Global surveillance by category

This is a category of disclosures related to global surveillance.

Court orders, memos and policy documents

Reports

The following table describes what is known about the below SIGINT Activity Designators (SIGADs). It is not presumed to be complete.

Designation Covername Parent Program Legal Authority Key Targets Type of Information collected Associated Databases Remarks
US-3140
(PDDG:TM)
MADCAPOCELOT STORMBREW EO 12333
  • The country of Russia
  • European Terrorism

PINWALE
MARINA

US-983
(PDDG:FL)
STORMBREW STORMBREW Global "Key corporate partner with access to international cables, routers, and switches"
US-3206
(PDDG:6T)
MONKEYROCKET OAKSTAR EO 12333 Counterterrorism in the Middle East, Europe, and Asia DNI metadata and content
  • "Foreign access point"
  • was expected to go online in spring 2012.
US-3217
(PDDG:MU)
SHIFTINGSHADOW OAKSTAR "Foreign access point"
US-3230
(PDDG:0B)
ORANGECRUSH OAKSTAR "To be determined"
  • Voice
  • Fax
  • DNI
  • DNR
  • Metadata
  • "Foreign access point through PRIMECANE, and 3rd party partner"
  • not online as of the time of source presentation.
US-3247
(PDDG:PJ)
YACHTSHOP OAKSTAR Worldwide DNI Metadata Worldwide DNI Metadata MARINA "Access through BLUEANCHOR partner"
US-3251 ORANGEBLOSSOM[56][57] OAKSTAR
US-3257
(PDDG:SK)
SILVERZEPHYR[56][57] OAKSTAR

Transit Authority
FAA

South, Central and Latin America
  • DNR
    • metadata
    • voice
    • fax
  • DNI
    • content
    • metadata
"Network access point through STEELKNIGHT partner"
US-3277 BLUEZEPHYR OAKSTAR
US-3354 COBALTFALCON OAKSTAR
US-984XN PRISM It is possible, though not directly proven that PRISM falls under the umbrella of BLARNEY, given similar designations. Known Targets include
  • Venezuela
    • Military procurement
    • Oil
  • Mexico
    • Narcotics
    • Energy
    • Internal Security
    • Political Affairs
  • Columbia
    • Trafficking
The exact type of data varies by provider:
  • Email
  • Chat - video, voice
  • Videos
  • Stored data
  • VoIP
  • Filer transfers
  • Video Conferencing
  • Notifications of target activity, logins, etc.
  • Online Social Networking details
  • Special Requests

TRAFFICTHIEF
MARINA
MAINWAY
FALLOUT
PINWALE
CONVEYANCE
NUCLEON

  • Accounts for 91% of collection under FAA702 authority.
  • Cooperation between the NSA and internet companies, whereby the companies allow the NSA access (whether direct or indirect is disputed) to their servers.[58]
  • List of PRISM partners: AOL, Apple, Facebook, Google, Microsoft, PalTalk, Skype, and Yahoo!.
  • Newsletters referencing millions of dollars in payments to Prism partners by SSO, reimbursing them for their costs.[59]
US-984
(PDDG:AX)
BLARNEY BLARNEY FISA
  • Counter Proliferation
  • Counter Terrorism
  • Diplomatic
  • Economic
  • Military
  • Foreign Government (i.e. Political/Intentions of Nations)
  • DNI Strong Selectors
  • DNR Strong Selectors
  • DNI Circuits
  • DNR CircuitsMobile Wireless
  • FISA Court authorized communications
  • FISA Court authorized communications
Known facilities:
  • AT&T's Room 641A in San Francisco, California
  • AT&T site in New Jersey
US-984X BLARNEY BLARNEY FAA
  • Counter Proliferation
  • Counter Terrorism
  • Diplomatic
  • Economic
  • Military
  • Foreign Government (i.e. Political/Intentions of Nations)
  • DNI Strong Selectors
  • DNR Strong Selectors
  • DNI Circuits
  • DNR CircuitsMobile Wireless
  • FISA Court authorized communications
  • FISA Court authorized communications
Known facilities:
  • AT&T's Room 641A in San Francisco, California
  • AT&T site in New Jersey
US-990
(PDDG-UY)
FAIRVIEW FAIRVIEW Transit Authority
FAA
Global
  • DNR (Directory ONMR)
  • DNI
  • Key corporate partner with access to international cables, routers and switches.
  • Cyber access (hacking).
US-3105S1 DARKTHUNDER SSO Corporate/ TAO Shaping
  • TAO refers to Tailored Access Operations, namely hacking.
US-3105S1 STEELFLAUTA SSO Corporate/ TAO Shaping
  • TAO refers to Tailored Access Operations, namely hacking.

Note: SIGADs not otherwise designated are presumed to operate under the legal authority of Section 702 of the FISA Amendments Act (FAA)

Collection and analysis programs or hardware

Relationships with corporate partners

NSA databases

Signals intelligence directorates (SIDs)

Technical directorates

Names associated with specific targets

Uncategorized or insufficiently described codenames

GCHQ operations

The Government Communications Headquarters (GCHQ) is the main British intelligence agency responsible for providing signals intelligence (SIGINT) and information assurance to the British government and armed forces.

NSA operations

NSA relationships with foreign intelligence services

Suggested protective measures from surveillance

Encryption

In cryptography, encryption is the process of encoding information in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. According to Snowden's recommendations published by The Guardian Edward in September 2013,[110] properly implemented strong crypto systems were among the few things which one can rely on. However, endpoint security is often too weak to prevent the NSA from finding ways around it.[110]

Underground bunkers

In September 2013, it was reported by the press that a number of countries deemed by the US and its allies to be rogue states, such as Syria, Iran and North Korea, had successfully evaded U.S. government surveillance by constructing secret bunkers deep below the Earth's surface.[111]

China's underground megaproject, the 816 Nuclear Military Plant in Chongqing (now declassified and opened to tourists), was reported to be "most worrying" for the U.S. Defense Intelligence Agency.[111]

Libya evaded surveillance by building "hardened and buried" bunkers at least 40 feet below ground level.[111]

Unrelated to Edward Snowden

References

  1. John D Bates (October 3, 2011). "[redacted]" (PDF). p. 16.
  2. Turner, Shawn (July 31, 2013). "DNI Clapper Declassifies and Releases Telephone Metadata Collection Documents". Retrieved August 22, 2013.
  3. "Minimization Procedures Used by the National Security Agency in Connection with Acquisitions of Foreign Intelligence Information Pursuant to Section 702, as amended" (PDF). October 31, 2011.
  4. James Ball and Spencer Ackerman (August 9, 2013). "NSA loophole allows warrantless search for US citizens' emails and phone calls". Retrieved August 12, 2013.
  5. 1 2 John D Bates (October 3, 2011). "[redacted]" (PDF). p. 71.
  6. Nakashima, Ellen (August 21, 2013). "NSA gathered thousands of Americans’ e-mails before court ordered it to revise its tactics". The Washington Post. Retrieved September 16, 2013.
  7. "FISA court ruling on illegal NSA e-mail collection program". The Washington Post. August 21, 2013. Retrieved September 16, 2013.
  8. Barton Gellman and Matt DeLong (August 15, 2013). "First direct evidence of illegal surveillance found by the FISA court". The Washington Post. Retrieved September 16, 2013.
  9. Charlie Savage and Scott Shane (August 21, 2013). "Secret Court Rebuked N.S.A. on Surveillance". The New York Times. Retrieved September 16, 2013.
  10. Mark Hosenball and Tabassum Zakaria (August 22, 2013). "NSA collected 56,000 emails by Americans a year: documents". Reuters. NBC News. Retrieved September 16, 2013.
  11. Perez, Evan (August 22, 2013). "NSA misrepresented scope of data collection to secret court". CNN. Retrieved October 2, 2013.
  12. Turner, Shawn (August 21, 2013). "DNI Declassifies Intelligence Community Documents Regarding Collection Under Section 702 of the Foreign Intelligence Surveillance Act (FISA)". Office of the Director of National Intelligence. IC on the Record. Retrieved October 2, 2013.
  13. Clapper, James (August 21, 2013). "DNI James Clapper’s Cover Letter Announcing the Document Release" (PDF). Director of National Intelligence. Retrieved October 2, 2013.
  14. Kimberly Dozier and Stephen Braun (August 21, 2013). "NSA Collected Thousands Of Emails, Other Communications By Americans With No Terror Ties". The Huffington Post. Associated Press. Retrieved October 2, 2013.
  15. Fung, Brian (August 21, 2013). "The FISA court got really upset when the NSA didn’t tell the truth on surveillance". The Washington Post. Retrieved September 16, 2013.
  16. Siobhan Gorman and Devlin Barrett (September 10, 2013). "NSA Violated Privacy Protections, Officials Say". The Wall Street Journal. Retrieved September 10, 2013.
  17. Ackerman, Spencer (September 10, 2013). "NSA violations led judge to consider viability of surveillance program". The Guardian. Retrieved September 16, 2013.
  18. Ellen Nakashima, Julie Tate and Carol Leonnig (September 10, 2013). "Declassified court documents highlight NSA violations in data collection for surveillance". The Washington Post. Retrieved September 14, 2013.
  19. Office of the Director of National Intelligence. (September 10). "Declassified FISA court documents on intelligence collection". The Washington Post. Retrieved September 14, 2013. Check date values in: |date= (help)
  20. James R. Clapper (Director of National Intelligence) (September 10, 2013). "DNI Clapper Declassifies Intelligence Community Documents Regarding Collection Under Section 501 of the Foreign Intelligence Surveillance Act (FISA)". Office of the Director of National Intelligence. IC On the Record. Retrieved September 14, 2013.
  21. Tim, Trevor (September 10, 2013). "Government Releases NSA Surveillance Docs and Previously Secret FISA Court Opinions In Response to EFF Lawsuit". Electronic Frontier Foundation. Electronic Frontier Foundation. Retrieved September 14, 2013.
  22. David Kravets. Kim Zetter, Kevin Poulsen (September 10, 2013). "NSA Illegally Gorged on U.S. Phone Records for Three Years". Wired.com. Retrieved September 22, 2013.
  23. Staff (August 10, 2013). "US-Geheimdienst: NSA führt Deutschland als Spionageziel".
  24. Timothy Jones (August 11, 2008). "Germany and EU targets for US espionage, Spiegel reports".
  25. 1 2 Barton Gellman and Greg Miller (August 29, 2013). "U.S. spy network's successes, failures and objectives detailed in 'black budget' summary". The Washington Post. Retrieved August 29, 2013.
  26. "The Black Budget". The Washington Post. August 29, 2013. Retrieved August 29, 2013.
  27. Glenn Greenwald, Laura Poitras, and Ewen MacAskill (September 11, 2013). "NSA shares raw intelligence including Americans' data with Israel". Retrieved September 11, 2013.
  28. Sailor IV, F. Dennis (September 13, 2013). "United States Foreign Intelligence Surveillance Court In Re Orders of this Court Interpreting Section 215 of the Patriot Act (Docket No. Misc. 13-02)" (PDF). www.uscourts.gov. Retrieved September 15, 2013.
  29. Fung, Brian (September 13, 2013). "The FISA court will release more opinions because of Snowden". The Washington Post. Retrieved September 15, 2013.
  30. Ackerman, Spencer (September 13, 2013). "Fisa judge: Snowden's NSA disclosures triggered important spying debate". The Guardian. Retrieved September 16, 2013.
  31. "DNI Clapper Declassifies Additional Intelligence Community Documents Regarding Collection Under Section 501 of the Foreign Intelligence Surveillance Act". Office of the Director of National Intelligence. IC ON THE RECORD. 18 November 2013. Retrieved 19 November 2013.
  32. "DNI Clapper Declassifies Additional Intelligence Community Documents Regarding Collection Under Section 501 of the Foreign Intelligence Surveillance Act". Office of the Director of National Intelligence. odni.gov. 18 November. Retrieved 19 November 2013. Check date values in: |date= (help)
  33. Charlie Savage and James Risen (18 November 2013). "Latest Release of Documents on N.S.A. Includes 2004 Ruling on Email Surveillance". The New York Times. Retrieved 19 November 2013.
  34. Ellen Nakashima and Greg Miller (19 November 2013). "Official releasing what appears to be original court file authorizing NSA to conduct sweeps". The Washington Post. Retrieved 19 November 2013.
  35. "Documents show NSA reported violations of court's surveillance rules". The New York Daily News. Associated Press.
  36. Leon, Richard (16 December 2013). "Federal judge rules NSA program is likely unconstitutional a.k.a. Klayman et al. v. Obama et al. Memorandum and Opinion from December 16, 2013 in Civil Action 13-0851 in United Case District Court for the District of Columbia". The Washington Post. Retrieved 17 December 2013.
  37. Savage, Charlie (16 December 2013). "Judge Questions Legality of N.S.A. Phone Records". The New York Times. Retrieved 18 December 2013.
  38. Bill Mears and Evan Perez, CNN (17 December 2013). "Judge: NSA domestic phone data-mining unconstitutional". cnn. Retrieved 18 December 2013.
  39. Kravets, David (16 December 2013). "Court Says NSA Bulk Telephone Spying Is Unconstitutional". Wired. Retrieved 18 December 2013.
  40. Kevin Johnson and Richard Wolf (16 December 2013). "Federal judge rules against NSA spying". USA Today. Retrieved 18 December 2013.
  41. Gerstein, Josh (16 December 2013). "Judge: NSA phone program likely unconstitutional". Politico. Retrieved 18 December 2013.
  42. 1 2 Ellen Nakashima and Ann E. Marimow (16 December 2013). "Judge: NSA’s collecting of phone records is probably unconstitutional". The Washington Post. Retrieved 17 December 2013.
  43. Spencer Ackerman and Dan Roberts (16 December 2013). "NSA phone surveillance program likely unconstitutional, federal judge rules". The Guardian. Retrieved 18 December 2013.
  44. Pauley III, William H. (27 December 2013). "United States District Court Southern District of New York: American Civil Liberties Union v. James R. Clapper (13 Civ. 3994) (WHP))" (PDF). American Civil Liberties Union. Retrieved 28 December 2013.
  45. Bazzle, Steph (27 December 2013). "Judge Says NSA’s Data Collection Is Legal". Indyposted. Retrieved 28 December 2013.
  46. Adam Liptak and Michael S. Schmidt (27 December 2013). "Judge Upholds N.S.A.’s Bulk Collection of Data on Calls". The New York Times. Retrieved 28 December 2013.
  47. Denniston, Lyle (27 December 2013). "Judge upholds NSA’s phone data sweeps (UPDATED)". Scotusblog. Retrieved 28 December 2013.
  48. Peterson, Andrea (27 December 2013). "The most Kafkaesque paragraph from today’s NSA ruling". The Washington Post. Retrieved 28 December 2013.
  49. Horwitz, Sari (27 December 2013). "NSA collection of phone data is lawful, federal judge rules". The Washington Post. Retrieved 28 December 2013.
  50. 1 2 Laura Poitras, Marcel Rosenbach and Holger Stark (August 12, 2013). "Ally and Target: US Intelligence Watches Germany Closely". Retrieved August 12, 2013.
  51. Gellman, Barton (August 16, 2013). "NSA broke privacy rules thousands of times per year, audit finds". The Washington Post. Retrieved August 16, 2013.
  52. Craig Whitlock and Barton Gellman (September 3, 2013). "U.S. documents detail al-Qaeda's efforts to fight back against drones". The Washington Post. Retrieved September 3, 2013.
  53. Greg Miller, Craig Whitlock and Barton Gellman (September 2, 2013). "Top-secret U.S. intelligence files show new levels of distrust of Pakistan". The Washington Post. Retrieved September 3, 2013.
  54. Staff (September 4, 2013). "US intelligence uncovered Pak army plot to kill Asma Jahangir in India: report". Retrieved September 4, 2013.
  55. Staff (September 7, 2013). "Privacy Scandal: NSA Can Spy on Smart Phone Data". Retrieved September 7, 2013.
  56. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 "NSA report on privacy violations in the first quarter of 2012". The Washington Post. August 16, 2013. Retrieved August 16, 2013.
  57. 1 2 3 No alvo dos EUA, Infographic, O Globo. Retrieved July 8, 2013.
  58. 1 2 Barton Gellman and Matt DeLong (August 15, 2013). "First direct evidence of illegal surveillance found by the FISA court". The Washington Post. Retrieved August 25, 2013.
  59. MacAskill, Ewen (August 23, 2013). "NSA paid millions to cover Prism compliance costs for tech companies". Retrieved August 23, 2013.
  60. 1 2 Drum, Kevin (June 8, 2013). "Map of the Day: Who the NSA Listens To". Retrieved September 9, 2013.
  61. Nakashima, Ellen (July 31, 2013). "Newly declassified documents on phone records program released". The Washington Post. Retrieved September 9, 2013.
  62. Gellman, Barton (June 15, 2013). "U.S. surveillance architecture includes collection of revealing Internet, phone metadata". The Washington Post. Retrieved September 9, 2013.
  63. A published heat map shows that most data is collected from Iran, Pakistan and Jordan, with over 40 billion individual pieces of information collected from these three countries alone in March 2013 alone, from a total of 97 billion worldwide.
  64. Snowden reveals Australia's links to US spy web, The Sydney Morning Herald, July 8, 2013. Retrieved July 11, 2013.
  65. 1 2 3 4 Glenn Greenwald and Spencer Ackerman (June 27, 2013). "How the NSA is still harvesting your online data". The Guardian. Retrieved August 1, 2013.
  66. 1 2 3 "What to say, and not to say, to 'our overseers'". The Washington Post. August 16, 2013. Retrieved August 16, 2013.
  67. 1 2 3 4 Staff (July 29, 2013). "Photo Gallery: NSA Documentation of Spying in Germany". Retrieved August 11, 2013.
  68. Barton Gellman and Matt DeLong (August 15, 2013). "What to say, and not to say, to 'our overseers'". The Washington Post. Retrieved August 25, 2013.
  69. 1 2 3 4 5 6 Laura Poitras, Marcel Rosenbach and Holger Stark (August 26, 2013). "Codename 'Apalachee': How America Spies on Europe and the UN". Retrieved August 26, 2013.
  70. 1 2 3 4 James Ball, Julian Borger and Glenn Greenwald (September 5, 2013). "US and UK spy agencies defeat privacy and security on the internet". The Guardian. Retrieved September 5, 2013.
  71. "Project Bullrun – classification guide to the NSA's decryption program". September 5, 2013.
  72. JAMES RISEN and LAURA POITRAS (November 22, 2013). "N.S.A. Report Outlined Goals for More Power". The New York Times. Retrieved 23 November 2013.
  73. How Microsoft handed the NSA access to encrypted messages, The Guardian, July 12, 2013. Retrieved July 13, 2013.
  74. 1 2 3 4 5 6 NSA slides explain the PRISM data-collection program, The Washington Post, June 6, 2013, updated July 10, 2013. Retrieved July 12, 2013.
  75. 1 2 3 Siobhan Gorman and Jennifer Valentiono-Devries (August 20, 2013). "New Details Show Broader NSA Surveillance Reach – Programs Cover 75% of Nation's Traffic, Can Snare Emails". The Wall Street Journal. Retrieved August 21, 2013.
  76. 1 2 "New slides about NSA collection programs". Top Level Telecommunications. July 16, 2013 and updated on July 16, 2013. Retrieved August 27, 2013. Check date values in: |date= (help)
  77. Kloc, Joe (July 12, 2013). "Forget PRISM: FAIRVIEW is the NSA's project to "own the Internet"". Retrieved August 11, 2013.
  78. Glenn Greenwald, Roberto Kax and José Casado (July 12, 2013). "Espionagem dos EUA se espalhou pela América Latina". Retrieved August 11, 2013.
  79. 1 2 "The National Security Agency: Missions, Authorities, Oversight and Partnerships" (PDF). National Security Agency. August 9, 2013. Retrieved August 12, 2013.
  80. Perez, Evan (August 10, 2013). "Documents shed light on U.S. surveillance programs". CNN. Retrieved August 12, 2013.
  81. Craig Timberg and Barton Gellman (August 30, 2013). "NSA paying U.S. companies for access to communications networks". The Washington Post. Retrieved August 31, 2013.
  82. 1 2 James Ball and Spencer Ackerman (August 9, 2013). "NSA loophole allows warrantless search for US citizens' emails and phone calls". Retrieved August 11, 2013.
  83. 1 2 Nakashima, Ellen (July 31, 2013). "Newly declassified documents on phone records program released". The Washington Post. Retrieved August 4, 2013.
  84. 1 2 3 4 5 Ambinder, Marc (August 14, 2013). "An Educated Guess About How the NSA Is Structured". Retrieved August 14, 2013.
  85. 1 2 Gellman, Barton (June 15, 2013). "U.S. surveillance architecture includes collection of revealing Internet, phone metadata". The Washington Post. Retrieved August 11, 2013.
  86. 1 2 Staff (September 15, 2013). "'Follow the Money': NSA Spies on International Payments 'Follow the Money': NSA Spies on International Payments". Retrieved September 15, 2013.
  87. 1 2 3 Staff (September 1, 2013). "'Success Story': NSA Targeted French Foreign Ministry". Retrieved September 1, 2013.
  88. 1 2 "Jornal O Globo revela que Brasil teria sido espionado pelos Estados Unidos". July 8, 2013. Retrieved September 5, 2013.
  89. 1 2 Peterson, Josh (June 27, 2013). "Report: NSA Internet spying program collected half-a-trillion records in 2012". The Daily Caller. Retrieved July 29, 2013.
  90. 1 2 Bamford, James (July 12, 2013). "They Know Much More Than You Think". The New York Review of Books. Retrieved July 29, 2013.
  91. Ball, James (October 25, 2013). "Leaked memos reveal GCHQ efforts to keep mass surveillance secret". The Guardian. Retrieved October 25, 2013.
  92. James Ball, Julian Borger and Glenn Greenwald (September 6, 2013). "Revealed: how US and UK spy agencies defeat internet privacy and security". The Guardian. Retrieved September 7, 2013.
  93. "Mastering the internet: how GCHQ set out to spy on the world wide web". The Guardian. 21 June 2013. Retrieved 18 December 2013.
  94. url=https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/
  95. 1 2 Duncan Campbell, Oliver Wright, James Cusick, Kim Sengupta (August 22, 2013). "Exclusive: Edward Snowden leaks reveal UK’s secret Middle-East web surveillance base". The Independent (London). Retrieved August 22, 2013.
  96. Greenwald, Glenn (August 23, 2013). "Snowden: UK government now leaking documents about itself". Retrieved August 23, 2013.
  97. 1 2 3 4 5 John Goetz, Hans Leyendecker and Frederik Obermaier (August 28, 2013). "British Officials Have Far-Reaching Access To Internet And Telephone Communications". Retrieved August 28, 2013.
  98. staff (September 16, 2013). "‘Foreign nation with significant means’ in spying on Belgium probe". Retrieved September 16, 2013.
  99. Schmitz, Gregor-Peter (September 20, 2013). "Cyber Attack: Belgians Angered by British Spying". Retrieved September 20, 2013.
  100. Gallagher, Ryan (September 20, 2013). "http://www.slate.com/blogs/future_tense/2013/09/20/operation_socialist_u_k_s_gchq_hacked_belgacom_snowden_documents_reveal.html". Retrieved September 20, 2013. External link in |title= (help)
  101. 1 2 "US-Geheimdienst hörte Zentrale der Vereinten Nationen ab". Der Spiegel (in German). Retrieved August 25, 2013.
  102. 1 2 Goebel, Nicole (August 25, 2013). Schuster, Kathleen, ed. "NSA spied on UN, German report says". Deutsche Welle. Retrieved August 25, 2013.
  103. "NSA bugged UN headquarters – newspaper". August 25, 2013. Retrieved August 25, 2013.
  104. Barton Gellman and Craig Whitlock (August 29, 2013). "To hunt Osama bin Laden, satellites watched over Abbottabad, Pakistan, and Navy SEALs". The Washington Post. Retrieved August 29, 2013.
  105. Staff (August 31, 2013). "Snowden Document: NSA Spied On Al Jazeera Communications". Retrieved August 31, 2013.
  106. Brooks, Bradley (September 1, 2013). "Report: NSA spied on leaders of Brazil, Mexico". Archived from the original on October 31, 2013. Retrieved September 1, 2013.
  107. Tiago Ornaghi and Flávio Lordello, eds. (September 1, 2013). "Saiba como o maior sistema de espionagem do mundo monitora comunicações em Brasília". Retrieved September 1, 2013.
  108. Cristina Tardáguila and Júnia Gama (September 1, 2013). "EUA espionaram Dilma". Retrieved September 1, 2013.
  109. Barton Gellman and Ashkan Soltani (October 14, 2013). "NSA collects millions of e-mail address books globally". The Washington Post.
  110. 1 2 "NSA surveillance: A guide to staying secure". The Guardian. Retrieved September 24, 2013.
  111. 1 2 3 Narayan Lakshman (September 24, 2013). "Secret bunkers, a challenge for U.S. intelligence". Chennai, India: The Hindu. Retrieved September 24, 2013.
  112. Nelson, Kimberly (August 22, 2013). "In Salt Lake for the 2002 Olympics? Your texts, emails and phone calls likely reviewed by NSA". Retrieved August 25, 2023. Check date values in: |access-date= (help)
  113. Davidson, Lee (August 23, 2013). "Former Salt Lake mayor: NSA snooping is the scandal of the century". Retrieved August 25, 2013.
  114. Freeze, Colin (June 15, 2013). "How Canada's shadowy metadata-gathering program went awry". The Globe and Mail (Toronto). Retrieved August 27, 2013.
  115. "Raw documents: Canada's 'top secret' data mining program". The Globe and Mail (Toronto). June 10, 2013. Retrieved August 27, 2013.
  116. Freeze, Colin (June 10, 2013). "Data-collection program got green light from MacKay in 2011". The Globe and Mail (Toronto). Retrieved August 27, 2013.
  117. Matt Apuzzo and Adam Goldman (August 25, 2013). "The NYPD Division of Un-American Activities". Retrieved August 26, 2013.
  118. "Blue Coat". Reporters Without Borders. March 12, 2013.
  119. Citizen Lab, Munk School of Global Affairs, University of Toronto (January 15, 2013). "Planet Blue Coat: Mapping Global Censorship and Surveillance Tools".
  120. Markoff, John (January 16, 2013). "Rights Group Reports on Abuses of Surveillance and Censorship Technology". The New York Times.
  121. Nakashima, Ellen (July 8, 2013). "Web monitoring devices made by U.S. firm Blue Coat detected in Iran, Sudan". The Washington Post.
  122. "You Are Being Tracked: How License Plate Readers Are Being Used to Record Americans' Movements". July 17, 2013. Retrieved August 11, 2013.
  123. Martinez, Michael (July 18, 2013). "ACLU raises privacy concerns about police technology tracking drivers". CNN. Retrieved August 11, 2013.
  124. McCullagh, Declan (August 2, 2013). "FBI pressures Internet providers to install surveillance software".
  125. Jennifer Valentino-DeVries and Danny Yadron (August 3, 2013). "FBI Taps Hacker Tactics to Spy on Suspects". The Wall Street Journal. Retrieved August 12, 2013.
  126. Choney, Suzanne (August 6, 2013). "FBI hacking squad used in domestic investigations, experts say". Retrieved August 12, 2013.
  127. Savage, Charlie (August 8, 2013). "N.S.A. Said to Search Content of Messages to and From U.S". The New York Times. Retrieved August 11, 2013.
  128. Nixon, Ron (July 3, 2013). "U.S. Postal Service Logging All Mail for Law Enforcement". The New York Times. Retrieved August 11, 2013.
  129. Dharmakumar, Rohin (August 13, 2013). "Keep your virtual life away from prying governments". Retrieved August 13, 2013.
  130. Parbat, Kalyan (July 27, 2013). "Israel's Verint to get government contract for interception tools". The Times Of India. Retrieved August 13, 2013.
  131. Kirka, Danica (August 19, 2013). "Partner of reporter at center of NSA leak detained". Retrieved August 19, 2013.
  132. Staff (August 21, 2013). "New Zealand passes bill allowing domestic spying". Retrieved August 23, 2013.
  133. Watkins, Tracy (August 21, 2013). "Spy bill passes into law amid wide criticism". Retrieved August 23, 2013.
  134. "Podcast Show #112: NSA Whistleblower Goes on Record -Reveals New Information & Names Culprits!" (Podcast). June 19, 2013. Retrieved August 15, 2013.
  135. Hill, Kashmir (July 24, 2013). "Blueprints of NSA's Ridiculously Expensive Data Center in Utah Suggest It Holds Less Info Than Thought". Forbes. Retrieved August 11, 2013.
  136. Priest, Dana (July 21, 2013). "NSA growth fueled by need to target terrorists". The Washington Post. Retrieved August 11, 2013.
  137. John Shiffman and Kristina Cooke (August 5, 2013). "Exclusive: U.S. directs agents to cover up program used to investigate Americans". Reuters. Retrieved August 11, 2013.
  138. John Shiffman and David Ingram (August 7, 2013). "Exclusive: IRS manual detailed DEA's use of hidden intel evidence". Reuters. Retrieved August 12, 2013.
  139. Lindsay, Jonathan S (July 27, 2013). "U.S. allowed Italian kidnap prosecution to shield higher-ups, ex-CIA officer says". Retrieved August 11, 2013.
  140. Obama’s crackdown views leaks as aiding enemies of U.S., McClatchy, June 20, 2013. Retrieved July 12, 2013.
  141. "Stellungnahme des BSI zur aktuellen Berichterstattung zu MS Windows 8 und TPM". August 21, 2013. Retrieved August 22, 2013.
  142. Staff (August 22, 2013). "German Federal Government Warns on the Security Dangers of Windows 8". Retrieved August 22, 2013.
  143. Carol D. Leonnig, Julie Tate and Barton Gellman (September 1, 2013). "U.S. intelligence agencies spend millions to hunt for insider threats, document shows". The Washington Post. Retrieved September 2, 2013.
  144. Strohm, Chris (August 23, 2013). "Lawmakers Probing Intentional Abuses of Power by NSA Analysts". Bloomberg. Retrieved August 23, 2013.
  145. Gorman, Siobhan (August 23, 2013). "NSA Officers Sometimes Spy on Love Interests". The Wall Street Journal. Retrieved August 23, 2013.
  146. Scott Shane and Colin Moynihan (August 1, 2013). "Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s". The New York Times. Retrieved August 2, 2013.
  147. "Synopsis of the Hemisphere Project". The New York Times. September 1, 2013. Retrieved September 2, 2013.
  148. Andersson, Aron (September 6, 2013). "Video: Här pekar Duncan Campbell ut Sverige" (in Swedish). Retrieved September 7, 2013.
  149. Victor Stenquist and Lisa Röstlund (September 6, 2013). "Uppgifter om Sverige fick inte publiceras" (in Swedish). Retrieved September 7, 2013.
  150. Staff (September 6, 2013). "Sweden sits on pipeline of intelligence 'gold'". Retrieved September 7, 2013.
  151. Staff (September 8, 2013). "Datenbank PX: CIA und deutsche Dienste betrieben jahrelang Geheimprojekt" (in German). Retrieved September 8, 2013.
  152. Greenberg, Andy (September 17, 2013). "Amid NSA Scandal, ACLU Report Turns Spotlight Back To FBI's 'Unchecked Abuse Of Authority'". Forbes. Retrieved September 17, 2013.
  153. "Unleashed and Unaccountable: The FBI's Unchecked Abuse of Authority". September 17, 2013. Retrieved September 17, 2013.
  154. Cushing, Tim (September 18, 2013). "NSA Apparently Purchasing Software Exploits From French Security Firm". Retrieved September 18, 2013.
This article is issued from Wikipedia - version of the Sunday, March 06, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.