HOME

TheInfoList



OR:

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the
Cold War The Cold War is a term commonly used to refer to a period of geopolitical tension between the United States and the Soviet Union and their respective allies, the Western Bloc and the Eastern Bloc. The term '' cold war'' is used because t ...
period, via programs such as the
Black Chamber The Black Chamber (1919–1929), also known as the Cipher Bureau, was the United States' first peacetime cryptanalytic organization, and a forerunner of the National Security Agency. The only prior codes and cypher organizations maintained by th ...
and
Project SHAMROCK Project SHAMROCK was the sister project to Project MINARET, an espionage exercise started in August 1945. Project MINARET involved the accumulation of all telegraphic data that entered or exited the United States. The Armed Forces Security Agency ...
. The formation and growth of federal
law-enforcement Law enforcement is the activity of some members of government who act in an organized manner to enforce the law by discovering, deterring, rehabilitating, or punishing people who violate the rules and norms governing that society. The term en ...
and
intelligence agencies An intelligence agency is a government agency responsible for the collection, analysis, and exploitation of information in support of law enforcement, national security, military, public safety, and foreign policy objectives. Means of informatio ...
such as the FBI,
CIA The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
, and
NSA The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collec ...
institutionalized surveillance used to also silence political dissent, as evidenced by
COINTELPRO COINTELPRO ( syllabic abbreviation derived from Counter Intelligence Program; 1956–1971) was a series of covert and illegal projects actively conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrati ...
projects which targeted various organizations and individuals. During the
Civil Rights Movement The civil rights movement was a nonviolent social and political movement and campaign from 1954 to 1968 in the United States to abolish legalized institutional racial segregation, discrimination, and disenfranchisement throughout the Unite ...
era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the
communist Communism (from Latin la, communis, lit=common, universal, label=none) is a far-left sociopolitical, philosophical, and economic ideology and current within the socialist movement whose goal is the establishment of a communist society, ...
model of the United States' rival at the time, the
Soviet Union The Soviet Union,. officially the Union of Soviet Socialist Republics. (USSR),. was a transcontinental country that spanned much of Eurasia from 1922 to 1991. A flagship communist state, it was nominally a federal union of fifteen nationa ...
. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters. The formation of the international UKUSA surveillance agreement of 1946 evolved into the
ECHELON ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:Given the 5 dialects that use ...
collaboration by 1955 of five English-speaking nations, also known as the
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
, and focused on interception of electronic communications, with substantial increases in domestic surveillance capabilities. Following the
September 11th attacks The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commercia ...
of 2001, domestic and international mass surveillance capabilities grew immensely. Contemporary mass surveillance relies upon annual presidential executive orders declaring a continued State of National Emergency, first signed by George W. Bush on September 14, 2001 and then continued on an annual basis by President Barack Obama. Mass surveillance is also based on several subsequent national security Acts including the
USA PATRIOT Act The USA PATRIOT Act (commonly known as the Patriot Act) was a landmark Act of the United States Congress, signed into law by President George W. Bush. The formal name of the statute is the Uniting and Strengthening America by Providing Appro ...
and FISA Amendment Act's PRISM surveillance program. Critics and political dissenters currently describe the effects of these acts, orders, and resulting database network of
fusion center In the United States, fusion centers are designed to promote information sharing at the federal level between agencies such as the Federal Bureau of Investigation, the U.S. Department of Homeland Security, the U.S. Department of Justice, and st ...
s as forming a veritable American police state that simply institutionalized the illegal
COINTELPRO COINTELPRO ( syllabic abbreviation derived from Counter Intelligence Program; 1956–1971) was a series of covert and illegal projects actively conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrati ...
tactics used to assassinate dissenters and leaders from the 1950s onwards. Additional surveillance agencies, such as the DHS and the position of Director of National Intelligence, have exponentially escalated mass surveillance since 2001. A series of media reports in 2013 revealed more recent programs and techniques employed by the US intelligence community. Advances in computer and information technology allow the creation of huge national databases that facilitate mass surveillance in the United States by
DHS The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-ter ...
managed fusion centers, the CIA's Terrorist Threat Integration Center (TTIC) program, and the FBI's
Terrorist Screening Database The Terrorist Screening Database (TSDB) is the central terrorist watchlist consolidated by the Federal Bureau of Investigation's Terrorist Screening Center and used by multiple agencies to compile their specific watchlists and for screening. The ...
(TSDB). Mass surveillance databases are also cited as responsible for profiling Latino Americans and contributing to "
self-deportation Self-deportation is an approach to dealing with illegal immigration, used in the United States and the United Kingdom, that allows an otherwise inadmissible person to voluntarily depart a country for which they have no legal ties to rather than f ...
" techniques, or physical deportations by way of the DHS's ICEGang national database. After
World War I World War I (28 July 1914 11 November 1918), often abbreviated as WWI, was List of wars and anthropogenic disasters by death toll, one of the deadliest global conflicts in history. Belligerents included much of Europe, the Russian Empire, ...
, the US Army and State Department established the
Black Chamber The Black Chamber (1919–1929), also known as the Cipher Bureau, was the United States' first peacetime cryptanalytic organization, and a forerunner of the National Security Agency. The only prior codes and cypher organizations maintained by th ...
, also known as the Cipher Bureau, which began operations in 1919. The Black Chamber was headed by
Herbert O. Yardley Herbert Osborn Yardley (April 13, 1889 – August 7, 1958) was an American cryptologist. He founded and led the cryptographic organization the Black Chamber. Under Yardley, the cryptanalysts of The American Black Chamber broke Japanese diplomatic ...
, who had been a leader in the Army's Military Intelligence program. Regarded as a precursor to the National Security Agency, it conducted peacetime decryption of material including diplomatic communications until 1929. In the advent of
World War II World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the World War II by country, vast majority of the world's countries—including all of the great power ...
, the Office of Censorship was established. The wartime agency monitored "communications by mail, cable, radio, or other means of transmission passing between the United States and any foreign country"."Return to Sender: U.S. Censorship of Enemy Alien Mail in World War II"
Louis Fiset, ''Prologue Magazine'', Vol. 33, No. 1 (Spring 2001). Retrieved 5 October 2013.
This included the 350,000 overseas cables and telegrams and 25,000 international telephone calls made each week. "Every letter that crossed international or U.S. territorial borders from December 1941 to August 1945 was subject to being opened and scoured for details." With the end of
World War II World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the World War II by country, vast majority of the world's countries—including all of the great power ...
,
Project SHAMROCK Project SHAMROCK was the sister project to Project MINARET, an espionage exercise started in August 1945. Project MINARET involved the accumulation of all telegraphic data that entered or exited the United States. The Armed Forces Security Agency ...
was established in 1945. The organization was created to accumulate telegraphic data entering and exiting from the United States. Major communication companies such as
Western Union The Western Union Company is an American multinational financial services company, headquartered in Denver, Colorado. Founded in 1851 as the New York and Mississippi Valley Printing Telegraph Company in Rochester, New York, the company cha ...
, RCA Global and ITT World Communications actively aided the project, allowing American intelligence officials to gain access to international message traffic. Under the project, and many subsequent programs, no precedent had been established for judicial authorization, and no warrants were issued for surveillance activities. The project was terminated in 1975. President Harry S. Truman established the
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
(
NSA The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collec ...
) in 1952 for the purposes of collecting, processing, and monitoring intelligence data. The existence of NSA was not known to people as the memorandum by President Truman was classified. When the Citizens' Commission to Investigate the FBI published stolen FBI documents revealing abuse of intelligence programs in 1971, Senator
Frank Church Frank Forrester Church III (July 25, 1924 – April 7, 1984) was an American politician and lawyer. A member of the Democratic Party, he served as a United States senator from Idaho from 1957 until his defeat in 1981. As of 2022, he is the longes ...
began an investigation into the programs that become known as the
Church Committee The Church Committee (formally the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities) was a US Senate select committee in 1975 that investigated abuses by the Central Intelligence ...
. The committee sought to investigate intelligence abuses throughout the 1970s. Following a report provided by the committee outlining egregious abuse, in 1976 Congress established the
Senate Select Committee on Intelligence The United States Senate Select Committee on Intelligence (sometimes referred to as the Intelligence Committee or SSCI) is dedicated to overseeing the United States Intelligence Community—the agencies and bureaus of the federal government of ...
. It would later be joined by the
Foreign Intelligence Surveillance Court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants aga ...
in 1978. The institutions worked to limit the power of the agencies, ensuring that surveillance activities remained within the rule of law. Following the attacks of
September 11, 2001 The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commerc ...
,
Congress A congress is a formal meeting of the representatives of different countries, constituent states, organizations, trade unions, political parties, or other groups. The term originated in Late Middle English to denote an encounter (meeting of ...
passed The
Patriot Act The USA PATRIOT Act (commonly known as the Patriot Act) was a landmark Act of the United States Congress, signed into law by President George W. Bush. The formal name of the statute is the Uniting and Strengthening America by Providing Appro ...
to strengthen security and intelligence efforts. The act granted the President broad powers on the war against terror, including the power to bypass the FISA Court for surveillance orders in cases of national security. Additionally, mass surveillance activities were conducted alongside various other surveillance programs under the head of
President's Surveillance Program The President's Surveillance Program (PSP) is a collection of secret intelligence activities authorized by the President of the United States George W. Bush after the September 11 attacks in 2001 as part of the War on Terrorism. Information ...
. Under pressure from the public, the warrantless wiretapping program was allegedly ended in January 2007. Many details about the surveillance activities conducted in the United States were revealed in the disclosure by
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
in June 2013. Regarded as one of the biggest media leaks in the United States, it presented extensive details about the surveillance programs of the NSA, that involved interception of Internet data and telephonic calls from over a billion users, across various countries.


National Security Agency (NSA)

1947: The National Security Act was signed by President Truman, establishing a National Security Council. 1949: The Armed Forces Security Agency was established to coordinate signal operations between military branches. 1952: The
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
(NSA) was officially established by President Truman by way of a National Security Council Intelligence Directive 9, dated Oct. 24, while the NSA officially came into existence days later on Nov. 4. According to ''
The New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
'', the NSA was created in "absolute secrecy" by President Truman, whose surveillance-minded administration ordered, only six weeks after President Truman took office, wiretaps on the telephones of
Thomas Gardiner Corcoran Thomas Gardiner Corcoran (December 29, 1900 – December 6, 1981) was one of several advisors in President Franklin D. Roosevelt's brain trust during the New Deal, and later, a close friend and advisor to President Lyndon B. Johnson. Early l ...
, a close advisor of Franklin D. Roosevelt. The recorded conversations are currently kept at the Harry S. Truman Presidential Library and Museum, along with other documents considered sensitive
≈233,600 pages
.


Federal Bureau of Investigation (FBI)

Institutional domestic surveillance was founded in 1896 with the National Bureau of Criminal Identification, which evolved by 1908 into the Bureau of Investigation, operated under the authority of the Department of Justice. In 1935, the FBI had grown into an independent agency under the direction of J. Edgar Hoover whose staff, through the use of wire taps, cable taps, mail tampering, garbage filtering and infiltrators, prepared secret
FBI Index The FBI Indexes, or Index List, was a system used to track American citizens and other people by the Federal Bureau of Investigation (FBI) before the adoption of computerized databases. The Index List was originally made of paper index cards, fir ...
Lists on more than 10 million people by 1939. Purported to be chasing 'communists' and other alleged subversives, the FBI used public and private pressure to destroy the lives of those it targeted during
McCarthyism McCarthyism is the practice of making false or unfounded accusations of subversion and treason, especially when related to anarchism, communism and socialism, and especially when done in a public and attention-grabbing manner. The term origin ...
, including those lives of the Hollywood 10 with the
Hollywood blacklist The Hollywood blacklist was an entertainment industry blacklist, broader than just Hollywood, put in effect in the mid-20th century in the United States during the early years of the Cold War. The blacklist involved the practice of denying empl ...
. The FBI's surveillance and investigation roles expanded in the 1950s while using the collected information to facilitate political assassinations, including the murders of
Fred Hampton Fredrick Allen Hampton Sr. (August 30, 1948 – December 4, 1969) was an American activist. He came to prominence in Chicago as deputy chairman of the national Black Panther Party and chair of the Illinois chapter. As a progressive African Ame ...
and Mark Clark in 1969. FBI is also directly connected to the bombings, assassinations, and deaths of other people including Malcolm X in 1963, Viola Liuzzo in 1965, Dr. Martin Luther King Jr. in 1968, Anna Mae Pictou Aquash in 1976, and Judi Bari in 1990. As the extent of the FBI's domestic surveillance continued to grow, many celebrities were also secretly investigated by the bureau, including: * First Lady
Eleanor Roosevelt Anna Eleanor Roosevelt () (October 11, 1884November 7, 1962) was an American political figure, diplomat, and activist. She was the first lady of the United States from 1933 to 1945, during her husband President Franklin D. Roosevelt's four ...
– A vocal critic of Hoover who likened the FBI to an 'American Gestapo' for its Index lists. Roosevelt also spoke out against anti-Japanese prejudice during the second world war, and was later a delegate to the United Nations and instrumental in creating the
Universal Declaration of Human Rights The Universal Declaration of Human Rights (UDHR) is an international document adopted by the United Nations General Assembly that enshrines the rights and freedoms of all human beings. Drafted by a UN committee chaired by Eleanor Roosevelt ...
. Th
3,000-page
FBI dossier on Eleanor Roosevelt reveals Hoover's close monitoring of her activities and writings, and contains retaliatory charges against her for suspected Communist activities. *
Frank Sinatra Francis Albert Sinatra (; December 12, 1915 – May 14, 1998) was an American singer and actor. Nicknamed the " Chairman of the Board" and later called "Ol' Blue Eyes", Sinatra was one of the most popular entertainers of the 1940s, 1950s, and ...
– Hi
1,300 page
FBI dossier, dating from 1943, contains allegations about Sinatra's possible ties to the
American Communist Party The Communist Party USA, officially the Communist Party of the United States of America (CPUSA), is a communist party in the United States which was established in 1919 after a split in the Socialist Party of America following the Russian Revo ...
. The FBI spent several decades tracking Sinatra and his associates. *
Marilyn Monroe Marilyn Monroe (; born Norma Jeane Mortenson; 1 June 1926 4 August 1962) was an American actress. Famous for playing comedic " blonde bombshell" characters, she became one of the most popular sex symbols of the 1950s and early 1960s, as wel ...
– Her FBI dossier begins in 1955 and continues up until the months before her death. It focuses mostly on her travels and associations, searching for signs of leftist views and possible ties to
communism Communism (from Latin la, communis, lit=common, universal, label=none) is a far-left sociopolitical, philosophical, and economic ideology and current within the socialist movement whose goal is the establishment of a communist society, ...
. Her ex-husband,
Arthur Miller Arthur Asher Miller (October 17, 1915 – February 10, 2005) was an American playwright, essayist and screenwriter in the 20th-century American theater. Among his most popular plays are ''All My Sons'' (1947), '' Death of a Salesman'' (1 ...
, was also monitored. Monroe's FBI dossier is "heavily censored", but
"reprocessed" version
has been released by the FBI to the public. *
John Lennon John Winston Ono Lennon (born John Winston Lennon; 9 October 19408 December 1980) was an English singer, songwriter, musician and peace activist who achieved worldwide fame as founder, co-songwriter, co-lead vocalist and rhythm guitarist of ...
– In 1971, shortly after Lennon arrived in the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country Continental United States, primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., ...
on a visa to meet up with anti-war activists, the FBI placed Lennon under surveillance, and the U.S. government tried to deport him from the country. At that time, opposition to the
Vietnam War The Vietnam War (also known by #Names, other names) was a conflict in Vietnam, Laos, and Cambodia from 1 November 1955 to the fall of Saigon on 30 April 1975. It was the second of the Indochina Wars and was officially fought between North Vie ...
had reached a peak and Lennon often showed up at political rallies to sing his anti-war anthem "''
Give Peace a Chance "Give Peace a Chance" is an anti-war song written by John Lennon (originally credited to Lennon–McCartney), and recorded with the participation of a small group of friends in a performance with Yoko Ono in a hotel room in Montreal, Quebec, C ...
''". The U.S. government argued that Lennon'
300 page
FBI dossier was particularly sensitive because its release may "lead to foreign diplomatic, economic and military retaliation against the United States", and therefore only approved a "heavily censored" version. *
The Beatles The Beatles were an English Rock music, rock band, formed in Liverpool in 1960, that comprised John Lennon, Paul McCartney, George Harrison and Ringo Starr. They are regarded as the Cultural impact of the Beatles, most influential band of al ...
, of which John Lennon was a member, had
separate FBI dossier
1967–73: The now-defunct
Project MINARET Project MINARET was a domestic espionage project operated by the National Security Agency (NSA), which, after intercepting electronic communications that contained the names of predesignated US citizens, passed them to other government law enforcem ...
was created to spy on U.S. citizens. At the request of the U.S. Army, those who protested against the
Vietnam War The Vietnam War (also known by #Names, other names) was a conflict in Vietnam, Laos, and Cambodia from 1 November 1955 to the fall of Saigon on 30 April 1975. It was the second of the Indochina Wars and was officially fought between North Vie ...
were put on the NSA's "watch list".


Church committee review

1975: The
Church Committee The Church Committee (formally the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities) was a US Senate select committee in 1975 that investigated abuses by the Central Intelligence ...
of the
United States Senate The United States Senate is the upper chamber of the United States Congress, with the House of Representatives being the lower chamber. Together they compose the national bicameral legislature of the United States. The composition and po ...
was set up to investigate widespread intelligence abuses by the NSA,
CIA The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
and FBI. Domestic surveillance, authorized by the highest
executive Executive ( exe., exec., execu.) may refer to: Role or title * Executive, a senior management role in an organization ** Chief executive officer (CEO), one of the highest-ranking corporate officers (executives) or administrators ** Executive di ...
branch of the federal government, spanned from the FDR Administration to the
Presidency of Richard Nixon Richard Nixon's tenure as the 37th president of the United States began with his first inauguration on January 20, 1969, and ended when he resigned on August 9, 1974, in the face of almost certain impeachment because of the Watergate Scanda ...
. The following examples were reported by the Church Committee: * President Roosevelt asked the FBI to put in its files the names of citizens sending telegrams to the White House opposing his "national defense" policy and supporting Col.
Charles Lindbergh Charles Augustus Lindbergh (February 4, 1902 – August 26, 1974) was an American aviator, military officer, author, inventor, and activist. On May 20–21, 1927, Lindbergh made the first nonstop flight from New York City to Paris, a distance o ...
. *
President Truman Harry S. Truman (May 8, 1884December 26, 1972) was the 33rd president of the United States, serving from 1945 to 1953. A leader of the Democratic Party, he previously served as the 34th vice president from January to April 1945 under Frankli ...
received inside information on a former Roosevelt aide's efforts to influence his appointments, labor union negotiating plans, and the publishing plans of journalists. *
President Eisenhower Dwight David "Ike" Eisenhower (born David Dwight Eisenhower; ; October 14, 1890 – March 28, 1969) was an American military officer and statesman who served as the 34th president of the United States from 1953 to 1961. During World War I ...
received reports on purely political and social contacts with foreign officials by
Bernard Baruch Bernard Mannes Baruch (August 19, 1870 – June 20, 1965) was an American financier and statesman. After amassing a fortune on the New York Stock Exchange, he impressed President Woodrow Wilson by managing the nation's economic mobilization in W ...
,
Eleanor Roosevelt Anna Eleanor Roosevelt () (October 11, 1884November 7, 1962) was an American political figure, diplomat, and activist. She was the first lady of the United States from 1933 to 1945, during her husband President Franklin D. Roosevelt's four ...
, and Supreme Court Justice William O. Douglas. * The
Kennedy administration John F. Kennedy's tenure as the 35th president of the United States, began with his inauguration on January 20, 1961, and ended with his assassination on November 22, 1963. A Democrat from Massachusetts, he took office following the 1960 ...
ordered the FBI to wiretap a congressional staff member, three executive officials, a lobbyist, and a Washington law firm.
US Attorney General The United States attorney general (AG) is the head of the United States Department of Justice, and is the chief law enforcement officer of the federal government of the United States. The attorney general serves as the principal advisor to the p ...
Robert F. Kennedy received data from an FBI wire tap on Martin Luther King Jr. and an electronic listening device targeting a congressman, both of which yielded information of a political nature. * President Johnson asked the FBI to conduct "name checks" on his critics and members of the staff of his 1964 opponent, Senator
Barry Goldwater Barry Morris Goldwater (January 2, 1909 – May 29, 1998) was an American politician and United States Air Force officer who was a five-term U.S. Senator from Arizona (1953–1965, 1969–1987) and the Republican Party nominee for president ...
. He also requested purely political intelligence on his critics in the Senate, and received extensive intelligence reports on political activity at the 1964 Democratic Convention from FBI electronic surveillance. * President Nixon authorized a program of wiretaps which produced for the White House purely political or personal information unrelated to national security, including information about a Supreme Court justice. Th
Final Report (Book II)
of the Church Committee revealed the following statistics: * Over 26,000 individuals were at one point catalogued on an FBI list of persons to be rounded up in the event of a " national emergency". * Over 500,000 domestic intelligence files were kept at the FBI headquarters, of which 65,000 were opened in 1972 alone. * At least 130,000 first class letters were opened and
photograph A photograph (also known as a photo, image, or picture) is an image created by light falling on a photosensitive surface, usually photographic film or an electronic image sensor, such as a CCD or a CMOS chip. Most photographs are now create ...
ed by the FBI from 1940 to 1966. * A quarter of a million first class letters were opened and photographed by the CIA from 1953 to 1973. * Millions of private
telegram Telegraphy is the long-distance transmission of messages where the sender uses symbolic codes, known to the recipient, rather than a physical exchange of an object bearing the message. Thus flag semaphore is a method of telegraphy, whereas ...
s sent from, or to, through the United States were obtained by the
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
(NSA), under a secret arrangement with U.S. telegraph companies, from 1947 to 1975. * Over 100,000 Americans have been indexed in U.S. Army intelligence files. * About 300,000 individuals were indexed in a CIA computer system during the course of
Operation CHAOS Operation CHAOS or Operation MHCHAOS was a Central Intelligence Agency domestic espionage project targeting the American people from 1967 to 1974, established by President Lyndon B. Johnson and expanded under President Richard Nixon, whose mission ...
. * Intelligence files on more than 11,000 individuals and groups were created by the
Internal Revenue Service The Internal Revenue Service (IRS) is the revenue service for the United States federal government, which is responsible for collecting U.S. federal taxes and administering the Internal Revenue Code, the main body of the federal statutory t ...
(IRS), with tax investigations "done on the basis of political rather than tax criteria". In response to the committee's findings, the
United States Congress The United States Congress is the legislature of the federal government of the United States. It is Bicameralism, bicameral, composed of a lower body, the United States House of Representatives, House of Representatives, and an upper body, ...
passed the
Foreign Intelligence Surveillance Act The Foreign Intelligence Surveillance Act of 1978 ("FISA" , ) is a United States federal law that establishes procedures for the physical and electronic surveillance and the collection of "foreign intelligence information" between "foreign pow ...
in 1978, which led to the establishment of the
United States Foreign Intelligence Surveillance Court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants aga ...
, which was authorized to issue surveillance
warrants Warrant may refer to: * Warrant (law), a form of specific authorization ** Arrest warrant, authorizing the arrest and detention of an individual ** Search warrant, a court order issued that authorizes law enforcement to conduct a search for eviden ...
. Several decades later in 2013, the presiding judge of the FISA Court,
Reggie Walton Reggie Barnett Walton (born February 8, 1949) is a Senior United States district judge of the United States District Court for the District of Columbia. He is a former presiding judge of the Foreign Intelligence Surveillance Court. Early life ...
, told ''
The Washington Post ''The Washington Post'' (also known as the ''Post'' and, informally, ''WaPo'') is an American daily newspaper published in Washington, D.C. It is the most widely circulated newspaper within the Washington metropolitan area and has a large n ...
'' that the court only has a limited ability to supervise the government's surveillance, and is therefore "forced" to rely upon the accuracy of the information that is provided by federal agents. On August 17, 1975 Senator Frank Church stated on NBC's "Meet the Press" without mentioning the name of the NSA about this agency:


ECHELON

In 1988 an article titled "Somebody's listening" by Duncan Campbell in the ''
New Statesman The ''New Statesman'' is a British political and cultural magazine published in London. Founded as a weekly review of politics and literature on 12 April 1913, it was at first connected with Sidney and Beatrice Webb and other leading members ...
'' described the signals-intelligence gathering activities of a program code-named "
ECHELON ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:Given the 5 dialects that use ...
". The program was engaged by English-speaking World War II Allied countries – Australia, Canada, New Zealand, the United Kingdom and the United States (collectively known as
AUSCANNZUKUS AUSCANNZUKUS is an abbreviation for the naval Command, Control, Communications and Computers (C4) interoperability organization involving the Anglosphere nations of Australia, Canada, New Zealand, the United Kingdom, and the United States. It is a ...
). It was created by the five countries to monitor the military and diplomatic communications of the
Soviet Union The Soviet Union,. officially the Union of Soviet Socialist Republics. (USSR),. was a transcontinental country that spanned much of Eurasia from 1922 to 1991. A flagship communist state, it was nominally a federal union of fifteen nationa ...
and of its
Eastern Bloc The Eastern Bloc, also known as the Communist Bloc and the Soviet Bloc, was the group of socialist states of Central and Eastern Europe, East Asia, Southeast Asia, Africa, and Latin America under the influence of the Soviet Union that existed du ...
allies during the
Cold War The Cold War is a term commonly used to refer to a period of geopolitical tension between the United States and the Soviet Union and their respective allies, the Western Bloc and the Eastern Bloc. The term '' cold war'' is used because t ...
in the early 1960s. By the 1990s the ECHELON system could intercept satellite transmissions,
public switched telephone network The public switched telephone network (PSTN) provides infrastructure and services for public telecommunication. The PSTN is the aggregate of the world's circuit-switched telephone networks that are operated by national, regional, or local telep ...
(PSTN) communications (including most Internet traffic), and transmissions carried by microwave. The New Zealand journalist Nicky Hager provided a detailed description of ECHELON in his 1996 book ''Secret Power''. While some member governments denied the existence of ECHELON, a report by a committee of the
European Parliament The European Parliament (EP) is one of the Legislature, legislative bodies of the European Union and one of its seven Institutions of the European Union, institutions. Together with the Council of the European Union (known as the Council and in ...
in 2001 confirmed the program's use and warned Europeans about its reach and effects.Fiddler, Stephen (1 July 2013)
Echoes of Echelon in Charges of NSA Spying in Europe
''The Washington Post''.
The European Parliament stated in its report that the term "ECHELON" occurred in a number of contexts, but that the evidence presented indicated it was a signals-intelligence collection system capable of interception and content-inspection of telephone calls, fax, e-mail and other data-traffic globally.
James Bamford James Bamford (born September 15, 1946) is an American author, journalist and documentary producer noted for his writing about United States intelligence agencies, especially the National Security Agency (NSA). ''The New York Times'' has call ...
further described the capabilities of ECHELON in ''Body of Secrets'' (2002) about the
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
.Bamford, James; Body of Secrets, Anchor, ; 2002 Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement have, over the years, caused considerable public concern.


Escalation following September 11, 2001 attacks

In the aftermath of the September 2001 attacks on the World Trade Center and the Pentagon, bulk domestic spying in the United States increased dramatically. The desire to prevent future attacks of this scale led to the passage of the
Patriot Act The USA PATRIOT Act (commonly known as the Patriot Act) was a landmark Act of the United States Congress, signed into law by President George W. Bush. The formal name of the statute is the Uniting and Strengthening America by Providing Appro ...
. Later acts include the Protect America Act (which removes the warrant requirement for government surveillance of foreign targets) and the FISA Amendments Act (which relaxed some of the original FISA court requirements). In 2002, "
Total Information Awareness Total Information Awareness (TIA) was a mass detection program by the United States Information Awareness Office. It operated under this title from February to May 2003 before being renamed Terrorism Information Awareness. Based on the concep ...
" was established by the U.S. government in order to "revolutionize the ability of the United States to detect, classify and identify foreign terrorists". In 2005, a report about President Bush's
President's Surveillance Program The President's Surveillance Program (PSP) is a collection of secret intelligence activities authorized by the President of the United States George W. Bush after the September 11 attacks in 2001 as part of the War on Terrorism. Information ...
appeared in ''The New York Times''. According to reporters
James Risen James Risen (born April 27, 1955) is an American journalist for ''The Intercept''. He previously worked for ''The New York Times'' and before that for ''Los Angeles Times''. He has written or co-written many articles concerning U.S. government ...
and
Eric Lichtblau Eric Lichtblau (born 1965) is an American journalist, reporting for '' The New York Times'' in the Washington bureau, as well as the '' Los Angeles Times'', '' Time'' magazine, '' The New Yorker'', and the CNN network's investigative news unit. H ...
, the actual publication of their report was delayed for a year because "The
White House The White House is the official residence and workplace of the president of the United States. It is located at 1600 Pennsylvania Avenue NW in Washington, D.C., and has been the residence of every U.S. president since John Adams in ...
asked ''The New York Times'' not to publish this article". Also in 2005, the existence of STELLARWIND was revealed by
Thomas Tamm Thomas Tamm (born 1952) is a public defender in Washington County, Maryland. He formerly worked as an attorney in the United States Department of Justice (USDOJ) Office of Intelligence Policy and Review during 2004 when senior Justice officials res ...
. In 2006,
Mark Klein Mark Klein is a former AT&T technician and whistleblower who revealed details of the company's cooperation with the United States National Security Agency in installing network hardware at a site known as Room 641A to monitor, capture and proce ...
revealed the existence of Room 641A that he had wired back in 2003. In 2008, Babak Pasdar, a computer security expert, and CEO of Bat Blue publicly revealed the existence of the "Quantico circuit", that he and his team found in 2003. He described it as a back door to the federal government in the systems of an unnamed wireless provider; the company was later independently identified as
Verizon Verizon Communications Inc., commonly known as Verizon, is an American multinational telecommunications conglomerate and a corporate component of the Dow Jones Industrial Average. The company is headquartered at 1095 Avenue of the Americas ...
. The NSA's database of American's phone calls was made public in 2006 by ''
USA Today ''USA Today'' (stylized in all uppercase) is an American daily middle-market newspaper and news broadcasting company. Founded by Al Neuharth on September 15, 1982, the newspaper operates from Gannett's corporate headquarters in Tysons, Virgini ...
'' journalist Leslie Cauley in an article titled, "NSA has massive database of Americans' phone calls." The article cites anonymous sources that described the program's reach on American citizens:
... it means that the government has detailed records of calls they made — across town or across the country — to family members, co-workers, business contacts and others. The three telecommunications companies are working under contract with the NSA, which launched the program in 2001 shortly after the Sept. 11 terrorist attacks.
The report failed to generate discussion of privacy rights in the media and was not referenced by Greenwald or ''The Washington Post'' in any of their subsequent reporting. In 2009, ''The New York Times'' cited several anonymous intelligence officials alleging that "the N.S.A. made Americans targets in eavesdropping operations based on insufficient evidence tying them to terrorism" and "the N.S.A. tried to wiretap a member of Congress without a warrant".


Acceleration of media leaks (2010–present)

On 15 March 2012, the American magazine ''
Wired ''Wired'' (stylized as ''WIRED'') is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics. Owned by Condé Nast, it is headquartered in San ...
'' published an article with the headline "The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)", which was later mentioned by U.S. Rep.
Hank Johnson Henry Calvin Johnson Jr. (born October 2, 1954) is an American lawyer and politician serving as the U.S. representative for since 2007. He is a member of the Democratic Party. The district is anchored in Atlanta's inner eastern suburbs, includ ...
during a congressional hearing. In response to Johnson's inquiry, NSA director Keith B. Alexander testified that these allegations made by ''
Wired ''Wired'' (stylized as ''WIRED'') is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics. Owned by Condé Nast, it is headquartered in San ...
'' magazine were untrue:


2013 mass surveillance disclosures

On 6 June 2013, Britain's ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
'' newspaper began publishing a series of revelations by an unnamed American whistleblower, revealed several days later to be former CIA and NSA-contracted systems analyst
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
. Snowden gave a cache of internal documents in support of his claims to two journalists: Glenn Greenwald and
Laura Poitras Laura Poitras (; born February 2, 1964) is an American director and producer of documentary films. Poitras has received numerous awards for her work, including the 2015 Academy Award for Best Documentary Feature for '' Citizenfour'', about Ed ...
, Greenwald later estimated that the cache contains 15,000 – 20,000 documents, some very large and very detailed, and some very small. This was one of the largest news leaks in the modern
history of the United States The history of the lands that became the United States began with the arrival of the first people in the Americas around 15,000 BC. Numerous indigenous cultures formed, and many saw transformations in the 16th century away from more densely ...
. In over two months of publications, it became clear that the NSA operates a complex web of spying programs which allow it to intercept internet and telephone conversations from over a billion users from dozens of countries around the world. Specific revelations have been made about China, the European Union, Latin America, Iran and Pakistan, and Australia and New Zealand, however the published documentation reveals that many of the programs indiscriminately collect bulk information directly from central servers and internet backbones, which almost invariably carry and reroute information from distant countries. Due to this central server and backbone monitoring, many of the programs overlap and interrelate among one another. These programs are often done with the assistance of US entities such as the
United States Department of Justice The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the United States government tasked with the enforcement of federal law and administration of justice in the United Stat ...
and the FBI,How Microsoft handed the NSA access to encrypted messages
''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
'', 12 July 2013. Retrieved 13 July 2013.
are sanctioned by US laws such as the FISA Amendments Act, and the necessary court orders for them are signed by the secret
Foreign Intelligence Surveillance Court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants aga ...
. In addition to this, many of the NSA's programs are directly aided by national and foreign intelligence services, Britain's GCHQ and Australia's DSD, as well as by large private telecommunications and Internet corporations, such as
Verizon Verizon Communications Inc., commonly known as Verizon, is an American multinational telecommunications conglomerate and a corporate component of the Dow Jones Industrial Average. The company is headquartered at 1095 Avenue of the Americas ...
,
Telstra Telstra Group Limited is an Australian telecommunications company that builds and operates telecommunications networks and markets voice, mobile, internet access, pay television and other products and services. It is a member of the S&P/ASX 2 ...
,
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
and Facebook. On 9 June 2013,
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
told ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers '' The Observer'' and '' The Guardian Weekly'', ''The Guardian'' is part of the ...
'': The US government has aggressively sought to dismiss and challenge Fourth Amendment cases raised: '' Hepting v. AT&T'', '' Jewel v. NSA'', '' Clapper v. Amnesty International'', ''Al-Haramain Islamic Foundation v. Obama'', and '' Center for Constitutional Rights v. Bush''. The government has also granted retroactive immunity to ISPs and telecoms participating in domestic surveillance. The US district court judge for the District of Columbia, Richard Leon, declared on December 16, 2013 that the mass collection of metadata of Americans' telephone records by the National Security Agency probably violates the Fourth Amendment prohibition of unreasonable searches and seizures.
Given the limited record before me at this point in the litigation – most notably, the utter lack of evidence that a terrorist attack has ever been prevented because searching the NSA database was faster than other investigative tactics – I have serious doubts about the efficacy of the metadata collection program as a means of conducting time-sensitive investigations in cases involving imminent threats of terrorism.
"Plaintiffs have a substantial likelihood of showing that their privacy interests outweigh the government's interest in collecting and analysing bulk telephony metadata and therefore the NSA's bulk collection program is indeed an unreasonable search under the fourth amendment," he wrote. "The Fourth Amendment typically requires 'a neutral and detached authority be interposed between the police and the public,' and it is offended by 'general warrants' and laws that allow searches to be conducted 'indiscriminately and without regard to their connections with a crime under investigation,'" he wrote. He added:
I cannot imagine a more 'indiscriminate' and 'arbitrary invasion' than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely such a program infringes on 'that degree of privacy' that the founders enshrined in the Fourth Amendment. Indeed I have little doubt that the author of our Constitution,
James Madison James Madison Jr. (March 16, 1751June 28, 1836) was an American statesman, diplomat, and Founding Father. He served as the fourth president of the United States from 1809 to 1817. Madison is hailed as the "Father of the Constitution" for h ...
, who cautioned us to beware 'the abridgement of freedom of the people by gradual and silent encroachments by those in power,' would be aghast.
Leon granted the request for a preliminary injunction that blocks the collection of phone data for two private plaintiffs (Larry Klayman, a conservative lawyer, and Charles Strange, father of a cryptologist killed in Afghanistan when his helicopter was shot down in 2011) and ordered the government to destroy any of their records that have been gathered. But the judge stayed action on his ruling pending a government appeal, recognizing in his 68-page opinion the "significant national security interests at stake in this case and the novelty of the constitutional issues."


H.R.4681 – Intelligence Authorization Act for Fiscal Year 2015

On 20 May 2014, U.S. Representative for Republican congressman Mike Rogers introduced Intelligence Authorization Act for Fiscal Year 2015 with the goal of authorizing appropriations for fiscal years 2014 and 2015 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the
Central Intelligence Agency The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
(CIA) Retirement and Disability System, and for other purposes. Some of its measures cover the limitation on retention. A covered communication (meaning any nonpublic telephone or electronic communication acquired without the consent of a person who is a party to the communication, including communications in electronic storage) shall not be retained in excess of 5 years, unless: (i) the communication has been affirmatively determined, in whole or in part, to constitute foreign intelligence or counterintelligence or is necessary to understand or assess foreign intelligence or counterintelligence; (ii) the communication is reasonably believed to constitute evidence of a crime and is retained by a law enforcement agency; (iii) the communication is enciphered or reasonably believed to have a secret meaning; (iv) all parties to the communication are reasonably believed to be non-United States persons; (v) retention is necessary to protect against an imminent threat to human life, in which case both the nature of the threat and the information to be retained shall be reported to the congressional intelligence committees not later than 30 days after the date such retention is extended under this clause; (vi) retention is necessary for technical assurance or compliance purposes, including a court order or discovery obligation, in which case access to information retained for technical assurance or compliance purposes shall be reported to the congressional intelligence committees on an annual basis; (vii) retention for a period in excess of 5 years is approved by the head of the element of the intelligence community responsible for such retention, based on a determination that retention is necessary to protect the national security of the United States, in which case the head of such element shall provide to the congressional intelligence committees a written certification describing (I) the reasons extended retention is necessary to protect the national security of the United States; (II) the duration for which the head of the element is authorizing retention; (III) the particular information to be retained; and (IV) the measures the element of the intelligence community is taking to protect the privacy interests of United States persons or persons located inside the United States. On 10 December 2014, Republican U.S. Representative for member of
Congress A congress is a formal meeting of the representatives of different countries, constituent states, organizations, trade unions, political parties, or other groups. The term originated in Late Middle English to denote an encounter (meeting of ...
Justin Amash Justin Amash ( ; born April 18, 1980) is an American lawyer and politician who served as the U.S. representative for from 2011 to 2021. Originally a Republican, Amash joined the Libertarian Party in April 2020, becoming the party's first (an ...
criticized the act on his Facebook as being "one of the most egregious sections of law I've encountered during my time as a representative" and "It grants the executive branch virtually unlimited access to the communications of every American". On 11 December 2014, a petition was created on
We the People The Preamble to the United States Constitution, beginning with the words We the People, is a brief introductory statement of the Constitution's fundamental purposes and guiding principles. Courts have referred to it as reliable evidence o ...
section of the whitehouse.gov website petitioning the Obama administration to veto the law.


USA Freedom Act

The USA Freedom Act was signed into law on June 2, 2015, the day after certain provisions of the Patriot Act had expired. It mandated an end to bulk collection of phone call metadata by the NSA within 180 days, but allowed continued mandatory retention of metadata by phone companies with access by the government with case-by-case approval from the
Foreign Intelligence Surveillance Court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants aga ...
.


Modalities, concepts, and methods


Logging postal mail

Under the Mail Isolation Control and Tracking program, the U.S. Postal Service photographs the exterior of every piece of paper mail that is processed in the United States — about 160 billion pieces in 2012. The U.S. Postmaster General stated that the system is primarily used for mail sorting, but the images are available for possible use by law enforcement agencies. Created in 2001 following the anthrax attacks that killed five people, it is a sweeping expansion of a 100-year-old program called " mail cover" which targets people suspected of crimes. Together, the two programs show that postal mail is subject to the same kind of scrutiny that the National Security Agency gives to telephone calls, e-mail, and other forms of electronic communication."U.S. Postal Service Logging All Mail for Law Enforcement"
Ron Nixon, ''New York Times'', July 3, 2013. Retrieved 25 September 2013.
Mail cover surveillance requests are granted for about 30 days, and can be extended for up to 120 days. Images captured under the Mail Isolation Control and Tracking program are retained for a week to 30 days and then destroyed."AP Interview: USPS takes photos of all mail"
Associated Press (AP), 2 August 2013.
There are two kinds of mail covers: those related to criminal activity and those requested to protect national security. Criminal activity requests average 15,000 to 20,000 per year, while the number of requests for national security mail covers has not been made public. Neither the Mail Isolation Control and Tracking program nor the mail cover program require prior approval by a judge. For both programs the information gathered is metadata from the outside of the envelope or package for which courts have said there is no expectation of privacy. Opening the mail to view its contents would require a warrant approved by a judge.


Wiretapping

Billions of dollars per year are spent, by agencies such as the Information Awareness Office,
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
, and the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice ...
, to develop, purchase, implement, and operate systems such as
Carnivore A carnivore , or meat-eater (Latin, ''caro'', genitive ''carnis'', meaning meat or "flesh" and ''vorare'' meaning "to devour"), is an animal or plant whose food and energy requirements derive from animal tissues (mainly muscle, fat and other s ...
,
ECHELON ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:Given the 5 dialects that use ...
, and
NarusInsight Narus Inc. was a Software industry, software company and Independent software vendor, vendor of big data analytics for cybersecurity. History In 1997, Ori Cohen, Vice President of Business and Technology Development for VDONet, founded Narus with ...
to intercept and analyze the immense amount of data that traverses the Internet and telephone system every day. The
Total Information Awareness Total Information Awareness (TIA) was a mass detection program by the United States Information Awareness Office. It operated under this title from February to May 2003 before being renamed Terrorism Information Awareness. Based on the concep ...
program, of the Information Awareness Office, was formed in 2002 by the Pentagon and led by former rear admiral John Poindexter. The program designed numerous technologies to be used to perform mass surveillance. Examples include advanced speech-to-text programs (so that phone conversations can be monitored en-masse by a computer, instead of requiring human operators to listen to them),
social network analysis Social network analysis (SNA) is the process of investigating social structures through the use of networks and graph theory. It characterizes networked structures in terms of ''nodes'' (individual actors, people, or things within the network) ...
software to monitor groups of people and their interactions with each other, and "Human identification at a distance" software which allows computers to identify people on surveillance cameras by their facial features and gait (the way they walk). The program was later renamed " Terrorism Information Awareness", after a negative public reaction.


Legal foundations

The Communications Assistance for Law Enforcement Act (CALEA), passed in 1994, requires that all U.S. telecommunications companies modify their equipment to allow easy
wiretapping Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitorin ...
of telephone, VoIP, and broadband Internet traffic. In 1999 two models of mandatory data retention were suggested for the US. The first model would record the
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
assigned to a customer at a specific time. In the second model, "which is closer to what Europe adopted", telephone numbers dialed, contents of Web pages visited, and recipients of e-mail messages must be retained by the
ISP An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
for an unspecified amount of time. In 2006 the
International Association of Chiefs of Police International Association of Chiefs of Police (IACP) is a nonprofit organization based in Alexandria, Virginia (United States). It is the world's largest professional association for police The police are a Law enforcement organization, c ...
adopted a resolution calling for a "uniform data retention mandate" for "customer subscriber information and source and destination information." The U.S. Department of Justice announced in 2011 that criminal investigations "are being frustrated" because no law currently exists to force Internet providers to keep track of what their customers are doing. The
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ...
has an ongoing lawsuit ( Hepting v. AT&T) against the telecom giant AT&T Inc. for its assistance to the U.S. government in monitoring the communications of millions of American citizens. It has managed thus far to keep the proceedings open. Recently the documents, which were exposed by a whistleblower who had previously worked for AT&T, and showed schematics of the massive data mining system, were made public.


Internet communications

The FBI developed the computer programs "
Magic Lantern The magic lantern, also known by its Latin name , is an early type of image projector that used pictures—paintings, prints, or photographs—on transparent plates (usually made of glass), one or more lenses, and a light source. Because a si ...
" and
CIPAV The Computer and Internet Protocol Address Verifier (CIPAV) is a data gathering tool that the Federal Bureau of Investigation (FBI) uses to track and gather location data on suspects under electronic surveillance. The software operates on the targ ...
, which it can remotely install on a computer system, in order to monitor a person's computer activity. The NSA has been gathering information on financial records, Internet surfing habits, and monitoring e-mails. It has also performed extensive surveillance on
social networks A social network is a social structure made up of a set of social actors (such as individuals or organizations), sets of dyadic ties, and other social interactions between actors. The social network perspective provides a set of methods for a ...
such as Facebook. Recently, Facebook has revealed that, in the last six months of 2012, they handed over the private data of between 18,000 and 19,000 users to law enforcement of all types—including local police and federal agencies, such as the FBI, Federal Marshals and the NSA. One form of wiretapping utilized by the NSA is RADON, a bi-directional host tap that can inject Ethernet packets onto the same target. It allows bi-directional exploitation of Denied networks using standard on-net tools. The one limitation of RADON is that it is a USB device that requires a physical connection to a laptop or PC to work. RADON was created by a Massachusetts firm called Netragard. Their founder, Adriel Desautels, said about RADON, "it is our 'safe' malware. RADON is designed to enable us to infect customer systems in a safe and controllable manner. Safe means that every strand is built with an expiration date that, when reached, results in RADON performing an automatic and clean self-removal." The NSA is also known to have splitter sites in the United States. Splitter sites are places where a copy of every packet is directed to a secret room where it is analyzed by the Narus STA 6400, a deep packet inspection device. Although the only known location is at 611 Folsom Street, San Francisco, California, expert analysis of Internet traffic suggests that there are likely several locations throughout the United States.


Advertising data

In September 2022 the EFF and AP revealed their investigation into the use of advertising IDs to develop the Fog Reveal database. Fog Reveal aggregates location data from mobile applications, which is then supplied as a service to United States law enforcement agencies.


Intelligence apparatus to monitor Americans

Since the
September 11, 2001 terrorist attacks The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commerc ...
, a vast domestic intelligence apparatus has been built to collect information using FBI, local police, state homeland security offices and military criminal investigators. The intelligence apparatus collects, analyzes and stores information about millions of (if not all) American citizens, most of whom have not been accused of any wrongdoing. Every state and local law enforcement agency is to feed information to federal authorities to support the work of the FBI. The PRISM special source operation system was enabled by the Protect America Act of 2007 under President Bush and the FISA Amendments Act of 2008, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017. According to ''The Register'', the FISA Amendments Act of 2008 "specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant" when one of the parties is outside the U.S. PRISM was first publicly revealed on 6 June 2013, after classified documents about the program were leaked to ''The Washington Post'' and ''The Guardian'' by
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
.


Telephones

In early 2006, ''
USA Today ''USA Today'' (stylized in all uppercase) is an American daily middle-market newspaper and news broadcasting company. Founded by Al Neuharth on September 15, 1982, the newspaper operates from Gannett's corporate headquarters in Tysons, Virgini ...
'' reported that several major telephone companies were cooperating illegally with the
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
to monitor the phone records of U.S. citizens, and storing them in a large database known as the
NSA call database MAINWAY is a database maintained by the United States' National Security Agency (NSA) containing metadata for hundreds of billions of telephone calls made through the largest telephone carriers in the United States, including AT&T, Verizon, ...
. This report came on the heels of allegations that the U.S. government had been conducting electronic surveillance of domestic telephone calls without warrants. Law enforcement and intelligence services in the United States possess technology to remotely activate the microphones in cell phones in order to listen to conversations that take place nearby the person who holds the phone."FBI using cell phone microphones to eavesdrop"
Eric Bangeman, ''Ars Technica'', 4 December 2006. Retrieved 17 September 2013.

Nicole Perlroth, ''New York Times'', 30 May 2012. Retrieved 20 September 2013.
U.S. federal agents regularly use mobile phones to collect location data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily (whether it is being used or not), using a technique known multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone. In 2013, the existence of the
Hemisphere Project The Hemisphere Project, also called simply Hemisphere (codename ''Hudson Hawk''), is a mass surveillance program conducted by US telephone company AT&T and paid for by the White House Office of National Drug Control Policy and the Drug Enforcement ...
, through which AT&T provides
call detail record A call detail record (CDR) is a data record produced by a telephone exchange or other telecommunications equipment that documents the details of a telephone call or other telecommunications transactions (e.g., text message) that passes through th ...
s to government agencies, became publicly known.


Infiltration of smartphones

As worldwide sales of
smartphone A smartphone is a portable computer device that combines mobile telephone and computing functions into one unit. They are distinguished from feature phones by their stronger hardware capabilities and extensive mobile operating systems, whi ...
s began exceeding those of
feature phone A feature phone (also spelled featurephone) is a type or class of mobile phone that retains the form factor of earlier generations of mobile telephones, typically with press-button based inputs and a small non-touch display. They tend to use an ...
s, the NSA decided to take advantage of the smartphone boom. This is particularly advantageous because the smartphone combines a
myriad A myriad (from Ancient Greek grc, μυριάς, translit=myrias, label=none) is technically the number 10,000 (ten thousand); in that sense, the term is used in English almost exclusively for literal translations from Greek, Latin or Sinospher ...
of data that would interest an intelligence agency, such as social contacts, user behavior, interests, location, photos and
credit card A credit card is a payment card issued to users (cardholders) to enable the cardholder to pay a merchant for goods and services based on the cardholder's accrued debt (i.e., promise to the card issuer to pay them for the amounts plus the ...
numbers and passwords. An internal NSA report from 2010 stated that the spread of the smartphone has been occurring "extremely rapidly"—developments that "certainly complicate traditional target analysis." According to the document, the NSA has set up task forces assigned to several smartphone manufacturers and
operating systems An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also in ...
, including Apple Inc.'s iPhone and iOS operating system, as well as
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
's Android mobile operating system. Similarly, Britain's GCHQ assigned a team to study and crack the
BlackBerry The blackberry is an edible fruit produced by many species in the genus ''Rubus'' in the family Rosaceae, hybrids among these species within the subgenus ''Rubus'', and hybrids between the subgenera ''Rubus'' and ''Idaeobatus''. The taxonomy ...
. Under the heading "iPhone capability", the document notes that there are smaller NSA programs, known as "scripts", that can perform surveillance on 38 different features of the iPhone 3 and
iPhone 4 The iPhone 4 is a smartphone that was designed and marketed by Apple Inc. It is the fourth generation of the iPhone lineup, succeeding the iPhone 3GS and preceding the 4S. Following a number of notable leaks, the iPhone 4 was first unvei ...
operating systems. These include the mapping feature,
voicemail A voicemail system (also known as voice message or voice bank) is a computer-based system that allows users and subscribers to exchange personal voice messages; to select and deliver voice information; and to process transactions relating to ind ...
and photos, as well as
Google Earth Google Earth is a computer program that renders a 3D computer graphics, 3D representation of Earth based primarily on satellite imagery. The program maps the Earth by superimposition, superimposing satellite images, aerial photography, and geog ...
,
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dust ...
and
Yahoo! Messenger Yahoo! Messenger (sometimes abbreviated Y!M) was an advertisement-supported instant messaging client (computing), client and associated protocol provided by Yahoo!. Yahoo! Messenger was provided free of charge and could be downloaded and used wit ...
.


Data mining of subpoenaed records

The FBI collected nearly all hotel, airline, rental car, gift shop, and casino records in
Las Vegas Las Vegas (; Spanish for "The Meadows"), often known simply as Vegas, is the 25th-most populous city in the United States, the most populous city in the state of Nevada, and the county seat of Clark County. The city anchors the Las Veg ...
during the last two weeks of 2003. The FBI requested all electronic data of hundreds of thousands of people based on a very general lead for the Las Vegas New Year's celebration. The Senior VP of
The Mirage The Mirage is a casino resort on the Las Vegas Strip in Paradise, Nevada, United States. It is owned by Vici Properties and operated by Hard Rock International. The 65-acre property includes a casino and 3,044 rooms. Golden Nugget, Inc., le ...
went on record with PBS'
Frontline Front line refers to the forward-most forces on a battlefield. Front line, front lines or variants may also refer to: Books and publications * ''Front Lines'' (novel), young adult historical novel by American author Michael Grant * ''Frontlines ...
describing the first time they were requested to help in the mass collection of personal information.


Surveillance cameras

Wide Area Persistent Surveillance (also Wide Area Motion Imaging) is a form of airborne surveillance system that collects pattern-of-life data by recording motion images of an area larger than a city – in sub-meter resolution. This video allows for anyone within the field of regard to be tracked – both live and retroactively, for forensic analysis. The use of sophisticated tracking algorithms applied to the WAMI dataset also enables mass automated geo-location tracking of every vehicle and pedestrian. WAMI sensors are typically mounted on manned airplanes, drones, blimps and aerostats. WAMI is currently in use on the southern border of the US and has been deployed in Baltimore, Dayton Ohio as well as in Los Angeles, specifically targeting Compton. Wide Area Persistent Surveillance systems such as ARGUS WAMI are capable of live viewing and recording a 68 square mile area with enough detail to view pedestrians and vehicles and generate chronographs. These WAMI cameras, such as Gorgon Stare, Angelfire, Hiper Stare, Hawkeye and ARGUS, create airborne video so detailed that pedestrians can be followed across the city through forensic analysis. This allows investigators to rewind and playback the movements of anyone within this 68 square mile area for hours, days or even months at a time depending on the airframe the WAMI sensors are mounted on. JLENS, a surveillance aerostat scheduled for deployment over the east coast of the US, is a form of WAMI that uses sophisticated radar imaging along with electro-optical WAMI sensors to enable mass geo-location tracking of ground vehicles. While a resistance to the domestic deployment of WAMI has emerged in areas where the public has learned of the technologies use, the deployments have been intentionally hidden from the public, as in Compton California, where the mayor learned about the surveillance from groups like the American Civil Liberties Union, Teame Zazzu and the Center for Investigative Reporting. PeSEAS and PerMIATE software automate and record the movement observed in the WAMI video. This technology uses software to track and record the movements of pedestrians and vehicles using automatic object recognition software across the entire frame, generating "tracklets" or chronographs of every car and pedestrian movements. 24/7 deployment of this technology has been suggested by the DHS on spy blimps such as the recently killed Blue Devil Airship.
Traffic cameras A traffic camera is a video camera which observes vehicular traffic on a road. Typically, traffic cameras are put along major roads such as highways, freeways, expressways and arterial roads, and are connected by optical fibers buried alongside or ...
, which were meant to help enforce traffic laws at intersections, have also sparked some controversy, due to their use by law enforcement agencies for purposes unrelated to traffic violations. These cameras also work as transit choke-points that allow individuals inside the vehicle to be positively identified and license plate data to be collected and time stamped for cross reference with airborne WAMI such as ARGUS and HAWKEYE used by police and Law Enforcement. The
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-ter ...
is funding networks of surveillance cameras in cities and towns as part of its efforts to combat terrorism. In February 2009,
Cambridge, MA Cambridge ( ) is a city in Middlesex County, Massachusetts, United States. As part of the Boston metropolitan area, the cities population of the 2020 U.S. census was 118,403, making it the fourth most populous city in the state, behind Boston, ...
rejected the cameras due to privacy concerns. In July 2020, the Electronic Frontier Foundation (EFF) reported that the San Francisco Police Department (SFPD) used a camera network in the city's Business Improvement District amid protests against police violence. The report claims that the SFPD's usage of the camera network went beyond investigating footage, likening the department's access to real-time video feeds as "indiscriminate surveillance of protestors."


Surveillance drones

On 19 June 2013, FBI Director
Robert Mueller Robert Swan Mueller III (; born August 7, 1944) is an American lawyer and government official who served as the sixth director of the Federal Bureau of Investigation (FBI) from 2001 to 2013. A graduate of Princeton University and New York ...
told the
United States Senate Committee on the Judiciary The United States Senate Committee on the Judiciary, informally the Senate Judiciary Committee, is a standing committee of 22 U.S. senators whose role is to oversee the Department of Justice (DOJ), consider executive and judicial nominations ...
that the federal government had been employing surveillance drones on U.S. soil in "particular incidents". According to Mueller, the FBI is currently in the initial stage of developing drone policies. Earlier in 2012, Congress passed a US$63 billion bill that will grant four years of additional funding to the
Federal Aviation Administration The Federal Aviation Administration (FAA) is the largest transportation agency of the U.S. government and regulates all aspects of civil aviation in the country as well as over surrounding international waters. Its powers include air traffic ...
(FAA). Under the bill, the FAA is required to provide military and commercial drones with expanded access to U.S. airspace by October 2015. In February 2013, a spokesman for the
Los Angeles Police Department The Los Angeles Police Department (LAPD), officially known as the City of Los Angeles Police Department, is the municipal police department of Los Angeles, California. With 9,974 police officers and 3,000 civilian staff, it is the third-lar ...
explained that these drones would initially be deployed in large public gatherings, including major protests. Over time, tiny drones would be used to fly inside buildings to track down suspects and assist in investigations. According to ''
The Los Angeles Times ''The'' () is a grammatical article in English, denoting persons or things already mentioned, under discussion, implied or otherwise presumed familiar to listeners, readers, or speakers. It is the definite article in English. ''The'' is the ...
'', the main advantage of using drones is that they offer "unblinking eye-in-the-sky coverage". They can be modified to carry high-resolution video cameras,
infrared sensors Infrared (IR), sometimes called infrared light, is electromagnetic radiation (EMR) with wavelengths longer than those of visible light. It is therefore invisible to the human eye. IR is generally understood to encompass wavelengths from around ...
, license plate readers, listening devices, and be disguised as sea gulls or other birds to mask themselves. The FBI and Customs and Border Protection have used drones for surveillance of protests by the
Black Lives Matter Black Lives Matter (abbreviated BLM) is a decentralized political and social movement that seeks to highlight racism, discrimination, and racial inequality experienced by black people. Its primary concerns are incidents of police bruta ...
movement.


Infiltration of activist groups

In 2003, consent decrees against surveillance around the country were lifted, with the assistance of the
Justice Department A justice ministry, ministry of justice, or department of justice is a ministry or other government agency in charge of the administration of justice. The ministry or department is often headed by a minister of justice (minister for justice in a ...
. The
New York City Police Department The New York City Police Department (NYPD), officially the City of New York Police Department, established on May 23, 1845, is the primary municipal law enforcement Law enforcement is the activity of some members of government who act i ...
infiltrated and compiled dossiers on protest groups before the
2004 Republican National Convention The 2004 Republican National Convention took place from August 30 to September 2, 2004 at Madison Square Garden in New York City, New York. The convention is one of a series of historic quadrennial meetings at which the Republican candidates fo ...
, leading to over 1,800 arrests and subsequent fingerprinting. In 2008,
Maryland State Police The Maryland State Police (MSP), officially the Maryland Department of State Police (MDSP), is the official state police force of the U.S. state of Maryland. The Maryland State Police is headquartered at 1201 Reisterstown Road in the Pikesvill ...
infiltrated local peace groups. In 2013, a Washington, D.C. undercover cop infiltrated peace groups.


International cooperation

During
World War II World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the World War II by country, vast majority of the world's countries—including all of the great power ...
, the BRUSA Agreement was signed by the governments of the United States and the United Kingdom for the purpose of intelligence sharing. This was later formalized in the UKUSA Agreement of 1946 as a
secret treaty A secret treaty is a treaty ( international agreement) in which the contracting state parties have agreed to conceal the treaty's existence or substance from other states and the public.Helmut Tichy and Philip Bittner, "Article 80" in Olivier D ...
. The full text of the agreement was released to the public on 25 June 2010. Although the treaty was later revised to include other countries such as Denmark, Germany, Ireland, Norway, Turkey, and the Philippines, most of the information sharing is performed by the so-called "Five Eyes", a term referring to the following English-speaking
western democracies Liberal democracy is the combination of a liberal political ideology that operates under an indirect democratic form of government. It is characterized by elections between multiple distinct political parties, a separation of powers into diff ...
and their respective intelligence agencies: * – The
Defence Signals Directorate Australian Signals Directorate (ASD), formerly the Defence Signals Directorate (DSD) is the federal statutory agency in the Australian Government responsible for foreign signals intelligence, support to military operations, cyber warfare, and ...
of Australia * – The
Communications Security Establishment The Communications Security Establishment (CSE; french: Centre de la sécurité des télécommunications, ''CST''), formerly (from 2008-2014) called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national ...
of Canada * – The
Government Communications Security Bureau The Government Communications Security Bureau (GCSB) ( mi, Te Tira Tiaki) is the public-service department of New Zealand charged with promoting New Zealand's national security by collecting and analysing information of an intelligence nature. ...
of New Zealand * – The
Government Communications Headquarters Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Uni ...
of the United Kingdom, which is widely considered to be a leader in traditional spying due to its influence on countries that were once part of the
British Empire The British Empire was composed of the dominions, colonies, protectorates, mandates, and other territories ruled or administered by the United Kingdom and its predecessor states. It began with the overseas possessions and trading posts e ...
. * – The
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
of the United States, which has the biggest budget and some of the most advanced technical abilities among the "''five eyes''". In 2013, media disclosures revealed how other government agencies have cooperated extensively with the "''Five Eyes''": * – The
Politiets Efterretningstjeneste Politiets Efterretningstjeneste (PET) (literally: Police Intelligence Service, official name in English: Danish Security and Intelligence Service, or DSIS) is the national security and intelligence agency of Denmark. The agency focuses solely o ...
(PET) of Denmark, a domestic intelligence agency, exchanges data with the NSA on a regular basis, as part of a secret agreement with the United States. * – The
Bundesnachrichtendienst The Federal Intelligence Service (German: ; , BND) is the foreign intelligence agency of Germany, directly subordinate to the Chancellor's Office. The BND headquarters is located in central Berlin and is the world's largest intelligence h ...
(''Federal Intelligence Service'') of Germany systematically transfers metadata from German intelligence sources to the NSA. In December 2012 alone, Germany provided the NSA with 500 million metadata records. The NSA granted the Bundesnachrichtendienst access to X-Keyscore,'Prolific Partner': German Intelligence Used NSA Spy Program
''
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
''. Retrieved 21 July 2013.
in exchange for Mira4 and Veras. In early 2013,
Hans-Georg Maaßen Hans-Georg Maaßen (born 24 November 1962) is a German civil servant and lawyer. From 1 August 2012 to 8 November 2018, he served as the President of the Federal Office for the Protection of the Constitution, Germany's domestic security agency a ...
, President of the German domestic security agency
BfV BFV may refer to: * Baden Football Association, the ''Badischer Fussball-Verband'', a regional football association in Germany * Bavarian Football Association, the ''Bayerischer Fussball-Verband'', a regional football association in Germany * Ber ...
, made several visits to the headquarters of the NSA. According to
classified Classified may refer to: General *Classified information, material that a government body deems to be sensitive *Classified advertising or "classifieds" Music *Classified (rapper) (born 1977), Canadian rapper * The Classified, a 1980s American ro ...
documents of the German government, Maaßen had agreed to transfer all data collected by the BfV via XKeyscore to the NSA. In addition, the BfV has been working very closely with eight other U.S. government agencies, including the
CIA The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
. * – The SIGINT National Unit of Israel routinely receives raw intelligence data (including those of U.S. citizens) from the NSA. (See also: Memorandum of understanding between the NSA and Israel) * – The
Algemene Inlichtingen en Veiligheidsdienst The General Intelligence and Security Service ( nl, Algemene Inlichtingen- en Veiligheidsdienst, AIVD; ) is the Intelligence agency, intelligence and security agency of the Netherlands, tasked with domestic, foreign and signals intelligence and p ...
(''General Intelligence and Security Service'') of the Netherlands has been receiving and storing user information gathered by U.S. intelligence sources such as PRISM. * – The Defence Ministry of Singapore and its
Security and Intelligence Division The Security and Intelligence Division (SID) is the foreign intelligence service of Singapore under the purview of the Ministry of Defence (MINDEF), tasked with gathering, processing and analysing national security information from around the wo ...
have been secretly intercepting much of the fibre optic cable traffic passing through the Asian continent. Information gathered by the
Government of Singapore The Government of Singapore is defined by the Constitution of Singapore to mean the executive branch of the state, which is made up of the president and the Cabinet. Although the president acts in their personal discretion in the exercis ...
is transferred to the
Government of Australia The Australian Government, also known as the Commonwealth Government, is the national government of Australia, a federal parliamentary constitutional monarchy. Like other Westminster-style systems of government, the Australian Governmen ...
as part of an intelligence sharing agreement. This allows the "Five Eyes" to maintain a "stranglehold on communications across the Eastern Hemisphere". * – The National Defence Radio Establishment of Sweden (codenamed Sardines) has been working extensively with the NSA, and it has granted the "five eyes" access to underwater cables in the
Baltic Sea The Baltic Sea is an arm of the Atlantic Ocean that is enclosed by Denmark, Estonia, Finland, Germany, Latvia, Lithuania, Poland, Russia, Sweden and the North and Central European Plain. The sea stretches from 53°N to 66°N latitude and from ...
. * – The Federal Intelligence Service (FSI) of Switzerland regularly exchanges information with the NSA, based on a secret agreement. In addition, the NSA has been granted access to Swiss monitoring facilities in
Leuk Leuk (french: Loèche-Ville) is a municipality in the district of Leuk in the canton of Valais in Switzerland. On 1 January 2013, the former municipality of Erschmatt merged into the municipality of Leuk.canton Canton may refer to: Administrative division terminology * Canton (administrative division), territorial/administrative division in some countries, notably Switzerland * Township (Canada), known as ''canton'' in Canadian French Arts and ente ...
of
Valais Valais ( , , ; frp, Valês; german: Wallis ), more formally the Canton of Valais,; german: Kanton Wallis; in other official Swiss languages outside Valais: it, (Canton) Vallese ; rm, (Chantun) Vallais. is one of the 26 cantons forming the S ...
) and Herrenschwanden (canton of
Bern german: Berner(in)french: Bernois(e) it, bernese , neighboring_municipalities = Bremgarten bei Bern, Frauenkappelen, Ittigen, Kirchlindach, Köniz, Mühleberg, Muri bei Bern, Neuenegg, Ostermundigen, Wohlen bei Bern, Zollikofen , website ...
). Aside from the "Five Eyes", most other Western countries are also participating in the NSA surveillance system and sharing information with each other. However, being a partner of the NSA does not automatically exempt a country from being targeted by the NSA. According to an internal NSA document leaked by Snowden, "We (the NSA) can, and often do, target the signals of most 3rd party foreign partners." Examples of members of the "
Five Eyes The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in sig ...
" spying for each other: * On behalf of the British
Prime Minister A prime minister, premier or chief of cabinet is the head of the cabinet and the leader of the ministers in the executive branch of government, often in a parliamentary or semi-presidential system. Under those systems, a prime minister is ...
Margaret Thatcher Margaret Hilda Thatcher, Baroness Thatcher (; 13 October 19258 April 2013) was Prime Minister of the United Kingdom from 1979 to 1990 and Leader of the Conservative Party from 1975 to 1990. She was the first female British prime ...
, the Security Intelligence Service of Canada spied on two British cabinet ministers in 1983. * The U.S.
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
spied on and intercepted the phone calls of
Princess Diana Diana, Princess of Wales (born Diana Frances Spencer; 1 July 1961 – 31 August 1997) was a member of the British royal family. She was the first wife of King Charles III (then Prince of Wales) and mother of Princes William and Harry. Her ac ...
right until she died in a Paris car crash with Dodi Fayed in 1997. The NSA currently holds 1,056 pages of classified information about Princess Diana, which cannot be released to the public because their disclosure is expected to cause "''exceptionally grave damage''" to the
national security National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military att ...
of the United States.


Uses of intercepted data

Most of the NSA's collected data which was seen by human eyes (i.e., used by NSA operatives) was used in accordance with the stated objective of combating terrorism. Other than to combat terrorism, these surveillance programs have been employed to assess the foreign policy and economic stability of other countries. According to reports by Brazil's O Globo newspaper, the collected data was also used to target "commercial secrets". In a statement addressed to the
National Congress of Brazil The National Congress of Brazil ( pt, Congresso Nacional do Brasil) is the legislative body of Brazil's federal government. Unlike the state legislative assemblies and municipal chambers, the Congress is bicameral, composed of the Federal Se ...
, journalist Glenn Greenwald testified that the U.S. government uses
counter-terrorism Counterterrorism (also spelled counter-terrorism), also known as anti-terrorism, incorporates the practices, military tactics, techniques, and strategies that governments, law enforcement, business, and intelligence agencies use to combat or ...
as a "pretext" for clandestine surveillance in order to compete with other countries in the "business, industrial and economic fields". In an interview with ''
Der Spiegel ''Der Spiegel'' (, lit. ''"The Mirror"'') is a German weekly news magazine published in Hamburg. With a weekly circulation of 695,100 copies, it was the largest such publication in Europe in 2011. It was founded in 1947 by John Seymour Chaloner ...
'' published on 12 August 2013, former NSA Director Michael Hayden admitted that "We
he NSA He or HE may refer to: Language * He (pronoun), an English pronoun * He (kana), the romanization of the Japanese kana へ * He (letter), the fifth letter of many Semitic alphabets * He (Cyrillic), a letter of the Cyrillic script called ''He'' in ...
steal secrets. We're number one in it". Hayden also added that "We steal stuff to make you safe, not to make you rich". According to documents seen by the news agency
Reuters Reuters ( ) is a news agency owned by Thomson Reuters Corporation. It employs around 2,500 journalists and 600 photojournalists in about 200 locations worldwide. Reuters is one of the largest news agencies in the world. The agency was est ...
, information obtained in this way is subsequently funnelled to authorities across the nation to help them launch criminal investigations of Americans. Federal agents are then instructed to "recreate" the investigative trail in order to "cover up" where the information originated, known as parallel construction. (Were the true origins known, the evidence and resulting case might be invalidated as "
fruit of the poisonous tree Fruit of the poisonous tree is a legal metaphor used to describe evidence that is obtained illegally. The logic of the terminology is that if the source (the "tree") of the evidence or evidence itself is tainted, then anything gained (the "fruit") ...
", a legal doctrine designed to deter
abuse of power Abuse is the improper usage or treatment of a thing, often to unfairly or improperly gain benefit. Abuse can come in many forms, such as: physical or verbal maltreatment, injury, assault, violation, rape, unjust practices, crimes, or other t ...
that prevents
evidence Evidence for a proposition is what supports this proposition. It is usually understood as an indication that the supported proposition is true. What role evidence plays and how it is conceived varies from field to field. In epistemology, evidenc ...
or subsequent events being used in a case if they resulted from a search or other process that does not conform to legal requirements.) According to NSA Chief Compliance Officer John DeLong, most violations of the NSA's rules were self-reported, and most often involved spying on personal love interests using surveillance technology of the agency. Most agricultural surveillance is not covert and is carried out by government agencies such as
APHIS ''Aphis'' is a genus of insects in the family Aphididae containing at least 600 species of aphids. It includes many notorious agricultural pests, such as the soybean aphid '' Aphis glycines''. Many species of ''Aphis'', such as '' A. coreopsidis ...
(USDA's Animal and Plant Health Inspection Service). DHS has lamented the limited surveillance coverage provided by these inspections and works to augment this protection with their own resources.


See also

*
Censorship in the United States Censorship in the United States involves the suppression of speech or public communication and raises issues of freedom of speech, which is protected by the First Amendment to the United States Constitution. Interpretation of this fundament ...
* Domain Awareness System * Freedom of speech in the United States * Global surveillance *
Internet censorship in the United States Internet censorship in the United States is the suppression of information published or viewed on the Internet in the United States. The First Amendment of the United States Constitution protects freedom of speech and expression against federal, st ...
*
Labor spying in the United States Labor spying in the United States had involved people recruited or employed for the purpose of gathering intelligence, committing sabotage, sowing dissent, or engaging in other similar activities, in the context of an employer/labor organization r ...
*
List of Americans under surveillance This is a list of some of the prominent U.S. citizens who are known to have been put under surveillance by the federal government of the United States. Activists * Helen Keller * Martin Luther King Jr. Businesspersons * Bernard Baruch H ...
* List of government mass surveillance projects *
Mass surveillance in the United Kingdom The use of electronic surveillance by the United Kingdom grew from the development of signal intelligence and pioneering code breaking during World War II. In the post-war period, the Government Communications Headquarters (GCHQ) was forme ...
* Police surveillance in New York City


References


External links

* Dozens of articles about the U.S. National Security Agency and its spying and surveillance programs
''CriMNet Evaluation Report''
by the Office of the Legislative Auditor of Minnesota, March 2004; part of a program to improve sharing of criminal justice information. * Smyth, Daniel
"Avoiding Bloodshed? US Journalists and Censorship in Wartime"
''War & Society'', Volume 32, Issue 1, 2013. . * Deflem, Mathieu; Silva, Derek, M.D.; and Anna S. Rogers. 2018

pp. 109–125 in ''The Cambridge Handbook of Social Problems'', Volume 2, edited by A. Javier Treviño. New York: Cambridge University Press. {{DEFAULTSORT:Mass Surveillance in the United States
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country Continental United States, primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., ...
Espionage in the United States Human rights abuses in the United States
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country Continental United States, primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., ...