XKeyscore

Last updated

XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligence agencies, including the Australian Signals Directorate, Canada's Communications Security Establishment, New Zealand's Government Communications Security Bureau, Britain's Government Communications Headquarters, Japan's Defense Intelligence Headquarters, and Germany's Bundesnachrichtendienst. [1]

Contents

In July 2013, Edward Snowden publicly revealed the program's purpose and use by the NSA in The Sydney Morning Herald and O Globo newspapers. The code name was already public knowledge because it was mentioned in earlier articles, and, like many other code names, it appears in job postings and online résumés of employees. [2] [3]

On July 3, 2014, German public broadcaster Norddeutscher Rundfunk, a member of ARD, published excerpts of XKeyscore's source code. [4] A team of experts analyzed the source code. [5]

Scope and functioning

XKeyscore is a complicated system, and various authors have different interpretations of its actual capabilities. Edward Snowden and Glenn Greenwald explained XKeyscore as being a system which enables almost unlimited surveillance of anyone anywhere in the world, while the NSA has said that usage of the system is limited and restricted.

According to The Washington Post and national security reporter Marc Ambinder, XKeyscore is an NSA data-retrieval system which consists of a series of user interfaces, backend databases, servers and software that selects certain types of data and metadata that the NSA has already collected using other methods. [6] [7]

According to Snowden and Greenwald

On January 26, 2014, the German broadcaster Norddeutscher Rundfunk asked Edward Snowden in its TV interview: "What could you do if you would use XKeyscore?" and he answered: [1]

You could read anyone's email in the world, anybody you've got an email address for. Any website: You can watch traffic to and from it. Any computer that an individual sits at: You can watch it. Any laptop that you're tracking: you can follow it as it moves from place to place throughout the world. It's a one-stop-shop for access to the NSA's information. ... You can tag individuals ... Let's say you work at a major German corporation and I want access to that network, I can track your username on a website on a forum somewhere, I can track your real name, I can track associations with your friends and I can build what's called a fingerprint, which is network activity unique to you, which means anywhere you go in the world, anywhere you try to sort of hide your online presence, your identity.

According to The Guardian 's Glenn Greenwald, low-level NSA analysts can, via systems like XKeyscore, "listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents. And it's all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst." [8]

He added that the NSA's database of collected communications allows its analysts to listen "to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you've entered, and it also alerts them to any further activity that people connected to that email address or that IP address do in the future". [8]

According to the NSA

In an official statement from July 30, 2013, the NSA said "XKeyscore is used as a part of NSA's lawful foreign signals intelligence collection system. ..." to legally obtain information about "legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests. ... to collect the information, that enables us to perform our missions successfully – to defend the nation and to protect U.S. and allied troops abroad." [9] In terms of access, an NSA press statement reads that there is no "unchecked analyst access to NSA collection data. Access to XKeyscore, as well as all of NSA's analytic tools, is limited to only those personnel who require access for their assigned tasks." and that there are "...stringent oversight and compliance mechanisms built in at several levels. One feature is the system's ability to limit what an analyst can do with a tool, based on the source of the collection and each analyst's defined responsibilities." [10]

Workings

XKeyscore logo XKeyscore backround removed.png
XKeyscore logo
Slide from a 2008 NSA presentation about XKeyscore, showing a world map with the locations of XKeyscore servers Xkeyscore-worldmap.jpg
Slide from a 2008 NSA presentation about XKeyscore, showing a world map with the locations of XKeyscore servers
Slide from a 2008 NSA presentation about XKeyscore, showing the query hierarchy Xkeyscore-hierarchy.jpg
Slide from a 2008 NSA presentation about XKeyscore, showing the query hierarchy

According to an NSA slide presentation about XKeyscore from 2013, it is a "DNI Exploitation System/Analytic Framework". DNI stands for Digital Network Intelligence, which means intelligence derived from internet traffic. [11]

Edward Snowden said about XKeyscore: "It's a front end search engine" in an interview with the German Norddeutscher Rundfunk. [12]

XKeyscore is a "piece of Linux software that is typically deployed on Red Hat servers. It uses the Apache web server and stores collected data in MySQL databases". [13]

XKeyscore is considered a "passive" program, in that it listens, but does not transmit anything on the networks that it targets. [5] But it can trigger other systems, which perform "active" attacks through Tailored Access Operations which are "tipping", for example, the QUANTUM family of programs, including QUANTUMINSERT, QUANTUMHAND, QUANTUMTHEORY, QUANTUMBOT and QUANTUMCOPPER and Turbulence. These run at so-called "defensive sites" including the Ramstein Air Force base in Germany, Yokota Air Base in Japan, and numerous military and non-military locations within the US. Trafficthief, a core program of Turbulence, can alert NSA analysts when their targets communicate, and trigger other software programs, so select data is "promoted" from the local XKeyscore data store to the NSA's "corporate repositories" for long term storage. [5]

Data sources

XKeyscore consists of over 700 servers at approximately 150 sites where the NSA collects data, like "US and allied military and other facilities as well as US embassies and consulates" in many countries around the world. [14] [15] [16] Among the facilities involved in the program are four bases in Australia and one in New Zealand. [15]

According to an NSA presentation from 2008, these XKeyscore servers are fed with data from the following collection systems: [17]

  1. F6 (Special Collection Service)   joint operation of the CIA and NSA that carries out clandestine operations including espionage on foreign diplomats and leaders
  2. FORNSAT   which stands for "foreign satellite collection", and refers to intercepts from satellites
  3. SSO (Special Source Operations)   a division of the NSA that cooperates with telecommunication providers

In a single, undated slide published by Swedish media in December 2013, the following additional data sources for XKeyscore are mentioned: [18]

  1. Overhead  intelligence derived from American spy planes, drones and satellites
  2. Tailored Access Operations   a division of the NSA that deals with hacking and cyberwarfare
  3. FISA   all types of surveillance approved by the Foreign Intelligence Surveillance Court
  4. Third party   foreign partners of the NSA such as the (signals) intelligence agencies of Belgium, Denmark, France, Germany, Italy, Japan, the Netherlands, Norway, Sweden, etc. However the Netherlands is out of any cooperation concerning intelligence gathering and sharing for illegal spying.

From these sources, XKeyscore stores "full-take data", which are indexed by plug-ins that extract certain types of metadata (like phone numbers, e-mail addresses, log-ins, and user activity) and index them in metadata tables, which can be queried by analysts. XKeyscore has been integrated with MARINA, which is NSA's database for internet metadata. [11]

However, the system continuously gets so much Internet data that it can be stored only for short periods of time. Content data remain on the system for only three to five days, while metadata is stored for up to thirty days. [19] A detailed commentary on an NSA presentation published in The Guardian in July 2013 cites a document published in 2008 declaring that "At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours." [20]

Types of XKeyscore

According to a document from an internal GCHQ website which was disclosed by the German magazine Der Spiegel in June 2014, there are three different types of the XKeyscore system: [21]

Capabilities

Slide from a 2008 NSA presentation about XKeyscore, showing the differences between the various NSA database systems KS10-001.jpg
Slide from a 2008 NSA presentation about XKeyscore, showing the differences between the various NSA database systems

For analysts, XKeyscore provides a "series of viewers for common data types", which allows them to query terabytes of raw data gathered at the aforementioned collection sites. This enables them to find targets that cannot be found by searching only the metadata, and also to do this against data sets that otherwise would have been dropped by the front-end data processing systems. According to a slide from an XKeyscore presentation, NSA collection sites select and forward less than 5% of the internet traffic to the PINWALE database for internet content. [19]

Because XKeyscore holds raw and unselected communications traffic, analysts can not only perform queries using "strong selectors" like e-mail addresses, but also using "soft selectors", like keywords, against the body texts of e-mail and chat messages and digital documents and spreadsheets in English, Arabic and Chinese. [11]

This is useful because "a large amount of time spent on the web is performing actions that are anonymous" and therefore those activities can't be found by just looking for e-mail addresses of a target. When content has been found, the analyst might be able to find new intelligence or a strong selector, which can then be used for starting a traditional search. [11]

Besides using soft selectors, analysts can also use the following other XKeyscore capabilities: [11] [23]

The Guardian revealed in 2013 that most of these things cannot be detected by other NSA tools, because they operate with strong selectors (like e-mail and IP addresses and phone numbers) and the raw data volumes are too high to be forwarded to other NSA databases. [11]

In 2008, NSA planned to add a number of new capabilities in the future, like VoIP, more networking protocols[ clarify ], Exif tags, which often include geolocation (GPS) data. [11]

Contribution to U.S. security

The NSA slides published in The Guardian during 2013 claimed that XKeyscore had played a role in capturing 300 terrorists by 2008, [11] which could not be substantiated as the redacted documents do not cite instances of terrorist interventions.

A 2011 report from the NSA unit in the Dagger Complex (close to Griesheim in Germany) said that XKeyscore made it easier and more efficient to target surveillance. Previously, analysis often accessed data NSA was not interested in. XKeyscore allowed them to focus on the intended topics, while ignoring unrelated data. XKeyscore also proved to be outstanding for tracking active groups associated with the Anonymous movement in Germany, because it allows for searching on patterns, rather than particular individuals. An analyst is able to determine when targets research new topics, or develop new behaviors. [26]

To create additional motivation, the NSA incorporated various gamification features. For instance, analysts who were especially good at using XKeyscore could acquire "skilz" points and "unlock achievements." The training units in Griesheim were apparently successful and analysts there had achieved the "highest average of skilz points" compared with all other NSA departments participating in the training program. [26]

Usage by foreign partners of the NSA

Germany

Excerpt of an NSA document leaked by Edward Snowden that reveals the BND's usage of the NSA's XKeyscore to wiretap a German domestic target BND XKeyscore.jpg
Excerpt of an NSA document leaked by Edward Snowden that reveals the BND's usage of the NSA's XKeyscore to wiretap a German domestic target

According to documents Der Spiegel acquired from Snowden, the German intelligence agencies BND (foreign intelligence) and BfV (domestic intelligence) were also allowed to use the XKeyscore system. In those documents the BND agency was described as the NSA's most prolific partner in information gathering. [27] This led to political confrontations, after which the directors of the German intelligence agencies briefed members of the German parliamentary intelligence oversight committee on July 25, 2013. They declared that XKeyscore has been used by the BND since 2007 and that the BfV has been using a test version since 2012. The directors also explained that the program is not for collecting data, but rather only for the analysis of collected data. [28]

Sweden

As part of the UKUSA Agreement, a secret treaty was signed in 1954 by Sweden with the United States, the United Kingdom, Canada, Australia and New Zealand (called the Five Eyes) for the purpose of intelligence collaboration and data sharing. [29] According to documents leaked by Snowden, the National Defence Radio Establishment (FRA) has been granted access to XKeyscore. [30]

Denmark

In an ongoing scandal, where it has been revealed that NSA helped FE (Danish Military Intelligence Service) build a new Spy datacenter at Sandagergård, Amager, XKeyscore has been made available for FE to use on the collected data. [31]

Japan

The classified documents leaked by Snowden also indicate that in April 2013, NSA had secretly provided the XKeyscore system to the Japanese government. [32]

See also

Related Research Articles

<span class="mw-page-title-main">United States Foreign Intelligence Surveillance Court</span> U.S. federal court

The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants against foreign spies inside the United States by federal law enforcement and intelligence agencies.

<span class="mw-page-title-main">National Security Agency</span> U.S. signals intelligence organization

The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The NSA has roughly 32,000 employees.

<span class="mw-page-title-main">Pinwale</span>

Pinwale is the code name for a National Security Agency (NSA) collection and retrieval system for so-called "Digital Network Intelligence", including internet e-mail. It is searchable by monitored NSA analysts.

<span class="mw-page-title-main">Turbulence (NSA)</span> United States National Security Agency information-technology project

Turbulence is a United States National Security Agency (NSA) information-technology project started c. 2005. It was developed in small, inexpensive "test" pieces rather than one grand plan like its failed predecessor, the Trailblazer Project. It also includes offensive cyberwarfare capabilities, like injecting malware into remote computers. The U.S. Congress criticized the project in 2007 for having similar bureaucratic problems as the Trailblazer Project.

<span class="mw-page-title-main">PRISM</span> Mass surveillance program run by the NSA

PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD US-984XN. PRISM collects stored internet communications based on demands made to internet companies such as Google LLC and Apple under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms. Among other things, the NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle.

<span class="mw-page-title-main">Boundless Informant</span> Big data analysis and visualization tool used by the NSA

Boundless Informant is a big data analysis and data visualization tool used by the United States National Security Agency (NSA). It gives NSA managers summaries of the NSA's worldwide data collection activities by counting metadata. The existence of this tool was disclosed by documents leaked by Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton. Those disclosed documents were in a direct contradiction to the NSA's assurance to United States Congress that it does not collect any type of data on millions of Americans.

<span class="mw-page-title-main">Edward Snowden</span> American whistleblower and former NSA contractor (born 1983)

Edward Joseph Snowden is an American and naturalized Russian citizen who was a computer intelligence consultant and whistleblower who leaked highly classified information from the National Security Agency (NSA) in 2013 when he was an employee and subcontractor. His disclosures revealed numerous global surveillance programs, many run by the NSA and the Five Eyes intelligence alliance with the cooperation of telecommunication companies and European governments and prompted a cultural discussion about national security and individual privacy.

<span class="mw-page-title-main">Tempora</span> GCHQ-operated Internet and telephone surveillance system

Tempora is the codeword for a formerly-secret computer system that is used by the British Government Communications Headquarters (GCHQ). This system is used to buffer most Internet communications that are extracted from fibre-optic cables, so these can be processed and searched at a later time. It was tested from 2008 and became operational in late 2011.

<span class="mw-page-title-main">Fairview (surveillance program)</span> Domestic spying partnership between AT&T and the NSA

Fairview is a secret program under which the National Security Agency cooperates with the American telecommunications company AT&T in order to collect phone, internet and e-mail data mainly of foreign countries' citizens at major cable landing stations and switching stations inside the United States. The FAIRVIEW program started in 1985, one year after the Bell breakup.

The Unified Targeting Tool (UTT) is a software program used by NSA to select targets for surveillance. It has gained attention as one of the programs exposed by Edward Snowden. It is mentioned as part of the PRISM program, and in other documents.

<span class="mw-page-title-main">Mass surveillance in the United States</span>

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

<span class="mw-page-title-main">2010s global surveillance disclosures</span> Disclosures of NSA and related global espionage

During the 2010s, international media news reports revealed new operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly relate to top secret documents leaked by ex-NSA contractor Edward Snowden. The documents consist of intelligence files relating to the U.S. and other Five Eyes countries. In June 2013, the first of Snowden's documents were published, with further selected documents released to various news outlets through the year.

<span class="mw-page-title-main">Reactions to global surveillance disclosures</span>

The global surveillance disclosure released to media by Edward Snowden has caused tension in the bilateral relations of the United States with several of its allies and economic partners as well as in its relationship with the European Union. In August 2013, U.S. President Barack Obama announced the creation of "a review group on intelligence and communications technologies" that would brief and later report to him. In December, the task force issued 46 recommendations that, if adopted, would subject the National Security Agency (NSA) to additional scrutiny by the courts, Congress, and the president, and would strip the NSA of the authority to infiltrate American computer systems using "backdoors" in hardware or software. Geoffrey R. Stone, a White House panel member, said there was no evidence that the bulk collection of phone data had stopped any terror attacks.

This is a category of disclosures related to global surveillance.

<span class="mw-page-title-main">Global surveillance</span> Mass surveillance across national borders

Global mass surveillance can be defined as the mass surveillance of entire populations across national borders.

<span class="mw-page-title-main">Timeline of global surveillance disclosures (2013–present)</span>

This timeline of global surveillance disclosures from 2013 to the present day is a chronological list of the global surveillance disclosures that began in 2013. The disclosures have been largely instigated by revelations from the former American National Security Agency contractor Edward Snowden.

<span class="mw-page-title-main">MYSTIC</span> Secret intelligence program used by NSA (2009–2014)

MYSTIC is a former secret program used since 2009 by the US National Security Agency (NSA) to collect the metadata as well as the content of phone calls from several countries. The program was first revealed in March 2014, based upon documents leaked by Edward Snowden.

<span class="mw-page-title-main">Operation Eikonal</span>

Operation Eikonal is a collaboration between the National Security Agency (NSA) and Bundesnachrichtendienst (BND) for the sharing of telephony and Internet data captured in Germany. It is based on an agreement that dates to 2002, and is part of the NSA operation "RAMPART-A". Surveillance started in 2003, telephony data was collected from 2004 onwards, and all Internet traffic from the Deutsche Telekom (DT) switching center in Frankfurt was captured starting in 2005.

Targeted surveillance is a form of surveillance, such as wiretapping, that is directed towards specific persons of interest, and is distinguishable from mass surveillance. Both untargeted and targeted surveillance is routinely accused of treating innocent people as suspects in ways that are unfair, of violating human rights, international treaties and conventions as well as national laws, and of failing to pursue security effectively.

<span class="mw-page-title-main">RAMPART-A</span>

RAMPART-A is the code name for global mass surveillance and world-wide signals intelligence partnership program led by the United States National Security Agency (NSA). Aim of the program is to "gain access to high-capacity international fiber-optic cables that transit at major congestion points around the world".

References

  1. 1 2 Seipel, Hubert (January 26, 2014). "Snowden Interview: Transcript". Norddeutscher Rundfunk . p. 3. Archived from the original on January 28, 2014. Retrieved May 6, 2019.
  2. Greenwald, Glenn; Ackerman, Spencer (June 27, 2013). "How the NSA Is Still Harvesting Your Online Data – Files Show Vast Scale of Current NSA Metadata Programs, with One Stream Alone Celebrating 'One Trillion Records Processed'". The Guardian . Archived from the original on August 4, 2013. Retrieved August 5, 2013.{{cite news}}: CS1 maint: multiple names: authors list (link)
  3. Layne, Ken (June 18, 2013). "Job Networking Site LinkedIn Filled With Secret NSA Program Names". Archived from the original on December 8, 2017. Retrieved August 6, 2013.
  4. "xkeyscorerules100". Panorama. ARD (broadcaster). July 3, 2014. Archived from the original on July 7, 2014. Retrieved July 4, 2014.
  5. 1 2 3 4 5 Jacob Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge (July 3, 2014). "NSA targets the privacy-conscious". Panorama. Norddeutscher Rundfunk. Archived from the original on July 3, 2014. Retrieved July 4, 2014.{{cite news}}: CS1 maint: multiple names: authors list (link)
  6. Nakashima, Ellen (July 31, 2013). "Newly Declassified Documents on Phone Records Program Released". The Washington Post . Archived from the original on July 2, 2014. Retrieved August 6, 2013.
  7. Fisher, Max (August 1, 2013). "Is XKeyscore Still Active? Defense Contractor Posted a Job Listing for it 2 weeks Ago". WorldViews, blog of The Washington Post . Retrieved August 6, 2013.
  8. 1 2 Rea, Kari (July 28, 2013). "Glenn Greenwald: Low-Level NSA Analysts Have 'Powerful and Invasive' Search Tool". ABC News . Archived from the original on July 30, 2013. Retrieved August 4, 2013.
  9. Wills, Amanda (August 1, 2013). "New Snowden Leak: NSA Program Taps All You Do Online". Mashable (via CNN). Archived from the original on August 4, 2013. Retrieved August 4, 2013.
  10. NSA Press Statement on 30 July 2013 Archived August 1, 2013, at the Wayback Machine
  11. 1 2 3 4 5 6 7 8 Staff (July 31, 2013). "XKeyscore Presentation from 2008 – Read in Full". The Guardian . Archived from the original on August 1, 2013. Retrieved August 6, 2013.
  12. "Snowden Interview Transcript". Norddeutscher Rundfunk. n.d. Archived from the original on January 28, 2014. Retrieved January 27, 2014.
  13. Lee, Micah; Greenwald, Glenn; Marquis-Boire, Morgan (July 2, 2015). "A Look at the Inner Workings of NSA's XKEYSCORE". The Intercept. Retrieved July 2, 2020.
  14. 1 2 Staff (c. 2013). "No alvo dos EUA – O big-brother na América Latina e no mundo" [The U.S. Targets – Big Brother in Latin America and in the World]. O Globo (in Portuguese). Archived from the original on July 12, 2013. Retrieved August 5, 2013.
  15. 1 2 Dorling, Philip (July 8, 2013). "Snowden Reveals Australia's Links to US Spy Web". The Sydney Morning Herald . Archived from the original on August 10, 2013. Retrieved August 2, 2013.
  16. Greenwald, Glenn; Casado, Roberto Kaz e José (July 6, 2013). "EUA expandem o aparato de vigilância continuamente – Software de vigilância usa mais de 700 servidores espalhados pelo mundo". O Globo (in Portuguese). Archived from the original on July 10, 2013. Retrieved August 2, 2013.{{cite news}}: CS1 maint: multiple names: authors list (link)
  17. Ambinder, Marc (July 31, 2013). "What's XKEYSCORE?". The Compass (blog of The Week). Archived from the original on January 30, 2014. Retrieved August 4, 2013.
  18. Gunnar Rensfeldt. "Read the Snowden Documents From the NSA". Sveriges Television. Archived from the original on February 9, 2014. Retrieved December 21, 2013.
  19. 1 2 See also: 3 slides about the XKeyscore program Archived February 2, 2014, at the Wayback Machine
  20. Greenwald, Glenn (July 31, 2013)."XKeyscore: NSA tool collects 'nearly everything a user does on the internet'  XKeyscore Gives 'Widest-Reaching' Collection of Online Data  NSA Analysts Require No Prior Authorization for Searches  Sweeps Up Emails, Social Media Activity and Browsing History" Archived December 31, 2013, at the Wayback Machine . The Guardian . Retrieved August 1, 2013.
  21. XKeyscoreTabs XKS Development Archived June 30, 2014, at the Wayback Machine , published by Der Spiegel on June 18, 2014
  22. Der Spiegel: GCHQ report on the technical abilities of the powerful spying program TEMPORA, which allows for a "full take" Archived June 5, 2019, at the Wayback Machine
  23. Gallagher, Sean (August 1, 2013). "NSA's Internet Taps Can Find Systems to Hack, Track VPNs and Word Docs – X-Keyscore Gives NSA the Ability to Find and Exploit Vulnerable Systems". Ars Technica. Archived from the original on August 4, 2013. Retrieved August 4, 2013.
  24. Greenwald, Glenn; Casado, Roberto Kaz e José (July 13, 2013). "Espionagem dos EUA se espalhou pela América Latina – Depois do Brasil, Colômbia foi o país mais vigiado – Venezuela também entrou na mira de programas americanos" [U.S. Spying Spread Through Latin America – After Brazil, Colombia Was the Country's Most Watched – Venezuela Also Came in the Crosshairs of U.S. Programs]. O Globo (in Portuguese). Archived from the original on July 15, 2013. Retrieved August 5, 2013.{{cite web}}: CS1 maint: multiple names: authors list (link)
  25. Kyle Rankin (July 3, 2014). "NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance". Archived from the original on July 3, 2014. Retrieved July 3, 2014.
  26. 1 2 Laura Poitras, Marcel Rosenbach and Holger Stark, Ally and Target: US Intelligence Watches Germany Closely Archived August 20, 2013, at the Wayback Machine , August 12, 2013.
  27. Staff (July 20, 2013). "'Prolific Partner': German Intelligence Used NSA Spy Program" Archived July 21, 2013, at the Wayback Machine . Der Spiegel . Retrieved August 5, 2013.
  28. Top Level Telecommunications, New slides about NSA collection programs Archived July 26, 2013, at the Wayback Machine , July 16, 2013
  29. "Cold War treaty confirms Sweden was not neutral". The Local . Archived from the original on December 11, 2013. Retrieved December 12, 2013.
  30. Gunnar Rensfeldt. "Read the Snowden Documents From the NSA". Sveriges Television. Archived from the original on February 9, 2014. Retrieved December 12, 2013.
  31. "Ny afsløring: FE masseindsamler oplysninger om danskere gennem avanceret spionsystem". DR (in Danish). September 24, 2020. Retrieved September 24, 2020.
  32. Ryan Gallagher (April 24, 2017). "Japan made secret deals with the NSA that expanded global surveillance". Archived from the original on April 24, 2017. Retrieved April 24, 2017.