This internal GCHQ form, which is undated, shows the procedure UK analysts follow for surveilling, or searching through already-acquired data for information from a person or organisation in a “sensitive” location – including the British Isles: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
This 2010 certification from the Director of National Intelligence and the Attorney General asserts that procedures are in place to ensure foreign intelligence gathering stays within the boundaries of the law by targeting people “who are reasonably believed to be outside the United States.” The breadth of the authority is, however, very wide, allowing surveillance of communications “about” 193 countries and other entities specified in a separate document: see the Washington Post article Court gave NSA broad leeway in surveillance, documents show, 30 June 2014.
This 24 November 2009 email from a GCHQ employee to NSA colleagues indicates that Monkey Puzzle, a tool associated with the datacentre-targeting Muscular project, has interfaces tailored to Google, Yahoo and Microsoft data: see the Washington Post article Microsoft, suspecting NSA spying, to ramp up efforts to encrypt its Internet traffic, 27 November 2013.
A Special Source Operations (SSO) document discusses the implications of a 3 October 2011 FISA Court opinion: see the Washington Post article NSA broke privacy rules thousands of times per year, audit finds, 15 August 2013.
A Targeting Rationale document details how NSA analysts should justify their targeting decisions: see the Washington Post article NSA broke privacy rules thousands of times per year, audit finds, 15 August 2013.
An NSA training slide detailing procedures when collection of information on US persons occurs: see the Washington Post article NSA broke privacy rules thousands of times per year, audit finds, 15 August 2013.
Presidential Policy Directive 20 ordered national security officials to create a target list for increased cyberspace offensives: see the Guardian article Obama orders US to draw up overseas target list for cyber-attacks, 7 June 2013.