Global Surveillance
   HOME

TheInfoList



OR:

Global mass surveillance can be defined as the
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
of entire populations across national borders. Its existence was not widely acknowledged by governments and the mainstream media until the
global surveillance disclosures During the 2010s, international media reports revealed new operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly relate to top secret documents leaked ...
by
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
triggered a debate about the
right to privacy The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 185 national constitutions mention the right to privacy. Since the globa ...
in the
Digital Age The Information Age is a History by period, historical period that began in the mid-20th century. It is characterized by a rapid shift from traditional industries, as established during the Industrial Revolution, to an economy centered on info ...
. One such debate is the balance which governments must acknowledge between the pursuit of national security and counter-terrorism over a right to privacy. Although, to quote H. Akın Ünver "Even when conducted for national security and counterterrorism purposes, the scale and detail of mass citizen data collected, leads to rightfully pessimistic observations about individual freedoms and privacy". Its roots can be traced back to the middle of the 20th century when the
UKUSA Agreement The United Kingdom – United States of America Agreement (UKUSA, ) is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intellig ...
was jointly enacted by the United Kingdom and the United States, which later expanded to Canada, Australia, and New Zealand to create the present
Five Eyes The Five Eyes (FVEY) is an Anglosphere intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are party to the multilateral UKUSA Agreement, a treaty for joint cooperat ...
alliance. The alliance developed cooperation arrangements with several "third-party" nations. Eventually, this resulted in the establishment of a global surveillance network, code-named "
ECHELON Echelon may refer to: * A level formation ** A level or rank in an organization, profession, or society ** A military sub-subunit smaller than a company but larger than a platoon ** Echelon formation, a step-like arrangement of units * ECHELO ...
" (1971).


Historical background

The
origins of global surveillance The origins of global surveillance can be traced back to the late 1940s, when the UKUSA Agreement was jointly enacted by the United Kingdom and the United States, whose close cooperation eventually culminated in the creation of the global surveill ...
can be traced back to the late 1940s after the
UKUSA Agreement The United Kingdom – United States of America Agreement (UKUSA, ) is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intellig ...
was collaboratively enacted by the United Kingdom and the United States, which eventually culminated in the creation of the global surveillance network code-named "
ECHELON Echelon may refer to: * A level formation ** A level or rank in an organization, profession, or society ** A military sub-subunit smaller than a company but larger than a platoon ** Echelon formation, a step-like arrangement of units * ECHELO ...
" in 1971. In the aftermath of the 1970s Watergate affair and a subsequent congressional inquiry led by Sen.
Frank Church Frank Forrester Church III (July 25, 1924 – April 7, 1984) was an American politician and lawyer. A Democrat, from 1957 to 1981 he served as a U.S. Senator from Idaho, and is currently the last Democrat to do so. He was the longest serving De ...
, it was revealed that the
NSA The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
, in collaboration with Britain's GCHQ, had routinely intercepted the international communications of prominent anti-
Vietnam War The Vietnam War (1 November 1955 – 30 April 1975) was an armed conflict in Vietnam, Laos, and Cambodia fought between North Vietnam (Democratic Republic of Vietnam) and South Vietnam (Republic of Vietnam) and their allies. North Vietnam w ...
leaders such as
Jane Fonda Jane Seymour Fonda (born December 21, 1937) is an American actress and activist. Recognized as a film icon, Jane Fonda filmography, Fonda's work spans several genres and over six decades of film and television. She is the recipient of List of a ...
and Dr.
Benjamin Spock Benjamin McLane Spock (May 2, 1903–March 15, 1998), widely known as Dr. Spock, was an American pediatrician, Olympian athlete and left-wing political activist. His book '' Baby and Child Care'' (1946) is one of the best-selling books of ...
. Decades later, a multi-year investigation by the
European Parliament The European Parliament (EP) is one of the two legislative bodies of the European Union and one of its seven institutions. Together with the Council of the European Union (known as the Council and informally as the Council of Ministers), it ...
highlighted the NSA's role in
economic espionage Industrial espionage, also known as economic espionage, corporate spying, or corporate espionage, is a form of espionage conducted for commercial purposes instead of purely national security. While political espionage is conducted or orchestrate ...
in a report entitled 'Development of Surveillance Technology and Risk of Abuse of Economic Information', in 1999. However, for the general public, it was a series of detailed disclosures of internal NSA documents in June 2013 that first revealed the massive extent of the NSA's spying, both foreign and domestic. Most of these were leaked by an ex-contractor,
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
. Even so, a number of these older global surveillance programs such as
PRISM PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD . PRISM collects stored internet ...
,
XKeyscore XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligen ...
, and
Tempora Tempora is the codeword for a formerly-secret computer system that is used by the British Government Communications Headquarters (GCHQ). This system is used to buffer most Internet communications that are extracted from fibre-optic cables, so t ...
were referenced in the 2013 release of thousands of documents. Many countries around the world, including
Western Allies Western Allies was a political and geographic grouping among the Allied Powers of the Second World War. It primarily refers to the leading Anglo-American Allied powers, namely the United States and the United Kingdom, although the term has also be ...
and member states of
NATO The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental organization, intergovernmental Transnationalism, transnational military alliance of 32 Member states of NATO, member s ...
, have been targeted by the "
Five Eyes The Five Eyes (FVEY) is an Anglosphere intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are party to the multilateral UKUSA Agreement, a treaty for joint cooperat ...
" strategic alliance of Australia, Canada, New Zealand, the UK, and the United States—five English-speaking
Western countries The Western world, also known as the West, primarily refers to various nations and states in Western Europe, Northern America, and Australasia; with some debate as to whether those in Eastern Europe and Latin America also constitute the West. ...
aiming to achieve
Total Information Awareness Total Information Awareness (TIA) was a mass detection program by the United States Information Awareness Office. It operated under this title from February to May 2003 before being renamed Terrorism Information Awareness. Based on the concep ...
by
mastering the Internet Mastering the Internet (MTI) is a mass surveillance project led by the British communications intelligence agency Government Communications Headquarters (GCHQ) budgeted at over £1 billion. According to reports in ''The Register'' and ''The Sund ...
with analytical tools such as the
Boundless Informant Boundless Informant (stylized as BOUNDLESSINFORMANT) is a big data analysis and data visualization tool used by the United States National Security Agency (NSA). It gives NSA managers summaries of the NSA's worldwide data collection activities by ...
. As confirmed by the NSA's director Keith B. Alexander on 26 September 2013, the NSA collects and stores all phone records of all American citizens. Much of the data is kept in large storage facilities such as the
Utah Data Center The Utah Data Center (UDC), also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, is a data storage facility for the United States Intelligence Community that is designed to store data estimated to ...
, a US $1.5 billion
megaproject A megaproject is an extremely large-scale construction and investment project. A more general definition is "Megaprojects are temporary endeavours (i.e. projects) characterised by: large investment commitment, vast complexity (especially in org ...
referred to by ''
The Wall Street Journal ''The Wall Street Journal'' (''WSJ''), also referred to simply as the ''Journal,'' is an American newspaper based in New York City. The newspaper provides extensive coverage of news, especially business and finance. It operates on a subscriptio ...
'' as a "symbol of the spy agency's surveillance prowess." On 6 June 2013, Britain's ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
'' newspaper began publishing a series of revelations by an as yet unknown American whistleblower, revealed several days later to be ex-CIA and ex-NSA-contracted systems analyst Edward Snowden. Snowden gave a cache of documents to two journalists,
Glenn Greenwald Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author, and former lawyer. In 1996, Greenwald founded a law firm concentrating on First Amendment to the United States Constitution, First Amendment litigation. He began blo ...
and
Laura Poitras Laura Poitras (; born February 2, 1964) is an American director and producer of documentary films. Poitras has received numerous awards for her work, including the 2015 Academy Award for Best Documentary Feature for ''Citizenfour'', about Edwa ...
. Greenwald later estimated that the cache contains 15,000–20,000 documents, some very large and detailed, and some very small. In over two subsequent months of publications, it became clear that the NSA had operated a complex web of spying programs that allowed it to intercept Internet and telephone conversations from over a billion users from dozens of countries around the world. Specific revelations were made about China, the European Union, Latin America, Iran and Pakistan, and Australia and New Zealand, however, the published documentation reveals that many of the programs indiscriminately collected bulk information directly from central servers and Internet backbones, which almost invariably carry and reroute information from distant countries. Due to this central server and backbone monitoring, many of the programs overlapped and interrelated with one another. These programs were often carried out with the assistance of US entities such as the
United States Department of Justice The United States Department of Justice (DOJ), also known as the Justice Department, is a United States federal executive departments, federal executive department of the U.S. government that oversees the domestic enforcement of Law of the Unite ...
and the
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
,How Microsoft handed the NSA access to encrypted messages
''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
'', 12 July 2013. Retrieved 13 July 2013.
were sanctioned by US laws such as the
FISA Amendments Act The FISA Amendments Act of 2008, also called the FAA and Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, is an Act of Congress that Rescind or amend something previously adopted, amended the Foreign Intelligence Surveilla ...
, and the necessary court orders for them were signed by the secret
Foreign Intelligence Surveillance Court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants ag ...
. Some of the NSA's programs were directly aided by national and foreign intelligence agencies, Britain's
GCHQ Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
and Australia's ASD, as well as by large private telecommunications and Internet corporations, such as
Verizon Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
,
Telstra Telstra Group Limited is an Australian telecommunications company that builds and operates telecommunications networks and markets related products and services. It is a member of the S&P/ASX 20 stock index, and is Australia's largest telecomm ...
,
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
, and Facebook. Snowden's disclosures of the NSA's surveillance activities are a continuation of
news leak A news leak is the unsanctioned release of confidential information to news media. It can also be the premature publication of information by a news outlet, of information that it has agreed not to release before a specified time, in violation of a ...
s which have been ongoing since the early 2000s. One year after the
September 11, 2001, attacks The September 11 attacks, also known as 9/11, were four coordinated Islamist terrorist suicide attacks by al-Qaeda against the United States in 2001. Hijackers in the September 11 attacks#Hijackers, Nineteen terrorists hijacked four com ...
, former U.S. intelligence official William Binney was publicly critical of the NSA for spying on U.S. citizens. Further disclosures followed. On 16 December 2005, ''
The New York Times ''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'' published a report under the headline " Bush Lets U.S. Spy on Callers Without Courts." In 2006, further evidence of the NSA's domestic surveillance of U.S. citizens was provided by ''
USA Today ''USA Today'' (often stylized in all caps) is an American daily middle-market newspaper and news broadcasting company. Founded by Al Neuharth in 1980 and launched on September 14, 1982, the newspaper operates from Gannett's corporate headq ...
''. The newspaper released a report on 11 May 2006, regarding the NSA's "massive database" of phone records collected from "tens of millions" of U.S. citizens. According to ''USA Today'', these phone records were provided by several telecom companies such as
AT&T AT&T Inc., an abbreviation for its predecessor's former name, the American Telephone and Telegraph Company, is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the w ...
,
Verizon Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
, and
BellSouth BellSouth, LLC (stylized as ''BELLSOUTH'' and formerly known as BellSouth Corporation) was an American telecommunications holding company based in Atlanta, Georgia. BellSouth was one of the seven original Regional Bell Operating Companies after ...
. In 2008, the security analyst
Babak Pasdar Babak Pasdar is an Iranian-American cyber security author, best known for his contributions in the areas of cloud-based security and as a whistle blower on government warrantless wiretapping. Pasdar was founder, CEO and CTO of IGX Global in 1997 an ...
revealed the existence of the so-called "Quantico circuit" that he and his team discovered in 2003 when brought on to update the carrier's security system. The circuit provided the U.S. federal government with a backdoor into the network of an unnamed wireless provider, which was later independently identified as
Verizon Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
.


Snowden's disclosures

Snowden made his first contact with journalist
Glenn Greenwald Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author, and former lawyer. In 1996, Greenwald founded a law firm concentrating on First Amendment to the United States Constitution, First Amendment litigation. He began blo ...
of ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
'' in late 2012. The timeline of mass surveillance disclosures by Snowden continued throughout the entire year of 2013.


By category

Documents leaked by Snowden in 2013 include court orders, memos, and policy documents related to a wide range of surveillance activities.


Purposes

According to the April 2013 summary of documents leaked by Snowden, other than to combat terrorism, these surveillance programs were employed to assess the foreign policy and economic stability of other countries, and to gather "commercial secrets". In a statement addressed to the
National Congress of Brazil The National Congress () is the legislative body of Brazil's federal government. Unlike the state legislative assemblies and Câmara Municipal, municipal chambers, the Congress is bicameral, composed of the Federal Senate (Brazil), Federal Sena ...
in early August 2013, journalist
Glenn Greenwald Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author, and former lawyer. In 1996, Greenwald founded a law firm concentrating on First Amendment to the United States Constitution, First Amendment litigation. He began blo ...
maintained that the U.S. government had used
counter-terrorism Counterterrorism (alternatively spelled: counter-terrorism), also known as anti-terrorism, relates to the practices, military tactics, techniques, and strategies that governments, law enforcement, businesses, and intelligence agencies use to co ...
as a pretext for clandestine surveillance in order to compete with other countries in the "business, industrial and economic fields". In a December 2013 letter to the
Brazilian government The politics of Brazil take place in a framework of a federal presidential representative democratic republic, whereby the President is both head of state and head of government, and of a multi-party system. The political and administrative ...
, Snowden wrote that "These programs were never about terrorism: they're about economic spying, social control, and diplomatic manipulation. They're about
power Power may refer to: Common meanings * Power (physics), meaning "rate of doing work" ** Engine power, the power put out by an engine ** Electric power, a type of energy * Power (social and political), the ability to influence people or events Math ...
." According to a White House panel member, the NSA didn't stop any terrorist attack. However the NSA chief stated that surveillance programs stopped 54 terrorist plots. In an interview with ''
Der Spiegel (, , stylized in all caps) is a German weekly news magazine published in Hamburg. With a weekly circulation of about 724,000 copies in 2022, it is one of the largest such publications in Europe. It was founded in 1947 by John Seymour Chaloner ...
'' published on 12 August 2013, former NSA Director Michael Hayden admitted that "We (the NSA) steal secrets. We're number one in it". Hayden also added: "We steal stuff to make you safe, not to make you rich". According to documents seen by the news agency
Reuters Reuters ( ) is a news agency owned by Thomson Reuters. It employs around 2,500 journalists and 600 photojournalists in about 200 locations worldwide writing in 16 languages. Reuters is one of the largest news agencies in the world. The agency ...
, these "secrets" were subsequently funneled to authorities across the nation to help them launch criminal investigations of Americans. Federal agents are then instructed to "recreate" the investigative trail in order to "cover up" where the information originated. According to the congressional testimony of Keith B. Alexander,
Director of the National Security Agency The director of the National Security Agency (DIRNSA) is the highest-ranking official of the National Security Agency, which is a defense agency within the United States Department of Defense, U.S. Department of Defense. The director of the NSA ...
, one of the purposes of its data collection is to store all the phone records inside a place that can be searched and assessed at all times. When asked by Senator
Mark Udall Mark Emery Udall ( ; born July 18, 1950) is an American politician who served as a United States Senator from Colorado from 2009 to 2015. A member of the Democratic Party, he previously served in the United States House of Representatives, repres ...
if the goal of the NSA is to collect the phone records of all Americans, Alexander replied, "Yes, I believe it is in the nation's best interest to put all the phone records into a lockbox that we could search when the nation needs to do it." Other applications of global surveillance include the identification and containment of emerging global outbreaks. In 2003, global surveillance mechanisms were used to fight against the
SARs Severe acute respiratory syndrome (SARS) is a viral respiratory disease of zoonotic origin caused by the virus SARS-CoV-1, the first identified strain of the SARS-related coronavirus. The first known cases occurred in November 2002, and the ...
pandemic.


Targets and methods


Collection of metadata and other content

In the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
, the NSA is collecting the phone records of more than 300 million Americans. The international surveillance tool
XKeyscore XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligen ...
allows government analysts to search through vast databases containing emails, online chats and the browsing histories of millions of individuals. Greenwald, Glenn (31 July 2013
"XKeyscore: NSA tool collects 'nearly everything a user does on the internet' XKeyscore Gives 'Widest-Reaching' Collection of Online Data NSA Analysts Require No Prior Authorization for Searches Sweeps Up Emails, Social Media Activity and Browsing History"
''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
''. Retrieved 1 August 2013.
Britain's global surveillance program
Tempora Tempora is the codeword for a formerly-secret computer system that is used by the British Government Communications Headquarters (GCHQ). This system is used to buffer most Internet communications that are extracted from fibre-optic cables, so t ...
intercepts the
fibre-optic An optical fiber, or optical fibre, is a flexible glass or plastic fiber that can transmit light from one end to the other. Such fibers find wide usage in fiber-optic communications, where they permit transmission over longer distances and at ...
cables that form the backbone of the Internet. Under the NSA's
PRISM PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD . PRISM collects stored internet ...
surveillance program, data that has already reached its final destination would be directly harvested from the servers of the following U.S. service providers:
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
,
Yahoo! Yahoo (, styled yahoo''!'' in its logo) is an American web portal that provides the search engine Yahoo Search and related services including My Yahoo, Yahoo Mail, Yahoo News, Yahoo Finance, Yahoo Sports, y!entertainment, yahoo!life, and its a ...
,
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
,
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
,
Paltalk Paltalk is a proprietary video group chat service that enables users to communicate by video, Internet chat, or voice. History In 2007, the filmed suicide of one of the service's users was widely reported in the media. Concerns were raised o ...
,
AOL AOL (formerly a company known as AOL Inc. and originally known as America Online) is an American web portal and online service provider based in New York City, and a brand marketed by Yahoo! Inc. The service traces its history to an online ...
,
Skype Skype () was a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for IP-based videotelephony, videoconferencing and voice calls. It also had instant messaging, file transfer, ...
,
YouTube YouTube is an American social media and online video sharing platform owned by Google. YouTube was founded on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim who were three former employees of PayPal. Headquartered in ...
, and
Apple Inc. Apple Inc. is an American multinational corporation and technology company headquartered in Cupertino, California, in Silicon Valley. It is best known for its consumer electronics, software, and services. Founded in 1976 as Apple Comput ...


Contact chaining

Contact chaining is a method that involves utilizing data related to social links among individuals, including call logs that connect phone numbers with each other, in order to pinpoint individuals associated with criminal groups. However, a lack of privacy guidelines can result in this process amassing an extensive portion of user data. The NSA uses the analysis of phone call and e-mail logs of American citizens to create sophisticated graphs of their social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information. According to
top secret Classified information is confidential material that a government deems to be sensitive information which must be protected from unauthorized disclosure that requires special handling and dissemination controls. Access is restricted by law or ...
NSA documents leaked by Snowden, during a single day in 2012, the NSA collected
e-mail Electronic mail (usually shortened to email; alternatively hyphenated e-mail) is a method of transmitting and receiving Digital media, digital messages using electronics, electronic devices over a computer network. It was conceived in the ...
address book An address book or a name and address book is a book, or a database used for storing entries, called contacts. Each contact entry usually consists of a few standard fields (for example: first name, last name, company name, address, telephone numb ...
s from: * 33,697
Gmail Gmail is the email service provided by Google. it had 1.5 billion active user (computing), users worldwide, making it the largest email service in the world. It also provides a webmail interface, accessible through a web browser, and is also ...
accounts * 82,857
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
accounts * 105,068
Hotmail Outlook.com, formerly Hotmail, is a free personal email service offered by Microsoft. It also provides a webmail interface accessible via web browser or mobile apps featuring mail, Calendaring software, calendaring, Address book, contacts, and ...
accounts * 444,743
Yahoo! Yahoo (, styled yahoo''!'' in its logo) is an American web portal that provides the search engine Yahoo Search and related services including My Yahoo, Yahoo Mail, Yahoo News, Yahoo Finance, Yahoo Sports, y!entertainment, yahoo!life, and its a ...
accounts * 22,881 unspecified other providers Each day, the NSA collects contacts from an estimated 500,000 buddy lists on live-chat services as well as from the inbox displays of Web-based e-mail accounts. Taken together, the data enables the NSA to draw detailed maps of a person's life based on their personal, professional, religious and political connections.


Data transfer

Federal agencies in the United States: Data gathered by these surveillance programs is routinely shared with the U.S.
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
(FBI) and the U.S.
Central Intelligence Agency The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
(CIA). In addition, the NSA supplies domestic intercepts to the
Drug Enforcement Administration The Drug Enforcement Administration (DEA) is a Federal law enforcement in the United States, United States federal law enforcement agency under the U.S. Department of Justice tasked with combating illicit Illegal drug trade, drug trafficking a ...
(DEA),
Internal Revenue Service The Internal Revenue Service (IRS) is the revenue service for the Federal government of the United States, United States federal government, which is responsible for collecting Taxation in the United States, U.S. federal taxes and administerin ...
(IRS), and other law enforcement agencies. Foreign countries: As a result of the NSA's
secret treaties ''Secret Treaties'' is the third studio album by American rock band Blue Öyster Cult, released on April 5, 1974 by Columbia. It features the same band members and production team as their previous album. The album spent 14 weeks in the US a ...
with foreign countries, data gathered by its surveillance programs are routinely shared with countries who are signatories to the
UKUSA Agreement The United Kingdom – United States of America Agreement (UKUSA, ) is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intellig ...
. These foreign countries also help to operate several NSA programs such as
XKEYSCORE XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligen ...
. (See
International cooperation In international relations, multilateralism refers to an alliance of multiple countries pursuing a common goal. Multilateralism is based on the principles of inclusivity, equality, and cooperation, and aims to foster a more peaceful, prosperous, an ...
.)


Financial payments monitoring

A special branch of the NSA called "Follow the Money" (FTM) monitors international payments, banking and credit card transactions and later stores the collected data in the NSA's financial databank, "Tracfin".


Mobile phone location tracking

Mobile phone tracking Mobile phone tracking is a process for identifying the location of a mobile phone, whether stationary or moving. Localization may be affected by a number of technologies, such as the multilateration of radio signals between (several) cell towers ...
refers to the act of attaining the position and coordinates of a mobile phone. According to ''
The Washington Post ''The Washington Post'', locally known as ''The'' ''Post'' and, informally, ''WaPo'' or ''WP'', is an American daily newspaper published in Washington, D.C., the national capital. It is the most widely circulated newspaper in the Washington m ...
'', the NSA has been tracking the locations of mobile phones from all over the world by tapping into the cables that connect mobile networks globally and that serve U.S. cellphones as well as foreign ones. In the process of doing so, the NSA collects more than 5 billion records of phone locations on a daily basis. This enables NSA analysts to map cellphone owners' relationships by correlating their patterns of movement over time with thousands or millions of other phone users who cross their paths. In order to decode private conversations, the NSA has cracked the most commonly used cellphone encryption technology,
A5/1 A5/1 is a stream cipher used to provide over-the-air communication privacy in the Global System for Mobile Communications, GSM Cell phone, cellular telephone standard. It is one of several implementations of the A5 security protocol. It was initial ...
. According to a classified document leaked by Snowden, the agency can "process encrypted A5/1" even when it has not acquired an encryption key. In addition, the NSA uses various types of cellphone infrastructure, such as the links between carrier networks, to determine the location of a cellphone user tracked by Visitor Location Registers.


Infiltration of smartphones

As worldwide sales of
smartphone A smartphone is a mobile phone with advanced computing capabilities. It typically has a touchscreen interface, allowing users to access a wide range of applications and services, such as web browsing, email, and social media, as well as multi ...
s grew rapidly, the NSA decided to take advantage of the smartphone boom. This is particularly advantageous because the smartphone contains a variety of data sets that would interest an intelligence agency, such as social contacts, user behaviour, interests, location, photos and credit card numbers and passwords. According to the documents leaked by Snowden, the NSA has set up
task force A task force (TF) is a unit or formation established to work on a single defined task or activity. Originally introduced by the United States Navy, the term has now caught on for general usage and is a standard part of NATO terminology. Many ...
s assigned to several smartphone manufacturers and
operating systems An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs. Time-sharing operating systems scheduler (computing), schedule tasks for ...
, including
Apple Inc. Apple Inc. is an American multinational corporation and technology company headquartered in Cupertino, California, in Silicon Valley. It is best known for its consumer electronics, software, and services. Founded in 1976 as Apple Comput ...
's
iPhone The iPhone is a line of smartphones developed and marketed by Apple that run iOS, the company's own mobile operating system. The first-generation iPhone was announced by then–Apple CEO and co-founder Steve Jobs on January 9, 2007, at ...
and
iOS Ios, Io or Nio (, ; ; locally Nios, Νιός) is a Greek island in the Cyclades group in the Aegean Sea. Ios is a hilly island with cliffs down to the sea on most sides. It is situated halfway between Naxos and Santorini. It is about long an ...
operating system, as well as
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
's Android mobile operating system. Similarly, Britain's
GCHQ Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
assigned a team to study and crack the
BlackBerry BlackBerry is a discontinued brand of handheld devices and related mobile services, originally developed and maintained by the Canadian company Research In Motion (RIM, later known as BlackBerry Limited) until 2016. The first BlackBerry device ...
. In addition, there are smaller NSA programs, known as "scripts", that can perform surveillance on 38 different features of the
iOS 3 iPhone OS 3 (''stylized as iPhone OS 3.0'') is the iOS version history#iPhone OS 3, third major release of the iOS mobile operating system developed by Apple Inc., succeeding iPhone OS 2. It was announced on March 17, 2009, and was released on J ...
and
iOS 4 iOS 4 is the fourth major release of the iOS mobile operating system developed by Apple Inc., being the successor to iPhone OS 3. It was announced at the Apple Special Event on April 8, 2010, and released on June 21, 2010. iOS 4 was the first ...
operating systems. These include the
map A map is a symbolic depiction of interrelationships, commonly spatial, between things within a space. A map may be annotated with text and graphics. Like any graphic, a map may be fixed to paper or other durable media, or may be displayed on ...
ping feature,
voicemail A voicemail system (also known as voice message or voice bank) is a computer-based system that allows callers to leave a recorded message when the recipient has been unable (or unwilling) to answer the phone. Calls may be directed to voicemail m ...
and photos, as well as
Google Earth Google Earth is a web mapping, web and computer program created by Google that renders a 3D computer graphics, 3D representation of Earth based primarily on satellite imagery. The program maps the Earth by superimposition, superimposing satelli ...
,
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
and
Yahoo! Messenger Yahoo! Messenger (sometimes abbreviated Y!M) was an instant messaging client and associated protocol created and formerly operated by Yahoo!. Yahoo! Messenger was provided free of charge and could be downloaded and used with a generic "Yahoo I ...
.


Infiltration of commercial data centers

In contrast to the
PRISM PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD . PRISM collects stored internet ...
surveillance program, which is a front-door method of access that is nominally approved by the
FISA court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants aga ...
, the
MUSCULAR MUSCULAR (DS-200B), located in the United Kingdom, is the name of a surveillance program jointly operated by Britain's Government Communications Headquarters (GCHQ) and the U.S. National Security Agency (NSA) that was revealed by documents release ...
surveillance program is noted to be "unusually aggressive" in its usage of unorthodox hacking methods to infiltrate Yahoo! and Google
data centre A data center is a building, a dedicated space within a building, or a group of buildings used to house computer systems and associated components, such as telecommunications and storage systems. Since IT operations are crucial for business ...
s around the world. As the program is operated overseas (
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of European mainland, the continental mainland. It comprises England, Scotlan ...
), the NSA presumes that anyone using a foreign data link is a foreigner, and is, therefore, able to collect content and metadata on a previously unknown scale from U.S. citizens and residents. According to the documents leaked by Snowden, the MUSCULAR surveillance program is jointly operated by the NSA and Britain's
GCHQ Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
agency. (See
International cooperation In international relations, multilateralism refers to an alliance of multiple countries pursuing a common goal. Multilateralism is based on the principles of inclusivity, equality, and cooperation, and aims to foster a more peaceful, prosperous, an ...
.)


Infiltration of anonymous networks

The
Five Eyes The Five Eyes (FVEY) is an Anglosphere intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are party to the multilateral UKUSA Agreement, a treaty for joint cooperat ...
have made repeated attempts to spy on Internet users communicating in secret via the anonymity network
Tor Tor, TOR or ToR may refer to: Places * Toronto, Canada ** Toronto Raptors * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor ...
. Several of their clandestine operations involve the implantation of malicious code into the computers of anonymous Tor users who visit infected websites. In some cases, the NSA and GCHQ have succeeded in blocking access to the anonymous network, diverting Tor users to insecure channels. In other cases, the NSA and the GCHQ were able to uncover the identity of these anonymous users.


Monitoring of hotel reservation systems

Under the Royal Concierge surveillance program, Britain's GCHQ agency uses an automated monitoring system to infiltrate the reservation systems of at least 350 luxury
hotel A hotel is an establishment that provides paid lodging on a short-term basis. Facilities provided inside a hotel room may range from a modest-quality mattress in a small room to large suites with bigger, higher-quality beds, a dresser, a re ...
s in many different parts of the world. Other related surveillance programs involve the wiretapping of room telephones and fax machines used in targeted hotels, as well as the monitoring of computers, hooked up to the hotel network.


Virtual reality surveillance

The U.S.
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA), the U.S.
Central Intelligence Agency The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
(CIA), and Britain's
Government Communications Headquarters Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primari ...
(GCHQ) have been conducting surveillance on the networks of many online games, including
massively multiplayer online role-playing game A massively multiplayer online role-playing game (MMORPG) is a video game that combines aspects of a role-playing video game and a massively multiplayer online game. As in role-playing games (RPGs), the player assumes the role of a Player charac ...
s (MMORPGs) such as
World of Warcraft ''World of Warcraft'' (''WoW'') is a 2004 massively multiplayer online role-playing (MMORPG) video game developed and published by Blizzard Entertainment for Windows and Mac OS X. Set in the '' Warcraft'' fantasy universe, ''World of War ...
, as well as
virtual world A virtual world (also called a virtual space or spaces) is a Computer simulation, computer-simulated environment which may be populated by many simultaneous users who can create a personal Avatar (computing), avatar and independently explore th ...
s such as
Second Life ''Second Life'' is a multiplayer virtual world that allows people to create an Avatar (computing), avatar for themselves and then interact with other users and user-created content within a multi-user online environment. Developed for person ...
, and the
Xbox Xbox is a video gaming brand that consists of four main home video game console lines, as well as application software, applications (games), the streaming media, streaming service Xbox Cloud Gaming, and online services such as the Xbox networ ...
gaming console.


Political Espionage

According to the April 2013 summary of disclosures, the NSA defined its "intelligence priorities" on a scale of "1" (highest interest) to "5" (lowest interest). It classified about 30 countries as "3rd parties", with whom it cooperates but also spies on: * Main targets: China, Russia, Iran, Pakistan and Afghanistan were ranked highly on the NSA's list of spying priorities, followed by France, Germany, Japan, and Brazil. The
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are Geography of the European Union, located primarily in Europe. The u ...
's "international trade" and "economic stability" are also of interest. Other high priority targets include Cuba, Israel, and North Korea. * Irrelevant: From a US intelligence perspective, countries such as Cambodia, Laos and Nepal were largely irrelevant, as were governments of smaller European Union countries such as Finland, Denmark, Croatia and the Czech Republic. Other prominent targets included members and adherents of the Internet group known as "
Anonymous Anonymous may refer to: * Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown ** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author * Anonym ...
", as well as potential whistleblowers. According to Snowden, the NSA targeted reporters who wrote critically about the government after 9/11. As part of a joint operation with the
Central Intelligence Agency The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
(CIA), the NSA deployed secret eavesdropping posts in eighty U.S. embassies and consulates worldwide. The headquarters of
NATO The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental organization, intergovernmental Transnationalism, transnational military alliance of 32 Member states of NATO, member s ...
were also used by NSA experts to spy on the European Union. In 2013, documents provided by Edward Snowden revealed that the following
intergovernmental organization Globalization is social change associated with increased connectivity among societies and their elements and the explosive evolution of transportation and telecommunication technologies to facilitate international cultural and economic exchange. ...
s, diplomatic missions, and government ministries have been subjected to surveillance by the "
Five Eyes The Five Eyes (FVEY) is an Anglosphere intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are party to the multilateral UKUSA Agreement, a treaty for joint cooperat ...
":


International Cooperation

During
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
, the BRUSA Agreement was signed by the governments of the United States and the United Kingdom for the purpose of intelligence sharing.U.S. National Security Agency
Early Papers Concerning US-UK Agreement – 1940–1944
. Agreement between British Government Code and Cipher School and U.S. War Department dated 17 May 1943. Retrieved: 5 October 2013.
This was later formalized in the
UKUSA Agreement The United Kingdom – United States of America Agreement (UKUSA, ) is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intellig ...
of 1946 as a
secret treaty A secret treaty is a treaty (international agreement) in which the contracting state parties have agreed to conceal the treaty's existence or substance from other states and the public.Helmut Tichy and Philip Bittner, "Article 80" in Olivier D ...
. The full text of the agreement was released to the public on 25 June 2010. Although the treaty was later revised to include other countries such as Denmark, Germany, Ireland, Norway, Turkey, and the Philippines, most of the information sharing has been performed by the so-called "
Five Eyes The Five Eyes (FVEY) is an Anglosphere intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are party to the multilateral UKUSA Agreement, a treaty for joint cooperat ...
", a term referring to the following English-speaking
western democracies Liberal democracy, also called Western-style democracy, or substantive democracy, is a form of government that combines the organization of a democracy with ideas of liberal political philosophy. Common elements within a liberal democracy are: ...
and their respective intelligence agencies: * – The
Australian Signals Directorate The Australian Signals Directorate (ASD), formerly the Defence Signals Directorate, is a statutory agency of the Government of Australia responsible for signals intelligence, providing intelligence support to Australian military operations, con ...
of Australia * – The
Communications Security Establishment The Communications Security Establishment (CSE; , ''CST''), formerly (from 2008-2014) called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national cryptologic agency. It is responsible for foreign signal ...
of Canada * – The
Government Communications Security Bureau The Government Communications Security Bureau (GCSB) () is the public service, public-service department of New Zealand charged with promoting New Zealand's national security by collecting and analysing information of an intelligence nature. Th ...
of New Zealand * – The
Government Communications Headquarters Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primari ...
of the United Kingdom, which is widely considered to be a leader in traditional spying due to its influence on countries that were once part of the
British Empire The British Empire comprised the dominions, Crown colony, colonies, protectorates, League of Nations mandate, mandates, and other Dependent territory, territories ruled or administered by the United Kingdom and its predecessor states. It bega ...
. * – The
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
of the United States, which has the biggest budget and the most advanced technical abilities among the "''five eyes''".
Left:
SEA-ME-WE 3 SEA-ME-WE3 or South-East Asia - Middle East - Western Europe 3 was an optical submarine telecommunications cable linking those regions and is the longest in the world. Completed in late 2000, it is led by France Telecom and China Telecom, and i ...
, which runs across the
Afro-Eurasia Afro-Eurasia (also Afroeurasia and Eurafrasia) is a landmass comprising the continents of Africa, Asia, and Europe. The terms are compound (linguistics), compound words of the names of its constituent parts. Afro-Eurasia has also been called th ...
n
supercontinent In geology, a supercontinent is the assembly of most or all of Earth's continent, continental blocks or cratons to form a single large landmass. However, some geologists use a different definition, "a grouping of formerly dispersed continents", ...
from Japan to
Northern Germany Northern Germany (, ) is a linguistic, geographic, socio-cultural and historic region in the northern part of Germany which includes the coastal states of Schleswig-Holstein, Mecklenburg-Vorpommern and Lower Saxony and the two city-states Hambur ...
, is one of the most important
submarine cables Submarine cable is any electrical cable that is laid on the seabed, although the term is often extended to encompass cables laid on the bottom of large freshwater bodies of water. Examples include: *Submarine communications cable *Submarine power ...
accessed by the "Five Eyes". Singapore, a former British colony in the Asia-Pacific region (blue dot), plays a vital role in intercepting Internet and telecommunications traffic heading from Australia/Japan to Europe, and vice versa. An intelligence-sharing agreement between Singapore and Australia allows the rest of the "Five Eyes" to gain access to
SEA-ME-WE 3 SEA-ME-WE3 or South-East Asia - Middle East - Western Europe 3 was an optical submarine telecommunications cable linking those regions and is the longest in the world. Completed in late 2000, it is led by France Telecom and China Telecom, and i ...
.
Right:
TAT-14 TAT-14 was the 14th consortium transatlantic telecommunications cable system. In operation from 2001 to 2020, it used wavelength division multiplexing. The cable system was built from multiple pairs of fibres—one fibre in each pair was used fo ...
, a telecommunications cable linking Europe with the United States, was identified as one of few assets of "Critical Infrastructure and Key Resources" of the US on foreign territory. In 2013, it was revealed that British officials "pressured a handful of telecommunications and Internet companies" to allow the British government to gain access to
TAT-14 TAT-14 was the 14th consortium transatlantic telecommunications cable system. In operation from 2001 to 2020, it used wavelength division multiplexing. The cable system was built from multiple pairs of fibres—one fibre in each pair was used fo ...
. According to the leaked documents, aside from the Five Eyes, most other Western countries have also participated in the NSA surveillance system and are sharing information with each other. In the documents the NSA lists "approved SIGINT partners" which are partner countries in addition to the Five Eyes. Glenn Greenwald said that the "NSA often maintains these partnerships by paying its partner to develop certain technologies and engage in surveillance, and can thus direct how the spying is carried out." These partner countries are divided into two groups, "Second Parties" and "Third Parties". The Second Parties are doing comprehensive cooperation with the NSA, and the Third Parties are doing focused cooperation. However, being a partner of the NSA does not automatically exempt a country from being targeted by the NSA itself. According to an internal NSA document leaked by Snowden, "We (the NSA) can, and often do, target the signals of most 3rd party foreign partners."


Australia

The
Australian Signals Directorate The Australian Signals Directorate (ASD), formerly the Defence Signals Directorate, is a statutory agency of the Government of Australia responsible for signals intelligence, providing intelligence support to Australian military operations, con ...
(ASD), formerly known as the Defence Signals Directorate (DSD), shares information on Australian citizens with the other members of the
UKUSA Agreement The United Kingdom – United States of America Agreement (UKUSA, ) is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intellig ...
. According to a 2008
Five Eyes The Five Eyes (FVEY) is an Anglosphere intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are party to the multilateral UKUSA Agreement, a treaty for joint cooperat ...
document leaked by Snowden, data of Australian citizens shared with foreign countries include "bulk, unselected, unminimised metadata" as well as "medical, legal or religious information". In close cooperation with other members of the
Five Eyes The Five Eyes (FVEY) is an Anglosphere intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are party to the multilateral UKUSA Agreement, a treaty for joint cooperat ...
community, the ASD runs secret surveillance facilities in many parts of
Southeast Asia Southeast Asia is the geographical United Nations geoscheme for Asia#South-eastern Asia, southeastern region of Asia, consisting of the regions that are situated south of China, east of the Indian subcontinent, and northwest of the Mainland Au ...
without the knowledge of Australian diplomats. In addition, the ASD cooperates with the Security and Intelligence Division (SID) of the
Republic of Singapore Singapore, officially the Republic of Singapore, is an island country and city-state in Southeast Asia. The country's territory comprises one main island, 63 satellite islands and islets, and one outlying islet. It is about one degree o ...
in an international operation to intercept underwater telecommunications cables across the
Eastern Hemisphere The Eastern Hemisphere is the half of the planet Earth which is east of the prime meridian (which crosses Greenwich, London, United Kingdom) and west of the antimeridian (which crosses the Pacific Ocean and relatively little land from pole to p ...
and the
Pacific Ocean The Pacific Ocean is the largest and deepest of Earth's five Borders of the oceans, oceanic divisions. It extends from the Arctic Ocean in the north to the Southern Ocean, or, depending on the definition, to Antarctica in the south, and is ...
. In March 2017 it was reported that, on advice from the Five Eyes intelligence alliance, more than 500 Iraqi and Syrian refugees, have been refused entry to Australia, in the last year.


Canada

The
Communications Security Establishment Canada The Communications Security Establishment (CSE; , ''CST''), formerly (from 2008-2014) called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national cryptologic agency. It is responsible for foreign signa ...
(CSEC) offers the NSA resources for advanced collection, processing, and analysis. It has set up
covert Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret. Secrecy is often controver ...
sites at the request of NSA. The US-Canada SIGNT relationship dates back to a secret alliance formed during
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
, and was formalized in 1949 under the CANUSA Agreement. On behalf of the NSA, the CSEC opened secret surveillance facilities in 20 countries around the world. As well, the
Communications Security Establishment Canada The Communications Security Establishment (CSE; , ''CST''), formerly (from 2008-2014) called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national cryptologic agency. It is responsible for foreign signa ...
has been revealed, following the
global surveillance disclosures During the 2010s, international media reports revealed new operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly relate to top secret documents leaked ...
to be engaging in surveillance on Wifi Hotspots of major Canadian Airports, collecting meta-data to use for engaging in surveillance on travelers, even days after their departure from said airports. Image:NSA Canada relationship.pdf, The NSA's relationship with Canada's CSEC Image:NSA Canada G8 G20.pdf, NSA document on a
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
operation with Canada's CSEC agency during the G8 and
G20 The G20 or Group of 20 is an intergovernmental forum comprising 19 sovereign countries, the European Union (EU), and the African Union (AU). It works to address major issues related to the global economy, such as international financial stabil ...
summits in
Toronto Toronto ( , locally pronounced or ) is the List of the largest municipalities in Canada by population, most populous city in Canada. It is the capital city of the Provinces and territories of Canada, Canadian province of Ontario. With a p ...
in 2010


Denmark

The
Politiets Efterretningstjeneste The Danish Security and Intelligence Service (DSIS; (PET)) is the national security and intelligence agency of Denmark. The agency focuses solely on national security while foreign intelligence operations are handled by the Danish Defense Intel ...
(PET) of Denmark, a domestic intelligence agency, exchanges data with the NSA on a regular basis, as part of a secret agreement with the United States. Being one of the " 9-Eyes" of the
UKUSA Agreement The United Kingdom – United States of America Agreement (UKUSA, ) is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intellig ...
, Denmark's relationship with the NSA is closer than the NSA's relationship with Germany, Sweden, Spain, Belgium or Italy.


France

The
Directorate-General for External Security The Directorate-General for External Security (, , DGSE) is France's foreign intelligence agency, equivalent to the British MI6 and the American CIA, established on 27 November 1943. The DGSE safeguards French national security through intelli ...
(DGSE) of France maintains a close relationship with both the NSA and the GCHQ after discussions for increased cooperation began in November 2006. By the early 2010s, the extent of cooperation in the joint interception of digital data by the DGSE and the NSA was noted to have increased dramatically. In 2011, a formal
memorandum A memorandum (: memorandums or memoranda; from the Latin ''memorandum'', "(that) which is to be remembered"), also known as a briefing note, is a Writing, written message that is typically used in a professional setting. Commonly abbreviation, ...
for data exchange was signed by the DGSE and the NSA, which facilitated the transfer of millions of
metadata Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive ...
records from the DGSE to the NSA. From December 2012 to 8 January 2013, over 70 million metadata records were handed over to the NSA by French intelligence agencies.


Germany

The
Bundesnachrichtendienst The Federal Intelligence Service (, ; BND) is the foreign intelligence agency of Germany, directly subordinate to the Federal Chancellery of Germany, Chancellor's Office. The Headquarters of the Federal Intelligence Service, BND headquarters is ...
(BND) of Germany systematically transfers metadata from German intelligence sources to the NSA. In December 2012 alone, the BND provided the NSA with 500 million metadata records. The NSA granted the Bundesnachrichtendienst access to X-Keyscore,'Prolific Partner': German Intelligence Used NSA Spy Program
''
Der Spiegel (, , stylized in all caps) is a German weekly news magazine published in Hamburg. With a weekly circulation of about 724,000 copies in 2022, it is one of the largest such publications in Europe. It was founded in 1947 by John Seymour Chaloner ...
''. Retrieved 21 July 2013.
in exchange for the German surveillance programs Mira4 and Veras. In early 2013,
Hans-Georg Maaßen Hans-Georg Maaßen (born 24 November 1962 in Mönchengladbach) is a German civil servant and lawyer. From 1 August 2012 to 8 November 2018, he served as the President of the Federal Office for the Protection of the Constitution, Germany's domes ...
, President of the German domestic security agency
Bundesamt für Verfassungsschutz The Federal Office for the Protection of the Constitution ( or BfV, often ''Bundesverfassungsschutz'') is Germany's federal domestic intelligence agency. Together with the Landesämter für Verfassungsschutz (LfV) at the state level, the fed ...
(BfV), made several visits to the headquarters of the NSA. According to
classified Classified may refer to: General *Classified information, material that a government body deems to be sensitive *Classified advertising or "classifieds" Music *Classified (rapper) (born 1977), Canadian rapper * The Classified, a 1980s American ro ...
documents of the German government, Maaßen agreed to transfer all data records of persons monitored in Germany by the BfV via XKeyscore to the NSA. In addition, the BfV works very closely with eight other U.S. government agencies, including the
CIA The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
. Under
Project 6 Project 6, or simply P6, is a global surveillance project jointly operated by the U.S.'s Central Intelligence Agency (CIA) in close cooperation with the German intelligence agencies Bundesnachrichtendienst (BND) and Bundesamt für Verfassungsschutz ...
, which is jointly operated by the CIA, BfV, and BND, a massive database containing personal information such as
photo A photograph (also known as a photo, or more generically referred to as an ''image'' or ''picture'') is an image created by light falling on a photosensitive surface, usually photographic film or an electronic image sensor. The process and pra ...
s, license plate numbers, Internet search histories and telephone
metadata Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive ...
was developed to gain a better understanding of the social relationships of presumed
jihad ''Jihad'' (; ) is an Arabic word that means "exerting", "striving", or "struggling", particularly with a praiseworthy aim. In an Islamic context, it encompasses almost any effort to make personal and social life conform with God in Islam, God ...
ists. In 2012, the BfV handed over 864
data set A data set (or dataset) is a collection of data. In the case of tabular data, a data set corresponds to one or more table (database), database tables, where every column (database), column of a table represents a particular Variable (computer sci ...
s of personal information to the CIA, NSA and seven other U.S. intelligence agencies. In exchange, the BND received data from U.S. intelligence agencies on 1,830 occasions. The newly acquired data was handed over to the BfV and stored in a domestically accessible system known as NADIS WN. Image:Dagger Complex 01.jpg, The Dagger Complex in
Darmstadt Darmstadt () is a city in the States of Germany, state of Hesse in Germany, located in the southern part of the Frankfurt Rhine Main Area, Rhine-Main-Area (Frankfurt Metropolitan Region). Darmstadt has around 160,000 inhabitants, making it the ...
, Germany, is operated by the
United States Army The United States Army (USA) is the primary Land warfare, land service branch of the United States Department of Defense. It is designated as the Army of the United States in the United States Constitution.Article II, section 2, clause 1 of th ...
on behalf of the NSA. Similar to the NSA's
Utah Data Center The Utah Data Center (UDC), also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, is a data storage facility for the United States Intelligence Community that is designed to store data estimated to ...
, the Dagger Complex is able to process, store, and decrypt millions of data pieces. Image:Radomes of Bad Aibling Station 1.jpg, The
Bad Aibling Station The Bad Aibling Station (BAS), also known as the 18th United States Army Security Agency Field Station, Field station 81, and Hortensie III is a satellite tracking station operated by the German SIGINT agency BND from nearby ''Mangfall Barrac ...
in
Bavaria Bavaria, officially the Free State of Bavaria, is a States of Germany, state in the southeast of Germany. With an area of , it is the list of German states by area, largest German state by land area, comprising approximately 1/5 of the total l ...
, Germany, was operated by the NSA until the early 2000s. It is currently run by the BND. As part of the global surveillance network
ECHELON Echelon may refer to: * A level formation ** A level or rank in an organization, profession, or society ** A military sub-subunit smaller than a company but larger than a platoon ** Echelon formation, a step-like arrangement of units * ECHELO ...
, it is the largest listening post outside Britain and the USA. Image:BND XKeyscore.jpg, In 2013, the German news magazine ''
Der Spiegel (, , stylized in all caps) is a German weekly news magazine published in Hamburg. With a weekly circulation of about 724,000 copies in 2022, it is one of the largest such publications in Europe. It was founded in 1947 by John Seymour Chaloner ...
'' published an excerpt of an NSA document leaked by Snowden, showing that the BND used the NSA's
XKEYSCORE XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligen ...
to wiretap a German domestic target.


Israel

The Israeli SIGINT National Unit (ISNU) routinely receives raw, unfiltered data of U.S. citizens from the NSA. However, a secret NSA document leaked by Snowden revealed that U.S. government officials are explicitly exempted from such forms of
data sharing Data sharing is the practice of making data used for scholarly research available to other investigators. Many funding agencies, institutions, and publication venues have policies regarding data sharing because transparency and openness are consid ...
with the ISNU. As stated in a memorandum detailing the rules of data sharing on U.S. citizens, the ISNU is obligated to: According to the undated memorandum, the ground rules for intelligence sharing between the NSA and the ISNU were laid out in March 2009. Under the data sharing agreement, the ISNU is allowed to retain the identities of U.S. citizens (excluding U.S. government officials) for up to a year.


Japan

In 2011, the NSA asked the Japanese government to intercept underwater fibre-optic cables carrying phone and Internet data in the Asia-Pacific region. However, the Japanese government refused to comply.


Libya

Under the reign of
Muammar Gaddafi Muammar Muhammad Abu Minyar al-Gaddafi (20 October 2011) was a Libyan military officer, revolutionary, politician and political theorist who ruled Libya from 1969 until Killing of Muammar Gaddafi, his assassination by Libyan Anti-Gaddafi ...
, the Libyan regime forged a partnership with Britain's secret service
MI6 The Secret Intelligence Service (SIS), commonly known as MI6 ( Military Intelligence, Section 6), is the foreign intelligence service of the United Kingdom, tasked mainly with the covert overseas collection and analysis of human intelligenc ...
and the U.S.
Central Intelligence Agency The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
(CIA) to obtain information about Libyan dissidents living in the United States and Canada. In exchange, Gaddafi allowed the Western democracies to use Libya as a base for
extraordinary renditions Extraordinary rendition is a euphemistically-named policy of state-sponsored abduction in a foreign jurisdiction and transfer to a third state. The best-known use of extraordinary rendition is in a United States-led program during the War on ...
.


Netherlands

The
Algemene Inlichtingen en Veiligheidsdienst The General Intelligence and Security Service ( ; AIVD) is the intelligence and security agency of the Netherlands, tasked with domestic, foreign and signals intelligence and protecting national security as well as assisting the Five Eyes in in ...
(AIVD) of the Netherlands has been receiving and storing data of Internet users gathered by U.S. intelligence sources such as the NSA's
PRISM PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD . PRISM collects stored internet ...
surveillance program. During a meeting in February 2013, the AIVD and the
MIVD The Military Intelligence and Security Service ( Dutch: ''Militaire Inlichtingen- en Veiligheidsdienst'') is the military intelligence service of the Netherlands, which operates under the Ministry of Defence. (online pdf here: https://www.docdro ...
briefed the NSA on their attempts to hack Internet forums and to collect the data of all users using a technology known as Computer Network Exploitation (CNE). Image:Notes for Dutch SIGINT-Cyber Analytic Exchange.jpg, Summary of a meeting held in February 2013 between the NSA and the Dutch intelligence services
AIVD The General Intelligence and Security Service ( ; AIVD) is the intelligence and security agency of the Netherlands, tasked with domestic, foreign and signals intelligence and protecting national security as well as assisting the Five Eyes in in ...
and
MIVD The Military Intelligence and Security Service ( Dutch: ''Militaire Inlichtingen- en Veiligheidsdienst'') is the military intelligence service of the Netherlands, which operates under the Ministry of Defence. (online pdf here: https://www.docdro ...


Norway

The
Norwegian Intelligence Service The Norwegian Intelligence Service (NIS) or () is a Norway, Norwegian military intelligence agency under the Chief of Defence (Norway), Chief of Defence and the Norwegian Ministry of Defence, Ministry of Defence. History Olav Njølstad says tha ...
(NIS) has confirmed that data collected by the agency is "shared with the Americans". Kjell Grandhagen, head of Norwegian military intelligence told reporters at a news conference that "We share this information with partners, and partners share with us ... We are talking about huge amounts of traffic data". In cooperation with the NSA, the NIS has gained access to Russian targets in the
Kola Peninsula The Kola Peninsula (; ) is a peninsula in the extreme northwest of Russia, and one of the largest peninsulas of Europe. Constituting the bulk of the territory of Murmansk Oblast, it lies almost completely inside the Arctic Circle and is border ...
and other civilian targets. In general, the NIS provides information to the NSA about "Politicians", "Energy" and "Armament". A
top secret Classified information is confidential material that a government deems to be sensitive information which must be protected from unauthorized disclosure that requires special handling and dissemination controls. Access is restricted by law or ...
memo of the NSA lists the following years as milestones of the Norway-United States of America SIGNT agreement, or NORUS Agreement: *1952 – Informal starting year of cooperation between the NIS and the NSA * 1954 – Formalization of the NORUS Agreement *1963 – Extension of the agreement for coverage of foreign instrumentation signals intelligence (FISINT) * 1970 – Extension of the agreement for coverage of
electronic intelligence Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly u ...
(ELINT) * 1994 – Extension of the agreement for coverage of
communications intelligence Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly u ...
(COMINT) The NSA perceives the NIS as one of its most reliable partners. Both agencies also cooperate to crack the encryption systems of mutual targets. According to the NSA, Norway has made no objections to its requests.


Singapore

The Defence Ministry of Singapore and its Security and Intelligence Division (SID) have been secretly intercepting much of the fibre optic cable traffic passing through the Asian continent. In close cooperation with the
Australian Signals Directorate The Australian Signals Directorate (ASD), formerly the Defence Signals Directorate, is a statutory agency of the Government of Australia responsible for signals intelligence, providing intelligence support to Australian military operations, con ...
(ASD/DSD), Singapore's SID has been able to intercept
SEA-ME-WE 3 SEA-ME-WE3 or South-East Asia - Middle East - Western Europe 3 was an optical submarine telecommunications cable linking those regions and is the longest in the world. Completed in late 2000, it is led by France Telecom and China Telecom, and i ...
(Southeast Asia-Middle East-Western Europe 3) as well as
SEA-ME-WE 4 South East Asia–Middle East–Western Europe 4 (SEA-ME-WE 4) is an optical fibre submarine communications cable system that carries telecommunications between Singapore, Malaysia, Thailand, Bangladesh, India, Sri Lanka, Pakistan, United Arab E ...
telecommunications cable Telecommunications cable is a type of guided transmission medium. Telecommunications are based on transmitting and receiving modulated waves/signals through a medium. Types of telecommunications cable include: electrical cables when electric curre ...
s. Access to these international telecommunications channels is facilitated by Singapore's government-owned operator,
SingTel Singapore Telecommunications Limited, trading as Singtel, is a Singaporean telecommunications conglomerate, the country's principal fixed-line operator and one of the four major mobile network operators operating in the country. Overview T ...
.
Temasek Holdings Temasek Holdings (Private) Limited ( ) is a Singaporean State ownership, state-owned multinational investment firm. Incorporated on 25 June 1974, Temasek has a net portfolio of US$288 billion (S$389 billion) as of 2024. Headquartered at Orchard ...
, a multibillion-dollar
sovereign wealth fund A sovereign wealth fund (SWF), or sovereign investment fund, is a state-owned investment fund that invests in real and financial assets such as stocks, Bond (finance), bonds, real estate, precious metals, or in alternative investments such as ...
with a majority stake in SingTel, has maintained close relations with the country's intelligence agencies. Information gathered by the
Government of Singapore The government of Singapore is defined by the Constitution of Singapore, Constitution of the Republic of Singapore to consist of the President of Singapore, President and the Executive. Executive authority of Singapore is vested in the Presi ...
is transferred to the
Government of Australia The Australian Government, also known as the Commonwealth Government or simply as the federal government, is the national Executive (government), executive government of Australia, a federalism, federal Parliamentary system, parliamentary con ...
as part of an intelligence sharing agreement. This allows the "
Five Eyes The Five Eyes (FVEY) is an Anglosphere intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are party to the multilateral UKUSA Agreement, a treaty for joint cooperat ...
" to maintain a "stranglehold on communications across the
Eastern Hemisphere The Eastern Hemisphere is the half of the planet Earth which is east of the prime meridian (which crosses Greenwich, London, United Kingdom) and west of the antimeridian (which crosses the Pacific Ocean and relatively little land from pole to p ...
".


Spain

In close cooperation with the Centro Nacional de Inteligencia (CNI), the NSA intercepted 60.5 million phone calls in Spain in a single month.


Sweden

The Försvarets radioanstalt (FRA) of Sweden (codenamed Sardines) has allowed the "
Five Eyes The Five Eyes (FVEY) is an Anglosphere intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are party to the multilateral UKUSA Agreement, a treaty for joint cooperat ...
" to access underwater cables in the
Baltic Sea The Baltic Sea is an arm of the Atlantic Ocean that is enclosed by the countries of Denmark, Estonia, Finland, Germany, Latvia, Lithuania, Poland, Russia, Sweden, and the North European Plain, North and Central European Plain regions. It is the ...
. On 5 December 2013,
Sveriges Television Sveriges Television AB ("Sweden's Television aktiebolag, Stock Company"), shortened to SVT (), is the Sweden, Swedish national public broadcasting, public television broadcaster, funded by a public service tax on personal income set by the Riksd ...
(''Swedish Television'') revealed that the FRA has been conducting a clandestine surveillance operation targeting the internal politics of Russia. The operation was conducted on behalf of the NSA, which receives data handed over to it by the FRA. According to documents leaked by Snowden, the FRA of Sweden has been granted access to the NSA's international surveillance program
XKeyscore XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligen ...
. Image:Nsa-internal-pm-on-fra-and-sweden-relations.pdf, The NSA's relationship with Sweden's FRA under the
UKUSA Agreement The United Kingdom – United States of America Agreement (UKUSA, ) is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intellig ...


Switzerland

The
Federal Intelligence Service The Federal Intelligence Service (, ; BND) is the foreign intelligence agency of Germany, directly subordinate to the Chancellor's Office. The BND headquarters is located in central Berlin. The BND has 300 locations in Germany and foreign cou ...
(NDB) of Switzerland exchanges information with the NSA regularly, on the basis of a secret agreement to circumvent domestic surveillance restrictions. In addition, the NSA has been granted access to Swiss surveillance facilities in
Leuk Leuk () is a municipality in the district of Leuk in the canton of Valais in Switzerland. On 1 January 2013, the former municipality of Erschmatt merged into the municipality of Leuk.canton of
Valais Valais ( , ; ), more formally, the Canton of Valais or Wallis, is one of the cantons of Switzerland, 26 cantons forming the Switzerland, Swiss Confederation. It is composed of thirteen districts and its capital and largest city is Sion, Switzer ...
) and Herrenschwanden (canton of
Bern Bern (), or Berne (), ; ; ; . is the ''de facto'' Capital city, capital of Switzerland, referred to as the "federal city".; ; ; . According to the Swiss constitution, the Swiss Confederation intentionally has no "capital", but Bern has gov ...
), which are part of the Swiss surveillance program
Onyx Onyx is a typically black-and-white banded variety of agate, a silicate mineral. The bands can also be monochromatic with alternating light and dark bands. ''Sardonyx'' is a variety with red to brown bands alternated with black or white bands. ...
. According to the NDB, the agency maintains working relationships with about 100 international organizations. However, the NDB has denied any form of cooperation with the NSA. Although the NSA does not have direct access to Switzerland's
Onyx Onyx is a typically black-and-white banded variety of agate, a silicate mineral. The bands can also be monochromatic with alternating light and dark bands. ''Sardonyx'' is a variety with red to brown bands alternated with black or white bands. ...
surveillance program, the Director of the NDB acknowledged that it is possible for other U.S. intelligence agencies to gain access to Switzerland's surveillance system.


United Kingdom

The British government allowed the NSA to store personal data of British citizens. Under Project MINARET, anti-
Vietnam War The Vietnam War (1 November 1955 – 30 April 1975) was an armed conflict in Vietnam, Laos, and Cambodia fought between North Vietnam (Democratic Republic of Vietnam) and South Vietnam (Republic of Vietnam) and their allies. North Vietnam w ...
dissidents in the United States were jointly targeted by the GCHQ and the NSA. Image:Menwith-hill-radomes.jpg,
RAF Menwith Hill Royal Air Force Menwith Hill (RAF Menwith Hill) is a Royal Air Force List of Royal Air Force stations, station near Harrogate, North Yorkshire, England, which provides communications and intelligence support services to the United Kingdom and th ...
, near Harrogate, North Yorkshire, is the biggest listening post outside the United States. It was used by U.S. military personnel to spy on Britons on behalf of
MI5 MI5 ( Military Intelligence, Section 5), officially the Security Service, is the United Kingdom's domestic counter-intelligence and security agency and is part of its intelligence machinery alongside the Secret Intelligence Service (MI6), Gov ...
and
MI6 The Secret Intelligence Service (SIS), commonly known as MI6 ( Military Intelligence, Section 6), is the foreign intelligence service of the United Kingdom, tasked mainly with the covert overseas collection and analysis of human intelligenc ...
.


United States

;Central Intelligence Agency (CIA) The CIA pays
AT&T AT&T Inc., an abbreviation for its predecessor's former name, the American Telephone and Telegraph Company, is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the w ...
more than US$10 million a year to gain access to international phone records, including those of U.S. citizens. ;National Security Agency (NSA) The NSA's Foreign Affairs Directorate interacts with foreign intelligence services and members of the
Five Eyes The Five Eyes (FVEY) is an Anglosphere intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are party to the multilateral UKUSA Agreement, a treaty for joint cooperat ...
to implement global surveillance. ;Federal Bureau of Investigation (FBI) The FBI acts as the
liaison Liaison or Liaisons may refer to: General usage * Affair, an unfaithful sexual relationship * Collaboration * Co-operation * Liaison, an egg-based thickening used in cooking Arts and entertainment * Liaisons (''Desperate Housewives''), a 2007 ...
between U.S. intelligence agencies and
Silicon Valley Silicon Valley is a region in Northern California that is a global center for high technology and innovation. Located in the southern part of the San Francisco Bay Area, it corresponds roughly to the geographical area of the Santa Clara Valley ...
giants such as
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
. ;Department of Homeland Security (DHS) In the early 2010s, the DHS conducted a joint surveillance operation with the FBI to crack down on dissidents of the
Occupy Wall Street Occupy Wall Street (OWS) was a left-wing populist movement against economic inequality, capitalism, corporate greed, big finance, and the influence of money in politics that began in Zuccotti Park, located in New York City's Financial ...
protest movement. ;Other law enforcement agencies The NSA supplies domestic intercepts to the
Drug Enforcement Administration The Drug Enforcement Administration (DEA) is a Federal law enforcement in the United States, United States federal law enforcement agency under the U.S. Department of Justice tasked with combating illicit Illegal drug trade, drug trafficking a ...
(DEA),
Internal Revenue Service The Internal Revenue Service (IRS) is the revenue service for the Federal government of the United States, United States federal government, which is responsible for collecting Taxation in the United States, U.S. federal taxes and administerin ...
(IRS), and other law enforcement agencies, who use intercepted data to initiate criminal investigations against US citizens. Federal agents are instructed to "recreate" the investigative trail in order to "cover up" where the information originated. ;White House Weeks after the
September 11 attacks The September 11 attacks, also known as 9/11, were four coordinated Islamist terrorist suicide attacks by al-Qaeda against the United States in 2001. Nineteen terrorists hijacked four commercial airliners, crashing the first two into ...
, U.S. President
George W. Bush George Walker Bush (born July 6, 1946) is an American politician and businessman who was the 43rd president of the United States from 2001 to 2009. A member of the Bush family and the Republican Party (United States), Republican Party, he i ...
signed the Patriot Act to ensure no disruption in the government's ability to conduct global surveillance: The Patriot Act was extended by U.S. President
Barack Obama Barack Hussein Obama II (born August 4, 1961) is an American politician who was the 44th president of the United States from 2009 to 2017. A member of the Democratic Party, he was the first African American president in American history. O ...
in May 2011 to further extend the federal government's legal authority to conduct additional forms of surveillance such as
roving wiretap In United States law, a roving wiretap is a special kind of wiretap permit that follows the surveillance target. For instance, if a target attempts to defeat a regular wiretap by throwing away a phone and acquiring a new one, another surveillance ...
s.


Commercial cooperation

Over 70 percent of the
United States Intelligence Community The United States Intelligence Community (IC) is a group of separate US federal government, U.S. federal government intelligence agencies and subordinate organizations that work to conduct Intelligence assessment, intelligence activities which ...
's budget is earmarked for payment to private firms. According to ''
Forbes ''Forbes'' () is an American business magazine founded by B. C. Forbes in 1917. It has been owned by the Hong Kong–based investment group Integrated Whale Media Investments since 2014. Its chairman and editor-in-chief is Steve Forbes. The co ...
'' magazine, the defense technology company
Lockheed Martin The Lockheed Martin Corporation is an American Arms industry, defense and aerospace manufacturer with worldwide interests. It was formed by the merger of Lockheed Corporation with Martin Marietta on March 15, 1995. It is headquartered in North ...
is currently the US's biggest defense contractor, and it is destined to be the NSA's most powerful commercial partner and biggest contractor in terms of dollar revenue.


AT&T

In a joint operation with the NSA, the American telecommunications corporation
AT&T AT&T Inc., an abbreviation for its predecessor's former name, the American Telephone and Telegraph Company, is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the w ...
operates
Room 641A Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency, as part of an American mass surveillance program. The facility commenced operations in 2003 and its purpose was publicly revealed ...
in the
SBC Communications AT&T Inc., an abbreviation for its predecessor's former name, the American Telephone and Telegraph Company, is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the ...
building in
San Francisco San Francisco, officially the City and County of San Francisco, is a commercial, Financial District, San Francisco, financial, and Culture of San Francisco, cultural center of Northern California. With a population of 827,526 residents as of ...
to spy on Internet traffic. The CIA pays
AT&T AT&T Inc., an abbreviation for its predecessor's former name, the American Telephone and Telegraph Company, is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the w ...
more than US$10 million a year to gain access to international phone records, including those of U.S. citizens.


Booz Allen Hamilton

Projects developed by
Booz Allen Hamilton Booz Allen Hamilton Holding Corporation (informally Booz Allen) is the parent of Booz Allen Hamilton Inc., an American company specializing in intelligence, AI, and digital transformation. It is headquartered in McLean, Virginia, in the Washing ...
include the Strategic Innovation Group to identify
terrorists Terrorism, in its broadest sense, is the use of violence against non-combatants to achieve political or ideological aims. The term is used in this regard primarily to refer to intentional violence during peacetime or in the context of war aga ...
through social media, on behalf of government agencies. During the
fiscal year A fiscal year (also known as a financial year, or sometimes budget year) is used in government accounting, which varies between countries, and for budget purposes. It is also used for financial reporting by businesses and other organizations. La ...
of 2013, Booz Allen Hamilton derived 99% of its income from the government, with the largest portion of its revenue coming from the
U.S. Army The United States Army (USA) is the primary land service branch of the United States Department of Defense. It is designated as the Army of the United States in the United States Constitution.Article II, section 2, clause 1 of the United Stat ...
. In 2013, Booz Allen Hamilton was hailed by
Bloomberg Businessweek ''Bloomberg Businessweek'', previously known as ''BusinessWeek'' (and before that ''Business Week'' and ''The Business Week''), is an American monthly business magazine published 12 times a year. The magazine debuted in New York City in Septembe ...
as "the World's Most Profitable Spy Organization".


British Telecommunications

British Telecommunications (code-named Remedy), a major supplier of telecommunications, granted Britain's intelligence agency GCHQ "unlimited access" to its network of undersea cables, according to documents leaked by Snowden.


Microsoft

The American multinational corporation
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
helped the NSA to circumvent software encryption safeguards. It also allowed the federal government to monitor web chats on the ''
Outlook.com Outlook.com, formerly Hotmail, is a free personal email service offered by Microsoft. It also provides a webmail interface accessible via web browser or mobile apps featuring mail, Calendaring software, calendaring, Address book, contacts, and ...
'' portal. In 2013, Microsoft worked with the FBI to allow the NSA to gain access to the company's
cloud storage service A file-hosting service, also known as cloud-storage service, online file-storage provider, or cyberlocker, is an internet hosting service specifically designed to host user files. These services allow users to upload files that can be accessed o ...
SkyDrive.


Orange S.A.

The French telecommunications corporation
Orange S.A. Orange S.A. (; formerly , stylised as france telecom) is a French multinational telecommunications corporation founded in 1988 and headquartered in Issy-les-Moulineaux, near Paris. ''Orange'' has been the corporation's main brand for mobile, ...
shares customer call data with the French intelligence agency DGSE, and the intercepted data is handed over to GCHQ.


RSA Security

RSA Security RSA Security LLC, formerly RSA Security, Inc. and trade name RSA, is an American computer security, computer and network security company with a focus on encryption and decryption standards. RSA was named after the initials of its co-founders, ...
was paid US$10 million by the NSA to introduce a
cryptographic Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More gen ...
backdoor in its encryption products.


Stratfor

Strategic Forecasting, Inc., more commonly known as
Stratfor Strategic Forecasting Inc., commonly known as Stratfor, is an American strategic intelligence publishing company founded in 1996. Stratfor's business model is to provide individual and enterprise subscriptions to Stratfor Worldview, its online p ...
, is a global intelligence company offering information to governments and private clients including
Dow Chemical Company The Dow Chemical Company is an American multinational corporation headquartered in Midland, Michigan, United States. The company was among the three largest chemical producers in the world in 2021. It is the operating subsidiary of Dow Inc., ...
,
Lockheed Martin The Lockheed Martin Corporation is an American Arms industry, defense and aerospace manufacturer with worldwide interests. It was formed by the merger of Lockheed Corporation with Martin Marietta on March 15, 1995. It is headquartered in North ...
,
Northrop Grumman Northrop Grumman Corporation is an American multinational Aerospace manufacturer, aerospace and Arms industry, defense company. With 97,000 employees and an annual revenue in excess of $40 billion, it is one of the world's largest Arms industry ...
,
Raytheon Raytheon is a business unit of RTX Corporation and is a major U.S. defense contractor and industrial corporation with manufacturing concentrations in weapons and military and commercial electronics. Founded in 1922, it merged in 2020 with Unite ...
, the
U.S. Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior, home, or public security ministries in other countries. Its missions involv ...
, the U.S. Defense Intelligence Agency, and the
U.S. Marine Corps The United States Marine Corps (USMC), also referred to as the United States Marines or simply the Marines, is the maritime land force service branch of the United States Department of Defense. It is responsible for conducting expeditionary ...
.


Vodafone

The British telecommunications company
Vodafone Vodafone Group Public Limited Company () is a British Multinational company, multinational telecommunications company. Its registered office and global headquarters are in Newbury, Berkshire, England. It predominantly operates Service (economic ...
(code-named Gerontic) granted Britain's intelligence agency GCHQ "unlimited access" to its network of undersea cables, according to documents leaked by Snowden.


In-Q-Tel

In-Q-Tel In-Q-Tel (IQT), formerly Peleus and In-Q-It, is an American not-for-profit venture capital firm based in Arlington, Virginia. It invests in companies to keep the Central Intelligence Agency, and other intelligence agencies, equipped with the lates ...
, which receives more than US$56 million a year in government support, is a
venture capital Venture capital (VC) is a form of private equity financing provided by firms or funds to start-up company, startup, early-stage, and emerging companies, that have been deemed to have high growth potential or that have demonstrated high growth in ...
firm that enables the CIA to invest in
Silicon Valley Silicon Valley is a region in Northern California that is a global center for high technology and innovation. Located in the southern part of the San Francisco Bay Area, it corresponds roughly to the geographical area of the Santa Clara Valley ...
.


Palantir Technologies

Palantir Technologies Palantir Technologies Inc. is an American publicly traded company that specializes in software platforms for big data analytics. Headquartered in Denver, Colorado, it was founded by Peter Thiel, Stephen Cohen, Joe Lonsdale, and Alex Karp in 2 ...
is a
data mining Data mining is the process of extracting and finding patterns in massive data sets involving methods at the intersection of machine learning, statistics, and database systems. Data mining is an interdisciplinary subfield of computer science and ...
corporation with close ties to the FBI, NSA and CIA. Based in
Palo Alto, California Palo Alto ( ; Spanish language, Spanish for ) is a charter city in northwestern Santa Clara County, California, United States, in the San Francisco Bay Area, named after a Sequoia sempervirens, coastal redwood tree known as El Palo Alto. Th ...
, the company developed a data collection and analytical program known as Prism. In 2011, it was revealed that the company conducted surveillance on
Glenn Greenwald Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author, and former lawyer. In 1996, Greenwald founded a law firm concentrating on First Amendment to the United States Constitution, First Amendment litigation. He began blo ...
.


Surveillance evasion

Several countries have evaded global surveillance by constructing secret
bunker A bunker is a defensive military fortification designed to protect people and valued materials from falling bombs, artillery, or other attacks. Bunkers are almost always underground, in contrast to blockhouses which are mostly above ground. T ...
facilities deep below the Earth's surface.


North Korea

Despite North Korea being a priority target, the NSA's internal documents acknowledged that it did not know much about
Kim Jong-un Kim Jong Un (born 8 January 1983 or 1984) is a North Korean politician and dictator who has served as supreme leader of North Korea since 2011 and general secretary of the Workers' Party of Korea (WPK) since 2012. He is the third son of Kim ...
and his regime's intentions.


Iran

In October 2012, Iran's police chief Esmail Ahmadi Moghaddam alleged that
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
is not a search engine but "a spying tool" for Western intelligence agencies. Six months later in April 2013, the country announced plans to introduce an "Islamic
Google Earth Google Earth is a web mapping, web and computer program created by Google that renders a 3D computer graphics, 3D representation of Earth based primarily on satellite imagery. The program maps the Earth by superimposition, superimposing satelli ...
" to evade global surveillance.


Libya

Libya Libya, officially the State of Libya, is a country in the Maghreb region of North Africa. It borders the Mediterranean Sea to the north, Egypt to Egypt–Libya border, the east, Sudan to Libya–Sudan border, the southeast, Chad to Chad–L ...
evaded surveillance by building "hardened and buried" bunkers at least 40 feet below ground level.


Impact

The global surveillance disclosure has caused tension in the
bilateral relations Bilateralism is the conduct of political, economic, or cultural relations between two sovereign states. It is in contrast to unilateralism or multilateralism, which is activity by a single state or jointly by multiple states, respectively. When ...
of the United States with several of its allies and economic partners as well as in its relationship with the
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are Geography of the European Union, located primarily in Europe. The u ...
. On 12 August 2013, President Obama announced the creation of an "independent" panel of "outside experts" to review the NSA's surveillance programs. The panel is due to be established by the Director of National Intelligence,
James R. Clapper James Robert Clapper Jr. (born March 14, 1941) is a retired lieutenant general in the United States Air Force and former Director of National Intelligence. Clapper has held several key positions within the United States Intelligence Community. ...
, who will consult and provide assistance to them. According to a survey undertaken by the human rights group
PEN International PEN International (known as International PEN until 2010) is a worldwide professional association, association of writers, founded in London in 1921 to promote friendship and intellectual co-operation among writers everywhere. The association ...
, these disclosures have had a
chilling effect In a legal context, a chilling effect is the inhibition or discouragement of the legitimate exercise of natural and legal rights by the threat of legal sanction. A chilling effect may be caused by legal actions such as the passing of a law, th ...
on American writers. Fearing the risk of being targeted by government surveillance, 28% of PEN's American members have curbed their usage of social media, and 16% have self-censored themselves by avoiding controversial topics in their writings.


Gallery

Image:UN General Assembly hall.jpg, According to Snowden's documents, the
United Nations Headquarters The headquarters of the United Nations (UN) is on of grounds in the Turtle Bay, Manhattan, Turtle Bay neighborhood of Midtown Manhattan in New York City. It borders First Avenue (Manhattan), First Avenue to the west, 42nd Street (Manhattan), 42nd ...
and the
United Nations General Assembly The United Nations General Assembly (UNGA or GA; , AGNU or AG) is one of the six principal organs of the United Nations (UN), serving as its main deliberative, policymaking, and representative organ. Currently in its Seventy-ninth session of th ...
were targeted by NSA employees disguised as diplomats. Image:Dmitry Medvedev 2 April 2009-1.jpg, Citing Snowden's documents, ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
'' reported that British officials had set up fake
Internet cafe The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
s at the 2009 G-20 London summit to spy on the delegates' use of computers, and to install key-logging software on the delegates' phones. This allowed British representatives to gain a "negotiating advantage" at the summit. Image:Tsinghua University - Square building.JPG, According to Snowden's interview with the ''
South China Morning Post The ''South China Morning Post'' (''SCMP''), with its Sunday edition, the ''Sunday Morning Post'', is a Hong Kong-based English-language newspaper owned by Alibaba Group. Founded in 1903 by Tse Tsan-tai and Alfred Cunningham, it has remaine ...
'', the U.S. government has been hacking numerous non-military targets in China for years. Other high-priority targets include
academic institution An academic institution is an educational institution dedicated to education and research, which grants academic degrees. See also academy and university. Types * Primary schools – (from French ''école primaire'') institutions where childre ...
s such as the prestigious
Tsinghua University Tsinghua University (THU) is a public university in Haidian, Beijing, China. It is affiliated with and funded by the Ministry of Education of China. The university is part of Project 211, Project 985, and the Double First-Class Constructio ...
in
Beijing Beijing, Chinese postal romanization, previously romanized as Peking, is the capital city of China. With more than 22 million residents, it is the world's List of national capitals by population, most populous national capital city as well as ...
. Image:Justus Lipsius, Eastern side.jpg, The
Council of the European Union The Council of the European Union, often referred to in the treaties and other official documents simply as the Council, and less formally known as the Council of Ministers, is the third of the seven institutions of the European Union (EU) a ...
, with its headquarters at the
Justus Lipsius building The Justus Lipsius building, located in the European Quarter of Brussels, Belgium, was the headquarters of the Council of the European Union from 1995, and the '' de facto'' home of the European Council from 2002 (''de jure'' as of 2004), unti ...
in
Brussels Brussels, officially the Brussels-Capital Region, (All text and all but one graphic show the English name as Brussels-Capital Region.) is a Communities, regions and language areas of Belgium#Regions, region of Belgium comprising #Municipalit ...
, was targeted by NSA employees working near the headquarters of
NATO The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental organization, intergovernmental Transnationalism, transnational military alliance of 32 Member states of NATO, member s ...
. An NSA document dated September 2010 explicitly names the Europeans as a "location target". Image:Aeroflot A321-200 VP-BWN SVO Jun 2011.png, The reservations system of Russia's
Aeroflot PJSC AeroflotRussian Airlines (, ), commonly known as Aeroflot ( or ; , , ), is the flag carrier and the largest airline of Russia. Aeroflot is headquartered in the Central Administrative Okrug, Moscow, with its hub being Sheremetyevo Interna ...
airline was hacked by the NSA. Image:Oil platform P-51 (Brazil).jpg,
Petrobras Petróleo Brasileiro S.A., better known by and Trade name, trading as the portmanteau Petrobras (), is a Brazilian state-owned enterprise, majority state-owned multinational corporation in the petroleum industry headquartered in Rio de Janeiro. ...
, currently the world's leader in offshore
deepwater drilling Deepwater drilling, or deep well drilling, is the process of creating holes in the Earth's crust using a drilling rig for oil extraction under the deep sea. There are approximately 3400 deepwater wells in the Gulf of Mexico with depths greater t ...
, is a "prominent" target of the U.S. government. Image:Angela Merkel (2008).jpg, From 2002 to 2013, the German Chancellor
Angela Merkel Angela Dorothea Merkel (; ; born 17 July 1954) is a German retired politician who served as Chancellor of Germany from 2005 to 2021. She is the only woman to have held the office. She was Leader of the Opposition from 2002 to 2005 and Leade ...
was targeted by the U.S.
Special Collection Service The Special Collection Service (SCS), codenamed F6, is a highly classified joint U.S. Central Intelligence Agency–National Security Agency program charged with inserting eavesdropping equipment in difficult-to-reach places, such as foreign e ...
. Image:Ehud Olmert 2006.jpg, Israeli Prime Minister
Ehud Olmert Ehud Olmert (; , ; born 30 September 1945) is an Israeli politician and lawyer who served as the prime minister of Israel from 2006 to 2009. The son of a former Herut politician, Olmert was first elected to the Knesset for Likud in 1973, at th ...
(pictured) and Defense Minister
Ehud Barak Ehud Barak ( ; born Ehud Brog; 12 February 1942) is an Israeli former general and politician who served as the Prime Minister of Israel, prime minister from 1999 to 2001. He was leader of the Israeli Labor Party, Labor Party between 1997 and 20 ...
were included in a list of surveillance targets used by the GCHQ and the NSA. Image:Joaquin Almunia Mercosul.jpg,
Joaquín Almunia Joaquín Almunia Amann (born 17 June 1948) is a Spanish politician and former member of the European Commission. During his tenure in the two Barroso Commissions, he was European commissioner responsible for economic and monetary affairs (2004 ...
, who served as the
European Commissioner for Competition The Commissioner for Competition is the member of the European Commission responsible for Competition (economics), competition. The current commissioner is Teresa Ribera (Spanish Socialist Workers' Party). Responsibilities The portfolio has r ...
and the
Vice-President of the European Commission A Vice-President of the European Commission is a member of the European Commission who leads the commission's work in particular focus areas in which multiple European Commissioners participate. Currently, the European Commission has a total of ...
, was targeted by Britain's GCHQ agency. Image:SusiloBambangYudhoyono.jpg,
Indonesia Indonesia, officially the Republic of Indonesia, is a country in Southeast Asia and Oceania, between the Indian Ocean, Indian and Pacific Ocean, Pacific oceans. Comprising over List of islands of Indonesia, 17,000 islands, including Sumatra, ...
's President
Susilo Bambang Yudhoyono Susilo Bambang Yudhoyono (born 9 September 1949), commonly referred to as SBY, is an Indonesian politician and retired Indonesian Army, army general who served as the sixth president of Indonesia from 2004 to 2014 and the second president of Ind ...
and his wife were placed under surveillance by the
Australian Signals Directorate The Australian Signals Directorate (ASD), formerly the Defence Signals Directorate, is a statutory agency of the Government of Australia responsible for signals intelligence, providing intelligence support to Australian military operations, con ...
(ASD). During the
2007 United Nations Climate Change Conference __NOTOC__ The 2007 United Nations Climate Change Conference took place at the Bali International Conference Centre, Nusa Dua, Bali, Indonesia, between December 3 and December 15, 2007 (though originally planned to end on 14 December). Representa ...
in
Bali Bali (English:; Balinese language, Balinese: ) is a Provinces of Indonesia, province of Indonesia and the westernmost of the Lesser Sunda Islands. East of Java and west of Lombok, the province includes the island of Bali and a few smaller o ...
, the ASD cooperated with the NSA to conduct mass surveillance on the Indonesian hosts. Image:Xbox-Duke-Controller.jpg, The
video gaming Video is an electronic medium for the recording, copying, playback, broadcasting, and display of moving visual media. Video was first developed for mechanical television systems, which were quickly replaced by cathode-ray tube (CRT) syst ...
network
Xbox Live The Xbox network, formerly known and commonly referred to as Xbox Live, is an online multiplayer gaming and digital media delivery service created and operated by Microsoft Gaming for the Xbox brand. It was first made available to the origina ...
was placed under surveillance to unravel possible terrorist plots.


See also

* 2013 Department of Justice investigations of reporters *
Cyber spying Cyber espionage, cyber spying, or cyber-collection is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information using methods on the Internet, networks or individual computers th ...
* Terrorist Finance Tracking Program * Top Secret America


References


Further reading


"Global Surveillance"
. An annotated and categorized "overview of the revelations following the leaks by the whistleblower Edward Snowden. There are also some links to comments and followups". By Oslo University Library. * *''Politico'' Staff.

" ''Politico''. 13 June 2013.
NSA inspector general report on email and internet data collection under Stellar Wind
as provided by The Guardian on 27 June 2013.
Putin talks NSA, Syria, Iran, drones in exclusive RT interview (FULL VIDEO)
" Russia Today. 12 June 2013. *Spencer Ackerman, Ackerman, Spencer.
NSA warned to rein in surveillance as agency reveals even greater scope
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
''. 17 July 2013. *Spencer Ackerman, Ackerman, Spencer.
Slew of court challenges threaten NSA's relationship with tech firms
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
''. Wednesday, 17 July 2013. *Spencer Ackerman, Ackerman, Spencer and Paul Lewis.
NSA amendment's narrow defeat spurs privacy advocates for surveillance fight
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
''. Thursday, 25 July 2013. *Spencer Ackerman, Ackerman, Spencer and Dan Roberts.
US embassy closures used to bolster the case for NSA surveillance programs
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
''. Monday 5 August 2013. *Two of the 'trips' (numbers 29 and 76) in the 2006 book, 'No Holiday', are investigating the NSA and its activities. * Greenwald, Glenn.
Members of Congress denied access to basic information about NSA
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
''. Sunday 4 August 2013. *Liu, Edward C
Surveillance of Foreigners Outside the United States Under Section 702 of the Foreign Intelligence Surveillance Act (FISA)
Congressional Research Service, 13 April 2016. *MacAskill, Ewen.
Justice Department fails in bid to delay landmark case on NSA collection
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
''. Thursday 25 July 2013. *Rushe, Dominic.
Microsoft pushes Eric Holder to lift block on public information sharing
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
''. Tuesday 16 July 2013. *Perez, Evan.
Documents shed light on U.S. surveillance programs
"

CNN. 9 August 2013. * Gellman, Barton.
NSA broke privacy rules thousands of times per year, audit finds
" ''Washington Post''. Thursday 15 August 2013. *Roberts, Dan and Robert Booth.
NSA defenders: embassy closures followed pre-9/11 levels of 'chatter'
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
''. Sunday 4 August 2013. * Greenwald, Glenn.
The crux of the NSA story in one phrase: 'collect it all'
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
''. Monday 15 July 2013. *Sanchez, Julian.
Five things Snowden leaks revealed about NSA’s original warrantless wiretaps
" ''Ars Technica''. 9 July 2013. *Forero, Juan.
Paper reveals NSA ops in Latin America
" ''Washington Post''. 9 July 2013. *Jabour, Bridie.
Telstra signed deal that would have allowed US spying
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
''. Friday 12 July 2013. *Spencer Ackerman, Ackerman, Spencer.
White House stays silent on renewal of NSA data collection order
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
''. Thursday 18 July 2013. *Naughton, John.
Edward Snowden's not the story. The fate of the internet is
" ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
''. 28 July 2013. *
Edward Snowden NSA files: secret surveillance and our revelations so far – Leaked National Security Agency documents have led to several hundred Guardian stories on electronic privacy and the state
by ''The Guardian''s James Ball on 21 August 2013
2013-07-29 Letter of FISA Court president Reggie B. Walton to the Chairman of the U.S. Senate Judiciary Committee Patrick J. Leahy about certain operations of the FISA Court
; among other things the process of accepting, modifying and/or rejecting surveillance measures proposed by the U.S. government, the interaction between the FISA Court and the U.S. government, the appearance of non-governmental parties before the court and the process used by the Court to consider and resolve any instances where the government entities notifies the court of compliance concerns with any of the FISA authorities. * Documents relating to the surveillance against Dilma Rousseff and Enrique Peña Nieto
NSA surveillance: A guide to staying secure - The NSA has huge capabilities – and if it wants in to your computer, it's in. With that in mind, here are five ways to stay safe
by ''The Guardian''s Bruce Schneier on 5 September 2013. {{Privacy Global surveillance, GCHQ National Security Agency Mass surveillance 2013 controversies, Surveillance Edward Snowden Espionage Intelligence operations National security Articles containing video clips