HOME

TheInfoList



OR:

Global mass surveillance can be defined as the
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizati ...
of entire populations across national borders. Its existence was not widely acknowledged by governments and the mainstream media until the
global surveillance disclosures Global means of or referring to a globe and may also refer to: Entertainment * ''Global'' (Paul van Dyk album), 2003 * ''Global'' (Bunji Garlin album), 2007 * ''Global'' (Humanoid album), 1989 * ''Global'' (Todd Rundgren album), 2015 * Bruno ...
by
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
triggered a debate about the
right to privacy The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 150 national constitutions mention the right to privacy. On 10 December 194 ...
in the Digital Age. Its roots can be traced back to the middle of the 20th century when the
UKUSA Agreement The United Kingdom – United States of America Agreement (UKUSA, ) is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intellig ...
was jointly enacted by the United Kingdom and the United States, which later expanded to Canada, Australia, and New Zealand to create the present
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
alliance. The alliance developed cooperation arrangements with several "third-party" nations. Eventually, this resulted in the establishment of a global surveillance network, code-named "
ECHELON ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:Given the 5 dialects that use ...
" (1971).


Historical background

The origins of global surveillance can be traced back to the late 1940s after the
UKUSA Agreement The United Kingdom – United States of America Agreement (UKUSA, ) is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intellig ...
was collaboratively enacted by the United Kingdom and the United States, which eventually culminated in the creation of the global surveillance network code-named "
ECHELON ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:Given the 5 dialects that use ...
" in 1971. In the aftermath of the 1970s Watergate affair and a subsequent
congressional inquiry A United States congressional hearing is the principal formal method by which United States congressional committees collect and analyze information in the early stages of legislative policymaking. Whether confirmation hearings (a procedure unique ...
led by Sen.
Frank Church Frank Forrester Church III (July 25, 1924 – April 7, 1984) was an American politician and lawyer. A member of the Democratic Party, he served as a United States senator from Idaho from 1957 until his defeat in 1981. As of 2022, he is the longes ...
, it was revealed that the
NSA The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collec ...
, in collaboration with Britain's GCHQ, had routinely intercepted the international communications of prominent anti-
Vietnam War The Vietnam War (also known by #Names, other names) was a conflict in Vietnam, Laos, and Cambodia from 1 November 1955 to the fall of Saigon on 30 April 1975. It was the second of the Indochina Wars and was officially fought between North Vie ...
leaders such as
Jane Fonda Jane Seymour Fonda (born December 21, 1937) is an American actress, activist, and former fashion model. Recognized as a film icon, Fonda is the recipient of List of awards and nominations received by Jane Fonda, various accolades including two ...
and Dr.
Benjamin Spock Benjamin McLane Spock (May 2, 1903 – March 15, 1998) was an American pediatrician and left-wing political activist whose book '' Baby and Child Care'' (1946) is one of the best-selling books of the twentieth century, selling 500,000 copies ...
. Decades later, a multi-year investigation by the
European Parliament The European Parliament (EP) is one of the Legislature, legislative bodies of the European Union and one of its seven Institutions of the European Union, institutions. Together with the Council of the European Union (known as the Council and in ...
highlighted the NSA's role in economic espionage in a report entitled 'Development of Surveillance Technology and Risk of Abuse of Economic Information', in 1999. However, for the general public, it was a series of detailed disclosures of internal NSA documents in June 2013 that first revealed the massive extent of the NSA's spying, both foreign and domestic. Most of these were leaked by an ex-contractor,
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
. Even so, a number of these older global surveillance programs such as PRISM,
XKeyscore XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intellige ...
, and
Tempora Tempora is the codeword for a formerly-secret computer system that is used by the British Government Communications Headquarters (GCHQ). This system is used to buffer most Internet communications that are extracted from fibre-optic cables, so t ...
were referenced in the 2013 release of thousands of documents. Many countries around the world, including
Western Allies The Allies, formally referred to as the United Nations from 1942, were an international military coalition formed during the Second World War (1939–1945) to oppose the Axis powers, led by Nazi Germany, Imperial Japan, and Fascist Italy ...
and member states of
NATO The North Atlantic Treaty Organization (NATO, ; french: Organisation du traité de l'Atlantique nord, ), also called the North Atlantic Alliance, is an intergovernmental military alliance between 30 member states – 28 European and two N ...
, have been targeted by the "
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
" strategic alliance of Australia, Canada, New Zealand, the UK, and the United States—five English-speaking
Western countries The Western world, also known as the West, primarily refers to the various nations and states in the regions of Europe, North America, and Oceania.
aiming to achieve
Total Information Awareness Total Information Awareness (TIA) was a mass detection program by the United States Information Awareness Office. It operated under this title from February to May 2003 before being renamed Terrorism Information Awareness. Based on the concep ...
by
mastering the Internet Mastering the Internet (MTI) is a mass surveillance project led by the British communications intelligence agency Government Communications Headquarters (GCHQ) budgeted at over £1 billion. According to reports in '' The Register'' and '' The Su ...
with analytical tools such as the
Boundless Informant Boundless Informant (stylized as BOUNDLESSINFORMANT) is a big data analysis and data visualization tool used by the United States National Security Agency (NSA). It gives NSA managers summaries of the NSA's worldwide data collection activities b ...
. As confirmed by the NSA's director Keith B. Alexander on 26 September 2013, the NSA collects and stores all phone records of all American citizens. Much of the data is kept in large storage facilities such as the Utah Data Center, a US $1.5 billion
megaproject A megaproject is an extremely large-scale investment project. According to the ''Oxford Handbook of Megaproject Management'', "Megaprojects are large-scale, complex ventures that typically cost $1 billion or more, take many years to develop and ...
referred to by ''
The Wall Street Journal ''The Wall Street Journal'' is an American business-focused, international daily newspaper based in New York City, with international editions also available in Chinese and Japanese. The ''Journal'', along with its Asian editions, is published ...
'' as a "symbol of the spy agency's surveillance prowess." On 6 June 2013, Britain's ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
'' newspaper began publishing a series of revelations by an as yet unknown American whistleblower, revealed several days later to be ex-CIA and ex-NSA-contracted systems analyst Edward Snowden. Snowden gave a cache of documents to two journalists,
Glenn Greenwald Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author and lawyer. In 2014, he cofounded ''The Intercept'', of which he was an editor until he resigned in October 2020. Greenwald subsequently started publishing on Substac ...
and
Laura Poitras Laura Poitras (; born February 2, 1964) is an American director and producer of documentary films. Poitras has received numerous awards for her work, including the 2015 Academy Award for Best Documentary Feature for '' Citizenfour'', about Ed ...
. Greenwald later estimated that the cache contains 15,000–20,000 documents, some very large and detailed, and some very small. In over two subsequent months of publications, it became clear that the NSA had operated a complex web of spying programs that allowed it to intercept Internet and telephone conversations from over a billion users from dozens of countries around the world. Specific revelations were made about China, the European Union, Latin America, Iran and Pakistan, and Australia and New Zealand, however, the published documentation reveals that many of the programs indiscriminately collected bulk information directly from central servers and Internet backbones, which almost invariably carry and reroute information from distant countries. Due to this central server and backbone monitoring, many of the programs overlapped and interrelated with one another. These programs were often carried out with the assistance of US entities such as the
United States Department of Justice The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the United States government tasked with the enforcement of federal law and administration of justice in the United Stat ...
and the FBI,How Microsoft handed the NSA access to encrypted messages
''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
'', 12 July 2013. Retrieved 13 July 2013.
were sanctioned by US laws such as the FISA Amendments Act, and the necessary court orders for them were signed by the secret
Foreign Intelligence Surveillance Court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants aga ...
. Some of the NSA's programs were directly aided by national and foreign intelligence agencies, Britain's
GCHQ Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Uni ...
and Australia's ASD, as well as by large private telecommunications and Internet corporations, such as
Verizon Verizon Communications Inc., commonly known as Verizon, is an American multinational telecommunications conglomerate and a corporate component of the Dow Jones Industrial Average. The company is headquartered at 1095 Avenue of the Americas ...
,
Telstra Telstra Group Limited is an Australian telecommunications company that builds and operates telecommunications networks and markets voice, mobile, internet access, pay television and other products and services. It is a member of the S&P/ASX 2 ...
,
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
, and Facebook. Snowden's disclosures of the NSA's surveillance activities are a continuation of
news leak A news leak is the unsanctioned release of confidential information to news media. It can also be the premature publication of information by a news outlet, of information that it has agreed not to release before a specified time, in violation of ...
s which have been ongoing since the early 2000s. One year after the
September 11, 2001, attacks The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commercia ...
, former U.S. intelligence official William Binney was publicly critical of the NSA for spying on U.S. citizens. Further disclosures followed. On 16 December 2005, ''
The New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
'' published a report under the headline " Bush Lets U.S. Spy on Callers Without Courts." In 2006, further evidence of the NSA's domestic surveillance of U.S. citizens was provided by ''
USA Today ''USA Today'' (stylized in all uppercase) is an American daily middle-market newspaper and news broadcasting company. Founded by Al Neuharth on September 15, 1982, the newspaper operates from Gannett's corporate headquarters in Tysons, Virgini ...
''. The newspaper released a report on 11 May 2006, regarding the NSA's "massive database" of phone records collected from "tens of millions" of U.S. citizens. According to ''USA Today'', these phone records were provided by several telecom companies such as
AT&T AT&T Inc. is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the world's largest telecommunications company by revenue and the third largest provider of mobile ...
,
Verizon Verizon Communications Inc., commonly known as Verizon, is an American multinational telecommunications conglomerate and a corporate component of the Dow Jones Industrial Average. The company is headquartered at 1095 Avenue of the Americas ...
, and
BellSouth BellSouth, LLC (stylized as ''BELLSOUTH'' and formerly known as BellSouth Corporation) was an American telecommunications holding company based in Atlanta, Georgia. BellSouth was one of the seven original Regional Bell Operating Companies after ...
. In 2008, the security analyst Babak Pasdar revealed the existence of the so-called "Quantico circuit" that he and his team discovered in 2003 when brought on to update the carrier's security system. The circuit provided the U.S. federal government with a backdoor into the network of an unnamed wireless provider, which was later independently identified as
Verizon Verizon Communications Inc., commonly known as Verizon, is an American multinational telecommunications conglomerate and a corporate component of the Dow Jones Industrial Average. The company is headquartered at 1095 Avenue of the Americas ...
.


Snowden's disclosures

Snowden made his first contact with journalist
Glenn Greenwald Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author and lawyer. In 2014, he cofounded ''The Intercept'', of which he was an editor until he resigned in October 2020. Greenwald subsequently started publishing on Substac ...
of ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
'' in late 2012. The
timeline of mass surveillance disclosures A timeline is a display of a list of events in chronological order. It is typically a graphic design showing a long bar labelled with dates paralleling it, and usually contemporaneous events. Timelines can use any suitable scale representi ...
by Snowden continued throughout the entire year of 2013.


By category

Documents leaked by Snowden in 2013 include court orders, memos, and policy documents related to a wide range of surveillance activities.


Purposes

According to the April 2013 summary of documents leaked by Snowden, other than to combat terrorism, these surveillance programs were employed to assess the foreign policy and economic stability of other countries, and to gather "commercial secrets". In a statement addressed to the
National Congress of Brazil The National Congress of Brazil ( pt, Congresso Nacional do Brasil) is the legislative body of Brazil's federal government. Unlike the state legislative assemblies and municipal chambers, the Congress is bicameral, composed of the Federal Se ...
in early August 2013, journalist
Glenn Greenwald Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author and lawyer. In 2014, he cofounded ''The Intercept'', of which he was an editor until he resigned in October 2020. Greenwald subsequently started publishing on Substac ...
maintained that the U.S. government had used
counter-terrorism Counterterrorism (also spelled counter-terrorism), also known as anti-terrorism, incorporates the practices, military tactics, techniques, and strategies that governments, law enforcement, business, and intelligence agencies use to combat or ...
as a pretext for clandestine surveillance in order to compete with other countries in the "business, industrial and economic fields". In a December 2013 letter to the Brazilian government, Snowden wrote that "These programs were never about terrorism: they're about economic spying, social control, and diplomatic manipulation. They're about
power Power most often refers to: * Power (physics), meaning "rate of doing work" ** Engine power, the power put out by an engine ** Electric power * Power (social and political), the ability to influence people or events ** Abusive power Power may a ...
." According to White House panel member NSA didn't stop any terrorist attack. However NSA chief said, that surveillance programs stopped 54 terrorist plots. In an interview with ''
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
'' published on 12 August 2013, former NSA Director Michael Hayden admitted that "We (the NSA) steal secrets. We're number one in it". Hayden also added: "We steal stuff to make you safe, not to make you rich". According to documents seen by the news agency
Reuters Reuters ( ) is a news agency owned by Thomson Reuters Corporation. It employs around 2,500 journalists and 600 photojournalists in about 200 locations worldwide. Reuters is one of the largest news agencies in the world. The agency was est ...
, these "secrets" were subsequently funneled to authorities across the nation to help them launch criminal investigations of Americans. Federal agents are then instructed to "recreate" the investigative trail in order to "cover up" where the information originated. According to the congressional testimony of Keith B. Alexander,
Director of the National Security Agency The director of the National Security Agency (DIRNSA) is the highest-ranking official of the National Security Agency, which is a defense agency within the U.S. Department of Defense. The director of the NSA also concurrently serves as the Chie ...
, one of the purposes of its data collection is to store all the phone records inside a place that can be searched and assessed at all times. When asked by Senator
Mark Udall Mark Emery Udall ( ; born July 18, 1950) is an American politician who served as a United States Senator from Colorado from 2009 to 2015. A member of the Democratic Party, he previously served in the United States House of Representatives, repre ...
if the goal of the NSA is to collect the phone records of all Americans, Alexander replied, "Yes, I believe it is in the nation's best interest to put all the phone records into a lockbox that we could search when the nation needs to do it."


Targets and methods


Collection of metadata and other content

In the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country Continental United States, primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., ...
, the NSA is collecting the phone records of more than 300 million Americans. The international surveillance tool
XKeyscore XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intellige ...
allows government analysts to search through vast databases containing emails, online chats and the browsing histories of millions of individuals. Greenwald, Glenn (31 July 2013
"XKeyscore: NSA tool collects 'nearly everything a user does on the internet' XKeyscore Gives 'Widest-Reaching' Collection of Online Data NSA Analysts Require No Prior Authorization for Searches Sweeps Up Emails, Social Media Activity and Browsing History"
''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
''. Retrieved 1 August 2013.
Britain's global surveillance program
Tempora Tempora is the codeword for a formerly-secret computer system that is used by the British Government Communications Headquarters (GCHQ). This system is used to buffer most Internet communications that are extracted from fibre-optic cables, so t ...
intercepts the
fibre-optic An optical fiber, or optical fibre in Commonwealth English, is a flexible, transparent fiber made by drawing glass (silica) or plastic to a diameter slightly thicker than that of a human hair. Optical fibers are used most often as a means t ...
cables that form the backbone of the Internet. Under the NSA's PRISM surveillance program, data that has already reached its final destination would be directly harvested from the servers of the following U.S. service providers:
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washi ...
,
Yahoo! Yahoo! (, styled yahoo''!'' in its logo) is an American web services provider. It is headquartered in Sunnyvale, California and operated by the namesake company Yahoo Inc., which is 90% owned by investment funds managed by Apollo Global Mana ...
,
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
,
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dust ...
,
Paltalk Paltalk is a proprietary video group chat service that enables users to communicate by video, Internet chat, or voice. It offers chat rooms and the ability for users to create their own public virtual chat room. Paltalk Desktop is available on ma ...
,
AOL AOL (stylized as Aol., formerly a company known as AOL Inc. and originally known as America Online) is an American web portal and online service provider based in New York City. It is a brand marketed by the current incarnation of Yahoo! Inc. ...
,
Skype Skype () is a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for VoIP-based videotelephony, videoconferencing and voice calls. It also has instant messaging, file transfer, debi ...
,
YouTube YouTube is a global online video sharing and social media platform headquartered in San Bruno, California. It was launched on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim. It is owned by Google, and is the second mo ...
, and Apple Inc.


Contact chaining

The NSA uses the analysis of phone call and e-mail logs of American citizens to create sophisticated graphs of their social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information. According to
top secret Classified information is material that a government body deems to be sensitive information that must be protected. Access is restricted by law or regulation to particular groups of people with the necessary security clearance and need to kn ...
NSA documents leaked by Snowden, during a single day in 2012, the NSA collected
e-mail Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic (digital) version of, or counterpart to, mail, at a time when "mail" meant ...
address book An address book or a name and address book is a book, or a database used for storing entries called contacts. Each contact entry usually consists of a few standard fields (for example: first name, last name, company name, address, telephone n ...
s from: * 22,881
Gmail Gmail is a free email service provided by Google. As of 2019, it had 1.5 billion active users worldwide. A user typically accesses Gmail in a web browser or the official mobile app. Google also supports the use of email clients via the POP and ...
accounts * 82,857
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dust ...
accounts * 105,068
Hotmail Outlook.com is a webmail service that is part of the Microsoft 365 product family. It offers mail, Calendaring software, calendaring, Address book, contacts, and Task management, tasks services. Founded in 1996 by Sabeer Bhatia and Jack Smit ...
accounts * 444,743
Yahoo! Yahoo! (, styled yahoo''!'' in its logo) is an American web services provider. It is headquartered in Sunnyvale, California and operated by the namesake company Yahoo Inc., which is 90% owned by investment funds managed by Apollo Global Mana ...
accounts Each day, the NSA collects contacts from an estimated 500,000 buddy lists on live-chat services as well as from the inbox displays of Web-based e-mail accounts. Taken together, the data enables the NSA to draw detailed maps of a person's life based on their personal, professional, religious and political connections.


Data transfer

Federal agencies in the United States: Data gathered by these surveillance programs is routinely shared with the U.S.
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice ...
(FBI) and the U.S.
Central Intelligence Agency The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
(CIA). In addition, the NSA supplies domestic intercepts to the
Drug Enforcement Administration The Drug Enforcement Administration (DEA; ) is a United States federal law enforcement agency under the U.S. Department of Justice tasked with combating drug trafficking and distribution within the U.S. It is the lead agency for domestic en ...
(DEA),
Internal Revenue Service The Internal Revenue Service (IRS) is the revenue service for the United States federal government, which is responsible for collecting U.S. federal taxes and administering the Internal Revenue Code, the main body of the federal statutory t ...
(IRS), and other law enforcement agencies. Foreign countries: As a result of the NSA's
secret treaties A secret treaty is a treaty ( international agreement) in which the contracting state parties have agreed to conceal the treaty's existence or substance from other states and the public.Helmut Tichy and Philip Bittner, "Article 80" in Olivier D ...
with foreign countries, data gathered by its surveillance programs are routinely shared with countries who are signatories to the
UKUSA Agreement The United Kingdom – United States of America Agreement (UKUSA, ) is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intellig ...
. These foreign countries also help to operate several NSA programs such as
XKEYSCORE XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intellige ...
. (See
International cooperation In international relations, multilateralism refers to an alliance of multiple countries pursuing a common goal. Definitions Multilateralism, in the form of membership in international institutions, serves to bind powerful nations, discourage u ...
.)


Financial payments monitoring

A special branch of the NSA called "Follow the Money" (FTM) monitors international payments, banking and credit card transactions and later stores the collected data in the NSA's financial databank, "Tracfin".


Mobile phone location tracking

Mobile phone tracking Mobile phone tracking is a process for identifying the location of a mobile phone, whether stationary or moving. Localization may be effected by a number of technologies, such as the multilateration of radio signals between (several) cell towers ...
refers to the act of attaining the position and coordinates of a mobile phone. According to ''
The Washington Post ''The Washington Post'' (also known as the ''Post'' and, informally, ''WaPo'') is an American daily newspaper published in Washington, D.C. It is the most widely circulated newspaper within the Washington metropolitan area and has a large n ...
'', the NSA has been tracking the locations of mobile phones from all over the world by tapping into the cables that connect mobile networks globally and that serve U.S. cellphones as well as foreign ones. In the process of doing so, the NSA collects more than 5 billion records of phone locations on a daily basis. This enables NSA analysts to map cellphone owners' relationships by correlating their patterns of movement over time with thousands or millions of other phone users who cross their paths. In order to decode private conversations, the NSA has cracked the most commonly used cellphone encryption technology,
A5/1 A5/1 is a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard. It is one of several implementations of the A5 security protocol. It was initially kept secret, but became public knowledge through l ...
. According to a classified document leaked by Snowden, the agency can "process encrypted A5/1" even when it has not acquired an encryption key. In addition, the NSA uses various types of cellphone infrastructure, such as the links between carrier networks, to determine the location of a cellphone user tracked by Visitor Location Registers.


Infiltration of smartphones

As worldwide sales of
smartphone A smartphone is a portable computer device that combines mobile telephone and computing functions into one unit. They are distinguished from feature phones by their stronger hardware capabilities and extensive mobile operating systems, whi ...
s grew rapidly, the NSA decided to take advantage of the smartphone boom. This is particularly advantageous because the smartphone contains a variety of data sets that would interest an intelligence agency, such as social contacts, user behaviour, interests, location, photos and
credit card A credit card is a payment card issued to users (cardholders) to enable the cardholder to pay a merchant for goods and services based on the cardholder's accrued debt (i.e., promise to the card issuer to pay them for the amounts plus the ...
numbers and passwords. According to the documents leaked by Snowden, the NSA has set up task forces assigned to several smartphone manufacturers and
operating systems An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also in ...
, including Apple Inc.'s iPhone and iOS operating system, as well as
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
's Android mobile operating system. Similarly, Britain's
GCHQ Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Uni ...
assigned a team to study and crack the
BlackBerry The blackberry is an edible fruit produced by many species in the genus ''Rubus'' in the family Rosaceae, hybrids among these species within the subgenus ''Rubus'', and hybrids between the subgenera ''Rubus'' and ''Idaeobatus''. The taxonomy ...
. In addition, there are smaller NSA programs, known as "scripts", that can perform surveillance on 38 different features of the iOS 3 and
iOS 4 iOS 4 is the fourth major release of the iOS mobile operating system developed by Apple Inc., being the successor to iPhone OS 3. It was announced at the Apple Special Event on April 8, 2010, and was released on June 21, 2010. iOS 4 is the ...
operating systems. These include the
map A map is a symbolic depiction emphasizing relationships between elements of some space, such as objects, regions, or themes. Many maps are static, fixed to paper or some other durable medium, while others are dynamic or interactive. Although ...
ping feature,
voicemail A voicemail system (also known as voice message or voice bank) is a computer-based system that allows users and subscribers to exchange personal voice messages; to select and deliver voice information; and to process transactions relating to ind ...
and photos, as well as
Google Earth Google Earth is a computer program that renders a 3D computer graphics, 3D representation of Earth based primarily on satellite imagery. The program maps the Earth by superimposition, superimposing satellite images, aerial photography, and geog ...
,
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dust ...
and
Yahoo! Messenger Yahoo! Messenger (sometimes abbreviated Y!M) was an advertisement-supported instant messaging client (computing), client and associated protocol provided by Yahoo!. Yahoo! Messenger was provided free of charge and could be downloaded and used wit ...
.


Infiltration of commercial data centers

In contrast to the PRISM surveillance program, which is a front-door method of access that is nominally approved by the
FISA court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants agai ...
, the
MUSCULAR Skeletal muscles (commonly referred to as muscles) are organs of the vertebrate muscular system and typically are attached by tendons to bones of a skeleton. The muscle cells of skeletal muscles are much longer than in the other types of muscle ...
surveillance program is noted to be "unusually aggressive" in its usage of unorthodox hacking methods to infiltrate Yahoo! and Google
data centre A data center (American English) or data centre (British English)See spelling differences. is a building, a dedicated space within a building, or a group of buildings used to house computer systems and associated components, such as telecommun ...
s around the world. As the program is operated overseas (
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Europe, off the north-western coast of the continental mainland. It comprises England, Scotland, Wales and ...
), the NSA presumes that anyone using a foreign data link is a foreigner, and is, therefore, able to collect content and metadata on a previously unknown scale from U.S. citizens and residents. According to the documents leaked by Snowden, the MUSCULAR surveillance program is jointly operated by the NSA and Britain's
GCHQ Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Uni ...
agency. (See
International cooperation In international relations, multilateralism refers to an alliance of multiple countries pursuing a common goal. Definitions Multilateralism, in the form of membership in international institutions, serves to bind powerful nations, discourage u ...
.)


Infiltration of anonymous networks

The
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
have made repeated attempts to spy on Internet users communicating in secret via the anonymity network Tor. Several of their clandestine operations involve the implantation of malicious code into the computers of anonymous Tor users who visit infected websites. In some cases, the NSA and GCHQ have succeeded in blocking access to the anonymous network, diverting Tor users to insecure channels. In other cases, the NSA and the GCHQ were able to uncover the identity of these anonymous users.


Monitoring of hotel reservation systems

Under the Royal Concierge surveillance program, Britain's GCHQ agency uses an automated monitoring system to infiltrate the reservation systems of at least 350 luxury
hotel A hotel is an establishment that provides paid lodging on a short-term basis. Facilities provided inside a hotel room may range from a modest-quality mattress in a small room to large suites with bigger, higher-quality beds, a dresser, a re ...
s in many different parts of the world. Other related surveillance programs involve the wiretapping of room telephones and fax machines used in targeted hotels, as well as the monitoring of computers, hooked up to the hotel network.


Virtual reality surveillance

The U.S.
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
(NSA), the U.S.
Central Intelligence Agency The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
(CIA), and Britain's
Government Communications Headquarters Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Uni ...
(GCHQ) have been conducting surveillance on the networks of many online games, including
massively multiplayer online role-playing game A massively multiplayer online role-playing game (MMORPG) is a video game that combines aspects of a role-playing video game and a massively multiplayer online game. As in role-playing games (RPGs), the player assumes the role of a Player charac ...
s (MMORPGs) such as
World of Warcraft ''World of Warcraft'' (''WoW'') is a massively multiplayer online role-playing game (MMORPG) released in 2004 by Blizzard Entertainment. Set in the '' Warcraft'' fantasy universe, ''World of Warcraft'' takes place within the world of Azer ...
, as well as
virtual world A virtual world (also called a virtual space) is a computer-simulated environment which may be populated by many users who can create a personal avatar, and simultaneously and independently explore the virtual world, participate in its activities ...
s such as
Second Life ''Second Life'' is an online multimedia platform that allows people to create an avatar for themselves and then interact with other users and user created content within a multi player online virtual world. Developed and owned by the San Fr ...
, and the
Xbox Xbox is a video gaming brand created and owned by Microsoft. The brand consists of five video game consoles, as well as applications (games), streaming services, an online service by the name of Xbox network, and the development arm by the ...
gaming console.


Political Espionage

According to the April 2013 summary of disclosures, the NSA defined its "intelligence priorities" on a scale of "1" (highest interest) to "5" (lowest interest). It classified about 30 countries as "3rd parties", with whom it cooperates but also spies on: * Main targets: China, Russia, Iran, Pakistan and Afghanistan were ranked highly on the NSA's list of spying priorities, followed by France, Germany, Japan, and Brazil. The
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are located primarily in Europe, Europe. The union has a total area of ...
's "international trade" and "economic stability" are also of interest. Other high priority targets include Cuba, Israel, and North Korea. * Irrelevant: From a US intelligence perspective, countries such as Cambodia, Laos and Nepal were largely irrelevant, as were governments of smaller European Union countries such as Finland, Denmark, Croatia and the Czech Republic. Other prominent targets included members and adherents of the Internet group known as "
Anonymous Anonymous may refer to: * Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown ** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author * Anony ...
", as well as potential whistleblowers. According to Snowden, the NSA targeted reporters who wrote critically about the government after 9/11. As part of a joint operation with the
Central Intelligence Agency The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
(CIA), the NSA deployed secret eavesdropping posts in eighty U.S. embassies and consulates worldwide. The headquarters of
NATO The North Atlantic Treaty Organization (NATO, ; french: Organisation du traité de l'Atlantique nord, ), also called the North Atlantic Alliance, is an intergovernmental military alliance between 30 member states – 28 European and two N ...
were also used by NSA experts to spy on the European Union. In 2013, documents provided by Edward Snowden revealed that the following
intergovernmental organization Globalization is social change Social change is the alteration of the social order of a society which may include changes in social institutions, social behaviours or social relations. Definition Social change may not refer to the not ...
s, diplomatic missions, and government ministries have been subjected to surveillance by the "
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
":


International Cooperation

During
World War II World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the World War II by country, vast majority of the world's countries—including all of the great power ...
, the BRUSA Agreement was signed by the governments of the United States and the United Kingdom for the purpose of intelligence sharing.U.S. National Security Agency
Early Papers Concerning US-UK Agreement – 1940–1944
. Agreement between British Government Code and Cipher School and U.S. War Department dated 17 May 1943. Retrieved: 5 October 2013.
This was later formalized in the
UKUSA Agreement The United Kingdom – United States of America Agreement (UKUSA, ) is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intellig ...
of 1946 as a
secret treaty A secret treaty is a treaty ( international agreement) in which the contracting state parties have agreed to conceal the treaty's existence or substance from other states and the public.Helmut Tichy and Philip Bittner, "Article 80" in Olivier D ...
. The full text of the agreement was released to the public on 25 June 2010. Although the treaty was later revised to include other countries such as Denmark, Germany, Ireland, Norway, Turkey, and the Philippines, most of the information sharing has been performed by the so-called "
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
", a term referring to the following English-speaking
western democracies Liberal democracy is the combination of a liberal political ideology that operates under an indirect democratic form of government. It is characterized by elections between multiple distinct political parties, a separation of powers into diff ...
and their respective intelligence agencies: * – The
Australian Signals Directorate Australian Signals Directorate (ASD), formerly the Defence Signals Directorate (DSD) is the federal statutory agency in the Australian Government responsible for foreign signals intelligence, support to military operations, cyber warfare, and i ...
of Australia * – The
Communications Security Establishment The Communications Security Establishment (CSE; french: Centre de la sécurité des télécommunications, ''CST''), formerly (from 2008-2014) called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national ...
of Canada * – The
Government Communications Security Bureau The Government Communications Security Bureau (GCSB) ( mi, Te Tira Tiaki) is the public-service department of New Zealand charged with promoting New Zealand's national security by collecting and analysing information of an intelligence nature. ...
of New Zealand * – The
Government Communications Headquarters Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Uni ...
of the United Kingdom, which is widely considered to be a leader in traditional spying due to its influence on countries that were once part of the
British Empire The British Empire was composed of the dominions, colonies, protectorates, mandates, and other territories ruled or administered by the United Kingdom and its predecessor states. It began with the overseas possessions and trading posts e ...
. * – The
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
of the United States, which has the biggest budget and the most advanced technical abilities among the "''five eyes''".
Left: SEA-ME-WE 3, which runs across the
Afro-Eurasia Afro-Eurasia (also Afroeurasia, Eurafrasia or the Old World) is a landmass comprising the continents of Africa, Asia, and Europe. The terms are compound words of the names of its constituent parts. Its mainland is the largest and most popul ...
n
supercontinent In geology, a supercontinent is the assembly of most or all of Earth's continental blocks or cratons to form a single large landmass. However, some geologists use a different definition, "a grouping of formerly dispersed continents", which leav ...
from Japan to
Northern Germany Northern Germany (german: link=no, Norddeutschland) is a linguistic, geographic, socio-cultural and historic region in the northern part of Germany which includes the coastal states of Schleswig-Holstein, Mecklenburg-Vorpommern and Lower Saxony an ...
, is one of the most important
submarine cables Submarine cable is any electrical cable that is laid on the seabed, although the term is often extended to encompass cables laid on the bottom of large freshwater bodies of water. Examples include: *Submarine communications cable *Submarine power ...
accessed by the "Five Eyes". Singapore, a former British colony in the Asia-Pacific region (blue dot), plays a vital role in intercepting Internet and telecommunications traffic heading from Australia/Japan to Europe, and vice versa. An intelligence-sharing agreement between Singapore and Australia allows the rest of the "Five Eyes" to gain access to SEA-ME-WE 3.
Right: TAT-14, a telecommunications cable linking Europe with the United States, was identified as one of few assets of "Critical Infrastructure and Key Resources" of the US on foreign territory. In 2013, it was revealed that British officials "pressured a handful of telecommunications and Internet companies" to allow the British government to gain access to TAT-14. According to the leaked documents, aside from the Five Eyes, most other Western countries have also participated in the NSA surveillance system and are sharing information with each other. In the documents the NSA lists "approved SIGINT partners" which are partner countries in addition to the Five Eyes. Glenn Greenwald said that the "NSA often maintains these partnerships by paying its partner to develop certain technologies and engage in surveillance, and can thus direct how the spying is carried out." These partner countries are divided into two groups, "Second Parties" and "Third Parties". The Second Parties are doing comprehensive cooperation with the NSA, and the Third Parties are doing focused cooperation. However, being a partner of the NSA does not automatically exempt a country from being targeted by the NSA itself. According to an internal NSA document leaked by Snowden, "We (the NSA) can, and often do, target the signals of most 3rd party foreign partners."


Australia

The
Australian Signals Directorate Australian Signals Directorate (ASD), formerly the Defence Signals Directorate (DSD) is the federal statutory agency in the Australian Government responsible for foreign signals intelligence, support to military operations, cyber warfare, and i ...
(ASD), formerly known as the Defence Signals Directorate (DSD), shares information on Australian citizens with the other members of the
UKUSA Agreement The United Kingdom – United States of America Agreement (UKUSA, ) is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intellig ...
. According to a 2008
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
document leaked by Snowden, data of Australian citizens shared with foreign countries include "bulk, unselected, unminimised metadata" as well as "medical, legal or religious information". In close cooperation with other members of the
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
community, the ASD runs secret surveillance facilities in many parts of
Southeast Asia Southeast Asia, also spelled South East Asia and South-East Asia, and also known as Southeastern Asia, South-eastern Asia or SEA, is the geographical south-eastern region of Asia, consisting of the regions that are situated south of mainland ...
without the knowledge of Australian diplomats. In addition, the ASD cooperates with the
Security and Intelligence Division The Security and Intelligence Division (SID) is the foreign intelligence service of Singapore under the purview of the Ministry of Defence (MINDEF), tasked with gathering, processing and analysing national security information from around the wo ...
(SID) of the
Republic of Singapore Singapore (), officially the Republic of Singapore, is a sovereign island country, island country and city-state in maritime Southeast Asia. It lies about one degree of latitude () north of the equator, off the southern tip of the Malay Pen ...
in an international operation to intercept underwater telecommunications cables across the
Eastern Hemisphere The Eastern Hemisphere is the half of the planet Earth which is east of the prime meridian (which crosses Greenwich, London, United Kingdom) and west of the antimeridian (which crosses the Pacific Ocean and relatively little land from pole ...
and the
Pacific Ocean The Pacific Ocean is the largest and deepest of Earth's five oceanic divisions. It extends from the Arctic Ocean in the north to the Southern Ocean (or, depending on definition, to Antarctica) in the south, and is bounded by the conti ...
. In March 2017 it was reported that, on advice from the Five Eyes intelligence alliance, more than 500 Iraqi and Syrian refugees, have been refused entry to Australia, in the last year.


Canada

The
Communications Security Establishment Canada The Communications Security Establishment (CSE; french: Centre de la sécurité des télécommunications, ''CST''), formerly (from 2008-2014) called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national c ...
(CSEC) offers the NSA resources for advanced collection, processing, and analysis. It has set up
covert Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret. Secrecy is often controvers ...
sites at the request of NSA. The US-Canada SIGNT relationship dates back to a secret alliance formed during
World War II World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the World War II by country, vast majority of the world's countries—including all of the great power ...
, and was formalized in 1949 under the CANUSA Agreement. On behalf of the NSA, the CSEC opened secret surveillance facilities in 20 countries around the world. As well, the
Communications Security Establishment Canada The Communications Security Establishment (CSE; french: Centre de la sécurité des télécommunications, ''CST''), formerly (from 2008-2014) called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national c ...
has been revealed, following the
global surveillance disclosures Global means of or referring to a globe and may also refer to: Entertainment * ''Global'' (Paul van Dyk album), 2003 * ''Global'' (Bunji Garlin album), 2007 * ''Global'' (Humanoid album), 1989 * ''Global'' (Todd Rundgren album), 2015 * Bruno ...
to be engaging in surveillance on Wifi Hotspots of major Canadian Airports, collecting meta-data to use for engaging in surveillance on travelers, even days after their departure from said airports. Image:NSA Canada relationship.pdf, The NSA's relationship with Canada's CSEC Image:NSA Canada G8 G20.pdf, NSA document on a
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizati ...
operation with Canada's CSEC agency during the G8 and G20 summits in
Toronto Toronto ( ; or ) is the capital city of the Canadian province of Ontario. With a recorded population of 2,794,356 in 2021, it is the most populous city in Canada and the fourth most populous city in North America. The city is the anch ...
in 2010


Denmark

The
Politiets Efterretningstjeneste Politiets Efterretningstjeneste (PET) (literally: Police Intelligence Service, official name in English: Danish Security and Intelligence Service, or DSIS) is the national security and intelligence agency of Denmark. The agency focuses solely o ...
(PET) of Denmark, a domestic intelligence agency, exchanges data with the NSA on a regular basis, as part of a secret agreement with the United States. Being one of the " 9-Eyes" of the
UKUSA Agreement The United Kingdom – United States of America Agreement (UKUSA, ) is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intellig ...
, Denmark's relationship with the NSA is closer than the NSA's relationship with Germany, Sweden, Spain, Belgium or Italy.


France

The Directorate-General for External Security (DGSE) of France maintains a close relationship with both the NSA and the GCHQ after discussions for increased cooperation began in November 2006. By the early 2010s, the extent of cooperation in the joint interception of digital data by the DGSE and the NSA was noted to have increased dramatically. In 2011, a formal
memorandum A memorandum ( : memoranda; abbr: memo; from the Latin ''memorandum'', "(that) which is to be remembered") is a written message that is typically used in a professional setting. Commonly abbreviated "memo," these messages are usually brief and ...
for data exchange was signed by the DGSE and the NSA, which facilitated the transfer of millions of
metadata Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive metadata – the descriptive ...
records from the DGSE to the NSA. From December 2012 to 8 January 2013, over 70 million metadata records were handed over to the NSA by French intelligence agencies.


Germany

The
Bundesnachrichtendienst The Federal Intelligence Service (German: ; , BND) is the foreign intelligence agency of Germany, directly subordinate to the Chancellor's Office. The BND headquarters is located in central Berlin and is the world's largest intelligence h ...
(BND) of Germany systematically transfers metadata from German intelligence sources to the NSA. In December 2012 alone, the BND provided the NSA with 500 million metadata records. The NSA granted the Bundesnachrichtendienst access to X-Keyscore,'Prolific Partner': German Intelligence Used NSA Spy Program
''
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
''. Retrieved 21 July 2013.
in exchange for the German surveillance programs Mira4 and Veras. In early 2013,
Hans-Georg Maaßen Hans-Georg Maaßen (born 24 November 1962) is a German civil servant and lawyer. From 1 August 2012 to 8 November 2018, he served as the President of the Federal Office for the Protection of the Constitution, Germany's domestic security agency a ...
, President of the German domestic security agency Federal Office for the Protection of the Constitution, Bundesamt für Verfassungsschutz (BfV), made several visits to the headquarters of the NSA. According to top secret, classified documents of the German government, Maaßen agreed to transfer all data records of persons monitored in Germany by the BfV via XKeyscore to the NSA. In addition, the BfV works very closely with eight other U.S. government agencies, including the CIA. Under Project 6, which is jointly operated by the CIA, BfV, and BND, a massive database containing personal information such as Photography, photos, Vehicle registration plate, license plate numbers, Web browsing history, Internet search histories and telephone
metadata Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive metadata – the descriptive ...
was developed to gain a better understanding of the social relationships of presumed jihadists. In 2012, the BfV handed over 864 data sets of personal information to the CIA, NSA and seven other United States Intelligence Community, U.S. intelligence agencies. In exchange, the BND received data from U.S. intelligence agencies on 1,830 occasions. The newly acquired data was handed over to the BfV and stored in a domestically accessible system known as Nachrichtendienstliches Informationssystem, NADIS WN. Image:Dagger Complex 01.jpg, The Dagger Complex in Darmstadt, Germany, is operated by the United States Army on behalf of the NSA. Similar to the NSA's Utah Data Center, the Dagger Complex is able to process, store, and decrypt millions of data pieces. Image:Radomes of Bad Aibling Station 1.jpg, The Bad Aibling Station in Bavaria, Germany, was operated by the NSA until the early 2000s. It is currently run by the BND. As part of the global surveillance network
ECHELON ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:Given the 5 dialects that use ...
, it is the largest listening post outside Britain and the USA. Image:BND XKeyscore.jpg, In 2013, the German news magazine ''
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
'' published an excerpt of an NSA document leaked by Snowden, showing that the BND used the NSA's
XKEYSCORE XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intellige ...
to wiretap a German domestic target.


Israel

The Unit 8200, Israeli SIGINT National Unit (ISNU) routinely receives raw, unfiltered data of U.S. citizens from the NSA. However, a secret NSA document leaked by Snowden revealed that U.S. government officials are explicitly exempted from such forms of data sharing with the ISNU. As stated in a memorandum detailing the rules of data sharing on U.S. citizens, the ISNU is obligated to: According to the undated memorandum, the ground rules for intelligence sharing between the NSA and the ISNU were laid out in March 2009. Under the data sharing agreement, the ISNU is allowed to retain the identities of U.S. citizens (excluding U.S. government officials) for up to a year.


Japan

In 2011, the NSA asked the Japanese government to intercept underwater fibre-optic cables carrying phone and Internet data in the Asia-Pacific region. However, the Japanese government refused to comply.


Libya

Under the reign of Muammar Gaddafi, the Libyan regime forged a partnership with Britain's secret service MI6 and the U.S.
Central Intelligence Agency The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
(CIA) to obtain information about Libyan dissidents living in the United States and Canada. In exchange, Gaddafi allowed the Western democracies to use Libya as a base for extraordinary renditions.


Netherlands

The Algemene Inlichtingen en Veiligheidsdienst (AIVD) of the Netherlands has been receiving and storing data of Internet users gathered by U.S. intelligence sources such as the NSA's PRISM surveillance program. During a meeting in February 2013, the AIVD and the Dutch Military Intelligence and Security Service, MIVD briefed the NSA on their attempts to hack Internet forums and to collect the data of all users using a technology known as Computer Network Exploitation (CNE). Image:Notes for Dutch SIGINT-Cyber Analytic Exchange.jpg, Summary of a meeting held in February 2013 between the NSA and the Dutch intelligence services Algemene Inlichtingen en Veiligheidsdienst, AIVD and Dutch Military Intelligence and Security Service, MIVD


Norway

The Norwegian Intelligence Service (NIS) has confirmed that data collected by the agency is "shared with the Americans". Kjell Grandhagen, head of Norwegian military intelligence told reporters at a news conference that "We share this information with partners, and partners share with us ... We are talking about huge amounts of traffic data". In cooperation with the NSA, the NIS has gained access to Russian targets in the Kola Peninsula and other civilian targets. In general, the NIS provides information to the NSA about "Politicians", "Energy" and "Armament". A
top secret Classified information is material that a government body deems to be sensitive information that must be protected. Access is restricted by law or regulation to particular groups of people with the necessary security clearance and need to kn ...
memo of the NSA lists the following years as milestones of the Norway-United States of America SIGNT agreement, or NORUS Agreement: *1952 – Informal starting year of cooperation between the NIS and the NSA * 1954 – Formalization of the NORUS Agreement *1963 – Extension of the agreement for coverage of foreign instrumentation signals intelligence (FISINT) * 1970 – Extension of the agreement for coverage of electronic intelligence (ELINT) * 1994 – Extension of the agreement for coverage of communications intelligence (COMINT) The NSA perceives the NIS as one of its most reliable partners. Both agencies also cooperate to crack the encryption systems of mutual targets. According to the NSA, Norway has made no objections to its requests.


Singapore

The Ministry of Defence (Singapore), Defence Ministry of Singapore and its
Security and Intelligence Division The Security and Intelligence Division (SID) is the foreign intelligence service of Singapore under the purview of the Ministry of Defence (MINDEF), tasked with gathering, processing and analysing national security information from around the wo ...
(SID) have been secretly intercepting much of the fibre optic cable traffic passing through the Asian continent. In close cooperation with the
Australian Signals Directorate Australian Signals Directorate (ASD), formerly the Defence Signals Directorate (DSD) is the federal statutory agency in the Australian Government responsible for foreign signals intelligence, support to military operations, cyber warfare, and i ...
(ASD/DSD), Singapore's SID has been able to intercept SEA-ME-WE 3 (Southeast Asia-Middle East-Western Europe 3) as well as SEA-ME-WE 4 telecommunications cables. Access to these international telecommunications channels is facilitated by Singapore's government-owned operator, SingTel. Temasek Holdings, a multibillion-dollar sovereign wealth fund with a majority stake in SingTel, has maintained close relations with the country's intelligence agencies. Information gathered by the Government of Singapore is transferred to the Government of Australia as part of an intelligence sharing agreement. This allows the "
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
" to maintain a "stranglehold on communications across the
Eastern Hemisphere The Eastern Hemisphere is the half of the planet Earth which is east of the prime meridian (which crosses Greenwich, London, United Kingdom) and west of the antimeridian (which crosses the Pacific Ocean and relatively little land from pole ...
".


Spain

In close cooperation with the National Intelligence Centre (Spain), Centro Nacional de Inteligencia (CNI), the NSA intercepted 60.5 million phone calls in Spain in a single month.


Sweden

The Försvarets radioanstalt (FRA) of Sweden (codenamed Sardines) has allowed the "
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
" to access underwater cables in the Baltic Sea. On 5 December 2013, Sveriges Television (''Swedish Television'') revealed that the FRA has been conducting a clandestine surveillance operation targeting the internal politics of Russia. The operation was conducted on behalf of the NSA, which receives data handed over to it by the FRA. According to documents leaked by Snowden, the FRA of Sweden has been granted access to the NSA's international surveillance program
XKeyscore XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intellige ...
. Image:Nsa-internal-pm-on-fra-and-sweden-relations.pdf, The NSA's relationship with Sweden's National Defence Radio Establishment (Sweden), FRA under the
UKUSA Agreement The United Kingdom – United States of America Agreement (UKUSA, ) is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intellig ...


Switzerland

The Swiss intelligence agencies#Federal Intelligence Service, Federal Intelligence Service (NDB) of Switzerland exchanges information with the NSA regularly, on the basis of a secret agreement to circumvent domestic surveillance restrictions. In addition, the NSA has been granted access to Swiss surveillance facilities in Leuk (Cantons of Switzerland, canton of Valais) and Kirchlindach, Herrenschwanden (canton of Bern (canton), Bern), which are part of the Swiss surveillance program Onyx (interception system), Onyx. According to the NDB, the agency maintains working relationships with about 100 international organizations. However, the NDB has denied any form of cooperation with the NSA. Although the NSA does not have direct access to Switzerland's Onyx (interception system), Onyx surveillance program, the Director of the NDB acknowledged that it is possible for other U.S. intelligence agencies to gain access to Switzerland's surveillance system.


United Kingdom

The British government allowed the NSA to store personal data of British citizens. Under Project MINARET, anti-
Vietnam War The Vietnam War (also known by #Names, other names) was a conflict in Vietnam, Laos, and Cambodia from 1 November 1955 to the fall of Saigon on 30 April 1975. It was the second of the Indochina Wars and was officially fought between North Vie ...
dissidents in the United States were jointly targeted by the GCHQ and the NSA. Image:Menwith-hill-radomes.jpg, RAF Menwith Hill, near Harrogate, North Yorkshire, is the biggest listening post outside the United States. It was used by U.S. military personnel to spy on Britons on behalf of MI5 and MI6.


United States

;Central Intelligence Agency (CIA) The CIA pays
AT&T AT&T Inc. is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the world's largest telecommunications company by revenue and the third largest provider of mobile ...
more than US$10 million a year to gain access to international phone records, including those of U.S. citizens. ;National Security Agency (NSA) The NSA's Foreign Affairs Directorate interacts with foreign intelligence services and members of the
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
to implement global surveillance. ;Federal Bureau of Investigation (FBI) The FBI acts as the wikt:liaison, liaison between U.S. intelligence agencies and Silicon Valley giants such as
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washi ...
. ;Department of Homeland Security (DHS) In the early 2010s, the United States Department of Homeland Security, DHS conducted a joint surveillance operation with the FBI to crack down on dissidents of the Occupy Wall Street protest movement. ;Other law enforcement agencies The NSA supplies domestic intercepts to the
Drug Enforcement Administration The Drug Enforcement Administration (DEA; ) is a United States federal law enforcement agency under the U.S. Department of Justice tasked with combating drug trafficking and distribution within the U.S. It is the lead agency for domestic en ...
(DEA),
Internal Revenue Service The Internal Revenue Service (IRS) is the revenue service for the United States federal government, which is responsible for collecting U.S. federal taxes and administering the Internal Revenue Code, the main body of the federal statutory t ...
(IRS), and other law enforcement agencies, who use intercepted data to initiate criminal investigations against US citizens. Federal agents are instructed to "recreate" the investigative trail in order to "cover up" where the information originated. ;White House Weeks after the September 11 attacks, U.S. President George W. Bush signed the Patriot Act to ensure no disruption in the government's ability to conduct global surveillance: The Patriot Act was extended by U.S. President Barack Obama in May 2011 to further extend the federal government's legal authority to conduct additional forms of surveillance such as roving wiretaps.


Commercial cooperation

Over 70 percent of the United States Intelligence Community's budget is earmarked for payment to private firms. According to ''Forbes'' magazine, the defense technology company Lockheed Martin is currently the US's biggest defense contractor, and it is destined to be the NSA's most powerful commercial partner and biggest contractor in terms of dollar revenue.


AT&T

In a joint operation with the NSA, the American telecommunications corporation
AT&T AT&T Inc. is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the world's largest telecommunications company by revenue and the third largest provider of mobile ...
operates Room 641A in the SBC Communications building in San Francisco to spy on Internet traffic. The CIA pays
AT&T AT&T Inc. is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the world's largest telecommunications company by revenue and the third largest provider of mobile ...
more than US$10 million a year to gain access to international phone records, including those of U.S. citizens.


Booz Allen Hamilton

Projects developed by Booz Allen Hamilton include the Strategic Innovation Group to identify terrorism, terrorists through social media, on behalf of government agencies. During the fiscal year of 2013, Booz Allen Hamilton derived 99% of its income from the government, with the largest portion of its revenue coming from the U.S. Army. In 2013, Booz Allen Hamilton was hailed by Bloomberg Businessweek as "the World's Most Profitable Spy Organization".


British Telecommunications

British Telecommunications (code-named Remedy), a major supplier of telecommunications, granted Britain's intelligence agency GCHQ "unlimited access" to its network of undersea cables, according to documents leaked by Snowden.


Microsoft

The American multinational corporation
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washi ...
helped the NSA to circumvent software encryption safeguards. It also allowed the federal government to monitor web chats on the ''Outlook.com'' portal. In 2013, Microsoft worked with the FBI to allow the NSA to gain access to the company's cloud storage service File system, SkyDrive.


Orange S.A.

The French telecommunications corporation Orange S.A. shares customer call data with the French intelligence agency DGSE, and the intercepted data is handed over to GCHQ.


RSA Security

RSA Security was paid US$10 million by the NSA to introduce a Cryptography, cryptographic Backdoor (computing), backdoor in its encryption products.


Stratfor

Strategic Forecasting, Inc., more commonly known as Stratfor, is a global intelligence company offering information to governments and private clients including Dow Chemical Company, Lockheed Martin, Northrop Grumman, Raytheon, the United States Department of Homeland Security, U.S. Department of Homeland Security, the Defense Intelligence Agency, U.S. Defense Intelligence Agency, and the United States Marine Corps, U.S. Marine Corps.


Vodafone

The British telecommunications company Vodafone (code-named Gerontic) granted Britain's intelligence agency GCHQ "unlimited access" to its network of undersea cables, according to documents leaked by Snowden.


In-Q-Tel

In-Q-Tel, which receives more than US$56 million a year in government support, is a venture capital firm that enables the CIA to invest in Silicon Valley.


Palantir Technologies

Palantir Technologies is a data mining corporation with close ties to the FBI, NSA and CIA. Based in Palo Alto, California, the company developed a data collection and analytical program known as Prism. In 2011, it was revealed that the company conducted surveillance on
Glenn Greenwald Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author and lawyer. In 2014, he cofounded ''The Intercept'', of which he was an editor until he resigned in October 2020. Greenwald subsequently started publishing on Substac ...
.


Surveillance evasion

Several countries have evaded global surveillance by constructing secret bunker facilities deep below the Earth's surface.


North Korea

Despite North Korea being a priority target, the NSA's internal documents acknowledged that it did not know much about Kim Jong Un, Kim Jong-un and his regime's intentions.


Iran

In October 2012, Iran's police chief Esmail Ahmadi Moghaddam alleged that
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
is not a search engine but "a spying tool" for Western intelligence agencies. Six months later in April 2013, the country announced plans to introduce an "Islamic
Google Earth Google Earth is a computer program that renders a 3D computer graphics, 3D representation of Earth based primarily on satellite imagery. The program maps the Earth by superimposition, superimposing satellite images, aerial photography, and geog ...
" to evade global surveillance.


Libya

Libya evaded surveillance by building "hardened and buried" bunkers at least 40 feet below ground level.


Impact

The global surveillance disclosure has caused tension in the bilateral relations of the United States with several of its allies and economic partners as well as in its relationship with the
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are located primarily in Europe, Europe. The union has a total area of ...
. On 12 August 2013, President Obama announced the creation of an "independent" panel of "outside experts" to review the NSA's surveillance programs. The panel is due to be established by the Director of National Intelligence, James R. Clapper, who will consult and provide assistance to them. According to a survey undertaken by the human rights group PEN International, these disclosures have had a chilling effect on American writers. Fearing the risk of being targeted by government surveillance, 28% of PEN's American members have curbed their usage of social media, and 16% have self-censorship, self-censored themselves by avoiding controversial topics in their writings.


Gallery

Image:UN General Assembly hall.jpg, According to Snowden's documents, the United Nations Headquarters and the United Nations General Assembly were targeted by NSA employees disguised as diplomats. Image:Dmitry Medvedev 2 April 2009-1.jpg, Citing Snowden's documents, ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
'' reported that British officials had set up fake Internet cafes at the 2009 G-20 London summit to spy on the delegates' use of computers, and to install Keystroke logging, key-logging software on the delegates' phones. This allowed British representatives to gain a "negotiating advantage" at the summit. Image:Tsinghua University - Square building.JPG, According to Snowden's interview with the ''South China Morning Post'', the U.S. government has been hacking numerous Civilian, non-military targets in China for years. Other high-priority targets include academic institutions such as the prestigious Tsinghua University in Beijing. Image:Justus Lipsius, Eastern side.jpg, The Council of the European Union, with its headquarters at the Justus Lipsius building in Brussels, was targeted by NSA employees working near the headquarters of
NATO The North Atlantic Treaty Organization (NATO, ; french: Organisation du traité de l'Atlantique nord, ), also called the North Atlantic Alliance, is an intergovernmental military alliance between 30 member states – 28 European and two N ...
. An NSA document dated September 2010 explicitly names the Europeans as a "location target". Image:Aeroflot A321-200 VP-BWN SVO Jun 2011.png, The airline reservations system, reservations system of Russia's Aeroflot airline was hacked by the NSA. Image:Oil platform P-51 (Brazil).jpg, Petrobras, currently the world's leader in offshore deepwater drilling, is a "prominent" target of the U.S. government. Image:Angela Merkel (2008).jpg, From 2002 to 2013, the German Chancellor Angela Merkel was targeted by the U.S. Special Collection Service. Image:Ehud Olmert 2006.jpg, Israeli Prime Minister Ehud Olmert (pictured) and Defense Minister Ehud Barak were included in a list of surveillance targets used by the GCHQ and the NSA. Image:Joaquin Almunia Mercosul.jpg, Joaquín Almunia, who served as the European Commissioner for Competition and the Vice-President of the European Commission, was targeted by Britain's GCHQ agency. Image:SusiloBambangYudhoyono.jpg, Indonesia's President Susilo Bambang Yudhoyono and his wife were placed under surveillance by the
Australian Signals Directorate Australian Signals Directorate (ASD), formerly the Defence Signals Directorate (DSD) is the federal statutory agency in the Australian Government responsible for foreign signals intelligence, support to military operations, cyber warfare, and i ...
(ASD). During the 2007 United Nations Climate Change Conference in Bali, the ASD cooperated with the NSA to conduct mass surveillance on the Indonesian hosts. Image:Xbox-Duke-Controller.jpg, The Video game, video gaming network Xbox Live was placed under surveillance to unravel possible terrorist plots.


See also

* 2013 Department of Justice investigations of reporters * Terrorist Finance Tracking Program * Top Secret America


References


Further reading


"Global Surveillance"
. An annotated and categorized "overview of the revelations following the leaks by the whistleblower Edward Snowden. There are also some links to comments and followups". By Oslo University Library. * *''Politico'' Staff.

" ''Politico''. 13 June 2013.
NSA inspector general report on email and internet data collection under Stellar Wind
as provided by The Guardian on 27 June 2013.
Putin talks NSA, Syria, Iran, drones in exclusive RT interview (FULL VIDEO)
" Russia Today. 12 June 2013. *Spencer Ackerman, Ackerman, Spencer.
NSA warned to rein in surveillance as agency reveals even greater scope
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
''. 17 July 2013. *Spencer Ackerman, Ackerman, Spencer.
Slew of court challenges threaten NSA's relationship with tech firms
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
''. Wednesday, 17 July 2013. *Spencer Ackerman, Ackerman, Spencer and Paul Lewis.
NSA amendment's narrow defeat spurs privacy advocates for surveillance fight
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
''. Thursday, 25 July 2013. *Spencer Ackerman, Ackerman, Spencer and Dan Roberts.
US embassy closures used to bolster the case for NSA surveillance programs
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
''. Monday 5 August 2013. *Two of the 'trips' (numbers 29 and 76) in the 2006 book, 'No Holiday', are investigating the NSA and its activities. * Greenwald, Glenn.
Members of Congress denied access to basic information about NSA
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
''. Sunday 4 August 2013. *Liu, Edward C
Surveillance of Foreigners Outside the United States Under Section 702 of the Foreign Intelligence Surveillance Act (FISA)
Congressional Research Service, 13 April 2016. *MacAskill, Ewen.
Justice Department fails in bid to delay landmark case on NSA collection
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
''. Thursday 25 July 2013. *Rushe, Dominic.
Microsoft pushes Eric Holder to lift block on public information sharing
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
''. Tuesday 16 July 2013. *Perez, Evan.
Documents shed light on U.S. surveillance programs
"

CNN. 9 August 2013. * Gellman, Barton.
NSA broke privacy rules thousands of times per year, audit finds
" ''Washington Post''. Thursday 15 August 2013. *Roberts, Dan and Robert Booth.
NSA defenders: embassy closures followed pre-9/11 levels of 'chatter'
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
''. Sunday 4 August 2013. * Greenwald, Glenn.
The crux of the NSA story in one phrase: 'collect it all'
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
''. Monday 15 July 2013. *Sanchez, Julian.
Five things Snowden leaks revealed about NSA’s original warrantless wiretaps
" ''Ars Technica''. 9 July 2013. *Forero, Juan.
Paper reveals NSA ops in Latin America
" ''Washington Post''. 9 July 2013. *Jabour, Bridie.
Telstra signed deal that would have allowed US spying
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
''. Friday 12 July 2013. *Spencer Ackerman, Ackerman, Spencer.
White House stays silent on renewal of NSA data collection order
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
''. Thursday 18 July 2013. *Naughton, John.
Edward Snowden's not the story. The fate of the internet is
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
''. 28 July 2013. *
Edward Snowden NSA files: secret surveillance and our revelations so far – Leaked National Security Agency documents have led to several hundred Guardian stories on electronic privacy and the state
by ''The Guardian''s James Ball on 21 August 2013
2013-07-29 Letter of FISA Court president Reggie B. Walton to the Chairman of the U.S. Senate Judiciary Committee Patrick J. Leahy about certain operations of the FISA Court
among other things the process of accepting, modifying and/or rejecting surveillance measures proposed by the U.S. government, the interaction between the FISA Court and the U.S. government, the appearance of non-governmental parties before the court and the process used by the Court to consider and resolve any instances where the government entities notifies the court of compliance concerns with any of the FISA authorities. * A collection of documents relating to surveillance. ** Part 2 of the above. ** Part 3 of the above. * Documents relating to the surveillance against Dilma Rousseff and Enrique Peña Nieto
NSA surveillance: A guide to staying secure - The NSA has huge capabilities – and if it wants in to your computer, it's in. With that in mind, here are five ways to stay safe
by ''The Guardian''s Bruce Schneier on 5 September 2013. {{Privacy Global surveillance, GCHQ National Security Agency Mass surveillance 2013 controversies, Surveillance Edward Snowden Espionage Intelligence operations National security Articles containing video clips