List of government surveillance projects
   HOME

TheInfoList



OR:

This is a list of government surveillance projects and related databases throughout the world.


International

*
ECHELON ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:Given the 5 dialects that use ...
: A
signals intelligence Signals intelligence (SIGINT) is intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication ( ...
(SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement.


European Union

*
Data Retention Directive The Data Retention Directive (Directive 2006/24/EC), a directive, later declared invalid by the European Court of Justice, was at first passed on 15 March 2006 and regulated data retention, where data has been generated or processed in connect ...
: A directive requiring EU member states to store citizens' telecommunications data for six to 24 months and allowing police and security agencies to request access from a court to details such as IP address and time of use of every email, phone call, and text message sent or received. *
INDECT INDECT is a research project in the area of intelligent security systems performed by several European universities since 2009 and funded by the European Union. The purpose of the project is to involve European scientists and researchers in the d ...
: Research project funded by the
European Union The European Union (EU) is a supranational political and economic union of member states that are located primarily in Europe. The union has a total area of and an estimated total population of about 447million. The EU has often been des ...
to develop surveillance methods (e.g. processing of CCTV camera data streams) for the monitoring of abnormal behaviours in an
urban Urban means "related to a city". In that sense, the term may refer to: * Urban area, geographical area distinct from rural areas * Urban culture, the culture of towns and cities Urban may also refer to: General * Urban (name), a list of people ...
environment. *
Schengen Information System The Schengen Information System (SIS) is a governmental database maintained by the European Commission. The SIS is used by 31 European countries to find information about individuals and entities for the purposes of national security, border co ...
: A database kept for
national security National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military atta ...
and
law enforcement Law enforcement is the activity of some members of government who act in an organized manner to enforce the law by discovering, deterring, rehabilitating, or punishing people who violate the rules and norms governing that society. The term en ...
purposes.


National


Australia

* In August 2014 it was reported that law-enforcement agencies had been accessing Australians' web browsing histories via
internet provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
s such as
Telstra Telstra Group Limited is an Australian telecommunications company that builds and operates telecommunications networks and markets voice, mobile, internet access, pay television and other products and services. It is a member of the S&P/ASX 20 ...
without a warrant. * It was reported that Australia had issued 75% more wiretap warrants in 2003 than the US did and this was 26 times greater than the US on a per capita basis.


China

*
Golden Shield Project The Golden Shield Project (), also named National Public Security Work Informational Project, is the Chinese nationwide network-security fundamental constructional project by the e-government of the People's Republic of China. This project i ...
: Also known as the "Great Firewall of China", it is a
censorship Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governments ...
and
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as c ...
project operated by the Ministry of Public Security (MPS) division of the
government of the People's Republic of China The Government of the People's Republic of China () is an authoritarian political system in the People's Republic of China under the exclusive political leadership of the Chinese Communist Party (CCP). It consists of legislative, executive, mili ...
. The project was initiated in 1998 and began operations in November 2003. * The Integrated Joint Operations Platform (IJOP, 一体化联合作战平台) is used by the government to monitor the population, particularly
Uyghurs The Uyghurs; ; ; ; zh, s=, t=, p=Wéiwú'ěr, IPA: ( ), alternatively spelled Uighurs, Uygurs or Uigurs, are a Turkic ethnic group originating from and culturally affiliated with the general region of Central and East Asia. The Uyghur ...
. The platform gathers
biometrics Biometrics are body measurements and calculations related to human characteristics. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify in ...
, including DNA samples, to track individuals in
Xinjiang Xinjiang, SASM/GNC: ''Xinjang''; zh, c=, p=Xīnjiāng; formerly romanized as Sinkiang (, ), officially the Xinjiang Uygur Autonomous Region (XUAR), is an autonomous region of the People's Republic of China (PRC), located in the northwest ...
. * Monitoring Bureau * Public Information Network Security *
Social Credit System The Social Credit System () is a national credit rating and blacklist being developed by the government of the People's Republic of China. The social credit initiative calls for the establishment of a record system so that businesses, indivi ...


France

*
Frenchelon "Frenchelon" is the nickname given to the signal intelligence system operated by France. The name is a reference to its Anglo-American counterpart ECHELON. History Its existence has never been officially acknowledged by French authorities, alth ...
: A data collection and analysis network operated by the French
Directorate-General for External Security The General Directorate for External Security (french: link=no, Direction générale de la Sécurité extérieure, DGSE) is France's foreign intelligence agency, equivalent to the British MI6 and the American CIA, established on 2 April 1982. ...
.


Germany

*
Nachrichtendienstliches Informationssystem The Nachrichtendienstliches Informationssystem (NADIS) (''Intelligence agency information system'') is a searchable database operated by the German domestic security agency Bundesamt für Verfassungsschutz (BfV). Data stored in the system is readily ...
: a searchable database operated by the German security agency
Bundesamt für Verfassungsschutz The Federal Office for the Protection of the Constitution (german: Bundesamt für Verfassungsschutz or BfV, often ''Bundesverfassungsschutz'') is Germany's federal domestic intelligence agency. Together with the Landesämter für Verfassungss ...
(BfV). *
Project 6 Project 6, or simply P6, is a global surveillance project jointly operated by U.S. Central Intelligence Agency (CIA) in close cooperation with the German intelligence agencies Bundesnachrichtendienst (BND) and Bundesamt für Verfassungsschutz (BfV ...
: a
global surveillance Global mass surveillance can be defined as the mass surveillance of entire populations across national borders. Its existence was not widely acknowledged by governments and the mainstream media until the global surveillance disclosures by Edwar ...
project jointly operated by the German intelligence agencies
Bundesnachrichtendienst The Federal Intelligence Service (German: ; , BND) is the foreign intelligence agency of Germany, directly subordinate to the Chancellor's Office. The BND headquarters is located in central Berlin and is the world's largest intelligence head ...
(BND) and
Bundesamt für Verfassungsschutz The Federal Office for the Protection of the Constitution (german: Bundesamt für Verfassungsschutz or BfV, often ''Bundesverfassungsschutz'') is Germany's federal domestic intelligence agency. Together with the Landesämter für Verfassungss ...
(BfV) in close cooperation with the U.S.
Central Intelligence Agency The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
(CIA).


India

* Central Monitoring System (CMS): A data collection system similar to the NSA's
PRISM Prism usually refers to: * Prism (optics), a transparent optical component with flat surfaces that refract light * Prism (geometry), a kind of polyhedron Prism may also refer to: Science and mathematics * Prism (geology), a type of sedimentary ...
program. It enables the
Government of India The Government of India (ISO: ; often abbreviated as GoI), known as the Union Government or Central Government but often simply as the Centre, is the national government of the Republic of India, a federal democracy located in South Asia, c ...
to listen to phone conversations, intercept
e-mail Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" meant ...
s and text messages, monitor posts on
social networking service A social networking service or SNS (sometimes called a social networking site) is an online platform which people use to build social networks or social relationships with other people who share similar personal or career content, interests, act ...
and track searches on
Google Google LLC () is an American multinational technology company focusing on search engine technology, online advertising, cloud computing, computer software, quantum computing, e-commerce, artificial intelligence, and consumer electronics. ...
. *
DRDO NETRA The DRDO Netra is an Indian, light-weight, autonomous unmanned aerial vehicle, UAV for surveillance and reconnaissance operations. It has been jointly developed by the Research and Development Establishment (R&DE), and IdeaForge, a Mumbai-based ...
: Network that is capable of tracking online communications on a real time basis by harvesting data from various
voice-over-IP Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. The terms Internet t ...
services, including
Skype Skype () is a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for VoIP-based videotelephony, videoconferencing and voice calls. It also has instant messaging, file transfer, deb ...
and
Google Talk Google Talk was an Instant messaging, instant messaging service that provided both text and voice communication. The instant messaging service was variously referred to colloquially as Gchat, Gtalk, or Gmessage among its users. Google Talk was ...
. It is operated by the
Research and Analysis Wing The Research and Analysis Wing (abbreviated R&AW; hi, ) is the foreign intelligence agency of India. The agency's primary function is gathering foreign intelligence, counter-terrorism, counter-proliferation, advising Indian policymakers, an ...
. *
NATGRID The National Intelligence Grid or NATGRID is the integrated intelligence master database structure for counter-terrorism purpose connecting databases of various core security agencies under Government of India collecting comprehensive patterns pr ...
: An intelligence grid that links the databases of several departments and ministries of the Government of India.


Russia

*
SORM The System for Operative Investigative Activities (SORM; russian: Система оперативно-разыскных мероприятий) is the technical specification for lawful interception interfaces of telecommunications and telephone n ...
: A technical system used by the
Federal Security Service of the Russian Federation The Federal Security Service of the Russian Federation (FSB) RF; rus, Федеральная служба безопасности Российской Федерации (ФСБ России), Federal'naya sluzhba bezopasnosti Rossiyskoy Feder ...
to monitor
internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
and
telephone A telephone is a telecommunications device that permits two or more users to conduct a conversation when they are too far apart to be easily heard directly. A telephone converts sound, typically and most efficiently the human voice, into e ...
communication. * СAMERTON: Is a global vehicle tracking system, control and tracking, identification of probable routes and places of the most frequent appearance of a particular vehicle, integrated with a distributed network of radar complexes of photo-video fixation and road surveillance camera. Developed and implemented by th
"Advanced Scientific - Research Projects"
enterprise St. Petersburg. Within the framework of the practical use of the system of the Ministry of Internal Affairs of the Russian Federation, it has made it possible to identify and solve grave and especially grave crimes, the system is also operated by other state services and departments; *
Yarovaya Law The Yarovaya law (in Russian: Закон Яровой, transliteration: ''Zakon Jarovoy''), also Yarovaya package/bag, is a set of two Russian federal bills, 374-FZ and 375-FZ, passed in 2016. The bills amend previous counter-terrorism laws and ...
is a piece of anti-terrorist legislation that includes a requirement to store all phone call and text messaging data, as well as providing cryptographic backdoors for security services.


Sweden

*
Titan traffic database The Titan traffic database is a database allegedly in use by the Swedish signals intelligence agency, the National Defence Radio Establishment The National Defence Radio Establishment ( sv, Försvarets radioanstalt, FRA) is a Swedish governm ...
: A
database In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases sp ...
established by the Swedish National Defence Radio Establishment (Swedish: Försvarets radioanstalt, FRA) where
call detail record A call detail record (CDR) is a data record produced by a telephone exchange or other telecommunications equipment that documents the details of a telephone call or other telecommunications transactions (e.g., text message) that passes through that ...
s (CDRs) of
telephony Telephony ( ) is the field of technology involving the development, application, and deployment of telecommunication services for the purpose of electronic transmission of voice, fax, or data, between distant parties. The history of telephony is i ...
and
internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
traffic Traffic comprises pedestrians, vehicles, ridden or herded animals, trains, and other conveyances that use public ways (roads) for travel and transportation. Traffic laws govern and regulate traffic, while rules of the road include traffic ...
and transaction data (IPDRs) concerning international telecommunications are stored. *
X-Keyscore XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in Real-time, real time. The NSA has shared XKeyscore with other ...
: A system used by the United States National Security Agency for searching and analysing internet data about foreign nationals. FRA has been granted access to the program.


Switzerland

*
Onyx Onyx primarily refers to the parallel banded variety of chalcedony, a silicate mineral. Agate and onyx are both varieties of layered chalcedony that differ only in the form of the bands: agate has curved bands and onyx has parallel bands. The c ...
: A data gathering system maintained by several
Swiss intelligence agencies The Swiss intelligence community is a group of agencies with responsibilities to protect the interests and infrastructure of Switzerland. History The first federal military secret service was established in 1937-1939 as Büro Ha by Hans Hau ...
to monitor military and civilian communications, such as
e-mails Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic (digital) version of, or counterpart to, mail, at a time when "mail" meant ...
,
telefax Fax (short for facsimile), sometimes called telecopying or telefax (the latter short for telefacsimile), is the telephonic transmission of scanned printed material (both text and images), normally to a telephone number connected to a printer o ...
and telephone calls. In 2001, Onyx received its second nomination for the ironically named "
Big Brother Award The Big Brother Awards (BBAs) recognize "the government and private sector organizations ... which have done the most to threaten personal privacy". They are named after the George Orwell character Big Brother from the novel ''Nineteen Ei ...
".


United Kingdom

* Impact Nominal Index: The Impact Nominal Index or INI is a computer system that enables the UK police force to establish whether other relevant authorities are holding information regarding a person of interest. *
Interception Modernisation Programme The Interception Modernisation Programme (IMP) was a UK government initiative to extend the government's capabilities for lawful interception and storage of communications data. It was widely reported that the IMP's eventual goal was to store detai ...
: An initiative to extend the
UK government ga, Rialtas a Shoilse gd, Riaghaltas a Mhòrachd , image = HM Government logo.svg , image_size = 220px , image2 = Royal Coat of Arms of the United Kingdom (HM Government).svg , image_size2 = 180px , caption = Royal Arms , date_es ...
's capability to lawfully intercept and store
communications data Communications data (sometimes referred to as traffic data or metadata) concerns information about communication. Communications data is a part of a message that should be distinguished from the content of the message. It contains data on the co ...
in a central database. *
Mastering the Internet Mastering the Internet (MTI) is a mass surveillance project led by the British communications intelligence agency Government Communications Headquarters (GCHQ) budgeted at over £1 billion. According to reports in ''The Register'' and ''The Sunday ...
(MTI): A clandestine
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizati ...
program led by the British intelligence agency
GCHQ Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Unit ...
. Data gathered by the GCHQ include the contents of
email Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" meant ...
messages, entries on the social networking platform
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin M ...
and the
web browsing history Web browsing history refers to the list of web pages a user has visited, as well as associated metadata such as page title and time of visit. It is usually stored locally by web browsers in order to provide the user with a history list to go back ...
of internet users. *
UK National DNA Database The United Kingdom National DNA Database (NDNAD; officially the ''UK National Criminal Intelligence DNA Database'') is a national DNA Database that was set up in 1995. In 2005 it had 3.1 million profiles and in 2020 it had 6.6 million profiles ...
(NDNAD): It is also the oldest national DNA database in the world. Since its establishment in 1995, the database has grown to include DNA samples from 2.7 million individuals, or 5.2% of the UK's population, many of whom have neither been charged with, or convicted of, any offence. *
Tempora Tempora is the codeword for a formerly-secret computer system that is used by the British Government Communications Headquarters (GCHQ). This system is used to buffer most Internet communications that are extracted from fibre-optic cables, so t ...
: Launched in the autumn of 2011, this initiative allows the
GCHQ Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Unit ...
to set up a large-scale
buffer Buffer may refer to: Science * Buffer gas, an inert or nonflammable gas * Buffer solution, a solution used to prevent changes in pH * Buffering agent, the weak acid or base in a buffer solution * Lysis buffer, in cell biology * Metal ion buffer * ...
that is capable of storing internet content for 3 days and
metadata Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive metadata – the descriptive ...
for 30 days. * Royal Concierge: prototyped in 2010, sends daily alerts to
GCHQ Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Unit ...
whenever a booking is made from a ".gov."
second-level domain In the Domain Name System (DNS) hierarchy, a second-level domain (SLD or 2LD) is a domain that is directly below a top-level domain (TLD). For example, in , is the second-level domain of the TLD. Second-level domains commonly refer to the organ ...
at select hotels worldwide. *Collection of
Internet Connection Record , collection of Internet Connection Records is being secretly trialled by two major British ISPs as part of a technical trial for mass surveillance under the Investigatory Powers Act 2016. The Home Office and National Crime Agency are also partici ...
s, being trialled in the UK as of March 2021.


United States

*
Boundless Informant Boundless Informant (stylized as BOUNDLESSINFORMANT) is a big data analysis and data visualization tool used by the United States National Security Agency (NSA). It gives NSA managers summaries of the NSA's worldwide data collection activities by ...
: A system deployed by the
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
to analyze global electronic information. In March 2013, Boundless Informant gathered 14 billion data reports from
Iran Iran, officially the Islamic Republic of Iran, and also called Persia, is a country located in Western Asia. It is bordered by Iraq and Turkey to the west, by Azerbaijan and Armenia to the northwest, by the Caspian Sea and Turkmeni ...
, 6.3 billion from
India India, officially the Republic of India (Hindi: ), is a country in South Asia. It is the seventh-largest country by area, the second-most populous country, and the most populous democracy in the world. Bounded by the Indian Ocean on the so ...
, and 2.8 billion from the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territorie ...
. * BULLRUN: a highly classified U.S.
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
program to preserve its ability to eavesdrop on encrypted communications by influencing and weakening encryption standards, by obtaining master encryption keys, and by gaining access to data before or after it is encrypted either by agreement, by force of law, or by computer network exploitation (hacking). *
Carnivore A carnivore , or meat-eater (Latin, ''caro'', genitive ''carnis'', meaning meat or "flesh" and ''vorare'' meaning "to devour"), is an animal or plant whose food and energy requirements derive from animal tissues (mainly muscle, fat and other sof ...
: A system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. Apparently replaced by commercial software such as
NarusInsight Narus Inc. was a Software industry, software company and Independent software vendor, vendor of big data analytics for cybersecurity. History In 1997, Ori Cohen, Vice President of Business and Technology Development for VDONet, founded Narus with ...
. *
Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative (CNCI) outlines U.S. cybersecurity goals across multiple agencies including the Department of Homeland Security, the Office of Management and Budget, and the National Security Agency. The initiativ ...
* DCSNet: The
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, ...
(FBI)'s
point-and-click Point and click are the actions of a computer user moving a pointer to a certain location on a screen (''pointing'') and then pressing a button on a mouse, usually the left button (''click''), or other pointing device. An example of point and ...
surveillance system that can perform instant wiretaps on any telecommunications device located in the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territorie ...
.Point, Click ... Eavesdrop: How the FBI Wiretap Net Operates
* Fairview: A
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizati ...
program directed at foreign mobile phone users. *
Financial Crimes Enforcement Network The Financial Crimes Enforcement Network (FinCEN) is a bureau of the United States Department of the Treasury that collects and analyzes information about financial transactions in order to combat domestic and international money laundering, terr ...
: A bureau of the Department of the Treasury that collects and analyzes financial transactions in order to combat
financial crimes Financial crime is crime committed against property, involving the unlawful conversion of the ownership of property (belonging to one person) to one's own personal use and benefit. Financial crimes may involve fraud (cheque fraud, credit card f ...
. * ICREACH: Surveillance frontend
GUI The GUI ( "UI" by itself is still usually pronounced . or ), graphical user interface, is a form of user interface that allows users to interact with electronic devices through graphical icons and audio indicator such as primary notation, inste ...
that is shared with 23 government agencies, including the
CIA The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian intelligence agency, foreign intelligence service of the federal government of the United States, officially tasked with gat ...
,
DEA The Drug Enforcement Administration (DEA; ) is a United States federal law enforcement agency under the U.S. Department of Justice tasked with combating drug trafficking and distribution within the U.S. It is the lead agency for domestic en ...
, and
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and its principal Federal law enforcement in the United States, federal law enforcement age ...
, to search illegally collected personal records. *
Magic Lantern The magic lantern, also known by its Latin name , is an early type of image projector that used pictures—paintings, prints, or photographs—on transparent plates (usually made of glass), one or more lenses, and a light source. Because a si ...
: A
keystroke logging Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored ...
software Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work. At the lowest programming level, executable code consists ...
deployed by the FBI in the form of an
e-mail attachment An email attachment is a computer file sent along with an email message. One or more files can be attached to any email message, and be sent along with it to the recipient. This is typically used as a simple method to share documents and images. ...
. When activated, it acts as a
trojan horse The Trojan Horse was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer's ''Iliad'', with the poem ending before the war is concluded, ...
and allows the FBI to decrypt user communications. *
Main Core Main Core is an alleged American government database containing information on those believed to be threats to national security. History The existence of the database was first asserted in May 2008 by Christopher Ketcham and again in July 200 ...
: A personal and financial database storing information of millions of U.S. citizens believed to be threats to
national security National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military atta ...
. The data mostly comes from the
NSA The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
,
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and its principal Federal law enforcement in the United States, federal law enforcement age ...
,
CIA The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian intelligence agency, foreign intelligence service of the federal government of the United States, officially tasked with gat ...
, as well as other government sources. *
MAINWAY MAINWAY is a database maintained by the United States' National Security Agency (NSA) containing metadata for hundreds of billions of telephone calls made through the largest telephone carriers in the United States, including AT&T, Verizon, and ...
: NSA database containing
metadata Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive metadata – the descriptive ...
for hundreds of billions of
telephone call A telephone call is a connection over a telephone network A telephone network is a telecommunications network that connects telephones, which allows telephone calls between two or more parties, as well as newer features such as fax and interne ...
s made through the four largest telephone carriers in the United States. * Media monitoring services, A proposed DHS database for monitoring all global news sources and media influencers. *
MUSCULAR Skeletal muscles (commonly referred to as muscles) are organs of the vertebrate muscular system and typically are attached by tendons to bones of a skeleton. The muscle cells of skeletal muscles are much longer than in the other types of muscle ...
: Overseas wiretapping of
Google Google LLC () is an American multinational technology company focusing on search engine technology, online advertising, cloud computing, computer software, quantum computing, e-commerce, artificial intelligence, and consumer electronics. ...
's and
Yahoo Yahoo! (, styled yahoo''!'' in its logo) is an American web services provider. It is headquartered in Sunnyvale, California and operated by the namesake company Yahoo! Inc. (2017–present), Yahoo Inc., which is 90% owned by investment funds ma ...
's unencrypted internal networks by the NSA. * MYSTIC is a voice interception program used by the National Security Agency. *
Nationwide Suspicious Activity Reporting Initiative The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) is a program of the United States Government used to collect and share reports of suspicious activity by people in the United States. The Nationwide SAR Initiative (NSI) builds ...
: Under this government initiative, a
Suspicious Activity Report In financial regulation, a Suspicious Activity Report (SAR) or Suspicious Transaction Report (STR) is a report made by a financial institution about suspicious or potentially suspicious activity. The criteria to decide when a report must be ma ...
(SAR) may be filed by law enforcers, public safety personnel, owners of critical infrastructure or the general public. *
NSA ANT catalog The ANT catalog (or TAO catalog) is a classified product catalog by the U.S. National Security Agency (NSA) of which the version written in 2008–2009 was published by German news magazine ''Der Spiegel'' in December 2013. Forty-nine catalog ...
: a 50-page document listing technology available to the United States National Security Agency (NSA) ANT division to aid in cyber-surveillance. *
PRISM Prism usually refers to: * Prism (optics), a transparent optical component with flat surfaces that refract light * Prism (geometry), a kind of polyhedron Prism may also refer to: Science and mathematics * Prism (geology), a type of sedimentary ...
: A clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) which can target customers of participating corporations outside or inside the United States. *
Room 641A Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency, as part of its warrantless surveillance program as authorized by the Patriot Act. The facility commenced operations in 2003 and its ...
: A telecommunication interception facility operated by
AT&T AT&T Inc. is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the world's largest telecommunications company by revenue and the third largest provider of mobile tel ...
for the U.S. National Security Agency. * Sentry Eagle: efforts to monitor and attack an adversary's cyberspace through capabilities include SIGINT, Computer Network Exploitation (CNE), Information Assurance, Computer Network Defense (CND), Network Warfare, and Computer Network Attack (CNA). The efforts included weakening US commercial encryption systems. *
Special Collection Service The Special Collection Service (SCS), codenamed F6, is a highly classified joint U.S. Central Intelligence Agency–National Security Agency program charged with inserting eavesdropping equipment in difficult-to-reach places, such as foreign em ...
(SCS): A
black budget A black budget or covert appropriation is a government budget that is allocated for classified or other secret operations of a nation. The black budget is an account expenses and spending related to military research and covert operations. The ...
program that is responsible for "close surveillance, burglary, wiretapping, breaking and entering." It employs
covert listening device A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and ...
technologies to bug foreign embassies, communications centers, computer facilities, fiber-optic networks, and government installations. *
Stellar Wind (code name) A stellar wind is a flow of gas ejected from the upper atmosphere of a star. It is distinguished from the bipolar outflows characteristic of young stars by being less collimated, although stellar winds are not generally spherically symmetric. D ...
: The
open secret An open secret is a concept or idea that is "officially" (''de jure'') secret or restricted in knowledge, but in practice (''de facto'') is widely known; or it refers to something that is widely known to be true but which none of the people most i ...
code name A code name, call sign or cryptonym is a code word or name used, sometimes clandestinely, to refer to another name, word, project, or person. Code names are often used for military purposes, or in espionage. They may also be used in industrial c ...
for four surveillance programs. *
Tailored Access Operations The Office of Tailored Access Operations (TAO), now Computer Network Operations, and structured as S32, is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA). It has been active since at least 1998, possibly 1997, ...
: Intelligence-gathering unit of the NSA that is capable of harvesting approximately 2
petabyte The byte is a unit of digital information that most commonly consists of eight bits. Historically, the byte was the number of bits used to encode a single character of text in a computer and for this reason it is the smallest addressable unit ...
s of data per hour. *
Terrorist Finance Tracking Program The Terrorist Finance Tracking Program (TFTP) is a United States government program to access financial transactions on the international SWIFT network that was revealed by ''The New York Times'', ''The Wall Street Journal'' and ''The Los Angeles T ...
: A joint initiative run by the
CIA The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian intelligence agency, foreign intelligence service of the federal government of the United States, officially tasked with gat ...
and the Department of the Treasury to access the SWIFT (
Society for Worldwide Interbank Financial Telecommunication Swift or SWIFT most commonly refers to: * SWIFT, an international organization facilitating transactions between banks ** SWIFT code * Swift (programming language) * Swift (bird), a family of birds It may also refer to: Organizations * SWIFT, a ...
) transaction database as part of the Bush administration's "Global
War on Terrorism The war on terror, officially the Global War on Terrorism (GWOT), is an ongoing international counterterrorism military campaign initiated by the United States following the September 11 attacks. The main targets of the campaign are militant I ...
". According to the U.S. government, its efforts to counter terrorist activities were compromised after the existence of the Terrorist Finance Tracking Program was leaked to the media. *
Turbulence In fluid dynamics, turbulence or turbulent flow is fluid motion characterized by chaotic changes in pressure and flow velocity. It is in contrast to a laminar flow, which occurs when a fluid flows in parallel layers, with no disruption between ...
(NSA): Turbulence is a United States National Security Agency (NSA) information-technology project started circa 2005. It was developed in small, inexpensive "test" pieces rather than one grand plan like its failed predecessor, the
Trailblazer Project Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell ...
. It also includes offensive cyberwarfare capabilities, like injecting malware into remote computers. The U.S. Congress criticized the project in 2007 for having similar bureaucratic problems as the Trailblazer Project. *
US Intelligence Community The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territori ...
(IC): A cooperative federation of 16 government agencies working together, but also separately, to gather intelligence and conduct
espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangibl ...
. *
Utah Data Center The Utah Data Center (UDC), also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, is a data storage facility for the United States Intelligence Community that is designed to store data estimated to b ...
: The Intelligence Community's US$1.5 billion
data storage Data storage is the recording (storing) of information (data) in a storage medium. Handwriting, phonographic recording, magnetic tape, and optical discs are all examples of storage media. Biological molecules such as RNA and DNA are conside ...
center that is designed to store extremely large amounts of data, on the scale of yottabytes. *
X-Keyscore XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in Real-time, real time. The NSA has shared XKeyscore with other ...
: A system used by the United States National Security Agency for searching and analysing internet data about foreign nationals.


Unclear origin

* GhostNet: A fictitious code name given to a large-scale surveillance project that is believed to be operated by the
People's Republic of China China, officially the People's Republic of China (PRC), is a country in East Asia. It is the world's most populous country, with a population exceeding 1.4 billion, slightly ahead of India. China spans the equivalent of five time zones and ...
. *
Stuxnet Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition ( SCADA) systems and is believed to be responsible for causing su ...
: It is the first discovered
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
that spies on industrial systems, and it was used to attack
Iran Iran, officially the Islamic Republic of Iran, and also called Persia, is a country located in Western Asia. It is bordered by Iraq and Turkey to the west, by Azerbaijan and Armenia to the northwest, by the Caspian Sea and Turkmeni ...
's nuclear facilities. It is believed to have originated from the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territorie ...
under the Bush administration.


Recently discontinued

* ''
Information Awareness Office The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology ...
'': An office established to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other threats to U.S. national security. *
Multistate Anti-Terrorism Information Exchange The Multistate Anti-Terrorism Information Exchange Program, also known by the acronym MATRIX, was a U.S. federally funded data mining system originally developed for the Florida Department of Law Enforcement described as a tool to identify terror ...
(MATRIX): A data mining system originally developed for the
Florida Department of Law Enforcement The Florida Department of Law Enforcement (FDLE) is a state-wide investigative law enforcement agency within the state of Florida. The department formally coordinates eight boards, councils, and commissions. FDLE's duties, responsibilities and ...
. *
Terrorist Surveillance Program The Terrorist Surveillance Program was an electronic surveillance program implemented by the National Security Agency (NSA) of the United States in the wake of the September 11, 2001 attacks. It was part of the President's Surveillance Program, ...
: Replaced by
PRISM Prism usually refers to: * Prism (optics), a transparent optical component with flat surfaces that refract light * Prism (geometry), a kind of polyhedron Prism may also refer to: Science and mathematics * Prism (geology), a type of sedimentary ...
. * ThinThread: A U.S. National Security Agency (NSA) program that involved wiretapping and sophisticated analysis of the resulting data. *
Trailblazer Project Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell ...
: U.S. National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks including cell phone networks and the Internet.


See also

* 2013 Public disclosures of surveillance and espionage activities *
Electronic police state Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizati ...
*
List of public disclosures of classified information This is a list of classified information and documents leaked to the public. Global * Lagarde list * Global surveillance disclosures (2013–present) * Global surveillance disclosures (1970–2013) * 2012 Stratfor email leak: Public disclosure ...
*
NSA warrantless surveillance (2001–07) The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
*
Politico-media complex The politico-media complex (PMC, also referred to as the political-media complex) is a name given to the network of relationships between a state's political and ruling classes and its media industry. It may also encompass other interest groups, ...


References

{{DEFAULTSORT:Government mass surveillance projects Military lists Surveillance databases National security Signals intelligence Secret government programs Mass surveillance