NSA Bulk Collection
   HOME

TheInfoList



OR:

The practice of
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the
First First most commonly refers to: * First, the ordinal form of the number 1 First or 1st may also refer to: Acronyms * Faint Images of the Radio Sky at Twenty-Centimeters, an astronomical survey carried out by the Very Large Array * Far Infrared a ...
and
Second World War World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
s, mass surveillance continued throughout the
Cold War The Cold War was a period of global Geopolitics, geopolitical rivalry between the United States (US) and the Soviet Union (USSR) and their respective allies, the capitalist Western Bloc and communist Eastern Bloc, which lasted from 1947 unt ...
period, via programs such as the
Black Chamber The Black Chamber, officially the Cable and Telegraph Section and also known as the Cipher Bureau, was the first peacetime cryptanalytic organization in the United States, operating from 1917 to 1929. It was a forerunner of the National Security ...
and
Project SHAMROCK Project SHAMROCK was the sister project to Project MINARET, an espionage exercise started in August 1945. Project MINARET involved the accumulation of all telegraphic data that entered or exited the United States. The Armed Forces Security Agency ...
. The formation and growth of federal
law-enforcement Law enforcement is the activity of some members of the government or other social institutions who act in an organized manner to enforce the law by investigating, deterring, rehabilitating, or punishing people who violate the rules and norms gove ...
and
intelligence agencies An intelligence agency is a government agency responsible for the collection, analysis, and exploitation of information in support of law enforcement, national security, military, public safety, and foreign policy objectives. Means of inf ...
such as the
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
,
CIA The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
, and
NSA The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
institutionalized surveillance used to also silence political dissent, as evidenced by
COINTELPRO COINTELPRO (a syllabic abbreviation derived from Counter Intelligence Program) was a series of covert and illegal projects conducted between 1956 and 1971 by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltr ...
projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the
communist Communism () is a sociopolitical, philosophical, and economic ideology within the socialist movement, whose goal is the creation of a communist society, a socioeconomic order centered on common ownership of the means of production, di ...
model of the United States' rival at the time, the
Soviet Union The Union of Soviet Socialist Republics. (USSR), commonly known as the Soviet Union, was a List of former transcontinental countries#Since 1700, transcontinental country that spanned much of Eurasia from 1922 until Dissolution of the Soviet ...
. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters. The formation of the international UKUSA surveillance agreement of 1946 evolved into the
ECHELON Echelon may refer to: * A level formation ** A level or rank in an organization, profession, or society ** A military sub-subunit smaller than a company but larger than a platoon ** Echelon formation, a step-like arrangement of units * ECHELO ...
collaboration by 1955 of five English-speaking nations, also known as the
Five Eyes The Five Eyes (FVEY) is an Anglosphere intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are party to the multilateral UKUSA Agreement, a treaty for joint cooperat ...
, and focused on interception of electronic communications, with substantial increases in domestic surveillance capabilities. Following the
September 11th attacks The September 11 attacks, also known as 9/11, were four coordinated Islamist terrorist suicide attacks by al-Qaeda against the United States in 2001. Nineteen terrorists hijacked four commercial airliners, crashing the first two into ...
of 2001, domestic and international mass surveillance capabilities grew immensely. Contemporary mass surveillance relies upon annual presidential executive orders declaring a continued State of National Emergency, first signed by George W. Bush on September 14, 2001 and then continued on an annual basis during the presidencies of Barack Obama, Joe Biden, and the first presidency of Donald Trump, with it still being active as of November 2024. Mass surveillance is also based on several subsequent national security Acts including the USA PATRIOT Act and
FISA The Foreign Intelligence Surveillance Act of 1978 (FISA, , ) is a United States federal law that establishes procedures for the surveillance and collection of foreign intelligence on domestic soil.
Amendment Act's
PRISM PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD . PRISM collects stored internet ...
surveillance program. Critics and political dissenters currently describe the effects of these acts, orders, and resulting database network of
fusion center In the United States, fusion centers are designed to promote information sharing at the federal level between agencies such as the Federal Bureau of Investigation, the U.S. Department of Homeland Security, the U.S. Department of Justice, and sta ...
s as forming a veritable American police state that simply institutionalized the illegal
COINTELPRO COINTELPRO (a syllabic abbreviation derived from Counter Intelligence Program) was a series of covert and illegal projects conducted between 1956 and 1971 by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltr ...
tactics used to assassinate dissenters and leaders from the 1950s onwards. Additional surveillance agencies, such as the DHS and the position of Director of National Intelligence, have greatly escalated mass surveillance since 2001. A series of media reports in 2013 revealed more recent programs and techniques employed by the
US intelligence community The United States Intelligence Community (IC) is a group of separate US federal government, U.S. federal government intelligence agencies and subordinate organizations that work to conduct Intelligence assessment, intelligence activities which ...
. Advances in computer and information technology allow the creation of huge national databases that facilitate mass surveillance in the United States by DHS managed fusion centers, the CIA's Terrorist Threat Integration Center (TTIC) program, and the FBI's
Terrorist Screening Database The Terrorist Screening Database (TSDB) is the central terrorist watchlist consolidated by the Federal Bureau of Investigation's Terrorist Screening Center and used by multiple agencies to compile their specific watchlists and for screening. The li ...
(TSDB). Mass surveillance databases are also cited as responsible for profiling Latino Americans and contributing to "
self-deportation Self-deportation is an approach to dealing with illegal immigration, used in the United States and the United Kingdom, that allows an otherwise inadmissible person to voluntarily depart a country for which they have no legal ties to rather than fac ...
" techniques, or physical deportations by way of the DHS's ICEGang national database. After
World War I World War I or the First World War (28 July 1914 – 11 November 1918), also known as the Great War, was a World war, global conflict between two coalitions: the Allies of World War I, Allies (or Entente) and the Central Powers. Fighting to ...
, the US Army and State Department established the
Black Chamber The Black Chamber, officially the Cable and Telegraph Section and also known as the Cipher Bureau, was the first peacetime cryptanalytic organization in the United States, operating from 1917 to 1929. It was a forerunner of the National Security ...
, also known as the Cipher Bureau, which began operations in 1919. The Black Chamber was headed by Herbert O. Yardley, who had been a leader in the Army's Military Intelligence program. Regarded as a precursor to the National Security Agency, it conducted peacetime decryption of material including diplomatic communications until 1929. In the advent of
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
, the
Office of Censorship The Office of Censorship was an emergency wartime agency set up by the United States federal government on December 19, 1941, to aid in the censorship of all communications coming into and going out of the United States, including its territories ...
was established. The wartime agency monitored "communications by mail, cable, radio, or other means of transmission passing between the United States and any foreign country"."Return to Sender: U.S. Censorship of Enemy Alien Mail in World War II"
Louis Fiset, ''Prologue Magazine'', Vol. 33, No. 1 (Spring 2001). Retrieved 5 October 2013.
This included the 350,000 overseas cables and telegrams and 25,000 international telephone calls made each week. "Every letter that crossed international or U.S. territorial borders from December 1941 to August 1945 was subject to being opened and scoured for details." With the end of
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
,
Project SHAMROCK Project SHAMROCK was the sister project to Project MINARET, an espionage exercise started in August 1945. Project MINARET involved the accumulation of all telegraphic data that entered or exited the United States. The Armed Forces Security Agency ...
was established in 1945. The organization was created to accumulate telegraphic data entering and exiting from the United States. Major communication companies such as
Western Union The Western Union Company is an American multinational financial services corporation headquartered in Denver, Denver, Colorado. Founded in 1851 as the New York and Mississippi Valley Printing Telegraph Company in Rochester, New York, the co ...
, RCA Global and ITT World Communications actively aided the project, allowing American intelligence officials to gain access to international message traffic. Under the project, and many subsequent programs, no precedent had been established for judicial authorization, and no warrants were issued for surveillance activities. The project was terminated in 1975. President
Harry S. Truman Harry S. Truman (May 8, 1884December 26, 1972) was the 33rd president of the United States, serving from 1945 to 1953. As the 34th vice president in 1945, he assumed the presidency upon the death of Franklin D. Roosevelt that year. Subsequen ...
established the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(
NSA The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
) in 1952 for the purposes of collecting, processing, and monitoring intelligence data. The existence of NSA was not known to people as the memorandum by President Truman was classified. When the Citizens' Commission to Investigate the FBI published stolen FBI documents revealing abuse of intelligence programs in 1971, Senator
Frank Church Frank Forrester Church III (July 25, 1924 – April 7, 1984) was an American politician and lawyer. A Democrat, from 1957 to 1981 he served as a U.S. Senator from Idaho, and is currently the last Democrat to do so. He was the longest serving De ...
began an investigation into the programs that become known as the
Church Committee The Church Committee (formally the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities) was a US Senate select committee in 1975 that investigated abuses by the Central Intelligence ...
. The committee sought to investigate intelligence abuses throughout the 1970s. Following a report provided by the committee outlining egregious abuse, in 1976 Congress established the
Senate Select Committee on Intelligence The United States Senate Select Committee on Intelligence (sometimes referred to as the Intelligence Committee or SSCI) is dedicated to overseeing the United States Intelligence Community—the agencies and bureaus of the federal government of ...
. It would later be joined by the
Foreign Intelligence Surveillance Court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants ag ...
in 1978. The institutions worked to limit the power of the agencies, ensuring that surveillance activities remained within the rule of law. Following the attacks of
September 11, 2001 The September 11 attacks, also known as 9/11, were four coordinated Islamist terrorist suicide attacks by al-Qaeda against the United States in 2001. Nineteen terrorists hijacked four commercial airliners, crashing the first two into ...
,
Congress A congress is a formal meeting of the representatives of different countries, constituent states, organizations, trade unions, political parties, or other groups. The term originated in Late Middle English to denote an encounter (meeting of ...
passed the Patriot Act to strengthen security and intelligence efforts. The act granted the President broad powers on the war against terror, including the power to bypass the FISA Court for surveillance orders in cases of national security. Additionally, mass surveillance activities were conducted alongside various other surveillance programs under the head of
President's Surveillance Program The President's Surveillance Program (PSP) is a collection of secret intelligence activities authorized by the President of the United States George W. Bush after the September 11 attacks in 2001 as part of the War on Terrorism. Information co ...
. Under pressure from the public, the warrantless wiretapping program was allegedly ended in January 2007. Many details about the surveillance activities conducted in the United States were revealed in the disclosure by
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
in June 2013. Regarded as one of the biggest media leaks in the United States, it presented extensive details about the surveillance programs of the NSA, that involved interception of Internet data and telephonic calls from over a billion users, across various countries.


National Security Agency (NSA)

1947: The National Security Act was signed by President Truman, establishing a National Security Council. 1949: The Armed Forces Security Agency was established to coordinate signal operations between military branches. 1952: The
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA) was officially established by President Truman by way of a National Security Council Intelligence Directive 9, dated Oct. 24, while the NSA officially came into existence days later on Nov. 4. According to ''
The New York Times ''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'', the NSA was created in "absolute secrecy" by President Truman, whose surveillance-minded administration ordered, only six weeks after President Truman took office,
wiretaps Wiretapping, also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connecti ...
on the telephones of
Thomas Gardiner Corcoran Thomas Gardiner Corcoran (December 29, 1900 – December 6, 1981) was an Irish-American legal scholar. He was one of several advisors in President Franklin D. Roosevelt's brain trust during the New Deal, and later, a close friend and advisor ...
, a close advisor of
Franklin D. Roosevelt Franklin Delano Roosevelt (January 30, 1882April 12, 1945), also known as FDR, was the 32nd president of the United States, serving from 1933 until his death in 1945. He is the longest-serving U.S. president, and the only one to have served ...
. The recorded conversations are currently kept at the
Harry S. Truman Presidential Library and Museum The Harry S. Truman Presidential Library and Museum is the Presidential library system, presidential library and resting place of Harry S. Truman, Harry S Truman, the List of presidents of the United States, 33rd president of the United States ( ...
, along with other documents considered sensitive
≈233,600 pages
.


Federal Bureau of Investigation (FBI)

Institutional domestic surveillance was founded in 1896 with the National Bureau of Criminal Identification, which evolved by 1908 into the Bureau of Investigation, operated under the authority of the Department of Justice. In 1935, the FBI had grown into an independent agency under the direction of J. Edgar Hoover whose staff, through the use of wire taps, cable taps, mail tampering, garbage filtering and infiltrators, prepared secret
FBI Index The FBI Indexes, or Index List, was a system used to track American citizens and other people by the Federal Bureau of Investigation (FBI) before the adoption of computerized databases. The Index List was originally made of paper index cards, fir ...
Lists on more than 10 million people by 1939. Purported to be chasing 'communists' and other alleged subversives, the FBI used public and private pressure to destroy the lives of those it targeted during
McCarthyism McCarthyism is a political practice defined by the political repression and persecution of left-wing individuals and a Fear mongering, campaign spreading fear of communist and Soviet influence on American institutions and of Soviet espionage i ...
, including those lives of the Hollywood 10 with the
Hollywood blacklist The Hollywood blacklist was the mid-20th century banning of suspected Communists from working in the United States entertainment industry. The blacklisting, blacklist began at the onset of the Cold War and Red Scare#Second Red Scare (1947–1957 ...
. The FBI's surveillance and investigation roles expanded in the 1950s while using the collected information to facilitate political assassinations, including the murders of
Fred Hampton Fredrick Allen Hampton Sr. (August 30, 1948 – December 4, 1969) was an American activist and revolutionary socialist. He came to prominence in his late teens and early 20s in Chicago as deputy chairman of the national Black Panther Party and c ...
and Mark Clark in 1969. FBI is also directly connected to the bombings, assassinations, and deaths of other people including Malcolm X in 1963, Viola Liuzzo in 1965, Dr. Martin Luther King Jr. in 1968, Anna Mae Pictou Aquash in 1976, and Judi Bari in 1990. As the extent of the FBI's domestic surveillance continued to grow, many celebrities were also secretly investigated by the bureau, including: * First Lady
Eleanor Roosevelt Anna Eleanor Roosevelt ( ; October 11, 1884November 7, 1962) was an American political figure, diplomat, and activist. She was the longest-serving First Lady of the United States, first lady of the United States, during her husband Franklin D ...
– A vocal critic of Hoover who likened the FBI to an 'American Gestapo' for its Index lists. Roosevelt also spoke out against anti-Japanese prejudice during the second world war, and was later a delegate to the United Nations and instrumental in creating the
Universal Declaration of Human Rights The Universal Declaration of Human Rights (UDHR) is an international document adopted by the United Nations General Assembly that enshrines the Human rights, rights and freedoms of all human beings. Drafted by a UN Drafting of the Universal D ...
. Th
3,000-page
FBI dossier on Eleanor Roosevelt reveals Hoover's close monitoring of her activities and writings, and contains retaliatory charges against her for suspected Communist activities. *
Frank Sinatra Francis Albert Sinatra (; December 12, 1915 – May 14, 1998) was an American singer and actor. Honorific nicknames in popular music, Nicknamed the "Chairman of the Board" and "Ol' Blue Eyes", he is regarded as one of the Time 100: The Most I ...
– Hi
1,300 page
FBI dossier, dating from 1943, contains allegations about Sinatra's possible ties to the American Communist Party. The FBI spent several decades tracking Sinatra and his associates. *
Marilyn Monroe Marilyn Monroe ( ; born Norma Jeane Mortenson; June 1, 1926 August 4, 1962) was an American actress and model. Known for playing comic "Blonde stereotype#Blonde bombshell, blonde bombshell" characters, she became one of the most popular sex ...
– Her FBI dossier begins in 1955 and continues up until the months before her death. It focuses mostly on her travels and associations, searching for signs of leftist views and possible ties to
communism Communism () is a political sociology, sociopolitical, political philosophy, philosophical, and economic ideology, economic ideology within the history of socialism, socialist movement, whose goal is the creation of a communist society, a ...
. Her ex-husband,
Arthur Miller Arthur Asher Miller (October 17, 1915 – February 10, 2005) was an American playwright, essayist and screenwriter in the 20th-century American theater. Among his most popular plays are '' All My Sons'' (1947), '' Death of a Salesman'' (1 ...
, was also monitored. Monroe's FBI dossier is "heavily censored", but
"reprocessed" version
has been released by the FBI to the public. *
John Lennon John Winston Ono Lennon (born John Winston Lennon; 9 October 19408 December 1980) was an English singer-songwriter, musician and activist. He gained global fame as the founder, co-lead vocalist and rhythm guitarist of the Beatles. Lennon's ...
– In 1971, shortly after Lennon arrived in the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
on a visa to meet up with
anti-war activists An anti-war movement is a social movement in opposition to one or more nations' decision to start or carry on an armed conflict. The term ''anti-war'' can also refer to pacifism, which is the opposition to all use of military force during conf ...
, the FBI placed Lennon under surveillance, and the U.S. government tried to deport him from the country. At that time, opposition to the
Vietnam War The Vietnam War (1 November 1955 – 30 April 1975) was an armed conflict in Vietnam, Laos, and Cambodia fought between North Vietnam (Democratic Republic of Vietnam) and South Vietnam (Republic of Vietnam) and their allies. North Vietnam w ...
had reached a peak and Lennon often showed up at political rallies to sing his anti-war anthem "''
Give Peace a Chance "Give Peace a Chance" is an anti-war song written by John Lennon (originally credited to Lennon–McCartney), and recorded with the participation of a small group of friends in a performance with Yoko Ono in a hotel room in Montreal, Quebec, C ...
''". The U.S. government argued that Lennon'
300 page
FBI dossier was particularly sensitive because its release may "lead to foreign diplomatic, economic and military retaliation against the United States", and therefore only approved a "heavily censored" version. *
The Beatles The Beatles were an English Rock music, rock band formed in Liverpool in 1960. The core lineup of the band comprised John Lennon, Paul McCartney, George Harrison and Ringo Starr. They are widely regarded as the Cultural impact of the Beatle ...
, of which John Lennon was a member, had
separate FBI dossier
1967–73: The now-defunct Project MINARET was created to spy on U.S. citizens. At the request of the
U.S. Army The United States Army (USA) is the primary land service branch of the United States Department of Defense. It is designated as the Army of the United States in the United States Constitution.Article II, section 2, clause 1 of the United Stat ...
, those who protested against the
Vietnam War The Vietnam War (1 November 1955 – 30 April 1975) was an armed conflict in Vietnam, Laos, and Cambodia fought between North Vietnam (Democratic Republic of Vietnam) and South Vietnam (Republic of Vietnam) and their allies. North Vietnam w ...
were put on the NSA's "watch list".


Church committee review

1975: The
Church Committee The Church Committee (formally the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities) was a US Senate select committee in 1975 that investigated abuses by the Central Intelligence ...
of the
United States Senate The United States Senate is a chamber of the Bicameralism, bicameral United States Congress; it is the upper house, with the United States House of Representatives, U.S. House of Representatives being the lower house. Together, the Senate and ...
was set up to investigate widespread intelligence abuses by the NSA,
CIA The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
and
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
. Domestic surveillance, authorized by the highest
executive Executive ( exe., exec., execu.) may refer to: Role or title * Executive, a senior management role in an organization ** Chief executive officer (CEO), one of the highest-ranking corporate officers (executives) or administrators ** Executive dir ...
branch of the federal government, spanned from the FDR Administration to the
Presidency of Richard Nixon Richard Nixon's tenure as the List of presidents of the United States, 37th president of the United States began with First inauguration of Richard Nixon, his first inauguration on January 20, 1969, and ended when he resigned on August 9, 19 ...
. The following examples were reported by the Church Committee: * President Roosevelt asked the FBI to put in its files the names of citizens sending telegrams to the White House opposing his "national defense" policy and supporting Col.
Charles Lindbergh Charles Augustus Lindbergh (February 4, 1902 – August 26, 1974) was an American aviator, military officer, and author. On May 20–21, 1927, he made the first nonstop flight from New York (state), New York to Paris, a distance of . His aircra ...
. *
President Truman Harry S. Truman (May 8, 1884December 26, 1972) was the 33rd president of the United States, serving from 1945 to 1953. As the 34th Vice president of the United States, vice president in 1945, he assumed the presidency upon the death of Frank ...
received inside information on a former Roosevelt aide's efforts to influence his appointments, labor union negotiating plans, and the publishing plans of journalists. *
President Eisenhower Dwight David "Ike" Eisenhower (born David Dwight Eisenhower; October 14, 1890 – March 28, 1969) was the 34th president of the United States, serving from 1953 to 1961. During World War II, he was Supreme Commander of the Allied Expeditionary ...
received reports on purely political and social contacts with foreign officials by
Bernard Baruch Bernard Mannes Baruch (August 19, 1870 – June 20, 1965) was an American financier and statesman. After amassing a fortune on the New York Stock Exchange, he impressed President Woodrow Wilson by managing the nation's economic mobilization in W ...
,
Eleanor Roosevelt Anna Eleanor Roosevelt ( ; October 11, 1884November 7, 1962) was an American political figure, diplomat, and activist. She was the longest-serving First Lady of the United States, first lady of the United States, during her husband Franklin D ...
, and Supreme Court Justice
William O. Douglas William Orville Douglas (October 16, 1898January 19, 1980) was an American jurist who served as an associate justice of the Supreme Court of the United States from 1939 to 1975. Douglas was known for his strong progressive and civil libertari ...
. * The
Kennedy administration John F. Kennedy's tenure as the List of presidents of the United States, 35th president of the United States began with Inauguration of John F. Kennedy, his inauguration on January 20, 1961, and ended with Assassination of John F. Kennedy, his ...
ordered the FBI to wiretap a congressional staff member, three executive officials, a lobbyist, and a Washington law firm.
US Attorney General The United States attorney general is the head of the United States Department of Justice and serves as the chief law enforcement officer of the federal government. The attorney general acts as the principal legal advisor to the president of the ...
Robert F. Kennedy Robert Francis Kennedy (November 20, 1925 – June 6, 1968), also known as RFK, was an American politician and lawyer. He served as the 64th United States attorney general from January 1961 to September 1964, and as a U.S. senator from New Yo ...
received data from an FBI wire tap on
Martin Luther King Jr. Martin Luther King Jr. (born Michael King Jr.; January 15, 1929 – April 4, 1968) was an American Baptist minister, civil and political rights, civil rights activist and political philosopher who was a leader of the civil rights move ...
and an electronic listening device targeting a congressman, both of which yielded information of a political nature. * President Johnson asked the FBI to conduct "name checks" on his critics and members of the staff of his 1964 opponent, Senator
Barry Goldwater Barry Morris Goldwater (January 2, 1909 – May 29, 1998) was an American politician and major general in the United States Air Force, Air Force Reserve who served as a United States senator from 1953 to 1965 and 1969 to 1987, and was the Re ...
. He also requested purely political intelligence on his critics in the Senate, and received extensive intelligence reports on political activity at the
1964 Democratic Convention The 1964 Democratic National Convention of the Democratic Party, took place at Boardwalk Hall in Atlantic City, New Jersey, from August 24 to 27, 1964. President Lyndon B. Johnson was nominated for a full term. Senator Hubert H. Humphrey of ...
from FBI electronic surveillance. *
President Nixon Richard Milhous Nixon (January 9, 1913April 22, 1994) was the 37th president of the United States, serving from 1969 until his resignation in 1974. A member of the Republican Party, he previously served as the 36th vice president under P ...
authorized a program of wiretaps which produced for the White House purely political or personal information unrelated to national security, including information about a
Supreme Court justice The Supreme Court of the United States is the highest-ranking judicial body in the United States. Its membership, as set by the Judiciary Act of 1869, consists of the chief justice of the United States and eight associate justices, any six of ...
. Th
Final Report (Book II)
of the Church Committee revealed the following statistics: * Over 26,000 individuals were at one point catalogued on an FBI list of persons to be rounded up in the event of a "
national emergency A state of emergency is a situation in which a government is empowered to put through policies that it would normally not be permitted to do, for the safety and protection of its citizens. A government can declare such a state before, during, o ...
". * Over 500,000 domestic intelligence files were kept at the FBI headquarters, of which 65,000 were opened in 1972 alone. * At least 130,000 first class letters were opened and
photograph A photograph (also known as a photo, or more generically referred to as an ''image'' or ''picture'') is an image created by light falling on a photosensitivity, photosensitive surface, usually photographic film or an electronic image sensor. Th ...
ed by the FBI from 1940 to 1966. * A quarter of a million first class letters were opened and photographed by the CIA from 1953 to 1973. * Millions of private
telegram Telegraphy is the long-distance transmission of messages where the sender uses symbolic codes, known to the recipient, rather than a physical exchange of an object bearing the message. Thus flag semaphore is a method of telegraphy, whereas pi ...
s sent from, or to, through the United States were obtained by the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA), under a secret arrangement with U.S. telegraph companies, from 1947 to 1975. * Over 100,000 Americans have been indexed in
U.S. Army The United States Army (USA) is the primary land service branch of the United States Department of Defense. It is designated as the Army of the United States in the United States Constitution.Article II, section 2, clause 1 of the United Stat ...
intelligence files. * About 300,000 individuals were indexed in a CIA computer system during the course of
Operation CHAOS Operation CHAOS or Operation MHCHAOS was a Central Intelligence Agency (CIA) domestic espionage project targeting American citizens operating from 1967 to 1974, established by President Lyndon B. Johnson and expanded under President Richard Nixon ...
. * Intelligence files on more than 11,000 individuals and groups were created by the
Internal Revenue Service The Internal Revenue Service (IRS) is the revenue service for the Federal government of the United States, United States federal government, which is responsible for collecting Taxation in the United States, U.S. federal taxes and administerin ...
(IRS), with tax investigations "done on the basis of political rather than tax criteria". In response to the committee's findings, the
United States Congress The United States Congress is the legislature, legislative branch of the federal government of the United States. It is a Bicameralism, bicameral legislature, including a Lower house, lower body, the United States House of Representatives, ...
passed the
Foreign Intelligence Surveillance Act The Foreign Intelligence Surveillance Act of 1978 (FISA, , ) is a Law of the United States, United States federal law that establishes procedures for the surveillance and collection of foreign intelligence on domestic soil.United States Foreign Intelligence Surveillance Court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a United States federal courts, U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests ...
, which was authorized to issue surveillance
warrants Warrant may refer to: * Warrant (law), a form of specific authorization ** Arrest warrant, authorizing the arrest and detention of an individual ** Search warrant, a court order issued that authorizes law enforcement to conduct a search for eviden ...
. Several decades later in 2013, the presiding judge of the FISA Court,
Reggie Walton Reggie Barnett Walton (born February 8, 1949) is a senior United States district judge of the United States District Court for the District of Columbia. He is a former presiding judge of the Foreign Intelligence Surveillance Court. Early li ...
, told ''
The Washington Post ''The Washington Post'', locally known as ''The'' ''Post'' and, informally, ''WaPo'' or ''WP'', is an American daily newspaper published in Washington, D.C., the national capital. It is the most widely circulated newspaper in the Washington m ...
'' that the court only has a limited ability to supervise the government's surveillance, and is therefore "forced" to rely upon the accuracy of the information that is provided by federal agents. On August 17, 1975 Senator Frank Church stated on NBC's "Meet the Press" without mentioning the name of the NSA about this agency:


ECHELON

In 1988 an article titled "Somebody's listening" by Duncan Campbell in the ''
New Statesman ''The New Statesman'' (known from 1931 to 1964 as the ''New Statesman and Nation'') is a British political and cultural news magazine published in London. Founded as a weekly review of politics and literature on 12 April 1913, it was at first c ...
'' described the signals-intelligence gathering activities of a program code-named "
ECHELON Echelon may refer to: * A level formation ** A level or rank in an organization, profession, or society ** A military sub-subunit smaller than a company but larger than a platoon ** Echelon formation, a step-like arrangement of units * ECHELO ...
". The program was engaged by English-speaking World War II Allied countries – Australia, Canada, New Zealand, the United Kingdom and the United States (collectively known as
AUSCANNZUKUS AUSCANNZUKUS is an abbreviation for the naval Command, Control, Communications and Computers (C4) interoperability organization involving the Anglosphere nations of Australia, Canada, New Zealand, the United Kingdom, and the United States. It is a ...
). It was created by the five countries to monitor the military and diplomatic communications of the
Soviet Union The Union of Soviet Socialist Republics. (USSR), commonly known as the Soviet Union, was a List of former transcontinental countries#Since 1700, transcontinental country that spanned much of Eurasia from 1922 until Dissolution of the Soviet ...
and of its
Eastern Bloc The Eastern Bloc, also known as the Communist Bloc (Combloc), the Socialist Bloc, the Workers Bloc, and the Soviet Bloc, was an unofficial coalition of communist states of Central and Eastern Europe, Asia, Africa, and Latin America that were a ...
allies during the
Cold War The Cold War was a period of global Geopolitics, geopolitical rivalry between the United States (US) and the Soviet Union (USSR) and their respective allies, the capitalist Western Bloc and communist Eastern Bloc, which lasted from 1947 unt ...
in the early 1960s. By the 1990s the ECHELON system could intercept satellite transmissions,
public switched telephone network The public switched telephone network (PSTN) is the aggregate of the world's telephone networks that are operated by national, regional, or local telephony operators. It provides infrastructure and services for public telephony. The PSTN consists o ...
(PSTN) communications (including most Internet traffic), and transmissions carried by microwave. The New Zealand journalist
Nicky Hager Nicolas Alfred Hager (born 1958) is a New Zealand investigative journalist. He has produced seven books since 1996, covering topics such as intelligence networks, environmental issues and politics. He is one of two New Zealand members of the I ...
provided a detailed description of ECHELON in his 1996 book ''Secret Power''. While some member governments denied the existence of ECHELON, a report by a committee of the
European Parliament The European Parliament (EP) is one of the two legislative bodies of the European Union and one of its seven institutions. Together with the Council of the European Union (known as the Council and informally as the Council of Ministers), it ...
in 2001 confirmed the program's use and warned Europeans about its reach and effects.Fiddler, Stephen (1 July 2013)
Echoes of Echelon in Charges of NSA Spying in Europe
''The Washington Post''.
The European Parliament stated in its report that the term "ECHELON" occurred in a number of contexts, but that the evidence presented indicated it was a signals-intelligence collection system capable of interception and content-inspection of telephone calls, fax, e-mail and other data-traffic globally.
James Bamford James Bamford (born September 15, 1946) is an American author, journalist and documentary producer noted for his writing about United States intelligence agencies, especially the National Security Agency (NSA). ''The New York Times'' has calle ...
further described the capabilities of ECHELON in ''Body of Secrets'' (2002) about the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
.Bamford, James; Body of Secrets, Anchor, ; 2002 Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement have, over the years, caused considerable public concern.


Escalation following September 11, 2001 attacks

In the aftermath of the September 2001 attacks on the World Trade Center and the Pentagon, bulk domestic spying in the United States increased dramatically. The desire to prevent future attacks of this scale led to the passage of the Patriot Act. Later acts include the Protect America Act (which removes the warrant requirement for government surveillance of foreign targets) and the
FISA Amendments Act The FISA Amendments Act of 2008, also called the FAA and Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, is an Act of Congress that Rescind or amend something previously adopted, amended the Foreign Intelligence Surveilla ...
(which relaxed some of the original FISA court requirements). In 2002, "
Total Information Awareness Total Information Awareness (TIA) was a mass detection program by the United States Information Awareness Office. It operated under this title from February to May 2003 before being renamed Terrorism Information Awareness. Based on the concep ...
" was established by the U.S. government in order to "revolutionize the ability of the United States to detect, classify and identify foreign terrorists". In 2005, a report about President Bush's
President's Surveillance Program The President's Surveillance Program (PSP) is a collection of secret intelligence activities authorized by the President of the United States George W. Bush after the September 11 attacks in 2001 as part of the War on Terrorism. Information co ...
appeared in ''The New York Times''. According to reporters
James Risen James Risen (born April 27, 1955) is an American journalist for '' The Intercept''. He previously worked for ''The New York Times'' and before that for ''Los Angeles Times''. He has written or co-written many articles concerning U.S. governmen ...
and
Eric Lichtblau Eric Lichtblau (born 1965) is an American journalist, reporting for ''The New York Times'' in the Washington bureau, as well as the ''Los Angeles Times'', ''Time'' magazine, ''The New Yorker'', and the CNN network's investigative news unit. He h ...
, the actual publication of their report was delayed for a year because "The
White House The White House is the official residence and workplace of the president of the United States. Located at 1600 Pennsylvania Avenue Northwest (Washington, D.C.), NW in Washington, D.C., it has served as the residence of every U.S. president ...
asked ''The New York Times'' not to publish this article". Also in 2005, the existence of STELLARWIND was revealed by Thomas Tamm. In 2006,
Mark Klein Mark Lee Klein (May 2, 1945 – March 8, 2025) was an American AT&T technician and whistleblower who revealed details of the company's cooperation with the United States National Security Agency in installing network hardware at a site known a ...
revealed the existence of
Room 641A Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency, as part of an American mass surveillance program. The facility commenced operations in 2003 and its purpose was publicly revealed ...
that he had wired back in 2003. In 2008, Babak Pasdar, a computer security expert, and CEO of Bat Blue publicly revealed the existence of the "Quantico circuit", that he and his team found in 2003. He described it as a back door to the federal government in the systems of an unnamed wireless provider; the company was later independently identified as
Verizon Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
. The NSA's database of American's phone calls was made public in 2006 by ''
USA Today ''USA Today'' (often stylized in all caps) is an American daily middle-market newspaper and news broadcasting company. Founded by Al Neuharth in 1980 and launched on September 14, 1982, the newspaper operates from Gannett's corporate headq ...
'' journalist Leslie Cauley in an article titled, "NSA has massive database of Americans' phone calls." The article cites anonymous sources that described the program's reach on American citizens:
... it means that the government has detailed records of calls they made — across town or across the country — to family members, co-workers, business contacts and others. The three telecommunications companies are working under contract with the NSA, which launched the program in 2001 shortly after the Sept. 11 terrorist attacks.
In 2009, ''The New York Times'' cited several anonymous intelligence officials alleging that "the N.S.A. made Americans targets in eavesdropping operations based on insufficient evidence tying them to terrorism" and "the N.S.A. tried to wiretap a member of Congress without a warrant".


Acceleration of media leaks (2010–present)

On 15 March 2012, the American magazine ''
Wired Wired may refer to: Arts, entertainment, and media Music * ''Wired'' (Jeff Beck album), 1976 * ''Wired'' (Hugh Cornwell album), 1993 * ''Wired'' (Mallory Knox album), 2017 * "Wired", a song by Prism from their album '' Beat Street'' * "Wired ...
'' published an article with the headline "The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)", which was later mentioned by U.S. Rep.
Hank Johnson Henry Calvin Johnson Jr. (born October 2, 1954) is an American lawyer and politician serving as the U.S. representative for since 2007. He is a member of the Democratic Party. The district is anchored in Atlanta's inner eastern suburbs, inclu ...
during a congressional hearing. In response to Johnson's inquiry, NSA director Keith B. Alexander testified that these allegations made by ''
Wired Wired may refer to: Arts, entertainment, and media Music * ''Wired'' (Jeff Beck album), 1976 * ''Wired'' (Hugh Cornwell album), 1993 * ''Wired'' (Mallory Knox album), 2017 * "Wired", a song by Prism from their album '' Beat Street'' * "Wired ...
'' magazine were untrue:


2013 mass surveillance disclosures

On 6 June 2013, Britain's ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
'' newspaper began publishing a series of revelations by an unnamed American whistleblower, revealed several days later to be former CIA and NSA-contracted systems analyst
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
. Snowden gave a cache of internal documents in support of his claims to two journalists:
Glenn Greenwald Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author, and former lawyer. In 1996, Greenwald founded a law firm concentrating on First Amendment to the United States Constitution, First Amendment litigation. He began blo ...
and
Laura Poitras Laura Poitras (; born February 2, 1964) is an American director and producer of documentary films. Poitras has received numerous awards for her work, including the 2015 Academy Award for Best Documentary Feature for ''Citizenfour'', about Edwa ...
, Greenwald later estimated that the cache contains 15,000–20,000 documents, some very large and very detailed, and some very small. This was one of the largest
news leak A news leak is the unsanctioned release of confidential information to news media. It can also be the premature publication of information by a news outlet, of information that it has agreed not to release before a specified time, in violation of a ...
s in the modern
history of the United States The history of the present-day United States began in roughly 15,000 BC with the arrival of Peopling of the Americas, the first people in the Americas. In the late 15th century, European colonization of the Americas, European colonization beg ...
. In over two months of publications, it became clear that the NSA operates a complex web of spying programs which allow it to intercept internet and telephone conversations from over a billion users from dozens of countries around the world. Specific revelations have been made about China, the European Union, Latin America, Iran and Pakistan, and Australia and New Zealand, however the published documentation reveals that many of the programs indiscriminately collect bulk information directly from central servers and internet backbones, which almost invariably carry and reroute information from distant countries. Due to this central server and backbone monitoring, many of the programs overlap and interrelate among one another. These programs are often done with the assistance of US entities such as the
United States Department of Justice The United States Department of Justice (DOJ), also known as the Justice Department, is a United States federal executive departments, federal executive department of the U.S. government that oversees the domestic enforcement of Law of the Unite ...
and the
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
,How Microsoft handed the NSA access to encrypted messages
''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
'', 12 July 2013. Retrieved 13 July 2013.
are sanctioned by US laws such as the
FISA Amendments Act The FISA Amendments Act of 2008, also called the FAA and Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, is an Act of Congress that Rescind or amend something previously adopted, amended the Foreign Intelligence Surveilla ...
, and the necessary court orders for them are signed by the secret
Foreign Intelligence Surveillance Court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants ag ...
. In addition to this, many of the NSA's programs are directly aided by national and foreign intelligence services, Britain's
GCHQ Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
and Australia's DSD, as well as by large private telecommunications and Internet corporations, such as
Verizon Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
,
Telstra Telstra Group Limited is an Australian telecommunications company that builds and operates telecommunications networks and markets related products and services. It is a member of the S&P/ASX 20 stock index, and is Australia's largest telecomm ...
,
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
and Facebook. On 9 June 2013,
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
told ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
'': The US government has aggressively sought to dismiss and challenge Fourth Amendment cases raised: '' Hepting v. AT&T'', '' Jewel v. NSA'', ''
Clapper v. Amnesty International ''Clapper v. Amnesty International USA'', 568 U.S. 398 (2013), was a Supreme Court of the United States, United States Supreme Court case in which the Court held that Amnesty International USA and others lacked Standing (law), standing to challen ...
'', ''Al-Haramain Islamic Foundation v. Obama'', and '' Center for Constitutional Rights v. Bush''. The government has also granted retroactive immunity to ISPs and telecoms participating in domestic surveillance. The US district court judge for the District of Columbia, Richard Leon, declared on December 16, 2013 that the mass collection of metadata of Americans' telephone records by the National Security Agency probably violates the Fourth Amendment prohibition of unreasonable searches and seizures.
Given the limited record before me at this point in the litigation – most notably, the utter lack of evidence that a terrorist attack has ever been prevented because searching the NSA database was faster than other investigative tactics – I have serious doubts about the efficacy of the metadata collection program as a means of conducting time-sensitive investigations in cases involving imminent threats of terrorism.
"Plaintiffs have a substantial likelihood of showing that their privacy interests outweigh the government's interest in collecting and analysing bulk telephony metadata and therefore the NSA's bulk collection program is indeed an unreasonable search under the fourth amendment," he wrote. "The Fourth Amendment typically requires 'a neutral and detached authority be interposed between the police and the public,' and it is offended by 'general warrants' and laws that allow searches to be conducted 'indiscriminately and without regard to their connections with a crime under investigation,'" he wrote. He added:
I cannot imagine a more 'indiscriminate' and 'arbitrary invasion' than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely such a program infringes on 'that degree of privacy' that the founders enshrined in the Fourth Amendment. Indeed I have little doubt that the author of our Constitution,
James Madison James Madison (June 28, 1836) was an American statesman, diplomat, and Founding Fathers of the United States, Founding Father who served as the fourth president of the United States from 1809 to 1817. Madison was popularly acclaimed as the ...
, who cautioned us to beware 'the abridgement of freedom of the people by gradual and silent encroachments by those in power,' would be aghast.
Leon granted the request for a preliminary injunction that blocks the collection of phone data for two private plaintiffs (Larry Klayman, a conservative lawyer, and Charles Strange, father of a cryptologist killed in Afghanistan when his helicopter was shot down in 2011) and ordered the government to destroy any of their records that have been gathered. But the judge stayed action on his ruling pending a government appeal, recognizing in his 68-page opinion the "significant national security interests at stake in this case and the novelty of the constitutional issues."


H.R.4681 – Intelligence Authorization Act for Fiscal Year 2015

On 20 May 2014,
U.S. Representative The United States House of Representatives is a chamber of the bicameral United States Congress; it is the lower house, with the U.S. Senate being the upper house. Together, the House and Senate have the authority under Article One of th ...
for Republican congressman Mike Rogers introduced Intelligence Authorization Act for Fiscal Year 2015 with the goal of authorizing appropriations for fiscal years 2014 and 2015 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the
Central Intelligence Agency The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
(CIA) Retirement and Disability System, and for other purposes. Some of its measures cover the limitation on retention. A covered communication (meaning any nonpublic telephone or electronic communication acquired without the consent of a person who is a party to the communication, including communications in electronic storage) shall not be retained in excess of 5 years, unless: (i) the communication has been affirmatively determined, in whole or in part, to constitute foreign intelligence or counterintelligence or is necessary to understand or assess foreign intelligence or counterintelligence; (ii) the communication is reasonably believed to constitute evidence of a crime and is retained by a law enforcement agency; (iii) the communication is enciphered or reasonably believed to have a secret meaning; (iv) all parties to the communication are reasonably believed to be non-United States persons; (v) retention is necessary to protect against an imminent threat to human life, in which case both the nature of the threat and the information to be retained shall be reported to the congressional intelligence committees not later than 30 days after the date such retention is extended under this clause; (vi) retention is necessary for technical assurance or compliance purposes, including a court order or discovery obligation, in which case access to information retained for technical assurance or compliance purposes shall be reported to the congressional intelligence committees on an annual basis; (vii) retention for a period in excess of 5 years is approved by the head of the element of the intelligence community responsible for such retention, based on a determination that retention is necessary to protect the national security of the United States, in which case the head of such element shall provide to the congressional intelligence committees a written certification describing (I) the reasons extended retention is necessary to protect the national security of the United States; (II) the duration for which the head of the element is authorizing retention; (III) the particular information to be retained; and (IV) the measures the element of the intelligence community is taking to protect the privacy interests of United States persons or persons located inside the United States. On 10 December 2014, Republican
U.S. Representative The United States House of Representatives is a chamber of the bicameral United States Congress; it is the lower house, with the U.S. Senate being the upper house. Together, the House and Senate have the authority under Article One of th ...
for member of
Congress A congress is a formal meeting of the representatives of different countries, constituent states, organizations, trade unions, political parties, or other groups. The term originated in Late Middle English to denote an encounter (meeting of ...
Justin Amash criticized the act on his Facebook as being "one of the most egregious sections of law I've encountered during my time as a representative" and "It grants the executive branch virtually unlimited access to the communications of every American".


USA Freedom Act

The
USA Freedom Act The USA Freedom Act (, ) is a U.S. law enacted on June 2, 2015, that restored and modified several provisions of the Patriot Act, which had expired the day before. The act imposes some new limits on the bulk collection of telecommunication meta ...
was signed into law on June 2, 2015, the day after certain provisions of the Patriot Act had expired. It mandated an end to bulk collection of phone call metadata by the NSA within 180 days, but allowed continued mandatory retention of metadata by phone companies with access by the government with case-by-case approval from the
Foreign Intelligence Surveillance Court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants ag ...
.


Modalities, concepts, and methods


Logging postal mail

Under the Mail Isolation Control and Tracking program, the U.S. Postal Service photographs the exterior of every piece of paper mail that is processed in the United States — about 160 billion pieces in 2012. The U.S. Postmaster General stated that the system is primarily used for mail sorting, but the images are available for possible use by law enforcement agencies. Created in 2001 following the anthrax attacks that killed five people, it is a sweeping expansion of a 100-year-old program called " mail cover" which targets people suspected of crimes. Together, the two programs show that postal mail is subject to the same kind of scrutiny that the National Security Agency gives to telephone calls, e-mail, and other forms of electronic communication."U.S. Postal Service Logging All Mail for Law Enforcement"
Ron Nixon, ''New York Times'', July 3, 2013. Retrieved 25 September 2013.
Mail cover surveillance requests are granted for about 30 days, and can be extended for up to 120 days. Images captured under the Mail Isolation Control and Tracking program are retained for a week to 30 days and then destroyed."AP Interview: USPS takes photos of all mail"
, Associated Press (AP), 2 August 2013.
There are two kinds of mail covers: those related to criminal activity and those requested to protect national security. Criminal activity requests average 15,000 to 20,000 per year, while the number of requests for national security mail covers has not been made public. Neither the Mail Isolation Control and Tracking program nor the mail cover program require prior approval by a judge. For both programs the information gathered is metadata from the outside of the envelope or package for which courts have said there is no
expectation of privacy In United States constitutional law, reasonable expectation of privacy is a legal test which is crucial in defining the scope of the applicability of the privacy protections of the Fourth Amendment to the U.S. Constitution. It is related to, ...
. Opening the mail to view its contents would require a warrant approved by a judge.


Wiretapping

Billions of dollars per year are spent, by agencies such as the
Information Awareness Office The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology ...
,
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
, and the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
, to develop, purchase, implement, and operate systems such as
Carnivore A carnivore , or meat-eater (Latin, ''caro'', genitive ''carnis'', meaning meat or "flesh" and ''vorare'' meaning "to devour"), is an animal or plant Plants are the eukaryotes that form the Kingdom (biology), kingdom Plantae; they ar ...
,
ECHELON Echelon may refer to: * A level formation ** A level or rank in an organization, profession, or society ** A military sub-subunit smaller than a company but larger than a platoon ** Echelon formation, a step-like arrangement of units * ECHELO ...
, and NarusInsight to intercept and analyze the immense amount of data that traverses the Internet and telephone system every day. The
Total Information Awareness Total Information Awareness (TIA) was a mass detection program by the United States Information Awareness Office. It operated under this title from February to May 2003 before being renamed Terrorism Information Awareness. Based on the concep ...
program, of the
Information Awareness Office The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology ...
, was formed in 2002 by the Pentagon and led by former rear admiral John Poindexter. The program designed numerous technologies to be used to perform mass surveillance. Examples include advanced
speech-to-text Speech recognition is an interdisciplinary subfield of computer science and computational linguistics that develops Methodology, methodologies and technologies that enable the recognition and translation of spoken language into text by computers. ...
programs (so that phone conversations can be monitored en-masse by a computer, instead of requiring human operators to listen to them),
social network analysis Social network analysis (SNA) is the process of investigating social structures through the use of networks and graph theory. It characterizes networked structures in terms of ''nodes'' (individual actors, people, or things within the network) ...
software to monitor groups of people and their interactions with each other, and "Human identification at a distance" software which allows computers to identify people on surveillance cameras by their facial features and gait (the way they walk). The program was later renamed " Terrorism Information Awareness", after a negative public reaction.


Legal foundations

The Communications Assistance for Law Enforcement Act (CALEA), passed in 1994, requires that all U.S. telecommunications companies modify their equipment to allow easy
wiretapping Wiretapping, also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connecti ...
of telephone, VoIP, and broadband Internet traffic. In 1999 two models of mandatory data retention were suggested for the US. The first model would record the
IP address An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
assigned to a customer at a specific time. In the second model, "which is closer to what Europe adopted", telephone numbers dialed, contents of Web pages visited, and recipients of e-mail messages must be retained by the
ISP An Internet service provider (ISP) is an organization that provides a myriad of services related to accessing, using, managing, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non ...
for an unspecified amount of time. In 2006 the
International Association of Chiefs of Police International Association of Chiefs of Police (IACP) is a nonprofit organization based in Alexandria, Virginia. It is the world's largest professional association for police leaders. Overview The International Association of Chiefs of Police ...
adopted a resolution calling for a "uniform data retention mandate" for "customer subscriber information and source and destination information." The
U.S. Department of Justice The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the U.S. government that oversees the domestic enforcement of federal laws and the administration of justice. It is equi ...
announced in 2011 that criminal investigations "are being frustrated" because no law currently exists to force Internet providers to keep track of what their customers are doing. The
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties. It provides funds for legal defense in court, ...
was involved in a lawsuit ( Hepting v. AT&T) against the telecom giant AT&T Inc. for its assistance to the U.S. government in monitoring the communications of millions of American citizens. Recently the documents, which were exposed by a whistleblower who had previously worked for AT&T, and showed schematics of the massive data mining system, were made public.


Internet communications

The FBI developed the computer programs "
Magic Lantern The magic lantern, also known by its Latin name , is an early type of image projector that uses pictures—paintings, prints, or photographs—on transparent plates (usually made of glass), one or more lens (optics), lenses, and a light source. ...
" and CIPAV, which it can remotely install on a computer system, in order to monitor a person's computer activity. The NSA has been gathering information on financial records, Internet surfing habits, and monitoring e-mails. It has also performed extensive surveillance on
social networks A social network is a social structure consisting of a set of social actors (such as individuals or organizations), networks of dyadic ties, and other social interactions between actors. The social network perspective provides a set of meth ...
such as Facebook. Recently, Facebook has revealed that, in the last six months of 2012, they handed over the private data of between 18,000 and 19,000 users to law enforcement of all types—including local police and federal agencies, such as the FBI, Federal Marshals and the NSA. One form of wiretapping utilized by the NSA is RADON, a bi-directional host tap that can inject Ethernet packets onto the same target. It allows bi-directional exploitation of Denied networks using standard on-net tools. The one limitation of RADON is that it is a USB device that requires a physical connection to a laptop or PC to work. RADON was created by a Massachusetts firm called Netragard. Their founder, Adriel Desautels, said about RADON, "it is our 'safe' malware. RADON is designed to enable us to infect customer systems in a safe and controllable manner. Safe means that every strand is built with an expiration date that, when reached, results in RADON performing an automatic and clean self-removal." The NSA is also known to have splitter sites in the United States. Splitter sites are places where a copy of every packet is directed to a secret room where it is analyzed by the Narus STA 6400, a deep packet inspection device. Although the only known location is at 611 Folsom Street, San Francisco, California, expert analysis of Internet traffic suggests that there are likely several locations throughout the United States.


Advertising data

In September 2022 the EFF and AP revealed their investigation into the use of advertising IDs to develop the Fog Reveal database. Fog Reveal aggregates location data from mobile applications, which is then supplied as a service to United States law enforcement agencies.


Intelligence apparatus to monitor Americans

Since the
September 11 attacks The September 11 attacks, also known as 9/11, were four coordinated Islamist terrorist suicide attacks by al-Qaeda against the United States in 2001. Nineteen terrorists hijacked four commercial airliners, crashing the first two into ...
, a vast domestic intelligence apparatus has been built to collect information using FBI, local police, state homeland security offices and military criminal investigators. The intelligence apparatus collects, analyzes and stores information about millions of (if not all) American citizens, most of whom have not been accused of any wrongdoing. Every state and local law enforcement agency is to feed information to federal authorities to support the work of the FBI. The
PRISM PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD . PRISM collects stored internet ...
special source operation system was enabled by the Protect America Act of 2007 under President Bush and the
FISA Amendments Act of 2008 The FISA Amendments Act of 2008, also called the FAA and Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, is an Act of Congress that amended the Foreign Intelligence Surveillance Act. It has been used as the legal basis f ...
, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017. According to ''The Register'', the FISA Amendments Act of 2008 "specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant" when one of the parties is outside the U.S. PRISM was first publicly revealed on 6 June 2013, after classified documents about the program were leaked to ''The Washington Post'' and ''The Guardian'' by
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
.


Telephones

In early 2006, ''
USA Today ''USA Today'' (often stylized in all caps) is an American daily middle-market newspaper and news broadcasting company. Founded by Al Neuharth in 1980 and launched on September 14, 1982, the newspaper operates from Gannett's corporate headq ...
'' reported that several major telephone companies were cooperating illegally with the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
to monitor the phone records of U.S. citizens, and storing them in a large database known as the
NSA call database MAINWAY is a database maintained by the United States' National Security Agency (NSA) containing metadata for hundreds of billions of telephone calls made through the largest telephone carriers in the United States, including AT&T, Verizon, and ...
. This report came on the heels of allegations that the
U.S. government The Federal Government of the United States of America (U.S. federal government or U.S. government) is the national government of the United States. The U.S. federal government is composed of three distinct branches: legislative, executi ...
had been conducting electronic surveillance of domestic telephone calls without warrants. Law enforcement and intelligence services in the United States possess technology to remotely activate the microphones in cell phones in order to listen to conversations that take place nearby the person who holds the phone."FBI using cell phone microphones to eavesdrop"
Eric Bangeman, ''Ars Technica'', 4 December 2006. Retrieved 17 September 2013.

Nicole Perlroth, ''New York Times'', 30 May 2012. Retrieved 20 September 2013.
U.S. federal agents regularly use mobile phones to collect location data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily (whether it is being used or not), using a technique known
multilateration Trilateration is the use of distances (or "ranges") for determining the unknown position coordinates of a point of interest, often around Earth ( geopositioning). When more than three distances are involved, it may be called multilateration, f ...
to calculate the differences in time for a signal to travel from the cell phone to each of several
cell towers A cell site, cell phone tower, cell base tower, or cellular base station is a cellular-enabled mobile device site where antennas and electronic communications equipment are placed (typically on a radio mast, tower, or other raised structure) ...
near the owner of the phone. In 2013, the existence of the
Hemisphere Project The Hemisphere Project, also known as Hemisphere (codenamed ''Hudson Hawk''), is a mass surveillance program conducted by US telecommunications company AT&T and funded by the White House Office of National Drug Control Policy and the Drug Enforc ...
, through which AT&T provides
call detail record A call detail record (CDR) is a data record produced by a telephone exchange or other telecommunications equipment that documents the details of a telephone call or other telecommunications transactions (e.g., text message) that passes through th ...
s to government agencies, became publicly known.


Infiltration of smartphones

As worldwide sales of
smartphone A smartphone is a mobile phone with advanced computing capabilities. It typically has a touchscreen interface, allowing users to access a wide range of applications and services, such as web browsing, email, and social media, as well as multi ...
s began exceeding those of
feature phone Feature may refer to: Computing * Feature recognition, could be a hole, pocket, or notch * Feature (computer vision), could be an edge, corner or blob * Feature (machine learning), in statistics: individual measurable properties of the phenome ...
s, the NSA decided to take advantage of the smartphone boom. This is particularly advantageous because the smartphone combines a
myriad In the context of numeric naming systems for powers of ten, myriad is the quantity ten thousand ( 10,000). Idiomatically, in English, ''myriad'' is an adjective used to mean that a group of things has indefinitely large quantity. ''Myriad ...
of data that would interest an intelligence agency, such as social contacts, user behavior, interests, location, photos and credit card numbers and passwords. An internal NSA report from 2010 stated that the spread of the smartphone has been occurring "extremely rapidly"—developments that "certainly complicate traditional target analysis." According to the document, the NSA has set up
task force A task force (TF) is a unit or formation established to work on a single defined task or activity. Originally introduced by the United States Navy, the term has now caught on for general usage and is a standard part of NATO terminology. Many ...
s assigned to several smartphone manufacturers and
operating systems An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs. Time-sharing operating systems scheduler (computing), schedule tasks for ...
, including
Apple Inc. Apple Inc. is an American multinational corporation and technology company headquartered in Cupertino, California, in Silicon Valley. It is best known for its consumer electronics, software, and services. Founded in 1976 as Apple Comput ...
's
iPhone The iPhone is a line of smartphones developed and marketed by Apple that run iOS, the company's own mobile operating system. The first-generation iPhone was announced by then–Apple CEO and co-founder Steve Jobs on January 9, 2007, at ...
and
iOS Ios, Io or Nio (, ; ; locally Nios, Νιός) is a Greek island in the Cyclades group in the Aegean Sea. Ios is a hilly island with cliffs down to the sea on most sides. It is situated halfway between Naxos and Santorini. It is about long an ...
operating system, as well as
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
's Android mobile operating system. Similarly, Britain's
GCHQ Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
assigned a team to study and crack the
BlackBerry BlackBerry is a discontinued brand of handheld devices and related mobile services, originally developed and maintained by the Canadian company Research In Motion (RIM, later known as BlackBerry Limited) until 2016. The first BlackBerry device ...
. Under the heading "iPhone capability", the document notes that there are smaller NSA programs, known as "scripts", that can perform surveillance on 38 different features of the iPhone 3 and
iPhone 4 The iPhone 4 is a smartphone that was developed and marketed by Apple Inc. It is the List of iPhone models, fourth generation of the iPhone lineup, succeeding the iPhone 3GS and preceding the iPhone 4s. Following a number of notable leaks, ...
operating systems. These include the
map A map is a symbolic depiction of interrelationships, commonly spatial, between things within a space. A map may be annotated with text and graphics. Like any graphic, a map may be fixed to paper or other durable media, or may be displayed on ...
ping feature,
voicemail A voicemail system (also known as voice message or voice bank) is a computer-based system that allows callers to leave a recorded message when the recipient has been unable (or unwilling) to answer the phone. Calls may be directed to voicemail m ...
and photos, as well as
Google Earth Google Earth is a web mapping, web and computer program created by Google that renders a 3D computer graphics, 3D representation of Earth based primarily on satellite imagery. The program maps the Earth by superimposition, superimposing satelli ...
,
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
and
Yahoo! Messenger Yahoo! Messenger (sometimes abbreviated Y!M) was an instant messaging client and associated protocol created and formerly operated by Yahoo!. Yahoo! Messenger was provided free of charge and could be downloaded and used with a generic "Yahoo I ...
.


Data mining of subpoenaed records

The
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
collected nearly all hotel, airline, rental car, gift shop, and casino records in
Las Vegas Las Vegas, colloquially referred to as Vegas, is the most populous city in the U.S. state of Nevada and the county seat of Clark County. The Las Vegas Valley metropolitan area is the largest within the greater Mojave Desert, and second-l ...
during the last two weeks of 2003. The FBI requested all electronic data of hundreds of thousands of people based on a very general lead for the Las Vegas New Year's celebration. The Senior VP of
The Mirage The Mirage is a defunct casino resort on the Las Vegas Strip in Paradise, Nevada, United States. The 65-acre property included a casino and 3,044 rooms. Mirage Resorts, Golden Nugget, Inc., led by developer Steve Wynn, purchased the future lan ...
went on record with
PBS The Public Broadcasting Service (PBS) is an American public broadcaster and non-commercial, free-to-air television network based in Arlington, Virginia. PBS is a publicly funded nonprofit organization and the most prominent provider of educat ...
' Frontline describing the first time they were requested to help in the mass collection of personal information.


Surveillance cameras

Wide-area motion imagery Wide-area motion imagery (WAMI) is an approach to surveillance, reconnaissance, and Military intelligence, intelligence-gathering that employs specialized software and a powerful camera system—usually airborne, and for extended periods of time ...
(WAMI), also known as wide-area persistent surveillance, is a form of airborne surveillance system that collects pattern-of-life data by recording motion images of an area larger than a city – in sub-meter resolution. This video allows for anyone within the field of regard to be tracked – both live and retroactively, for forensic analysis. The use of sophisticated tracking algorithms applied to the WAMI dataset also enables mass automated geo-location tracking of every vehicle and pedestrian. WAMI sensors are typically mounted on manned airplanes, drones, blimps and aerostats. WAMI is currently in use on the southern border of the US and in the past has been deployed in
Baltimore Baltimore is the most populous city in the U.S. state of Maryland. With a population of 585,708 at the 2020 census and estimated at 568,271 in 2024, it is the 30th-most populous U.S. city. The Baltimore metropolitan area is the 20th-large ...
,
Dayton Dayton () is a city in Montgomery County, Ohio, United States, and its county seat. It is the List of cities in Ohio, sixth-most populous city in Ohio, with a population of 137,644 at the 2020 United States census, 2020 census. The Dayton metro ...
, and
Compton, California Compton is a city located in the Gateway Cities region of southern Los Angeles County, California, United States, situated south of downtown Los Angeles. Compton is one of the oldest cities in the county, and on May 11, 1888, was the eighth ci ...
in 2012. An aerial motion imagery surveillance system was deployed more narrowly in
Lancaster, California Lancaster is a charter city in northern Los Angeles County, California, Los Angeles County, in the Antelope Valley of the western Mojave Desert in Southern California, United States. As of the 2020 United States census, 2020 census, the popul ...
starting in 2012. WAMI systems such as ARGUS WAMI are capable of live viewing and recording a 68 square mile area with enough detail to view pedestrians and vehicles and generate chronographs. These WAMI cameras, such as Gorgon Stare, Angelfire, Hiper Stare, Hawkeye and ARGUS, create airborne video so detailed that pedestrians can be followed across the city through forensic analysis. This allows investigators to rewind and playback the movements of anyone within this 68 square mile area for hours, days or even months at a time depending on the airframe the WAMI sensors are mounted on. JLENS, a surveillance aerostat scheduled for deployment over the east coast of the US, is a form of WAMI that uses sophisticated radar imaging along with electro-optical WAMI sensors to enable mass geo-location tracking of ground vehicles. There has been some resistance to the domestic deployment of WAMI. Its use in Compton, California was intentionally hidden from the public, including from the mayor, because the sheriff's department believed many people would object to the program. The Compton program was revealed and publicized by the American Civil Liberties Union, Teame Zazzu, and
The Center for Investigative Reporting The Center for Investigative Reporting (CIR) is a nonprofit news organization based in San Francisco, California. CIR was founded in 1977 as the nation’s first nonprofit investigative journalism organization. It subsequently grew into a multi ...
. After becoming aware of the deployment of WAMI system in her jurisdiction, Compton Mayor Aja Brown proposed requiring that the public be notified before authorities implement monitoring equipment. PeSEAS and PerMIATE software automate and record the movement observed in the WAMI video. This technology uses software to track and record the movements of pedestrians and vehicles using automatic object recognition software across the entire frame, generating "tracklets" or chronographs of every car and pedestrian movements. 24/7 deployment of this technology has been suggested by the DHS on spy blimps such as the recently killed Blue Devil Airship.
Traffic cameras A traffic camera is a video camera which observes vehicular traffic on a road. Typically, traffic cameras are put along major roads such as highways, freeways, expressways and arterial roads, and are connected by optical fibers buried alongside o ...
, which were meant to help enforce traffic laws at intersections, have also sparked some controversy, due to their use by law enforcement agencies for purposes unrelated to traffic violations. These cameras also work as transit choke-points that allow individuals inside the vehicle to be positively identified and license plate data to be collected and time stamped for cross reference with airborne WAMI such as ARGUS and HAWKEYE used by police and Law Enforcement. The
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior, home, or public security ministries in other countries. Its missions invol ...
is funding networks of surveillance cameras in cities and towns as part of its efforts to combat terrorism. In February 2009,
Cambridge, MA Cambridge ( ) is a city in Middlesex County, Massachusetts, United States. It is a suburb in the Greater Boston metropolitan area, located directly across the Charles River from Boston. The city's population as of the 2020 U.S. census was 118, ...
rejected the cameras due to privacy concerns. In July 2020, the Electronic Frontier Foundation (EFF) reported that the San Francisco Police Department (SFPD) used a camera network in the city's Business Improvement District amid protests against police violence. The report claims that the SFPD's usage of the camera network went beyond investigating footage, likening the department's access to real-time video feeds as "indiscriminate surveillance of protestors."


Surveillance drones

On 19 June 2013,
FBI Director The director of the Federal Bureau of Investigation is the head of the Federal Bureau of Investigation (FBI), a United States federal law enforcement agency, and is responsible for its day-to-day operations. The FBI director is appointed for a ...
Robert Mueller Robert Swan Mueller III (; born August 7, 1944) is an American lawyer who served as the sixth director of the Federal Bureau of Investigation (FBI) from 2001 to 2013. A graduate of Princeton University and New York University, Mueller served a ...
told the
United States Senate Committee on the Judiciary The United States Senate Committee on the Judiciary, informally known as the Senate Judiciary Committee, is a Standing committee (United States Congress), standing committee of 22 U.S. senators whose role is to oversee the United States Departm ...
that the federal government had been employing surveillance drones on U.S. soil in "particular incidents". According to Mueller, the FBI is currently in the initial stage of developing drone policies. Earlier in 2012, Congress passed a US$63 billion bill that will grant four years of additional funding to the
Federal Aviation Administration The Federal Aviation Administration (FAA) is a Federal government of the United States, U.S. federal government agency within the United States Department of Transportation, U.S. Department of Transportation that regulates civil aviation in t ...
(FAA). Under the bill, the FAA is required to provide military and commercial drones with expanded access to U.S. airspace by October 2015. In February 2013, a spokesman for the
Los Angeles Police Department The City of Los Angeles Police Department, commonly referred to as Los Angeles Police Department (LAPD), is the primary law enforcement agency of Los Angeles, California, United States. With 8,832 officers and 3,000 civilian staff, it is the th ...
explained that these drones would initially be deployed in large public gatherings, including major protests. Over time, tiny drones would be used to fly inside buildings to track down suspects and assist in investigations. According to ''
The Los Angeles Times The ''Los Angeles Times'' is an American daily newspaper that began publishing in Los Angeles, California, in 1881. Based in the Greater Los Angeles city of El Segundo since 2018, it is the sixth-largest newspaper in the U.S. and the larges ...
'', the main advantage of using drones is that they offer "unblinking eye-in-the-sky coverage". They can be modified to carry high-resolution video cameras,
infrared sensors Infrared thermography (IRT), thermal video or thermal imaging, is a process where a thermal camera captures and creates an image of an object by using infrared radiation emitted from the object in a process, which are examples of infrared im ...
, license plate readers, listening devices, and be disguised as sea gulls or other birds to mask themselves. The FBI and Customs and Border Protection have used drones for surveillance of protests by the
Black Lives Matter Black Lives Matter (BLM) is a Decentralization, decentralized political and social movement that aims to highlight racism, discrimination and Racial inequality in the United States, racial inequality experienced by black people, and to pro ...
movement.


Infiltration of activist groups

In 2003, consent decrees against surveillance around the country were lifted, with the assistance of the
Justice Department A justice ministry, ministry of justice, or department of justice, is a ministry or other government agency in charge of the administration of justice. The ministry or department is often headed by a minister of justice (minister for justice in a ...
. The
New York City Police Department The City of New York Police Department, also referred to as New York City Police Department (NYPD), is the primary law enforcement agency within New York City. Established on May 23, 1845, the NYPD is the largest, and one of the oldest, munic ...
infiltrated and compiled dossiers on protest groups before the
2004 Republican National Convention The 2004 Republican National Convention took place from August 30 to September 2, 2004, at Madison Square Garden in New York City, New York. The convention is one of a series of Republican National Convention, historic quadrennial meetings at w ...
, leading to over 1,800 arrests and subsequent fingerprinting. In 2008,
Maryland State Police The Maryland State Police (MSP), officially the Maryland Department of State Police (MDSP), is the official state police force of the U.S. state of Maryland. The Maryland State Police is headquartered at 1201 Reisterstown Road in the Pikesville, ...
infiltrated local peace groups. In 2013, a
Washington, D.C. Washington, D.C., formally the District of Columbia and commonly known as Washington or D.C., is the capital city and federal district of the United States. The city is on the Potomac River, across from Virginia, and shares land borders with ...
undercover cop infiltrated peace groups.
The Intercept ''The Intercept'' is an American left-wing nonprofit news organization that publishes articles and podcasts online. ''The Intercept'' has published in English since its founding in 2014, and in Portuguese since the 2016 launch of the Brazilia ...
claimed that in 2020, the FBI paid an informant to pose as organizer in Denver, Colorado during the
George Floyd protests The George Floyd protests were a series of protests, riots, and demonstrations against police brutality that began in Minneapolis in the United States on May 26, 2020. The protests and civil unrest began in Minneapolis as Reactions to the mu ...
. This informant particularly infiltrated and undermined protest movements by accusing other genuine activists of being FBI informants.


International cooperation

During
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
, the BRUSA Agreement was signed by the governments of the United States and the United Kingdom for the purpose of intelligence sharing. This was later formalized in the
UKUSA Agreement The United Kingdom – United States of America Agreement (UKUSA, ) is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intellig ...
of 1946 as a
secret treaty A secret treaty is a treaty (international agreement) in which the contracting state parties have agreed to conceal the treaty's existence or substance from other states and the public.Helmut Tichy and Philip Bittner, "Article 80" in Olivier D ...
. The full text of the agreement was released to the public on 25 June 2010. Although the treaty was later revised to include other countries such as Denmark, Germany, Ireland, Norway, Turkey, and the Philippines, most of the information sharing is performed by the so-called "Five Eyes", a term referring to the following English-speaking
western democracies Liberal democracy, also called Western-style democracy, or substantive democracy, is a form of government that combines the organization of a democracy with ideas of liberal political philosophy. Common elements within a liberal democracy are: ...
and their respective intelligence agencies: * – The
Defence Signals Directorate The Australian Signals Directorate (ASD), formerly the Defence Signals Directorate, is a Statutory body, statutory agency of the Australian Government, Government of Australia responsible for signals intelligence, providing intelligence support ...
of Australia * – The
Communications Security Establishment The Communications Security Establishment (CSE; , ''CST''), formerly (from 2008-2014) called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national cryptologic agency. It is responsible for foreign signal ...
of Canada * – The Government Communications Security Bureau of New Zealand * – The Government Communications Headquarters of the United Kingdom, which is widely considered to be a leader in traditional spying due to its influence on countries that were once part of the British Empire. * – The
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
of the United States, which has the biggest budget and some of the most advanced technical abilities among the "''five eyes''". In 2013, media disclosures revealed how other government agencies have cooperated extensively with the "''Five Eyes''": * – The Politiets Efterretningstjeneste (PET) of Denmark, a domestic intelligence agency, exchanges data with the NSA on a regular basis, as part of a secret agreement with the United States. * – The Bundesnachrichtendienst (''Federal Intelligence Service'') of Germany systematically transfers metadata from German intelligence sources to the NSA. In December 2012 alone, Germany provided the NSA with 500 million metadata records. The NSA granted the Bundesnachrichtendienst access to X-Keyscore,'Prolific Partner': German Intelligence Used NSA Spy Program
''Der Spiegel''. Retrieved 21 July 2013.
in exchange for Mira4 and Veras. In early 2013, Hans-Georg Maaßen, President of the German domestic security agency Federal Office for the Protection of the Constitution, BfV, made several visits to the headquarters of the NSA. According to Classified information#Top Secret (TS), classified documents of the German government, Maaßen had agreed to transfer all data collected by the BfV via XKeyscore to the NSA. In addition, the BfV has been working very closely with eight other U.S. government agencies, including the
CIA The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
. * – The Unit 8200, SIGINT National Unit of Israel routinely receives raw intelligence data (including those of U.S. citizens) from the NSA. (See also: :File:Israel Morandum of Understanding SIGINT.pdf, Memorandum of understanding between the NSA and Israel) * – The Algemene Inlichtingen en Veiligheidsdienst (''General Intelligence and Security Service'') of the Netherlands has been receiving and storing user information gathered by U.S. intelligence sources such as
PRISM PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD . PRISM collects stored internet ...
. * – The Ministry of Defence (Singapore), Defence Ministry of Singapore and its Security and Intelligence Division have been secretly intercepting much of the fibre optic cable traffic passing through the Asian continent. Information gathered by the Government of Singapore is transferred to the Government of Australia as part of an intelligence sharing agreement. This allows the "Five Eyes" to maintain a "stranglehold on communications across the Eastern Hemisphere". * – The National Defence Radio Establishment (Sweden), National Defence Radio Establishment of Sweden (codenamed Sardines) has been working extensively with the NSA, and it has granted the "five eyes" access to underwater cables in the Baltic Sea. * – The Swiss intelligence agencies, Federal Intelligence Service (FSI) of Switzerland regularly exchanges information with the NSA, based on a secret agreement. In addition, the NSA has been granted access to Swiss monitoring facilities in Leuk (Cantons of Switzerland, canton of Valais) and Kirchlindach, Herrenschwanden (canton of Bern (canton), Bern). Aside from the "Five Eyes", most other Western countries are also participating in the NSA surveillance system and sharing information with each other. However, being a partner of the NSA does not automatically exempt a country from being targeted by the NSA. According to an internal NSA document leaked by Snowden, "We (the NSA) can, and often do, target the signals of most 3rd party foreign partners." Examples of members of the "UKUSA Agreement, Five Eyes" spying for each other: * On behalf of the British Prime Minister of the United Kingdom, Prime Minister Margaret Thatcher, the Canadian Security Intelligence Service, Security Intelligence Service of Canada spied on two British cabinet ministers in 1983. * The U.S.
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
spied on and intercepted the phone calls of Diana, Princess of Wales, Princess Diana right until she died in a Death of Diana, Princess of Wales, Paris car crash with Dodi Fayed in 1997. The NSA currently holds 1,056 pages of classified information about Princess Diana, which cannot be released to the public because their disclosure is expected to cause "''exceptionally grave damage''" to the national security of the United States due to details regarding intelligence gathering capabilities.


Uses of intercepted data

Most of the Global surveillance disclosures (2013–present), NSA's collected data which was seen by human eyes (i.e., used by NSA operatives) was used in accordance with the stated objective of combating terrorism. In addition to combatting terrorism, these surveillance programs have been employed to assess the foreign policy and economic stability of other countries. According to reports by Brazil's O Globo newspaper, the collected data was also used to target "commercial secrets". In a statement addressed to the National Congress of Brazil, journalist
Glenn Greenwald Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author, and former lawyer. In 1996, Greenwald founded a law firm concentrating on First Amendment to the United States Constitution, First Amendment litigation. He began blo ...
testified that the U.S. government uses counter-terrorism as a "pretext" for clandestine surveillance in order to compete with other countries in the "business, industrial and economic fields". In an interview with ''Der Spiegel'' published on 12 August 2013, former NSA Director Michael Hayden (general), Michael Hayden admitted that "We [the NSA] steal secrets. We're number one in it". Hayden also added that "We steal stuff to make you safe, not to make you rich". According to documents seen by the news agency Reuters, information obtained in this way is subsequently funnelled to authorities across the nation to help them launch criminal investigations of Americans. Federal agents are then instructed to "recreate" the investigative trail in order to "cover up" where the information originated, known as parallel construction. (Were the true origins known, the evidence and resulting case might be invalidated as "fruit of the poisonous tree", a legal doctrine designed to deter abuse of power that prevents evidence or subsequent events being used in a case if they resulted from a search or other process that does not conform to legal requirements.) According to NSA Chief Compliance Officer John DeLong, most violations of the NSA's rules were self-reported, and most often involved spying on personal love interests using surveillance technology of the agency. Most agricultural surveillance (disambiguation), agricultural surveillance is not covert and is carried out by government agencies such as APHIS (USDA's Animal and Plant Health Inspection Service). DHS has lamented the limited surveillance coverage provided by these inspections and works to augment this protection with their own resources.


See also

* Censorship in the United States * Domain Awareness System * Freedom of speech in the United States * Global surveillance * Internet censorship in the United States * Labor spying in the United States * List of Americans under surveillance * List of government mass surveillance projects * Mass surveillance in the United Kingdom * Police surveillance in New York City


References


External links

* Dozens of articles about the U.S. National Security Agency and its spying and surveillance programs
''CriMNet Evaluation Report''
by the Office of the Legislative Auditor of Minnesota, March 2004; part of a program to improve sharing of criminal justice information. * Smyth, Daniel
"Avoiding Bloodshed? US Journalists and Censorship in Wartime"
''War & Society'', Volume 32, Issue 1, 2013. . * Deflem, Mathieu; Silva, Derek, M.D.; and Anna S. Rogers. 2018

pp. 109–125 in ''The Cambridge Handbook of Social Problems'', Volume 2, edited by A. Javier Treviño. New York: Cambridge University Press. {{DEFAULTSORT:Mass Surveillance in the United States Mass surveillance, United States Espionage in the United States Human rights abuses in the United States Mass surveillance by country, United States