Global surveillance by category

This is a category of disclosures related to global surveillance.

Court orders, memos and policy documents

  • Memorandum of understanding between the NSA and the Israel SIGINT National Unit (ISNU)
  • April 2013 FISC Order demanding that Verizon hand over all telephony metadata to NSA. The order had been initially granted in May 2006. In 2009 the FISC discovered that the government had made repeated and substantial misrepresentations to the court about its use, and had routinely been "running queries of the metadata using querying terms that did not meet the required standard for querying." It further concluded that the violations had been routine and systematic.[1]
  • Legal Justification of the bulk telephony metadata collection (officially released)[2]
  • 2009 NSA Procedures for Targeting Foreigners for Surveillance
  • 2009 NSA Procedures for Minimizing collection on US Persons
  • 2011 NSA Procedures for Minimizing collection on US Persons (officially released)[3]
    • Reference to a 2011 Change in the court-approved Minimization Procedures allowing analysts to run search queries using US persons' identifiers if there is "effective" oversight by NSA (it is not publicly known if such oversight has been established, or if any such searches have been conducted).[4] The court order mentioned was later officially released.[5]
  • October 2011 Court decision finding NSA's upstream collection program, which collected tens of thousands of non-target communications, to have violated the law. It held, citing multiple Supreme Court precedents, that the Fourth Amendment applies to the contents of all communications, whatever the means (they are "papers"). It also finds that the NSA's minimization and targeting policies to be legally and/or constitutionally deficient, and recommends changes. (officially released).[5][6][7][8][9][10][11][12][13][14] Additional findings:
    • The collection of Upstream data had begun before a court order approving it, in violation of 50 USC § 1809(a), which makes it a crime to engage in, use or disseminate surveillance knowing, or having reason to know such surveillance was not authorized. [15]
  • March 2009 FISC ruling showing a consistent pattern of misrepresentations of the bulk telephone metadata collection program by the government to the Court. It also held that the data was being routinely queried in ways that did not meet "reasonable articulatable suspicion", demonstrating inadequate safeguards in the software and training of analysts. Showing that "thousands of violations resulted from the use of identifiers that were not "RAS-approved by analysts who were not even aware that they were accessing BR metadata," and that in 2006 "there was no single person [in the NSA] who had a complete understanding of the BR FISA system architecture," a situation which persisted until February 2009 or later. RAS is shorthand for Reasonable Articulatable Suspicion. The Court nonetheless reapproved the collection of bulk phone metadata, while mandating additional safeguards and training, and "end-to-end system engineering reviews," and reports from the review. (Officially released by court order)[16][17][18][19][20][21][22]
  • October 2012 Presidential Policy Directive 20 (PPD20), outlining cyberwarfare.
  • 2007 Michael Mukasey memo proposing broader powers.
  • April 2013 list of US Spying targets and topics by priority. The top priority countries are: Iran, Russia, China, Pakistan, North Korea and Afghanistan. Germany, France, the European Union, and Japan are mid-level priorities; Italy and Spain rank lower.[23][24]
  • FY 2013 Intelligence "Black Budget" Summary.[25][26]
  • A memorandum of understanding concerning US sharing of raw SIGINT with Israel. The data has not been scrubbed to eliminate US persons, it asks Israel not to deliberately target US persons, however the agreement allows Israel to retain US person data for one full year. The memorandum is not legally binding. A separate document states "And there are other kinds of CI threats that are right on our midst. For example, one of NSA's biggest threats is actually from friendly intelligence services, like Israel.", it continues "Balancing the SIGINT exchange between US and Israeli needs has been a constant challenge. In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came and went, and with NSA's only true Third Party CT relationship being driven almost entirely driven by the needs of the partner."[27]
  • September 13, 2013 FISC Court order declassifing all the legal opinions relating to Section 215 of the Patriot Act written after May 2011 not already the subject of Freedom of Information Act litigation. The FISA Court ruled that the White House must identify the opinions in question by October 4, 2013.[28][29][30]
  • 1,000 pages of documents were released by James R. Clapper Jr. on November 19, 2013 in response to lawsuits filed by the American Civil Liberties Union and the Electronic Frontier Foundation and a directive by U.S. President Barack Obama. Among the documents are what appeared to be the original court document authorizing the National Security Agency to conduct sweeping collections of Americans' electronic communications records for counterterrorism purposes, the NSA's failure to abide by court-imposed rules to protect Americans' privacy, reports to Congress, training slides and regulations issued under President Obama.[31][32][33][34][35]
  • December 16, 2013 ruling by US district court judge for the District of Columbia Richard Leon[36][37][38][39][40][41] declaring that the mass collection of metadata of Americans' telephone records by the National Security Agency probably violates the fourth amendment prohibition unreasonable searches and seizures.[42] Leon granted the request for an preliminary injunction that blocks the collection of phone data for two private plaintiffs (Larry Klayman, a conservative lawyer, and Charles Strange, father of a cryptologist killed in Afghanistan when his helicopter was shot down in 2011)[43] and ordered the government to destroy any of their records that have been gathered. But the judge stayed action on his ruling pending a government appeal, recognizing in his 68-page opinion the "significant national security interests at stake in this case and the novelty of the constitutional issues."[42]
  • 2013-12-27 ruling by U.S. District Judge William H. Pauley III in New York City holding[44] the U.S. government's global telephone data-gathering system is needed to thwart potential terrorist attacks, and that it can only work if everyone's calls are swept in. In his opinion, he wrote, "a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data" and noted that a similar collection of data prior to 9/11 might have prevented the attack.[45] U.S. District Judge William H. Pauley III also ruled that Congress legally set up the program and that it does not violate anyone's constitutional rights. The judge also concluded that the telephone data being swept up by NSA did not belong to telephone users, but to the telephone companies. And further he ruled that, when NSA obtains such data from the telephone companies, and then probes into it to find links between callers and potential terrorists, this further use of the data was not even a search under the Fourth Amendment. He also concluded that the controlling precedent is Smith v. Maryland: "Smith's bedrock holding is that an individual has no legitimate expectation of privacy in information provided to third parties," Judge Pauley wrote.[46][47][48][49]

Reports

  • 2009 OIG report on STELLARWIND
  • Extracts from reports relating to XKeyscore. One entitled "Tales from the Land of Brothers Grimm" and others detailing the successes of said software, another is a note from an analyst who felt that he always had one foot in prison when using it. XKeyscore is also described as "big and scary, strong and powerful" and lets an analyst do whatever they like.[50]
  • Reports detailing thousands of privacy violations[51]
  • Numerous reports relating to drones, including "Threats to Unmanned Aerial Vehicles", a report summarizing attempts to shoot down, intercept, control or otherwise spoof drones. While the report details vulnerabilities of specific aircraft, the document itself has not been published, but only excerpts described. Other reports detail American spin efforts, suggesting that the phrases "drone strike," "kill list," "robot warfare," "Aerial Assassins" be avoided, offering "lethal UAV operations" instead, and also terms like "Pre-emptive and Preventive Military Action" and "Inherent Right of Self Defense." Likewise, reports detail efforts by Al-Qaeda to spin, portraying attacks as cowardly and immoral. Analysts also questioned whether America was losing rhetorical battle in courts, media, and public opinion. Another report stated that drone strikes "could be brought under increased scrutiny, perceived to be illegitimate, openly resisted or undermined."[52]
  • The US learned that Pakistan engaged in a pattern of extrajudicial killings, mostly against militants. However, not all targets militants, Pakistan also planned to murder a human rights activist, Asma Jahangir, while she was on a visit to India. The plot was aborted when she learned of it. The US sought to avoid public disclosure of this, and other incidents.[53][54]
  • The NSA and GCHQ have access to user data in iPhones, BlackBerrys, and Android phones. They are able to read almost all smartphone information, including SMS, location, emails, and notes.[55]

The following table describes what is known about the below SIGINT Activity Designators (SIGADs). It is not presumed to be complete.

Designation Covername Parent Program Legal Authority Key Targets Type of Information collected Associated Databases Remarks
US-3140
(PDDG:TM)
MADCAPOCELOT STORMBREW EO 12333
  • The country of Russia
  • European Terrorism

PINWALE
MARINA

US-983
(PDDG:FL)
STORMBREW STORMBREW Global "Key corporate partner with access to international cables, routers, and switches"
US-3206
(PDDG:6T)
MONKEYROCKET OAKSTAR EO 12333 Counterterrorism in the Middle East, Europe, and Asia DNI metadata and content
  • "Foreign access point"
  • was expected to go online in spring 2012.
US-3217
(PDDG:MU)
SHIFTINGSHADOW OAKSTAR "Foreign access point"
US-3230
(PDDG:0B)
ORANGECRUSH OAKSTAR "To be determined"
  • Voice
  • Fax
  • DNI
  • DNR
  • Metadata
  • "Foreign access point through PRIMECANE, and 3rd party partner"
  • not online as of the time of source presentation.
US-3247
(PDDG:PJ)
YACHTSHOP OAKSTAR Worldwide DNI Metadata Worldwide DNI Metadata MARINA "Access through BLUEANCHOR partner"
US-3251 ORANGEBLOSSOM[56][57] OAKSTAR
US-3257
(PDDG:SK)
SILVERZEPHYR[56][57] OAKSTAR

Transit Authority
FAA

South, Central and Latin America
  • DNR
    • metadata
    • voice
    • fax
  • DNI
    • content
    • metadata
"Network access point through STEELKNIGHT partner"
US-3277 BLUEZEPHYR OAKSTAR
US-3354 COBALTFALCON OAKSTAR
US-984XN PRISM It is possible, though not directly proven that PRISM falls under the umbrella of BLARNEY, given similar designations. Known Targets include
  • Venezuela
    • Military procurement
    • Oil
  • Mexico
    • Narcotics
    • Energy
    • Internal Security
    • Political Affairs
  • Colombia
    • Trafficking
The exact type of data varies by provider:
  • Email
  • Chat – video, voice
  • Videos
  • Stored data
  • VoIP
  • Filer transfers
  • Video Conferencing
  • Notifications of target activity, logins, etc.
  • Online Social Networking details
  • Special Requests

TRAFFICTHIEF
MARINA
MAINWAY
FALLOUT
PINWALE
CONVEYANCE
NUCLEON

  • Accounts for 91% of collection under FAA702 authority.
  • Cooperation between the NSA and internet companies, whereby the companies allow the NSA access (whether direct or indirect is disputed) to their servers.[58]
  • List of PRISM partners: AOL, Apple, Facebook, Google, Microsoft, PalTalk, Skype, and Yahoo!.
  • Newsletters referencing millions of dollars in payments to Prism partners by SSO, reimbursing them for their costs.[59]
US-984
(PDDG:AX)
BLARNEY BLARNEY FISA
  • Counter Proliferation
  • Counter Terrorism
  • Diplomatic
  • Economic
  • Military
  • Foreign Government (i.e. Political/Intentions of Nations)
  • DNI Strong Selectors
  • DNR Strong Selectors
  • DNI Circuits
  • DNR CircuitsMobile Wireless
  • FISA Court authorized communications
  • FISA Court authorized communications
Known facilities:
  • AT&T's Room 641A in San Francisco, California
  • AT&T site in New Jersey
US-984X BLARNEY BLARNEY FAA
  • Counter Proliferation
  • Counter Terrorism
  • Diplomatic
  • Economic
  • Military
  • Foreign Government (i.e. Political/Intentions of Nations)
  • DNI Strong Selectors
  • DNR Strong Selectors
  • DNI Circuits
  • DNR CircuitsMobile Wireless
  • FISA Court authorized communications
  • FISA Court authorized communications
Known facilities:
  • AT&T's Room 641A in San Francisco, California
  • AT&T site in New Jersey
US-990
(PDDG-UY)
FAIRVIEW FAIRVIEW Transit Authority
FAA
Global
  • DNR (Directory ONMR)
  • DNI
  • Key corporate partner with access to international cables, routers and switches.
  • Cyber access (hacking).
US-3105S1 DARKTHUNDER SSO Corporate/ TAO Shaping
  • TAO refers to Tailored Access Operations, namely hacking.
US-3105S1 STEELFLAUTA SSO Corporate/ TAO Shaping
  • TAO refers to Tailored Access Operations, namely hacking.

Note: SIGADs not otherwise designated are presumed to operate under the legal authority of Section 702 of the FISA Amendments Act (FAA)

  • Cyber Hit Counts: no explanation has been provided in the source material.
  • Directory ONMR: no explanation has been provided in the source material.
  • DNI: Digital Network Intelligence.[60]
  • DNR: Dial Number Recognition.[60]
  • MARINA: An NSA Database of Internet metadata.[61][62]
  • Timing Advances: no explanation has been provided in the source material.
  • Transit Authority: A legal authority that states communications that transit the United States are collectible, provided that both endpoints are foreign.

Collection and analysis programs or hardware

  • Boundless Informant – Computer program that physically performs the data collection.[63]
  • Dropmire – A program that specifically targets foreign embassies and diplomats
  • XKeyscore – A program which allows searching collected data in a variety of ways.[56][64]
  • SHELLTRUMPET – A metadata program that targets international communications.[65]
  • Unified Targeting Tool (UTT) – A graphical frontend for querying databases.[56][66]
  • LOPERS – A software based system to spy on PSTNs[67]
  • TURBULENCE – Includes cyber-warfare capabilities, such as targeting enemies with malware. (updates to existing knowledge)
  • JUGGERNAUT – A system to intercept mobile networks, including voice, fax, data, and text.[67]
  • SPYDER[56]
  • CHALKFUN[56]
  • VLR – Visitor Location Register[56]
  • TransX[56]
  • RAGTIME – A blanket term for any of four different surveillance programs[56][68]
  • Special Collection Service – Joint CIA/NSA eavesdropping team focused based in about 80 US embassies and consulates around the world. There are known branches in Frankfurt and Vienna. According to Der Spiegel, many of their operations are a direct violation of at least 3 signed treaties: "The Convention on the Privileges and Immunities of the United Nations of 1946, the Vienna Convention on Diplomatic Relations of 1961, and a signed an agreement in 1947 that rules out all undercover operations.[69]
  • STATEROOM – Surveillance on embassies and consulates. Highly Classified.[69]
  • BULLRUN, named after the Battle of Bull Run. – Bullrun refers to the NSA's set of codebreaking capabilities, including the use of Computer Network Exploitation (hacking) to obtain keys, weakening of encryption standards and providing backdoors to the same.[70] The following codenames are known to be related to BULLRUN: APERIODIC, AMBULANT, AUNTIE, PAINTEDEAGLE, PAWLEYS, PITCHFORD, PENDLETON, PICARESQUE, and PIEDMONT. No further explanation of the above codenames has been provided to date.[71]
  • Treasure Map, near real-time, interactive map of the global Internet. Collects Wi-Fi network and geolocation data, and the traffic of 30–50 million unique Internet addresses. It can reveal the location and owner of a computer, mobile device or router on a daily basis. NSA boasts that the program can map "any device, anywhere, all the time."[72]

Relationships with corporate partners

  • Upstream collects data from fiber-optic cables and internet backbones.[58][74]
    • Codenames of companies participating in Upstream: BLARNEY (a surveillance program which was established by the NSA with AT&T and which operates at or near key fiber-optic landing points in the U.S. to capture foreign communications coming in and out of the country),[75][76] STORMBREW, FAIRVIEW (a highly classified program for tapping into the world's intercontinental fiber-optic cables according to NSA whistleblower Thomas Andrews Drake),[76] and OAKSTAR. There are conflicting sources: some that call these "programs",[75][77][78] versus the official statement called "The National Security Agency: Missions, Authorities, Oversight and Partnerships" that describes them as codenames of cooperating companies.[79][80] A third source, just released groups them with describes them as "programs authorized to collect cable transit traffic passing through US Gateways with both sides of the communication being foreign.[56]The FY 2013 budget for the above programs is as follows:[81]
      • BLARNEY – $65.96 million
      • FAIRVIEW – $94.06 million
      • STORMBREW – $46.06 million
      • OAKSTAR – $9.41 million
    • Miscellaneous codenames of companies: LITHIUM[79]
    • RAMPART – Described as being part of Special Source operations, there is at least one known subdivision.[82]
      • RAMPART-T – Started in 1991 or earlier, documents describe this program as: "Penetration of hard targets at or near leadership level". The information is intended for "the president and his national security advisers". Rampart-T is aimed at China, Russia, and Eastern European countries, there are around 20 nations targeted.[69]
  • Microsoft allows the NSA to bypass encryption on Outlook.com.
  • Names and Codenames of companies assisting GCHQ:

NSA databases

  • PINWALE – Stores email and text[83]
  • NUCLEON – Stores voice data[84]
  • MAINWAY – Stores telephony metadata (i.e. call records)[85]
  • MARINA – Stores Internet metadata[83][85]
  • TRAFFICTHIEF – Stores metadata from a subset of assigned targets.
  • CLOUD/ABR[56]
  • DISHFIRE[56]
  • FASTSCOPE[56]
  • SIGINT NAVIGATOR[56]
  • TRACFIN – A database of financial information.[56][86]
  • TUNINGFORK[56]
  • OCTAVE – A database with a graphical frontend[56][66]
  • ANCHORY – A database of completed SIGINT reports.[56][84]
  • Nymrod – Apparently a database of names (appears in UTT Screenshot)[66]

Signals intelligence directorates (SIDs)

  • PRINTAURA – According to Ambinder, "NSA Unit involved in data filtering for TRAFFICTHIEF"[84]
  • Protocol Exploitation – Sorts data types into specific databases[74][84]

Technical directorates

  • SCISSORS – This team sorts data types for analysis.[74][84]

Names associated with specific targets

  • Apalatchee = The EU mission by the East River, in New York.[69]
  • Magothy = The EU embassy in Washington, DC. This embassy had its internal videoconferencing, and other areas of the computer network tapped. Both by the US, and by the Chinese. The US effort was conducted by the team working for the BLARNEY program.[69]
  • Wabash = French diplomatic office in Washington. This office was bugged.[87]
  • Blackfoot = French diplomatic office in the UN in New York. This office was bugged and computer screen captures obtained.[87]
  • KATEEL = Brazilian embassy in Washington.[88]
  • POCOMOKE = Brazilian Permanent Mission to the UN in New York.[88]

Uncategorized or insufficiently described codenames

  • CERF CALL MOSES1[67]
  • CONVEYANCE – Provides filtering for PRISM[74]
  • EVILOLIVE – Collects internet traffic and data.[65]
  • FACELIFT[82]
  • FALLOUT – Provides filtering for PRISM[74]
  • LONGHAUL – Involved in the process of decrypting communications.[70]
  • MATRIX[67]
  • MOONLIGHTPATH[65][89]
  • SPINNERET[65][89]
  • STEELKNIGHT[57]
  • CASPORT[56]
  • DANCINGOASIS[69]

GCHQ operations

The Government Communications Headquarters (GCHQ) is the main British intelligence agency responsible for providing signals intelligence (SIGINT) and information assurance to the British government and armed forces.

  • Tempora – Collects data from transatlantic fibre-optic cables of major telecommunications corporations by directly tapping on them and from Internet backbones. Tempora uses intercepts on the fibre-optic cables that make up the backbone of the internet to gain access to swaths of internet users' personal data. The intercepts are placed in the United Kingdom and overseas, with the knowledge of companies owning either the cables or landing stations. It is a GCHQ program to create a large-scale "Internet buffer" which stores Internet content for three days and metadata for up to 30 days.[74][90][91] Its component programs are Mastering the Internet and Global Telecoms Exploitation.[92]
  • Karma Police – Internet metadata collection program designed to profile the web browsing habits of 'every visible user on the Internet'.[93]
  • Britain runs a large-scale intercept station in the Middle East, capable of tapping underwater fiber-optic cables and satellites, and extracting email, telephone, and web traffic. The information is then passed to the GCHQ and shared with the NSA. The operation costs around £1 billion and is still being assembled. It is part of the "Tempora" project.[94] Edward Snowden disputes the Independent's claim that he, or anyone he has had direct contact with is the source of this information.[95] Süddeutsche Zeitung's fiber optic revelations were also described as having been obtained from GC-Wiki by Snowden.[96]
  • GCHQ is believed to have forced some six global telecommunications and Internet companies to allow them to access more than 14 fiber optic cables that transport telephone communications.[96] The six companies, BT, Vodafone, Viatel, Interoute, Verizon and Level-3, gave GCHQ access to the cables in return for payment, it is believed the companies had no choice in this decision.[96] Three of the cables' terminal stations are on German territory; two of the cables are partially owned by Deutsche Telekom, who have denied knowledge of or participation in GCHQ's activities.[96]
  • Spying on the 2009 G20 Summit in London.
  • GC-Wiki – An internal wiki at GCHQ.[94]
  • Access to the majority of Internet and telephone communications throughout Europe, and occasionally as far as the United States.[96]
  • GCHQ has a team dedicated to cracking encrypted traffic on Hotmail, Google, Yahoo and Facebook.[70]
  • The Belgian telecom company Belgacom reports that it had been hacked, and has filed criminal charges, and will be cooperating with the investigation into the hacking. "The inquiry has shown that the hacking was only possible by an intruder with significant financial and logistic means," they said. "This fact, combined with the technical complexity of the hacking and the scale on which it occurred, points towards international state-sponsored cyber espionage."[97] According to documents released by Der Spiegel, the operation against Belgacom was entitled 'Operation Socialist' and was done by the GCHQ for the purpose of enabling Man-in-the-middle attacks against smartphones.[98][99]
  • Edgehill, named after the Battle of Edgehill, is a program operated by GCHQ similar to the NSA's BULLRUN program.[70]
  • Other programs operated jointly with the NSA include MUSCULAR, Dishfire, Stateroom and Optic Nerve (GCHQ).
  • Other programs include Squeaky Dolphin, WARRIOR PRIDE, and XKeyscore.
  • Organizational groups within GCHQ include the Human Science Operations Cell, the Joint Threat Research Intelligence Group, and the Joint Operations Cell.

NSA operations

  • Hacking Tsinghua University, and also Pacnet in China.
  • Spying on Latin America with the help of Global Crossing.
  • The NSA operates the global monitoring network Special Collection Service that collects from more than 80 embassies and consulates worldwide, often without the knowledge or consent of the host country.[100][101]
  • The NSA spied on a UN videoconferencing system, in violation of the US agreement with the UN not to do so. In the process NSA discovered that the Chinese had already done so, and then started analyzing what the Chinese were taking. Shortly thereafter, the NSA gained access to approximately 500 other UN channels of communications.[100][101][102]
  • Additional details of the raid on Osama bin Laden's Abbotabad, Pakistan compound. The work of Tailored Access Operations, in installing spyware on phones is highlighted. Also highlighted are the roles of the CIA, other agencies, and the Navy SEALs.[103]
  • The NSA's Network Analysis Center cracked the reservation system for Aeroflot, and also hacked Al Jazeera, accessing specially protected material, according to a document dated in 2006.[104]
  • The NSA hacked the French Foreign Ministry, and bugged the French diplomatic offices in Washington and New York in 2010.[87]
  • The NSA conducted extensive spying on Enrique Peña Nieto, and his aides, accessing their emails. Likewise, the NSA spied on the communications of Dilma Rousseff, and her aides, and also created a two hop contact graph. The source document is dated June 2012, it is unclear whether the operation is ongoing.[105][106][107]
  • The NSA and GCHQ target banks and credit card companies by various means including "Tailored Access Operations", specifically by targeting printer traffic from banks. VISA has also been targeted. According to a GCHQ document, the collection involves "bulk data" containing "rich personal information" that is mostly "not about our targets".[86]
  • From collection points outside the United States, the NSA gathers contact lists belonging to users of e-mail and instant messaging services, including Yahoo, Hotmail, Facebook and Gmail.[108]

NSA relationships with foreign intelligence services

  • Payments to GCHQ from NSA totaling at least £100 million
  • Relationships with Germany's BND, exchange of technology: (XKeyscore, and the German programs and bulk metadata (500 Million records in one month alone)).
  • The US directly spies on most of its allies, even those with intelligence sharing agreements, with only the Five Eyes being immune.[50]

Suggested protective measures from surveillance

Encryption

In cryptography, encryption is the process of encoding information in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. According to Snowden's recommendations published by The Guardian Edward in September 2013,[109] properly implemented strong crypto systems were among the few things which one can rely on. However, endpoint security is often too weak to prevent the NSA from finding ways around it.[109]

Underground bunkers

In September 2013, it was reported by the press that a number of countries deemed by the US and its allies to be rogue states, such as Syria, Iran and North Korea, had successfully evaded U.S. government surveillance by constructing secret bunkers deep below the Earth's surface.[110]

China's underground megaproject, the 816 Nuclear Military Plant in Chongqing (now declassified and opened to tourists), was reported to be "most worrying" for the U.S. Defense Intelligence Agency.[110]

Libya evaded surveillance by building "hardened and buried" bunkers at least 40 feet below ground level.[110]

Unrelated to Edward Snowden

  • In 2002, the NSA, in cooperation with the FBI, and in cooperation with Qwest, monitored nearly all communications in the Salt Lake area in the six months surrounding the Olympic games.[75][111][112]
  • Since 2005, Canada has been running a bulk phone metadata, email and text message program.[113][114][115]
  • The NYPD is engaging in mass surveillance, particularly of Muslims, in mosques, in social gatherings, and even at home. The department employs "rakers" to troll Muslim neighborhoods. The unit employing said rakers, was once called "The Demographics Unit," the name was changed in 2010 to the "Zone Assessment Unit" to mask the appearance, though not change the actual fact of racial profiling. Knowledge of this program was kept from the city council.[116]
  • Devices made by the American company Blue Coat Systems, which are used for Internet surveillance and censorship, have turned up repeatedly in countries that censor and surveil the Internet, and have a record of human rights abuses, such as Iran, Syria, China, Burma (Myanmar) and Sudan.[117][118][119][120]
  • The ACLU has released a report on the proliferation of license plate readers and on the retention of data from them.[121][122]
  • The FBI has been pressuring ISPs to install surveillance software, referred to as the "harvesting program".[123]
  • The FBI has been using malware and hacking to surveil suspects. Reports indicate however, that hacking and malware usage remains a last resort, and that warrants are sought for individual cases.[124][125]
  • The NSA collects the contents of emails that transit from the US to abroad, and searches them for keywords.[126]
  • The Post Office scans all mail cover (envelopes, outsides of packages and postcards) and enables retroactively tracking mail correspondence by its Mail Isolation Control and Tracking programme.[127]
  • France's Equivalent of PRISM
  • India will be building a mass domestic surveillance program called the "Central Monitoring System", which will be able to track all voice, fax, and text across all telephone networks in the country. It will also contract the Israeli company Verint Systems to monitor encrypted Gmail, BlackBerry, Skype and Yahoo! mail.[128][129]
  • More than 230 thousand people were questioned under The United Kingdom's Schedule 7 of the Terrorism act of 2000 between April 2009 and March 2012.[130]
  • New Zealand passed a bill allowing domestic spying against its citizens and residents, by a narrow margin (61–59).[131][132]
  • Russ Tice, on June 19 gave an interview to Boiling Frogs Post, in which he expanded his previous disclosures. Specifically he names persons who had been wiretapped by the NSA, namely: Hillary Clinton, Barack Obama, Dianne Feinstein, Colin Powell, Evan Bayh, Samuel Alito and many others including journalists and political groups. He asserts that all telephony content is collected.[133]
  • Blueprints of the Utah Data Center[134]
  • "The Find," the NSA can locate cellphones even when they were turned off.[135]
  • The DEA's and IRS's use of NSA data to start criminal investigations against US citizens, and their method of "Parallel Construction" to conceal the true origins of their evidence.[136][137]
  • CIA operative De Sousa, convicted in absentia in Italy in the extraordinary rendition case of Osama Mustapha Hassan Nasr AKA Abu Omar goes on camera describing the case.[138]
  • Insider Threat Program – policy requiring federal employees to report "high-risk persons or behaviors" from among co-workers, as well as to punish those who fail to report such colleagues.[139] In 2013, the NSA planned to investigate over 4000 cases.[25]
  • The German Federal Office for Information Security has warned that Windows 8 has a built-in backdoor, that could allow Microsoft, and by extension the NSA to access many Windows 8 machines via the Trusted Platform Module that comes embedded on many Windows 8 machines.[140][141] Of the subset of CIA applicants whose backgrounds raised flags, one fifth were found to have ties to either terrorism or foreign hostile intelligence.[142]
  • The NSA has admitted about a dozen cases of willful violations by analysts over the last 10 years.[143] One common form, in which an analyst spies on a love interest, has been dubbed "LOVEINT"[144]
  • The Hemisphere Project, a secret partnership between federal and local drug officials and AT&T since September 2007. Law enforcement has access to electronic call detail records for any telephone carrier that uses an AT&T switch to process a telephone call. Records go back to 1987 and about 4 billion are added every day. Officials are instructed to obfuscate the existence of the program, by a method similar to "Parallel Construction" in which a separate subpoena is obtained for records which had already been returned by the Hemisphere project, thus disguising the true origin of the data.[145][146]
  • Sweden is helping the GCHQ tap fiber-optic cables and has become, effectively, a member of the 'Five Eyes', according to Duncan Campbell in a hearing of the EU parliament's LIBE committee. He further states that the codename for the tapping operation is "Sardine" and is classified several levels above top secret, and that the information about Sweden was withheld from publication in the Guardian, The New York Times, and Pro Publica.[147][148][149]
  • CIA, BND and the Federal Office for the Protection of the Constitution ran Projekt 6 (P6 for short) from 2005 to 2010. Its aim was to gather intelligence on suspected jihadists and terrorism supporters. An American query request for the internal database, code name PX contains the passport number, date of birth and name of German investigative journalist Peter Buchen.[150]
  • The ACLU released a 69-page report on the FBI entitled "Unleashed and Unaccountable" detailing warrantless wiretapping, spying on political activists and journalists, biased training and racial profiling, proxy detentions in foreign countries, use of the no-fly list as a means of pressuring people to become informants, bulk data collection (eGuardian and bulk telephony metadata), dodging oversight and misleading the public.[151][152]
  • The NSA purchases zero-day exploits from Vupen, as revealed in a FOIA request. In response, the CEO of Vupen suggested that a FOIA request also be made for Raytheon, Lockheed Martin and Northrop, because they also sell exploits.[153]

References

  1. John D Bates (October 3, 2011). "[redacted]" (PDF). p. 16.
  2. Turner, Shawn (July 31, 2013). "DNI Clapper Declassifies and Releases Telephone Metadata Collection Documents". Retrieved August 22, 2013.
  3. "Minimization Procedures Used by the National Security Agency in Connection with Acquisitions of Foreign Intelligence Information Pursuant to Section 702, as amended" (PDF). October 31, 2011.
  4. James Ball and Spencer Ackerman (August 9, 2013). "NSA loophole allows warrantless search for US citizens' emails and phone calls". Retrieved August 12, 2013.
  5. John D Bates (October 3, 2011). "[redacted]" (PDF). p. 71.
  6. Nakashima, Ellen (August 21, 2013). "NSA gathered thousands of Americans' e-mails before court ordered it to revise its tactics". The Washington Post. Retrieved September 16, 2013.
  7. "FISA court ruling on illegal NSA e-mail collection program". The Washington Post. August 21, 2013. Retrieved September 16, 2013.
  8. Barton Gellman; Matt DeLong (August 15, 2013). "First direct evidence of illegal surveillance found by the FISA court". The Washington Post. Retrieved September 16, 2013.
  9. Charlie Savage; Scott Shane (August 21, 2013). "Secret Court Rebuked N.S.A. on Surveillance". The New York Times. Retrieved September 16, 2013.
  10. Mark Hosenball; Tabassum Zakaria (August 22, 2013). "NSA collected 56,000 emails by Americans a year: documents". Reuters. NBC News. Retrieved September 16, 2013.
  11. Perez, Evan (August 22, 2013). "NSA misrepresented scope of data collection to secret court". CNN. Retrieved October 2, 2013.
  12. Turner, Shawn (August 21, 2013). "DNI Declassifies Intelligence Community Documents Regarding Collection Under Section 702 of the Foreign Intelligence Surveillance Act (FISA)". Office of the Director of National Intelligence. IC on the Record. Retrieved October 2, 2013.
  13. Clapper, James (August 21, 2013). "DNI James Clapper's Cover Letter Announcing the Document Release" (PDF). Director of National Intelligence. Retrieved October 2, 2013.
  14. Kimberly Dozier; Stephen Braun (August 21, 2013). "NSA Collected Thousands Of Emails, Other Communications By Americans With No Terror Ties". The Huffington Post. Associated Press. Retrieved October 2, 2013.
  15. Fung, Brian (August 21, 2013). "The FISA court got really upset when the NSA didn't tell the truth on surveillance". The Washington Post. Retrieved September 16, 2013.
  16. Siobhan Gorman; Devlin Barrett (September 10, 2013). "NSA Violated Privacy Protections, Officials Say". The Wall Street Journal. Retrieved September 10, 2013.
  17. Ackerman, Spencer (September 10, 2013). "NSA violations led judge to consider viability of surveillance program". The Guardian. Retrieved September 16, 2013.
  18. Ellen Nakashima; Julie Tate; Carol Leonnig (September 10, 2013). "Declassified court documents highlight NSA violations in data collection for surveillance". The Washington Post. Retrieved September 14, 2013.
  19. Office of the Director of National Intelligence. (September 10). "Declassified FISA court documents on intelligence collection". The Washington Post. Retrieved September 14, 2013. Check date values in: |date= (help)
  20. James R. Clapper (Director of National Intelligence) (September 10, 2013). "DNI Clapper Declassifies Intelligence Community Documents Regarding Collection Under Section 501 of the Foreign Intelligence Surveillance Act (FISA)". Office of the Director of National Intelligence. IC On the Record. Retrieved September 14, 2013.
  21. Tim, Trevor (September 10, 2013). "Government Releases NSA Surveillance Docs and Previously Secret FISA Court Opinions In Response to EFF Lawsuit". Electronic Frontier Foundation. Electronic Frontier Foundation. Retrieved September 14, 2013.
  22. David Kravets. Kim Zetter; Kevin Poulsen (September 10, 2013). "NSA Illegally Gorged on U.S. Phone Records for Three Years". Wired.com. Retrieved September 22, 2013.
  23. Staff (August 10, 2013). "US-Geheimdienst: NSA führt Deutschland als Spionageziel".
  24. Timothy Jones (August 11, 2008). "Germany and EU targets for US espionage, Spiegel reports".
  25. Barton Gellman and Greg Miller (August 29, 2013). "U.S. spy network's successes, failures and objectives detailed in 'black budget' summary". The Washington Post. Retrieved August 29, 2013.CS1 maint: uses authors parameter (link)
  26. "The Black Budget". The Washington Post. August 29, 2013. Retrieved August 29, 2013.
  27. Glenn Greenwald, Laura Poitras, and Ewen MacAskill (September 11, 2013). "NSA shares raw intelligence including Americans' data with Israel". Retrieved September 11, 2013.CS1 maint: uses authors parameter (link)
  28. Sailor IV, F. Dennis (September 13, 2013). "United States Foreign Intelligence Surveillance Court In Re Orders of this Court Interpreting Section 215 of the Patriot Act (Docket No. Misc. 13-02)" (PDF). www.uscourts.gov. Archived from the original (PDF) on September 18, 2013. Retrieved September 15, 2013.
  29. Fung, Brian (September 13, 2013). "The FISA court will release more opinions because of Snowden". The Washington Post. Retrieved September 15, 2013.
  30. Ackerman, Spencer (September 13, 2013). "Fisa judge: Snowden's NSA disclosures triggered important spying debate". The Guardian. Retrieved September 16, 2013.
  31. "DNI Clapper Declassifies Additional Intelligence Community Documents Regarding Collection Under Section 501 of the Foreign Intelligence Surveillance Act". Office of the Director of National Intelligence. IC ON THE RECORD. 18 November 2013. Retrieved 19 November 2013.
  32. "DNI Clapper Declassifies Additional Intelligence Community Documents Regarding Collection Under Section 501 of the Foreign Intelligence Surveillance Act". Office of the Director of National Intelligence. odni.gov. 18 November. Archived from the original on 19 November 2013. Retrieved 19 November 2013. Check date values in: |date= (help)
  33. Charlie Savage; James Risen (18 November 2013). "Latest Release of Documents on N.S.A. Includes 2004 Ruling on Email Surveillance". The New York Times. Retrieved 19 November 2013.
  34. Ellen Nakashima; Greg Miller (19 November 2013). "Official releasing what appears to be original court file authorizing NSA to conduct sweeps". The Washington Post. Retrieved 19 November 2013.
  35. "Documents show NSA reported violations of court's surveillance rules". The New York Daily News. Associated Press.
  36. Leon, Richard (16 December 2013). "Federal judge rules NSA program is likely unconstitutional a.k.a. Klayman et al. v. Obama et al. Memorandum and Opinion from December 16, 2013 in Civil Action 13-0851 in United Case District Court for the District of Columbia". The Washington Post. Retrieved 17 December 2013.
  37. Savage, Charlie (16 December 2013). "Judge Questions Legality of N.S.A. Phone Records". The New York Times. Retrieved 18 December 2013.
  38. Bill Mears and Evan Perez, CNN (17 December 2013). "Judge: NSA domestic phone data-mining unconstitutional". cnn. Retrieved 18 December 2013.
  39. Kravets, David (16 December 2013). "Court Says NSA Bulk Telephone Spying Is Unconstitutional". Wired. Retrieved 18 December 2013.
  40. Kevin Johnson; Richard Wolf (16 December 2013). "Federal judge rules against NSA spying". USA Today. Retrieved 18 December 2013.
  41. Gerstein, Josh (16 December 2013). "Judge: NSA phone program likely unconstitutional". Politico. Retrieved 18 December 2013.
  42. Ellen Nakashima; Ann E. Marimow (16 December 2013). "Judge: NSA's collecting of phone records is probably unconstitutional". The Washington Post. Retrieved 17 December 2013.
  43. Spencer Ackerman; Dan Roberts (16 December 2013). "NSA phone surveillance program likely unconstitutional, federal judge rules". The Guardian. Retrieved 18 December 2013.
  44. Pauley III, William H. (27 December 2013). "United States District Court Southern District of New York: American Civil Liberties Union v. James R. Clapper (13 Civ. 3994) (WHP)" (PDF). American Civil Liberties Union. Retrieved 28 December 2013.
  45. Bazzle, Steph (27 December 2013). "Judge Says NSA's Data Collection Is Legal". Indyposted. Archived from the original on December 28, 2013. Retrieved 28 December 2013.
  46. Adam Liptak; Michael S. Schmidt (27 December 2013). "Judge Upholds N.S.A.'s Bulk Collection of Data on Calls". The New York Times. Retrieved 28 December 2013.
  47. Denniston, Lyle (27 December 2013). "Judge upholds NSA's phone data sweeps (UPDATED)". Scotusblog. Retrieved 28 December 2013.
  48. Peterson, Andrea (27 December 2013). "The most Kafkaesque paragraph from today's NSA ruling". The Washington Post. Retrieved 28 December 2013.
  49. Horwitz, Sari (27 December 2013). "NSA collection of phone data is lawful, federal judge rules". The Washington Post. Retrieved 28 December 2013.
  50. Laura Poitras, Marcel Rosenbach and Holger Stark (August 12, 2013). "Ally and Target: US Intelligence Watches Germany Closely". Retrieved August 12, 2013.CS1 maint: uses authors parameter (link)
  51. Gellman, Barton (August 16, 2013). "NSA broke privacy rules thousands of times per year, audit finds". The Washington Post. Retrieved August 16, 2013.
  52. Craig Whitlock and Barton Gellman (September 3, 2013). "U.S. documents detail al-Qaeda's efforts to fight back against drones". The Washington Post. Retrieved September 3, 2013.CS1 maint: uses authors parameter (link)
  53. Greg Miller, Craig Whitlock and Barton Gellman (September 2, 2013). "Top-secret U.S. intelligence files show new levels of distrust of Pakistan". The Washington Post. Retrieved September 3, 2013.CS1 maint: uses authors parameter (link)
  54. Staff (September 4, 2013). "US intelligence uncovered Pak army plot to kill Asma Jahangir in India: report". Retrieved September 4, 2013.
  55. Staff (September 7, 2013). "Privacy Scandal: NSA Can Spy on Smart Phone Data". Retrieved September 7, 2013.
  56. "NSA report on privacy violations in the first quarter of 2012". The Washington Post. August 16, 2013. Retrieved August 16, 2013.
  57. No alvo dos EUA, Infographic, O Globo. Retrieved July 8, 2013.
  58. Barton Gellman; Matt DeLong (August 15, 2013). "First direct evidence of illegal surveillance found by the FISA court". The Washington Post. Retrieved August 25, 2013.
  59. MacAskill, Ewen (August 23, 2013). "NSA paid millions to cover Prism compliance costs for tech companies". Retrieved August 23, 2013.
  60. Drum, Kevin (June 8, 2013). "Map of the Day: Who the NSA Listens To". Retrieved September 9, 2013.
  61. Nakashima, Ellen (July 31, 2013). "Newly declassified documents on phone records program released". The Washington Post. Retrieved September 9, 2013.
  62. Gellman, Barton (June 15, 2013). "U.S. surveillance architecture includes collection of revealing Internet, phone metadata". The Washington Post. Retrieved September 9, 2013.
  63. A published heat map shows that most data is collected from Iran, Pakistan and Jordan, with over 40 billion individual pieces of information collected from these three countries alone in March 2013 alone, from a total of 97 billion worldwide.
  64. Snowden reveals Australia's links to US spy web, The Sydney Morning Herald, July 8, 2013. Retrieved July 11, 2013.
  65. Glenn Greenwald and Spencer Ackerman (June 27, 2013). "How the NSA is still harvesting your online data". The Guardian. Retrieved August 1, 2013.
  66. "What to say, and not to say, to 'our overseers'". The Washington Post. August 16, 2013. Retrieved August 16, 2013.
  67. Staff (July 29, 2013). "Photo Gallery: NSA Documentation of Spying in Germany". Retrieved August 11, 2013.
  68. Barton Gellman; Matt DeLong (August 15, 2013). "What to say, and not to say, to 'our overseers'". The Washington Post. Retrieved August 25, 2013.
  69. Laura Poitras, Marcel Rosenbach and Holger Stark (August 26, 2013). "Codename 'Apalachee': How America Spies on Europe and the UN". Retrieved August 26, 2013.CS1 maint: uses authors parameter (link)
  70. James Ball; Julian Borger; Glenn Greenwald (September 5, 2013). "US and UK spy agencies defeat privacy and security on the internet". The Guardian. Retrieved September 5, 2013.
  71. "Project Bullrun – classification guide to the NSA's decryption program". September 5, 2013.
  72. JAMES RISEN; LAURA POITRAS (November 22, 2013). "N.S.A. Report Outlined Goals for More Power". The New York Times. Retrieved 23 November 2013.
  73. How Microsoft handed the NSA access to encrypted messages, The Guardian, July 12, 2013. Retrieved July 13, 2013.
  74. NSA slides explain the PRISM data-collection program, The Washington Post, June 6, 2013, updated July 10, 2013. Retrieved July 12, 2013.
  75. Siobhan Gorman; Jennifer Valentiono-Devries (August 20, 2013). "New Details Show Broader NSA Surveillance Reach – Programs Cover 75% of Nation's Traffic, Can Snare Emails". The Wall Street Journal. Retrieved August 21, 2013.
  76. "New slides about NSA collection programs". Top Level Telecommunications. July 16, 2013 and updated on July 16, 2013. Retrieved August 27, 2013. Check date values in: |date= (help)
  77. Kloc, Joe (July 12, 2013). "Forget PRISM: FAIRVIEW is the NSA's project to "own the Internet"". Retrieved August 11, 2013.
  78. Glenn Greenwald, Roberto Kax and José Casado (July 12, 2013). "Espionagem dos EUA se espalhou pela América Latina". Retrieved August 11, 2013.CS1 maint: uses authors parameter (link)
  79. "The National Security Agency: Missions, Authorities, Oversight and Partnerships" (PDF). National Security Agency. August 9, 2013. Retrieved August 12, 2013.
  80. Perez, Evan (August 10, 2013). "Documents shed light on U.S. surveillance programs". CNN. Retrieved August 12, 2013.
  81. Craig Timberg; Barton Gellman (August 30, 2013). "NSA paying U.S. companies for access to communications networks". The Washington Post. Retrieved August 31, 2013.
  82. James Ball and Spencer Ackerman (August 9, 2013). "NSA loophole allows warrantless search for US citizens' emails and phone calls". Retrieved August 11, 2013.CS1 maint: uses authors parameter (link)
  83. Nakashima, Ellen (July 31, 2013). "Newly declassified documents on phone records program released". The Washington Post. Retrieved August 4, 2013.
  84. Ambinder, Marc (August 14, 2013). "An Educated Guess About How the NSA Is Structured". Retrieved August 14, 2013.
  85. Gellman, Barton (June 15, 2013). "U.S. surveillance architecture includes collection of revealing Internet, phone metadata". The Washington Post. Retrieved August 11, 2013.
  86. Staff (September 15, 2013). "'Follow the Money': NSA Spies on International Payments 'Follow the Money': NSA Spies on International Payments". Retrieved September 15, 2013.
  87. Staff (September 1, 2013). "'Success Story': NSA Targeted French Foreign Ministry". Retrieved September 1, 2013.
  88. "Jornal O Globo revela que Brasil teria sido espionado pelos Estados Unidos". July 8, 2013. Retrieved September 5, 2013.
  89. Bamford, James (July 12, 2013). "They Know Much More Than You Think". The New York Review of Books. Retrieved July 29, 2013.
  90. Ball, James (October 25, 2013). "Leaked memos reveal GCHQ efforts to keep mass surveillance secret". The Guardian. Retrieved October 25, 2013.
  91. James Ball; Julian Borger; Glenn Greenwald (September 6, 2013). "Revealed: how US and UK spy agencies defeat internet privacy and security". The Guardian. Retrieved September 7, 2013.
  92. "Mastering the internet: how GCHQ set out to spy on the world wide web". The Guardian. 21 June 2013. Retrieved 18 December 2013.
  93. url=https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/
  94. Duncan Campbell, Oliver Wright, James Cusick, Kim Sengupta (August 22, 2013). "Exclusive: Edward Snowden leaks reveal UK's secret Middle-East web surveillance base". The Independent. London. Retrieved August 22, 2013.CS1 maint: uses authors parameter (link)
  95. Greenwald, Glenn (August 23, 2013). "Snowden: UK government now leaking documents about itself". Retrieved August 23, 2013.
  96. John Goetz; Hans Leyendecker; Frederik Obermaier (August 28, 2013). "British Officials Have Far-Reaching Access To Internet And Telephone Communications". Retrieved August 28, 2013.
  97. staff (September 16, 2013). "'Foreign nation with significant means' in spying on Belgium probe". Retrieved September 16, 2013.
  98. Schmitz, Gregor-Peter (September 20, 2013). "Cyber Attack: Belgians Angered by British Spying". Retrieved September 20, 2013.
  99. Gallagher, Ryan (September 20, 2013). "http://www.slate.com/blogs/future_tense/2013/09/20/operation_socialist_u_k_s_gchq_hacked_belgacom_snowden_documents_reveal.html". Retrieved September 20, 2013. External link in |title= (help)
  100. "US-Geheimdienst hörte Zentrale der Vereinten Nationen ab". Der Spiegel (in German). Retrieved August 25, 2013.
  101. Goebel, Nicole (August 25, 2013). Schuster, Kathleen (ed.). "NSA spied on UN, German report says". Deutsche Welle. Retrieved August 25, 2013.
  102. "NSA bugged UN headquarters – newspaper". August 25, 2013. Retrieved August 25, 2013.
  103. Barton Gellman and Craig Whitlock (August 29, 2013). "To hunt Osama bin Laden, satellites watched over Abbottabad, Pakistan, and Navy SEALs". The Washington Post. Retrieved August 29, 2013.CS1 maint: uses authors parameter (link)
  104. Staff (August 31, 2013). "Snowden Document: NSA Spied On Al Jazeera Communications". Retrieved August 31, 2013.
  105. Brooks, Bradley (September 1, 2013). "Report: NSA spied on leaders of Brazil, Mexico". Archived from the original on September 2, 2013. Retrieved September 1, 2013.
  106. Tiago Ornaghi; Flávio Lordello, eds. (September 1, 2013). "Saiba como o maior sistema de espionagem do mundo monitora comunicações em Brasília". Retrieved September 1, 2013.
  107. Cristina Tardáguila; Júnia Gama (September 1, 2013). "EUA espionaram Dilma". Retrieved September 1, 2013.
  108. Barton Gellman; Ashkan Soltani (October 14, 2013). "NSA collects millions of e-mail address books globally". The Washington Post.
  109. "NSA surveillance: A guide to staying secure". The Guardian. Retrieved September 24, 2013.
  110. Narayan Lakshman (September 24, 2013). "Secret bunkers, a challenge for U.S. intelligence". The Hindu. Chennai, India. Retrieved September 24, 2013.
  111. Nelson, Kimberly (August 22, 2013). "In Salt Lake for the 2002 Olympics? Your texts, emails and phone calls likely reviewed by NSA". Retrieved August 25, 2023. Check date values in: |accessdate= (help)
  112. Davidson, Lee (August 23, 2013). "Former Salt Lake mayor: NSA snooping is the scandal of the century". Retrieved August 25, 2013.
  113. Freeze, Colin (June 15, 2013). "How Canada's shadowy metadata-gathering program went awry". The Globe and Mail. Toronto. Retrieved August 27, 2013.
  114. "Raw documents: Canada's 'top secret' data mining program". The Globe and Mail. Toronto. June 10, 2013. Retrieved August 27, 2013.
  115. Freeze, Colin (June 10, 2013). "Data-collection program got green light from MacKay in 2011". The Globe and Mail. Toronto. Retrieved August 27, 2013.
  116. Matt Apuzzo and Adam Goldman (August 25, 2013). "The NYPD Division of Un-American Activities". Retrieved August 26, 2013.CS1 maint: uses authors parameter (link)
  117. "Blue Coat". Reporters Without Borders. March 12, 2013. Archived from the original on November 28, 2013. Retrieved November 30, 2013.
  118. Citizen Lab, Munk School of Global Affairs, University of Toronto (January 15, 2013). "Planet Blue Coat: Mapping Global Censorship and Surveillance Tools".CS1 maint: multiple names: authors list (link)
  119. Markoff, John (January 16, 2013). "Rights Group Reports on Abuses of Surveillance and Censorship Technology". The New York Times.
  120. Nakashima, Ellen (July 8, 2013). "Web monitoring devices made by U.S. firm Blue Coat detected in Iran, Sudan". The Washington Post.
  121. "You Are Being Tracked: How License Plate Readers Are Being Used to Record Americans' Movements". July 17, 2013. Retrieved August 11, 2013.
  122. Martinez, Michael (July 18, 2013). "ACLU raises privacy concerns about police technology tracking drivers". CNN. Retrieved August 11, 2013.
  123. McCullagh, Declan (August 2, 2013). "FBI pressures Internet providers to install surveillance software".
  124. Jennifer Valentino-DeVries and Danny Yadron (August 3, 2013). "FBI Taps Hacker Tactics to Spy on Suspects". The Wall Street Journal. Retrieved August 12, 2013.CS1 maint: uses authors parameter (link)
  125. Choney, Suzanne (August 6, 2013). "FBI hacking squad used in domestic investigations, experts say". Retrieved August 12, 2013.
  126. Savage, Charlie (August 8, 2013). "N.S.A. Said to Search Content of Messages to and From U.S". The New York Times. Retrieved August 11, 2013.
  127. Nixon, Ron (July 3, 2013). "U.S. Postal Service Logging All Mail for Law Enforcement". The New York Times. Retrieved August 11, 2013.
  128. Dharmakumar, Rohin (August 13, 2013). "Keep your virtual life away from prying governments". Retrieved August 13, 2013.
  129. Parbat, Kalyan (July 27, 2013). "Israel's Verint to get government contract for interception tools". The Times Of India. Retrieved August 13, 2013.
  130. Kirka, Danica (August 19, 2013). "Partner of reporter at center of NSA leak detained". Retrieved August 19, 2013.
  131. Staff (August 21, 2013). "New Zealand passes bill allowing domestic spying". Retrieved August 23, 2013.
  132. Watkins, Tracy (August 21, 2013). "Spy bill passes into law amid wide criticism". Retrieved August 23, 2013.
  133. "Podcast Show #112: NSA Whistleblower Goes on Record -Reveals New Information & Names Culprits!" (Podcast). June 19, 2013. Retrieved August 15, 2013.
  134. Hill, Kashmir (July 24, 2013). "Blueprints of NSA's Ridiculously Expensive Data Center in Utah Suggest It Holds Less Info Than Thought". Forbes. Retrieved August 11, 2013.
  135. Priest, Dana (July 21, 2013). "NSA growth fueled by need to target terrorists". The Washington Post. Retrieved August 11, 2013.
  136. John Shiffman and Kristina Cooke (August 5, 2013). "Exclusive: U.S. directs agents to cover up program used to investigate Americans". Reuters. Retrieved August 11, 2013.CS1 maint: uses authors parameter (link)
  137. John Shiffman and David Ingram (August 7, 2013). "Exclusive: IRS manual detailed DEA's use of hidden intel evidence". Reuters. Retrieved August 12, 2013.CS1 maint: uses authors parameter (link)
  138. Lindsay, Jonathan S (July 27, 2013). "U.S. allowed Italian kidnap prosecution to shield higher-ups, ex-CIA officer says". Retrieved August 11, 2013.
  139. Obama’s crackdown views leaks as aiding enemies of U.S. Archived 2015-06-18 at the Wayback Machine, McClatchy, June 20, 2013. Retrieved July 12, 2013.
  140. "Stellungnahme des BSI zur aktuellen Berichterstattung zu MS Windows 8 und TPM". August 21, 2013. Retrieved August 22, 2013.
  141. Staff (August 22, 2013). "German Federal Government Warns on the Security Dangers of Windows 8". Retrieved August 22, 2013.
  142. Carol D. Leonnig, Julie Tate and Barton Gellman (September 1, 2013). "U.S. intelligence agencies spend millions to hunt for insider threats, document shows". The Washington Post. Retrieved September 2, 2013.CS1 maint: uses authors parameter (link)
  143. Strohm, Chris (August 23, 2013). "Lawmakers Probing Intentional Abuses of Power by NSA Analysts". Bloomberg. Retrieved August 23, 2013.
  144. Gorman, Siobhan (August 23, 2013). "NSA Officers Sometimes Spy on Love Interests". The Wall Street Journal. Retrieved August 23, 2013.
  145. Scott Shane and Colin Moynihan (August 1, 2013). "Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.'s". The New York Times. Retrieved August 2, 2013.CS1 maint: uses authors parameter (link)
  146. "Synopsis of the Hemisphere Project". The New York Times. September 1, 2013. Retrieved September 2, 2013.
  147. Andersson, Aron (September 6, 2013). "Video: Här pekar Duncan Campbell ut Sverige" (in Swedish). Retrieved September 7, 2013.
  148. Victor Stenquist and Lisa Röstlund (September 6, 2013). "Uppgifter om Sverige fick inte publiceras" (in Swedish). Retrieved September 7, 2013.CS1 maint: uses authors parameter (link)
  149. Staff (September 6, 2013). "Sweden sits on pipeline of intelligence 'gold'". Retrieved September 7, 2013.
  150. Staff (September 8, 2013). "Datenbank PX: CIA und deutsche Dienste betrieben jahrelang Geheimprojekt" (in German). Retrieved September 8, 2013.
  151. Greenberg, Andy (September 17, 2013). "Amid NSA Scandal, ACLU Report Turns Spotlight Back To FBI's 'Unchecked Abuse Of Authority'". Forbes. Retrieved September 17, 2013.
  152. "Unleashed and Unaccountable: The FBI's Unchecked Abuse of Authority". September 17, 2013. Retrieved September 17, 2013.
  153. Cushing, Tim (September 18, 2013). "NSA Apparently Purchasing Software Exploits From French Security Firm". Retrieved September 18, 2013.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.