This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…
This document is a presentation on a potential approach to circumventing TOR (The Onion Router) which allows users to remain anonymous on the web. The presentation explores one method of correlating TOR "exit node traffic, and traffic between client…
This document is a presentation about a new SIGINT processing application, ICREACH. The proposed application will enable "large scale expansion of communications metadata shared with IC partners." ICREACH makes "greater use" of NSA's communications…
This document is a memo submitted to the Foreign Intelligence Surveillance Court detailing the targetting minimization procedures used by the NSA in their surveillance of foreign and domestic communications.
This document is an extract from an internal GCHQ presentation. It lists email addresses associated with trials aimed at extracting encryption keys and other personalized data from individual mobile phone devices. The extraction keys were retrieved…
This document is a page from GCHQ's internal wiki, GCWiki. It is an extract from a glossary describing terms relating to INCENSER, a component of the GERONTIC program supplying data with assistance from Cable and Wireless using a rival company's…
This document is a report from the BOUNDLESSINFORMANT big data analysis tool used by the NSA. It shows the NSA's efforts in monitoring telephonic and internet communications in Germany in a 30 day period between December 10 2012 and Janurary 8 2013.
This document is a report prepared in conjunction between the NSA and GCHQ. It documents a collaborative plan to develop and use various surveillance tools aimed at subverting encryption technologies.