Global surveillance

From Infogalactic: the planetary knowledge core
Jump to: navigation, search

<templatestyles src="Module:Hatnote/styles.css"></templatestyles>

Lua error in package.lua at line 80: module 'strict' not found. Lua error in package.lua at line 80: module 'strict' not found.

Global surveillance refers to the mass surveillance of entire populations across national borders.[1] Its roots can be traced back to the middle of the 20th century, when the UKUSA Agreement was jointly enacted by the United Kingdom and the United States, which later expanded to Canada, Australia, and New Zealand to create the Five Eyes alliance. The alliance developed cooperation arrangements with several "third-party" nations. Eventually, this resulted in the establishment of a global surveillance network, code-named "ECHELON", in 1971.[2][3]

Its existence, however, was not widely acknowledged by governments and the mainstream media until the global surveillance disclosures by Edward Snowden triggered a debate about the right to privacy in the digital age.[4]

Historical background

<templatestyles src="Module:Hatnote/styles.css"></templatestyles>

File:UN General Assembly hall.jpg
According to Snowden's documents, the United Nations Headquarters and the United Nations General Assembly were targeted by NSA employees disguised as diplomats.[5]
Citing Snowden's documents, The Guardian reported that British officials had set up fake internet cafes at the 2009 G-20 London summit to spy on the delegates' use of computers, and to install key-logging software on the delegates' phones. This allowed British representatives to gain a "negotiating advantage" at the summit[6]
According to Snowden's interview with the South China Morning Post, the U.S. government has been hacking numerous non-military targets in China for years. Other high-priority targets include academic institutions such as the prestigious Tsinghua University in Beijing[7]
The Council of the European Union, with its headquarters at the Justus Lipsius building in Brussels, was targeted by NSA employees working near the headquarters of NATO. An NSA document dated September 2010 explicitly names the Europeans as a "location target".[8]
The reservations system of Russia's Aeroflot airline was hacked by the NSA[9]
Petrobras, currently the world's leader in offshore deepwater drilling, is a "prominent" target of the U.S. government[10]
From 2002 to 2013, the German Chancellor Angela Merkel was targeted by the U.S. Special Collection Service[11]
Israeli Prime Minister Ehud Olmert (pictured) and Defense Minister Ehud Barak were included in a list of surveillance targets used by the GCHQ and the NSA[12]
Joaquín Almunia, who served as the European Commissioner for Competition and the Vice-President of the European Commission, was targeted by Britain's GCHQ agency[13]
Indonesia's President Susilo Bambang Yudhoyono and his wife were placed under surveillance by the Australian Signals Directorate (ASD).[14] During the 2007 United Nations Climate Change Conference in Bali, the ASD cooperated with the NSA to conduct mass surveillance on the Indonesian hosts[15]
The video gaming network Xbox Live was placed under surveillance to unravel possible terrorist plots[16]

The origins of global surveillance can be traced back to the late 1940s, after the UKUSA Agreement was jointly enacted by the United Kingdom and the United States, which eventually culminated in the creation of the global surveillance network code-named "ECHELON" in 1971.[2][3]

In the aftermath of the 1970s Watergate affair and a subsequent congressional inquiry led by Sen. Frank Church,[17] it was revealed that the NSA, in collaboration with Britain's GCHQ, had routinely intercepted the international communications of prominent anti-Vietnam War leaders such as Jane Fonda and Dr. Benjamin Spock.[18] Decades later, a multi-year investigation by the European Parliament highlighted the NSA's role in economic espionage in a report entitled 'Development of Surveillance Technology and Risk of Abuse of Economic Information', in 1999.[19]

However, for the general public, it was a series of detailed disclosures of internal NSA documents in June 2013 that first revealed the massive extent of the NSA's spying, both foreign and domestic. Most of these were leaked by an ex-contractor, Edward Snowden. Even so, a number of these older global surveillance programs such as PRISM, XKeyscore, and Tempora were referenced in the 2013 release of thousands of documents.[20] Many countries around the world, including Western Allies and member states of NATO, have been targeted by the "Five Eyes" strategic alliance of Australia, Canada, New Zealand, the UK and the USA—five English-speaking Western democracies aiming to achieve Total Information Awareness by mastering the Internet with analytical tools such as the Boundless Informant.[21] As confirmed by the NSA's director Keith B. Alexander on September 26, 2013, the NSA collects and stores all phone records of all American citizens.[22] Much of the data is kept in large storage facilities such as the Utah Data Center, a US$1.5 billion megaproject referred to by The Wall Street Journal as a "symbol of the spy agency's surveillance prowess."[23]

<templatestyles src="Template:Blockquote/styles.css" />

"Today, this global surveillance system continues to grow. It now collects so much digital detritus — e-mails, calls, text messages, cellphone location data and a catalog of computer viruses - that the N.S.A. is building a 1-million-square-foot facility in the Utah desert to store and process it."

— The New York Times[24] (August 2012)

On June 6, 2013, Britain's The Guardian newspaper began publishing a series of revelations by an as yet unknown American whistleblower, revealed several days later to be ex-CIA and ex-NSA-contracted systems analyst Edward Snowden. Snowden gave a cache of documents to two journalists: Glenn Greenwald and Laura Poitras, Greenwald later estimated that the cache contains 15,000 – 20,000 documents, some very large and very detailed, and some very small.[25][26] In over two subsequent months of publications, it became clear that the NSA had operated a complex web of spying programs which allowed it to intercept internet and telephone conversations from over a billion users from dozens of countries around the world. Specific revelations were made about China, the European Union, Latin America, Iran and Pakistan, and Australia and New Zealand, however the published documentation reveals that many of the programs indiscriminately collected bulk information directly from central servers and internet backbones, which almost invariably carry and reroute information from distant countries.

Due to this central server and backbone monitoring, many of the programs overlapped and interrelated among one another. These programs were often carried out with the assistance of US entities such as the United States Department of Justice and the FBI,[27] were sanctioned by US laws such as the FISA Amendments Act, and the necessary court orders for them were signed by the secret Foreign Intelligence Surveillance Court. Some of the NSA's programs were directly aided by national and foreign intelligence agencies, Britain's GCHQ and Australia's DSD, as well as by large private telecommunications and internet corporations, such as Verizon, Telstra,[28] Google and Facebook.[29]

Purposes

According to the April 2013 summary of documents leaked by Snowden, other than to combat terrorism, these surveillance programs were employed to assess the foreign policy and economic stability of other countries,[30] and to gather "commercial secrets".[31]

In a statement addressed to the National Congress of Brazil in early August 2013, journalist Glenn Greenwald maintained that the U.S. government had used counter-terrorism as a pretext for clandestine surveillance in order to compete with other countries in the "business, industrial and economic fields".[32][33][34] In a December 2013 letter to the Brazilian government, Snowden wrote that "These programs were never about terrorism: they’re about economic spying, social control, and diplomatic manipulation. They’re about power."[35] According to White House panel member NSA didn't stop any terrorist attack.[36] However NSA chief said, that surveillance programs stopped 54 terrorist plots.[37]

In an interview with Der Spiegel published on August 12, 2013, former NSA Director Michael Hayden admitted that "We (the NSA) steal secrets. We're number one in it". Hayden also added: "We steal stuff to make you safe, not to make you rich".[30]

According to documents seen by the news agency Reuters, these "secrets" were subsequently funnelled to authorities across the nation to help them launch criminal investigations of Americans.[38] Federal agents are then instructed to "recreate" the investigative trail in order to "cover up" where the information originated.[38]

According to the congressional testimony of Keith B. Alexander, Director of the National Security Agency, one of the purposes of its data collection is to store all the phone records inside a place that can be searched and assessed at all times. When asked by Senator Mark Udall if the goal of the NSA is to collect the phone records of all Americans, Alexander replied:

<templatestyles src="Template:Blockquote/styles.css" />

"Yes, I believe it is in the nation's best interest to put all the phone records into a lockbox that we could search when the nation needs to do it."

Targets and methods

Socioeconomical

Collection of metadata and other content

In the United States, the NSA is collecting the phone records of more than 300 million Americans.[40] The international surveillance tool XKeyscore allows government analysts to search through vast databases containing emails, online chats and the browsing histories of millions of individuals.[41][42][43] Britain's global surveillance program Tempora intercepts the fibre-optic cables that form the backbone of the Internet.[44] Under the NSA's PRISM surveillance program, data that has already reached its final destination would be directly harvested from the servers of the following U.S. service providers: Microsoft, Yahoo!, Google, Facebook, Paltalk, AOL, Skype, YouTube, and Apple Inc.[45]

Contact chaining

The NSA uses the analysis of phone call and e-mail logs of American citizens to create sophisticated graphs of their social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information.[46]

According to top secret NSA documents leaked by Edward Snowden, during a single day in 2012, the NSA collected e-mail address books from:

Each day, the NSA collects contacts from an estimated 500,000 buddy lists on live-chat services as well as from the inbox displays of Web-based e-mail accounts.[47] Taken together, the data enables the NSA to draw detailed maps of a person’s life based on their personal, professional, religious and political connections.[47]

Data transfer
Federal agencies in the United States

Data gathered by these surveillance programs is routinely shared with the U.S. Federal Bureau of Investigation (FBI) and the U.S. Central Intelligence Agency (CIA).[48] In addition, the NSA supplies domestic intercepts to the Drug Enforcement Administration (DEA), Internal Revenue Service (IRS), and other law enforcement agencies.[38]

Foreign countries

As a result of the NSA's secret treaties with foreign countries, data gathered by its surveillance programs is routinely shared with countries who are signatories to the UKUSA Agreement. These foreign countries also help to operate several NSA programs such as XKEYSCORE. (See International cooperation.)

Financial payments monitoring

A special branch of the NSA called "Follow the Money" (FTM) monitors international payments, banking and credit card transactions and later stores the collected data in the NSA's financial databank, "Tracfin".[49]

Mobile phone location tracking

Mobile phone tracking refers to the act of attaining the position and coordinates of a mobile phone. According to The Washington Post, the NSA has been tracking the locations of mobile phones from all over the world by tapping into the cables that connect mobile networks globally and that serve U.S. cellphones as well as foreign ones. In the process of doing so, the NSA collects more than 5 billion records of phone locations on a daily basis. This enables NSA analysts to map cellphone owners’ relationships by correlating their patterns of movement over time with thousands or millions of other phone users who cross their paths.[50][51][52][53][54][55][56]

In order to decode private conversations, the NSA has cracked the most commonly used cellphone encryption technology, A5/1. According to a classified document leaked by Snowden, the agency can "process encrypted A5/1" even when it has not acquired an encryption key.[57] In addition, the NSA uses various types of cellphone infrastructure, such as the links between carrier networks, to determine the location of a cellphone user tracked by Visitor Location Registers.[58]

Infiltration of smartphones

As worldwide sales of smartphones grew rapidly, the NSA decided to take advantage of the smartphone boom. This is particularly advantageous because the smartphone contains a variety of data sets that would interest an intelligence agency, such as social contacts, user behavior, interests, location, photos and credit card numbers and passwords.[59]

According to documents leaked by Edward Snowden, the NSA has set up task forces assigned to several smartphone manufacturers and operating systems, including Apple Inc.'s iPhone and iOS operating system, as well as Google's Android mobile operating system.[59] Similarly, Britain's GCHQ assigned a team to study and crack the BlackBerry.[59] In addition, there are smaller NSA programs, known as "scripts", that can perform surveillance on 38 different features of the iOS 3 and iOS 4 operating systems. These include the mapping feature, voicemail and photos, as well as Google Earth, Facebook and Yahoo! Messenger.[59]

Infiltration of commercial data centers

In contrast to the PRISM surveillance program, which is a front-door method of access that is nominally approved by the FISA court, the MUSCULAR surveillance program is noted to be "unusually aggressive" in its usage of unorthodox hacking methods to infiltrate Yahoo! and Google data centers around the world. As the program is operated overseas (United Kingdom), the NSA presumes that anyone using a foreign data link is a foreigner, and is therefore able to collect content and metadata on a previously unknown scale from U.S. citizens and residents.[60] According to documents leaked by Edward Snowden, the MUSCULAR surveillance program is jointly operated by the NSA and Britain's GCHQ agency.[61] (See International cooperation.)

Infiltration of anonymous networks

The Five Eyes have made repeated attempts to spy on Internet users communicating in secret via the anonymity network Tor. Several of their clandestine operations involve the implantation of malicious code into the computers of anonymous Tor users who visit infested websites. In some cases, the NSA and GCHQ have succeeded in blocking access to the anonymous network, diverting Tor users to insecure channels. In other cases, the NSA and the GCHQ were able to uncover the identity of these anonymous users.[62][63][64][65][66][67][68][69][70]

Monitoring of hotel reservation systems

Under the Royal Concierge surveillance program, Britain's GCHQ agency uses an automated monitoring system to infiltrate the reservation systems of at least 350 luxury hotels in many different parts of the world.[71] Other related surveillance programs involve the wiretapping of room telephones and fax machines used in targeted hotels as well as the monitoring of computers hooked up to the hotel network.[71]

Virtual reality surveillance

The U.S. National Security Agency (NSA), the U.S. Central Intelligence Agency (CIA), and Britain's Government Communications Headquarters (GCHQ) have been conducting surveillance on the networks of many online games, including massively multiplayer online role-playing games (MMORPGs) such as World of Warcraft, as well as virtual worlds such as Second Life, and the Xbox gaming console.[72]

The New York Times, citing documents leaked by Edward Snowden, reported in September 2013 on the NSA's "push to exploit phone and e-mail data of Americans after it lifted restrictions in 2010", which enables "large-scale graph analysis on very large sets of communications metadata".[73] This slide from an NSA presentation shows one of the methods in which the agency uses e-mail and phone data to analyze the relationship network of a target. According to The Times, the NSA can "augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data".[46] Such types of data were collected from U.S. citizens as well as foreign nationals.[46]

Political espionage

According to the April 2013 summary of disclosures, the NSA defined its "intelligence priorities" on a scale of "1" (highest interest) to "5" (lowest interest).[30] It classified about 30 countries as "3rd parties", with whom it cooperates but also spies on:

  • Main targets: China, Russia, Iran, Pakistan and Afghanistan were ranked highly on the NSA's list of spying priorities, followed by France, Germany, Japan, and Brazil. The European Union's "international trade" and "economic stability" are also of interest.[30] Other high priority targets include Cuba, Israel, and North Korea.[74]
  • Irrelevant : From a US intelligence perspective, countries such as Cambodia, Laos and Nepal were largely irrelevant, as were governments of smaller European Union countries such as Finland, Denmark, Croatia and the Czech Republic.[30]

Other prominent targets included members and adherents of the internet group known as "Anonymous",[30] as well as potential whistleblowers.[75] According to Edward Snowden, the NSA targeted reporters who wrote critically about the government after 9/11.[76]

As part of a joint operation with the Central Intelligence Agency (CIA), the NSA deployed secret eavesdropping posts in eighty U.S. embassies and consulates worldwide.[5] The headquarters of NATO were also used by NSA experts to spy on the European Union.[77]

In 2013, documents provided by Edward Snowden revealed that the following intergovernmental organizations, diplomatic missions, and government ministries have been subjected to surveillance by the "Five Eyes":

Country/
Organization
Target Method(s)
 Brazil Ministry of Energy Collection of metadata records by the Communications Security Establishment of Canada (CSEC)[78]
 France Ministry of Foreign and European Affairs Infiltration of virtual private networks (VPN)[79]
Embassy of France in Washington, D.C
 Germany Embassy of Germany in Rwanda[13]
 Italy Embassy of Italy in Washington, D.C
 India Embassy of India in Washington, D.C
Permanent Representative of India to the United Nations
 Mexico Secretariat of Public Security
  • Hacking of e-mail accounts as part of an operation code-named "Whitetamale"[82]
 European Union Council of the European Union in Brussels
Delegation to the United Nations in New York
Delegation to the United States in Washington, D.C
 United Nations United Nations Headquarters
International Atomic Energy Agency (IAEA)
United Nations Development Programme (UNDP)[13]
United Nations Children's Fund (UNICEF)[13]

International cooperation

The "Five Eyes" of Australia, Canada, New Zealand, the United Kingdom and the United States

During World War II, the BRUSA Agreement was signed by the governments of the United States and the United Kingdom for the purpose of intelligence sharing.[85] This was later formalized in the UKUSA Agreement of 1946 as a secret treaty. The full text of the agreement was released to the public on June 25, 2010.[86]

Although the treaty was later revised to include other countries such as Denmark, Germany, Ireland, Norway, Turkey, and the Philippines,[86] most of the information sharing has been performed by the so-called "Five Eyes",[87] a term referring to the following English-speaking western democracies and their respective intelligence agencies:

Top secret documents leaked by Edward Snowden revealed that the "Five Eyes" have gained access to the majority of internet and telephone communications flowing throughout Europe, the United States, and other parts of the world.


Left: SEA-ME-WE 3, which runs across the Afro-Eurasian supercontinent from Japan to Northern Germany, is one of the most important submarine cables accessed by the "Five Eyes". Singapore, a former British colony in the Asia-Pacific region (blue dot), plays a vital role in intercepting internet and telecommunications traffic heading from Australia/Japan to Europe, and vice versa. An intelligence sharing agreement between Singapore and Australia allows the rest of the "Five Eyes" to gain access to SEA-ME-WE 3.[88]
Right: TAT-14, a telecommunications cable linking Europe with the United States, was identified as one of few assets of "Critical Infrastructure and Key Resources" of the USA on foreign territory. In 2013, it was revealed that British officials "pressured a handful of telecommunications and internet companies" to allow the British government to gain access to TAT-14.[89]

According to the leaked documents, aside from the Five Eyes, most other Western countries have also participatied in the NSA surveillance system and are sharing information with each other.[90] However, being a partner of the NSA does not automatically exempt a country from being targeted by the NSA. According to an internal NSA document leaked by Snowden, "We (the NSA) can, and often do, target the signals of most 3rd party foreign partners."[91]

Australia

Pine Gap, near the Australian town of Alice Springs, is run by the CIA and it is part of the global surveillance program ECHELON.[92][93]

The Australian Signals Directorate (ASD), formerly known as the Defence Signals Directorate (DSD), shares information on Australian citizens with the other members of the UKUSA Agreement. According to a 2008 Five Eyes document leaked by Edward Snowden, data of Australian citizens shared with foreign countries include "bulk, unselected, unminimised metadata" as well as "medical, legal or religious information".[94]

In close cooperation with other members of the Five Eyes community, the ASD runs secret surveillance facilities in many parts of Southeast Asia without the knowledge of Australian diplomats.[95] In addition, the ASD cooperates with the Security and Intelligence Division (SID) of the Republic of Singapore in an international operation to intercept underwater telecommunications cables across the Eastern Hemisphere and the Pacific Ocean.[96]

Canada

The Communications Security Establishment Canada (CSEC) offers the NSA resources for advanced collection, processing, and analysis. It has set up covert sites at the request of NSA.[97] The US-Canada SIGNT relationship dates back to a secret alliance formed during World War II, and was formalized in 1949 under the CANUSA Agreement.[97]

On behalf of the NSA, the CSEC opened secret surveillance facilities in 20 countries around the world.[98]

As well, the Communications Security Establishment Canada has been revealed, following the global surveillance disclosures to be engaging in surveillance on Wifi Hotspots of major Canadian Airports, collecting meta-data to use for engaging in surveillance on travelers, even days after their departure from said airports.[99]

Denmark

The Politiets Efterretningstjeneste (PET) of Denmark, a domestic intelligence agency, exchanges data with the NSA on a regular basis, as part of a secret agreement with the United States.[100] Being one of the "9-Eyes" of the UKUSA Agreement, Denmark’s relationship with the NSA is closer than the NSA's relationship with Germany, Sweden, Spain, Belgium or Italy.[101]

France

The Directorate-General for External Security (DGSE) of France maintains a close relationship with both the NSA and the GCHQ after discussions for increased cooperation began in November 2006.[102] By the early 2010s, the extent of cooperation in the joint interception of digital data by the DGSE and the NSA was noted to have increased dramatically.[102][103]

In 2011, a formal memorandum for data exchange was signed by the DGSE and the NSA, which facilitated the transfer of millions of metadata records from the DGSE to the NSA.[104] From December 2012 to 8 January 2013, over 70 million metadata records were handed over to the NSA by French intelligence agencies.[104]

Germany

The Bundesnachrichtendienst (BND) of Germany systematically transfers metadata from German intelligence sources to the NSA. In December 2012 alone, the BND provided the NSA with 500 million metadata records.[105] The NSA granted the Bundesnachrichtendienst access to X-Keyscore,[106] in exchange for the German surveillance programs Mira4 and Veras.[105]

In early 2013, Hans-Georg Maaßen, President of the German domestic security agency Bundesamt für Verfassungsschutz (BfV), made several visits to the headquarters of the NSA. According to classified documents of the German government, Maaßen agreed to transfer all data records of persons monitored in Germany by the BfV via XKeyscore to the NSA.[107] In addition, the BfV works very closely with eight other U.S. government agencies, including the CIA.[108] Under Project 6, which is jointly operated by the CIA, BfV, and BND, a massive database containing personal information such as photos, license plate numbers, Internet search histories and telephone metadata was developed to gain a better understanding of the social relationships of presumed jihadists.[109]

In 2012, the BfV handed over 864 data sets of personal information to the CIA, NSA and seven other U.S. intelligence agencies. In exchange, the BND received data from U.S. intelligence agencies on 1,830 occasions. The newly acquired data was handed over to the BfV and stored in a domestically accessible system known as NADIS WN.[110]

Israel

File:Israel Memorandum of Understanding SIGINT.pdf

The Israeli SIGINT National Unit (ISNU) routinely receives raw, unfiltered data of U.S. citizens from the NSA. However, a secret NSA document leaked by Snowden revealed that U.S. government officials are explicitly exempted from such forms of data sharing with the ISNU.[113] As stated in a memorandum detailing the rules of data sharing on U.S. citizens, the ISNU is obligated to:

<templatestyles src="Template:Blockquote/styles.css" />

"Destroy upon recognition any communication contained in raw SIGINT provided by NSA that is either to or from an official of the U.S. government. "U.S. government officials" include officials of the Executive Branch (including White House, Cabinet Departments, and independent agencies); the U.S. House of Representatives and Senate (members and staff); and the U.S. Federal Court system (including, but not limited to, the Supreme Court)."

According to the undated memorandum, the ground rules for intelligence sharing between the NSA and the ISNU were laid out in March 2009.[113] Under the data sharing agreement, the ISNU is allowed to retain the identities of U.S. citizens (excluding U.S. government officials) for up to a year.[113]

Japan

In 2011, the NSA asked the Japanese government to intercept underwater fiber-optic cables carrying phone and Internet data in the Asia-Pacific region. However, the Japanese government refused to comply.[114]

Netherlands

The Algemene Inlichtingen en Veiligheidsdienst (AIVD) of the Netherlands has been receiving and storing data of Internet users gathered by U.S. intelligence sources such as the NSA's PRISM surveillance program.[115] During a meeting in February 2013, the AIVD and the MIVD briefed the NSA on their attempts to hack Internet forums and to collect the data of all users using a technology known as Computer Network Exploitation (CNE).[116]

Norway

The Norwegian Intelligence Service (NIS) has confirmed that data collected by the agency is "shared with the Americans".[117] Kjell Grandhagen, head of Norwegian military intelligence told reporters at a news conference that "We share this information with partners, and partners share with us...We are talking about huge amounts of traffic data".[118]

In cooperation with the NSA, the NIS has gained access to Russian targets in the Kola Peninsula and other civilian targets. In general, the NIS provides information to the NSA about "Politicians", "Energy" and "Armament".[119] A top secret memo of the NSA lists the following years as milestones of the Norway-United States of America SIGNT agreement, or NORUS Agreement:

The NSA perceives the NIS as one of its most reliable partners. Both agencies also cooperate to crack the encryption systems of mutual targets. According to the NSA, Norway has made no objections to its requests.[120]

Singapore

The Defence Ministry of Singapore and its Security and Intelligence Division (SID) have been secretly intercepting much of the fibre optic cable traffic passing through the Asian continent. In close cooperation with the Australian Signals Directorate (ASD/DSD), Singapore's SID has been able to intercept SEA-ME-WE 3 (Southeast Asia-Middle East-Western Europe 3) as well as SEA-ME-WE 4 telecommunications cables.[96] Access to these international telecommunications channels is facilitated by Singapore's government-owned operator, SingTel.[96] Temasek Holdings, a multibillion-dollar sovereign wealth fund with a majority stake in SingTel, has maintained close relations with the country's intelligence agencies.[96]

Information gathered by the Government of Singapore is transferred to the Government of Australia as part of an intelligence sharing agreement. This allows the "Five Eyes" to maintain a "stranglehold on communications across the Eastern Hemisphere".[88]

Spain

In close cooperation with Spanish intelligence agencies, the NSA intercepted 60.5 million phone calls in Spain in a single month.[121][122]

Sweden

The Försvarets radioanstalt (FRA) of Sweden (codenamed Sardines)[123] has allowed the "Five Eyes" to access underwater cables in the Baltic Sea.[123] On 5 December 2013, Sveriges Television (Swedish Television) revealed that the FRA has been conducting a clandestine surveillance operation targeting the internal politics of Russia. The operation was conducted on behalf of the NSA, which receives data handed over to it by the FRA.[124][125]

According to documents leaked by Snowden, the FRA of Sweden has been granted access to the NSA's international surveillance program XKeyscore.[126]

Switzerland

The Federal Intelligence Service (NDB) of Switzerland exchanges information with the NSA regularly, on the basis of a secret agreement to circumvent domestic surveillance restrictions.[127][128] In addition, the NSA has been granted access to Swiss surveillance facilities in Leuk (canton of Valais) and Herrenschwanden (canton of Bern), which are part of the Swiss surveillance program Onyx.[127]

According to the NDB, the agency maintains working relationships with about 100 international organizations. However, the NDB has denied any form of cooperation with the NSA.[129] Although the NSA does not have direct access to Switzerland's Onyx surveillance program, the Director of the NDB acknowledged that it is possible for other U.S. intelligence agencies to gain access to Switzerland's surveillance system.[129]

United Kingdom

<templatestyles src="Module:Hatnote/styles.css"></templatestyles>

The British government allowed the NSA to store personal data of British citizens.[130]

Under Project MINARET, anti-Vietnam War dissidents in the United States were jointly targeted by the GCHQ and the NSA.[131][132]

United States

Lua error in package.lua at line 80: module 'strict' not found.

<templatestyles src="Module:Hatnote/styles.css"></templatestyles>

Central Intelligence Agency (CIA)

The CIA pays AT&T more than US$10 million a year to gain access to international phone records, including those of U.S. citizens.[134]

National Security Agency (NSA)

The NSA's Foreign Affairs Directorate interacts with foreign intelligence services and members of the Five Eyes to implement global surveillance.[135]

Federal Bureau of Investigation (FBI)

The FBI acts as the liaison between U.S. intelligence agencies and Silicon Valley giants such as Microsoft.[48]

Department of Homeland Security (DHS)

In the early 2010s, the DHS conducted a joint surveillance operation with the FBI to crackdown on dissidents of the Occupy Wall Street protest movement.[136][137][138]

Other law enforcement agencies

The NSA supplies domestic intercepts to the Drug Enforcement Administration (DEA), Internal Revenue Service (IRS), and other law enforcement agencies, who use intercepted data to intitiate criminal investigations against US citizens. Federal agents are instructed to "recreate" the investigative trail in order to "cover up" where the information originated.[38]

White House
File:US President Barack Obama, surveillance activities, June 2013.ogv
U.S. President Barack Obama emphasizing the importance of global surveillance to prevent terrorist attacks

Weeks after the September 11 attacks, U.S. President George W. Bush signed the Patriot Act to ensure no disruption in the government's ability to conduct global surveillance:

<templatestyles src="Template:Blockquote/styles.css" />

This new law that I sign today will allow surveillance of all communications used by terrorists, including e-mails, the Internet and cell phones.

— U.S. President George W. Bush on the implementation of the Patriot Act after the September 11 attacks[139]

The Patriot Act was extended by U.S. President Barack Obama in May 2011 to further extend the federal government's legal authority to conduct additional forms of surveillance such as roving wiretaps.[140]

Commercial cooperation

Over 70 percent of the United States Intelligence Community's budget is earmarked for payment to private firms.[141] According to Forbes magazine, the defense technology company Lockheed Martin is currently the USA's biggest defense contractor, and it is destined to be the NSA's most powerful commercial partner and biggest contractor in terms of dollar revenue.[142]

AT&T

In a joint operation with the NSA, the American telecommunications corporation AT&T operates Room 641A in the SBC Communications building in San Francisco to spy on internet traffic.[143] The CIA pays AT&T more than US$10 million a year to gain access to international phone records, including those of U.S. citizens.[134]

Booz Allen Hamilton

Projects developed by Booz Allen Hamilton include the Strategic Innovation Group to identify terrorists through social media, on behalf of government agencies.[144] During the fiscal year of 2013, Booz Allen Hamilton derived 99% of its income from the government, with the largest portion of its revenue coming from the U.S. Army.[144] In 2013, Booz Allen Hamilton was hailed by Bloomberg Businessweek as "the World's Most Profitable Spy Organization".[145]

British Telecommunications

British Telecommunications (code-named Remedy[146]), a major supplier of telecommunications, granted Britain's intelligence agency GCHQ "unlimited access" to its network of undersea cables, according to documents leaked by Snowden.[146]

Microsoft

The American multinational corporation Microsoft helped the NSA to circumvent software encryption safeguards. It also allowed the federal government to monitor web chats on the Outlook.com portal.[48] In 2013, Microsoft worked with the FBI to allow the NSA to gain access to the company's cloud storage service SkyDrive.[48]

Orange S.A.

French telecommunications corporation Orange S.A. shares customer call data with intelligence agencies[147]

The French telecommunications corporation Orange S.A. shares customer call data with the French intelligence agency DGSE, and the intercepted data is handed over to GCHQ.[147]

RSA Security

RSA Security was paid US$10 million by the NSA to introduce a cryptographic backdoor in its encryption products.[148]

Stratfor

Strategic Forecasting, Inc., more commonly known as Stratfor, is a global intelligence company offering information to governments and private clients including Dow Chemical Company, Lockheed Martin, Northrop Grumman, Raytheon, the U.S. Department of Homeland Security, the U.S. Defense Intelligence Agency, and the U.S. Marine Corps.[149]

Vodafone

The British telecommunications company Vodafone (code-named Gerontic[146]) granted Britain's intelligence agency GCHQ "unlimited access" to its network of undersea cables, according to documents leaked by Snowden.[146]

In-Q-Tel

In-Q-Tel, which receives more than US$56 million a year in government support,[150] is a venture capital firm that enables the CIA to invest in Silicon Valley.[150]

Palantir Technologies

Palantir Technologies is a data mining corporation with close ties to the FBI, NSA and CIA.[151][152]

Based in Palo Alto, California, the company developed a data collection and analytical program known as Prism.[153][154]

Surveillance evasion

Several countries have evaded global surveillance by constructing secret bunker facilities deep below the Earth's surface.[155]

North Korea

Despite North Korea being a priority target, the NSA's internal documents acknowledged that it did not know much about Kim Jong Un and his regime's intentions.[74]

Iran

In October 2012, Iran's police chief Esmail Ahmadi Moghaddam alleged that Google is not a search engine but "a spying tool" for Western intelligence agencies.[156] Six months later in April 2013, the country announced plans to introduce an "Islamic Google Earth" to evade global surveillance.[157]

Libya

Libya evaded surveillance by building "hardened and buried" bunkers at least 40 feet below ground level.[155]

Timeline of disclosures

<templatestyles src="Module:Hatnote/styles.css"></templatestyles>

Edward Snowden's disclosures of the NSA's surveillance activities are a continuation of news leaks which have been ongoing since the early 2000s. One year after the September 11, 2001 attacks, former U.S. intelligence official William Binney, was publicly critical of the NSA for spying on U.S. citizens.[158]

Further disclosures followed. On December 16, 2005, The New York Times published a report under the headline "Bush Lets U.S. Spy on Callers Without Courts."[159] In 2006, further evidence of the NSA's domestic surveillance of U.S. citizens was provided by USA Today. The newspaper released a report on May 11, 2006 regarding the NSA's "massive database" of phone records collected from "tens of millions" of U.S. citizens. According to USA Today, these phone records were provided by several telecom companies such as AT&T, Verizon and BellSouth.[160] In 2008, the security analyst Babak Pasdar revealed the existence of the so-called "Quantico circuit" that he and his team discovered in 2003 when brought on to update the carrier's security system. The circuit provided the U.S. federal government with a backdoor into the network of an unnamed wireless provider, which was later independently identified as Verizon.[161]

Snowden made his first contact with journalist Glenn Greenwald of The Guardian in late 2012.[162] The timeline of mass surveillance disclosures by Snowden continued throughout the entire year of 2013.

By category

<templatestyles src="Module:Hatnote/styles.css"></templatestyles>

Documents leaked by Edward Snowden in 2013 include court orders, memos, and policy documents related to a wide range of surveillance activities.

Impact

<templatestyles src="Module:Hatnote/styles.css"></templatestyles>

The global surveillance disclosure has caused tension in the bilateral relations of the United States with several of its allies and economic partners as well as in its relationship with the European Union. On August 12, 2013, President Obama announced the creation of an "independent" panel of "outside experts" to review the NSA's surveillance programs. The panel is due to be established by the Director of National Intelligence, James R. Clapper, who will consult and provide assistance to them.[163]

According to a survey undertaken by the human rights group PEN International, these disclosures have had a chilling effect on American writers. Fearing the risk of being targeted by government surveillance, 28% of PEN's American members have curbed their usage of social media, and 16% have self-censored themselves by avoiding controversial topics in their writings.[164]

See also

References

  1. Lua error in package.lua at line 80: module 'strict' not found.
  2. 2.0 2.1 Lua error in package.lua at line 80: module 'strict' not found.
  3. 3.0 3.1 Lua error in package.lua at line 80: module 'strict' not found.
  4. Lua error in package.lua at line 80: module 'strict' not found.
  5. 5.0 5.1 Lua error in package.lua at line 80: module 'strict' not found.
  6. Lua error in package.lua at line 80: module 'strict' not found.
  7. Lua error in package.lua at line 80: module 'strict' not found.
  8. Lua error in package.lua at line 80: module 'strict' not found.
  9. Lua error in package.lua at line 80: module 'strict' not found.
  10. Lua error in package.lua at line 80: module 'strict' not found.
  11. Lua error in package.lua at line 80: module 'strict' not found.
  12. Lua error in package.lua at line 80: module 'strict' not found.
  13. 13.0 13.1 13.2 13.3 Lua error in package.lua at line 80: module 'strict' not found.
  14. Lua error in package.lua at line 80: module 'strict' not found.
  15. Lua error in package.lua at line 80: module 'strict' not found.
  16. Lua error in package.lua at line 80: module 'strict' not found.
  17. Lua error in package.lua at line 80: module 'strict' not found.
  18. Lua error in package.lua at line 80: module 'strict' not found.
  19. Lua error in package.lua at line 80: module 'strict' not found.
  20. Lua error in package.lua at line 80: module 'strict' not found.
  21. Lua error in package.lua at line 80: module 'strict' not found.
  22. Lua error in package.lua at line 80: module 'strict' not found.
  23. Lua error in package.lua at line 80: module 'strict' not found.
  24. Lua error in package.lua at line 80: module 'strict' not found.
  25. Lua error in package.lua at line 80: module 'strict' not found.
  26. Lua error in package.lua at line 80: module 'strict' not found.
  27. How Microsoft handed the NSA access to encrypted messages, The Guardian, July 12, 2013. Retrieved July 13, 2013.
  28. Lua error in package.lua at line 80: module 'strict' not found.
  29. The first three days of revelations were: the FISC court order that Verizon provide bulk metadata on its customers to the NSA; presentation slides explaining the cooperation of nine US internet giants through the PRISM program; and the bulk collection of Chinese users' text messages, which coincided with Xi Jinping's visit to California to meet Barack Obama.
  30. 30.0 30.1 30.2 30.3 30.4 30.5 Lua error in package.lua at line 80: module 'strict' not found.
  31. Lua error in package.lua at line 80: module 'strict' not found.
  32. Lua error in package.lua at line 80: module 'strict' not found.
  33. Lua error in package.lua at line 80: module 'strict' not found.
  34. Lua error in package.lua at line 80: module 'strict' not found.
  35. Lua error in package.lua at line 80: module 'strict' not found.[dead link]
  36. http://investigations.nbcnews.com/_news/2013/12/20/21975158-nsa-program-stopped-no-terror-attacks-says-white-house-panel-member
  37. Lua error in package.lua at line 80: module 'strict' not found.
  38. 38.0 38.1 38.2 38.3 Lua error in package.lua at line 80: module 'strict' not found. Cite error: Invalid <ref> tag; name "reuters3" defined multiple times with different content
  39. Lua error in package.lua at line 80: module 'strict' not found.
  40. Lua error in package.lua at line 80: module 'strict' not found.
  41. Greenwald, Glenn (July 31, 2013)."XKeyscore: NSA tool collects 'nearly everything a user does on the internet' – XKeyscore Gives 'Widest-Reaching' Collection of Online Data – NSA Analysts Require No Prior Authorization for Searches – Sweeps Up Emails, Social Media Activity and Browsing History". The Guardian. Retrieved August 1, 2013.
  42. Lua error in package.lua at line 80: module 'strict' not found.
  43. Lua error in package.lua at line 80: module 'strict' not found.
  44. Lua error in package.lua at line 80: module 'strict' not found.
  45. Lua error in package.lua at line 80: module 'strict' not found.
  46. 46.0 46.1 46.2 Lua error in package.lua at line 80: module 'strict' not found.
  47. 47.0 47.1 47.2 47.3 47.4 47.5 Lua error in package.lua at line 80: module 'strict' not found.
  48. 48.0 48.1 48.2 48.3 Lua error in package.lua at line 80: module 'strict' not found.
  49. Lua error in package.lua at line 80: module 'strict' not found.
  50. Lua error in package.lua at line 80: module 'strict' not found.
  51. Lua error in package.lua at line 80: module 'strict' not found.
  52. Lua error in package.lua at line 80: module 'strict' not found.
  53. Lua error in package.lua at line 80: module 'strict' not found.
  54. Lua error in package.lua at line 80: module 'strict' not found.
  55. Lua error in package.lua at line 80: module 'strict' not found.
  56. Lua error in package.lua at line 80: module 'strict' not found.
  57. Lua error in package.lua at line 80: module 'strict' not found.
  58. Lua error in package.lua at line 80: module 'strict' not found.
  59. 59.0 59.1 59.2 59.3 Lua error in package.lua at line 80: module 'strict' not found.
  60. Lua error in package.lua at line 80: module 'strict' not found.
  61. Lua error in package.lua at line 80: module 'strict' not found.
  62. Lua error in package.lua at line 80: module 'strict' not found.
  63. Lua error in package.lua at line 80: module 'strict' not found.
  64. Lua error in package.lua at line 80: module 'strict' not found.
  65. Lua error in package.lua at line 80: module 'strict' not found.
  66. Lua error in package.lua at line 80: module 'strict' not found.
  67. Lua error in package.lua at line 80: module 'strict' not found.
  68. Lua error in package.lua at line 80: module 'strict' not found.
  69. Lua error in package.lua at line 80: module 'strict' not found.
  70. Lua error in package.lua at line 80: module 'strict' not found.
  71. 71.0 71.1 Lua error in package.lua at line 80: module 'strict' not found.
  72. Lua error in package.lua at line 80: module 'strict' not found.
  73. Lua error in package.lua at line 80: module 'strict' not found.
  74. 74.0 74.1 Lua error in package.lua at line 80: module 'strict' not found.
  75. Lua error in package.lua at line 80: module 'strict' not found.
  76. Lua error in package.lua at line 80: module 'strict' not found.
  77. Lua error in package.lua at line 80: module 'strict' not found.
  78. Lua error in package.lua at line 80: module 'strict' not found.
  79. Lua error in package.lua at line 80: module 'strict' not found.
  80. 80.0 80.1 Lua error in package.lua at line 80: module 'strict' not found.
  81. 81.0 81.1 Lua error in package.lua at line 80: module 'strict' not found.
  82. Lua error in package.lua at line 80: module 'strict' not found.
  83. Lua error in package.lua at line 80: module 'strict' not found.
  84. 84.0 84.1 84.2 84.3 Lua error in package.lua at line 80: module 'strict' not found.
  85. U.S. National Security Agency. Early Papers Concerning US-UK Agreement – 1940–1944. Agreement between British Government Code and Cipher School and U.S. War Department dated May 17, 1943. Retrieved: October 5, 2013.
  86. 86.0 86.1 Lua error in package.lua at line 80: module 'strict' not found.
  87. 87.0 87.1 87.2 87.3 87.4 87.5 Lua error in package.lua at line 80: module 'strict' not found.
  88. 88.0 88.1 Lua error in package.lua at line 80: module 'strict' not found.
  89. Lua error in package.lua at line 80: module 'strict' not found.
  90. Lua error in package.lua at line 80: module 'strict' not found.
  91. Lua error in package.lua at line 80: module 'strict' not found.
  92. Lua error in package.lua at line 80: module 'strict' not found.
  93. Lua error in package.lua at line 80: module 'strict' not found.
  94. Lua error in package.lua at line 80: module 'strict' not found.
  95. Lua error in package.lua at line 80: module 'strict' not found.
  96. 96.0 96.1 96.2 96.3 Lua error in package.lua at line 80: module 'strict' not found.
  97. 97.0 97.1 Lua error in package.lua at line 80: module 'strict' not found.
  98. Lua error in package.lua at line 80: module 'strict' not found.
  99. Lua error in package.lua at line 80: module 'strict' not found.
  100. Lua error in package.lua at line 80: module 'strict' not found.
  101. Lua error in package.lua at line 80: module 'strict' not found.
  102. 102.0 102.1 Lua error in package.lua at line 80: module 'strict' not found.
  103. Lua error in package.lua at line 80: module 'strict' not found.
  104. 104.0 104.1 Lua error in package.lua at line 80: module 'strict' not found.
  105. 105.0 105.1 Lua error in package.lua at line 80: module 'strict' not found.
  106. 'Prolific Partner': German Intelligence Used NSA Spy Program, Der Spiegel. Retrieved July 21, 2013.
  107. Lua error in package.lua at line 80: module 'strict' not found.
  108. Lua error in package.lua at line 80: module 'strict' not found.
  109. Lua error in package.lua at line 80: module 'strict' not found.
  110. Lua error in package.lua at line 80: module 'strict' not found.
  111. Lua error in package.lua at line 80: module 'strict' not found.
  112. Lua error in package.lua at line 80: module 'strict' not found.
  113. 113.0 113.1 113.2 113.3 Lua error in package.lua at line 80: module 'strict' not found.
  114. Lua error in package.lua at line 80: module 'strict' not found.
  115. Lua error in package.lua at line 80: module 'strict' not found.
  116. Lua error in package.lua at line 80: module 'strict' not found.
  117. Lua error in package.lua at line 80: module 'strict' not found.
  118. Lua error in package.lua at line 80: module 'strict' not found.
  119. Lua error in package.lua at line 80: module 'strict' not found.
  120. 120.0 120.1 120.2 120.3 120.4 120.5 Lua error in package.lua at line 80: module 'strict' not found.
  121. Lua error in package.lua at line 80: module 'strict' not found.
  122. Lua error in package.lua at line 80: module 'strict' not found.
  123. 123.0 123.1 Lua error in package.lua at line 80: module 'strict' not found.
  124. Lua error in package.lua at line 80: module 'strict' not found.
  125. Lua error in package.lua at line 80: module 'strict' not found.
  126. Lua error in package.lua at line 80: module 'strict' not found.
  127. 127.0 127.1 Lua error in package.lua at line 80: module 'strict' not found.
  128. Lua error in package.lua at line 80: module 'strict' not found.
  129. 129.0 129.1 Lua error in package.lua at line 80: module 'strict' not found.
  130. Lua error in package.lua at line 80: module 'strict' not found.
  131. Lua error in package.lua at line 80: module 'strict' not found.
  132. Lua error in package.lua at line 80: module 'strict' not found.
  133. Lua error in package.lua at line 80: module 'strict' not found.
  134. 134.0 134.1 Lua error in package.lua at line 80: module 'strict' not found.
  135. Lua error in package.lua at line 80: module 'strict' not found.
  136. Lua error in package.lua at line 80: module 'strict' not found.
  137. Lua error in package.lua at line 80: module 'strict' not found.
  138. Lua error in package.lua at line 80: module 'strict' not found.
  139. Lua error in package.lua at line 80: module 'strict' not found.
  140. Lua error in package.lua at line 80: module 'strict' not found.
  141. Lua error in package.lua at line 80: module 'strict' not found.
  142. Lua error in package.lua at line 80: module 'strict' not found.
  143. Lua error in package.lua at line 80: module 'strict' not found.
  144. 144.0 144.1 Lua error in package.lua at line 80: module 'strict' not found.
  145. Lua error in package.lua at line 80: module 'strict' not found.
  146. 146.0 146.1 146.2 146.3 Lua error in package.lua at line 80: module 'strict' not found.
  147. 147.0 147.1 Lua error in package.lua at line 80: module 'strict' not found.
  148. Lua error in package.lua at line 80: module 'strict' not found.
  149. Lua error in package.lua at line 80: module 'strict' not found.
  150. 150.0 150.1 Lua error in package.lua at line 80: module 'strict' not found.
  151. Lua error in package.lua at line 80: module 'strict' not found.
  152. Lua error in package.lua at line 80: module 'strict' not found.
  153. Lua error in package.lua at line 80: module 'strict' not found.
  154. Lua error in package.lua at line 80: module 'strict' not found.
  155. 155.0 155.1 Lua error in package.lua at line 80: module 'strict' not found.
  156. Lua error in package.lua at line 80: module 'strict' not found.
  157. Lua error in package.lua at line 80: module 'strict' not found.
  158. Lua error in package.lua at line 80: module 'strict' not found.
  159. Lua error in package.lua at line 80: module 'strict' not found.
  160. Lua error in package.lua at line 80: module 'strict' not found.
  161. Lua error in package.lua at line 80: module 'strict' not found.
  162. Peter Maass (August 18, 2013), How Laura Poitras Helped Snowden Spill His Secrets The New York Times
  163. Lua error in package.lua at line 80: module 'strict' not found.
  164. Lua error in package.lua at line 80: module 'strict' not found.

Further reading