HOME

TheInfoList



OR:

Ongoing news reports in the international media have revealed operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly emanate from a cache of top secret documents leaked by ex-NSA contractor
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
, which he obtained whilst working for Booz Allen Hamilton, one of the largest contractors for defense and intelligence in the United States. In addition to a trove of U.S. federal documents, Snowden's cache reportedly contains thousands of Australian, British, Canadian and New Zealand intelligence files that he had accessed via the exclusive "
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
" network. In June 2013, the first of Snowden's documents were published simultaneously by ''
The Washington Post ''The Washington Post'' (also known as the ''Post'' and, informally, ''WaPo'') is an American daily newspaper published in Washington, D.C. It is the most widely circulated newspaper within the Washington metropolitan area and has a large n ...
'' and ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
'', attracting considerable public attention. The disclosure continued throughout 2013, and a small portion of the estimated full cache of documents was later published by other media outlets worldwide, most notably ''
The New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
'' (United States), the
Canadian Broadcasting Corporation The Canadian Broadcasting Corporation (french: Société Radio-Canada), branded as CBC/Radio-Canada, is a Canadian public broadcaster for both radio and television. It is a federal Crown corporation that receives funding from the governmen ...
, the
Australian Broadcasting Corporation The Australian Broadcasting Corporation (ABC) is the national broadcaster of Australia. It is principally funded by direct grants from the Australian Government and is administered by a government-appointed board. The ABC is a publicly-owne ...
, ''
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
'' (Germany), ''
O Globo ''O Globo'' (, ''The Globe'') is a Brazilian newspaper based in Rio de Janeiro. ''O Globo'' is the most prominent print publication in the Grupo Globo media conglomerate. Founded by journalist Irineu Marinho, owner of ''A Noite'', it was ori ...
'' (Brazil), ''
Le Monde ''Le Monde'' (; ) is a French daily afternoon newspaper. It is the main publication of Le Monde Group and reported an average circulation of 323,039 copies per issue in 2009, about 40,000 of which were sold abroad. It has had its own website si ...
'' (France), ''
L'espresso ''L'Espresso'' () is an Italian weekly news magazine. It is one of the two most prominent Italian weeklies; the other is ''Panorama''. Since 2022 it has been published by BFC Media. History and profile One of Italy's foremost newsmagazines, '' ...
'' (Italy), ''
NRC Handelsblad ''NRC'', previously called ''NRC Handelsblad'' (), is a daily morning newspaper published in the Netherlands by NRC Media. It is generally accepted as a newspaper of record in the Netherlands. History ''NRC Handelsblad'' was first published on 1 ...
'' (the Netherlands), ''
Dagbladet ''Dagbladet'' (lit.: ''The Daily Magazine'') is one of Norway's largest newspapers and is published in the tabloid format. It has 1,400,000 daily readers on mobile, web and paper. Traditionally ''Dagbladet'' is considered the main liberal newsp ...
'' (Norway), ''
El País ''El País'' (; ) is a Spanish-language daily newspaper in Spain. ''El País'' is based in the capital city of Madrid and it is owned by the Spanish media conglomerate PRISA. It is the second most circulated daily newspaper in Spain . ''El Pa ...
'' (Spain), and
Sveriges Television Sveriges Television AB ("Sweden's Television Stock Company"), shortened to SVT (), is the Sweden, Swedish national public broadcasting, public television broadcaster, funded by a public service tax on personal income set by the Riksdag (national ...
(Sweden). These media reports have shed light on the implications of several secret treaties signed by members of the UKUSA community in their efforts to implement global surveillance. For example, ''Der Spiegel'' revealed how the German Federal Intelligence Service (; BND) transfers "massive amounts of intercepted data to the NSA", while Swedish Television revealed the National Defence Radio Establishment (FRA) provided the NSA with data from its cable collection, under a secret treaty signed in 1954 for bilateral cooperation on surveillance. Other security and intelligence agencies involved in the practice of global surveillance include those in Australia ( ASD), Britain ( GCHQ), Canada (
CSE CSE may refer to: Education Examinations * Certificate of Secondary Education, a secondary school qualification in the United Kingdom, replaced by the GCSE * Civil Services Examination, an examination to qualify for government service in India Fi ...
), Denmark ( PET), France ( DGSE), Germany ( BND), Italy ( AISE), the Netherlands ( AIVD), Norway ( NIS), Spain ( CNI), Switzerland ( NDB), Singapore ( SID) as well as Israel ( ISNU), which receives raw, unfiltered data of U.S. citizens that is shared by the NSA. On June 14, 2013, United States
prosecutor A prosecutor is a legal representative of the prosecution in states with either the common law adversarial system or the civil law inquisitorial system. The prosecution is the legal party responsible for presenting the case in a criminal tria ...
s charged Edward Snowden with
espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information ( intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tang ...
and theft of government property. In late July 2013, he was granted a one-year temporary asylum by the Russian government, contributing to a deterioration of Russia–United States relations. Towards the end of October 2013, the British Prime Minister
David Cameron David William Donald Cameron (born 9 October 1966) is a British former politician who served as Prime Minister of the United Kingdom from 2010 to 2016 and Leader of the Conservative Party from 2005 to 2016. He previously served as Leader o ...
warned ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
'' not to publish any more leaks, or it will receive a DA-Notice. In November 2013, a criminal investigation of the disclosure was being undertaken by Britain's
Metropolitan Police Service The Metropolitan Police Service (MPS), formerly and still commonly known as the Metropolitan Police (and informally as the Met Police, the Met, Scotland Yard, or the Yard), is the territorial police force responsible for law enforcement and ...
. In December 2013, ''The Guardian'' editor Alan Rusbridger said: "We have published I think 26 documents so far out of the 58,000 we've seen." The extent to which the media reports have responsibly informed the public is disputed. In January 2014, Obama said that "the sensational way in which these disclosures have come out has often shed more heat than light"Transcript Of President Obama's Speech On NSA Reforms
NPR January 17, 2014
and critics such as Sean Wilentz have noted that many of the Snowden documents released do not concern domestic surveillance. Sean Wilentz (January 19, 2014)
Would You Feel Differently About Snowden, Greenwald, and Assange If You Knew What They Really Thought?
''
The New Republic ''The New Republic'' is an American magazine of commentary on politics, contemporary culture, and the arts. Founded in 1914 by several leaders of the progressive movement, it attempted to find a balance between "a liberalism centered in hu ...
''
The US & British Defense establishment weigh the strategic harm in the period following the disclosures more heavily than their civic public benefit. In its first assessment of these disclosures,
the Pentagon The Pentagon is the headquarters building of the United States Department of Defense. It was constructed on an accelerated schedule during World War II. As a symbol of the U.S. military, the phrase ''The Pentagon'' is often used as a metony ...
concluded that Snowden committed the biggest "theft" of U.S. secrets in the
history of the United States The history of the lands that became the United States began with the arrival of the first people in the Americas around 15,000 BC. Numerous indigenous cultures formed, and many saw transformations in the 16th century away from more densely ...
. Sir
David Omand Sir David Bruce Omand (born 15 April 1947) is a British former senior civil servant who served as the Director of the Government Communications Headquarters ( GCHQ) from 1996 to 1997. Background Omand was born on 15 April 1947. His father, ...
, a former director of GCHQ, described Snowden's disclosure as the "most catastrophic loss to British intelligence ever".


Background

Barton Gellman, a
Pulitzer Prize The Pulitzer Prize () is an award for achievements in newspaper, magazine, online journalism, literature, and musical composition within the United States. It was established in 1917 by provisions in the will of Joseph Pulitzer, who had made ...
–winning journalist who led ''
The Washington Post ''The Washington Post'' (also known as the ''Post'' and, informally, ''WaPo'') is an American daily newspaper published in Washington, D.C. It is the most widely circulated newspaper within the Washington metropolitan area and has a large n ...
''s coverage of Snowden's disclosures, summarized the leaks as follows: The disclosure revealed specific details of the NSA's close cooperation with U.S. federal agencies such as the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice ...
(FBI) and the
Central Intelligence Agency The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
(CIA), in addition to the agency's previously undisclosed financial payments to numerous commercial partners and telecommunications companies, as well as its previously undisclosed relationships with international partners such as Britain, France, Germany, and its secret treaties with foreign governments that were recently established for sharing intercepted data of each other's citizens. The disclosures were made public over the course of several months since June 2013, by the press in several nations from the trove leaked by the former NSA contractor Edward J. Snowden, who obtained the trove while working for Booz Allen Hamilton.
George Brandis George Henry Brandis (born 22 June 1957) is a former Australian politician. He was a Senator for Queensland from 2000 to 2018, representing the Liberal Party, and was a cabinet minister in the Abbott and Turnbull governments. He was later ...
, the
Attorney-General of Australia The Attorney-GeneralThe title is officially "Attorney-General". For the purposes of distinguishing the office from other attorneys-general, and in accordance with usual practice in the United Kingdom and other common law jurisdictions, the Aust ...
, asserted that Snowden's disclosure is the "most serious setback for Western intelligence since the
Second World War World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the vast majority of the world's countries—including all of the great powers—forming two opposi ...
."


Global surveillance

, global surveillance programs include: The NSA was also getting data directly from telecommunications companies code-named Artifice, Lithium, Serenade, SteelKnight, and X. The real identities of the companies behind these code names were not included in the Snowden document dump because they were protected as Exceptionally Controlled Information which prevents wide circulation even to those (like Snowden) who otherwise have the necessary security clearance.


Disclosures

Although the exact size of Snowden's disclosure remains unknown, the following estimates have been put up by various government officials: * At least 15,000 Australian intelligence files, according to Australian officials * At least 58,000 British intelligence files, according to British officials * About 1.7 million U.S. intelligence files, according to U.S. Department of Defense talking points As a contractor of the NSA, Snowden was granted access to U.S. government documents along with top secret documents of several allied governments, via the exclusive
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
network. Snowden claims that he currently does not physically possess any of these documents, having surrendered all copies to journalists he met in
Hong Kong Hong Kong ( (US) or (UK); , ), officially the Hong Kong Special Administrative Region of the People's Republic of China (abbr. Hong Kong SAR or HKSAR), is a List of cities in China, city and Special administrative regions of China, special ...
. According to his lawyer, Snowden has pledged not to release any documents while in Russia, leaving the responsibility for further disclosures solely to journalists. As of 2014, the following news outlets have accessed some of the documents provided by Snowden:
Australian Broadcasting Corporation The Australian Broadcasting Corporation (ABC) is the national broadcaster of Australia. It is principally funded by direct grants from the Australian Government and is administered by a government-appointed board. The ABC is a publicly-owne ...
,
Canadian Broadcasting Corporation The Canadian Broadcasting Corporation (french: Société Radio-Canada), branded as CBC/Radio-Canada, is a Canadian public broadcaster for both radio and television. It is a federal Crown corporation that receives funding from the governmen ...
,
Channel 4 Channel 4 is a British free-to-air public broadcast television network operated by the state-owned Channel Four Television Corporation. It began its transmission on 2 November 1982 and was established to provide a fourth television service ...
, ''
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
'', ''
El Pais EL, El or el may refer to: Religion * El (deity), a Semitic word for "God" People * EL (rapper) (born 1983), stage name of Elorm Adablah, a Ghanaian rapper and sound engineer * El DeBarge, music artist * El Franco Lee (1949–2016), American ...
'', '' El Mundo'', ''
L'espresso ''L'Espresso'' () is an Italian weekly news magazine. It is one of the two most prominent Italian weeklies; the other is ''Panorama''. Since 2022 it has been published by BFC Media. History and profile One of Italy's foremost newsmagazines, '' ...
'', ''
Le Monde ''Le Monde'' (; ) is a French daily afternoon newspaper. It is the main publication of Le Monde Group and reported an average circulation of 323,039 copies per issue in 2009, about 40,000 of which were sold abroad. It has had its own website si ...
'', NBC, ''
NRC Handelsblad ''NRC'', previously called ''NRC Handelsblad'' (), is a daily morning newspaper published in the Netherlands by NRC Media. It is generally accepted as a newspaper of record in the Netherlands. History ''NRC Handelsblad'' was first published on 1 ...
'', ''
Dagbladet ''Dagbladet'' (lit.: ''The Daily Magazine'') is one of Norway's largest newspapers and is published in the tabloid format. It has 1,400,000 daily readers on mobile, web and paper. Traditionally ''Dagbladet'' is considered the main liberal newsp ...
'', ''
O Globo ''O Globo'' (, ''The Globe'') is a Brazilian newspaper based in Rio de Janeiro. ''O Globo'' is the most prominent print publication in the Grupo Globo media conglomerate. Founded by journalist Irineu Marinho, owner of ''A Noite'', it was ori ...
'', ''
South China Morning Post The ''South China Morning Post'' (''SCMP''), with its Sunday edition, the ''Sunday Morning Post'', is a Hong Kong-based English-language newspaper owned by Alibaba Group. Founded in 1903 by Tse Tsan-tai and Alfred Cunningham, it has remained ...
'', ''
Süddeutsche Zeitung The ''Süddeutsche Zeitung'' (; ), published in Munich, Bavaria, is one of the largest daily newspapers in Germany. The tone of SZ is mainly described as centre-left, liberal, social-liberal, progressive-liberal, and social-democrat. Hist ...
'',
Sveriges Television Sveriges Television AB ("Sweden's Television Stock Company"), shortened to SVT (), is the Sweden, Swedish national public broadcasting, public television broadcaster, funded by a public service tax on personal income set by the Riksdag (national ...
, ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
'', ''
The New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
'', and ''
The Washington Post ''The Washington Post'' (also known as the ''Post'' and, informally, ''WaPo'') is an American daily newspaper published in Washington, D.C. It is the most widely circulated newspaper within the Washington metropolitan area and has a large n ...
''.


Historical context

In the 1970s, NSA analyst
Perry Fellwock Perry Fellwock (born 1947) is a former National Security Agency (NSA) analyst and whistleblower who revealed the existence of the NSA and its worldwide covert surveillance network in an interview, using the pseudonym Winslow Peck, with '' Rampart ...
(under the pseudonym "Winslow Peck") revealed the existence of the UKUSA Agreement, which forms the basis of the
ECHELON ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:Given the 5 dialects that use ...
network, whose existence was revealed in 1988 by Lockheed employee Margaret Newsham. Months before the
September 11 attacks The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commer ...
and during its aftermath, further details of the global surveillance apparatus were provided by various individuals such as the former MI5 official David Shayler and the journalist James Bamford, who were followed by: * NSA employees William Binney and
Thomas Andrews Drake Thomas Andrews Drake (born 1957) is a former senior executive of the National Security Agency (NSA), a decorated United States Air Force and United States Navy veteran, and a whistleblower. In 2010, the government alleged that Drake mishandled doc ...
, who revealed that the NSA is rapidly expanding its surveillance * GCHQ employee Katharine Gun, who revealed a plot to bug UN delegates shortly before the
Iraq War {{Infobox military conflict , conflict = Iraq War {{Nobold, {{lang, ar, حرب العراق (Arabic) {{Nobold, {{lang, ku, شەڕی عێراق (Kurdish languages, Kurdish) , partof = the Iraq conflict (2003–present), I ...
* British Cabinet Minister
Clare Short Clare Short (born 15 February 1946) is a British politician who served as Secretary of State for International Development under Prime Minister Tony Blair from 1997 to 2003. Short was the Member of Parliament for Birmingham Ladywood from 1983 ...
, who revealed in 2004 that the UK had spied on UN Secretary-General Kofi Annan * NSA employee
Russ Tice Russell D. Tice (born 1961) is a former intelligence analyst for the United States Air Force, Office of Naval Intelligence, Defense Intelligence Agency (DIA), and National Security Agency (NSA). In December, 2005, Tice helped spark a national cont ...
, who triggered the NSA warrantless surveillance controversy after revealing that the Bush Administration had spied on U.S. citizens without court approval * Journalist Leslie Cauley of ''
USA Today ''USA Today'' (stylized in all uppercase) is an American daily middle-market newspaper and news broadcasting company. Founded by Al Neuharth on September 15, 1982, the newspaper operates from Gannett's corporate headquarters in Tysons, Virgini ...
'', who revealed in 2006 that the NSA is keeping a massive database of Americans' phone calls *
AT&T AT&T Inc. is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the world's largest telecommunications company by revenue and the third largest provider of mobile ...
employee
Mark Klein Mark Klein is a former AT&T technician and whistleblower who revealed details of the company's cooperation with the United States National Security Agency in installing network hardware at a site known as Room 641A to monitor, capture and proce ...
, who revealed in 2006 the existence of Room 641A of the NSA * Activists
Julian Assange Julian Paul Assange ( ; Hawkins; born 3 July 1971) is an Australian editor, publisher, and activist who founded WikiLeaks in 2006. WikiLeaks came to international attention in 2010 when it published a series of leaks provided by U.S. Army int ...
and
Chelsea Manning Chelsea Elizabeth Manning (born Bradley Edward Manning; December 17, 1987) is an American activist and whistleblower. She is a former United States Army soldier who was convicted by court-martial in July 2013 of violations of the Espionage A ...
, who revealed in 2011 the existence of the
mass surveillance industry The mass surveillance industry is a multibillion-dollar industry that has undergone phenomenal growth since 2001. According to data provided by ''The Wall Street Journal'', the retail market for surveillance tools has grown from "nearly zero" in 20 ...
* Journalist Michael Hastings, who revealed in 2012 that protestors of the
Occupy Wall Street Occupy Wall Street (OWS) was a protest movement against economic inequality and the influence of money in politics that began in Zuccotti Park, located in New York City's Wall Street financial district, in September 2011. It gave rise to the ...
movement were kept under surveillance In the aftermath of Snowden's revelations,
The Pentagon The Pentagon is the headquarters building of the United States Department of Defense. It was constructed on an accelerated schedule during World War II. As a symbol of the U.S. military, the phrase ''The Pentagon'' is often used as a metony ...
concluded that Snowden committed the biggest theft of U.S. secrets in the
history of the United States The history of the lands that became the United States began with the arrival of the first people in the Americas around 15,000 BC. Numerous indigenous cultures formed, and many saw transformations in the 16th century away from more densely ...
. In Australia, the coalition government described the leaks as the most damaging blow dealt to Australian intelligence in history. Sir
David Omand Sir David Bruce Omand (born 15 April 1947) is a British former senior civil servant who served as the Director of the Government Communications Headquarters ( GCHQ) from 1996 to 1997. Background Omand was born on 15 April 1947. His father, ...
, a former director of GCHQ, described Snowden's disclosure as the "most catastrophic loss to British intelligence ever".


Timeline

In April 2012, NSA contractor
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
began downloading documents.Mark Hosenball (August 15, 2013)
Snowden downloaded NSA secrets while working for Dell, sources say
''
Reuters Reuters ( ) is a news agency owned by Thomson Reuters Corporation. It employs around 2,500 journalists and 600 photojournalists in about 200 locations worldwide. Reuters is one of the largest news agencies in the world. The agency was est ...
''
That year, Snowden had made his first contact with journalist Glenn Greenwald, then employed by ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
'', and he contacted documentary filmmaker
Laura Poitras Laura Poitras (; born February 2, 1964) is an American director and producer of documentary films. Poitras has received numerous awards for her work, including the 2015 Academy Award for Best Documentary Feature for '' Citizenfour'', about Ed ...
in January 2013. Peter Maass (August 18, 2013)
"How Laura Poitras Helped Snowden Spill His Secrets"
''The New York Times''


2013


May

In May 2013, Snowden went on temporary leave from his position at the NSA, citing the pretext of receiving treatment for his
epilepsy Epilepsy is a group of non-communicable neurological disorders characterized by recurrent epileptic seizures. Epileptic seizures can vary from brief and nearly undetectable periods to long periods of vigorous shaking due to abnormal electrica ...
. Towards the end of May, he traveled to Hong Kong. Greenwald, Poitras and the Guardian's defence and intelligence correspondent
Ewen MacAskill Ewen MacAskill (born 1951)Bryan Burrough, Sarah Ellison and Suzanna Andrew"The Snowden Saga: A Shadowland of Secrets and Light" ''Vanity Fair'', May 2014 is a Scottish journalist. He worked for 22 years on ''The Guardian'', ending his career in ...
flew to Hong Kong to meet Snowden.


June

After the U.S.-based editor of ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
'', Janine Gibson, held several meetings in
New York City New York, often called New York City or NYC, is the List of United States cities by population, most populous city in the United States. With a 2020 population of 8,804,190 distributed over , New York City is also the L ...
, she decided that Greenwald, Poitras and the ''Guardian''s defence and intelligence correspondent Ewen MacAskill would fly to Hong Kong to meet Snowden. On June 5, in the first media report based on the leaked material, ''The Guardian'' exposed a top secret court order showing that the NSA had collected phone records from over 120 million Verizon subscribers. Under the order, the numbers of both parties on a call, as well as the location data, unique identifiers, time of call, and duration of call were handed over to the FBI, which turned over the records to the NSA. According to ''
The Wall Street Journal ''The Wall Street Journal'' is an American business-focused, international daily newspaper based in New York City, with international editions also available in Chinese and Japanese. The ''Journal'', along with its Asian editions, is published ...
'', the Verizon order is part of a controversial data program, which seeks to stockpile records on all calls made in the U.S., but does not collect information directly from
T-Mobile US T-Mobile US, Inc. is an American wireless network operator headquartered in Overland Park, Kansas and Bellevue, Washington, U.S. Its largest shareholder is a multinational telecommunications company Deutsche Telekom AG, which , holds 48.4 pe ...
and
Verizon Wireless Verizon is an American wireless network operator that previously operated as a separate division of Verizon Communications under the name Verizon Wireless. In a 2019 reorganization, Verizon moved the wireless products and services into the div ...
, in part because of their foreign ownership ties. On June 6, 2013, the second media disclosure, the revelation of the PRISM surveillance program (which collects the e-mail, voice, text and video chats of foreigners and an unknown number of Americans from Microsoft, Google, Facebook, Yahoo, Apple and other tech giants), was published simultaneously by ''The Guardian'' and ''
The Washington Post ''The Washington Post'' (also known as the ''Post'' and, informally, ''WaPo'') is an American daily newspaper published in Washington, D.C. It is the most widely circulated newspaper within the Washington metropolitan area and has a large n ...
''. ''
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
'' revealed NSA spying on multiple diplomatic missions of the
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are located primarily in Europe, Europe. The union has a total area of ...
and the
United Nations Headquarters zh, 联合国总部大楼french: Siège des Nations uniesrussian: Штаб-квартира Организации Объединённых Наций es, Sede de las Naciones Unidas , image = Midtown Manhattan Skyline 004.jpg , im ...
in New York. During specific episodes within a four-year period, the NSA hacked several Chinese mobile-phone companies, the
Chinese University of Hong Kong The Chinese University of Hong Kong (CUHK) is a public research university in Ma Liu Shui, Hong Kong, formally established in 1963 by a charter granted by the Legislative Council of Hong Kong. It is the territory's second-oldest university and ...
and
Tsinghua University Tsinghua University (; abbr. THU) is a national public research university in Beijing, China. The university is funded by the Ministry of Education. The university is a member of the C9 League, Double First Class University Plan, Projec ...
in Beijing, and the Asian fiber-optic network operator Pacnet. Only Australia, Canada, New Zealand and the UK are explicitly exempted from NSA attacks, whose main target in the European Union is Germany. A method of bugging encrypted fax machines used at an EU embassy is codenamed Dropmire. During the 2009 G-20 London summit, the British intelligence agency
Government Communications Headquarters Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Uni ...
(GCHQ) intercepted the communications of foreign diplomats. In addition, GCHQ has been intercepting and storing mass quantities of fiber-optic traffic via Tempora. Two principal components of Tempora are called "
Mastering the Internet Mastering the Internet (MTI) is a mass surveillance project led by the British communications intelligence agency Government Communications Headquarters (GCHQ) budgeted at over £1 billion. According to reports in '' The Register'' and '' The Su ...
" (MTI) and "
Global Telecoms Exploitation Global Telecoms Exploitation is reportedly a secret British telephonic mass surveillance programme run by the British signals intelligence and computer security agency, the Government Communications Headquarters (GCHQ). Its existence was revea ...
". The data is preserved for three days while
metadata Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive metadata – the descriptive ...
is kept for thirty days. Data collected by GCHQ under Tempora is shared with the
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
(NSA) of the United States. From 2001 to 2011, the NSA collected vast amounts of metadata records detailing the email and internet usage of Americans via
Stellar Wind A stellar wind is a flow of gas ejected from the upper atmosphere of a star. It is distinguished from the bipolar outflows characteristic of young stars by being less collimated, although stellar winds are not generally spherically symmetric. ...
, which was later terminated due to operational and resource constraints. It was subsequently replaced by newer surveillance programs such as ShellTrumpet, which "''processed its one trillionth metadata record''" by the end of December 2012. The NSA follows specific procedures to target non-U.S. persons and to minimize data collection from U.S. persons. These court-approved policies allow the NSA to: * keep data that could potentially contain details of U.S. persons for up to five years; * retain and make use of "inadvertently acquired" domestic communications if they contain usable intelligence, information on criminal activity, threat of harm to people or property, are encrypted, or are believed to contain any information relevant to cybersecurity; * preserve "foreign intelligence information" contained within attorney–client communications; and * access the content of communications gathered from "U.S. based machine or phone numbers in order to establish if targets are located in the U.S., for the purposes of ceasing further surveillance. According to
Boundless Informant Boundless Informant (stylized as BOUNDLESSINFORMANT) is a big data analysis and data visualization tool used by the United States National Security Agency (NSA). It gives NSA managers summaries of the NSA's worldwide data collection activities b ...
, over 97 billion pieces of intelligence were collected over a 30-day period ending in March 2013. Out of all 97 billion sets of information, about 3 billion data sets originated from U.S. computer networks and around 500 million metadata records were collected from German networks. In August 2013, it was revealed that the
Bundesnachrichtendienst The Federal Intelligence Service (German: ; , BND) is the foreign intelligence agency of Germany, directly subordinate to the Chancellor's Office. The BND headquarters is located in central Berlin and is the world's largest intelligence h ...
(BND) of Germany transfers massive amounts of metadata records to the NSA. ''Der Spiegel'' disclosed that out of all 27 member states of the European Union, Germany is the most targeted due to the NSA's systematic monitoring and storage of Germany's telephone and Internet connection data. According to the magazine the NSA stores data from around half a billion communications connections in Germany each month. This data includes telephone calls, emails, mobile-phone text messages and chat transcripts.


July

The NSA gained massive amounts of information captured from the monitored data traffic in Europe. For example, in December 2012, the NSA gathered on an average day metadata from some 15 million telephone connections and 10 million Internet datasets. The NSA also monitored the European Commission in Brussels and monitored EU diplomatic Facilities in Washington and at the United Nations by placing bugs in offices as well as infiltrating computer networks. The U.S. government made as part of its UPSTREAM data collection program deals with companies to ensure that it had access to and hence the capability to surveil undersea fiber-optic cables which deliver e-mails, Web pages, other electronic communications and phone calls from one continent to another at the speed of light. According to the Brazilian newspaper ''
O Globo ''O Globo'' (, ''The Globe'') is a Brazilian newspaper based in Rio de Janeiro. ''O Globo'' is the most prominent print publication in the Grupo Globo media conglomerate. Founded by journalist Irineu Marinho, owner of ''A Noite'', it was ori ...
'', the NSA spied on millions of emails and calls of Brazilian citizens, while Australia and New Zealand have been involved in the joint operation of the NSA's global analytical system XKeyscore.EUA expandem o aparato de vigilância continuamente
''
O Globo ''O Globo'' (, ''The Globe'') is a Brazilian newspaper based in Rio de Janeiro. ''O Globo'' is the most prominent print publication in the Grupo Globo media conglomerate. Founded by journalist Irineu Marinho, owner of ''A Noite'', it was ori ...
'', July 6, 2013. Retrieved July 8, 2013.
Among the numerous allied facilities contributing to XKeyscore are four installations in Australia and one in New Zealand: * Pine Gap near
Alice Springs Alice Springs ( aer, Mparntwe) is the third-largest town in the Northern Territory of Australia. Known as Stuart until 31 August 1933, the name Alice Springs was given by surveyor William Whitfield Mills after Alice, Lady Todd (''née'' A ...
, Australia, which is partly operated by the U.S.
Central Intelligence Agency The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
(CIA) * The Shoal Bay Receiving Station near Darwin, Australia, is operated by the
Australian Signals Directorate Australian Signals Directorate (ASD), formerly the Defence Signals Directorate (DSD) is the federal statutory agency in the Australian Government responsible for foreign signals intelligence, support to military operations, cyber warfare, and i ...
(ASD) * The Australian Defence Satellite Communications Station near Geraldton, Australia, is operated by the ASD *
HMAS Harman HMAS ''Harman'' is a Royal Australian Navy (RAN) base that serves as a communications and logistics facility. The main base is located in the Australian capital of Canberra, and is geographically recognised as the suburb of Harman (postcode 2 ...
outside
Canberra Canberra ( ) is the capital city of Australia. Founded following the federation of the colonies of Australia as the seat of government for the new nation, it is Australia's largest inland city and the eighth-largest city overall. The ci ...
, Australia, is operated by the ASD *
Waihopai Station The Waihopai Station is a secure communication facility, located near Blenheim, run by New Zealand's Government Communications Security Bureau. The station started operating in 1989, and collects data that is then shared with New Zealand's allies ...
near
Blenheim, New Zealand Blenheim ( ; mi, Waiharakeke) is the most populous town in the region of Marlborough, in the north east of the South Island of New Zealand. It has an urban population of The surrounding Marlborough wine region is well known as the centre o ...
, is operated by New Zealand's
Government Communications Security Bureau The Government Communications Security Bureau (GCSB) ( mi, Te Tira Tiaki) is the public-service department of New Zealand charged with promoting New Zealand's national security by collecting and analysing information of an intelligence nature. ...
(GCSB) ''
O Globo ''O Globo'' (, ''The Globe'') is a Brazilian newspaper based in Rio de Janeiro. ''O Globo'' is the most prominent print publication in the Grupo Globo media conglomerate. Founded by journalist Irineu Marinho, owner of ''A Noite'', it was ori ...
'' released an NSA document titled " Primary FORNSAT Collection Operations", which revealed the specific locations and codenames of the FORNSAT intercept stations in 2002. According to Edward Snowden, the NSA has established secret intelligence partnerships with many Western governments. The Foreign Affairs Directorate (FAD) of the NSA is responsible for these partnerships, which, according to Snowden, are organized such that foreign governments can "insulate their political leaders" from public outrage in the event that these global surveillance partnerships are leaked. In an interview published by ''
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
'', Snowden accused the NSA of being "in bed together with the Germans". The NSA granted the German intelligence agencies BND (foreign intelligence) and
BfV BFV may refer to: * Baden Football Association, the ''Badischer Fussball-Verband'', a regional football association in Germany * Bavarian Football Association, the ''Bayerischer Fussball-Verband'', a regional football association in Germany * Ber ...
(domestic intelligence) access to its controversial XKeyscore system.'Prolific Partner': German Intelligence Used NSA Spy Program
''
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
''. Retrieved July 21, 2013.
In return, the BND turned over copies of two systems named Mira4 and Veras, reported to exceed the NSA's SIGINT capabilities in certain areas. Every day, massive amounts of metadata records are collected by the BND and transferred to the NSA via the
Bad Aibling Station The Bad Aibling Station (BAS), also known as the 18th United States Army Security Agency Field Station, Field station 81, and Hortensie III is a satellite tracking station operated by the German SIGINT agency BND from nearby ''Mangfall Barrack ...
near
Munich Munich ( ; german: München ; bar, Minga ) is the capital and most populous city of the German state of Bavaria. With a population of 1,558,395 inhabitants as of 31 July 2020, it is the third-largest city in Germany, after Berlin and ...
, Germany. In December 2012 alone, the BND handed over 500 million metadata records to the NSA. In a document dated January 2013, the NSA acknowledged the efforts of the BND to undermine
privacy law Privacy law is the body of law that deals with the regulating, storing, and using of personally identifiable information, personal healthcare information, and financial information of individuals, which can be collected by governments, public o ...
s: According to an NSA document dated April 2013, Germany has now become the NSA's "most prolific partner". Under a section of a separate document leaked by Snowden titled "Success Stories", the NSA acknowledged the efforts of the German government to expand the BND's international data sharing with partners: In addition, the German government was well aware of the PRISM surveillance program long before Edward Snowden made details public. According to Angela Merkel's spokesman
Steffen Seibert Steffen Rüdiger Seibert (born 7 June 1960 in Munich) is a German journalist who served as head of the German Federal Government's Press and Information Office and as the German government's spokesperson from 2010 to 2021. During his tenure, Seib ...
, there are two separate PRISM programs – one is used by the NSA and the other is used by
NATO The North Atlantic Treaty Organization (NATO, ; french: Organisation du traité de l'Atlantique nord, ), also called the North Atlantic Alliance, is an intergovernmental military alliance between 30 member states – 28 European and two N ...
forces in
Afghanistan Afghanistan, officially the Islamic Emirate of Afghanistan,; prs, امارت اسلامی افغانستان is a landlocked country located at the crossroads of Central Asia and South Asia. Referred to as the Heart of Asia, it is borde ...
. The two programs are "not identical". ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
'' revealed further details of the NSA's XKeyscore tool, which allows government analysts to search through vast databases containing emails, online chats and the browsing histories of millions of individuals without prior authorization. Greenwald, Glenn (July 31, 2013
"XKeyscore: NSA tool collects 'nearly everything a user does on the internet'"
''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
''. Retrieved August 1, 2013.
Microsoft "developed a surveillance capability to deal" with the interception of encrypted chats on
Outlook.com Outlook.com is a webmail service that is part of the Microsoft 365 product family. It offers mail, calendaring, contacts, and tasks services. Founded in 1996 by Sabeer Bhatia and Jack Smith as Hotmail, it was acquired by Microsoft in 1997 ...
, within five months after the service went into testing. NSA had access to Outlook.com emails because "Prism collects this data prior to encryption." In addition, Microsoft worked with the FBI to enable the NSA to gain access to its cloud storage service SkyDrive. An internal NSA document dating from August 3, 2012, described the PRISM surveillance program as a "
team sport A team sport includes any sport where individuals are organized into opposing teams which compete to win or cooperate to entertain their audience. Team members act together towards a shared objective. This can be done in a number of ways s ...
". The
CIA The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
's National Counterterrorism Center is allowed to examine federal government files for possible criminal behavior, even if there is no reason to suspect U.S. citizens of wrongdoing. Previously the NTC was barred to do so, unless a person was a terror suspect or related to an investigation. Snowden also confirmed that Stuxnet was cooperatively developed by the United States and Israel. In a report unrelated to Edward Snowden, the French newspaper ''
Le Monde ''Le Monde'' (; ) is a French daily afternoon newspaper. It is the main publication of Le Monde Group and reported an average circulation of 323,039 copies per issue in 2009, about 40,000 of which were sold abroad. It has had its own website si ...
'' revealed that France's DGSE was also undertaking mass surveillance, which it described as "illegal and outside any serious control".


August

Documents leaked by Edward Snowden that were seen by ''
Süddeutsche Zeitung The ''Süddeutsche Zeitung'' (; ), published in Munich, Bavaria, is one of the largest daily newspapers in Germany. The tone of SZ is mainly described as centre-left, liberal, social-liberal, progressive-liberal, and social-democrat. Hist ...
'' (SZ) and ''
Norddeutscher Rundfunk Norddeutscher Rundfunk (NDR; ''Northern German Broadcasting'') is a public radio and television broadcaster, based in Hamburg. In addition to the city-state of Hamburg, NDR broadcasts for the German states of Lower Saxony, Mecklenburg-Vorpommer ...
'' revealed that several telecom operators have played a key role in helping the British intelligence agency
Government Communications Headquarters Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Uni ...
(GCHQ) tap into worldwide
fiber-optic communication Fiber-optic communication is a method of transmitting information from one place to another by sending pulses of infrared light through an optical fiber. The light is a form of carrier wave that is modulated to carry information. Fiber is pr ...
s. The telecom operators are: * Verizon Business (codenamed "Dacron") * BT (codenamed "Remedy") * Vodafone Cable (codenamed "Gerontic") *
Global Crossing Global Crossing was a telecommunications company that provided computer networking services and operated a tier 1 carrier. It maintained a large backbone network and offered peering, virtual private networks, leased lines, audio and video co ...
(codenamed "Pinnage") * Level 3 (codenamed "Little") *
Viatel Viatel is a Dublin-based telecoms operator. Viatel was founded in 1991 by Martin Varsavsky. In 1994, it went public on the Nasdaq stock exchange. Four years later, Varsavsky sold his stake in Viatel for US$200 million and left the company. I ...
(codenamed "Vitreous") * Interoute (codenamed "Streetcar") Each of them were assigned a particular area of the international fiber-optic network for which they were individually responsible. The following networks have been infiltrated by GCHQ: TAT-14 (EU-UK-US), Atlantic Crossing 1 (EU-UK-US), Circe South (France-UK), Circe North (Netherlands-UK), Flag Atlantic-1, Flag Europa-Asia, SEA-ME-WE 3 (Southeast Asia-Middle East-Western Europe), SEA-ME-WE 4 (Southeast Asia-Middle East-Western Europe), Solas (Ireland-UK), UK-France 3, UK-Netherlands 14, ULYSSES (EU-UK),
Yellow Yellow is the color between green and orange on the spectrum of light. It is evoked by light with a dominant wavelength of roughly 575585 nm. It is a primary color in subtractive color systems, used in painting or color printing. In th ...
(UK-US) and Pan European Crossing (EU-UK). Telecommunication companies who participated were "forced" to do so and had "no choice in the matter". Some of the companies were subsequently paid by GCHQ for their participation in the infiltration of the cables. According to the SZ, GCHQ has access to the majority of internet and telephone communications flowing throughout Europe, can listen to phone calls, read emails and text messages, see which websites internet users from all around the world are visiting. It can also retain and analyse nearly the entire European internet traffic. GCHQ is collecting all data transmitted to and from the United Kingdom and Northern Europe via the undersea fibre optic telecommunications cable SEA-ME-WE 3. The
Security and Intelligence Division The Security and Intelligence Division (SID) is the foreign intelligence service of Singapore under the purview of the Ministry of Defence (MINDEF), tasked with gathering, processing and analysing national security information from around the wo ...
(SID) of Singapore co-operates with Australia in accessing and sharing communications carried by the SEA-ME-WE-3 cable. The
Australian Signals Directorate Australian Signals Directorate (ASD), formerly the Defence Signals Directorate (DSD) is the federal statutory agency in the Australian Government responsible for foreign signals intelligence, support to military operations, cyber warfare, and i ...
(ASD) is also in a partnership with British, American and Singaporean intelligence agencies to tap undersea fibre optic telecommunications cables that link Asia, the Middle East and Europe and carry much of Australia's international phone and internet traffic. The U.S. runs a top-secret surveillance program known as the Special Collection Service (SCS), which is based in over 80 U.S. consulates and embassies worldwide. The NSA hacked the United Nations' video conferencing system in Summer 2012 in violation of a UN agreement. The NSA is not just intercepting the communications of Americans who are in direct contact with foreigners targeted overseas, but also searching the contents of vast amounts of e-mail and text communications into and out of the country by Americans who mention information about foreigners under surveillance. It also spied on
Al Jazeera Al Jazeera ( ar, الجزيرة, translit-std=DIN, translit=al-jazīrah, , "The Island") is a state-owned Arabic-language international radio and TV broadcaster of Qatar. It is based in Doha and operated by the media conglomerate Al Jazee ...
and gained access to its internal communications systems. The NSA has built a surveillance network that has the capacity to reach roughly 75% of all U.S. Internet traffic. U.S. Law-enforcement agencies use tools used by computer hackers to gather information on suspects. An internal NSA audit from May 2012 identified 2776 incidents i.e. violations of the rules or court orders for surveillance of Americans and foreign targets in the U.S. in the period from April 2011 through March 2012, while U.S. officials stressed that any mistakes are not intentional. The FISA Court that is supposed to provide critical oversight of the U.S. government's vast spying programs has limited ability to do so and it must trust the government to report when it improperly spies on Americans. A legal opinion declassified on August 21, 2013, revealed that the NSA intercepted for three years as many as 56,000 electronic communications a year of Americans not suspected of having links to terrorism, before FISA court that oversees surveillance found the operation unconstitutional in 2011. Under the Corporate Partner Access project, major U.S. telecommunications providers receive hundreds of millions of dollars each year from the NSA. Voluntary cooperation between the NSA and the providers of global communications took off during the 1970s under the cover name
BLARNEY Blarney () is a suburban town within the administrative area of Cork City in Ireland. It is located approximately north-west of the city centre. It is the site of Blarney Castle, home of the legendary Blarney Stone. Blarney is part of the Dáil ...
. A letter drafted by the Obama administration specifically to inform Congress of the government's mass collection of Americans' telephone communications data was withheld from lawmakers by leaders of the House Intelligence Committee in the months before a key vote affecting the future of the program. The NSA paid GCHQ over £100 Million between 2009 and 2012, in exchange for these funds GCHQ "must pull its weight and be seen to pull its weight." Documents referenced in the article explain that the weaker British laws regarding spying are "a selling point" for the NSA. GCHQ is also developing the technology to "exploit any mobile phone at any time." The NSA has under a legal authority a secret backdoor into its databases gathered from large Internet companies enabling it to search for U.S. citizens' email and phone calls without a warrant. The
Privacy and Civil Liberties Oversight Board The Privacy and Civil Liberties Oversight Board (PCLOB) is an independent agency within the executive branch of the United States government, established by Congress in 2004 to advise the President and other senior executive branch officials to en ...
urged the U.S. intelligence chiefs to draft stronger US surveillance guidelines on domestic spying after finding that several of those guidelines have not been updated up to 30 years. U.S. intelligence analysts have deliberately broken rules designed to prevent them from spying on Americans by choosing to ignore so-called "minimisation procedures" aimed at protecting privacy and used the NSA's agency's enormous eavesdropping power to spy on love interests. After the U.S. Foreign Secret Intelligence Court ruled in October 2011 that some of the NSA's activities were unconstitutional, the agency paid millions of dollars to major internet companies to cover extra costs incurred in their involvement with the PRISM surveillance program. "
Mastering the Internet Mastering the Internet (MTI) is a mass surveillance project led by the British communications intelligence agency Government Communications Headquarters (GCHQ) budgeted at over £1 billion. According to reports in '' The Register'' and '' The Su ...
" (MTI) is part of the
Interception Modernisation Programme The Interception Modernisation Programme (IMP) was a UK government initiative to extend the government's capabilities for lawful interception and storage of communications data. It was widely reported that the IMP's eventual goal was to store deta ...
(IMP) of the British government that involves the insertion of thousands of DPI ( deep packet inspection) "black boxes" at various
internet service provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise priva ...
s, as revealed by the British media in 2009. In 2013, it was further revealed that the NSA had made a £17.2  million financial contribution to the project, which is capable of vacuuming signals from up to 200 fibre-optic cables at all physical points of entry into Great Britain.


September

The ''Guardian'' and ''The New York Times'' reported on secret documents leaked by Snowden showing that the NSA has been in "collaboration with technology companies" as part of "an aggressive, multipronged effort" to weaken the
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can d ...
used in commercial software, and GCHQ has a team dedicated to cracking "Hotmail, Google, Yahoo and Facebook" traffic. Germany's domestic security agency Bundesverfassungsschutz (BfV) systematically transfers the personal data of German residents to the NSA, CIA and seven other members of the
United States Intelligence Community United may refer to: Places * United, Pennsylvania, an unincorporated community * United, West Virginia, an unincorporated community Arts and entertainment Films * ''United'' (2003 film), a Norwegian film * ''United'' (2011 film), a BBC Two f ...
, in exchange for information and espionage software. Israel, Sweden and Italy are also cooperating with American and British intelligence agencies. Under a secret treaty codenamed " Lustre", French intelligence agencies transferred millions of metadata records to the NSA. The Obama Administration secretly won permission from the Foreign Intelligence Surveillance Court in 2011 to reverse restrictions on the National Security Agency's use of intercepted phone calls and e-mails, permitting the agency to search deliberately for Americans' communications in its massive databases. The searches take place under a surveillance program Congress authorized in 2008 under Section 702 of the Foreign Intelligence Surveillance Act. Under that law, the target must be a foreigner "reasonably believed" to be outside the United States, and the court must approve the targeting procedures in an order good for one year. But a warrant for each target would thus no longer be required. That means that communications with Americans could be picked up without a court first determining that there is probable cause that the people they were talking to were terrorists, spies or "foreign powers." The FISC extended the length of time that the NSA is allowed to retain intercepted U.S. communications from five years to six years with an extension possible for foreign intelligence or counterintelligence purposes. Both measures were done without public debate or any specific authority from Congress. A special branch of the NSA called "Follow the Money" (FTM) monitors international payments, banking and credit card transactions and later stores the collected data in the NSA's own financial databank "Tracfin". The NSA monitored the communications of Brazil's president
Dilma Rousseff Dilma Vana Rousseff (; born 14 December 1947) is a Brazilian economist and politician who served as the 36th president of Brazil, holding the position from 2011 until her impeachment and removal from office on 31 August 2016. She is the first ...
and her top aides. The agency also spied on Brazil's oil firm
Petrobras Petróleo Brasileiro S.A., better known by the portmanteau Petrobras (), is a state-owned Brazilian multinational corporation in the petroleum industry headquartered in Rio de Janeiro, Brazil. The company's name translates to Brazilian Petrole ...
as well as French diplomats, and gained access to the private network of the
Ministry of Foreign Affairs of France The Ministry for Europe and Foreign Affairs () is the ministry of the Government of France that handles France's foreign relations. Since 1855, its headquarters have been located at 37 Quai d'Orsay, close to the National Assembly. The term Qua ...
and the SWIFT network. In the United States, the NSA uses the analysis of phone call and e-mail logs of American citizens to create sophisticated graphs of their social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information. The NSA routinely shares raw intelligence data with Israel without first sifting it to remove information about U.S. citizens. In an effort codenamed GENIE, computer specialists can control foreign computer networks using "covert implants," a form of remotely transmitted malware on tens of thousands of devices annually. As worldwide sales of
smartphone A smartphone is a portable computer device that combines mobile telephone and computing functions into one unit. They are distinguished from feature phones by their stronger hardware capabilities and extensive mobile operating systems, whi ...
s began exceeding those of
feature phone A feature phone (also spelled featurephone) is a type or class of mobile phone that retains the form factor of earlier generations of mobile telephones, typically with press-button based inputs and a small non-touch display. They tend to use an ...
s, the NSA decided to take advantage of the smartphone boom. This is particularly advantageous because the smartphone combines a
myriad A myriad (from Ancient Greek grc, μυριάς, translit=myrias, label=none) is technically the number 10,000 (ten thousand); in that sense, the term is used in English almost exclusively for literal translations from Greek, Latin or Sinospher ...
of data that would interest an intelligence agency, such as social contacts, user behavior, interests, location, photos and credit card numbers and passwords. An internal NSA report from 2010 stated that the spread of the smartphone has been occurring "extremely rapidly"—developments that "certainly complicate traditional target analysis." According to the document, the NSA has set up task forces assigned to several smartphone manufacturers and
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common daemon (computing), services for computer programs. Time-sharing operating systems scheduler (computing), schedule tasks for ef ...
s, including Apple Inc.'s iPhone and iOS operating system, as well as
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
's Android mobile operating system. Similarly, Britain's GCHQ assigned a team to study and crack the
BlackBerry The blackberry is an edible fruit produced by many species in the genus ''Rubus'' in the family Rosaceae, hybrids among these species within the subgenus ''Rubus'', and hybrids between the subgenera ''Rubus'' and ''Idaeobatus''. The taxonomy ...
. Under the heading "iPhone capability", the document notes that there are smaller NSA programs, known as "scripts", that can perform surveillance on 38 different features of the iOS 3 and
iOS 4 iOS 4 is the fourth major release of the iOS mobile operating system developed by Apple Inc., being the successor to iPhone OS 3. It was announced at the Apple Special Event on April 8, 2010, and was released on June 21, 2010. iOS 4 is the ...
operating systems. These include the mapping feature,
voicemail A voicemail system (also known as voice message or voice bank) is a computer-based system that allows users and subscribers to exchange personal voice messages; to select and deliver voice information; and to process transactions relating to ind ...
and photos, as well as
Google Earth Google Earth is a computer program that renders a 3D computer graphics, 3D representation of Earth based primarily on satellite imagery. The program maps the Earth by superimposition, superimposing satellite images, aerial photography, and geog ...
, Facebook and Yahoo! Messenger. On September 9, 2013, an internal NSA presentation on iPhone Location Services was published by ''
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
''. One slide shows scenes from Apple's ''1984''-themed television commercial alongside the words "Who knew in 1984..."; another shows Steve Jobs holding an iPhone, with the text "...that this would be big brother..."; and a third shows happy consumers with their iPhones, completing the question with "...and the zombies would be paying customers?"


October

On October 4, 2013, ''
The Washington Post ''The Washington Post'' (also known as the ''Post'' and, informally, ''WaPo'') is an American daily newspaper published in Washington, D.C. It is the most widely circulated newspaper within the Washington metropolitan area and has a large n ...
'' and ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
'' jointly reported that the NSA and GCHQ had made repeated attempts to spy on anonymous Internet users who have been communicating in secret via the anonymity network Tor. Several of these surveillance operations involved the implantation of malicious code into the computers of Tor users who visit particular websites. The NSA and GCHQ had partly succeeded in blocking access to the anonymous network, diverting Tor users to insecure channels. The government agencies were also able to uncover the identity of some anonymous Internet users. The Communications Security Establishment (CSE) has been using a program called Olympia to map the communications of Brazil's Mines and Energy Ministry by targeting the metadata of phone calls and emails to and from the ministry. The Australian Federal Government knew about the PRISM surveillance program months before Edward Snowden made details public. The NSA gathered hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world. The agency did not target individuals. Instead it collected contact lists in large numbers that amount to a sizable fraction of the world's e-mail and instant messaging accounts. Analysis of that data enables the agency to search for hidden connections and to map relationships within a much smaller universe of foreign intelligence targets. The NSA monitored the public email account of former Mexican president
Felipe Calderón Felipe de Jesús Calderón Hinojosa (; born 18 August 1962) is a Mexican politician who served as the 63rd president of Mexico from 1 December 2006 to 30 November 2012 and Secretary of Energy during the presidency of Vicente Fox between 2003 ...
(thus gaining access to the communications of high-ranking cabinet members), the emails of several high-ranking members of Mexico's security forces and text and the mobile phone communication of current Mexican president
Enrique Peña Nieto Enrique Peña Nieto (; born 20 July 1966), commonly referred to by his initials EPN, is a Mexican politician who served as the 64th president of Mexico from 1 December 2012 to 30 November 2018. A member of the Institutional Revolutionary Party ...
. The NSA tries to gather cellular and landline phone numbers—often obtained from American diplomats—for as many foreign officials as possible. The contents of the phone calls are stored in computer databases that can regularly be searched using keywords. The NSA has been monitoring telephone conversations of 35 world leaders. The U.S. government's first public acknowledgment that it tapped the phones of world leaders was reported on October 28, 2013, by the Wall Street Journal after an internal U.S. government review turned up NSA monitoring of some 35 world leaders. GCHQ has tried to keep its mass surveillance program a secret because it feared a "damaging public debate" on the scale of its activities which could lead to legal challenges against them. ''The Guardian'' revealed that the NSA had been monitoring telephone conversations of 35 world leaders after being given the numbers by an official in another U.S. government department. A confidential memo revealed that the NSA encouraged senior officials in such Departments as the
White House The White House is the official residence and workplace of the president of the United States. It is located at 1600 Pennsylvania Avenue NW in Washington, D.C., and has been the residence of every U.S. president since John Adams in ...
, State and
The Pentagon The Pentagon is the headquarters building of the United States Department of Defense. It was constructed on an accelerated schedule during World War II. As a symbol of the U.S. military, the phrase ''The Pentagon'' is often used as a metony ...
, to share their "Rolodexes" so the agency could add the telephone numbers of leading foreign politicians to their surveillance systems. Reacting to the news, German leader
Angela Merkel Angela Dorothea Merkel (; ; born 17 July 1954) is a German former politician and scientist who served as Chancellor of Germany from 2005 to 2021. A member of the Christian Democratic Union (CDU), she previously served as Leader of the Opp ...
, arriving in
Brussels Brussels (french: Bruxelles or ; nl, Brussel ), officially the Brussels-Capital Region (All text and all but one graphic show the English name as Brussels-Capital Region.) (french: link=no, Région de Bruxelles-Capitale; nl, link=no, Bruss ...
for an
EU summit This is a list of meetings of the European Council (informally referred to as EU summits); the meetings of the European Council, an institution of the European Union (EU) comprising heads of state or government of EU member states. They started ...
, accused the U.S. of a breach of trust, saying: "We need to have trust in our allies and partners, and this must now be established once again. I repeat that spying among friends is not at all acceptable against anyone, and that goes for every citizen in Germany." The NSA collected in 2010 data on ordinary Americans' cellphone locations, but later discontinued it because it had no "operational value." Under Britain's MUSCULAR programme, the NSA and GCHQ have secretly broken into the main communications links that connect
Yahoo Yahoo! (, styled yahoo''!'' in its logo) is an American web services provider. It is headquartered in Sunnyvale, California and operated by the namesake company Yahoo! Inc. (2017–present), Yahoo Inc., which is 90% owned by investment funds ma ...
and
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
data center A data center (American English) or data centre (British English)See spelling differences. is a building, a dedicated space within a building, or a group of buildings used to house computer systems and associated components, such as telecommun ...
s around the world and thereby gained the ability to collect metadata and
content Content or contents may refer to: Media * Content (media), information or experience provided to audience or end-users by publishers or media producers ** Content industry, an umbrella term that encompasses companies owning and providing mas ...
at will from hundreds of millions of user accounts. The mobile phone of German Chancellor
Angela Merkel Angela Dorothea Merkel (; ; born 17 July 1954) is a German former politician and scientist who served as Chancellor of Germany from 2005 to 2021. A member of the Christian Democratic Union (CDU), she previously served as Leader of the Opp ...
might have been tapped by U.S. intelligence. According to the Spiegel this monitoring goes back to 2002 and ended in the summer of 2013, while ''The New York Times'' reported that Germany has evidence that the NSA's surveillance of Merkel began during George W. Bush's tenure. After learning from ''
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
'' magazine that the NSA has been listening in to her personal mobile phone, Merkel compared the snooping practices of the NSA with those of the
Stasi The Ministry for State Security, commonly known as the (),An abbreviation of . was the state security service of the East Germany from 1950 to 1990. The Stasi's function was similar to the KGB, serving as a means of maintaining state autho ...
. It was reported in March 2014, by
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
that Merkel had also been placed on an NSA surveillance list alongside 122 other world leaders. On October 31, 2013,
Hans-Christian Ströbele Hans-Christian Ströbele (; 7 June 1939 – 29 August 2022) was a German politician and lawyer. He was a member of Alliance 90/The Greens, the German green party. Education and early career Ströbele was born on 7 June 1939 in Halle, Saale, ...
, a member of the
German Bundestag German(s) may refer to: * Germany (of or related to) **Germania (historical use) * Germans, citizens of Germany, people of German ancestry, or native speakers of the German language ** For citizens of Germany, see also German nationality law **Ge ...
, met Snowden in Moscow and revealed the former intelligence contractor's readiness to brief the German government on NSA spying. A highly sensitive signals intelligence collection program known as
Stateroom A state room in a large European mansion is usually one of a suite of very grand rooms which were designed for use when entertaining royalty. The term was most widely used in the 17th and 18th centuries. They were the most lavishly decorated in ...
involves the interception of radio, telecommunications and internet traffic. It is operated out of the diplomatic missions of the
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
(Australia, Britain, Canada, New Zealand, United States) in numerous locations around the world. The program conducted at U.S. diplomatic missions is run in concert by the U.S. intelligence agencies NSA and CIA in a joint venture group called " Special Collection Service" (SCS), whose members work undercover in shielded areas of the American Embassies and Consulates, where they are officially accredited as diplomats and as such enjoy special privileges. Under diplomatic protection, they are able to look and listen unhindered. The SCS for example used the American Embassy near the Brandenburg Gate in Berlin to monitor communications in Germany's government district with its parliament and the seat of the government. Under the Stateroom surveillance programme, Australia operates clandestine surveillance facilities to intercept phone calls and data across much of Asia. In France, the NSA targeted people belonging to the worlds of business, politics or French state administration. The NSA monitored and recorded the content of telephone communications and the history of the connections of each target i.e. the metadata. The actual surveillance operation was performed by French intelligence agencies on behalf of the NSA. The cooperation between France and the NSA was confirmed by the Director of the NSA, Keith B. Alexander, who asserted that foreign intelligence services collected phone records in "war zones" and "other areas outside their borders" and provided them to the NSA. The French newspaper ''
Le Monde ''Le Monde'' (; ) is a French daily afternoon newspaper. It is the main publication of Le Monde Group and reported an average circulation of 323,039 copies per issue in 2009, about 40,000 of which were sold abroad. It has had its own website si ...
'' also disclosed new PRISM and Upstream slides (See Page 4, 7 and 8) coming from the "PRISM/US-984XN Overview" presentation. In Spain, the NSA intercepted the telephone conversations, text messages and emails of millions of Spaniards, and spied on members of the Spanish government. Between December 10, 2012, and January 8, 2013, the NSA collected metadata on 60 million telephone calls in Spain. According to documents leaked by Snowden, the surveillance of Spanish citizens was jointly conducted by the NSA and the intelligence agencies of Spain.


November

''The New York Times'' reported that the NSA carries out an eavesdropping effort, dubbed Operation Dreadnought, against the Iranian leader Ayatollah Ali Khamenei. During his 2009 visit to Iranian Kurdistan, the agency collaborated with GCHQ and the U.S.'s
National Geospatial-Intelligence Agency The National Geospatial-Intelligence Agency (NGA) is a combat support agency within the United States Department of Defense whose primary mission is collecting, analyzing, and distributing geospatial intelligence (GEOINT) in support of natio ...
, collecting radio transmissions between aircraft and airports, examining Khamenei's convoy with satellite imagery, and enumerating military radar stations. According to the story, an objective of the operation is "communications fingerprinting": the ability to distinguish Khamenei's communications from those of other people in
Iran Iran, officially the Islamic Republic of Iran, and also called Persia, is a country located in Western Asia. It is bordered by Iraq and Turkey to the west, by Azerbaijan and Armenia to the northwest, by the Caspian Sea and Turkmeni ...
. The same story revealed an operation code-named Ironavenger, in which the NSA intercepted e-mails sent between a country allied with the United States and the government of "an adversary". The ally was conducting a
spear-phishing Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwa ...
attack: its e-mails contained
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depr ...
. The NSA gathered documents and login credentials belonging to the enemy country, along with knowledge of the ally's capabilities for attacking computers. According to the British newspaper ''
The Independent ''The Independent'' is a British online newspaper. It was established in 1986 as a national morning printed paper. Nicknamed the ''Indy'', it began as a broadsheet and changed to tabloid format in 2003. The last printed edition was publish ...
'', the British intelligence agency GCHQ maintains a listening post on the roof of the
British Embassy in Berlin The British Embassy in Berlin (german: Britische Botschaft, Berlin) is the United Kingdom's diplomatic mission to Germany. It is located on 70-71 Wilhelmstraße, near the Hotel Adlon, in Berlin. The current ambassador is Jill Gallard. Palais ...
that is capable of intercepting mobile phone calls, wi-fi data and long-distance communications all over the German capital, including adjacent government buildings such as the Reichstag (seat of the German parliament) and the Chancellery (seat of Germany's head of government) clustered around the
Brandenburg Gate The Brandenburg Gate (german: Brandenburger Tor ) is an 18th-century Neoclassical architecture, neoclassical monument in Berlin, built on the orders of Prussian king Frederick William II of Prussia, Frederick William II after Prussian invasion ...
. Operating under the code-name "Quantum Insert", GCHQ set up a fake website masquerading as
LinkedIn LinkedIn () is an American business and employment-oriented online service that operates via websites and mobile apps. Launched on May 5, 2003, the platform is primarily used for professional networking and career development, and allows job se ...
, a social website used for
professional network A professional network service (or, in an Internet context, simply professional network) is a type of social network service that focuses on interactions and relationships for business opportunities and career growth, with less emphasis on activiti ...
ing, as part of its efforts to install surveillance software on the computers of the telecommunications operator Belgacom. In addition, the headquarters of the oil cartel
OPEC The Organization of the Petroleum Exporting Countries (OPEC, ) is a cartel of countries. Founded on 14 September 1960 in Baghdad by the first five members (Iran, Iraq, Kuwait, Saudi Arabia, and Venezuela), it has, since 1965, been headqua ...
were infiltrated by GCHQ as well as the NSA, which bugged the computers of nine OPEC employees and monitored the General Secretary of OPEC. For more than three years GCHQ has been using an automated monitoring system code-named "Royal Concierge" to infiltrate the reservation systems of at least 350 prestigious hotels in many different parts of the world in order to target, search and analyze reservations to detect diplomats and government officials. First tested in 2010, the aim of the "Royal Concierge" is to track down the travel plans of diplomats, and it is often supplemented with surveillance methods related to human intelligence (HUMINT). Other covert operations include the wiretapping of room telephones and fax machines used in targeted hotels as well as the monitoring of computers hooked up to the hotel network. In November 2013, the
Australian Broadcasting Corporation The Australian Broadcasting Corporation (ABC) is the national broadcaster of Australia. It is principally funded by direct grants from the Australian Government and is administered by a government-appointed board. The ABC is a publicly-owne ...
and ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
'' revealed that the
Australian Signals Directorate Australian Signals Directorate (ASD), formerly the Defence Signals Directorate (DSD) is the federal statutory agency in the Australian Government responsible for foreign signals intelligence, support to military operations, cyber warfare, and i ...
(DSD) had attempted to listen to the private phone calls of the
president of Indonesia The President of the Republic of Indonesia ( id, Presiden Republik Indonesia) is both the head of state and the head of government of the Republic of Indonesia. The president leads the executive branch of the Indonesian government an ...
and his wife. The Indonesian foreign minister, Marty Natalegawa, confirmed that he and the president had contacted the ambassador in Canberra. Natalegawa said any tapping of Indonesian politicians' personal phones "violates every single decent and legal instrument I can think of—national in Indonesia, national in Australia, international as well". Other high-ranking Indonesian politicians targeted by the DSD include: * Boediono (Vice President) *
Jusuf Kalla Muhammad Jusuf Kalla (; born 15 May 1942) is an Indonesian politician and businessman who served as the 10th and 12th vice president of Indonesia, the only vice president in Indonesian history to serve two non-consecutive terms in office (2004� ...
(Former Vice President) * Dino Patti Djalal (Ambassador to the United States) *
Andi Mallarangeng Andi Alfian Mallarangeng (born March 14, 1963 in Makassar, South Sulawesi) is an Indonesian politician who served as Minister of Youth and Sports at Second United Indonesia Cabinet. He also served as presidential spokesman for President Susilo Ba ...
(Government spokesperson) *
Hatta Rajasa Muhammad Hatta Rajasa (born 18 December 1953) is an Indonesian politician who served as the Coordinating Minister for the Economy of Indonesia from 22 October 2009 to 13 May 2014. A member of the National Mandate Party (PAN), he previously served ...
(State Secretary) *
Sri Mulyani Indrawati Sri Mulyani Indrawati (born 26 August 1962) is an Indonesian economist who has been Minister of Finance of Indonesia since 2016; previously she served in the same post from 2005 to 2010. In June 2010 she was appointed as Managing Director of t ...
(Former Finance Minister and current managing director of the
World Bank The World Bank is an international financial institution that provides loans and grants to the governments of low- and middle-income countries for the purpose of pursuing capital projects. The World Bank is the collective name for the Inte ...
) * Widodo Adi Sutjipto (Former Commander-in-Chief of the military) *
Sofyan Djalil Dr. Sofyan A. Djalil, S.H., M.A. was the Minister of Agrarian and Spatial Planning of Indonesia under President Joko Widodo's 2014–2019 Working Cabinet and the Onward Indonesia Cabinet. He has served as State Minister for State-Owned Enterpr ...
(Senior government advisor) Carrying the title " 3G impact and update", a classified presentation leaked by Snowden revealed the attempts of the ASD/DSD to keep up to pace with the rollout of 3G technology in Indonesia and across Southeast Asia. The ASD/DSD motto placed at the bottom of each page reads: "Reveal their secrets—protect our own." Under a secret deal approved by British intelligence officials, the NSA has been storing and analyzing the internet and email records of British citizens since 2007. The NSA also proposed in 2005 a procedure for spying on the citizens of the UK and other Five-Eyes nations alliance, even where the partner government has explicitly denied the U.S. permission to do so. Under the proposal, partner countries must neither be informed about this particular type of surveillance, nor the procedure of doing so. Towards the end of November, ''The New York Times'' released an internal NSA report outlining the agency's efforts to expand its surveillance abilities. The five-page document asserts that the
law of the United States The law of the United States comprises many levels of codified and uncodified forms of law, of which the most important is the nation's Constitution, which prescribes the foundation of the federal government of the United States, as well as ...
has not kept up with the needs of the NSA to conduct mass surveillance in the "golden age" of
signals intelligence Signals intelligence (SIGINT) is intelligence-gathering by interception of '' signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication ...
, but there are grounds for optimism because, in the NSA's own words: The report, titled "
SIGINT Signals intelligence (SIGINT) is intelligence-gathering by interception of '' signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication ...
Strategy 2012–2016", also said that the U.S. will try to influence the "global commercial encryption market" through "commercial relationships", and emphasized the need to "revolutionize" the analysis of its vast data collection to "radically increase operational impact". On November 23, 2013, the Dutch newspaper ''
NRC Handelsblad ''NRC'', previously called ''NRC Handelsblad'' (), is a daily morning newspaper published in the Netherlands by NRC Media. It is generally accepted as a newspaper of record in the Netherlands. History ''NRC Handelsblad'' was first published on 1 ...
'' reported that the Netherlands was targeted by U.S. intelligence agencies in the immediate aftermath of
World War II World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the World War II by country, vast majority of the world's countries—including all of the great power ...
. This period of surveillance lasted from 1946 to 1968, and also included the interception of the communications of other European countries including Belgium, France, West Germany and Norway. The Dutch Newspaper also reported that NSA infected more than 50,000 computer networks worldwide, often covertly, with malicious spy software, sometimes in cooperation with local authorities, designed to steal sensitive information.


December

According to the classified documents leaked by Snowden, the
Australian Signals Directorate Australian Signals Directorate (ASD), formerly the Defence Signals Directorate (DSD) is the federal statutory agency in the Australian Government responsible for foreign signals intelligence, support to military operations, cyber warfare, and i ...
(ASD), formerly known as the Defense Signals Directorate, had offered to share intelligence information it had collected with the other intelligence agencies of the UKUSA Agreement. Data shared with foreign countries include "bulk, unselected, unminimized metadata" it had collected. The ASD provided such information on the condition that no Australian citizens were targeted. At the time the ASD assessed that "unintentional collection f metadata of Australian nationalsis not viewed as a significant issue". If a target was later identified as being an Australian national, the ASD was required to be contacted to ensure that a warrant could be sought. Consideration was given as to whether "medical, legal or religious information" would be automatically treated differently to other types of data, however a decision was made that each agency would make such determinations on a case-by-case basis. Leaked material does not specify where the ASD had collected the intelligence information from, however Section 7(a) of the Intelligence Services Act 2001 (Commonwealth) states that the ASD's role is "...to obtain intelligence about the capabilities, intentions or activities of people or organizations outside Australia...". As such, it is possible ASD's metadata intelligence holdings was focused on foreign intelligence collection and was within the bounds of Australian law. ''
The Washington Post ''The Washington Post'' (also known as the ''Post'' and, informally, ''WaPo'') is an American daily newspaper published in Washington, D.C. It is the most widely circulated newspaper within the Washington metropolitan area and has a large n ...
'' revealed that the NSA has been tracking the locations of mobile phones from all over the world by tapping into the cables that connect mobile networks globally and that serve U.S. cellphones as well as foreign ones. In the process of doing so, the NSA collects more than five billion records of phone locations on a daily basis. This enables NSA analysts to map cellphone owners' relationships by correlating their patterns of movement over time with thousands or millions of other phone users who cross their paths. The Washington Post also reported that both GCHQ and the NSA make use of location data and advertising tracking files generated through normal internet browsing (with
cookies A cookie is a baked or cooked snack or dessert that is typically small, flat and sweet. It usually contains flour, sugar, egg, and some type of oil, fat, or butter. It may include other ingredients such as raisins, oats, chocolate chi ...
operated by Google, known as "Pref") to pinpoint targets for government hacking and to bolster surveillance. The
Norwegian Intelligence Service The Norwegian Intelligence Service (NIS) or Etterretningstjenesten (E-tjenesten) is a Norwegian military intelligence agency under the Chief of Defence and the Ministry of Defence. History Olav Njølstad says that the "stay-behind cooperation w ...
(NIS), which cooperates with the NSA, has gained access to Russian targets in the
Kola Peninsula The Kola Peninsula (russian: Кольский полуостров, Kolsky poluostrov; sjd, Куэлнэгк нёа̄ррк) is a peninsula in the extreme northwest of Russia, and one of the largest peninsulas of Europe. Constituting the bulk ...
and other civilian targets. In general, the NIS provides information to the NSA about "Politicians", "Energy" and "Armament". A top secret memo of the NSA lists the following years as milestones of the Norway–United States of America SIGINT agreement, or NORUS Agreement: *1952 – Informal starting year of cooperation between the NIS and the NSA *1954 – Formalization of the agreement *1963 – Extension of the agreement for coverage of
foreign instrumentation signals intelligence Foreign instrumentation signals intelligence, FISINT (''F''oreign ''I''nstrumentation ''S''ignature ''INT''elligence) is intelligence from the interception of foreign electromagnetic emissions associated with the testing and operational deployment ...
(FISINT) *1970 – Extension of the agreement for coverage of electronic intelligence (ELINT) *1994 – Extension of the agreement for coverage of communications intelligence (COMINT) The NSA considers the NIS to be one of its most reliable partners. Both agencies also cooperate to crack the encryption systems of mutual targets. According to the NSA, Norway has made no objections to its requests from the NIS. On December 5,
Sveriges Television Sveriges Television AB ("Sweden's Television Stock Company"), shortened to SVT (), is the Sweden, Swedish national public broadcasting, public television broadcaster, funded by a public service tax on personal income set by the Riksdag (national ...
reported the National Defense Radio Establishment (FRA) has been conducting a clandestine surveillance operation in Sweden, targeting the internal politics of Russia. The operation was conducted on behalf of the NSA, receiving data handed over to it by the FRA. The Swedish-American surveillance operation also targeted Russian energy interests as well as the
Baltic states The Baltic states, et, Balti riigid or the Baltic countries is a geopolitical term, which currently is used to group three countries: Estonia, Latvia, and Lithuania. All three countries are members of NATO, the European Union, the Eurozone ...
. As part of the UKUSA Agreement, a secret treaty was signed in 1954 by Sweden with the United States, the United Kingdom, Canada, Australia and New Zealand, regarding collaboration and intelligence sharing. As a result of Snowden's disclosures, the notion of Swedish neutrality in international politics was called into question. In an internal document dating from the year 2006, the NSA acknowledged that its "relationship" with Sweden is "protected at the TOP SECRET level because of that nation's political neutrality." Specific details of Sweden's cooperation with members of the UKUSA Agreement include: * The FRA has been granted access to XKeyscore, an analytical database of the NSA. * Sweden updated the NSA on changes in Swedish legislation that provided the legal framework for information sharing between the FRA and the Swedish Security Service. * Since January 2013, a counterterrorism analyst of the NSA has been stationed in the Swedish capital of
Stockholm Stockholm () is the capital and largest city of Sweden as well as the largest urban area in Scandinavia. Approximately 980,000 people live in the municipality, with 1.6 million in the urban area, and 2.4 million in the metropo ...
* The NSA, GCHQ and the FRA signed an agreement in 2004 that allows the FRA to directly collaborate with the NSA without having to consult GCHQ. About five years later, the
Riksdag The Riksdag (, ; also sv, riksdagen or ''Sveriges riksdag'' ) is the legislature and the supreme decision-making body of Sweden. Since 1971, the Riksdag has been a unicameral legislature with 349 members (), elected proportionally and se ...
passed a controversial legislative change, briefly allowing the FRA to monitor both wireless and cable bound signals passing the Swedish border without a court order, while also introducing several provisions designed to protect the privacy of individuals, according to the original proposal. This legislation was amended 11 months later, in an effort to strengthen protection of privacy by making court orders a requirement, and by imposing several limits on the intelligence-gathering. According to documents leaked by Snowden, the
Special Source Operations Special Source Operations (SSO) is a division in the US National Security Agency (NSA) which is responsible for all programs aimed at collecting data from major fiber-optic cables and switches, both inside the US and abroad, and also through corpor ...
of the NSA has been sharing information containing "logins, cookies, and GooglePREFID" with the Tailored Access Operations division of the NSA, as well as Britain's GCHQ agency. During the 2010 G-20 Toronto summit, the U.S. embassy in Ottawa was transformed into a security command post during a six-day spying operation that was conducted by the NSA and closely coordinated with the
Communications Security Establishment Canada The Communications Security Establishment (CSE; french: Centre de la sécurité des télécommunications, ''CST''), formerly (from 2008-2014) called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national c ...
(CSEC). The goal of the spying operation was, among others, to obtain information on international development, banking reform, and to counter trade protectionism to support "U.S. policy goals." On behalf of the NSA, the CSEC has set up covert spying posts in 20 countries around the world. In Italy the Special Collection Service of the NSA maintains two separate surveillance posts in Rome and
Milan Milan ( , , Lombard: ; it, Milano ) is a city in northern Italy, capital of Lombardy, and the second-most populous city proper in Italy after Rome. The city proper has a population of about 1.4 million, while its metropolitan city ...
. According to a secret NSA memo dated September 2010, the Italian embassy in Washington, D.C. has been targeted by two spy operations of the NSA: * Under the codename "Bruneau", which refers to mission "Lifesaver", the NSA sucks out all the information stored in the embassy's computers and creates electronic images of
hard disk drive A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with mag ...
s. * Under the codename "Hemlock", which refers to mission "Highlands", the NSA gains access to the embassy's communications through physical "implants". Due to concerns that terrorist or criminal networks may be secretly communicating via computer games, the NSA, GCHQ, CIA, and FBI have been conducting surveillance and scooping up data from the networks of many online games, including
massively multiplayer online role-playing game A massively multiplayer online role-playing game (MMORPG) is a video game that combines aspects of a role-playing video game and a massively multiplayer online game. As in role-playing games (RPGs), the player assumes the role of a Player charac ...
s (MMORPGs) such as
World of Warcraft ''World of Warcraft'' (''WoW'') is a massively multiplayer online role-playing game (MMORPG) released in 2004 by Blizzard Entertainment. Set in the '' Warcraft'' fantasy universe, ''World of Warcraft'' takes place within the world of Azer ...
, as well as
virtual world A virtual world (also called a virtual space) is a computer-simulated environment which may be populated by many users who can create a personal avatar, and simultaneously and independently explore the virtual world, participate in its activities ...
s such as
Second Life ''Second Life'' is an online multimedia platform that allows people to create an avatar for themselves and then interact with other users and user created content within a multi player online virtual world. Developed and owned by the San Fr ...
, and the
Xbox Xbox is a video gaming brand created and owned by Microsoft. The brand consists of five video game consoles, as well as applications (games), streaming services, an online service by the name of Xbox network, and the development arm by the ...
gaming console. The NSA has cracked the most commonly used cellphone encryption technology,
A5/1 A5/1 is a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard. It is one of several implementations of the A5 security protocol. It was initially kept secret, but became public knowledge through l ...
. According to a classified document leaked by Snowden, the agency can "process encrypted A5/1" even when it has not acquired an encryption key. In addition, the NSA uses various types of cellphone infrastructure, such as the links between carrier networks, to determine the location of a cellphone user tracked by Visitor Location Registers. US district court judge for the District of Columbia, Richard Leon, declared on December 16, 2013, that the mass collection of metadata of Americans' telephone records by the National Security Agency probably violates the fourth amendment prohibition of unreasonable
searches and seizures Search and seizure is a procedure used in many civil law and common law legal systems by which police or other authorities and their agents, who, suspecting that a crime has been committed, commence a search of a person's property and confis ...
. Leon granted the request for a preliminary injunction that blocks the collection of phone data for two private plaintiffs (Larry Klayman, a conservative lawyer, and Charles Strange, father of a cryptologist killed in Afghanistan when his helicopter was shot down in 2011) and ordered the government to destroy any of their records that have been gathered. But the judge stayed action on his ruling pending a government appeal, recognizing in his 68-page opinion the "significant national security interests at stake in this case and the novelty of the constitutional issues." However federal judge William H. Pauley III in New York City ruled the U.S. government's global telephone data-gathering system is needed to thwart potential terrorist attacks, and that it can only work if everyone's calls are swept in. U.S. District Judge Pauley also ruled that Congress legally set up the program and that it does not violate anyone's constitutional rights. The judge also concluded that the telephone data being swept up by NSA did not belong to telephone users, but to the telephone companies. He further ruled that when NSA obtains such data from the telephone companies, and then probes into it to find links between callers and potential terrorists, this further use of the data was not even a search under the Fourth Amendment. He also concluded that the controlling precedent is ''
Smith v. Maryland ''Smith v. Maryland'', 442 U.S. 735 (1979), was a Supreme Court case holding that the installation and use of a pen register by the police to obtain information on a suspect's telephone calls was not a "search" within the meaning of the Fourth Ame ...
'': "Smith's bedrock holding is that an individual has no legitimate expectation of privacy in information provided to third parties," Judge Pauley wrote. The American Civil Liberties Union declared on January 2, 2012, that it will appeal Judge Pauley's ruling that NSA bulk the phone record collection is legal. "The government has a legitimate interest in tracking the associations of suspected terrorists, but tracking those associations does not require the government to subject every citizen to permanent surveillance," deputy ACLU legal director Jameel Jaffer said in a statement. In recent years, American and British intelligence agencies conducted surveillance on more than 1,100 targets, including the office of an Israeli prime minister, heads of international aid organizations, foreign energy companies and a European Union official involved in antitrust battles with American technology businesses. A catalog of high-tech gadgets and software developed by the NSA's Tailored Access Operations (TAO) was leaked by the German news magazine ''
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
''. Dating from 2008, the catalog revealed the existence of special gadgets modified to capture computer
screenshot screenshot (also known as screen capture or screen grab) is a digital image that shows the contents of a computer display. A screenshot is created by the operating system or software running on the device powering the display. Additionally, s ...
s and
USB flash drive Universal Serial Bus (USB) is an industry standard that establishes specifications for cables, connectors and protocols for connection, communication and power supply ( interfacing) between computers, peripherals and other computers. A bro ...
s secretly fitted with radio transmitters to broadcast stolen data over the airwaves, and fake base stations intended to intercept mobile phone signals, as well as many other secret devices and software implants listed here: File:NSA SPARROW II.jpg, SPARROW II – Mobile device that functions as a WLAN collection system File:NSA FIREWALK.jpg, FIREWALK – Hardware implant for collection of
Gigabit Ethernet In computer networking, Gigabit Ethernet (GbE or 1 GigE) is the term applied to transmitting Ethernet frames at a rate of a gigabit per second. The most popular variant, 1000BASE-T, is defined by the IEEE 802.3ab standard. It came into use ...
network traffic File:NSA GINSU.jpg, GINSU – Software that extends application persistence for the CNE (Computer Network Exploitation) implant KONGUR File:NSA IRATEMONK.jpg, IRATEMONK – Replaces
master boot record A master boot record (MBR) is a special type of boot sector at the very beginning of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond. The concept of MB ...
s (MBRs) of various hard disk manufacturers File:NSA SWAP.jpg, SWAP – Exploits
motherboard A motherboard (also called mainboard, main circuit board, mb, mboard, backplane board, base board, system board, logic board (only in Apple computers) or mobo) is the main printed circuit board (PCB) in general-purpose computers and other expand ...
BIOS In computing, BIOS (, ; Basic Input/Output System, also known as the System BIOS, ROM BIOS, BIOS ROM or PC BIOS) is firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the b ...
before the
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common daemon (computing), services for computer programs. Time-sharing operating systems scheduler (computing), schedule tasks for ef ...
loads File:NSA WISTFULTOLL.jpg, WISTFULTOLL – Software implant that exploits
Windows Management Instrumentation Windows Management Instrumentation (WMI) consists of a set of extensions to the Windows Driver Model that provides an operating system interface through which instrumented components provide information and notification. WMI is Microsoft's im ...
(WMI) to transfer data File:NSA HOWLERMONKEY.jpg, HOWLERMONKEY – Short to medium range
radio frequency Radio frequency (RF) is the oscillation rate of an alternating electric current or voltage or of a magnetic, electric or electromagnetic field or mechanical system in the frequency range from around to around . This is roughly between the up ...
(RF)
transceiver In radio communication, a transceiver is an electronic device which is a combination of a radio ''trans''mitter and a re''ceiver'', hence the name. It can both transmit and receive radio waves using an antenna, for communication purposes. Thes ...
File:NSA NIGHTSTAND.jpg, NIGHTSTAND – Mobile device that introduces NSA software to computers up to away via
Wireless LAN A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office buildi ...
File:NSA COTTONMOUTH-I.jpg, COTTONMOUTH-I –
USB flash drive Universal Serial Bus (USB) is an industry standard that establishes specifications for cables, connectors and protocols for connection, communication and power supply ( interfacing) between computers, peripherals and other computers. A bro ...
implant File:NSA COTTONMOUTH-II.jpg, COTTONMOUTH-II – USB implant File:NSA COTTONMOUTH-III.jpg, COTTONMOUTH-III – USB implant File:NSA JUNIORMINT.jpg, JUNIORMINT – Digital core packaged into a
printed circuit board A printed circuit board (PCB; also printed wiring board or PWB) is a medium used in electrical and electronic engineering to connect electronic components to one another in a controlled manner. It takes the form of a laminated sandwich str ...
(PCB) and a
flip chip Flip chip, also known as controlled collapse chip connection or its abbreviation, C4, is a method for interconnecting dies such as semiconductor devices, IC chips, integrated passive devices and microelectromechanical systems (MEMS), to extern ...
File:NSA MAESTRO-II.jpg, MAESTRO-II – Miniaturized digital core packaged into a
multi-chip module A multi-chip module (MCM) is generically an electronic assembly (such as a package with a number of conductor terminals or "pins") where multiple integrated circuits (ICs or "chips"), semiconductor dies and/or other discrete components are in ...
(MCM) File:NSA TRINITY.jpg, TRINITY – Miniaturized digital core packaged into a
multi-chip module A multi-chip module (MCM) is generically an electronic assembly (such as a package with a number of conductor terminals or "pins") where multiple integrated circuits (ICs or "chips"), semiconductor dies and/or other discrete components are in ...
(MCM) File:NSA SOMBERKNAVE.jpg, SOMBERKNAVE – Software implant for
Windows XP Windows XP is a major release of Microsoft's Windows NT operating system. It was release to manufacturing, released to manufacturing on August 24, 2001, and later to retail on October 25, 2001. It is a direct upgrade to its predecessors, Wind ...
that provides covert
Internet access Internet access is the ability of individuals and organizations to connect to the Internet using computer terminals, computers, and other devices; and to access services such as email and the World Wide Web. Internet access is sold by Interne ...
for the NSA's targets File:NSA SURLYSPAWN.jpg, SURLYSPAWN – Device for keystroke logging NSA RAGEMASTER.jpg, RAGEMASTER – Hardware implant concealed in a computer's
VGA Video Graphics Array (VGA) is a video display controller and accompanying de facto graphics standard, first introduced with the IBM PS/2 line of computers in 1987, which became ubiquitous in the PC industry within three years. The term can now ...
cable to capture screenshots and video
File:NSA IRONCHEF.jpg, IRONCHEF – Software implant that functions as a permanent
BIOS In computing, BIOS (, ; Basic Input/Output System, also known as the System BIOS, ROM BIOS, BIOS ROM or PC BIOS) is firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the b ...
system File:NSA DEITYBOUNCE.jpg, DEITYBOUNCE – Software implant for insertion into
Dell PowerEdge The PowerEdge (PE) line is Dell's server computer product line. Most PowerEdge servers use the x86 architecture. The early exceptions to this, the PowerEdge 3250, PowerEdge 7150, and PowerEdge 7250, used Intel's Itanium processor, but Dell ab ...
servers File:NSA JETPLOW.jpg, JETPLOW – Installs a backdoor targeting
Cisco PIX Cisco PIX (Private Internet eXchange) was a popular IP firewall and network address translation (NAT) appliance. It was one of the first products in this market segment. In 2005, Cisco introduced the neweCisco Adaptive Security Appliance( Cisco ...
and ASA firewalls File:NSA HALLUXWATER.jpg, HALLUXWATER – Installs a backdoor targeting
Huawei Huawei Technologies Co., Ltd. ( ; ) is a Chinese multinational technology corporation headquartered in Shenzhen, Guangdong, China. It designs, develops, produces and sells telecommunications equipment, consumer electronics and various sma ...
's Eudemon firewalls File:NSA FEEDTROUGH.jpg, FEEDTROUGH – Installs a backdoor targeting numerous
Juniper Networks Juniper Networks, Inc. is an American multinational corporation headquartered in Sunnyvale, California. The company develops and markets networking products, including routers, switches, network management software, network security product ...
firewalls File:NSA GOURMETTROUGH.jpg, GOURMETTROUGH – Installs a backdoor targeting numerous
Juniper Networks Juniper Networks, Inc. is an American multinational corporation headquartered in Sunnyvale, California. The company develops and markets networking products, including routers, switches, network management software, network security product ...
firewalls File:NSA SOUFFLETROUGH.jpg, SOUFFLETROUGH –
BIOS In computing, BIOS (, ; Basic Input/Output System, also known as the System BIOS, ROM BIOS, BIOS ROM or PC BIOS) is firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the b ...
implant for
Juniper Junipers are coniferous trees and shrubs in the genus ''Juniperus'' () of the cypress family Cupressaceae. Depending on the taxonomy, between 50 and 67 species of junipers are widely distributed throughout the Northern Hemisphere, from the Arc ...
SSG300 and SSG 500 series firewalls
File:NSA LOUDAUTO.jpg, LOUDAUTO – Covert listening device File:NSA NIGHTWATCH.jpg, NIGHTWATCH – Device for reconstruction of signals belonging to target systems File:NSA CTX4000.jpg, CTX4000 – Portable continuous-wave radar (CRW) unit to illuminate a target system for Dropmire collection File:NSA PHOTOANGLO.jpg, PHOTOANGLO – Successor to the CTX4000, jointly developed by the NSA and GCHQ File:NSA TAWDRYYARD.jpg, TAWDRYYARD – Device that functions as a
radio frequency Radio frequency (RF) is the oscillation rate of an alternating electric current or voltage or of a magnetic, electric or electromagnetic field or mechanical system in the frequency range from around to around . This is roughly between the up ...
(RF)
retroreflector A retroreflector (sometimes called a retroflector or cataphote) is a device or surface that reflects radiation (usually light) back to its source with minimum scattering. This works at a wide range of angle of incidence, unlike a planar mirro ...
File:NSA PICASSO.jpg, PICASSO – Modified
GSM The Global System for Mobile Communications (GSM) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation ( 2G) digital cellular networks used by mobile devices such ...
handset File:NSA GENESIS.jpg, GENESIS – Modified Motorola SLVR L9 handset File:NSA CROSSBEAM.jpg, CROSSBEAM –
GSM The Global System for Mobile Communications (GSM) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation ( 2G) digital cellular networks used by mobile devices such ...
module for commercial mobile phones File:NSA CANDYGRAM.jpg, CANDYGRAM – Mimics the
GSM The Global System for Mobile Communications (GSM) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation ( 2G) digital cellular networks used by mobile devices such ...
cell tower of targeted networks File:NSA DROPOUTJEEP.jpg, DROPOUTJEEP – Software implant for the iOS operating system of the iPhone File:NSA GOPHERSET.jpg, GOPHERSET – Software implant for
GSM The Global System for Mobile Communications (GSM) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation ( 2G) digital cellular networks used by mobile devices such ...
subscriber identity module (SIM) cards that pulls out address books, SMS (
Short Message Service Short Message/Messaging Service, commonly abbreviated as SMS, is a text messaging service component of most telephone, Internet and mobile device systems. It uses standardized communication protocols that let mobile devices exchange short tex ...
) text messages, and call log information File:NSA MONKEYCALENDAR.jpg, MONKEYCALENDAR – Software implant for GSM subscriber identity module (SIM) cards that pulls out geolocation information File:NSA TOTECHASER.jpg, TOTECHASER – Windows CE implant that targets the Thuraya handset File:NSA TOTEGHOSTLY.jpg, TOTEGHOSTLY 2.0 – Software implant for
Windows Mobile Windows Mobile is a discontinued family of mobile operating systems developed by Microsoft for smartphones and personal digital assistants. Its origin dated back to Windows CE in 1996, though Windows Mobile itself first appeared in 2000 as Pock ...
capable of retrieving SMS (
Short Message Service Short Message/Messaging Service, commonly abbreviated as SMS, is a text messaging service component of most telephone, Internet and mobile device systems. It uses standardized communication protocols that let mobile devices exchange short tex ...
) text messages,
Voicemail A voicemail system (also known as voice message or voice bank) is a computer-based system that allows users and subscribers to exchange personal voice messages; to select and deliver voice information; and to process transactions relating to ind ...
and contact lists, as well as turning on built-in microphones and cameras
The Tailored Access Operations (TAO) division of the NSA intercepted the shipping deliveries of computers and laptops in order to install spyware and physical implants on electronic gadgets. This was done in close cooperation with the FBI and the CIA. NSA officials responded to the Spiegel reports with a statement, which said: "Tailored Access Operations is a unique national asset that is on the front lines of enabling NSA to defend the nation and its allies. AO'swork is centred on computer network exploitation in support of foreign intelligence collection." In a separate disclosure unrelated to Snowden, the French
Trésor public The Trésor public ( en, Public treasury) is the national administration of the Treasury in France. It is headed by the general directorate of public finances (''Direction générale des finances publiques'') in the Ministry of the Economy, Finan ...
, which runs a
certificate authority In cryptography, a certificate authority or certification authority (CA) is an entity that stores, signs, and issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. Thi ...
, was found to have issued fake certificates impersonating
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
in order to facilitate spying on French government employees via
man-in-the-middle attack In cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle, monkey-in-the-middle, meddler-in-the-middle, manipulator-in-the-middle (MITM), person-in-the-middle (PITM) or adversary-in-the-middle (AiTM) ...
s.


2014


January

The NSA is working to build a powerful
quantum computer Quantum computing is a type of computation whose operations can harness the phenomena of quantum mechanics, such as superposition, interference, and entanglement. Devices that perform quantum computations are known as quantum computers. Thoug ...
capable of breaking all types of encryption. The effort is part of a US$79.7 million research program known as "Penetrating Hard Targets". It involves extensive research carried out in large, shielded rooms known as
Faraday cage A Faraday cage or Faraday shield is an enclosure used to block electromagnetic fields. A Faraday shield may be formed by a continuous covering of conductive material, or in the case of a Faraday cage, by a mesh of such materials. Faraday cages ...
s, which are designed to prevent
electromagnetic radiation In physics, electromagnetic radiation (EMR) consists of waves of the electromagnetic (EM) field, which propagate through space and carry momentum and electromagnetic radiant energy. It includes radio waves, microwaves, infrared, (visib ...
from entering or leaving. Currently, the NSA is close to producing basic building blocks that will allow the agency to gain "complete quantum control on two
semiconductor A semiconductor is a material which has an electrical conductivity value falling between that of a conductor, such as copper, and an insulator, such as glass. Its resistivity falls as its temperature rises; metals behave in the opposite way ...
qubits". Once a quantum computer is successfully built, it would enable the NSA to unlock the encryption that protects data held by banks, credit card companies, retailers, brokerages, governments and health care providers. According to ''The New York Times'', the NSA is monitoring approximately 100,000 computers worldwide with spy software named Quantum. Quantum enables the NSA to conduct surveillance on those computers on the one hand, and can also create a digital highway for launching cyberattacks on the other hand. Among the targets are the Chinese and Russian military, but also trade institutions within the European Union. The NYT also reported that the NSA can access and alter computers which are not connected with the internet by a secret technology in use by the NSA since 2008. The prerequisite is the physical insertion of the radio frequency hardware by a spy, a manufacturer or an unwitting user. The technology relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. The technology can also transmit malware back to the infected computer.
Channel 4 Channel 4 is a British free-to-air public broadcast television network operated by the state-owned Channel Four Television Corporation. It began its transmission on 2 November 1982 and was established to provide a fourth television service ...
and ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
'' revealed the existence of
Dishfire Dishfire (stylised DISHFIRE) is a covert global surveillance collection system and database run by the United States of America's National Security Agency (NSA) and the United Kingdom's Government Communications Headquarters (GCHQ) that collect ...
, a massive
database In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases ...
of the NSA that collects hundreds of millions of text messages on a daily basis. GCHQ has been given full access to the database, which it uses to obtain personal information of Britons by exploiting a legal loophole. Each day, the database receives and stores the following amounts of data: * Geolocation data of more than 76,000 text messages and other travel information * Over 110,000 names, gathered from electronic
business card Business cards are cards bearing business information about a company or individual. They are shared during formal introductions as a convenience and a memory aid. A business card typically includes the giver's name, company or business af ...
s * Over 800,000
financial transaction A financial transaction is an Contract, agreement, or communication, between a buyer and seller to exchange goods, Service (economics), services, or Asset, assets for payment. Any transaction involves a change in the status of the finances of two ...
s that are either gathered from text-to-text payments or by linking credit cards to phone users * Details of 1.6 million border crossings based on the interception of network
roaming Roaming is a wireless telecommunication term typically used with mobile devices, such as mobile phones. It refers to a mobile phone being used outside the range of its native network and connecting to another available cell network. Technical ...
alerts * Over 5 million
missed call A missed call is a telephone call that is deliberately terminated by the caller before being answered by its intended recipient, in order to communicate a pre-agreed message. It is a form of one-bit messaging. Missed calls are common in emerg ...
alerts * About 200 million text messages from around the world The database is supplemented with an analytical tool known as the Prefer program, which processes SMS messages to extract other types of information including contacts from
missed call A missed call is a telephone call that is deliberately terminated by the caller before being answered by its intended recipient, in order to communicate a pre-agreed message. It is a form of one-bit messaging. Missed calls are common in emerg ...
alerts. The Privacy and Civil Liberties Oversight Board report on mass surveillance was released on January 23, 2014. It recommends to end the bulk telephone metadata, i.e., bulk phone records – phone numbers dialed, call times and durations, but not call content collection – collection program, to create a "Special Advocate" to be involved in some cases before the FISA court judge and to release future and past FISC decisions "that involve novel interpretations of FISA or other significant questions of law, technology or compliance." According to a joint disclosure by ''The New York Times'', ''The Guardian'', and ProPublica, the NSA and GCHQ have begun working together to collect and store data from dozens of
smartphone A smartphone is a portable computer device that combines mobile telephone and computing functions into one unit. They are distinguished from feature phones by their stronger hardware capabilities and extensive mobile operating systems, whi ...
application software Application may refer to: Mathematics and computing * Application software, computer software designed to help the user to perform specific tasks ** Application layer, an abstraction layer that specifies protocols and interface methods used in a ...
by 2007 at the latest. A 2008 GCHQ report, leaked by Snowden asserts that "anyone using
Google Maps Google Maps is a web mapping platform and consumer application offered by Google. It offers satellite imagery, aerial photography, street maps, 360° interactive panoramic views of streets (Street View), real-time traffic conditions, and rou ...
on a smartphone is working in support of a GCHQ system". The NSA and GCHQ have traded recipes for various purposes such as grabbing location data and journey plans that are made when a target uses
Google Maps Google Maps is a web mapping platform and consumer application offered by Google. It offers satellite imagery, aerial photography, street maps, 360° interactive panoramic views of streets (Street View), real-time traffic conditions, and rou ...
, and vacuuming up address books, buddy lists, phone logs and geographic data embedded in photos posted on the mobile versions of numerous social networks such as Facebook,
Flickr Flickr ( ; ) is an American image hosting and video hosting service, as well as an online community, founded in Canada and headquartered in the United States. It was created by Ludicorp in 2004 and was a popular way for amateur and profession ...
,
LinkedIn LinkedIn () is an American business and employment-oriented online service that operates via websites and mobile apps. Launched on May 5, 2003, the platform is primarily used for professional networking and career development, and allows job se ...
, Twitter and other services. In a separate 20-page report dated 2012, GCHQ cited the popular smartphone game " Angry Birds" as an example of how an application could be used to extract user data. Taken together, such forms of data collection would allow the agencies to collect vital information about a user's life, including his or her home country, current location (through geolocation), age, gender, ZIP code, marital status, income,
ethnicity An ethnic group or an ethnicity is a grouping of people who identify with each other on the basis of shared attributes that distinguish them from other groups. Those attributes can include common sets of traditions, ancestry, language, history, ...
,
sexual orientation Sexual orientation is an enduring pattern of romantic or sexual attraction (or a combination of these) to persons of the opposite sex or gender, the same sex or gender, or to both sexes or more than one gender. These attractions are generall ...
, education level, number of children, etc. A GCHQ document dated August 2012 provided details of the
Squeaky Dolphin Squeaky Dolphin is a program developed by the Government Communications Headquarters (GCHQ), a British intelligence and security organization, to collect and analyze data from social media networks. The program was first revealed to the general ...
surveillance program, which enables GCHQ to conduct broad,
real-time Real-time or real time describes various operations in computing or other processes that must guarantee response times within a specified time (deadline), usually a relatively short time. A real-time process is generally one that happens in defined ...
monitoring of various
social media Social media are interactive media technologies that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks. While challenges to the definition of ''social me ...
features and social media traffic such as YouTube video views, the
Like button A like button, like option, or recommend button, is a feature in communication software such as social networking services, Internet forums, news websites and blogs where the user can express that they like, enjoy or support certain content. ...
on Facebook, and Blogspot/Blogger visits without the knowledge or consent of the companies providing those social media features. The agency's "Squeaky Dolphin" program can collect, analyze and utilize YouTube, Facebook and Blogger data in specific situations in real time for analysis purposes. The program also collects the addresses from the billions of videos watched daily as well as some user information for analysis purposes. During the
2009 United Nations Climate Change Conference The 2009 United Nations Climate Change Conference, commonly known as the Copenhagen Summit, was held at the Bella Center in Copenhagen, Denmark, between 7 and 18 December. The conference included the 15th session of the Conference of the Part ...
in Copenhagen, the NSA and its
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
partners monitored the communications of delegates of numerous countries. This was done to give their own policymakers a negotiating advantage. The
Communications Security Establishment Canada The Communications Security Establishment (CSE; french: Centre de la sécurité des télécommunications, ''CST''), formerly (from 2008-2014) called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national c ...
(CSEC) has been tracking Canadian air passengers via free
Wi-Fi Wi-Fi () is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio waves ...
services at a major Canadian airport. Passengers who exited the airport terminal continued to be tracked as they showed up at other
Wi-Fi Wi-Fi () is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio waves ...
locations across Canada. In a CSEC document dated May 2012, the agency described how it had gained access to two communications systems with over 300,000 users in order to pinpoint a specific imaginary target. The operation was executed on behalf of the NSA as a trial run to test a new technology capable of tracking down "any target that makes occasional forays into other cities/regions." This technology was subsequently shared with Canada's
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
partners – Australia, New Zealand, Britain, and the United States.


February

According to research by ''
Süddeutsche Zeitung The ''Süddeutsche Zeitung'' (; ), published in Munich, Bavaria, is one of the largest daily newspapers in Germany. The tone of SZ is mainly described as centre-left, liberal, social-liberal, progressive-liberal, and social-democrat. Hist ...
'' and TV network NDR the mobile phone of former German chancellor
Gerhard Schröder Gerhard Fritz Kurt "Gerd" Schröder (; born 7 April 1944) is a German lobbyist and former politician, who served as the chancellor of Germany from 1998 to 2005. From 1999 to 2004, he was also the Leader of the Social Democratic Party of Germa ...
was monitored from 2002 onwards, reportedly because of his government's opposition to military intervention in Iraq. The source of the latest information is a document leaked by Edward Snowden. The document, containing information about the National Sigint Requirement List (NSRL), had previously been interpreted as referring only to
Angela Merkel Angela Dorothea Merkel (; ; born 17 July 1954) is a German former politician and scientist who served as Chancellor of Germany from 2005 to 2021. A member of the Christian Democratic Union (CDU), she previously served as Leader of the Opp ...
's mobile. However ''Süddeutsche Zeitung'' and NDR claim to have confirmation from NSA insiders that the surveillance authorisation pertains not to the individual, but the political post – which in 2002 was still held by Schröder. According to research by the two media outlets, Schröder was placed as number 388 on the list, which contains the names of persons and institutions to be put under surveillance by the NSA. GCHQ launched a
cyber-attack A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricte ...
on the activist network "
Anonymous Anonymous may refer to: * Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown ** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author * Anony ...
", using
denial-of-service attack In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host conne ...
(DoS) to shut down a chatroom frequented by the network's members and to spy on them. The attack, dubbed Rolling Thunder, was conducted by a GCHQ unit known as the
Joint Threat Research Intelligence Group The Joint Threat Research Intelligence Group (JTRIG) is a unit of the Government Communications Headquarters (GCHQ), the British intelligence agency. The existence of JTRIG was revealed as part of the global surveillance disclosures in documents le ...
(JTRIG). The unit successfully uncovered the true identities of several Anonymous members. The NSA Section 215 bulk telephony metadata program which seeks to stockpile records on all calls made in the U.S. is collecting less than 30 percent of all Americans' call records because of an inability to keep pace with the explosion in cellphone use, according to ''The Washington Post''. The controversial program permits the NSA after a warrant granted by the secret Foreign Intelligence Surveillance Court to record numbers, length and location of every call from the participating carriers. ''
The Intercept ''The Intercept'' is an American left-wing news website founded by Glenn Greenwald, Jeremy Scahill, Laura Poitras and funded by billionaire eBay co-founder Pierre Omidyar. Its current editor is Betsy Reed. The publication initially report ...
'' reported that the U.S. government is using primarily NSA surveillance to target people for drone strikes overseas. In its report ''The Intercept'' author detail the flawed methods which are used to locate targets for lethal drone strikes, resulting in the deaths of innocent people. According to the Washington Post NSA analysts and collectors i.e. NSA personnel which controls electronic surveillance equipment use the NSA's sophisticated surveillance capabilities to track individual targets geographically and in real time, while drones and tactical units aimed their weaponry against those targets to take them out. An unnamed US law firm, reported to be Mayer Brown, was targeted by Australia's ASD. According to Snowden's documents, the ASD had offered to hand over these intercepted communications to the NSA. This allowed government authorities to be "able to continue to cover the talks, providing highly useful intelligence for interested US customers". NSA and GCHQ documents revealed that the anti-secrecy organization
WikiLeaks WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...
and other
activist group Activism (or Advocacy) consists of efforts to promote, impede, direct or intervene in social, political, economic or environmental reform with the desire to make changes in society toward a perceived greater good. Forms of activism range fro ...
s were targeted for government surveillance and criminal prosecution. In particular, the
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
es of visitors to WikiLeaks were collected in real time, and the US government urged its allies to file criminal charges against the founder of WikiLeaks,
Julian Assange Julian Paul Assange ( ; Hawkins; born 3 July 1971) is an Australian editor, publisher, and activist who founded WikiLeaks in 2006. WikiLeaks came to international attention in 2010 when it published a series of leaks provided by U.S. Army int ...
, due to his organization's publication of the Afghanistan war logs. The WikiLeaks organization was designated as a "malicious foreign actor". Quoting an unnamed NSA official in Germany, '' Bild am Sonntag'' reported that whilst President Obama's order to stop spying on Merkel was being obeyed, the focus had shifted to bugging other leading government and business figures including Interior Minister
Thomas de Maiziere Thomas may refer to: People * List of people with given name Thomas * Thomas (name) * Thomas (surname) * Saint Thomas (disambiguation) * Thomas Aquinas (1225–1274) Italian Dominican friar, philosopher, and Doctor of the Church * Thomas the A ...
, a close confidant of Merkel. Caitlin Hayden, a security adviser to President Obama, was quoted in the newspaper report as saying, "The US has made clear it gathers intelligence in exactly the same way as any other states." ''The Intercept'' reveals that government agencies are infiltrating online communities and engaging in "false flag operations" to discredit targets among them people who have nothing to do with terrorism or national security threats. The two main tactics that are currently used are the injection of all sorts of false material onto the internet in order to destroy the reputation of its targets; and the use of social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. The Guardian reported that Britain's surveillance agency GCHQ, with aid from the National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing. The surveillance program codenamed
Optic Nerve In neuroanatomy, the optic nerve, also known as the second cranial nerve, cranial nerve II, or simply CN II, is a paired cranial nerve that transmits visual information from the retina to the brain. In humans, the optic nerve is derived fro ...
collected still images of Yahoo webcam chats (one image every five minutes) in bulk and saved them to agency databases. The agency discovered "that a surprising number of people use webcam conversations to show intimate parts of their body to the other person", estimating that between 3% and 11% of the Yahoo webcam imagery harvested by GCHQ contains "undesirable nudity".


March

The NSA has built an infrastructure which enables it to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The NSA relies on an automated system codenamed
TURBINE A turbine ( or ) (from the Greek , ''tyrbē'', or Latin ''turbo'', meaning vortex) is a rotary mechanical device that extracts energy from a fluid flow and converts it into useful work. The work produced by a turbine can be used for generating ...
which in essence enables the automated management and control of a large network of implants (a form of remotely transmitted malware on selected individual computer devices or in bulk on tens of thousands of devices). As quoted by ''The Intercept'', TURBINE is designed to "allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually." The NSA has shared many of its files on the use of implants with its counterparts in the so-called Five Eyes surveillance alliance – the United Kingdom, Canada, New Zealand, and Australia. Among other things due to TURBINE and its control over the implants the NSA is capable of: * breaking into targeted computers and to siphoning out data from foreign Internet and phone networks * infecting a target's computer and exfiltrating files from a hard drive * covertly recording audio from a computer's microphone and taking snapshots with its webcam * launching cyberattacks by corrupting and disrupting file downloads or denying access to websites * exfiltrating data from removable flash drives that connect to an infected computer The TURBINE implants are linked to, and relies upon, a large network of clandestine surveillance "sensors" that the NSA has installed at locations across the world, including the agency's headquarters in Maryland and eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. Codenamed as TURMOIL, the sensors operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or "tips" to TURBINE, enabling the initiation of a malware attack. To identify surveillance targets, the NSA uses a series of data "selectors" as they flow across Internet cables. These selectors can include email addresses, IP addresses, or the unique "cookies" containing a username or other identifying information that are sent to a user's computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter, unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates. The CIA was accused by U.S. Senate Intelligence Committee Chairwoman Dianne Feinstein of spying on a stand-alone computer network established for the committee in its investigation of allegations of CIA abuse in a George W. Bush-era detention and interrogation program. A voice interception program codenamed MYSTIC began in 2009. Along with RETRO, short for "retrospective retrieval" (RETRO is voice audio recording buffer that allows retrieval of captured content up to 30 days into the past), the MYSTIC program is capable of recording "100 percent" of a foreign country's telephone calls, enabling the NSA to rewind and review conversations up to 30 days and the relating metadata. With the capability to store up to 30 days of recorded conversations MYSTIC enables the NSA to pull an instant history of the person's movements, associates and plans. On March 21, ''
Le Monde ''Le Monde'' (; ) is a French daily afternoon newspaper. It is the main publication of Le Monde Group and reported an average circulation of 323,039 copies per issue in 2009, about 40,000 of which were sold abroad. It has had its own website si ...
'' published slides from an internal presentation of the
Communications Security Establishment Canada The Communications Security Establishment (CSE; french: Centre de la sécurité des télécommunications, ''CST''), formerly (from 2008-2014) called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national c ...
, which attributed a piece of malicious software to French intelligence. The CSEC presentation concluded that the list of malware victims matched French intelligence priorities and found French cultural reference in the malware's code, including the name
Babar Babar ( ur, ), also variously spelled as Baber, Babur, and Babor is a male given name of Pashto, and Persian origin, and a popular male given name in Pakistan. It is generally taken in reference to the Persian ''babr'' (Persian: ببر), meanin ...
, a popular French children's character, and the developer name "Titi". The French telecommunications corporation Orange S.A. shares its call data with the French intelligence agency DGSE, which hands over the intercepted data to GCHQ. The NSA has spied on the Chinese technology company
Huawei Huawei Technologies Co., Ltd. ( ; ) is a Chinese multinational technology corporation headquartered in Shenzhen, Guangdong, China. It designs, develops, produces and sells telecommunications equipment, consumer electronics and various sma ...
. Huawei is a leading manufacturer of smartphones, tablets, mobile phone infrastructure, and WLAN routers and installs fiber optic cable. According to ''
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
'' this "kind of technology ��is decisive in the NSA's battle for data supremacy." The NSA, in an operation named "Shotgiant", was able to access Huawei's email archive and the source code for Huawei's communications products. The US government has had longstanding concerns that Huawei may not be independent of the
People's Liberation Army The People's Liberation Army (PLA) is the principal military force of the China, People's Republic of China and the armed wing of the Chinese Communist Party (CCP). The PLA consists of five Military branch, service branches: the People's ...
and that the Chinese government might use equipment manufactured by Huawei to conduct cyberespionage or cyberwarfare. The goals of the NSA operation were to assess the relationship between Huawei and the PLA, to learn more the Chinese government's plans and to use information from Huawei to spy on Huawei's customers, including Iran, Afghanistan, Pakistan, Kenya, and Cuba. Former Chinese President
Hu Jintao Hu Jintao (born 21 December 1942) is a Chinese politician who served as the 16–17th general secretary of the Chinese Communist Party (CCP) from 2002 to 2012, the 6th president of the People's Republic of China (PRC) from 2003 to 2013, and ...
, the Chinese Trade Ministry, banks, as well as telecommunications companies were also targeted by the NSA. ''The Intercept'' published a document of an NSA employee discussing how to build a database of IP addresses, webmail, and Facebook accounts associated with system administrators so that the NSA can gain access to the networks and systems they administer. At the end of March 2014, ''
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
'' and ''The Intercept'' published, based on a series of classified files from the archive provided to reporters by NSA whistleblower Edward Snowden, articles related to espionage efforts by GCHQ and NSA in Germany. The British GCHQ targeted three German internet firms for information about Internet traffic passing through internet exchange points, important customers of the German internet providers, their technology suppliers as well as future technical trends in their business sector and company employees. The NSA was granted by the
Foreign Intelligence Surveillance Court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants aga ...
the authority for blanket surveillance of Germany, its people and institutions, regardless whether those affected are suspected of having committed an offense or not, without an individualized court order specifying on March 7, 2013. In addition Germany's chancellor Angela Merkel was listed in a surveillance search machine and database named Nymrod along with 121 others foreign leaders. As ''The Intercept'' wrote: "The NSA uses the Nymrod system to 'find information relating to targets that would otherwise be tough to track down,' according to internal NSA documents. Nymrod sifts through secret reports based on intercepted communications as well as full transcripts of faxes, phone calls, and communications collected from computer systems. More than 300 'cites' for Merkel are listed as available in intelligence reports and transcripts for NSA operatives to read."


April

Towards the end of April, Edward Snowden said that the United States surveillance agencies spy on Americans more than anyone else in the world, contrary to anything that has been said by the government up until this point.


May

An article published by Ars Technica shows NSA's Tailored Access Operations (TAO) employees intercepting a Cisco router. ''The Intercept'' and
WikiLeaks WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...
revealed information about which countries were having their communications collected as part of the MYSTIC surveillance program. On May 19, ''The Intercept'' reported that the NSA is recording and archiving nearly every cell phone conversation in the Bahamas with a system called SOMALGET, a subprogram of MYSTIC. The mass surveillance has been occurring without the Bahamian government's permission. Aside from the Bahamas, ''The Intercept'' reported NSA interception of cell phone metadata in
Kenya ) , national_anthem = " Ee Mungu Nguvu Yetu"() , image_map = , map_caption = , image_map2 = , capital = Nairobi , coordinates = , largest_city = Nairobi , ...
, the
Philippines The Philippines (; fil, Pilipinas, links=no), officially the Republic of the Philippines ( fil, Republika ng Pilipinas, links=no), * bik, Republika kan Filipinas * ceb, Republika sa Pilipinas * cbk, República de Filipinas * hil, Republ ...
,
Mexico Mexico (Spanish language, Spanish: México), officially the United Mexican States, is a List of sovereign states, country in the southern portion of North America. It is borders of Mexico, bordered to the north by the United States; to the so ...
and a fifth country it did not name due to "credible concerns that doing so could lead to increased violence." WikiLeaks released a statement on May 23 claiming that
Afghanistan Afghanistan, officially the Islamic Emirate of Afghanistan,; prs, امارت اسلامی افغانستان is a landlocked country located at the crossroads of Central Asia and South Asia. Referred to as the Heart of Asia, it is borde ...
was the unnamed nation. In a statement responding to the revelations, the NSA said "the implication that NSA's foreign intelligence collection is arbitrary and unconstrained is false." Through its global surveillance operations the NSA exploits the flood of images included in emails, text messages, social media, videoconferences and other communications to harvest millions of images. These images are then used by the NSA in sophisticated facial recognition programs to track suspected terrorists and other intelligence targets.


June

Vodafone Vodafone Group plc () is a British multinational telecommunications company. Its registered office and global headquarters are in Newbury, Berkshire, England. It predominantly operates services in Asia, Africa, Europe, and Oceania. , Vod ...
revealed that there were secret wires that allowed government agencies direct access to their networks. This access does not require warrants and the direct access wire is often equipment in a locked room. In six countries where Vodafone operates, the law requires telecommunication companies to install such access or allows governments to do so. Vodafone did not name these countries in case some governments retaliated by imprisoning their staff.
Shami Chakrabarti Sharmishta "Shami" Chakrabarti, Baroness Chakrabarti, (born 16 June 1969) is a British politician, barrister, and human rights activist. A member of the Labour Party, she served as the director of Liberty, a major advocacy group which promote ...
of
Liberty Liberty is the ability to do as one pleases, or a right or immunity enjoyed by prescription or by grant (i.e. privilege). It is a synonym for the word freedom. In modern politics, liberty is understood as the state of being free within society fr ...
said "For governments to access phone calls at the flick of a switch is unprecedented and terrifying. Snowden revealed the internet was already treated as fair game. Bluster that all is well is wearing pretty thin – our analogue laws need a digital overhaul." Vodafone published its first Law Enforcement Disclosure Report on June 6, 2014. Vodafone group privacy officer Stephen Deadman said "These pipes exist, the direct access model exists. We are making a call to end direct access as a means of government agencies obtaining people's communication data. Without an official warrant, there is no external visibility. If we receive a demand we can push back against the agency. The fact that a government has to issue a piece of paper is an important constraint on how powers are used." Gus Hosein, director of
Privacy International Privacy International (PI) is a UK-based registered charity that defends and promotes the right to privacy across the world. First formed in 1990, registered as a non-profit company in 2002 and as a charity in 2012, PI is based in London. Its ...
said "I never thought the telcos would be so complicit. It's a brave step by Vodafone and hopefully the other telcos will become more brave with disclosure, but what we need is for them to be braver about fighting back against the illegal requests and the laws themselves." Above- top-secret documentation of a covert surveillance program named Overseas Processing Centre 1 (OPC-1) (codenamed "CIRCUIT") by GCHQ was published by ''
The Register ''The Register'' is a British technology news website co-founded in 1994 by Mike Magee, John Lettice and Ross Alderson. The online newspaper's masthead sublogo is "''Biting the hand that feeds IT''." Their primary focus is information tec ...
''. Based on documents leaked by Edward Snowden, GCHQ taps into undersea fiber optic cables via secret spy bases near the
Strait of Hormuz The Strait of Hormuz ( fa, تنگه هرمز ''Tangeh-ye Hormoz'' ar, مَضيق هُرمُز ''Maḍīq Hurmuz'') is a strait between the Persian Gulf and the Gulf of Oman. It provides the only sea passage from the Persian Gulf to the o ...
and Yemen. BT and
Vodafone Vodafone Group plc () is a British multinational telecommunications company. Its registered office and global headquarters are in Newbury, Berkshire, England. It predominantly operates services in Asia, Africa, Europe, and Oceania. , Vod ...
are implicated. The Danish newspaper ''Dagbladet Information'' and ''The Intercept'' revealed on June 19, 2014, the NSA mass surveillance program codenamed RAMPART-A. Under RAMPART-A, 'third party' countries tap into fiber optic cables carrying the majority of the world's electronic communications and are secretly allowing the NSA to install surveillance equipment on these fiber-optic cables. The foreign partners of the NSA turn massive amounts of data like the content of phone calls, faxes, e-mails, internet chats, data from virtual private networks, and calls made using Voice over IP software like Skype over to the NSA. In return these partners receive access to the NSA's sophisticated surveillance equipment so that they too can spy on the mass of data that flows in and out of their territory. Among the partners participating in the NSA mass surveillance program are Denmark and Germany.


July

During the week of July 4, a 31-year-old male employee of
Germany Germany,, officially the Federal Republic of Germany, is a country in Central Europe. It is the second most populous country in Europe after Russia, and the most populous member state of the European Union. Germany is situated betwee ...
's intelligence service BND was arrested on suspicion of spying for the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country Continental United States, primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., ...
. The employee is suspected of spying on the
German Parliamentary Committee investigating the NSA spying scandal The German Parliamentary Committee investigation of the NSA spying scandal (official title: ''1. Untersuchungsausschuss „NSA“'') was started on March 20, 2014, by the German Parliament in order to investigate the extent and background of for ...
. Former NSA official and whistleblower William Binney spoke at a
Centre for Investigative Journalism The Centre for Investigative Journalism (CIJ) is a British independent charity providing training to journalists, researchers, producers and students in the practice and methodology of investigative journalism. It was incorporated as a Company L ...
conference in London. According to Binney, "at least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores." He also stated that the majority of fiber optic cables run through the U.S., which "is no accident and allows the US to view all communication coming in." ''
The Washington Post ''The Washington Post'' (also known as the ''Post'' and, informally, ''WaPo'') is an American daily newspaper published in Washington, D.C. It is the most widely circulated newspaper within the Washington metropolitan area and has a large n ...
'' released a review of a cache provided by Snowden containing roughly 160,000 text messages and e-mails intercepted by the NSA between 2009 and 2012. The newspaper concluded that nine out of ten account holders whose conversations were recorded by the agency "were not the intended surveillance targets but were caught in a net the agency had cast for somebody else." In its analysis, ''The Post'' also noted that many of the account holders were Americans. On July 9, a soldier working within Germany's Federal Ministry of Defence (BMVg) fell under suspicion of spying for the United States. As a result of the July 4 case and this one, the German government expelled the CIA station chief in Germany on July 17. On July 18, former State Department official John Tye released an editorial in ''The Washington Post'', highlighting concerns over data collection under
Executive Order 12333 Executive Order 12333, signed on December 4, 1981 by U.S. President Ronald Reagan, was an Executive Order intended to extend powers and responsibilities of U.S. intelligence agencies and direct the leaders of U.S. federal agencies to co-opera ...
. Tye's concerns are rooted in classified material he had access to through the State Department, though he has not publicly released any classified materials.


August

''The Intercept'' reported that the NSA is "secretly providing data to nearly two dozen U.S. government agencies with a 'Google-like' search engine" called ICREACH. The database, ''The Intercept'' reported, is accessible to domestic law enforcement agencies including the FBI and the
Drug Enforcement Administration The Drug Enforcement Administration (DEA; ) is a United States federal law enforcement agency under the U.S. Department of Justice tasked with combating drug trafficking and distribution within the U.S. It is the lead agency for domestic en ...
and was built to contain more than 850 billion metadata records about phone calls, emails, cellphone locations, and text messages.


2015


February

Based on documents obtained from Snowden, ''The Intercept'' reported that the
NSA The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collec ...
and GCHQ had broken into the internal computer network of
Gemalto Gemalto was an international digital security company providing software applications, secure personal devices such as smart cards and tokens, and managed services. It was formed in June 2006 by the merger of two companies, Axalto and Gemplu ...
and stolen the encryption keys that are used in SIM cards no later than 2010. , the company is the world's largest manufacturer of SIM cards, making about two billion cards a year. With the keys, the intelligence agencies could eavesdrop on cell phones without the knowledge of mobile phone operators or foreign governments.


March

''
The New Zealand Herald ''The New Zealand Herald'' is a daily newspaper published in Auckland, New Zealand, owned by New Zealand Media and Entertainment, and considered a newspaper of record for New Zealand. It has the largest newspaper circulation of all newspape ...
'', in partnership with ''The Intercept'', revealed that the New Zealand government used XKeyscore to spy on candidates for the position of
World Trade Organization The World Trade Organization (WTO) is an intergovernmental organization that regulates and facilitates international trade. With effective cooperation in the United Nations System, governments use the organization to establish, revise, and ...
director general and also members of the
Solomon Islands Solomon Islands is an island country consisting of six major islands and over 900 smaller islands in Oceania, to the east of Papua New Guinea and north-west of Vanuatu. It has a land area of , and a population of approx. 700,000. Its capit ...
government.


April

In January 2015, the DEA revealed that it had been collecting metadata records for all telephone calls made by Americans to 116 countries linked to drug trafficking. The DEA's program was separate from the telephony metadata programs run by the NSA. In April, ''
USA Today ''USA Today'' (stylized in all uppercase) is an American daily middle-market newspaper and news broadcasting company. Founded by Al Neuharth on September 15, 1982, the newspaper operates from Gannett's corporate headquarters in Tysons, Virgini ...
'' reported that the DEA's data collection program began in 1992 and included all telephone calls between the United States and from Canada and Mexico. Current and former DEA officials described the program as the precursor of the NSA's similar programs. The DEA said its program was suspended in September 2013, after a review of the NSA's programs and that it was "ultimately terminated."


September

Snowden provided journalists at ''The Intercept'' with GCHQ documents regarding another secret program " Karma Police", calling itself "the world's biggest" data mining operation, formed to create profiles on every visible Internet user's browsing habits. By 2009 it had stored over 1.1 trillion web browsing sessions, and by 2012 was recording 50 billion sessions per day.


2016


January

*
NSA The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collec ...
documents show the US and UK spied on
Israel Israel (; he, יִשְׂרָאֵל, ; ar, إِسْرَائِيل, ), officially the State of Israel ( he, מְדִינַת יִשְׂרָאֵל, label=none, translit=Medīnat Yīsrāʾēl; ), is a country in Western Asia. It is situated ...
i military drones and fighter jets.


August

* A group called ''
The Shadow Brokers The Shadow Brokers (TSB) is a hacker group who first appeared in the summer of 2016. They published several leaks containing hacking tools, including several zero-day exploits, from the " Equation Group" who are widely suspected to be a branch of ...
'' says it infiltrated NSA's Equation Group and teases files including some named in documents leaked by
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
. Among the products affected by the leaked material was Cisco PIX and ASA VPN boxes.


2017

In March 2017,
WikiLeaks WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...
published more than 8,000 documents on the
CIA The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
. The confidential documents, codenamed Vault 7, dated from 2013 to 2016, included details on the CIA's hacking capabilities, such as the ability to compromise cars, smart TVs,
web browser A web browser is application software for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's screen. Browsers are used o ...
s (including
Google Chrome Google Chrome is a cross-platform web browser developed by Google. It was first released in 2008 for Microsoft Windows, built with free software components from Apple WebKit and Mozilla Firefox. Versions were later released for Linux, macOS, ...
, Microsoft Edge,
Firefox Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements current ...
, and
Opera Opera is a form of theatre in which music is a fundamental component and dramatic roles are taken by singers. Such a "work" (the literal translation of the Italian word "opera") is typically a collaboration between a composer and a libr ...
), and the operating systems of most
smartphone A smartphone is a portable computer device that combines mobile telephone and computing functions into one unit. They are distinguished from feature phones by their stronger hardware capabilities and extensive mobile operating systems, whi ...
s (including
Apple An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple trees are cultivated worldwide and are the most widely grown species in the genus '' Malus''. The tree originated in Central Asia, where its wild ancest ...
's iOS and
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
's Android), as well as other
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common daemon (computing), services for computer programs. Time-sharing operating systems scheduler (computing), schedule tasks for ef ...
s such as
Microsoft Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for ...
,
macOS macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac computers. Within the market of desktop and la ...
, and
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, whi ...
. WikiLeaks did not name the source, but said that the files had "circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive."


2018


2019


2020


2021

* In May 2021, it was reported that Danish Defence Intelligence Service collaborated with NSA to wiretap on fellow EU members and leaders, leading to wide backlash among EU countries and demands for explanation from Danish and American governments.


Reaction


Reactions of citizens

The disclosure provided impetus for the creation of
social movement A social movement is a loosely organized effort by a large group of people to achieve a particular goal, typically a social or political one. This may be to carry out a social change, or to resist or undo one. It is a type of group action and ma ...
s against mass surveillance, such as
Restore the Fourth Restore the Fourth is an American 501(c)(4) nonprofit organization that seeks to strengthen the Fourth Amendment to the United States Constitution, which prohibits unreasonable searches and seizures, and to eliminate programs that violate it. I ...
, and actions like Stop Watching Us and The Day We Fight Back. On the legal front, the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ...
joined a
coalition A coalition is a group formed when two or more people or groups temporarily work together to achieve a common goal. The term is most frequently used to denote a formation of power in political or economical spaces. Formation According to ''A Gui ...
of diverse groups filing suit against the NSA. Several human rights organizations have urged the
Obama administration Barack Obama's tenure as the 44th president of the United States began with his first inauguration on January 20, 2009, and ended on January 20, 2017. A Democrat from Illinois, Obama took office following a decisive victory over Republican ...
not to prosecute, but protect, "
whistleblower A whistleblower (also written as whistle-blower or whistle blower) is a person, often an employee, who reveals information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe or fraudulent. Whi ...
Snowden":
Amnesty International Amnesty International (also referred to as Amnesty or AI) is an international non-governmental organization focused on human rights, with its headquarters in the United Kingdom. The organization says it has more than ten million members and s ...
,
Human Rights Watch Human Rights Watch (HRW) is an international non-governmental organization, headquartered in New York City, that conducts research and advocacy on human rights. The group pressures governments, policy makers, companies, and individual human ...
,
Transparency International Transparency International e.V. (TI) is a German registered association founded in 1993 by former employees of the World Bank. Based in Berlin, its nonprofit and non-governmental purpose is to take action to combat global corruption with civil ...
, and the
Index on Censorship Index on Censorship is an organization campaigning for freedom of expression, which produces a quarterly magazine of the same name from London. It is directed by the non-profit-making Writers and Scholars International, Ltd (WSI) in association w ...
, among others. On the economic front, several consumer surveys registered a drop in online shopping and banking activity as a result of the Snowden revelations. However, it is argued long-term impact among the general population is negligible. Citizens seem to be quite upset if an intelligence agency had a “ dick pic program”, collecting pictures of private parts, yet “the general public has still failed to adopt privacy-enhancing tools en masse.”


Reactions of political leaders


United States

Domestically, President
Barack Obama Barack Hussein Obama II ( ; born August 4, 1961) is an American politician who served as the 44th president of the United States from 2009 to 2017. A member of the Democratic Party (United States), Democratic Party, Obama was the first Af ...
claimed that there is "no spying on Americans", and
White House The White House is the official residence and workplace of the president of the United States. It is located at 1600 Pennsylvania Avenue NW in Washington, D.C., and has been the residence of every U.S. president since John Adams in ...
Press Secretary
Jay Carney James Ferguson 'Jay' Carney (born May 22, 1965) is an American public relations officer, political advisor and journalist who has served as Amazon's Senior Vice President of Global Corporate Affairs from 2015 to 2022, and the United States Whi ...
asserted that the surveillance programs revealed by Snowden have been authorized by Congress. On the international front, U.S. Attorney General Eric Holder stated that "we cannot target even foreign persons overseas without a valid foreign intelligence purpose."


United Kingdom

Prime Minister
David Cameron David William Donald Cameron (born 9 October 1966) is a British former politician who served as Prime Minister of the United Kingdom from 2010 to 2016 and Leader of the Conservative Party from 2005 to 2016. He previously served as Leader o ...
warned journalists that "if they don't demonstrate some social responsibility it will be very difficult for government to stand back and not to act."
Deputy Prime Minister A deputy prime minister or vice prime minister is, in some countries, a government minister who can take the position of acting prime minister when the prime minister is temporarily absent. The position is often likened to that of a vice president, ...
Nick Clegg Sir Nicholas William Peter Clegg (born 7 January 1967) is a British media executive and former Deputy Prime Minister of the United Kingdom who has been president for global affairs at Meta Platforms since 2022, having previously been vicep ...
emphasized that the media should "absolutely defend the principle of secrecy for the intelligence agencies". Foreign Secretary William Hague claimed that "we take great care to balance individual privacy with our duty to safeguard the public and UK national security." Hague defended the
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
alliance and reiterated that the British-U.S. intelligence relationship must not be endangered because it "saved many lives".


Australia

Former Prime Minister Tony Abbott stated that "every Australian governmental agency, every Australian official at home and abroad, operates in accordance with the law". Abbott criticized the
Australian Broadcasting Corporation The Australian Broadcasting Corporation (ABC) is the national broadcaster of Australia. It is principally funded by direct grants from the Australian Government and is administered by a government-appointed board. The ABC is a publicly-owne ...
for being unpatriotic due to its reporting on the documents provided by Snowden, whom Abbott described as a "traitor". Foreign Minister
Julie Bishop Julie Isabel Bishop (born 17 July 1956) is an Australian former politician who served as Minister for Foreign Affairs from 2013 to 2018 and deputy leader of the Liberal Party from 2007 to 2018. She was the Member of Parliament (MP) for Curti ...
also denounced Snowden as a traitor and accused him of "unprecedented" treachery. Bishop defended the
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
alliance and reiterated that the Australian–U.S. intelligence relationship must not be endangered because it "saves lives".


Germany

In July 2013, Chancellor
Angela Merkel Angela Dorothea Merkel (; ; born 17 July 1954) is a German former politician and scientist who served as Chancellor of Germany from 2005 to 2021. A member of the Christian Democratic Union (CDU), she previously served as Leader of the Opp ...
defended the surveillance practices of the NSA, and described the United States as "our truest ally throughout the decades". After the NSA's surveillance on Merkel was revealed, however, the Chancellor compared the NSA with the
Stasi The Ministry for State Security, commonly known as the (),An abbreviation of . was the state security service of the East Germany from 1950 to 1990. The Stasi's function was similar to the KGB, serving as a means of maintaining state autho ...
. According to ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
'',
Berlin Berlin ( , ) is the capital and largest city of Germany by both area and population. Its 3.7 million inhabitants make it the European Union's most populous city, according to population within city limits. One of Germany's sixteen constitu ...
is using the controversy over NSA spying as leverage to enter the exclusive
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
alliance. Interior Minister
Hans-Peter Friedrich Hans-Peter Friedrich (born 10 March 1957) is a German politician of the Christian Social Union of Bavaria, Christian Social Union (CSU) who has been serving as a member of the German Bundestag since 1998 German federal election, 1998. Under th ...
stated that "the Americans take our data privacy concerns seriously." Testifying before the
German Parliament The Bundestag (, "Federal Diet") is the German federal parliament. It is the only federal representative body that is directly elected by the German people. It is comparable to the United States House of Representatives or the House of Commons ...
, Friedrich defended the NSA's surveillance, and cited five terrorist plots on German soil that were prevented because of the NSA. However, in April 2014, another German interior minister criticized the United States for failing to provide sufficient assurances to Germany that it had reined in its spying tactics.
Thomas de Maiziere Thomas may refer to: People * List of people with given name Thomas * Thomas (name) * Thomas (surname) * Saint Thomas (disambiguation) * Thomas Aquinas (1225–1274) Italian Dominican friar, philosopher, and Doctor of the Church * Thomas the A ...
, a close ally of Merkel, told ''
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
'': "U.S. intelligence methods may be justified to a large extent by security needs, but the tactics are excessive and over-the-top."


Sweden

Minister for Foreign Affairs Carl Bildt, defended the
FRA A friar is a member of one of the mendicant orders founded in the twelfth or thirteenth century; the term distinguishes the mendicants' itinerant apostolic character, exercised broadly under the jurisdiction of a superior general, from the o ...
and described its surveillance practices as a "national necessity".
Minister for Defence {{unsourced, date=February 2021 A ministry of defence or defense (see spelling differences), also known as a department of defence or defense, is an often-used name for the part of a government responsible for matters of defence, found in states ...
Karin Enström said that Sweden's intelligence exchange with other countries is "critical for our security" and that "intelligence operations occur within a framework with clear legislation, strict controls and under parliamentary oversight."


Netherlands

Interior Minister
Ronald Plasterk Ronald Hans Anton Plasterk (; born 12 April 1957) is a Dutch scientist, entrepreneur and retired politician of the Labour Party (PvdA). He has earned a PhD degree in biology, specialised in molecular genetics. Being a former Minister of the Du ...
apologized for incorrectly claiming that the NSA had collected 1.8 million records of metadata in the Netherlands. Plasterk acknowledged that it was in fact Dutch intelligence services who collected the records and transferred them to the NSA.


Denmark

The Danish Prime Minister
Helle Thorning-Schmidt Helle Thorning-Schmidt (; born 14 December 1966) is a Danish retired politician who served as the 26th Prime Minister of Denmark from 2011 to 2015, and Leader of the Social Democrats from 2005 to 2015. She is the first woman to have held each ...
has praised the American intelligence agencies, claiming they have prevented terrorist attacks in Denmark, and expressed her personal belief that the Danish people "should be grateful" for the Americans' surveillance. She has later claimed that the Danish authorities have no basis for assuming that American intelligence agencies have performed illegal spying activities towards Denmark or Danish interests.


Review of intelligence agencies

;Germany In July 2013, the German government announced an extensive review of Germany's intelligence services. ;United States In August 2013, the U.S. government announced an extensive review of U.S. intelligence services. ;United Kingdom In October 2013, the British government announced an extensive review of British intelligence services. ;Canada In December 2013, the Canadian government announced an extensive review of Canada's intelligence services.


Criticism and alternative views

In January 2014, U.S. President
Barack Obama Barack Hussein Obama II ( ; born August 4, 1961) is an American politician who served as the 44th president of the United States from 2009 to 2017. A member of the Democratic Party (United States), Democratic Party, Obama was the first Af ...
said that "the sensational way in which these disclosures have come out has often shed more heat than light" and critics such as Sean Wilentz claimed that "the NSA has acted far more responsibly than the claims made by the leakers and publicized by the press." In Wilentz' view "The leakers have gone far beyond justifiably blowing the whistle on abusive programs. In addition to their alarmism about .S.domestic surveillance, many of the Snowden documents released thus far have had nothing whatsoever to do with domestic surveillance." Edward Lucas, former Moscow bureau chief for ''
The Economist ''The Economist'' is a British weekly newspaper printed in demitab format and published digitally. It focuses on current affairs, international business, politics, technology, and culture. Based in London, the newspaper is owned by The Eco ...
'', agreed, asserting that "Snowden's revelations neatly and suspiciously fits the interests of one country: Russia" and citing
Masha Gessen Masha Gessen (born 13 January 1967) is a Russian-American journalist, author, translator and activist who has been an outspoken critic of the president of Russia, Vladimir Putin, and the former president of the United States, Donald Trump. Ge ...
's statement that "The Russian propaganda machine has not gotten this much mileage out of a US citizen since Angela Davis's murder trial in 1971." Bob Cesca objected to ''
The New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
'' failing to redact the name of an NSA employee and the specific location where an
al Qaeda Al-Qaeda (; , ) is an Islamic extremism, Islamic extremist organization composed of Salafist jihadists. Its members are mostly composed of Arab, Arabs, but also include other peoples. Al-Qaeda has mounted attacks on civilian and military ta ...
group was being targeted in a series of slides the paper made publicly available. Russian journalist
Andrei Soldatov Andrei Alekseyevich Soldatov (russian: Андрей Алексеевич Солдатов, born 4 October 1975 in Moscow, Russia) is a Russian investigative journalist and Russian security services expert. Together with fellow journalist Irina ...
argued that Snowden's revelations had had negative consequences for internet freedom in Russia, as Russian authorities increased their own surveillance and regulation on the pretext of protecting the privacy of Russian users. Snowden's name was invoked by Russian legislators who supported measures forcing platforms such as
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
, Facebook, Twitter and Gmail and YouTube to locate their servers on Russian soil or install SORM black boxes on their servers so that Russian authorities could control them. Soldatov also contended that as a result of the disclosures, international support for having national governments take over the powers of the organizations involved in coordinating the Internet's global architectures had grown, which could lead to a Balkanization of the Internet that restricted free access to information. The Montevideo Statement on the Future of Internet Cooperation issued in October 2013, by ICANN and other organizations warned against "Internet fragmentation at a national level" and expressed "strong concern over the undermining of the trust and confidence of Internet users globally due to recent revelations". In late 2014, Freedom House said "[s]ome states are using the revelations of widespread surveillance by the U.S. National Security Agency (NSA) as an excuse to augment their own monitoring capabilities, frequently with little or no oversight, and often aimed at the political opposition and human rights activists."Tightening the Net: Governments Expand Online Controls
''Freedom House'' Freedom on the Net 2014


Gallery


Comparison with other leaks


See also

* Global surveillance whistleblowers * Communications Assistance for Law Enforcement Act * Harris Corporation * PositiveID


References


External links

* ;Collections *
Global Surveillance
. An annotated and categorized "overview of the revelations following the leaks by the whistleblower Edward Snowden. There are also some links to comments and followups". By Oslo University Library. *
NSA Spying Scandal
''
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
''
Six months of revelations on NSA by the Washington Post's Kennedy Elliott and Terri Rupar on December 23, 2013
* A collection of documents relating to surveillance. ** Part 2 of the above. ** Part 3 of the above. * Documents relating to the surveillance against
Dilma Rousseff Dilma Vana Rousseff (; born 14 December 1947) is a Brazilian economist and politician who served as the 36th president of Brazil, holding the position from 2011 until her impeachment and removal from office on 31 August 2016. She is the first ...
and
Enrique Peña Nieto Enrique Peña Nieto (; born 20 July 1966), commonly referred to by his initials EPN, is a Mexican politician who served as the 64th president of Mexico from 1 December 2012 to 30 November 2018. A member of the Institutional Revolutionary Party ...

The NSA Archive by the American Civil Liberties Union (ACLU)
– All documents released since June 5, 2013—both by the media and the U.S. government—are housed in this database established and operated by the ACLU. *
ACLU article "Introducing the ACLU's NSA Documents Database" by the ACLU's Emily Weinrebe on April 3, 2014
on the above NSA Archive established and operated by the American Civil Liberties Union (ACLU).
NSA Primary Sources
– A List of all leaks and links to media articles related to the disclosures based on the material of Edward Snowden sorted by Date, Document and Media outlet established and operated by the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ...
.
Snowden disclosures
at the Internet Archive. {{DEFAULTSORT:Global surveillance disclosures (2013-present) Global surveillance 2010s in politics 2010s in international relations News leaks Edward Snowden 2010s scandals Articles containing video clips Cover-ups Surveillance scandals Works about security and surveillance