Katana VentraIP

Global surveillance

Global mass surveillance can be defined as the mass surveillance of entire populations across national borders.[1]

Its existence was not widely acknowledged by governments and the mainstream media until the global surveillance disclosures by Edward Snowden triggered a debate about the right to privacy in the Digital Age.[2][3] One such debate is the balance which governments must acknowledge between the pursuit of national security and counter-terrorism over a right to privacy. Although, to quote H. Akın Ünver "Even when conducted for national security and counterterrorism purposes, the scale and detail of mass citizen data collected, leads to rightfully pessimistic observations about individual freedoms and privacy".[4]


Its roots can be traced back to the middle of the 20th century when the UKUSA Agreement was jointly enacted by the United Kingdom and the United States, which later expanded to Canada, Australia, and New Zealand to create the present Five Eyes alliance.[5] The alliance developed cooperation arrangements with several "third-party" nations. Eventually, this resulted in the establishment of a global surveillance network, code-named "ECHELON" (1971).[6][7]

Purposes[edit]

According to the April 2013 summary of documents leaked by Snowden, other than to combat terrorism, these surveillance programs were employed to assess the foreign policy and economic stability of other countries,[26] and to gather "commercial secrets".[27]


In a statement addressed to the National Congress of Brazil in early August 2013, journalist Glenn Greenwald maintained that the U.S. government had used counter-terrorism as a pretext for clandestine surveillance in order to compete with other countries in the "business, industrial and economic fields".[28][29] In a December 2013 letter to the Brazilian government, Snowden wrote that "These programs were never about terrorism: they're about economic spying, social control, and diplomatic manipulation. They're about power."[30] According to a White House panel member, the NSA didn't stop any terrorist attack.[31] However the NSA chief stated that surveillance programs stopped 54 terrorist plots.[32]


In an interview with Der Spiegel published on 12 August 2013, former NSA Director Michael Hayden admitted that "We (the NSA) steal secrets. We're number one in it". Hayden also added: "We steal stuff to make you safe, not to make you rich".[26]


According to documents seen by the news agency Reuters, these "secrets" were subsequently funneled to authorities across the nation to help them launch criminal investigations of Americans.[33] Federal agents are then instructed to "recreate" the investigative trail in order to "cover up" where the information originated.[33]


According to the congressional testimony of Keith B. Alexander, Director of the National Security Agency, one of the purposes of its data collection is to store all the phone records inside a place that can be searched and assessed at all times. When asked by Senator Mark Udall if the goal of the NSA is to collect the phone records of all Americans, Alexander replied, "Yes, I believe it is in the nation's best interest to put all the phone records into a lockbox that we could search when the nation needs to do it."[34]

Targets and methods[edit]

Collection of metadata and other content[edit]

In the United States, the NSA is collecting the phone records of more than 300 million Americans.[35] The international surveillance tool XKeyscore allows government analysts to search through vast databases containing emails, online chats and the browsing histories of millions of individuals.[36][37][38] Britain's global surveillance program Tempora intercepts the fibre-optic cables that form the backbone of the Internet.[39] Under the NSA's PRISM surveillance program, data that has already reached its final destination would be directly harvested from the servers of the following U.S. service providers: Microsoft, Yahoo!, Google, Facebook, Paltalk, AOL, Skype, YouTube, and Apple Inc.[40]

Main targets: China, Russia, Iran, Pakistan and Afghanistan were ranked highly on the NSA's list of spying priorities, followed by France, Germany, Japan, and Brazil. The 's "international trade" and "economic stability" are also of interest.[26] Other high priority targets include Cuba, Israel, and North Korea.[70]

European Union

Irrelevant: From a US intelligence perspective, countries such as Cambodia, Laos and Nepal were largely irrelevant, as were governments of smaller European Union countries such as Finland, Denmark, Croatia and the Czech Republic.

[26]

According to the April 2013 summary of disclosures, the NSA defined its "intelligence priorities" on a scale of "1" (highest interest) to "5" (lowest interest).[26] It classified about 30 countries as "3rd parties", with whom it cooperates but also spies on:


Other prominent targets included members and adherents of the Internet group known as "Anonymous",[26] as well as potential whistleblowers.[71] According to Snowden, the NSA targeted reporters who wrote critically about the government after 9/11.[72]


As part of a joint operation with the Central Intelligence Agency (CIA), the NSA deployed secret eavesdropping posts in eighty U.S. embassies and consulates worldwide.[73] The headquarters of NATO were also used by NSA experts to spy on the European Union.[74]


In 2013, documents provided by Edward Snowden revealed that the following intergovernmental organizations, diplomatic missions, and government ministries have been subjected to surveillance by the "Five Eyes":

– The Australian Signals Directorate of Australia[85]

Australia

– The Government Communications Headquarters of the United Kingdom, which is widely considered to be a leader in traditional spying due to its influence on countries that were once part of the British Empire.[85]

United Kingdom

– The National Security Agency of the United States, which has the biggest budget and the most advanced technical abilities among the "five eyes".[85]

United States

According to Snowden's documents, the United Nations Headquarters and the United Nations General Assembly were targeted by NSA employees disguised as diplomats.[73]

According to Snowden's documents, the United Nations Headquarters and the United Nations General Assembly were targeted by NSA employees disguised as diplomats.[73]

Citing Snowden's documents, The Guardian reported that British officials had set up fake Internet cafes at the 2009 G-20 London summit to spy on the delegates' use of computers, and to install key-logging software on the delegates' phones. This allowed British representatives to gain a "negotiating advantage" at the summit.[168]

Citing Snowden's documents, The Guardian reported that British officials had set up fake Internet cafes at the 2009 G-20 London summit to spy on the delegates' use of computers, and to install key-logging software on the delegates' phones. This allowed British representatives to gain a "negotiating advantage" at the summit.[168]

According to Snowden's interview with the South China Morning Post, the U.S. government has been hacking numerous non-military targets in China for years. Other high-priority targets include academic institutions such as the prestigious Tsinghua University in Beijing.[169]

According to Snowden's interview with the South China Morning Post, the U.S. government has been hacking numerous non-military targets in China for years. Other high-priority targets include academic institutions such as the prestigious Tsinghua University in Beijing.[169]

The Council of the European Union, with its headquarters at the Justus Lipsius building in Brussels, was targeted by NSA employees working near the headquarters of NATO. An NSA document dated September 2010 explicitly names the Europeans as a "location target".[170]

The Council of the European Union, with its headquarters at the Justus Lipsius building in Brussels, was targeted by NSA employees working near the headquarters of NATO. An NSA document dated September 2010 explicitly names the Europeans as a "location target".[170]

The reservations system of Russia's Aeroflot airline was hacked by the NSA.[171]

The reservations system of Russia's Aeroflot airline was hacked by the NSA.[171]

Petrobras, currently the world's leader in offshore deepwater drilling, is a "prominent" target of the U.S. government.[172]

Petrobras, currently the world's leader in offshore deepwater drilling, is a "prominent" target of the U.S. government.[172]

From 2002 to 2013, the German Chancellor Angela Merkel was targeted by the U.S. Special Collection Service.[173]

From 2002 to 2013, the German Chancellor Angela Merkel was targeted by the U.S. Special Collection Service.[173]

Israeli Prime Minister Ehud Olmert (pictured) and Defense Minister Ehud Barak were included in a list of surveillance targets used by the GCHQ and the NSA.[174]

Israeli Prime Minister Ehud Olmert (pictured) and Defense Minister Ehud Barak were included in a list of surveillance targets used by the GCHQ and the NSA.[174]

Joaquín Almunia, who served as the European Commissioner for Competition and the Vice-President of the European Commission, was targeted by Britain's GCHQ agency.[77]

Joaquín Almunia, who served as the European Commissioner for Competition and the Vice-President of the European Commission, was targeted by Britain's GCHQ agency.[77]

Indonesia's President Susilo Bambang Yudhoyono and his wife were placed under surveillance by the Australian Signals Directorate (ASD).[175] During the 2007 United Nations Climate Change Conference in Bali, the ASD cooperated with the NSA to conduct mass surveillance on the Indonesian hosts.[176]

Indonesia's President Susilo Bambang Yudhoyono and his wife were placed under surveillance by the Australian Signals Directorate (ASD).[175] During the 2007 United Nations Climate Change Conference in Bali, the ASD cooperated with the NSA to conduct mass surveillance on the Indonesian hosts.[176]

The video gaming network Xbox Live was placed under surveillance to unravel possible terrorist plots.[177]

The video gaming network Xbox Live was placed under surveillance to unravel possible terrorist plots.[177]

2013 Department of Justice investigations of reporters

Cyber spying

Terrorist Finance Tracking Program

Top Secret America

Archived 5 January 2019 at the Wayback Machine. An annotated and categorized "overview of the revelations following the leaks by the whistleblower Edward Snowden. There are also some links to comments and followups". By Oslo University Library.

"Global Surveillance"

. The Guardian. London. 8 June 2013.

"The NSA Files"

Politico Staff. "." Politico. 13 June 2013.

NSA leaks cause flood of political problems

as provided by The Guardian on 27 June 2013.

NSA inspector general report on email and internet data collection under Stellar Wind

"." Russia Today. 12 June 2013.

Putin talks NSA, Syria, Iran, drones in exclusive RT interview (FULL VIDEO)

and Paul Lewis. "NSA amendment's narrow defeat spurs privacy advocates for surveillance fight." The Guardian. Thursday, 25 July 2013.

Ackerman, Spencer

and Dan Roberts. "US embassy closures used to bolster the case for NSA surveillance programs." The Guardian. Monday 5 August 2013.

Ackerman, Spencer

Two of the 'trips' (numbers 29 and 76) in the 2006 book, 'No Holiday', Cohen, Martin (2006). No Holiday. New York: Disinformation Company Ltd.  978-1-932857-29-0. are investigating the NSA and its activities.

ISBN

Liu, Edward C. Congressional Research Service, 13 April 2016.

Surveillance of Foreigners Outside the United States Under Section 702 of the Foreign Intelligence Surveillance Act (FISA)

MacAskill, Ewen. "." The Guardian. Thursday 25 July 2013.

Justice Department fails in bid to delay landmark case on NSA collection

Rushe, Dominic. "." The Guardian. Tuesday 16 July 2013.

Microsoft pushes Eric Holder to lift block on public information sharing

Perez, Evan. "." (Archive) CNN. 9 August 2013.

Documents shed light on U.S. surveillance programs

Gellman, Barton. "." Washington Post. Thursday 15 August 2013.

NSA broke privacy rules thousands of times per year, audit finds

Roberts, Dan and Robert Booth. "." The Guardian. Sunday 4 August 2013.

NSA defenders: embassy closures followed pre-9/11 levels of 'chatter'

. "The crux of the NSA story in one phrase: 'collect it all'." The Guardian. Monday 15 July 2013.

Greenwald, Glenn

Sanchez, Julian. "." Ars Technica. 9 July 2013.

Five things Snowden leaks revealed about NSA’s original warrantless wiretaps

Forero, Juan. "." Washington Post. 9 July 2013.

Paper reveals NSA ops in Latin America

Jabour, Bridie. "." The Guardian. Friday 12 July 2013.

Telstra signed deal that would have allowed US spying

Naughton, John. "." The Guardian. 28 July 2013.

Edward Snowden's not the story. The fate of the internet is

"" by The Guardian's James Ball on 21 August 2013

Edward Snowden NSA files: secret surveillance and our revelations so far – Leaked National Security Agency documents have led to several hundred Guardian stories on electronic privacy and the state

; among other things the process of accepting, modifying and/or rejecting surveillance measures proposed by the U.S. government, the interaction between the FISA Court and the U.S. government, the appearance of non-governmental parties before the court and the process used by the Court to consider and resolve any instances where the government entities notifies the court of compliance concerns with any of the FISA authorities.

2013-07-29 Letter of FISA Court president Reggie B. Walton to the Chairman of the U.S. Senate Judiciary Committee Patrick J. Leahy about certain operations of the FISA Court

(in Portuguese). 2 September 2013. Retrieved 4 September 2013. Documents relating to the surveillance against Dilma Rousseff and Enrique Peña Nieto

"Veja os documentos ultrassecretos que comprovam espionagem a Dilma"

by The Guardian's Bruce Schneier on 5 September 2013.

NSA surveillance: A guide to staying secure - The NSA has huge capabilities – and if it wants in to your computer, it's in. With that in mind, here are five ways to stay safe