files": [], + "presentation_url": "http://www.nytimes.com/interactive/2015/06/04/us/document-cyber-surveillance-documents.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "cyber-surveillance-documents.pdf", + "name": "2015-06-04_4377b219_cyber-surveillance-documents.pdf", + "digest": "4377b2199d0d81ac5b22d2acc21d8cbfa622cdf2b82ea8210d92318cd57f3f34" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2092819/new-faa702-certification-in-the-works-cyber.pdf", + "accomp_articles": [ + { + "url": "https://www.propublica.org/article/new-snowden-documents-reveal-secret-memos-expanding-spying", + "pubdate": "2015-06-04" + } + ], + "alternative_files": [], + "presentation_url": "https://www.documentcloud.org/documents/2092819-new-faa702-certification-in-the-works-cyber.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "new-faa702-certification-in-the-works-cyber.pdf", + "name": "2015-06-04_4691acd1_new-faa702-certification-in-the-works-cyber.pdf", + "digest": "4691acd178e8be573bd4463c5a27911ced5656f1b958ff17c8b4be26d51e8f5b" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2093173/cno-authorities.pdf", + "accomp_articles": [ + { + "url": "https://www.propublica.org/article/new-snowden-documents-reveal-secret-memos-expanding-spying", + "pubdate": "2015-06-04" + } + ], + "alternative_files": [], + "presentation_url": "https://www.propublica.org/documents/item/2093173-cno-authorities.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "cno-authorities.pdf", + "name": "2015-06-04_ce77597a_cno-authorities.pdf", + "digest": "ce77597a34e042286dde8748c272a95ead4248b0110f4929af04dc641bd7bfdd" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2093219/final-cyberspace-policy-review-secret-rel-5-eyes.pdf", + "accomp_articles": [ + { + "url": "https://www.propublica.org/article/new-snowden-documents-reveal-secret-memos-expanding-spying", + "pubdate": "2015-06-04" + } + ], + "alternative_files": [], + "presentation_url": "https://www.propublica.org/documents/item/2093219-final-cyberspace-policy-review-secret-rel-5-eyes.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "final-cyberspace-policy-review-secret-rel-5-eyes.pdf", + "name": "2015-06-04_801871bb_final-cyberspace-policy-review-secret-rel-5-eyes.pdf", + "digest": "801871bbeab781391e44b590fcb4e99a4fd18a645669d71d8f63d2ba729d11d2" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2093264/prism-briefing-1.pdf", + "accomp_articles": [ + { + "url": "https://www.propublica.org/article/new-snowden-documents-reveal-secret-memos-expanding-spying", + "pubdate": "2015-06-04" + } + ], + "alternative_files": [], + "presentation_url": "https://www.propublica.org/documents/item/2093264-prism-briefing-1.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "prism-briefing-1.pdf", + "name": "2015-06-04_1e29d80c_prism-briefing-1.pdf", + "digest": "1e29d80c4a0c4effc254f9f2152d1550904454021bf70460cfce8424d5b4c893" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2093265/prism-briefing-2.pdf", + "accomp_articles": [ + { + "url": "https://www.propublica.org/article/new-snowden-documents-reveal-secret-memos-expanding-spying", + "pubdate": "2015-06-04" + } + ], + "alternative_files": [], + "presentation_url": "https://www.propublica.org/documents/item/2093265-prism-briefing-2.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "prism-briefing-2.pdf", + "name": "2015-06-04_dd3bf17f_prism-briefing-2.pdf", + "digest": "dd3bf17f2f25d5965e9ffa3ee5ac623523975bc09b5a5a1093416d6ec77231ef" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-04", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2093304/sso-timeline.pdf", + "accomp_articles": [ + { + "url": "https://www.propublica.org/article/new-snowden-documents-reveal-secret-memos-expanding-spying", + "pubdate": "2015-06-04" + } + ], + "alternative_files": [], + "presentation_url": "https://www.propublica.org/documents/item/2093304-sso-timeline.html", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sso-timeline.pdf", + "name": "2015-06-04_1cbda7f3_sso-timeline.pdf", + "digest": "1cbda7f3fb9c05854fa222cddee9415fd7dad69ef82e2efb401476f088f863bb" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-11", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2096255/sidtoday-interview-with-a-sid-hacker.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/05/18/snowden-osama-bin-laden-raid/", + "pubdate": "2015-05-18" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/06/11/sidtoday-interview-sid-hacker/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "sidtoday-interview-with-a-sid-hacker.pdf", + "name": "2015-06-11_6a663ace_sidtoday-interview-with-a-sid-hacker.pdf", + "digest": "6a663aceb1458f8bb5f392c0f3dcdf4af486e95f2aac0c58cdaa1a7263b07838" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-22", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2106783/project-camberdada.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/06/22/nsa-gchq-targeted-kaspersky/", + "pubdate": "2015-06-22" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/06/22/project-camberdada-nsa/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "project-camberdada.pdf", + "name": "2015-06-22_02822ae2_project-camberdada.pdf", + "digest": "02822ae2dc779287d023f331b8baa157cd718858f095ed16b8b09e5363c7d056" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-22", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2106784/kaspersky-user-agent-strings-nsa.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/06/22/nsa-gchq-targeted-kaspersky/", + "pubdate": "2015-06-22" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/06/22/kaspersky-user-agent-strings/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "kaspersky-user-agent-strings-nsa.pdf", + "name": "2015-06-22_332a90aa_kaspersky-user-agent-strings-nsa.pdf", + "digest": "332a90aa41f4a622642affee58e0f0b2d4a2c2e752bb008556d683cc9a94c951" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-22", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2106815/operational-legalities-gchq-nov-28-2008.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/06/22/gchq-reverse-engineering-warrants/", + "pubdate": "2015-06-22" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/06/22/operational-legalities-gchq-powerpoint-presentation/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "operational-legalities-gchq-nov-28-2008.pdf", + "name": "2015-06-22_6f6f159a_operational-legalities-gchq-nov-28-2008.pdf", + "digest": "6f6f159a95c46d38546d828e4d1e3d29a3f14947d1a03e54b4b1ad7e41f1c773" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-22", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2106821/malware-analysis-amp-reverse-engineering-acno.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/06/22/gchq-reverse-engineering-warrants/", + "pubdate": "2015-06-22" + }, + { + "url": "https://firstlook.org/theintercept/2015/06/22/nsa-gchq-targeted-kaspersky/", + "pubdate": "2015-06-22" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/06/22/malware-reverse-engineering/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "malware-analysis-amp-reverse-engineering-acno.pdf", + "name": "2015-06-22_13b1cc91_malware-analysis-amp-reverse-engineering-acno.pdf", + "digest": "13b1cc9116109e7a7f330d1c10999e73d5bcfefe89880efda1c15a88cf722bb7" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-22", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2106822/intrusion-analysis-gchq.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/06/22/gchq-reverse-engineering-warrants/", + "pubdate": "2015-06-22" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/06/22/intrusion-analysis-gchq/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "intrusion-analysis-gchq.pdf", + "name": "2015-06-22_9adf42a4_intrusion-analysis-gchq.pdf", + "digest": "9adf42a463af40657f79b6d960068c9df73ad81a0b967b4cbef1cdb9e57c4ca8" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-22", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2106823/software-reverse-engineering-gchq.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/06/22/gchq-reverse-engineering-warrants/", + "pubdate": "2015-06-22" + }, + { + "url": "https://firstlook.org/theintercept/2015/06/22/nsa-gchq-targeted-kaspersky/", + "pubdate": "2015-06-22" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/06/22/software-reverse-engineering-gchq/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "software-reverse-engineering-gchq.pdf", + "name": "2015-06-22_a123e2d2_software-reverse-engineering-gchq.pdf", + "digest": "a123e2d28465e661df086cd6723131a9a59011fd6887ede59fed133a6685ce9d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-22", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2106824/teca-product-centre-gchq-wiki.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/06/22/gchq-reverse-engineering-warrants/", + "pubdate": "2015-06-22" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/06/22/teca-product-centre-gchq-wiki/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "teca-product-centre-gchq-wiki.pdf", + "name": "2015-06-22_33401e7e_teca-product-centre-gchq-wiki.pdf", + "digest": "33401e7e1049ff7cf7d52dd5109e5bb09fbb99e7a2a4c4e0efdef87898127a1e" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-22", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2106825/reverse-engineering-gchq-wiki.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/06/22/gchq-reverse-engineering-warrants/", + "pubdate": "2015-06-22" + }, + { + "url": "https://firstlook.org/theintercept/2015/06/22/nsa-gchq-targeted-kaspersky/", + "pubdate": "2015-06-22" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/06/22/reverse-engineering-gchq-wiki/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "reverse-engineering-gchq-wiki.pdf", + "name": "2015-06-22_34edac1d_reverse-engineering-gchq-wiki.pdf", + "digest": "34edac1d5d6121329212160a18290e5f7f1526163d0d8a1eb2e8ac04f3c5e329" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-22", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2106826/gchq-application-for-renewal-of-warrant-gpw-1160.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/06/22/gchq-reverse-engineering-warrants/", + "pubdate": "2015-06-22" + }, + { + "url": "https://firstlook.org/theintercept/2015/06/22/nsa-gchq-targeted-kaspersky/", + "pubdate": "2015-06-22" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/06/22/gchq-warrant-renewal/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gchq-application-for-renewal-of-warrant-gpw-1160.pdf", + "name": "2015-06-22_fdfd9ac9_gchq-application-for-renewal-of-warrant-gpw-1160.pdf", + "digest": "fdfd9ac93d22f7e097d00e2b4874a12019fe517930a6456e1772a73a3d00fa9a" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-22", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2106842/tsi-legal-authorisation-flowcharts-targeting-amp.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/06/22/gchq-reverse-engineering-warrants/", + "pubdate": "2015-06-22" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/06/22/tsi-legal-flowcharts/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "tsi-legal-authorisation-flowcharts-targeting-amp.pdf", + "name": "2015-06-22_00bfcb76_tsi-legal-authorisation-flowcharts-targeting-amp.pdf", + "digest": "00bfcb768ed7f84059678a3f9764fc23b9d6610d50e7691399b1531e58a6341d" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-22", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2107478/ndist-gchqs-developing-cyber-defence-mission.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/06/22/nsa-gchq-targeted-kaspersky/", + "pubdate": "2015-06-22" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/06/22/ndist-gchqs-developing-cyber-defence-mission/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "ndist-gchqs-developing-cyber-defence-mission.pdf", + "name": "2015-06-22_4948d4cb_ndist-gchqs-developing-cyber-defence-mission.pdf", + "digest": "4948d4cbb5acc06d67dff77223109b89e2a922df440a3991ab8f5b89649cd767" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-22", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2107755/gchq-ministry-stakeholder-relationships.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/06/22/controversial-gchq-unit-domestic-law-enforcement-propaganda/", + "pubdate": "2015-06-22" + }, + { + "url": "https://firstlook.org/theintercept/2015/06/22/gchq-reverse-engineering-warrants/", + "pubdate": "2015-06-22" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/06/22/gchq-ministry-relationships/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "gchq-ministry-stakeholder-relationships.pdf", + "name": "2015-06-22_035b9386_gchq-ministry-stakeholder-relationships.pdf", + "digest": "035b9386073cbee8d2557559bbc21d970a3754874a4834d78cbe34a4e710d929" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-22", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2107835/fco-relationships-amp-goals-08-09-gchq.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/06/22/gchq-reverse-engineering-warrants/", + "pubdate": "2015-06-22" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/06/22/fco-relationships/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "fco-relationships-amp-goals-08-09-gchq.pdf", + "name": "2015-06-22_20495de5_fco-relationships-amp-goals-08-09-gchq.pdf", + "digest": "20495de565c146f6a566be96a99278c9e1512a4287783bcb2583e7fe14853d88" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-22", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2108174/behavioural-science-support-for-jtrigs-effects.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/06/22/controversial-gchq-unit-domestic-law-enforcement-propaganda/", + "pubdate": "2015-06-22" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/document/2015/06/22/behavioural-science-support-jtrig/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "behavioural-science-support-for-jtrigs-effects.pdf", + "name": "2015-06-22_997a3caf_behavioural-science-support-for-jtrigs-effects.pdf", + "digest": "997a3caf60956f284cba0a97e0f3129e5d1e432282fbc053c6499d2048cf9bec" + }, + "index": "" + } + ] + }, + { + "pubdate": "2015-06-26", + "url": "https://s3.amazonaws.com/s3.documentcloud.org/documents/2110724/nsa-report-on-nyt-warrantless-wiretapping-story.pdf", + "accomp_articles": [ + { + "url": "https://firstlook.org/theintercept/2015/06/26/nsa-started-investigating-new-york-times-original-warrantless-wiretapping-story/", + "pubdate": "2015-06-26" + } + ], + "alternative_files": [], + "presentation_url": "https://firstlook.org/theintercept/2015/06/26/nsa-started-investigating-new-york-times-original-warrantless-wiretapping-story/", + "published_files": [ + { + "index_type": "", + "file": { + "files": [], + "original_name": "nsa-report-on-nyt-warrantless-wiretapping-story.pdf", + "name": "2015-06-26_9ec5db78_nsa-report-on-nyt-warrantless-wiretapping-story.pdf", + "digest": "9ec5db782a224d559f8c5395cba05a4e1e8c535499f8b96fcdc1fd34a718a524" + }, + "index": "" + } + ] + } +] \ No newline at end of file diff --git a/doc/METHODOLOGY.md b/doc/METHODOLOGY.md index e57bc16..d2a6b38 100644 --- a/doc/METHODOLOGY.md +++ b/doc/METHODOLOGY.md @@ -122,3 +122,40 @@ containing the following information: - digest: The SHA256 digest of the content of the file. +## Primary Source Catalogue creation + +Cataloguing the Primary Sources is now a simple matter of combining +information from the discovery and retrieval steps:- + + $ python script/discodown.py data/discovered.jsonl + data/downloaded.jsonl + data/catalogue.json + +Each item in [data/catalogue.json](../data/catalogue.json) is an +object, in json notation:- + + { + pubdate: '', + url: '', + presentation_url: '', + published_files: [ + { + file: { + digest: '', + name: '', + original_name: '', + files: [] + }, + index_type: '', + index: '' + } + ], + alternative_files: [], + accompanying_articles: [ + { + pubdate: '', + url: '' + } + ] + } + diff --git a/script/discodown.py b/script/discodown.py new file mode 100644 index 0000000..cdd0b03 --- /dev/null +++ b/script/discodown.py @@ -0,0 +1,220 @@ +# discodown.py Combine discovered and downloaded document metadata. +# Copyright (C) 2015 jah +# +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see +# . + +""" +Combine the output of source-discover.py and down.py to create a josn +file of Primary Source document metadata. + +Usage: + discodown.py DISCO DOWN COMBI + discodown.py (-h | --help) + discodown.py --version + +Arguments: + DISCO path to a json lines file as output by source-discover.py + DOWN path to a json lines file as output by down.py + COMBI output a json file to this path, overwrite it if it exists + +Options: + -h --help Show this screen. + --version Show version. + +""" + +from docopt import docopt +import sys, json, copy + +SCHEMA = { + 'pubdate': '', + 'url': '', + 'presentation_url': '', + 'published_files': [], + 'alternative_files': [], + 'accomp_articles': [] +} +SCHEMA_ARTICLE = { + 'pubdate': '', + 'url': '' +} +SCHEMA_FILE = { + 'file': { + 'digest': '', + 'name': '', + 'original_name': '', + 'files': [] + }, + 'index_type': '', + 'index': '' +} + + +def combine(disco, down=None, existing=None): + '''Combine an item of discovered primary source info with an item + of downloaded primary source info. + + An absence of downloaded primary source info will result in the + creation of the same data structure as if the download info were + present, but with an empty list of 'published_files'. + + A previously combined pair can be supplied as the 'existing' + argument, in which case it will be appended with the appropriate + discovered info, i.e. the downloaded info is assumed to already exist + in 'existing' and is ignored. + ''' + + if existing: + o = existing + else: + o = copy.deepcopy(SCHEMA) + o['url'] = disco['url'] + o['pubdate'] = disco['pubdate'] + o['presentation_url'] = disco['presentation_url'] + if down: + f = copy.deepcopy(SCHEMA_FILE) + f['file']['digest'] = down['digest'] + f['file']['name'] = down['filename'] + f['file']['original_name'] = down['original_name'] + o['published_files'].append(f) + + a = copy.deepcopy(SCHEMA_ARTICLE) + a['url'] = disco['article_url'] + a['pubdate'] = disco['article_pubdate'] + o['accomp_articles'].append(a) + + return o + + +def main(args): + + combined_count = 0 + + # try to read and parse any previously combined entries. + try: + out_file = open(args['COMBI'], 'r') + except IOError, e: + combined = [] + else: + + try: + combined = json.load(out_file) + except ValueError, e: + combined = [] + + out_file.close() + + # combined map serves two purposes: + # - store the combined records for writing to out_file. + # - provide a lookup for previously combined entries. + # consumers need to test for the existence of an article url in + # and to retrieve the previosuly combined record. + combined_map = {} + for c in combined: + ckey = c['url'] or c['presentation_url'] + combined_map[ckey] = {'record': c} + combined_map[ckey]['articles'] = [ + art['url'] for art in c['accomp_articles'] + ] + + # read the discovery info into a lookup table of download urls. + # a document can have more than one accompanying article (e.g. two + # publishers collaborating on the publication of a document or + # two articles by the same publisher which accompany an + # overlapping set of documents), so the table maps download url to + # article url to document info. + # + # where a download url is absent, create or update 'combined' + # records from the document info alone. + discovered_map = {} + disco_file = open(args['DISCO'], 'r') + for line in disco_file: + o = json.loads(line) + url = o['url'] or o['presentation_url'] + art_url = o['article_url'] + if o['url']: + if url not in discovered_map: + discovered_map[url] = {} + if art_url not in discovered_map[url]: + discovered_map[url][art_url] = o + else: + # without a url, this doc cannot have been downloaded + # so just create an entry from the discovery info + if url not in combined_map: + # new non-down record + c = combine(o) + combined_count += 1 + # update combined_map to avoid repeating this creation + combined_map[url] = {'record': c, 'articles': [art_url]} + elif art_url not in combined_map[url]['articles']: + # update a non-down record + combine(o, existing=combined_map[url]['record']) + # avoid repeat + combined_map[url]['articles'].append(art_url) + print 'Updating non-download record: %s.' % url + + disco_file.close() + + # read the downloaded file info, find its corresponding discovery + # info and combine the two + down_file = open(args['DOWN'], 'r') + for line in down_file: + down = json.loads(line) + url = down['url'] + if url not in discovered_map: + # well this is unexpected + print('Downloaded file is not discovered? Are you mad? %s' + % url) + continue + + c = None + for art, disco in discovered_map[url].iteritems(): + if url in combined_map: + c = combined_map[url]['record'] + if art in combined_map[url]['articles']: + continue + combine(disco, down, existing=c) + combined_map[url]['articles'].append(art) + print 'Updating record: %s.' % url + else: + c = combine(disco, down, existing=c) + combined_map[url] = {'record': c, 'articles': [art]} + combined_count += 1 + + down_file.close() + + # open out_file for writing and empty it + out_file = open(args['COMBI'], 'w') + out_file.seek(0) + out_file.truncate() + + # extract the combined records from combined_map, sort and dump + json.dump(sorted([ x['record'] for x in combined_map.itervalues()], + key=lambda x: (x['pubdate'], + x['url'] or x['presentation_url']) + ), out_file, indent=4, separators=(',', ': ')) + + out_file.close() + + print 'Total records written: %d. New records: %d' % ( + len(combined_map), combined_count) + + return 0 + + +if __name__ == '__main__': + arguments = docopt(__doc__, version='0.0.1') + sys.exit(main(arguments)) +