fbpx
Wikipedia

Timeline of global surveillance disclosures (2013–present)

This timeline of global surveillance disclosures from 2013 to the present day is a chronological list of the global surveillance disclosures that began in 2013. The disclosures have been largely instigated by revelations from the former American National Security Agency contractor Edward Snowden.

The Mira hotel in Hong Kong, where Edward Snowden hosted his first meeting with Glenn Greenwald, Laura Poitras, and journalist Ewen MacAskill of The Guardian[1]

2012 edit

In April 2012, Defense contractor Edward Snowden began downloading sensitive Western intelligence material while working for the American computer corporation Dell.[2] By the end of the year, Snowden had made his first contact with journalist Glenn Greenwald of The Guardian.[3]

January–May 2013 edit

In January 2013, Snowden contacted documentary filmmaker Laura Poitras.[4] In March 2013, Snowden took up a new job at Booz Allen Hamilton in Hawaii, specifically to gain access to additional top-secret documents that could be leaked.[2] In April 2013, Poitras asked Greenwald to meet her in New York City.[3] In May 2013, Snowden was permitted temporary leave from his position at the NSA in Hawaii, on the pretext of receiving treatment for his epilepsy.[5] Towards the end of May, Snowden flew to Hong Kong.[6]

June 2013 edit

After the U.S.-based editor of The Guardian held several meetings in New York City, it was decided that Greenwald, Poitras, and The Guardian's defence and intelligence correspondent Ewen MacAskill would fly to Hong Kong to meet Snowden. On June 5, in the first media report based on the leaked material,[7] The Guardian exposed a top secret court order showing that the NSA had collected phone records from over 120 million Verizon subscribers.[8] Under the order, the numbers of both parties on a call, as well as the location data, unique identifiers, time of call, and duration of call were handed over to the FBI, which turned over the records to the NSA.[8] According to The Wall Street Journal, the Verizon order is part of a controversial data program, which seeks to stockpile records on all calls made in the U.S., but doesn't collect information directly from T-Mobile USA and Verizon Wireless, in part because of their foreign ownership ties.[9]

On June 7, 2013, the second media disclosure, the revelation of the PRISM surveillance program,[10][11][12] was published simultaneously by The Guardian and The Washington Post.[1][13]

Documents provided by Snowden to Der Spiegel revealed how the NSA spied on various diplomatic missions of the European Union (EU) including the EU's delegation to the United States in Washington D.C., the EU's delegation to the United Nations in New York, and the Council of the European Union in Brussels, as well as the United Nations Headquarters in New York.[14][15] During specific episodes within a four-year period, the NSA hacked several Chinese mobile phone companies,[16] the Chinese University of Hong Kong, and Tsinghua University in Beijing,[17] and the Asian fiber-optic network operator Pacnet.[18] Only Australia, Canada, New Zealand, and the UK are explicitly exempted from NSA attacks, whose main target in the EU is Germany.[19] A method of bugging encrypted fax machines used at an EU embassy is codenamed Dropmire.[20]

During the 2009 G-20 London summit, the British intelligence agency Government Communications Headquarters (GCHQ) intercepted the communications of foreign diplomats.[21] In addition, the GCHQ has been intercepting and storing mass quantities of fiber-optic traffic via Tempora.[22] Two principal components of Tempora are called "Mastering the Internet" (MTI) and "Global Telecoms Exploitation".[23] The data is preserved for three days while metadata is kept for thirty days.[24] Data collected by the GCHQ under Tempora is shared with the National Security Agency (NSA) of the United States.[23]

From 2001 to 2011, the NSA collected vast amounts of metadata records detailing the email and internet usage of Americans via Stellar Wind,[25] which was later terminated due to operational and resource constraints. It was subsequently replaced by newer surveillance programs such as ShellTrumpet, which "processed its one trillionth metadata record" by the end of December 2012.[26]

According to the Boundless Informant, over 97 billion pieces of intelligence were collected over a 30-day period ending in March 2013. Out of all 97 billion sets of information, about 3 billion data sets originated from U.S. computer networks[27] and around 500 million metadata records were collected from German networks.[28]

Several weeks later, it was revealed that the Bundesnachrichtendienst (BND) of Germany transfers massive amounts of metadata records to the NSA.[29]

 
On June 11, 2013, The Guardian published a snapshot of the NSA's global map of electronic data collection for the month of March 2013. Known as the Boundless Informant, the program is used by the NSA to track the amount of data being analyzed over a specific period of time. The color scheme ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance). Outside the Middle East, only China, Germany, India, Kenya, and the United States are colored orange or yellow

July 2013 edit

According to the Brazilian newspaper O Globo, the NSA spied on millions of emails and calls of Brazilian citizens,[30][31] while Australia and New Zealand have been involved in the joint operation of the NSA's global analytical system XKeyscore.[32][33] Among the numerous allied facilities contributing to XKeyscore are four installations in Australia and one in New Zealand:

O Globo released an NSA document titled "Primary FORNSAT Collection Operations", which revealed the specific locations and codenames of the FORNSAT intercept stations in 2002.[34]

According to Edward Snowden, the NSA has established secret intelligence partnerships with many Western governments.[33] The Foreign Affairs Directorate (FAD) of the NSA is responsible for these partnerships, which, according to Snowden, are organized such that foreign governments can "insulate their political leaders" from public outrage in the event that these global surveillance partnerships are leaked.[35]

In an interview published by Der Spiegel, Snowden accused the NSA of being "in bed together with the Germans".[36] The NSA granted the German intelligence agencies BND (foreign intelligence) and BfV (domestic intelligence) access to its controversial XKeyscore system.[37] In return, the BND turned over copies of two systems named Mira4 and Veras, reported to exceed the NSA's SIGINT capabilities in certain areas.[38] Every day, massive amounts of metadata records are collected by the BND and transferred to the NSA via the Bad Aibling Station near Munich, Germany.[38] In December 2012 alone, the BND handed over 500 million metadata records to the NSA.[39][40]

In a document dated January 2013, the NSA acknowledged the efforts of the BND to undermine privacy laws:

"The BND has been working to influence the German government to relax interpretation of the privacy laws to provide greater opportunities of intelligence sharing[40]

According to an NSA document dated April 2013, Germany has now become the NSA's "most prolific partner".[40] Under a section of a separate document leaked by Snowden titled "Success Stories", the NSA acknowledged the efforts of the German government to expand the BND's international data sharing with partners:

"The German government modifies its interpretation of the G-10 privacy law … to afford the BND more flexibility in sharing protected information with foreign partners."[41]

In addition, the German government was well aware of the PRISM surveillance program long before Edward Snowden made details public. According to Angela Merkel's spokesman Steffen Seibert, there are two separate PRISM programs - one is used by the NSA and the other is used by NATO forces in Afghanistan.[42] Both surveillance programs are "not identical".[42]

The Guardian revealed further details of the NSA's XKeyscore tool, which allows government analysts to search through vast databases containing emails, online chats and the browsing histories of millions of individuals without prior authorization.[43][44][45] Microsoft "developed a surveillance capability to deal" with the interception of encrypted chats on Outlook.com, within five months after the service went into testing. NSA had access to Outlook.com emails because “Prism collects this data prior to encryption.”[46]

In addition, Microsoft worked with the FBI to enable the NSA to gain access to its cloud storage service SkyDrive. An internal NSA document dating from 3 August 2012 described the PRISM surveillance program as a "team sport".[46]

Even if there is no reason to suspect U.S. citizens of wrongdoing, the CIA's National Counterterrorism Center is allowed to examine federal government files for possible criminal behavior. Previously the NTC was barred to do so, unless a person was a terror suspect or related to an investigation.[47]

Snowden also confirmed that Stuxnet was cooperatively developed by the United States and Israel.[48] In a report unrelated to Edward Snowden, the French newspaper Le Monde revealed that France's DGSE was also undertaking mass surveillance, which it described as "illegal and outside any serious control".[49][50]

August 2013 edit

Documents leaked by Edward Snowden that were seen by Süddeutsche Zeitung (SZ) and Norddeutscher Rundfunk revealed that several telecom operators have played a key role in helping the British intelligence agency Government Communications Headquarters (GCHQ) tap into worldwide fiber-optic communications. The telecom operators are:

Each of them were assigned a particular area of the international fiber-optic network for which they were individually responsible. The following networks have been infiltrated by the GCHQ: TAT-14 (Europe-USA), Atlantic Crossing 1 (Europe-USA), Circe South (France-UK), Circe North (The Netherlands-UK), Flag Atlantic-1, Flag Europa-Asia, SEA-ME-WE 3 (Southeast Asia-Middle East-Western Europe), SEA-ME-WE 4 (Southeast Asia-Middle East-Western Europe), Solas (Ireland-UK), UK-France 3, UK-Netherlands 14, ULYSSES (Europe-UK), Yellow (UK-USA) and Pan European Crossing.[53]

Telecommunication companies who participated were "forced" to do so and had "no choice in the matter".[53] Some of the companies were subsequently paid by GCHQ for their participation in the infiltration of the cables.[53] According to the SZ the GCHQ has access to the majority of internet and telephone communications flowing throughout Europe, can listen to phone calls, read emails and text messages, see which websites internet users from all around the world are visiting. It can also retain and analyse nearly the entire European internet traffic.[53]

The GCHQ is collecting all data transmitted to and from the United Kingdom and Northern Europe via the undersea fibre optic telecommunications cable SEA-ME-WE 3. The Security and Intelligence Division (SID) of Singapore co-operates with Australia in accessing and sharing communications carried by the SEA-ME-WE-3 cable. The Australian Signals Directorate (ASD) is also in a partnership with British, American and Singaporean intelligence agencies to tap undersea fibre optic telecommunications cables that link Asia, the Middle East and Europe and carry much of Australia's international phone and internet traffic.[54]

The U.S. runs a top-secret surveillance program known as the Special Collection Service (SCS), which is based in over 80 U.S. consulates and embassies worldwide.[55][56] The NSA hacked the United Nations' video conferencing system in Summer 2012 in violation of a UN agreement.[55][56]

The NSA is not just intercepting the communications of Americans who are in direct contact with foreigners targeted overseas, but also searching the contents of vast amounts of e-mail and text communications into and out of the country by Americans who mention information about foreigners under surveillance.[57] It also spied on the Al Jazeera and gained access to its internal communications systems.[58]

The NSA has built a surveillance network that has the capacity to reach roughly 75% of all U.S. Internet traffic.[59][60][61] U.S. Law-enforcement agencies use tools used by computer hackers to gather information on suspects.[62][63] An internal NSA audit from May 2012 identified 2776 incidents i.e. violations of the rules or court orders for surveillance of Americans and foreign targets in the U.S. in the period from April 2011 through March 2012, while U.S. officials stressed that any mistakes are not intentional.[64][65][66][67][68][69][70]

The FISA Court that is supposed to provide critical oversight of the U.S. government's vast spying programs has limited ability to do and it must trust the government to report when it improperly spies on Americans.[71] A legal opinion declassified on August 21, 2013 revealed that the NSA intercepted for three years as many as 56,000 electronic communications a year of Americans who weren't suspected of having links to terrorism, before FISC court that oversees surveillance found the operation unconstitutional in 2011.[72][73][74][75][76] Under the Corporate Partner Access project, major U.S. telecommunications providers receive hundreds of millions of dollars each year from the NSA.[77] Voluntary cooperation between the NSA and the providers of global communications took off during the 1970s under the cover name BLARNEY.[77]

A letter drafted by the Obama administration specifically to inform Congress of the government's mass collection of Americans’ telephone communications data was withheld from lawmakers by leaders of the House Intelligence Committee in the months before a key vote affecting the future of the program.[78][79]

The NSA paid GCHQ over £100 Million between 2009 and 2012, in exchange for these funds GCHQ "must pull its weight and be seen to pull its weight." Documents referenced in the article explain that the weaker British laws regarding spying are "a selling point" for the NSA. GCHQ is also developing the technology to "exploit any mobile phone at any time."[80] The NSA has under a legal authority a secret backdoor into its databases gathered from large Internet companies enabling it to search for U.S. citizens' email and phone calls without a warrant.[81][82]

The Privacy and Civil Liberties Oversight Board urged the U.S. intelligence chiefs to draft stronger US surveillance guidelines on domestic spying after finding that several of those guidelines have not been updated up to 30 years.[83][84] U.S. intelligence analysts have deliberately broken rules designed to prevent them from spying on Americans by choosing to ignore so-called "minimisation procedures" aimed at protecting privacy.[85][86][87]

After the U.S. Foreign Secret Intelligence Court ruled in October 2011 that some of the NSA's activities were unconstitutional, the agency paid millions of dollars to major internet companies to cover extra costs incurred in their involvement with the PRISM surveillance program.[88]

"Mastering the Internet" (MTI) is part of the Interception Modernisation Programme (IMP) of the British government that involves the insertion of thousands of DPI (deep packet inspection) "black boxes" at various internet service providers, as revealed by the British media in 2009.[89]

In 2013, it was further revealed that the NSA had made a £17.2  million financial contribution to the project, which is capable of vacuuming signals from up to 200 fibre-optic cables at all physical points of entry into Great Britain.[90]

September 2013 edit

The Guardian and The New York Times reported on secret documents leaked by Snowden showing that the NSA has been in "collaboration with technology companies" as part of "an aggressive, multipronged effort" to weaken the encryption used in commercial software, and the GCHQ has a team dedicated to cracking "Hotmail, Google, Yahoo and Facebook" traffic.[91][92][93][94][95][96] Israel, Sweden and Italy are also cooperating with American and British intelligence agencies. Under a secret treaty codenamed "Lustre", French intelligence agencies transferred millions of metadata records to the NSA.[97][98][99][100]

The Obama Administration secretly won permission from the Foreign Intelligence Surveillance Court in 2011 to reverse restrictions on the National Security Agency's use of intercepted phone calls and e-mails, permitting the agency to search deliberately for Americans’ communications in its massive databases. The searches take place under a surveillance program Congress authorized in 2008 under Section 702 of the Foreign Intelligence Surveillance Act. Under that law, the target must be a foreigner “reasonably believed” to be outside the United States, and the court must approve the targeting procedures in an order good for one year, but a warrant for each target would thus no longer be required. That means that communications with Americans could be picked up without a court first determining that there is probable cause that the people they were talking to were terrorists, spies or “foreign powers.” The FISC extended the length of time that the NSA is allowed to retain intercepted U.S. communications from five years to six years with an extension possible for foreign intelligence or counterintelligence purposes. Both measures were done without public debate or any specific authority from Congress.[101]

A special branch of the NSA called "Follow the Money" (FTM) monitors international payments, banking and credit card transactions and later stores the collected data in the NSA's own financial databank "Tracfin".[102] The NSA monitored the communications of Brazil's president Dilma Rousseff and her top aides.[103] The agency also spied on Brazil's oil firm Petrobras as well as French diplomats, and gained access to the private network of the Ministry of Foreign Affairs of France and the SWIFT network.[104]

In the United States, the NSA uses the analysis of phone call and e-mail logs of American citizens to create sophisticated graphs of their social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information.[105] The NSA routinely shares raw intelligence data with Israel without first sifting it to remove information about U.S. citizens.[106][107]

In an effort codenamed GENIE, computer specialists can control foreign computer networks using "covert implants,” a form of remotely transmitted malware on tens of thousands of devices annually.[108][109][110][111] As worldwide sales of smartphones began exceeding those of feature phones, the NSA decided to take advantage of the smartphone boom. This is particularly advantageous because the smartphone combines a myriad of data that would interest an intelligence agency, such as social contacts, user behavior, interests, location, photos and credit card numbers and passwords.[112]

An internal NSA report from 2010 stated that the spread of the smartphone has been occurring "extremely rapidly"—developments that "certainly complicate traditional target analysis."[112] According to the document, the NSA has set up task forces assigned to several smartphone manufacturers and operating systems, including Apple Inc.'s iPhone and iOS operating system, as well as Google's Android mobile operating system.[112] Similarly, Britain's GCHQ assigned a team to study and crack the BlackBerry.[112]

Under the heading "iPhone capability", the document notes that there are smaller NSA programs, known as "scripts", that can perform surveillance on 38 different features of the iOS 3 and iOS 4 operating systems. These include the mapping feature, voicemail and photos, as well as Google Earth, Facebook and Yahoo! Messenger.[112]

October 2013 edit

On October 4, 2013, The Washington Post and The Guardian jointly reported that the NSA and the GCHQ have made repeated attempts to spy on anonymous Internet users who have been communicating in secret via the anonymity network Tor. Several of these surveillance operations involve the implantation of malicious code into the computers of Tor users who visit particular websites. The NSA and GCHQ have partly succeeded in blocking access to the anonymous network, diverting Tor users to insecure channels. The government agencies were also able to uncover the identity of some anonymous Internet users.[113][114][115][116][117][118][119][120][121]

The Communications Security Establishment Canada (CSEC) has been using a program called Olympia to map the communications of Brazil's Mines and Energy Ministry by targeting the metadata of phone calls and emails to and from the ministry.[122][123]

The Australian Federal Government knew about the PRISM surveillance program months before Edward Snowden made details public.[124][125]

The NSA monitored the public email account of former Mexican president Felipe Calderón (thus gaining access to the communications of high-ranking cabinet members), the E-Mails of several high-ranking members of Mexico's security forces and text and the mobile phone communication of current Mexican president Enrique Peña Nieto.[126][127] The NSA tries to gather cellular and landline phone numbers—often obtained from American diplomats—for as many foreign officials as possible. The contents of the phone calls are stored in computer databases that can regularly be searched using keywords.[128][129]

The NSA has been monitoring telephone conversations of 35 world leaders.[130] The U.S. government's first public acknowledgment that it tapped the phones of world leaders was reported on October 28, 2013 by the Wall Street Journal after an internal U.S. government review turned up NSA monitoring of some 35 world leaders.[131] The GCHQ has tried to keep its mass surveillance program a secret because it feared a "damaging public debate" on the scale of its activities which could lead to legal challenges against them.[132]

The Guardian revealed that the NSA had been monitoring telephone conversations of 35 world leaders after being given the numbers by an official in another U.S. government department. A confidential memo revealed that the NSA encouraged senior officials in such Departments as the White House, State and The Pentagon, to share their "Rolodexes" so the agency could add the telephone numbers of leading foreign politicians to their surveillance systems. Reacting to the news, German leader Angela Merkel, arriving in Brussels for an EU summit, accused the U.S. of a breach of trust, saying: "We need to have trust in our allies and partners, and this must now be established once again. I repeat that spying among friends is not at all acceptable against anyone, and that goes for every citizen in Germany."[130] The NSA collected in 2010 data on ordinary Americans’ cellphone locations, but later discontinued it because it had no “operational value.”[133]

Under Britain's MUSCULAR programme, the NSA and the GCHQ have secretly broken into the main communications links that connect Yahoo and Google data centers around the world and thereby gained the ability to collect metadata and content at will from hundreds of millions of user accounts.[134][135][136][137][138]

The mobile phone of German Chancellor Angela Merkel might have been tapped by U.S. intelligence.[139][140][141][142][143][144][145] According to the Spiegel this monitoring goes back to 2002[146][147] and ended in the summer of 2013,[131] while the New York Times reported that Germany has evidence that the NSA's surveillance of Merkel began during George W. Bush's tenure.[148] After learning from Der Spiegel magazine that the NSA has been listening in to her personal mobile phone, Merkel compared the snooping practices of the NSA with those of the Stasi.[149]

On October 31, 2013, Hans-Christian Ströbele, a member of the German Bundestag, met Snowden in Moscow and revealed the former intelligence contractor's readiness to brief the German government on NSA spying.[150]

A highly sensitive signals intelligence collection program known as Stateroom involves the interception of radio, telecommunications and internet traffic. It is operated out of the diplomatic missions of the Five Eyes (Australia, Britain, Canada, New Zealand, United States) in numerous locations around the world. The program conducted at U.S. diplomatic missions is run in concert by the U.S. intelligence agencies NSA and CIA in a joint venture group called "Special Collection Service" (SCS), whose members work undercover in shielded areas of the American Embassies and Consulates, where they are officially accredited as diplomats and as such enjoy special privileges. Under diplomatic protection, they are able to look and listen unhindered. The SCS for example used the American Embassy near the Brandenburg Gate in Berlin to monitor communications in Germany's government district with its parliament and the seat of the government.[145][151][152][153]

Under the Stateroom surveillance programme, Australia operates clandestine surveillance facilities to intercept phone calls and data across much of Asia.[152][154]

In France, the NSA targeted people belonging to the worlds of business, politics or French state administration. The NSA monitored and recorded the content of telephone communications and the history of the connections of each target i.e. the metadata.[155][156] The actual surveillance operation was performed by French intelligence agencies on behalf of the NSA.[97][157] The cooperation between France and the NSA was confirmed by the Director of the NSA, Keith B. Alexander, who asserted that foreign intelligence services collected phone records in "war zones" and "other areas outside their borders" and provided them to the NSA.[158]

The French newspaper Le Monde also disclosed new PRISM and Upstream slides (See Page 4, 7 and 8) coming from the "PRISM/US-984XN Overview" presentation.[159]

In Spain, the NSA intercepted the telephone conversations, text messages and emails of millions of Spaniards, and spied on members of the Spanish government.[160] Between December 10, 2012 and January 8, 2013, the NSA collected metadata on 60 million telephone calls in Spain.[161]

According to documents leaked by Snowden, the surveillance of Spanish citizens was jointly conducted by the NSA and the intelligence agencies of Spain.[162][163]

 
On October 4, 2013, The Washington Post published a powerpoint presentation leaked by Snowden, showing how the NSA has compromised the Tor encrypted network that is being employed by hundreds of thousands of people to circumvent "nation state internet policies". By secretly exploiting a JavaScript plug-in, the NSA is able to uncover the identities of various anonymous Internet users such as dissidents, terrorists, and other targets

November 2013 edit

The New York Times reported that the NSA carries out an eavesdropping effort, dubbed Operation Dreadnought, against the Iranian leader Ayatollah Ali Khamenei. During his 2009 visit to Iranian Kurdistan, the agency collaborated with the GCHQ and the U.S.'s National Geospatial-Intelligence Agency, collecting radio transmissions between aircraft and airports, examining Khamenei's convoy with satellite imagery, and enumerating military radar stations. According to the story, an objective of the operation is "communications fingerprinting": the ability to distinguish Khamenei's communications from those of other people in Iran.[164]

The same story revealed an operation code-named Ironavenger, in which the NSA intercepted e-mails sent between a country allied with the United States and the government of "an adversary". The ally was conducting a spear-phishing attack: its e-mails contained malware. The NSA gathered documents and login credentials belonging to the enemy country, along with knowledge of the ally's capabilities for attacking computers.[164]

According to the British newspaper The Independent, the British intelligence agency GCHQ maintains a listening post on the roof of the British Embassy in Berlin that is capable of intercepting mobile phone calls, wi-fi data and long-distance communications all over the German capital, including adjacent government buildings such as the Reichstag (seat of the German parliament) and the Chancellery (seat of Germany's head of government) clustered around the Brandenburg Gate.[165]

Operating under the code-name "Quantum Insert", the GCHQ set up a fake website masquerading as LinkedIn, a social website used for professional networking, as part of its efforts to install surveillance software on the computers of the telecommunications operator Belgacom.[166] In addition, the headquarters of the oil cartel OPEC were infiltrated by the GCHQ as well as the NSA, which bugged the computers of nine OPEC employees and monitored the General Secretary of OPEC.[166]

For more than three years the GCHQ has been using an automated monitoring system code-named "Royal Concierge" to infiltrate the reservation systems of at least 350 upscale hotels in many different parts of the world in order to target, search and analyze reservations to detect diplomats and government officials.[167] First tested in 2010, the aim of the "Royal Concierge" is to track down the travel plans of diplomats, and it is often supplemented with surveillance methods related to human intelligence (HUMINT). Other covert operations include the wiretapping of room telephones and fax machines used in targeted hotels as well as the monitoring of computers hooked up to the hotel network.[167]

In November 2013, the Australian Broadcasting Corporation and The Guardian revealed that the Australian Signals Directorate (DSD) had attempted to listen to the private phone calls of the president of Indonesia and his wife. The Indonesian foreign minister, Marty Natalegawa, confirmed that he and the president had contacted the ambassador in Canberra. Natalegawa said any tapping of Indonesian politicians’ personal phones “violates every single decent and legal instrument I can think of—national in Indonesia, national in Australia, international as well”.[168]

Other high-ranking Indonesian politicians targeted by the DSD include:

Carrying the title "3G impact and update", a classified presentation leaked by Snowden revealed the attempts of the ASD/DSD to keep up to pace with the rollout of 3G technology in Indonesia and across Southeast Asia. The ASD/DSD motto placed at the bottom of each page reads: "Reveal their secrets—protect our own."[169]

Under a secret deal approved by British intelligence officials, the NSA has been storing and analyzing the internet and email records of British citizens since 2007. The NSA also proposed in 2005 a procedure for spying on the citizens of the UK and other Five-Eyes nations alliance, even where the partner government has explicitly denied the U.S. permission to do so. Under the proposal, partner countries must neither be informed about this particular type of surveillance, nor the procedure of doing so.[170]

Towards the end of November, The New York Times released an internal NSA report outlining the agency's efforts to expand its surveillance abilities.[171] The five-page document asserts that the law of the United States has not kept up with the needs of the NSA to conduct mass surveillance in the "golden age" of signals intelligence, but there are grounds for optimism because, in the NSA's own words:

"The culture of compliance, which has allowed the American people to entrust NSA with extraordinary authorities, will not be compromised in the face of so many demands, even as we aggressively pursue legal authorities..."[172]

The report, titled "SIGNT Strategy 2012–2016", also said that the U.S. will try to influence the "global commercial encryption market" through "commercial relationships", and emphasized the need to "revolutionize" the analysis of its vast data collection to "radically increase operational impact".[171]

On November 23, 2013, the Dutch newspaper NRC Handelsblad reported that the Netherlands was targeted by U.S. intelligence agencies in the immediate aftermath of World War II. This period of surveillance lasted from 1946 to 1968, and also included the interception of the communications of other European countries including Belgium, France, West Germany and Norway.[173] The Dutch Newspaper also reported that NSA infected more than 50,000 computer networks worldwide, often covertly, with malicious spy software, sometimes in cooperation with local authorities, designed to steal sensitive information.[174][175]

 
On November 23, 2013, the Dutch newspaper NRC Handelsblad released a top secret NSA presentation leaked by Snowden, showing five "Classes of Accesses" that the NSA uses in its worldwide signals intelligence operations.[174][175] These five "Classes of Accesses" are:
  3rd PARTY/LIAISON—refers to data provided by the international partners of the NSA. Within the framework of the UKUSA Agreement, these international partners are known as "third parties".
  REGIONAL—refers to over 80 regional Special Collection Services (SCS). The SCS is a black budget program operated by the NSA and the CIA, with operations based in many cities such as Athens, Bangkok, Berlin, Brasília, Budapest, Frankfurt, Geneva, Lagos, Milan, New Delhi, Paris, Prague, Vienna, and Zagreb, and others, targeting Central America, the Arabian Peninsula, East Asia, and Continental Europe.
  CNE—an abbreviation for "Computer Network Exploitation". It is performed by a special cyber-warfare unit of the NSA known as Tailored Access Operations (TAO), which infected over 50,000 computer networks worldwide with malicious software designed to steal sensitive information, and is mostly aimed at Brazil, China, Egypt, India, Mexico, Saudi Arabia, and parts of Eastern Europe
  LARGE CABLE—20 major points of accesses, many of them located within the United States
  FORNSAT—an abbreviation for "Foreign Satellite Collection". It refers to intercepts from satellites that process data used by other countries such as Britain, Norway, Japan, and the Philippines

December 2013 edit

According to the classified documents leaked by Snowden, the Australian Signals Directorate, formerly known as the Defence Signals Directorate, had offered to share information on Australian citizens with the other intelligence agencies of the UKUSA Agreement. Data shared with foreign countries include "bulk, unselected, unminimised metadata" such as "medical, legal or religious information".[176]

The Washington Post revealed that the NSA has been tracking the locations of mobile phones from all over the world by tapping into the cables that connect mobile networks globally and that serve U.S. cellphones as well as foreign ones. In the process of doing so, the NSA collects more than five billion records of phone locations on a daily basis. This enables NSA analysts to map cellphone owners’ relationships by correlating their patterns of movement over time with thousands or millions of other phone users who cross their paths.[177][178][179][180][181][182][183][184]

The Washington Post also reported that the NSA makes use of location data and advertising tracking files generated through normal internet browsing i.e. tools that enable Internet advertisers to track consumers from Google and others to get information on potential targets, to pinpoint targets for government hacking and to bolster surveillance.[185][186][187]

The Norwegian Intelligence Service (NIS), which cooperates with the NSA, has gained access to Russian targets in the Kola Peninsula and other civilian targets. In general, the NIS provides information to the NSA about "Politicians", "Energy" and "Armament".[188] A top secret memo of the NSA lists the following years as milestones of the Norway-United States of America SIGNT agreement, or NORUS Agreement:

The NSA considers the NIS to be one of its most reliable partners. Both agencies also cooperate to crack the encryption systems of mutual targets. According to the NSA, Norway has made no objections to its requests from the NIS.[189]

On 5 December, Sveriges Television reported that the National Defence Radio Establishment (FRA) has been conducting a clandestine surveillance operation in Sweden, targeting the internal politics of Russia. The operation was conducted on behalf of the NSA, receiving data handed over to it by the FRA.[190][191] The Swedish-American surveillance operation also targeted Russian energy interests as well as the Baltic states.[192] As part of the UKUSA Agreement, a secret treaty was signed in 1954 by Sweden with the United States, the United Kingdom, Canada, Australia and New Zealand, regarding collaboration and intelligence sharing.[193]

As a result of Snowden's disclosures, the notion of Swedish neutrality in international politics was called into question.[citation needed] In an internal document dating from the year 2006, the NSA acknowledged that its "relationship" with Sweden is "protected at the TOP SECRET level because of that nation’s political neutrality."[194] Specific details of Sweden's cooperation with members of the UKUSA Agreement include:

  • The FRA has been granted access to XKeyscore, an analytical database of the NSA.[195]
  • Sweden updated the NSA on changes in Swedish legislation that provided the legal framework for information sharing between the FRA and the Swedish Security Service.[195]
  • Since January 2013, a counterterrorism analyst of the NSA has been stationed in the Swedish capital of Stockholm.[195]
  • The NSA, the GCHQ and the FRA signed an agreement in 2004 that allows the FRA to directly collaborate with the NSA without having to consult the GCHQ.[195]

In order to identify targets for government hacking and surveillance, both the GCHQ and the NSA have used advertising cookies operated by Google, known as Pref, to "pinpoint" targets. According to documents leaked by Snowden, the Special Source Operations of the NSA has been sharing information containing "logins, cookies, and GooglePREFID" with the Tailored Access Operations division of the NSA, as well as Britain's GCHQ agency.[196]

During the 2010 G-20 Toronto summit, the U.S. embassy in Ottawa was transformed into a security command post during a six-day spying operation that was conducted by the NSA and closely co-ordinated with the Communications Security Establishment Canada (CSEC). The goal of the spying operation was, among others, to obtain information on international development, banking reform, and to counter trade protectionism to support "U.S. policy goals."[197] On behalf of the NSA, the CSEC has set up covert spying posts in 20 countries around the world.

In Italy the Special Collection Service of the NSA maintains two separate surveillance posts in Rome and Milan.[198] According to a secret NSA memo dated September 2010, the Italian embassy in Washington, D.C. has been targeted by two spy operations of the NSA:

  • Under the codename "Bruneau", which refers to mission "Lifesaver", the NSA sucks out all the information stored in the embassy's computers and creates electronic images of hard disk drives.[198]
  • Under the codename "Hemlock", which refers to mission "Highlands", the NSA gains access to the embassy's communications through physical "implants".[198]

Due to concerns that terrorist or criminal networks may be secretly communicating via computer games, the NSA, the GCHQ, the CIA, and the FBI have been conducting surveillance and scooping up data from the networks of many online games, including massively multiplayer online role-playing games (MMORPGs) such as World of Warcraft, as well as virtual worlds such as Second Life, and the Xbox gaming console.[199][200][201][202]

The NSA has cracked the most commonly used cellphone encryption technology, A5/1. According to a classified document leaked by Snowden, the agency can "process encrypted A5/1" even when it has not acquired an encryption key.[203] In addition, the NSA uses various types of cellphone infrastructure, such as the links between carrier networks, to determine the location of a cellphone user tracked by Visitor Location Registers.[204]

US district court judge for the District of Columbia, Richard Leon, declared[205][206][207][208][209][210] on December 16, 2013, that the mass collection of metadata of Americans’ telephone records by the National Security Agency probably violates the fourth amendment prohibition of unreasonable searches and seizures.[211] Leon granted the request for a preliminary injunction that blocks the collection of phone data for two private plaintiffs (Larry Klayman, a conservative lawyer, and Charles Strange, father of a cryptologist killed in Afghanistan when his helicopter was shot down in 2011)[212] and ordered the government to destroy any of their records that have been gathered. But the judge stayed action on his ruling pending a government appeal, recognizing in his 68-page opinion the “significant national security interests at stake in this case and the novelty of the constitutional issues.”[211]

However federal judge William H. Pauley III in New York City ruled[213] the U.S. government's global telephone data-gathering system is needed to thwart potential terrorist attacks, and that it can only work if everyone's calls are swept in. U.S. District Judge Pauley also ruled that Congress legally set up the program and that it does not violate anyone's constitutional rights. The judge also concluded that the telephone data being swept up by NSA did not belong to telephone users, but to the telephone companies. He further ruled that when NSA obtains such data from the telephone companies, and then probes into it to find links between callers and potential terrorists, this further use of the data was not even a search under the Fourth Amendment. He also concluded that the controlling precedent is Smith v. Maryland: “Smith’s bedrock holding is that an individual has no legitimate expectation of privacy in information provided to third parties,” Judge Pauley wrote.[214][215][216][217] The American Civil Liberties Union declared on January 2, 2012 that it will appeal Judge Pauley's ruling that NSA bulk the phone record collection is legal. "The government has a legitimate interest in tracking the associations of suspected terrorists, but tracking those associations does not require the government to subject every citizen to permanent surveillance,” deputy ACLU legal director Jameel Jaffer said in a statement.[218]

In recent years, American and British intelligence agencies conducted surveillance on more than 1,100 targets, including the office of an Israeli prime minister, heads of international aid organizations, foreign energy companies and a European Union official involved in antitrust battles with American technology businesses.[219]

A catalog of high-tech gadgets and software developed by the NSA's Tailored Access Operations (TAO) was leaked by the German news magazine Der Spiegel.[220] Dating from 2008, the catalog revealed the existence of special gadgets modified to capture computer screenshots and USB flash drives secretly fitted with radio transmitters to broadcast stolen data over the airwaves, and fake base stations intended to intercept mobile phone signals, as well as many other secret devices and software implants listed here:

Computer implants
Server implants and firewall implants
Mobile phone implants and related products

The Tailored Access Operations (TAO) division of the NSA intercepted the shipping deliveries of computers and laptops in order to install spyware and physical implants on electronic gadgets. This was done in close cooperation with the FBI and the CIA.[220][221][222][223][224][225][226] NSA officials responded to the Spiegel reports with a statement, which said: "Tailored Access Operations is a unique national asset that is on the front lines of enabling NSA to defend the nation and its allies. [TAO's] work is centred on computer network exploitation in support of foreign intelligence collection."[227]

In a separate disclosure unrelated to Snowden, the French Trésor public, which runs a certificate authority, was found to have issued fake certificates impersonating Google in order to facilitate spying on French government employees via man-in-the-middle attacks.[228]

 
On 4 December 2013, The Washington Post released an internal NSA chart illustrating the extent of the agency's mass collection of mobile phone location records, which amounts to about five billion on a daily basis.[177] The records are stored in a huge database known as FASCIA, which received over 27 terabytes of location data within seven months.[229]

January 2014 edit

The NSA is working to build a powerful quantum computer capable of breaking all types of encryption.[230][231][232][233][234] The effort is part of a US$79.7 million research program known as "Penetrating Hard Targets". It involves extensive research carried out in large, shielded rooms known as Faraday cages, which are designed to prevent electromagnetic radiation from entering or leaving.[231] Currently, the NSA is close to producing basic building blocks that will allow the agency to gain "complete quantum control on two semiconductor qubits".[231] Once a quantum computer is successfully built, it would enable the NSA to unlock the encryption that protects data held by banks, credit card companies, retailers, brokerages, governments and health care providers.[230]

According to the New York Times the NSA is monitoring approximately 100.000 computers worldwide with spy software named Quantum. Quantum enables the NSA to conduct surveillance on those computers on the one hand and can also create a digital highway for launching cyberattacks on the other hand. Among the targets are the Chinese and Russian military, but also trade institutions within the European Union. The NYT also reported that the NSA can access and alter computers which are not connected with the internet by a secret technology in use by the NSA since 2008. The prerequisite is the physically insertion of the radio frequency hardware by a spy, a manufacturer or an unwitting user. The technology relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. The technology can also transmit malware back to the infected computer.[174]

Channel 4 and The Guardian revealed the existence of Dishfire, a massive database of the NSA that collects hundreds of millions of text messages on a daily basis.[235] The GCHQ has been given full access to the database, which it uses to obtain personal information of Britons by exploiting a legal loophole.[236]

Each day, the database receives and stores the following amounts of data:

The database is supplemented with an analytical tool known as the Prefer program, which processes SMS messages to extract other types of information including contacts from missed call alerts.[237]

According to a joint disclosure by the New York Times, the Guardian, and ProPublica,[239][240][241][242][243] the NSA and the GCHQ have begun working together to collect and store data from dozens of smartphone application software by 2007 at the latest. A 2008 GCHQ report leaked by Snowden asserts that "anyone using Google Maps on a smartphone is working in support of a GCHQ system". The NSA and the GCHQ have traded recipes for various purposes such as grabbing location data and journey plans that are made when a target uses Google Maps, and vacuuming up address books, buddy lists, phone logs and geographic data embedded in photos posted on the mobile versions of numerous social networks such as Facebook, Flickr, LinkedIn, Twitter and other services. In a separate 20-page report dated 2012, the GCHQ cited the popular smartphone game "Angry Birds" as an example of how an application could be used to extract user data. Taken together, such forms of data collection would allow the agencies to collect vital information about a user's life, including his or her home country, current location (through geolocation), age, gender, ZIP code, marital status, income, ethnicity, sexual orientation, education level, number of children, etc.[244][245]

A GCHQ document dated August 2012 provided details of the Squeaky Dolphin surveillance program, which enables the GCHQ to conduct broad, real-time monitoring of various social media features and social media traffic such as YouTube video views, the Like button on Facebook, and Blogspot/Blogger visits without the knowledge or consent of the companies providing those social media features. The agency's “Squeaky Dolphin” program can collect, analyze and utilize YouTube, Facebook and Blogger data in specific situations in real time for analysis purposes. The program also collects the addresses from the billion of videos watched daily as well as some user information for analysis purposes.[246][247][248]

During the 2009 United Nations Climate Change Conference in Copenhagen, the NSA and its Five Eyes partners monitored the communications of delegates of numerous countries. This was done to give their own policymakers a negotiating advantage.[249][250]

The Communications Security Establishment Canada (CSEC) has been tracking Canadian air passengers via free Wi-Fi services at a major Canadian airport. Passengers who exited the airport terminal continued to be tracked as they showed up at other Wi-Fi locations across Canada. In a CSEC document dated May 2012, the agency described how it had gained access to two communications systems with over 300,000 users in order to pinpoint a specific imaginary target. The operation was executed on behalf of the NSA as a trial run to test a new technology capable of tracking down "any target that makes occasional forays into other cities/regions." This technology was subsequently shared with Canada's Five Eyes partners - Australia, New Zealand, Britain, and the United States.[251][252][253]

 
On 27 January 2014, The New York Times released[241] an internal NSA document from a 2010 meeting that details the extent of the agency's surveillance on smartphones. Data collected include phone settings, network connections, Web browsing history, buddy lists, downloaded documents, encryption usage, and user agents. Notice the following line of text at the bottom - "TOP SECRET//COMINT//REL TO USA, FVEY" - which is used to indicated that this top secret document is related to communications intelligence (COMINT), and can be accessed by the USA and its Five Eyes (FVEY) partners in Australia, Britain, Canada, and New Zealand

February 2014 edit

According to research by Süddeutsche Zeitung and TV network NDR the mobile phone of former German chancellor Gerhard Schröder was monitored from 2002 onwards, reportedly because of his government's opposition to military intervention in Iraq. The source of the latest information is a document leaked by NSA whistleblower Edward Snowden. The document, containing information about the National Sigint Requirement List (NSRL), had previously been interpreted as referring only to Angela Merkel's mobile. However Süddeutsche Zeitung and NDR claim to have confirmation from NSA insiders that the surveillance authorisation pertains not to the individual, but the political post – which in 2002 was still held by Schröder. According to research by the two media outlets, Schröder was placed as number 388 on the list, which contains the names of persons and institutions to be put under surveillance by the NSA.[254][255][256][257]

The GCHQ launched a cyber-attack on the activist network "Anonymous", using denial-of-service attack (DoS) to shut down a chatroom frequented by the network's members and to spy on them. The attack, dubbed Rolling Thunder, was conducted by a GCHQ unit known as the Joint Threat Research Intelligence Group (JTRIG). The unit successfully uncovered the true identities of several Anonymous members.[258][259][260][261]

The NSA Section 215 bulk telephony metadata program which seeks to stockpile records on all calls made in the U.S. is collecting less than 30 percent of all Americans' call records because of an inability to keep pace with the explosion in cellphone use, according to The Washington Post. The controversial program permits the NSA after a warrant granted by the secret Foreign Intelligence Surveillance Court to record numbers, length and location of every call from the participating carriers.[262][263]

March 2014 edit

The NSA has built an infrastructure which enables it to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The NSA relies on an automated system codenamed TURBINE which in essence enables the automated management and control of a large network of implants (a form of remotely transmitted malware on selected individual computer devices or in bulk on tens of thousands of devices). As quoted by The Intercept, TURBINE is designed to "allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually."[264] The NSA has shared many of its files on the use of implants with its counterparts in the so-called Five Eyes surveillance alliance – the United Kingdom, Canada, New Zealand, and Australia.

Among other things due to TURBINE and its control over the implants the NSA is capable of:

  • breaking into targeted computers and to siphoning out data from foreign Internet and phone networks
  • infecting a target's computer and exfiltrating files from a hard drive
  • covertly recording audio from a computer's microphone and taking snapshots with its webcam
  • launching cyberattacks by corrupting and disrupting file downloads or denying access to websites
  • exfiltrating data from removable flash drives that connect to an infected computer

The TURBINE implants are linked to, and relies upon, a large network of clandestine surveillance "sensors" that the NSA has installed at locations across the world, including the agency's headquarters in Maryland and eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. Codenamed as TURMOIL, the sensors operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or "tips" to TURBINE, enabling the initiation of a malware attack. To identify surveillance targets, the NSA uses a series of data "selectors" as they flow across Internet cables. These selectors can include email addresses, IP addresses, or the unique "cookies" containing a username or other identifying information that are sent to a user's computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter, unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.[264][265][266][267][268][269][270][271][272][273][274][275][276][277][278][279]

The CIA was accused by U.S. Senate Intelligence Committee Chairwoman Dianne Feinstein of spying on a stand-alone computer network established for the committee in its investigation of allegations of CIA abuse in a George W. Bush-era detention and interrogation program.[280]

A voice interception program codenamed MYSTIC began in 2009. Along with RETRO, short for "retrospective retrieval" (RETRO is voice audio recording buffer that allows retrieval of captured content up to 30 days into the past), the MYSTIC program is capable of recording "100 percent" of a foreign country's telephone calls, enabling the NSA to rewind and review conversations up to 30 days and the relating metadata. With the capability to store up to 30 days of recorded conversations MYSTIC enables the NSA to pull an instant history of the person's movements, associates and plans.[281][282][283][284][285][286]

On March 21, Le Monde published slides from an internal presentation of the Communications Security Establishment Canada, which attributed a piece of malicious software to French intelligence. The CSEC presentation concluded that the list of malware victims matched French intelligence priorities and found French cultural reference in the malware's code, including the name Babar, a popular French children's character, and the developer name "Titi".[287]

The French telecommunications corporation Orange S.A. shares its call data with the French intelligence agency DGSE, which hands over the intercepted data to GCHQ.[288]

The NSA has spied on the Chinese technology company Huawei.[289][290][291] Huawei is a leading manufacturer of smartphones, tablets, mobile phone infrastructure, and WLAN routers and installs fiber optic cable. According to Der Spiegel this "kind of technology […] is decisive in the NSA's battle for data supremacy."[292] The NSA, in an operation named "Shotgiant", was able to access Huawei's email archive and the source code for Huawei's communications products.[292] The US government has had longstanding concerns that Huawei may not be independent of the People's Liberation Army and that the Chinese government might use equipment manufactured by Huawei to conduct cyberespionage or cyberwarfare. The goals of the NSA operation were to assess the relationship between Huawei and the PLA, to learn more the Chinese government's plans and to use information from Huawei to spy on Huawei's customers, including Iran, Afghanistan, Pakistan, Kenya, and Cuba. Former Chinese President Hu Jintao, the Chinese Trade Ministry, banks, as well as telecommunications companies were also targeted by the NSA.[289][292]

The Intercept published a document of an NSA employee discussing how to build a database of IP addresses, webmail, and Facebook accounts associated with system administrators so that the NSA can gain access to the networks and systems they administer.[293][294]

At the end of March 2014, Der Spiegel and The Intercept published, based on a series of classified files from the archive provided to reporters by NSA whistleblower Edward Snowden, articles related to espionage efforts by GCHQ and NSA in Germany.[295][296] The British GCHQ targeted three German internet firms for information about Internet traffic passing through internet exchange points, important customers of the German internet providers, their technology suppliers as well as future technical trends in their business sector and company employees.[295][296] The NSA was granted by the Foreign Intelligence Surveillance Court the authority for blanket surveillance of Germany, its people and institutions, regardless whether those affected are suspected of having committed an offense or not, without an individualized court order specifying on March 7, 2013.[296] In addition Germany's chancellor Angela Merkel was listed in a surveillance search machine and database named Nymrod along with 121 others foreign leaders.[295][296] As The Intercept wrote: "The NSA uses the Nymrod system to 'find information relating to targets that would otherwise be tough to track down,' according to internal NSA documents. Nymrod sifts through secret reports based on intercepted communications as well as full transcripts of faxes, phone calls, and communications collected from computer systems. More than 300 'cites' for Merkel are listed as available in intelligence reports and transcripts for NSA operatives to read."[295]

April 2014 edit

Towards the end of April, Edward Snowden said that the United States surveillance agencies spy on Americans more than anyone else in the world, contrary to anything that has been said by the government up until this point.[297]

May 2014 edit

An article published by Ars Technica shows NSA's Tailored Access Operations (TAO) employees intercepting a Cisco router.[298]

The Intercept and WikiLeaks revealed information about which countries were having their communications collected as part of the MYSTIC surveillance program. On May 19, The Intercept reported that the NSA is recording and archiving nearly every cell phone conversation in the Bahamas with a system called SOMALGET, a subprogram of MYSTIC. The mass surveillance has been occurring without the Bahamian government's permission.[299] Aside from the Bahamas, The Intercept reported NSA interception of cell phone metadata in Kenya, the Philippines, Mexico and a fifth country it did not name due to "credible concerns that doing so could lead to increased violence." WikiLeaks released a statement on May 23 claiming that Afghanistan was the unnamed nation.[300]

In a statement responding to the revelations, the NSA said "the implication that NSA's foreign intelligence collection is arbitrary and unconstrained is false."[299]

Through its global surveillance operations the NSA exploits the flood of images included in emails, text messages, social media, videoconferences and other communications to harvest millions of images. These images are then used by the NSA in sophisticated facial recognition programs to track suspected terrorists and other intelligence targets.[301]

June 2014 edit

Vodafone revealed that there were secret wires that allowed government agencies direct access to their networks.[302] This access does not require warrants and the direct access wire is often equipment in a locked room.[302] In six countries where Vodafone operates, the law requires telecommunication companies to install such access or allows governments to do so.[302] Vodafone did not name these countries in case some governments retaliated by imprisoning their staff.[302] Shami Chakrabarti of Liberty said "For governments to access phone calls at the flick of a switch is unprecedented and terrifying. Snowden revealed the internet was already treated as fair game. Bluster that all is well is wearing pretty thin – our analogue laws need a digital overhaul."[302] Vodafone published its first Law Enforcement Disclosure Report on June 6, 2014.[302] Vodafone group privacy officer Stephen Deadman said "These pipes exist, the direct access model exists. We are making a call to end direct access as a means of government agencies obtaining people's communication data. Without an official warrant, there is no external visibility. If we receive a demand we can push back against the agency. The fact that a government has to issue a piece of paper is an important constraint on how powers are used."[302] Gus Hosein, director of Privacy International said "I never thought the telcos would be so complicit. It's a brave step by Vodafone and hopefully the other telcos will become more brave with disclosure, but what we need is for them to be braver about fighting back against the illegal requests and the laws themselves."[302]

Above-top-secret documentation of a covert surveillance program named Overseas Processing Centre 1 (OPC-1) (codenamed "CIRCUIT") by GCHQ was published by The Register. Based on documents leaked by Edward Snowden, GCHQ taps into undersea fiber optic cables via secret spy bases near the Strait of Hormuz and Yemen. BT and Vodafone are implicated.[303]

The Danish newspaper Dagbladet Information and The Intercept revealed on June 19, 2014, the NSA mass surveillance program codenamed RAMPART-A. Under RAMPART-A, 'third party' countries tap into fiber optic cables carrying the majority of the world's electronic communications and are secretly allowing the NSA to install surveillance equipment on these fiber-optic cables. The foreign partners of the NSA turn massive amounts of data like the content of phone calls, faxes, e-mails, internet chats, data from virtual private networks, and calls made using Voice over IP software like Skype over to the NSA. In return these partners receive access to the NSA's sophisticated surveillance equipment so that they too can spy on the mass of data that flows in and out of their territory. Among the partners participating in the NSA mass surveillance program are Denmark and Germany.[304][305][306]

July 2014 edit

During the week of July 4, a 31-year-old male employee of Germany's intelligence service BND was arrested on suspicion of spying for the United States. The employee is suspected of spying on the German Parliamentary Committee investigating the NSA spying scandal.[307]

Former NSA official and whistleblower William Binney spoke at a Centre for Investigative Journalism conference in London. According to Binney, "at least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores." He also stated that the majority of fiber optic cables run through the U.S., which "is no accident and allows the US to view all communication coming in."[308]

The Washington Post released a review of a cache provided by Snowden containing roughly 160,000 text messages and e-mails intercepted by the NSA between 2009 and 2012. The newspaper concluded that nine out of ten account holders whose conversations were recorded by the agency "were not the intended surveillance targets but were caught in a net the agency had cast for somebody else." In its analysis, The Post also noted that many of the account holders were Americans.[309]

On July 9, a soldier working within Germany's Federal Ministry of Defence (BMVg) fell under suspicion of spying for the United States.[310] As a result of the July 4 case and this one, the German government expelled the CIA station chief in Germany on July 17.[311]

On July 18, former State Department official John Tye released an editorial in The Washington Post, highlighting concerns over data collection under Executive Order 12333. Tye's concerns are rooted in classified material he had access to through the State Department, though he has not publicly released any classified materials.[312]

August 2014 edit

The Intercept reported that the NSA is "secretly providing data to nearly two dozen U.S. government agencies with a 'Google-like' search engine" called ICREACH. The database, The Intercept reported, is accessible to domestic law enforcement agencies including the FBI and the Drug Enforcement Administration and was built to contain more than 850 billion metadata records about phone calls, emails, cellphone locations, and text messages.[313][314]

February 2015 edit

Based on documents obtained from Snowden, The Intercept reported that the NSA and GCHQ had broken into the internal computer network of Gemalto and stolen the encryption keys that are used in SIM cards no later than 2010. As of 2015, the company is the world's largest manufacturer of SIM cards, making about two billion cards a year. With the keys, the intelligence agencies could eavesdrop on cell phones without the knowledge of mobile phone operators or foreign governments.[315]

March 2015 edit

The New Zealand Herald, in partnership with The Intercept, revealed that the New Zealand government used XKeyscore to spy on candidates for the position of World Trade Organization director general[316] and also members of the Solomon Islands government.[317]

April 2015 edit

In January 2015, the DEA revealed that it had been collecting metadata records for all telephone calls made by Americans to 116 countries linked to drug trafficking. The DEA's program was separate from the telephony metadata programs run by the NSA.[318] In April, USA Today reported that the DEA's data collection program began in 1992 and included all telephone calls between the United States and from Canada and Mexico. Current and former DEA officials described the program as the precursor of the NSA's similar programs.[319] The DEA said its program was suspended in September 2013, after a review of the NSA's programs and that it was "ultimately terminated."[318]

January 2016 edit

August 2016 edit

References edit

  1. ^ a b "How Edward Snowden led journalist and film-maker to reveal NSA secrets". The Guardian. 19 August 2013. Retrieved August 20, 2013.
  2. ^ a b Mark Hosenball (August 15, 2013), Snowden downloaded NSA secrets while working for Dell, sources say Reuters
  3. ^ a b Peter Maass (August 18, 2013), "How Laura Poitras Helped Snowden Spill His Secrets" The New York Times
  4. ^ Carmon, Irin (June 10, 2013). . Salon. Archived from the original on June 15, 2013. Retrieved June 11, 2013.
  5. ^ Greenwald, Glenn; MacAskill, Ewen; Poitras, Laura (June 9, 2013). "Edward Snowden: the whistleblower behind the NSA surveillance revelations". The Guardian. London. Retrieved June 9, 2013.
  6. ^ Smith, Matt; Pearson, Michael (June 10, 2013). "NSA leaker holed up in Hong Kong hotel, running low on cash". CNN. Retrieved June 10, 2013.
  7. ^ Everything We Learned From Edward Snowden in 2013 - NationalJournal.com
  8. ^ a b Glenn Greenwald (June 6, 2013). "NSA collecting phone records of millions of Verizon customers daily". The Guardian. Retrieved September 16, 2013.
  9. ^ Danny Yadron & Evan Perez (14 June 2013). "T-Mobile, Verizon Wireless Shielded from NSA Sweep". The Wall Street Journal. Retrieved 10 February 2014.
  10. ^ Gellman, Barton; Poitras, Laura (June 6, 2013). "US Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program". The Washington Post. Retrieved June 15, 2013.{{cite news}}: CS1 maint: multiple names: authors list (link)
  11. ^ Greenwald, Glenn; MacAskill, Ewen (June 6, 2013). "NSA Taps in to Internet Giants' Systems to Mine User Data, Secret Files Reveal – Top-Secret Prism Program Claims Direct Access to Servers of Firms Including Google, Apple and Facebook – Companies Deny Any Knowledge of Program in Operation Since 2007 – Obama Orders US to Draw Up Overseas Target List for Cyber-Attacks". The Guardian. Retrieved June 15, 2013.{{cite news}}: CS1 maint: multiple names: authors list (link)
  12. ^ "NSA slides explain the PRISM data-collection program". The Washington Post. 10 July 2013 [6 June 2013]. Retrieved 11 February 2014.
  13. ^ . The Washington Post. Archived from the original on August 24, 2013. Retrieved August 20, 2013.
  14. ^ Laura Poitras, Marcel Rosenbach, Fidelius Schmid and Holger Stark (June 29, 2013). "NSA Spied on European Union Offices". Der Spiegel.{{cite magazine}}: CS1 maint: multiple names: authors list (link)
  15. ^ Laura Poitras, Marcel Rosenbach and Holger Stark. "How America Spies on Europe and the UN". Der Spiegel.
  16. ^ EXCLUSIVE: US hacks Chinese mobile phone companies, South China Morning Post
  17. ^ NSA targeted China's Tsinghua University in hacking attacks, South China Morning Post
  18. ^ Lam, Lana (June 23, 2013). "US hacked Pacnet, Asia Pacific fibre-optic network operator, in 2009". South China Morning Post (Hong Kong). Retrieved June 25, 2013.
  19. ^ Laura Poitras, Marcel Rosenbach und Holger Stark (30 June 2013). "Geheimdokumente: NSA überwacht 500 Millionen Verbindungen in Deutschland". Der Spiegel (in German). Retrieved June 30, 2013.
  20. ^ MacAskill, Ewen; Borger, Julian (June 30, 2013). "New NSA leaks show how US is bugging its European allies". The Guardian. London.
  21. ^ MacAskill, Ewen; Davies, Nick; Hopkins, Nick; Borger, Julian; Ball, James (June 17, 2013). "GCHQ intercepted foreign politicians' communications at G20 summits". The Guardian. London.
  22. ^ MacAskill, Ewen; Borger, Julian; Hopkins, Nick; Davies, Nick; Ball, James (June 21, 2013). "GCHQ taps fiber-optic cables for secret access to world's communications". The Guardian.
  23. ^ a b Ewen MacAskill; Julian Borger; Nick Hopkins; Nick Davies; James Ball (21 June 2013). "GCHQ taps fibre-optic cables for secret access to world's communications". The Guardian. Retrieved 21 June 2013.
  24. ^ Philip Bump (21 June 2013). . The Atlantic Wire. Archived from the original on 5 November 2013. Retrieved 23 June 2013.
  25. ^ Glenn Greenwald and Spencer Ackerman (June 27, 2013). "NSA collected US email records in bulk for more than two years under Obama". The Guardian. Retrieved August 1, 2013.
  26. ^ Glenn Greenwald and Spencer Ackerman (June 27, 2013). "How the NSA is still harvesting your online data". The Guardian. Retrieved August 1, 2013.
  27. ^ Glenn Greenwald and Ewen MacAskill (11 June 2013). "Boundless Informant: the NSA's secret tool to track global surveillance data". The Guardian. Retrieved 1 January 2014.
  28. ^ Laura Poitras, Marcel Rosenbach and Holger Stark. "Partner and Target: NSA Snoops on 500 Million German Data Connections". Der Spiegel. Retrieved 1 January 2014.
  29. ^ Hubert Gude, Laura Poitras & Marcel Rosenbach. "German Intelligence Sends Massive Amounts of Data to the NSA". Der Spiegel. Retrieved 1 January 2014.
  30. ^ EUA espionaram milhões de e-mails e ligações de brasileiros, O Globo, July 6, 2013. Retrieved July 8, 2013.
  31. ^ The NSA's mass and indiscriminate spying on Brazilians, Glenn Greenwald, The Guardian, July 7, 2013. Retrieved July 8, 2013.
  32. ^ EUA expandem o aparato de vigilância continuamente, O Globo, July 6, 2013. Retrieved July 8, 2013.
  33. ^ a b c d e f g Philip Dorling (July 8, 2013). "Snowden reveals Australia's links to US spy web". The Sydney Morning Herald. Retrieved July 8, 2013.
  34. ^ Kaz, Roberto (8 July 2013). "NSA e CIA mantiveram em Brasília equipe para coleta de dados filtrados de satélite". O Globo (in Portuguese). Retrieved 1 February 2014.
  35. ^ "Interview with Whistleblower Edward Snowden on Global Spying". Der Spiegel. July 8, 2013.
  36. ^ "Edward Snowden Accuses Germany of Aiding NSA in Spying Efforts". Der Spiegel. July 7, 2013.
  37. ^ 'Prolific Partner': German Intelligence Used NSA Spy Program, Der Spiegel. Retrieved July 21, 2013.
  38. ^ a b Hubert Gude, Laura Poitras & Marcel Rosenbach (August 5, 2013). "German intelligence Sends Massive Amounts of Data to the NSA". Der Spiegel. Retrieved 14 December 2013.
  39. ^ Geiger, Friedrich (August 3, 2013). "German Intelligence Agency Providing NSA With Metadata – Report". The Wall Street Journal. Retrieved August 3, 2013.
  40. ^ a b c "'Key Partners': Secret Links Between Germany and the NSA". Der Spiegel. July 22, 2013. Retrieved 13 January 2014.
  41. ^ René Pfister, Laura Poitras, Marcel Rosenbach, Jörg Schindler and Holger Stark. "German Intelligence Worked Closely with NSA on Data Surveillance". Der Spiegel. Retrieved 22 December 2013.{{cite magazine}}: CS1 maint: multiple names: authors list (link)
  42. ^ a b Matthias Gebauer. "Prism in Afghanistan: Conflicting Accounts By German Government". Der Spiegel.
  43. ^ Greenwald, Glenn (July 31, 2013)."XKeyscore: NSA tool collects 'nearly everything a user does on the internet'". The Guardian. Retrieved August 1, 2013.
  44. ^ Nakashima, Ellen (July 31, 2013). "Newly declassified documents on phone records program released". The Washington Post. Retrieved August 4, 2013.
  45. ^ Charlie Savage & David E. Sanger (July 31, 2013). "Senate Panel Presses N.S.A. on Phone Logs". The New York Times. Retrieved August 4, 2013.
  46. ^ a b Glenn Greenwald, Ewen MacAskill, Laura Poitras, Spencer Ackerman and Dominic Rushe (July 11, 2013). "Revealed: how Microsoft handed the NSA access to encrypted messages". The Guardian. Retrieved July 11, 2013.{{cite news}}: CS1 maint: multiple names: authors list (link)
  47. ^ Angwin, Julia (December 13, 2012). "U.S. Terrorism Agency to Tap a Vast Database of Citizens". The Wall Street Journal. Retrieved August 21, 2013.
  48. ^ Iain Thomson (July 8, 2013). "Snowden: US and Israel did create Stuxnet attack code". The Register. Retrieved July 8, 2013.
  49. ^ Révélations sur le Big Brother français (2), Le Monde, July 4, 2013. Retrieved July 5, 2013.
  50. ^ France 'runs vast electronic spying operation using NSA-style methods', The Guardian, July 4, 2013. Retrieved July 5, 2013.
  51. ^ a b c d e f g James Ball, Luke Harding & Juliette Garside. "BT and Vodafone among telecoms companies passing details to GCHQ". The Guardian. Retrieved 22 December 2013.
  52. ^ a b c d e f g John Goetz & Frederik Obermaier (2 August 2013). "Snowden enthüllt Namen der spähenden Telekomfirmen". Süddeutsche Zeitung (in German). Retrieved August 2, 2013. In den internen Papieren des GCHQ aus dem Jahr 2009 stehen sie nun aufgelistet: Verizon Business, Codename: Dacron, British Telecommunications (codenamed "Remedy"), Vodafone Cable ("Gerontic"), Global Crossing ("Pinnage"), Level 3 (codenamed "Little"), Viatel ("Vitreous") und Interoute ("Streetcar").
  53. ^ a b c d John Goetz, Hans Leyendecker & Frederik Obermaier (August 28, 2013). "British Officials Have Far-Reaching Access To Internet And Telephone Communications". Süddeutsche Zeitung. Retrieved August 28, 2013.
  54. ^ Dorling, Philip (28 August 2013). "Australian spies in global deal to tap undersea cables". The Sydney Morning Herald. Retrieved August 29, 2013.
  55. ^ a b "U.S. spy agency bugged U.N. headquarters: Germany's Spiegel". Reuters. August 25, 2013. Retrieved 12 January 2014.
  56. ^ a b "US-Geheimdienst hörte Zentrale der Vereinten Nationen ab". Der Spiegel (in German). 25 August 2013. Retrieved August 25, 2013.
  57. ^ Savage, Charlie (August 8, 2013). "N.S.A. Said to Search Content of Messages to and From U.S." The New York Times. Retrieved September 30, 2013.
  58. ^ "Snowden Document: NSA Spied On Al Jazeera Communications". Der Spiegel. August 31, 2013. Retrieved 1 January 2014.
  59. ^ Siobhan Gorman & Jennifer Valentiono-Devries (August 20, 2013). "New Details Show Broader NSA Surveillance Reach – Programs Cover 75% of Nation's Traffic, Can Snare Emails". The Wall Street Journal. Retrieved August 21, 2013.
  60. ^ "Graphic: How the NSA Scours Internet Traffic in the U.S." The Wall Street Journal. August 20, 2013. Retrieved August 21, 2013.
  61. ^ Jennifer Valentiono-Devries & Siobhan Gorman (August 20, 2013). "What You Need to Know on New Details of NSA Spying". The Wall Street Journal. Retrieved August 21, 2013.
  62. ^ Jennifer Valentino-Devries & Danny Yadron (August 1, 2013). "FBI Taps Hacker Tactics to Spy on Suspects". The Wall Street Journal. Retrieved October 9, 2013.
  63. ^ Jennifer Valentino-DeVries & Danny Yadron (August 1, 2013). "How the FBI Hacks Criminal Suspects". The Wall Street Journal. Retrieved October 9, 2013.
  64. ^ "NSA report on privacy violations in the first quarter of 2012". The Washington Post. August 16, 2013. Retrieved August 16, 2013.
  65. ^ Barton Gellman & Matt DeLong (August 15, 2013). "What to say, and not to say, to 'our overseers'". The Washington Post. Retrieved August 25, 2013.
  66. ^ Barton Gellman & Matt DeLong (August 15, 2013). "First direct evidence of illegal surveillance found by the FISA court". The Washington Post. Retrieved August 25, 2013.
  67. ^ Gellmann, Barton (August 16, 2013). "NSA broke privacy rules thousands of times per year, audit finds". The Washington Post. Retrieved August 24, 2013.
  68. ^ Nakashima, Ellen (August 16, 2013). "Lawmakers, privacy advocates call for reforms at NSA". The Washington Post. Retrieved August 25, 2013.
  69. ^ Gellmann, Barton (August 16, 2013). "NSA statements to The Post". The Washington Post. Retrieved August 25, 2013.
  70. ^ Barton Gellman & Matt DeLong (August 15, 2013). "What's a 'violation'?". The Washington Post. Retrieved August 25, 2013.
  71. ^ Leonnig, Carol D. (August 16, 2013). "Court: Ability to police U.S. spying program limited". The Washington Post. Retrieved August 25, 2013.
  72. ^ Nakashima, Ellen (August 21, 2013). "NSA gathered thousands of Americans' e-mails before court ordered it to revise its tactics". The Washington Post. Retrieved September 16, 2013.
  73. ^ "FISA court ruling on illegal NSA e-mail collection program". The Washington Post. August 21, 2013. Retrieved September 16, 2013.
  74. ^ Barton Gellman & Matt DeLong (August 15, 2013). "First direct evidence of illegal surveillance found by the FISA court". The Washington Post. Retrieved September 16, 2013.
  75. ^ Charlie Savage & Scott Shane (August 21, 2013). "Secret Court Rebuked N.S.A. on Surveillance". The New York Times. Retrieved September 16, 2013.
  76. ^ Mark Hosenball & Tabassum Zakaria (August 22, 2013). "NSA collected 56,000 emails by Americans a year: documents". NBC News. Reuters. Retrieved September 16, 2013.
  77. ^ a b Craig Timberg & Barton Gellman (August 30, 2013). "NSA paying U.S. companies for access to communications networks". The Washington Post. Retrieved August 31, 2013.
  78. ^ Wallsten, Peter (August 17, 2013). "House panel withheld document on NSA surveillance program from members". The Washington Post. Retrieved August 25, 2013.
  79. ^ Weich, Ronald. "Report of the National Security Agency's Bulk Collection Programs for USA PATRIOT Act Reauthorization" (PDF). Office of the Assistant Attorney General. Director of National Intelligence. Retrieved August 25, 2013.
  80. ^ James Ball, Luke Harding & Juliette Garside (August 1, 2013). "Exclusive: NSA pays £100m in secret funding for GCHQ". Retrieved August 2, 2013.
  81. ^ James Ball and Spencer Ackerman (August 9, 2013). "NSA loophole allows warrantless search for US citizens' emails and phone calls – Exclusive: Spy agency has secret backdoor permission to search databases for individual Americans' communications". The Guardian. Retrieved August 12, 2013.
  82. ^ Farivar, Cyrus (August 10, 2013). "New leak: NSA can search US e-mail data but theoretically won't". Ars Technica. Retrieved August 13, 2013.
  83. ^ Roberts, Dan (August 23, 2013). "US surveillance guidelines not updated for 30 years, privacy board finds – Privacy watchdog points out in letter to intelligence chiefs that rules designed to protect Americans are severely outdated". The Guardian. Retrieved August 24, 2013.
  84. ^ Medine, David (August 22, 2013). "2013-08-22 Privacy and Civil Liberties Oversight Board letter to US Attorney General Eric Holder and Director of National Intelligence James Clapper" (PDF). Privacy & Civil Liberties Oversight Board. Retrieved August 24, 2013.
  85. ^ Strohm, Chris (August 24, 2013). "Lawmakers Probe Willful Abuses of Power by NSA Analysts". Bloomberg. Retrieved August 24, 2013.
  86. ^ Roberts, Dan (August 23, 2013). "NSA analysts deliberately broke rules to spy on Americans, agency reveals – Inspector general's admission undermines fresh insistences from president that breaches of privacy rules were inadvertent". The Guardian. Retrieved August 24, 2013.
  87. ^ Gorman, Siobhan (August 23, 2013). "NSA Officers Spy on Love Interests". The Wall Street Journal. Retrieved August 24, 2013.
  88. ^ MacAskill, Ewen (August 23, 2013). "NSA paid millions to cover Prism compliance costs for tech companies • Top-secret files show first evidence of financial relationship • Prism companies include Google and Yahoo, says NSA • Costs were incurred after 2011 Fisa court ruling". The Guardian. Retrieved August 24, 2013.
  89. ^ David Leppard & Chris Williams (May 3, 2009). "Jacqui Smith's secret plan to carry on snooping". The Sunday Times. Retrieved May 3, 2009.
  90. ^ Henry Porter (21 June 2013). "GCHQ revelations: mastery of the internet will mean mastery of everyone". The Guardian. Retrieved October 19, 2013.
  91. ^ James Ball, Julian Borger & Glenn Greenwald (September 5, 2013). "US and UK spy agencies defeat privacy and security on the internet". The Guardian. Retrieved September 5, 2013.
  92. ^ Nicole Perlroth, Jeff Larson & Scott Shane (September 5, 2013). "N.S.A. Foils Much Internet Encryption". The New York Times. Retrieved September 5, 2013.
  93. ^ "Secret Documents Reveal N.S.A. Campaign Against Encryption". The New York Times. September 5, 2013. Retrieved September 7, 2013.
  94. ^ "Unlocking Private Communications". The New York Times. September 5, 2013. Retrieved September 7, 2013.
  95. ^ Perlroth, Nicole, Larson, Jeff, and Shane, Scott (September 5, 2013). "The NSA's Secret Campaign to Crack, Undermine Internet Security". ProPublica.{{cite news}}: CS1 maint: multiple names: authors list (link)
  96. ^ Nakashima, Ellen (September 6, 2013). "NSA has made strides in thwarting encryption used to protect Internet communication". The Washington Post. Retrieved September 7, 2013.
  97. ^ a b Jacques Follorou (2013-10-30). "Surveillance : la DGSE a transmis des données à la NSA américaine". Le Monde (in French). Retrieved 30 December 2013.
  98. ^ . Le Parisien. 2013-10-29. Archived from the original on 2014-05-02. Retrieved 30 December 2013.
  99. ^ Guillaume Champeau (28 October 2013). "Lustre : la France aurait coopéré avec la NSA". Numerama (in French). Retrieved 30 December 2013.
  100. ^ "Espionnage : la France perd son Lustre". ZDNet (in French). 28 October 2013. Retrieved 30 December 2013.
  101. ^ Nakashima, Ellen (8 September 2013). "Obama administration had restrictions on NSA reversed in 2011". The Washington Post. Retrieved 3 February 2014.
  102. ^ "'Follow the Money': NSA Spies on International Payments". Der Spiegel. September 15, 2013. Retrieved September 24, 2013.
  103. ^ "Brazil Angered Over Report N.S.A. Spied on President". The New York Times. 3 September 2013. Retrieved September 16, 2013.
  104. ^ "NSA Documents Show United States Spied Brazilian Oil Giant". Jornal da Globo Fantástico. September 8, 2013. Retrieved September 24, 2013.
  105. ^ James Risen & Laura Poitras (September 28, 2013). "N.S.A. Gathers Data on Social Connections of U.S. Citizens". The New York Times. Retrieved September 30, 2013.
  106. ^ Glenn Greenwald, Laura Poitras & Ewen MacAskill (September 11, 2013). "NSA shares raw intelligence including Americans' data with Israel". The Guardian. Retrieved September 14, 2013.
  107. ^ "NSA and Israeli intelligence: memorandum of understanding – full document". The Guardian. September 11, 2013. Retrieved September 14, 2013.
  108. ^ Barton Gellman. "Secret documents detail U.S. war in cyberspace". The Washington Post (via The Japan Times). Retrieved September 2, 2013.
  109. ^ Barton Gellman & Ellen Nakashima (August 31, 2013). "U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show". The Washington Post. Retrieved August 31, 2013.
  110. ^ Konrad Lischka und Julia Stanek (August 31, 2013). "Cyber-Angriffe: USA infizieren Zehntausende Computer mit NSA-Trojanern". Der SPIEGEL (in German). Retrieved August 31, 2013.
  111. ^ Zetter, Kim (September 4, 2013). "NSA Laughs at PCs, Prefers Hacking Routers and Switches". Wired.com. Retrieved October 2, 2013.
  112. ^ a b c d e Laura Poitras, Marcel Rosenbach & Holger Stark (9 September 2013). "iSpy: How the NSA Accesses Smartphone Data". Der Spiegel. Retrieved September 9, 2013.
  113. ^ Barton Gellman, Craig Timberg & Steven Rich (4 October 2013). "Secret NSA documents show campaign against Tor encrypted network". The Washington Post. Retrieved 19 November 2013.
  114. ^ Steven Rich & Matt DeLong. "NSA slideshow on 'The TOR problem'". The Washington Postdate=4 October 2013. Retrieved 19 November 2013.
  115. ^ Lee, Timothy B. (4 October 2013). "Everything you need to know about the NSA and Tor in one FAQ". The Washington Post. Retrieved 19 November 2013.
  116. ^ "NSA report on the Tor encrypted network". The Washington Post. 4 October 2013. Retrieved 19 November 2013.
  117. ^ "GCHQ report on 'MULLENIZE' program to 'stain' anonymous electronic traffic". The Washington Post. 4 October 2013. Retrieved 19 November 2013.
  118. ^ James Ball, Bruce Schneier & Glenn Greenwald (4 October 2013). "NSA and GCHQ target Tor network that protects anonymity of web users". The Guardian. Retrieved 19 November 2013.
  119. ^ Schneier, Bruce (4 October 2013). "Attacking Tor: how the NSA targets users' online anonymity". The Guardian. Retrieved 19 November 2013.
  120. ^ "'Tor Stinks' presentation – read the full document". The Guardian. 4 October 2013. Retrieved 19 November 2013.
  121. ^ "Tor: 'The king of high-secure, low-latency anonymity'". The Guardian. 4 October 2013. Retrieved 19 November 2013.
  122. ^ "Ministério de Minas e Energia está na mira de espiões americanos e canadenses". O Globo. October 6, 2013. Retrieved October 8, 2013.
  123. ^ . Associated Press. Associated Press. October 6, 2013. Archived from the original on October 10, 2013. Retrieved October 8, 2013.
  124. ^ Ockenden, Will (October 8, 2013). "Australia prepared briefing on US global internet spying program PRISM before Snowden revelations". ABC News (Australia). Retrieved October 8, 2013.
  125. ^ "AG Department Prism FOI PDF". ABC News Online. June 27, 2013. Retrieved October 8, 2013.
  126. ^ Jens Glüsing, Laura Poitras, Marcel Rosenbach and Holger Stark (October 20, 2013). "Fresh Leak on US Spying: NSA Accessed Mexican President's Email". Der Spiegel. Retrieved October 22, 2013.{{cite news}}: CS1 maint: multiple names: authors list (link)
  127. ^ "NSA-Spionage: Mexiko fordert Aufklärung über US-Bespitzelungen". Der Spiegel (in German). October 21, 2013. Retrieved October 22, 2013.
  128. ^ Mark Mazzetti & David E. Sanger (October 30, 2013). "Tap on Merkel Provides Peek at Vast Spy Net". The New York Times. Retrieved November 1, 2013.
  129. ^ Mark Landler & Michael S. Schmidt (October 30, 2013). "Spying Known at Top Levels, Officials Say". The New York Times. Retrieved November 1, 2013.
  130. ^ a b Ball, James (October 24, 2013). "NSA monitored calls of 35 world leaders after US official handed over contacts". The Guardian. Retrieved October 24, 2013.
  131. ^ a b Siobhan Gorhan & Adam Entous (October 28, 2013). "Obama Unaware as U.S. Spied on World Leaders: Officials". The Wall Street Journal. Retrieved October 28, 2013.
  132. ^ Ball, James (October 25, 2013). "Leaked memos reveal GCHQ efforts to keep mass surveillance secret". The Guardian. Retrieved October 25, 2013.
  133. ^ Nakashima, Ellen (October 2, 2013). "NSA had test project to collect data on Americans' cellphone locations, director says". The Washington Post. Retrieved October 18, 2013.
  134. ^ Barton Gellman & Ashkan Soltani (October 30, 2013). "NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say". The Washington Post. Retrieved October 31, 2013.
  135. ^ Barton Gellman, Todd Lindeman & Ashkan Soltani (October 30, 2013). . The Washington Post. Archived from the original on October 31, 2013. Retrieved October 31, 2013.
  136. ^ Barton Gellman & Matt DeLong (October 30, 2013). . The Washington Post. Archived from the original on October 30, 2013. Retrieved October 31, 2013.
  137. ^ Peterson, Andrea (October 30, 2013). "PRISM already gave the NSA access to tech giants. Here's why it wanted more". The Washington Post. Retrieved October 31, 2013.
  138. ^ Washington Post Staff (October 30, 2013). "NSA statement on Washington Post report on infiltration of Google, Yahoo data center links". The Washington Post. Retrieved October 31, 2013.
  139. ^ Jacob Appelbaum, Holger Stark, Marcel Rosenbach and Jörg Schindler (October 23, 2013). "Berlin Complains: Did US Tap Chancellor Merkel's Mobile Phone?". Der Spiegel. Retrieved October 25, 2013.{{cite news}}: CS1 maint: multiple names: authors list (link)
  140. ^ Fischer, Sebastian (October 24, 2013). "Merkel's Phone: Spying Suspicions Put Obama in a Tight Spot". Der Spiegel. Retrieved October 25, 2013.
  141. ^ Charly Wilder & Rupert Neat (October 24, 2013). "'Out of Hand': Europe Furious Over US Spying Allegations". Der Spiegel. Retrieved October 25, 2013.
  142. ^ Ian Traynor in Brussels; Philip Oltermann in Berlin & Paul Lewis in Washington (October 24, 2013). "Angela Merkel's call to Obama: are you bugging my mobile phone?". The Guardian. Retrieved October 25, 2013.
  143. ^ Ball, James (October 25, 2013). "NSA monitored calls of 35 world leaders after US official handed over contacts". The Guardian. Retrieved October 25, 2013.
  144. ^ Traynor, Ian (October 25, 2013). "Germany and France warn NSA spying fallout jeopardises fight against terror". The Guardian. Retrieved October 25, 2013.
  145. ^ a b Jacob Appelbaum, Nikolaus Blome, Hubert Gude, Ralf Neukirch, René Pfister, Laura Poitras, Marcel Rosenbach, Jörg Schindler, Gregor Peter Schmitz and Holger Stark. Translated from the German by Kristen Allen and Charly Wilder. (October 27, 2013). "Der Spiegel Cover Story: How NSA Spied on Merkel Cell Phone from Berlin Embassy - Embassy Espionage: The NSA's Secret Spy Hub in Berlin". Der Spiegel. Retrieved November 1, 2013.{{cite news}}: CS1 maint: multiple names: authors list (link)
  146. ^ "NSA-Überwachung: Merkels Handy steht seit 2002 auf US-Abhörliste". Der Spiegel (in German). October 26, 2012. Retrieved October 26, 2013.
  147. ^ Ofer Aderet (October 26, 2015). "Obama: Had I known NSA tapped Merkel's cell, I would have stopped it, German media reports". Haaretz. Retrieved October 26, 2013.
  148. ^ David E. Sanger & Mark Mazzetti (October 24, 2013). "Allegation of U.S. Spying on Merkel Puts Obama at Crossroads". The New York Times. Retrieved October 26, 2013.
  149. ^ Ian Traynor & Paul Lewis (17 December 2013). "Merkel compared NSA to Stasi in heated encounter with Obama". The Guardian. Retrieved 18 December 2013.
  150. ^ "Germany hopes for details from Snowden on US spying". BBC News. November 1, 2013. Retrieved November 1, 2013.
  151. ^ "Photo Gallery: Spies in the Embassy 10/27/2013". Der Spiegel. October 27, 2013. Retrieved November 1, 2013.
  152. ^ a b Dorling, Philipp (October 31, 2013). "Exposed: Australia's Asia spy network". The Sydney Morning Herald. Retrieved November 1, 2013.
  153. ^ Konrad Lischka & Matthias Kremp (October 28, 2013). "NSA-Spähskandal: So funktionieren die Abhöranlagen in US-Botschaften". Der Spiegel (in German). Retrieved November 1, 2013.
  154. ^ Perlez, Jane (October 31, 2013). "Australia Said to Play Part in N.S.A. Effort". The New York Times. Retrieved November 1, 2013.
  155. ^ Jacques Follorou & Glenn Greenwald (October 21, 2013). "France in the NSA's crosshair : phone networks under surveillance". Le Monde. Retrieved October 22, 2013.
  156. ^ Gearan, Anna (October 22, 2013). "Report that NSA collected French phone records causing diplomatic headache for U.S." The Washington Post. Retrieved October 22, 2013.
  157. ^ Adam Entous & Siobhan Gorman (October 29, 2013). "U.S. Says France, Spain Aided NSA Spying". The Wall Street Journal. Retrieved October 29, 2013.
  158. ^ Ellen Nakashima & Karen DeYoung (October 29, 2013). "NSA chief says NATO allies shared phone records with the U.S. spy agency". The Washington Post. Retrieved October 30, 2013.
  159. ^ "Espionnage de la NSA : tous les documents publiés par "Le Monde"". Le Monde. October 21, 2013. Retrieved October 22, 2013.
  160. ^ Miguel González. "NSA revelations: Spain also a victim of US espionage". El Pais. Retrieved 13 December 2013.
  161. ^ Miguel González. "España eleva el tono de las quejas a EE UU por el espionaje masivo". El Pais (in Spanish). Retrieved 13 December 2013.
  162. ^ Paul Hamilos. "Spain colluded in NSA spying on its citizens, Spanish newspaper reports". The Guardian. Retrieved 22 December 2013.
  163. ^ Glenn Greenwald & Germán Aranda. "El CNI facilitó el espionaje masivo de EEUU a España". El Mundo (in Spanish). Retrieved 22 December 2013.
  164. ^ a b Shane, Scott (2013-11-02). "No Morsel Too Minuscule for All-Consuming N.S.A." The New York Times. from the original on 2016-07-20. Retrieved 2013-11-25. This "communications fingerprinting," as a document called it, is the key to what the N.S.A. does. It allows the agency's computers to scan the stream of international communications and pluck out messages tied to the supreme leader.
  165. ^ Campbell, Duncan (November 5, 2013). "Revealed: Britain's 'secret listening post in the heart of Berlin'". The Independent. Archived from the original on 2022-05-07. Retrieved November 5, 2013.
  166. ^ a b Tony Paterson. "GCHQ used 'Quantum Insert' technique to set up fake LinkedIn pages and spy on mobile phone giants". The Independent. Archived from the original on 2022-05-07. Retrieved November 10, 2013.
  167. ^ a b Laura Poitras, Marcel Rosenbach & Holger Stark (November 17, 2013). "'Royal Concierge': GCHQ Monitors Hotel Reservations to Track Diplomats". Der Spiegel. Retrieved November 17, 2013.
  168. ^ Indonesia recalls Canberra ambassador over Yudhoyono phone tapping attempt, Foreign minister demands explanation after documents reveal Australian agencies targeted phones of president and his wife The Guardian 18 November 2013
  169. ^ a b c d e f g h i Michael Brissenden (18 November 2013). "Australia spied on Indonesian president Susilo Bambang Yudhoyono, leaked Edward Snowden documents reveal". Australian Broadcasting Corporation. Retrieved 13 December 2013.
  170. ^ Ball, James (20 November 2013). "US and UK struck secret deal to allow NSA to 'unmask' Britons' personal data". The Guardian. Retrieved 21 November 2013.
  171. ^ a b JAMES RISEN & LAURA POITRAS (November 22, 2013). "N.S.A. Report Outlined Goals for More Power". The New York Times. Retrieved 23 November 2013.
  172. ^ "A Strategy for Surveillance Powers". The New York Times. Retrieved 23 November 2013.
  173. ^ Floor Boon, Steven Derix & Huib Modderkolk (23 November 2013). "Document Snowden: Nederland al sinds 1946 doelwit van NSA". NRC Handelsblad (in Dutch). Retrieved 23 November 2013.
  174. ^ a b c David E. Sanger & Thom Shanker (14 January 2014). "N.S.A. Devises Radio Pathway Into Computers". The New York Times. Retrieved 15 January 2014.
  175. ^ a b Floor Boon, Steven Derix & Huib Modderkolk (23 November 2013). "NSA infected 50,000 computer networks with malicious software". NRC Handelsblad. Retrieved 23 November 2013.
  176. ^ Ewen MacAskill, James Ball & Katharine Murphy (2 December 2013). "Revealed: Australian spy agency offered to share data about ordinary citizens". The Guardian. Retrieved 3 December 2013.
  177. ^ a b Barton Gellman & Ashkan Soltani (4 December 2013). "NSA tracking cellphone locations worldwide, Snowden documents show". The Washington Post. Retrieved 5 December 2013.
  178. ^ "How the NSA is tracking people right now". The Washington Post. 4 December 2013. Retrieved 6 December 2013.
  179. ^ Ashkan Soltani & Matt DeLong (4 December 2013). "FASCIA: The NSA's huge trove of location records". The Washington Post. Retrieved 6 December 2013.
  180. ^ "How the NSA uses cellphone tracking to find and 'develop' targets". The Washington Post. 4 December 2013. Retrieved 6 December 2013.
  181. ^ "Reporter explains NSA collection of cellphone data". The Washington Post. 4 December 2013. Retrieved 6 December 2013.
  182. ^ Peterson, Andrea (4 December 2013). "The NSA says it 'obviously' can track locations without a warrant. That's not so obvious". The Washington Post's The Switch. Retrieved 6 December 2013.
  183. ^ Lee, Timothy (4 December 2013). "The NSA could figure out how many Americans it's spying on. It just doesn't want to". The Washington Post's The Switch. Retrieved 6 December 2013.
  184. ^ Ashkan Soltani & Barton Gellmann (10 December 2013). "New documents show how the NSA infers relationships based on mobile location data". The Washington Post. Retrieved 26 December 2013.
  185. ^ Ashkan Soltani, Andrea Peterson & Barton Gellman (10 December 2013). "NSA uses Google cookies to pinpoint targets for hacking". The Washington Post. Retrieved 28 January 2014.
  186. ^ Ashkan Soltani & Matt DeLong (10 December 2013). "NSA signal-surveillance success stories". The Washington Post. Retrieved 28 January 2014.
  187. ^ "Reporter: For NSA, Google cookies allow 'laser-guided' targeting". The Washington Post. 11 December 2013. Retrieved 28 January 2014.
  188. ^ Arne Halvorsen, Anne Marte Blindheim, Harald S. Klungtveit, Kjetil Magne Sørenes, Tore Bergsaker and Gunnar Hultgreen. "Norway´s secret surveillance of Russian politics for the NSA". Dagbladet. Retrieved 18 December 2013.{{cite news}}: CS1 maint: multiple names: authors list (link)
  189. ^ a b c d e f "Snowden-dokumentene: Norge er NSAs drømmepartner". Dagbladet (in Norwegian). Retrieved 18 December 2013.
  190. ^ Glenn Greenwald, Ryan Gallagher, Filip Struwe and Anna H Svensson. (in Swedish). Sveriges Television. Archived from the original on 6 December 2013. Retrieved 5 December 2013.{{cite web}}: CS1 maint: multiple names: authors list (link)
  191. ^ Filip Struwe, Glenn Greenwald, Ryan Gallagher, Sven Bergman, Joachim Dyfvermark and Fredrik Laurin. "Snowden files reveal Swedish-American surveillance of Russia" (in Swedish). Sveriges Television. Retrieved 5 December 2013.{{cite web}}: CS1 maint: multiple names: authors list (link)
  192. ^ Sven Bergman, Joachim Dyfvermark, Ryan Gallagher, Glenn Greenwald and Fredrik Laurin. "FRA spying on "energy" and "Baltics" for USA". Sveriges Television. Retrieved 7 December 2013.{{cite web}}: CS1 maint: multiple names: authors list (link)
  193. ^ "Cold War treaty confirms Sweden was not neutral". The Local. 9 December 2013. Retrieved 12 December 2013.
  194. ^ "NSA "asking for" specific exchanges from FRA - Secret treaty since 1954". Sveriges Television. Retrieved 12 December 2013.
  195. ^ a b c d "Read the Snowden Documents From the NSA". Sveriges Television. Retrieved 12 December 2013.
  196. ^ Ashkan Soltani; Andrea Peterson & Barton Gellman. "NSA uses Google cookies to pinpoint targets for hacking". The Washington Post. Retrieved 12 December 2013.
  197. ^ Greg Weston; Glenn Greenwald; Ryan Gallagher. "New Snowden docs show U.S. spied during G20 in Toronto". Canadian Broadcasting Corporation. Retrieved 13 December 2013.
  198. ^ a b c Glenn Greenwald & Stefania Maurizi. "Revealed: How the NSA Targets Italy". L'espresso. Retrieved 13 December 2013.
  199. ^ MARK MAZZETTI & JUSTIN ELLIOTT (9 December 2013). "Spies Infiltrate a Fantasy Realm of Online Games". The New York Times. Retrieved 12 December 2013.
  200. ^ Ball, James (9 December 2013). "Xbox Live among game services targeted by US and UK spy agencies". The Guardian. Retrieved 18 December 2013.
  201. ^ "NSA files: games and virtual environments paper". The Guardian. 9 December 2013. Retrieved 18 December 2013.
  202. ^ Justin Elliott, ProPublica, and Mark Mazzetti, The New York Times (9 December 2013). "NSA files: games and virtual environments paper". Pro Publica. Retrieved 18 December 2013.{{cite news}}: CS1 maint: multiple names: authors list (link)
  203. ^ Craig Timberg & Ashkan Soltani. "By cracking cellphone code, NSA has capacity for decoding private conversations". The Washington Post. Retrieved 14 December 2013.
  204. ^ "How the NSA pinpoints a mobile device". The Washington Post. Retrieved 14 December 2013.
  205. ^ Leon, Richard (16 December 2013). . The Washington Post. Archived from the original on 30 August 2017. Retrieved 17 December 2013.
  206. ^ Savage, Charlie (16 December 2013). "Judge Questions Legality of N.S.A. Phone Records". The New York Times. Retrieved 18 December 2013.
  207. ^ Bill Mears and Evan Perez, CNN (17 December 2013). "Judge: NSA domestic phone data-mining unconstitutional". CNN. Retrieved 18 December 2013. {{cite web}}: |author= has generic name (help)
  208. ^ Kravets, David (16 December 2013). "Court Says NSA Bulk Telephone Spying Is Unconstitutional". Wired. Retrieved 18 December 2013.
  209. ^ Kevin Johnson & Richard Wolf (16 December 2013). "Federal judge rules against NSA spying". USA Today. Retrieved 18 December 2013.
  210. ^ Gerstein, Josh (16 December 2013). "Judge: NSA phone program likely unconstitutional". Politico. Retrieved 18 December 2013.
  211. ^ a b Ellen Nakashima & Ann E. Marimow (16 December 2013). "Judge: NSA's collecting of phone records is probably unconstitutional". The Washington Post. Retrieved 17 December 2013.
  212. ^ Spencer Ackerman & Dan Roberts (16 December 2013). "NSA phone surveillance program likely unconstitutional, federal judge rules". The Guardian. Retrieved 18 December 2013.
  213. ^ Pauley III, William H. (27 December 2013). "United States District Court Southern District of New York: American Civil Liberties Union v. James R. Clapper (13 Civ. 3994) (WHP))" (PDF). American Civil Liberties Union. Retrieved 28 December 2013.
  214. ^ Adam Liptak & Michael S. Schmidt (27 December 2013). "Judge Upholds N.S.A.'s Bulk Collection of Data on Calls". The New York Times. Retrieved 28 December 2013.
  215. ^ Denniston, Lyle (27 December 2013). "Judge upholds NSA's phone data sweeps (UPDATED)". Scotusblog. Retrieved 28 December 2013.
  216. ^ Peterson, Andrea (27 December 2013). "The most Kafkaesque paragraph from today's NSA ruling". The Washington Post. Retrieved 28 December 2013.
  217. ^ Horwitz, Sari (27 December 2013). "NSA collection of phone data is lawful, federal judge rules". The Washington Post. Retrieved 28 December 2013.
  218. ^ Ackermann, Spencer (2 January 2014). "ACLU will appeal ruling that NSA bulk phone record collection is legal". The Guardian. Retrieved 4 January 2014.
  219. ^ James Glanz & Andrew W. Lehren (20 December 2013). "N.S.A. Spied on Allies, Aid Groups and Businesses". The New York Times. Retrieved 28 December 2013.
  220. ^ a b Jacob Appelbaum, Judith Horchert and Christian Stöcker. "Catalog Reveals NSA Has Back Doors for Numerous Devices - Shopping for Spy Gear: Catalog Advertises NSA Toolbox". Der Spiegel. Retrieved 30 December 2013.
  221. ^ Jacob Appelbaum, Laura Poitras, Marcel Rosenbach, Christian Stöcker, Jörg Schindler and Holger Start. "Inside TAO: Documents Reveal Top NSA Hacking Unit - The NSA Uses Powerful Toolbox in Effort to Spy on Global Networks". Der Spiegel. Retrieved 30 December 2013.{{cite magazine}}: CS1 maint: multiple names: authors list (link)
  222. ^ "Interactive Graphic: The NSA's Spy Catalog". Der Spiegel. 30 December 2013. Retrieved 4 January 2014.
  223. ^ Erik Kain (2013-12-29). "Report: NSA Intercepting Laptops Ordered Online, Installing Spyware". Forbes. Retrieved 30 December 2013.
  224. ^ RAPHAEL SATTER (29 December 2013). . Associated Press. Archived from the original on December 30, 2013. Retrieved 30 December 2013.
  225. ^ Courtney Subramanian (December 29, 2013). "The TAO of the NSA: Specialized Hacking Team Gets the 'Ungettable'". Time. Retrieved 30 December 2013.
  226. ^ "Glenn Greenwald: The NSA Can "Literally Watch Every Keystroke You Make"". Democracy Now!. 30 December 2013. Retrieved 4 January 2014.
  227. ^ Walters, Joanna (29 December 2013). "NSA 'hacking unit' infiltrates computers around the world – report". The Guardian. Retrieved 4 January 2014.
  228. ^ "French gov used fake Google certificate to read its workers' traffic". The Register.
  229. ^ The Washington Post (2013-12-04). "GHOSTMACHINE: The NSA's cloud analytics platform" (4 slides). The Washington Post. from the original on 2017-11-20. Retrieved 2014-03-23.
  230. ^ a b Michael Winter (January 2, 2014). "NSA working to build computer to crack encryption". USA Today. Retrieved 3 January 2014.
  231. ^ a b c Steven Rich & Barton Gellman (3 January 2014). "NSA seeks to build quantum computer that could crack most types of encryption". The Washington Post. Retrieved 3 January 2014.
  232. ^ "A description of the Penetrating Hard Targets project". The Washington Post. 2 January 2014. Retrieved 4 January 2014.
  233. ^ "Classifying NSA quantum computing efforts". The Washington Post. 2 January 2014. Retrieved 4 January 2014.
  234. ^ Lee, Timothy B. (2 January 2014). "Confused about the NSA's quantum computing project? This MIT computer scientist can explain". The Washington Post. Retrieved 4 January 2014.
  235. ^ "Report: NSA 'collected 200m texts per day'". BBC News. 16 January 2014. Retrieved 16 January 2014.
  236. ^ Geoff White (16 January 2014). "Revealed: UK and US spied on text messages of Brits". Channel 4. Retrieved 16 January 2014.
  237. ^ a b c d e f James Ball in (16 January 2014). "NSA collects millions of text messages daily in 'untargeted' global sweep". The Guardian. Retrieved 16 January 2014.
  238. ^ "Report: NSA 'collected 200m texts per day'". BBC News. 16 January 2014. Retrieved 16 January 2014.
  239. ^ James Glanz, Jeff Larson & Andrew W. Lehren (27 January 2014). "Spy Agencies Tap Data Streaming From Phone Apps - A version of the NYT appeared in print on January 28, 2014, on page A1 of the New York edition with the headline: Spy Agencies Tap Data Streaming From Phone Apps". The New York Times. Retrieved 28 January 2014.
  240. ^ "From Britain's Government Communications Headquarters". The New York Times. 27 January 2014. Retrieved 28 January 2014.
  241. ^ a b "From the National Security Agency". The New York Times. 27 January 2014. Retrieved 28 January 2014.
  242. ^ Ball, James (28 January 2014). "Angry Birds and 'leaky' phone apps targeted by NSA and GCHQ for user data". The Guardian. Retrieved 28 January 2014.
  243. ^ Jeff Larson, ProPublica, and James Glanz and Andrew W. Lehren, The New York Times (27 January 2014). "Spy Agencies Probe Angry Birds and Other Apps for Personal Data". ProPublica. Retrieved 28 January 2014.{{cite news}}: CS1 maint: multiple names: authors list (link)
  244. ^ Ball, James (27 January 2014). "NSA and GCHQ target 'leaky' phone apps like Angry Birds to scoop user data". The Guardian. Retrieved 27 January 2014.
  245. ^ JAMES GLANZ, JEFF LARSON & ANDREW W. LEHREN (27 January 2014). "Spy Agencies Scour Phone Apps for Personal Data". The New York Times. Retrieved 27 January 2014.
  246. ^ Dignan, Larry (28 January 2014). . ZDNet. Archived from the original on January 29, 2014. Retrieved 28 January 2014.
  247. ^ Richard Esposito; Matthew Cole; Mark Schone; Glenn Greenwald (27 January 2014). "Snowden docs reveal British spies snooped on YouTube and Facebook". NBC News. Retrieved 27 January 2014.
  248. ^ (PDF). GCHQ. NBC News Investigations. 27 January 2014. Archived from the original (PDF) on 29 January 2014. Retrieved 28 January 2014.
  249. ^ Vidal, John. "Snowden revelations of NSA spying on Copenhagen climate talks spark anger". The Guardian. Retrieved 31 January 2014.
  250. ^ Sheppard, Kate. "Snowden Docs: U.S. Spied On Negotiators At 2009 Climate Summit". The Huffington Post. Retrieved 31 January 2014.
  251. ^ Greg Weston; Glenn Greenwald; Ryan Gallagher (30 January 2014). "CSEC used airport Wi-Fi to track Canadian travellers: Edward Snowden documents". Canadian Broadcasting Corporation. Retrieved 31 January 2014.
  252. ^ "Snowden leaks: Canada 'spied on airport travellers'". BBC. 31 January 2014. Retrieved 31 January 2014.
  253. ^ Memmott, Mark (31 January 2014). "Canada Used Airport Wi-Fi To Track Travelers, Snowden Leak Alleges"

timeline, global, surveillance, disclosures, 2013, present, this, timeline, global, surveillance, disclosures, from, 2013, present, chronological, list, global, surveillance, disclosures, that, began, 2013, disclosures, have, been, largely, instigated, revelat. This timeline of global surveillance disclosures from 2013 to the present day is a chronological list of the global surveillance disclosures that began in 2013 The disclosures have been largely instigated by revelations from the former American National Security Agency contractor Edward Snowden The Mira hotel in Hong Kong where Edward Snowden hosted his first meeting with Glenn Greenwald Laura Poitras and journalist Ewen MacAskill of The Guardian 1 Contents 1 2012 2 January May 2013 3 June 2013 4 July 2013 5 August 2013 6 September 2013 7 October 2013 8 November 2013 9 December 2013 10 January 2014 11 February 2014 12 March 2014 13 April 2014 14 May 2014 15 June 2014 16 July 2014 17 August 2014 18 February 2015 19 March 2015 20 April 2015 21 January 2016 22 August 2016 23 References2012 editIn April 2012 Defense contractor Edward Snowden began downloading sensitive Western intelligence material while working for the American computer corporation Dell 2 By the end of the year Snowden had made his first contact with journalist Glenn Greenwald of The Guardian 3 January May 2013 editIn January 2013 Snowden contacted documentary filmmaker Laura Poitras 4 In March 2013 Snowden took up a new job at Booz Allen Hamilton in Hawaii specifically to gain access to additional top secret documents that could be leaked 2 In April 2013 Poitras asked Greenwald to meet her in New York City 3 In May 2013 Snowden was permitted temporary leave from his position at the NSA in Hawaii on the pretext of receiving treatment for his epilepsy 5 Towards the end of May Snowden flew to Hong Kong 6 June 2013 editAfter the U S based editor of The Guardian held several meetings in New York City it was decided that Greenwald Poitras and The Guardian s defence and intelligence correspondent Ewen MacAskill would fly to Hong Kong to meet Snowden On June 5 in the first media report based on the leaked material 7 The Guardian exposed a top secret court order showing that the NSA had collected phone records from over 120 million Verizon subscribers 8 Under the order the numbers of both parties on a call as well as the location data unique identifiers time of call and duration of call were handed over to the FBI which turned over the records to the NSA 8 According to The Wall Street Journal the Verizon order is part of a controversial data program which seeks to stockpile records on all calls made in the U S but doesn t collect information directly from T Mobile USA and Verizon Wireless in part because of their foreign ownership ties 9 On June 7 2013 the second media disclosure the revelation of the PRISM surveillance program 10 11 12 was published simultaneously by The Guardian and The Washington Post 1 13 Documents provided by Snowden to Der Spiegel revealed how the NSA spied on various diplomatic missions of the European Union EU including the EU s delegation to the United States in Washington D C the EU s delegation to the United Nations in New York and the Council of the European Union in Brussels as well as the United Nations Headquarters in New York 14 15 During specific episodes within a four year period the NSA hacked several Chinese mobile phone companies 16 the Chinese University of Hong Kong and Tsinghua University in Beijing 17 and the Asian fiber optic network operator Pacnet 18 Only Australia Canada New Zealand and the UK are explicitly exempted from NSA attacks whose main target in the EU is Germany 19 A method of bugging encrypted fax machines used at an EU embassy is codenamed Dropmire 20 During the 2009 G 20 London summit the British intelligence agency Government Communications Headquarters GCHQ intercepted the communications of foreign diplomats 21 In addition the GCHQ has been intercepting and storing mass quantities of fiber optic traffic via Tempora 22 Two principal components of Tempora are called Mastering the Internet MTI and Global Telecoms Exploitation 23 The data is preserved for three days while metadata is kept for thirty days 24 Data collected by the GCHQ under Tempora is shared with the National Security Agency NSA of the United States 23 From 2001 to 2011 the NSA collected vast amounts of metadata records detailing the email and internet usage of Americans via Stellar Wind 25 which was later terminated due to operational and resource constraints It was subsequently replaced by newer surveillance programs such as ShellTrumpet which processed its one trillionth metadata record by the end of December 2012 26 According to the Boundless Informant over 97 billion pieces of intelligence were collected over a 30 day period ending in March 2013 Out of all 97 billion sets of information about 3 billion data sets originated from U S computer networks 27 and around 500 million metadata records were collected from German networks 28 Several weeks later it was revealed that the Bundesnachrichtendienst BND of Germany transfers massive amounts of metadata records to the NSA 29 nbsp On June 11 2013 The Guardian published a snapshot of the NSA s global map of electronic data collection for the month of March 2013 Known as the Boundless Informant the program is used by the NSA to track the amount of data being analyzed over a specific period of time The color scheme ranges from green least subjected to surveillance through yellow and orange to red most surveillance Outside the Middle East only China Germany India Kenya and the United States are colored orange or yellowJuly 2013 editAccording to the Brazilian newspaper O Globo the NSA spied on millions of emails and calls of Brazilian citizens 30 31 while Australia and New Zealand have been involved in the joint operation of the NSA s global analytical system XKeyscore 32 33 Among the numerous allied facilities contributing to XKeyscore are four installations in Australia and one in New Zealand Pine Gap near Alice Springs Australia which is partly operated by the U S Central Intelligence Agency CIA 33 The Shoal Bay Receiving Station near Darwin Australia is operated by the Australian Signals Directorate ASD 33 The Australian Defence Satellite Communications Station near Geraldton Australia is operated by the ASD 33 HMAS Harman outside Canberra Australia is operated by the ASD 33 Waihopai Station near Blenheim New Zealand is operated by New Zealand s Government Communications Security Bureau GCSB 33 O Globo released an NSA document titled Primary FORNSAT Collection Operations which revealed the specific locations and codenames of the FORNSAT intercept stations in 2002 34 According to Edward Snowden the NSA has established secret intelligence partnerships with many Western governments 33 The Foreign Affairs Directorate FAD of the NSA is responsible for these partnerships which according to Snowden are organized such that foreign governments can insulate their political leaders from public outrage in the event that these global surveillance partnerships are leaked 35 In an interview published by Der Spiegel Snowden accused the NSA of being in bed together with the Germans 36 The NSA granted the German intelligence agencies BND foreign intelligence and BfV domestic intelligence access to its controversial XKeyscore system 37 In return the BND turned over copies of two systems named Mira4 and Veras reported to exceed the NSA s SIGINT capabilities in certain areas 38 Every day massive amounts of metadata records are collected by the BND and transferred to the NSA via the Bad Aibling Station near Munich Germany 38 In December 2012 alone the BND handed over 500 million metadata records to the NSA 39 40 In a document dated January 2013 the NSA acknowledged the efforts of the BND to undermine privacy laws The BND has been working to influence the German government to relax interpretation of the privacy laws to provide greater opportunities of intelligence sharing 40 According to an NSA document dated April 2013 Germany has now become the NSA s most prolific partner 40 Under a section of a separate document leaked by Snowden titled Success Stories the NSA acknowledged the efforts of the German government to expand the BND s international data sharing with partners The German government modifies its interpretation of the G 10 privacy law to afford the BND more flexibility in sharing protected information with foreign partners 41 In addition the German government was well aware of the PRISM surveillance program long before Edward Snowden made details public According to Angela Merkel s spokesman Steffen Seibert there are two separate PRISM programs one is used by the NSA and the other is used by NATO forces in Afghanistan 42 Both surveillance programs are not identical 42 The Guardian revealed further details of the NSA s XKeyscore tool which allows government analysts to search through vast databases containing emails online chats and the browsing histories of millions of individuals without prior authorization 43 44 45 Microsoft developed a surveillance capability to deal with the interception of encrypted chats on Outlook com within five months after the service went into testing NSA had access to Outlook com emails because Prism collects this data prior to encryption 46 In addition Microsoft worked with the FBI to enable the NSA to gain access to its cloud storage service SkyDrive An internal NSA document dating from 3 August 2012 described the PRISM surveillance program as a team sport 46 Even if there is no reason to suspect U S citizens of wrongdoing the CIA s National Counterterrorism Center is allowed to examine federal government files for possible criminal behavior Previously the NTC was barred to do so unless a person was a terror suspect or related to an investigation 47 Snowden also confirmed that Stuxnet was cooperatively developed by the United States and Israel 48 In a report unrelated to Edward Snowden the French newspaper Le Monde revealed that France s DGSE was also undertaking mass surveillance which it described as illegal and outside any serious control 49 50 August 2013 editDocuments leaked by Edward Snowden that were seen by Suddeutsche Zeitung SZ and Norddeutscher Rundfunk revealed that several telecom operators have played a key role in helping the British intelligence agency Government Communications Headquarters GCHQ tap into worldwide fiber optic communications The telecom operators are Verizon Business codenamed Dacron 51 52 British Telecommunications codenamed Remedy 51 52 Vodafone Cable codenamed Gerontic 51 52 Global Crossing codenamed Pinnage 51 52 Level 3 codenamed Little 51 52 Viatel codenamed Vitreous 51 52 Interoute codenamed Streetcar 51 52 Each of them were assigned a particular area of the international fiber optic network for which they were individually responsible The following networks have been infiltrated by the GCHQ TAT 14 Europe USA Atlantic Crossing 1 Europe USA Circe South France UK Circe North The Netherlands UK Flag Atlantic 1 Flag Europa Asia SEA ME WE 3 Southeast Asia Middle East Western Europe SEA ME WE 4 Southeast Asia Middle East Western Europe Solas Ireland UK UK France 3 UK Netherlands 14 ULYSSES Europe UK Yellow UK USA and Pan European Crossing 53 Telecommunication companies who participated were forced to do so and had no choice in the matter 53 Some of the companies were subsequently paid by GCHQ for their participation in the infiltration of the cables 53 According to the SZ the GCHQ has access to the majority of internet and telephone communications flowing throughout Europe can listen to phone calls read emails and text messages see which websites internet users from all around the world are visiting It can also retain and analyse nearly the entire European internet traffic 53 The GCHQ is collecting all data transmitted to and from the United Kingdom and Northern Europe via the undersea fibre optic telecommunications cable SEA ME WE 3 The Security and Intelligence Division SID of Singapore co operates with Australia in accessing and sharing communications carried by the SEA ME WE 3 cable The Australian Signals Directorate ASD is also in a partnership with British American and Singaporean intelligence agencies to tap undersea fibre optic telecommunications cables that link Asia the Middle East and Europe and carry much of Australia s international phone and internet traffic 54 The U S runs a top secret surveillance program known as the Special Collection Service SCS which is based in over 80 U S consulates and embassies worldwide 55 56 The NSA hacked the United Nations video conferencing system in Summer 2012 in violation of a UN agreement 55 56 The NSA is not just intercepting the communications of Americans who are in direct contact with foreigners targeted overseas but also searching the contents of vast amounts of e mail and text communications into and out of the country by Americans who mention information about foreigners under surveillance 57 It also spied on the Al Jazeera and gained access to its internal communications systems 58 The NSA has built a surveillance network that has the capacity to reach roughly 75 of all U S Internet traffic 59 60 61 U S Law enforcement agencies use tools used by computer hackers to gather information on suspects 62 63 An internal NSA audit from May 2012 identified 2776 incidents i e violations of the rules or court orders for surveillance of Americans and foreign targets in the U S in the period from April 2011 through March 2012 while U S officials stressed that any mistakes are not intentional 64 65 66 67 68 69 70 The FISA Court that is supposed to provide critical oversight of the U S government s vast spying programs has limited ability to do and it must trust the government to report when it improperly spies on Americans 71 A legal opinion declassified on August 21 2013 revealed that the NSA intercepted for three years as many as 56 000 electronic communications a year of Americans who weren t suspected of having links to terrorism before FISC court that oversees surveillance found the operation unconstitutional in 2011 72 73 74 75 76 Under the Corporate Partner Access project major U S telecommunications providers receive hundreds of millions of dollars each year from the NSA 77 Voluntary cooperation between the NSA and the providers of global communications took off during the 1970s under the cover name BLARNEY 77 A letter drafted by the Obama administration specifically to inform Congress of the government s mass collection of Americans telephone communications data was withheld from lawmakers by leaders of the House Intelligence Committee in the months before a key vote affecting the future of the program 78 79 The NSA paid GCHQ over 100 Million between 2009 and 2012 in exchange for these funds GCHQ must pull its weight and be seen to pull its weight Documents referenced in the article explain that the weaker British laws regarding spying are a selling point for the NSA GCHQ is also developing the technology to exploit any mobile phone at any time 80 The NSA has under a legal authority a secret backdoor into its databases gathered from large Internet companies enabling it to search for U S citizens email and phone calls without a warrant 81 82 The Privacy and Civil Liberties Oversight Board urged the U S intelligence chiefs to draft stronger US surveillance guidelines on domestic spying after finding that several of those guidelines have not been updated up to 30 years 83 84 U S intelligence analysts have deliberately broken rules designed to prevent them from spying on Americans by choosing to ignore so called minimisation procedures aimed at protecting privacy 85 86 87 After the U S Foreign Secret Intelligence Court ruled in October 2011 that some of the NSA s activities were unconstitutional the agency paid millions of dollars to major internet companies to cover extra costs incurred in their involvement with the PRISM surveillance program 88 Mastering the Internet MTI is part of the Interception Modernisation Programme IMP of the British government that involves the insertion of thousands of DPI deep packet inspection black boxes at various internet service providers as revealed by the British media in 2009 89 In 2013 it was further revealed that the NSA had made a 17 2 million financial contribution to the project which is capable of vacuuming signals from up to 200 fibre optic cables at all physical points of entry into Great Britain 90 September 2013 editThe Guardian and The New York Times reported on secret documents leaked by Snowden showing that the NSA has been in collaboration with technology companies as part of an aggressive multipronged effort to weaken the encryption used in commercial software and the GCHQ has a team dedicated to cracking Hotmail Google Yahoo and Facebook traffic 91 92 93 94 95 96 Israel Sweden and Italy are also cooperating with American and British intelligence agencies Under a secret treaty codenamed Lustre French intelligence agencies transferred millions of metadata records to the NSA 97 98 99 100 The Obama Administration secretly won permission from the Foreign Intelligence Surveillance Court in 2011 to reverse restrictions on the National Security Agency s use of intercepted phone calls and e mails permitting the agency to search deliberately for Americans communications in its massive databases The searches take place under a surveillance program Congress authorized in 2008 under Section 702 of the Foreign Intelligence Surveillance Act Under that law the target must be a foreigner reasonably believed to be outside the United States and the court must approve the targeting procedures in an order good for one year but a warrant for each target would thus no longer be required That means that communications with Americans could be picked up without a court first determining that there is probable cause that the people they were talking to were terrorists spies or foreign powers The FISC extended the length of time that the NSA is allowed to retain intercepted U S communications from five years to six years with an extension possible for foreign intelligence or counterintelligence purposes Both measures were done without public debate or any specific authority from Congress 101 A special branch of the NSA called Follow the Money FTM monitors international payments banking and credit card transactions and later stores the collected data in the NSA s own financial databank Tracfin 102 The NSA monitored the communications of Brazil s president Dilma Rousseff and her top aides 103 The agency also spied on Brazil s oil firm Petrobras as well as French diplomats and gained access to the private network of the Ministry of Foreign Affairs of France and the SWIFT network 104 In the United States the NSA uses the analysis of phone call and e mail logs of American citizens to create sophisticated graphs of their social connections that can identify their associates their locations at certain times their traveling companions and other personal information 105 The NSA routinely shares raw intelligence data with Israel without first sifting it to remove information about U S citizens 106 107 In an effort codenamed GENIE computer specialists can control foreign computer networks using covert implants a form of remotely transmitted malware on tens of thousands of devices annually 108 109 110 111 As worldwide sales of smartphones began exceeding those of feature phones the NSA decided to take advantage of the smartphone boom This is particularly advantageous because the smartphone combines a myriad of data that would interest an intelligence agency such as social contacts user behavior interests location photos and credit card numbers and passwords 112 An internal NSA report from 2010 stated that the spread of the smartphone has been occurring extremely rapidly developments that certainly complicate traditional target analysis 112 According to the document the NSA has set up task forces assigned to several smartphone manufacturers and operating systems including Apple Inc s iPhone and iOS operating system as well as Google s Android mobile operating system 112 Similarly Britain s GCHQ assigned a team to study and crack the BlackBerry 112 Under the heading iPhone capability the document notes that there are smaller NSA programs known as scripts that can perform surveillance on 38 different features of the iOS 3 and iOS 4 operating systems These include the mapping feature voicemail and photos as well as Google Earth Facebook and Yahoo Messenger 112 October 2013 editOn October 4 2013 The Washington Post and The Guardian jointly reported that the NSA and the GCHQ have made repeated attempts to spy on anonymous Internet users who have been communicating in secret via the anonymity network Tor Several of these surveillance operations involve the implantation of malicious code into the computers of Tor users who visit particular websites The NSA and GCHQ have partly succeeded in blocking access to the anonymous network diverting Tor users to insecure channels The government agencies were also able to uncover the identity of some anonymous Internet users 113 114 115 116 117 118 119 120 121 The Communications Security Establishment Canada CSEC has been using a program called Olympia to map the communications of Brazil s Mines and Energy Ministry by targeting the metadata of phone calls and emails to and from the ministry 122 123 The Australian Federal Government knew about the PRISM surveillance program months before Edward Snowden made details public 124 125 The NSA monitored the public email account of former Mexican president Felipe Calderon thus gaining access to the communications of high ranking cabinet members the E Mails of several high ranking members of Mexico s security forces and text and the mobile phone communication of current Mexican president Enrique Pena Nieto 126 127 The NSA tries to gather cellular and landline phone numbers often obtained from American diplomats for as many foreign officials as possible The contents of the phone calls are stored in computer databases that can regularly be searched using keywords 128 129 The NSA has been monitoring telephone conversations of 35 world leaders 130 The U S government s first public acknowledgment that it tapped the phones of world leaders was reported on October 28 2013 by the Wall Street Journal after an internal U S government review turned up NSA monitoring of some 35 world leaders 131 The GCHQ has tried to keep its mass surveillance program a secret because it feared a damaging public debate on the scale of its activities which could lead to legal challenges against them 132 The Guardian revealed that the NSA had been monitoring telephone conversations of 35 world leaders after being given the numbers by an official in another U S government department A confidential memo revealed that the NSA encouraged senior officials in such Departments as the White House State and The Pentagon to share their Rolodexes so the agency could add the telephone numbers of leading foreign politicians to their surveillance systems Reacting to the news German leader Angela Merkel arriving in Brussels for an EU summit accused the U S of a breach of trust saying We need to have trust in our allies and partners and this must now be established once again I repeat that spying among friends is not at all acceptable against anyone and that goes for every citizen in Germany 130 The NSA collected in 2010 data on ordinary Americans cellphone locations but later discontinued it because it had no operational value 133 Under Britain s MUSCULAR programme the NSA and the GCHQ have secretly broken into the main communications links that connect Yahoo and Google data centers around the world and thereby gained the ability to collect metadata and content at will from hundreds of millions of user accounts 134 135 136 137 138 The mobile phone of German Chancellor Angela Merkel might have been tapped by U S intelligence 139 140 141 142 143 144 145 According to the Spiegel this monitoring goes back to 2002 146 147 and ended in the summer of 2013 131 while the New York Times reported that Germany has evidence that the NSA s surveillance of Merkel began during George W Bush s tenure 148 After learning from Der Spiegel magazine that the NSA has been listening in to her personal mobile phone Merkel compared the snooping practices of the NSA with those of the Stasi 149 On October 31 2013 Hans Christian Strobele a member of the German Bundestag met Snowden in Moscow and revealed the former intelligence contractor s readiness to brief the German government on NSA spying 150 A highly sensitive signals intelligence collection program known as Stateroom involves the interception of radio telecommunications and internet traffic It is operated out of the diplomatic missions of the Five Eyes Australia Britain Canada New Zealand United States in numerous locations around the world The program conducted at U S diplomatic missions is run in concert by the U S intelligence agencies NSA and CIA in a joint venture group called Special Collection Service SCS whose members work undercover in shielded areas of the American Embassies and Consulates where they are officially accredited as diplomats and as such enjoy special privileges Under diplomatic protection they are able to look and listen unhindered The SCS for example used the American Embassy near the Brandenburg Gate in Berlin to monitor communications in Germany s government district with its parliament and the seat of the government 145 151 152 153 Under the Stateroom surveillance programme Australia operates clandestine surveillance facilities to intercept phone calls and data across much of Asia 152 154 In France the NSA targeted people belonging to the worlds of business politics or French state administration The NSA monitored and recorded the content of telephone communications and the history of the connections of each target i e the metadata 155 156 The actual surveillance operation was performed by French intelligence agencies on behalf of the NSA 97 157 The cooperation between France and the NSA was confirmed by the Director of the NSA Keith B Alexander who asserted that foreign intelligence services collected phone records in war zones and other areas outside their borders and provided them to the NSA 158 The French newspaper Le Monde also disclosed new PRISM and Upstream slides See Page 4 7 and 8 coming from the PRISM US 984XN Overview presentation 159 In Spain the NSA intercepted the telephone conversations text messages and emails of millions of Spaniards and spied on members of the Spanish government 160 Between December 10 2012 and January 8 2013 the NSA collected metadata on 60 million telephone calls in Spain 161 According to documents leaked by Snowden the surveillance of Spanish citizens was jointly conducted by the NSA and the intelligence agencies of Spain 162 163 nbsp On October 4 2013 The Washington Post published a powerpoint presentation leaked by Snowden showing how the NSA has compromised the Tor encrypted network that is being employed by hundreds of thousands of people to circumvent nation state internet policies By secretly exploiting a JavaScript plug in the NSA is able to uncover the identities of various anonymous Internet users such as dissidents terrorists and other targetsNovember 2013 editThe New York Times reported that the NSA carries out an eavesdropping effort dubbed Operation Dreadnought against the Iranian leader Ayatollah Ali Khamenei During his 2009 visit to Iranian Kurdistan the agency collaborated with the GCHQ and the U S s National Geospatial Intelligence Agency collecting radio transmissions between aircraft and airports examining Khamenei s convoy with satellite imagery and enumerating military radar stations According to the story an objective of the operation is communications fingerprinting the ability to distinguish Khamenei s communications from those of other people in Iran 164 The same story revealed an operation code named Ironavenger in which the NSA intercepted e mails sent between a country allied with the United States and the government of an adversary The ally was conducting a spear phishing attack its e mails contained malware The NSA gathered documents and login credentials belonging to the enemy country along with knowledge of the ally s capabilities for attacking computers 164 According to the British newspaper The Independent the British intelligence agency GCHQ maintains a listening post on the roof of the British Embassy in Berlin that is capable of intercepting mobile phone calls wi fi data and long distance communications all over the German capital including adjacent government buildings such as the Reichstag seat of the German parliament and the Chancellery seat of Germany s head of government clustered around the Brandenburg Gate 165 Operating under the code name Quantum Insert the GCHQ set up a fake website masquerading as LinkedIn a social website used for professional networking as part of its efforts to install surveillance software on the computers of the telecommunications operator Belgacom 166 In addition the headquarters of the oil cartel OPEC were infiltrated by the GCHQ as well as the NSA which bugged the computers of nine OPEC employees and monitored the General Secretary of OPEC 166 For more than three years the GCHQ has been using an automated monitoring system code named Royal Concierge to infiltrate the reservation systems of at least 350 upscale hotels in many different parts of the world in order to target search and analyze reservations to detect diplomats and government officials 167 First tested in 2010 the aim of the Royal Concierge is to track down the travel plans of diplomats and it is often supplemented with surveillance methods related to human intelligence HUMINT Other covert operations include the wiretapping of room telephones and fax machines used in targeted hotels as well as the monitoring of computers hooked up to the hotel network 167 In November 2013 the Australian Broadcasting Corporation and The Guardian revealed that the Australian Signals Directorate DSD had attempted to listen to the private phone calls of the president of Indonesia and his wife The Indonesian foreign minister Marty Natalegawa confirmed that he and the president had contacted the ambassador in Canberra Natalegawa said any tapping of Indonesian politicians personal phones violates every single decent and legal instrument I can think of national in Indonesia national in Australia international as well 168 Other high ranking Indonesian politicians targeted by the DSD include Boediono 169 Vice President Jusuf Kalla 169 Former Vice President Dino Patti Djalal 169 Ambassador to the United States Andi Mallarangeng 169 Government spokesperson Hatta Rajasa 169 State Secretary Sri Mulyani Indrawati 169 Former Finance Minister and current managing director of the World Bank Widodo Adi Sutjipto 169 Former Commander in Chief of the military Sofyan Djalil 169 Senior government advisor Carrying the title 3G impact and update a classified presentation leaked by Snowden revealed the attempts of the ASD DSD to keep up to pace with the rollout of 3G technology in Indonesia and across Southeast Asia The ASD DSD motto placed at the bottom of each page reads Reveal their secrets protect our own 169 Under a secret deal approved by British intelligence officials the NSA has been storing and analyzing the internet and email records of British citizens since 2007 The NSA also proposed in 2005 a procedure for spying on the citizens of the UK and other Five Eyes nations alliance even where the partner government has explicitly denied the U S permission to do so Under the proposal partner countries must neither be informed about this particular type of surveillance nor the procedure of doing so 170 Towards the end of November The New York Times released an internal NSA report outlining the agency s efforts to expand its surveillance abilities 171 The five page document asserts that the law of the United States has not kept up with the needs of the NSA to conduct mass surveillance in the golden age of signals intelligence but there are grounds for optimism because in the NSA s own words The culture of compliance which has allowed the American people to entrust NSA with extraordinary authorities will not be compromised in the face of so many demands even as we aggressively pursue legal authorities 172 The report titled SIGNT Strategy 2012 2016 also said that the U S will try to influence the global commercial encryption market through commercial relationships and emphasized the need to revolutionize the analysis of its vast data collection to radically increase operational impact 171 On November 23 2013 the Dutch newspaper NRC Handelsblad reported that the Netherlands was targeted by U S intelligence agencies in the immediate aftermath of World War II This period of surveillance lasted from 1946 to 1968 and also included the interception of the communications of other European countries including Belgium France West Germany and Norway 173 The Dutch Newspaper also reported that NSA infected more than 50 000 computer networks worldwide often covertly with malicious spy software sometimes in cooperation with local authorities designed to steal sensitive information 174 175 nbsp On November 23 2013 the Dutch newspaper NRC Handelsblad released a top secret NSA presentation leaked by Snowden showing five Classes of Accesses that the NSA uses in its worldwide signals intelligence operations 174 175 These five Classes of Accesses are 3rd PARTY LIAISON refers to data provided by the international partners of the NSA Within the framework of the UKUSA Agreement these international partners are known as third parties REGIONAL refers to over 80 regional Special Collection Services SCS The SCS is a black budget program operated by the NSA and the CIA with operations based in many cities such as Athens Bangkok Berlin Brasilia Budapest Frankfurt Geneva Lagos Milan New Delhi Paris Prague Vienna and Zagreb and others targeting Central America the Arabian Peninsula East Asia and Continental Europe CNE an abbreviation for Computer Network Exploitation It is performed by a special cyber warfare unit of the NSA known as Tailored Access Operations TAO which infected over 50 000 computer networks worldwide with malicious software designed to steal sensitive information and is mostly aimed at Brazil China Egypt India Mexico Saudi Arabia and parts of Eastern Europe LARGE CABLE 20 major points of accesses many of them located within the United States FORNSAT an abbreviation for Foreign Satellite Collection It refers to intercepts from satellites that process data used by other countries such as Britain Norway Japan and the PhilippinesDecember 2013 editAccording to the classified documents leaked by Snowden the Australian Signals Directorate formerly known as the Defence Signals Directorate had offered to share information on Australian citizens with the other intelligence agencies of the UKUSA Agreement Data shared with foreign countries include bulk unselected unminimised metadata such as medical legal or religious information 176 The Washington Post revealed that the NSA has been tracking the locations of mobile phones from all over the world by tapping into the cables that connect mobile networks globally and that serve U S cellphones as well as foreign ones In the process of doing so the NSA collects more than five billion records of phone locations on a daily basis This enables NSA analysts to map cellphone owners relationships by correlating their patterns of movement over time with thousands or millions of other phone users who cross their paths 177 178 179 180 181 182 183 184 The Washington Post also reported that the NSA makes use of location data and advertising tracking files generated through normal internet browsing i e tools that enable Internet advertisers to track consumers from Google and others to get information on potential targets to pinpoint targets for government hacking and to bolster surveillance 185 186 187 The Norwegian Intelligence Service NIS which cooperates with the NSA has gained access to Russian targets in the Kola Peninsula and other civilian targets In general the NIS provides information to the NSA about Politicians Energy and Armament 188 A top secret memo of the NSA lists the following years as milestones of the Norway United States of America SIGNT agreement or NORUS Agreement 1952 Informal starting year of cooperation between the NIS and the NSA 189 1954 Formalization of the agreement 189 1963 Extension of the agreement for coverage of foreign instrumentation signals intelligence FISINT 189 1970 Extension of the agreement for coverage of electronic intelligence ELINT 189 1994 Extension of the agreement for coverage of communications intelligence COMINT 189 The NSA considers the NIS to be one of its most reliable partners Both agencies also cooperate to crack the encryption systems of mutual targets According to the NSA Norway has made no objections to its requests from the NIS 189 On 5 December Sveriges Television reported that the National Defence Radio Establishment FRA has been conducting a clandestine surveillance operation in Sweden targeting the internal politics of Russia The operation was conducted on behalf of the NSA receiving data handed over to it by the FRA 190 191 The Swedish American surveillance operation also targeted Russian energy interests as well as the Baltic states 192 As part of the UKUSA Agreement a secret treaty was signed in 1954 by Sweden with the United States the United Kingdom Canada Australia and New Zealand regarding collaboration and intelligence sharing 193 As a result of Snowden s disclosures the notion of Swedish neutrality in international politics was called into question citation needed In an internal document dating from the year 2006 the NSA acknowledged that its relationship with Sweden is protected at the TOP SECRET level because of that nation s political neutrality 194 Specific details of Sweden s cooperation with members of the UKUSA Agreement include The FRA has been granted access to XKeyscore an analytical database of the NSA 195 Sweden updated the NSA on changes in Swedish legislation that provided the legal framework for information sharing between the FRA and the Swedish Security Service 195 Since January 2013 a counterterrorism analyst of the NSA has been stationed in the Swedish capital of Stockholm 195 The NSA the GCHQ and the FRA signed an agreement in 2004 that allows the FRA to directly collaborate with the NSA without having to consult the GCHQ 195 In order to identify targets for government hacking and surveillance both the GCHQ and the NSA have used advertising cookies operated by Google known as Pref to pinpoint targets According to documents leaked by Snowden the Special Source Operations of the NSA has been sharing information containing logins cookies and GooglePREFID with the Tailored Access Operations division of the NSA as well as Britain s GCHQ agency 196 During the 2010 G 20 Toronto summit the U S embassy in Ottawa was transformed into a security command post during a six day spying operation that was conducted by the NSA and closely co ordinated with the Communications Security Establishment Canada CSEC The goal of the spying operation was among others to obtain information on international development banking reform and to counter trade protectionism to support U S policy goals 197 On behalf of the NSA the CSEC has set up covert spying posts in 20 countries around the world In Italy the Special Collection Service of the NSA maintains two separate surveillance posts in Rome and Milan 198 According to a secret NSA memo dated September 2010 the Italian embassy in Washington D C has been targeted by two spy operations of the NSA Under the codename Bruneau which refers to mission Lifesaver the NSA sucks out all the information stored in the embassy s computers and creates electronic images of hard disk drives 198 Under the codename Hemlock which refers to mission Highlands the NSA gains access to the embassy s communications through physical implants 198 Due to concerns that terrorist or criminal networks may be secretly communicating via computer games the NSA the GCHQ the CIA and the FBI have been conducting surveillance and scooping up data from the networks of many online games including massively multiplayer online role playing games MMORPGs such as World of Warcraft as well as virtual worlds such as Second Life and the Xbox gaming console 199 200 201 202 The NSA has cracked the most commonly used cellphone encryption technology A5 1 According to a classified document leaked by Snowden the agency can process encrypted A5 1 even when it has not acquired an encryption key 203 In addition the NSA uses various types of cellphone infrastructure such as the links between carrier networks to determine the location of a cellphone user tracked by Visitor Location Registers 204 US district court judge for the District of Columbia Richard Leon declared 205 206 207 208 209 210 on December 16 2013 that the mass collection of metadata of Americans telephone records by the National Security Agency probably violates the fourth amendment prohibition of unreasonable searches and seizures 211 Leon granted the request for a preliminary injunction that blocks the collection of phone data for two private plaintiffs Larry Klayman a conservative lawyer and Charles Strange father of a cryptologist killed in Afghanistan when his helicopter was shot down in 2011 212 and ordered the government to destroy any of their records that have been gathered But the judge stayed action on his ruling pending a government appeal recognizing in his 68 page opinion the significant national security interests at stake in this case and the novelty of the constitutional issues 211 However federal judge William H Pauley III in New York City ruled 213 the U S government s global telephone data gathering system is needed to thwart potential terrorist attacks and that it can only work if everyone s calls are swept in U S District Judge Pauley also ruled that Congress legally set up the program and that it does not violate anyone s constitutional rights The judge also concluded that the telephone data being swept up by NSA did not belong to telephone users but to the telephone companies He further ruled that when NSA obtains such data from the telephone companies and then probes into it to find links between callers and potential terrorists this further use of the data was not even a search under the Fourth Amendment He also concluded that the controlling precedent is Smith v Maryland Smith s bedrock holding is that an individual has no legitimate expectation of privacy in information provided to third parties Judge Pauley wrote 214 215 216 217 The American Civil Liberties Union declared on January 2 2012 that it will appeal Judge Pauley s ruling that NSA bulk the phone record collection is legal The government has a legitimate interest in tracking the associations of suspected terrorists but tracking those associations does not require the government to subject every citizen to permanent surveillance deputy ACLU legal director Jameel Jaffer said in a statement 218 In recent years American and British intelligence agencies conducted surveillance on more than 1 100 targets including the office of an Israeli prime minister heads of international aid organizations foreign energy companies and a European Union official involved in antitrust battles with American technology businesses 219 A catalog of high tech gadgets and software developed by the NSA s Tailored Access Operations TAO was leaked by the German news magazine Der Spiegel 220 Dating from 2008 the catalog revealed the existence of special gadgets modified to capture computer screenshots and USB flash drives secretly fitted with radio transmitters to broadcast stolen data over the airwaves and fake base stations intended to intercept mobile phone signals as well as many other secret devices and software implants listed here Computer implants nbsp SPARROW II Mobile device that functions as a WLAN collection system nbsp FIREWALK Hardware implant for collection of Gigabit Ethernet network traffic nbsp GINSU Software that extends application persistence for the CNE Computer Network Exploitation implant KONGUR nbsp IRATEMONK Replaces master boot records MBRs of various hard disk manufacturers nbsp SWAP Exploits motherboard BIOS before the operating system loads nbsp WISTFULTOLL Software implant that exploits Windows Management Instrumentation WMI to transfer data nbsp HOWLERMONKEY Short to medium range radio frequency RF transceiver nbsp NIGHTSTAND Mobile device that introduces NSA software to computers up to 8 miles 13 kilometers away via Wireless LAN nbsp COTTONMOUTH I USB flash drive implant nbsp COTTONMOUTH II USB implant nbsp COTTONMOUTH III USB implant nbsp JUNIORMINT Digital core packaged into a printed circuit board PCB and a flip chip nbsp MAESTRO II Miniaturized digital core packaged into a multi chip module MCM nbsp TRINITY Miniaturized digital core packaged into a multi chip module MCM nbsp SOMBERKNAVE Software implant for Windows XP that provides covert Internet access for the NSA s targets nbsp SURLYSPAWN Device for keystroke logging nbsp RAGEMASTER Hardware implant concealed in a computer s Video Graphics Array VGA to capture screenshots and video Server implants and firewall implants nbsp IRONCHEF Software implant that functions as a permanent BIOS system nbsp DEITYBOUNCE Software implant for insertion into Dell PowerEdge servers nbsp JETPLOW Installs a backdoor targeting Cisco PIX and ASA firewalls nbsp HALLUXWATER Installs a backdoor targeting Huawei s Eudemon firewalls nbsp FEEDTROUGH Installs a backdoor targeting numerous Juniper Networks firewalls nbsp GOURMETTROUGH Installs a backdoor targeting numerous Juniper Networks firewalls nbsp SOUFFLETROUGH BIOS implant for Juniper SSG300 and SSG 500 series firewalls Covert listening devices nbsp LOUDAUTO Covert listening device nbsp NIGHTWATCH Device for reconstruction of signals belonging to target systems nbsp CTX4000 Portable continuous wave radar CRW unit to illuminate a target system for Dropmire collection nbsp PHOTOANGLO Successor to the CTX4000 jointly developed by the NSA and the GCHQ nbsp TAWDRYYARD Device that functions as a radio frequency RF retroreflector Mobile phone implants and related products nbsp PICASSO Modified GSM handset nbsp GENESIS Modified Motorola SLVR L9 handset nbsp CROSSBEAM GSM module for commercial mobile phones nbsp CANDYGRAM Mimics the GMS cell tower of targeted networks nbsp DROPOUTJEEP Software implant for the iOS operating system of the iPhone nbsp GOPHERSET Software implant for GSM subscriber identity module SIM cards that pulls out address books SMS Short Message Service text messages and call log information nbsp MONKEYCALENDAR Software implant for GSM subscriber identity module SIM cards that pulls out geolocation information nbsp TOTECHASER Windows CE implant that targets the Thuraya handset nbsp TOTEGHOSTLY 2 0 Software implant for Windows Mobile capable of retrieving SMS Short Message Service text messages Voicemail and contact lists as well as turning on built in microphones and cameras The Tailored Access Operations TAO division of the NSA intercepted the shipping deliveries of computers and laptops in order to install spyware and physical implants on electronic gadgets This was done in close cooperation with the FBI and the CIA 220 221 222 223 224 225 226 NSA officials responded to the Spiegel reports with a statement which said Tailored Access Operations is a unique national asset that is on the front lines of enabling NSA to defend the nation and its allies TAO s work is centred on computer network exploitation in support of foreign intelligence collection 227 In a separate disclosure unrelated to Snowden the French Tresor public which runs a certificate authority was found to have issued fake certificates impersonating Google in order to facilitate spying on French government employees via man in the middle attacks 228 nbsp On 4 December 2013 The Washington Post released an internal NSA chart illustrating the extent of the agency s mass collection of mobile phone location records which amounts to about five billion on a daily basis 177 The records are stored in a huge database known as FASCIA which received over 27 terabytes of location data within seven months 229 January 2014 editThe NSA is working to build a powerful quantum computer capable of breaking all types of encryption 230 231 232 233 234 The effort is part of a US 79 7 million research program known as Penetrating Hard Targets It involves extensive research carried out in large shielded rooms known as Faraday cages which are designed to prevent electromagnetic radiation from entering or leaving 231 Currently the NSA is close to producing basic building blocks that will allow the agency to gain complete quantum control on two semiconductor qubits 231 Once a quantum computer is successfully built it would enable the NSA to unlock the encryption that protects data held by banks credit card companies retailers brokerages governments and health care providers 230 According to the New York Times the NSA is monitoring approximately 100 000 computers worldwide with spy software named Quantum Quantum enables the NSA to conduct surveillance on those computers on the one hand and can also create a digital highway for launching cyberattacks on the other hand Among the targets are the Chinese and Russian military but also trade institutions within the European Union The NYT also reported that the NSA can access and alter computers which are not connected with the internet by a secret technology in use by the NSA since 2008 The prerequisite is the physically insertion of the radio frequency hardware by a spy a manufacturer or an unwitting user The technology relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers In some cases they are sent to a briefcase size relay station that intelligence agencies can set up miles away from the target The technology can also transmit malware back to the infected computer 174 Channel 4 and The Guardian revealed the existence of Dishfire a massive database of the NSA that collects hundreds of millions of text messages on a daily basis 235 The GCHQ has been given full access to the database which it uses to obtain personal information of Britons by exploiting a legal loophole 236 Each day the database receives and stores the following amounts of data Geolocation data of more than 76 000 text messages and other travel information 237 Over 110 000 names gathered from electronic business cards 237 Over 800 000 financial transactions that are either gathered from text to text payments or by linking credit cards to phone users 237 Details of 1 6 million border crossings based on the interception of network roaming alerts 237 Over 5 million missed call alerts 237 About 200 million text messages from around the world 238 The database is supplemented with an analytical tool known as the Prefer program which processes SMS messages to extract other types of information including contacts from missed call alerts 237 According to a joint disclosure by the New York Times the Guardian and ProPublica 239 240 241 242 243 the NSA and the GCHQ have begun working together to collect and store data from dozens of smartphone application software by 2007 at the latest A 2008 GCHQ report leaked by Snowden asserts that anyone using Google Maps on a smartphone is working in support of a GCHQ system The NSA and the GCHQ have traded recipes for various purposes such as grabbing location data and journey plans that are made when a target uses Google Maps and vacuuming up address books buddy lists phone logs and geographic data embedded in photos posted on the mobile versions of numerous social networks such as Facebook Flickr LinkedIn Twitter and other services In a separate 20 page report dated 2012 the GCHQ cited the popular smartphone game Angry Birds as an example of how an application could be used to extract user data Taken together such forms of data collection would allow the agencies to collect vital information about a user s life including his or her home country current location through geolocation age gender ZIP code marital status income ethnicity sexual orientation education level number of children etc 244 245 A GCHQ document dated August 2012 provided details of the Squeaky Dolphin surveillance program which enables the GCHQ to conduct broad real time monitoring of various social media features and social media traffic such as YouTube video views the Like button on Facebook and Blogspot Blogger visits without the knowledge or consent of the companies providing those social media features The agency s Squeaky Dolphin program can collect analyze and utilize YouTube Facebook and Blogger data in specific situations in real time for analysis purposes The program also collects the addresses from the billion of videos watched daily as well as some user information for analysis purposes 246 247 248 During the 2009 United Nations Climate Change Conference in Copenhagen the NSA and its Five Eyes partners monitored the communications of delegates of numerous countries This was done to give their own policymakers a negotiating advantage 249 250 The Communications Security Establishment Canada CSEC has been tracking Canadian air passengers via free Wi Fi services at a major Canadian airport Passengers who exited the airport terminal continued to be tracked as they showed up at other Wi Fi locations across Canada In a CSEC document dated May 2012 the agency described how it had gained access to two communications systems with over 300 000 users in order to pinpoint a specific imaginary target The operation was executed on behalf of the NSA as a trial run to test a new technology capable of tracking down any target that makes occasional forays into other cities regions This technology was subsequently shared with Canada s Five Eyes partners Australia New Zealand Britain and the United States 251 252 253 nbsp On 27 January 2014 The New York Times released 241 an internal NSA document from a 2010 meeting that details the extent of the agency s surveillance on smartphones Data collected include phone settings network connections Web browsing history buddy lists downloaded documents encryption usage and user agents Notice the following line of text at the bottom TOP SECRET COMINT REL TO USA FVEY which is used to indicated that this top secret document is related to communications intelligence COMINT and can be accessed by the USA and its Five Eyes FVEY partners in Australia Britain Canada and New ZealandFebruary 2014 editAccording to research by Suddeutsche Zeitung and TV network NDR the mobile phone of former German chancellor Gerhard Schroder was monitored from 2002 onwards reportedly because of his government s opposition to military intervention in Iraq The source of the latest information is a document leaked by NSA whistleblower Edward Snowden The document containing information about the National Sigint Requirement List NSRL had previously been interpreted as referring only to Angela Merkel s mobile However Suddeutsche Zeitung and NDR claim to have confirmation from NSA insiders that the surveillance authorisation pertains not to the individual but the political post which in 2002 was still held by Schroder According to research by the two media outlets Schroder was placed as number 388 on the list which contains the names of persons and institutions to be put under surveillance by the NSA 254 255 256 257 The GCHQ launched a cyber attack on the activist network Anonymous using denial of service attack DoS to shut down a chatroom frequented by the network s members and to spy on them The attack dubbed Rolling Thunder was conducted by a GCHQ unit known as the Joint Threat Research Intelligence Group JTRIG The unit successfully uncovered the true identities of several Anonymous members 258 259 260 261 The NSA Section 215 bulk telephony metadata program which seeks to stockpile records on all calls made in the U S is collecting less than 30 percent of all Americans call records because of an inability to keep pace with the explosion in cellphone use according to The Washington Post The controversial program permits the NSA after a warrant granted by the secret Foreign Intelligence Surveillance Court to record numbers length and location of every call from the participating carriers 262 263 March 2014 editThe NSA has built an infrastructure which enables it to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process The NSA relies on an automated system codenamed TURBINE which in essence enables the automated management and control of a large network of implants a form of remotely transmitted malware on selected individual computer devices or in bulk on tens of thousands of devices As quoted by The Intercept TURBINE is designed to allow the current implant network to scale to large size millions of implants by creating a system that does automated control implants by groups instead of individually 264 The NSA has shared many of its files on the use of implants with its counterparts in the so called Five Eyes surveillance alliance the United Kingdom Canada New Zealand and Australia Among other things due to TURBINE and its control over the implants the NSA is capable of breaking into targeted computers and to siphoning out data from foreign Internet and phone networks infecting a target s computer and exfiltrating files from a hard drive covertly recording audio from a computer s microphone and taking snapshots with its webcam launching cyberattacks by corrupting and disrupting file downloads or denying access to websites exfiltrating data from removable flash drives that connect to an infected computer The TURBINE implants are linked to and relies upon a large network of clandestine surveillance sensors that the NSA has installed at locations across the world including the agency s headquarters in Maryland and eavesdropping bases used by the agency in Misawa Japan and Menwith Hill England Codenamed as TURMOIL the sensors operate as a sort of high tech surveillance dragnet monitoring packets of data as they are sent across the Internet When TURBINE implants exfiltrate data from infected computer systems the TURMOIL sensors automatically identify the data and return it to the NSA for analysis And when targets are communicating the TURMOIL system can be used to send alerts or tips to TURBINE enabling the initiation of a malware attack To identify surveillance targets the NSA uses a series of data selectors as they flow across Internet cables These selectors can include email addresses IP addresses or the unique cookies containing a username or other identifying information that are sent to a user s computer by websites such as Google Facebook Hotmail Yahoo and Twitter unique Google advertising cookies that track browsing habits unique encryption key fingerprints that can be traced to a specific user and computer IDs that are sent across the Internet when a Windows computer crashes or updates 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 The CIA was accused by U S Senate Intelligence Committee Chairwoman Dianne Feinstein of spying on a stand alone computer network established for the committee in its investigation of allegations of CIA abuse in a George W Bush era detention and interrogation program 280 A voice interception program codenamed MYSTIC began in 2009 Along with RETRO short for retrospective retrieval RETRO is voice audio recording buffer that allows retrieval of captured content up to 30 days into the past the MYSTIC program is capable of recording 100 percent of a foreign country s telephone calls enabling the NSA to rewind and review conversations up to 30 days and the relating metadata With the capability to store up to 30 days of recorded conversations MYSTIC enables the NSA to pull an instant history of the person s movements associates and plans 281 282 283 284 285 286 On March 21 Le Monde published slides from an internal presentation of the Communications Security Establishment Canada which attributed a piece of malicious software to French intelligence The CSEC presentation concluded that the list of malware victims matched French intelligence priorities and found French cultural reference in the malware s code including the name Babar a popular French children s character and the developer name Titi 287 The French telecommunications corporation Orange S A shares its call data with the French intelligence agency DGSE which hands over the intercepted data to GCHQ 288 The NSA has spied on the Chinese technology company Huawei 289 290 291 Huawei is a leading manufacturer of smartphones tablets mobile phone infrastructure and WLAN routers and installs fiber optic cable According to Der Spiegel this kind of technology is decisive in the NSA s battle for data supremacy 292 The NSA in an operation named Shotgiant was able to access Huawei s email archive and the source code for Huawei s communications products 292 The US government has had longstanding concerns that Huawei may not be independent of the People s Liberation Army and that the Chinese government might use equipment manufactured by Huawei to conduct cyberespionage or cyberwarfare The goals of the NSA operation were to assess the relationship between Huawei and the PLA to learn more the Chinese government s plans and to use information from Huawei to spy on Huawei s customers including Iran Afghanistan Pakistan Kenya and Cuba Former Chinese President Hu Jintao the Chinese Trade Ministry banks as well as telecommunications companies were also targeted by the NSA 289 292 The Intercept published a document of an NSA employee discussing how to build a database of IP addresses webmail and Facebook accounts associated with system administrators so that the NSA can gain access to the networks and systems they administer 293 294 At the end of March 2014 Der Spiegel and The Intercept published based on a series of classified files from the archive provided to reporters by NSA whistleblower Edward Snowden articles related to espionage efforts by GCHQ and NSA in Germany 295 296 The British GCHQ targeted three German internet firms for information about Internet traffic passing through internet exchange points important customers of the German internet providers their technology suppliers as well as future technical trends in their business sector and company employees 295 296 The NSA was granted by the Foreign Intelligence Surveillance Court the authority for blanket surveillance of Germany its people and institutions regardless whether those affected are suspected of having committed an offense or not without an individualized court order specifying on March 7 2013 296 In addition Germany s chancellor Angela Merkel was listed in a surveillance search machine and database named Nymrod along with 121 others foreign leaders 295 296 As The Intercept wrote The NSA uses the Nymrod system to find information relating to targets that would otherwise be tough to track down according to internal NSA documents Nymrod sifts through secret reports based on intercepted communications as well as full transcripts of faxes phone calls and communications collected from computer systems More than 300 cites for Merkel are listed as available in intelligence reports and transcripts for NSA operatives to read 295 April 2014 editTowards the end of April Edward Snowden said that the United States surveillance agencies spy on Americans more than anyone else in the world contrary to anything that has been said by the government up until this point 297 May 2014 editAn article published by Ars Technica shows NSA s Tailored Access Operations TAO employees intercepting a Cisco router 298 The Intercept and WikiLeaks revealed information about which countries were having their communications collected as part of the MYSTIC surveillance program On May 19 The Intercept reported that the NSA is recording and archiving nearly every cell phone conversation in the Bahamas with a system called SOMALGET a subprogram of MYSTIC The mass surveillance has been occurring without the Bahamian government s permission 299 Aside from the Bahamas The Intercept reported NSA interception of cell phone metadata in Kenya the Philippines Mexico and a fifth country it did not name due to credible concerns that doing so could lead to increased violence WikiLeaks released a statement on May 23 claiming that Afghanistan was the unnamed nation 300 In a statement responding to the revelations the NSA said the implication that NSA s foreign intelligence collection is arbitrary and unconstrained is false 299 Through its global surveillance operations the NSA exploits the flood of images included in emails text messages social media videoconferences and other communications to harvest millions of images These images are then used by the NSA in sophisticated facial recognition programs to track suspected terrorists and other intelligence targets 301 June 2014 editVodafone revealed that there were secret wires that allowed government agencies direct access to their networks 302 This access does not require warrants and the direct access wire is often equipment in a locked room 302 In six countries where Vodafone operates the law requires telecommunication companies to install such access or allows governments to do so 302 Vodafone did not name these countries in case some governments retaliated by imprisoning their staff 302 Shami Chakrabarti of Liberty said For governments to access phone calls at the flick of a switch is unprecedented and terrifying Snowden revealed the internet was already treated as fair game Bluster that all is well is wearing pretty thin our analogue laws need a digital overhaul 302 Vodafone published its first Law Enforcement Disclosure Report on June 6 2014 302 Vodafone group privacy officer Stephen Deadman said These pipes exist the direct access model exists We are making a call to end direct access as a means of government agencies obtaining people s communication data Without an official warrant there is no external visibility If we receive a demand we can push back against the agency The fact that a government has to issue a piece of paper is an important constraint on how powers are used 302 Gus Hosein director of Privacy International said I never thought the telcos would be so complicit It s a brave step by Vodafone and hopefully the other telcos will become more brave with disclosure but what we need is for them to be braver about fighting back against the illegal requests and the laws themselves 302 Above top secret documentation of a covert surveillance program named Overseas Processing Centre 1 OPC 1 codenamed CIRCUIT by GCHQ was published by The Register Based on documents leaked by Edward Snowden GCHQ taps into undersea fiber optic cables via secret spy bases near the Strait of Hormuz and Yemen BT and Vodafone are implicated 303 The Danish newspaper Dagbladet Information and The Intercept revealed on June 19 2014 the NSA mass surveillance program codenamed RAMPART A Under RAMPART A third party countries tap into fiber optic cables carrying the majority of the world s electronic communications and are secretly allowing the NSA to install surveillance equipment on these fiber optic cables The foreign partners of the NSA turn massive amounts of data like the content of phone calls faxes e mails internet chats data from virtual private networks and calls made using Voice over IP software like Skype over to the NSA In return these partners receive access to the NSA s sophisticated surveillance equipment so that they too can spy on the mass of data that flows in and out of their territory Among the partners participating in the NSA mass surveillance program are Denmark and Germany 304 305 306 July 2014 editDuring the week of July 4 a 31 year old male employee of Germany s intelligence service BND was arrested on suspicion of spying for the United States The employee is suspected of spying on the German Parliamentary Committee investigating the NSA spying scandal 307 Former NSA official and whistleblower William Binney spoke at a Centre for Investigative Journalism conference in London According to Binney at least 80 of all audio calls not just metadata are recorded and stored in the US The NSA lies about what it stores He also stated that the majority of fiber optic cables run through the U S which is no accident and allows the US to view all communication coming in 308 The Washington Post released a review of a cache provided by Snowden containing roughly 160 000 text messages and e mails intercepted by the NSA between 2009 and 2012 The newspaper concluded that nine out of ten account holders whose conversations were recorded by the agency were not the intended surveillance targets but were caught in a net the agency had cast for somebody else In its analysis The Post also noted that many of the account holders were Americans 309 On July 9 a soldier working within Germany s Federal Ministry of Defence BMVg fell under suspicion of spying for the United States 310 As a result of the July 4 case and this one the German government expelled the CIA station chief in Germany on July 17 311 On July 18 former State Department official John Tye released an editorial in The Washington Post highlighting concerns over data collection under Executive Order 12333 Tye s concerns are rooted in classified material he had access to through the State Department though he has not publicly released any classified materials 312 August 2014 editThe Intercept reported that the NSA is secretly providing data to nearly two dozen U S government agencies with a Google like search engine called ICREACH The database The Intercept reported is accessible to domestic law enforcement agencies including the FBI and the Drug Enforcement Administration and was built to contain more than 850 billion metadata records about phone calls emails cellphone locations and text messages 313 314 February 2015 editBased on documents obtained from Snowden The Intercept reported that the NSA and GCHQ had broken into the internal computer network of Gemalto and stolen the encryption keys that are used in SIM cards no later than 2010 As of 2015 update the company is the world s largest manufacturer of SIM cards making about two billion cards a year With the keys the intelligence agencies could eavesdrop on cell phones without the knowledge of mobile phone operators or foreign governments 315 March 2015 editThe New Zealand Herald in partnership with The Intercept revealed that the New Zealand government used XKeyscore to spy on candidates for the position of World Trade Organization director general 316 and also members of the Solomon Islands government 317 April 2015 editIn January 2015 the DEA revealed that it had been collecting metadata records for all telephone calls made by Americans to 116 countries linked to drug trafficking The DEA s program was separate from the telephony metadata programs run by the NSA 318 In April USA Today reported that the DEA s data collection program began in 1992 and included all telephone calls between the United States and from Canada and Mexico Current and former DEA officials described the program as the precursor of the NSA s similar programs 319 The DEA said its program was suspended in September 2013 after a review of the NSA s programs and that it was ultimately terminated 318 January 2016 editThis section needs expansion You can help by adding to it January 2016 NSA documents show the US and UK spied on Israeli military drones and fighter jets 320 321 August 2016 editA group called The Shadow Brokers says it infiltrated NSA s Equation Group and teases files including some named in documents leaked by Edward Snowden 322 References edit a b How Edward Snowden led journalist and film maker to reveal NSA secrets The Guardian 19 August 2013 Retrieved August 20 2013 a b Mark Hosenball August 15 2013 Snowden downloaded NSA secrets while working for Dell sources say Reuters a b Peter Maass August 18 2013 How Laura Poitras Helped Snowden Spill His Secrets The New York Times Carmon Irin June 10 2013 How we broke the NSA story Salon Archived from the original on June 15 2013 Retrieved June 11 2013 Greenwald Glenn MacAskill Ewen Poitras Laura June 9 2013 Edward Snowden the whistleblower behind the NSA surveillance revelations The Guardian London Retrieved June 9 2013 Smith Matt Pearson Michael June 10 2013 NSA leaker holed up in Hong Kong hotel running low on cash CNN Retrieved June 10 2013 Everything We Learned From Edward Snowden in 2013 NationalJournal com a b Glenn Greenwald June 6 2013 NSA collecting phone records of millions of Verizon customers daily The Guardian Retrieved September 16 2013 Danny Yadron amp Evan Perez 14 June 2013 T Mobile Verizon Wireless Shielded from NSA Sweep The Wall Street Journal Retrieved 10 February 2014 Gellman Barton Poitras Laura June 6 2013 US Intelligence Mining Data from Nine U S Internet Companies in Broad Secret Program The Washington Post Retrieved June 15 2013 a href Template Cite news html title Template Cite news cite news a CS1 maint multiple names authors list link Greenwald Glenn MacAskill Ewen June 6 2013 NSA Taps in to Internet Giants Systems to Mine User Data Secret Files Reveal Top Secret Prism Program Claims Direct Access to Servers of Firms Including Google Apple and Facebook Companies Deny Any Knowledge of Program in Operation Since 2007 Obama Orders US to Draw Up Overseas Target List for Cyber Attacks The Guardian Retrieved June 15 2013 a href Template Cite news html title Template Cite news cite news a CS1 maint multiple names authors list link NSA slides explain the PRISM data collection program The Washington Post 10 July 2013 6 June 2013 Retrieved 11 February 2014 U S British intelligence mining data from nine U S Internet companies in broad secret program The Washington Post Archived from the original on August 24 2013 Retrieved August 20 2013 Laura Poitras Marcel Rosenbach Fidelius Schmid and Holger Stark June 29 2013 NSA Spied on European Union Offices Der Spiegel a href Template Cite magazine html title Template Cite magazine cite magazine a CS1 maint multiple names authors list link Laura Poitras Marcel Rosenbach and Holger Stark How America Spies on Europe and the UN Der Spiegel EXCLUSIVE US hacks Chinese mobile phone companies South China Morning Post NSA targeted China s Tsinghua University in hacking attacks South China Morning Post Lam Lana June 23 2013 US hacked Pacnet Asia Pacific fibre optic network operator in 2009 South China Morning Post Hong Kong Retrieved June 25 2013 Laura Poitras Marcel Rosenbach und Holger Stark 30 June 2013 Geheimdokumente NSA uberwacht 500 Millionen Verbindungen in Deutschland Der Spiegel in German Retrieved June 30 2013 MacAskill Ewen Borger Julian June 30 2013 New NSA leaks show how US is bugging its European allies The Guardian London MacAskill Ewen Davies Nick Hopkins Nick Borger Julian Ball James June 17 2013 GCHQ intercepted foreign politicians communications at G20 summits The Guardian London MacAskill Ewen Borger Julian Hopkins Nick Davies Nick Ball James June 21 2013 GCHQ taps fiber optic cables for secret access to world s communications The Guardian a b Ewen MacAskill Julian Borger Nick Hopkins Nick Davies James Ball 21 June 2013 GCHQ taps fibre optic cables for secret access to world s communications The Guardian Retrieved 21 June 2013 Philip Bump 21 June 2013 The UK Tempora Program Captures Vast Amounts of Data and Shares with NSA The Atlantic Wire Archived from the original on 5 November 2013 Retrieved 23 June 2013 Glenn Greenwald and Spencer Ackerman June 27 2013 NSA collected US email records in bulk for more than two years under Obama The Guardian Retrieved August 1 2013 Glenn Greenwald and Spencer Ackerman June 27 2013 How the NSA is still harvesting your online data The Guardian Retrieved August 1 2013 Glenn Greenwald and Ewen MacAskill 11 June 2013 Boundless Informant the NSA s secret tool to track global surveillance data The Guardian Retrieved 1 January 2014 Laura Poitras Marcel Rosenbach and Holger Stark Partner and Target NSA Snoops on 500 Million German Data Connections Der Spiegel Retrieved 1 January 2014 Hubert Gude Laura Poitras amp Marcel Rosenbach German Intelligence Sends Massive Amounts of Data to the NSA Der Spiegel Retrieved 1 January 2014 EUA espionaram milhoes de e mails e ligacoes de brasileiros O Globo July 6 2013 Retrieved July 8 2013 The NSA s mass and indiscriminate spying on Brazilians Glenn Greenwald The Guardian July 7 2013 Retrieved July 8 2013 EUA expandem o aparato de vigilancia continuamente O Globo July 6 2013 Retrieved July 8 2013 a b c d e f g Philip Dorling July 8 2013 Snowden reveals Australia s links to US spy web The Sydney Morning Herald Retrieved July 8 2013 Kaz Roberto 8 July 2013 NSA e CIA mantiveram em Brasilia equipe para coleta de dados filtrados de satelite O Globo in Portuguese Retrieved 1 February 2014 Interview with Whistleblower Edward Snowden on Global Spying Der Spiegel July 8 2013 Edward Snowden Accuses Germany of Aiding NSA in Spying Efforts Der Spiegel July 7 2013 Prolific Partner German Intelligence Used NSA Spy Program Der Spiegel Retrieved July 21 2013 a b Hubert Gude Laura Poitras amp Marcel Rosenbach August 5 2013 German intelligence Sends Massive Amounts of Data to the NSA Der Spiegel Retrieved 14 December 2013 Geiger Friedrich August 3 2013 German Intelligence Agency Providing NSA With Metadata Report The Wall Street Journal Retrieved August 3 2013 a b c Key Partners Secret Links Between Germany and the NSA Der Spiegel July 22 2013 Retrieved 13 January 2014 Rene Pfister Laura Poitras Marcel Rosenbach Jorg Schindler and Holger Stark German Intelligence Worked Closely with NSA on Data Surveillance Der Spiegel Retrieved 22 December 2013 a href Template Cite magazine html title Template Cite magazine cite magazine a CS1 maint multiple names authors list link a b Matthias Gebauer Prism in Afghanistan Conflicting Accounts By German Government Der Spiegel Greenwald Glenn July 31 2013 XKeyscore NSA tool collects nearly everything a user does on the internet The Guardian Retrieved August 1 2013 Nakashima Ellen July 31 2013 Newly declassified documents on phone records program released The Washington Post Retrieved August 4 2013 Charlie Savage amp David E Sanger July 31 2013 Senate Panel Presses N S A on Phone Logs The New York Times Retrieved August 4 2013 a b Glenn Greenwald Ewen MacAskill Laura Poitras Spencer Ackerman and Dominic Rushe July 11 2013 Revealed how Microsoft handed the NSA access to encrypted messages The Guardian Retrieved July 11 2013 a href Template Cite news html title Template Cite news cite news a CS1 maint multiple names authors list link Angwin Julia December 13 2012 U S Terrorism Agency to Tap a Vast Database of Citizens The Wall Street Journal Retrieved August 21 2013 Iain Thomson July 8 2013 Snowden US and Israel did create Stuxnet attack code The Register Retrieved July 8 2013 Revelations sur le Big Brother francais 2 Le Monde July 4 2013 Retrieved July 5 2013 France runs vast electronic spying operation using NSA style methods The Guardian July 4 2013 Retrieved July 5 2013 a b c d e f g James Ball Luke Harding amp Juliette Garside BT and Vodafone among telecoms companies passing details to GCHQ The Guardian Retrieved 22 December 2013 a b c d e f g John Goetz amp Frederik Obermaier 2 August 2013 Snowden enthullt Namen der spahenden Telekomfirmen Suddeutsche Zeitung in German Retrieved August 2 2013 In den internen Papieren des GCHQ aus dem Jahr 2009 stehen sie nun aufgelistet Verizon Business Codename Dacron British Telecommunications codenamed Remedy Vodafone Cable Gerontic Global Crossing Pinnage Level 3 codenamed Little Viatel Vitreous und Interoute Streetcar a b c d John Goetz Hans Leyendecker amp Frederik Obermaier August 28 2013 British Officials Have Far Reaching Access To Internet And Telephone Communications Suddeutsche Zeitung Retrieved August 28 2013 Dorling Philip 28 August 2013 Australian spies in global deal to tap undersea cables The Sydney Morning Herald Retrieved August 29 2013 a b U S spy agency bugged U N headquarters Germany s Spiegel Reuters August 25 2013 Retrieved 12 January 2014 a b US Geheimdienst horte Zentrale der Vereinten Nationen ab Der Spiegel in German 25 August 2013 Retrieved August 25 2013 Savage Charlie August 8 2013 N S A Said to Search Content of Messages to and From U S The New York Times Retrieved September 30 2013 Snowden Document NSA Spied On Al Jazeera Communications Der Spiegel August 31 2013 Retrieved 1 January 2014 Siobhan Gorman amp Jennifer Valentiono Devries August 20 2013 New Details Show Broader NSA Surveillance Reach Programs Cover 75 of Nation s Traffic Can Snare Emails The Wall Street Journal Retrieved August 21 2013 Graphic How the NSA Scours Internet Traffic in the U S The Wall Street Journal August 20 2013 Retrieved August 21 2013 Jennifer Valentiono Devries amp Siobhan Gorman August 20 2013 What You Need to Know on New Details of NSA Spying The Wall Street Journal Retrieved August 21 2013 Jennifer Valentino Devries amp Danny Yadron August 1 2013 FBI Taps Hacker Tactics to Spy on Suspects The Wall Street Journal Retrieved October 9 2013 Jennifer Valentino DeVries amp Danny Yadron August 1 2013 How the FBI Hacks Criminal Suspects The Wall Street Journal Retrieved October 9 2013 NSA report on privacy violations in the first quarter of 2012 The Washington Post August 16 2013 Retrieved August 16 2013 Barton Gellman amp Matt DeLong August 15 2013 What to say and not to say to our overseers The Washington Post Retrieved August 25 2013 Barton Gellman amp Matt DeLong August 15 2013 First direct evidence of illegal surveillance found by the FISA court The Washington Post Retrieved August 25 2013 Gellmann Barton August 16 2013 NSA broke privacy rules thousands of times per year audit finds The Washington Post Retrieved August 24 2013 Nakashima Ellen August 16 2013 Lawmakers privacy advocates call for reforms at NSA The Washington Post Retrieved August 25 2013 Gellmann Barton August 16 2013 NSA statements to The Post The Washington Post Retrieved August 25 2013 Barton Gellman amp Matt DeLong August 15 2013 What s a violation The Washington Post Retrieved August 25 2013 Leonnig Carol D August 16 2013 Court Ability to police U S spying program limited The Washington Post Retrieved August 25 2013 Nakashima Ellen August 21 2013 NSA gathered thousands of Americans e mails before court ordered it to revise its tactics The Washington Post Retrieved September 16 2013 FISA court ruling on illegal NSA e mail collection program The Washington Post August 21 2013 Retrieved September 16 2013 Barton Gellman amp Matt DeLong August 15 2013 First direct evidence of illegal surveillance found by the FISA court The Washington Post Retrieved September 16 2013 Charlie Savage amp Scott Shane August 21 2013 Secret Court Rebuked N S A on Surveillance The New York Times Retrieved September 16 2013 Mark Hosenball amp Tabassum Zakaria August 22 2013 NSA collected 56 000 emails by Americans a year documents NBC News Reuters Retrieved September 16 2013 a b Craig Timberg amp Barton Gellman August 30 2013 NSA paying U S companies for access to communications networks The Washington Post Retrieved August 31 2013 Wallsten Peter August 17 2013 House panel withheld document on NSA surveillance program from members The Washington Post Retrieved August 25 2013 Weich Ronald Report of the National Security Agency s Bulk Collection Programs for USA PATRIOT Act Reauthorization PDF Office of the Assistant Attorney General Director of National Intelligence Retrieved August 25 2013 James Ball Luke Harding amp Juliette Garside August 1 2013 Exclusive NSA pays 100m in secret funding for GCHQ Retrieved August 2 2013 James Ball and Spencer Ackerman August 9 2013 NSA loophole allows warrantless search for US citizens emails and phone calls Exclusive Spy agency has secret backdoor permission to search databases for individual Americans communications The Guardian Retrieved August 12 2013 Farivar Cyrus August 10 2013 New leak NSA can search US e mail data but theoretically won t Ars Technica Retrieved August 13 2013 Roberts Dan August 23 2013 US surveillance guidelines not updated for 30 years privacy board finds Privacy watchdog points out in letter to intelligence chiefs that rules designed to protect Americans are severely outdated The Guardian Retrieved August 24 2013 Medine David August 22 2013 2013 08 22 Privacy and Civil Liberties Oversight Board letter to US Attorney General Eric Holder and Director of National Intelligence James Clapper PDF Privacy amp Civil Liberties Oversight Board Retrieved August 24 2013 Strohm Chris August 24 2013 Lawmakers Probe Willful Abuses of Power by NSA Analysts Bloomberg Retrieved August 24 2013 Roberts Dan August 23 2013 NSA analysts deliberately broke rules to spy on Americans agency reveals Inspector general s admission undermines fresh insistences from president that breaches of privacy rules were inadvertent The Guardian Retrieved August 24 2013 Gorman Siobhan August 23 2013 NSA Officers Spy on Love Interests The Wall Street Journal Retrieved August 24 2013 MacAskill Ewen August 23 2013 NSA paid millions to cover Prism compliance costs for tech companies Top secret files show first evidence of financial relationship Prism companies include Google and Yahoo says NSA Costs were incurred after 2011 Fisa court ruling The Guardian Retrieved August 24 2013 David Leppard amp Chris Williams May 3 2009 Jacqui Smith s secret plan to carry on snooping The Sunday Times Retrieved May 3 2009 Henry Porter 21 June 2013 GCHQ revelations mastery of the internet will mean mastery of everyone The Guardian Retrieved October 19 2013 James Ball Julian Borger amp Glenn Greenwald September 5 2013 US and UK spy agencies defeat privacy and security on the internet The Guardian Retrieved September 5 2013 Nicole Perlroth Jeff Larson amp Scott Shane September 5 2013 N S A Foils Much Internet Encryption The New York Times Retrieved September 5 2013 Secret Documents Reveal N S A Campaign Against Encryption The New York Times September 5 2013 Retrieved September 7 2013 Unlocking Private Communications The New York Times September 5 2013 Retrieved September 7 2013 Perlroth Nicole Larson Jeff and Shane Scott September 5 2013 The NSA s Secret Campaign to Crack Undermine Internet Security ProPublica a href Template Cite news html title Template Cite news cite news a CS1 maint multiple names authors list link Nakashima Ellen September 6 2013 NSA has made strides in thwarting encryption used to protect Internet communication The Washington Post Retrieved September 7 2013 a b Jacques Follorou 2013 10 30 Surveillance la DGSE a transmis des donnees a la NSA americaine Le Monde in French Retrieved 30 December 2013 Espionnage la France aurait collabore avec la NSA Le Parisien 2013 10 29 Archived from the original on 2014 05 02 Retrieved 30 December 2013 Guillaume Champeau 28 October 2013 Lustre la France aurait coopere avec la NSA Numerama in French Retrieved 30 December 2013 Espionnage la France perd son Lustre ZDNet in French 28 October 2013 Retrieved 30 December 2013 Nakashima Ellen 8 September 2013 Obama administration had restrictions on NSA reversed in 2011 The Washington Post Retrieved 3 February 2014 Follow the Money NSA Spies on International Payments Der Spiegel September 15 2013 Retrieved September 24 2013 Brazil Angered Over Report N S A Spied on President The New York Times 3 September 2013 Retrieved September 16 2013 NSA Documents Show United States Spied Brazilian Oil Giant Jornal da Globo Fantastico September 8 2013 Retrieved September 24 2013 James Risen amp Laura Poitras September 28 2013 N S A Gathers Data on Social Connections of U S Citizens The New York Times Retrieved September 30 2013 Glenn Greenwald Laura Poitras amp Ewen MacAskill September 11 2013 NSA shares raw intelligence including Americans data with Israel The Guardian Retrieved September 14 2013 NSA and Israeli intelligence memorandum of understanding full document The Guardian September 11 2013 Retrieved September 14 2013 Barton Gellman Secret documents detail U S war in cyberspace The Washington Post via The Japan Times Retrieved September 2 2013 Barton Gellman amp Ellen Nakashima August 31 2013 U S spy agencies mounted 231 offensive cyber operations in 2011 documents show The Washington Post Retrieved August 31 2013 Konrad Lischka und Julia Stanek August 31 2013 Cyber Angriffe USA infizieren Zehntausende Computer mit NSA Trojanern Der SPIEGEL in German Retrieved August 31 2013 Zetter Kim September 4 2013 NSA Laughs at PCs Prefers Hacking Routers and Switches Wired com Retrieved October 2 2013 a b c d e Laura Poitras Marcel Rosenbach amp Holger Stark 9 September 2013 iSpy How the NSA Accesses Smartphone Data Der Spiegel Retrieved September 9 2013 Barton Gellman Craig Timberg amp Steven Rich 4 October 2013 Secret NSA documents show campaign against Tor encrypted network The Washington Post Retrieved 19 November 2013 Steven Rich amp Matt DeLong NSA slideshow on The TOR problem The Washington Postdate 4 October 2013 Retrieved 19 November 2013 Lee Timothy B 4 October 2013 Everything you need to know about the NSA and Tor in one FAQ The Washington Post Retrieved 19 November 2013 NSA report on the Tor encrypted network The Washington Post 4 October 2013 Retrieved 19 November 2013 GCHQ report on MULLENIZE program to stain anonymous electronic traffic The Washington Post 4 October 2013 Retrieved 19 November 2013 James Ball Bruce Schneier amp Glenn Greenwald 4 October 2013 NSA and GCHQ target Tor network that protects anonymity of web users The Guardian Retrieved 19 November 2013 Schneier Bruce 4 October 2013 Attacking Tor how the NSA targets users online anonymity The Guardian Retrieved 19 November 2013 Tor Stinks presentation read the full document The Guardian 4 October 2013 Retrieved 19 November 2013 Tor The king of high secure low latency anonymity The Guardian 4 October 2013 Retrieved 19 November 2013 Ministerio de Minas e Energia esta na mira de espioes americanos e canadenses O Globo October 6 2013 Retrieved October 8 2013 Report Canada spies targeted Brazil mine ministry Associated Press Associated Press October 6 2013 Archived from the original on October 10 2013 Retrieved October 8 2013 Ockenden Will October 8 2013 Australia prepared briefing on US global internet spying program PRISM before Snowden revelations ABC News Australia Retrieved October 8 2013 AG Department Prism FOI PDF ABC News Online June 27 2013 Retrieved October 8 2013 Jens Glusing Laura Poitras Marcel Rosenbach and Holger Stark October 20 2013 Fresh Leak on US Spying NSA Accessed Mexican President s Email Der Spiegel Retrieved October 22 2013 a href Template Cite news html title Template Cite news cite news a CS1 maint multiple names authors list link NSA Spionage Mexiko fordert Aufklarung uber US Bespitzelungen Der Spiegel in German October 21 2013 Retrieved October 22 2013 Mark Mazzetti amp David E Sanger October 30 2013 Tap on Merkel Provides Peek at Vast Spy Net The New York Times Retrieved November 1 2013 Mark Landler amp Michael S Schmidt October 30 2013 Spying Known at Top Levels Officials Say The New York Times Retrieved November 1 2013 a b Ball James October 24 2013 NSA monitored calls of 35 world leaders after US official handed over contacts The Guardian Retrieved October 24 2013 a b Siobhan Gorhan amp Adam Entous October 28 2013 Obama Unaware as U S Spied on World Leaders Officials The Wall Street Journal Retrieved October 28 2013 Ball James October 25 2013 Leaked memos reveal GCHQ efforts to keep mass surveillance secret The Guardian Retrieved October 25 2013 Nakashima Ellen October 2 2013 NSA had test project to collect data on Americans cellphone locations director says The Washington Post Retrieved October 18 2013 Barton Gellman amp Ashkan Soltani October 30 2013 NSA infiltrates links to Yahoo Google data centers worldwide Snowden documents say The Washington Post Retrieved October 31 2013 Barton Gellman Todd Lindeman amp Ashkan Soltani October 30 2013 How the NSA is infiltrating private networks The Washington Post Archived from the original on October 31 2013 Retrieved October 31 2013 Barton Gellman amp Matt DeLong October 30 2013 How the NSA s MUSCULAR program collects too much data from Yahoo and Google The Washington Post Archived from the original on October 30 2013 Retrieved October 31 2013 Peterson Andrea October 30 2013 PRISM already gave the NSA access to tech giants Here s why it wanted more The Washington Post Retrieved October 31 2013 Washington Post Staff October 30 2013 NSA statement on Washington Post report on infiltration of Google Yahoo data center links The Washington Post Retrieved October 31 2013 Jacob Appelbaum Holger Stark Marcel Rosenbach and Jorg Schindler October 23 2013 Berlin Complains Did US Tap Chancellor Merkel s Mobile Phone Der Spiegel Retrieved October 25 2013 a href Template Cite news html title Template Cite news cite news a CS1 maint multiple names authors list link Fischer Sebastian October 24 2013 Merkel s Phone Spying Suspicions Put Obama in a Tight Spot Der Spiegel Retrieved October 25 2013 Charly Wilder amp Rupert Neat October 24 2013 Out of Hand Europe Furious Over US Spying Allegations Der Spiegel Retrieved October 25 2013 Ian Traynor in Brussels Philip Oltermann in Berlin amp Paul Lewis in Washington October 24 2013 Angela Merkel s call to Obama are you bugging my mobile phone The Guardian Retrieved October 25 2013 Ball James October 25 2013 NSA monitored calls of 35 world leaders after US official handed over contacts The Guardian Retrieved October 25 2013 Traynor Ian October 25 2013 Germany and France warn NSA spying fallout jeopardises fight against terror The Guardian Retrieved October 25 2013 a b Jacob Appelbaum Nikolaus Blome Hubert Gude Ralf Neukirch Rene Pfister Laura Poitras Marcel Rosenbach Jorg Schindler Gregor Peter Schmitz and Holger Stark Translated from the German by Kristen Allen and Charly Wilder October 27 2013 Der Spiegel Cover Story How NSA Spied on Merkel Cell Phone from Berlin Embassy Embassy Espionage The NSA s Secret Spy Hub in Berlin Der Spiegel Retrieved November 1 2013 a href Template Cite news html title Template Cite news cite news a CS1 maint multiple names authors list link NSA Uberwachung Merkels Handy steht seit 2002 auf US Abhorliste Der Spiegel in German October 26 2012 Retrieved October 26 2013 Ofer Aderet October 26 2015 Obama Had I known NSA tapped Merkel s cell I would have stopped it German media reports Haaretz Retrieved October 26 2013 David E Sanger amp Mark Mazzetti October 24 2013 Allegation of U S Spying on Merkel Puts Obama at Crossroads The New York Times Retrieved October 26 2013 Ian Traynor amp Paul Lewis 17 December 2013 Merkel compared NSA to Stasi in heated encounter with Obama The Guardian Retrieved 18 December 2013 Germany hopes for details from Snowden on US spying BBC News November 1 2013 Retrieved November 1 2013 Photo Gallery Spies in the Embassy 10 27 2013 Der Spiegel October 27 2013 Retrieved November 1 2013 a b Dorling Philipp October 31 2013 Exposed Australia s Asia spy network The Sydney Morning Herald Retrieved November 1 2013 Konrad Lischka amp Matthias Kremp October 28 2013 NSA Spahskandal So funktionieren die Abhoranlagen in US Botschaften Der Spiegel in German Retrieved November 1 2013 Perlez Jane October 31 2013 Australia Said to Play Part in N S A Effort The New York Times Retrieved November 1 2013 Jacques Follorou amp Glenn Greenwald October 21 2013 France in the NSA s crosshair phone networks under surveillance Le Monde Retrieved October 22 2013 Gearan Anna October 22 2013 Report that NSA collected French phone records causing diplomatic headache for U S The Washington Post Retrieved October 22 2013 Adam Entous amp Siobhan Gorman October 29 2013 U S Says France Spain Aided NSA Spying The Wall Street Journal Retrieved October 29 2013 Ellen Nakashima amp Karen DeYoung October 29 2013 NSA chief says NATO allies shared phone records with the U S spy agency The Washington Post Retrieved October 30 2013 Espionnage de la NSA tous les documents publies par Le Monde Le Monde October 21 2013 Retrieved October 22 2013 Miguel Gonzalez NSA revelations Spain also a victim of US espionage El Pais Retrieved 13 December 2013 Miguel Gonzalez Espana eleva el tono de las quejas a EE UU por el espionaje masivo El Pais in Spanish Retrieved 13 December 2013 Paul Hamilos Spain colluded in NSA spying on its citizens Spanish newspaper reports The Guardian Retrieved 22 December 2013 Glenn Greenwald amp German Aranda El CNI facilito el espionaje masivo de EEUU a Espana El Mundo in Spanish Retrieved 22 December 2013 a b Shane Scott 2013 11 02 No Morsel Too Minuscule for All Consuming N S A The New York Times Archived from the original on 2016 07 20 Retrieved 2013 11 25 This communications fingerprinting as a document called it is the key to what the N S A does It allows the agency s computers to scan the stream of international communications and pluck out messages tied to the supreme leader Campbell Duncan November 5 2013 Revealed Britain s secret listening post in the heart of Berlin The Independent Archived from the original on 2022 05 07 Retrieved November 5 2013 a b Tony Paterson GCHQ used Quantum Insert technique to set up fake LinkedIn pages and spy on mobile phone giants The Independent Archived from the original on 2022 05 07 Retrieved November 10 2013 a b Laura Poitras Marcel Rosenbach amp Holger Stark November 17 2013 Royal Concierge GCHQ Monitors Hotel Reservations to Track Diplomats Der Spiegel Retrieved November 17 2013 Indonesia recalls Canberra ambassador over Yudhoyono phone tapping attempt Foreign minister demands explanation after documents reveal Australian agencies targeted phones of president and his wife The Guardian 18 November 2013 a b c d e f g h i Michael Brissenden 18 November 2013 Australia spied on Indonesian president Susilo Bambang Yudhoyono leaked Edward Snowden documents reveal Australian Broadcasting Corporation Retrieved 13 December 2013 Ball James 20 November 2013 US and UK struck secret deal to allow NSA to unmask Britons personal data The Guardian Retrieved 21 November 2013 a b JAMES RISEN amp LAURA POITRAS November 22 2013 N S A Report Outlined Goals for More Power The New York Times Retrieved 23 November 2013 A Strategy for Surveillance Powers The New York Times Retrieved 23 November 2013 Floor Boon Steven Derix amp Huib Modderkolk 23 November 2013 Document Snowden Nederland al sinds 1946 doelwit van NSA NRC Handelsblad in Dutch Retrieved 23 November 2013 a b c David E Sanger amp Thom Shanker 14 January 2014 N S A Devises Radio Pathway Into Computers The New York Times Retrieved 15 January 2014 a b Floor Boon Steven Derix amp Huib Modderkolk 23 November 2013 NSA infected 50 000 computer networks with malicious software NRC Handelsblad Retrieved 23 November 2013 Ewen MacAskill James Ball amp Katharine Murphy 2 December 2013 Revealed Australian spy agency offered to share data about ordinary citizens The Guardian Retrieved 3 December 2013 a b Barton Gellman amp Ashkan Soltani 4 December 2013 NSA tracking cellphone locations worldwide Snowden documents show The Washington Post Retrieved 5 December 2013 How the NSA is tracking people right now The Washington Post 4 December 2013 Retrieved 6 December 2013 Ashkan Soltani amp Matt DeLong 4 December 2013 FASCIA The NSA s huge trove of location records The Washington Post Retrieved 6 December 2013 How the NSA uses cellphone tracking to find and develop targets The Washington Post 4 December 2013 Retrieved 6 December 2013 Reporter explains NSA collection of cellphone data The Washington Post 4 December 2013 Retrieved 6 December 2013 Peterson Andrea 4 December 2013 The NSA says it obviously can track locations without a warrant That s not so obvious The Washington Post s The Switch Retrieved 6 December 2013 Lee Timothy 4 December 2013 The NSA could figure out how many Americans it s spying on It just doesn t want to The Washington Post s The Switch Retrieved 6 December 2013 Ashkan Soltani amp Barton Gellmann 10 December 2013 New documents show how the NSA infers relationships based on mobile location data The Washington Post Retrieved 26 December 2013 Ashkan Soltani Andrea Peterson amp Barton Gellman 10 December 2013 NSA uses Google cookies to pinpoint targets for hacking The Washington Post Retrieved 28 January 2014 Ashkan Soltani amp Matt DeLong 10 December 2013 NSA signal surveillance success stories The Washington Post Retrieved 28 January 2014 Reporter For NSA Google cookies allow laser guided targeting The Washington Post 11 December 2013 Retrieved 28 January 2014 Arne Halvorsen Anne Marte Blindheim Harald S Klungtveit Kjetil Magne Sorenes Tore Bergsaker and Gunnar Hultgreen Norway s secret surveillance of Russian politics for the NSA Dagbladet Retrieved 18 December 2013 a href Template Cite news html title Template Cite news cite news a CS1 maint multiple names authors list link a b c d e f Snowden dokumentene Norge er NSAs drommepartner Dagbladet in Norwegian Retrieved 18 December 2013 Glenn Greenwald Ryan Gallagher Filip Struwe and Anna H Svensson SVT avslojar FRA spionerar pa Ryssland at USA in Swedish Sveriges Television Archived from the original on 6 December 2013 Retrieved 5 December 2013 a href Template Cite web html title Template Cite web cite web a CS1 maint multiple names authors list link Filip Struwe Glenn Greenwald Ryan Gallagher Sven Bergman Joachim Dyfvermark and Fredrik Laurin Snowden files reveal Swedish American surveillance of Russia in Swedish Sveriges Television Retrieved 5 December 2013 a href Template Cite web html title Template Cite web cite web a CS1 maint multiple names authors list link Sven Bergman Joachim Dyfvermark Ryan Gallagher Glenn Greenwald and Fredrik Laurin FRA spying on energy and Baltics for USA Sveriges Television Retrieved 7 December 2013 a href Template Cite web html title Template Cite web cite web a CS1 maint multiple names authors list link Cold War treaty confirms Sweden was not neutral The Local 9 December 2013 Retrieved 12 December 2013 NSA asking for specific exchanges from FRA Secret treaty since 1954 Sveriges Television Retrieved 12 December 2013 a b c d Read the Snowden Documents From the NSA Sveriges Television Retrieved 12 December 2013 Ashkan Soltani Andrea Peterson amp Barton Gellman NSA uses Google cookies to pinpoint targets for hacking The Washington Post Retrieved 12 December 2013 Greg Weston Glenn Greenwald Ryan Gallagher New Snowden docs show U S spied during G20 in Toronto Canadian Broadcasting Corporation Retrieved 13 December 2013 a b c Glenn Greenwald amp Stefania Maurizi Revealed How the NSA Targets Italy L espresso Retrieved 13 December 2013 MARK MAZZETTI amp JUSTIN ELLIOTT 9 December 2013 Spies Infiltrate a Fantasy Realm of Online Games The New York Times Retrieved 12 December 2013 Ball James 9 December 2013 Xbox Live among game services targeted by US and UK spy agencies The Guardian Retrieved 18 December 2013 NSA files games and virtual environments paper The Guardian 9 December 2013 Retrieved 18 December 2013 Justin Elliott ProPublica and Mark Mazzetti The New York Times 9 December 2013 NSA files games and virtual environments paper Pro Publica Retrieved 18 December 2013 a href Template Cite news html title Template Cite news cite news a CS1 maint multiple names authors list link Craig Timberg amp Ashkan Soltani By cracking cellphone code NSA has capacity for decoding private conversations The Washington Post Retrieved 14 December 2013 How the NSA pinpoints a mobile device The Washington Post Retrieved 14 December 2013 Leon Richard 16 December 2013 Federal judge rules NSA program is likely unconstitutional a k a Klayman et al v Obama et al Memorandum and Opinion from December 16 2013 in Civil Action 13 0851 in United Case District Court for the District of Columbia The Washington Post Archived from the original on 30 August 2017 Retrieved 17 December 2013 Savage Charlie 16 December 2013 Judge Questions Legality of N S A Phone Records The New York Times Retrieved 18 December 2013 Bill Mears and Evan Perez CNN 17 December 2013 Judge NSA domestic phone data mining unconstitutional CNN Retrieved 18 December 2013 a href Template Cite web html title Template Cite web cite web a author has generic name help Kravets David 16 December 2013 Court Says NSA Bulk Telephone Spying Is Unconstitutional Wired Retrieved 18 December 2013 Kevin Johnson amp Richard Wolf 16 December 2013 Federal judge rules against NSA spying USA Today Retrieved 18 December 2013 Gerstein Josh 16 December 2013 Judge NSA phone program likely unconstitutional Politico Retrieved 18 December 2013 a b Ellen Nakashima amp Ann E Marimow 16 December 2013 Judge NSA s collecting of phone records is probably unconstitutional The Washington Post Retrieved 17 December 2013 Spencer Ackerman amp Dan Roberts 16 December 2013 NSA phone surveillance program likely unconstitutional federal judge rules The Guardian Retrieved 18 December 2013 Pauley III William H 27 December 2013 United States District Court Southern District of New York American Civil Liberties Union v James R Clapper 13 Civ 3994 WHP PDF American Civil Liberties Union Retrieved 28 December 2013 Adam Liptak amp Michael S Schmidt 27 December 2013 Judge Upholds N S A s Bulk Collection of Data on Calls The New York Times Retrieved 28 December 2013 Denniston Lyle 27 December 2013 Judge upholds NSA s phone data sweeps UPDATED Scotusblog Retrieved 28 December 2013 Peterson Andrea 27 December 2013 The most Kafkaesque paragraph from today s NSA ruling The Washington Post Retrieved 28 December 2013 Horwitz Sari 27 December 2013 NSA collection of phone data is lawful federal judge rules The Washington Post Retrieved 28 December 2013 Ackermann Spencer 2 January 2014 ACLU will appeal ruling that NSA bulk phone record collection is legal The Guardian Retrieved 4 January 2014 James Glanz amp Andrew W Lehren 20 December 2013 N S A Spied on Allies Aid Groups and Businesses The New York Times Retrieved 28 December 2013 a b Jacob Appelbaum Judith Horchert and Christian Stocker Catalog Reveals NSA Has Back Doors for Numerous Devices Shopping for Spy Gear Catalog Advertises NSA Toolbox Der Spiegel Retrieved 30 December 2013 Jacob Appelbaum Laura Poitras Marcel Rosenbach Christian Stocker Jorg Schindler and Holger Start Inside TAO Documents Reveal Top NSA Hacking Unit The NSA Uses Powerful Toolbox in Effort to Spy on Global Networks Der Spiegel Retrieved 30 December 2013 a href Template Cite magazine html title Template Cite magazine cite magazine a CS1 maint multiple names authors list link Interactive Graphic The NSA s Spy Catalog Der Spiegel 30 December 2013 Retrieved 4 January 2014 Erik Kain 2013 12 29 Report NSA Intercepting Laptops Ordered Online Installing Spyware Forbes Retrieved 30 December 2013 RAPHAEL SATTER 29 December 2013 Report NSA intercepts computer deliveries Associated Press Archived from the original on December 30 2013 Retrieved 30 December 2013 Courtney Subramanian December 29 2013 The TAO of the NSA Specialized Hacking Team Gets the Ungettable Time Retrieved 30 December 2013 Glenn Greenwald The NSA Can Literally Watch Every Keystroke You Make Democracy Now 30 December 2013 Retrieved 4 January 2014 Walters Joanna 29 December 2013 NSA hacking unit infiltrates computers around the world report The Guardian Retrieved 4 January 2014 French gov used fake Google certificate to read its workers traffic The Register The Washington Post 2013 12 04 GHOSTMACHINE The NSA s cloud analytics platform 4 slides The Washington Post Archived from the original on 2017 11 20 Retrieved 2014 03 23 a b Michael Winter January 2 2014 NSA working to build computer to crack encryption USA Today Retrieved 3 January 2014 a b c Steven Rich amp Barton Gellman 3 January 2014 NSA seeks to build quantum computer that could crack most types of encryption The Washington Post Retrieved 3 January 2014 A description of the Penetrating Hard Targets project The Washington Post 2 January 2014 Retrieved 4 January 2014 Classifying NSA quantum computing efforts The Washington Post 2 January 2014 Retrieved 4 January 2014 Lee Timothy B 2 January 2014 Confused about the NSA s quantum computing project This MIT computer scientist can explain The Washington Post Retrieved 4 January 2014 Report NSA collected 200m texts per day BBC News 16 January 2014 Retrieved 16 January 2014 Geoff White 16 January 2014 Revealed UK and US spied on text messages of Brits Channel 4 Retrieved 16 January 2014 a b c d e f James Ball in 16 January 2014 NSA collects millions of text messages daily in untargeted global sweep The Guardian Retrieved 16 January 2014 Report NSA collected 200m texts per day BBC News 16 January 2014 Retrieved 16 January 2014 James Glanz Jeff Larson amp Andrew W Lehren 27 January 2014 Spy Agencies Tap Data Streaming From Phone Apps A version of the NYT appeared in print on January 28 2014 on page A1 of the New York edition with the headline Spy Agencies Tap Data Streaming From Phone Apps The New York Times Retrieved 28 January 2014 From Britain s Government Communications Headquarters The New York Times 27 January 2014 Retrieved 28 January 2014 a b From the National Security Agency The New York Times 27 January 2014 Retrieved 28 January 2014 Ball James 28 January 2014 Angry Birds and leaky phone apps targeted by NSA and GCHQ for user data The Guardian Retrieved 28 January 2014 Jeff Larson ProPublica and James Glanz and Andrew W Lehren The New York Times 27 January 2014 Spy Agencies Probe Angry Birds and Other Apps for Personal Data ProPublica Retrieved 28 January 2014 a href Template Cite news html title Template Cite news cite news a CS1 maint multiple names authors list link Ball James 27 January 2014 NSA and GCHQ target leaky phone apps like Angry Birds to scoop user data The Guardian Retrieved 27 January 2014 JAMES GLANZ JEFF LARSON amp ANDREW W LEHREN 27 January 2014 Spy Agencies Scour Phone Apps for Personal Data The New York Times Retrieved 27 January 2014 Dignan Larry 28 January 2014 Snowden s Squeaky Dolphin leak Brits spy on YouTube Facebook behavior ZDNet Archived from the original on January 29 2014 Retrieved 28 January 2014 Richard Esposito Matthew Cole Mark Schone Glenn Greenwald 27 January 2014 Snowden docs reveal British spies snooped on YouTube and Facebook NBC News Retrieved 27 January 2014 Psychology A New Kind of SIGDEV Signals Development Establishing the Human Science Operation Cell PDF GCHQ NBC News Investigations 27 January 2014 Archived from the original PDF on 29 January 2014 Retrieved 28 January 2014 Vidal John Snowden revelations of NSA spying on Copenhagen climate talks spark anger The Guardian Retrieved 31 January 2014 Sheppard Kate Snowden Docs U S Spied On Negotiators At 2009 Climate Summit The Huffington Post Retrieved 31 January 2014 Greg Weston Glenn Greenwald Ryan Gallagher 30 January 2014 CSEC used airport Wi Fi to track Canadian travellers Edward Snowden documents Canadian Broadcasting Corporation Retrieved 31 January 2014 Snowden leaks Canada spied on airport travellers BBC 31 January 2014 Retrieved 31 January 2014 Memmott Mark 31 January 2014 Canada Used Airport Wi Fi To Track Travelers Snowden Leak Alleges, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.