Top-secret NSA/GCHQ documents
The following documents show a few of the methods being used by NSA and GCHQ in order to spy on everyone's private electronic communications. More may be published here in the future.
NSA collects millions of contact lists
from e-mail and instant messaging accounts from around the world.
NSA tries to find weaknesses in Tor
, a widely used system for anonymous communications.
GCHQ's "Operation Mullenize"
, a method of "staining" machines by planting extra code in them in order to identify otherwise anonymous traffic.
, a dirty trick used by NSA to spy on Windows users to gain access to their personal data.