Global surveillance by category

Last updated

This is a category of disclosures related to global surveillance.

Contents

Court orders, memos and policy documents

Reports

The following table describes what is known about the below SIGINT Activity Designators (SIGADs). It is not presumed to be complete.

DesignationCovernameParent ProgramLegal AuthorityKey TargetsType of Information collectedAssociated DatabasesRemarks
US-3140
(PDDG:TM)
MADCAPOCELOT STORMBREW EO 12333
  • The country of Russia
  • European Terrorism

PINWALE
MARINA

US-983
(PDDG:FL)
STORMBREW STORMBREW Global"Key corporate partner with access to international cables, routers, and switches"
US-3206
(PDDG:6T)
MONKEYROCKET OAKSTAR EO 12333 Counterterrorism in the Middle East, Europe, and AsiaDNI metadata and content
  • "Foreign access point"
  • was expected to go online in spring 2012.
US-3217
(PDDG:MU)
SHIFTINGSHADOW OAKSTAR "Foreign access point"
US-3230
(PDDG:0B)
ORANGECRUSH OAKSTAR "To be determined"
  • Voice
  • Fax
  • DNI
  • DNR
  • Metadata
  • "Foreign access point through PRIMECANE, and 3rd party partner"
  • not online as of the time of source presentation.
US-3247
(PDDG:PJ)
YACHTSHOP OAKSTAR Worldwide DNI MetadataWorldwide DNI MetadataMARINA"Access through BLUEANCHOR partner"
US-3251ORANGEBLOSSOM [56] [57] OAKSTAR
US-3257
(PDDG:SK)
SILVERZEPHYR [56] [57] OAKSTAR

Transit Authority
FAA

South, Central and Latin America
  • DNR
    • metadata
    • voice
    • fax
  • DNI
    • content
    • metadata
"Network access point through STEELKNIGHT partner"
US-3277BLUEZEPHYR OAKSTAR
US-3354COBALTFALCON OAKSTAR
US-984XN PRISM It is possible, though not directly proven that PRISM falls under the umbrella of BLARNEY, given similar designations.Known Targets include
  • Venezuela
    • Military procurement
    • Oil
  • Mexico
    • Narcotics
    • Energy
    • Internal Security
    • Political Affairs
  • Colombia
    • Trafficking
The exact type of data varies by provider:
  • Email
  • Chat – video, voice
  • Videos
  • Stored data
  • VoIP
  • Filer transfers
  • Video Conferencing
  • Notifications of target activity, logins, etc.
  • Online Social Networking details
  • Special Requests

TRAFFICTHIEF
MARINA
MAINWAY
FALLOUT
PINWALE
CONVEYANCE
NUCLEON

  • Accounts for 91% of collection under FAA702 authority.
  • Cooperation between the NSA and internet companies, whereby the companies allow the NSA access (whether direct or indirect is disputed) to their servers. [58]
  • List of PRISM partners: AOL, Apple, Facebook, Google, Microsoft, PalTalk, Skype, and Yahoo!.
  • Newsletters referencing millions of dollars in payments to Prism partners by SSO, reimbursing them for their costs. [59]
US-984
(PDDG:AX)
BLARNEYBLARNEYFISA
  • Counter Proliferation
  • Counter Terrorism
  • Diplomatic
  • Economic
  • Military
  • Foreign Government (i.e. Political/Intentions of Nations)
  • DNI Strong Selectors
  • DNR Strong Selectors
  • DNI Circuits
  • DNR CircuitsMobile Wireless
  • FISA Court authorized communications
  • FISA Court authorized communications
Known facilities:
  • AT&T's Room 641A in San Francisco, California
  • AT&T site in New Jersey
US-984XBLARNEYBLARNEYFAA
  • Counter Proliferation
  • Counter Terrorism
  • Diplomatic
  • Economic
  • Military
  • Foreign Government (i.e. Political/Intentions of Nations)
  • DNI Strong Selectors
  • DNR Strong Selectors
  • DNI Circuits
  • DNR CircuitsMobile Wireless
  • FISA Court authorized communications
  • FISA Court authorized communications
Known facilities:
  • AT&T's Room 641A in San Francisco, California
  • AT&T site in New Jersey
US-990
(PDDG-UY)
FAIRVIEWFAIRVIEWTransit Authority
FAA
Global
  • DNR (Directory ONMR)
  • DNI
  • Key corporate partner with access to international cables, routers and switches.
  • Cyber access (hacking).
US-3105S1DARKTHUNDERSSO Corporate/ TAO  Shaping
  • TAO refers to Tailored Access Operations, namely hacking.
US-3105S1STEELFLAUTASSO Corporate/ TAO  Shaping
  • TAO refers to Tailored Access Operations, namely hacking.

Note: SIGADs not otherwise designated are presumed to operate under the legal authority of Section 702 of the FISA Amendments Act (FAA)

Collection and analysis programs or hardware

Relationships with corporate partners

NSA databases

Signals intelligence directorates (SIDs)

Technical directorates

Names associated with specific targets

Uncategorized or insufficiently described codenames

GCHQ operations

The Government Communications Headquarters (GCHQ) is the main British intelligence agency responsible for providing signals intelligence (SIGINT) and information assurance to the British government and armed forces.

NSA operations

NSA relationships with foreign intelligence services

Suggested protective measures from surveillance

Encryption

In cryptography, encryption is the process of encoding information in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. According to Snowden's recommendations published by The Guardian Edward in September 2013, [107] properly implemented strong crypto systems were among the few things which one can rely on. However, endpoint security is often too weak to prevent the NSA from finding ways around it. [107]

Underground bunkers

In September 2013, it was reported by the press that a number of countries deemed by the US and its allies to be rogue states, such as Syria, Iran and North Korea, had successfully evaded U.S. government surveillance by constructing secret bunkers deep below the Earth's surface. [108]

China's underground megaproject, the 816 Nuclear Military Plant in Chongqing (now declassified and opened to tourists), was reported to be "most worrying" for the U.S. Defense Intelligence Agency. [108]

Libya evaded surveillance by building "hardened and buried" bunkers at least 40 feet below ground level. [108]

Unrelated to Edward Snowden

Related Research Articles

<span class="mw-page-title-main">United States Foreign Intelligence Surveillance Court</span> U.S. federal court

The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants against foreign spies inside the United States by federal law enforcement and intelligence agencies.

<span class="mw-page-title-main">National Security Agency</span> U.S. signals intelligence organization

The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The NSA has roughly 32,000 employees.

<span class="mw-page-title-main">MUSCULAR</span> Joint UK and USA surveillance program

MUSCULAR (DS-200B), located in the United Kingdom, is the name of a surveillance program jointly operated by Britain's Government Communications Headquarters (GCHQ) and the U.S. National Security Agency (NSA) that was revealed by documents released by Edward Snowden and interviews with knowledgeable officials. GCHQ is the primary operator of the program. GCHQ and the NSA have secretly broken into the main communications links that connect the data centers of Yahoo! and Google. Substantive information about the program was made public at the end of October 2013.

<span class="mw-page-title-main">Terrorist Surveillance Program</span> NSA program

The Terrorist Surveillance Program was an electronic surveillance program implemented by the National Security Agency (NSA) of the United States in the wake of the September 11, 2001 attacks. It was part of the President's Surveillance Program, which was in turn conducted under the overall umbrella of the War on Terrorism. The NSA, a signals intelligence agency, implemented the program to intercept al Qaeda communications overseas where at least one party is not a U.S. person. In 2005, The New York Times disclosed that technical glitches resulted in some of the intercepts including communications which were "purely domestic" in nature, igniting the NSA warrantless surveillance controversy. Later works, such as James Bamford's The Shadow Factory, described how the nature of the domestic surveillance was much, much more widespread than initially disclosed. In a 2011 New Yorker article, former NSA employee Bill Binney said that his colleagues told him that the NSA had begun storing billing and phone records from "everyone in the country."

<span class="mw-page-title-main">Stellar Wind</span> Warrantless surveillance program of the NSA in the United States

"Stellar Wind" was the code name of a warrantless surveillance program begun under the George W. Bush administration's President's Surveillance Program (PSP). The National Security Agency (NSA) program was approved by President Bush shortly after the September 11, 2001 attacks and was revealed by Thomas Tamm to The New York Times in 2004. Stellar Wind was a prelude to new legal structures that allowed President Bush and President Barack Obama to reproduce each of those programs and expand their reach.

<span class="mw-page-title-main">PRISM</span> Mass surveillance program run by the NSA

PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD US-984XN. PRISM collects stored internet communications based on demands made to internet companies such as Google LLC and Apple under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms. Among other things, the NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle.

<span class="mw-page-title-main">Boundless Informant</span> Big data analysis and visualization tool used by the NSA

Boundless Informant is a big data analysis and data visualization tool used by the United States National Security Agency (NSA). It gives NSA managers summaries of the NSA's worldwide data collection activities by counting metadata. The existence of this tool was disclosed by documents leaked by Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton. Those disclosed documents were in a direct contradiction to the NSA's assurance to United States Congress that it does not collect any type of data on millions of Americans.

<span class="mw-page-title-main">Tempora</span> GCHQ-operated Internet and telephone surveillance system

Tempora is the codeword for a formerly-secret computer system that is used by the British Government Communications Headquarters (GCHQ). This system is used to buffer most Internet communications that are extracted from fibre-optic cables, so these can be processed and searched at a later time. It was tested from 2008 and became operational in late 2011.

Special Source Operations (SSO) is a division in the US National Security Agency (NSA) which is responsible for all programs aimed at collecting data from major fiber-optic cables and switches, both inside the US and abroad, and also through corporate partnerships. Its existence was revealed through documents provided by Edward Snowden to media outlets in 2013 and, according to him, it is the "crown jewel" of the NSA.

<span class="mw-page-title-main">Fairview (surveillance program)</span> Domestic spying partnership between AT&T and the NSA

Fairview is a secret program under which the National Security Agency cooperates with the American telecommunications company AT&T in order to collect phone, internet and e-mail data mainly of foreign countries' citizens at major cable landing stations and switching stations inside the United States. The FAIRVIEW program started in 1985, one year after the Bell breakup.

<span class="mw-page-title-main">XKeyscore</span> Mass surveillance system

XKeyscore is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligence agencies, including the Australian Signals Directorate, Canada's Communications Security Establishment, New Zealand's Government Communications Security Bureau, Britain's Government Communications Headquarters, Japan's Defense Intelligence Headquarters, and Germany's Bundesnachrichtendienst.

<span class="mw-page-title-main">Blarney (code name)</span> US NSA communications surveillance program

BLARNEY is a communications surveillance program of the National Security Agency (NSA) of the United States. It started in 1978, operated under the Foreign Intelligence Surveillance Act and was expanded after the September 11 attacks.

<span class="mw-page-title-main">Mass surveillance in the United States</span>

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

<span class="mw-page-title-main">OAKSTAR</span>

OAKSTAR is a secret internet surveillance program of the National Security Agency (NSA) of the United States. It was disclosed in 2013 as part of the leaks by former NSA contractor Edward Snowden.

<span class="mw-page-title-main">STORMBREW</span>

STORMBREW is a secret internet surveillance program of the National Security Agency (NSA) of the United States. It was disclosed in the summer of 2013 as part of the leaks by former NSA contractor Edward Snowden.

<span class="mw-page-title-main">2010s global surveillance disclosures</span> Disclosures of NSA and related global espionage

During the 2010s, international media news reports revealed new operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly relate to top secret documents leaked by ex-NSA contractor Edward Snowden. The documents consist of intelligence files relating to the U.S. and other Five Eyes countries. In June 2013, the first of Snowden's documents were published, with further selected documents released to various news outlets through the year.

<span class="mw-page-title-main">Reactions to global surveillance disclosures</span>

The global surveillance disclosure released to media by Edward Snowden has caused tension in the bilateral relations of the United States with several of its allies and economic partners as well as in its relationship with the European Union. In August 2013, U.S. President Barack Obama announced the creation of "a review group on intelligence and communications technologies" that would brief and later report to him. In December, the task force issued 46 recommendations that, if adopted, would subject the National Security Agency (NSA) to additional scrutiny by the courts, Congress, and the president, and would strip the NSA of the authority to infiltrate American computer systems using "backdoors" in hardware or software. Geoffrey R. Stone, a White House panel member, said there was no evidence that the bulk collection of phone data had stopped any terror attacks.

<span class="mw-page-title-main">Global surveillance</span> Mass surveillance across national borders

Global mass surveillance can be defined as the mass surveillance of entire populations across national borders.

<span class="mw-page-title-main">Barack Obama on mass surveillance</span> Overview of the statements of former U.S. president Barack Obama on mass surveillance

Former U.S. President Barack Obama favored some levels of mass surveillance. He has received some widespread criticism from detractors as a result. Due to his support of certain government surveillance, some critics have said his support may have gone beyond acceptable privacy rights. This is of course a debatable conclusion. Many former US presidents have increased the abilities and techniques used for intelligence gathering. President Obama released many statements on mass surveillance.

<span class="mw-page-title-main">Timeline of global surveillance disclosures (2013–present)</span>

This timeline of global surveillance disclosures from 2013 to the present day is a chronological list of the global surveillance disclosures that began in 2013. The disclosures have been largely instigated by revelations from the former American National Security Agency contractor Edward Snowden.

References

  1. John D Bates (October 3, 2011). "[redacted]" (PDF). p. 16.
  2. Turner, Shawn (July 31, 2013). "DNI Clapper Declassifies and Releases Telephone Metadata Collection Documents" . Retrieved August 22, 2013.
  3. "Minimization Procedures Used by the National Security Agency in Connection with Acquisitions of Foreign Intelligence Information Pursuant to Section 702, as amended" (PDF). October 31, 2011.
  4. James Ball and Spencer Ackerman (August 9, 2013). "NSA loophole allows warrantless search for US citizens' emails and phone calls" . Retrieved August 12, 2013.
  5. 1 2 John D Bates (October 3, 2011). "[redacted]" (PDF). p. 71.
  6. Nakashima, Ellen (August 21, 2013). "NSA gathered thousands of Americans' e-mails before court ordered it to revise its tactics". The Washington Post. Retrieved September 16, 2013.
  7. "FISA court ruling on illegal NSA e-mail collection program". The Washington Post. August 21, 2013. Retrieved September 16, 2013.
  8. Gellman, Barton; DeLong, Matt (August 15, 2013). "First direct evidence of illegal surveillance found by the FISA court". The Washington Post. Retrieved September 16, 2013.
  9. Savage, Charlie; Shane, Scott (August 21, 2013). "Secret Court Rebuked N.S.A. on Surveillance". The New York Times. Retrieved September 16, 2013.
  10. Hosenball, Mark; Zakaria, Tabassum (August 22, 2013). "NSA collected 56,000 emails by Americans a year: documents". NBC News. Reuters. Retrieved September 16, 2013.
  11. Perez, Evan (August 22, 2013). "NSA misrepresented scope of data collection to secret court". CNN. Retrieved October 2, 2013.
  12. Turner, Shawn (August 21, 2013). "DNI Declassifies Intelligence Community Documents Regarding Collection Under Section 702 of the Foreign Intelligence Surveillance Act (FISA)". Office of the Director of National Intelligence. IC on the Record. Retrieved October 2, 2013.
  13. Clapper, James (August 21, 2013). "DNI James Clapper's Cover Letter Announcing the Document Release" (PDF). Director of National Intelligence. Retrieved October 2, 2013.
  14. Dozier, Kimberly; Braun, Stephen (August 21, 2013). "NSA Collected Thousands Of Emails, Other Communications By Americans With No Terror Ties". The Huffington Post. Associated Press. Retrieved October 2, 2013.
  15. Fung, Brian (August 21, 2013). "The FISA court got really upset when the NSA didn't tell the truth on surveillance". The Washington Post. Retrieved September 16, 2013.
  16. Gorman, Siobhan; Barrett, Devlin (September 10, 2013). "NSA Violated Privacy Protections, Officials Say". The Wall Street Journal. Retrieved September 10, 2013.
  17. Ackerman, Spencer (September 10, 2013). "NSA violations led judge to consider viability of surveillance program". The Guardian. Retrieved September 16, 2013.
  18. Nakashima, Ellen; Tate, Julie; Leonnig, Carol (September 10, 2013). "Declassified court documents highlight NSA violations in data collection for surveillance". The Washington Post. Retrieved September 14, 2013.
  19. Office of the Director of National Intelligence. (September 10, 2013). "Declassified FISA court documents on intelligence collection". The Washington Post. Retrieved September 14, 2013.
  20. James R. Clapper (Director of National Intelligence) (September 10, 2013). "DNI Clapper Declassifies Intelligence Community Documents Regarding Collection Under Section 501 of the Foreign Intelligence Surveillance Act (FISA)". Office of the Director of National Intelligence. IC On the Record. Retrieved September 14, 2013.
  21. Tim, Trevor (September 10, 2013). "Government Releases NSA Surveillance Docs and Previously Secret FISA Court Opinions In Response to EFF Lawsuit". Electronic Frontier Foundation. Electronic Frontier Foundation. Retrieved September 14, 2013.
  22. David Kravets. Kim Zetter; Poulsen, Kevin (September 10, 2013). "NSA Illegally Gorged on U.S. Phone Records for Three Years". Wired.com. Retrieved September 22, 2013.
  23. Staff (August 10, 2013). "US-Geheimdienst: NSA führt Deutschland als Spionageziel".
  24. Jones, Timothy (August 11, 2008). "Germany and EU targets for US espionage, Spiegel reports".
  25. 1 2 Gellman, Barton; Miller, Greg (August 29, 2013). "U.S. spy network's successes, failures and objectives detailed in 'black budget' summary". The Washington Post. Retrieved August 29, 2013.
  26. "The Black Budget". The Washington Post. August 29, 2013. Retrieved August 29, 2013.
  27. Glenn Greenwald; Laura Poitras; Ewen MacAskill (September 11, 2013). "NSA shares raw intelligence including Americans' data with Israel" . Retrieved September 11, 2013.
  28. Sailor IV, F. Dennis (September 13, 2013). "United States Foreign Intelligence Surveillance Court In Re Orders of this Court Interpreting Section 215 of the Patriot Act (Docket No. Misc. 13-02)" (PDF). www.uscourts.gov. Archived from the original (PDF) on September 18, 2013. Retrieved September 15, 2013.
  29. Fung, Brian (September 13, 2013). "The FISA court will release more opinions because of Snowden". The Washington Post. Retrieved September 15, 2013.
  30. Ackerman, Spencer (September 13, 2013). "Fisa judge: Snowden's NSA disclosures triggered important spying debate". The Guardian. Retrieved September 16, 2013.
  31. "DNI Clapper Declassifies Additional Intelligence Community Documents Regarding Collection Under Section 501 of the Foreign Intelligence Surveillance Act". Office of the Director of National Intelligence. IC ON THE RECORD. 18 November 2013. Retrieved 19 November 2013.
  32. "DNI Clapper Declassifies Additional Intelligence Community Documents Regarding Collection Under Section 501 of the Foreign Intelligence Surveillance Act". Office of the Director of National Intelligence. odni.gov. 18 November 2013. Archived from the original on 19 November 2013. Retrieved 19 November 2013.
  33. Savage, Charlie; Risen, James (18 November 2013). "Latest Release of Documents on N.S.A. Includes 2004 Ruling on Email Surveillance". The New York Times. Retrieved 19 November 2013.
  34. Nakashima, Ellen; Miller, Greg (19 November 2013). "Official releasing what appears to be original court file authorizing NSA to conduct sweeps". The Washington Post. Retrieved 19 November 2013.
  35. "Documents show NSA reported violations of court's surveillance rules". The New York Daily News. Associated Press.
  36. Leon, Richard (16 December 2013). "Federal judge rules NSA program is likely unconstitutional a.k.a. Klayman et al. v. Obama et al. Memorandum and Opinion from December 16, 2013 in Civil Action 13-0851 in United Case District Court for the District of Columbia". The Washington Post. Archived from the original on 30 August 2017. Retrieved 17 December 2013.
  37. Savage, Charlie (16 December 2013). "Judge Questions Legality of N.S.A. Phone Records". The New York Times. Retrieved 18 December 2013.
  38. Bill Mears and Evan Perez, CNN (17 December 2013). "Judge: NSA domestic phone data-mining unconstitutional". cnn. Retrieved 18 December 2013.{{cite news}}: |author= has generic name (help)
  39. Kravets, David (16 December 2013). "Court Says NSA Bulk Telephone Spying Is Unconstitutional". Wired. Retrieved 18 December 2013.
  40. Johnson, Kevin; Wolf, Richard (16 December 2013). "Federal judge rules against NSA spying". USA Today. Retrieved 18 December 2013.
  41. Gerstein, Josh (16 December 2013). "Judge: NSA phone program likely unconstitutional". Politico. Retrieved 18 December 2013.
  42. 1 2 Nakashima, Ellen; Marimow, Ann E. (16 December 2013). "Judge: NSA's collecting of phone records is probably unconstitutional". The Washington Post. Retrieved 17 December 2013.
  43. Ackerman, Spencer; Roberts, Dan (16 December 2013). "NSA phone surveillance program likely unconstitutional, federal judge rules". The Guardian. Retrieved 18 December 2013.
  44. Pauley III, William H. (27 December 2013). "United States District Court Southern District of New York: American Civil Liberties Union v. James R. Clapper (13 Civ. 3994) (WHP)" (PDF). American Civil Liberties Union. Retrieved 28 December 2013.
  45. Bazzle, Steph (27 December 2013). "Judge Says NSA's Data Collection Is Legal". Indyposted. Archived from the original on December 28, 2013. Retrieved 28 December 2013.
  46. Liptak, Adam; Schmidt, Michael S. (27 December 2013). "Judge Upholds N.S.A.'s Bulk Collection of Data on Calls". The New York Times. Retrieved 28 December 2013.
  47. Denniston, Lyle (27 December 2013). "Judge upholds NSA's phone data sweeps (UPDATED)". Scotusblog. Retrieved 28 December 2013.
  48. Peterson, Andrea (27 December 2013). "The most Kafkaesque paragraph from today's NSA ruling". The Washington Post. Retrieved 28 December 2013.
  49. Horwitz, Sari (27 December 2013). "NSA collection of phone data is lawful, federal judge rules". The Washington Post. Retrieved 28 December 2013.
  50. 1 2 Poitras, Laura; Rosenbach, Marcel; Stark, Holger (August 12, 2013). "Ally and Target: US Intelligence Watches Germany Closely" . Retrieved August 12, 2013.
  51. Gellman, Barton (August 16, 2013). "NSA broke privacy rules thousands of times per year, audit finds". The Washington Post. Retrieved August 16, 2013.
  52. Craig Whitlock; Barton Gellman (September 3, 2013). "U.S. documents detail al-Qaeda's efforts to fight back against drones". The Washington Post. Retrieved September 3, 2013.
  53. Miller, Greg; Whitlock, Craig; Gellman, Barton (September 2, 2013). "Top-secret U.S. intelligence files show new levels of distrust of Pakistan". The Washington Post. Retrieved September 3, 2013.
  54. Staff (September 4, 2013). "US intelligence uncovered Pak army plot to kill Asma Jahangir in India: report" . Retrieved September 4, 2013.
  55. Staff (September 7, 2013). "Privacy Scandal: NSA Can Spy on Smart Phone Data" . Retrieved September 7, 2013.
  56. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 "NSA report on privacy violations in the first quarter of 2012". The Washington Post. August 16, 2013. Retrieved August 16, 2013.
  57. 1 2 3 No alvo dos EUA Archived 2013-07-12 at the Wayback Machine , Infographic, O Globo . Retrieved July 8, 2013.
  58. 1 2 Gellman, Barton; DeLong, Matt (August 15, 2013). "First direct evidence of illegal surveillance found by the FISA court". The Washington Post. Retrieved August 25, 2013.
  59. MacAskill, Ewen (August 23, 2013). "NSA paid millions to cover Prism compliance costs for tech companies" . Retrieved August 23, 2013.
  60. 1 2 Drum, Kevin (June 8, 2013). "Map of the Day: Who the NSA Listens To" . Retrieved September 9, 2013.
  61. Nakashima, Ellen (July 31, 2013). "Newly declassified documents on phone records program released". The Washington Post. Retrieved September 9, 2013.
  62. Gellman, Barton (June 15, 2013). "U.S. surveillance architecture includes collection of revealing Internet, phone metadata". The Washington Post. Retrieved September 9, 2013.
  63. A published heat map shows that most data is collected from Iran, Pakistan and Jordan, with over 40 billion individual pieces of information collected from these three countries alone in March 2013 alone, from a total of 97 billion worldwide.
  64. Snowden reveals Australia's links to US spy web, The Sydney Morning Herald , July 8, 2013. Retrieved July 11, 2013.
  65. 1 2 3 4 Glenn Greenwald and Spencer Ackerman (June 27, 2013). "How the NSA is still harvesting your online data". The Guardian. Retrieved August 1, 2013.
  66. 1 2 3 "What to say, and not to say, to 'our overseers'". The Washington Post. August 16, 2013. Retrieved August 16, 2013.
  67. 1 2 3 4 Staff (July 29, 2013). "Photo Gallery: NSA Documentation of Spying in Germany". Der Spiegel. Retrieved August 11, 2013.
  68. Gellman, Barton; DeLong, Matt (August 15, 2013). "What to say, and not to say, to 'our overseers'". The Washington Post. Retrieved August 25, 2013.
  69. 1 2 3 4 5 6 Poitras, Laura; Rosenbach, Marcel; Stark, Holger (August 26, 2013). "Codename 'Apalachee': How America Spies on Europe and the UN" . Retrieved August 26, 2013.
  70. 1 2 3 4 Ball, James; Borger, Julian; Greenwald, Glenn (September 5, 2013). "US and UK spy agencies defeat privacy and security on the internet". The Guardian. Retrieved September 5, 2013.
  71. "Project Bullrun – classification guide to the NSA's decryption program". TheGuardian.com . September 5, 2013.
  72. Risen, James; Poitras, Laura (November 22, 2013). "N.S.A. Report Outlined Goals for More Power". The New York Times . Retrieved 23 November 2013.
  73. How Microsoft handed the NSA access to encrypted messages, The Guardian , July 12, 2013. Retrieved July 13, 2013.
  74. 1 2 3 4 5 6 NSA slides explain the PRISM data-collection program, The Washington Post , June 6, 2013, updated July 10, 2013. Retrieved July 12, 2013.
  75. 1 2 3 Gorman, Siobhan; Valentiono-Devries, Jennifer (August 20, 2013). "New Details Show Broader NSA Surveillance Reach – Programs Cover 75% of Nation's Traffic, Can Snare Emails". The Wall Street Journal. Retrieved August 21, 2013.
  76. 1 2 "New slides about NSA collection programs". Top Level Telecommunications. July 16, 2013. Retrieved August 27, 2013.
  77. Kloc, Joe (July 12, 2013). "Forget PRISM: FAIRVIEW is the NSA's project to "own the Internet"" . Retrieved August 11, 2013.
  78. Greenwald, Glenn; Kax, Roberto; Casado, José (July 12, 2013). "Espionagem dos EUA se espalhou pela América Latina" . Retrieved August 11, 2013.
  79. 1 2 "The National Security Agency: Missions, Authorities, Oversight and Partnerships" (PDF). National Security Agency. August 9, 2013. Retrieved August 12, 2013.
  80. Perez, Evan (August 10, 2013). "Documents shed light on U.S. surveillance programs". CNN. Retrieved August 12, 2013.
  81. Timberg, Craig; Gellman, Barton (August 30, 2013). "NSA paying U.S. companies for access to communications networks". The Washington Post. Retrieved August 31, 2013.
  82. 1 2 James Ball; Spencer Ackerman (August 9, 2013). "NSA loophole allows warrantless search for US citizens' emails and phone calls" . Retrieved August 11, 2013.
  83. 1 2 Nakashima, Ellen (July 31, 2013). "Newly declassified documents on phone records program released". The Washington Post. Retrieved August 4, 2013.
  84. 1 2 3 4 5 Ambinder, Marc (August 14, 2013). "An Educated Guess About How the NSA Is Structured" . Retrieved August 14, 2013.
  85. 1 2 Gellman, Barton (June 15, 2013). "U.S. surveillance architecture includes collection of revealing Internet, phone metadata". The Washington Post. Retrieved August 11, 2013.
  86. 1 2 Staff (September 15, 2013). "'Follow the Money': NSA Spies on International Payments 'Follow the Money': NSA Spies on International Payments" . Retrieved September 15, 2013.
  87. 1 2 3 Staff (September 1, 2013). "'Success Story': NSA Targeted French Foreign Ministry" . Retrieved September 1, 2013.
  88. 1 2 "Jornal O Globo revela que Brasil teria sido espionado pelos Estados Unidos". July 8, 2013. Retrieved September 5, 2013.
  89. 1 2 Bamford, James (July 12, 2013). "They Know Much More Than You Think". The New York Review of Books. Retrieved July 29, 2013.
  90. Ball, James (October 25, 2013). "Leaked memos reveal GCHQ efforts to keep mass surveillance secret". The Guardian. Retrieved October 25, 2013.
  91. Ball, James; Borger, Julian; Greenwald, Glenn (September 6, 2013). "Revealed: how US and UK spy agencies defeat internet privacy and security". The Guardian. Retrieved September 7, 2013.
  92. "Mastering the internet: how GCHQ set out to spy on the world wide web". The Guardian. 21 June 2013. Retrieved 18 December 2013.
  93. url=https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/
  94. 1 2 Duncan Campbell; Oliver Wright; James Cusick; Kim Sengupta (August 22, 2013). "Exclusive: Edward Snowden leaks reveal UK's secret Middle-East web surveillance base". The Independent. London. Retrieved August 22, 2013.
  95. Greenwald, Glenn (August 23, 2013). "Snowden: UK government now leaking documents about itself" . Retrieved August 23, 2013.
  96. 1 2 3 4 5 Goetz, John; Leyendecker, Hans; Obermaier, Frederik (August 28, 2013). "British Officials Have Far-Reaching Access To Internet And Telephone Communications" . Retrieved August 28, 2013.
  97. Schmitz, Gregor-Peter (September 20, 2013). "Cyber Attack: Belgians Angered by British Spying" . Retrieved September 20, 2013.
  98. Gallagher, Ryan (September 20, 2013). "U.K. Hacked Belgian Phone Company in "Op Socialist" Spy Mission, Snowden Reveals" . Retrieved September 20, 2013.
  99. 1 2 "US-Geheimdienst hörte Zentrale der Vereinten Nationen ab". Der Spiegel (in German). 25 August 2013. Retrieved August 25, 2013.
  100. 1 2 Goebel, Nicole (August 25, 2013). Schuster, Kathleen (ed.). "NSA spied on UN, German report says". Deutsche Welle . Retrieved August 25, 2013.
  101. Gellman, Barton; Whitlock, Craig (August 29, 2013). "To hunt Osama bin Laden, satellites watched over Abbottabad, Pakistan, and Navy SEALs". The Washington Post. Retrieved August 29, 2013.
  102. Staff (August 31, 2013). "Snowden Document: NSA Spied On Al Jazeera Communications" . Retrieved August 31, 2013.
  103. Brooks, Bradley (September 1, 2013). "Report: NSA spied on leaders of Brazil, Mexico". Archived from the original on September 2, 2013. Retrieved September 1, 2013.
  104. Ornaghi, Tiago; Lordello, Flávio, eds. (September 1, 2013). "Saiba como o maior sistema de espionagem do mundo monitora comunicações em Brasília" . Retrieved September 1, 2013.
  105. Tardáguila, Cristina; Gama, Júnia (September 1, 2013). "EUA espionaram Dilma" . Retrieved September 1, 2013.
  106. Gellman, Barton; Soltani, Ashkan (October 14, 2013). "NSA collects millions of e-mail address books globally". The Washington Post.
  107. 1 2 "NSA surveillance: A guide to staying secure". The Guardian . Retrieved September 24, 2013.
  108. 1 2 3 Narayan Lakshman (September 24, 2013). "Secret bunkers, a challenge for U.S. intelligence". The Hindu . Chennai, India. Retrieved September 24, 2013.
  109. Nelson, Kimberly (August 22, 2013). "In Salt Lake for the 2002 Olympics? Your texts, emails and phone calls likely reviewed by NSA". Archived from the original on 2013-12-10.
  110. Davidson, Lee (August 23, 2013). "Former Salt Lake mayor: NSA snooping is the scandal of the century" . Retrieved August 25, 2013.
  111. Freeze, Colin (June 15, 2013). "How Canada's shadowy metadata-gathering program went awry". The Globe and Mail. Toronto. Retrieved August 27, 2013.
  112. "Raw documents: Canada's 'top secret' data mining program". The Globe and Mail. Toronto. June 10, 2013. Retrieved August 27, 2013.
  113. Freeze, Colin (June 10, 2013). "Data-collection program got green light from MacKay in 2011". The Globe and Mail. Toronto. Retrieved August 27, 2013.
  114. Matt Apuzzo; Adam Goldman (August 25, 2013). "The NYPD Division of Un-American Activities" . Retrieved August 26, 2013.
  115. "Blue Coat". Reporters Without Borders. March 12, 2013. Archived from the original on November 28, 2013. Retrieved November 30, 2013.
  116. Citizen Lab, Munk School of Global Affairs, University of Toronto (January 15, 2013). "Planet Blue Coat: Mapping Global Censorship and Surveillance Tools".{{cite web}}: CS1 maint: multiple names: authors list (link)
  117. Markoff, John (January 16, 2013). "Rights Group Reports on Abuses of Surveillance and Censorship Technology". The New York Times.
  118. Nakashima, Ellen (July 8, 2013). "Web monitoring devices made by U.S. firm Blue Coat detected in Iran, Sudan". The Washington Post.
  119. "You Are Being Tracked: How License Plate Readers Are Being Used to Record Americans' Movements". July 17, 2013. Retrieved August 11, 2013.
  120. Martinez, Michael (July 18, 2013). "ACLU raises privacy concerns about police technology tracking drivers". CNN. Retrieved August 11, 2013.
  121. McCullagh, Declan (August 2, 2013). "FBI pressures Internet providers to install surveillance software".
  122. Jennifer Valentino-DeVries; Danny Yadron (August 3, 2013). "FBI Taps Hacker Tactics to Spy on Suspects". The Wall Street Journal. Retrieved August 12, 2013.
  123. Choney, Suzanne (August 6, 2013). "FBI hacking squad used in domestic investigations, experts say" . Retrieved August 12, 2013.
  124. Savage, Charlie (August 8, 2013). "N.S.A. Said to Search Content of Messages to and From U.S". The New York Times. Retrieved August 11, 2013.
  125. Nixon, Ron (July 3, 2013). "U.S. Postal Service Logging All Mail for Law Enforcement". The New York Times. Retrieved August 11, 2013.
  126. Dharmakumar, Rohin (August 13, 2013). "Keep your virtual life away from prying governments" . Retrieved August 13, 2013.
  127. Parbat, Kalyan (July 27, 2013). "Israel's Verint to get government contract for interception tools". The Times Of India. Retrieved August 13, 2013.
  128. Kirka, Danica (August 19, 2013). "Partner of reporter at center of NSA leak detained" . Retrieved August 19, 2013.
  129. Staff (August 21, 2013). "New Zealand passes bill allowing domestic spying" . Retrieved August 23, 2013.
  130. Watkins, Tracy (August 21, 2013). "Spy bill passes into law amid wide criticism" . Retrieved August 23, 2013.
  131. "Podcast Show #112: NSA Whistleblower Goes on Record -Reveals New Information & Names Culprits!" (Podcast). June 19, 2013. Retrieved August 15, 2013.
  132. Hill, Kashmir (July 24, 2013). "Blueprints of NSA's Ridiculously Expensive Data Center in Utah Suggest It Holds Less Info Than Thought". Forbes. Retrieved August 11, 2013.
  133. Priest, Dana (July 21, 2013). "NSA growth fueled by need to target terrorists". The Washington Post. Retrieved August 11, 2013.
  134. Shiffman, John; Cooke, Kristina (August 5, 2013). "Exclusive: U.S. directs agents to cover up program used to investigate Americans". Reuters. Retrieved August 11, 2013.
  135. Shiffman, John; Ingram, David (August 7, 2013). "Exclusive: IRS manual detailed DEA's use of hidden intel evidence". Reuters. Retrieved August 12, 2013.
  136. Lindsay, Jonathan S (July 27, 2013). "U.S. allowed Italian kidnap prosecution to shield higher-ups, ex-CIA officer says" . Retrieved August 11, 2013.
  137. Obama's crackdown views leaks as aiding enemies of U.S. Archived 2015-06-18 at the Wayback Machine , McClatchy , June 20, 2013. Retrieved July 12, 2013.
  138. "Stellungnahme des BSI zur aktuellen Berichterstattung zu MS Windows 8 und TPM". August 21, 2013. Archived from the original on March 4, 2016. Retrieved August 22, 2013.
  139. Staff (August 22, 2013). "German Federal Government Warns on the Security Dangers of Windows 8" . Retrieved August 22, 2013.
  140. Carol D. Leonnig; Julie Tate; Barton Gellman (September 1, 2013). "U.S. intelligence agencies spend millions to hunt for insider threats, document shows". The Washington Post. Retrieved September 2, 2013.
  141. Strohm, Chris (August 23, 2013). "Lawmakers Probing Intentional Abuses of Power by NSA Analysts". Bloomberg. Retrieved August 23, 2013.
  142. Gorman, Siobhan (August 23, 2013). "NSA Officers Sometimes Spy on Love Interests". The Wall Street Journal. Retrieved August 23, 2013.
  143. Scott Shane; Colin Moynihan (August 1, 2013). "Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.'s". The New York Times. Retrieved August 2, 2013.
  144. "Synopsis of the Hemisphere Project". The New York Times. September 1, 2013. Retrieved September 2, 2013.
  145. Andersson, Aron (September 6, 2013). "Video: Här pekar Duncan Campbell ut Sverige" (in Swedish). Retrieved September 7, 2013.
  146. Stenquist, Victor; Röstlund, Lisa (September 6, 2013). "Uppgifter om Sverige fick inte publiceras" (in Swedish). Retrieved September 7, 2013.
  147. Staff (September 6, 2013). "Sweden sits on pipeline of intelligence 'gold'" . Retrieved September 7, 2013.
  148. Staff (September 8, 2013). "Datenbank PX: CIA und deutsche Dienste betrieben jahrelang Geheimprojekt" (in German). Retrieved September 8, 2013.
  149. Greenberg, Andy (September 17, 2013). "Amid NSA Scandal, ACLU Report Turns Spotlight Back To FBI's 'Unchecked Abuse Of Authority'". Forbes. Retrieved September 17, 2013.
  150. "Unleashed and Unaccountable: The FBI's Unchecked Abuse of Authority". September 17, 2013. Retrieved September 17, 2013.
  151. Cushing, Tim (September 18, 2013). "NSA Apparently Purchasing Software Exploits From French Security Firm" . Retrieved September 18, 2013.