<<

2013 mass disclosures - , the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

2013 disclosures From Wikipedia, the free encyclopedia Further information:

The 2013 mass surveillance disclosures refer to numerous media reports beginning in June 2013 which revealed operational details of the US Agency (NSA) and its international partners' mass surveillance of foreign nationals as well as US citizens. The series of reports emanated from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden. On 6 June 2013, the first set of documents were published simultaneously by and , attracting considerable public attention. [1]

The practice of mass surveillance in the took off during the 1940s and was greatly expanded in the 1970s. It soon grew into a program code-named "ECHELON",[2] but did not attract much public attention until other global surveillance programs such as PRISM, XKeyscore, and were exposed in the 2013 release of thousands of documents.[3] Many countries around the world, including Western Allies and member states of NATO, have been targeted by the "" strategic alliance of , , , the UK and the USA—five English-speaking Western democracies aiming to achieve Total Information Awareness by mastering the with analytical tools such as the .[4] As confirmed by the NSA's director Keith B. Alexander on 26 September 2013, the NSA collects and stores all phone records of all American citizens.[5] Much of the data is kept in large storage facilities such as the , a US$1.5 billion megaproject referred to by as a "symbol of the spy agency's surveillance prowess."[6]

As a result of the disclosures, social movements such as have sprung up to protest against mass surveillance. Domestic spying programmes in countries such as , the UK, and have also been brought to light. On the legal front, the Electronic Frontier Foundation joined a coalition of diverse groups filing lawsuits against the NSA. Several organizations have urged the Obama administration not to prosecute, but to protect " Snowden". These groups include Amnesty International, Human Rights Watch, Transparency International, and the Index on Censorship.[7][8][9][10]

On 14 June 2013, Snowden was charged by US federal prosecutors under the Act of 1917 for his alleged theft of government . He was later granted temporary political asylum by the Russian government in late July 2013. This contributed to a deterioration of –United States relations.[11][12] On 6 August 2013, President Obama made a public appearance on national television where he reassured Americans that "We don't have a domestic spying program" and "There is no spying on Americans".[13]

Contents

1 Historical background 1.1 Origins of clandestine surveillance in the United States 1.2 Mass surveillance in a global context (1940–2001) 1.3 9/11 and its implications on mass surveillance (2001–2009) 1.4 Acceleration of media leaks (2010–present) 2 Summary of revealed surveillance details 2.1 Purposes 2.2 Targets 2.3 International cooperation 2.4 Methods 2.4.1 Infiltration of 2.4.2 "" 2.4.3 Surveillance drones 3 2013 Disclosures by category 3.1 Court orders, memos and policy documents 3.2 Reports 3.3 Collection and programs or hardware 3.4 Relationships with corporate partners 3.5 NSA databases 3.6 directorates (SIDs) 3.7 Technical directorates 3.8 Names associated with specific targets 3.9 Uncategorized or insufficiently described codenames. 3.10 GCHQ operations 3.11 NSA operations 3.12 NSA relationships with foreign intelligence services 3.13 Suggested protective measures from surveillance 3.13.1 3.13.2 Underground 3.14 Unrelated to Edward Snowden 4 Media reports

1 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

4.1 Chronology 4.2 Disclosures 5 Fallout 5.1 Attempts to minimize perceived damage 5.2 US Congress' attempts to limit NSA 5.3 Impact on foreign relations 5.4 Impact on trade 5.5 Perceived consequences for counter- and national security 6 Reaction 6.1 United States of America 6.1.1 Executive branch 6.1.2 Congress 6.1.3 Public 6.2 Europe 6.2.1 Governments 6.2.2 Public 6.3 Non-government organizations 6.4 and 6.5 South America 6.6 6.7 6.8 Other countries 6.9 7 List of Americans under surveillance 7.1 Activists 7.2 Celebrities 7.3 Journalists 7.4 Members of Congress 8 Media related to the disclosures 9 Comparison with previous leaks 10 See also 11 References 12 Further reading

Historical background

Disclosures of the scope of a mass surveillance program involving U.S. citizens had been made in the U.S. media in 2006.[15] In early 2013, Edward Snowden handed over 15,000 – 20,000 top secret documents to various media outlets, triggering one of the biggest news leaks in the modern history of the United States.[16]

Origins of clandestine surveillance in the United States

Main article: Mass surveillance in the United States

During World War II the U.K. and U.S. governments entered into a series of agreements for sharing of signals intelligence of enemy communications traffic.[19] In March, 1946, a secret agreement, the "British-US Communication Intelligence Agreement", known as BRUSA, was established, based on the wartime agreements. The agreement "tied the two countries into a worldwide network of listening posts run by Government Communications Headquarters (GCHQ), the U.K's biggest spying organisation, and its U.S. equivalent, the ."[20]

Wartime censorship of communications during the World Wars was paralleled by peacetime decipherment of communications by the Black Chamber (, MI-8), operating with the approval of the U.S. State Department from 1919 to 1929.[21] In 1945 the now-defunct Project SHAMROCK was created to gather all telegraphic data entering into or exiting from the United States.[21][22] communication companies such as Western Union, RCA Global and ITT World Communications actively aided the U.S. government in the latter's attempt to gain access to international message traffic.[23]

The Federal Bureau of Investigation under J. Edgar Hoover carried out wide-ranging surveillance of communications and political expression, targeting many well-known speakers such as Albert Einstein,[14][24][25] Frank Sinatra,[26][27] First Lady Eleanor Roosevelt,[28][29] Marilyn Monroe,[30] John Lennon,[31] Martin Luther King, Jr.,[32][33] A FBI memo recognized King to be the "most dangerous and effective Negro leader in the country.",[34] ,[35][36] These activities were later uncovered during the course of investigation as the slowly unfolded, which eventually led to the resignation of President .[37]

2 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

In 1952, the NSA was officially established.[21] According to The Times, the NSA was created in "absolute " by President Truman.[38] Six weeks after President Truman took office, he ordered wiretaps on the telephones of Thomas Gardiner Corcoran, a close advisor of Franklin D. Roosevelt.[39] The recorded conversations are currently kept at the Harry S. Truman Presidential Library and Museum, along with other sensitive documents (~233,600 pages (http://www.trumanlibrary.org/hstpaper/psf.htm))

INVESTIGATIONS: Nobody Asked: Is It Moral?

It did not matter that much of the information had already been released —or leaked—to the public. The effect was still overwhelming: a stunning, dismaying indictment of U.S. intelligence agencies and six Presidents, from Franklin Roosevelt to Richard Nixon, for having blithely violated democratic ideals and individual rights while gathering information at home or conducting clandestine operations abroad...

— Time magazine, May 10, 1976[40] Due to his alleged ties to communism, the German-born physicist Albert Einstein was Mass surveillance in a global context (1940–2001) placed under surveillance by the Federal Bureau of Investigation (FBI) shortly after Main article: ECHELON he emigrated to America. The FBI monitored Einstein's mail, intercepted his In 1988, an article titled "Somebody's listening" by Duncan Campbell in the , telephone calls, and searched his trash[14] described the signals intelligence gathering activities of a program code-named "ECHELON.[45] The program was engaged by English-speaking World War II Allied powers Australia, Canada, New Zealand, the and the United States (collectively know as AUSCANNZUKUS). Based on the UKUSA Agreement, it was created to monitor the military and diplomatic communications of the and its allies during the in the early 1960s.[46] Though its existence had long been known, the UKUSA agreement only became public in 2010. It enabled the U.S. and the U.K. to exchange "knowledge from operations involving intercepting, decoding and translating foreign communications." The agreement forbade the parties to reveal its existence to any third party.[20]

By the late 1990s the ECHELON system was capable of intercepting satellite transmissions, public switched telephone network (PSTN) communications (including most Internet traffic), and transmissions carried by microwave. A detailed description of ECHELON was provided by New Zealand journalist in his 1996 book "Secret Power". While the existence of ECHELON was denied by some member governments, a report by a committee of the in 2001 confirmed the program's use and warned Europeans about its reach and effects.[2] The European Parliament stated in its report that the term "ECHELON" was used in a number of contexts, but that the evidence presented indicated it was a signals intelligence collection system capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally. The report to the European Parliament confirmed that this was a "global system for the interception of private and commercial communications."[46]

Due to her alleged ties to communism, the Echelon spy network revealed American actress Marilyn Monroe was placed under surveillance by the FBI. From Imagine a global spying network that can eavesdrop on every single phone call, fax or the year 1955 onwards, the federal bureau e-mail, anywhere on the planet. It sounds like science fiction, but it's true. Two of the closely monitored her social life until chief protagonists - Britain and America - officially deny its existence. But the BBC has months before her death[17] confirmation from Government that such a network really does exist..."

— The British Broadcasting Corporation (BBC), November 1999[47]

9/11 and its implications on mass surveillance (2001–2009)

Further information: NSA warrantless surveillance (2001–07)

In the aftermath of the in 2001 on the World Trade Center and Pentagon, the scope of domestic spying in the United States increased significantly. The bid to prevent future attacks of this scale led to the passage of the . Later acts include the Protect America Act (which removes the warrant requirement for government surveillance of foreign targets[51]) and the FISA Amendments Act (which relaxed some of the original FISA court requirements).

In 2005, the existence of STELLARWIND was revealed by . On 1 January 2006, days after wrote that "Bush

3 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

Lets U.S. Spy on Callers Without Courts,[52] the President emphasized that "This is a limited program designed to prevent attacks on the United States of America. And I repeat, limited."[53]

In 2006, revealed the existence of that he had wired back in 2003.[54] In 2008, Babak Pasdar, a expert, and CEO of Bat Blue publicly revealed the existence of the "Quantico circuit", that he and his team found in 2003. He described it as a back door to the federal government in the systems of an unnamed wireless provider; the company was later independently identified as Verizon.[55]

You Are a Suspect

Every purchase you make with a , every magazine subscription you buy and medical prescription you fill, every Web site you visit and e-mail you send or receive, every academic grade you receive, every bank deposit you make, every trip you book and every event you attend -- all these transactions and communications will go into what the Defense Department describes as a virtual, centralized grand database. To this computerized dossier on your private life from commercial sources, add every piece of information that government has about you -- passport application, driver's license The American boxer was and toll records, judicial and divorce records, complaints from nosy neighbors to the [18] F.B.I., your lifetime paper trail plus the latest hidden camera surveillance -- and you targeted by the NSA's Project MINARET have the supersnoop's dream: a Total Information Awareness about every U.S. citizen.

— The New York Times, November 2002[56]

Acceleration of media leaks (2010–present)

On 28 November 2010, WikiLeaks and five major news outlets in Spain (El País), France (), (), the United Kingdom (The Guardian), and the United States (The New York Times) began publishing the first 220 of 251,287 leaked U.S. State department diplomatic "cables" simultaneously.[57]

Other notable media leaks include the Afghan War documents leak (considered to be one of the largest leaks in U.S. military history[58]), as well as the War documents leak (A collection of 391,832 field reports[59]), and the Guantanamo Bay files leak (779 top secret documents marked NOFORN).

On 15 March 2012, the American magazine Wired published an article with the headline "The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)",[60] which was later mentioned by U.S. Rep. Hank Johnson during a congressional hearing. In response to Johnson's inquiry, NSA director Keith B. Alexander testified that these allegations made by Wired magazine were untrue.[61] South 's anti-apartheid President Nelson Mandela was closely watched by British MI6 agents[41][42] U.S. agency denies data center to monitor citizens'

"Many unfounded allegations have been made about the planned activities of the ," the NSA said in a statement, noting that "one of the biggest misconceptions about NSA is that we are unlawfully listening in on, or reading emails of, U.S. citizens. This is simply not the case.".

, April 2013[62]

Summary of revealed surveillance details

On 6 June 2013, Britain's The Guardian newspaper began publishing a series of revelations by an as yet unknown American whistleblower, revealed several days later to be ex-CIA and ex-NSA-contracted systems analyst Edward Snowden. Snowden gave a cache of documents to two journalists: and , Greenwald later estimated that the cache contains 15,000 – 20,000 documents, some very large and very detailed, and some very small.[70][71] In over two subsequent months of publications, it became clear that the NSA had operated a complex web of spying programs which allowed it to intercept internet and telephone conversations from over a billion users from dozens of countries around the world. Specific revelations were made about China, the , , Iran and , and Australia and New Zealand, however the published documentation reveals that many of the programs indiscriminately collected bulk information directly from central servers and internet backbones, which almost invariably carry and reroute information from distant countries.

Due to this central server and backbone monitoring, many of the programs overlapped and interrelated among one another. These programs were often carried out with the assistance of US entities such as the United States Department of Justice and the FBI,[72] were sanctioned by

4 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

US laws such as the FISA Amendments Act, and the necessary court orders for them were signed by the secret Foreign Intelligence Surveillance Court. Some of the NSA's programs were directly aided by national and foreign intelligence agencies, Britain's GCHQ and Australia's DSD, as well as by large private telecommunications and internet corporations, such as Verizon, ,[73] and .[74]

Purposes

According to the April 2013 summary of documents leaked by Snowden, other than to combat terrorism, these surveillance programs were employed to assess the and economic stability of other countries,[75] and to gather "commercial secrets".[76]

In a statement addressed to the National Congress of Brazil in early August 2013, journalist Glenn Greenwald maintained that the U.S. government had used counter-terrorism as a pretext for clandestine surveillance in order to compete with other countries in the "business, industrial and economic fields".[77][78][79]

In an interview with Der Spiegel published on 12 August 2013, former NSA Director admitted that "We (the NSA) steal secrets. We're number one in it". Hayden also added: "We steal [75] stuff to make you safe, not to make you rich". Princess Diana's phone calls were monitored and recorded by the NSA right According to documents seen by the news agency Reuters, these "secrets" were subsequently until she died in a 1997 Paris car crash funnelled to authorities across to help them launch criminal investigations of with Dodi Fayed[43][44] Americans.[80] Federal agents are then instructed to "recreate" the investigative trail in order to "cover up" where the information originated.[80]

Targets

According to the April 2013 summary of disclosures, the NSA defined its "intelligence priorities" on a scale of "1" (highest interest) to "5" (lowest interest).[75] It classified about 30 countries as "3rd parties", with whom it cooperates but also spies on:

Main targets: China, Russia, Iran, Pakistan and were ranked highly on the NSA's list of spying priorities, followed by France, Germany, Japan, and Brazil. The European Union's "international trade" and "economic stability" are also of interest.[75] Other high priority targets include , , and North Korea.[81] North Korea: Despite being a priority target, and despite continuous surveillance from sensors located outside the country, the NSA knew little about North Korea and Kim Jong Un.[81] Syria: Syria was being closely monitored, particularly for signs of chemical weapons use.[81] Iran: suspected nuclear sites that did not show up on satellite imagery were identified by new surveillance techniques.[81] The 7th U.N. Secretary-General Kofi Annan Irrelevant : From a US intelligence perspective, countries such as Cambodia, Laos and was placed under surveillance by British intelligence agents, who bugged his office Nepal were largely irrelevant, as were most European countries like , , in the lead up to the [48] Croatia and the Czech Republic.[75]

Other prominent targets included members and adherents of the internet group known as "",[75] as well as potential whistleblowers.[82] According to Edward Snowden, the NSA targeted reporters who wrote critically about the government after 9/11.[83]

As part of a joint operation with the Central (CIA), the NSA deployed secret posts in eighty U.S. embassies and consulates worldwide.[63] The headquarters of NATO were also used by NSA experts to spy on the European Union.[84]

In 2013, documents provided by Edward Snowden revealed that the following intergovernmental organizations, diplomatic missions, and government ministries have been subjected to surveillance by the "Five Eyes":

5 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

Country/ Target Method(s) Organization Collection of records by the Brazil Ministry of Energy Establishment of Canada (CSEC)[85] Ministry of Foreign and European Affairs France Infiltration of virtual private networks (VPN)[86] Embassy of France in Washington, D.C Embassy of India in Washington, D.C Copying entire hard disk drives[87] India Permanent Representative Picking data from screenshots[87] of India to the United Nations The 8th U.N. Secretary-General Ban Hacking of e-mail accounts as part of an Ki-moon was placed under surveillance by Secretariat of Public Security operation code-named "Whitetamale"[88] U.S. diplomats, who collected iris scans, fingerprints and DNA of U.N. officials, according to leaked documents released by Council of the European Wikileaks[49][50] Union in Installation of covert listening devices[89] European Delegation to the United Hacking and infiltration of virtual private Union Nations in New York networks[90] [90] Delegation to the United Disk cloning States in Washington, D.C United Nations Headquarters United in New York Hacking of encrypted communications[90] [90] Nations International Atomic Energy Infiltration of internal video conferences Agency in Vienna According to Snowden's documents, the United Nations Headquarters and the United Nations General Assembly were International cooperation targeted by NSA employees disguised as diplomats.[63] During World War II, the BRUSA Agreement was signed by the governments of the United States and the United Kingdom for the purpose of intelligence sharing.[19] This was later formalized in the UKUSA Agreement of 1946 as a secret treaty. The full text of the agreement was released to the public on 25 June 2010.[20]

Although the treaty was later revised to include other countries such as Denmark, Germany, Ireland, , Turkey, and the ,[20] most of the information sharing has been performed by the so-called "Five Eyes",[91] a term referring to the following English-speaking western democracies and their respective intelligence agencies:

– The Defence Signals Directorate of Australia[91] – The Communications Security Establishment of Canada[91] Citing Snowden's documents, The – The Government Communications Security Bureau of New Zealand[91] Guardian reported that British officials had – The Government Communications Headquarters of the United Kingdom, which is set up fake internet cafes at the 2009 G-20 widely considered to be a leader in traditional spying due to its influence on countries that London summit to spy on the delegates' were once colonies of the .[91] use of computers, and to install – The National Security Agency of the United States, which has the biggest budget and key-logging software on the delegates' phones. This allowed British the most advanced technical abilities among the "five eyes".[91] representatives to gain a "negotiating [64] In 2013, media disclosures revealed how other government agencies have cooperated extensively advantage" at the summit with the "Five Eyes":

- The Politiets Efterretningstjeneste (PET) of Denmark, a domestic intelligence agency, exchanges data with the NSA on a regular basis, as part of a secret agreement with the United States.[92]

– The Bundesnachrichtendienst (Federal Intelligence Service) of Germany systematically transfers metadata from German intelligence sources to the NSA. In December 2012 alone, Germany provided the NSA with 500 million metadata records.[93] The NSA granted the Bundesnachrichtendienst access to X-Keyscore,[94] in exchange for Mira4 and Veras.[93] In early 2013, Hans-Georg

6 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

Maaßen, President of the German domestic security agency BfV, made several visits to the headquarters of the NSA. According to classified documents of the German government, Maaßen had agreed to transfer all data collected by the BfV via XKeyscore to the NSA.[95] In addition, the BfV has been working very closely with eight other U.S. government agencies, including the CIA.[96]

- The SIGINT National Unit of Israel routinely receives data (including those of U.S. citizens) from the NSA.[97] (See also: Memorandum of understanding between the NSA and Israel)

- In 2011, the Japanese government was asked by the NSA to intercept fiber-optic According Snowden's interview with the cables carrying phone and Internet data from across the entire Asia-Pacific region, including , the U.S. government has been hacking numerous China. However, the Japanese government refused to comply.[98] non-military targets in China for years. Other high-priority targets include - The Algemene Inlichtingen en Veiligheidsdienst (General Intelligence and Security academic institutions such as the Service) of the Netherlands has been receiving and storing user information gathered by U.S. prestigious in intelligence sources such as PRISM.[99] [65]

– The Defence Ministry of and its Security and Intelligence Division have been secretly intercepting much of the fibre optic cable traffic passing through the Asian continent. Information gathered by the is transferred to the Government of Australia as part of an intelligence sharing agreement. This allows the "Five Eyes" to maintain a "stranglehold on communications across the ".[100]

– The National Defence Radio Establishment of (codenamed Sardines)[101] has been working extensively with the NSA, and it has granted the "five eyes" access to underwater cables in the .[101]

- The Federal Intelligence Service (FSI) of regularly exchanges information with the NSA, based on a secret agreement.[92][102] In addition, the NSA has been granted The Council of the European Union, with its headquarters at the Justus Lipsius access to Swiss monitoring facilities in Leuk (canton of Valais) and Herrenschwanden (canton building in Brussels, was targeted by NSA [92] of Bern). employees working near the headquarters of NATO. An NSA document dated

Top secret documents leaked by Edward Snowden revealed that the "Five Eyes" have gained access to the majority of internet and telephone communications flowing throughout Europe, the United States, and other parts of the world.

Left: SEA-ME-WE 3, which runs across the Afro-Eurasian supercontinent from Japan to Northern Germany, is one of the most important submarine cables accessed by the "Five Eyes". Singapore, a former British colony in the Asia-Pacific region (blue dot), plays a vital role in intercepting internet and telecommunications traffic heading from Australia/Japan to Europe, and vice versa. An intelligence sharing agreement between Singapore and Australia allows the rest of the "Five Eyes" to gain access to SEA-ME-WE 3.[100] Right:TAT-14, a telecommunications cable linking Europe with the United States, was identified as one of few assets of "Critical Infrastructure and Key Resources" of the USA on foreign territory. In , currently the world's leader in 2013, it was revealed that British officials "pressured a handful of telecommunications and internet offshore deepwater drilling, is a companies" to allow the British government to gain access to TAT-14.[103] "prominent" target of the U.S. government[68] According to the leaked documents, aside from the Five Eyes, most other Western countries also participatied in the NSA surveillance system and sharing information with each other.[104] However,

7 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

being a partner of the NSA did not automatically exempt a country from being targeted by the NSA. According to an internal NSA document leaked by Snowden, "We (the NSA) can, and often do, target the signals of most 3rd party foreign partners."[105]

Methods

Infiltration of smartphones

As worldwide sales of smartphones began exceeding those of feature phones, the NSA decided to take advantage of the boom. This is particularly advantageous because the smartphone combines a myriad of data that would interest an intelligence agency, such as social contacts, user behavior, interests, location, photos and credit card numbers and passwords.[106] From 2002 to 2013, the German Chancellor was targeted by An internal NSA report from 2010 stated that the spread of the smartphone has been occurring the U.S. Special Collection Service[69] "extremely rapidly"—developments that "certainly complicate traditional target analysis."[106] According to the document, the NSA has set up task forces assigned to several smartphone manufacturers and operating systems, including Apple Inc.'s iPhone and iOS , as well as Google's Android mobile operating system.[106] Similarly, Britain's GCHQ assigned a team to study and crack the BlackBerry.[106]

Under the heading "iPhone capability," the document notes that there are smaller NSA programs, known as "scripts," that can perform surveillance on 38 different features of the iPhone 3 and iPhone 4 operating systems. These include the mapping feature, and photos, as well as The "Five Eyes" of Australia, Canada, New , Facebook and Yahoo! Messenger.[106] Zealand, the United Kingdom and the United States

A secret NSA presentation, leaked to Laura Poitras and Der Spiegel, introduces the NSA's iPhone Location Services:[107]

First slide: "Who knew in 1984..."(A reference to George Orwell's dystopian novel Nineteen Eighty-Four)

Second slide:"...that this would be big brother..." (Referring to Steve Jobs of Apple Inc. and the iPhone brand)

Third slide:"...and the Zombies would be paying customers?"

"Mastering the Internet"

"Mastering the Internet" (MTI) is part of the Interception Modernisation Programme (IMP) of the British government that involves the insertion of thousands of DPI (deep packet inspection) "black boxes" at various internet service providers, as revealed by the British media in 2009.[108]

In 2013, it was further revealed that the NSA had made a £17.2 million financial contribution to the project, which is capable of vacuuming signals from up to 200 fibre-optic cables at all physical points of entry into Great Britain.[109]

Mastering the Internet

October 2007 – As part of the British government's 2007 Spending Review, the GCHQ is secretly allocated £1 billion to store and

8 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

monitor online communications[110]

May 3, 2009 – The British media, led by The Register and , reveals the GCHQ's plan to monitor the Internet[111][112]

May 3, 2009 – The GCHQ explicitly denies these allegations[112]

August 1, 2013 – The Guardian, citing documents leaked by Edward Snowden, reveals that both the NSA and the GCHQ are "Mastering the Internet", with the latter receiving a £17.2 million payment from the former.[113][114]

A classified NSA powerpoint slide about the importance of monitoring the HTTP (Hypertext Transfer Protocol) usage of "typical" Internet users. Notice the orange bar on top with the following line of text: "TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL". This is used to indicate that the presentation is part of a top secret document about communications intelligece (COMINT) that is related to the "Five Eyes" of the United States, Australia, Canada, Great Britain, and New Zealand.

Surveillance drones

On 19 June 2013, FBI Director told the Committee on the Judiciary that the federal government had been employing surveillance drones on U.S. soil in "particular incidents".[115] According to Mueller, the FBI is currently in the initial stage of developing drone policies.[115]

Earlier in 2012, Congress passed a US$63 billion bill that will grant four years of additional funding to the Federal Aviation Administration (FAA). Under the bill, the FAA is required to provide military and commercial drones with expanded access to U.S. airspace by October 2015.[116]

In February 2013, a spokesman for the Los Angeles Police Department explained that these drones would initially be deployed in large public gatherings, including major protests. Over time, tiny drones would be used to fly inside buildings to track down suspects and assist in investigations.[117] According to The , the main advantage of using drones is that they offer "unblinking eye-in-the-sky coverage". They can be modified to carry high-resolution video cameras, infrared sensors, license plate readers, listening devices, and be disguised as sea gulls or other birds to mask themselves.[117]

By 2020, about 30,000 unmanned drones are expected to be deployed in the United States for the purpose of surveillance and law enforcement.[118] 2013 Disclosures by category

Further information: List of government surveillance projects

Court orders, memos and policy documents

Memorandum of understanding between the NSA and the Israel SIGINT National Unit (ISNU) April 2013 FISC Order demanding that Verizon hand over all telephony metadata to NSA. The order had been initially granted in May 2006. In 2009 the FISC discovered that the government had made repeated and substantial misrepresentations to the court about its use, and had routinely been "running queries of the metadata using querying terms that did not meet the required standard for querying." It further concluded that the violations had been routine and systematic.[119] Legal Justification of the bulk telephony metadata collection (officially released)[120] 2009 NSA Procedures for Targeting Foreigners for Surveillance 2009 NSA Procedures for Minimizing collection on US Persons 2011 NSA Procedures for Minimizing collection on US Persons (officially released)[121] Reference to a 2011 Change in the court-approved Minimization Procedures allowing analysts to run search queries using US persons' identifiers if there is "effective" oversight by NSA (it is not publicly known if such oversight has been established, or if any such searches have been conducted).[122] The court order mentioned was later officially released.[123] October 2011 Court decision finding NSA's program, which collected tens of thousands of non-target communications, to have violated the law. It held, citing multiple Supreme Court precedents, that the Fourth Amendment applies to the

9 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

contents of all communications, whatever the means (they are "papers"). It also finds that the NSA's minimization and targeting policies to be legally and/or constitutionally deficient, and recommends changes. (officially released).[123][124][125][126][127][128][129][130][131][132] Additional findings: The collection of Upstream data had begun before a court order approving it, in violation of 50 USC § 1809(a), which makes it a crime to engage in, use or disseminate surveillance knowing, or having reason to know such surveillance was not authorized. [133] March 2009 FISC ruling showing a consistent pattern of misrepresentations of the bulk telephone metadata collection program by the government to the Court. It also held that the data was being routinely queried in ways that did not meet "reasonable articulatable suspicion", demonstrating inadequate safeguards in the software and training of analysts. Showing that "thousands of violations resulted from the use of identifiers that were not "RAS-approved by analysts who were not even aware that they were accessing BR metadata," and that in 2006 "there was no single person [in the NSA] who had a complete understanding of the BR FISA system architecture," a situation which persisted until February 2009 or later. RAS is shorthand for Reasonable Articulatable Suspicion. The Court nonetheless reapproved the collection of bulk phone metadata, while mandating additional safeguards and training, and "end-to-end system engineering reviews," and reports from the review. (Officially released by court order)[134][135][136][137][138][139][140] October 2012 Presidential Policy Directive 20 (PPD20), outlining . 2007 memo proposing broader powers. April 2013 list of US Spying targets and topics by priority. The top priority countries are: Iran, Russia, China, Pakistan, North Korea and Afghanistan. Germany, France, the European Union, and Japan are mid-level priorities; and Spain rank lower.[141][142] FY 2013 Intelligence "Black Budget" Summary.[81][143] A memorandum of understanding concerning US sharing of raw SIGINT with Israel. The data has not been scrubbed to eliminate US persons, it asks Israel not to deliberately target US persons, however the agreement allows Israel to retain US person data for one full year. The memorandum is not legally binding. A separate document states "And there are other kinds of CI threats that are right on our midst. For example, one of NSA's biggest threats is actually from friendly intelligence services, like Israel.", it continues "Balancing the SIGINT exchange between US and Israeli needs has been a constant challenge. In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came and went, and with NSA's only true Third Party CT relationship being driven almost entirely driven by the needs of the partner." [144] September 13, 2013 FISC Court order declassifing all the legal opinions relating to Section 215 of the Patriot Act written after May 2011 that aren't already the subject of Freedom of Information Act litigation. The FISA Court ruled that the must identify the opinions in question by October 4, 2013.[145][146][147]

Reports

2009 OIG report on STELLARWIND Extracts from reports relating to XKeyscore. One entitled "Tales from the Land of Brothers Grimm" and others detailing the successes of said software, another is a note from an analyst who felt that he always had one foot in prison when using it. XKeyscore is also described as "big and scary, strong and powerful" and lets an analyst do whatever they like.[148] Reports detailing thousands of violations[149] Numerous reports relating to drones, including "Threats to Unmanned Aerial Vehicles", a report summarizing attempts to shoot down, intercept, control or otherwise spoof drones. While the report details vulnerabilities of specific aircraft, the document itself has not been published, but only excerpts described. Other reports detail American spin efforts, suggesting that the phrases "drone strike," "kill list," "robot warfare," "Aerial Assassins" be avoided, offering "lethal UAV operations" instead, and also terms like "Pre-emptive and Preventive Military Action" and "Inherent Right of Self Defense." Likewise, reports detail efforts by Al-Qaeda to spin, portraying attacks as cowardly and immoral. Analysts also questioned whether America was losing rhetorical battle in courts, media, and public opinion. Another report stated that drone strikes "could be brought under increased scrutiny, perceived to be illegitimate, openly resisted or undermined."[150] The US learned that Pakistan engaged in a pattern of extrajudicial killings, mostly against militants. However, not all targets militants, Pakistan also planned to murder a human rights activist, , while she was on a visit to India. The plot was aborted when she learned of it. The US sought to avoid public disclosure of this, and other incidents.[151][152] The NSA and GCHQ have access to user data in , , and Android phones. They are able to read almost all smartphone information, including SMS, location, emails, and notes.[153]

Collection and analysis programs or hardware

Boundless Informant – Computer program that physically performs the data collection.[154] – A program that specifically targets foreign embassies and diplomats XKeyscore – A program which allows searching collected data in a variety of ways.[155][156] SHELLTRUMPET – A metadata program that targets international communications.[157] Unified Targeting Tool (UTT) – A graphical frontend for querying databases.[155][158] LOPERS – A software based system to spy on PSTNs[159] TURBULENCE – Includes cyber-warfare capabilities, such as targeting enemies with . (updates to existing knowledge) JUGGERNAUT – A system to intercept mobile networks, including voice, fax, data, and text.[159]

10 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

SPYDER[155] CHALKFUN[155] VLR – Visitor Location Register[155] TransX[155] RAGTIME – A blanket term for any of four different surveillance programs[155][160] Special Collection Service – Joint CIA/NSA eavesdropping team focused based in about 80 US embassies and consulates around the world. There are known branches in Frankfurt and Vienna. According to Der Spiegel, many of their operations are a direct violation of at least 3 signed treaties: "The Convention on the Privileges and Immunities of the United Nations of 1946, the Vienna Convention on Diplomatic Relations of 1961, and a signed an agreement in 1947 that rules out all undercover operations.[161] STATEROOM – Surveillance on embassies and consulates. Highly Classified.[161] BULLRUN, named after the Battle of Bull Run. - Bullrun refers to the NSA's set of codebreaking capabilities, including the use of Computer Network Exploitation (hacking) to obtain keys, weakening of encryption standards and providing backdoors to the same.[162] The following codenames are known to be related to BULLRUN: APERIODIC, AMBULANT, AUNTIE, PAINTEDEAGLE, PAWLEYS, PITCHFORD, PENDLETON, PICARESQUE, and PIEDMONT. No further explanation of the above codenames has been provided to date.[163] Edgehill, named after the Battle of Edgehill - A program similar to BULLRUN, operated by the GCHQ.[162]

Relationships with corporate partners

Special Source Operations (SSO) – Is a division of the NSA responsible for all programs which collaborate with corporate entities.[72]

Upstream collects data from fiber-optic cables and internet backbones.[164][165] Codenames of companies participating in Upstream: BLARNEY (a surveillance program which was established by the NSA with AT&T and which operates at or near key fiber-optic landing points in the U.S. to capture foreign communications coming in and out of the country),[166][167] STORMBREW, FAIRVIEW (a highly classified program for tapping into the world's intercontinental fiber-optic cables according to NSA whistleblower Thomas Andrews Drake),[167] and OAKSTAR. There are conflicting sources: some that call these "programs",[166][168][169] versus the official statement called "The National Security Agency: Missions, Authorities, Oversight and Partnerships" that describes them as codenames of cooperating companies.[170][171] A third source, just released groups them with describes them as "programs authorized to collect cable transit traffic passing through US Gateways with both sides of the communication being foreign.[155]The FY 2013 budget for the above programs is as follows:[172] BLARNEY – $65.96 million FAIRVIEW – $94.06 million STORMBREW – $46.06 million OAKSTAR – $9.41 million Miscellaneous codenames of companies: LITHIUM[170] RAMPART – Described as being part of Special Source operations, there is at least one known subdivision.[173] RAMPART-T – Started in 1991 or earlier, documents describe this program as: "Penetration of hard targets at or near leadership level". The information is intended for "the president and his national security advisers". Rampart-T is aimed at China, Russia, and Eastern European countries, there are around 20 nations targeted.[161] allows the NSA to bypass encryption on Outlook.com. Names and Codenames of companies assisting GCHQ: Verizon Business (codenamed "Dacron") British Telecommunications (codenamed "Remedy") Cable (codenamed "Gerontic") Global Crossing (codenamed "Pinnage") Level 3 (codenamed "Little") Viatel (codenamed "Vitreous") Interoute (codenamed "Streetcar")

NSA databases

PINWALE – Stores and text[174] NUCLEON – Stores voice data[175] MAINWAY – Stores telephony metadata (ie call records)[176] MARINA – Stores Internet metadata[174][176] TRAFFICTHIEF – Stores metadata from a subset of assigned targets. CLOUD/ABR[155] [155] FASTSCOPE[155] SIGINT NAVIGATOR[155]

11 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

TRACFIN - A database of financial information.[155][177] TUNINGFORK[155] OCTAVE – A database with a graphical frontend[155][158] ANCHORY – A database of completed SIGINT reports.[155][175] Nymrod – Apparently a database of names (appears in UTT Screenshot)[158]

Signals intelligence directorates (SIDs)

PRINTAURA – According to Ambinder, "NSA Unit involved in data filtering for TRAFFICTHIEF"[175] Protocol Exploitation – Sorts data types into specific databases[165][175]

Technical directorates

SCISSORS – This team sorts data types for analysis.[165][175]

Names associated with specific targets

Apalatchee = The EU mission by the East River, in New York.[161] Magothy = The EU embassy in Washington, DC. This embassy had its internal videoconferencing, and other areas of the computer network tapped. Both by the US, and by the Chinese. The US effort was conducted by the team working for the BLARNEY program.[161] Wabash = French diplomatic office in Washington. This office was bugged.[178] Blackfoot = French diplomatic office in the UN in New York. This office was bugged and computer screen captures obtained.[178] KATEEL = Brazilian embassy in Washington.[179] POCOMOKE = Brazilian Permanent Mission to the UN in New York.[179]

Uncategorized or insufficiently described codenames.

CERF CALL MOSES1[159] CONVEYANCE – Provide filtering for PRISM.[165] EVILOLIVE- Collects internet traffic and data.[157] FACELIFT[173] FALLOUT – Provides filtering for PRISM .[165] LONGHAUL - Involved in the process of decrypting communications.[162] MATRIX[159] MOONLIGHTPATH[157][180][181] SPINNERET[157][180][181] STEELKNIGHT[182] CASPORT[155] DANCINGOASIS[161]

GCHQ operations

Main articles: Government Communications Headquarters and Mass surveillance in the United Kingdom

The Government Communications Headquarters (GCHQ) is the main British intelligence agency responsible for providing signals intelligence (SIGINT) and information assurance to the British government and armed forces.

Tempora – Collects data from transatlantic fibre-optic cables of major telecommunications corporations by directly tapping on them and from Internet backbones. Tempora uses intercepts on the fibre-optic cables that make up the backbone of the internet to gain access to swaths of internet users' . The intercepts are placed in the United Kingdom and overseas, with the knowledge of companies owning either the cables or landing stations. It is a GCHQ program to create a large-scale "Internet buffer" which stores Internet content for three days and metadata for up to 30 days.[165][183][184] Britain runs a large-scale intercept station in the , capable of tapping underwater fiber-optic cables and satellites, and extracting email, telephone, and web traffic. The information is then passed to the GCHQ and shared with the NSA. The operation costs around £1 billion and is still being assembled. It is part of the "Tempora" project.[185] Edward Snowden disputes 's claim that he, or anyone he has had direct contact with is the source of this information.[186] Süddeutsche Zeitung's fiber optic revelations were also described as having been obtained from GC-Wiki by Snowden.[103] GCHQ is believed to have forced some six global telecommunications and Internet companies to allow them to access more than 14 fiber optic cables that transport telephone communications.[103] The six companies, BT, Vodafone, Viatel, Interoute, Verizon and Level-3, gave GCHQ access to the cables in return for payment, it is believed the companies had no choice in this decision.[103] Three of the cables' terminal stations are on German territory; two of the cables are partially owned by Deutsche Telekom, who have denied knowledge of or participation in GCHQ's activities.[103]

12 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

Spying on the 2009 Summit in London. Life and times of GCHQ employees. GC-Wiki – An internal wiki at GCHQ.[185] Access to the majority of Internet and telephone communications throughout Europe, and occasionally as far as the United States.[103] GCHQ has a team dedicated to cracking encrypted traffic on Hotmail, Google, Yahoo and Facebook.[162] The Belgian telecom company Belgacom reports that it had been hacked, and has filed criminal charges, and will be cooperating with the investigation into the hacking. "The inquiry has shown that the hacking was only possible by an intruder with significant financial and logistic means," they said. "This fact, combined with the technical complexity of the hacking and the scale on which it occurred, points towards international state-sponsored cyber espionage." [187] According to documents released by Der Spiegel, the operation against Belgacom was entitled 'Operation Socialist' and was done by the GCHQ for the purpose of enabling Man-in-the-middle attacks against smartphones.[188][189]

NSA operations

Hacking Tsinghua University, and also Pacnet in China. Spying on Latin America with the help of Global Crossing. The NSA operates "Special Collection Services," a global monitoring network, that collects from more then 80 embassies and consulates worldwide, often without the knowledge or consent of the host country.[90][190] The NSA spied on a UN videoconferencing system, in violation of the US agreement with the UN not to do so. In the process NSA discovered that the Chinese had already done so, and then started analyzing what the Chinese were taking. Shortly thereafter, the NSA gained access to approximately 500 other UN channels of communications.[90][190][191] Additional details of the raid on 's Abbotabad, Pakistan compound. The work of Tailored Access Operations, in installing spyware on phones is highlighted. Also highlighted are the roles of the CIA, other agencies, and the Navy SEALs.[192] The NSA's Network Analysis Center cracked the reservation system for , and also hacked , accessing specially protected material, according to a document dated in 2006.[67] The NSA hacked the French Foreign Ministry, and bugged the French diplomatic offices in Washington and New York in 2010.[178] The NSA conducted extensive spying on Enrique Peña Nieto, and his aides, accessing their emails. Likewise, the NSA spied on the communications of , and her aides, and also created a two hop contact graph. The source document is dated June 2012, it is unclear whether the operation is ongoing.[193][194][195] The NSA and GCHQ target banks and credit card companies by various means including "Tailored Access Operations", specifically by targeting printer traffic from banks. VISA has also been targeted. According to a GCHQ document, the collection involves "bulk data" containing "rich personal information" that is mostly "not about our targets".[177] From collection points outside the United States, the NSA gathers contact lists belonging to users of e-mail and instant messaging services, including Yahoo, Hotmail, Facebook and .[196]

NSA relationships with foreign intelligence services

Payments to GCHQ from NSA totaling at least £100 million Relationships with Germany's BND, exchange of technology: (XKeyscore, and the German programs and bulk metadata (500 Million records in one month alone)). The US directly spies on most of its allies, even those with intelligence sharing agreements, with only the Five Eyes being immune.[148]

Suggested protective measures from surveillance

Encryption

In , encryption is the process of encoding information in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. According to Snowden's recommendations published by The Guardian Edward in September 2013 ,[197] properly implemented strong crypto systems were among the few things which one can rely on. However, endpoint security is often too weak to prevent the NSA from finding ways around it.[197]

Underground bunkers

In September 2013, it was reported by the press that a number of countries deemed by the US and its allies to be rogue states, such as Syria, Iran and North Korea, had successfully evaded U.S. government surveillance by constructing secret bunkers deep below the Earth's surface.[198]

China's underground megaproject, the 816 Nuclear Military Plant in Chongqing (now declassified and opened to tourists), was reported to be "most worrying" for the U.S. Defense Intelligence Agency.[198]

Libya evaded surveillance by building "hardened and buried" bunkers at least 40 feet below ground level.[198]

Unrelated to Edward Snowden

13 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

In 2002, the NSA, in cooperation with the FBI, and in cooperation with , monitored nearly all communications in the Salt Lake area in the six months surrounding the Olympic games.[166][199][200] Since 2005, Canada has been running a bulk phone metadata, email and text message program.[201][202][203] The NYPD is engaging in mass surveillance, particularly of Muslims, in mosques, in social gatherings, and even at home. The department employs "rakers" to troll Muslim neighborhoods. The unit employing said rakers, was once called "The Demographics Unit," the name was changed in 2010 to the "Zone Assessment Unit" to mask the appearance, though not change the actual fact of racial profiling. Knowledge of this program was kept from the city council.[204] Devices made by the American company Blue Coat Systems, which are used for Internet surveillance and censorship, have turned up repeatedly in countries that censor and surveil the Internet, and have a record of human rights abuses, such as Iran, Syria, China, Burma (Myanmar) and Sudan.[205][206][207][208] The ACLU has released a report on the proliferation of license plate readers and on the retention of data from them.[209][210] The FBI has been pressuring ISPs to install surveillance software, referred to as the "harvesting program".[211] The FBI has been using malware and hacking to surveil suspects. Reports indicate however, that hacking and malware usage remains a last resort, and that warrants are sought for individual cases.[212][213] The NSA collects the contents of emails that transit from the US to abroad, and searches them for keywords.[214] The Post Office scans all envelopes, outsides of packages and postcards.[215] France's Equivalent of PRISM India will be building a mass domestic surveillance program called the "Central Monitoring System", which will be able to track all voice, fax, and text across all telephone networks in the country. It will also contract the Israeli company Verint Systems to monitor encrypted Gmail, BlackBerry, and Yahoo! mail.[216][217] More than 230 thousand people were questioned under The United Kingdom's Schedule 7 (http://www.legislation.gov.uk/ukpga/2000/11 /schedule/7) of the Terrorism act of 2000 between April 2009 and March 2012.[218] New Zealand passed a bill allowing domestic spying against its citizens and residents, by a narrow margin (61–59).[219][220] , on 19 June gave an interview to Boiling Frogs Post, in which he expanded his previous disclosures. Specifically he names persons who had been wiretapped by the NSA, namely: , , Diane Feinstein, Colin Powell, Evan Bayh, and many others including journalists and political groups. He asserts that all telephony content is collected.[221] Blueprints of the Utah Data Center[222] "The Find," the NSA can locate even unpowered cellphones.[223] The DEA's and IRS's use of NSA data to start criminal investigations against US citizens, and their method of "Parallel Construction" to conceal the true origins of their evidence.[224][225] CIA operative De Sousa, convicted in absentia in Italy in the case of Osama Mustapha Hassan Nasr AKA Abu Omar goes on camera describing the case.[226] – policy requiring federal employees to report "high-risk persons or behaviors" from among co-workers, as well as to punish those who fail to report such colleagues.[227] In 2013, the NSA planned to investigate over 4000 cases.[81] The German Federal Office for Information Security has warned that Windows 8 has a built-in , that could allow Microsoft, and by extension the NSA to access many Windows 8 machines via the Trusted Platform Module that comes embedded on many Windows 8 machines.[228][229] Of the subset of CIA applicants whose backgrounds raised flags, one fifth were found to have ties to either terrorism or foreign hostile intelligence.[230] The NSA has admitted about a dozen cases of willful violations by analysts over the last 10 years.[231] One common form, in which an analyst spies on a love interest, has been dubbed "LOVEINT"[232] The Hemisphere Project, a secret partnership between federal and local drug officials and AT&T since September 2007. Law enforcement has access to electronic call detail records for any telephone carrier that uses an AT&T switch to process a telephone call. Records go back to 1987 and about 4 billion are added every day. Officials are instructed to obfuscate the existence of the program, by a method similar to "Parallel Construction" in which a separate subpoena is obtained for records which had already been returned by the Hemisphere project, thus disguising the true origin of the data.[233][234] Sweden is helping the GCHQ tap fiber-optic cables and has become, effectively, a member of the 'Five Eyes', according to Duncan Campbell in a hearing of the EU parliament's LIBE committee. He further states that the codename for the tapping operation is "Sardine" and is classified several levels above top secret, and that the information about Sweden was withheld from publication in the Guardian, The New York Times, and Pro Publica.[235][236][237] CIA, BND and the Federal Office for the Protection of the Constitution ran Projekt 6 (P6 for short) from 2005 to 2010. It's aim was to gather intelligence on suspected jihadists and terrorism supporters. An American query request for the internal database, code name PX contains the passport number, date of birth and name of German investigative journalist Peter Buchen.[238] The ACLU released a 69 page report on the FBI entitled "Unleashed and Unaccountable" detailing warrantless wiretapping, spying on political activists and journalists, biased training and racial profiling, proxy detentions in foreign countries, use of the no-fly list as a means of pressuring people to becomes informants, bulk data collection (eGuardian and bulk telephony metadata), dodging oversight and misleading the public.[239][240] The NSA purchases zero-day exploits from Vupen, as revealed in a FOIA request. In response, the CEO of Vupen suggested that a FOIA request also be made for Raytheon, and Northrop, because they also sell exploits.[241]

14 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

Media reports

Chronology

In April 2012, Snowden began downloading sensitive NSA material while working for the American computer corporation Inc..[243]

By the end of 2012, Snowden had made his first contact with journalist Glenn Greenwald of The Guardian.[244] In January 2013, Snowden contacted documentary filmmaker Laura Poitras.[245]

In March 2013, Snowden took up a new job at in , specifically to gain access to additional top-secret documents that could be leaked.[243] In April 2013, Poitras asked Greenwald to meet her in .[244]

In May 2013, Snowden was permitted temporary leave from his position at the NSA in Hawaii, on the pretext of receiving treatment for his epilepsy.[246] The Mira in Hong Kong, where On 20 May 2013, Snowden flew to Hong Kong.[247] Edward Snowden, Laura Poitras, Glenn Greenwald and Ewen MacAskill met After The Guardian's editor held several meetings in New York City, it was decided that Greenwald, together and published their first Poitras and "veteran" reporter Ewen MacAskill would fly to Hong Kong to meet Snowden. On 6 June disclosure a week later[242] 2013, the first media disclosure was published simultaneously by Greenwald (The Guardian) and Poitras (The Washington Post).[242][248]

In October 2013 The Guardian revealed that the NSA had been monitoring telephone conversations of 35 world leaders after being given the numbers by an official in another US government department. A confidential memo revealed that the NSA encouraged senior officials in such Departments as the White House, State and , to share their "Rolodexes" so the agency could add the telephone numbers of leading foreign politicians to their surveillance systems. Reacting to the news, German leader Angela Merkel, arriving in Brussels for an EU summit, accused the US of a breach of trust, saying: "We need to have trust in our allies and partners, and this must now be established once again. I repeat that spying among friends is not at all acceptable against anyone, and that goes for every citizen in Germany."[249]

Disclosures

15 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

News outlet Type of media Summary of disclosures The Guardian and the Washington Post both reported that the U.S. National Security Agency (NSA) has been monitoring Internet traffic in realtime via PRISM.[250][251] In addition, the Guardian reported that:

The NSA collected data from over 120 million Verizon subscribers (This was the very first revelation, published on 6 June)[252] The NSA collected global electronic information via Boundless Informant During the 2009 G-20 London Summit, the British intelligence agency Government Communications Headquarters (GCHQ) had intercepted the communications of foreign diplomats.[64] The GCHQ has been intercepting and storing mass quantities of fiber-optic traffic via Tempora[253] The NSA collected, from 2001 to 2011 via , vast amounts of records detailing the email and internet usage of Americans,[254] and after the program end of Stellar Wind due to operational and resource reasons other programs such as ShellTrumpet.[157] A method of bugging encrypted fax machines used at an EU embassy is codenamed Dropmire[255] Microsoft "developed a surveillance capability to deal" with the interception of encrypted chats on Outlook.com, within five months after the service went into testing. NSA had access to Outlook.com emails because “Prism collects this data prior to encryption.”[256] The Guardian revealed that XKeyscore allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals.[174][257][258] British daily The NSA paid GCHQ over £100 Million between 2009 and 2012, in exchange for The Guardian newspaper these funds GCHQ "must pull its weight and be seen to pull its weight." Documents referenced in the article explain that weaker laws regarding spying are "a selling point". GCHQ is also developing the technology to "exploit any at any time."[259] The NSA has under a legal authority a secret backdoor into its databases gathered from large Internet companies enabling it to search for US citizens' email and phone calls without a warrant.[260][261] Summary of The Guardian revelations as of 21 August 2012 regarding the NSA and GCHQ.[262] The Privacy and Oversight Board urged the U.S. intelligence chiefs to draft stronger US surveillance guidelines on domestic spying after finding that several of those guidelines have not been updated up to 30 years.[263][264] After the Foreign Secret Intelligence Court ruled in October 2011 that some of the NSA's activities were unconstitutional paid millions of dollars to cover the costs of major internet companies involved in the Prism surveillance program[265] The NSA routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens.[97][266] The NSA has been monitoring telephone conversations of 35 world leaders.[249] The U.S. government's first public acknowledgment that it tapped the phones of world leaders was reported on October 28, 2013 by the Wall Street Journal after an internal U.S. government internal review turned up NSA monitoring of some 35 world leaders.[267] The GCHQ has tried to keep its mass -surveillance programmessecret because it feared a "damaging public debate" on the scale of its activities which could lead to legal challenges against its mass-surveillance programmes.[184]

PRISM revelation, simultaneously with The Guardian.[223][268]

U.S. daily Upstream revelation.[165] The Washington Post newspaper An internal NSA audit from May 2012 identified 2776 incidents i.e. violations of the rules or court orders for surveillance of Americans and foreign targets in the U.S. in

16 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

News outlet Type of media Summary of disclosures the period from April 2011 through March 2012, while U.S. officials stressed that any mistakes are not intentional.[155][160][164][269][270][271][272] The FISA Court that is supposed to provide critical oversight of the U.S. government's vast spying programs has limited ability to do and it must trust the government to report when it improperly spies on Americans.[273] A letter drafted by the Obama administration specifically to inform Congress of the government's mass collection of Americans’ telephone communications data was withheld from lawmakers by leaders of the House Intelligence Committee in the months before a key vote affecting the future of the program.[274][275] A legal opinions declassified on August 21, 2013 revealed that the NSA intercepted for three years as many as 56,000 electronic communications a year of Americans who weren’t suspected of having links to terrorism, before FISC court that oversees surveillance found the operation unconstitutional in 2011.[124][125][126][127][128] By the Corporate Partner Access Project for major U.S. telecommunications providers these providers receive hundreds of millions of dollars a year from the NSA for for clandestine access to their communications networks and filtering vast traffic flows for foreign targets.[172] The NSA's Office of Tailored Access Operations (TAO) collects intelligence on foreign targets by "hacking into their computers and telecommunications systems, cracking passwords, compromising the computer security systems protecting the targeted computer, stealing the data stored on computer hard drives, and then copying all the messages and data traffic passing within the targeted email and text-messaging systems", in a process known as 'computer network exploitation' (CNE).[276] In an effort codenamed GENIE, computer specialists can control foreign computer networks using "covert implants,” a form of remotely transmitted malware on tens of thousands of devices annually.[277][278][279][280] The NSA collected in 2010 data on ordinary Americans’ cellphone locations, but later discontinued it because it had no “operational value.”[281] The NSA is harvesting hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world.[282][283][284][285][286][287]

U.S. Law-enforcement agencies use tools used by computer hackers to gather information on suspects.[288][289] The NSA has built a surveillance network that has the capacity to reach roughly U.S. international 75% of all U.S. Internet traffic.[166][290][291] The Wall Street Journal daily newspaper Even if there is no reason to suspect U.S. citizens the CIA's National Counterterrorism Center is allowed to examine the government files of for possible criminal behavior. Previously the NTC was barred to do so, unless a person was a terror suspect or related to an investigation.[292]

The N.S.A. is not just intercepting the communications of Americans who are in direct contact with foreigners targeted overseas, but also searching the contents of vast amounts of e-mail and text communications into and out of the country by U.S. international Americans who mention information about foreigners under surveillance.[293] The New York Times daily newspaper The N.S.A. uses the analysis of phone call and e-mail logs of American citizens to create sophisticated graphs of their social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information.[294]

US intelligence analysts have deliberately broken rules designed to prevent them U.S. international from spying on Americans by choosing to ignore so-called "minimisation news agency procedures" aimed at protecting privacy[295][296][297]

17 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

News outlet Type of media Summary of disclosures During specific episodes within a four-year period, the NSA hacked: Several Chinese mobile-phone companies[298] South China Morning Post newspaper based The Chinese University of Hong Kong and Tsinghua University in Beijing[299] in Hong Kong The Asian fiber-optic network operator Pacnet[300]

Documents provided by Edward Snowden and seen by Der Spiegel revealed that the NSA spied on various diplomatic missions of the European Union (EU), including:

The EU's delegation to the United States in Washington D.C.[89] The EU's delegation to the United Nations in New York[89] The Council of the European Union in Brussels[89] The United Nations Headquarters in New York[90] The NSA hacked the French foreign ministry and bugged the French diplomatic offices in Washington and New York.[178]

Only Australia, Canada, New Zealand and the UK are explicitly exempted from NSA attacks, whose main target in the EU is Germany.[301]

Snowden also confirmed that was cooperatively developed by the United States and Israel.[302]

The NSA gave the German intelligence agencies BND and BfV access to X-Keyscore.[94] In return, the BND turned over copies of two systems named Mira4 and Veras, reported to exceed the NSA's SIGINT capabilities in certain areas.[93] The NSA also provided the BND with analysis tools so that the BND can monitor foreign data streams flowing through Germany.[303][304]

The BND is providing the NSA metadata collected from German systems. In December 2012 alone, Germany provided the NSA with 500 million metadata records.[305][306][307] German news Der Spiegel The US runs a top-secret surveillance program, code name Special Collection Service, magazine based in over 80 consulates and embassies worldwide, including Frankfurt Germany and Vienna, .[90] The NSA hacked the United Nations' video conferencing system in Summer 2012 in violation of a UN agreement.[90]

The NSA spied on the EU embassies in New York and Washington, code names Apalachee and Magothy. It deployed listening devices, copied hard drives and hacked internal networks.[90]

The NSA spied on the Al Jazeera and gained access to its internal communications systems.[308]

A NSA branch called "Follow the Money" (FTM) widely monitors international payments, banking and credit card transactions and later stores the collected data in the NSA's own financial databank "".[309]

The NSA monitored the president's public email account of former Mexican president Felipe Calderón (thus gaining access to the communications of high ranking cabinet members), the E-Mails of several high-ranking members of Mexico's security forces and text and the mobile phone communication of current Mexican president Enrique Peña Nieto.[310][311]

The mobile phone of German Chancellor Angela Merkel might have been tapped by US intelligence.[312][313][314][315][316][317] According to the Spiegel this monitoring goes back to 2002[318][319][320] and ended in the summer of 2013,[267] while the New York Times reported that Germany has evidence that the NSA's surveillance of Merkel began during George W. Bush's tenure.[321]

The NSA spied on millions of emails and calls of Brazilian citizens.[322][323] Australia and New Zealand have been aiding the United States in their surveillance Brazilian O Globo and Globo program.[324][325] newspaper; Network The National Security Agency directly targeted the communications of president television network Dilma Rousseff and her top aides.[326] The NSA spied on Brazil's oil firm Petrobras as well as French diplomats and gained

18 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

News outlet Type of media Summary of disclosures access to the private network of the Ministry of Foreign Affairs of France and the SWIFT network.[327] Canada's Communications Security Establishment used a software program called Olympia to the Brazil's Mines and Energy Ministry communications by targeting "metadata" of phone calls and emails from and to the Brazilian ministry.[328][329]

British Government Communications Headquarters is collecting all data transmitted to and from the United Kingdom and Northern Europe via the undersea fibre optic telecommunications cable SEA-ME-WE 3. Singaporean intelligence co-operates with The Sydney Morning Australian Australia in accessing and sharing communications carried by the SEA-ME-WE-3 cable. The Herald newspaper Australian Signals Directorate, is also in a partnership with British, American and Singaporean intelligence agencies to tap undersea fibre optic telecommunications cables that link Asia, the Middle East and Europe and carry much of Australia's international phone and internet traffic.[100] Australian news * The Australian Federal Government knew about the internet spying program PRISM ABC News (Australia) service months before Edward Snowden made details public.[330][331] Documents leaked by Edward Snowden and jointly disclosed by Süddeutsche Zeitung (SZ) and Norddeutscher Rundfunk revealed that several telecom operators have played a key role in helping the British intelligence agency Government Communications Headquarters (GCHQ) tap onto worldwide fiber-optic communications.[332][333] The telecom operators are:

Verizon Business (codenamed "Dacron")[334] British Telecommunications (codenamed "Remedy")[334] Vodafone Cable (codenamed "Gerontic")[334] Global Crossing (codenamed "Pinnage")[334] Level 3 (codenamed "Little")[334] Viatel (codenamed "Vitreous")[334] Süddeutsche Zeitung German newspaper Interoute (codenamed "Streetcar")[334]

Each of them were assigned a particular area of the international fiber-optic network for which they were individually responsible. The following networks have been infiltrated by the GCHQ:

TAT-14 (Europe-USA)[103] Atlantic Crossing 1 (Europe-USA)[103] Circe South (France-UK)[103] Circe North (The Netherlands-UK)[103] Flag Atlantic-1[103] Flag Europa-Asia[103] SEA-ME-WE 3 (-Middle East-Western Europe)[103] [103] Norddeutscher Rundfunk Public broadcaster SEA-ME-WE 4 (Southeast Asia-Middle East-Western Europe) Solas (Ireland-UK)[103] UK-France 3[103] UK-Netherlands 14[103] ULYSSES (Europe-UK)[103] Yellow (UK-USA)[103] Pan European Crossing[103]

Telecommunication companies who participated were "forced" to do so and had "no choice in the matter".[103] Some of the companies were subsequently paid by GCHQ for their participation in the infiltration of the cables.[335] According to the SZ the GCHQ has access to the majority of internet and telephone communications flowing throughout Europe, can listen to phone calls, read emails and text messages, see which websites internet users from all around the world are visiting.[334] It can also retain and analyse nearly the entire european internet traffic.[333]

Germany's domestic security agency Bundesverfassungsschutz transmitted regularly informations of persons monitored in Germany to the NSA, CIA and seven

19 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

News outlet Type of media Summary of disclosures other members of the US Intelligence community in exchange for information and espionage software.[336][337][338]

French intelligence agencies are cooperating under the codename "" with the Five Eyes alliance by systematically providing them with information after France signed a cooperation treaty with the alliance. Israel, Sweden and Italy are also cooperating with American and British intelligence agencies.[339]

The Guardian and the New York Times reported on secret documents leaked by Snowden independent showing that the NSA has been in "collaboration with technology companies" as part of Pro Publica, The Guardian journalists; British "an aggressive, multipronged effort" to weaken the encryption used in commercial and The New York Times and American daily software, that the GCHQ has a team dedicated to cracking "Hotmail, Google, Yahoo and newspapers Facebook" traffic, and other revelations.[162][340][341][342][343][344] * The NSA targeted in France both people suspected of association with terrorist activities as well as people belonging to the worlds of business, politics or French state administration. The NSA monitored and recorded the content of telephone French daily communications and the history of the connections of each target i.e. the metadata. Le Monde [345][346] newspaper

Le Monde also disclosed new PRISM and Upstream slides (See Page 4, 7 and 8) coming from the "PRISM/US-984XN Overview" presentation.[347]

Fallout

Shortly after the disclosures were published, US President Barack Obama asserted that the American public had no cause for concern because "nobody is listening to your telephone calls",[348] and "there is no spying on Americans".[349]

On 21 June 2013, the Director of National Intelligence James R. Clapper issued an apology for

giving false testimony under oath to the , which is a felony under 18 USC s. 1001. Earlier in March that year, Clapper was asked by Senator Ron Wyden to clarify the alleged surveillance of U.S. citizens by the NSA:

Senator Wyden: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" U.S. President Barack Obama on the importance of surveillance: "... They help [350] Director Clapper: "No, Sir." us prevent terrorist attacks. And the modest encroachments on the privacy that are involved in getting phone numbers or In an interview shortly after Snowden's disclosures were first published, Clapper stated that he had duration without a name attached and not misunderstood Wyden's question and answered in what he thought was the "least untruthful looking at content, that on net, it was manner".[351] Later, in his letter of apology, Clapper wrote that he had only focused on Section 702 worth us doing ..." of the Foreign Intelligence Surveillance Act during his testimony to Congress, and therefore, he "simply didn't think" about Section 215 of the Patriot Act, which justifies the mass collection of telephone data from U.S. citizens.[352] Clapper said: "My response was clearly erroneous—for which I apologize".[352]

To increase transparency and because it is in the public interest the Director of National Intelligence authorized the declassification and public release of the following documents pertaining to the collection of telephone metadata pursuant to Section 215 of the PATRIOT Act on 31 July 2013.[353] These documents were:

1. Cover Letter and 2009 Report on the National Security Agency’s Bulk Collection Program for USA PATRIOT Act Reauthorization[354] 2. Cover Letters and 2011 Report on the National Security Agency's Bulk Collection Program for USA PATRIOT Act Reauthorization[355] 3. Primary Order for Business Records Collection Under Section 215 of the USA PATRIOT Act[356]

In a press conference on 9 August 2013 President Obama announced four steps to reform U.S. intelligence gathering measures, to increase transparency and restore public trust in surveillance by NSA, but made no indication to alter the NSA's ongoing mass collection of phone data and surveillance of internet communications in the short term.[357][358] These four steps are:[359][360][361]

1. Reform Section 215 of the Patriot Act which allows the National Security Agency to collect telephone data from millions of communications without a warrant.[359]

20 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

2. More transparency: Declassification of the legal rationale for the US government's phone-data collection,[171][362][363][364] release of NSA information that details its mission, authorities, and oversight,[170][171][365] installation of a "civil liberties and privacy officer" at the National Security and a website created by the American intelligence community to inform Americans and the world what the intelligence community does and what it doesn’t do, how it carries out its mission, and why it does so.[359] 3. More balance between security and privacy at the Federal Intelligence Surveillance Court by appointing an adversarial voice – such as a lawyer assigned to advocate privacy rights[366] – to argue against the US government to ensure to make sure civil liberties concerns have an independent voice in appropriate cases.[359] 4. Review of all US government intelligence and communications technologies by a group of external experts (composed of former intelligence officials, civil liberties and privacy advocates, and others)[366] which shall provide an interim report in 60 days and a final report by the end of 2014 outlining how the US government can maintain the trust of the people, how it can make sure that there absolutely is no abuse in terms of how surveillance technologies are used and how surveillance impacts US foreign policy.[359] Director of National Intelligence James R. Clapper has been directed on 13 August 2013 to form and review the new Review Group on Intelligence and Communications Technologies, which is to brief Obama on its interim findings within 60 days of the establishment of the group. A final report and recommendations are to be submitted through Clapper to the president no later than 15 December 2013.[365][367][368] The group's purpose is to assess whether the US "employs its technical collection capabilities in a manner that optimally protects our national security and advances our foreign policy while appropriately accounting for other policy considerations, such as the risk of unauthorized disclosure and our need to maintain the public trust."[369]

In a reaction to Obama above reform proposals responsible for overseeing the program which collects Americans’ telephone communications data in bulk say that they felt in recent years limited in their ability to challenge its scope and legality. They pointed out to intelligence officials who would not volunteer details if questions were not asked with absolute precision in regular meetings; hearing only from government officials steeped in the legal and national security arguments for aggressive spying; and House members must rely on the existing committee staff, many of whom used to work for the spy agencies they are tasked with overseeing, while Senate Intelligence Committee members can each designate a full-time staffer for the committee who has full access. Additional obstacles stemmed from the classified nature of documents, which lawmakers may read only in specific, secure offices; rules require them to leave their notes behind and restrict their ability to discuss the issues with colleagues, outside experts or their own staff.[370]

On 12 August 2013, President Obama announced the creation of an "independent" panel of "outside experts" to review the NSA's surveillance programs. The panel is due to be established by the Director of National Intelligence, James R. Clapper, who will consult and provide assistance to them.[371] The "independent" panel of "outside experts" is composed of intelligence insiders, former White House officials and Obama advisers, who did not discuss any changes to the National Security Agency's controversial activities at its first meeting.[372]

On 19 July 2013, Human Rights Watch sent a letter to the Obama administration, urging it to allow companies involved in the NSA's surveillance to report about these activities and to increase government transparency.[373]

On 18 August 2013, Amnesty International asserted that if journalists maintain their independence and report critically about governments, they too may be "targeted" by the British government.[374]

On 20 August 2013, Index on Censorship argued that the British government's "threat of legal action" against The Guardian was a "direct attack on press freedom in the UK".[375]

On 4 September 2013, U.N. Special Rapporteur Frank La Rue stressed that the "protection of national security secrets must never be used as an excuse to intimidate the press into silence."[376]

Attempts to minimize perceived damage

Press censorship: British government officials issued a confidential DA-Notice to several press organizations, with the aim of restricting their ability to report on these leaks.[377] According to the U.S. Army, its decision to block The Guardian website was based upon the need to prevent service personnel from accessing press coverage and online content related to these disclosures.[378]

Detention without charge: On 18 August 2013, David Miranda, partner of journalist Glenn Greenwald, was detained under Schedule 7 of the United Kingdom's Terrorism Act of 2000. Miranda was returning from Berlin, carrying 58,000 GCHQ documents on a single computer file[379] to Greenwald in Brazil. Greenwald described Miranda's detention as "clearly intended to send a message of intimidation to those of us who have been reporting on the NSA and GCHQ".[380][381][382][383] The Metropolitan Police and Home Secretary Teresa May argued that Miranda's detention "legally and procedurally sound".[384] However, Lord Falconer of Thoroton, responsible for introducing the bill in the House of Lords, said that under the act, police can only detain someone "to assess whether they are involved in the commission, preparation or instigation of terrorism". He said "I am very clear that this does not apply, either on its terms or in its spirit, to Mr Miranda."[385] Antonio Patriota the Brazilian Minister of External Relations said that Miranda's detention was "not justifiable". The reasons for Miranda's detention were sought from the police by British politicians and David Anderson QC, the independent reviewer of terrorism legislation.[386] The United States government later said that British officials had given them a "heads up" about Miranda's detention, while adding that the decision to detain him had been a British one.[386]

Destruction of evidence: Guardian editor said the newspaper had received legal threats from the British government and was urged to surrender all documents leaked by Snowden. Security officials from the Government Communications Headquarters (GCHQ) later made a visit to the newspaper's London headquarters to ensure that all computer hard drives containing Snowden's

21 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

documents were destroyed.[384][387]

Editing of interview transcript: After the NSA Director of Compliance John Delong was interviewed by The Washington Post regarding these disclosures, the White House sent a "prepared" statement to The Post and ordered that "none of Delong's comments could be quoted on the record". The Post refused to comply.[388][389]

Forced landing of Morales' plane: Five Latin American countries – , Cuba, , Nicaragua and Venezuela – voiced their concerns to the UN Secretary-General Ban Ki-Moon after the plane of Bolivia's President was denied entry by a number of western European countries, and was forced to reroute to Austria based on "suspicion that United States whistleblower Edward Snowden was on board".[390] Ban said it was important to prevent such incidents from occurring in the future and emphasized that "A Head of State and his or her aircraft enjoy immunity and inviolability".[390]

US Congress' attempts to limit NSA

In response to the information released by Snowden, Rep. Justin Amash (R-Mich.) and Rep. (D-Mich.) proposed the "Amash- Coyers Amendment" to the National Defense Authorization Act.[391] If passed, the amendment would have curtailed "the ongoing dragnet collection and storage of the personal records of innocent Americans." The House rejected the amendment by a vote of 205–217.[392] An analysis indicated that those who voted against the amendment received 122% more in campaign contributions from defense contractors than those who voted in favor.[393]

In September 2013, Senators , Richard Blumenthal, and Ron Wyden introduced a "sweeping surveillance reform" proposal.[394] Called the most comprehensive proposal to date, the "Intelligence Oversight and Surveillance Reform Act" seeks to end the bulk collection of communication records made legal in section 215 of the Patriot Act and to reign in other "electronic eavesdropping programs".[395] Wyden told the Guardian the Snowden disclosures have "caused a sea change in the way the public views the surveillance system". The draft bill is a blend of 12 similar proposals as well as other legislative proposals.[396]

Impact on foreign relations

The media leaks caused tension in the bilateral relations of the United States with several of its allies and economic partners as well as in its relationship with the European Union:

Brazil

The Brazilian government expressed outrage at the revelations that the National Security Agency directly targeted the communications of president Dilma Rousseff and her top aides.[326] It called the incident an "unacceptable violation of sovereignty" and requested an immediate explanation from the U.S. government.[397]

Brazil's government signaled it would consider cancelling Rousseff's state visit to Washington – the only state visit for a foreign leader scheduled this year.[398] A senior Brazilian official stated the country would downgrade commercial ties unless Rousseff receives a public apology.[398] That would include ruling out the $4 billion dollar purchase of Boeing F-18 Super Hornet fighters and cooperation on oil and biofuels technology, as well as other commercial agreements.[398]

China

According to Huang Chengqing, Director of China's Computer emergency response team, about 2.91 million mainframe computers in China have been hijacked by more than 4,000 servers based in the United States.[399] On 17 June 2013, two weeks after the first disclosure was published, a spokesman for the Chinese Foreign Ministry said:

"We believe the United States should pay attention to the international community's concerns and demands and give the international community the necessary explanation"[400]

France

On 21 October, 2013, France summoned Charles Rivkin, the U.S. Ambassador to France, to clarify and explain the NSA's surveillance of French citizens.[401] Speaking to journalists in the French seaport of Lorient, President François Hollande said:

"We cannot accept this kind of behaviour between partners and allies...We ask that this immediately stop."[402]

Germany

On 1 July 2013, the German Foreign Ministry summoned Philip D. Murphy, the U.S. Ambassador to Germany, over allegations that the NSA had spied on institutions of the European Union.[403] On 24 October 2013, the Foreign Ministry summoned John B. Emerson, the U.S. Ambassador to Germany, to clarify allegations that the NSA had tapped into Chancellor Angela Merkel’s mobile phone.[404][405]

In early August 2013, Germany canceled largely symbolic Cold War-era administrative agreements with Britain, the United States and France, which had granted the Western countries which had troops stationed in the right to request surveillance operations to protect those forces.[406]

At the end of August 2013, on orders of the German domestic intelligence agency, a federal police helicopter conducted a low-altitude flyover of the United States Consulate in Frankfurt, apparently in search of suspected clandestine eavesdropping facilities. A German official called it a

22 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

symbolic "shot across the bow."[407]

Italy

Italy's Prime Minister Enrico Letta asked , the U.S. Secretary of State, to clarify if the NSA had illegally intercepted telecommunications in Italy.[408] On 23 October 2013, the Italian Interiro Minister Angelino Alfano told reporters in Rome:

"We have a duty to (provide) clarity to Italian citizens - we must obtain the whole truth and tell the whole truth, without regard for anyone."[409]

Mexico

On 24 October 2013, the Mexican Foreign Minister José Antonio Meade Kuribreña met with U.S. Ambassador Earl Anthony Wayne to clarify surveillance details revealed by Snowden.[410]

Spain

On 25 October 2013, the Spanish Prime Minister Mariano Rajoy summoned James Costos, the U.S. Ambassador to Spain, to clarify reports about the NSA's surveillance of the Spanish government.[411] Spanish EU Minister, Inigo Mendez de Vigo, said such practices, if true, were "inappropriate and unacceptable". An EU delegation was to meet officials in Washington to convey their concerns.[412]

European Union

Early July 2013, the European Commissioner for Home Affairs, Cecilia Malmström, wrote to 2 US officials that "mutual trust and confidence have been seriously eroded and I expect the U.S. to do all that it can to restore them".[413]

On 20 October 2013, a committee at the European Parliament backed a measure that, if enacted, would require American companies to seek clearance from European officials before complying with United States warrants seeking private data. The legislation has been under consideration for two years. The vote is part of efforts in Europe to shield citizens from online surveillance in the wake of revelations about a far-reaching spying program by NSA.[414]

The European Council meeting at the end of October 2013 in its statement signed by all 28 EU leaders while stressing that "intelligence gathering is a vital element in the fight against terrorism" and noting "the close relationship between Europe and the USA and the value of that partnership", said that this must "be based on respect and trust," a lack of which "could prejudice the necessary cooperation in the field of intelligence gathering".[415][416]

Impact on trade

Late October 2013 There has been a notable dropoff of computer hardware and analytic software in the Chinese market. [2] (http://www.testosteronepit.com/home/2013/10/17/nsa-revelations-kill-ibm-hardware-sales-in-china.html) This has been highly attributed to the Snowden document releases, not market saturation or downticks.

Perceived consequences for counter-terrorism and national security

Late June 2013, Keith B. Alexander, the director of the NSA, asserted that these media leaks had caused "significant" and "irreversible" damage to the national security of the United States and this "irresponsible" release of will have a "long-term detrimental" impact on the intelligence community's ability to detect future attacks. Furthermore, these leaks have "inflamed and sensationalized" the work that the intelligence community does lawfully under "strict oversight and compliance".[417]

In early October 2013, former GCHQ director Sir , speaking of how useful for Russia's intelligece services Snowden's stay in Russia could be, told the BBC: "Part of me says that not even the KGB in its heyday of Philby, Burgess and Maclean in the 1950s could have dreamt of acquiring 58,000 highly classified intelligence documents."[418] Snowden stated that he had not leaked any documents to Russia.[419]

Andrew Parker, the director general of the UK Security Service maintained in October 2013 that the exposing of intelligence techniques had given extremists the ability to evade the intelligence agencies; he said,"It causes enormous damage to make public the reach and limits of GCHQ techniques. Such information hands the advantage to the terrorists. It is the gift they need to evade us and strike at will."[420]

Shortly afterwards, The editorialised that security chiefs were "right to be alarmed, knowing that terrorists can change their modus operandi in response to new information on their capabilities" and there was "no firm evidence that the intelligence agencies are using these new collection capabilities for malign ends."[379] Reaction

United States of America

Executive branch

In early June 2013, the U.S. Director of National Intelligence, James R. Clapper, referring to the surveillance activities reported in The Washington Post and Guardian shortly prior, stressed that those were lawful and conducted under authorities approved by the US Congress and that "significant misimpressions" had resulted from those articles; he called the disclosures of "intelligence community measures used to keep Americans safe" "reckless".[421] He condemned the leaks as having done "huge, grave damage" to the U.S. intelligence capabilities.[422] The

23 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

NSA formally requested that the Department of Justice launch a criminal investigation into Snowden's actions.[421]

On June 14, 2013, US federal prosecutors filed a sealed complaint, made public on June 21,[423] charging Snowden with theft of government property, unauthorized communication of national defense information, and willful communication of classified intelligence to an unauthorized person; the latter two charges being under the Espionage Act.[424]

In June 2013, the U.S. military blocked access to parts of the Guardian website related to government surveillance programs for thousands of defense personnel across the country, and to the entire Guardian website for personnel stationed in Afghanistan, the Middle East, and .[425][426] A spokesperson described the filtering as a routine "network hygiene" measure intended to mitigate unauthorized disclosures of classified information onto the Department of Defense's [DOD] unclassified networks.[425]

On Sunday, August 4, Chairman of the was shown on the weekly ABC interview show This Week saying that Snowden "has caused us some considerable damage to our intelligence architecture. Our adversaries are changing the way that they communicate."[427]

United States President Barack Obama was dismissive of Snowden in late June, saying, "I'm not going to be scrambling jets to get a 29-year-old hacker."[428][429] In early August, Obama said that Snowden was no patriot and that Americans would have been better off if they had remained unaware of the NSA surveillance activities that Snowden revealed.[430] Obama also said that he had "called for a thorough review of our surveillance operations before Mr. Snowden made these leaks.... My preference, and I think the American people's preference, would have been for a lawful, orderly examination of these laws; a thoughtful fact-based debate that would then lead us to a better place."[430] On August 9, Obama announced that he was ordering Director of National Intelligence to arrange for "a high-level group of outside experts to review our entire intelligence and communications technologies.”[431][432] Director of National Intelligence James Clapper acknowledged that Snowden may have done a public service and started a needed debate about the balance between privacy and security. “As loath as I am to give any credit for what’s happened here, which was egregious, I think it’s clear that some of the conversations that this has generated, some of the debate, actually probably needed to happen,” he said, “It’s unfortunate they didn’t happen some time ago, but if there’s a good side to this, that’s it.”[433][434]

Congress

Reactions to Snowden's disclosures among members of Congress initially were largely negative.[435] Speaker of the House [436] and senators [437] and Bill Nelson[438] called Snowden a traitor, and several senators and representatives joined them in calling for Snowden's arrest and prosecution.[437][439][440]

Representative was one of few members of Congress to question the constitutional validity of the government surveillance programs and suggest that Snowden should be granted immunity from prosecution.[441] Senators Ted Cruz[442] and Rand Paul[443] offered tentative support for Snowden, saying they were reserving judgment on Snowden until more information about the surveillance programs and about Snowden's motives were known. Senator Paul said, "I do think when history looks at this, they are going to contrast the behavior of James Clapper, our National Intelligence Director, with Edward Snowden. Mr. Clapper lied in Congress in defiance of the law, in the name of security. Mr. Snowden told the truth in the name of privacy."[444] Paul later called Snowden a "civil disobedient", like Martin Luther King Jr., but who faced life imprisonment.[445] Representative John Lewis made comparisons between Snowden and Gandhi, saying the leaker was appealing to a "higher law".[446]

Senator Bill Nelson, "What Edward Snowden did amounts to an act of ."[447] Similar comments have also been made by Rep. Peter T. King, Rep. John Boehner, and Sen. Dianne Feinstein.[448]

On July 25, the US Senate Committee on Appropriations unanimously adopted an amendment by Senator to the " 2014 Department of State, Foreign Operations, and Related Programs Appropriations Bill"[449] that would seek sanctions against any country that offers asylum to Snowden.[450][451][452]

In response to the information release by Snowden, Rep. Justin Amash (R-Mich.) and Rep. John Conyers (D-Mich.) proposed an amendment to the National Defense Authorization Act[453] to curtail the NSA gathering and storage of the personal records, but the House rejected it by a narrow margin of 205–217.[454] Amash subsequently told that Snowden was "a whistle-blower. He told us what we need to know."[455]

On the Sunday ABC interview show This Week, Rep. , D-, of the United States House Select Committee on Intelligence was asked by Raddatz, "Are efforts being thwarted in trying to get information for members of Congress?" He replied,

"...[S]ince this incident occurred with Snowden, we've had three different hearings for members of our Democratic Caucus, and the Republican Caucus, where General Alexander has come with his deputy, Chris Inglis, to ask any questions that people have as it relates to this information. And we will continue to do that because what we're trying to do now is to get the American public to know more about what's going on....But we can do better. I have to educate my caucus more, the Democratic Caucus. And we're trying to declassify as much as we can."[456]

U.S. Senator John McCain (R-AZ) said on the August 11 edition of Fox News Sunday that Snowden had become a hero to young Americans, as he reminded them of the Jason Bourne character. McCain attributed it to generation change and a lack of confidence in the federal government. "Right now there's kind of a generational change," he said. "Young Americans do not trust this government."[457]

Gordon Humphrey, the conservative Republican senator for New Hampshire from 1979–1991, expressed support for Snowden.[458] Glenn Greenwald revealed that Humphrey, a former member of the Senate Foreign Relations Committee, had been in contact with Snowden via email. Humphrey told Snowden, "Provided you have not leaked information that would put in harms way any intelligence agent, I believe you have done the right thing in exposing what I regard as massive violation of the United States Constitution."[459] Humphrey cited Snowden as a "courageous whistle-blower".[460]

24 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

Tom McClintock (R-Calif) came out in favor of amnesty for Snowden, saying "I think it would be best if the American government granted him amnesty to get him back to America where he can answer questions without the threat of prosecution... We have some very good laws against sharing secrets and he broke those laws. On the other hand, he broke them for a very good reason because those laws were being used in direct contravention of our 4th Amendment rights as Americans."[461]

Public

Polls conducted by news organisations following Snowden's disclosures about government surveillance programs to the press indicated that American public opinion on Snowden's actions was divided. A poll conducted June 10–11, 2013 showed 44 percent of Americans thought it was right for Snowden to share the information with the press while 42 percent thought it was wrong.[462] A USA Today/Pew Research poll conducted June 12–16 found that 49 percent thought the release of information served the public interest while 44 percent thought it harmed it. The same poll found that 54 percent felt a criminal case should be brought against Snowden, while 38 percent thought one should not be brought,[463][464] while a Washington Post/ABC News poll conducted between the same dates as the Pew poll cited 43 percent of respondents saying Snowden ought to be charged with a crime, while 48 percent said he ought not.[465] Another poll in early July found 38 percent of Americans thought he did the wrong thing, 33 percent said he did the right thing, and 29 percent were unsure.[466] A WSJ/NBC poll conducted July 17–21 found that 11% of Americans viewed Snowden positively while 34% had a negative view.[467] A Quinnipiac University Polling Institute poll conducted June 28 – July 8 found that in the wake of Snowden's disclosures, more Americans said that government goes too far in restricting civil liberties as part of the war on terrorism (45 percent) than said that government does not go far enough to adequately protect the country (40 percent).[468] That finding was evidence of a massive swing in public opinion since an earlier Quinnipiac poll, conducted in 2010, when only 25 percent of respondents had said government goes too far in restricting civil liberties while 63 percent had said government does not go far enough. The same poll found that 55 percent of Americans regarded Snowden as a whistleblower while 34 percent saw him as a traitor.[468] Quinnipiac showed that a majority of Americans, by a wide margin, still regarded Snowden as a whistleblower rather than a traitor when it repeated the poll July 31 – August 1.[469]

After the June 2013 release, mass protests against government surveillance were reported in many parts of the world. In the United States, a political movement known as "Restore the Fourth" was formed and it gained momentum rapidly. In early July, Restore the Fourth was responsible for protests in more than 80 cities including , , Denver, Chicago, Los Angeles and New York City. These protests were loosely coordinated via online messaging services and involved protestors from all over the United States.[470] Towards the end of July, it was reported in the media that the German intelligence agency BND had been actively cooperating with the NSA, which sparked demonstrations in 40 German cities involving thousands of protestors all over the country.[471]

On 26 October 2013, an anti-NSA rally in Washington, D.C. supported by a diverse coalition of over 100 advocacy groups attracted thousands of protestors calling for an end to mass surveillance.[472] Many marchers carried signs saying "Thank you, Edward Snowden". In a statement written by Snowden and read to the crowd, Snowden said, "This isn't about red or blue party lines, and it definitely isn't about terrorism. It's about being able to live in a free and open society."[473]

Glenn Greenwald, one of the journalists who received the documents, praised Snowden for having done a service by revealing the surveillance on the American public.[474][475] John Cassidy, also of , called Snowden "a hero", and said that "in revealing the colossal scale of the US government's eavesdropping on Americans and other people around the world, [Snowden] has performed a great public service that more than outweighs any breach of trust he may have committed."[476] CNN columnist Douglas Rushkoff also called Snowden's leak an act of heroism.[477] Amy Davidson, writing in The New Yorker, was thankful for the "overdue" conversation on privacy and the limits of domestic surveillance.[478]

American political commentators and public figures such as ,[479] Chris Hedges,[480] ,[481] Cornel West,[482] Glenn Beck,[481] Matt Drudge,[483] Alex Jones,[484] Andrew Napolitano,[485] ,[486] Michael Savage,[487] and [488] praised Snowden for exposing secret government surveillance.

Other commentators were more critical of Snowden's methods and motivations.[489] Jeffrey Toobin, for example, denounced Snowden as "a grandiose narcissist who deserves to be in prison."[490] Writing in the The New Yorker, Toobin argued that the programs exposed were not illegal, therefore Snowden was not a whistleblower. Further, Toobin questioned "whether the government can function when all of its employees (and contractors) can take it upon themselves to sabotage the programs they don’t like".[490]

Former Vice President , suggested in June 2013 that Snowden might be a spy working for the Chinese government.[491]

Stewart Baker, a former NSA general counsel in the early 1990s, said at a July 18, 2013 hearing, "I am afraid that hyped and distorted press reports orchestrated by Edward Snowden and his allies may cause us – or other nations – to construct new restraints on our intelligence gathering, restraints that will leave us vulnerable to another security disaster."[492]

Former CIA and NSA chief General Michael Hayden in late June 2013 welcomed the public debate about the balance between privacy and security that the leaks had provoked: "I am convinced the more the American people know exactly what it is we are doing in this balance between privacy and security, the more they know the more comfortable they will feel."[493][494] In September 2013, Hayden stressed the indisputable legality of "what the NSA is doing" and called Snowden a "troubled young man", albeit "morally arrogant to a tremendous degree"; he also said about his prospects in Russia: "I suspect he will end up like most of the rest of the defectors who went to the old Soviet Union: Isolated, bored, lonely, depressed -- and most of them ended up alcoholics."[495]

Some former U.S. intelligence officials speculated that Chinese or Russian intelligence agents might have gleaned additional classified material from Snowden,[496][497][498] a view shared by some former Russian agents.[499] Snowden, however, told Greenwald in July that "I never gave any information to either government, and they never took anything from my laptops."[500]

In late June 2013, Former US President said: "He's obviously violated the laws of America, for which he's responsible, but I think the invasion of human rights and American privacy has gone too far ... I think that the secrecy that has been surrounding this invasion of

25 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

privacy has been excessive, so I think that the bringing of it to the public notice has probably been, in the long term, beneficial."[501]

The editors of Bloomberg News argued that, while the government ought to prosecute Snowden, the media's focus on Snowden took attention away from issues of U.S. government surveillance, the interpretations of the Patriot Act, and the Foreign Intelligence Surveillance Act (FISA) court actions, all of which are "what really matters in all this."[502] Greenwald accused the media in the U.S. of focusing on Edward Snowden instead of on wrongdoing by Clapper and other U.S. officials.[503] In an op-ed, author Alex Berenson argued that the federal government should have flown a representative to Hong Kong to ask Snowden to give testimony in front of the U.S. Congress and offer him a fair criminal trial, with a view to preventing further unintended disclosures of classified information to other countries.[504]

On June 9, a We the People petition was launched on the whitehouse.gov website to seek "a full, free, and absolute for any crimes [Snowden] has committed or may have committed related The petition to pardon Snowden at the to blowing the whistle on secret NSA surveillance programs". The petition attained 100,000 White House website signatures within two weeks, thus meeting the threshold and requiring an official response from the White House.[505] In October 2013, the Administration still had not responded to the petition, but gave no excuse for the four month delay.[506][507]

On August 8, 2013, , a Texas-based secure email service provider reportedly used by Snowden, abruptly announced it was shutting down operations after nearly 10 years of business.[508] The owner, Ladar Levison, posted a statement online saying he would rather go out of business than "become complicit in crimes against the American people."[508] He also said that he was barred by law from disclosing what he had experienced over the preceding 6 weeks, and that he was appealing the case in the U.S. Fourth Circuit Court of Appeals.[508] Multiple sources speculated that the timing of the statement suggested that Lavabit had been targeted by the US government in its pursuit of information about Snowden.[508][509][510][511][512] The following day, a similar email service, Silent Circle, preemptively shut down in order to "prevent spying".[513] Snowden said about the Lavabit closure, "Ladar Levison and his team suspended the operations of their 10-year old business rather than violate the Constitutional rights of their roughly 400,000 users. The President, Congress, and the Courts have forgotten that the costs of bad policy are always borne by ordinary citizens, and it is our job to remind them that there are limits to what we will pay." He said that "internet titans" like Google should ask themselves why they weren't "fighting for our interests the same way small businesses are".[514]

Europe

Governments

British Foreign Minister William Hague admitted that Britain's GCHQ was also spying and collaborating with the NSA, and defended the two agencies' actions as "indispensable."[515][516][517] Meanwhile, UK Defence officials issued a confidential DA-Notice to British media asking for restraint in running further stories related to surveillance leaks including the PRISM programme and the British involvement therein.[518]

Documents from Snowden show that cooperation between Berlin and Washington in the area of digital surveillance and defense intensified considerably during time of Chancellor Merkel. The Bundesnachrichtendienst (BND), the foreign intelligence agency of Germany, is directly subordinated to the Chancellor's Office. Although Merkel denied knowing about surveillance, Germans take the claims seriously. According to Hansjörg Geiger, former head of the BND, findings/claims are Orwellian and mutual political and economic espionage would be explicitly forbidden.[519]

In the European Parliament, the Greens–European Free Alliance and European United Left–Nordic Green Left nominated Snowden for the 2013 Sakharov Prize for Freedom of Thought, which includes €50,000.[520][521]

Public

An opinion poll carried out by Emnid at the end of June revealed that 50% of Germans consider Snowden a hero, and 35% would hide him in their homes.[522]

Jürgen Trittin a German Green politician wrote in The Guardian Europe on July 2, 2013 "Edward Snowden has done us all a great service. The man who revealed that our US and UK allies are spying on us ought to be given refuge by an EU country. [...] If ever a case demonstrated why we need the protection of whistleblowers, this is it."[523]

Non-government organizations

After Amnesty International met Edward Snowden in in mid July 2013, the organization said: Demonstration against PRISM in Berlin, "What he has disclosed is patently in the public interest and as a whistleblower his actions Germany were justified. He has exposed unlawful sweeping surveillance programmes that unquestionably interfere with an individual’s . States that attempt to stop a person from revealing such unlawful behaviour are flouting international law. Freedom of expression is a fundamental right."[525]

Widney Brown, Senior Director of Amnesty, feared that Snowden would be at "great risk" of human rights violations if forcibly transferred to the United States,[526] and urged no country to return Snowden to the US. Michael Bochenek, Director of Law and Policy at Amnesty International deplored the US pressure on governments to block Snowden's asylum attempts, saying "It is his unassailable right, enshrined in international

26 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

law".[527]

Human Rights Watch said that if Snowden were able to raise the issue of NSA mass surveillance without facing espionage charges, he would not have left the United States in the first place.[528] Human Rights Watch writes that any country where Snowden seeks asylum should consider his claim fairly and protect his rights under international law, which recognizes that revealing official secrets is sometimes justified in the public interest.[529]

Index on Censorship condemned the U.S. government for its "mass surveillance of citizens’ private communications" and urged all government officials to uphold the First Amendment to the United States Constitution. A statement released by Index on Censorship said: "Whistleblowers such as Edward Snowden — as well as journalists reporting on the Prism scandal, who have come under fire , the United Nations' High — should be protected under the first amendment, not criminalised."[530] Commissioner for Human Rights, said: "Without prejudging the validity of any Navi Pillay, the United Nations High Commissioner for Human Rights, said: "Snowden's case has asylum claim by Snowden, I appeal to all shown the need to protect persons disclosing information on matters that have implications for States to respect the internationally human rights, as well as the importance of ensuring respect for the right to privacy".[524] guaranteed right to seek asylum."[524]

Transparency International, International Association of Lawyers against Nuclear Arms and Vereinigung Deutscher Wissenschaftler awarded Snowden the German Whistleblowerpreis 2013.[531]

The Humanist Union awarded him the Fritz Bauer Prize 2013.[532]

China and Hong Kong

The South China Morning Post published a poll of Hong Kong residents conducted while Snowden was still in Hong Kong that showed that half of the 509 respondents believed the Chinese government should not surrender Snowden to the United States if Washington raises such a request; 33 percent of those polled think of Snowden as a hero, 12.8 percent described him as a traitor, 23 percent described him as "something in between."[533]

Referring to Snowden's presence in the territory, Hong Kong chief executive Leung Chun-Ying assured that the government would "handle the case of Mr Snowden in accordance with the laws and established procedures of Hong Kong [and] follow up on any incidents related to the privacy or other rights of the institutions or people in Hong Kong being violated."[534] Pan-democrat legislators Gary Fan and Claudia Mo said that the perceived U.S. prosecution against Snowden will set "a dangerous precedent and will likely be used to justify similar actions" by authoritarian governments.[535] During Snowden's stay, the two main political groups, the pan-democrats and Pro-Beijing camp, found rare agreement to support Snowden.[536][537] The pro-Beijing DAB party even organised a separate march to Government headquarters Hong Kong demonstration at US Consulate on June 15 in support of Snowden for Snowden.

The People's Daily and the Global Times editorials of June 19 stated respectively that the central Chinese government was unwilling to be involved in a "mess" caused by others, and that the Hong Kong government should follow the public opinion and not concern itself with Sino-US relations.[538] A Tsinghua University communications studies specialist, Liu Jianming, interpreted that the two articles as suggesting that the mainland government did not want further involvement in the case and that the Hong Kong government should handle it independently.[538]

After Snowden left Hong Kong, Chinese-language newspapers such as the Ming Pao and the Oriental Daily expressed relief that Hong Kong no longer had to shoulder the burden of the Snowden situation.[539] Mainland experts said that, although the Central Government did not want to appear to be intervening in the matter, it was inconceivable that the Hong Kong government acted independently in a matter that could have far-reaching consequences for Sino-US relations. One expert suggested that, by doing so, China had "returned the favor" for their not having accepted the asylum plea from Wang Lijun in February 2012.[540] The official Chinese Communist Party mouthpiece, the People's Daily denied the US government accusation that the PRC central government had allowed Snowden to escape, and said that Snowden helped in "tearing off Washington's sanctimonious mask."[541]

South America

Robert Menendez, chairman of the United States foreign relations panel, warned Ecuador that accepting Snowden "would severely jeopardize" preferential trade access the United States provides to Ecuador.[542] Ecuador's President responded by abdicating US trade benefits.[543] A government spokesman said that Ecuador would offer the US "economic aid of US$23 million annually, similar to what we received with the trade benefits, with the intention of providing education about human rights."[544]

Correa criticized the US media for centering its focus on Snowden and countries supporting him, instead of focusing on the global and domestic privacy issues implicated in the leaked documents.[545]

After Bolivian president Morales' plane was, reacting to a false tip that Snowden was on board, denied access to Spanish, French, and Italian airspace during a return flight from Moscow, the presidents of Uruguay, Argentina, Venezuela and Suriname joined Correa and a representative

27 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

from Brazil, in Cochabamba, Bolivia to discuss the incident.[546] Presidents Nicolás Maduro of Venezuela and of Nicaragua offered Snowden asylum after the meeting.

Brazil

In September 2013, Brazil's Chamber of Deputies Foreign Relations Committee decided to send a representative to speak to Edward Snowden about the espionage activities of the NSA in Brazil.[547] Petrobras announced that it was investing R$21 billion over five years to improve its .[548]

United Nations

Secretary General Ban Ki-moon said that "the Snowden case is something I consider to be misuse" and that digital communications should not be "misused in such a way as Snowden did."[549] , an Icelandic legislator, criticized Ban for expressing a personal view while speaking in an official capacity. She said that Ban "seemed entirely unconcerned about the invasion Glenn Greenwald (right) and his partner, of privacy by governments around the world, and only concerned about how whistleblowers are Brazilian David Miranda (left), speaking to misusing the system."[549] the National Congress of Brazil about US spying activity in that country. Other countries

Russia, Turkey and South Africa reacted angrily after it was revealed that their diplomats had been spied on during the 2009 G-20 London summit.[550]

Whistleblowers

Daniel Ellsberg, the whistleblower and leaker of the top-secret in 1971, stated in an interview with CNN that he thought Snowden had done an "incalculable" service to his country and that his leaks might prevent the United States from becoming a surveillance state. He said Snowden had acted with the same sort of courage and patriotism as a soldier in battle.[551] In an op-ed the following morning, Ellsberg added that "there has not been in American history a more important leak than Edward Snowden's release of NSA material ... including the Pentagon Papers."[552] Ray McGovern, a retired CIA officer turned political activist, agreed with Ellsberg and added, "This time today I'm feeling much more hopeful for our democracy than I was feeling this time yesterday."[553]

William Binney, a whistleblower who disclosed details of the NSA's mass surveillance activities, said that Snowden had "performed a really great public service to begin with by exposing these programs and making the government in a sense publicly accountable for what they're doing." After Snowden cited a conversation with a "reliable source" about allegations that the US was "hacking into China", Binney felt he was "transitioning from whistle-blower to a traitor."[554]

Thomas Drake, former senior executive of NSA and whistleblower, said that he feels "extraordinary kinship" with Snowden. "What he did was a magnificent act of civil disobedience. He's exposing the inner workings of the surveillance state. And it's in the public interest. It truly is."[554][555]

WikiLeaks founder hailed Snowden as a "hero" who has exposed "one of the most serious events of the decade – the creeping formulation of a mass surveillance state."[556] After charges against Snowden were revealed, Assange released a statement asking people to "step forward and stand with" Snowden.[557] Following President Obama's assurances that changes are planned for the NSA surveillance program, Assange said in a written statement that Obama had "validated Edward Snowden's role as a whistle-blower".[558][559]

Shamai Leibowitz, who leaked details about an FBI operation, said that the legal threats and "smear campaign" against Snowden are a "grave mistake" because "If the government really wanted to keep more secrets from coming out, they would do well to let this man of go live his life in some other country."[560]

In October 2013, four US whistleblowers and activists visited Moscow to present Snowden with an award for truth-telling titled The for Integrity in Intelligence.[561][562] Thomas Drake, one of the presenters, told reporters after the event that the US had "unchained itself from their own constitution" by banning the "real law and [using] a secret law and secret interpretations of law." He further explained that Snowden "had to escape the US to ensure any chance of freedom", claiming the US had made Snowden stateless by revoking his passport while in Russia, leading to his temporary asylum in the country. Drake praised Russia, saying it had "actually recognized the international law and granted him political asylum".[563] List of Americans under surveillance

Further information: Mass surveillance in the United States

In September 2013, names of prominent figures in the United States were released to public following an Interagency Security Classification Appeals Panel-mandated declassification by the NSA of relevant documents, and in response to an appeal by the National Security Archive at George Washington University.[566]

Activists

Martin Luther King, Jr, a leader of the African-American , was subjected to NSA surveillance right up until the day of his assasination.[566]

28 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

Celebrities

Muhammad Ali, a former heavyweight boxing champion, was targeted by Project MINARET of the NSA, according to documents declassified in September 2013.[566]

Journalists

Art Buchwald, a columnist for The Washington Post, was nominated by the FBI to be placed under NSA surveillance, according to documents declassified in September 2013[566]

Tom Wicker, a columnist for The New York Times, was among those included in the Enemies List of the White House[566]

Members of Congress

Frank Church, a U.S. Senator from , was placed on the NSA watch list because of his "irresponsible" political views and criticism of the .[566]

Howard Baker, a Senate Majority Leader from Tennessee, was placed on the NSA watch list, In 2013, the CIA admitted that it had spied [564][565] according to documents declassified in September 2013[566] on Noam Chomsky

Media related to the disclosures

Court order demanding that Verizon hand over all Procedures used to target Foreigners. metadata to NSA.

Procedures used to Minimize collection on US 2009 OIG Draft Report on Stellar Wind. persons.

29 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

2007 Memos by Michael Mukasey requesting Presidential Policy Directive – PPD 20 Signed By Broader powers. Barack Obama Relating to Cyberwarfare

NSA report on privacy violations. What's a 'privacy violation'

FISA Court finds NSA surveillance "deficient on Targeting Rationale Guidelines statutory and constitutional grounds" but nonetheless recertifies it.

Extracts of FY 2013 Intelligence Budget, volume 1 FY 2013 Intelligence Budget, additional tables

30 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

SilverZephyr Slide Dropmire Slide.

Documents relating to spying on the 2009 G20 Cover page of the PRISM presentation. Summit

Map of global internet bandwidth. Names of the PRISM content providers and which services they typically provide.

Dates each content provider joined PRISM. Flowchart of the PRISM tasking process.

31 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

PRISM dataflow. Explanation of PRISM case names.

REPRISMFISA web application. Upstream and PRISM.

A week in the life of Prism A 2008 Presentation of the XKeyscore program. (PDF, 27.26 MB)

Geopolititical Trends: Key Challenges Geopolitical trends: Global Drivers

32 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

Benefits of contact graph analysis. Benefits of contact graph analysis.

Contact graph. Hops in a contact graph.

2 hop contact graph. Spying against Enrique Peña Nieto and his associates.

Details of the process in the Nieto operation. Emails from Nieto detailing potential cabinet picks.

33 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

Spying effort against Dilma Rousseff and her Details of the process in the Rousseff operation (2 advisers. hop contact graph)

Details of the process in the Rousseff operation (2 Benefits of contact graph analysis. hop contact graph)

Exploitation of Common Internet Encryption Technologies.

Comparison with previous leaks

Main Year Disclosure Size Major publisher(s) Source(s) 1971 Pentagon Papers 4,100 pages Daniel Ellsberg The New York Times United States diplomatic 251,287 diplomatic Chelsea The Guardian, The New York Times. Der Spiegel, Le Monde, El 2010 cables leak cables Manning Pais, Wikileaks Mass surveillance 15,000 – 20,000 Edward The Guardian, The New York Times, The Washington 2013 disclosures documents Snowden Post, Der Spiegel, Le Monde,

See also

2013 Department of Justice investigations of reporters Terrorist Finance Tracking Program

34 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

Top Secret America

References

1. ^ Greenwald, Glenn. "NSA collecting phone records of millions of 13. ^ Henderson. "Obama To Leno: 'There Is No Spying On Americans'" Verizon customers daily" (http://www.theguardian.com/world/2013/jun (http://m.npr.org/news/U.S./209692380). NPR. Retrieved 16 August /06/nsa-phone-records-verizon-court-order). The Guardian. Retrieved 2013. 16 August 2013. "Exclusive: Top secret court order requiring Verizon to 14. ^ a b "New Details Emerge From the Einstein Files; How the F.B.I. hand over all call data shows scale of domestic surveillance under Tracked His Phone Calls and His Trash" (http://www.nytimes.com Obama" /2002/05/07/science/new-details-emerge-einstein-files-fbi-tracked- 2. ^ a b Fiddler, Stephen (1 July 2013). Echoes of Echelon in Charges of his-phone-calls-his-trash.html?pagewanted=all&src=pm). The New NSA Spying in Europe (http://online.wsj.com/article York Times. Retrieved 17 September 2013. /SB10001424127887323936404578579811316559112.html). The Wall 15. ^ Cauley, Leslie. "NSA has massive database of Americans' phone Street Journal. calls" (http://yahoo.usatoday.com/news/washington/2006-05-10- 3. ^ Snowden has ‘thousands’ of damaging NSA documents, says nsa_x.htm). "USA Today". Greenwald—MSNBC (http://tv.msnbc.com/2013/07/15/snowden- 16. ^ "Ex-CIA employee source of leak on PRISM program" has-thousands-of-damaging-nsa-documents-says-greenwald/) (http://www.france24.com/en/20130609-former-cia-employee-source- 4. ^ Glenn Greenwald and Ewen MacAskill. "Boundless Informant: the us-intelligence-leaks-snowden-nsa). France 24. Retrieved 17 NSA's secret tool to track global surveillance data" September 2013. "Snowden’s decision to reveal his identity and (http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless- whereabouts lifts the lid on one of the biggest security leaks in US informant-global-datamining). The Guardian. Retrieved June 12, 2013. history and escalates a story that has placed a bright light on Obama’s 5. ^ "Senators: Limit NSA snooping into US phone records" extensive use of secret surveillance." (http://bigstory.ap.org/article/senators-limit-nsa-snooping-us-phone- 17. ^ "New data show how closely FBI monitored Marilyn Monroe" records). . Retrieved 15 October 2013. ""Is it the goal (http://www.cbsnews.com/8301-207_162-57561157/new-data- of the NSA to collect the phone records of all Americans?" Udall asked show-how-closely-fbi-monitored-marilyn-monroe/). CBS News. at Thursday's hearing. "Yes, I believe it is in the nation's best interest December 28, 2012. to put all the phone records into a lockbox that we could search when 18. ^ (2002/05/07). "Documents Show the NSA Spied on the nation needs to do it. Yes," Alexander replied." Muhammad Ali, Martin Luther King Jr., and … Art Buchwald" 6. ^ Siobhan Gorman. "Meltdowns Hobble NSA Data Center" (http://www.slate.com/blogs/future_tense/2013/09 (http://online.wsj.com/news/articles /26/minaret_nsa_surveillance_program_spied_on_muhammad_ali_mar /SB10001424052702304441404579119490744478398). The Wall tin_luther_king.html). Slate (magazine). Retrieved 27 October 2013. Street Journal. Retrieved 19 October 2013. "The Utah facility, one of 19. ^ a b U.S. National Security Agency. Early Papers Concerning US-UK the Pentagon's biggest U.S. construction projects, has become a Agreement – 1940–1944 (http://www.nsa.gov/public_info/_files/ukusa symbol of the spy agency's surveillance prowess, which gained broad /early_papers_1940-1944.pdf). Agreement between British attention in the wake of leaks from NSA contractor Edward Snowden." Government Code and Cipher School and U.S. War Department dated 7. ^ "USA must not persecute whistleblower Edward Snowden" May 17, 1943. Retrieved: 2013-10-05. (http://www.amnesty.org/en/news/usa-must-not-persecute- 20. ^ a b c d Norton-Taylor, Richard (25 June 2010). "Not so secret: deal whistleblower-edward-snowden-2013-07-02). Amnesty International. at the heart of UK-US intelligence" (http://www.guardian.co.uk/world Retrieved 16 August 2013. /2010/jun/25/intelligence-deal-uk-us-released). The Guardian. 8. ^ "US: Statement on Protection of Whistleblowers in Security Sector" Retrieved 25 June 2010. (http://www.hrw.org/news/2013/06/18/us-statement-protection- 21. ^ a b c "Factbox: History of mass surveillance in the United States" whistleblowers-security-sector). Human Rights Watch. Retrieved 16 (http://www.reuters.com/article/2013/06/07/us-usa-security-records- August 2013. factbox-idUSBRE95617O20130607). Reuters. Retrieved 14 August 9. ^ Transparency International Germany. "Transparency International 2013. Germany: Whistleblower Prize 2013 for Edward Snowden" 22. ^ The Center for Cryptologic History. "The Origins of NSA (NSA.gov)" (http://www.transparency.org/news/pressrelease (http://web.archive.org/web/20040318034627/http://www.nsa.gov /transparency_international_germany_whistleblower_prize_2013_for_e /publications/publi00015.cfm). Web.archive.org. Archived from the dward_snow). Transparency International. Retrieved 16 August 2013. original (http://www.nsa.gov/publications/publi00015.cfm) on 18 10. ^ "US needs to protect whistleblowers and journalists" March 2004. (http://www.indexoncensorship.org/2013/06/us-needs-to-protect- 23. ^ Epsley-Jones, Katelyn; Frenzel, Christina. "The whistleblowers-and-journalists/). Index on Censorship. Retrieved 16 Hearings & the FISA Court" (http://www.pbs.org/wgbh/pages/frontline August 2013. /homefront/preemption/churchfisa.html). PBS. Retrieved 14 August 11. ^ Snowden Asylum Hits U.S.-Russia Relations - WSJ.com 2013. (http://online.wsj.com/article 24. ^ "FBI campaign against Einstein revealed" (http://news.bbc.co.uk /SB10001424127887323681904578641610474568782.html) /2/hi/sci/tech/2033324.stm). BBC. Retrieved 17 September 2013. 12. ^ U.S. 'Extremely Disappointed' At Russia's Asylum For Snowden : The Two-Way : NPR (http://www.npr.org/blogs/thetwo-way/2013/08/01 /207831950/snowden-has-left-moscows-airport-as-russia-grants- asylum)

35 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

25. ^ "Albert Einstein: Fact or Fiction?" (http://www.history.com/topics 38. ^ Bamford, James. "The Agency That Could Be Big Brother" /einsteins-life-facts-and-fiction). History (TV channel). Retrieved 17 (http://www.nytimes.com/2005/12/25/weekinreview September 2013. "Because of his controversial political beliefs-his /25bamford.html?pagewanted=print). The New York Times. Retrieved support for socialism, civil rights, and nuclear disarmament, for 14 August 2013. example-many anti-Communist crusaders believed that Einstein was a 39. ^ DAVID BURNHAM. "TRUMAN WIRETAPS ON EX-NEW DEAL AIDE dangerous subversive. Some, like FBI director J. Edgar Hoover, even CITED" (http://www.nytimes.com/1986/02/01/us/truman-wiretaps- thought he was a spy. For 22 years, Hoover's agents tapped Einstein's on-ex-new-deal-aide-cited.html). The New York Times. Retrieved 18 phones, opened his mail, rifled through his trash and even bugged his September 2013. secretary's nephew's house, all to prove that he was more radical (as 40. ^ "INVESTIGATIONS: Nobody Asked: Is It Moral?" his 1,500-page FBI dossier noted) than "even Stalin himself."" (http://content.time.com/time/magazine/article 26. ^ RONALD J. OSTROW and LISA GETTER. "FBI Files on Sinatra Detail /0,9171,914164,00.html). Time. May 10, 1976. Links to JFK, Mob Figures" (http://articles.latimes.com/1998/dec 41. ^ "British intelligence 'birdwatchers spied on Nelson Mandela's /09/news/mn-52274). Los Angeles Times. Retrieved 18 September hideout'" (http://www.telegraph.co.uk/news/worldnews/nelson- 2013. mandela/10169630/British-intelligence-birdwatchers-spied-on-Nelson- 27. ^ MOLOTSKY, IRVIN. "F.B.I. Releases Its Sinatra File, With Tidbits Old Mandelas-hideout.html). . Retrieved 21 September and New" (http://www.nytimes.com/1998/12/09/us/fbi-releases- 2013. its-sinatra-file-with-tidbits-old-and-new.html). The New York Times. 42. ^ "Nelson Mandela ‘was spied on by MI6 birdwatchers’" Retrieved 18 September 2013. (http://www.thetimes.co.uk/tto/news/world/africa/article3812361.ece). 28. ^ "Question: Why is Eleanor Roosevelt's FBI file so large?" The Times. Retrieved 21 September 2013. (http://www.gwu.edu/~erpapers/teachinger/q-and-a/q31.cfm). 43. ^ "NSA Admits to Spying on Princess Diana" George Washington University. Retrieved 18 September 2013. (http://www.washingtonpost.com/wp-srv/national/daily/dec98 29. ^ "Eleanor Roosevelt" (http://www.history.com/topics/eleanor- /diana12.htm). The Washington Post. Retrieved 21 September 2013. roosevelt). History (TV channel). Retrieved 18 September 2013. "J. 44. ^ David Hencke and Rob Evans (6 August 1999). "US holds secret files Edgar Hoover (1895–1972), the longtime director of the Federal on Diana" (http://www.theguardian.com/uk/1999/aug/06 Bureau of Investigation, considered Eleanor Roosevelt’s liberal views /monarchy.freedomofinformation). The Guardian. dangerous and believed she might be involved in communist activities. 45. ^ Campbell, Duncan (12 August 1988). "Somebody's Listening" He ordered his agents to monitor Roosevelt and keep what became an (http://web.archive.org/web/20070103071501/http: extensive file on her." //duncan.gn.apc.org/echelon-dc.htm). New Statesman. Archived from 30. ^ "FBI removes many redactions in Marilyn Monroe file" the original (http://duncan.gn.apc.org/echelon-dc.htm) on (http://bigstory.ap.org/article/fbi-removes-many-redactions-marilyn- 2007-01-03. Retrieved 16 September 2013. monroe-file). Associated Press. Retrieved 18 September 2013. 46. ^ a b Schmid, Gerhard (11 July 2001). "On the existence of a global 31. ^ Cohen, Adam. "While Nixon Campaigned, the F.B.I. Watched John system for the interception of private and commercial communications Lennon" (http://www.nytimes.com/2006/09/21/opinion/21thu4.html). (ECHELON interception system), (2001/2098(INI))" The New York Times. Retrieved 18 September 2013. (http://www.europarl.europa.eu/sides/getDoc.do?pubRef=- 32. ^ "Martin Luther King, Jr. FBI File" (http://library.truman.edu //EP//NONSGML+REPORT+A5-2001-0264+0+DOC+PDF+V0 /microforms/martin_luther_king.asp). Pickler Memorial Library (Truman //EN&language=EN) (pdf). European Parliament: Temporary State University). Retrieved 17 September 2013. Committee on the ECHELON Interception System. p. 194. Retrieved 16 33. ^ Church, Frank (April 23, 1976), "Church Committee Book III", Dr. September 2013. Martin Luther King, Jr., Case Study (Church Committee) 47. ^ Andrew Bomford (3 November, 1999). "Echelon spy network 34. ^ "FBI tracked King's every move" (http://edition.cnn.com/2008/US revealed" (http://news.bbc.co.uk/2/hi/503224.stm). BBC. /03/31/mlk.fbi./). CNN. Retrieved 17 September 2013. 48. ^ "UK 'spied on UN's Kofi Annan'" (http://news.bbc.co.uk 35. ^ "'Life Lessons' From a White House Plumber" (http://www.npr.org /2/hi/uk_news/politics/3488548.stm). BBC. February, 2004. /templates/story/story.php?storyId=14468307). NPR. "When Daniel 49. ^ James Chapman, Gerri Peev and Ian Drury (30 November 2010). Ellsberg leaked the Pentagon Papers to The New York Times in 1971, "WikiLeaks are a bunch of terrorists, says leading U.S. congressman as the Nixon White House tried to discredit him. Among other things, No10 warns of threat to national security" (http://www.dailymail.co.uk Nixon loyalists burglarized the office of Ellsberg's psychiatrist." /news/article-1333879/WikiLeaks-terrorists-says-leading- 36. ^ "The Watergate Story" (http://www.washingtonpost.com/wp-srv US-congressman-Peter-King.html). Daily Mail. /politics/special/watergate/timeline.html). The Washington Post. 50. ^ "US diplomats spied on UN leadership" Retrieved 17 September 2013. "The White House "plumbers" unit - (http://www.theguardian.com/world/2010/nov/28/us-embassy-cables- named for their orders to plug leaks in the administration - burglarizes spying-un). The Guardian. Retrieved 27 August 2013. a psychiatrist's office to find files on Daniel Ellsberg, the former 51. ^ "Warrantless Surveillance and the Foreign Intelligence Surveillance defense analyst who leaked the Pentagon Papers." Act: The Role of Checks and Balances in Protecting Americans' Privacy 37. ^ "Watergate and the Constitution" (http://www.archives.gov Rights (Part II): Hearing Before the H. Comm. on the Judiciary, 110th /education/lessons/watergate-constitution/). National Archives and Cong. 13–30 (statement of J.M. McConnell, Director of National Records Administration. Retrieved 17 September 2013. Intelligence)" (http://www.gpo.gov/fdsys/pkg/CHRG-110hhrg37844 /pdf/CHRG-110hhrg37844.pdf). 18 September 2007.

36 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

52. ^ Risen, James; Lichtblau, Eric. "Bush Lets U.S. Spy on Callers 66. ^ Laura Poitras, Marcel Rosenbach, Fidelius Schmid and Holger Stark. Without Courts" (http://www.nytimes.com/2005/12/16/politics "Attacks from America: NSA Spied on European Union Offices" /16program.html?pagewanted=all). The New York Times. Retrieved 14 (http://www.spiegel.de/international/europe/nsa-spied-on-european- August 2013. "The White House asked The New York Times not to union-offices-a-908590.html). Der Spiegel. Retrieved 9 September publish this article" 2013. 53. ^ "President Visits Troops at Brooke Army Medical Center" 67. ^ a b Staff (31 August 2013). "Snowden Document: NSA Spied On Al (http://georgewbush-whitehouse.archives.gov/news/releases/2006/01 Jazeera Communications" (http://www.spiegel.de/international/world /20060101.html). White House. 1 January 2006, 12:05 PM CST. /nsa-spied-on-al-jazeera-communications-snowden-document- Retrieved 15 August 2013. a-919681.html). Retrieved 31 August 2013. 54. ^ "AT&T Whistle-Blower's Evidence" (http://www.wired.com/science 68. ^ ROMERO, SIMON. "N.S.A. Spied on Brazilian Oil Company, Report /discoveries/news/2006/05/70908). Wired. 17 May 2006. Retrieved 14 Says" (http://www.nytimes.com/2013/09/09/world/americas August 2013. /nsa-spied-on-brazilian-oil-company-report-says.html?_r=0). The New 55. ^ Poulsen, Kevin. "Whistle-Blower: Feds Have a Backdoor Into York Times. Retrieved 9 September 2013. Wireless Carrier — Congress Reacts" (http://www.wired.com 69. ^ "US bugged Merkel's phone from 2002 until 2013, report claims" /threatlevel/2008/03/whistleblower-f/). Wired. Retrieved 14 August (http://www.bbc.co.uk/news/world-europe-24690055). BBC. Retrieved 2013. 27 October 2013. 56. ^ WILLIAM SAFIRE (November 14, 2002). "You Are a Suspect" 70. ^ Duran-Sanchez, Mabel (10 August 2013). "Greenwald Testifies to (http://www.nytimes.com/2002/11/14/opinion/you-are- Brazilian Senate about NSA Espionage Targeting Brazil and Latin a-suspect.html). The New York Times. Retrieved 20 September 2013. America" (http://www.cepr.net/index.php/blogs/the-americas- 57. ^ "WikiLeaks FAQ: What Do the Diplomatic Cables Really Tell Us?" /greenwald-testifies-to-brazilian-senate-about-nsa-espionage- (http://www.spiegel.de/international/world/-faq-what-do-the- targeting-brazil-and-latin-america). Retrieved 13 August 2013. diplomatic-cables-really-tell-us-a-731441.html). Der Spiegel. Retrieved 71. ^ "Glenn Greenwald afirma que documentos dizem respeito à 14 August 2013. interesses comerciais do governo americano" 58. ^ Davies, Nick; Leigh, David (25 July 2010). "Afghanistan war logs: (http://www.senado.gov.br/noticias/TV/default.asp?IND_ACESSO=S& Massive leak of secret files exposes truth of occupation" cod_midia=269827&cod_video=267526). 6 August 2013. Retrieved 13 (http://www.guardian.co.uk/world/2010/jul/25/afghanistan-war-logs- August 2013. military-leaks). The Guardian (London). Retrieved 26 July 2010. 72. ^ a b How Microsoft handed the NSA access to encrypted messages 59. ^ "The WikiLeaks Iraq War Logs: Greatest Data Leak in US Military (http://www.guardian.co.uk/world/2013/jul/11/microsoft- History" (http://www.spiegel.de/international/world nsa-collaboration-user-data), The Guardian, 12 July 2013. Retrieved 13 /0,1518,724845,00.html). Der Spiegel. 22 October 2010. Retrieved 23 July 2013. October 2010. 73. ^ Bridie Jabour in Sydney (12 July 2013). "Telstra signed deal that 60. ^ "The NSA Is Building the Country's Biggest Spy Center (Watch What would have allowed US spying" (http://www.guardian.co.uk/world You Say)" (http://www.wired.com/threatlevel/2012/03 /2013/jul/12/telstra-deal-america-government-spying). The Guardian. /ff_nsadatacenter/all/1). Wired. Retrieved 14 August 2013. 74. ^ The first three days of revelations were: the FISC court order that 61. ^ Greenberg, Andy. "NSA Chief Denies Wired's Domestic Spying Story Verizon provide bulk metadata on its customers to the NSA; (Fourteen Times) In Congressional Hearing" (http://www.forbes.com presentation slides explaining the cooperation of nine US internet /sites/andygreenberg/2012/03/20/nsa-chief-denies-wireds-domestic- giants through the PRISM program; and the bulk collection of Chinese spying-story-fourteen-times-in-congressional-hearing/). . users' text messages, which coincided with 's visit to Retrieved 14 August 2013. California to meet Barack Obama. 62. ^ "U.S. agency denies data center to monitor citizens' emails" 75. ^ a b c d e f Laura Poitras, Marcel Rosenbach and Holger Stark. "Ally (http://www.reuters.com/article/2013/04/16/us-usa-security- and Target: US Intelligence Watches Germany Closely" nsa-idUSBRE93E11O20130416). Reuters. Retrieved 22 September (http://www.spiegel.de/international/world/germany-is-a-both- 2013. a-partner-to-and-a-target-of-nsa-surveillance-a-916029.html). Der 63. ^ a b Laura Poitras, Marcel Rosenbach and Holger Stark. "Codename Spiegel. Retrieved 13 August 2013. 'Apalachee': How America Spies on Europe and the UN" 76. ^ "Colombia asks Kerry to explain NSA spying" (http://www.spiegel.de/international/world/secret-nsa-documents- (http://www.washingtonpost.com/politics/kerry-to-face-questions- show-how-the-us-spies-on-europe-and-the-un-a-918625-2.html). Der on-nsa-spying-during-south-america-trip/2013/08/12/afdab47e- Spiegel. p. 2. Retrieved 26 August 2013. 0382-11e3-88d6-d5795fab4637_story.html). The Washington Post. 64. ^ a b MacAskill, Ewen; Davies, Nick; Hopkins, Nick; Borger, Julian; Retrieved 13 August 2013. Ball, James (17 June 2013). "GCHQ intercepted foreign politicians' 77. ^ "Greenwald diz que espionagem dá vantagens comerciais e communications at G20 summits" (http://www.guardian.co.uk/uk/2013 industriais aos Estados Unidos" (http://www12.senado.gov.br/noticias /jun/16/gchq-intercepted-communications-g20-summits). The /materias/2013/08/06/greenwald-diz-que-espionagem-da-vantagens- Guardian (London). comerciais-e-industriais-aos-estados-unidos) (in Portuguese). Federal 65. ^ "Edward Snowden: US government has been hacking Hong Kong Senate of Brazil. Retrieved 13 August 2013. and China for years" (http://www.scmp.com/news/hong-kong/article 78. ^ "Greenwald diz que EUA espionam para obter vantagens comerciais" /1259508/edward-snowden-us-government-has-been-hacking- (http://www.dw.de/greenwald-diz-que-eua-espionam-para-obter- hong-kong-and-china?page=all). South China Morning Post. Retrieved vantagens-comerciais/a-17002867) (in Portuguese). . 9 September 2013. Retrieved 13 August 2013.

37 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

79. ^ "NSA's activity in Latin America is 'collection of data on oil and 92. ^ a b c "NDB und NSA kooperieren enger als bisher bekannt" military purchases from Venezuela, energy and narcotics from Mexico' (http://www.handelszeitung.ch/politik/ndb-und-nsa-kooperieren- – Greenwald" (http://voiceofrussia.com/news/2013_08_07/NSA-s- enger-als-bisher-bekannt-496751) (in German). Handelszeitung. activity-in-Latin-America-is-collection-of-data-on-oil-and-military- Retrieved 18 September 2013. purchases-from-Venezuela-energy-and-narcotics-from-Mexico- 93. ^ a b c unlisted (3 August 2013). "Überwachung: BND leitet Greenwald-1337/). Voice of Russia. Retrieved 13 August 2013. massenhaft Metadaten an die NSA weiter" (http://www.spiegel.de 80. ^ a b "Exclusive: U.S. directs agents to cover up program used to /netzwelt/netzpolitik/bnd-leitet-laut-spiegel-massenhaft-metadaten- investigate Americans" (http://www.reuters.com/article/2013/08 an-die-nsa-weiter-a-914682.html). Der Spiegel (in German). Retrieved /05/us-dea-sod-idUSBRE97409R20130805). Reuters. Retrieved 14 3 August 2013. August 2013. 94. ^ a b 'Prolific Partner': German Intelligence Used NSA Spy Program 81. ^ a b c d e f and Greg Miller (29 August 2013). "U.S. (http://www.spiegel.de/international/germany/german-intelligence- spy network's successes, failures and objectives detailed in 'black agencies-used-nsa-spying-program-a-912173.html), Der Spiegel. budget' summary" (http://www.washingtonpost.com/world/national- Retrieved 21 July 2013. security/black-budget-summary-details-us-spy-networks-successes- 95. ^ "Verfassungsschutz beliefert NSA" (http://www.sueddeutsche.de failures-and-objectives/2013/08/29/7e57bb78-10ab-11e3-8cdd- /politik/spionage-in-deutschland-verfassungsschutz-beliefert- bcdc09410972_story.html). Retrieved 29 August 2013. nsa-1.1770672) (in German). Süddeutsche Zeitung. Retrieved 14 82. ^ Maass, Peter. "How Laura Poitras Helped Snowden Spill His Secrets" September 2013. "Seit Juli 2013 testet der Verfassungsschutz die (http://www.nytimes.com/2013/08/18/magazine/laura-poitras- Späh- und Analysesoftware XKeyscore. Sollte der Geheimdienst das snowden.html?pagewanted=all). The New York Times. Retrieved 13 Programm im Regelbetrieb nutzen, hat sich das BfV verpflichtet, alle August 2013. Erkenntnisse mit der NSA zu teilen. Das hatte der Präsident des 83. ^ Easley, Jonathan. "Snowden: NSA targeted journalists critical of Bundesamtes, Hans-Georg Maaßen, dem US-Dienst zugesichert. Im government after 9/11" (http://thehill.com/blogs/blog-briefing- Januar und Mai war Maaßen zu Besuchen bei der NSA." room/news/316751-snowden-nsa-targeted-journalists-critical- 96. ^ "Verfassungsschutz beliefert NSA" (http://www.sueddeutsche.de of-government-after-911). . Retrieved 14 August 2013. /politik/spionage-in-deutschland-verfassungsschutz-beliefert- 84. ^ Laura Poitras, Marcel Rosenbach, Fidelius Schmid and Holger Stark. nsa-1.1770672) (in German). Süddeutsche Zeitung. Retrieved 14 "Attacks from America: NSA Spied on European Union Offices" September 2013. (http://www.spiegel.de/international/europe/nsa-spied-on-european- 97. ^ a b Glenn Greenwald, Laura Poitras and Ewen MacAskill (11 union-offices-a-908590.html). Der Spiegel. Retrieved 26 August 2013. September 2013). "NSA shares raw intelligence including Americans' 85. ^ "Report: Canada spies targeted Brazil mine ministry" data with Israel" (http://www.theguardian.com/world/2013/sep (http://bigstory.ap.org/article/report-canada-spies-targeted-brazil- /11/nsa-americans-personal-data-israel-documents). The Guardian. mine-ministry). Associated Press. Retrieved 7 October 2013. Retrieved 14 September 2013. 86. ^ "'Success Story': NSA Targeted French Foreign Ministry" 98. ^ "NSA asked Japan to tap regionwide fiber-optic cables in 2011" (http://www.spiegel.de/international/world/nsa-targeted-french- (http://www.japantimes.co.jp/news/2013/10/27/world/nsa-asked- foreign-ministry-a-919693.html). Der Spiegel. Retrieved 24 September japan-to-tap-regionwide-fiber-optic-cables-in-2011/#.Um4Lf1NVO28). 2013. . Retrieved 28 October 2013. 87. ^ a b Shobhan Saxena. "NSA planted bugs at Indian missions in D.C., 99. ^ Olmer, Bart. "Ook AIVD bespiedt internetter" U.N." (http://www.thehindu.com/news/international/world (http://www.telegraaf.nl/binnenland/21638965 /nsa-planted-bugs-at-indian-missions-in-dc-un/article5164944.ece). /__Ook_AIVD_bespiedt_internetter__.html) (in Dutch). De Telegraaf. The Hindu. Retrieved 24 September 2013. Retrieved 10 September 2013. "Niet alleen Amerikaanse 88. ^ Jens Glüsing, Laura Poitras, Marcel Rosenbach and Holger Stark. inlichtingendiensten monitoren internetters wereldwijd. Ook "Fresh Leak on US Spying: NSA Accessed Mexican President's Email" Nederlandse geheime diensten krijgen informatie uit het omstreden (http://www.spiegel.de/international/world/nsa-hacked-email-account- surveillanceprogramma ’Prism’." of-mexican-president-a-928817.html). Der Spiegel. Retrieved 20 100. ^ a b c Dorling, Philip. "Australian spies in global deal to tap undersea October 2013. cables" (http://www.smh.com.au/technology/technology- 89. ^ a b c d Laura Poitras, Marcel Rosenbach, Fidelius Schmid und Holger news/australian-spies-in-global-deal-to-tap-undersea-cables- Stark. "Geheimdokumente: NSA horcht EU-Vertretungen mit Wanzen 20130828-2sr58.html). The Sydney Morning Herald. Retrieved 29 aus" (http://www.spiegel.de/netzwelt/netzpolitik/nsa-hat-wanzen- August 2013. in-eu-gebaeuden-installiert-a-908515.html). Der Spiegel (in German). 101. ^ a b "Sverige deltog i NSA-övervakning" (http://www.svd.se/nyheter Retrieved 29 June 2013. /inrikes/sverige-deltog-i-nsa-overvakning_8492260.svd) (in Swedish). 90. ^ a b c d e f g h i j "US-Geheimdienst hörte Zentrale der Vereinten Svenska Dagbladet. Retrieved 10 September 2013. Nationen ab" (http://www.spiegel.de/politik/ausland/nsa-hoerte- zentrale-der-vereinte-nationen-in-new-york-ab-a-918421.html). Der Spiegel (in German). Retrieved 25 August 2013. 91. ^ a b c d e f "5-nation spy alliance too vital for leaks to harm" (http://bigstory.ap.org/article/experts-say-us-spy-alliance-will-survive- snowden). Associated Press. Retrieved 29 August 2013.

38 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

102. ^ Christof Moser and Alan Cassidy. "Geheimdienst-Aufsicht will 113. ^ Nick Hopkins and Julian Borger. "Exclusive: NSA pays £100m in Kooperation des NDB mit der NSA prüfen" secret funding for GCHQ" (http://www.theguardian.com/uk-news (http://www.sonntagonline.ch/ressort/aktuell/3210/) (in German). /2013/aug/01/nsa-paid--spying-edward-snowden). The Guardian. Schweiz am Sonntag. Retrieved 18 September 2013. "Die NSA hat Retrieved 19 October 2013. sowohl mit der Schweiz wie Dänemark eine geheime Vereinbarung 114. ^ Tom Whitehead. "Americans pay GCHQ £100m to spy for them, abgeschlossen, die den Austausch von Geheimdienstinformationen leaked papers claim" (http://www.telegraph.co.uk/news/uknews regelt. Die Vereinbarung berechtigt die NSA, eigene Schlüsselbegriffe /defence/10217280/Americans-pay-GCHQ-100m-to-spy-for- in die Abhörsysteme beider Staaten einspeisen zu lassen. Im Tausch them-leaked-papers-claim.html). The Daily Telegraph. Retrieved 19 für damit gewonnene Erkenntnisse der schweizerischen und dänischen October 2013. Auslandaufklärung erhalten der NDB und der dänische Geheimdienst 115. ^ a b "Mueller: FBI uses drones for surveillance over US soil" PET von der NSA Informationen, die sie im eigenen Land aufgrund (http://www.bbc.co.uk/news/world-us-canada-22976598). BBC. gesetzlicher Schranken nicht selber sammeln dürfen. Das geheime Retrieved 24 September 2013. Abkommen macht auch die Schweiz zu einem NSA-Horchposten." 116. ^ Kashmir Hill. "Congress Welcomes The Drones" 103. ^ a b c d e f g h i j k l m n o p q r s t u John Goetz, Hans Leyendecker (http://www.forbes.com/sites/kashmirhill/2012/02/07/congress- and Frederik Obermaier (28 August 2013). "British Officials Have welcomes-the-drones/). Forbes. Retrieved 24 September 2013. Far-Reaching Access To Internet And Telephone Communications" 117. ^ a b rian Bennett and Joel Rubin. "Drones are taking to the skies in (http://international.sueddeutsche.de/post/59603415442/british- the U.S." (http://articles.latimes.com/2013/feb/15/nation/la-na- officials-have-far-reaching-access-to-internet). Retrieved 28 August domestic-drones-20130216). Los Angeles Times. Retrieved 24 2013. September 2013. 104. ^ "Edward Snowden Interview: The NSA and Its Willing Helpers" 118. ^ MICHAEL KIRKLAND. "Drones over America" (http://www.upi.com (http://www.spiegel.de/international/world/interview- /Top_News/US/2013/02/17/Under-the-US-Supreme-Court-Drones- with-whistleblower-edward-snowden-on-global-spying-a-910006.html). over-America/UPI-97921361089800/). United Press International. Der Spiegel. Retrieved 29 August 2013. "Snowden: Yes, of course. Retrieved 24 September 2013. We're (the NSA) in bed together with the Germans the same as with 119. ^ John D Bates (3 October 2011). "[redacted]" (https://www.eff.org most other Western countries." /sites/default/files/filenode/fisc_opinion_- 105. ^ Laura Poitras, Marcel Rosenbach and Holger Stark. "Ally and Target: _unconstitutional_surveillance_0.pdf). p. 16. US Intelligence Watches Germany Closely" (http://www.spiegel.de 120. ^ Turner, Shawn (31 July 2013). "DNI Clapper Declassifies and /international/world/germany-is-a-both-a-partner-to-and-a-target- Releases Telephone Metadata Collection Documents" of-nsa-surveillance-a-916029.html). Der Spiegel. Retrieved 29 August (http://icontherecord.tumblr.com/post/57514665466/dni-clapper- 2013. "The NSA classifies about 30 other countries as "3rd parties," declassifies-and-releases-telephone). Retrieved 22 August 2013. with whom it cooperates, though with reservations. Germany is one of 121. ^ "Minimization Procedures Used by the National Security Agency in them. "We can, and often do, target the signals of most 3rd party Connection with Acquisitions of Foreign Intelligence Information foreign partners," the secret NSA document reads." Pursuant to Section 702, as amended" (http://www.dni.gov/files 106. ^ a b c d e Laura Poitras, Marcel Rosenbach and Holger Stark. "iSpy: /documents How the NSA Accesses Smartphone Data" (http://www.spiegel.de /Minimization%20Procedures%20used%20by%20NSA%20in%20Conn /international/world/how-the-nsa-spies-on-smartphones-including- ection%20with%20FISA%20SECT%20702.pdf). 31 October 2011. the--a-921161.html). Der Spiegel. Retrieved 9 September 122. ^ and (9 August 2013). "NSA loophole 2013. allows warrantless search for US citizens' emails and phone calls" 107. ^ Laura Poitras, Marcel Rosenbach, and Holger Stark. "Photo Gallery: (http://www.theguardian.com/world/2013/aug/09/nsa-loophole- Spying on Smartphones" (http://www.spiegel.de/fotostrecke/photo- warrantless-searches-email-calls). Retrieved 12 August 2013. gallery-spying-on-smartphones-fotostrecke-101201.html). Der Spiegel. 123. ^ a b John D Bates (3 October 2011). "[redacted]" Retrieved 9 September 2013. (https://www.eff.org/sites/default/files/filenode/fisc_opinion_- 108. ^ David Leppard and Chris Williams (3 May 2009). "Jacqui Smith's _unconstitutional_surveillance_0.pdf). p. 71. secret plan to carry on snooping" (http://www.timesonline.co.uk 124. ^ a b Nakashima, Ellen (21 August 2013). "NSA gathered thousands of /tol/news/politics/article6211101.ece). The Sunday Times. Retrieved 3 Americans’ e-mails before court ordered it to revise its tactics" May 2009. (http://www.washingtonpost.com/world/national-security 109. ^ Henry Porter. "GCHQ revelations: mastery of the internet will mean /nsa-gathered-thousands-of-americans-e-mails-before-court-struck- mastery of everyone" (http://www.theguardian.com/commentisfree down-program/2013/08/21/146ba4b6-0a90-11e3- /2013/jun/21/gchq-mastery-internet-mastery-everyone). The b87c-476db8ac34cd_story.html). The Washington Post. Retrieved 16 Guardian. Retrieved 19 October 2013. September 2013. 110. ^ Chris Williams (3 May 2009). "Jacqui's secret plan to 'Master the 125. ^ a b "FISA court ruling on illegal NSA e-mail collection program" Internet'" (http://www.theregister.co.uk/2009/05/03/gchq_mti/). The (http://apps.washingtonpost.com/g/page/national/fisa-court- Register. Retrieved 3 May 2009. documents-on-illegal-nsa-e-mail-collection-program/409/). The 111. ^ Chris Williams (3 May 2009). "Jacqui's secret plan to 'Master the Washington Post. 21 August 2013. Retrieved 16 September 2013. Internet'" (http://www.theregister.co.uk/2009/05/03/gchq_mti/). The Register. Retrieved 3 May 2009. 112. ^ a b "Agency denies internet spy plans" (http://news.bbc.co.uk /2/hi/8032367.stm). BBC. Retrieved 19 October 2013.

39 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

126. ^ a b Barton Gellman and Matt DeLong (15 August 2013). "First direct 137. ^ Office of the Director of National Intelligence. (10 September). evidence of illegal surveillance found by the FISA court" "Declassified FISA court documents on intelligence collection" (http://apps.washingtonpost.com/g/page/national/first-direct- (http://apps.washingtonpost.com/g/page/world/declassified-fisa-court- evidence-of-illegal-surveillance-found-by-the-fisa-court/393/). The documents-on-intelligence-collection/447/). The Washington Post. Washington Post. Retrieved 16 September 2013. Retrieved 14 September 2013. 127. ^ a b and (21 August 2013). "Secret Court 138. ^ James R. Clapper (Director of National Intelligence) (10 September Rebuked N.S.A. on Surveillance" (http://www.nytimes.com/2013/08 2013). "DNI Clapper Declassifies Intelligence Community Documents /22/us/2011-ruling-found-an-nsa-program- Regarding Collection Under Section 501 of the Foreign Intelligence unconstitutional.html?_r=3&&pagewanted=all). The New York Times. Surveillance Act (FISA)" (http://icontherecord.tumblr.com Retrieved 16 September 2013. /post/60867560465/dni-clapper-declassifies-intelligence-community). 128. ^ a b Mark Hosenball and Tabassum Zakaria (22 August 2013). "NSA Office of the Director of National Intelligence. IC On the Record. collected 56,000 emails by Americans a year: documents" Retrieved 14 September 2013. (http://www.nbcnews.com/technology/nsa-collected-56-000-emails- 139. ^ Tim, Trevor (10 September 2013). "Government Releases NSA americans-year-documents-6C10975688). Reuters. NBC News. Surveillance Docs and Previously Secret FISA Court Opinions In Retrieved 16 September 2013. Response to EFF Lawsuit" (https://www.eff.org/deeplinks/2013/09 129. ^ Perez, Evan (22 August 2013). "NSA misrepresented scope of data /government-releases-nsa-surveillance-docs-and-previously-secret- collection to secret court" (http://edition.cnn.com/2013/08/21/politics fisa-court). Electronic Frontier Foundation. Electronic Frontier /nsa-fisa-court). CNN. Retrieved 2 October 2013. Foundation. Retrieved 14 September 2013. 130. ^ Turner, Shawn (21 August 2013). "DNI Declassifies Intelligence 140. ^ David Kravets. Kim Zetter, Kevin Poulsen (10 September 2013). Community Documents Regarding Collection Under Section 702 of the "NSA Illegally Gorged on U.S. Phone Records for Three Years" Foreign Intelligence Surveillance Act (FISA)" (http://www.wired.com/threatlevel/2013/09/nsa-violations/). (http://icontherecord.tumblr.com/post/58944252298/dni-declassifies- Wired.com. Retrieved 22 September 2013. intelligence-community-documents). Office of the Director of National 141. ^ Staff (10 August 2013). "US-Geheimdienst: NSA führt Deutschland Intelligence. IC on the Record. Retrieved 2 October 2013. als Spionageziel" (http://www.spiegel.de/politik/ausland/nsa-fuehrt- 131. ^ Clapper, James (21 August 2013). "DNI James Clapper’s Cover deutschland-als-spionageziel-a-915871.html). Letter Announcing the Document Release" (http://www.dni.gov/files 142. ^ Timothy Jones (11 August 2008). "Germany and EU targets for US /documents espionage, Spiegel reports" (http://dw.de/p/19NYt). /DNI%20Clapper%20Section%20702%20Declassification%20Cover%2 143. ^ "The Black Budget" (http://www.washingtonpost.com/wp-srv 0Letter.pdf). Director of National Intelligence. Retrieved 2 October /special/national/black-budget/). 29 August 2013. Retrieved 29 August 2013. 2013. 132. ^ Kimberly Dozier and Stephen Braun (21 August 2013). "NSA 144. ^ Glenn Greenwald, Laura Poitras, and Ewen MacAskill (September 11, Collected Thousands Of Emails, Other Communications By Americans 2013). "NSA shares raw intelligence including Americans' data with With No Terror Ties" (http://www.huffingtonpost.com/2013/08/21/nsa- Israel" (http://www.theguardian.com/world/2013/sep/11/nsa- email-collection_n_3791459.html). Associated Press. The Huffington americans-personal-data-israel-documents). Retrieved 11 September Post. Retrieved 2 October 2013. 2013. 133. ^ Fung, Brian (21 August 2013). "The FISA court got really upset 145. ^ Sailor IV, F. Dennis (13 September 2013). "United States Foreign when the NSA didn’t tell the truth on surveillance" Intelligence Surveillance Court In Re Orders of this Court (http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/21 Interpretating Section 215 of the Patriot Act (Docket No. Misc. 13-02)" /the-fisa-court-got-really-upset-when-the-nsa-didnt-tell-the-truth- (http://www.uscourts.gov/uscourts/courts/fisc/misc-13-02-order- on-surveillance/). The Washington Post. Retrieved 16 September 2013. 130813.pdf). www.uscourts.gov. Retrieved 15 September 2013. 134. ^ Siobhan Gorman and Devlin Barrett (September 10, 2013). "NSA 146. ^ Fung, Brian (13 September 2013). "The FISA court will release more Violated Privacy Protections, Officials Say" (http://online.wsj.com opinions because of Snowden" (http://www.washingtonpost.com/blogs /article /the-switch/wp/2013/09/13/the-fisa-court-will-release-more-opinions- /SB10001424127887324094704579067422990999360.html#project% because-of-snowden/?tid=pm_business_pop). The Washington Post. 3DNSAdocument0910%26articleTabs%3Darticle). Retrieved 10 Retrieved 15 September 2013. September 2013. 147. ^ Ackerman, Spencer (13 September 2013). "Fisa judge: Snowden's 135. ^ Ackerman, Spencer (10 September 2013). "NSA violations led judge NSA disclosures triggered important spying debate" to consider viability of surveillance program" (http://www.theguardian.com/world/2013/sep/13/edward-snowden- (http://www.theguardian.com/world/2013/sep/10/nsa-violated-court- nsa-disclosures-judge). The Guardian. Retrieved 16 September 2013. rules-data-documents). The Guardian. Retrieved 16 September 2013. 148. ^ a b Laura Poitras, Marcel Rosenbach and Holger Stark (12 August 136. ^ Ellen Nakashima, Julie Tate and Carol Leonnig (10 September 2013). "Ally and Target: US Intelligence Watches Germany Closely" 2013). "Declassified court documents highlight NSA violations in data (http://www.spiegel.de/international/world/germany-is-a-both- collection for surveillance" (http://www.washingtonpost.com/world a-partner-to-and-a-target-of-nsa-surveillance-a-916029.html). /national-security/declassified-court-documents-highlight-nsa-violations Retrieved 12 August 2013. /2013/09/10/60b5822c-1a4b-11e3-a628-7e6dde8f889d_story.html). The Washington Post. Retrieved 14 September 2013.

40 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

149. ^ Gellman, Barton (16 August 2013). "NSA broke privacy rules 161. ^ a b c d e f Laura Poitras, Marcel Rosenbach and Holger Stark (26 thousands of times per year, audit finds" August 2013). "Codename 'Apalachee': How America Spies on Europe (http://www.washingtonpost.com/world/national-security/nsa-broke- and the UN" (http://www.spiegel.de/international/world/secret- privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15 nsa-documents-show-how-the-us-spies-on-europe-and-the- /3310e554-05ca-11e3-a07f-49ddc7417125_story.html). Retrieved 16 un-a-918625.html). Retrieved 26 August 2013. August 2013. 162. ^ a b c d e James Ball, Julian Borger and Glenn Greenwald 150. ^ Craig Whitlock and Barton Gellman (3 September 2013). "U.S. (2013-09-05). "US and UK spy agencies defeat privacy and security on documents detail al-Qaeda's efforts to fight back against drones" the internet" (http://www.theguardian.com/world/2013/sep/05/nsa- (http://www.washingtonpost.com/world/national-security gchq-encryption-codes-security). The Guardian. Retrieved 2013-09-05. /us-documents-detail-al-qaedas-efforts-to-fight-back-against-drones 163. ^ "Project Bullrun – classification guide to the NSA's decryption /2013/09/03/b83e7654-11c0-11e3-b630-36617ca6640f_story_3.html). program" (http://www.theguardian.com/world/interactive/2013/sep Retrieved 3 September 2013. /05/nsa-project-bullrun-classification-guide). September 5, 2013. 151. ^ Greg Miller, Craig Whitlock and Barton Gellman (2 September 2013). 164. ^ a b Barton Gellman and Matt DeLong (15 August 2013). "First direct "Top-secret U.S. intelligence files show new levels of distrust of evidence of illegal surveillance found by the FISA court" Pakistan" (http://www.washingtonpost.com/world/national-security (http://apps.washingtonpost.com/g/page/national/first-direct- /top-secret-us-intelligence-files-show-new-levels-of-distrust-of-pakistan evidence-of-illegal-surveillance-found-by-the-fisa-court/393/). The /2013/09/02/e19d03c2-11bf-11e3-b630-36617ca6640f_story_3.html). Washington Post. Retrieved 25 August 2013. Retrieved 3 September 2013. 165. ^ a b c d e f g NSA slides explain the PRISM data-collection program 152. ^ Staff (4 September 2013). "US intelligence uncovered Pak army plot (http://www.washingtonpost.com/wp-srv/special/politics/prism- to kill Asma Jahangir in India: report" (http://www.indiatvnews.com collection-documents/), The Washington Post, 6 June 2013, updated /news/world/us-intelligence-uncovered-pak-army-plot-to-kill-asma-- 10 July 2013. Retrieved 12 July 2013. 13317.html). Retrieved 4 September 2013. 166. ^ a b c d Siobhan Gorman and Jennifer Valentiono-Devries (20 August 153. ^ Staff (September 7, 2013). "Privacy Scandal: NSA Can Spy on Smart 2013). "New Details Show Broader NSA Surveillance Reach – Programs Phone Data" (http://www.spiegel.de/international/world Cover 75% of Nation's Traffic, Can Snare Emails" /a-920971.html). Retrieved 7 September 2013. (http://online.wsj.com/article 154. ^ A published heat map shows that most data is collected from Iran, /SB10001424127887324108204579022874091732470.html?mod=WSJ Pakistan and Jordan, with over 40 billion individual pieces of Europe_hpp_LEFTTopStories). The Wall Street Journal. Retrieved 21 information collected from these three countries alone in March 2013 August 2013. alone, from a total of 97 billion worldwide. 167. ^ a b "New slides about NSA collection programs" 155. ^ a b c d e f g h i j k l m n o p q r "NSA report on privacy violations in (http://electrospaces.blogspot.nl/2013/07/new-slides-about- the first quarter of 2012" (http://apps.washingtonpost.com/g/page nsa-collection-programs.html). Top Level Telecommunications. 16 July /national/nsa-report-on-privacy-violations-in-the-first-quarter-of-2012 2013 and updated on July 16, 2013. Retrieved 27 August 2013. /395/). The Washington Post. 16 August 2013. Retrieved 16 August 168. ^ Kloc, Joe (12 July 2013). "Forget PRISM: FAIRVIEW is the NSA's 2013. project to "own the Internet"" (http://www.dailydot.com 156. ^ Snowden reveals Australia's links to US spy web /news/fairview-prism-blarney-nsa-internet-spying-projects/). Retrieved (http://www.smh.com.au/world/snowden-reveals-australias-links- 11 August 2013. to-us-spy-web-20130708-2plyg.html), The Sydney Morning Herald, 8 169. ^ Glenn Greenwald, Roberto Kax and José Casado (12 July 2013). July 2013. Retrieved 11 July 2013. "Espionagem dos EUA se espalhou pela América Latina" 157. ^ a b c d e Glenn Greenwald and Spencer Ackerman (27 June 2013). (http://oglobo.globo.com/mundo/espionagem-dos-eua-se-espalhou- "How the NSA is still harvesting your online data" pela-america-latina-8966619). Retrieved 11 August 2013. (http://www.theguardian.com/world/2013/jun/27/nsa-online- 170. ^ a b c "The National Security Agency: Missions, Authorities, Oversight metadata-collection). The Guardian. Retrieved 1 August 2013. and Partnerships" (http://i2.cdn.turner.com/cnn/2013/images/08/09 158. ^ a b c "What to say, and not to say, to 'our overseers'" /2013_08_09_the_nsa_story1.pdf). National Security Agency. 9 August (http://apps.washingtonpost.com/g/page/national/what-to-say- 2013. Retrieved 12 August 2013. and-not-to-say-to-our-overseers/390/). 16 August 2013. Retrieved 16 171. ^ a b c Perez, Evan (10 August 2013). "Documents shed light on U.S. August 2013. surveillance programs" (http://edition.cnn.com/2013/08/09/politics 159. ^ a b c d Staff (29 July 2013). "Photo Gallery: NSA Documentation of /nsa-documents-scope/index.html?hpt=hp_t2). CNN. Retrieved 12 Spying in Germany" (http://www.spiegel.de/fotostrecke/photo-gallery- August 2013. nsa-documentation-of-spying-in-germany-fotostrecke-99672-4.html). 172. ^ a b Craig Timberg and Barton Gellman (30 August 2013). "NSA Retrieved 11 August 2013. paying U.S. companies for access to communications networks" 160. ^ a b Barton Gellman and Matt DeLong (15 August 2013). "What to (http://www.washingtonpost.com/world/national-security/nsa-paying- say, and not to say, to 'our overseers'" us-companies-for-access-to-communications-networks/2013/08 (http://apps.washingtonpost.com/g/page/national/what-to-say- /29/5641a4b6-10c2-11e3-bdf6-e4fc677d94a1_story.html). The and-not-to-say-to-our-overseers/390/#more). The Washington Post. Washington Post. Retrieved 31 August 2013. Retrieved 25 August 2013. 173. ^ a b James Ball and Spencer Ackerman (9 August 2013). "NSA loophole allows warrantless search for US citizens' emails and phone calls" (http://www.theguardian.com/world/2013/aug/09/nsa-loophole- warrantless-searches-email-calls#). Retrieved 11 August 2013.

41 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

174. ^ a b c Nakashima, Ellen (31 July 2013). "Newly declassified 187. ^ staff (September 16, 2013). "‘Foreign nation with significant means’ documents on phone records program released" in spying on Belgium probe" (http://rt.com/news/belgium-spying- (http://www.washingtonpost.com/world/national-security telecom-company-930/). Retrieved September 16, 2013. /governments-secret-order-to-verizon-to-be-unveiled-at-senate-hearing 188. ^ Schmitz, Gregor-Peter (September 20, 2013). "Cyber Attack: /2013/07/31/233fdd3a-f9cf-11e2-a369-d1954abcb7e3_story.html). The Belgians Angered by British Spying" (http://www.spiegel.de Washington Post. Retrieved 4 August 2013. /international/europe/belgian-prime-minister-angry-at-claims-of-british- 175. ^ a b c d e Ambinder, Marc (14 August 2013). "An Educated Guess spying-a-923583.html). Retrieved September 20, 2013. About How the NSA Is Structured" (http://www.theatlantic.com 189. ^ Gallagher, Ryan (September 20, 2013). "http://www.slate.com/blogs /technology/archive/2013/08/an-educated-guess-about-how-the- /future_tense/2013/09 nsa-is-structured/278697/). Retrieved 14 August 2013. /20/operation_socialist_u_k_s_gchq_hacked_belgacom_snowden_docu 176. ^ a b Gellman, Barton (15 June 2013). "U.S. surveillance architecture ments_reveal.html" (http://www.slate.com/blogs/future_tense includes collection of revealing Internet, phone metadata" /2013/09 (http://www.washingtonpost.com/investigations/us-surveillance- /20/operation_socialist_u_k_s_gchq_hacked_belgacom_snowden_docu architecture-includes-collection-of-revealing-internet-phone-metadata ments_reveal.html). Retrieved September 20, 2013. /2013/06/15/e9bf004a-d511-11e2-b05f-3ea3f0e7bb5a_print.html). 190. ^ a b Goebel, Nicole (25 August 2013). Schuster, Kathleen, ed. "NSA Retrieved 11 August 2013. spied on UN, German report says" (http://www.dw.de/nsa-spied- 177. ^ a b Staff (September 15, 2013). "'Follow the Money': NSA Spies on on-un-german-report-says/a-17043621). Deutsche Welle. Retrieved 25 International Payments 'Follow the Money': NSA Spies on International August 2013. Payments" (http://www.spiegel.de/international/world/spiegel- 191. ^ "NSA bugged UN headquarters – newspaper" (http://rt.com exclusive-nsa-spies-on-international-bank-transactions-a-922276.html). /news/nsa-us-un-germany-snowden-964/). 25 August 2013. Retrieved Retrieved 15 September 2013. 25 August 2013. 178. ^ a b c d Staff (1 September 2013). "'Success Story': NSA Targeted 192. ^ Barton Gellman and Craig Whitlock (29 August 2013). "To hunt French Foreign Ministry" (http://www.spiegel.de/international/world Osama bin Laden, satellites watched over Abbottabad, Pakistan, and /nsa-targeted-french-foreign-ministry-a-919693.html). Retrieved 1 Navy SEALs" (http://www.washingtonpost.com/world/national-security September 2013. /to-hunt-osama-bin-laden-satellites-watched-over-abbottabad- 179. ^ a b "Jornal O Globo revela que Brasil teria sido espionado pelos pakistan-and-navy-seals/2013/08/29/8d32c1d6-10d5-11e3- Estados Unidos" (http://g1.globo.com/bom-dia-brasil/noticia/2013/07 b4cb-fd7ce041d814_story.html). Retrieved 29 August 2013. /jornal-o-globo-revela-que-brasil-teria-sido-espionado-pelos-estados- 193. ^ Brooks, Bradley (1 September 2013). "Report: NSA spied on leaders unidos.html). 8 July 2013. Retrieved 5 September 2013. of Brazil, Mexico" (http://www.kansascity.com/2013/09/01/4452264 180. ^ a b Peterson, Josh (27 June 2013). "Report: NSA Internet spying /report-nsa-directly-spied-brazil.html). Retrieved 1 September 2013. program collected half-a-trillion records in 2012" (http://dailycaller.com 194. ^ Tiago Ornaghi and Flávio Lordello, ed. (1 September 2013). "Saiba /2013/06/27/report-nsa-internet-spying-program-collected-half-a- como o maior sistema de espionagem do mundo monitora trillion-records-in-2012/). The Daily Caller. Retrieved 29 July 2013. comunicações em Brasília" (http://globotv.globo.com/rede- 181. ^ a b Bamford, James (12 July 2013). "They Know Much More Than globo/fantastico/t/edicoes/v/saiba-como-o-maior-sistema- You Think" (http://www.nybooks.com/articles/archives/2013/aug de-espionagem-do-mundo-monitora-comunicacoes-em-brasilia /15/nsa-they-know-much-more-you-think/?pagination=false). The New /2795898/). Retrieved 1 September 2013. York Review of Books. Retrieved 29 July 2013. 195. ^ Cristina Tardáguila and Júnia Gama (1 September 2013). "EUA 182. ^ No alvo dos EUA (http://oglobo.globo.com/infograficos/big-brother- espionaram Dilma" (http://oglobo.globo.com/pais/eua-espionaram- am-latina/), Infographic, O Globo. Retrieved 8 July 2013. dilma-9782118). Retrieved 1 September 2013. 183. ^ James Ball, Julian Borger and Glenn Greenwald (6 September 196. ^ Barton Gellman and Ashkan Soltani (2013-10-14). "NSA collects 2013). "Revealed: how US and UK spy agencies defeat millions of e-mail address books globally" and security" (http://www.theguardian.com/world/2013/sep/05/nsa- (http://www.washingtonpost.com/world/national-security/nsa-collects- gchq-encryption-codes-security). The Guardian. Retrieved 7 September millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be- 2013. 34f9-11e3-80c6-7e6dd8d22d8f_story.html). 184. ^ a b Ball, James (25 October 2013). "Leaked memos reveal GCHQ 197. ^ a b "NSA surveillance: A guide to staying secure" efforts to keep mass surveillance secret" (http://www.theguardian.com (http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain- /uk-news/2013/oct/25/leaked-memos-gchq-mass-surveillance-secret- secure-surveillance). The Guardian. Retrieved 24 September 2013. snowden). The Guardian. Retrieved 25 October 2013. 198. ^ a b c Narayan Lakshman. "Secret bunkers, a challenge for U.S. 185. ^ a b Duncan Campbell, Oliver Wright, James Cusick, Kim Sengupta intelligence" (http://www.thehindu.com/news/international/world (22 August 2013). "Exclusive: Edward Snowden leaks reveal UK’s /secret-bunkers-a-challenge-for-us-intelligence secret Middle-East web surveillance base" /article5164833.ece?ref=relatedNews). The Hindu. Retrieved 24 (http://www.independent.co.uk/news/uk/politics/exclusive-edward- September 2013. snowden-leaks-reveal-uks-secret-middleeast-web-surveillance- 199. ^ Nelson, Kimberly (22 August 2013). "In Salt Lake for the 2002 base-8781082.html). Retrieved 22 August 2013. Olympics? Your texts, emails and phone calls likely reviewed by NSA" 186. ^ Greenwald, Glenn (23 August 2013). "Snowden: UK government (http://www.abc4.com/content/news/top_stories/story/In-Salt- now leaking documents about itself" (http://www.theguardian.com Lake-for-the-2002-Olympics-Your-texts/DYaHZbWho0e- /commentisfree/2013/aug/23/uk-government-independent-military- Bv2cmLfb3Q.cspx). Retrieved 25 August 2023. base). Retrieved 23 August 2013.

42 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

200. ^ Davidson, Lee (23 August 2013). "Former Salt Lake mayor: NSA 214. ^ Savage, Charlie (8 August 2013). "N.S.A. Said to Search Content of snooping is the scandal of the century" (http://www.sltrib.com/sltrib Messages to and From U.S" (http://www.nytimes.com/2013/08/08/us /politics/56774366-90/anderson-communications-federal- /broader-sifting-of-data-abroad-is-seen-by-nsa.html?pagewanted=all& government.html.csp). Retrieved 25 August 2013. _r=1&). Retrieved 11 August 2013. 201. ^ Freeze, Colin (15 June 2013). "How Canada's shadowy metadata- 215. ^ Nixon, Ron (3 July 2013). "U.S. Postal Service Logging All Mail for gathering program went awry" (http://www.theglobeandmail.com Law Enforcement" (http://www.nytimes.com/2013/07/04/us /news/national/how-canadas-shadowy-metadata-gathering-program- /monitoring-of-snail-mail.html?pagewanted=all& went-awry/article12580225/?page=all). Retrieved 27 August 2013. gwh=E70A808E920CA9668DA27B3DB2CD96B8). Retrieved 11 August 202. ^ "Raw documents: Canada's 'top secret' program" 2013. (http://www.theglobeandmail.com/news/national/raw-documents- 216. ^ Dharmakumar, Rohin (13 August 2013). "Keep your virtual life away -top-secret-data-mining-program/article12446852/). 10 June from prying governments" (http://www.moneycontrol.com 2013. Retrieved 27 August 2013. /news/features/keep-your-virtual-life-away-prying- 203. ^ Freeze, Colin (10 June 2013). "Data-collection program got green governments_931610.html). Retrieved 13 August 2013. light from MacKay in 2011" (http://www.theglobeandmail.com 217. ^ Parbat, Kalyan (27 July 2013). "Israel's Verint to get government /news/politics/data-collection-program-got-green-light-from-mackay- contract for interception tools" in-2011/article12444909/). Retrieved 27 August 2013. (http://articles.economictimes.indiatimes.com/2013-07-27 204. ^ Matt Apuzzo and Adam Goldman (25 August 2013). "The NYPD /news/40833490_1_interception-solution-cyber-security-interception- Division of Un-American Activities" (http://nymag.com/news/features tools). Retrieved 13 August 2013. /nypd-demographics-unit-2013-9/#). Retrieved 26 August 2013. 218. ^ Kirka, Danica (19 August 2013). "Partner of reporter at center of 205. ^ "Blue Coat" (http://surveillance.rsf.org/en/blue-coat-2/). Reporters NSA leak detained" (http://www.ksl.com/index.php?nid=235& Without Borders. 12 March 2013. sid=26489357&fm=most_popular). Retrieved 19 August 2013. 206. ^ Citizen Lab, Munk School of Global Affairs, University of (15 219. ^ Staff (21 August 2013). "New Zealand passes bill allowing domestic January 2013). "Planet Blue Coat: Mapping Global Censorship and spying" (http://www.abc.net.au/news/2013-08-21/new-zealand- Surveillance Tools" (https://citizenlab.org/2013/01/planet-blue-coat- passes-spy-bill/4903500). Retrieved 23 August 2013. mapping-global-censorship-and-surveillance-tools/). 220. ^ Watkins, Tracy (21 August 2013). "Spy bill passes into law amid 207. ^ Markoff, John (16 January 2013). "Rights Group Reports on Abuses wide criticism" (http://www.stuff.co.nz/national/politics/9071730 of Surveillance and Censorship Technology" (http://www.nytimes.com /Spy-bill-passes-into-law-amid-wide-criticism). Retrieved 23 August /2013/01/16/business/rights-group-reports-on-abuses-of-surveillance- 2013. and-censorship-technology.html?_r=1&). The New York Times. 221. ^ " Show #112: NSA Whistleblower Goes on Record -Reveals 208. ^ Nakashima, Ellen (8 July 2013). "Web monitoring devices made by New Information & Names Culprits!" (http://www.boilingfrogspost.com U.S. firm Blue Coat detected in Iran, Sudan" /2013/06/19/podcast-show-112-nsa-whistleblower-goes-on-record- (http://www.washingtonpost.com/world/national-security/report- reveals-new-information-names-culprits/) (Podcast). 19 June 2013. web-monitoring-devices-made-by-us-firm-blue-coat-detected-in-iran- http://www.boilingfrogspost.com/2013/06/19/podcast-show-112- sudan/2013/07/08/09877ad6-e7cf-11e2- nsa-whistleblower-goes-on-record-reveals-new-information-names- a301-ea5a8116d211_story.html). The Washington Post. culprits/. Retrieved 15 August 2013. 209. ^ "You Are Being Tracked: How License Plate Readers Are Being Used 222. ^ Hill, Kashmir (24 July 2013). "Blueprints of NSA's Ridiculously to Record Americans' Movements" (http://www.aclu.org/technology- Expensive Data Center in Utah Suggest It Holds Less Info Than and-/you-are-being-tracked-how-license-plate-readers- Thought" (http://www.forbes.com/sites/kashmirhill/2013/07 are-being-used-record). 17 July 2013. Retrieved 11 August 2013. /24/blueprints-of-nsa-data-center-in-utah-suggest-its-storage-capacity- 210. ^ Martinez, Michael (18 July 2013). "ACLU raises privacy concerns is-less-impressive-than-thought/). Retrieved 11 August 2013. about police technology tracking drivers" (http://edition.cnn.com 223. ^ a b Priest, Dana (21 July 2013). "NSA growth fueled by need to /2013/07/17/us/aclu-license-plates-readers). Retrieved 11 August target terrorists" (http://www.washingtonpost.com/world/national- 2013. security/nsa-growth-fueled-by-need-to-target-terrorists/2013/07 211. ^ McCullagh, Declan (2 August 2013). "FBI pressures Internet /21/24c93cf4-f0b1-11e2-bed3-b9b6fe264871_story.html). Retrieved 11 providers to install surveillance software" (http://news.cnet.com August 2013. /8301-13578_3-57596791-38/fbi-pressures-internet-providers- 224. ^ John Shiffman and Kristina Cooke (5 August 2013). "Exclusive: U.S. to-install-surveillance-software/). directs agents to cover up program used to investigate Americans" 212. ^ Jennifer Valentino-DeVries and Danny Yadron (3 August 2013). "FBI (http://www.reuters.com/article/2013/08/05/us-dea-sod- Taps Hacker Tactics to Spy on Suspects" (http://online.wsj.com idUSBRE97409R20130805). Retrieved 11 August 2013. /article_email/SB10001424127887323997004578641993388259674- 225. ^ John Shiffman and David Ingram (7 August 2013). "Exclusive: IRS lMyQjAxMTAzMDAwMTEwNDEyWj.html). Retrieved 12 August 2013. manual detailed DEA's use of hidden intel evidence" 213. ^ Choney, Suzanne (6 August 2013). "FBI hacking squad used in (http://uk.reuters.com/article/2013/08/07/uk-dea-irs- domestic investigations, experts say" (http://www.nbcnews.com idUKBRE9761B620130807). Retrieved 12 August 2013. /technology/fbi-hacking-squad-used-domestic-investigations-experts- 226. ^ Lindsay, Jonathan S (27 July 2013). "U.S. allowed Italian kidnap say-6C10851882). Retrieved 12 August 2013. prosecution to shield higher-ups, ex-CIA officer says" (http://www.mcclatchydc.com/2013/07/27/197823/us-allowed-italian- kidnap-prosecution.html). Retrieved 11 August 2013.

43 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

227. ^ Obama’s crackdown views leaks as aiding enemies of U.S. 241. ^ Cushing, Tim (September 18, 2013). "NSA Apparently Purchasing (http://www.mcclatchydc.com/2013/06/20/194513/obamas- Software Exploits From French Security Firm" crackdown-views-leaks-as.html#.UeA5tDtHLNx), McClatchy, 20 June (http://www.techdirt.com/articles/20130918/09245224568 2013. Retrieved 12 July 2013. /nsa-apparently-purchasing-software-exploits-french-security- 228. ^ "Stellungnahme des BSI zur aktuellen Berichterstattung zu MS firm.shtml). Retrieved September 18, 2013. Windows 8 und TPM" (https://www.bsi.bund.de/DE/Presse 242. ^ a b "How Edward Snowden led journalist and film-maker to reveal /Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html). NSA secrets" (http://www.theguardian.com/world/2013/aug 21 August 2013. Retrieved 22 August 2013. /19/edward-snowden-nsa-secrets-glenn-greenwald-laura-poitras). The 229. ^ Staff (22 August 2013). "German Federal Government Warns on the Guardian. Retrieved 20 August 2013. Security Dangers of Windows 8" (http://www.infosecurity-us.com 243. ^ a b Mark Hosenball (15 August 2013), Snowden downloaded NSA /view/34119/german-federal-government-warns-on-the-security- secrets while working for Dell, sources say (http://www.reuters.com dangers-of-windows-8/). Retrieved 22 August 2013. /article/2013/08/15/us-usa-security-snowden- 230. ^ Carol D. Leonnig, Julie Tate and Barton Gellman (1 September dell-idUSBRE97E17P20130815) Reuters 2013). "U.S. intelligence agencies spend millions to hunt for insider 244. ^ a b (18 August 2013), How Laura Poitras Helped threats, document shows" (http://www.washingtonpost.com/politics Snowden Spill His Secrets (http://www.nytimes.com/2013/08 /us-intelligence-agencies-spend-millions-to-hunt-for-insider-threats- /18/magazine/laura-poitras-snowden.html) The New York Times document-shows/2013/09/01/c6ab6c74-0ffe-11e3-85b6- 245. ^ Carmon, Irin (10 June 2013). "How we broke the NSA story" d27422650fd5_story.html?hpid=z3). Retrieved 2 September 2013. (http://www.salon.com/2013/06 231. ^ Strohm, Chris (23 August 2013). "Lawmakers Probing Intentional /10/qa_with_laura_poitras_the_woman_behind_the_nsa_scoops Abuses of Power by NSA Analysts" (http://www.bloomberg.com /singleton/). Salon. Retrieved 11 June 2013. /news/2013-08-23/nsa-analysts-intentionally-abused-spying-powers- 246. ^ Greenwald, Glenn; MacAskill, Ewen; Poitras, Laura (9 June 2013). multiple-times.html). Retrieved 23 August 2013. "Edward Snowden: the whistleblower behind the NSA surveillance 232. ^ Gorman, Siobhan (23 August 2013). "NSA Officers Sometimes Spy revelations" (http://www.guardian.co.uk/world/2013/jun/09/edward- on Love Interests" (http://blogs.wsj.com/washwire/2013/08/23/nsa- snowden-nsa-whistleblower-surveillance). The Guardian (London). officers-sometimes-spy-on-love-interests/). Retrieved 23 August 2013. Retrieved 9 June 2013. 233. ^ Scott Shane and Colin Moynihan (1 August 2013,). "Drug Agents 247. ^ Smith, Matt; Pearson, Michael (10 June 2013). "NSA leaker holed up Use Vast Phone Trove, Eclipsing N.S.A.’s" (http://www.nytimes.com in Hong Kong hotel, running low on cash" (http://edition.cnn.com /2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing- /2013/06/10/politics/nsa-leak/index.html). CNN. Retrieved 10 June nsas.html?pagewanted=1&_r=0&smid=tw-nytimes&partner=rss& 2013. emc=rss). Retrieved 2 August 2013. 248. ^ "U.S., British intelligence mining data from nine U.S. Internet 234. ^ "Synopsis of the Hemisphere Project" (http://www.nytimes.com companies in broad secret program" /interactive/2013/09/02/us/hemisphere-project.html). 1 September (http://articles.washingtonpost.com/2013-06-06 2013. Retrieved 2 September 2013. /news/39784046_1_prism-nsa-u-s-servers). The Washington Post. 235. ^ Andersson, Aron (September 6, 2013). "Video: Här pekar Duncan Retrieved 20 August 2013. Campbell ut Sverige" (http://www.metro.se/teknik/video-har-pekar- 249. ^ a b Ball, James (24 October 2013). "NSA monitored calls of 35 world duncan-campbell-ut-sverige/EVHmif!DURGOGm2hJtog/) (in Swedish). leaders after US official handed over contacts" Retrieved 7 September 2013. (http://www.theguardian.com/world/2013/oct/24/nsa-surveillance- 236. ^ Victor Stenquist and Lisa Röstlund (September 6, 2013). "Uppgifter world-leaders-calls). The Guardian. Retrieved 24 October 2013. om Sverige fick inte publiceras" (http://www.aftonbladet.se/nyheter 250. ^ Gellman, Barton; Poitras, Laura (6 June 2013). "US Intelligence /article17420027.ab) (in Swedish). Retrieved 7 September 2013. Mining Data from Nine U.S. Internet Companies in Broad Secret 237. ^ Staff (September 6, 2013). "Sweden sits on pipeline of intelligence Program" (http://www.washingtonpost.com/investigations 'gold'" (http://www.thelocal.se/50114/20130906/). Retrieved 7 /us-intelligence-mining-data-from-nine-us-internet-companies- September 2013. in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845- 238. ^ Staff (September 8, 2013). "Datenbank PX: CIA und deutsche d970ccb04497_story.html). The Washington Post. Retrieved 15 June Dienste betrieben jahrelang Geheimprojekt" (http://www.spiegel.de 2013. /politik/deutschland/cia-und-deutsche-dienste-betrieben-jahrelanges- 251. ^ Greenwald, Glenn; MacAskill, Ewen (6 June 2013). "NSA Prism geheimprojekt-in-neuss-a-920958.html) (in German). Retrieved 8 program taps in to user data of Apple, Google and others" September 2013. (http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants- 239. ^ Greenberg, Andy (September 17, 2013). "Amid NSA Scandal, ACLU nsa-data). The Guardian. Retrieved 15 June 2013. Report Turns Spotlight Back To FBI's 'Unchecked Abuse Of Authority'" 252. ^ Glenn Greenwald (6 June 2013). "NSA collecting phone records of (http://www.forbes.com/sites/andygreenberg/2013/09/17/amid- millions of Verizon customers daily" (http://www.guardian.co.uk/world nsa-scandal-aclu-report-turns-spotlight-back-to-fbis-unchecked-abuse- /2013/jun/06/nsa-phone-records-verizon-court-order). The Guardian. of-authority/). Retrieved September 17, 2013. Retrieved 16 September 2013. 240. ^ "Unleashed and Unaccountable: The FBI's Unchecked Abuse of 253. ^ MacAskill, Ewen; Borger, Julian; Hopkins, Nick; Davies, Nick; Ball, Authority" (https://www.aclu.org/unleashed-and-unaccountable). James (21 June 2013). "GCHQ taps fiber-optic cables for secret access September 17, 2013. Retrieved September 17, 2013. to world's communications" (http://www.guardian.co.uk/uk/2013 /jun/21/gchq-cables-secret-world-communications-nsa). The Guardian.

44 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

254. ^ Glenn Greenwald and Spencer Ackerman (27 June 2013). "NSA 265. ^ MacAskill, Ewen (23 August 2013). "NSA paid millions to cover Prism collected US email records in bulk for more than two years under compliance costs for tech companies • Top-secret files show first Obama" (http://www.theguardian.com/world/2013/jun/27/nsa- evidence of financial relationship • Prism companies include Google data-mining-authorised-obama). The Guardian. Retrieved 1 August and Yahoo, says NSA • Costs were incurred after 2011 Fisa court 2013. ruling" (http://www.theguardian.com/world/2013/aug/23/nsa-prism- 255. ^ MacAskill, Ewen; Borger, Julian (30 June 2013). "New NSA leaks costs-tech-companies-paid). The Guardian. Retrieved 24 August 2013. show how US is bugging its European allies" 266. ^ "NSA and Israeli intelligence: memorandum of understanding – full (http://www.guardian.co.uk/world/2013/jun/30/nsa-leaks-us-bugging- document" (http://www.theguardian.com/world/interactive/2013/sep european-allies). The Guardian (London). /11/nsa-israel-intelligence-memorandum-understanding-document). 256. ^ Glenn Greenwald, Ewen MacAskill, Laura Poitras, Spencer Ackerman The Guardian. 11 September 2013. Retrieved 14 September 2013. and Dominic Rushe (11 July 2013). "Revealed: how Microsoft handed 267. ^ a b Siobhan Gorhan and Adam Entous (28 October 2013). "Obama the NSA access to encrypted messages" (http://www.guardian.co.uk Unaware as U.S. Spied on World Leaders: Officials" /world/2013/jul/11/microsoft-nsa-collaboration-user-data). The (http://online.wsj.com/news/articles Guardian. Retrieved 11 July 2013. /SB10001424052702304470504579162110180138036). The Wall 257. ^ Greenwald, Glenn (31 July 2013)."XKeyscore: NSA tool collects Street Journal. Retrieved 28 October 2013. 'nearly everything a user does on the internet' – XKeyscore Gives 268. ^ Barton Gellman and Laura Poitras (6 June 2013). "U.S., British 'Widest-Reaching' Collection of Online Data – NSA Analysts Require No intelligence mining data from nine U.S. Internet companies in broad Prior Authorization for Searches – Sweeps Up Emails, Social Media secret program" (http://www.washingtonpost.com/investigations Activity and Browsing History" (http://www.theguardian.com/world /us-intelligence-mining-data-from-nine-us-internet-companies- /2013/jul/31/nsa-top-secret-program-online-data). The Guardian. in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845- Retrieved 1 August 2013. d970ccb04497_story.html). The Washington Post. Retrieved 24 August 258. ^ Charlie Savage and David E. Sanger (31 July 2013). "Senate Panel 2013. Presses N.S.A. on Phone Logs" (http://www.nytimes.com/2013/08 269. ^ Gellmann, Barton (16 August 2013). "NSA broke privacy rules /01/us/nsa-surveillance.html?pagewanted=all&_r=0). The New York thousands of times per year, audit finds" Times. Retrieved 4 August 2013. (http://www.washingtonpost.com/world/national-security/nsa-broke- 259. ^ James Ball, and Juliette Garside (1 August 2013). privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15 "Exclusive: NSA pays £100m in secret funding for GCHQ" /3310e554-05ca-11e3-a07f-49ddc7417125_story.html). The (http://www.theguardian.com/uk-news/2013/aug/01/nsa-paid-gchq- Washington Post. Retrieved 24 August 2013. spying-edward-snowden). Retrieved 2 August 2013. 270. ^ Nakashima, Ellen (16 August 2013). "Lawmakers, privacy advocates 260. ^ James Ball and Spencer Ackerman (9 August 2013). "NSA loophole call for reforms at NSA" (http://www.washingtonpost.com/world allows warrantless search for US citizens' emails and phone calls – /national-security/lawmakers-privacy-advocates-call-for-reforms-at-nsa Exclusive: Spy agency has secret backdoor permission to search /2013/08/16/7cccb772-0692-11e3-a07f-49ddc7417125_story.html). databases for individual Americans' communications" The Washington Post. Retrieved 25 August 2013. (http://www.theguardian.com/world/2013/aug/09/nsa-loophole- 271. ^ Gellmann, Barton (16 August 2013). "NSA statements to The Post" warrantless-searches-email-calls). The Guardian. Retrieved 12 August (http://www.washingtonpost.com/world/national-security 2013. /nsa-statements-to-the-post/2013/08/15/f40dd2c4-05d6-11e3- 261. ^ Farivar, Cyrus (10 August 2013). "New leak: NSA can search US a07f-49ddc7417125_story.html). The Washington Post. Retrieved 25 e-mail data but theoretically won’t" (http://arstechnica.com/tech-policy August 2013. /2013/08/new-leak-nsa-can-search-us-e-mail-data-but-theoretically- 272. ^ Barton Gellman and Matt DeLong (15 August 2013). "What's a isnt-allowed-to/). . Retrieved 13 August 2013. 'violation'?" (http://apps.washingtonpost.com/g/page/national/whats- 262. ^ Ball, James (21 August 2013). "Edward Snowden NSA files: secret a-violation/391/). The Washington Post. Retrieved 25 August 2013. surveillance and our revelations so far – Leaked National Security 273. ^ Leonnig, Carol D. (16 August 2013). "Court: Ability to police U.S. Agency documents have led to several hundred Guardian stories on spying program limited" (http://www.washingtonpost.com/politics electronic privacy and the state" (http://www.theguardian.com/world /court-ability-to-police-us-spying-program-limited/2013/08 /2013/aug/21/edward-snowden-nsa-files-revelations). The Guardian. /15/4a8c8c44-05cd-11e3-a07f-49ddc7417125_story.html). The Retrieved 24 August 2013. Washington Post. Retrieved 25 August 2013. 263. ^ Roberts, Dan (23 August 2013). "US surveillance guidelines not 274. ^ Wallsten, Peter (17 August 2013). "House panel withheld document updated for 30 years, privacy board finds – Privacy watchdog points on NSA surveillance program from members" out in letter to intelligence chiefs that rules designed to protect (http://www.washingtonpost.com/politics/house-panel-withheld- Americans are severely outdated" (http://www.theguardian.com/world document-on-nsa-surveillance-program-from-members/2013/08 /2013/aug/23/us-surveillance-rules-30-years). The Guardian. Retrieved /16/944e728e-0672-11e3-9259-e2aafe5a5f84_story.html). The 24 August 2013. Washington Post. Retrieved 25 August 2013. 264. ^ Medine, David (22 August 2013). "2013-08-22 Privacy and Civil 275. ^ Weich, Ronald. "Report of the National Security Agency's Bulk Liberties Oversight Board letter to US Attorney General and Collection Programs for USA PATRIOT Act Reauthorization" Directer of National Intelligence James Clapper" (http://www.dni.gov/files/documents (https://s3.amazonaws.com/s3.documentcloud.org/documents/778168 /2011_CoverLetters_Report_Collection.pdf). Office of the Assistant /pclob-guidelines-letter-1.pdf). amazonnews.com. Retrieved 24 August Attorney General. Director of National Intelligence. Retrieved 25 2013. August 2013.

45 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

276. ^ Aid, Matthew M. (10 June 2013). "Inside the NSA's -Secret 287. ^ Soltani, Ashkan (14 October 2013). "Here’s everything you should China Hacking Group" (http://www.foreignpolicy.com/articles/2013/06 know about NSA address book spying in one FAQ" /10/inside_the_nsa_s_ultra_secret_china_hacking_group?page=0,0). (http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/14 Foreign Policy. Retrieved 11 June 2013. /heres-everything-you-know-about-nsa-address-book-spying-in-one- 277. ^ Barton Gellman. "Secret documents detail U.S. war in cyberspace" faq/). The Washington Post. Retrieved 18 October 2013. (http://www.japantimes.co.jp/news/2013/08/31/world/secret- 288. ^ Jennifer Valentino-Devries and Danny Yadron (1 August 2013). "FBI documents-detail-u-s-war-in-cyberspace). The Washington Post (via Taps Hacker Tactics to Spy on Suspects" (http://online.wsj.com/article The Japan Times). Retrieved 2 September 2013. /SB10001424127887323997004578641993388259674.html). The Wall 278. ^ Barton Gellman and Ellen Nakashima (31 August 2013). "U.S. spy Street Journal. Retrieved 9 October 2013. agencies mounted 231 offensive cyber-operations in 2011, documents 289. ^ Jennifer Valentino-DeVries and Danny Yadron (1 August 2013). show" (http://www.washingtonpost.com/world/national-security "How the FBI Hacks Criminal Suspects" (http://blogs.wsj.com/digits /us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011- /2013/08/01/how-the-fbi-hacks-criminal-suspects/). The Wall Street documents-show/2013/08/30/d090a6ae-119e-11e3- Journal. Retrieved 9 October 2013. b4cb-fd7ce041d814_story.html). The Washington Post. Retrieved 31 290. ^ "Graphic: How the NSA Scours Internet Traffic in the U.S." August 2013. (http://online.wsj.com/article 279. ^ Konrad Lischka und Julia Stanek (31 August 2013). "Cyber-Angriffe: /SB10001424127887324108204579022874091732470.html?mod=WSJ USA infizieren Zehntausende Computer mit NSA-Trojanern" Europe_hpp_LEFTTopStories#project%3DNSA0820%26articleTabs%3D (http://www.spiegel.de/netzwelt/web/genie-programm-usa-infizierten- interactive). The Wall Street Journal. 20 August 2013. Retrieved 21 zehntausende-rechner-a-919625.html). Der SPIEGEL (in German). August 2013. Retrieved 31 August 2013. 291. ^ Jennifer Valentiono-Devries and Siobhan Gorman (20 August 2013). 280. ^ Zetter, Kim (4 September 2013). "NSA Laughs at PCs, Prefers "What You Need to Know on New Details of NSA Spying" Hacking Routers and Switches" (http://www.wired.com/threatlevel (http://online.wsj.com/article /2013/09/nsa-router-hacking/). Wired.com. Retrieved 2 October 2013. /SB10001424127887324108204579025222244858490.html?mod=WSJ 281. ^ Nakashima, Ellen (2 October 2013). "NSA had test project to collect Europe_hpp_LEFTTopStories). The Wall Street Journal. Retrieved 21 data on Americans’ cellphone locations, director says" August 2013. (http://www.washingtonpost.com/world/national-security/nsa-had- 292. ^ Angwin, Julia (13 December 2012). "U.S. Terrorism Agency to Tap a test-project-to-collect-data-on-americans-cellphone-locations-director- Vast Database of Citizens" (http://online.wsj.com/article says/2013/10/02/65076278-2b71-11e3-8ade- /SB10001424127887324108204579025222244858490.html?mod=WSJ a1f23cda135e_story.html). The Washington Post. Retrieved 18 October Europe_hpp_LEFTTopStories). The Wall Street Journal. Retrieved 21 2013. August 2013. 282. ^ Ehrenfreud, Max (15 October 2013). "Leaks by Edward Snowden 293. ^ Savage, Charlie (8 August 2013). "N.S.A. Said to Search Content of suggest NSA collects millions of Americans’ address books" Messages to and From U.S." (http://www.nytimes.com/2013/08/08/us (http://www.washingtonpost.com/world/national-security/leaks- /broader-sifting-of-data-abroad-is-seen-by-nsa.html?pagewanted=all). by-edward-snowden-suggest-nsa-collects-millions-of-americans- The New York Times. Retrieved 30 September 2013. address-books/2013/10/15/ce043b56-359f- 294. ^ and Laura Poitras (28 September 2013). "N.S.A. 11e3-be86-6aeaa439845b_story.html). The Washington Post. Gathers Data on Social Connections of U.S. Citizens" Retrieved 18 October 2013. (http://www.nytimes.com/2013/09/29/us/nsa-examines-social- 283. ^ Barton Gellman and Ashkan Soltani (15 October 2013). "NSA networks-of-us-citizens.html?_r=0&pagewanted=all). The New York collects millions of e-mail address books globally" Times. Retrieved 30 September 2013. (http://www.washingtonpost.com/world/national-security/nsa-collects- 295. ^ Strohm, Chris (24 August 2013). "Lawmakers Probe Willful Abuses millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be- of Power by NSA Analysts" (http://www.bloomberg.com 34f9-11e3-80c6-7e6dd8d22d8f_story.html). The Washington Post. /news/2013-08-23/nsa-analysts-intentionally-abused-spying-powers- Retrieved 18 October 2013. multiple-times.html). Bloomberg News. Retrieved 24 August 2013. 284. ^ Barton Gellman and Matt DeLong (15 October 2013). "The NSA's 296. ^ Roberts, Dan (23 August 2013). "NSA analysts deliberately broke problem? Too much data." (http://apps.washingtonpost.com/g/page rules to spy on Americans, agency reveals – Inspector general's /world/the-nsas-overcollection-problem/517/). The Washington Post. admission undermines fresh insistences from president that breaches Retrieved 18 October 2013. of privacy rules were inadvertent" (http://www.theguardian.com/world 285. ^ Barton Gellman and Matt DeLong (15 October 2013). "SCISSORS: /2013/aug/23/nsa-analysts-broke-rules-spy). The Guardian. Retrieved How the NSA collects less data" (http://apps.washingtonpost.com 24 August 2013. /g/page/world/how-the-nsa-tried-to-collect-less/518/). The 297. ^ Gorman, Siobhan (23 August 2013). "NSA Officers Spy on Love Washington Post. Retrieved 18 October 2013. Interests" (http://blogs.wsj.com/washwire/2013/08/23/nsa-officers- 286. ^ Barton Gellman and Matt DeLong (15 October 2013). "An excerpt sometimes-spy-on-love-interests/). The Wall Street Journal. Retrieved from the NSA's Wikipedia" (http://apps.washingtonpost.com/g/page 24 August 2013. /world/an-excerpt-from-/519/). The Washington Post. 298. ^ EXCLUSIVE: US hacks Chinese mobile phone companies Retrieved 18 October 2013. (http://www.scmp.com/news/china/article/1266821/us-hacks-chinese- mobile-phone-companies-steals-sms-data-edward-snowden), South China Morning Post

46 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

299. ^ NSA targeted China's Tsinghua University in hacking attacks 313. ^ Fischer, Sebastian (24 October 2013). "Merkel's Phone: Spying (http://www.scmp.com/news/china/article/1266892/exclusive- Suspicions Put Obama in a Tight Spot" (http://www.spiegel.de nsa-targeted-chinas-tsinghua-university-extensive-hacking), South /international/world/suspicions-of-us-spying-on-merkel-phone- China Morning Post awkward-for-obama-a-929692.html). Der Spiegel. Retrieved 25 300. ^ Lam, Lana (23 June 2013). "US hacked Pacnet, Asia Pacific October 2013. fibre-optic network operator, in 2009" (http://www.scmp.com 314. ^ Charly Wilder and Rupert Neat (24 October). "'Out of Hand': Europe /news/hong-kong/article/1266875/exclusive-us-hacked-pacnet- Furious Over US Spying Allegations" (http://www.spiegel.de asia-pacific-fibre-optic-network-operator). South China Morning Post /international/world/angry-european-and-german-reactions-to-merkel- (Hong Kong). Retrieved 25 June 2013. us-phone-spying-scandal-a-929725.html). Der Spiegel. Retrieved 25 301. ^ Laura Poitras, Marcel Rosenbach und Holger Stark. October 2013. "Geheimdokumente: NSA überwacht 500 Millionen Verbindungen in 315. ^ Ian Traynor in Brussels, Philip Oltermann in Berlin, and Paul Lewis in Deutschland" (http://www.spiegel.de/netzwelt/netzpolitik Washington (24 October). "Angela Merkel's call to Obama: are you /nsa-ueberwacht-500-millionen-verbindungen-in-deutschland- bugging my mobile phone?" (http://www.theguardian.com/world a-908517.html). Der Spiegel (in German). Retrieved 30 June 2013. /2013/oct/23/us-monitored-angela-merkel-german). The Guardian. 302. ^ Iain Thomson (8 July 2013). "Snowden: US and Israel did create Retrieved 25 October 2013. Stuxnet attack code" (http://www.theregister.co.uk/2013/07 316. ^ Ball, James (25 October 2013). "NSA monitored calls of 35 world /08/snowden_us_israel_stuxnet/). The Register. Retrieved 8 July 2013. leaders after US official handed over contacts" 303. ^ "Interview mit Edward Snowden: NSA liefert BND Werkzeuge für (http://www.theguardian.com/world/2013/oct/24/nsa-surveillance- Lauschangriff" (http://www.spiegel.de/politik/ausland/interview- world-leaders-calls). The Guardian. Retrieved 25 October 2013. mit-edward-snowden-im-spiegel-nsa-und-bnd-arbeiten-zusammen- 317. ^ Traynor, Ian (25 October 2013). "Germany and France warn NSA a-909800.html). Der Spiegel (in German). 7 July 2013. Retrieved 14 spying fallout jeopardises fight against terror" September 2013. (http://www.theguardian.com/world/2013/oct/25/germany-france- 304. ^ "Snowden: NSA steckte "unter einer Decke mit den Deutschen" nsa-spying-merkel-hollande-eu). The Guardian. Retrieved 25 October Zusammenarbeit zwischen US-Geheimdienst und BND offenbar enger 2013. als bekannt" (http://www.dradio.de/aktuell/2168273/) (in German). 318. ^ "NSA-Überwachung: Merkels Handy steht seit 2002 auf Deutschlandradio. 7 July 2013. Retrieved 14 September 2013. US-Abhörliste" (http://www.spiegel.de/politik/deutschland 305. ^ unlisted (3 August 2013). "Überwachung: BND leitet massenhaft /nsa-ueberwachung-merkel-steht-seit-2002-auf-us-abhoerliste- Metadaten an die NSA weiter" (http://www.spiegel.de/netzwelt a-930193.html). Der Spiegel (in German). 26 October 2012. Retrieved /netzpolitik/bnd-leitet-laut-spiegel-massenhaft-metadaten-an-die- 26 October 2013. nsa-weiter-a-914682.html). Retrieved 3 August 2013. 319. ^ "U.S. monitored German Chancellor Angela Merkel's phone since 306. ^ Geiger, Friedrich (3 August 2013). "German Intelligence Agency 2002" (http://www.dailymail.co.uk/news/article-2477593 Providing NSA With Metadata – Report" (http://online.wsj.com/article /U-S-monitored-German-Chancellor-Angela-Merkels-phone-2002.html). /BT-CO-20130803-700914.html). Retrieved 3 August 2013. Reuters. The Daily Mail. 26 October 2012. Retrieved 26 October 2013. 307. ^ Mass Data: Transfers from Germany Aid US Surveillance 320. ^ Ofer Aderet (26 October 2015). "Obama: Had I known NSA tapped (http://www.spiegel.de/international/world/german-intelligence-sends- Merkel's cell, I would have stopped it, German media reports" massive-amounts-of-data-to-the-nsa-a-914821.html) 5 August 2013 (http://www.haaretz.com/news/world/1.554526). . Retrieved 308. ^ "Snowden-Enthüllungen: NSA spionierte al-Dschasira aus" 26 October 2013. (http://www.spiegel.de/netzwelt/netzpolitik/arabischer- 321. ^ David E. Sanger and (24 October 2013). "Allegation nachrichtensender-nsa-spionierte-al-dschasira-aus-a-919688.html). Der of U.S. Spying on Merkel Puts Obama at Crossroads" SPIEGEL (in German). 31 August 2013. Retrieved 31 August 2013. (http://www.nytimes.com/2013/10/25/world/europe/allegation-of-us- 309. ^ "'Follow the Money': NSA Spies on International Payments" spying-on-merkel-puts-obama-at-crossroads.html). The New York (http://www.spiegel.de/international/world/spiegel-exclusive- Times. Retrieved 26 October 2013. nsa-spies-on-international-bank-transactions-a-922276.html). Der 322. ^ EUA espionaram milhões de e-mails e ligações de brasileiros Spiegel. 15 September 2013. Retrieved 24 September 2013. (http://oglobo.globo.com/mundo/eua-espionaram-milhoes-de-mails- 310. ^ Jens Glüsing, Laura Poitras, Marcel Rosenbach and Holger Stark (20 ligacoes-de-brasileiros-8940934), O Globo, 6 July 2013. Retrieved 8 October 2013). "Fresh Leak on US Spying: NSA Accessed Mexican July 2013. President's Email" (http://www.spiegel.de/international/world 323. ^ The NSA's mass and indiscriminate spying on Brazilians /nsa-hacked-email-account-of-mexican-president-a-928817.html). Der (http://www.guardian.co.uk/commentisfree/2013/jul/07/nsa-brazilians- Spiegel. Retrieved 22 October 2013. globo-spying), Glenn Greenwald, The Guardian, 7 July 2013. Retrieved 311. ^ "NSA-Spionage: Mexiko fordert Aufklärung über US-Bespitzelungen" 8 July 2013. (http://www.spiegel.de/politik/ausland/nsa-spionage-mexiko-fordert- 324. ^ EUA expandem o aparato de vigilância continuamente aufklaerung-ueber-us-bespitzelungen-a-928946.html). Der Spiegel (in (http://oglobo.globo.com/mundo/eua-expandem-aparato-de-vigilancia- German). 21 October 2013. Retrieved 22 October 2013. continuamente-8941149), O Globo, 6 July 2013. Retrieved 8 July 2013. 312. ^ , Holger Stark, Marcel Rosenbach and Jörg 325. ^ Philip Dorling (8 July 2013). "Snowden reveals Australia's links to US Schindler (23 October 2013). "Berlin Complains: Did US Tap Chancellor spy web" (http://www.theage.com.au/world/snowden-reveals- Merkel's Mobile Phone?" (http://www.spiegel.de/international/world -links-to-us-spy-web-20130708-2plyg.html). The Age World. /merkel-calls-obama-over-suspicions-us-tapped-her-mobile-phone- Retrieved 8 July 2013. a-929642.html). Der Spiegel. Retrieved 25 October 2013.

47 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

326. ^ a b "Brazil Angered Over Report N.S.A. Spied on President" 338. ^ "Auch Verfassungsschutz liefert Daten an NSA "Süddeutsche (http://www.nytimes.com/2013/09/03/world/americas/brazil-angered- Zeitung" und NDR berichten über intensiven Datenaustausch" over-report-nsa-spied-on-president.html?_r=0). The New York Times. (http://www.dradio.de/aktuell/2250771/). Deutschland Radio (in Retrieved 16 September 2013. German). Deutschland Radio. 13 September 2013. Retrieved 14 327. ^ "NSA Documents Show United States Spied Brazilian Oil Giant" September 2013. (http://g1.globo.com/fantastico/noticia/2013/09/nsa-documents- 339. ^ "Frankreich liefert Informationen an britische und show-united-states-spied-brazilian-oil-giant.html). Jornal da Globo US-Geheimdienste" (http://www.sueddeutsche.de/politik/codename- Fantástico. 8 September 2013. Retrieved 24 September 2013. lustre-frankreich-liefert-informationen-an-britische-und-us- 328. ^ "Ministério de Minas e Energia está na mira de espiões americanos e geheimdienste-1.1804606). Süddeutsche Zeitung (in German). 26 canadenses" (http://g1.globo.com/fantastico/noticia/2013/10 October 2013. Retrieved 26 October 2013. /ministerio-das-minas-e-energia-esta-na-mira-de-espioes-americanos- 340. ^ Nicole Perlroth, Jeff Larson and Scott Shane (2013-09-05). "N.S.A. e-canadenses.html). O Globo. 6 October 2013. Retrieved 8 October Foils Much Internet Encryption" (http://www.nytimes.com/2013/09 2013. /06/us/nsa-foils-much-internet-encryption.html?_r=0). The New York 329. ^ "Report: Canada spies targeted Brazil mine ministry" Times. Retrieved 2013-09-05. (http://bigstory.ap.org/article/report-canada-spies-targeted-brazil- 341. ^ "Secret Documents Reveal N.S.A. Campaign Against Encryption" mine-ministry). The Associated Press. The Associated Press. 6 October (http://www.nytimes.com/interactive/2013/09/05/us/documents- 2013. Retrieved 8 October 2013. reveal-nsa-campaign-against-encryption.html?ref=us). The New York 330. ^ Ockenden, Will (8 October 2013). "Australia prepared briefing on US Times. 5 September 2013. Retrieved 7 September 2013. global internet spying program PRISM before Snowden revelations" 342. ^ "Unlocking Private Communications" (http://www.nytimes.com (http://www.abc.net.au/news/2013-10-08/australia-prepared-briefing- /interactive/2013/09/05/us/unlocking-private- on-prism-spying-program/5004290). ABC News (Australia). Retrieved 8 communications.html?ref=us). The New York Times. 5 September October 2013. 2013. Retrieved 7 September 2013. 331. ^ "AG Department Prism FOI PDF" (http://de.scribd.com 343. ^ Perlroth, Nicole, Larson, Jeff, and Shane, Scott (September 5, 2013). /doc/174279481/ag-department-prism-foi-pdf). ABC News Online. 27 "The NSA’s Secret Campaign to Crack, Undermine Internet Security" June 2013. Retrieved 8 October 2013. (http://www.propublica.org/article/the-nsas-secret-campaign-to-crack- 332. ^ "NDR/SZ: Neue Dokumente belasten britischen Geheimdienst – undermine-internet-encryption). ProPublica. Deutsche Telekom verlangt Auskünfte" (http://www.ndr.de 344. ^ Nakashima, Ellen (6 September 2013). "NSA has made strides in /unternehmen/presse/pressemitteilungen thwarting encryption used to protect Internet communication" /pressemeldungndr12881.html). NDR Presse und Information (in (http://www.washingtonpost.com/world/national-security/nsa-has- German). NDR. 28 August 2013. Retrieved 30 August 2013. made-strides-in-thwarting-encryption-used-to-protect-internet- 333. ^ a b John Goetz, Hans Leyendecker and Frederik Obermaier (28 communication/2013/09/05/0ec08efc-1669-11e3- August 2013). "Britischer Geheimdienst zapft Daten aus Deutschland a2ec-b47e45e6f8ef_story.html?hpid=z3). The Washington Post. ab" (http://www.sueddeutsche.de/politik/internet-ueberwachung- Retrieved 7 September 2013. britischer-geheimdienst-zapft-daten-aus-deutschland-ab-1.1757068). 345. ^ Jacques Follorou and Glenn Greenwald (21 October 2013). "France Süddeutsche Zeitung (in German). Retrieved 30 August 2013. in the NSA's crosshair : phone networks under surveillance" 334. ^ a b c d e f g h John Goetz and Frederik Obermaier. "Snowden (http://www.lemonde.fr/technologies/article/2013/10/21/france-in-the- enthüllt Namen der spähenden Telekomfirmen" nsa-s-crosshair-phone-networks-under- (http://www.sueddeutsche.de/digital/internet-ueberwachung- surveillance_3499741_651865.html). Le Monde. Retrieved 22 October snowden-enthuellt-namen-der-spaehenden-telekomfirmen-1.1736791). 2013. Süddeutsche Zeitung (in German). Retrieved 2 August 2013. "In den 346. ^ Gearan, Anna (22 October 2013). "Report that NSA collected French internen Papieren des GCHQ aus dem Jahr 2009 stehen sie nun phone records causing diplomatic headache for U.S." aufgelistet: Verizon Business, Codename: Dacron, British (http://www.washingtonpost.com/world/national-security/report- Telecommunications (codenamed "Remedy"), Vodafone Cable that-nsa-collected-french-phone-records-causing-diplomatic-headache- ("Gerontic"), Global Crossing ("Pinnage"), Level 3 (codenamed for-us/2013/10/21/bfa74f22-3a76-11e3- "Little"), Viatel ("Vitreous") und Interoute ("Streetcar")." a94f-b58017bfee6c_story.html). The Washington Post. Retrieved 22 335. ^ "Snowden enthüllt Namen der spähenden Telekomfirmen" October 2013. (http://www.sueddeutsche.de/digital/internet-ueberwachung- 347. ^ "Espionnage de la NSA : tous les documents publiés par "Le snowden-enthuellt-namen-der-spaehenden-telekomfirmen-1.1736791). Monde"" (http://www.lemonde.fr/technologies/article/2013/10 Süddeutsche Zeitung. Retrieved 2 August 2013. /21/espionnage-de-la-nsa-tous-les-documents-publies-par-le- 336. ^ "Verfassungsschutz spionierte für Geheimdienste - Bundesamt-Chef monde_3499986_651865.html). Le Monde. 21 October 2013. Maaßen stimmte zu" (http://www.ndr.de/unternehmen/presse Retrieved 22 October 2013. /pressemitteilungen/pressemeldungndr13009.html). Norddeutscher 348. ^ "Obama: "Nobody is listening to your telephone calls"" Rundfunk (in German). Norddeutscher Rundfunk. 13 September 2013. (http://www.cbsnews.com/8301-250_162-57588239/obama-nobody- Retrieved 14 September 2013. is-listening-to-your-telephone-calls/). CBS News. Retrieved 9 July 337. ^ "Verfassungsschutz beliefert NSA" (http://www.sueddeutsche.de 2013. /politik/spionage-in-deutschland-verfassungsschutz-beliefert- 349. ^ "Obama To Leno: 'There Is No Spying On Americans'" nsa-1.1770672). Süddeutsche Zeitung (in German). 13 September (http://m.npr.org/news/front/209692380). NPR. Retrieved 14 August 2013. Retrieved 14 September 2013. 2013.

48 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

350. ^ Kessler, Glenn. "James Clapper's 'least untruthful' statement to the 361. ^ Chelsea J. Carter and Jessica Yellin (10 August 2013). "Obama: Senate" (http://www.washingtonpost.com/blogs/fact-checker Snowden can 'make his case' in court; no Olympics boycott" /post/james-clappers-least-untruthful-statement-to-the-senate (http://edition.cnn.com/2013/08/09/politics/obama-news-conference /2013/06/11/e50677a8-d2d8-11e2-a73e-826d299ff459_blog.html). /index.html?hpt=hp_t2). CNN. Retrieved 12 August 2013. The Washington Post. Retrieved 13 August 2013. 362. ^ "White House surveillance reform plan – Administration White 351. ^ James Clapper interviewed by Andrea Mitchell of NBC News, June 9 Paper: 'Bulk Collection of Telephony Metadata under Section 215 of the 2013 (http://www.nbcumv.com/mediavillage/networks/nbcnews USA Patriot Act'" (http://apps.washingtonpost.com/g/page/politics /pressreleases?pr=contents/press-releases/2013/06 /obama-administration-white-paper-on-nsa-surveillance-oversight /09/nbcnewsexclusiv1370799482417.xml). Retrieved 19 Sept 2013. /388/). The Washington Post. 9 August 2013. Retrieved 14 August 352. ^ a b "DNI Clapper Letter on Misunderstandings Arising from his 2013. March 12th Appearance Before the Senate Select Committee on 363. ^ "Obama administration asserts broad surveillance powers" Intelligence" (http://www.webcitation.org/6I9BnJX1H). Director of (http://www.washingtonpost.com/politics/obama-administration- National Intelligence. Archived from the original (http://www.dni.gov asserts-broad-surveillance-powers/2013/08 /files/documents /09/ff429504-0134-11e3-96a8-d3b921c0924a_story.html). The /2013-06-21%20DNI%20Ltr%20to%20Sen.%20Feinstein.pdf) on 16 Washington Post. 10 August 2013. Retrieved 14 August 2013. December 2013. Retrieved 9 July 2013. 364. ^ Priest, Dana (9 August 2013). "Piercing the confusion around NSA's 353. ^ Turner, Shawn (31 July 2013). "DNI Clapper Declassifies and phone surveillance program" (http://www.washingtonpost.com/world Releases Telephone Metadata Collection Documents" /national-security/piercing-the-confusion-around-nsas-phone- (http://www.dni.gov/index.php/newsroom/press-releases/191-press- surveillance-program/2013/08/08/bdece566-fbc4-11e2-9bde- releases-2013/908-dni-clapper-declassifies-and-releases-telephone- 7ddaa186b751_story.html). The Washington Post. Retrieved 14 August metadata-collection-documents). Director of Public Affairs Office of the 2013. Director of National Intelligence. Retrieved 17 August 2013. 365. ^ a b Ribeiro, James (13 August 2013). "Intelligence chief Clapper to 354. ^ Assistant Attorney General Roland Weich (14 December 2009). set up US surveillance review group" (http://www.pcworld.com/article "Cover Letter and 2009 Report on the National Security Agency's Bulk /2046531/intelligence-chief-clapper-to-set-up-us-surveillance-review- Collection Program for USA PATRIOT Act Reauthorization" group.html). PC World. Retrieved 13 August 2013. (http://www.dni.gov/files/documents 366. ^ a b Scott Wilson and Zachary A. Goldfarb (9 August 2013). "Obama /2009_CoverLetter_Report_Collection.pdf). U.S. Department of Justice announces proposals to reform NSA surveillance" Office of Legal Affairs. Retrieved 17 August 2013. (http://www.washingtonpost.com/politics/obama-to-announce- 355. ^ Assistant Attorney General Roland Weich (2 February 2011). "Cover proposals-to-reform-nsa-surveillance/2013/08/09/ee3d6762-011a- Letters and 2011 Report on the National Security Agency's Bulk 11e3-9711-3708310f6f4d_story.html). The Washington Post. Retrieved Collection Program for USA PATRIOT Act Reauthorization" 12 August 2013. (http://www.dni.gov/files/documents 367. ^ Serwer, Adam (12 August 2013). "Intel chief misled Congress on /2011_CoverLetters_Report_Collection.pdf). U.S. Department of NSA spying. Now he's leading program's review" (http://tv.msnbc.com Justice Office of Legal Affairs. Retrieved 17 August 2013. /2013/08/12/intel-chief-who-openly-misled-congress-tasked-to-head- 356. ^ Vinson, Roger (25 April 2013). "United States Foreign Intelligence nsa-review-board/). MSNBC. Retrieved 13 August 2013. Surveilllance Court Docket-Nr: BR 13–80 Primary Order for Business 368. ^ Masnick, Mike (12 August 2013). "Confessed Liar To Congress, Records Collection Under Section 215 of the USA PATRIOT Act" James Clapper, Gets To Set Up The 'Independent' Review Over NSA (http://www.dni.gov/files/documents Surveillance" (http://www.techdirt.com/articles/20130812 /PrimaryOrder_Collection_215.pdf). United States Foreign Intelligence /13512624147/president-asks-confessed-liar-to-congerss-james- Surveillance Court. Office of Director of National Intelligence. Retrieved clapper-to-set-up-independent-review-committee-over-nsa- 17 August 2013. surveillance.shtml). Techdirt. Retrieved 13 August 2013. 357. ^ Paul Lewis and Spencer Ackerman (9 August 2013). "Obama touts 369. ^ Mullin, Joe (13 August 2013). "Obama's "reform" panel to be led by NSA surveillance reforms to quell growing unease over program" Clapper, who denied spying to Congress" (http://arstechnica.com/tech- (http://www.theguardian.com/world/2013/aug/09/obama- policy/2013/08/obamas-reform-panel-to-be-led-by-clapper- nsa-surveillance-reforms-press-conference). The Guardian. Retrieved who-denied-spying-to-congress/). Ars technica. Retrieved 13 August 12 August 2013. 2013. 358. ^ Mark Mazzetti and Scott Shane (9 August 2013). "Threats Test 370. ^ Peter Wallsten (11 August 2013). "Lawmakers say obstacles limited Obama's Balancing Act on Surveillance" (http://www.nytimes.com oversight of NSA's telephone surveillance program" /2013/08/10/us/threats-test-obamas-balancing-act-on- (http://www.washingtonpost.com/politics/2013/08/10/bee87394-004d- surveillance.html?hp&_r=1&pagewanted=all&). The New York Times. 11e3-9a3e-916de805f65d_story.html). The Washington Post. Retrieved Retrieved 12 August 2013. 25 August 2013. 359. ^ a b c d e "Barack Obama pledges greater surveillance transparency" 371. ^ Johnson, Luke. "James Clapper, Director of National Intelligence (http://www.bbc.co.uk/news/world-us-canada-23642880). BBC News Who Misled Congress, To Establish Surveillance Review Group" US & CANDA. 9 August 2013. Retrieved 12 August 2013. (http://www.huffingtonpost.com/2013/08/13/james- 360. ^ "Obama pledges spy programme transparency" clapper_n_3748431.html). Huffington Post. Retrieved 13 August 2013. (http://www.aljazeera.com/news/americas/2013/08 /201389182111504799.html). Al Jazeera. 10 August 2013. Retrieved 12 August 2013.

49 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

372. ^ Ackerman, Spencer (12 September 2013). "Obama's NSA 386. ^ a b "US given 'heads up' on David Miranda detention" surveillance review panel did not discuss changes, attendees say - Pair (http://www.bbc.co.uk/news/uk-23761918). BBC News. 19 August say meeting was dominated by tech firms' interests and session did 2013. not broach the topic of changes to data collectio" 387. ^ Rusbridger, Alan (19 August 2013). "David Miranda, schedule 7 and (http://www.theguardian.com/world/2013/sep/12/obama-nsa-review- the danger that all reporters now face" (http://www.theguardian.com surveillance-changes). The Guardian. Retrieved 2 October 2013. /commentisfree/2013/aug/19/david-miranda-schedule7-danger- 373. ^ "US: Increase Transparency on Surveillance" (http://www.hrw.org reporters). The Guardian. Retrieved 21 August 2013. /news/2013/07/18/us-increase-transparency-surveillance). Human 388. ^ "NSA statements to The Post" (http://www.washingtonpost.com Rights Watch. Retrieved 20 August 2013. /world/national-security/nsa-statements-to-the-post/2013/08/15 374. ^ "UK: Detention of Guardian journalist's partner at Heathrow /f40dd2c4-05d6-11e3-a07f-49ddc7417125_story.html). The unlawful and unwarranted" (http://www.amnesty.org/en/news Washington Post. Retrieved 20 August 2013. /uk-detention-guardian-employee-heathrow-unlawful- 389. ^ Lloyd Grove. "At the Obama White House: Transparency and-unwarranted-2013-08-18). Amnesty International. Retrieved 20 Transhmarency" (http://www.thedailybeast.com/articles/2013/08 August 2013. /23/at-the-obama-white-house-transparency-transhmarency.html). The 375. ^ "Forcing The Guardian to destroy materials is a direct attack on Daily Beast. Retrieved 23 September 2013. press freedom" (http://www.indexoncensorship.org/2013/08/forcing- 390. ^ a b "Latin American nations voice concerns to Ban over rerouting of the-guardian-to-destroy-materials-is-a-direct-attack-on-press- Bolivian leader's plane" (http://www.un.org/apps/news freedom/). Index on Censorship. Retrieved 20 August 2013. /story.asp?NewsID=45374&Cr=Latin+America&Cr1=#.UhN673-_S28). 376. ^ "UK: "National security concerns must never justify intimidating United Nations. Retrieved 20 August 2013. journalists into silence," warn UN experts" (http://www.ohchr.org 391. ^ Ehrenfreund, Max (25 July 2013). "House proposal to curtail NSA in /EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=13678& response to Edward Snowden's leaks fails narrowly" LangID=E). Office of the United Nations High Commissioner for (http://www.washingtonpost.com/world/national-security/house- Human Rights. Retrieved 4 September 2013. proposal-to-curtail-nsa-in-response-to-edward-snowdens-leaks-fails- 377. ^ Halliday, Josh. "MoD serves news outlets with D notice over narrowly/2013/07/25/b7117338- surveillance leaks" (http://www.guardian.co.uk/world/2013/jun f54d-11e2-9434-60440856fadf_story.html). The Washington Post. /17/defence-d-bbc-media-censor-surveillance-security). The Guardian. Retrieved 29 July 2013. Retrieved 27 June 2013. 392. ^ Abby Ohlheiser and Philip Bump (24 July 2013). "The Amash 378. ^ "The Guardian Blocked by the Army After NSA Stories" Amendment Fails, Barely" (http://www.theatlanticwire.com/politics (http://www.huffingtonpost.com/2013/06/28/army-blocks- /2013/07/amash-amendment-fails-despite-democratic-support the-guardian_n_3515374.html). Huffington Post. Retrieved 20 August /67584/). Wire. Retrieved 29 July 2013. 2013. 393. ^ Kravets, David (26 July 2013). "Lawmakers Who Upheld NSA Phone 379. ^ a b "The security threat posed by Snowden" (http://www.ft.com Spying Received Double the Defense Industry Cash" /cms/s/0/9b4b5afe-30dc-11e3-b991-00144feab7de.html#undefined). (http://www.wired.com/threatlevel/2013/07/money-nsa-vote/). The Financial Times. October 9, 2013. Retrieved 3 August 2013. 380. ^ "David Miranda Heathrow detention: No 10 'kept abreast of 394. ^ Serwer, Adam (25 September 2013). "New calls for surveillance operation'" (http://www.bbc.co.uk/news/uk-23769324). BBC News. 20 reform after Snowden" (http://www.msnbc.com/msnbc/new-calls- August 2013. surveillance-reform-after). MSNBC. Retrieved 18 October 2013. 381. ^ Boadle, Anthony (6 August 2013). "Glenn Greenwald: Snowden 395. ^ Zengerle, Patricia (25 September 2013). "U.S. lawmakers seek to Gave Me 15–20,000 Classified Documents" end bulk NSA telephone records collection" (http://www.reuters.com (http://www.huffingtonpost.com/2013/08/07/glenn-greenwald- /article/2013/09/25/us-cybersecurity-law-congress- edward-snowden-documents_n_3716424.html?utm_hp_ref=media). idUSBRE98O1BU20130925). Reuters. Retrieved 18 October 2013. Huffington Post. Retrieved 9 August 2013. 396. ^ Paul Lewis and Dan Roberts (25 September 2013). "NSA reform bill 382. ^ Greenwald, Glenn (19 August 2013). "Glenn Greenwald: detaining to trim back US surveillance unveiled in Congress" my partner was a failed attempt at intimidation" (http://www.theguardian.com/world/2013/sep/25/nsa-reform- (http://www.theguardian.com/commentisfree/2013/aug/18/david- bill-surveillance-congress). The Guardian (Washington). Retrieved 18 miranda-detained-uk-nsa). The Guardian (London). October 2013. 383. ^ "White House knew Glenn Greenwald's partner David Miranda would 397. ^ "Brazil Reacts With Fury To NSA Spying; Mexico Orders Probe" be detained" (http://edition.cnn.com/2013/08/19/world/europe (http://www.ibtimes.com/brazil-reacts-fury-nsa-spying-mexico-orders- /greenwald-partner-detained). CNN. Retrieved 20 August 2013. probe-1402437). International Business Times. Retrieved 16 384. ^ a b "Guardian says Britain made it destroy Snowden material" September 2013. (http://www.reuters.com/article/2013/08/20/us-usa-security-snowden- 398. ^ a b c "Exclusive: Brazil's Rousseff wants U.S. apology for NSA guardian-idUSBRE97I10E20130820). Reuters. Retrieved 20 August spying" (http://www.reuters.com/article/2013/09/04/us-usa-security- 2013. snowden-brazil-idUSBRE98314N20130904). Reuters. Retrieved 16 385. ^ David Miranda's detention had no basis in law, says former lord September 2013. chancellor | World news (http://www.theguardian.com/world 399. ^ "China has 'mountains of data' about U.S. cyber attacks: official" /2013/aug/21/david-miranda-law-detention-heathrow). The Guardian. (http://www.reuters.com/article/2013/06/05/us-china-usa-hacking- (21 August 2013). idUSBRE95404L20130605). Reuters. 5 June 2013. Retrieved 2013-10-24.

50 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

400. ^ "China asks U.S. to explain Internet surveillance" 415. ^ "EU-US spying row stokes concern over anti-terror campaign" (http://www.reuters.com/article/2013/06/17/us-usa-security-china- (http://www.eubusiness.com/news-eu/us-intelligence.r38). EU idUSBRE95G06R20130617). Reuters. Retrieved 24 October 2013. Business. 26 October 2013. Retrieved 26 October 2013. 401. ^ "France summons U.S. ambassador over spying report" 416. ^ "EU says distrust of US on spying may harm terror fight" (http://www.reuters.com/article/2013/10/21/us-france- (http://www.bbc.co.uk/news/world-europe-24668286). BBC. 25 nsa-idUSBRE99K04920131021). Reuters. Retrieved 24 October 2013. October 2013. Retrieved 26 October 2013. 402. ^ Michael Mainville. "France warns US spying claims threaten trade 417. ^ Roulo, Claudette. "Leaks Damage National Security, NSA Director talks" (http://www.google.com/hostednews/afp/article Says" (http://archive.is/OS678). American Forces Press Service. /ALeqM5gvEj5LQZyQYyVIIJoBkOncNw8hhg?docId=CNG.ce0613494dc2 Archived from the original (http://www.defense.gov b055d0943c13ea7ff3c9.661). AFP. Retrieved 24 October 2013. /news/newsarticle.aspx?id=120387) on 16 December 2013. Retrieved 403. ^ "German Foreign Ministry Summons US Ambassador Over NSA 8 July 2013. (Archive (http://www.webcitation.org/6I9BwalAH)) Spying Claims" (http://online.wsj.com/article/BT-CO- 418. ^ Corera, Gordon (October 4, 2013). "Edward Snowden revelations: 20130701-702136.html). The Wall Street Journal'. 1 July 2013. Can we trust the spying state?" (http://www.bbc.co.uk "Seeking clarification on the matter, the foreign ministry has called the /news/technology-24399213). BBC. U.S. ambassador to Germany, Philip Murphy, for a meeting later 419. ^ Edward Snowden: Russia, China Did Not Get Any Documents From Monday, a spokesman for the ministry said." Me (http://www.huffingtonpost.com/2013/07/10/edward-snowden- 404. ^ "German foreign minister summons US ambassador over Merkel russia_n_3573844.html) spying allegations" (http://www.dw.de/german-foreign-minister- 420. ^ Whitehead, Tom (October 9, 2013). "GCHQ leaks have 'gifted' summons-us-ambassador-over-merkel-spying-allegations/a-17180294). terrorists ability to attack 'at will', warns spy chief" Deutsche Welle. Retrieved 24 October 2013. (http://www.telegraph.co.uk/news/uknews/terrorism-in-the- 405. ^ "NSA spying allegations: Are US allies really shocked?" uk/10365026/GCHQ-leaks-have-gifted-terrorists-ability-to-attack- (http://www.bbc.co.uk/news/world-europe-24676392). BBC. 26 at-will-warns-spy-chief.html). Daily Telegraph. October 2013. Retrieved 26 October 2013. 421. ^ a b Gardner, Timothy; Hosenball, Mark (June 9, 2013). "Spy agency 406. ^ "Germany ends spy pact with US and UK after Snowden" seeks criminal probe into leaks" (http://www.reuters.com/article (http://www.bbc.co.uk/news/world-europe-23553837). BBC. 2 August /2013/06/09/us-usa-security-clapper-idUSBRE9570GL20130609). 2013. Reuters. Retrieved June 9, 2013. 407. ^ German Helicopter Searched For NSA Listening Post In Frankfurt 422. ^ Blake, Aaron (June 9, 2013). "Clapper: Leaks are ‘literally (http://www.spiegel.de/international/germany/german-helicopter- gut-wrenching,’ leaker being sought" (http://www.washingtonpost.com searched-for-nsa-listening-post-in-frankfurt-a-921257.html) SPIEGEL /blogs/post-politics/wp/2013/06/09/clapper-leaks-are-literally- ONLINE. gut-wrenching-leaker-being-sought/). The Washington Post. Retrieved 408. ^ "Italy Presses Kerry Over US Surveillance" August 8, 2013. (http://www.voanews.com/content/reu-italy-presses-kerry-over-us- 423. ^ Finn, Peter; Horwitz, Sari (June 21, 2013). "U.S. charges Snowden surveillance/1775519.html). . Retrieved 24 October with espionage" (http://www.washingtonpost.com/world/national- 2013. security/us-charges-snowden-with-espionage/2013/06/21/507497d8- 409. ^ "Letta quizzes Kerry on US spy claims" dab1-11e2-a016-92547bf094cc_story.html). The Washington Post. (http://www.gazzettadelsud.it/news/english/66340/Letta-quizzes- Retrieved June 21, 2013. Kerry-on-US-spy-claims.html). Gazzetta del Sud. Retrieved 24 October 424. ^ U.S. vs. Edward J. Snowden criminal complaint 2013. (http://apps.washingtonpost.com/g/documents/world/us-vs-edward- 410. ^ "Mexico foreign minister meets US envoy over spy claims" j-snowden-criminal-complaint/496/). The Washington Post. (http://www.google.com/hostednews/afp/article 425. ^ a b Ackerman, Spencer; Roberts, Dan (June 28, 2013). "US army /ALeqM5je2oc0TErsKF85FBXuMKGBtXOiYw?docId=c170c655- blocks access to Guardian website to preserve 'network hygiene'" d892-4a59-bf69-1c48205d2b75). AFP. Retrieved 26 October 2013. (http://www.guardian.co.uk/world/2013/jun/28/us-army-blocks- 411. ^ "Spanish PM summons U. S. ambassador over NSA spying" guardian-website-access). The Guardian (London). Retrieved June 29, (http://www.agi.it/flash-news/articles/201310251547-cro-ren1041- 2013. spanish_pm_summons_u_s_ambassador_over_nsa_spying). Agenzia 426. ^ Ackerman, Spencer (July 1, 2013). "US military blocks entire Giornalistica Italia. Retrieved 27 October 2013. Guardian website for troops stationed abroad" 412. ^ "NSA surveillance: Spain demands US explain 'monitoring'" (http://www.guardian.co.uk/world/2013/jul/01/us-military-blocks- (http://www.bbc.co.uk/news/world-europe-24708410). bbc.co.uk. 28 guardian-troops). The Guardian. October 2013. Retrieved 28 October 2013. 427. ^ Raddatz, Martha (August 4, 2013). "Transcript for Joint Chiefs 413. ^ "European Union threatens to stop sharing data with United States Chairman Gen. Martin Dempsey on 'This Week'" over spying reports" (http://www.nydailynews.com/news/world (http://abcnews.go.com/ThisWeek/video/joint-chiefs-chairman- /eu-threatens-stop-sharing-data-u-s-spying-reports-article-1.1391702). gen-martin-dempsey-week-19865953.). ABC News 'This Week'. Daily News. Retrieved 8 July 2013. Retrieved August 14, 2013. 414. ^ "Rules Shielding Online Data From N.S.A. and Other Prying Eyes 428. ^ "Obama downplays Snowden case, says US not 'scrambling jets' to Advance in Europe" (http://www.nytimes.com/2013/10/22/business get 'hacker'" (http://www.foxnews.com/politics/2013/06/27/obama- /international/eu-panel-backs-plan-to-shield-online-data.html), James downplays-snowden-case-says-us-not-scrambling-jets-to-get-hacker/). Kanter and Mike Scott, New York Times, 21 October 2013. Retrieved Fox News. June 27, 2013. 22 October 2013.

51 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

429. ^ Pecquet, Julian (June 27, 2013). "US won't 'scramble jets' to capture 442. ^ Morgenstern, Madeleine (June 11, 2013). "Ted Cruz Reserving 'hacker' Snowden, Obama says" (http://thehill.com/blogs/global-affairs Judgement on Whether NSA Leaker Is a 'Patriot' or a 'Traitor'" /africa/308117-obama-wont-scramble-jets-to-capture-hacker- (http://www.theblaze.com/stories/2013/06/11/ted-cruz-reserving- snowden). The Hill. judgement-on-whether-nsa-leaker-is-a-patriot-or-a-traitor/). The Blaze. 430. ^ a b Wolf, Z. Byron (August 13, 2013). "Fact-checking Obama's claims Retrieved June 11, 2013. about Snowden" (http://edition.cnn.com/2013/08/12/politics/obama- 443. ^ Sink, Justin (June 11, 2013). "Rand Paul 'reserving judgment' on snowden-whistleblower). CNN. NSA leaker" (http://thehill.com/blogs/blog-briefing-room/news 431. ^ MacAskill, Ewen (August 13, 2013). "White House insists James /304673-rand-paul-reserving-judgment-on-nsa-leaker). The Hill. Clapper will not lead NSA surveillance review" 444. ^ Sullivan, Sean (June 23, 2013). "Rand Paul: Snowden will face (http://www.theguardian.com/world/2013/aug/13/white-house-james- problems if he 'cozies up' to Russia, China" clapper-nsa-surveillance-review). The Guardian. (http://www.washingtonpost.com/blogs/post-politics/wp/2013/06/23 432. ^ Farivar, Cyrus (August 23, 2013). "Obama's 'outside experts' /rand-paul-snowden-will-face-problems-if-he-cozies-up-to-russia- surveillance review panel has deep ties to gov't" china/). The Washington Post. (http://arstechnica.com/tech-policy/2013/08/obamas-reported-outside- 445. ^ "Rand Paul: Edward Snowden ‘civil disobedient’ – Tal Kopan –" experts-surveillance-review-panel-has-deep-ties-to-govt/). Ars (http://www.politico.com/story/2013/06/rand-paul-edward-snowden- Technica. nsa-leak-92953.html). .com. June 18, 2013. 433. ^ Waterman, Shaun (12 September 2013). "Congress will rein in NSA’s 446. ^ "John Lewis compares Edward Snowden, Gandhi – James Arkin –" domestic snooping, predicts top U.S. intel official" (http://www.politico.com/story/2013/08/john-lewis-compares-edward- (http://www.washingtontimes.com/news/2013/sep/12/us-spy- snowden-gandhi-95317.html). Politico.com. August 8, 2013. congress-rein-in-nsa-domestic-snooping/). . 447. ^ "This man is a traitor" (http://www.billnelson.senate.gov Retrieved 16 September 2013. /news/details.cfm?id=344052&). senate.gov. Retrieved 18 September 434. ^ Dilanian, Ken (12 September 2013). "Clapper: Snowden case brings 2013. healthy debate; more disclosures to come" (http://www.latimes.com 448. ^ "John Boehner: Edward Snowden Is A 'Traitor'" /world/worldnow/la-fg-wn-clapper-snowden-disclosures- (http://www.huffingtonpost.com/2013/06/11/john-boehner-edward- 20130912,0,7438979.story). The Los Angeles Times. Retrieved 15 snowden_n_3420635.html). The Huffington Post. Retrieved 18 September 2013. September 2013. 435. ^ Reeve, Elspeth (June 10, 2013). "Washington turns on the NSA 449. ^ S. 1372 (http://hdl.loc.gov/loc.uscongress/legislation.113s1372) at blinders to target weird 'IT guy' leaker instead" THOMAS. S. 1372 (http://www.govtrack.us/congress/bills/113/s1372) (http://www.theatlanticwire.com/politics/2013/06/edward-snowden- at GovTrack. S. 1372 (http://www.opencongress.org/bill/113-s1372/) washington-response/66063/). The Atlantic Wire. at OpenCongress. 436. ^ LoGiurato, Brett (June 11, 2013). "John Boehner: Edward Snowden 450. ^ Zengerle, Patricia (July 25, 2013). "U.S. lawmakers want sanctions Is A 'Traitor'" (http://www.sfgate.com/technology/businessinsider on any country taking in Snowden" (http://www.reuters.com/article /article/JOHN-BOEHNER-Edward-Snowden-Is-A-Traitor-4593261.php). /2013/07/25/us-usa-security-congress-idUSBRE96O18220130725). San Francisco Chronicle. Retrieved June 11, 2013. Reuters. 437. ^ a b Herb, Jeremy; Sink, Justin (June 10, 2013). "Sen. Feinstein calls 451. ^ "U.S. Senate advances law pressuring Russia not to give Snowden Snowden's NSA leaks an 'act of treason'" (http://thehill.com/blogs asylum" (http://news.xinhuanet.com/english/world/2013-07 /defcon-hill/policy-and-strategy/304573-sen-feinstein-snowdens-leaks- /26/c_132574418.htm). Xinhua. July 26, 2013. are-treason). thehill.com. 452. ^ "FY14 Full Committee Markup of State-Foreign Operations, and 438. ^ Nelson, Bill (June 11, 2013). "This man is a traitor" Financial Services General Government Bills" (http://www.nydailynews.com/opinion/man-traitor-article-1.1369682). (http://www.appropriations.senate.gov Daily News (New York). /webcasts.cfm?method=webcasts.view&id=591353fa-8fd0-41e9-9d7e- 439. ^ "Edward Snowden: Ex-CIA leaker drops out of sight, faces legal 6adf0ab76537) (Podcast). United States Senate Committee on battle" (http://articles.chicagotribune.com/2013-06-10/news/chi- Appropriations. July 25, 2013. Event occurs at 1:10:08. edward-snowden-nsa-leaks-20130610_1_u-s-justice-department- http://www.appropriations.senate.gov regina-ip-hong-kong). The Chicago Tribune. Reuters. June 10, 2013. /webcasts.cfm?method=webcasts.view&id=591353fa-8fd0-41e9-9d7e- Retrieved June 12, 2013. 6adf0ab76537. 440. ^ Blake, Aaron (June 11, 2013). "DNC chair Debbie Wasserman 453. ^ Max Ehrenfreund. "House proposal to curtail NSA in response to Schultz: Snowden is a coward" (http://www.washingtonpost.com/blogs Edward Snowden's leaks fails narrowly" /post-politics/wp/2013/06/11/dnc-chair-debbie-wasserman-schultz- (http://www.washingtonpost.com/world/national-security/house- snowden-is-a-coward/). The Washington Post. Retrieved June 13, proposal-to-curtail-nsa-in-response-to-edward-snowdens-leaks-fails- 2013. narrowly/2013/07/25/b7117338- 441. ^ Dumain, Emma; Lesniewski, Niels (June 10, 2013). "Snowden Has a f54d-11e2-9434-60440856fadf_story.html). The Washington Post. Few Defenders on the Hill" (http://www.rollcall.com 454. ^ "The Amash Amendment Fails, Barely – Abby Ohlheiser and Philip /news/snowden_has_a_few_defenders_on_the_hill- Bump" (http://www.theatlanticwire.com/politics/2013/07/amash- 225492-1.html?pos=oplyh). Roll Call. Retrieved June 11, 2013. amendment-fails-despite-democratic-support/67584/). The Atlantic Wire. July 24, 2013.

52 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

455. ^ "Amash: Snowden a whistle-blower, 'told us what we need to know'" 469. ^ Nelson, Steven (August 1, 2013). "As Edward Snowden receives (http://www.foxnews.com/politics/2013/08/04/republican-rep-amash- asylum in Russia, poll shows Americans sympathetic to NSA 'whistle- snowden-whistleblower-told-us-what-need-to-know/). Fox News. 4 blower'" (http://www.usnews.com/news/blogs/washington-whispers August 2013. Retrieved 6 October 2013. /2013/08/01/edward-snowden-receives-asylum-in-russia-poll-shows- 456. ^ Raddatz, Martha (August 4, 2013). "'This Week' Transcript: Gen. americans-sympathetic-to-nsa-whistle-blower). US News & World Martin Dempsey, Reps. Ruppersberger and King, and Glenn Report. Greenwald" (http://abcnews.go.com/ThisWeek/week-transcript- 470. ^ Heather, Kelly. "Protests against the NSA spring up across U.S." gen-martin-dempsey-reps-ruppersberger-king/story?id=19864913& (http://edition.cnn.com/2013/07/04/tech/web/restore-nsa-protests). page=3.). ABC News 'This Week'. Retrieved August 14, 2013. CNN. Retrieved 13 August 2013. 457. ^ "McCain: Young Americans admire Snowden, see him as ‘some kind 471. ^ "Thousands fill German streets to protest Berlin's NSA spying of Jason Bourne’" (http://www.washingtontimes.com/news/2013 involvement" (http://rt.com/news/germany-nsa-merkel-writers-669/). /aug/11/mccain-young-americans-admire-snowden-see-him-some/). Russia: RT. Retrieved 13 August 2013. The Washington Times. Retrieved August 11, 2013. 472. ^ Bart Jansen and Carolyn Pesce. "Anti-NSA rally attracts thousands to 458. ^ Johnson, Luke. "Edward Snowden Receives Support From Former march in Washington" (http://www.usatoday.com/story/news/nation GOP Sen. Gordon Humphrey" (http://www.huffingtonpost.com /2013/10/26/nsa-dc-rally/3241417/). USA Today. Retrieved 27 October /2013/07/16/edward-snowden-gordon-humphrey_n_3606491.html). 2013. Huffington Post. Retrieved August 11, 2013. 473. ^ Thousands gather in Washington for anti-NSA '' 459. ^ Greenwald, Glenn. "Email exchange between Edward Snowden and rally | World news | theguardian.com (http://www.theguardian.com former GOP Senator Gordon Humphrey" (http://www.theguardian.com /world/2013/oct/26/nsa-rally-stop-watching-washington-snowden) /commentisfree/2013/jul/16/gordon-humphrey-email-edward- 474. ^ Greenwald, Glenn (June 22, 2013). "On the Espionage Act charges snowden). The Guardian. Retrieved August 11, 2013. against Edward Snowden" (http://www.guardian.co.uk/commentisfree 460. ^ Gold, Hadas. "Former Sen. Gordon Humphrey emails with Edward /2013/jun/22/snowden-espionage-charges). The Guardian Security Snowden" (http://www.politico.com/story/2013/07/ex-senator-emails- and Liberty blog (London). Archived (http://www.webcitation.org with-snowden-94323.html?hp=f1). Politico. Retrieved July 17, 2013. /6HaOj8UiN) from the original on June 23, 2013. Retrieved June 23, 461. ^ "Rep. McClintock Says the US Should Grant Snowden Amnesty – Hit 2013. & Run" (http://reason.com/blog/2013/08/12/rep-mcclintock-says-the- 475. ^ Guariglia, Matthew (June 10, 2013). "Edward Snowden: Traitor or us-should-gran). Reason. July 24, 2013. Hero?" (http://www.heavy.com/news/2013/06/edward-snowden- 462. ^ Newport, Frank (June 12, 2013). "Americans Disapprove of hero-traitor-obama/). heavy.com. Retrieved June 11, 2013. Government Surveillance Programs" (http://www.gallup.com 476. ^ Cassidy, John (June 10, 2013). "Why Edward Snowden Is A Hero" /poll/163043/americans-disapprove-government-surveillance- (http://www.newyorker.com/online/blogs/johncassidy/2013/06 programs.aspx). Gallup. /why-edward-snowden-is-a-hero.html). The New Yorker. 463. ^ Public Split over Impact of NSA Leak, But Most Want Snowden 477. ^ Rushkoff, Douglas (June 10, 2013). "Edward Snowden is a hero" Prosecuted (http://www.people-press.org/2013/06/17/public-split- (http://www.cnn.com/2013/06/10/opinion/rushkoff-snowden- over-impact-of-nsa-leak-but-most-want-snowden-prosecuted/). Pew hero/index.html). CNN. Retrieved June 16, 2013. Research Center. June 17, 2013. 478. ^ Davidson, Amy (June 9, 2013). "Edward Snowden, The N.S.A. 464. ^ Page, Susan (June 18, 2013). "Poll: Snowden should be prosecuted Leaker, Comes Forward" (http://www.newyorker.com/online/blogs for NSA leaks" (http://www.usatoday.com/story/news/politics/2013/06 /closeread/2013/06/edward-snowden-the-nsa-leaker-comes- /17/americans-say-snowden-should-be-prosecuted-for-nsa-leaks- forward.html). The New Yorker. in-usa-today-poll/2430583/). USA Today (Washington DC). 479. ^ Harvey, Fiona (June 19, 2013). "NSA surveillance is an attack on 465. ^ "Post-ABC poll: NSA surveillance and Edward Snowden" American citizens, says Noam Chomsky" (http://www.guardian.co.uk (http://www.washingtonpost.com/politics/polling/postabc-poll-nsa- /world/2013/jun/19/nsa-surveillance-attack-american-citizens- surveillance-edward-snowden/2013/06/19/699571a8-d8cf-11e2- noam-chomsky). The Guardian (London). Retrieved July 4, 2013. b418-9dfa095e125d_page.html). The Washington Post. June 19, 2013. 480. ^ "New Yorkers Declare 'I Stand With Edward Snowden': Dozens Rally 466. ^ Emily Swanson (July 5, 2013). "Edward Snowden Poll Finds More & Draw Massive Media Attention for NSA Whistleblower (updated)" Americans Now Think He Did The Wrong Thing" (http://www.sparrowmedia.net/2013/06/i-stand-with-edward- (http://www.huffingtonpost.com/2013/07/05/edward-snowden- snowden-rally-union-square/). the sparrow project. June 10, 2013. poll_n_3542931.html). Huffington Post. Retrieved July 9, 2013. Retrieved June 11, 2013. 481. ^ a b Gold, Hadas (June 10, 2013). "Glenn Beck, Michael Moore call See more polls reported in early July, see here [1] (http://today.yougov.com/news/2013/07/03/snowden-stays-russia- Edward Snowden a hero" (http://www.politico.com/story/2013/06 he-slips-public-opinion/). /edward-snowden-nsa-leak-michael-moore-glenn-beck-92476.html). Politico. Retrieved June 11, 2013. 467. ^ Rebecca Ballhaus (July 24, 2013) WSJ/NBC Poll: Most Americans 482. ^ "Cornel West Calls Edward Snowden the 'John Brown' of National View Snowden Negatively (http://blogs.wsj.com/washwire/2013/07 Security" (http://colorlines.com/archives/2013/06 /24/wsjnbc-poll-most-americans-view-snowden-negatively/) The Wall /cornell_west_calls_edward_snowden_the_john_brown_of_national_se Street Journal curity.html). colorlines. June 28, 2013. Retrieved July 4, 2013. 468. ^ a b Salant, Jonathan D. (July 10, 2013). "Snowden Seen as Whistle- Blower by Majority in New Poll" (http://www.bloomberg.com /news/2013-07-10/snowden-seen-as-whistlebloweer-by-majority- in-new-poll.html). Bloomberg News. Retrieved July 10, 2013.

53 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

483. ^ Budowsky, Brent (June 7, 2013). "Matt Drudge, and 496. ^ Schindler, John R. (June 27, 2013). "Snowden in the U.S.-Russian versus Barack Obama, George W. Bush and Big Brother" 'SpyWar'" (http://nationalinterest.org/commentary/snowden-the-us- (http://thehill.com/blogs/pundits-blog/homeland-security/304147- russian-spywar-8668). National Affairs. matt-drudge-bernie-sanders-and-ron-paul-versus-barack-obama- 497. ^ Ross, Brian (June 26, 2013). "Edward Snowden Steps Into Secret george-w-bush-and-big-brother). The Hill (Washington DC). Retrieved U.S.-Russia Spy Scuffle" (http://abcnews.go.com/Blotter/edward- June 11, 2013. snowden-steps-secret-us-russia-spy-scuffle/story?id=19495341). ABC 484. ^ "Arrest Congressman Peter King, Not NSA Whistleblower" News (http://www.infowars.com/arrest-congressman-peter-king-not- 498. ^ Ewing, Philip (June 25, 2013). "What Russian intel might ask nsa-whistleblower/). Infowars. June 10, 2013. Retrieved June 11, Edward Snowden" (http://www.politico.com/story/2013/06/edward- 2013. snowden-foreign-intel-93366.html). Politico. 485. ^ "Napolitano: NSA Leaker Is an "American Hero"" 499. ^ Simon Schuster (July 10, 2013). Snowden in Moscow: What Russian (http://foxnewsinsider.com/2013/06/10/judge-andrew-napolitano- Authorities Might Be Doing With the NSA Whistle-Blower nsa-leaker-edward-snowden-%E2%80%9Camerican-hero%E2 (http://world.time.com/2013/07/10/snowden-in-moscow-what-are- %80%9D). Fox News Channel. June 10, 2013. Retrieved July 4, 2013. russian-authorities-doing-with-the-nsa-whistleblower/) Time 486. ^ "Oliver Stone calls National Security Agency secret-leaker Edward 500. ^ Snowden: I never gave any information to Chinese or Russian Snowden 'a hero'" (http://www.nydailynews.com/news/politics/oliver- governments (http://www.guardian.co.uk/commentisfree/2013/jul stone-calls-national-security-agency-secret-leaker-edward-snowden- /10/snowden-denies-information-russia-china), Glenn Greenwald, July hero-article-1.1390488). July 4, 2013. 10, 2013 487. ^ Kirell, Andrew (June 11, 2013). "Michael Savage Rants Against Fox 501. ^ Watkins, Tom (June 30, 2013). "Father proposes deal for Snowden's News' 'Empty Skirts' & 'Lipstick With Legs' For Condemning NSA voluntary return" (http://edition.cnn.com/2013/06/28/us/snowden- Leaker" (http://www.mediaite.com/tv/michael-savage-rants-against- lawyer-offer), CNN fox-news-empty-skirts-lipstick-with-legs-for-condemning-nsa-leaker/). 502. ^ The Editors (June 24, 2013). "This Is Not About Edward Snowden" Mediaite. Retrieved June 12, 2013. (http://www.bloomberg.com/news/2013-06-24/this-is-not-about- 488. ^ Walt, Stephen (July 8, 2013). "Snowden deserves an immediate edward-snowden.html). Bloomberg News (New York). Retrieved June presidential pardon" (http://www.ft.com/intl/cms/s/0/0ccf2d14- 25, 2013. e7c1-11e2-babb-00144feabdc0.html#axzz2YUB4jd46). Financial 503. ^ Greenwald, Glenn (July 3, 2013). "James Clapper, EU play-acting, Times. Retrieved July 8, 2013. and political priorities" (http://www.guardian.co.uk/commentisfree 489. ^ Reeve, Elspeth (June 10, 2013). "These Pundits Have Decided /2013/jul/03/clapper-lying-snowden-eu-bolivia). The Guardian Security Snowden Deserves to Go to Jail" (http://www.theatlanticwire.com and Liberty blog (London). Retrieved July 3, 2013. /politics/2013/06/these-pundits-have-decided-snowden-deserves- 504. ^ Berenson, Alex (June 25, 2013). "Snowden, Through the Eyes of a go-jail/66084/). The Atlantic Wire (Washington DC). Retrieved June Spy Novelist" (https://www.nytimes.com/2013/06/25/opinion 12, 2013. /snowden-through-the-eyes-of-a-spy-novelist.html?_r=0). The New 490. ^ a b Toobin, Jeffrey (June 10, 2013). "Edward Snowden is no hero" York Times. Retrieved June 26, 2013. (http://www.newyorker.com/online/blogs/comment/2013/06/edward- 505. ^ "NSA leaker petition hits 100,000-signature threshold in under 2 snowden-nsa-leaker-is-no-hero.html). The New Yorker. weeks" (http://rt.com/usa/snowden-white-house-petition-113/). RT 491. ^ "Edward Snowden is a 'traitor' and possible spy for China – Dick USA. June 18, 2013. Retrieved June 25, 2013. Cheney" (http://www.theguardian.com/world/2013/jun/16/nsa- 506. ^ White House Remains Silent on 'Pardon Edward Snowden' Petition - whistleblower-edward-snowden-traitor-cheney). The Guardian. Washington Whispers (usnews.com) (http://www.usnews.com Retrieved 18 September 2013. /news/blogs/washington-whispers/2013/08/23/white-house-remains- 492. ^ Branigin, William (July 17, 2013). "Lawmakers of both parties voice silent-on-pardon-edward-snowden-petition) doubts about NSA surveillance programs" 507. ^ Three Months After It Cleared The 100K Signature Threshold, (http://www.washingtonpost.com/world/national-security/house- 'Pardon Snowden' Petition Still Unanswered | Techdirt committee-holds-hearing-on-nsa-surveillance-programs/2013/07 (http://www.techdirt.com/articles/20130930/16175624702/three- /17/ffc3056c-eee3-11e2-9008-61e94a7ea20d_story.html). The months-after-it-cleared-100k-signature-threshold-pardon-snowden- Washington Post. petition-still-unanswered.shtml) 493. ^ Former CIA, NSA chief Michael Hayden: Open spy programs to 508. ^ a b c d Poulsen, Kevin (August 8, 2013). "Edward Snowden's email reassure U.S. public (http://www.washingtontimes.com/news/2013 provider shuts down amid secret court battle" (http://www.wired.com /jun/30/former-cia-nsa-chief-michael-hayden-open-spy-progr/), The /threatlevel/2013/08/lavabit-snowden/). Wired. Washington Times, June 30, 2013. Retrieved Jul 9, 2013. 509. ^ Associated Press (August 8, 2013). "Texas-based secure email 494. ^ Former CIA, NSA director sounds off on PRISM, spying tools service linked to NSA leaker Edward Snowden abruptly shuts down" (http://www.networkworld.com/community/blog/former-cia-nsa- (http://www.washingtonpost.com/world/europe/texas-based-email- director-says-give-public-more-info-nsa-surveillance-programs), service-linked-to-nsa-leaker-edward-snowden-abruptly-shuts- Network World, July 1, 2013. Retrieved Jul 9, 2013. down/2013/08/08/eda45a30-006c- 495. ^ Peterson, Andrea. "Former NSA chief: ‘Morally arrogant’ Snowden 11e3-8294-0ee5075b840d_story.html). The Washington Post. will probably become an alcoholic" (http://www.washingtonpost.com 510. ^ Masnick, Mike (August 8, 2013). "Edward Snowden's email provider, /blogs/the-switch/wp/2013/09/17/former-nsa-chief-morally-arrogant- Lavabit, shuts down to fight gov't intrusion" (http://www.techdirt.com snowden-will-probably-become-an-alcoholic/?tid=btm_rex_1). The /articles/20130808/13092724113/ed-snowdens-email-provider-lavabit- Washington Post. Retrieved 18 September 2013. shuts-down-to-fight-us-govt-intrusion.shtml). Techdirt.

54 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

511. ^ Hill, Kashmir (August 8, 2013). "Email company reportedly used by 526. ^ "USA must not hunt down whistleblower Edward Snowden" Edward Snowden shuts down rather than hand over data to the Feds" (http://www.amnesty.org/en/news/usa-must-not-hunt- (http://www.forbes.com/sites/kashmirhill/2013/08/08/email-company- down-whistleblower-edward-snowden-2013-06-24). Amnesty reportedly-used-by-edward-snowden-shuts-down-rather-than-hand- International. Retrieved June 25, 2013. data-over-to-feds/). Forbes. 527. ^ USA must not persecute whistleblower Edward Snowden 512. ^ Schneier, Bruce (August 22, 2013). "The real, terrifying reason why (http://www.amnesty.org/en/news/usa-must-not-persecute- British authorities detained David Miranda" whistleblower-edward-snowden-2013-07-02) July 2, 2013 Amnesty (http://www.theatlantic.com/international/archive/2013/08/the-real- 528. ^ "US: Protect National Security Whistleblowers" (http://www.hrw.org terrifying-reason-why-british-authorities-detained-david-miranda /news/2013/06/18/us-protect-national-security-whistleblowers). /278952/). The Atlantic. Human Rights Watch. Retrieved June 25, 2013. 513. ^ "Lavabit privacy row: second email service closes 'to prevent spying' 529. ^ Countries Should Consider Snowden’s Asylum Claim Fairly" | Technology" (http://www.theguardian.com/technology/2013/aug (http://www.hrw.org/news/2013/07/03/countries-should-consider- /09/lavabit-email-edward-snowden-shuts-down). The Guardian. snowden-s-asylum-claim-fairly). Human Rights Watch, July 2013 514. ^ Glenn Greenwald (August 9, 2013). "Email service used by Snowden 530. ^ "US needs to protect whistleblowers and journalists" shuts itself down, warns against using US-based companies" (http://www.indexoncensorship.org/2013/06/us-needs-to-protect- (http://www.theguardian.com/commentisfree/2013/aug/09/lavabit- whistleblowers-and-journalists/). Index on Censorship. Retrieved shutdown-snowden-silicon-valley). The Guardian. August 4, 2013. 515. ^ "Data snooping: law abiding citizens have 'nothing to fear', says 531. ^ Heise Online-Autoren Detlef Borchers, anw (July 23, 2013). Hague – video" (http://www.guardian.co.uk/uk/video/2013/jun "Whistleblower-Preis für Edward Snowden" /09/data-snooping-law-abiding-citizens-nothing-fear-hague-video). The (http://www.webcitation.org/6IMvcdV8q). Heise Online. Archived from Guardian (London). June 9, 2013. the original (http://www.heise.de/newsticker/meldung/Whistleblower- 516. ^ "NSA Prism programme: William Hague makes statement on GCHQ Preis-fuer-Edward-Snowden-1922132.html) on July 25, 2013. – video" (http://www.guardian.co.uk/politics/video/2013/jun/10/nsa- Retrieved July 25, 2013. prism-hague-gchq-video). The Guardian (London). June 10, 2013. 532. ^ Sven Lüders (July 24, 2013). "Fritz-Bauer-Preis an Edward 517. ^ Travis, Alan; Connolly, Kate; Watt, Nicholas (June 26, 2013). "GCHQ Snowden" (http://www.webcitation.org/6IMvQXUEU). Humanistischer surveillance: Germany blasts UK over mass monitoring" Pressedienst. Archived from the original (http://hpd.de/node/16474) (http://www.guardian.co.uk/uk/2013/jun/25/germany-uk-gchq- on July 25, 2013. Retrieved July 25, 2013. internet-surveillance). The Guardian (London). 533. ^ But, Joshua (June 16, 2013). "Hongkongers don't want Snowden 518. ^ Staines, Paul (June 8, 2013). "D-Notice, June 7, 2013" (http://order- handed over to the US, according to poll" (http://www.scmp.com order.com/2013/06/08/d-notice-june-7-2013/). Guido Fawkes blog. /news/hong-kong/article/1261483/one-2-hongkongers-say-snowden- 519. ^ 'Key Partners': The Secret Link Between Germany and the NSA should-not-be-surrendered-us). South China Morning Post (Hong (http://www.spiegel.de/international/world/german-intelligence- Kong). Retrieved June 17, 2013. worked-closely-with-nsa-on-data-surveillance-a-912355.html) July 22, 534. ^ "HK, US govt lawyers 'not working together' on Snowden, say 2013 Spiegel Online sources as CY breaks silence" (http://www.scmp.com/news/hong- 520. ^ "2013 Sakharov Prize for Freedom of Thought - seven nominations" kong/article/1261593/cy-leung-breaks-silence-snowden-case-we- (http://www.europarl.europa.eu/news/en/news-room/content will-follow-privacy-claims). South China Morning Post (Hong Kong). /20130916IPR20013/html/2013-Sakharov-Prize-for-Freedom- June 16, 2013. of-Thought-seven-nominations). 2013-09-16. Retrieved 2013-09-18. 535. ^ Fraser, Niall (June 13, 2013). "H.K. lawmakers petition Obama for "Edward Snowden - nominated by the Greens/EFA group and GUE/NGL leniency against whistleblower" (http://www.globalpost.com/dispatch group" /news/kyodo-news-international/130615/hk-lawmakers-petition- 521. ^ "Pakistan's Malala, Snowden Nominated for E.U. Prize" obama-leniency-against-whistlebl). Kyodo News International. (http://world.time.com/2013/09/16/pakistans-malala-snowden- Retrieved June 15, 2013. nominated-for-e-u-prize/). 2013-09-16. Retrieved 2013-09-18. 536. ^ Ma, Mary (June 20, 2013). "Ip in security minister's shoes" 522. ^ Valentina Pop (July 8, 2013). "Germany defends intelligence (http://www.thestandard.com.hk/news_detail.asp?pp_cat=49& co-operation with US" (http://euobserver.com/foreign/120795). art_id=134784&sid=39840738&con_type=1&d_str=20130620& EUobserver. Retrieved July 9, 2013. isSearch=1&sear_year=2013). The Standard (Hong Kong). "However, 523. ^ Trittin, Jürgen (July 2, 2013). "Edward Snowden deserves shelter in surrounding the Snowden case is something never before seen in local Germany" (http://www.guardian.co.uk/commentisfree/2013/jul politics. Not only are the pan-democrat and pro-establishment camps /02/edward-snowden-shelter-in-germany). The Guardian (United singing off the same song sheet, the pan-democrats and mainland Kingdom). Retrieved July 13, 2013. propagandists are humming a similar tune." 524. ^ a b "UN rights chief urges protection for individuals revealing human rights violations" (http://www.un.org/apps/news /story.asp?Cr=asylum&NewsID=45399#.Uf7eH6y_S28). United Nations. Retrieved August 4, 2013. 525. ^ Amnesty International meets US whistleblower Edward Snowden (http://www.amnesty.org/en/news/amnesty-international-meets- us-whistleblower-edward-snowden-2013-07-12) July 12, 2013

55 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

537. ^ Lau, Stuart (June 24, 2013). "Hong Kong's political foes made allies 549. ^ a b Pilkington, Ed. "Edward Snowden's digital 'misuse' has created amid Edward Snowden storm" (http://www.scmp.com/news/hong- problems, says Ban Ki-moon (http://www.guardian.co.uk/world kong/article/1267574/edward-snowden-passing-snowstorm- /2013/jul/03/edward-snowden-digital-misuse-ban-ki-moon)." The made-allies-hong-kong-foes). South China Morning Post (Hong Kong). Guardian. July 3, 2013. Retrieved July 3, 2013. Retrieved June 24, 2013. "Snowden's arrival in the city gave Hong 550. ^ G20 summits: Russia and Turkey react with fury to spying Kong a rare place in the global geopolitical spotlight and ushered in revelations (http://www.guardian.co.uk/world/2013/jun/17/turkey- near-unprecedented political solidarity as pan-democrats and Beijing russia-g20-spying-gchq), The Guardian, June 17, 2013. Retrieved Jul loyalists lined up to take a shot at an unlikely target: the United 2013. States." 551. ^ O'Malley, Nick (June 10, 2013). "NSA leaker reveals himself after 538. ^ a b Zuo, Mandy (June 20, 2013). "Beijing wants Hong Kong to fleeing US" (http://www.smh.com.au/world/nsa-leaker-reveals-himself- handle Snowden on its own, party newspapers suggest" after-fleeing-us-20130610-2nz6h.html). The Sydney Morning Herald. (http://www.scmp.com/news/china/article/1264604/newspaper- Retrieved June 10, 2013. commentaries-suggest-beijing-wants-hong-kong-handle-snowden-its). 552. ^ Ellsberg, Daniel (June 10, 2013). "Edward Snowden: saving us from South China Morning Post (Hong Kong). Retrieved June 20, 2013. In the United of America" (http://www.guardian.co.uk print as "Articles highlight possible Beijing role". /commentisfree/2013/jun/10/edward-snowden-united-stasi-america). 539. ^ Lai Ying-kit (June 24, 2013). "Edward Snowden's depature seen as a The Guardian. Retrieved June 10, 2013. relief: Chinese-language newspapers" (http://www.scmp.com 553. ^ Noor, Jaisal (June 11, 2013). "Former CIA Analyst: Snowden Did The /news/hong-kong/article/1268012/edward-snowdens-depature- Right Thing" (http://therealnews.com seen-relief-chinese-language-newspapers). South China Morning Post /t2/index.php?option=com_content&task=view&id=31&Itemid=74& (Hong Kong). Retrieved June 24, 2013. jumival=10297). The Real News Network. 540. ^ "Beijing made final decision, say analysts". South China Morning 554. ^ a b Eisler, Peter; Page, Susan (June 16, 2013). "3 NSA veterans Post (Hong Kong). June 25, 2013. p. 2. speak out on whistle-blower: We told you so 541. ^ Kaiman, Jonathan (June 25, 2013). "China's state newspaper (http://www.usatoday.com/story/news/politics/2013/06/16/snowden- praises Edward Snowden for 'tearing off Washington's sanctimonious whistleblower-nsa-officials-roundtable/2428809/)." USA Today mask'" (http://www.guardian.co.uk/world/2013/jun/25/peoples-daily- (Washington DC). Retrieved June 19, 2013. savages-us-over-snowden). The Guardian (London). Retrieved June 555. ^ Snowden saw what I saw: surveillance criminally subverting the 25, 2013. constitution (http://www.guardian.co.uk/commentisfree/2013/jun 542. ^ "Ecuador warned: Asylum for Edward Snowden would jeopardize /12/snowden-surveillance-subverting-constitution) The Guardian. millions in trade" (http://hotair.com/headlines/archives/2013/06 Retrieved July 10, 2013 /27/ecuador-warned-asylum-for-edward-snowden-would-jeopardize- 556. ^ Addley, Esther (June 10, 2013). "Julian Assange praises Edward millions-in-trade/). Michelle Malkin. June 27, 2013. Snowden as a hero" (http://www.guardian.co.uk/media/2013/jun 543. ^ "Ecuador offers U.S. rights aid, waives trade benefits" /10/julian-assange-praises-edward-snowden). The Guardian (London). (http://www.reuters.com/article/2013/06/27/us-usa-security-ecuador- Retrieved June 10, 2013. idUSBRE95Q0L820130627). Reuters. June 27, 2013. 557. ^ Dart, Tom (June 22, 2013). "Support NSA whistleblower Edward 544. ^ "Ecuador waives US trade rights after threats made over Snowden Snowden, says Julian Assange" (http://www.guardian.co.uk/world case" (http://www.scmp.com/news/world/article/1270475/ecuador- /2013/jun/22/edward-snowden-nsa-whistleblower-julian-assange). The waives-us-trade-rights-after-threats-made-over-snowden-case). South Guardian (London). Retrieved June 22, 2013. China Morning Post (Hong Kong). June 28, 2013. 558. ^ David Jackson. "Assange: Obama 'validates' Snowden" 545. ^ "Ecuador president blasts coverage of Snowden case" (http://www.usatoday.com/story/theoval/2013/08/11/obama- (http://archive.is/Z8NMS). Newsday (New York). Associated Press. snowden-assange-nsa-surveillance/2640217/). USA Today. June 26, 2013. Archived from the original (http://www.newsday.com 559. ^ "Assange calls Obama reform plans 'victory of sorts' for Snowden" /news/world/ecuador-president-blasts-coverage-of-snowden- (http://www.reuters.com/article/2013/08/10/us-usa-surveillance- case-1.5574121) on June 29, 2013. Retrieved June 28, 2013. assange-idUSBRE9790A920130810). Reuters. August 10, 2013. 546. ^ Snowden's fate up in the air after Nicaragua, Venezuela offer asylum 560. ^ Blowback from the White House's vindictive war on whistleblowers (http://www.ctvnews.ca/world/snowden-s-fate-up-in-the-air-after- (http://www.guardian.co.uk/commentisfree/2013/jul/05/blowback- nicaragua-venezuela-offer-asylum-1.1354492), CTV Television white-house-whistleblowers)." Leibowitz, Shamai in The Guardian. July Network, July 5, 2013. Retrieved July 9, 2013. 5, 2013. Retrieved July 5, 2013. 547. ^ Sotero, Paulo (17 September 2013). "Mission impossible in Moscow" 561. ^ The Washington Post (http://www.washingtonpost.com/world (http://www.estadao.com.br/noticias/impresso,missao-impossivel- /snowdens-father-arrives-in-moscow/2013/10/10/ec4f6c32-3182-11e3- em-moscou-,1075984,0.htm). O Estado de S. Paulo. Retrieved 18 ad00-ec4c6b31cbed_story_1.html) September 2013. 562. ^ Former National Security Whistleblowers Meet in Moscow and Award 548. ^ Leahy, Joe (18 September 2013). "Brazil’s Petrobras to invest heavily Sam Adams Prize to Snowden - Government Accountability Project in data security" (http://www.ft.com/cms/s/0/f3195d0a- (http://www.whistleblower.org/blog/44-2013/3012-former-national- 2081-11e3-9a9a-00144feab7de.html#axzz2gzh4A13k). Financial Times security-whistleblowers-meet-in-moscow-and-award-sam-adams-prize- (São Paulo). Retrieved 18 September 2013. (registration required) to-snowden-) 563. ^ 'US unchained itself from constitution': Whistleblowers on RT after secret Snowden meeting — RT News (http://rt.com/news/rt- whistleblowers-snowden-prize-983/)

56 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

564. ^ John Hudson. "Exclusive: After Multiple Denials, CIA Admits to 566. ^ a b c d e f g MATTHEW M. AID. "Secret Cold War Documents Reveal Snooping on Noam Chomsky" (http://thecable.foreignpolicy.com/posts NSA Spied on Senators" (http://www.foreignpolicy.com/articles /2013/08 /2013/09/25/it_happened_here_NSA_spied_on_senators_1970s). /13/after_multiple_denials_cia_admits_to_snooping_on_noam_chomsk Foreign Policy. Retrieved 25 September 2013. "...That's according to a y). Foreign Policy. Retrieved 27 September 2013. recently declassified NSA history, which called the effort "disreputable 565. ^ Nikhil Kumar. "Memo shows CIA ‘did keep file on Noam Chomsky’" if not outright illegal." For years the names of the surveillance targets (http://www.independent.co.uk/news/world/americas/memo-shows- were kept secret. But after a decision by the Interagency Security cia-did-keep-file-on-noam-chomsky-8760093.html). The Independent. Classification Appeals Panel, in response to an appeal by the National Retrieved 27 September 2013. Security Archive at George Washington University, the NSA has declassified them for the first time. The names of the NSA's targets are eye-popping."

Further reading

"The NSA Files" (http://www.guardian.co.uk/world/the-nsa-files). The Guardian. Politico Staff. "NSA leaks cause flood of political problems (http://www.politico.com/story/2013/06/nsa-leaks-cause-flood-of-political- problems-92703.html)." Politico. 13 June 2013. NSA inspector general report on email and internet data collection under Stellar Wind (http://www.guardian.co.uk/world/interactive /2013/jun/27/nsa-inspector-general-report-document-data-collection) as provided by The Guardian on 27 June 2013. "Putin talks NSA, Syria, Iran, drones in exclusive RT interview (FULL VIDEO) (https://www.youtube.com/watch?v=33oIF-ggK5U)." Russia Today. 12 June 2013. Ackerman, Spencer. "NSA warned to rein in surveillance as agency reveals even greater scope (http://www.guardian.co.uk/world /2013/jul/17/nsa-surveillance-house-hearing)." The Guardian. 17 July 2013. Ackerman, Spencer. "Slew of court challenges threaten NSA's relationship with tech firms (http://www.guardian.co.uk/world/2013/jul /17/nsa-court-challenges-tech-firms)." The Guardian. Wednesday 17 July 2013. Ackerman, Spencer and Paul Lewis. "NSA amendment's narrow defeat spurs privacy advocates for surveillance fight (http://www.guardian.co.uk/world/2013/jul/25/narrow-defeat-nsa-amendment-privacy-advocates)." The Guardian. Thursday 25 July 2013. Ackerman, Spencer and Dan Roberts. "US embassy closures used to bolster case for NSA surveillance programs (http://www.theguardian.com/world/2013/aug/05/us-embassy-closure-nsa-surveillance)." The Guardian. Monday 5 August 2013. Greenwald, Glenn. "Members of Congress denied access to basic information about NSA (http://www.theguardian.com/commentisfree /2013/aug/04/congress-nsa-denied-access)." The Guardian. Sunday 4 August 2013. "Obama’s former adviser ridicules statement that NSA doesn’t spy on Americans (http://rt.com/usa/us-obama-surveillance-snowden- 296/)." (Archive (http://archive.is/sLrba)) Russia Today. 9 August 2013. MacAskill, Ewen. "Justice Department fails in bid to delay landmark case on NSA collection (http://www.guardian.co.uk/world/2013/jul /25/justice-department-case-nsa-collection)." The Guardian. Thursday 25 July 2013. Rushe, Dominic. "Microsoft pushes Eric Holder to lift block on public information sharing (http://www.guardian.co.uk/technology/2013/jul /16/microsoft-eric-holder-permission-information-national-security)." The Guardian. Tuesday 16 July 2013. Perez, Evan. "Documents shed light on U.S. surveillance programs (http://www.cnn.com/2013/08/09/politics/nsa-documents- scope/index.html)." (Archive (http://archive.is/Mqsdk)) CNN. 9 August 2013. Gellman, Barton. "NSA broke privacy rules thousands of times per year, audit finds (http://www.washingtonpost.com/world/national- security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f- 49ddc7417125_story.html)." Washington Post. Thursday 15 August 2013. Roberts, Dan and Robert Booth. "NSA defenders: embassy closures followed pre-9/11 levels of 'chatter' (http://www.theguardian.com /world/2013/aug/04/nsa-us-embassy-closures-terrorist-threat)." The Guardian. Sunday 4 August 2013. Greenwald, Glenn. "The crux of the NSA story in one phrase: 'collect it all' (http://www.guardian.co.uk/commentisfree/2013/jul/15/crux- nsa-collect-it-all)." The Guardian. Monday 15 July 2013. Sanchez, Julian. "Five things Snowden leaks revealed about NSA’s original warrantless wiretaps (http://arstechnica.com/tech-policy /2013/07/5-things-snowden-leaks-revealed-about-nsas-original-warrantless-wiretaps/)." Ars Technica. 9 July 2013. Forero, Juan. "Paper reveals NSA ops in Latin America (http://www.washingtonpost.com/world/the_americas/paper-reveals-nsa-ops- in-latin-america/2013/07/09/eff0cc7e-e8e3-11e2-818e-aa29e855f3ab_story.html)." Washington Post. 9 July 2013. Jabour, Bridie. "Telstra signed deal that would have allowed US spying (http://www.guardian.co.uk/world/2013/jul/12/telstra- deal-america-government-spying)." The Guardian. Friday 12 July 2013. Ackerman, Spencer. "White House stays silent on renewal of NSA data collection order (http://www.guardian.co.uk/world/2013/jul /18/white-house-silent-renewal-nsa-court-order#start-of-comments)." The Guardian. Thursday 18 July 2013. Naughton, John. "Edward Snowden's not the story. The fate of the internet is (http://www.guardian.co.uk/technology/2013/jul /28/edward-snowden-death-of-internet)." The Guardian. 28 July 2013. Adams, Becket. "MAD MAGAZINE USES ICONIC CHARACTERS TO HIT OBAMA OVER GOV’T SURVEILLANCE (http://www.theblaze.com

57 of 58 29.10.13 01:49 2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan...

/stories/2013/08/08/mad-magazine-uses-iconic-characters-to-hit-obama-over-govt-surveillance/)." The Blaze. 8 August 2013. Howerton, Jason. "HERE IS THE PRO-NSA SURVEILLANCE ARGUMENT (http://www.theblaze.com/stories/2013/06/10/here-is-the- pro-nsa-surveillance-argument)." The Blaze. 10 June 2013. "Edward Snowden NSA files: secret surveillance and our revelations so far – Leaked National Security Agency documents have led to several hundred Guardian stories on electronic privacy and the state (http://www.theguardian.com/world/2013/aug/21/edward- snowden-nsa-files-revelations)" by the Guardian's James Ball on 21 August 2013 2013-07-29 Letter of FISA Court president Reggie B. Walton to the Chairman of the U.S. Senate Judiciary Committee Patrick J. Leahy about certain operations of the FISA Court (http://www.leahy.senate.gov/download/honorable-patrick-j-leahy); among other things the process of accepting, modifying and/or rejecting surveillance measures proposed by the U.S. government, the interaction between the FISA Court and the U.S. government, the appearance of non-governmental parties before the court and and the process used by the Court to consider and resolve any instances where the government entities notifies the court of compliance concerns with any of the FISA authorities. "The Spy Files" (http://wikileaks.org/the-spyfiles.html). Wikileaks. December 1, 2011. A collection of documents relating to surveillance. "The Spy Files" (http://wikileaks.org/spyfiles/list/releasedate/2011-12-08.html). Wikileaks. December 8, 2011. Part 2 of the above. "Spy Files 3" (http://wikileaks.org/spyfiles3.html). Wikileaks. September 4, 2013. Part 3 of the above. "Veja os documentos ultrassecretos que comprovam espionagem a Dilma" (http://g1.globo.com/fantastico/noticia/2013/09/veja- os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html) (in Portuguese). 2 September 2013. Retrieved 4 September 2013. Documents relating to the surveillance against Dilma Roussef and Enrique Peña Nieto NSA surveillance: A guide to staying secure - The NSA has huge capabilities – and if it wants in to your computer, it's in. With that in mind, here are five ways to stay safe (http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance) by The Guardian's Bruce Schneier on September 5, 2013.

Retrieved from "http://en.wikipedia.org/w/index.php?title=2013_mass_surveillance_disclosures&oldid=579195708" Categories: National Security Agency operations Mass surveillance 2013 controversies Edward Snowden

This page was last modified on 29 October 2013 at 00:22.

Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the , Inc., a non-profit organization.

58 of 58 29.10.13 01:49