MAINWAY

Last updated

MAINWAY is a database maintained by the United States' National Security Agency (NSA) containing metadata for hundreds of billions of telephone calls made through the largest telephone carriers in the United States, including AT&T, Verizon, and T-Mobile. [1] [2]

Contents

The existence of this database and the NSA program that compiled it was unknown to the general public until USA Today broke the story on May 10, 2006. [1]

It is estimated that the database contains over 1.9 trillion call-detail records. [3] The records include detailed call information (caller, receiver, date/time of call, length of call, etc.) for use in traffic analysis [4] and social network analysis, [5] but do not include audio information or transcripts of the content of the phone calls. [4]

According to former NSA director Michael Hayden, the NSA sought to deploy MAINWAY prior to 9/11 in response to the Millennium Plot but did not do so because it did not comply with US law. Hayden wrote: "The answer from [the Justice Department] was clear: ' ... you can't do this.'" [6] As of June 2013, the database stores metadata for at least five years. [7] According to Pulitzer Prize winning journalist James Risen, MAINWAY was the most important of the four components that comprised the ThinThread program. [8]

The database's existence has prompted fierce objections. It is often viewed as an illegal warrantless search and violation of the pen register provisions of the Foreign Intelligence Surveillance Act and (in some cases) the Fourth Amendment of the United States Constitution.

The George W. Bush administration neither confirmed nor denied the existence of the domestic call record database. This contrasts with a related NSA controversy concerning warrantless surveillance of selected telephone calls; in that case they did confirm the existence of the program of debated legality. That program's code name was Stellar Wind. [9]

Similar programs exist or are planned in other countries, including Sweden (Titan traffic database) [10] and Great Britain (Interception Modernisation Programme).

The MAINWAY equivalent for Internet traffic is MARINA. [11]

Content

According to an anonymous source, the database is "the largest database ever assembled in the world," [1] and contains call-detail records (CDRs) for all phone calls, domestic and international. A call-detail record consists of the phone numbers of the callers and recipients along with time, position and duration of the call. While the database does not contain specific names or addresses, that information is widely available from non-classified sources. [1]

According to the research group TeleGeography, AT&T (including the former SBC), Verizon, and BellSouth connected nearly 500 billion telephone calls in 2005 and nearly two trillion calls since late 2001. [12] It is reported that all four companies were paid to provide the information to the NSA. [13] [14]

Usage

Although such a database of phone records would not be useful as a tool in itself for national security,[ dubious ] it could be used as an element of broader national security analytical efforts and data mining. These efforts could involve analysts using the data to connect phone numbers with names and links to persons of interest. [15] [16] Such efforts have been the focus of the NSA's recent attempts to acquire key technologies from high tech firms in Silicon Valley and elsewhere. Link analysis software, such as Link Explorer or the Analyst's Notebook, is used by law enforcement to organize and view links that are demonstrated through such information as telephone and financial records, which are imported into the program from other sources. [17] Neural network software is used to detect patterns, classify and cluster data as well as forecast future events. [18]

Using relational mathematics, it is possible to find out if someone changes their telephone number by analyzing and comparing calling patterns.[ citation needed ] [19]

ThinThread, a system designed largely by William Binney, which pre-dated this database, but was discarded for the Trailblazer Project, introduced some of the technology which is used to analyze the data. [20] Michael Hayden, former director of the NSA, admitted as much in an interview, saying: "But we judged fundamentally that as good as [ThinThread] was, and believe me, we pulled a whole bunch of elements out of it and used it for our final solution for these problems, as good as it was, it couldn't scale sufficiently to the volume of modern communications." [21] Where ThinThread encrypted privacy data, however, no such measures have been reported with respect to the current system.

Response

Internet monitoring

Wired magazine

On May 22, 2006, it was revealed by investigative reporter Seymour Hersh and Wired magazine that the program involved the NSA setting up splitters to the routing cores of many telecoms companies and to major Internet traffic hubs. These provided a direct connection via an alleged "black room" known as Room 641A. This room allows most U.S. telecoms communications and Internet traffic to be redirected to the NSA.

According to a security consultant who worked on the program, "What the companies are doing is worse than turning over records ... they're providing total access to all the data," and a former senior intelligence official said, "This is not about getting a cardboard box of monthly phone bills in alphabetical order ... the NSA is getting real-time actionable intelligence." [35] [36]

Partial retraction

On June 30, 2006 USA Today printed a partial retraction about its controversial article the prior month saying: "... USA TODAY also spoke again with the sources who had originally provided information about the scope and contents of the domestic calls database. All said the published report accurately reflected their knowledge and understanding of the NSA program, but none could document a contractual relationship between BellSouth or Verizon and the NSA, or that the companies turned over bulk calling records to the NSA. Based on its reporting after the May 11 article, USA TODAY has now concluded that while the NSA has built a massive domestic calls record database involving the domestic call records of telecommunications companies, the newspaper cannot confirm that BellSouth or Verizon contracted with the NSA to provide bulk calling records to that database ..." [37]

Denials

Five days after the story appeared, BellSouth officials said they could not find evidence of having handed over such records. "Based on our review to date, we have confirmed no such contract exists and we have not provided bulk customer calling records to the NSA," the officials said. USA Today replied that BellSouth officials had not denied the allegation when contacted the day before the story was published. [38] Verizon has also asserted that it has not turned over such records. [39]

Companies are permitted by US securities law (15 U.S.C. 78m(b)(3)(A)) to refrain from properly accounting for their use of assets in matters involving national security, when properly authorized by an agency or department head acting under authorization by the President of the United States. [40] President Bush issued a presidential memorandum on May 5, 2006 delegating authority to make such a designation to Director of National Intelligence John Negroponte, just as the NSA call database scandal appeared in the media. [41]

Lawsuits

The Electronic Frontier Foundation filed a related suit against AT&T on January 31, 2006, alleging that the firm had given NSA access to its database, a charge reiterated in the USA Today article. [42] Verizon and BellSouth have both claimed they were never contacted by the NSA, nor did they provide any information to the agency, [38] [43] though US codes of law [44] permit companies to lie about their activities when the President believes that telling the truth would compromise national security. [40]

On June 6, 2013, in the wake of well-publicized leaks of top secret documents by former NSA contractor Edward Snowden, conservative public interest lawyer and Judicial Watch founder Larry Klayman filed a lawsuit ( Klayman v. Obama ) challenging the constitutionality and statutory authorization of the government's wholesale collection of phone record metadata. On June 10, the American Civil Liberties Union and Yale Law School's Media Freedom and Information Clinic filed a motion with the Foreign Intelligence Surveillance Court (FISC) asking for the secret FISC opinions on the Patriot Act to be made public in the light of the Guardian's publication of a leaked FISC court order about the collection of Verizon call records metadata. [45] [46] [47] On June 11, the ACLU filed a lawsuit ( ACLU v. Clapper ) against Director of National Intelligence James Clapper challenging the legality of the NSA's telephony metadata collection program. Once the judge in each case had issued rulings seemingly at odds with one another, Gary Schmitt (former staff director of the Senate Select Committee on Intelligence) wrote in The Weekly Standard , "The two decisions have generated public confusion over the constitutionality of the NSA's data collection program—a kind of judicial 'he-said, she-said' standoff." [48] The ACLU contested the decision in the Second Circuit Court of Appeals. In 2015, the appeals court ruled that Section 215 of the Patriot Act did not authorize the bulk collection of metadata, which judge Gerard E. Lynch called a "staggering" amount of information. [49]

In November 2014, an appeals court in Washington heard arguments in the case Klayman v. Obama . During the hearings, Justice Department attorney H. Thomas Byron defended the NSA's collection of phone records and stated that "the government doesn't and never has acquired all or nearly all of the telephone call data records." [50]

Claims

New Jersey

Spurred by the public disclosure of the NSA call database, a lawsuit was filed against Verizon on May 12, 2006 at the Federal District Court in Manhattan by Princeton, N.J. based attorneys Carl Mayer and Bruce Afran. The lawsuit seeks $1,000 for each violation of the Telecommunications Act of 1996, and would total approximately $5 billion if the court certifies the suit as a class-action lawsuit. [51]

Oregon

On May 12, 2006, an Oregon man filed a lawsuit against Verizon Northwest for $1 billion. [52]

Maine

On May 13, 2006, a complaint in Maine was filed by a group of 21 Maine residents who asked the Public Utilities Commission (PUC) to demand answers from Verizon about whether it provided telephone records and information to the federal government without customers' knowledge or consent. Maine law requires the PUC to investigate complaints against a utility if a petition involves at least 10 of the utility's customers. [53]

California (E.F.F.)

Shortly after the NSA call database story surfaced, a San Francisco lawsuit, Hepting v. AT&T , was filed by the Electronic Frontier Foundation. [54] [55]

Justice Department response

On May 14, 2006, the Los Angeles Times reported that the U.S. Justice Department called for an end to an eavesdropping lawsuit against AT&T Corp., citing possible damage from the litigation to national security. [54] [56]

In an April 28 Statement of Interest of the AT&T case, the US government indicated that it intends to invoke the State Secrets Privilege in a bid to dismiss the action. [57]

The NSA call database was not approved by the Foreign Intelligence Surveillance Court (FISC) as required by the Foreign Intelligence Surveillance Act (FISA). The FISC was established in 1978 to secretly authorize access to call-identifying information and interception of communications of suspected foreign agents on U.S. soil. [54] Stanford Law School's Chip Pitts provided an overview of the relevant legal concerns in The Washington Spectator. [58]

Separate from the question of whether the database is illegal under FISA, one may ask whether the call detail records are covered by the privacy protection of the Fourth Amendment of the U.S. Constitution. This is unclear. As the U.S. has no explicit constitutional guarantee on the secrecy of correspondence, any protection on communications is an extension from litigation of the privacy provided to "houses and papers." [59] This again is dependent on the flexuous requirement of a reasonable expectation of privacy .

The most relevant U.S. Supreme Court case is Smith v. Maryland . [60] In that case, the Court addressed pen registers, which are mechanical devices that record the numbers dialed on a telephone; a pen register does not record call contents. The Court ruled that pen registers are not covered by the Fourth Amendment: "The installation and use of a pen register, ... was not a 'search,' and no warrant was required." More generally, "This Court consistently has held that a person has no legitimate expectation of privacy in information he ... voluntarily turns over to third parties." [61]

The data collecting activity may however be illegal under other telecommunications privacy laws.

Stored Communications Act

The 1986 Stored Communications Act (18 U.S.C. § 2701) forbids turnover of information to the government without a warrant or court order, the law gives consumers the right to sue for violations of the act. [62] [63]

A governmental entity may require the disclosure by a provider of electronic communication service of the contents of a wire or electronic communication ... only pursuant to a warrant issued using the procedures described in the Federal Rules of Criminal Procedure [64]

However, the Stored Communications Act also authorizes phone providers to conduct electronic surveillance if the Attorney General of the United States certifies that a court order or warrant is not required and that the surveillance is required:

[Telephone providers] are authorized to ... intercept ... communications or to conduct electronic surveillance ... if such provider ... has been provided with a certification in writing by ... the Attorney General of the United States that no warrant or court order is required by law, that all statutory requirements have been met, and that the specified assistance is required. [65]

The Act provides for special penalties for violators when "the offense is committed ... in violation of the Constitution or laws of the United States or any State." [64]

Finally, the act allows any customer whose telephone company provided this information to sue that company in civil court for (a) actual damages to the consumer, (b) any profits by the telephone company, (c) punitive damages, and (d) attorney fees. The minimum amount a successful customer will recover under (a) and (b) is $1,000:

The court may assess as damages in a civil action under this section the sum of the actual damages suffered by the plaintiff and any profits made by the violator as a result of the violation, but in no case shall a person entitled to recover receive less than the sum of $1,000. If the violation is willful or intentional, the court may assess punitive damages. In the case of a successful action to enforce liability under this section, the court may assess the costs of the action, together with reasonable attorney fees determined by the court.

18 U.S.C. § 2707(c) damages [64]

Communications Assistance for Law Enforcement Act

President Clinton signed into law the Communications Assistance for Law Enforcement Act of 1994, after it was passed in both the House and Senate by a voice vote. That law is an act "to make clear a telecommunications carrier's duty to cooperate in the interception of communications for law enforcement purposes, and for other purposes." The act states that a court order isn't the only lawful way of obtaining call information, saying, "A telecommunications carrier shall ensure that any interception of communications or access to call-identifying information effected within its switching premises can be activated only in accordance with a court order or other lawful authorization." [66]

Historical background

The FISC was inspired by the recommendations of the Church Committee, [67] which investigated a wide range of intelligence and counter-intelligence incidents and programs, including some U.S. Army programs and the FBI program COINTELPRO.

In 1971, the US media reported that COINTELPRO targeted thousands of Americans during the 1960s, after several stolen FBI dossiers were passed to news agencies. [68] The Church Committee Senate final report, which investigated COINTELPRO declared that:

Too many people have been spied upon by too many Government agencies and too much information has been collected. The Government has often undertaken the secret surveillance of citizens on the basis of their political beliefs, even when those beliefs posed no threat of violence or illegal acts on behalf of a hostile foreign power. The Government, operating primarily through secret informants, but also using other intrusive techniques such as wiretaps, microphone "bugs," surreptitious mail opening, and break-ins, has swept in vast amounts of information about the personal lives, views, and associations of American citizens. Investigations of groups deemed potentially dangerous – and even of groups suspected of associating with potentially dangerous organizations – have continued for decades, despite the fact that those groups did not engage in unlawful activity. [69] [70]

Legality

The legality of blanket wiretapping has never been sustained in court, but on July 10, 2008 the US Congress capitulated to the administration in granting blanket immunity to the administration and telecom industry for potentially illegal domestic surveillance. [71] The bill was passed during the crucible of the 2008 presidential campaign, and was supported by then-Sen. Barack Obama, D-Ill., who was campaigning against Sen. John McCain, R-Ariz., for the presidency. [71]

Obama provided qualified support for the bill. He promised to "carefully monitor" the program for abuse, but said that, "Given the legitimate threats we face, providing effective intelligence collection tools with appropriate safeguards is too important to delay. So I support the compromise." [71] It is difficult to argue that appropriate safeguards are in place, when CDRs from all the major telecommunications companies are provided to the NSA.

The Foreign Intelligence Surveillance Court has released an opinion, dated August 29, 2013, written by U.S. District Judge Claire Eagan of the Northern District of Oklahoma, in which she said "metadata that includes phone numbers, time and duration of calls is not protected by the Fourth Amendment, since the content of the calls is not accessed." [72] In the option, Judge Eagan said "data collection is authorized under Section 215 of the Patriot Act that allows the FBI to issue orders to produce tangible things if there are reasonable grounds to believe the records are relevant to a terrorism investigation." [72] The option authorized the FBI to "collect the information for probes of 'unknown' as well as known terrorists." [72] According to the New York Times , "other judges had routinely reauthorized the data collection program every 90 days." [72]

Political action

The Senate Armed Services Committee was scheduled to hold hearings with NSA whistle-blower Russell Tice the week following the revelation of the NSA call database. Tice indicated that his testimony would reveal information on additional illegal activity related to the NSA call database that has not yet been made public, and that even a number of NSA employees believe what they are doing is illegal. Tice also told the National Journal that he "will not confirm or deny" if his testimony will include information on spy satellites being used to spy on American citizens from space. [73] However, these hearings did not occur and the reason why is unknown.

Polls

Qwest Communications

The USA Today report indicated that Qwest's then CEO, Joseph Nacchio, doubted the NSA's assertion that warrants were unnecessary. In negotiations, the NSA pressured the company to turn over the records. Qwest attorneys asked the NSA to obtain approval from the United States Foreign Intelligence Surveillance Court. When the NSA indicated they would not seek this approval, Qwest's new CEO Richard Notebaert declined NSA's request for access. Later, T-Mobile explicitly stated they do not participate in warrantless surveillance. [77]

See also

Related Research Articles

<span class="mw-page-title-main">United States Foreign Intelligence Surveillance Court</span> U.S. federal court

The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants against foreign spies inside the United States by federal law enforcement and intelligence agencies.

<span class="mw-page-title-main">NSA warrantless surveillance (2001–2007)</span> Part of Terrorist Surveillance Program

NSA warrantless surveillance — also commonly referred to as "warrantless-wiretapping" or "-wiretaps" — was the surveillance of persons within the United States, including U.S. citizens, during the collection of notionally foreign intelligence by the National Security Agency (NSA) as part of the Terrorist Surveillance Program. In late 2001, the NSA was authorized to monitor, without obtaining a FISA warrant, phone calls, Internet activities, text messages and other forms of communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lays within the U.S.

<span class="mw-page-title-main">Terrorist Surveillance Program</span> NSA program

The Terrorist Surveillance Program was an electronic surveillance program implemented by the National Security Agency (NSA) of the United States in the wake of the September 11, 2001 attacks. It was part of the President's Surveillance Program, which was in turn conducted under the overall umbrella of the War on Terrorism. The NSA, a signals intelligence agency, implemented the program to intercept al Qaeda communications overseas where at least one party is not a U.S. person. In 2005, The New York Times disclosed that technical glitches resulted in some of the intercepts including communications which were "purely domestic" in nature, igniting the NSA warrantless surveillance controversy. Later works, such as James Bamford's The Shadow Factory, described how the nature of the domestic surveillance was much, much more widespread than initially disclosed. In a 2011 New Yorker article, former NSA employee Bill Binney said that his colleagues told him that the NSA had begun storing billing and phone records from "everyone in the country."

<span class="mw-page-title-main">Stellar Wind</span> Warrantless surveillance program of the NSA in the United States

"Stellar Wind" was the code name of a warrantless surveillance program begun under the George W. Bush administration's President's Surveillance Program (PSP). The National Security Agency (NSA) program was approved by President Bush shortly after the September 11, 2001 attacks and was revealed by Thomas Tamm to The New York Times in 2004. Stellar Wind was a prelude to new legal structures that allowed President Bush and President Barack Obama to reproduce each of those programs and expand their reach.

A call detail record (CDR) is a data record produced by a telephone exchange or other telecommunications equipment that documents the details of a telephone call or other telecommunications transactions that passes through that facility or device. The record contains various attributes of the call, such as time, duration, completion status, source number, and destination number. It is the automated equivalent of the paper toll tickets that were written and timed by operators for long-distance calls in a manual telephone exchange.

<span class="mw-page-title-main">Boundless Informant</span> Big data analysis and visualization tool used by the NSA

Boundless Informant is a big data analysis and data visualization tool used by the United States National Security Agency (NSA). It gives NSA managers summaries of the NSA's worldwide data collection activities by counting metadata. The existence of this tool was disclosed by documents leaked by Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton. Those disclosed documents were in a direct contradiction to the NSA's assurance to United States Congress that it does not collect any type of data on millions of Americans.

<span class="mw-page-title-main">Hemisphere Project</span>

The Hemisphere Project, also called simply Hemisphere, is a mass surveillance program conducted by US telephone company AT&T and paid for by the White House Office of National Drug Control Policy and the Drug Enforcement Administration (DEA).

<span class="mw-page-title-main">Mass surveillance in the United States</span>

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

<span class="mw-page-title-main">2010s global surveillance disclosures</span> Disclosures of NSA and related global espionage

Ongoing news reports in the international media have revealed operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly emanate from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden, which he obtained whilst working for Booz Allen Hamilton, one of the largest contractors for defense and intelligence in the United States. In addition to a trove of U.S. federal documents, Snowden's cache reportedly contains thousands of Australian, British, Canadian and New Zealand intelligence files that he had accessed via the exclusive "Five Eyes" network. In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention. The disclosure continued throughout 2013, and a small portion of the estimated full cache of documents was later published by other media outlets worldwide, most notably The New York Times, the Canadian Broadcasting Corporation, the Australian Broadcasting Corporation, Der Spiegel (Germany), O Globo (Brazil), Le Monde (France), L'espresso (Italy), NRC Handelsblad, Dagbladet (Norway), El País (Spain), and Sveriges Television (Sweden).

This is a category of disclosures related to global surveillance.

<span class="mw-page-title-main">Global surveillance</span> Mass surveillance across national borders

Global mass surveillance can be defined as the mass surveillance of entire populations across national borders.

The Fourth Amendment Protection Acts, are a collection of state legislation aimed at withdrawing state support for bulk data (metadata) collection and ban the use of warrant-less data in state courts. They are proposed nullification laws that, if enacted as law, would prohibit the state governments from co-operating with the National Security Agency, whose mass surveillance efforts are seen as unconstitutional by the proposals' proponents. Specific examples include the Kansas Fourth Amendment Preservation and Protection Act and the Arizona Fourth Amendment Protection Act. The original proposals were made in 2013 and 2014 by legislators in the American states of Utah, Washington, Arizona, Kansas, Missouri, Oklahoma and California. Some of the bills would require a warrant before information could be released, whereas others would forbid state universities from doing NSA research or hosting NSA recruiters, or prevent the provision of services such as water to NSA facilities.

<span class="mw-page-title-main">USA Freedom Act</span> 2015 U.S. surveillance law

The USA Freedom Act is a U.S. law enacted on June 2, 2015, that restored and modified several provisions of the Patriot Act, which had expired the day before. The act imposes some new limits on the bulk collection of telecommunication metadata on U.S. citizens by American intelligence agencies, including the National Security Agency. It also restores authorization for roving wiretaps and tracking lone wolf terrorists. The title of the act is a ten-letter backronym that stands for Uniting and Strengthening America by Fulfilling Rights and Ensuring Effective Discipline Over Monitoring Act of 2015.

<span class="mw-page-title-main">Proposed reforms of mass surveillance by the United States</span>

Proposed reforms of mass surveillance by the United States are a collection of diverse proposals offered in response to the Global surveillance disclosures of 2013.

<i>Klayman v. Obama</i> American federal court case

Klayman v. Obama, 957 F.Supp.2d 1, was a decision by the United States District Court for District of Columbia finding that the National Security Agency's (NSA) bulk phone metadata collection program was unconstitutional under the Fourth Amendment. The ruling was later overturned on jurisdictional grounds, leaving the constitutional implications of NSA surveillance unaddressed.

<span class="mw-page-title-main">Barack Obama on mass surveillance</span> Overview of the statements of former U.S. president Barack Obama on mass surveillance

Former U.S. President Barack Obama favored some levels of mass surveillance. He has received some widespread criticism from detractors as a result. Due to his support of certain government surveillance, some critics have said his support may have gone beyond acceptable privacy rights. This is of course a debatable conclusion. Many former US presidents have increased the abilities and techniques used for intelligence gathering. President Obama released many statements on mass surveillance.

<i>American Civil Liberties Union v. Clapper</i> American federal court case

American Civil Liberties Union v. Clapper, 785 F.3d 787, was a lawsuit by the American Civil Liberties Union (ACLU) and its affiliate, the New York Civil Liberties Union, against the United States federal government as represented by then-Director of National Intelligence James Clapper. The ACLU challenged the legality and constitutionality of the National Security Agency's (NSA) bulk phone metadata collection program.

The Privacy and Civil Liberties Oversight Board report on mass surveillance was issued in January 2014 in light of the global surveillance disclosures of 2013, recommending the US end bulk data collection.

In Re Electronic Privacy Information Center, 134 S.Ct. 638 (2013), was a direct petition to the Supreme Court of the United States regarding the National Security Agency's (NSA) telephony metadata collection program. On July 8, 2013, the Electronic Privacy Information Center (EPIC) filed a petition for a writ of mandamus and prohibition, or a writ of certiorari, to vacate an order of the Foreign Intelligence Surveillance Court (FISC) in which the court compelled Verizon to produce telephony metadata records from all of its subscribers' calls and deliver those records to the NSA. On November 18, 2013, the Supreme Court denied EPIC's petition.

<span class="mw-page-title-main">Timeline of global surveillance disclosures (2013–present)</span>

This timeline of global surveillance disclosures from 2013 to the present day is a chronological list of the global surveillance disclosures that began in 2013. The disclosures have been largely instigated by revelations from the former American National Security Agency contractor Edward Snowden.

References

  1. 1 2 3 4 5 Cauley, Leslie (May 11, 2006). "NSA has massive database of Americans' phone calls". USA Today. Archived from the original on February 23, 2011. Retrieved May 11, 2006.
  2. Cheng, Roger (July 6, 2015). "T-Mobile was asked to turn over more customer info than its larger rivals". CNET . Retrieved August 22, 2022.
  3. "Three Major Telecom Companies Help US Government Spy on Millions of Americans". Democracy Now! . Archived from the original on May 16, 2006. Retrieved May 15, 2006.
  4. 1 2 Schneier, Bruce (June 18, 2013). "Evidence that the NSA Is Storing Voice Content, Not Just Metadata". Schneier on Security. Archived from the original on June 23, 2013. Retrieved July 18, 2013. "And, by the way, I hate the term 'metadata.' What's wrong with 'traffic analysis,' which is what we've always called that sort of thing?"
  5. Cauley, Leslie (May 11, 2006). "NSA has massive database of Americans' phone calls". USA Today. Archived from the original on July 2, 2013. Retrieved July 18, 2013. "The data are used for 'social network analysis,' the official said, meaning to study how terrorist networks contact each other and how they are tied together."
  6. Hayden, Michael V. (February 21, 2017). Playing to the Edge: American Intelligence in the Age of Terror. Penguin. ISBN   9780143109983.
  7. "How the NSA uses your telephone records". The Week . June 6, 2013. Archived from the original on June 6, 2013. Retrieved June 6, 2013.
  8. Risen, James (2014). Pay Any Price: Greed, Power, and Endless War. Houghton Mifflin Harcourt. ISBN   9780544341418.
  9. "Now We Know What the Battle Was About". Newsweek. December 13, 2008. Archived from the original on July 17, 2009. Retrieved August 11, 2009.
  10. "Network Cameras & Wireless Network Camera Systems | VideoSurveillance.com". www.videosurveillance.com. Retrieved November 13, 2020.
  11. "Washington Post Provides New History of NSA Surveillance Programs". Mother Jones. Archived from the original on February 26, 2014. Retrieved March 15, 2016.
  12. Gellman, Barton; Mohammed, Arshad (May 12, 2006). "Data on Phone Calls Monitored Extent of Administration's Domestic Surveillance Decried in Both Parties". The Washington Post.
  13. "Hold the Phone". Newsweek. Archived from the original on June 14, 2007. Retrieved May 22, 2006.
  14. Since the NSA request, SBC has merged with AT&T, making the number of companies now involved three, not four.
  15. Ronczkowski, Michael R. (2003) Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis, and Investigations, CRC Press LLC, ISBN   0-8493-2012-7, pp. 101–106.
  16. Robert M. Clark (2003), Intelligence Analysis: A Target-Centric Approach, CQ Press, ISBN   1-56802-830-X.
  17. Markoff, John (February 25, 2006). "Taking Spying to Higher Level, Agencies Look for More Ways to Mine Data". The New York Times. Archived from the original on January 15, 2016. Retrieved February 22, 2017.
  18. "Missile Defense Agency" (PDF). mda.mil. Archived from the original (PDF) on May 24, 2006.
  19. Fawcett, Tom, and Foster Provost. "Adaptive fraud detection". Data Mining and Knowledge Discovery.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  20. Shorrock, Tim. "Obama's crackdown on whistleblowers". The Nation.
  21. "Former CIA and NSA Director General Michael Hayden (UAF ret) On His New Book "Playing To The Edge" « The Hugh Hewitt Show". The Hugh Hewitt Show. February 23, 2016. Retrieved October 9, 2017.
  22. "Bush defends surveillance". WIS 10 TV. Archived from the original on March 3, 2016. Retrieved May 11, 2006.
  23. "Specter Demands Phone Companies Testify on Database (Update1)". Bloomberg. May 11, 2006. Archived from the original on September 29, 2005.
  24. "Gingrich on NSA Phone Records Program: Administration's Conduct Can't 'Be Defended By Reasonable People'". Think Progress. Archived from the original on June 14, 2006. Retrieved May 13, 2006.
  25. "Immigration, NSA Wiretapping, and Iraq". Meet the Press interview, on www.newt.org. Archived from the original on September 17, 2006. Retrieved May 16, 2006.
  26. Adair, Bill (May 12, 2006). "NSA call tracking starts furor". Tampa Bay Times. Retrieved July 8, 2013.
  27. 1 2 "Quotes About the NSA Collecting Data". Associated Press. Retrieved May 11, 2006.[ dead link ] May 11, 2006
  28. "NSA Wire Tapping Program Revealed". NewsHour with Jim Lehrer. PBS. May 11, 2006. Archived from the original on July 9, 2013. Retrieved July 8, 2013.
  29. "Commissioner Copps calls for the FCC to open an inquiry into the lawfulness of the disclosure of America's phone records" (PDF). FCC. May 15, 2006. Retrieved July 8, 2013.
  30. "Robertson speaks to teens". manassasjm.com. Retrieved May 15, 2006.
  31. "BellSouth denies giving records to NSA". CNN. Archived from the original on May 26, 2006. Retrieved May 15, 2006.
  32. Archived June 14, 2006, at the Wayback Machine
  33. Archived June 15, 2006, at the Wayback Machine
  34. "Spy Agency Sought U.S. Call Records Before 9/11, Lawyers Say". Bloomberg. June 30, 2006. Archived from the original on July 19, 2006. Retrieved March 8, 2017.
  35. Hersh, Seymour (May 22, 2006). "Listening In". The New Yorker. Archived from the original on June 13, 2013. Retrieved July 17, 2013.
  36. "Whistle-Blower's Evidence, Uncut". Wired. May 22, 2006. Archived from the original on February 9, 2013.
  37. "A note to our readers". USA Today. June 30, 2006. Archived from the original on July 5, 2006.
  38. 1 2 "BellSouth: No Call Data to NSA". Wired. May 16, 2006. Archived from the original on February 10, 2013.
  39. Drinkard, Jim (May 16, 2006). "Verizon says it isn't giving call records to NSA". USA Today . Retrieved May 22, 2006.
  40. 1 2 "15 USC § 78m – Periodical and other reports | Title 15 – Commerce and Trade | U.S. Code". LII / Legal Information Institute. Retrieved July 8, 2013.
  41. George W. Bush (May 12, 2006). "Memorandum of May 5, 2006: Assignment of Function Relating to Granting of Authority for Issuance of Certain Directives". Federal Register. 71 (92): 27941–27943. Archived from the original on August 29, 2006.
  42. "NSA Multi-District Litigation". Electronic Frontier Foundation. July 2011. Archived from the original on April 21, 2006. Retrieved July 8, 2013.
  43. Drinkard, Jim. " "Verizon says it isn't giving call records to NSA". USA Today . May 16, 2006. Archived from the original on June 19, 2012. Retrieved June 8, 2013.
  44. TITLE 15, CHAPTER 2B, § 78m (b)(3)(A)
  45. Roberts, Dan; Ball, James; MacAskill, Ewen (October 6, 2013). "Obama pressured over NSA snooping as US senator denounces 'act of treason'". The Guardian. London. Archived from the original on August 22, 2013. Retrieved October 6, 2013.
  46. "ACLU Seeks Secret Court Opinions Authorizing NSA's Mass Acquisition of Americans' Phone Records". October 6, 2013. Retrieved October 6, 2013.
  47. NSA collecting phone records of millions of Verizon customers daily Archived October 12, 2019, at the Wayback Machine , Glenn Greenwald, The Guardian , June 6, 2013. Retrieved July 2013.
  48. Schmitt, Gary (January 13, 2014). "A Tale of Two Judges". The Weekly Standard. Retrieved March 9, 2014.
  49. "U.S. NSA domestic phone spying program illegal: appeals court". Reuters. May 7, 2015. Archived from the original on November 17, 2015. Retrieved July 1, 2017.
  50. Yostt, Pete (November 7, 2014). "National security and privacy: appeals court steps into debate over NSA surveillance program". US News. Retrieved November 7, 2014.
  51. "N.J. Lawyers Sue Verizon Over NSA Data Collection". Associated Press. March 25, 2015. Retrieved October 26, 2020.
  52. "Beaverton man sues Verizon Northwest for $1 billion". The Oregonian. Retrieved May 15, 2006.
  53. "Complaint over phone records filed with PUC". Boston Globe. Retrieved May 15, 2006.[ dead link ]
  54. 1 2 3 "U.S. Justice Department urges end to AT&T suit". xinhuanet.com, quoting Los Angeles Times. Archived from the original on February 11, 2012. Retrieved May 15, 2006.
  55. Lazarus, David (May 12, 2006). "AT&T, Verizon readily break their own rules". San Francisco Chronicle. Archived from the original on December 31, 2006. Retrieved May 11, 2006.
  56. In 1970, when stolen COINTELPRO documents were released to members of Congress, journalists, and organizations who were named in the files, the administration's response to the disclosures was to warn that any further disclosures "could endanger the lives or cause other serious harm to persons engaged in investigation activities on behalf of the United States." Stone, Geoffrey R., Perilous Times: Free Speech in Wartime from the Sedition Act of 1798 to the War on Terrorism, p. 495
  57. "Archived copy" (PDF). www.eff.org. Archived from the original (PDF) on June 14, 2006. Retrieved January 15, 2022.{{cite web}}: CS1 maint: archived copy as title (link)
  58. Chip Pitts (March 15, 2007). "The End of Illegal Domestic Spying? Don't Count on It". Wash. Spec. Archived from the original on October 29, 2007.
  59. "EX PARTE JACKSON, 96 U.S. 727 (1877)". U.S. Supreme Court . Archived from the original on April 25, 2006. Retrieved May 17, 2006.
  60. "SMITH v. MARYLAND, 442 U.S. 735 (1979)". U.S. Supreme Court . Archived from the original on June 19, 2006. Retrieved May 26, 2006.
  61. "Introduction to Government Investigations". cyber.harvard.edu. August 8, 2019. Retrieved October 23, 2020.
  62. "Lawyer says Qwest refused data request". The Olympian. Archived from the original on September 5, 2006. Retrieved May 11, 2006.
  63. "Telecoms face billion dollar wiretap lawsuits: report". marketwatch.com. Archived from the original on January 28, 2013. Retrieved May 11, 2006.
  64. 1 2 3 "United States Code Annotated Title 18. Crimes and Criminal Procedure Part I—Crimes Chapter 121—Stored Wire And Electronic Communications And Transactional Records Access". cybercrime.gov. Archived from the original on May 2, 2006. Retrieved May 11, 2006.
  65. "18 U.S.C. § 2511(2)(a)(ii)". www4.law.cornell.edu. Retrieved May 16, 2006.
  66. "47 USC 1004 CALEA 105". US Code. Retrieved May 17, 2006.
  67. Cohen, David; John Wells (April 17, 2004). American National Security and Civil Liberties in an Era of Terrorism. Palgrave. ISBN   978-1-4039-6199-0. p. 34
  68. "COINTELPRO Rides Again". zmag.org. Archived from the original on September 18, 2002. Retrieved May 11, 2006.
  69. "Intelligence Activities and the Rights of Americans book II". United States Senate. Archived from the original on October 19, 2006. Retrieved May 11, 2006.
  70. "Tapped Out Why Congress won't get through to the NSA". Slate.com. February 2, 2006. Archived from the original on February 9, 2006. Retrieved May 11, 2006.
  71. 1 2 3 "NSA data-gathering deja vu for privacy hawks". CBS News. August 6, 2013. Archived from the original on June 15, 2013. Retrieved August 6, 2013.
  72. 1 2 3 4 Weiss, Debra Cassens (September 18, 2013). "Surveillance court releases new opinion upholding NSA collection of phone data". ABA Journal. Archived from the original on February 16, 2019. Retrieved September 25, 2013.
  73. "NSA Whistleblower To Expose More Unlawful Activity: 'People ... Are Going To Be Shocked'". Think Progress. Archived from the original on June 12, 2006. Retrieved May 12, 2006.
  74. "Newsweek". Archived from the original on June 13, 2006.
  75. "Washington Post-ABC News Poll". The Washington Post. Archived from the original on October 11, 2008. Retrieved May 12, 2006. May 12, 2006
  76. "UPDATE: Early 'Wash Post' Poll on NSA Phone Spying Refuted". Editor & Publisher. Archived from the original on May 25, 2006.
  77. "Callers Can't Hide". Forbes. Archived from the original on September 2, 2006. Retrieved May 15, 2006.