This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…
This document is a memo originating from the office of the Attorney General of the United States. It describes the policies and procedures for disseminating mimimized intelligence information on U.S. citizens to foreign intelligence agencies,…
This document is a memo submitted to the Foreign Intelligence Surveillance Court that describes the procedures used by the NSA for determining the "foreignness" of persons targeted for surveillance. The document also describes the oversight and…
This document is an extract from a GCHQ programme report that discusses decryption research and development for accessing mobile devices and apps. The programme name is WOLFRAMITE.
This document is a NSA classification guide detailing the appropriate security classifications for describing different elements of program BULLRUN. This program is used to unlock encryption tools used to protect emails, banking and medical records.
This document contains an extract from the FY13 Congressional Budget Justification for the National Intelligence Program discussing the addition of another country to the MYSTIC program. The MYSTIC program monitors voice call metadata and content.
This is an extract from an internal NSA presentation. It relates to the provision of XKEYSCORE analytics program to the German BfV (Federal Office for the Protection of the Constitution).
This document is an internal GCHQ presentation. It describes various operations aimed at monitoring target's activities on social media using the SQEAKY DOLPHIN and ANTICRISISGIRL applications. It also more generally describes the value of the social…
This document contains a presentation prepared by GCHQ that demonstrates the real-time monitoring of online activity, through a program called SQUEAKY DOLPHIN. This program uses data from a GCHQ unit, GTE - Global Telecoms Exploitation, which…