List Of Government Surveillance Projects
   HOME

TheInfoList



OR:

This is a list of government surveillance projects and related databases throughout the world.


International

*
ECHELON Echelon may refer to: * A level formation ** A level or rank in an organization, profession, or society ** A military sub-subunit smaller than a company but larger than a platoon ** Echelon formation, a step-like arrangement of units * ECHELO ...
: A
signals intelligence Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly u ...
(SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement.


European Union


Former

*
Data Retention Directive The Data Retention Directive (Directive 2006/24/EC), later declared invalid by the European Court of Justice, was at first passed on 15 March 2006 and regulated data retention, where data has been generated or processed in connection with the ...
: A
defunct Defunct may refer to: * Defunct (video game), ''Defunct'' (video game), 2014 * Zombie process or defunct process, in Unix-like operating systems See also

* * :Former entities * End-of-life product * Obsolescence {{Disambiguation ...
directive requiring EU member states to store citizens' telecommunications data for six to 24 months and allowing police and security agencies to request access from a court to details such as IP address and time of use of every email, phone call, and text message sent or received. *
INDECT INDECT is a research project in the area of intelligent security systems performed by several European universities since 2009 and funded by the European Union. The purpose of the project is to involve European scientists and researchers in the d ...
: Was a research project (until 2014) funded by the
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are Geography of the European Union, located primarily in Europe. The u ...
to develop surveillance methods (e.g. processing of CCTV camera data streams) for the monitoring of abnormal behaviours in an urban environment.


Current (as per 2024)

*
Schengen Information System The Schengen Information System (SIS) is a governmental database maintained by the European Commission. The SIS is used by 31 European countries to find information about individuals and entities for the purposes of national security, border ...
: A database kept for
national security National security, or national defence (national defense in American English), is the security and Defence (military), defence of a sovereign state, including its Citizenship, citizens, economy, and institutions, which is regarded as a duty of ...
and
law enforcement Law enforcement is the activity of some members of the government or other social institutions who act in an organized manner to enforce the law by investigating, deterring, rehabilitating, or punishing people who violate the rules and norms gove ...
purposes.


National


Australia

* In August 2014 it was reported that law-enforcement agencies had been accessing Australians' web browsing histories via
internet provider An Internet service provider (ISP) is an organization that provides a myriad of services related to accessing, using, managing, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non ...
s such as
Telstra Telstra Group Limited is an Australian telecommunications company that builds and operates telecommunications networks and markets related products and services. It is a member of the S&P/ASX 20 stock index, and is Australia's largest telecomm ...
without a warrant. * It was reported that Australia had issued 75% more wiretap warrants in 2003 than the US did and this was 26 times greater than the US on a per capita basis.


China

*
Golden Shield Project The Golden Shield Project (), also named National Public Security Work Informational Project, is the Chinese nationwide network-security fundamental constructional project by the e-government of the People's Republic of China. This project i ...
: Also known as the "Great Firewall of China", it is a
censorship Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governmen ...
and
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
project operated by the
Ministry of Public Security Ministry of Public Security can refer to: * Ministry of Justice and Public Security (Brazil) * Ministry of Public Security of Burundi * Ministry of Public Security (Chile) * Ministry of Public Security (China) * Ministry of Public Security of Co ...
(MPS) division of the
government of the People's Republic of China The government of the People's Republic of China is based on a system of people's congress within the parameters of a Unitary state, unitary communist state, in which the ruling Chinese Communist Party (CCP) enacts its policies through people's ...
. The project was initiated in 1998 and began operations in November 2003. * The Integrated Joint Operations Platform (IJOP, 一体化联合作战平台) is used by the government to monitor the population, particularly
Uyghurs The Uyghurs,. alternatively spelled Uighurs, Uygurs or Uigurs, are a Turkic peoples, Turkic ethnic group originating from and culturally affiliated with the general region of Central Asia and East Asia. The Uyghurs are recognized as the ti ...
. The platform gathers
biometrics Biometrics are body measurements and calculations related to human characteristics and features. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used t ...
, including DNA samples, to track individuals in
Xinjiang Xinjiang,; , SASM/GNC romanization, SASM/GNC: Chinese postal romanization, previously romanized as Sinkiang, officially the Xinjiang Uygur Autonomous Region (XUAR), is an Autonomous regions of China, autonomous region of the China, People' ...
. * Monitoring Bureau * Public Information Network Security *
Social Credit System The Social Credit System ( zh , c = 社会信用体系 , p = shèhuì xìnyòng tǐxì ) is a national credit rating and Blacklisting, blacklist implemented by the government of China, government of the People's Republic of China. The social cred ...


France

*
Frenchelon "Frenchelon" is the nickname given to the signal intelligence system operated by France. The name is a reference to its Anglo-American counterpart ECHELON. History Its existence has never been officially acknowledged by French authorities, al ...
: A data collection and analysis network operated by the French
Directorate-General for External Security The Directorate-General for External Security (, , DGSE) is France's foreign intelligence agency, equivalent to the British MI6 and the American CIA, established on 27 November 1943. The DGSE safeguards French national security through intelli ...
.


Germany

* Nachrichtendienstliches Informationssystem: a searchable database operated by the German security agency
Bundesamt für Verfassungsschutz The Federal Office for the Protection of the Constitution ( or BfV, often ''Bundesverfassungsschutz'') is Germany's federal domestic intelligence agency. Together with the Landesämter für Verfassungsschutz (LfV) at the state level, the fed ...
(BfV). *
Project 6 Project 6, or simply P6, is a global surveillance project jointly operated by the U.S.'s Central Intelligence Agency (CIA) in close cooperation with the German intelligence agencies Bundesnachrichtendienst (BND) and Bundesamt für Verfassungsschutz ...
: a
global surveillance Global mass surveillance can be defined as the mass surveillance of entire populations across national borders. Its existence was not widely acknowledged by governments and the mainstream media until the global surveillance disclosures by Edw ...
project jointly operated by the German intelligence agencies
Bundesnachrichtendienst The Federal Intelligence Service (, ; BND) is the foreign intelligence agency of Germany, directly subordinate to the Federal Chancellery of Germany, Chancellor's Office. The Headquarters of the Federal Intelligence Service, BND headquarters is ...
(BND) and
Bundesamt für Verfassungsschutz The Federal Office for the Protection of the Constitution ( or BfV, often ''Bundesverfassungsschutz'') is Germany's federal domestic intelligence agency. Together with the Landesämter für Verfassungsschutz (LfV) at the state level, the fed ...
(BfV) in close cooperation with the U.S.
Central Intelligence Agency The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
(CIA).


India

*
Central Monitoring System The Central Monitoring System, abbreviated to CMS, is a centralized telephone interception provisioning system installed by the Centre for Development of Telematics (C-DOT), an Indian Government owned telecommunications technology development ...
(CMS): A data collection system similar to the NSA's
PRISM PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD . PRISM collects stored internet ...
program. It enables the
Government of India The Government of India (ISO 15919, ISO: Bhārata Sarakāra, legally the Union Government or Union of India or the Central Government) is the national authority of the Republic of India, located in South Asia, consisting of States and union t ...
to listen to phone conversations, intercept
e-mail Electronic mail (usually shortened to email; alternatively hyphenated e-mail) is a method of transmitting and receiving Digital media, digital messages using electronics, electronic devices over a computer network. It was conceived in the ...
s and text messages, monitor posts on
social networking service A social networking service (SNS), or social networking site, is a type of online social media platform which people use to build social networks or social relationships with other people who share similar personal or career content, interest ...
and track searches on
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
. *
DRDO NETRA The DRDO Netra (Literally ''Eyes'' in Sanskrit) is an Indian, light-weight, autonomous UAV for surveillance and reconnaissance operations. It has been jointly developed by the Research and Development Establishment (R&DE), and IdeaForge, a Mum ...
: Network that is capable of tracking online communications on a real time basis by harvesting data from various
voice-over-IP Voice over Internet Protocol (VoIP), also known as IP telephony, is a set of technologies used primarily for voice communication sessions over Internet Protocol (IP) networks, such as the Internet. VoIP enables voice calls to be transmitted as ...
services, including
Skype Skype () was a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for IP-based videotelephony, videoconferencing and voice calls. It also had instant messaging, file transfer, ...
and
Google Talk Google Talk was an instant messaging service that provided both text and voice communication. The instant messaging service was variously referred to colloquially as Gchat, Gtalk, or Gmessage among its users. Google Talk was also the name o ...
. It is operated by the
Research and Analysis Wing The Research and Analysis Wing (R&AW) is the foreign intelligence agency of the Republic of India. The agency's primary function is gathering foreign intelligence, counter-terrorism, counter-proliferation, advising Indian policymakers, and a ...
. *
NATGRID The National Intelligence Grid or NATGRID is an integrated intelligence master database structure for counter-terrorism purposes which connects databases of various core security agencies under the Government of India. It collects and analyses co ...
: An intelligence grid that links the databases of several departments and ministries of the Government of India.


Russia

* SORM: A technical system used by the
Federal Security Service of the Russian Federation The Federal Security Service of the Russian Federation СБ, ФСБ России (FSB) is the principal security agency of Russia and the main successor agency to the Soviet Union's KGB; its immediate predecessor was the Federal Counteri ...
to monitor
internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
and
telephone A telephone, colloquially referred to as a phone, is a telecommunications device that enables two or more users to conduct a conversation when they are too far apart to be easily heard directly. A telephone converts sound, typically and most ...
communication. * СAMERTON: Is a global vehicle tracking system, control and tracking, identification of probable routes and places of the most frequent appearance of a particular vehicle, integrated with a distributed network of radar complexes of photo-video fixation and road surveillance camera. Developed and implemented by th
"Advanced Scientific - Research Projects"
enterprise St. Petersburg. Within the framework of the practical use of the system of the Ministry of Internal Affairs of the Russian Federation, it has made it possible to identify and solve grave and especially grave crimes, the system is also operated by other state services and departments; *
Yarovaya Law The Yarovaya law (in Russian language, Russian: Закон Яровой, Romanization of Russian, transliteration: ''Zakon Jarovoy''), also Yarovaya package or Yarovaya — Ozerov package is a set of two Russian federal law, federal bills, 374-F ...
is a piece of anti-terrorist legislation that includes a requirement to store all phone call and text messaging data, as well as providing cryptographic backdoors for security services.


Sweden

* Titan traffic database: A
database In computing, a database is an organized collection of data or a type of data store based on the use of a database management system (DBMS), the software that interacts with end users, applications, and the database itself to capture and a ...
established by the Swedish National Defence Radio Establishment (Swedish: Försvarets radioanstalt, FRA) where
call detail record A call detail record (CDR) is a data record produced by a telephone exchange or other telecommunications equipment that documents the details of a telephone call or other telecommunications transactions (e.g., text message) that passes through th ...
s (CDRs) of
telephony Telephony ( ) is the field of technology involving the development, application, and deployment of telecommunications services for the purpose of electronic transmission of voice, fax, or data, between distant parties. The history of telephony is ...
and
internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
traffic Traffic is the movement of vehicles and pedestrians along land routes. Traffic laws govern and regulate traffic, while rules of the road include traffic laws and informal rules that may have developed over time to facilitate the orderly an ...
and transaction data (IPDRs) concerning international telecommunications are stored. * X-Keyscore: A system used by the United States National Security Agency for searching and analysing internet data about foreign nationals. FRA has been granted access to the program.


Switzerland

*
Onyx Onyx is a typically black-and-white banded variety of agate, a silicate mineral. The bands can also be monochromatic with alternating light and dark bands. ''Sardonyx'' is a variety with red to brown bands alternated with black or white bands. ...
: A data gathering system maintained by several
Swiss intelligence agencies The Swiss intelligence community is a group of agencies with responsibilities to protect the interests and infrastructure of Switzerland. The Federal Intelligence Service (FIS), the country's main intelligence agency, is governed by the Int ...
to monitor military and civilian communications, such as
e-mails Electronic mail (usually shortened to email; alternatively hyphenated e-mail) is a method of transmitting and receiving digital messages using electronic devices over a computer network. It was conceived in the late–20th century as the ...
,
telefax Fax (short for facsimile), sometimes called telecopying or telefax (short for telefacsimile), is the telephonic transmission of scanned printed material (both text and images), normally to a telephone number connected to a printer or other out ...
and telephone calls. In 2001, Onyx received its second nomination from the ironically named " Big Brother Award".


United Kingdom

* Impact Nominal Index: The Impact Nominal Index or INI is a computer system that enables the UK police force to establish whether other relevant authorities are holding information regarding a person of interest. * Interception Modernisation Programme: An initiative to extend the
UK government His Majesty's Government, abbreviated to HM Government or otherwise UK Government, is the central government, central executive authority of the United Kingdom of Great Britain and Northern Ireland.
's capability to lawfully intercept and store communications data in a central database. *
Mastering the Internet Mastering the Internet (MTI) is a mass surveillance project led by the British communications intelligence agency Government Communications Headquarters (GCHQ) budgeted at over £1 billion. According to reports in ''The Register'' and ''The Sund ...
(MTI): A clandestine
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
program led by the British intelligence agency
GCHQ Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
. Data gathered by the GCHQ include the contents of
email Electronic mail (usually shortened to email; alternatively hyphenated e-mail) is a method of transmitting and receiving Digital media, digital messages using electronics, electronic devices over a computer network. It was conceived in the ...
messages, entries on the social networking platform
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
and the
web browsing history Web browsing history refers to the list of web pages a user has visited, as well as associated metadata Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the ...
of internet users. * UK National DNA Database (NDNAD): It is also the oldest national DNA database in the world. Since its establishment in 1995, the database has grown to include DNA samples from 2.7 million individuals, or 5.2% of the UK's population, many of whom have neither been charged with, or convicted of, any offence. *
Tempora Tempora is the codeword for a formerly-secret computer system that is used by the British Government Communications Headquarters (GCHQ). This system is used to buffer most Internet communications that are extracted from fibre-optic cables, so t ...
: Launched in the autumn of 2011, this initiative allows the
GCHQ Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
to set up a large-scale
buffer Buffer may refer to: Science * Buffer gas, an inert or nonflammable gas * Buffer solution, a solution used to prevent changes in pH * Lysis buffer, in cell biology * Metal ion buffer * Mineral redox buffer, in geology Technology and engineeri ...
that is capable of storing internet content for 3 days and
metadata Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive ...
for 30 days. * Royal Concierge: prototyped in 2010, sends daily alerts to
GCHQ Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
whenever a booking is made from a ".gov."
second-level domain In the Domain Name System (DNS) hierarchy, a second-level domain (SLD or 2LD) is a domain that is directly below a top-level domain (TLD). For example, in , is the second-level domain of the TLD. Second-level domains commonly refer to the organ ...
at select hotels worldwide. *Collection of Internet Connection Records, being trialled in the UK as of March 2021.


United States

*
Boundless Informant Boundless Informant (stylized as BOUNDLESSINFORMANT) is a big data analysis and data visualization tool used by the United States National Security Agency (NSA). It gives NSA managers summaries of the NSA's worldwide data collection activities by ...
: A system deployed by the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
to analyze global electronic information. In March 2013, Boundless Informant gathered 14 billion data reports from
Iran Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
, 6.3 billion from
India India, officially the Republic of India, is a country in South Asia. It is the List of countries and dependencies by area, seventh-largest country by area; the List of countries by population (United Nations), most populous country since ...
, and 2.8 billion from the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
. * BULLRUN: a highly classified U.S.
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
program to preserve its ability to eavesdrop on encrypted communications by influencing and weakening encryption standards, by obtaining master encryption keys, and by gaining access to data before or after it is encrypted either by agreement, by force of law, or by computer network exploitation (hacking). *
Carnivore A carnivore , or meat-eater (Latin, ''caro'', genitive ''carnis'', meaning meat or "flesh" and ''vorare'' meaning "to devour"), is an animal or plant Plants are the eukaryotes that form the Kingdom (biology), kingdom Plantae; they ar ...
: A system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. Apparently replaced by commercial software such as NarusInsight. * Comprehensive National Cybersecurity Initiative * DCSNet: The
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
(FBI)'s
point-and-click Point and click are one of the actions of a computer user moving a pointer to a certain location on a screen (''pointing'') and then pressing a button on a mouse or other pointing device (''click''). An example of point and click is in hypermedi ...
surveillance system that can perform instant wiretaps on any telecommunications device located in the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
.Point, Click ... Eavesdrop: How the FBI Wiretap Net Operates
* Fairview: A
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
program directed at foreign mobile phone users. *
Financial Crimes Enforcement Network The Financial Crimes Enforcement Network (FinCEN) is a bureau within the United States Department of the Treasury that collects and analyzes information about financial transactions to combat domestic and international money laundering, terrori ...
: A bureau of the Department of the Treasury that collects and analyzes financial transactions in order to combat
financial crimes Finance refers to monetary resources and to the study and discipline of money, currency, assets and liabilities. As a subject of study, is a field of Business Administration wich study the planning, organizing, leading, and controlling of an ...
. * ICREACH: Surveillance frontend GUI that is shared with 23 government agencies, including the
CIA The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
,
DEA The Drug Enforcement Administration (DEA) is a United States federal law enforcement agency under the U.S. Department of Justice tasked with combating illicit drug trafficking and distribution within the U.S. It is the lead agency for domes ...
, and
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
, to search illegally collected personal records. *
Magic Lantern The magic lantern, also known by its Latin name , is an early type of image projector that uses pictures—paintings, prints, or photographs—on transparent plates (usually made of glass), one or more lens (optics), lenses, and a light source. ...
: A
keystroke logging Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitore ...
software Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications. The history of software is closely tied to the development of digital comput ...
deployed by the FBI in the form of an
e-mail attachment An email attachment is a computer file sent along with an email message. One or more files can be attached to any email message, and be sent along with it to the recipient. This is typically used as a simple method to share documents and images. ...
. When activated, it acts as a
trojan horse In Greek mythology, the Trojan Horse () was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer, Homer's ''Iliad'', with the poem ending ...
and allows the FBI to decrypt user communications. * Main Core: A personal and financial database storing information of millions of U.S. citizens believed to be threats to
national security National security, or national defence (national defense in American English), is the security and Defence (military), defence of a sovereign state, including its Citizenship, citizens, economy, and institutions, which is regarded as a duty of ...
. The data mostly comes from the
NSA The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
,
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
,
CIA The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
, as well as other government sources. *
MAINWAY MAINWAY is a database maintained by the United States' National Security Agency (NSA) containing metadata for hundreds of billions of telephone calls made through the largest telephone company, telephone carriers in the United States, including A ...
: NSA database containing
metadata Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive ...
for hundreds of billions of
telephone call A telephone call, phone call, voice call, or simply a call, is the effective use of a connection over a telephone network between the calling party and the called party. Telephone calls are the form of human communication that was first enabl ...
s made through the four largest telephone carriers in the United States. * Media monitoring services, A proposed DHS database for monitoring all global news sources and media influencers. *
MUSCULAR MUSCULAR (DS-200B), located in the United Kingdom, is the name of a surveillance program jointly operated by Britain's Government Communications Headquarters (GCHQ) and the U.S. National Security Agency (NSA) that was revealed by documents release ...
: Overseas wiretapping of
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
's and
Yahoo Yahoo (, styled yahoo''!'' in its logo) is an American web portal that provides the search engine Yahoo Search and related services including My Yahoo, Yahoo Mail, Yahoo News, Yahoo Finance, Yahoo Sports, y!entertainment, yahoo!life, an ...
's unencrypted internal networks by the NSA. * MYSTIC is a voice interception program used by the National Security Agency. *
Nationwide Suspicious Activity Reporting Initiative The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) is a program of the United States government used to collect and share reports of suspicious activity by people in the United States. The Nationwide SAR Initiative (NSI) builds o ...
: Under this government initiative, a
Suspicious Activity Report In financial regulation, a Suspicious Activity Report (SAR) or Suspicious Transaction Report (STR) is a report made by a financial institution about suspicious or potentially suspicious activity as required under laws designed to counter money lau ...
(SAR) may be filed by law enforcers, public safety personnel, owners of critical infrastructure or the general public. * NSA ANT catalog: a 50-page document listing technology available to the United States National Security Agency (NSA) ANT division to aid in cyber-surveillance. *
PRISM PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD . PRISM collects stored internet ...
: A clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) which can target customers of participating corporations outside or inside the United States. *
Room 641A Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency, as part of an American mass surveillance program. The facility commenced operations in 2003 and its purpose was publicly revealed ...
: A telecommunication interception facility operated by
AT&T AT&T Inc., an abbreviation for its predecessor's former name, the American Telephone and Telegraph Company, is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the w ...
for the U.S. National Security Agency. * Sentry Eagle: efforts to monitor and attack an adversary's cyberspace through capabilities include SIGINT, Computer Network Exploitation (CNE), Information Assurance, Computer Network Defense (CND), Network Warfare, and Computer Network Attack (CNA). The efforts included weakening US commercial encryption systems. *
Special Collection Service The Special Collection Service (SCS), codenamed F6, is a highly classified joint U.S. Central Intelligence Agency–National Security Agency program charged with inserting eavesdropping equipment in difficult-to-reach places, such as foreign e ...
(SCS): A black budget program that is responsible for "close surveillance, burglary, wiretapping, breaking and entering." It employs
covert listening device A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and ...
technologies to bug foreign embassies, communications centers, computer facilities, fiber-optic networks, and government installations. *
Stellar Wind (code name) A stellar wind is a flow of gas ejected from the upper atmosphere of a star. It is distinguished from the bipolar outflows characteristic of young stars by being less collimated, although stellar winds are not generally spherically symmetric. Di ...
: The
open secret An open secret is information that was originally intended to be confidential but has at some point been disclosed and is known to many people. Open secrets are ''secrets'' in the sense that they are excluded from formal or official discourse, b ...
code name A code name, codename, call sign, or cryptonym is a code word or name used, sometimes clandestinely, to refer to another name, word, project, or person. Code names are often used for military purposes, or in espionage. They may also be used in ...
for four surveillance programs. *
Tailored Access Operations The Office of Tailored Access Operations (TAO), structured as S32, is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA). It has been active since at least 1998, possibly 1997, but was not named or structured as ...
: Intelligence-gathering unit of the NSA that is capable of harvesting approximately 2
petabyte The byte is a unit of digital information that most commonly consists of eight bits. Historically, the byte was the number of bits used to encode a single character of text in a computer and for this reason it is the smallest addressable un ...
s of data per hour. *
Terrorist Finance Tracking Program The Terrorist Finance Tracking Program (TFTP) is a United States government program to access financial transactions on the international SWIFT network that was revealed by ''The New York Times'', ''The Wall Street Journal'' and the ''Los Angeles T ...
: A joint initiative run by the
CIA The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
and the Department of the Treasury to access the SWIFT (
Society for Worldwide Interbank Financial Telecommunication Swift or SWIFT most commonly refers to: * SWIFT, an international organization facilitating transactions between banks ** SWIFT code * Swift (programming language) * Swift (bird), a family of birds It may also refer to: Organizations * SWIFT, ...
) transaction database as part of the Bush administration's "Global War on Terrorism". According to the U.S. government, its efforts to counter terrorist activities were compromised after the existence of the Terrorist Finance Tracking Program was leaked to the media. *
Turbulence In fluid dynamics, turbulence or turbulent flow is fluid motion characterized by chaotic changes in pressure and flow velocity. It is in contrast to laminar flow, which occurs when a fluid flows in parallel layers with no disruption between ...
(NSA): Turbulence is a United States National Security Agency (NSA) information-technology project started circa 2005. It was developed in small, inexpensive "test" pieces rather than one grand plan like its failed predecessor, the
Trailblazer Project Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as ce ...
. It also includes offensive cyberwarfare capabilities, like injecting malware into remote computers. The U.S. Congress criticized the project in 2007 for having similar bureaucratic problems as the Trailblazer Project. *
US Intelligence Community The United States Intelligence Community (IC) is a group of separate US federal government, U.S. federal government intelligence agencies and subordinate organizations that work to conduct Intelligence assessment, intelligence activities which ...
(IC): A cooperative federation of 16 government agencies working together, but also separately, to gather intelligence and conduct
espionage Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information ( intelligence). A person who commits espionage on a mission-specific contract is called an ...
. *
Utah Data Center The Utah Data Center (UDC), also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, is a data storage facility for the United States Intelligence Community that is designed to store data estimated to ...
: The Intelligence Community's US$1.5 billion
data storage Data storage is the recording (storing) of information (data) in a storage medium. Handwriting, phonographic recording, magnetic tape, and optical discs are all examples of storage media. Biological molecules such as RNA and DNA are con ...
center that is designed to store extremely large amounts of data, on the scale of yottabytes. * X-Keyscore: A system used by the United States National Security Agency for searching and analysing internet data about foreign nationals.


Unclear origin

* GhostNet: A fictitious code name given to a large-scale surveillance project that is believed to be operated by the
People's Republic of China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
. *
Stuxnet Stuxnet is a Malware, malicious computer worm first uncovered on June 17, 2010, and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsibl ...
: It is the first discovered
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
that spies on industrial systems, and it was used to attack
Iran Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
's nuclear facilities. It is believed to have originated from the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
under the Bush administration.


Recently discontinued

* ''
Information Awareness Office The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology ...
'': An office established to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other threats to U.S. national security. *
Multistate Anti-Terrorism Information Exchange The Multistate Anti-Terrorism Information Exchange Program, also known by the acronym MATRIX, was a U.S. federally funded data mining system originally developed for the Florida Department of Law Enforcement described as a tool to identify terro ...
(MATRIX): A data mining system originally developed for the Florida Department of Law Enforcement. * Terrorist Surveillance Program: Replaced by
PRISM PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD . PRISM collects stored internet ...
. * ThinThread: A U.S. National Security Agency (NSA) program that involved wiretapping and sophisticated analysis of the resulting data. *
Trailblazer Project Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as ce ...
: U.S. National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks including cell phone networks and the Internet.


See also

* 2013 Public disclosures of surveillance and espionage activities * Electronic police state * List of public disclosures of classified information *
NSA warrantless surveillance (2001–07) The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
* Politico-media complex


References

{{DEFAULTSORT:Government mass surveillance projects Military lists Surveillance databases National security Signals intelligence Secret government programs Mass surveillance