On 28 January 2016 Canada’s Communications Security Establishment (CSE, formerly CSEC) admitted to the parliament that it had included Canadians’ metadata in its collection of foreign communications, which is prohibited in Canada by law.
This undated GCHQ spreadshhet clarifies how the agency categorises different aspects of intercepted communications: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
This undated GCHQ presentation includes, in its speakers notes, the statements that “We have a light oversight regime compared to [the] US” and “judicial oversight… [is] the main issue for us”: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
It’s been a while since we’ve had a ruling on the legality of the NSA’s call records programme from a US federal court. Back in December 2013, judges in two federal courts gave conflicting verdicts on whether the domestic collection that was the subject of the very first Snowden revelation was constitutional.
USA Today has revealed that a huge DEA phone records programme – which tracked and stored data relating to international phone calls placed by US persons – was halted as a result of Edward Snowden’s revelations. The DEA database predated 9/11 by almost ten years and “provided a blueprint for the far broader National Security Agency surveillance that followed.”
This CSEC presentation from 2011 communicates Canada’s current and future cyberwar plans to their Five Eyes partners: see the article Communication Security Establishment’s cyberwarfare toolbox revealed, 23 March 2015.
This NSA memo, dated 3 January 2011, draws analysts’ attention to a rule change, allowing “contact chaining, and other analysis, from and through any selector, irrespective of nationality and location, in order to follow or discover valid foreign intelligence targets”: see the New York Times article N.S.A. Gathers Data on Social Connections of U.S. Citizens, 28 September 2013.
This NSA presentation from 2011 gives an overview of anonymising technologies, including Tor: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
This undated presentation from NSA’s Network Analysis Center describes agency techniques for overcoming Virtual Private Networks (VPNs): see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.