The practice of mass surveillance in the United States dates back to
wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the
First
First or 1st is the ordinal form of the number one (#1).
First or 1st may also refer to:
*World record, specifically the first instance of a particular achievement
Arts and media Music
* 1$T, American rapper, singer-songwriter, DJ, and reco ...
and
Second World Wars
World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the vast majority of the world's countries—including all of the great powers—forming two opposing ...
, mass surveillance continued throughout the
Cold War period, via programs such as the
Black Chamber and
Project SHAMROCK. The formation and growth of federal
law-enforcement and
intelligence agencies
An intelligence agency is a government agency responsible for the collection, analysis, and exploitation of information in support of law enforcement, national security, military, public safety, and foreign policy objectives.
Means of informati ...
such as the
FBI,
CIA
The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
, and
NSA institutionalized surveillance used to also silence political dissent, as evidenced by
COINTELPRO
COINTELPRO ( syllabic abbreviation derived from Counter Intelligence Program; 1956–1971) was a series of covert and illegal projects actively conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrati ...
projects which targeted various organizations and individuals. During the
Civil Rights Movement
The civil rights movement was a nonviolent social and political movement and campaign from 1954 to 1968 in the United States to abolish legalized institutional Racial segregation in the United States, racial segregation, Racial discrimination ...
era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the
communist
Communism (from Latin la, communis, lit=common, universal, label=none) is a far-left sociopolitical, philosophical, and economic ideology and current within the socialist movement whose goal is the establishment of a communist society, a ...
model of the United States' rival at the time, the
Soviet Union
The Soviet Union,. officially the Union of Soviet Socialist Republics. (USSR),. was a List of former transcontinental countries#Since 1700, transcontinental country that spanned much of Eurasia from 1922 to 1991. A flagship communist state, ...
. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.
The formation of the international UKUSA surveillance agreement of 1946 evolved into the
ECHELON
ECHELON, originally a secret government code name, is a surveillance program ( signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:Given the 5 dialects that ...
collaboration by 1955 of five English-speaking nations, also known as the
Five Eyes
The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in si ...
, and focused on interception of electronic communications, with substantial increases in domestic surveillance capabilities.
Following the
September 11th attacks
The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commerci ...
of 2001, domestic and international mass surveillance capabilities grew immensely. Contemporary mass surveillance relies upon annual presidential executive orders declaring a continued State of National Emergency, first signed by George W. Bush on September 14, 2001 and then continued on an annual basis by President Barack Obama. Mass surveillance is also based on several subsequent national security Acts including the
USA PATRIOT Act
The USA PATRIOT Act (commonly known as the Patriot Act) was a landmark Act of the United States Congress, signed into law by President George W. Bush. The formal name of the statute is the Uniting and Strengthening America by Providing Appro ...
and
FISA
The Foreign Intelligence Surveillance Act of 1978 ("FISA" , ) is a United States federal law that establishes procedures for the physical and electronic surveillance and the collection of "foreign intelligence information" between "foreign pow ...
Amendment Act's
PRISM
Prism usually refers to:
* Prism (optics), a transparent optical component with flat surfaces that refract light
* Prism (geometry), a kind of polyhedron
Prism may also refer to:
Science and mathematics
* Prism (geology), a type of sedimentary ...
surveillance program. Critics and political dissenters currently describe the effects of these acts, orders, and resulting database network of
fusion center
In the United States, fusion centers are designed to promote information sharing at the federal level between agencies such as the Federal Bureau of Investigation, the U.S. Department of Homeland Security, the U.S. Department of Justice, and ...
s as forming a veritable American police state that simply institutionalized the illegal
COINTELPRO
COINTELPRO ( syllabic abbreviation derived from Counter Intelligence Program; 1956–1971) was a series of covert and illegal projects actively conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrati ...
tactics used to assassinate dissenters and leaders from the 1950s onwards.
Additional surveillance agencies, such as the DHS and the position of Director of National Intelligence, have exponentially escalated mass surveillance since 2001. A series of
media reports in 2013 revealed more recent programs and techniques employed by the
US intelligence community.
Advances in computer and information technology allow the creation of huge
national databases that facilitate mass surveillance in the United States
by
DHS managed fusion centers, the CIA's Terrorist Threat Integration Center (TTIC) program, and the FBI's
Terrorist Screening Database
The Terrorist Screening Database (TSDB) is the central terrorist watchlist consolidated by the Federal Bureau of Investigation's Terrorist Screening Center and used by multiple agencies to compile their specific watchlists and for screening. The li ...
(TSDB).
Mass surveillance databases are also cited as responsible for profiling Latino Americans and contributing to "
self-deportation Self-deportation is an approach to dealing with illegal immigration, used in the United States and the United Kingdom, that allows an otherwise inadmissible person to voluntarily depart a country for which they have no legal ties to rather than fa ...
" techniques, or physical deportations by way of the DHS's ICEGang national database.
After
World War I
World War I (28 July 1914 11 November 1918), often abbreviated as WWI, was List of wars and anthropogenic disasters by death toll, one of the deadliest global conflicts in history. Belligerents included much of Europe, the Russian Empire, ...
, the US Army and State Department established the
Black Chamber, also known as the Cipher Bureau, which began operations in 1919. The Black Chamber was headed by
Herbert O. Yardley, who had been a leader in the Army's Military Intelligence program. Regarded as a precursor to the National Security Agency, it conducted peacetime decryption of material including diplomatic communications until 1929.
In the advent of
World War II
World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the World War II by country, vast majority of the world's countries—including all of the great power ...
, the
Office of Censorship
The Office of Censorship was an emergency wartime agency set up by the United States federal government on December 19, 1941 to aid in the censorship of all communications coming into and going out of the United States, including its territories ...
was established. The wartime agency monitored "communications by mail, cable, radio, or other means of transmission passing between the United States and any foreign country".
["Return to Sender: U.S. Censorship of Enemy Alien Mail in World War II"](_blank)
Louis Fiset, ''Prologue Magazine'', Vol. 33, No. 1 (Spring 2001). Retrieved 5 October 2013. This included the 350,000 overseas cables and telegrams and 25,000 international telephone calls made each week.
"Every letter that crossed international or U.S. territorial borders from December 1941 to August 1945 was subject to being opened and scoured for details."
With the end of
World War II
World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the World War II by country, vast majority of the world's countries—including all of the great power ...
,
Project SHAMROCK was established in 1945. The organization was created to accumulate telegraphic data entering and exiting from the United States.
Major communication companies such as
Western Union
The Western Union Company is an American multinational financial services company, headquartered in Denver, Colorado.
Founded in 1851 as the New York and Mississippi Valley Printing Telegraph Company in Rochester, New York, the company ch ...
,
RCA Global and
ITT World Communications actively aided the project, allowing American intelligence officials to gain access to international message traffic.
Under the project, and many subsequent programs, no precedent had been established for judicial authorization, and no warrants were issued for surveillance activities. The project was terminated in 1975.
President
Harry S. Truman established the
National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
(
NSA) in 1952 for the purposes of collecting, processing, and monitoring intelligence data. The existence of NSA was not known to people as the memorandum by President Truman was classified.
When the
Citizens' Commission to Investigate the FBI published stolen FBI documents revealing abuse of intelligence programs in 1971, Senator
Frank Church
Frank Forrester Church III (July 25, 1924 – April 7, 1984) was an American politician and lawyer. A member of the Democratic Party, he served as a United States senator from Idaho from 1957 until his defeat in 1981. As of 2022, he is the longe ...
began an investigation into the programs that become known as the
Church Committee
The Church Committee (formally the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities) was a US Senate select committee in 1975 that investigated abuses by the Central Intelligence ...
. The committee sought to investigate intelligence abuses throughout the 1970s. Following a report provided by the committee outlining egregious abuse, in 1976 Congress established the
Senate Select Committee on Intelligence. It would later be joined by the
Foreign Intelligence Surveillance Court
The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants ag ...
in 1978.
The institutions worked to limit the power of the agencies, ensuring that surveillance activities remained within the rule of law.
Following the attacks of
September 11, 2001
The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commercia ...
,
Congress
A congress is a formal meeting of the representatives of different countries, constituent states, organizations, trade unions, political parties, or other groups. The term originated in Late Middle English to denote an encounter (meeting of ...
passed The
Patriot Act
The USA PATRIOT Act (commonly known as the Patriot Act) was a landmark Act of the United States Congress, signed into law by President George W. Bush. The formal name of the statute is the Uniting and Strengthening America by Providing Appro ...
to strengthen security and intelligence efforts. The act granted the President broad powers on the
war against terror
The war on terror, officially the Global War on Terrorism (GWOT), is an ongoing international counterterrorism military campaign initiated by the United States following the September 11 attacks. The main targets of the campaign are militant I ...
, including the power to bypass the FISA Court for surveillance orders in cases of national security. Additionally, mass surveillance activities were conducted alongside various other surveillance programs under the head of
President's Surveillance Program
The President's Surveillance Program (PSP) is a collection of secret intelligence activities authorized by the President of the United States George W. Bush after the September 11 attacks in 2001 as part of the War on Terrorism. Informatio ...
. Under pressure from the public, the warrantless wiretapping program was allegedly ended in January 2007.
Many details about the surveillance activities conducted in the United States were revealed in the disclosure by
Edward Snowden
Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and s ...
in June 2013.
Regarded as one of the biggest media leaks in the United States, it presented extensive details about the surveillance programs of the NSA, that involved interception of Internet data and telephonic calls from over a billion users, across various countries.
National Security Agency (NSA)
1947: The National Security Act was signed by President Truman, establishing a National Security Council.
1949: The Armed Forces Security Agency was established to coordinate signal operations between military branches.
1952: The
National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
(NSA) was officially established by President Truman by way of a National Security Council Intelligence Directive 9, dated Oct. 24, while the NSA officially came into existence days later on Nov. 4.
According to ''
The New York Times
''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
'', the NSA was created in "absolute secrecy" by President Truman, whose surveillance-minded administration ordered, only six weeks after President Truman took office,
wiretaps on the telephones of
Thomas Gardiner Corcoran, a close advisor of
Franklin D. Roosevelt
Franklin Delano Roosevelt (; ; January 30, 1882April 12, 1945), often referred to by his initials FDR, was an American politician and attorney who served as the 32nd president of the United States from 1933 until his death in 1945. As the ...
. The recorded conversations are currently kept at the
Harry S. Truman Presidential Library and Museum, along with other documents considered sensitive
≈233,600 pages.
Federal Bureau of Investigation (FBI)
Institutional domestic surveillance was founded in 1896 with the National Bureau of Criminal Identification, which evolved by 1908 into the Bureau of Investigation, operated under the authority of the Department of Justice. In 1935, the FBI had grown into an independent agency under the direction of J. Edgar Hoover whose staff, through the use of wire taps, cable taps, mail tampering, garbage filtering and infiltrators, prepared secret
FBI Index Lists on more than 10 million people by 1939.
Purported to be chasing 'communists' and other alleged subversives, the FBI used public and private pressure to destroy the lives of those it targeted during
McCarthyism
McCarthyism is the practice of making false or unfounded accusations of subversion and treason, especially when related to anarchism, communism
Communism (from Latin la, communis, lit=common, universal, label=none) is a far-left so ...
, including those lives of the Hollywood 10 with the
Hollywood blacklist
The Hollywood blacklist was an entertainment industry Blacklisting, blacklist, broader than just Hollywood, put in effect in the mid-20th century in the United States during the early years of the Cold War. The blacklist involved the practice of ...
. The FBI's surveillance and investigation roles expanded in the 1950s while using the collected information to facilitate political assassinations, including the murders of
Fred Hampton
Fredrick Allen Hampton Sr. (August 30, 1948 – December 4, 1969) was an American activist. He came to prominence in Chicago as deputy chairman of the national Black Panther Party and chair of the Illinois chapter. As a progressive African Ameri ...
and Mark Clark in 1969. FBI is also directly connected to the bombings, assassinations, and deaths of other people including Malcolm X in 1963, Viola Liuzzo in 1965, Dr. Martin Luther King Jr. in 1968, Anna Mae Pictou Aquash in 1976, and Judi Bari in 1990.
As the extent of the FBI's domestic surveillance continued to grow, many celebrities were also secretly investigated by the bureau, including:
* First Lady
Eleanor Roosevelt
Anna Eleanor Roosevelt () (October 11, 1884November 7, 1962) was an American political figure, diplomat, and activist. She was the first lady of the United States from 1933 to 1945, during her husband President Franklin D. Roosevelt's four ...
– A vocal critic of Hoover who likened the FBI to an 'American Gestapo' for its Index lists. Roosevelt also spoke out against anti-Japanese prejudice during the second world war, and was later a delegate to the United Nations and instrumental in creating the
Universal Declaration of Human Rights
The Universal Declaration of Human Rights (UDHR) is an international document adopted by the United Nations General Assembly that enshrines the rights and freedoms of all human beings. Drafted by a UN committee chaired by Eleanor Roosevelt, ...
. Th
3,000-pageFBI dossier on Eleanor Roosevelt reveals Hoover's close monitoring of her activities and writings, and contains retaliatory charges against her for suspected Communist activities.
*
Frank Sinatra – Hi
1,300 pageFBI dossier, dating from 1943, contains allegations about Sinatra's possible ties to the
American Communist Party
The Communist Party USA, officially the Communist Party of the United States of America (CPUSA), is a communist party in the United States which was established in 1919 after a split in the Socialist Party of America following the Russian Revo ...
. The FBI spent several decades tracking Sinatra and his associates.
*
Marilyn Monroe
Marilyn Monroe (; born Norma Jeane Mortenson; 1 June 1926 4 August 1962) was an American actress. Famous for playing comedic " blonde bombshell" characters, she became one of the most popular sex symbols of the 1950s and early 1960s, as wel ...
– Her FBI dossier begins in 1955 and continues up until the months before her death. It focuses mostly on her travels and associations, searching for signs of leftist views and possible ties to
communism
Communism (from Latin la, communis, lit=common, universal, label=none) is a far-left sociopolitical, philosophical, and economic ideology and current within the socialist movement whose goal is the establishment of a communist society ...
.
Her ex-husband,
Arthur Miller
Arthur Asher Miller (October 17, 1915 – February 10, 2005) was an American playwright, essayist and screenwriter in the 20th-century American theater. Among his most popular plays are ''All My Sons'' (1947), ''Death of a Salesman'' (19 ...
, was also monitored. Monroe's FBI dossier is "heavily censored", but
"reprocessed" versionhas been released by the FBI to the public.
*
John Lennon
John Winston Ono Lennon (born John Winston Lennon; 9 October 19408 December 1980) was an English singer, songwriter, musician and peace activist who achieved worldwide fame as founder, co-songwriter, co-lead vocalist and rhythm guitarist of ...
– In 1971, shortly after Lennon arrived in the
United States
The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., federal district, five ma ...
on a visa to meet up with
anti-war activists
An anti-war movement (also ''antiwar'') is a social movement, usually in opposition to a particular nation's decision to start or carry on an armed conflict, unconditional of a maybe-existing just cause. The term anti-war can also refer to pa ...
, the FBI placed Lennon under surveillance, and the U.S. government tried to deport him from the country.
At that time, opposition to the
Vietnam War
The Vietnam War (also known by #Names, other names) was a conflict in Vietnam, Laos, and Cambodia from 1 November 1955 to the fall of Saigon on 30 April 1975. It was the second of the Indochina Wars and was officially fought between North Vie ...
had reached a peak and Lennon often showed up at political rallies to sing his anti-war anthem "''
Give Peace a Chance''".
The U.S. government argued that Lennon'
300 pageFBI dossier was particularly sensitive because its release may "lead to foreign diplomatic, economic and military retaliation against the United States", and therefore only approved a "heavily censored" version.
*
The Beatles
The Beatles were an English rock band, formed in Liverpool in 1960, that comprised John Lennon, Paul McCartney, George Harrison and Ringo Starr. They are regarded as the most influential band of all time and were integral to the developm ...
, of which John Lennon was a member, had
separate FBI dossier
1967–73: The now-defunct
Project MINARET
Project MINARET was a domestic espionage project operated by the National Security Agency (NSA), which, after intercepting electronic communications that contained the names of predesignated US citizens, passed them to other government law enforce ...
was created to spy on U.S. citizens. At the request of the
U.S. Army, those who protested against the
Vietnam War
The Vietnam War (also known by #Names, other names) was a conflict in Vietnam, Laos, and Cambodia from 1 November 1955 to the fall of Saigon on 30 April 1975. It was the second of the Indochina Wars and was officially fought between North Vie ...
were put on the NSA's "watch list".
Church committee review
1975: The
Church Committee
The Church Committee (formally the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities) was a US Senate select committee in 1975 that investigated abuses by the Central Intelligence ...
of the
United States Senate
The United States Senate is the upper chamber of the United States Congress, with the House of Representatives being the lower chamber. Together they compose the national bicameral legislature of the United States.
The composition and ...
was set up to investigate widespread intelligence abuses by the NSA,
CIA
The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
and
FBI.
Domestic surveillance, authorized by the highest
executive branch of the federal government, spanned from the
FDR Administration to the
Presidency of Richard Nixon
Richard Nixon's tenure as the 37th president of the United States began with his first inauguration on January 20, 1969, and ended when he resigned on August 9, 1974, in the face of almost certain impeachment because of the Watergate Scanda ...
. The following examples were reported by the Church Committee:
*
President Roosevelt asked the FBI to put in its files the names of citizens sending telegrams to the White House opposing his "national defense" policy and supporting Col.
Charles Lindbergh
Charles Augustus Lindbergh (February 4, 1902 – August 26, 1974) was an American aviator, military officer, author, inventor, and activist. On May 20–21, 1927, Lindbergh made the first nonstop flight from New York City to Paris, a distance o ...
.
*
President Truman
Harry S. Truman (May 8, 1884December 26, 1972) was the 33rd president of the United States, serving from 1945 to 1953. A leader of the Democratic Party, he previously served as the 34th vice president from January to April 1945 under Frankli ...
received inside information on a former Roosevelt aide's efforts to influence his appointments, labor union negotiating plans, and the publishing plans of journalists.
*
President Eisenhower received reports on purely political and social contacts with foreign officials by
Bernard Baruch
Bernard Mannes Baruch (August 19, 1870 – June 20, 1965) was an American financier and statesman.
After amassing a fortune on the New York Stock Exchange, he impressed President Woodrow Wilson by managing the nation's economic mobilization in ...
,
Eleanor Roosevelt
Anna Eleanor Roosevelt () (October 11, 1884November 7, 1962) was an American political figure, diplomat, and activist. She was the first lady of the United States from 1933 to 1945, during her husband President Franklin D. Roosevelt's four ...
, and Supreme Court Justice
William O. Douglas.
* The
Kennedy administration
John F. Kennedy's tenure as the 35th president of the United States, began with his inauguration on January 20, 1961, and ended with his assassination on November 22, 1963. A Democrat from Massachusetts, he took office following the 1960 pr ...
ordered the FBI to wiretap a congressional staff member, three executive officials, a lobbyist, and a Washington law firm.
US Attorney General
The United States attorney general (AG) is the head of the United States Department of Justice, and is the chief law enforcement officer of the federal government of the United States. The attorney general serves as the principal advisor to the p ...
Robert F. Kennedy received data from an FBI wire tap on
Martin Luther King Jr. and an electronic listening device targeting a congressman, both of which yielded information of a political nature.
*
President Johnson asked the FBI to conduct "name checks" on his critics and members of the staff of his 1964 opponent, Senator
Barry Goldwater
Barry Morris Goldwater (January 2, 1909 – May 29, 1998) was an American politician and United States Air Force officer who was a five-term U.S. Senator from Arizona (1953–1965, 1969–1987) and the United States Republican Party, Republ ...
. He also requested purely political intelligence on his critics in the Senate, and received extensive intelligence reports on political activity at the
1964 Democratic Convention
The 1964 Democratic National Convention of the Democratic Party, took place at Boardwalk Hall in Atlantic City, New Jersey from August 24 to 27, 1964. President Lyndon B. Johnson was nominated for a full term. Senator Hubert H. Humphrey of Minne ...
from FBI electronic surveillance.
*
President Nixon authorized a program of wiretaps which produced for the White House purely political or personal information unrelated to national security, including information about a
Supreme Court justice
The Supreme Court of the United States is the highest-ranking judicial body in the United States. Its membership, as set by the Judiciary Act of 1869, consists of the chief justice of the United States and eight associate justices, any six of ...
.
Th
Final Report (Book II)of the Church Committee revealed the following statistics:
* Over 26,000 individuals were at one point catalogued on an FBI list of persons to be rounded up in the event of a "
national emergency
A state of emergency is a situation in which a government is empowered to be able to put through policies that it would normally not be permitted to do, for the safety and protection of its citizens. A government can declare such a state du ...
".
* Over 500,000 domestic intelligence files were kept at the FBI headquarters, of which 65,000 were opened in 1972 alone.
* At least 130,000
first class letters were opened and
photograph
A photograph (also known as a photo, image, or picture) is an image created by light falling on a photosensitive surface, usually photographic film or an electronic image sensor, such as a CCD or a CMOS chip. Most photographs are now creat ...
ed by the FBI from 1940 to 1966.
* A quarter of a million first class letters were opened and photographed by the CIA from 1953 to 1973.
* Millions of private
telegram
Telegraphy is the long-distance transmission of messages where the sender uses symbolic codes, known to the recipient, rather than a physical exchange of an object bearing the message. Thus flag semaphore is a method of telegraphy, whereas ...
s sent from, or to, through the United States were obtained by the
National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
(NSA), under a secret arrangement with U.S. telegraph companies, from 1947 to 1975.
* Over 100,000 Americans have been indexed in
U.S. Army intelligence files.
* About 300,000 individuals were indexed in a CIA computer system during the course of
Operation CHAOS.
* Intelligence files on more than 11,000 individuals and groups were created by the
Internal Revenue Service (IRS), with tax investigations "done on the basis of political rather than tax criteria".
In response to the committee's findings, the
United States Congress
The United States Congress is the legislature of the federal government of the United States. It is bicameral, composed of a lower body, the House of Representatives, and an upper body, the Senate. It meets in the U.S. Capitol in Washi ...
passed the
Foreign Intelligence Surveillance Act
The Foreign Intelligence Surveillance Act of 1978 ("FISA" , ) is a United States federal law that establishes procedures for the physical and electronic surveillance and the collection of "foreign intelligence information" between "foreign po ...
in 1978, which led to the establishment of the
United States Foreign Intelligence Surveillance Court
The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants aga ...
, which was authorized to issue surveillance
warrants.
Several decades later in 2013, the presiding judge of the FISA Court,
Reggie Walton, told ''
The Washington Post
''The Washington Post'' (also known as the ''Post'' and, informally, ''WaPo'') is an American daily newspaper published in Washington, D.C. It is the most widely circulated newspaper within the Washington metropolitan area and has a large n ...
'' that the court only has a limited ability to supervise the government's surveillance, and is therefore "forced" to rely upon the accuracy of the information that is provided by federal agents.
On August 17, 1975 Senator Frank Church stated on NBC's "Meet the Press" without mentioning the name of the NSA about this agency:
ECHELON
In 1988 an article titled "Somebody's listening" by
Duncan Campbell in the ''
New Statesman
The ''New Statesman'' is a British political and cultural magazine published in London. Founded as a weekly review of politics and literature on 12 April 1913, it was at first connected with Sidney and Beatrice Webb and other leading members o ...
'' described the signals-intelligence gathering activities of a program code-named "
ECHELON
ECHELON, originally a secret government code name, is a surveillance program ( signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:Given the 5 dialects that ...
". The program was engaged by English-speaking World War II
Allied countries – Australia, Canada, New Zealand, the United Kingdom and the United States (collectively known as
AUSCANNZUKUS AUSCANNZUKUS is an abbreviation for the naval Command, Control, Communications and Computers (C4) interoperability organization involving the Anglosphere nations of Australia, Canada, New Zealand, the United Kingdom, and the United States. It is als ...
). It was created by the five countries to monitor the military and diplomatic communications of the
Soviet Union
The Soviet Union,. officially the Union of Soviet Socialist Republics. (USSR),. was a List of former transcontinental countries#Since 1700, transcontinental country that spanned much of Eurasia from 1922 to 1991. A flagship communist state, ...
and of its
Eastern Bloc
The Eastern Bloc, also known as the Communist Bloc and the Soviet Bloc, was the group of socialist states of Central and Eastern Europe, East Asia, Southeast Asia, Africa, and Latin America under the influence of the Soviet Union that existed du ...
allies during the
Cold War in the early 1960s.
By the 1990s the ECHELON system could intercept satellite transmissions,
public switched telephone network
The public switched telephone network (PSTN) provides infrastructure and services for public telecommunication. The PSTN is the aggregate of the world's circuit-switched telephone networks that are operated by national, regional, or local telep ...
(PSTN) communications (including most Internet traffic), and transmissions carried by microwave. The New Zealand journalist
Nicky Hager
Nicky Hager (born 1958) is a New Zealand investigative journalist. He has produced seven books since 1996, covering topics such as intelligence networks, environmental issues and politics. He is one of two New Zealand members of the Internationa ...
provided a detailed description of ECHELON in his 1996 book ''Secret Power''. While some member governments denied the existence of ECHELON, a report by a committee of the
European Parliament
The European Parliament (EP) is one of the legislative bodies of the European Union and one of its seven institutions. Together with the Council of the European Union (known as the Council and informally as the Council of Ministers), it adop ...
in 2001 confirmed the program's use and warned Europeans about its reach and effects.
[Fiddler, Stephen (1 July 2013)]
Echoes of Echelon in Charges of NSA Spying in Europe
''The Washington Post''. The European Parliament stated in its report that the term "ECHELON" occurred in a number of contexts, but that the evidence presented indicated it was a signals-intelligence collection system capable of interception and content-inspection of telephone calls, fax, e-mail and other data-traffic globally.
[
]James Bamford
James Bamford (born September 15, 1946) is an American author, journalist and documentary producer noted for his writing about United States intelligence agencies, especially the National Security Agency (NSA). ''The New York Times'' has calle ...
further described the capabilities of ECHELON in ''Body of Secrets'' (2002) about the National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
.[Bamford, James; Body of Secrets, Anchor, ; 2002] Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement have, over the years, caused considerable public concern.
Escalation following September 11, 2001 attacks
In the aftermath of the September 2001 attacks on the World Trade Center and the Pentagon, bulk domestic spying in the United States increased dramatically. The desire to prevent future attacks of this scale led to the passage of the Patriot Act
The USA PATRIOT Act (commonly known as the Patriot Act) was a landmark Act of the United States Congress, signed into law by President George W. Bush. The formal name of the statute is the Uniting and Strengthening America by Providing Appro ...
. Later acts include the Protect America Act
The Protect America Act of 2007 (PAA), (, enacted by ), is a controversial amendment to the Foreign Intelligence Surveillance Act (FISA) that was signed into law by U.S. President George W. Bush on August 5, 2007. It removed the warrant requir ...
(which removes the warrant requirement for government surveillance of foreign targets) and the FISA Amendments Act
The FISA Amendments Act of 2008, also called the FAA and Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, is an Act of Congress that amended the Foreign Intelligence Surveillance Act. It has been used as the legal basis f ...
(which relaxed some of the original FISA court requirements).
In 2002, "Total Information Awareness
Total Information Awareness (TIA) was a mass detection program by the United States Information Awareness Office. It operated under this title from February to May 2003 before being renamed Terrorism Information Awareness.
Based on the conce ...
" was established by the U.S. government in order to "revolutionize the ability of the United States to detect, classify and identify foreign terrorists".
In 2005, a report about President Bush's President's Surveillance Program
The President's Surveillance Program (PSP) is a collection of secret intelligence activities authorized by the President of the United States George W. Bush after the September 11 attacks in 2001 as part of the War on Terrorism. Informatio ...
appeared in ''The New York Times''. According to reporters James Risen
James Risen (born April 27, 1955) is an American journalist for '' The Intercept''. He previously worked for '' The New York Times'' and before that for '' Los Angeles Times''. He has written or co-written many articles concerning U.S. governm ...
and Eric Lichtblau
Eric Lichtblau (born 1965) is an American journalist, reporting for ''The New York Times'' in the Washington bureau, as well as the ''Los Angeles Times'', ''Time'' magazine, ''The New Yorker'', and the CNN network's investigative news unit. He h ...
, the actual publication of their report was delayed for a year because "The White House
The White House is the official residence and workplace of the president of the United States. It is located at 1600 Pennsylvania Avenue Northwest, Washington, D.C., NW in Washington, D.C., and has been the residence of every U.S. preside ...
asked ''The New York Times'' not to publish this article".
Also in 2005, the existence of STELLARWIND
A stellar wind is a flow of gas ejected from the stellar atmosphere, upper atmosphere of a star. It is distinguished from the bipolar outflows characteristic of young stars by being less collimated, although stellar winds are not generally spher ...
was revealed by Thomas Tamm
Thomas Tamm (born 1952) is a public defender in Washington County, Maryland. He formerly worked as an attorney in the United States Department of Justice (USDOJ) Office of Intelligence Policy and Review during 2004 when senior Justice officials res ...
. In 2006, Mark Klein revealed the existence of Room 641A that he had wired back in 2003. In 2008, Babak Pasdar, a computer security expert, and CEO of Bat Blue publicly revealed the existence of the "Quantico circuit", that he and his team found in 2003. He described it as a back door to the federal government in the systems of an unnamed wireless provider; the company was later independently identified as Verizon
Verizon Communications Inc., commonly known as Verizon, is an American multinational telecommunications conglomerate and a corporate component of the Dow Jones Industrial Average. The company is headquartered at 1095 Avenue of the Americas in ...
.
The NSA's database of American's phone calls was made public in 2006 by ''USA Today
''USA Today'' (stylized in all uppercase) is an American daily middle-market newspaper and news broadcasting company. Founded by Al Neuharth on September 15, 1982, the newspaper operates from Gannett's corporate headquarters in Tysons, Virg ...
'' journalist Leslie Cauley in an article titled, "NSA has massive database of Americans' phone calls." The article cites anonymous sources that described the program's reach on American citizens:
... it means that the government has detailed records of calls they made — across town or across the country — to family members, co-workers, business contacts and others. The three telecommunications companies are working under contract with the NSA, which launched the program in 2001 shortly after the Sept. 11 terrorist attacks.
The report failed to generate discussion of privacy rights in the media and was not referenced by Greenwald or ''The Washington Post'' in any of their subsequent reporting.
In 2009, ''The New York Times'' cited several anonymous intelligence officials alleging that "the N.S.A. made Americans targets in eavesdropping operations based on insufficient evidence tying them to terrorism" and "the N.S.A. tried to wiretap a member of Congress without a warrant".
Acceleration of media leaks (2010–present)
On 15 March 2012, the American magazine ''Wired
''Wired'' (stylized as ''WIRED'') is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics. Owned by Condé Nast, it is headquartered in San Fran ...
'' published an article with the headline "The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)", which was later mentioned by U.S. Rep. Hank Johnson
Henry Calvin Johnson Jr. (born October 2, 1954) is an American lawyer and politician serving as the U.S. representative for since 2007. He is a member of the Democratic Party. The district is anchored in Atlanta's inner eastern suburbs, includi ...
during a congressional hearing. In response to Johnson's inquiry, NSA director Keith B. Alexander testified that these allegations made by ''Wired
''Wired'' (stylized as ''WIRED'') is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics. Owned by Condé Nast, it is headquartered in San Fran ...
'' magazine were untrue:
2013 mass surveillance disclosures
On 6 June 2013, Britain's ''The Guardian
''The Guardian'' is a British daily newspaper
A newspaper is a periodical publication containing written information about current events and is often typed in black ink with a white or gray background.
Newspapers can cover a wide ...
'' newspaper began publishing a series of revelations by an unnamed American whistleblower, revealed several days later to be former CIA and NSA-contracted systems analyst Edward Snowden
Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and s ...
. Snowden gave a cache of internal documents in support of his claims to two journalists: Glenn Greenwald
Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author and lawyer. In 2014, he cofounded ''The Intercept'', of which he was an editor until he resigned in October 2020. Greenwald subsequently started publishing on Substa ...
and Laura Poitras
Laura Poitras (; born February 2, 1964) is an American director and producer of documentary films.
Poitras has received numerous awards for her work, including the 2015 Academy Award for Best Documentary Feature for '' Citizenfour'', about Ed ...
, Greenwald later estimated that the cache contains 15,000 – 20,000 documents, some very large and very detailed, and some very small. This was one of the largest news leak
A news leak is the unsanctioned release of confidential information to news media. It can also be the premature publication of information by a news outlet, of information that it has agreed not to release before a specified time, in violation of ...
s in the modern history of the United States. In over two months of publications, it became clear that the NSA operates a complex web of spying programs which allow it to intercept internet and telephone conversations from over a billion users from dozens of countries around the world. Specific revelations have been made about China, the European Union, Latin America, Iran and Pakistan, and Australia and New Zealand, however the published documentation reveals that many of the programs indiscriminately collect bulk information directly from central servers and internet backbones, which almost invariably carry and reroute information from distant countries.
Due to this central server and backbone monitoring, many of the programs overlap and interrelate among one another. These programs are often done with the assistance of US entities such as the United States Department of Justice
The United States Department of Justice (DOJ), also known as the Justice Department, is a United States federal executive departments, federal executive department of the United States government tasked with the enforcement of federal law and a ...
and the FBI,[How Microsoft handed the NSA access to encrypted messages](_blank)
''The Guardian
''The Guardian'' is a British daily newspaper
A newspaper is a periodical publication containing written information about current events and is often typed in black ink with a white or gray background.
Newspapers can cover a wide ...
'', 12 July 2013. Retrieved 13 July 2013. are sanctioned by US laws such as the FISA Amendments Act
The FISA Amendments Act of 2008, also called the FAA and Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, is an Act of Congress that amended the Foreign Intelligence Surveillance Act. It has been used as the legal basis f ...
, and the necessary court orders for them are signed by the secret Foreign Intelligence Surveillance Court
The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants ag ...
. In addition to this, many of the NSA's programs are directly aided by national and foreign intelligence services, Britain's GCHQ
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Uni ...
and Australia's DSD, as well as by large private telecommunications and Internet corporations, such as Verizon
Verizon Communications Inc., commonly known as Verizon, is an American multinational telecommunications conglomerate and a corporate component of the Dow Jones Industrial Average. The company is headquartered at 1095 Avenue of the Americas in ...
, Telstra
Telstra Group Limited is an Australian telecommunications company that builds and operates telecommunications networks and markets voice, mobile, internet access, pay television and other products and services. It is a member of the S&P/ASX ...
, Google
Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
and Facebook.
On 9 June 2013, Edward Snowden
Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and s ...
told ''The Guardian
''The Guardian'' is a British daily newspaper
A newspaper is a periodical publication containing written information about current events and is often typed in black ink with a white or gray background.
Newspapers can cover a wide ...
'':
The US government has aggressively sought to dismiss and challenge Fourth Amendment cases raised: '' Hepting v. AT&T'', '' Jewel v. NSA'', '' Clapper v. Amnesty International'', ''Al-Haramain Islamic Foundation v. Obama'', and ''Center for Constitutional Rights v. Bush
''CCR v. Bush'' is a legal action by the Center for Constitutional Rights against the George W. Bush administration, challenging the National Security Agency's (NSA's) surveillance of people within the United States, including the interception of ...
''. The government has also granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.
The US district court judge for the District of Columbia, Richard Leon, declared on December 16, 2013 that the mass collection of metadata of Americans' telephone records by the National Security Agency probably violates the Fourth Amendment prohibition of unreasonable searches and seizures.
Given the limited record before me at this point in the litigation – most notably, the utter lack of evidence that a terrorist attack has ever been prevented because searching the NSA database was faster than other investigative tactics – I have serious doubts about the efficacy of the metadata collection program as a means of conducting time-sensitive investigations in cases involving imminent threats of terrorism.
"Plaintiffs have a substantial likelihood of showing that their privacy interests outweigh the government's interest in collecting and analysing bulk telephony metadata and therefore the NSA's bulk collection program is indeed an unreasonable search under the fourth amendment," he wrote.
"The Fourth Amendment typically requires 'a neutral and detached authority be interposed between the police and the public,' and it is offended by 'general warrants' and laws that allow searches to be conducted 'indiscriminately and without regard to their connections with a crime under investigation,'" he wrote. He added:
I cannot imagine a more 'indiscriminate' and 'arbitrary invasion' than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely such a program infringes on 'that degree of privacy' that the founders enshrined in the Fourth Amendment. Indeed I have little doubt that the author of our Constitution, James Madison
James Madison Jr. (March 16, 1751June 28, 1836) was an American statesman, diplomat, and Founding Father. He served as the fourth president of the United States from 1809 to 1817. Madison is hailed as the "Father of the Constitution" for h ...
, who cautioned us to beware 'the abridgement of freedom of the people by gradual and silent encroachments by those in power,' would be aghast.
Leon granted the request for a preliminary injunction that blocks the collection of phone data for two private plaintiffs (Larry Klayman, a conservative lawyer, and Charles Strange, father of a cryptologist killed in Afghanistan when his helicopter was shot down in 2011) and ordered the government to destroy any of their records that have been gathered. But the judge stayed action on his ruling pending a government appeal, recognizing in his 68-page opinion the "significant national security interests at stake in this case and the novelty of the constitutional issues."
H.R.4681 – Intelligence Authorization Act for Fiscal Year 2015
On 20 May 2014, U.S. Representative for Republican congressman Mike Rogers introduced Intelligence Authorization Act for Fiscal Year 2015 with the goal of authorizing appropriations for fiscal years 2014 and 2015 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency
The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian intelligence agency, foreign intelligence service of the federal government of the United States, officially tasked with gat ...
(CIA) Retirement and Disability System, and for other purposes.
Some of its measures cover the limitation on retention. A covered communication (meaning any nonpublic telephone or electronic communication acquired without the consent of a person who is a party to the communication, including communications in electronic storage) shall not be retained in excess of 5 years, unless: (i) the communication has been affirmatively determined, in whole or in part, to constitute foreign intelligence or counterintelligence or is necessary to understand or assess foreign intelligence or counterintelligence; (ii) the communication is reasonably believed to constitute evidence of a crime and is retained by a law enforcement agency; (iii) the communication is enciphered or reasonably believed to have a secret meaning; (iv) all parties to the communication are reasonably believed to be non-United States persons; (v) retention is necessary to protect against an imminent threat to human life, in which case both the nature of the threat and the information to be retained shall be reported to the congressional intelligence committees not later than 30 days after the date such retention is extended under this clause; (vi) retention is necessary for technical assurance or compliance purposes, including a court order or discovery obligation, in which case access to information retained for technical assurance or compliance purposes shall be reported to the congressional intelligence committees on an annual basis; (vii) retention for a period in excess of 5 years is approved by the head of the element of the intelligence community responsible for such retention, based on a determination that retention is necessary to protect the national security of the United States, in which case the head of such element shall provide to the congressional intelligence committees a written certification describing (I) the reasons extended retention is necessary to protect the national security of the United States; (II) the duration for which the head of the element is authorizing retention; (III) the particular information to be retained; and (IV) the measures the element of the intelligence community is taking to protect the privacy interests of United States persons or persons located inside the United States.
On 10 December 2014, Republican U.S. Representative for member of Congress
A congress is a formal meeting of the representatives of different countries, constituent states, organizations, trade unions, political parties, or other groups. The term originated in Late Middle English to denote an encounter (meeting of ...
Justin Amash
Justin Amash ( ; born April 18, 1980) is an American lawyer and politician who served as the U.S. representative for from 2011 to 2021. Originally a Republican, Amash joined the Libertarian Party in April 2020, becoming the party's first (an ...
criticized the act on his Facebook as being "one of the most egregious sections of law I've encountered during my time as a representative" and "It grants the executive branch virtually unlimited access to the communications of every American".
On 11 December 2014, a petition was created on We the People section of the whitehouse.gov
whitehouse.gov (also simply known as wh.gov) is the official website of the White House and is managed by the Office of Digital Strategy. It was launched on July 29, 1994 by the Clinton administration.
The content of the website is in th ...
website petitioning the Obama administration to veto the law.
USA Freedom Act
The USA Freedom Act was signed into law on June 2, 2015, the day after certain provisions of the Patriot Act had expired. It mandated an end to bulk collection of phone call metadata by the NSA within 180 days, but allowed continued mandatory retention of metadata by phone companies with access by the government with case-by-case approval from the Foreign Intelligence Surveillance Court
The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants ag ...
.
Modalities, concepts, and methods
Logging postal mail
Under the Mail Isolation Control and Tracking program, the U.S. Postal Service photographs the exterior of every piece of paper mail that is processed in the United States — about 160 billion pieces in 2012. The U.S. Postmaster General stated that the system is primarily used for mail sorting, but the images are available for possible use by law enforcement agencies.[ Created in 2001 following the anthrax attacks that killed five people, it is a sweeping expansion of a 100-year-old program called " mail cover" which targets people suspected of crimes. Together, the two programs show that postal mail is subject to the same kind of scrutiny that the National Security Agency gives to telephone calls, e-mail, and other forms of electronic communication.]["U.S. Postal Service Logging All Mail for Law Enforcement"]
Ron Nixon, ''New York Times'', July 3, 2013. Retrieved 25 September 2013.
Mail cover surveillance requests are granted for about 30 days, and can be extended for up to 120 days. Images captured under the Mail Isolation Control and Tracking program are retained for a week to 30 days and then destroyed.["AP Interview: USPS takes photos of all mail"]
Associated Press (AP), 2 August 2013. There are two kinds of mail covers: those related to criminal activity and those requested to protect national security. Criminal activity requests average 15,000 to 20,000 per year, while the number of requests for national security mail covers has not been made public. Neither the Mail Isolation Control and Tracking program nor the mail cover program require prior approval by a judge. For both programs the information gathered is metadata from the outside of the envelope or package for which courts have said there is no expectation of privacy
Expectation of privacy is a legal test which is crucial in defining the scope of the applicability of the privacy protections of the Fourth Amendment to the United States Constitution. It is related to, but is not the same as, a ''right to priva ...
. Opening the mail to view its contents would require a warrant approved by a judge.[
]
Wiretapping
Billions of dollars per year are spent, by agencies such as the Information Awareness Office
The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology ...
, National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
, and the Federal Bureau of Investigation
The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, ...
, to develop, purchase, implement, and operate systems such as Carnivore
A carnivore , or meat-eater (Latin, ''caro'', genitive ''carnis'', meaning meat or "flesh" and ''vorare'' meaning "to devour"), is an animal or plant whose food and energy requirements derive from animal tissues (mainly muscle, fat and other ...
, ECHELON
ECHELON, originally a secret government code name, is a surveillance program ( signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:Given the 5 dialects that ...
, and NarusInsight to intercept and analyze the immense amount of data that traverses the Internet and telephone system every day.
The Total Information Awareness
Total Information Awareness (TIA) was a mass detection program by the United States Information Awareness Office. It operated under this title from February to May 2003 before being renamed Terrorism Information Awareness.
Based on the conce ...
program, of the Information Awareness Office
The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology ...
, was formed in 2002 by the Pentagon and led by former rear admiral John Poindexter. The program designed numerous technologies to be used to perform mass surveillance. Examples include advanced speech-to-text
Speech recognition is an interdisciplinary subfield of computer science and computational linguistics that develops methodologies and technologies that enable the recognition and translation of spoken language into text by computers with the ma ...
programs (so that phone conversations can be monitored en-masse by a computer, instead of requiring human operators to listen to them), social network analysis
Social network analysis (SNA) is the process of investigating social structures through the use of networks and graph theory. It characterizes networked structures in terms of ''nodes'' (individual actors, people, or things within the network) ...
software to monitor groups of people and their interactions with each other, and "Human identification at a distance" software which allows computers to identify people on surveillance cameras by their facial features and gait (the way they walk). The program was later renamed "Terrorism Information Awareness
The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology ...
", after a negative public reaction.
Legal foundations
The Communications Assistance for Law Enforcement Act
The Communications Assistance for Law Enforcement Act (CALEA), also known as the "Digital Telephony Act," is a United States wiretapping law passed in 1994, during the presidency of Bill Clinton (Pub. L. No. 103-414, 108 Stat. 4279, codified at 47 ...
(CALEA), passed in 1994, requires that all U.S. telecommunications companies modify their equipment to allow easy wiretapping
Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitori ...
of telephone, VoIP, and broadband Internet traffic.
In 1999 two models of mandatory data retention were suggested for the US. The first model would record the IP address
An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
assigned to a customer at a specific time. In the second model, "which is closer to what Europe adopted", telephone numbers dialed, contents of Web pages visited, and recipients of e-mail messages must be retained by the ISP for an unspecified amount of time. In 2006 the International Association of Chiefs of Police
International Association of Chiefs of Police (IACP) is a nonprofit organization based in Alexandria, Virginia (United States). It is the world's largest professional association for police
The police are a constituted body of persons e ...
adopted a resolution calling for a "uniform data retention mandate" for "customer subscriber information and source and destination information." The U.S. Department of Justice announced in 2011 that criminal investigations "are being frustrated" because no law currently exists to force Internet providers to keep track of what their customers are doing.
The Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ...
has an ongoing lawsuit ( Hepting v. AT&T) against the telecom giant AT&T Inc. for its assistance to the U.S. government in monitoring the communications of millions of American citizens. It has managed thus far to keep the proceedings open. Recently the documents, which were exposed by a whistleblower who had previously worked for AT&T, and showed schematics of the massive data mining system, were made public.
Internet communications
The FBI developed the computer programs "Magic Lantern
The magic lantern, also known by its Latin name , is an early type of image projector that used pictures—paintings, prints, or photographs—on transparent plates (usually made of glass), one or more lens (optics), lenses, and a light source. ...
" and CIPAV
The Computer and Internet Protocol Address Verifier (CIPAV) is a data gathering tool that the Federal Bureau of Investigation (FBI) uses to track and gather location data on suspects under electronic surveillance. The software operates on the tar ...
, which it can remotely install on a computer system, in order to monitor a person's computer activity.
The NSA has been gathering information on financial records, Internet surfing habits, and monitoring e-mails. It has also performed extensive surveillance on social networks
A social network is a social structure made up of a set of social actors (such as individuals or organizations), sets of dyadic ties, and other social interactions between actors. The social network perspective provides a set of methods for ...
such as Facebook. Recently, Facebook has revealed that, in the last six months of 2012, they handed over the private data of between 18,000 and 19,000 users to law enforcement of all types—including local police and federal agencies, such as the FBI, Federal Marshals and the NSA. One form of wiretapping utilized by the NSA is RADON, a bi-directional host tap that can inject Ethernet packets onto the same target. It allows bi-directional exploitation of Denied networks using standard on-net tools. The one limitation of RADON is that it is a USB device that requires a physical connection to a laptop or PC to work. RADON was created by a Massachusetts firm called Netragard. Their founder, Adriel Desautels, said about RADON, "it is our 'safe' malware. RADON is designed to enable us to infect customer systems in a safe and controllable manner. Safe means that every strand is built with an expiration date that, when reached, results in RADON performing an automatic and clean self-removal."
The NSA is also known to have splitter sites in the United States. Splitter sites are places where a copy of every packet is directed to a secret room where it is analyzed by the Narus STA 6400, a deep packet inspection device. Although the only known location is at 611 Folsom Street, San Francisco, California, expert analysis of Internet traffic suggests that there are likely several locations throughout the United States.
Advertising data
In September 2022 the EFF and AP revealed their investigation into the use of advertising IDs to develop the Fog Reveal
Fog Reveal is a tracking tool that aggregates location data from mobile apps. It is a product of FOG Data Science.
FOG Data Science
FOG Data Science is a limited liability company based in Virginia. It was founded in 2016 by two former Unite ...
database. Fog Reveal aggregates location data from mobile applications, which is then supplied as a service to United States law enforcement agencies.
Intelligence apparatus to monitor Americans
Since the September 11, 2001 terrorist attacks
The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commerci ...
, a vast domestic intelligence apparatus has been built to collect information using FBI, local police, state homeland security offices and military criminal investigators. The intelligence apparatus collects, analyzes and stores information about millions of (if not all) American citizens, most of whom have not been accused of any wrongdoing. Every state and local law enforcement agency is to feed information to federal authorities to support the work of the FBI.
The PRISM
Prism usually refers to:
* Prism (optics), a transparent optical component with flat surfaces that refract light
* Prism (geometry), a kind of polyhedron
Prism may also refer to:
Science and mathematics
* Prism (geology), a type of sedimentary ...
special source operation system was enabled by the Protect America Act of 2007
The Protect America Act of 2007 (PAA), (, enacted by ), is a controversial amendment to the Foreign Intelligence Surveillance Act (FISA) that was signed into law by U.S. President George W. Bush on August 5, 2007. It removed the warrant requi ...
under President Bush and the FISA Amendments Act of 2008
The FISA Amendments Act of 2008, also called the FAA and Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, is an Act of Congress that amended the Foreign Intelligence Surveillance Act. It has been used as the legal basis fo ...
, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017. According to ''The Register'', the FISA Amendments Act of 2008 "specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant" when one of the parties is outside the U.S.
PRISM was first publicly revealed on 6 June 2013, after classified documents about the program were leaked to ''The Washington Post'' and ''The Guardian'' by Edward Snowden
Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and s ...
.
Telephones
In early 2006, ''USA Today
''USA Today'' (stylized in all uppercase) is an American daily middle-market newspaper and news broadcasting company. Founded by Al Neuharth on September 15, 1982, the newspaper operates from Gannett's corporate headquarters in Tysons, Virg ...
'' reported that several major telephone companies were cooperating illegally with the National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
to monitor the phone records of U.S. citizens, and storing them in a large database known as the NSA call database. This report came on the heels of allegations that the U.S. government
The federal government of the United States (U.S. federal government or U.S. government) is the national government of the United States, a federal republic located primarily in North America, composed of 50 states, a city within a fede ...
had been conducting electronic surveillance of domestic telephone calls without warrants.
Law enforcement and intelligence services in the United States possess technology to remotely activate the microphones in cell phones in order to listen to conversations that take place nearby the person who holds the phone.["FBI using cell phone microphones to eavesdrop"]
Eric Bangeman, ''Ars Technica'', 4 December 2006. Retrieved 17 September 2013.
Nicole Perlroth, ''New York Times'', 30 May 2012. Retrieved 20 September 2013.
U.S. federal agents regularly use mobile phones to collect location data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily (whether it is being used or not), using a technique known multilateration Trilateration is the use of distances (or "ranges") for determining the unknown position coordinates of a point of interest, often around Earth ( geopositioning).
When more than three distances are involved, it may be called multilateration, for ...
to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers
A cell site, cell tower, or cellular base station is a cellular-enabled mobile device site where antennas and electronic communications equipment are placed (typically on a radio mast, tower, or other raised structure) to create a cell, or adja ...
near the owner of the phone.
In 2013, the existence of the Hemisphere Project
The Hemisphere Project, also called simply Hemisphere (codename ''Hudson Hawk''), is a mass surveillance program conducted by US telephone company AT&T and paid for by the White House Office of National Drug Control Policy and the Drug Enforcement ...
, through which AT&T provides call detail record
A call detail record (CDR) is a data record produced by a telephone exchange or other telecommunications equipment that documents the details of a telephone call or other telecommunications transactions (e.g., text message) that passes through that ...
s to government agencies, became publicly known.
Infiltration of smartphones
As worldwide sales of smartphone
A smartphone is a portable computer device that combines mobile telephone and computing functions into one unit. They are distinguished from feature phones by their stronger hardware capabilities and extensive mobile operating systems, whic ...
s began exceeding those of feature phone
A feature phone (also spelled featurephone) is a type or class of mobile phone that retains the form factor of earlier generations of mobile telephones, typically with press-button based inputs and a small non-touch display. They tend to use an ...
s, the NSA decided to take advantage of the smartphone boom. This is particularly advantageous because the smartphone combines a myriad
A myriad (from Ancient Greek grc, μυριάς, translit=myrias, label=none) is technically the number 10,000 (ten thousand); in that sense, the term is used in English almost exclusively for literal translations from Greek, Latin or Sinospheri ...
of data that would interest an intelligence agency, such as social contacts, user behavior, interests, location, photos and credit card
A credit card is a payment card issued to users (cardholders) to enable the cardholder to pay a merchant for goods and services based on the cardholder's accrued debt (i.e., promise to the card issuer to pay them for the amounts plus the o ...
numbers and passwords.
An internal NSA report from 2010 stated that the spread of the smartphone has been occurring "extremely rapidly"—developments that "certainly complicate traditional target analysis." According to the document, the NSA has set up task forces assigned to several smartphone manufacturers and operating systems
An operating system (OS) is system software that manages computer hardware, software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ef ...
, including Apple Inc.'s iPhone and iOS operating system, as well as Google
Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
's Android
Android may refer to:
Science and technology
* Android (robot), a humanoid robot or synthetic organism designed to imitate a human
* Android (operating system), Google's mobile operating system
** Bugdroid, a Google mascot sometimes referred to ...
mobile operating system. Similarly, Britain's GCHQ
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Uni ...
assigned a team to study and crack the BlackBerry
The blackberry is an edible fruit produced by many species in the genus ''Rubus'' in the family Rosaceae, hybrids among these species within the subgenus ''Rubus'', and hybrids between the subgenera ''Rubus'' and ''Idaeobatus''. The taxonomy of ...
.
Under the heading "iPhone capability", the document notes that there are smaller NSA programs, known as "scripts", that can perform surveillance on 38 different features of the iPhone 3 and iPhone 4
The iPhone 4 is a smartphone that was designed and marketed by Apple Inc. It is the fourth generation of the iPhone lineup, succeeding the iPhone 3GS and preceding the 4S. Following a number of notable leaks, the iPhone 4 was first unve ...
operating systems. These include the mapping feature, voicemail
A voicemail system (also known as voice message or voice bank) is a computer-based system that allows users and subscribers to exchange personal voice messages; to select and deliver voice information; and to process transactions relating to ind ...
and photos, as well as Google Earth, Facebook
Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin ...
and Yahoo! Messenger
Yahoo! Messenger (sometimes abbreviated Y!M) was an advertisement-supported instant messaging client and associated protocol provided by Yahoo!. Yahoo! Messenger was provided free of charge and could be downloaded and used with a generic "Yahoo I ...
.
Data mining of subpoenaed records
The FBI collected nearly all hotel, airline, rental car, gift shop, and casino records in Las Vegas
Las Vegas (; Spanish language, Spanish for "The Meadows"), often known simply as Vegas, is the List of United States cities by population, 25th-most populous city in the United States, the most populous city in the U.S. state, state of Neva ...
during the last two weeks of 2003. The FBI requested all electronic data of hundreds of thousands of people based on a very general lead for the Las Vegas New Year's celebration. The Senior VP of The Mirage
The Mirage is a casino resort on the Las Vegas Strip in Paradise, Nevada, United States. It is owned by Vici Properties and operated by Hard Rock International. The 65-acre property includes a casino and 3,044 rooms.
Golden Nugget, Inc., led ...
went on record with PBS
The Public Broadcasting Service (PBS) is an American public broadcaster and non-commercial, free-to-air television network based in Arlington, Virginia. PBS is a publicly funded nonprofit organization and the most prominent provider of ed ...
' Frontline describing the first time they were requested to help in the mass collection of personal information.
Surveillance cameras
Wide Area Persistent Surveillance (also Wide Area Motion Imaging) is a form of airborne surveillance system that collects pattern-of-life data by recording motion images of an area larger than a city – in sub-meter resolution. This video allows for anyone within the field of regard to be tracked – both live and retroactively, for forensic analysis. The use of sophisticated tracking algorithms applied to the WAMI dataset also enables mass automated geo-location tracking of every vehicle and pedestrian. WAMI sensors are typically mounted on manned airplanes, drones, blimps and aerostats. WAMI is currently in use on the southern border of the US and has been deployed in Baltimore, Dayton Ohio as well as in Los Angeles, specifically targeting Compton. Wide Area Persistent Surveillance systems such as ARGUS WAMI are capable of live viewing and recording a 68 square mile area with enough detail to view pedestrians and vehicles and generate chronographs. These WAMI cameras, such as Gorgon Stare, Angelfire, Hiper Stare, Hawkeye and ARGUS, create airborne video so detailed that pedestrians can be followed across the city through forensic analysis. This allows investigators to rewind and playback the movements of anyone within this 68 square mile area for hours, days or even months at a time depending on the airframe the WAMI sensors are mounted on. JLENS, a surveillance aerostat scheduled for deployment over the east coast of the US, is a form of WAMI that uses sophisticated radar imaging along with electro-optical WAMI sensors to enable mass geo-location tracking of ground vehicles.
While a resistance to the domestic deployment of WAMI has emerged in areas where the public has learned of the technologies use, the deployments have been intentionally hidden from the public, as in Compton California, where the mayor learned about the surveillance from groups like the American Civil Liberties Union, Teame Zazzu and the Center for Investigative Reporting.
PeSEAS and PerMIATE software automate and record the movement observed in the WAMI video. This technology uses software to track and record the movements of pedestrians and vehicles using automatic object recognition software across the entire frame, generating "tracklets" or chronographs of every car and pedestrian movements. 24/7 deployment of this technology has been suggested by the DHS on spy blimps such as the recently killed Blue Devil Airship.
Traffic cameras
A traffic camera is a video camera which observes vehicular traffic on a road. Typically, traffic cameras are put along major roads such as highways, freeways, expressways and arterial roads, and are connected by optical fibers buried alongside or ...
, which were meant to help enforce traffic laws at intersections, have also sparked some controversy, due to their use by law enforcement agencies for purposes unrelated to traffic violations. These cameras also work as transit choke-points that allow individuals inside the vehicle to be positively identified and license plate data to be collected and time stamped for cross reference with airborne WAMI such as ARGUS and HAWKEYE used by police and Law Enforcement.
The Department of Homeland Security
The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-te ...
is funding networks of surveillance cameras in cities and towns as part of its efforts to combat terrorism. In February 2009, Cambridge, MA
Cambridge ( ) is a city in Middlesex County, Massachusetts, United States. As part of the Boston metropolitan area, the cities population of the 2020 U.S. census was 118,403, making it the fourth most populous city in the state, behind Boston ...
rejected the cameras due to privacy concerns.
In July 2020, the Electronic Frontier Foundation (EFF) reported that the San Francisco Police Department (SFPD) used a camera network in the city's Business Improvement District amid protests against police violence. The report claims that the SFPD's usage of the camera network went beyond investigating footage, likening the department's access to real-time video feeds as "indiscriminate surveillance of protestors."
Surveillance drones
On 19 June 2013, FBI Director
The Director of the Federal Bureau of Investigation is the head of the Federal Bureau of Investigation, a United States' federal law enforcement agency, and is responsible for its day-to-day operations. The FBI Director is appointed for a singl ...
Robert Mueller
Robert Swan Mueller III (; born August 7, 1944) is an American lawyer and government official who served as the sixth director of the Federal Bureau of Investigation (FBI) from 2001 to 2013.
A graduate of Princeton University and New York ...
told the United States Senate Committee on the Judiciary
The United States Senate Committee on the Judiciary, informally the Senate Judiciary Committee, is a standing committee of 22 U.S. senators whose role is to oversee the Department of Justice (DOJ), consider executive and judicial nomination ...
that the federal government had been employing surveillance drones
Drone most commonly refers to:
* Drone (bee), a male bee, from an unfertilized egg
* Unmanned aerial vehicle
* Unmanned surface vehicle, watercraft
* Unmanned underwater vehicle or underwater drone
Drone, drones or The Drones may also refer to:
...
on U.S. soil in "particular incidents". According to Mueller, the FBI is currently in the initial stage of developing drone policies.
Earlier in 2012, Congress passed a US$63 billion bill that will grant four years of additional funding to the Federal Aviation Administration
The Federal Aviation Administration (FAA) is the largest transportation agency of the U.S. government and regulates all aspects of civil aviation in the country as well as over surrounding international waters. Its powers include air traffic m ...
(FAA). Under the bill, the FAA is required to provide military and commercial drones with expanded access to U.S. airspace by October 2015.
In February 2013, a spokesman for the Los Angeles Police Department
The Los Angeles Police Department (LAPD), officially known as the City of Los Angeles Police Department, is the municipal Police, police department of Los Angeles, California. With 9,974 police officers and 3,000 civilian staff, it is the thir ...
explained that these drones would initially be deployed in large public gatherings, including major protests. Over time, tiny drones would be used to fly inside buildings to track down suspects and assist in investigations. According to ''The Los Angeles Times
''The'' () is a grammatical article in English, denoting persons or things that are already or about to be mentioned, under discussion, implied or otherwise presumed familiar to listeners, readers, or speakers. It is the definite article in ...
'', the main advantage of using drones is that they offer "unblinking eye-in-the-sky coverage". They can be modified to carry high-resolution video cameras, infrared sensors, license plate readers, listening devices, and be disguised as sea gulls
Gulls, or colloquially seagulls, are seabirds of the family Laridae in the suborder Lari. They are most closely related to the terns and skimmers and only distantly related to auks, and even more distantly to waders. Until the 21st century, m ...
or other birds to mask themselves.
The FBI and Customs and Border Protection have used drones for surveillance of protests by the Black Lives Matter
Black Lives Matter (abbreviated BLM) is a decentralized political and social movement that seeks to highlight racism, discrimination, and racial inequality experienced by black people. Its primary concerns are incidents of police brut ...
movement.
Infiltration of activist groups
In 2003, consent decrees against surveillance around the country were lifted, with the assistance of the Justice Department.
The New York City Police Department
The New York City Police Department (NYPD), officially the City of New York Police Department, established on May 23, 1845, is the primary municipal law enforcement agency within the City of New York, the largest and one of the oldest i ...
infiltrated and compiled dossiers on protest groups before the 2004 Republican National Convention
The 2004 Republican National Convention took place from August 30 to September 2, 2004 at Madison Square Garden in New York City, New York. The convention is one of a series of historic quadrennial meetings at which the Republican candidates fo ...
, leading to over 1,800 arrests and subsequent fingerprinting.
In 2008, Maryland State Police
The Maryland State Police (MSP), officially the Maryland Department of State Police (MDSP), is the official state police force of the U.S. state of Maryland. The Maryland State Police is headquartered at 1201 Reisterstown Road in the Pikesvill ...
infiltrated local peace groups.
In 2013, a Washington, D.C. undercover cop infiltrated peace groups.
International cooperation
During World War II
World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the World War II by country, vast majority of the world's countries—including all of the great power ...
, the BRUSA Agreement was signed by the governments of the United States and the United Kingdom for the purpose of intelligence sharing. This was later formalized in the UKUSA Agreement
The United Kingdom – United States of America Agreement (UKUSA, ) is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intelli ...
of 1946 as a secret treaty
A secret treaty is a treaty ( international agreement) in which the contracting state parties have agreed to conceal the treaty's existence or substance from other states and the public.Helmut Tichy and Philip Bittner, "Article 80" in Olivier D ...
. The full text of the agreement was released to the public on 25 June 2010.
Although the treaty was later revised to include other countries such as Denmark, Germany, Ireland, Norway, Turkey, and the Philippines, most of the information sharing is performed by the so-called "Five Eyes", a term referring to the following English-speaking western democracies
Liberal democracy is the combination of a liberal political ideology that operates under an indirect democratic form of government. It is characterized by elections between multiple distinct political parties, a separation of powers into diff ...
and their respective intelligence agencies:
* – The Defence Signals Directorate of Australia
* – The Communications Security Establishment
The Communications Security Establishment (CSE; french: Centre de la sécurité des télécommunications, ''CST''), formerly (from 2008-2014) called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national ...
of Canada
* – The Government Communications Security Bureau
The Government Communications Security Bureau (GCSB) ( mi, Te Tira Tiaki) is the public-service department of New Zealand charged with promoting New Zealand's national security by collecting and analysing information of an intelligence nature. ...
of New Zealand
* – The Government Communications Headquarters
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the ...
of the United Kingdom, which is widely considered to be a leader in traditional spying due to its influence on countries that were once part of the British Empire
The British Empire was composed of the dominions, colonies, protectorates, mandates, and other territories ruled or administered by the United Kingdom and its predecessor states. It began with the overseas possessions and trading post ...
.
* – The National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
of the United States, which has the biggest budget and some of the most advanced technical abilities among the "''five eyes''".
In 2013, media disclosures revealed how other government agencies have cooperated extensively with the "''Five Eyes''":
* – The Politiets Efterretningstjeneste
Politiets Efterretningstjeneste (PET) (literally: Police Intelligence Service, official name in English: Danish Security and Intelligence Service, or DSIS) is the national security and intelligence agency of Denmark. The agency focuses solely ...
(PET) of Denmark, a domestic intelligence agency, exchanges data with the NSA on a regular basis, as part of a secret agreement with the United States.
* – The Bundesnachrichtendienst
The Federal Intelligence Service (German: ; , BND) is the foreign intelligence agency of Germany, directly subordinate to the Chancellor's Office. The BND headquarters is located in central Berlin and is the world's largest intelligence headq ...
(''Federal Intelligence Service'') of Germany systematically transfers metadata from German intelligence sources to the NSA. In December 2012 alone, Germany provided the NSA with 500 million metadata records. The NSA granted the Bundesnachrichtendienst access to X-Keyscore
XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligen ...
,['Prolific Partner': German Intelligence Used NSA Spy Program](_blank)
'' Der Spiegel''. Retrieved 21 July 2013. in exchange for Mira4 and Veras.[ In early 2013, ]Hans-Georg Maaßen
Hans-Georg Maaßen (born 24 November 1962) is a German civil servant and lawyer. From 1 August 2012 to 8 November 2018, he served as the President of the Federal Office for the Protection of the Constitution, Germany's domestic security agency ...
, President of the German domestic security agency BfV BFV may refer to:
* Baden Football Association, the ''Badischer Fussball-Verband'', a regional football association in Germany
* Bavarian Football Association, the ''Bayerischer Fussball-Verband'', a regional football association in Germany
* Berli ...
, made several visits to the headquarters of the NSA. According to classified
Classified may refer to:
General
*Classified information, material that a government body deems to be sensitive
*Classified advertising or "classifieds"
Music
*Classified (rapper) (born 1977), Canadian rapper
*The Classified, a 1980s American roc ...
documents of the German government, Maaßen had agreed to transfer all data collected by the BfV via XKeyscore to the NSA. In addition, the BfV has been working very closely with eight other U.S. government agencies, including the CIA
The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
.
* – The SIGINT National Unit of Israel routinely receives raw intelligence data (including those of U.S. citizens) from the NSA. (See also: Memorandum of understanding between the NSA and Israel)
* – The Algemene Inlichtingen en Veiligheidsdienst (''General Intelligence and Security Service'') of the Netherlands has been receiving and storing user information gathered by U.S. intelligence sources such as PRISM
Prism usually refers to:
* Prism (optics), a transparent optical component with flat surfaces that refract light
* Prism (geometry), a kind of polyhedron
Prism may also refer to:
Science and mathematics
* Prism (geology), a type of sedimentary ...
.
* – The Defence Ministry of Singapore and its Security and Intelligence Division
The Security and Intelligence Division (SID) is the foreign intelligence service of Singapore under the purview of the Ministry of Defence (MINDEF), tasked with gathering, processing and analysing national security information from around the w ...
have been secretly intercepting much of the fibre optic cable traffic passing through the Asian continent. Information gathered by the Government of Singapore is transferred to the Government of Australia as part of an intelligence sharing agreement. This allows the "Five Eyes" to maintain a "stranglehold on communications across the Eastern Hemisphere".
* – The National Defence Radio Establishment of Sweden (codenamed Sardines) has been working extensively with the NSA, and it has granted the "five eyes" access to underwater cables in the Baltic Sea
The Baltic Sea is an arm of the Atlantic Ocean that is enclosed by Denmark, Estonia, Finland, Germany, Latvia, Lithuania, Poland, Russia, Sweden and the North and Central European Plain.
The sea stretches from 53°N to 66°N latitude and fr ...
.
* – The Federal Intelligence Service
The Federal Intelligence Service (German: ; , BND) is the foreign intelligence agency of Germany, directly subordinate to the Chancellor's Office. The BND headquarters is located in central Berlin and is the world's largest intelligence headq ...
(FSI) of Switzerland regularly exchanges information with the NSA, based on a secret agreement. In addition, the NSA has been granted access to Swiss monitoring facilities in Leuk
Leuk (french: Loèche-Ville) is a municipality in the district of Leuk in the canton of Valais in Switzerland. On 1 January 2013, the former municipality of Erschmatt merged into the municipality of Leuk.[canton
Canton may refer to:
Administrative division terminology
* Canton (administrative division), territorial/administrative division in some countries, notably Switzerland
* Township (Canada), known as ''canton'' in Canadian French
Arts and ent ...]
of Valais
Valais ( , , ; frp, Valês; german: Wallis ), more formally the Canton of Valais,; german: Kanton Wallis; in other official Swiss languages outside Valais: it, (Canton) Vallese ; rm, (Chantun) Vallais. is one of the 26 cantons forming the S ...
) and Herrenschwanden (canton of Bern).
Aside from the "Five Eyes", most other Western countries are also participating in the NSA surveillance system and sharing information with each other. However, being a partner of the NSA does not automatically exempt a country from being targeted by the NSA. According to an internal NSA document leaked by Snowden, "We (the NSA) can, and often do, target the signals of most 3rd party foreign partners."
Examples of members of the "Five Eyes
The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in si ...
" spying for each other:
* On behalf of the British Prime Minister
A prime minister, premier or chief of cabinet is the head of the cabinet and the leader of the ministers in the executive branch of government, often in a parliamentary or semi-presidential system. Under those systems, a prime minister is ...
Margaret Thatcher
Margaret Hilda Thatcher, Baroness Thatcher (; 13 October 19258 April 2013) was Prime Minister of the United Kingdom from 1979 to 1990 and Leader of the Conservative Party from 1975 to 1990. She was the first female British prime ...
, the Security Intelligence Service of Canada spied on two British cabinet ministers in 1983.
* The U.S. National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
spied on and intercepted the phone calls of Princess Diana
Diana, Princess of Wales (born Diana Frances Spencer; 1 July 1961 – 31 August 1997) was a member of the British royal family. She was the first wife of King Charles III (then Prince of Wales) and mother of Princes William and Harry. Her a ...
right until she died in a Paris car crash with Dodi Fayed in 1997. The NSA currently holds 1,056 pages of classified information about Princess Diana, which cannot be released to the public because their disclosure is expected to cause "''exceptionally grave damage''" to the national security of the United States.
Uses of intercepted data
Most of the NSA's collected data which was seen by human eyes (i.e., used by NSA operatives) was used in accordance with the stated objective of combating terrorism.
Other than to combat terrorism, these surveillance programs have been employed to assess the foreign policy and economic stability of other countries.
According to reports by Brazil's O Globo newspaper, the collected data was also used to target "commercial secrets". In a statement addressed to the National Congress of Brazil
The National Congress of Brazil ( pt, Congresso Nacional do Brasil) is the legislative body of Brazil's federal government. Unlike the state legislative assemblies and municipal chambers, the Congress is bicameral, composed of the Federal Sen ...
, journalist Glenn Greenwald
Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author and lawyer. In 2014, he cofounded ''The Intercept'', of which he was an editor until he resigned in October 2020. Greenwald subsequently started publishing on Substa ...
testified that the U.S. government uses counter-terrorism
Counterterrorism (also spelled counter-terrorism), also known as anti-terrorism, incorporates the practices, military tactics, techniques, and strategies that Government, governments, law enforcement, business, and Intelligence agency, intellig ...
as a "pretext" for clandestine surveillance in order to compete with other countries in the "business, industrial and economic fields".
In an interview with '' Der Spiegel'' published on 12 August 2013, former NSA Director Michael Hayden admitted that "We he NSA
He or HE may refer to:
Language
* He (pronoun), an English pronoun
* He (kana), the romanization of the Japanese kana へ
* He (letter), the fifth letter of many Semitic alphabets
* He (Cyrillic), a letter of the Cyrillic script called ''He'' ...
steal secrets. We're number one in it". Hayden also added that "We steal stuff to make you safe, not to make you rich".
According to documents seen by the news agency Reuters
Reuters ( ) is a news agency owned by Thomson Reuters Corporation. It employs around 2,500 journalists and 600 photojournalists in about 200 locations worldwide. Reuters is one of the largest news agencies in the world.
The agency was est ...
, information obtained in this way is subsequently funnelled to authorities across the nation to help them launch criminal investigations of Americans. Federal agents are then instructed to "recreate" the investigative trail in order to "cover up" where the information originated, known as parallel construction. (Were the true origins known, the evidence and resulting case might be invalidated as "fruit of the poisonous tree
Fruit of the poisonous tree is a legal metaphor used to describe evidence that is obtained illegally. The logic of the terminology is that if the source (the "tree") of the evidence or evidence itself is tainted, then anything gained (the "fruit") ...
", a legal doctrine designed to deter abuse of power
Abuse is the improper usage or treatment of a thing, often to unfairly or improperly gain benefit. Abuse can come in many forms, such as: physical or verbal maltreatment, injury, assault, violation, rape, unjust practices, crimes, or other t ...
that prevents evidence
Evidence for a proposition is what supports this proposition. It is usually understood as an indication that the supported proposition is true. What role evidence plays and how it is conceived varies from field to field.
In epistemology, eviden ...
or subsequent events being used in a case if they resulted from a search or other process that does not conform to legal requirements.)
According to NSA Chief Compliance Officer John DeLong, most violations of the NSA's rules were self-reported, and most often involved spying on personal love interest
''Gli Innamorati'' (, meaning "The Lovers") were stock characters within the theatre style known as commedia dell'arte, who appeared in 16th century Italy. In the plays, everything revolved around the Lovers in some regard. These dramatic and pos ...
s using surveillance technology of the agency.
Most agricultural surveillance is not covert and is carried out by government agencies such as APHIS
''Aphis'' is a genus of insects in the family Aphididae containing at least 600 species of aphids. It includes many notorious agricultural pests, such as the soybean aphid '' Aphis glycines''. Many species of ''Aphis'', such as '' A. coreopsidis ...
(USDA's Animal and Plant Health Inspection Service). DHS has lamented the limited surveillance coverage provided by these inspections and works to augment this protection with their own resources.
See also
* Censorship in the United States
Censorship in the United States involves the suppression of speech or public communication and raises issues of freedom of speech, which is protected by the First Amendment to the United States Constitution. Interpretation of this fundamen ...
* Domain Awareness System
* Freedom of speech in the United States
In the United States, freedom of speech and expression is strongly protected from government restrictions by the First Amendment to the United States Constitution, many state constitutions, and state and federal laws. Freedom of speech, also c ...
* Global surveillance
Global mass surveillance can be defined as the mass surveillance of entire populations across national borders.
Its existence was not widely acknowledged by governments and the mainstream media until the global surveillance disclosures by Edwa ...
* Internet censorship in the United States
Internet censorship in the United States is the suppression of information published or viewed on the Internet in the United States. The First Amendment of the United States Constitution protects freedom of speech and expression against federal, ...
* Labor spying in the United States
Labor spying in the United States had involved people recruited or employed for the purpose of gathering intelligence, committing sabotage, sowing dissent, or engaging in other similar activities, in the context of an employer/labor organization ...
* List of Americans under surveillance
This is a list of some of the prominent U.S. citizens who are known to have been put under surveillance by the federal government of the United States.
Activists
* Helen Keller
* Martin Luther King Jr.
Businesspersons
* Bernard Baruch
How ...
* List of government mass surveillance projects
This is a list of government surveillance projects and related databases throughout the world.
International
* ECHELON: A signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the ...
* Mass surveillance in the United Kingdom
The use of electronic surveillance by the United Kingdom grew from the development of signal intelligence and pioneering code breaking during World War II. In the post-war period, the Government Communications Headquarters (GCHQ) was forme ...
* Police surveillance in New York City
The New York City Police Department (NYPD) actively monitors public activity in New York City, New York, United States. Historically, surveillance has been used by the NYPD for a range of purposes, including against crime, counter-terrorism, and a ...
References
External links
* Dozens of articles about the U.S. National Security Agency and its spying and surveillance programs
''CriMNet Evaluation Report''
by the Office of the Legislative Auditor of Minnesota, March 2004; part of a program to improve sharing of criminal justice information.
* Smyth, Daniel
"Avoiding Bloodshed? US Journalists and Censorship in Wartime"
''War & Society'', Volume 32, Issue 1, 2013. .
* Deflem, Mathieu; Silva, Derek, M.D.; and Anna S. Rogers. 2018
pp. 109–125 in ''The Cambridge Handbook of Social Problems'', Volume 2, edited by A. Javier Treviño. New York: Cambridge University Press.
{{DEFAULTSORT:Mass Surveillance in the United States
United States
The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., federal district, five ma ...
Espionage in the United States
Human rights abuses in the United States
United States
The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., federal district, five ma ...