Origins of global surveillance

Last updated

The origins of global surveillance can be traced back to the late 1940s, when the UKUSA Agreement was jointly enacted by the United Kingdom and the United States, whose close cooperation eventually culminated in the creation of the global surveillance network, code-named "ECHELON", in 1971. [1] [2]

Contents

In the aftermath of the 1970s Watergate affair and a subsequent congressional inquiry led by Senator Frank Church, [3] it was revealed that the NSA, in collaboration with Britain's GCHQ, had routinely intercepted the international communications of prominent anti-Vietnam War leaders such as Jane Fonda and Benjamin Spock. [4] Decades later, a multi-year investigation by the European Parliament highlighted the NSA's role in economic espionage in a report entitled "Development of Surveillance Technology and Risk of Abuse of Economic Information", in 1999. [5]

However, for the general public, it was a series of detailed disclosures of internal NSA documents in June 2013 that first revealed the massive extent of the NSA's spying, both foreign and domestic. Most of these were leaked by an ex-contractor, Edward Snowden. Even so, a number of these older global surveillance programs such as PRISM, XKeyscore, and Tempora were referenced in the 2013 release of thousands of documents. [6] As confirmed by the NSA's director Keith B. Alexander in 2013, the NSA collects and stores all phone records of all American citizens. [7] Much of the data is kept in large storage facilities such as the Utah Data Center, a US$1.5 billion megaproject referred to by The Wall Street Journal as a "symbol of the spy agency's surveillance prowess." [8]

Clandestine surveillance in the United States

Wartime censorship of communications during the World Wars was paralleled by peacetime decipherment of communications by the Black Chamber (Cipher Bureau, MI-8), operating with the approval of the U.S. State Department from 1919 to 1929. [9] In 1945 the now-defunct Project SHAMROCK was created to gather all telegraphic data entering into or exiting from the United States. [9] [10] Major communication companies such as Western Union, RCA Global and ITT World Communications actively aided the U.S. government in the latter's attempt to gain access to international message traffic. [11]

In 1952, the NSA was officially established. [9] According to The New York Times , the NSA was created in "absolute secrecy" by President Truman. [12] Six weeks after President Truman took office, he ordered wiretaps on the telephones of Thomas Gardiner Corcoran, a close advisor of Franklin D. Roosevelt. [13] The recorded conversations are currently kept at the Harry S. Truman Presidential Library and Museum, along with other sensitive documents (~233,600 pages).

Under J. Edgar Hoover, the Federal Bureau of Investigation (FBI) carried out wide-ranging surveillance of communications and political expression, targeting many well-known speakers such as Albert Einstein, [14] [15] [16] Frank Sinatra, [17] [18] First Lady Eleanor Roosevelt, [19] [20] Marilyn Monroe, [21] John Lennon, [22] and Daniel Ellsberg, [23] [24] Through the illegal COINTELPRO project, Hoover placed emphasis on civil rights movement leader Martin Luther King Jr. (amongst others), [25] [26] with one FBI memo calling King the "most dangerous and effective Negro leader in the country." [27]

Some of these activities were uncovered when documents were released in 1971 by the Citizens' Commission to Investigate the FBI, followed by the information revealed in the investigations of the 1972 Watergate scandal. [28] Following the 1974 resignation of Richard Nixon, and in light of the cumulative revelations, the U.S. Senate Church Committee was appointed in 1975 to investigate intelligence abuses by federal agencies. In a May 1976 Time article, Nobody Asked: Is It Moral?, the magazine stated:

It did not matter that much of the information had already been released—or leaked—to the public. The effect was still overwhelming: a stunning, dismaying indictment of U.S. intelligence agencies and six Presidents, from Franklin Roosevelt to Richard Nixon, for having blithely violated democratic ideals and individual rights while gathering information at home or conducting clandestine operations abroad... [29]

Mass surveillance in a global context (1940–2001)

During World War II the U.K. and U.S. governments entered into a series of agreements for sharing of signals intelligence of enemy communications traffic. [31] In March 1946, a secret agreement, the "British-US Communication Intelligence Agreement", known as BRUSA, was established, based on the wartime agreements. The agreement "tied the two countries into a worldwide network of listening posts run by Government Communications Headquarters (GCHQ), the U.K.'s biggest spying organisation, and its U.S. equivalent, the National Security Agency." [32]

In 1988, an article titled "Somebody's listening" by Duncan Campbell in the New Statesman , described the signals intelligence gathering activities of a program code-named "ECHELON. [33] The program was engaged by English-speaking World War II Allied powers Australia, Canada, New Zealand, the United Kingdom and the United States (collectively known as AUSCANNZUKUS). Based on the UKUSA Agreement, it was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s. [34] Though its existence had long been known, the UKUSA agreement only became public in 2010. It enabled the U.S. and the U.K. to exchange "knowledge from operations involving intercepting, decoding and translating foreign communications." The agreement forbade the parties to reveal its existence to any third party. [32]

By the late 1990s the ECHELON system was capable of intercepting satellite transmissions, public switched telephone network (PSTN) communications (including most Internet traffic), and transmissions carried by microwave. A detailed description of ECHELON was provided by New Zealand journalist Nicky Hager in his 1996 book "Secret Power". While the existence of ECHELON was denied by some member governments, a report by a committee of the European Parliament in 2001 confirmed the program's use and warned Europeans about its reach and effects. [35] The European Parliament stated in its report that the term "ECHELON" was used in a number of contexts, but that the evidence presented indicated it was a signals intelligence collection system capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally. The report to the European Parliament confirmed that this was a "global system for the interception of private and commercial communications." [34]

Echelon spy network revealed

Imagine a global spying network that can eavesdrop on every single phone call, fax or e-mail, anywhere on the planet. It sounds like science fiction, but it's true. Two of the chief protagonists - Britain and America - officially deny its existence. But the BBC has confirmation from the Australian Government that such a network really does exist..."

The British Broadcasting Corporation (BBC), November 1999 [36]

9/11 and its implications on global surveillance (2001–2009)

In the aftermath of the September 11 attacks in 2001 on the World Trade Center and the Pentagon, the scope of domestic spying in the United States increased significantly. The bid to prevent future attacks of this scale led to the passage of the Patriot Act. Later acts include the Protect America Act (which removes the warrant requirement for government surveillance of foreign targets [41] ) and the FISA Amendments Act (which relaxed some of the original FISA court requirements).

In 2005, the existence of STELLARWIND was revealed by Thomas Tamm. On January 1, 2006, days after The New York Times wrote that "Bush Lets U.S. Spy on Callers Without Courts, [42] the President emphasized that "This is a limited program designed to prevent attacks on the United States of America. And I repeat, limited." [43]

In 2006, Mark Klein revealed the existence of Room 641A that he had wired back in 2003. [44] In 2008, Babak Pasdar, a computer security expert, and CEO of Bat Blue publicly revealed the existence of the "Quantico circuit", that he and his team found in 2003. He described it as a back door to the federal government in the systems of an unnamed wireless provider; the company was later independently identified as Verizon. [45] Additional disclosures regarding a mass surveillance program involving U.S. citizens had been made in the U.S. media in 2006. [46]

You Are a Suspect

Every purchase you make with a credit card, every magazine subscription you buy and medical prescription you fill, every Web site you visit and e-mail you send or receive, every academic grade you receive, every bank deposit you make, every trip you book and every event you attend—all these transactions and communications will go into what the Defense Department describes as a virtual, centralized grand database. To this computerized dossier on your private life from commercial sources, add every piece of information that government has about you—passport application, driver's license and toll records, judicial and divorce records, complaints from nosy neighbors to the F.B.I., your lifetime paper trail plus the latest hidden camera surveillance—and you have the supersnoop's dream: a Total Information Awareness about every U.S. citizen.

The New York Times , November 2002 [47]

Acceleration of media leaks (2010–present)

On November 28, 2010, WikiLeaks and five major news outlets in Spain ( El País ), France ( Le Monde ), Germany ( Der Spiegel ), the United Kingdom ( The Guardian ), and the United States ( The New York Times ) began publishing the first 220 of 251,287 leaked U.S. State department diplomatic "cables" simultaneously. [51]

On March 15, 2012, the American magazine Wired published an article with the headline "The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)", [52] which was later mentioned by U.S. Rep. Hank Johnson during a congressional hearing. In response to Johnson's inquiry, NSA director Keith B. Alexander testified that these allegations made by Wired magazine were untrue. [53]

In early 2013, Edward Snowden handed over 200,000 top secret documents to various media outlets, triggering one of the biggest news leaks in the modern history of the United States. [54]

See also

Related Research Articles

ECHELON Signals intelligence collection and analysis network

ECHELON, originally a secret government code name, is a surveillance program operated by the United States with the aid of four other signatory states to the UKUSA Security Agreement: Australia, Canada, New Zealand, and the United Kingdom, also known as the Five Eyes.

National Security Agency U.S. signals intelligence organization

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The existence of the NSA was not revealed until 1975. The NSA has roughly 32,000 employees.

UKUSA Agreement Multilateral treaty covering signals intelligence, secretly signed in 1946

The United Kingdom – United States of America Agreement is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intelligence operations is also known as the Five Eyes. In classification markings this is abbreviated as FVEY, with the individual countries being abbreviated as AUS, CAN, NZL, GBR, and USA, respectively.

Terrorist Surveillance Program NSA program

The Terrorist Surveillance Program was an electronic surveillance program implemented by the National Security Agency (NSA) of the United States in the wake of the September 11, 2001 attacks. "The program, which enabled the United States to secretly track billions of phone calls made by millions of U.S. citizens over a period of decades, was a blueprint for the NSA surveillance that would come after it, with similarities too close to be coincidental". It was part of the President's Surveillance Program, which was in turn conducted under the overall umbrella of the War on Terrorism. The NSA, a signals intelligence agency, implemented the program to intercept al Qaeda communications overseas where at least one party is not a U.S. person. In 2005, The New York Times disclosed that technical glitches resulted in some of the intercepts including communications which were "purely domestic" in nature, igniting the NSA warrantless surveillance controversy. Later works, such as James Bamford's The Shadow Factory, described how the nature of the domestic surveillance was much, much more widespread than initially disclosed. In a 2011 New Yorker article, former NSA employee Bill Binney said that his colleagues told him that the NSA had begun storing billing and phone records from "everyone in the country."

Five Eyes Intelligence alliance (AU/CA/NZ/UK/US)

The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in signals intelligence.

Special Collection Service Classified joint CIA–NSA program to insert eavesdropping equipment in difficult places

The Special Collection Service (SCS), codenamed F6, is a highly classified joint U.S. Central Intelligence Agency–National Security Agency program charged with inserting eavesdropping equipment in difficult-to-reach places, such as foreign embassies, communications centers, and foreign government installations. Established in the late 1970s and headquartered in Beltsville, Maryland, the SCS has been involved in operations ranging from the Cold War to the Global War on Terrorism.

Stellar Wind Warrantless surveillance program of the NSA in the United States

"Stellar Wind" was the code name of a warrantless surveillance program begun under the George W. Bush administration's President's Surveillance Program (PSP). The National Security Agency (NSA) program was approved by President Bush shortly after the September 11, 2001 attacks and was revealed by Thomas Tamm to The New York Times in 2004. Stellar Wind was a prelude to new legal structures that allowed President Bush and President Barack Obama to reproduce each of those programs and expand their reach.

PRISM (surveillance program) Mass surveillance program run by the NSA

PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD US-984XN. PRISM collects stored internet communications based on demands made to internet companies such as Google LLC under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms. Among other things, the NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle.

Edward Snowden American whistleblower and former National Security Agency contractor

Edward Joseph Snowden is an American former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and subcontractor. His disclosures revealed numerous global surveillance programs, many run by the NSA and the Five Eyes Intelligence Alliance with the cooperation of telecommunication companies and European governments, and prompted a cultural discussion about national security and individual privacy.

Tempora GCHQ-operated Internet and telephone surveillance system

Tempora is the codeword for a formerly-secret computer system that is used by the British Government Communications Headquarters (GCHQ). This system is used to buffer most Internet communications that are extracted from fibre-optic cables, so these can be processed and searched at a later time. It was tested from 2008 and became operational in late 2011.

Perry Fellwock

Perry Fellwock is a former National Security Agency (NSA) analyst and whistleblower who revealed the existence of the NSA and its worldwide covert surveillance network in an interview, using the pseudonym Winslow Peck, with Ramparts in 1971. At the time that Fellwock blew the whistle on ECHELON, the NSA was a nearly unknown organization and among the most secretive of the US intelligence agencies. Fellwock revealed that it had a significantly larger budget than the Central Intelligence Agency (CIA). Fellwock was motivated by Daniel Ellsberg's release of the Pentagon Papers. Today, Fellwock has been acknowledged as the first NSA whistleblower.

Mass surveillance in the United States Overview of mass surveillance in the United States of America

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

Global surveillance disclosures (2013–present) Disclosures of NSA and related global espionage

Ongoing news reports in the international media have revealed operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly emanate from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden, which he obtained whilst working for Booz Allen Hamilton, one of the largest contractors for defense and intelligence in the United States. In addition to a trove of U.S. federal documents, Snowden's cache reportedly contains thousands of Australian, British, Canadian and New Zealand intelligence files that he had accessed via the exclusive "Five Eyes" network. In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention. The disclosure continued throughout 2013, and a small portion of the estimated full cache of documents was later published by other media outlets worldwide, most notably The New York Times, the Canadian Broadcasting Corporation, the Australian Broadcasting Corporation, Der Spiegel (Germany), O Globo (Brazil), Le Monde (France), L'espresso (Italy), NRC Handelsblad, Dagbladet (Norway), El País (Spain), and Sveriges Television (Sweden).

Global surveillance Mass surveillance across national borders

Global mass surveillance can be defined as the mass surveillance of entire populations across national borders.

Stateroom (surveillance program)

STATEROOM is the code name of a highly secretive signals intelligence collection program involving the interception of international radio, telecommunications and internet traffic. It is operated out of the diplomatic missions of the signatories to the UKUSA Agreement and the members of the ECHELON network including Australia, New Zealand, United Kingdom, Canada and the United States.

Global surveillance disclosures (1970–2013)

Global surveillance refers to the practice of globalized mass surveillance on entire populations across national borders. Although its existence was first revealed in the 1970s and led legislators to attempt to curb domestic spying by the National Security Agency (NSA), it did not receive sustained public attention until the existence of ECHELON was revealed in the 1980s and confirmed in the 1990s. In 2013 it gained substantial worldwide media attention due to the global surveillance disclosure by Edward Snowden.

Lustre (treaty)

Lustre is the codename of a secret treaty signed by France and the Five Eyes (FVEY) for cooperation in signals intelligence and for mutual data exchange between their respective intelligence agencies. Its existence was revealed during the 2013 global surveillance disclosure based on documents leaked by the former NSA contractor Edward Snowden.

Barack Obama on mass surveillance Overview of the statements of former U.S. president Barack Obama on mass surveillance

U.S. president Barack Obama has received widespread criticism due to his support of government surveillance. President Obama had released many statements on mass surveillance as a result.

Timeline of global surveillance disclosures (2013–present)

This timeline of global surveillance disclosures from 2013 to the present day is a chronological list of the global surveillance disclosures that began in 2013. The disclosures have been largely instigated by revelations from the former American National Security Agency contractor Edward Snowden.

References

  1. "Q&A: What you need to know about Echelon". BBC. 29 May 2001.
  2. Nabbali, Talitha; Perry, Mark (March 2004). "Going for the throat". Computer Law & Security Review. 20 (2): 84–97. doi:10.1016/S0267-3649(04)00018-4. It wasn't until 1971 that the UKUSA allies began ECHELON
  3. Pre-Emption - The Nsa And The Telecoms | Spying On The Home Front | FRONTLINE | PBS
  4. Cohen, Martin (2006). No Holiday. New York: Disinformation Company Ltd. ISBN   978-1-932857-29-0.
  5. Peggy Becker (October 1999). DEVELOPMENT OF SURVEILLANCE TECHNOLOGY AND RISK OF ABUSE OF ECONOMIC INFORMATION (Report). STOA, European Parliament. Retrieved November 3, 2013.
  6. Snowden has ‘thousands’ of damaging NSA documents, says Greenwald
  7. "Senators: Limit NSA snooping into US phone records". Associated Press. Retrieved October 15, 2013. "Is it the goal of the NSA to collect the phone records of all Americans?" Udall asked at Thursday's hearing. "Yes, I believe it is in the nation's best interest to put all the phone records into a lockbox that we could search when the nation needs to do it. Yes," Alexander replied.
  8. Siobhan Gorman. "Meltdowns Hobble NSA Data Center". The Wall Street Journal . Retrieved October 19, 2013. The Utah facility, one of the Pentagon's biggest U.S. construction projects, has become a symbol of the spy agency's surveillance prowess, which gained broad attention in the wake of leaks from NSA contractor Edward Snowden.
  9. 1 2 3 "Factbox: History of mass surveillance in the United States". Reuters. June 7, 2013. Retrieved August 14, 2013.
  10. The Center for Cryptologic History. "The Origins of NSA (NSA.gov)". Archived from the original on March 18, 2004.
  11. Epsley-Jones, Katelyn; Frenzel, Christina. "The Church Committee Hearings & the FISA Court". PBS. Retrieved August 14, 2013.
  12. Bamford, James (December 25, 2005). "The Agency That Could Be Big Brother". The New York Times. Retrieved August 14, 2013.
  13. DAVID BURNHAM (February 1, 1986). "TRUMAN WIRETAPS ON EX-NEW DEAL AIDE CITED". The New York Times. Retrieved September 18, 2013.
  14. 1 2 Overbye, Dennis (May 7, 2002). "New Details Emerge From the Einstein Files; How the F.B.I. Tracked His Phone Calls and His Trash". The New York Times . Retrieved September 17, 2013.
  15. "FBI campaign against Einstein revealed". BBC. June 8, 2002. Retrieved September 17, 2013.
  16. "Albert Einstein: Fact or Fiction?". History (U.S. TV channel) . Retrieved September 17, 2013. Because of his controversial political beliefs-his support for socialism, civil rights, and nuclear disarmament, for example-many anti-Communist crusaders believed that Einstein was a dangerous subversive. Some, like FBI director J. Edgar Hoover, even thought he was a spy. For 22 years, Hoover's agents tapped Einstein's phones, opened his mail, rifled through his trash and even bugged his secretary's nephew's house, all to prove that he was more radical (as his 1,500-page FBI dossier noted) than "even Stalin himself."
  17. RONALD J. OSTROW and LISA GETTER (December 9, 1998). "FBI Files on Sinatra Detail Links to JFK, Mob Figures". Los Angeles Times. Retrieved September 18, 2013.
  18. MOLOTSKY, IRVIN (December 9, 1998). "F.B.I. Releases Its Sinatra File, With Tidbits Old and New". The New York Times. Retrieved September 18, 2013.
  19. "Question: Why is Eleanor Roosevelt's FBI file so large?". George Washington University . Retrieved September 18, 2013.
  20. "Eleanor Roosevelt". History (U.S. TV channel) . Retrieved September 18, 2013. J. Edgar Hoover (1895–1972), the longtime director of the Federal Bureau of Investigation, considered Eleanor Roosevelt’s liberal views dangerous and believed she might be involved in communist activities. He ordered his agents to monitor Roosevelt and keep what became an extensive file on her.
  21. "FBI removes many redactions in Marilyn Monroe file". Associated Press. Retrieved September 18, 2013.
  22. Cohen, Adam (September 21, 2006). "While Nixon Campaigned, the F.B.I. Watched John Lennon". The New York Times. Retrieved September 18, 2013.
  23. "'Life Lessons' From a White House Plumber". NPR.org. NPR. When Daniel Ellsberg leaked the Pentagon Papers to The New York Times in 1971, the Nixon White House tried to discredit him. Among other things, Nixon loyalists burglarized the office of Ellsberg's psychiatrist.
  24. "The Watergate Story". The Washington Post . Retrieved September 17, 2013. The White House "plumbers" unit - named for their orders to plug leaks in the administration - burglarizes a psychiatrist's office to find files on Daniel Ellsberg, the former defense analyst who leaked the Pentagon Papers.
  25. "Martin Luther King, Jr. FBI File". Pickler Memorial Library (Truman State University). Retrieved September 17, 2013.
  26. Church, Frank (April 23, 1976), "Church Committee Book III", Dr. Martin Luther King Jr., Case Study, Church Committee
  27. "FBI tracked King's every move". CNN. December 29, 2008. Retrieved September 17, 2013.
  28. "Watergate and the Constitution". National Archives and Records Administration . Retrieved September 17, 2013.
  29. "INVESTIGATIONS: Nobody Asked: Is It Moral?". Time . May 10, 1976.
  30. Ryan Gallagher (2002-05-07). "Documents Show the NSA Spied on Muhammad Ali, Martin Luther King Jr., and ... Art Buchwald". Slate . Retrieved October 27, 2013.
  31. U.S. National Security Agency. Early Papers Concerning US-UK Agreement – 1940–1944 Archived September 18, 2013, at the Wayback Machine . Agreement between British Government Code and Cipher School and U.S. War Department dated May 17, 1943. Retrieved: October 5, 2013.
  32. 1 2 Norton-Taylor, Richard (June 25, 2010). "Not so secret: deal at the heart of UK-US intelligence". The Guardian . London. Retrieved June 25, 2010.
  33. Campbell, Duncan (August 12, 1988). "Somebody's Listening". New Statesman . Archived from the original on January 3, 2007. Retrieved September 16, 2013.
  34. 1 2 Schmid, Gerhard (July 11, 2001). "On the existence of a global system for the interception of private and commercial communications (ECHELON interception system), (2001/2098(INI))" (PDF). European Parliament: Temporary Committee on the ECHELON Interception System. p. 194. Retrieved September 16, 2013.
  35. Fiddler, Stephen (July 1, 2013). Echoes of Echelon in Charges of NSA Spying in Europe. The Wall Street Journal .
  36. Andrew Bomford (November 3, 1999). "Echelon spy network revealed". BBC.
  37. Laing, Aislinn (July 9, 2013). "British intelligence 'birdwatchers spied on Nelson Mandela's hideout'". The Daily Telegraph . London. Retrieved September 21, 2013.
  38. "Nelson Mandela 'was spied on by MI6 birdwatchers'". The Times . Retrieved September 21, 2013.
  39. "NSA Admits to Spying on Princess Diana". The Washington Post . December 12, 1998. Retrieved September 21, 2013.
  40. David Hencke and Rob Evans (August 6, 1999). "US holds secret files on Diana". The Guardian .
  41. "Warrantless Surveillance and the Foreign Intelligence Surveillance Act: The Role of Checks and Balances in Protecting Americans' Privacy Rights (Part II): Hearing Before the H. Comm. on the Judiciary, 110th Cong. 13–30 (statement of J.M. McConnell, Director of National Intelligence)" (PDF). September 18, 2007.
  42. Risen, James; Lichtblau, Eric (December 16, 2005). "Bush Lets U.S. Spy on Callers Without Courts". The New York Times. Retrieved August 14, 2013. The White House asked The New York Times not to publish this article
  43. "President Visits Troops at Brooke Army Medical Center". White House. January 1, 2006. Retrieved August 15, 2013.
  44. "AT&T Whistle-Blower's Evidence". Wired. May 17, 2006. Retrieved August 14, 2013.
  45. Poulsen, Kevin (March 6, 2008). "Whistle-Blower: Feds Have a Backdoor Into Wireless Carrier — Congress Reacts". Wired. Retrieved August 14, 2013.
  46. Cauley, Leslie (May 11, 2006). "NSA has massive database of Americans' phone calls". USA Today. Archived from the original on July 13, 2013.
  47. William Safire (November 14, 2002). "You Are a Suspect". The New York Times . Retrieved September 20, 2013.
  48. "UK 'spied on UN's Kofi Annan'". BBC. February 2004.
  49. Paul Richter and Ken Dilanian (November 29, 2010). "U.S. diplomats ordered to gather data on counterparts, WikiLeaks releases show". The Los Angeles Times . Retrieved 17 December 2013.
  50. "US diplomats spied on UN leadership". The Guardian . 28 November 2010. Retrieved August 27, 2013.
  51. "WikiLeaks FAQ: What Do the Diplomatic Cables Really Tell Us?". Der Spiegel. 28 November 2010. Retrieved August 14, 2013.
  52. Bamford, James (March 15, 2012). "The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)". Wired. Retrieved August 14, 2013.
  53. Greenberg, Andy. "NSA Chief Denies Wired's Domestic Spying Story (Fourteen Times) In Congressional Hearing". Forbes. Retrieved August 14, 2013.
  54. "Ex-CIA employee source of leak on PRISM program". France 24. 9 June 2013. Retrieved September 17, 2013. Snowden’s decision to reveal his identity and whereabouts lifts the lid on one of the biggest security leaks in US history and escalates a story that has placed a bright light on Obama’s extensive use of secret surveillance.