{"id":219934,"date":"2017-06-16T03:06:06","date_gmt":"2017-06-16T07:06:06","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/global-surveillance-disclosures-2013present-wikipedia.php"},"modified":"2017-06-16T03:06:06","modified_gmt":"2017-06-16T07:06:06","slug":"global-surveillance-disclosures-2013present-wikipedia","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/global-surveillance-disclosures-2013present-wikipedia.php","title":{"rendered":"Global surveillance disclosures (2013present) &#8211; Wikipedia"},"content":{"rendered":"<p><p>    Ongoing news reports in the international media have revealed    operational details about the United States National Security Agency (NSA)    and its international partners' global    surveillance[1] of foreign nationals and U.S.    citizens. The reports mostly emanate from a cache of top    secret documents leaked by ex-NSA    contractor Edward Snowden, which he obtained whilst    working for Booz Allen Hamilton, one of the    largest contractors for defense and intelligence in the United    States.[2] In addition to    a trove of U.S. federal documents, Snowden's cache reportedly    contains thousands of Australian, British and Canadian    intelligence files that he had accessed via the exclusive    \"Five Eyes\"    network. In June 2013, the first of Snowden's documents were    published simultaneously by The    Washington Post and The Guardian, attracting    considerable public attention.[3] The disclosure    continued throughout 2013, and a small portion of the estimated    full cache of documents was later published by other media    outlets worldwide, most notably The New    York Times (United States), the Canadian Broadcasting    Corporation, the Australian Broadcasting    Corporation, Der Spiegel (Germany), O Globo (Brazil),    Le Monde    (France), L'espresso (Italy), NRC    Handelsblad (the Netherlands), Dagbladet (Norway),    El Pas    (Spain), and Sveriges Television (Sweden).[4]  <\/p>\n<p>    These media reports have shed light on the implications of    several secret treaties signed by members of the    UKUSA    community in their efforts to implement global    surveillance. For example, Der Spiegel revealed how    the German Bundesnachrichtendienst (BND)    transfers \"massive amounts of intercepted data to the    NSA\",[5]    while Swedish Television revealed the National    Defence Radio Establishment (FRA) provided the NSA with    data from its cable collection, under a secret treaty    signed in 1954 for bilateral cooperation on    surveillance.[6] Other security and intelligence    agencies involved in the practice of global    surveillance include those in Australia (ASD), Britain (GCHQ), Canada    (CSEC),    Denmark (PET),    France (DGSE), Germany    (BND), Italy (AISE), the    Netherlands (AIVD), Norway    (NIS), Spain (CNI), Switzerland    (NDB), Singapore (SID) as well as    Israel (ISNU),    which receives raw, unfiltered data of U.S. citizens that is    shared by the NSA.[7][8][9][10][11][12][13][14]  <\/p>\n<p>    On June 14, 2013, United States prosecutors charged    Edward Snowden with espionage and theft of government property.[15] In late July    2013, he was granted a one-year temporary asylum by    the Russian government,[16] contributing    to a deterioration of RussiaUnited States    relations.[17][18] On August 6,    2013, U.S. President Barack Obama made a public appearance on    national television where he told Americans that \"We don't have    a domestic spying program\" and that \"There is no spying on    Americans\".[19] Towards the end of October 2013,    the British Prime Minister David Cameron warned The Guardian    not to    publish any more leaks, or it will receive a DA-Notice.[20] In November    2013, a criminal investigation of the disclosure was being    undertaken by Britain's Metropolitan Police    Service.[21]    In December 2013, The Guardian editor Alan    Rusbridger said: \"We have published I think 26 documents so    far out of the 58,000 we've seen.\"[22]  <\/p>\n<p>    The extent to which the media reports have responsibly informed    the public is disputed. In January 2014, Obama said that \"the    sensational way in which these disclosures have come out has    often shed more heat than light\"[23] and critics such as    Sean    Wilentz have noted that many of the Snowden documents    released do not concern domestic surveillance.[24] In its first    assessment of these disclosures, the Pentagon concluded that Snowden    committed the biggest \"theft\" of U.S. secrets in the history of the United    States.[25]    Sir David    Omand, a former director of GCHQ, described Snowden's    disclosure as the \"most catastrophic loss to British    intelligence ever\".[26]  <\/p>\n<p>    Barton    Gellman, a Pulitzer Prizewinning journalist who led    The Washington Post's coverage of Snowden's disclosures,    summarized the leaks as follows:  <\/p>\n<p>      \"Taken together, the revelations have brought to light a      global surveillance system that      cast off many of its historical restraints after the attacks of Sept. 11, 2001. Secret      legal authorities empowered the NSA to sweep in the      telephone, Internet and location records of whole      populations.\"    <\/p>\n<p>    The disclosure revealed specific details of the NSA's close    cooperation with U.S. federal agencies such as the Federal Bureau of    Investigation (FBI)[28][29] and the Central Intelligence Agency    (CIA)[30][31] in addition to the    agency's previously undisclosed financial payments to numerous    commercial partners and telecommunications companies,[32][33][34] as    well as its previously undisclosed relationships with    international partners such as Britain,[35][36] France[12][37]    Germany,[5][38] and its secret treaties    with foreign governments that were recently established for    sharing intercepted data of each other's citizens.[7][39][40][41] The    disclosures were made public over the course of several months    since June 2013, by the press in several nations from the trove    leaked by the former NSA contractor Edward J. Snowden,[42] who obtained the    trove while working for Booz Allen Hamilton.[2]  <\/p>\n<p>    George    Brandis, the current Attorney-General of    Australia, asserted that Snowden's disclosure is the \"most    serious setback for Western intelligence since the Second World    War.\"[43]  <\/p>\n<p>    As of December 2013[update],    global surveillance programs include:  <\/p>\n<p>    The NSA was also getting data directly from telecommunications companies    codenamed Artifice, Lithium, Serenade, SteelKnight, and X. The    real identities of the companies behind these codenames were    not included in the Snowden document dump because they were    protected as Exceptionally Controlled    Information which prevents wide circulation even to those    (like Snowden) who otherwise have the necessary security    clearance.[65][66]  <\/p>\n<p>    Although the exact size of Snowden's disclosure remains    unknown, the following estimates have been put up by various    government officials:  <\/p>\n<p>    As a contractor of the NSA, Snowden was granted access to U.S.    government documents along with top secret documents    of several allied governments, via the    exclusive Five    Eyes network.[69] Snowden    claims that he is currently not in physical possession of any    of these documents, after having surrendered all copies to the    journalists he met in Hong Kong.[70]  <\/p>\n<p>    According to his lawyer, Snowden has pledged not to release any    documents while in Russia, leaving the responsibility for    further disclosures solely to journalists.[71] As of    2014, the following news outlets have accessed some of the    documents provided by Snowden: Australian Broadcasting    Corporation, Canadian Broadcasting    Corporation, Channel 4, Der Spiegel, El    Pais, El Mundo, L'espresso,    Le Monde,    NBC, NRC    Handelsblad, Dagbladet, O Globo, South China Morning Post,    Sddeutsche Zeitung, Sveriges Television, The Guardian,    The New York Times, and    The Washington Post.  <\/p>\n<p>    In the 1970s, NSA analyst Perry Fellwock (under the pseudonym    \"Winslow Peck\") revealed the existence of the UKUSA    Agreement, which forms the basis of the ECHELON network, whose    existence was revealed in 1988 by Lockheed employee Margaret    Newsham.[72][73] Months    before the September 11 attacks and during its    aftermath, further details of the global    surveillance apparatus were provided by various individuals    such as the former MI5    official David Shayler and the journalist James    Bamford,[74][75] who were    followed by:  <\/p>\n<p>    In the aftermath of Snowden's revelations, The Pentagon    concluded that Snowden committed the biggest theft of U.S.    secrets in the history of the United    States.[25]    In Australia, the coalition government described the leaks as    the most damaging blow dealt to Australian intelligence    in history.[43] Sir David Omand, a    former director of GCHQ, described Snowden's disclosure as the    \"most catastrophic loss to British intelligence ever\".[26]  <\/p>\n<p>    In April 2012, NSA contractor Edward Snowden began downloading    documents.[87] That year, Snowden    had made his first contact with journalist Glenn    Greenwald of The Guardian and he contacted    documentary filmmaker Laura Poitras in January 2013.[88][89]  <\/p>\n<p>    In May 2013, Snowden went on temporary leave from his position    at the NSA, citing the pretext of receiving treatment for his    epilepsy. Towards    the end of May, he traveled to Hong Kong.[90][91] Greenwald, Poitras and    the Guardian's defence and intelligence correspondent Ewen    MacAskill flew to Hong Kong to meet Snowden.  <\/p>\n<p>    After the U.S.-based editor of The Guardian, Janine Gibson,    held several meetings in New York City, it was decided that    Greenwald, Poitras and the Guardian's defence and intelligence correspondent Ewen    MacAskill would fly to Hong Kong to meet Snowden. On June 5, in    the first media report based on the leaked material,[92]The Guardian exposed a    top secret court order showing that the NSA    had collected phone records from over 120 million Verizon    subscribers.[93] Under the order,    the numbers of both parties on a call, as well as the location    data, unique identifiers, time of call, and duration of call    were handed over to the FBI, which turned over the records to    the NSA.[93] According to    The Wall Street Journal, the    Verizon order is part of a controversial data program, which    seeks to stockpile records on all calls made in the U.S., but    does not collect information directly from T-Mobile US and    Verizon Wireless, in part because of    their foreign ownership ties.[94]  <\/p>\n<p>    On June 6, 2013, the second media disclosure, the revelation of    the PRISM surveillance program    (which collects the e-mail, voice, text and video chats of    foreigners and an unknown number of Americans from Microsoft,    Google, Facebook, Yahoo, Apple and other tech giants),[95][96][97][98] was    published simultaneously by The Guardian and The    Washington Post.[86][99]  <\/p>\n<p>    Der    Spiegel revealed NSA spying on multiple diplomatic    missions of the European Union (EU) and the United Nations Headquarters    in New York.[100][101] During    specific episodes within a four-year period, the NSA hacked    several Chinese mobile-phone companies,[102] the    Chinese University of Hong    Kong and Tsinghua University in    Beijing,[103] and the Asian fiber-optic    network operator Pacnet.[104] Only    Australia, Canada, New Zealand and the UK are    explicitly exempted from NSA attacks, whose main target in the    EU is Germany.[105] A method of bugging encrypted    fax machines used at an EU embassy is codenamed Dropmire.[106]  <\/p>\n<p>    During the 2009 G-20 London    summit, the British intelligence agency Government    Communications Headquarters (GCHQ) intercepted the    communications of foreign diplomats.[107] In addition, GCHQ    has been intercepting and storing mass quantities of    fiber-optic traffic via Tempora.[108]    Two principal components of Tempora are called \"Mastering the Internet\" (MTI) and    \"Global Telecoms    Exploitation\".[109] The data is    preserved for three days while metadata is kept for thirty days.[110] Data collected by GCHQ    under Tempora is shared with the National Security Agency (NSA)    of the United States.[109]  <\/p>\n<p>    From 2001 to 2011, the NSA collected vast amounts of metadata    records detailing the email and internet usage of Americans via    Stellar Wind,[111] which was later terminated due    to operational and resource constraints. It was subsequently    replaced by newer surveillance programs such as ShellTrumpet,    which \"processed its one trillionth metadata record\" by    the end of December 2012.[112]  <\/p>\n<p>    The NSA follows specific procedures to target non-U.S.    persons[113] and to minimize data    collection from U.S. persons.[114] These    court-approved policies allow the NSA to:[115][116]  <\/p>\n<p>    According to Boundless Informant, over 97 billion    pieces of intelligence were collected over a 30-day period    ending in March 2013. Out of all 97 billion sets of    information, about 3 billion data sets originated from U.S. computer    networks[117] and around 500 million    metadata records were collected from German networks.[118]  <\/p>\n<p>    In August 2013, it was revealed that the Bundesnachrichtendienst (BND) of    Germany transfers massive amounts of metadata records to the    NSA.[119]  <\/p>\n<p>    Der Spiegel disclosed that Germany is the most targeted    country of the 27 members of the European Union due to the NSA    systematic monitoring and storage of Germany's telephone and    Internet connection data. According to the magazine the NSA    stores data from around half a billion communications    connections in Germany each month. This data includes telephone    calls, emails, mobile-phone text messages and chat    transcripts.[120]  <\/p>\n<p>    The NSA gained massive amounts of information captured from the    monitored data traffic in Europe. For example, in December    2013, the NSA gathered on an average day metadata from some 15    million telephone connections and 10 million Internet datasets.    The NSA also monitored the European Commission in Brussels and    monitored EU diplomatic Facilities in Washington and at the    United Nations by placing bugs in offices as well as    infiltrating computer networks.[121]  <\/p>\n<p>    The U.S. government made as part of its UPSTREAM data collection    program deals with companies to ensure that it had access    to and hence the capability to surveil undersea fiber-optic    cables which deliver e-mails, Web pages, other electronic    communications and phone calls from one continent to another at    the speed of light.[122][123]  <\/p>\n<p>    According to the Brazilian newspaper O Globo, the NSA spied on millions of    emails and calls of Brazilian citizens,[124][125] while    Australia and New Zealand have been involved in the joint    operation of the NSA's global analytical system XKeyscore.[126][127] Among the    numerous allied facilities contributing to    XKeyscore are four installations in Australia and one in New    Zealand:  <\/p>\n<p>    O Globo    released an NSA document titled \"Primary FORNSAT    Collection Operations\", which revealed the specific    locations and codenames of the FORNSAT intercept stations in 2002.[128]  <\/p>\n<p>    According to Edward Snowden, the NSA has established secret    intelligence partnerships with many Western    governments.[127] The Foreign    Affairs Directorate (FAD) of the NSA is responsible for    these partnerships, which, according to Snowden, are organized    such that foreign governments can \"insulate their political    leaders\" from public outrage in the event that these global    surveillance partnerships are leaked.[129]  <\/p>\n<p>    In an interview published by Der Spiegel, Snowden accused the    NSA of being \"in bed together with the Germans\".[130] The NSA granted the German    intelligence agencies BND    (foreign intelligence) and BfV (domestic intelligence)    access to its controversial XKeyscore system.[131] In return,    the BND turned over copies of two systems named Mira4 and Veras,    reported to exceed the NSA's SIGINT capabilities in certain    areas.[5]    Every day, massive amounts of metadata records are collected by    the BND and transferred to the NSA via the Bad    Aibling Station near Munich, Germany.[5] In December 2012    alone, the BND handed over 500 million metadata records to the    NSA.[132][133]  <\/p>\n<p>    In a document dated January 2013, the NSA acknowledged the    efforts of the BND to undermine privacy laws:  <\/p>\n<p>      \"The BND has      been working to influence the German government to relax      interpretation of the privacy laws to provide greater      opportunities of intelligence sharing\".[133]    <\/p>\n<p>    According to an NSA document dated April 2013, Germany has now    become the NSA's \"most prolific partner\".[133] Under a    section of a separate document leaked by Snowden titled    \"Success Stories\", the NSA acknowledged the efforts of the    German government to expand the BND's international data    sharing with partners:  <\/p>\n<p>      \"The German government modifies its interpretation of the            G-10 privacy law  to afford the BND more flexibility in      sharing protected information with foreign partners.\"[50]    <\/p>\n<p>    In addition, the German government was well aware of the PRISM    surveillance program long before Edward Snowden made details    public. According to Angela Merkel's spokesman Steffen    Seibert, there are two separate PRISM programs  one is    used by the NSA and the other is used by NATO forces in Afghanistan.[134] The two    programs are \"not identical\".[134]  <\/p>\n<p>    The    Guardian revealed further details of the NSA's XKeyscore tool, which    allows government analysts to search through vast databases    containing emails, online chats and the browsing histories of    millions of individuals without prior authorization.[135][136][137] Microsoft \"developed a    surveillance capability to deal\" with the interception of    encrypted chats on Outlook.com, within five months after the    service went into testing. NSA had access to Outlook.com emails    because \"Prism collects this data prior to encryption.\"[47]  <\/p>\n<p>    In addition, Microsoft worked with the FBI to enable the NSA to    gain access to its cloud storage service SkyDrive. An internal NSA document dating from    August 3, 2012 described the PRISM surveillance program as a    \"team    sport\".[47]  <\/p>\n<p>    Even if there is no reason to suspect U.S. citizens of    wrongdoing, the CIA's National Counterterrorism    Center is allowed to examine federal government files for    possible criminal behavior. Previously the NTC was barred to do    so, unless a person was a terror suspect or related to an    investigation.[138]  <\/p>\n<p>    Snowden also confirmed that Stuxnet was cooperatively developed by the United    States and Israel.[139] In a    report unrelated to Edward Snowden, the French newspaper    Le Monde    revealed that France's DGSE was also undertaking mass surveillance,    which it described as \"illegal and outside any serious    control\".[140][141]  <\/p>\n<p>    Documents leaked by Edward Snowden that were seen by    Sddeutsche Zeitung (SZ) and    Norddeutscher Rundfunk    revealed that several telecom operators have played a key    role in helping the British intelligence agency Government    Communications Headquarters (GCHQ) tap into worldwide    fiber-optic communications. The    telecom operators are:  <\/p>\n<p>    Each of them were assigned a particular area of the    international fiber-optic network for which    they were individually responsible. The following networks have    been infiltrated by GCHQ: TAT-14 (Europe-USA), Atlantic Crossing 1 (Europe-USA),    Circe South (France-UK), Circe    North (The Netherlands-UK), Flag Atlantic-1,    Flag Europa-Asia,    SEA-ME-WE 3    (Southeast Asia-Middle East-Western Europe), SEA-ME-WE 4    (Southeast Asia-Middle East-Western Europe), Solas    (Ireland-UK), UK-France 3, UK-Netherlands 14, ULYSSES (Europe-UK), Yellow (UK-USA) and Pan    European Crossing.[143]  <\/p>\n<p>    Telecommunication companies who participated were \"forced\" to    do so and had \"no choice in the matter\".[143] Some of the companies    were subsequently paid by GCHQ for their participation in the    infiltration of the cables.[143] According to the SZ,    GCHQ has access to the majority of internet and telephone    communications flowing throughout Europe, can listen to phone    calls, read emails and text messages, see which websites    internet users from all around the world are visiting. It can    also retain and analyse nearly the entire European internet    traffic.[143]  <\/p>\n<p>    GCHQ is collecting all data transmitted to and from the United    Kingdom and Northern Europe via the undersea fibre optic    telecommunications cable SEA-ME-WE 3. The Security and Intelligence    Division (SID) of Singapore co-operates with Australia in    accessing and sharing communications carried by the SEA-ME-WE-3    cable. The Australian Signals    Directorate (ASD) is also in a partnership with British,    American and Singaporean intelligence agencies to tap undersea    fibre optic telecommunications cables that link Asia, the    Middle East and Europe and carry much of Australia's    international phone and internet traffic.[144]  <\/p>\n<p>    The U.S. runs a top-secret surveillance program known as the    Special Collection Service    (SCS), which is based in over 80 U.S. consulates and embassies    worldwide.[146]    The NSA hacked the United Nations' video conferencing system in    Summer 2012 in violation of a UN agreement.[146]  <\/p>\n<p>    The NSA is not just intercepting the communications of    Americans who are in direct contact with foreigners targeted    overseas, but also searching the contents of vast amounts of    e-mail and text communications into and out of the country by    Americans who mention information about foreigners under    surveillance.[147] It also spied on the Al Jazeera and gained    access to its internal communications systems.[148]  <\/p>\n<p>    The NSA has built a surveillance network that has the capacity    to reach roughly 75% of all U.S. Internet traffic.[149][150][151] U.S.    Law-enforcement agencies use tools used by computer hackers to    gather information on suspects.[152][153] An internal NSA audit from May    2012 identified 2776 incidents i.e. violations of the rules or    court orders for surveillance of Americans and foreign targets    in the U.S. in the period from April 2011 through March 2012,    while U.S. officials stressed that any mistakes are not    intentional.[154][155][156][157][158][159][160]  <\/p>\n<p>    The FISA Court that is supposed to provide critical oversight    of the U.S. government's vast spying programs has limited    ability to do so and it must trust the government to report    when it improperly spies on Americans.[161] A    legal opinion declassified on August 21, 2013, revealed that    the NSA intercepted for three years as many as 56,000    electronic communications a year of Americans not suspected of    having links to terrorism, before FISA court that oversees    surveillance found the operation unconstitutional in    2011.[162][163][164][165][166]    Under the Corporate Partner Access project, major U.S.    telecommunications providers receive hundreds of millions of    dollars each year from the NSA.[167] Voluntary    cooperation between the NSA and the providers of global    communications took off during the 1970s under the cover name    BLARNEY.[167]  <\/p>\n<p>    A letter drafted by the Obama administration specifically to    inform Congress of the government's mass collection of    Americans' telephone communications data was withheld from    lawmakers by leaders of the House Intelligence Committee in the    months before a key vote affecting the future of the    program.[168][169]  <\/p>\n<p>    The NSA paid GCHQ over 100 Million between 2009 and 2012, in    exchange for these funds GCHQ \"must pull its weight and be seen    to pull its weight.\" Documents referenced in the article    explain that the weaker British laws regarding spying are \"a    selling point\" for the NSA. GCHQ is also developing the    technology to \"exploit any mobile phone at any time.\"[170] The NSA has under a    legal authority a secret backdoor into its databases gathered    from large Internet companies enabling it to search for U.S.    citizens' email and phone calls without a warrant.[171][172]  <\/p>\n<p>    The Privacy and Civil Liberties Oversight Board urged the U.S.    intelligence chiefs to draft stronger US surveillance    guidelines on domestic spying after finding that several of    those guidelines have not been updated up to 30 years.[173][174] U.S.    intelligence analysts have deliberately broken rules designed    to prevent them from spying on Americans by choosing to ignore    so-called \"minimisation procedures\" aimed at protecting    privacy[175][176] and used    the NSA's agency's enormous eavesdropping power to spy on love    interests.[177]  <\/p>\n<p>    After the U.S. Foreign    Secret Intelligence Court ruled in October 2011 that some    of the NSA's activities were unconstitutional, the agency paid    millions of dollars to major internet companies to cover extra    costs incurred in their involvement with the PRISM surveillance    program.[178]  <\/p>\n<p>    \"Mastering the Internet\" (MTI) is    part of the Interception    Modernisation Programme (IMP) of the British government    that involves the insertion of thousands of DPI (deep packet inspection) \"black    boxes\" at various internet service    providers, as revealed by the British media in    2009.[179]  <\/p>\n<p>    In 2013, it was further revealed that the NSA had made a 17.2    million financial contribution to the project, which is    capable of vacuuming signals from up to 200 fibre-optic cables    at all physical points of entry into Great Britain.[180]  <\/p>\n<p>    The Guardian and The New York Times reported on    secret documents leaked by Snowden showing that the NSA has    been in \"collaboration with technology companies\" as part of    \"an aggressive, multipronged effort\" to weaken the encryption used in    commercial software, and GCHQ has a team dedicated to cracking    \"Hotmail, Google, Yahoo and Facebook\" traffic.[181][182][183][184][185][186]  <\/p>\n<p>    Germany's domestic security agency Bundesverfassungsschutz    (BfV) systematically transfers the personal data of German    residents to the NSA, CIA and seven other members of the    United States    Intelligence Community, in exchange for information and    espionage software.[187][188][189] Israel,    Sweden and Italy are also cooperating with American and British    intelligence agencies. Under a secret treaty codenamed    \"Lustre\", French intelligence agencies    transferred millions of metadata records to the NSA.[63][64][190][191]  <\/p>\n<p>    The Obama Administration secretly won permission from the    Foreign Intelligence Surveillance Court in 2011 to reverse    restrictions on the National Security Agency's use of    intercepted phone calls and e-mails, permitting the agency to    search deliberately for Americans' communications in its    massive databases. The searches take place under a surveillance    program Congress authorized in 2008 under Section 702 of the    Foreign Intelligence Surveillance Act. Under that law, the    target must be a foreigner \"reasonably believed\" to be outside    the United States, and the court must approve the targeting    procedures in an order good for one year. But a warrant for    each target would thus no longer be required. That means that    communications with Americans could be picked up without a    court first determining that there is probable cause that the    people they were talking to were terrorists, spies or \"foreign    powers.\" The FISC extended the length of time that the NSA is    allowed to retain intercepted U.S. communications from five    years to six years with an extension possible for foreign    intelligence or counterintelligence purposes. Both measures    were done without public debate or any specific authority from    Congress.[192]  <\/p>\n<p>    A special branch of the NSA called \"Follow the Money\" (FTM)    monitors international payments, banking and credit card    transactions and later stores the collected data in the NSA's    own financial databank \"Tracfin\".[193] The NSA    monitored the communications of Brazil's president Dilma    Rousseff and her top aides.[194] The agency also    spied on Brazil's oil firm Petrobras as well as French diplomats, and    gained access to the private network of the Ministry of Foreign    Affairs of France and the SWIFT    network.[195]  <\/p>\n<p>    In the United States, the NSA uses the analysis of phone call    and e-mail logs of American citizens to create sophisticated    graphs of their social connections that can identify their    associates, their locations at certain times, their traveling    companions and other personal information.[196] The NSA routinely shares raw    intelligence data with Israel without first sifting it to    remove information about U.S. citizens.[7][197]  <\/p>\n<p>    In an effort codenamed GENIE, computer specialists can control    foreign computer networks using \"covert implants,\" a form of    remotely transmitted malware on tens of thousands of devices    annually.[198][199][200][201] As    worldwide sales of smartphones began exceeding those of feature phones,    the NSA decided to take advantage of the smartphone boom. This    is particularly advantageous because the smartphone combines a    myriad of data that    would interest an intelligence agency, such as social contacts,    user behavior, interests, location, photos and credit card    numbers and passwords.[202]  <\/p>\n<p>    An internal NSA report from 2010 stated that the spread of the    smartphone has been occurring \"extremely rapidly\"developments    that \"certainly complicate traditional target    analysis.\"[202] According to the    document, the NSA has set up task forces assigned to several smartphone    manufacturers and operating systems, including Apple Inc.'s iPhone and iOS operating system, as well as    Google's Android mobile operating    system.[202] Similarly,    Britain's GCHQ assigned a team to study and crack the BlackBerry.[202]  <\/p>\n<p>    Under the heading \"iPhone capability\", the document notes that    there are smaller NSA programs, known as \"scripts\", that can    perform surveillance on 38 different features of the iOS 3 and    iOS 4 operating    systems. These include the mapping feature, voicemail and photos, as well as Google Earth,    Facebook and Yahoo! Messenger.[202]  <\/p>\n<p>    On September 9, 2013, an internal NSA presentation on iPhone    Location Services was published by Der Spiegel.    One slide shows scenes from Apple's 1984-themed television    commercial alongside the words \"Who knew in 1984...\";    another shows Steve Jobs holding an iPhone, with the text    \"...that this would be big brother...\"; and a third shows happy    consumers with their iPhones, completing the question with    \"...and the zombies would be paying customers?\"[203]  <\/p>\n<p>    On October 4, 2013, The Washington Post and    The    Guardian jointly reported that the NSA and GCHQ had    made repeated attempts to spy on anonymous Internet users who    have been communicating in secret via the anonymity network    Tor. Several of these    surveillance operations involved the implantation of malicious    code into the computers of Tor users who visit particular    websites. The NSA and GCHQ had partly succeeded in blocking    access to the anonymous network, diverting Tor users to    insecure channels. The government agencies were also able to    uncover the identity of some anonymous Internet users.[204][205][206][207][208][209][210][211][212]  <\/p>\n<p>    The Communications    Security Establishment Canada (CSEC) has been using a    program called Olympia to map the communications of Brazil's    Mines and Energy    Ministry by targeting the metadata of phone calls and    emails to and from the ministry.[213][214]  <\/p>\n<p>    The Australian Federal Government knew about the PRISM    surveillance program months before Edward Snowden made details    public.[215][216]  <\/p>\n<p>    The NSA gathered hundreds of millions of contact lists from    personal e-mail and instant messaging accounts around the    world. The agency did not target individuals. Instead it    collected contact lists in large numbers that amount to a    sizable fraction of the worlds e-mail and instant messaging    accounts. Analysis of that data enables the agency to search    for hidden connections and to map relationships within a much    smaller universe of foreign intelligence targets.[217][218][219][220]  <\/p>\n<p>    The NSA monitored the public email account of former Mexican    president Felipe Caldern (thus gaining access to    the communications of high-ranking cabinet members), the emails    of several high-ranking members of Mexico's security forces and    text and the mobile phone communication of current Mexican    president Enrique Pea Nieto.[221][222] The NSA    tries to gather cellular and landline phone numbersoften    obtained from American diplomatsfor as many foreign officials    as possible. The contents of the phone calls are stored in    computer databases that can regularly be searched using    keywords.[223][224]  <\/p>\n<p>    The NSA has been monitoring telephone conversations of 35 world    leaders.[225] The U.S.    government's first public acknowledgment that it tapped the    phones of world leaders was reported on October 28, 2013, by    the Wall Street Journal after an internal U.S. government    review turned up NSA monitoring of some 35 world    leaders.[226]GCHQ has    tried to keep its mass surveillance program a secret because it    feared a \"damaging public debate\" on the scale of its    activities which could lead to legal challenges against    them.[227]  <\/p>\n<p>    The Guardian revealed that the NSA had been monitoring    telephone conversations of 35 world leaders after being given    the numbers by an official in another U.S. government    department. A confidential memo revealed that the NSA    encouraged senior officials in such Departments as the White House,    State and The Pentagon, to    share their \"Rolodexes\" so the agency could add the telephone    numbers of leading foreign politicians to their surveillance    systems. Reacting to the news, German leader Angela Merkel,    arriving in Brussels for an EU summit, accused the U.S.    of a breach of trust, saying: \"We need to have trust in our    allies and partners, and this must now be established once    again. I repeat that spying among friends is not at all    acceptable against anyone, and that goes for every citizen in    Germany.\"[225] The NSA    collected in 2010 data on ordinary Americans' cellphone    locations, but later discontinued it because it had no    \"operational value.\"[228]  <\/p>\n<p>    Under Britain's MUSCULAR programme, the    NSA and GCHQ have secretly broken into the main communications    links that connect Yahoo and Google data centers around the world and thereby    gained the ability to collect metadata and content at will    from hundreds of millions of user accounts.[229][230][231][232][233]  <\/p>\n<p>    The mobile phone of German Chancellor Angela Merkel    might have been tapped by U.S. intelligence.[234][235][236][237][238][239][240] According to    the Spiegel this monitoring goes back to 2002[241][242][243] and ended in the summer of    2013,[226] while The New    York Times reported that Germany has evidence that the    NSA's surveillance of Merkel began during George W.    Bush's tenure.[244] After    learning from Der Spiegel magazine that the NSA has    been listening in to her personal mobile phone, Merkel compared    the snooping practices of the NSA with those of the Stasi.[245] It    was reported in March 2014, by Der Spiegel that Merkel had also been    placed on an NSA surveillance list alongside 122 other world    leaders.[246]  <\/p>\n<p>    On October 31, 2013, Hans-Christian Strbele, a member    of the German Bundestag, met Snowden in    Moscow and revealed the former intelligence contractor's    readiness to brief the German government on NSA spying.[247]  <\/p>\n<p>    A highly sensitive signals intelligence collection program    known as Stateroom involves    the interception of radio, telecommunications and internet    traffic. It is operated out of the diplomatic missions of the    Five    Eyes (Australia, Britain, Canada, New Zealand, United    States) in numerous locations around the world. The program    conducted at U.S. diplomatic missions is run in concert by the    U.S. intelligence agencies NSA and CIA in a joint venture group    called \"Special Collection Service\"    (SCS), whose members work undercover in shielded areas of the    American Embassies and Consulates, where they are officially    accredited as diplomats and as such enjoy special privileges.    Under diplomatic protection, they are able to look and listen    unhindered. The SCS for example used the American Embassy near    the Brandenburg Gate in Berlin to monitor communications in    Germany's government district with its parliament and the seat    of the government.[240][248][249][250]  <\/p>\n<p>    Under the Stateroom surveillance programme, Australia operates    clandestine surveillance facilities to intercept phone calls    and data across much of Asia.[249][251]  <\/p>\n<p>    In France, the NSA targeted people belonging to the worlds of    business, politics or French state administration. The NSA    monitored and recorded the content of telephone communications    and the history of the connections of each target i.e. the    metadata.[252][253] The actual    surveillance operation was performed by French intelligence    agencies on behalf of the NSA.[63][254] The cooperation    between France and the NSA was confirmed by the Director of the    NSA, Keith B. Alexander, who asserted that    foreign intelligence services collected phone records in \"war    zones\" and \"other areas outside their borders\" and provided    them to the NSA.[255]  <\/p>\n<p>    The French newspaper Le Monde also disclosed new PRISM and Upstream slides    (See Page 4, 7 and 8) coming from the \"PRISM\/US-984XN Overview\"    presentation.[256]  <\/p>\n<p>    In Spain, the NSA intercepted the telephone conversations, text    messages and emails of millions of Spaniards, and spied on    members of the Spanish government.[257] Between    December 10, 2012 and January 8, 2013, the NSA collected    metadata on 60 million telephone calls in Spain.[258]  <\/p>\n<p>    According to documents leaked by Snowden, the surveillance of    Spanish citizens was jointly conducted by the NSA and the    intelligence agencies of Spain.[259][260]  <\/p>\n<p>    The New York Times reported that the NSA carries out an    eavesdropping effort, dubbed Operation Dreadnought, against the    Iranian leader Ayatollah Ali    Khamenei. During his 2009 visit to Iranian    Kurdistan, the agency collaborated with GCHQ and the U.S.'s    National    Geospatial-Intelligence Agency, collecting radio    transmissions between aircraft and airports, examining    Khamenei's convoy with satellite imagery, and enumerating    military radar stations. According to the story, an objective    of the operation is \"communications fingerprinting\": the    ability to distinguish Khamenei's communications from those of    other people in Iran.[261]  <\/p>\n<p>    The same story revealed an operation code-named Ironavenger, in    which the NSA intercepted e-mails sent between a country allied    with the United States and the government of \"an adversary\".    The ally was conducting a spear-phishing attack:    its e-mails contained malware. The NSA gathered documents and login credentials belonging to    the enemy country, along with knowledge of the ally's    capabilities for attacking computers.[261]  <\/p>\n<p>    According to the British newspaper The    Independent, the British intelligence agency GCHQ    maintains a listening post on the roof of the British Embassy in    Berlin that is capable of intercepting mobile phone calls,    wi-fi data and long-distance communications all over the German    capital, including adjacent government buildings such as the    Reichstag (seat of the German    parliament) and the Chancellery (seat of Germany's head of    government) clustered around the Brandenburg    Gate.[262]  <\/p>\n<p>    Operating under the code-name \"Quantum Insert\", GCHQ set up a    fake website masquerading as LinkedIn, a social website used for professional networking, as part of    its efforts to install surveillance software on the computers    of the telecommunications operator Belgacom.[263][264][265] In    addition, the headquarters of the oil cartel OPEC were infiltrated by GCHQ as    well as the NSA, which bugged the computers of nine OPEC    employees and monitored the General Secretary of    OPEC.[263]  <\/p>\n<p>    For more than three years GCHQ has been using an automated    monitoring system code-named \"Royal Concierge\" to infiltrate    the reservation    systems of at least 350 upscale hotels in many different    parts of the world in order to target, search and analyze    reservations to detect diplomats and government    officials.[266] First tested    in 2010, the aim of the \"Royal Concierge\" is to track down the    travel plans of diplomats, and it is often supplemented with    surveillance methods related to human    intelligence (HUMINT). Other covert operations include the    wiretapping of room telephones and fax machines used in    targeted hotels as well as the monitoring of computers hooked    up to the hotel network.[266]  <\/p>\n<p>    In November 2013, the Australian Broadcasting    Corporation and The Guardian revealed that the Australian Signals    Directorate (DSD) had attempted to listen to the private    phone calls of the president of Indonesia and    his wife. The Indonesian foreign minister, Marty    Natalegawa, confirmed that he and the president had    contacted the ambassador in Canberra. Natalegawa said any    tapping of Indonesian politicians' personal phones \"violates    every single decent and legal instrument I can think    ofnational in Indonesia, national in Australia, international    as well\".[267]  <\/p>\n<p>    Other high-ranking Indonesian politicians targeted by the DSD    include:  <\/p>\n<p>    Carrying the title \"3G impact    and update\", a classified presentation leaked by Snowden    revealed the attempts of the ASD\/DSD to keep up to pace with    the rollout of 3G technology in Indonesia and across Southeast    Asia. The ASD\/DSD motto placed at the bottom of each page    reads: \"Reveal their secretsprotect our own.\"[268]  <\/p>\n<p>    Under a secret deal approved by British intelligence officials,    the NSA has been storing and analyzing the internet and email    records of UK citizens since 2007. The NSA also proposed in    2005 a procedure for spying on the citizens of the UK and other    Five-Eyes nations alliance, even where    the partner government has explicitly denied the U.S.    permission to do so. Under the proposal, partner countries must    neither be informed about this particular type of surveillance,    nor the procedure of doing so.[39]  <\/p>\n<p>    Towards the end of November, The New York Times released    an internal NSA report outlining the agency's efforts to expand    its surveillance abilities.[269] The five-page    document asserts that the law of the United States has not    kept up with the needs of the NSA to conduct mass surveillance    in the \"golden age\" of signals intelligence, but    there are grounds for optimism because, in the NSA's own words:  <\/p>\n<p>      \"The culture of compliance, which has allowed the American      people to entrust NSA with extraordinary authorities, will      not be compromised in the face of so many demands, even as we      aggressively pursue legal authorities...\"[270]    <\/p>\n<p>    The report, titled \"SIGINT Strategy 20122016\", also    said that the U.S. will try to influence the \"global commercial    encryption market\" through \"commercial relationships\", and    emphasized the need to \"revolutionize\" the analysis of its vast    data collection to \"radically increase operational    impact\".[269]  <\/p>\n<p>    On November 23, 2013, the Dutch newspaper NRC    Handelsblad reported that the Netherlands was targeted    by U.S. intelligence agencies in the immediate aftermath of    World War    II. This period of surveillance lasted from 1946 to 1968,    and also included the interception of the communications of    other European countries including Belgium, France, West    Germany and Norway.[271] The Dutch    Newspaper also reported that NSA infected more than 50,000    computer networks worldwide, often covertly, with malicious spy    software, sometimes in cooperation with local authorities,    designed to steal sensitive information.[42][272]  <\/p>\n<p>            LARGE            CABLE20 major points of accesses, many of them            located within the United States          <\/p>\n<p>    According to the classified documents leaked by Snowden, the    Australian Signals    Directorate (ASD), formerly known as the Defence Signals    Directorate, had offered to share intelligence information it    had collected with the other intelligence agencies of the    UKUSA    Agreement. Data shared with foreign countries include    \"bulk, unselected, unminimised metadata\" it had collected. The    ASD provided such information on the condition that no    Australian citizens were targeted. At the time the ASD assessed    that \"unintentional collection [of metadata of Australian    nationals] is not viewed as a significant issue\". If a target    was later identified as being an Australian national, the ASD    was required to be contacted to ensure that a warrant could be    sought. Consideration was given as to whether \"medical, legal    or religious information\" would be automatically treated    differently to other types of data, however a decision was made    that each agency would make such determinations on a    case-by-case basis.[273] Leaked material    does not specify where the ASD had collected the intelligence    information from, however Section 7(a) of the Intelligence    Services Act 2001 (Commonwealth) states that the ASD's role is    \"...to obtain intelligence about the capabilities, intentions    or activities of people or organisations outside    Australia...\".[274] As such, it is possible ASD's    metadata intelligence holdings was focused on foreign    intelligence collection and was within the bounds of Australian    law.  <\/p>\n<p>    The Washington Post revealed that    the NSA has been tracking the locations of mobile phones from    all over the world by tapping into the cables that connect    mobile networks globally and that serve U.S. cellphones as well    as foreign ones. In the process of doing so, the NSA collects    more than five billion records of phone locations on a daily    basis. This enables NSA analysts to map cellphone owners'    relationships by correlating their patterns of movement over    time with thousands or millions of other phone users who cross    their paths.[275][276][277][278][279][280][281][282]  <\/p>\n<p>    The Washington Post also reported that both GCHQ and the NSA    make use of location data and advertising tracking files    generated through normal internet browsing (with cookies operated by    Google, known as \"Pref\") to pinpoint targets for government    hacking and to bolster surveillance.[283][284][285]  <\/p>\n<p>    The Norwegian Intelligence    Service (NIS), which cooperates with the NSA, has gained    access to Russian targets in the Kola Peninsula and other civilian    targets. In general, the NIS provides information to the NSA    about \"Politicians\", \"Energy\" and \"Armament\".[286] A top secret memo of    the NSA lists the following years as milestones of the    NorwayUnited States of America SIGINT agreement, or NORUS    Agreement:  <\/p>\n<p>    The NSA considers the NIS to be one of its most reliable    partners. Both agencies also cooperate to crack the encryption    systems of mutual targets. According to the NSA, Norway has    made no objections to its requests from the NIS.[287]  <\/p>\n<p>    On December 5, Sveriges Television reported the    National    Defence Radio Establishment (FRA) has been conducting a    clandestine surveillance operation in Sweden, targeting the    internal politics of Russia. The operation was conducted on    behalf of the NSA, receiving data handed over to it by the    FRA.[288][289] The    Swedish-American surveillance operation also targeted Russian    energy interests as well as the Baltic states.[290] As    part of the UKUSA Agreement, a secret treaty was    signed in 1954 by Sweden with the United States, the United    Kingdom, Canada, Australia and New Zealand, regarding    collaboration and intelligence sharing.[291]  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/en.wikipedia.org\/wiki\/Global_surveillance_disclosures_(2013\u2013present)\" title=\"Global surveillance disclosures (2013present) - Wikipedia\">Global surveillance disclosures (2013present) - Wikipedia<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Ongoing news reports in the international media have revealed operational details about the United States National Security Agency (NSA) and its international partners' global surveillance[1] of foreign nationals and U.S.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/global-surveillance-disclosures-2013present-wikipedia.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-219934","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/219934"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=219934"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/219934\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=219934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=219934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=219934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}