http://www.theguardian.com/world/2013/dec/02/dishfire-wabash-spy-language-snowden-files-nsa-surveillance-glossary
From Dishfire to Wabash: a quick guide to 21st-century spy speak
The NSA files leaked by Edward Snowden are full of intelligence services jargon. Decode the language of surveillance with our glossary of insider terminology
James Ball
1 December 2013
BlackfootName of an operation to bug the French mission to the UN.
BlarneySee Upstream.
Boundless InformantThe National Security Agency's internal analytic tool that allows it to monitor surveillance country by country and program by program.
Bruneau (or Hemlock)The codenames given to the Italian embassy in Washington by the NSA.
BlufStands for "bottom line up front" -- a request from NSA analysts to collect less data from the Muscular program (see below) because it is of no intelligence value.
BullrunThe NSA's efforts to undermine encryption technology that protects email accounts, banking transactions and official records. The UK has a similar programme, with both codenamed after civil war battles: Bullrun for the NSA and Edgehill for GCHQ.
Cheesy NameA GCHQ program that selects encryption keys that might be vulnerable to being cracked.
DishfireDatabase that stores text messages, for future use.
DNI (digital network information)Data sent across computer networks, such as web page requests, emails, voice over IP. (Formally, any information sent as "packets").
DNR (dialled number records)The metadata around phone calls, including the sending and receiving of phone numbers, call time and duration.
DropmireA surveillance method that involves bugging encrypted fax machines. Used to spy on the European Union embassy in New York.
EdgehillSee Bullrun.
Fisa court (Fisc)The foreign intelligence surveillance court, a secret US court which oversees surveillance under the Fisa Act.
FairviewSee Upstream.
Five EyesBritain, the US, Canada, Australia and New Zealand -- the club of English-speaking countries sharing intelligence.
GCHQGovernment Communications Headquarters, the UK intelligence agency focusing on signals and communications intelligence.
GenieAn NSA surveillance project to remotely implant spyware into overseas computers, including those in foreign embassies.
HumintShort for "human intelligence", refers to information gleaned directly from sources or undercover agents. See also Sigint.
KeyholeCode for images gathered by satellites.
KlondykeThe mission to snoop on the Greek embassy in Washington.
MainwayThe database where the NSA stores metadata of millions of phone calls for up to a year.
MarinaThe database where the NSA stores metadata of millions of internet users for up to a year.
MetadataThe "envelope" of a phone call or email, which could include the time, the duration, the phone numbers or email addresses, and the location of both parties.
MuscularProgram to intercept Google and Yahoo traffic, exposed by the Washington Post.
Noforn"Not for foreign distribution" -- a classification of some of the Snowden slides.
NSAThe National Security Agency, the US agency responsible for collecting and analysing intelligence, plus cybersecurity.
OakstarSee Upstream.
Operation SocialistThe name of a GCHQ cyber-attack on Belgium's main telecoms provider, Belgacom.
PerdidoThe codename for the bugging of EU missions in New York and Washington.
Polar BreezeA technique for tapping into nearby computers.
PowellThe operation to snoop on the Greek UN mission.
PrismA programme to collect data from internet companies including Google, Microsoft, Facebook and Apple.
Rampart-TSpying efforts against leaders of China, Russia and several eastern European states.
Royal ConciergeA GCHQ surveillance project to track foreign diplomats' movements by monitoring the booking systems of high-class hotels.
SigintShort for "signals intelligence", or information gathered through the interception of signals between people or computers. See also Humint.
SnacksThe NSA's Social Network Analysis Collaboration Knowledge Services, which analyses social hierarchies through text messages.
StormbrewSee Upstream.
TemporaA GCHQ programme to create a large-scale "internet buffer", storing internet content for three days and metadata for up to 30.
TorFree software allowing users to communicate anonymously.
TracfinDatabase storing information from credit card transactions
Turbulence, Turmoil and TumultData analysis tools used by the NSA to sift through the enormous amount of internet traffic that it sees, looking for connections to target.
UpstreamRefers to bulk-intercept programs, codenamed Fairview, Stormbrew, Oakstar and Blarney, to intercept data in huge fibre-optic communications cables.
VerizonOne of America's largest telecoms providers, from which the NSA collects the phone records (metadata) of millions of customers.
WabashThe codename given to the bugging of the French embassy in Washington.
XKeyscoreAn NSA program that allows analysts to search vast databases of emails, online chats and browsing histories of millions of individuals, with no prior authorisation.