CINXE.COM
Global surveillance - Wikipedia
<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Global surveillance - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"c6b5616e-87f0-4342-a098-562eb8d83621","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Global_surveillance","wgTitle":"Global surveillance","wgCurRevisionId":1260024867,"wgRevisionId":1260024867,"wgArticleId":41227816,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["CS1 Portuguese-language sources (pt)","CS1 maint: multiple names: authors list","CS1 German-language sources (de)","Webarchive template wayback links","CS1 French-language sources (fr)","CS1 Dutch-language sources (nl)","CS1 Norwegian-language sources (no)","CS1 Spanish-language sources (es)","CS1 Swedish-language sources (sv)","Articles with short description","Short description is different from Wikidata","Use dmy dates from July 2019", "All articles with unsourced statements","Articles with unsourced statements from October 2023","Articles containing potentially dated statements from 2007","All articles containing potentially dated statements","Wikipedia external links cleanup from August 2022","Commons category link is on Wikidata","Articles containing video clips","Global surveillance","GCHQ","National Security Agency","Mass surveillance","2013 controversies","Edward Snowden","Espionage","Intelligence operations","National security"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Global_surveillance","wgRelevantArticleId":41227816,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0, "wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":100000,"wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":false,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q15653954","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options": "loading","ext.cite.styles":"ready","mediawiki.page.gallery.styles":"ready","ext.tmh.player.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["ext.cite.ux-enhancements","mediawiki.page.media","ext.tmh.player","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface", "ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.quicksurveys.init","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&modules=ext.cite.styles%7Cext.tmh.player.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cmediawiki.page.gallery.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&only=styles&skin=vector-2022"> <script async="" src="/w/load.php?lang=en&modules=startup&only=scripts&raw=1&skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&modules=site.styles&only=styles&skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.5"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/0/08/Globe_eye_icon.png"> <meta property="og:image:width" content="1200"> <meta property="og:image:height" content="480"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/0/08/Globe_eye_icon.png/800px-Globe_eye_icon.png"> <meta property="og:image:width" content="800"> <meta property="og:image:height" content="320"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/0/08/Globe_eye_icon.png/640px-Globe_eye_icon.png"> <meta property="og:image:width" content="640"> <meta property="og:image:height" content="256"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Global surveillance - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Global_surveillance"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Global_surveillance&action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Global_surveillance"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Global_surveillance rootpage-Global_surveillance skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page's font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&returnto=Global+surveillance" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&returnto=Global+surveillance" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&returnto=Global+surveillance" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&returnto=Global+surveillance" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-Historical_background" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Historical_background"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>Historical background</span> </div> </a> <ul id="toc-Historical_background-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Snowden's_disclosures" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Snowden's_disclosures"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Snowden's disclosures</span> </div> </a> <button aria-controls="toc-Snowden's_disclosures-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Snowden's disclosures subsection</span> </button> <ul id="toc-Snowden's_disclosures-sublist" class="vector-toc-list"> <li id="toc-By_category" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#By_category"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.1</span> <span>By category</span> </div> </a> <ul id="toc-By_category-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Purposes" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Purposes"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Purposes</span> </div> </a> <ul id="toc-Purposes-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Targets_and_methods" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Targets_and_methods"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Targets and methods</span> </div> </a> <button aria-controls="toc-Targets_and_methods-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Targets and methods subsection</span> </button> <ul id="toc-Targets_and_methods-sublist" class="vector-toc-list"> <li id="toc-Collection_of_metadata_and_other_content" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Collection_of_metadata_and_other_content"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1</span> <span>Collection of metadata and other content</span> </div> </a> <ul id="toc-Collection_of_metadata_and_other_content-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Contact_chaining" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Contact_chaining"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2</span> <span>Contact chaining</span> </div> </a> <ul id="toc-Contact_chaining-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Data_transfer" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Data_transfer"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.3</span> <span>Data transfer</span> </div> </a> <ul id="toc-Data_transfer-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Financial_payments_monitoring" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Financial_payments_monitoring"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.4</span> <span>Financial payments monitoring</span> </div> </a> <ul id="toc-Financial_payments_monitoring-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Mobile_phone_location_tracking" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Mobile_phone_location_tracking"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.5</span> <span>Mobile phone location tracking</span> </div> </a> <ul id="toc-Mobile_phone_location_tracking-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Infiltration_of_smartphones" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Infiltration_of_smartphones"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.6</span> <span>Infiltration of smartphones</span> </div> </a> <ul id="toc-Infiltration_of_smartphones-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Infiltration_of_commercial_data_centers" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Infiltration_of_commercial_data_centers"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.7</span> <span>Infiltration of commercial data centers</span> </div> </a> <ul id="toc-Infiltration_of_commercial_data_centers-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Infiltration_of_anonymous_networks" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Infiltration_of_anonymous_networks"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.8</span> <span>Infiltration of anonymous networks</span> </div> </a> <ul id="toc-Infiltration_of_anonymous_networks-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Monitoring_of_hotel_reservation_systems" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Monitoring_of_hotel_reservation_systems"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.9</span> <span>Monitoring of hotel reservation systems</span> </div> </a> <ul id="toc-Monitoring_of_hotel_reservation_systems-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Virtual_reality_surveillance" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Virtual_reality_surveillance"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.10</span> <span>Virtual reality surveillance</span> </div> </a> <ul id="toc-Virtual_reality_surveillance-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Political_Espionage" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Political_Espionage"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>Political Espionage</span> </div> </a> <ul id="toc-Political_Espionage-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-International_Cooperation" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#International_Cooperation"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>International Cooperation</span> </div> </a> <button aria-controls="toc-International_Cooperation-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle International Cooperation subsection</span> </button> <ul id="toc-International_Cooperation-sublist" class="vector-toc-list"> <li id="toc-Australia" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Australia"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.1</span> <span>Australia</span> </div> </a> <ul id="toc-Australia-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Canada" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Canada"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.2</span> <span>Canada</span> </div> </a> <ul id="toc-Canada-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Denmark" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Denmark"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.3</span> <span>Denmark</span> </div> </a> <ul id="toc-Denmark-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-France" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#France"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.4</span> <span>France</span> </div> </a> <ul id="toc-France-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Germany" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Germany"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.5</span> <span>Germany</span> </div> </a> <ul id="toc-Germany-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Israel" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Israel"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.6</span> <span>Israel</span> </div> </a> <ul id="toc-Israel-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Japan" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Japan"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.7</span> <span>Japan</span> </div> </a> <ul id="toc-Japan-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Libya" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Libya"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.8</span> <span>Libya</span> </div> </a> <ul id="toc-Libya-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Netherlands" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Netherlands"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.9</span> <span>Netherlands</span> </div> </a> <ul id="toc-Netherlands-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Norway" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Norway"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.10</span> <span>Norway</span> </div> </a> <ul id="toc-Norway-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Singapore" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Singapore"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.11</span> <span>Singapore</span> </div> </a> <ul id="toc-Singapore-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Spain" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Spain"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.12</span> <span>Spain</span> </div> </a> <ul id="toc-Spain-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Sweden" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Sweden"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.13</span> <span>Sweden</span> </div> </a> <ul id="toc-Sweden-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Switzerland" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Switzerland"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.14</span> <span>Switzerland</span> </div> </a> <ul id="toc-Switzerland-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-United_Kingdom" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#United_Kingdom"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.15</span> <span>United Kingdom</span> </div> </a> <ul id="toc-United_Kingdom-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-United_States" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#United_States"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.16</span> <span>United States</span> </div> </a> <ul id="toc-United_States-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Commercial_cooperation" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Commercial_cooperation"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>Commercial cooperation</span> </div> </a> <button aria-controls="toc-Commercial_cooperation-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Commercial cooperation subsection</span> </button> <ul id="toc-Commercial_cooperation-sublist" class="vector-toc-list"> <li id="toc-AT&T" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#AT&T"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.1</span> <span>AT&T</span> </div> </a> <ul id="toc-AT&T-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Booz_Allen_Hamilton" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Booz_Allen_Hamilton"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.2</span> <span>Booz Allen Hamilton</span> </div> </a> <ul id="toc-Booz_Allen_Hamilton-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-British_Telecommunications" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#British_Telecommunications"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.3</span> <span>British Telecommunications</span> </div> </a> <ul id="toc-British_Telecommunications-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Microsoft" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Microsoft"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.4</span> <span>Microsoft</span> </div> </a> <ul id="toc-Microsoft-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Orange_S.A." class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Orange_S.A."> <div class="vector-toc-text"> <span class="vector-toc-numb">7.5</span> <span>Orange S.A.</span> </div> </a> <ul id="toc-Orange_S.A.-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-RSA_Security" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#RSA_Security"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.6</span> <span>RSA Security</span> </div> </a> <ul id="toc-RSA_Security-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Stratfor" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Stratfor"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.7</span> <span>Stratfor</span> </div> </a> <ul id="toc-Stratfor-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Vodafone" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Vodafone"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.8</span> <span>Vodafone</span> </div> </a> <ul id="toc-Vodafone-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-In-Q-Tel" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#In-Q-Tel"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.9</span> <span>In-Q-Tel</span> </div> </a> <ul id="toc-In-Q-Tel-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Palantir_Technologies" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Palantir_Technologies"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.10</span> <span>Palantir Technologies</span> </div> </a> <ul id="toc-Palantir_Technologies-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Surveillance_evasion" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Surveillance_evasion"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>Surveillance evasion</span> </div> </a> <button aria-controls="toc-Surveillance_evasion-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Surveillance evasion subsection</span> </button> <ul id="toc-Surveillance_evasion-sublist" class="vector-toc-list"> <li id="toc-North_Korea" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#North_Korea"> <div class="vector-toc-text"> <span class="vector-toc-numb">8.1</span> <span>North Korea</span> </div> </a> <ul id="toc-North_Korea-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Iran" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Iran"> <div class="vector-toc-text"> <span class="vector-toc-numb">8.2</span> <span>Iran</span> </div> </a> <ul id="toc-Iran-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Libya_2" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Libya_2"> <div class="vector-toc-text"> <span class="vector-toc-numb">8.3</span> <span>Libya</span> </div> </a> <ul id="toc-Libya_2-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Impact" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Impact"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>Impact</span> </div> </a> <ul id="toc-Impact-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Gallery" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Gallery"> <div class="vector-toc-text"> <span class="vector-toc-numb">10</span> <span>Gallery</span> </div> </a> <ul id="toc-Gallery-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">11</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">12</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Further_reading" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Further_reading"> <div class="vector-toc-text"> <span class="vector-toc-numb">13</span> <span>Further reading</span> </div> </a> <ul id="toc-Further_reading-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Global surveillance</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 12 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-12" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">12 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D9%85%D8%B1%D8%A7%D9%82%D8%A8%D8%A9_%D8%B9%D8%A7%D9%84%D9%85%D9%8A%D8%A9" title="مراقبة عالمية – Arabic" lang="ar" hreflang="ar" data-title="مراقبة عالمية" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/Vigil%C3%A0ncia_global" title="Vigilància global – Catalan" lang="ca" hreflang="ca" data-title="Vigilància global" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-el mw-list-item"><a href="https://el.wikipedia.org/wiki/%CE%A0%CE%B1%CE%B3%CE%BA%CF%8C%CF%83%CE%BC%CE%B9%CE%B1_%CE%B5%CF%80%CE%B9%CF%84%CE%AE%CF%81%CE%B7%CF%83%CE%B7" title="Παγκόσμια επιτήρηση – Greek" lang="el" hreflang="el" data-title="Παγκόσμια επιτήρηση" data-language-autonym="Ελληνικά" data-language-local-name="Greek" class="interlanguage-link-target"><span>Ελληνικά</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D9%86%D8%B8%D8%A7%D8%B1%D8%AA_%D8%AC%D9%87%D8%A7%D9%86%DB%8C" title="نظارت جهانی – Persian" lang="fa" hreflang="fa" data-title="نظارت جهانی" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/Surveillance_globale" title="Surveillance globale – French" lang="fr" hreflang="fr" data-title="Surveillance globale" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%EC%84%B8%EA%B3%84%EC%A0%81_%EA%B0%90%EC%8B%9C%EB%A7%9D" title="세계적 감시망 – Korean" lang="ko" hreflang="ko" data-title="세계적 감시망" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/%E5%9B%BD%E9%9A%9B%E7%9A%84%E7%9B%A3%E8%A6%96%E7%B6%B2" title="国際的監視網 – Japanese" lang="ja" hreflang="ja" data-title="国際的監視網" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-oc mw-list-item"><a href="https://oc.wikipedia.org/wiki/Susvelhan%C3%A7a_globala" title="Susvelhança globala – Occitan" lang="oc" hreflang="oc" data-title="Susvelhança globala" data-language-autonym="Occitan" data-language-local-name="Occitan" class="interlanguage-link-target"><span>Occitan</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Vigil%C3%A2ncia_global" title="Vigilância global – Portuguese" lang="pt" hreflang="pt" data-title="Vigilância global" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/Maailmanlaajuinen_joukkovalvonta" title="Maailmanlaajuinen joukkovalvonta – Finnish" lang="fi" hreflang="fi" data-title="Maailmanlaajuinen joukkovalvonta" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/K%C3%BCresel_g%C3%B6zetleme" title="Küresel gözetleme – Turkish" lang="tr" hreflang="tr" data-title="Küresel gözetleme" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E5%85%A8%E7%90%83%E7%9B%A3%E6%8E%A7" title="全球監控 – Chinese" lang="zh" hreflang="zh" data-title="全球監控" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q15653954#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Global_surveillance" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Global_surveillance" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Global_surveillance"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Global_surveillance&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Global_surveillance&action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Global_surveillance"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Global_surveillance&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Global_surveillance&action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Global_surveillance" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Global_surveillance" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Global_surveillance&oldid=1260024867" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Global_surveillance&action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&page=Global_surveillance&id=1260024867&wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FGlobal_surveillance"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FGlobal_surveillance"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&page=Global_surveillance&action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Global_surveillance&printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="wb-otherproject-link wb-otherproject-commons mw-list-item"><a href="https://commons.wikimedia.org/wiki/Category:2013_Mass_Surveillance_Disclosures" hreflang="en"><span>Wikimedia Commons</span></a></li><li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q15653954" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Mass surveillance across national borders</div> <p class="mw-empty-elt"> </p> <style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1126788409">.mw-parser-output .plainlist ol,.mw-parser-output .plainlist ul{line-height:inherit;list-style:none;margin:0;padding:0}.mw-parser-output .plainlist ol li,.mw-parser-output .plainlist ul li{margin-bottom:0}</style><style data-mw-deduplicate="TemplateStyles:r1246091330">.mw-parser-output .sidebar{width:22em;float:right;clear:right;margin:0.5em 0 1em 1em;background:var(--background-color-neutral-subtle,#f8f9fa);border:1px solid var(--border-color-base,#a2a9b1);padding:0.2em;text-align:center;line-height:1.4em;font-size:88%;border-collapse:collapse;display:table}body.skin-minerva .mw-parser-output .sidebar{display:table!important;float:right!important;margin:0.5em 0 1em 1em!important}.mw-parser-output .sidebar-subgroup{width:100%;margin:0;border-spacing:0}.mw-parser-output .sidebar-left{float:left;clear:left;margin:0.5em 1em 1em 0}.mw-parser-output .sidebar-none{float:none;clear:both;margin:0.5em 1em 1em 0}.mw-parser-output .sidebar-outer-title{padding:0 0.4em 0.2em;font-size:125%;line-height:1.2em;font-weight:bold}.mw-parser-output .sidebar-top-image{padding:0.4em}.mw-parser-output .sidebar-top-caption,.mw-parser-output .sidebar-pretitle-with-top-image,.mw-parser-output .sidebar-caption{padding:0.2em 0.4em 0;line-height:1.2em}.mw-parser-output .sidebar-pretitle{padding:0.4em 0.4em 0;line-height:1.2em}.mw-parser-output .sidebar-title,.mw-parser-output .sidebar-title-with-pretitle{padding:0.2em 0.8em;font-size:145%;line-height:1.2em}.mw-parser-output .sidebar-title-with-pretitle{padding:0.1em 0.4em}.mw-parser-output .sidebar-image{padding:0.2em 0.4em 0.4em}.mw-parser-output .sidebar-heading{padding:0.1em 0.4em}.mw-parser-output .sidebar-content{padding:0 0.5em 0.4em}.mw-parser-output .sidebar-content-with-subgroup{padding:0.1em 0.4em 0.2em}.mw-parser-output .sidebar-above,.mw-parser-output .sidebar-below{padding:0.3em 0.8em;font-weight:bold}.mw-parser-output .sidebar-collapse .sidebar-above,.mw-parser-output .sidebar-collapse .sidebar-below{border-top:1px solid #aaa;border-bottom:1px solid #aaa}.mw-parser-output .sidebar-navbar{text-align:right;font-size:115%;padding:0 0.4em 0.4em}.mw-parser-output .sidebar-list-title{padding:0 0.4em;text-align:left;font-weight:bold;line-height:1.6em;font-size:105%}.mw-parser-output .sidebar-list-title-c{padding:0 0.4em;text-align:center;margin:0 3.3em}@media(max-width:640px){body.mediawiki .mw-parser-output .sidebar{width:100%!important;clear:both;float:none!important;margin-left:0!important;margin-right:0!important}}body.skin--responsive .mw-parser-output .sidebar a>img{max-width:none!important}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-list-title,html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle{background:transparent!important}html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle a{color:var(--color-progressive)!important}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-list-title,html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle{background:transparent!important}html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle a{color:var(--color-progressive)!important}}@media print{body.ns-0 .mw-parser-output .sidebar{display:none!important}}</style><table class="sidebar sidebar-collapse nomobile nowraplinks hlist" style="border:1px solid #B2BEB"><tbody><tr><td class="sidebar-pretitle" style="background:#B2BEB5">Part of <a href="/wiki/Category:Global_surveillance" title="Category:Global surveillance">a series</a> on</td></tr><tr><th class="sidebar-title-with-pretitle" style="background:#B2BEB5;font-weight:normal;padding-bottom:0.15em;"><b><a class="mw-selflink selflink">Global surveillance</a></b></th></tr><tr><td class="sidebar-image"><span typeof="mw:File"><a href="/wiki/File:Globe_eye_icon.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/0/08/Globe_eye_icon.png/150px-Globe_eye_icon.png" decoding="async" width="150" height="60" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/08/Globe_eye_icon.png/225px-Globe_eye_icon.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/0/08/Globe_eye_icon.png/300px-Globe_eye_icon.png 2x" data-file-width="1024" data-file-height="410" /></a></span></td></tr><tr><th class="sidebar-heading" style="background:#B2BEB5"> Disclosures</th></tr><tr><td class="sidebar-content"> <ul><li><a href="/wiki/Origins_of_global_surveillance" title="Origins of global surveillance">Origins</a></li> <li><a href="/wiki/Global_surveillance_disclosures_(1970%E2%80%932013)" title="Global surveillance disclosures (1970–2013)">Pre-2013</a></li> <li><a href="/wiki/2010s_global_surveillance_disclosures" title="2010s global surveillance disclosures">2013–present</a></li> <li><a href="/wiki/Reactions_to_global_surveillance_disclosures" title="Reactions to global surveillance disclosures">Reactions</a></li></ul></td> </tr><tr><th class="sidebar-heading" style="background:#B2BEB5"> Systems</th></tr><tr><td class="sidebar-content"> <ul><li><a href="/wiki/XKeyscore" title="XKeyscore">XKeyscore</a></li> <li><a href="/wiki/PRISM" title="PRISM">PRISM</a></li> <li><a href="/wiki/ECHELON" title="ECHELON">ECHELON</a></li> <li><a href="/wiki/Sentient_(intelligence_analysis_system)" title="Sentient (intelligence analysis system)">Sentient</a></li> <li><a href="/wiki/Carnivore_(software)" title="Carnivore (software)">Carnivore</a></li> <li><a href="/wiki/Dishfire" title="Dishfire">Dishfire</a></li> <li><a href="/wiki/Stone_Ghost" title="Stone Ghost">Stone Ghost</a></li> <li><a href="/wiki/Tempora" title="Tempora">Tempora</a></li> <li><a href="/wiki/Frenchelon" title="Frenchelon">Frenchelon</a></li> <li><a href="/wiki/Fairview_(surveillance_program)" title="Fairview (surveillance program)">Fairview</a></li> <li><a href="/wiki/MYSTIC_(surveillance_program)" class="mw-redirect" title="MYSTIC (surveillance program)">MYSTIC</a></li> <li><a href="/wiki/Digital_Collection_System_Network" title="Digital Collection System Network">DCSN</a></li> <li><a href="/wiki/Boundless_Informant" title="Boundless Informant">Boundless Informant</a></li> <li><a href="/wiki/Bullrun_(decryption_program)" title="Bullrun (decryption program)">Bullrun</a></li> <li><a href="/wiki/Pinwale" title="Pinwale">Pinwale</a></li> <li><a href="/wiki/Stingray_phone_tracker" title="Stingray phone tracker">Stingray</a></li> <li><a href="/wiki/SORM" title="SORM">SORM</a></li> <li><a href="/wiki/RAMPART-A" title="RAMPART-A">RAMPART-A</a></li> <li><a href="/wiki/Mastering_the_Internet" title="Mastering the Internet">Mastering the Internet</a></li> <li><a href="/wiki/Jindalee_Operational_Radar_Network" title="Jindalee Operational Radar Network">Jindalee Operational Radar Network</a></li></ul></td> </tr><tr><th class="sidebar-heading" style="background:#B2BEB5"> Selected agencies</th></tr><tr><td class="sidebar-content"> <ul><li><a href="/wiki/Five_Eyes" title="Five Eyes">FVEY</a> <ul><li><a href="/wiki/Australian_Signals_Directorate" title="Australian Signals Directorate">ASD</a></li> <li><a href="/wiki/Communications_Security_Establishment" title="Communications Security Establishment">CSE</a></li> <li><a href="/wiki/Government_Communications_Security_Bureau" title="Government Communications Security Bureau">GCSB</a></li> <li><a href="/wiki/GCHQ" title="GCHQ">GCHQ</a></li> <li><a href="/wiki/National_Security_Agency" title="National Security Agency">NSA</a></li></ul></li> <li><a href="/wiki/Federal_Intelligence_Service" title="Federal Intelligence Service">BND</a></li> <li><a href="/wiki/National_Cyber_and_Crypto_Agency" title="National Cyber and Crypto Agency">BSSN</a></li> <li><a href="/wiki/National_Intelligence_Centre_(Spain)" title="National Intelligence Centre (Spain)">CNI</a></li> <li><a href="/wiki/Defense_Intelligence_Headquarters" title="Defense Intelligence Headquarters">DIH</a></li> <li><a href="/wiki/Directorate-General_for_External_Security" title="Directorate-General for External Security">DGSE</a></li> <li><a href="/wiki/KGB" title="KGB">KGB</a></li> <li><a href="/wiki/Ministry_of_State_Security_(China)" title="Ministry of State Security (China)">MSS</a></li> <li><a href="/wiki/Joint_Sigint_Cyber_Unit" title="Joint Sigint Cyber Unit">JSCU</a></li> <li><a href="/wiki/Special_Communications_Service_of_Russia" title="Special Communications Service of Russia">Spetssvyaz</a></li> <li><a href="/wiki/Unit_8200" title="Unit 8200">Unit 8200</a></li></ul></td> </tr><tr><th class="sidebar-heading" style="background:#B2BEB5"> Places</th></tr><tr><td class="sidebar-content"> <ul><li><a href="/wiki/The_Doughnut" title="The Doughnut">The Doughnut</a></li> <li><a href="/wiki/Fort_Meade" title="Fort Meade">Fort Meade</a></li> <li><a href="/wiki/RAF_Menwith_Hill" title="RAF Menwith Hill">Menwith Hill</a></li> <li><a href="/wiki/Pine_Gap" title="Pine Gap">Pine Gap</a></li> <li><a href="/wiki/Southern_Cross_Cable#Spying_and_interception" title="Southern Cross Cable">Southern Cross Cable</a></li> <li><a href="/wiki/Utah_Data_Center" title="Utah Data Center">Utah Data Center</a></li> <li><a href="/wiki/Bad_Aibling_Station" title="Bad Aibling Station">Bad Aibling Station</a></li> <li><a href="/wiki/Dagger_Complex" title="Dagger Complex">Dagger Complex</a></li> <li><a href="/wiki/GCHQ_Bude" title="GCHQ Bude">GCHQ Bude</a></li></ul></td> </tr><tr><th class="sidebar-heading" style="background:#B2BEB5"> Laws</th></tr><tr><td class="sidebar-content"> <ul><li>Five Eyes <ul><li><a href="/wiki/UKUSA_Agreement" title="UKUSA Agreement">UKUSA Agreement</a></li> <li><a href="/wiki/Lustre_(treaty)" title="Lustre (treaty)">Lustre</a></li></ul></li> <li>U.S. <ul><li><a href="/wiki/USA_Freedom_Act" title="USA Freedom Act">USA Freedom Act</a></li> <li><a href="/wiki/Foreign_Intelligence_Surveillance_Act_of_1978_Amendments_Act_of_2008" class="mw-redirect" title="Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008">FISA amendments</a></li></ul></li> <li>EU <ul><li><a href="/wiki/Data_Retention_Directive" title="Data Retention Directive">Data Retention Directive</a></li> <li><a href="/wiki/Data_Protection_Directive" title="Data Protection Directive">Data Protection Directive</a></li> <li><a href="/wiki/General_Data_Protection_Regulation" title="General Data Protection Regulation">GDPR</a></li></ul></li> <li>China <ul><li><a href="/wiki/National_Intelligence_Law" class="mw-redirect" title="National Intelligence Law">National Intelligence Law</a></li> <li><a href="/wiki/Cybersecurity_Law_of_the_People%27s_Republic_of_China" title="Cybersecurity Law of the People's Republic of China">Cybersecurity Law</a></li></ul></li> <li>UK <ul><li><a href="/wiki/Investigatory_Powers_Act_2016" title="Investigatory Powers Act 2016">Investigatory Powers Act 2016</a></li></ul></li></ul></td> </tr><tr><th class="sidebar-heading" style="background:#B2BEB5"> Proposed changes</th></tr><tr><td class="sidebar-content"> <ul><li>U.S. <ul><li><a href="/wiki/FISA_Improvements_Act" title="FISA Improvements Act">FISA Improvements Act</a></li> <li><a href="/wiki/Proposed_reforms_of_mass_surveillance_by_the_United_States" title="Proposed reforms of mass surveillance by the United States">Other proposals</a></li></ul></li></ul></td> </tr><tr><th class="sidebar-heading" style="background:#B2BEB5"> Concepts</th></tr><tr><td class="sidebar-content"> <ul><li><a href="/wiki/Mass_surveillance" title="Mass surveillance">Mass surveillance</a></li> <li><a href="/wiki/Culture_of_fear" title="Culture of fear">Culture of fear</a></li> <li><a href="/wiki/Secure_communication" title="Secure communication">Secure communication</a></li> <li><a href="/wiki/Signals_intelligence" title="Signals intelligence">SIGINT</a></li> <li><a href="/wiki/Call_detail_record" title="Call detail record">Call detail record</a></li> <li><a href="/wiki/Surveillance_issues_in_smart_cities" title="Surveillance issues in smart cities">Surveillance issues in smart cities</a></li></ul></td> </tr><tr><th class="sidebar-heading" style="background:#B2BEB5"> Related topics</th></tr><tr><td class="sidebar-content"> <ul><li><a href="/wiki/Espionage" title="Espionage">Espionage</a></li> <li><a href="/wiki/Intelligence_agency" title="Intelligence agency">Intelligence agency</a></li> <li><a href="/wiki/Cryptography" title="Cryptography">Cryptography</a> <ul><li><a href="/wiki/Tor_(network)" title="Tor (network)">Tor</a></li> <li><a href="/wiki/Virtual_private_network" title="Virtual private network">VPNs</a></li> <li><a href="/wiki/Transport_Layer_Security" title="Transport Layer Security">TLS</a></li></ul></li> <li><a href="/wiki/Human_rights" title="Human rights">Human rights</a> <ul><li><a href="/wiki/Right_to_privacy" title="Right to privacy">Privacy</a></li> <li><a href="/wiki/Civil_liberties" title="Civil liberties">Liberty</a></li></ul></li> <li><a href="/wiki/Reconnaissance_satellite" title="Reconnaissance satellite">Satellites</a></li> <li><a href="/wiki/Stop_Watching_Us" title="Stop Watching Us">Stop Watching Us</a></li> <li><a href="/wiki/Nothing_to_hide_argument" title="Nothing to hide argument">Nothing to hide argument</a></li></ul></td> </tr><tr><td class="sidebar-navbar"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Global_surveillance" title="Template:Global surveillance"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Global_surveillance" title="Template talk:Global surveillance"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Global_surveillance" title="Special:EditPage/Template:Global surveillance"><abbr title="Edit this template">e</abbr></a></li></ul></div></td></tr></tbody></table> <p><b>Global mass surveillance</b> can be defined as the <a href="/wiki/Mass_surveillance" title="Mass surveillance">mass surveillance</a> of entire populations across national borders.<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup> </p><p>Its existence was not widely acknowledged by governments and the mainstream media until the <a href="/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)" class="mw-redirect" title="Global surveillance disclosures (2013–present)">global surveillance disclosures</a> by <a href="/wiki/Edward_Snowden" title="Edward Snowden">Edward Snowden</a> triggered a debate about the <a href="/wiki/Right_to_privacy" title="Right to privacy">right to privacy</a> in the <a href="/wiki/Digital_Age" class="mw-redirect" title="Digital Age">Digital Age</a>.<sup id="cite_ref-2" class="reference"><a href="#cite_note-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-RangerSteve1_3-0" class="reference"><a href="#cite_note-RangerSteve1-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup> One such debate is the balance which governments must acknowledge between the pursuit of national security and counter-terrorism over a right to privacy. Although, to quote H. Akın Ünver "Even when conducted for national security and counterterrorism purposes, the scale and detail of mass citizen data collected, leads to rightfully pessimistic observations about individual freedoms and privacy".<sup id="cite_ref-4" class="reference"><a href="#cite_note-4"><span class="cite-bracket">[</span>4<span class="cite-bracket">]</span></a></sup> </p><p>Its roots can be traced back to the middle of the 20th century when the <a href="/wiki/UKUSA_Agreement" title="UKUSA Agreement">UKUSA Agreement</a> was jointly enacted by the United Kingdom and the United States, which later expanded to Canada, Australia, and New Zealand to create the present <a href="/wiki/Five_Eyes" title="Five Eyes">Five Eyes</a> alliance.<sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">[</span>5<span class="cite-bracket">]</span></a></sup> The alliance developed cooperation arrangements with several "third-party" nations. Eventually, this resulted in the establishment of a global surveillance network, code-named "<a href="/wiki/ECHELON" title="ECHELON">ECHELON</a>" (1971).<sup id="cite_ref-auto_6-0" class="reference"><a href="#cite_note-auto-6"><span class="cite-bracket">[</span>6<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-Nabbali_2004_84–97_7-0" class="reference"><a href="#cite_note-Nabbali_2004_84–97-7"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup> </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="Historical_background">Historical background</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=1" title="Edit section: Historical background"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Origins_of_global_surveillance" title="Origins of global surveillance">Origins of global surveillance</a></div> <p>The <a href="/wiki/Origins_of_global_surveillance" title="Origins of global surveillance">origins of global surveillance</a> can be traced back to the late 1940s after the <a href="/wiki/UKUSA_Agreement" title="UKUSA Agreement">UKUSA Agreement</a> was collaboratively enacted by the United Kingdom and the United States, which eventually culminated in the creation of the global surveillance network code-named "<b><a href="/wiki/ECHELON" title="ECHELON">ECHELON</a></b>" in 1971.<sup id="cite_ref-auto_6-1" class="reference"><a href="#cite_note-auto-6"><span class="cite-bracket">[</span>6<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-Nabbali_2004_84–97_7-1" class="reference"><a href="#cite_note-Nabbali_2004_84–97-7"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup> </p><p>In the aftermath of the <a href="/wiki/Watergate_scandal" title="Watergate scandal">1970s Watergate affair</a> and a subsequent <a href="/wiki/Congressional_inquiry" class="mw-redirect" title="Congressional inquiry">congressional inquiry</a> led by Sen. <a href="/wiki/Frank_Church" title="Frank Church">Frank Church</a>,<sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">[</span>8<span class="cite-bracket">]</span></a></sup> it was revealed that the <a href="/wiki/National_Security_Agency" title="National Security Agency">NSA</a>, in collaboration with Britain's GCHQ, had routinely intercepted the international communications of prominent anti-<a href="/wiki/Vietnam_War" title="Vietnam War">Vietnam War</a> leaders such as <a href="/wiki/Jane_Fonda" title="Jane Fonda">Jane Fonda</a> and Dr. <a href="/wiki/Benjamin_Spock" title="Benjamin Spock">Benjamin Spock</a>.<sup id="cite_ref-9" class="reference"><a href="#cite_note-9"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup> Decades later, a multi-year investigation by the <a href="/wiki/European_Parliament" title="European Parliament">European Parliament</a> highlighted the NSA's role in <a href="/wiki/Industrial_espionage" title="Industrial espionage">economic espionage</a> in a report entitled 'Development of Surveillance Technology and Risk of Abuse of Economic Information', in 1999.<sup id="cite_ref-10" class="reference"><a href="#cite_note-10"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup> </p><p>However, for the general public, it was a series of detailed disclosures of internal NSA documents in June 2013 that first revealed the massive extent of the NSA's spying, both foreign and domestic. Most of these were leaked by an ex-contractor, <a href="/wiki/Edward_Snowden" title="Edward Snowden">Edward Snowden</a>. Even so, a number of these older global surveillance programs such as <a href="/wiki/PRISM_(surveillance_program)" class="mw-redirect" title="PRISM (surveillance program)">PRISM</a>, <a href="/wiki/XKeyscore" title="XKeyscore">XKeyscore</a>, and <a href="/wiki/Tempora" title="Tempora">Tempora</a> were referenced in the 2013 release of thousands of documents.<sup id="cite_ref-11" class="reference"><a href="#cite_note-11"><span class="cite-bracket">[</span>11<span class="cite-bracket">]</span></a></sup> Many countries around the world, including <a href="/wiki/Western_Bloc" title="Western Bloc">Western Allies</a> and member states of <a href="/wiki/NATO" title="NATO">NATO</a>, have been targeted by the "<a href="/wiki/UKUSA_Agreement" title="UKUSA Agreement">Five Eyes</a>" strategic alliance of Australia, Canada, New Zealand, the UK, and the United States—five English-speaking <a href="/wiki/Western_world" title="Western world">Western countries</a> aiming to achieve <a href="/wiki/Total_Information_Awareness" title="Total Information Awareness">Total Information Awareness</a> by <a href="/wiki/Mastering_the_Internet" title="Mastering the Internet">mastering the Internet</a> with analytical tools such as the <a href="/wiki/Boundless_Informant" title="Boundless Informant">Boundless Informant</a>.<sup id="cite_ref-guardian1_12-0" class="reference"><a href="#cite_note-guardian1-12"><span class="cite-bracket">[</span>12<span class="cite-bracket">]</span></a></sup> As confirmed by the NSA's director <a href="/wiki/Keith_B._Alexander" title="Keith B. Alexander">Keith B. Alexander</a> on 26 September 2013, the NSA collects and stores all phone records of all American citizens.<sup id="cite_ref-13" class="reference"><a href="#cite_note-13"><span class="cite-bracket">[</span>13<span class="cite-bracket">]</span></a></sup> Much of the data is kept in large storage facilities such as the <a href="/wiki/Utah_Data_Center" title="Utah Data Center">Utah Data Center</a>, a US $1.5 billion <a href="/wiki/Megaproject" title="Megaproject">megaproject</a> referred to by <i><a href="/wiki/The_Wall_Street_Journal" title="The Wall Street Journal">The Wall Street Journal</a></i> as a "symbol of the spy agency's surveillance prowess."<sup id="cite_ref-14" class="reference"><a href="#cite_note-14"><span class="cite-bracket">[</span>14<span class="cite-bracket">]</span></a></sup> </p> <style data-mw-deduplicate="TemplateStyles:r1244412712">.mw-parser-output .templatequote{overflow:hidden;margin:1em 0;padding:0 32px}.mw-parser-output .templatequotecite{line-height:1.5em;text-align:left;margin-top:0}@media(min-width:500px){.mw-parser-output .templatequotecite{padding-left:1.6em}}</style><blockquote class="templatequote"><p>Today, this global surveillance system continues to grow. It now collects so much digital detritus – e-mails, calls, text messages, cellphone location data and a catalog of computer viruses - that the N.S.A. is building a <a href="/wiki/Utah_Data_Center" title="Utah Data Center">1-million-square-foot facility in the Utah desert</a> to store and process it.</p><div class="templatequotecite">— <cite><i><a href="/wiki/The_New_York_Times" title="The New York Times">The New York Times</a></i><sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">[</span>15<span class="cite-bracket">]</span></a></sup> (August 2012)</cite></div></blockquote> <p>On 6 June 2013, Britain's <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i> newspaper began publishing a series of revelations by an as yet unknown American whistleblower, revealed several days later to be ex-CIA and ex-NSA-contracted systems analyst Edward Snowden. Snowden gave a cache of documents to two journalists, <a href="/wiki/Glenn_Greenwald" title="Glenn Greenwald">Glenn Greenwald</a> and <a href="/wiki/Laura_Poitras" title="Laura Poitras">Laura Poitras</a>. Greenwald later estimated that the cache contains 15,000–20,000 documents, some very large and detailed, and some very small.<sup id="cite_ref-cepr1_16-0" class="reference"><a href="#cite_note-cepr1-16"><span class="cite-bracket">[</span>16<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-Senado1_17-0" class="reference"><a href="#cite_note-Senado1-17"><span class="cite-bracket">[</span>17<span class="cite-bracket">]</span></a></sup> In over two subsequent months of publications, it became clear that the NSA had operated a complex web of spying programs that allowed it to intercept Internet and telephone conversations from over a billion users from dozens of countries around the world. Specific revelations were made about China, the European Union, Latin America, Iran and Pakistan, and Australia and New Zealand, however, the published documentation reveals that many of the programs indiscriminately collected bulk information directly from central servers and Internet backbones, which almost invariably carry and reroute information from distant countries.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (October 2023)">citation needed</span></a></i>]</sup> </p><p>Due to this central server and backbone monitoring, many of the programs overlapped and interrelated with one another. These programs were often carried out with the assistance of US entities such as the <a href="/wiki/United_States_Department_of_Justice" title="United States Department of Justice">United States Department of Justice</a> and the <a href="/wiki/FBI" class="mw-redirect" title="FBI">FBI</a>,<sup id="cite_ref-microsoft_18-0" class="reference"><a href="#cite_note-microsoft-18"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup> were sanctioned by US laws such as the <a href="/wiki/FISA_Amendments_Act" class="mw-redirect" title="FISA Amendments Act">FISA Amendments Act</a>, and the necessary court orders for them were signed by the secret <a href="/wiki/Foreign_Intelligence_Surveillance_Court" class="mw-redirect" title="Foreign Intelligence Surveillance Court">Foreign Intelligence Surveillance Court</a>. Some of the NSA's programs were directly aided by national and foreign intelligence agencies, Britain's <a href="/wiki/GCHQ" title="GCHQ">GCHQ</a> and Australia's <a href="/wiki/Australian_Signals_Directorate" title="Australian Signals Directorate">ASD</a>, as well as by large private telecommunications and Internet corporations, such as <a href="/wiki/Verizon" title="Verizon">Verizon</a>, <a href="/wiki/Telstra" title="Telstra">Telstra</a>,<sup id="cite_ref-19" class="reference"><a href="#cite_note-19"><span class="cite-bracket">[</span>19<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Google" title="Google">Google</a>, and Facebook.<sup id="cite_ref-20" class="reference"><a href="#cite_note-20"><span class="cite-bracket">[</span>20<span class="cite-bracket">]</span></a></sup> </p><p>Snowden's disclosures of the NSA's surveillance activities are a continuation of <a href="/wiki/News_leak" title="News leak">news leaks</a> which have been ongoing since the early 2000s. One year after the <a href="/wiki/September_11_attacks" title="September 11 attacks">September 11, 2001, attacks</a>, former U.S. intelligence official <a href="/wiki/William_Binney_(U.S._intelligence_official)" class="mw-redirect" title="William Binney (U.S. intelligence official)">William Binney</a> was publicly critical of the NSA for spying on U.S. citizens.<sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup> </p><p>Further disclosures followed. On 16 December 2005, <i><a href="/wiki/The_New_York_Times" title="The New York Times">The New York Times</a></i> published a report under the headline "<a href="/wiki/George_W._Bush" title="George W. Bush">Bush</a> Lets U.S. Spy on Callers Without Courts."<sup id="cite_ref-nytimes2005_22-0" class="reference"><a href="#cite_note-nytimes2005-22"><span class="cite-bracket">[</span>22<span class="cite-bracket">]</span></a></sup> In 2006, further evidence of the NSA's domestic surveillance of U.S. citizens was provided by <i><a href="/wiki/USA_Today" title="USA Today">USA Today</a></i>. The newspaper released a report on 11 May 2006, regarding the NSA's "massive database" of phone records collected from "tens of millions" of U.S. citizens. According to <i>USA Today</i>, these phone records were provided by several telecom companies such as <a href="/wiki/AT%26T" title="AT&T">AT&T</a>, <a href="/wiki/Verizon_Communications" class="mw-redirect" title="Verizon Communications">Verizon</a>, and <a href="/wiki/BellSouth" title="BellSouth">BellSouth</a>.<sup id="cite_ref-USATODAY1_23-0" class="reference"><a href="#cite_note-USATODAY1-23"><span class="cite-bracket">[</span>23<span class="cite-bracket">]</span></a></sup> In 2008, the security analyst <a href="/wiki/Babak_Pasdar" title="Babak Pasdar">Babak Pasdar</a> revealed the existence of the so-called "Quantico circuit" that he and his team discovered in 2003 when brought on to update the carrier's security system. The circuit provided the U.S. federal government with a backdoor into the network of an unnamed wireless provider, which was later independently identified as <a href="/wiki/Verizon" title="Verizon">Verizon</a>.<sup id="cite_ref-Poulsen_24-0" class="reference"><a href="#cite_note-Poulsen-24"><span class="cite-bracket">[</span>24<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Snowden's_disclosures"><span id="Snowden.27s_disclosures"></span>Snowden's disclosures</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=2" title="Edit section: Snowden's disclosures"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Further information: <a href="/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)" class="mw-redirect" title="Global surveillance disclosures (2013–present)">Global surveillance disclosures (2013–present)</a></div> <p>Snowden made his first contact with journalist <a href="/wiki/Glenn_Greenwald" title="Glenn Greenwald">Glenn Greenwald</a> of <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i> in late 2012.<sup id="cite_ref-Maass_25-0" class="reference"><a href="#cite_note-Maass-25"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup> The <a href="/wiki/Timeline_of_mass_surveillance_disclosures" class="mw-redirect" title="Timeline of mass surveillance disclosures">timeline of mass surveillance disclosures</a> by Snowden continued throughout the entire year of 2013. </p> <div class="mw-heading mw-heading3"><h3 id="By_category">By category</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=3" title="Edit section: By category"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Global_surveillance_by_category" title="Global surveillance by category">Global surveillance by category</a></div> <p>Documents leaked by Snowden in 2013 include court orders, memos, and policy documents related to a wide range of surveillance activities. </p> <div class="mw-heading mw-heading2"><h2 id="Purposes">Purposes</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=4" title="Edit section: Purposes"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>According to the April 2013 summary of documents leaked by Snowden, other than to combat terrorism, these surveillance programs were employed to assess the foreign policy and economic stability of other countries,<sup id="cite_ref-spiegellaurapoitras_26-0" class="reference"><a href="#cite_note-spiegellaurapoitras-26"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup> and to gather "commercial secrets".<sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">[</span>27<span class="cite-bracket">]</span></a></sup> </p><p>In a statement addressed to the <a href="/wiki/National_Congress_of_Brazil" title="National Congress of Brazil">National Congress of Brazil</a> in early August 2013, journalist <a href="/wiki/Glenn_Greenwald" title="Glenn Greenwald">Glenn Greenwald</a> maintained that the U.S. government had used <a href="/wiki/Counter-terrorism" class="mw-redirect" title="Counter-terrorism">counter-terrorism</a> as a pretext for clandestine surveillance in order to compete with other countries in the "business, industrial and economic fields".<sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span class="cite-bracket">[</span>28<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">[</span>29<span class="cite-bracket">]</span></a></sup> In a December 2013 letter to the <a href="/wiki/Brazilian_government" class="mw-redirect" title="Brazilian government">Brazilian government</a>, Snowden wrote that "These programs were never about terrorism: they're about economic spying, social control, and diplomatic manipulation. They're about <a href="/wiki/Power_(social_and_political)" title="Power (social and political)">power</a>."<sup id="cite_ref-autogenerated8_30-0" class="reference"><a href="#cite_note-autogenerated8-30"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup> According to a White House panel member, the NSA didn't stop any terrorist attack.<sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">[</span>31<span class="cite-bracket">]</span></a></sup> However the NSA chief stated that surveillance programs stopped 54 terrorist plots.<sup id="cite_ref-32" class="reference"><a href="#cite_note-32"><span class="cite-bracket">[</span>32<span class="cite-bracket">]</span></a></sup> </p><p>In an interview with <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i> published on 12 August 2013, former NSA Director <a href="/wiki/Michael_Hayden_(general)" title="Michael Hayden (general)">Michael Hayden</a> admitted that "We (the NSA) steal secrets. We're number one in it". Hayden also added: "We steal stuff to make you safe, not to make you rich".<sup id="cite_ref-spiegellaurapoitras_26-1" class="reference"><a href="#cite_note-spiegellaurapoitras-26"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup> </p><p>According to documents seen by the news agency <a href="/wiki/Reuters" title="Reuters">Reuters</a>, these "secrets" were subsequently funneled to authorities across the nation to help them launch criminal investigations of Americans.<sup id="cite_ref-reuters3_33-0" class="reference"><a href="#cite_note-reuters3-33"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup> Federal agents are then instructed to "recreate" the investigative trail in order to "cover up" where the information originated.<sup id="cite_ref-reuters3_33-1" class="reference"><a href="#cite_note-reuters3-33"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup> </p><p>According to the congressional testimony of <a href="/wiki/Keith_B._Alexander" title="Keith B. Alexander">Keith B. Alexander</a>, <a href="/wiki/Director_of_the_National_Security_Agency" title="Director of the National Security Agency">Director of the National Security Agency</a>, one of the purposes of its data collection is to store all the phone records inside a place that can be searched and assessed at all times. When asked by Senator <a href="/wiki/Mark_Udall" title="Mark Udall">Mark Udall</a> if the goal of the NSA is to collect the phone records of all Americans, Alexander replied, "Yes, I believe it is in the nation's best interest to put all the phone records into a lockbox that we could search when the nation needs to do it."<sup id="cite_ref-34" class="reference"><a href="#cite_note-34"><span class="cite-bracket">[</span>34<span class="cite-bracket">]</span></a></sup> </p><p>Other applications of global surveillance include the identification and containment of emerging global outbreaks. In 2003, global surveillance mechanisms were used to fight against the <a href="/wiki/SARS" title="SARS">SARs</a> pandemic.<sup id="cite_ref-35" class="reference"><a href="#cite_note-35"><span class="cite-bracket">[</span>35<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Targets_and_methods">Targets and methods</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=5" title="Edit section: Targets and methods"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="Collection_of_metadata_and_other_content">Collection of metadata and other content</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=6" title="Edit section: Collection of metadata and other content"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In the <a href="/wiki/United_States" title="United States">United States</a>, the NSA is collecting the phone records of more than 300 million Americans.<sup id="cite_ref-36" class="reference"><a href="#cite_note-36"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup> The international surveillance tool <b><a href="/wiki/XKeyscore" title="XKeyscore">XKeyscore</a></b> allows government analysts to search through vast databases containing emails, online chats and the browsing histories of millions of individuals.<sup id="cite_ref-Guardian1_37-0" class="reference"><a href="#cite_note-Guardian1-37"><span class="cite-bracket">[</span>37<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-autogenerated4_38-0" class="reference"><a href="#cite_note-autogenerated4-38"><span class="cite-bracket">[</span>38<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-39" class="reference"><a href="#cite_note-39"><span class="cite-bracket">[</span>39<span class="cite-bracket">]</span></a></sup> Britain's global surveillance program <b><a href="/wiki/Tempora" title="Tempora">Tempora</a></b> intercepts the <a href="/wiki/Fibre-optic" class="mw-redirect" title="Fibre-optic">fibre-optic</a> cables that form the backbone of the Internet.<sup id="cite_ref-Tempora20131025_40-0" class="reference"><a href="#cite_note-Tempora20131025-40"><span class="cite-bracket">[</span>40<span class="cite-bracket">]</span></a></sup> Under the NSA's <b><a href="/wiki/PRISM_(surveillance_program)" class="mw-redirect" title="PRISM (surveillance program)">PRISM</a></b> surveillance program, data that has already reached its final destination would be directly harvested from the servers of the following U.S. service providers: <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a>, <a href="/wiki/Yahoo!" class="mw-redirect" title="Yahoo!">Yahoo!</a>, <a href="/wiki/Google" title="Google">Google</a>, <a href="/wiki/Facebook" title="Facebook">Facebook</a>, <a href="/wiki/Paltalk" title="Paltalk">Paltalk</a>, <a href="/wiki/AOL" title="AOL">AOL</a>, <a href="/wiki/Skype" title="Skype">Skype</a>, <a href="/wiki/YouTube" title="YouTube">YouTube</a>, and <a href="/wiki/Apple_Inc." title="Apple Inc.">Apple Inc.</a><sup id="cite_ref-WaPo1_41-0" class="reference"><a href="#cite_note-WaPo1-41"><span class="cite-bracket">[</span>41<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-42" class="reference"><a href="#cite_note-42"><span class="cite-bracket">[</span>42<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Contact_chaining">Contact chaining</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=7" title="Edit section: Contact chaining"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:NSA_Syanpse_Data_Model.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/c/cc/NSA_Syanpse_Data_Model.png/500px-NSA_Syanpse_Data_Model.png" decoding="async" width="500" height="375" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/c/cc/NSA_Syanpse_Data_Model.png 1.5x" data-file-width="600" data-file-height="450" /></a><figcaption><i><a href="/wiki/The_New_York_Times" title="The New York Times">The New York Times</a></i>, citing documents leaked by Snowden, reported in September 2013 on the NSA's "push to exploit phone and e-mail data of Americans after it lifted restrictions in 2010", which enables "large-scale graph analysis on very large sets of communications metadata".<sup id="cite_ref-43" class="reference"><a href="#cite_note-43"><span class="cite-bracket">[</span>43<span class="cite-bracket">]</span></a></sup> This slide from an NSA presentation shows one of the methods in which the agency uses e-mail and phone data to analyze the relationship network of a target. According to The <i>Times</i>, the NSA can "augment the communications data with material from public, commercial and other sources, including <a href="/wiki/Bank_code" title="Bank code">bank codes</a>, <a href="/wiki/Insurance" title="Insurance">insurance</a> information, <a href="/wiki/Facebook" title="Facebook">Facebook</a> profiles, <a href="/wiki/Manifest_(transportation)" title="Manifest (transportation)">passenger manifests</a>, <a href="/wiki/Voter_database" title="Voter database">voter registration rolls</a> and <a href="/wiki/Global_Positioning_System" title="Global Positioning System">GPS</a> location information, as well as <a href="/wiki/Property" title="Property">property</a> records and unspecified <a href="/wiki/Tax" title="Tax">tax</a> data".<sup id="cite_ref-nsasocial_44-0" class="reference"><a href="#cite_note-nsasocial-44"><span class="cite-bracket">[</span>44<span class="cite-bracket">]</span></a></sup> Such types of data were collected from U.S. citizens as well as foreign nationals.<sup id="cite_ref-nsasocial_44-1" class="reference"><a href="#cite_note-nsasocial-44"><span class="cite-bracket">[</span>44<span class="cite-bracket">]</span></a></sup></figcaption></figure> <p>Contact chaining is a method that involves utilizing data related to social links among individuals, including call logs that connect phone numbers with each other, in order to pinpoint individuals associated with criminal groups. However, a lack of privacy guidelines can result in this process amassing an extensive portion of user data.<sup id="cite_ref-45" class="reference"><a href="#cite_note-45"><span class="cite-bracket">[</span>45<span class="cite-bracket">]</span></a></sup> </p><p>The NSA uses the analysis of phone call and e-mail logs of American citizens to create sophisticated graphs of their social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information.<sup id="cite_ref-nsasocial_44-2" class="reference"><a href="#cite_note-nsasocial-44"><span class="cite-bracket">[</span>44<span class="cite-bracket">]</span></a></sup> </p><p>According to <a href="/wiki/Classified_information#Top_Secret_(TS)" title="Classified information">top secret</a> NSA documents leaked by Snowden, during a single day in 2012, the NSA collected <a href="/wiki/E-mail" class="mw-redirect" title="E-mail">e-mail</a> <a href="/wiki/Address_book" title="Address book">address books</a> from: </p> <ul><li>33,697 <a href="/wiki/Gmail" title="Gmail">Gmail</a> accounts<sup id="cite_ref-wapo1_46-0" class="reference"><a href="#cite_note-wapo1-46"><span class="cite-bracket">[</span>46<span class="cite-bracket">]</span></a></sup></li> <li>82,857 <a href="/wiki/Facebook" title="Facebook">Facebook</a> accounts<sup id="cite_ref-wapo1_46-1" class="reference"><a href="#cite_note-wapo1-46"><span class="cite-bracket">[</span>46<span class="cite-bracket">]</span></a></sup></li> <li>105,068 <a href="/wiki/Outlook.com" title="Outlook.com">Hotmail</a> accounts<sup id="cite_ref-wapo1_46-2" class="reference"><a href="#cite_note-wapo1-46"><span class="cite-bracket">[</span>46<span class="cite-bracket">]</span></a></sup></li> <li>444,743 <a href="/wiki/Yahoo!" class="mw-redirect" title="Yahoo!">Yahoo!</a> accounts<sup id="cite_ref-wapo1_46-3" class="reference"><a href="#cite_note-wapo1-46"><span class="cite-bracket">[</span>46<span class="cite-bracket">]</span></a></sup></li> <li>22,881 unspecified other providers<sup id="cite_ref-wapo1_46-4" class="reference"><a href="#cite_note-wapo1-46"><span class="cite-bracket">[</span>46<span class="cite-bracket">]</span></a></sup></li></ul> <p>Each day, the NSA collects contacts from an estimated 500,000 <a href="/wiki/Contact_list" title="Contact list">buddy lists</a> on live-chat services as well as from the inbox displays of Web-based e-mail accounts.<sup id="cite_ref-wapo1_46-5" class="reference"><a href="#cite_note-wapo1-46"><span class="cite-bracket">[</span>46<span class="cite-bracket">]</span></a></sup> Taken together, the data enables the NSA to draw detailed maps of a person's life based on their personal, professional, religious and political connections.<sup id="cite_ref-wapo1_46-6" class="reference"><a href="#cite_note-wapo1-46"><span class="cite-bracket">[</span>46<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Data_transfer">Data transfer</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=8" title="Edit section: Data transfer"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Federal agencies in the United States: Data gathered by these surveillance programs is routinely shared with the U.S. <a href="/wiki/Federal_Bureau_of_Investigation" title="Federal Bureau of Investigation">Federal Bureau of Investigation</a> (FBI) and the U.S. <a href="/wiki/Central_Intelligence_Agency" title="Central Intelligence Agency">Central Intelligence Agency</a> (CIA).<sup id="cite_ref-microsoftencrypt_47-0" class="reference"><a href="#cite_note-microsoftencrypt-47"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup> In addition, the NSA supplies domestic intercepts to the <a href="/wiki/Drug_Enforcement_Administration" title="Drug Enforcement Administration">Drug Enforcement Administration</a> (DEA), <a href="/wiki/Internal_Revenue_Service" title="Internal Revenue Service">Internal Revenue Service</a> (IRS), and other law enforcement agencies.<sup id="cite_ref-reuters3_33-2" class="reference"><a href="#cite_note-reuters3-33"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup> </p><p>Foreign countries: As a result of the NSA's <a href="/wiki/Secret_treaty" title="Secret treaty">secret treaties</a> with foreign countries, data gathered by its surveillance programs are routinely shared with countries who are signatories to the <a href="/wiki/UKUSA_Agreement" title="UKUSA Agreement">UKUSA Agreement</a>. These foreign countries also help to operate several NSA programs such as <b><a href="/wiki/XKeyscore" title="XKeyscore">XKEYSCORE</a></b>. (See <a href="#International_Cooperation">International cooperation</a>.) </p> <div class="mw-heading mw-heading3"><h3 id="Financial_payments_monitoring">Financial payments monitoring</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=9" title="Edit section: Financial payments monitoring"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>A special branch of the NSA called "<b>Follow the Money</b>" (FTM) monitors international payments, banking and credit card transactions and later stores the collected data in the NSA's financial databank, "<b>Tracfin</b>".<sup id="cite_ref-nsafin_48-0" class="reference"><a href="#cite_note-nsafin-48"><span class="cite-bracket">[</span>48<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Mobile_phone_location_tracking">Mobile phone location tracking</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=10" title="Edit section: Mobile phone location tracking"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Mobile_phone_tracking" title="Mobile phone tracking">Mobile phone tracking</a> refers to the act of attaining the position and coordinates of a mobile phone. According to <i><a href="/wiki/The_Washington_Post" title="The Washington Post">The Washington Post</a></i>, the NSA has been tracking the locations of mobile phones from all over the world by tapping into the cables that connect mobile networks globally and that serve U.S. cellphones as well as foreign ones. In the process of doing so, the NSA collects more than 5 billion records of phone locations on a daily basis. This enables NSA analysts to map cellphone owners' relationships by correlating their patterns of movement over time with thousands or millions of other phone users who cross their paths.<sup id="cite_ref-wapo52013_49-0" class="reference"><a href="#cite_note-wapo52013-49"><span class="cite-bracket">[</span>49<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-50" class="reference"><a href="#cite_note-50"><span class="cite-bracket">[</span>50<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-51" class="reference"><a href="#cite_note-51"><span class="cite-bracket">[</span>51<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-52" class="reference"><a href="#cite_note-52"><span class="cite-bracket">[</span>52<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-53" class="reference"><a href="#cite_note-53"><span class="cite-bracket">[</span>53<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-54" class="reference"><a href="#cite_note-54"><span class="cite-bracket">[</span>54<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-55" class="reference"><a href="#cite_note-55"><span class="cite-bracket">[</span>55<span class="cite-bracket">]</span></a></sup> </p><p>In order to decode private conversations, the NSA has cracked the most commonly used cellphone encryption technology, <a href="/wiki/A5/1" title="A5/1">A5/1</a>. According to a classified document leaked by Snowden, the agency can "process encrypted A5/1" even when it has not acquired an encryption key.<sup id="cite_ref-56" class="reference"><a href="#cite_note-56"><span class="cite-bracket">[</span>56<span class="cite-bracket">]</span></a></sup> In addition, the NSA uses various types of cellphone infrastructure, such as the links between carrier networks, to determine the location of a cellphone user tracked by <a href="/wiki/Visitor_Location_Registers" class="mw-redirect" title="Visitor Location Registers">Visitor Location Registers</a>.<sup id="cite_ref-57" class="reference"><a href="#cite_note-57"><span class="cite-bracket">[</span>57<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Infiltration_of_smartphones">Infiltration of smartphones</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=11" title="Edit section: Infiltration of smartphones"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>As worldwide sales of <a href="/wiki/Smartphone" title="Smartphone">smartphones</a> grew rapidly, the NSA decided to take advantage of the smartphone boom. This is particularly advantageous because the smartphone contains a variety of data sets that would interest an intelligence agency, such as social contacts, user behaviour, interests, location, photos and <a href="/wiki/Credit_card" title="Credit card">credit card</a> numbers and passwords.<sup id="cite_ref-spiegel201399_58-0" class="reference"><a href="#cite_note-spiegel201399-58"><span class="cite-bracket">[</span>58<span class="cite-bracket">]</span></a></sup> </p><p>According to the documents leaked by Snowden, the NSA has set up <a href="/wiki/Task_force" title="Task force">task forces</a> assigned to several smartphone manufacturers and <a href="/wiki/Operating_systems" class="mw-redirect" title="Operating systems">operating systems</a>, including <a href="/wiki/Apple_Inc." title="Apple Inc.">Apple Inc.</a>'s <a href="/wiki/IPhone" title="IPhone">iPhone</a> and <a href="/wiki/IOS" title="IOS">iOS</a> operating system, as well as <a href="/wiki/Google" title="Google">Google</a>'s <a href="/wiki/Android_(operating_system)" title="Android (operating system)">Android</a> mobile operating system.<sup id="cite_ref-spiegel201399_58-1" class="reference"><a href="#cite_note-spiegel201399-58"><span class="cite-bracket">[</span>58<span class="cite-bracket">]</span></a></sup> Similarly, Britain's <a href="/wiki/GCHQ" title="GCHQ">GCHQ</a> assigned a team to study and crack the <a href="/wiki/BlackBerry" title="BlackBerry">BlackBerry</a>.<sup id="cite_ref-spiegel201399_58-2" class="reference"><a href="#cite_note-spiegel201399-58"><span class="cite-bracket">[</span>58<span class="cite-bracket">]</span></a></sup> In addition, there are smaller NSA programs, known as "scripts", that can perform surveillance on 38 different features of the <a href="/wiki/IOS_3" class="mw-redirect" title="IOS 3">iOS 3</a> and <a href="/wiki/IOS_4" title="IOS 4">iOS 4</a> operating systems. These include the <a href="/wiki/Map" title="Map">mapping</a> feature, <a href="/wiki/Voicemail" title="Voicemail">voicemail</a> and photos, as well as <a href="/wiki/Google_Earth" title="Google Earth">Google Earth</a>, <a href="/wiki/Facebook" title="Facebook">Facebook</a> and <a href="/wiki/Yahoo!_Messenger" class="mw-redirect" title="Yahoo! Messenger">Yahoo! Messenger</a>.<sup id="cite_ref-spiegel201399_58-3" class="reference"><a href="#cite_note-spiegel201399-58"><span class="cite-bracket">[</span>58<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Infiltration_of_commercial_data_centers">Infiltration of commercial data centers</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=12" title="Edit section: Infiltration of commercial data centers"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In contrast to the <b><a href="/wiki/PRISM_(surveillance_program)" class="mw-redirect" title="PRISM (surveillance program)">PRISM</a></b> surveillance program, which is a front-door method of access that is nominally approved by the <a href="/wiki/United_States_Foreign_Intelligence_Surveillance_Court" title="United States Foreign Intelligence Surveillance Court">FISA court</a>, the <b><a href="/wiki/Muscular_(surveillance_program)" class="mw-redirect" title="Muscular (surveillance program)">MUSCULAR</a></b> surveillance program is noted to be "unusually aggressive" in its usage of unorthodox hacking methods to infiltrate Yahoo! and Google <a href="/wiki/Data_centre" class="mw-redirect" title="Data centre">data centres</a> around the world. As the program is operated overseas (<a href="/wiki/United_Kingdom" title="United Kingdom">United Kingdom</a>), the NSA presumes that anyone using a foreign data link is a foreigner, and is, therefore, able to collect content and metadata on a previously unknown scale from U.S. citizens and residents.<sup id="cite_ref-59" class="reference"><a href="#cite_note-59"><span class="cite-bracket">[</span>59<span class="cite-bracket">]</span></a></sup> According to the documents leaked by Snowden, the MUSCULAR surveillance program is jointly operated by the NSA and Britain's <a href="/wiki/Government_Communications_Headquarters" class="mw-redirect" title="Government Communications Headquarters">GCHQ</a> agency.<sup id="cite_ref-How_we_know_60-0" class="reference"><a href="#cite_note-How_we_know-60"><span class="cite-bracket">[</span>60<span class="cite-bracket">]</span></a></sup> (See <a href="#International_Cooperation">International cooperation</a>.) </p> <div class="mw-heading mw-heading3"><h3 id="Infiltration_of_anonymous_networks">Infiltration of anonymous networks</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=13" title="Edit section: Infiltration of anonymous networks"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The <a href="/wiki/UKUSA_Agreement" title="UKUSA Agreement">Five Eyes</a> have made repeated attempts to spy on Internet users communicating in secret via the anonymity network <a href="/wiki/Tor_(anonymity_network)" class="mw-redirect" title="Tor (anonymity network)">Tor</a>. Several of their clandestine operations involve the implantation of malicious code into the computers of anonymous Tor users who visit infected websites. In some cases, the NSA and GCHQ have succeeded in blocking access to the anonymous network, diverting Tor users to insecure channels. In other cases, the NSA and the GCHQ were able to uncover the identity of these anonymous users.<sup id="cite_ref-61" class="reference"><a href="#cite_note-61"><span class="cite-bracket">[</span>61<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-62" class="reference"><a href="#cite_note-62"><span class="cite-bracket">[</span>62<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-63" class="reference"><a href="#cite_note-63"><span class="cite-bracket">[</span>63<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-64" class="reference"><a href="#cite_note-64"><span class="cite-bracket">[</span>64<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-65" class="reference"><a href="#cite_note-65"><span class="cite-bracket">[</span>65<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-66" class="reference"><a href="#cite_note-66"><span class="cite-bracket">[</span>66<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-67" class="reference"><a href="#cite_note-67"><span class="cite-bracket">[</span>67<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-68" class="reference"><a href="#cite_note-68"><span class="cite-bracket">[</span>68<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-69" class="reference"><a href="#cite_note-69"><span class="cite-bracket">[</span>69<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Monitoring_of_hotel_reservation_systems">Monitoring of hotel reservation systems</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=14" title="Edit section: Monitoring of hotel reservation systems"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Under the <b><a href="/wiki/Royal_Concierge" title="Royal Concierge">Royal Concierge</a></b> surveillance program, Britain's GCHQ agency uses an automated monitoring system to infiltrate the <a href="/wiki/Hotel_reservation_system" class="mw-redirect" title="Hotel reservation system">reservation systems</a> of at least 350 luxury <a href="/wiki/Hotel" title="Hotel">hotels</a> in many different parts of the world.<sup id="cite_ref-spirgelconcierge_70-0" class="reference"><a href="#cite_note-spirgelconcierge-70"><span class="cite-bracket">[</span>70<span class="cite-bracket">]</span></a></sup> Other related surveillance programs involve the wiretapping of room telephones and fax machines used in targeted hotels, as well as the monitoring of computers, hooked up to the hotel network.<sup id="cite_ref-spirgelconcierge_70-1" class="reference"><a href="#cite_note-spirgelconcierge-70"><span class="cite-bracket">[</span>70<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Virtual_reality_surveillance">Virtual reality surveillance</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=15" title="Edit section: Virtual reality surveillance"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The U.S. <a href="/wiki/National_Security_Agency" title="National Security Agency">National Security Agency</a> (NSA), the U.S. <a href="/wiki/Central_Intelligence_Agency" title="Central Intelligence Agency">Central Intelligence Agency</a> (CIA), and Britain's <a href="/wiki/Government_Communications_Headquarters" class="mw-redirect" title="Government Communications Headquarters">Government Communications Headquarters</a> (GCHQ) have been conducting surveillance on the networks of many online games, including <a href="/wiki/Massively_multiplayer_online_role-playing_game" title="Massively multiplayer online role-playing game">massively multiplayer online role-playing games</a> (MMORPGs) such as <a href="/wiki/World_of_Warcraft" title="World of Warcraft">World of Warcraft</a>, as well as <a href="/wiki/Virtual_world" title="Virtual world">virtual worlds</a> such as <a href="/wiki/Second_Life" title="Second Life">Second Life</a>, and the <a href="/wiki/Xbox" title="Xbox">Xbox</a> gaming console.<sup id="cite_ref-71" class="reference"><a href="#cite_note-71"><span class="cite-bracket">[</span>71<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Political_Espionage">Political Espionage</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=16" title="Edit section: Political Espionage"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>According to the April 2013 summary of disclosures, the NSA defined its "intelligence priorities" on a scale of "1" (highest interest) to "5" (lowest interest).<sup id="cite_ref-spiegellaurapoitras_26-2" class="reference"><a href="#cite_note-spiegellaurapoitras-26"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup> It classified about 30 countries as "3rd parties", with whom it cooperates but also spies on: </p> <ul><li><b>Main targets</b>: China, Russia, Iran, Pakistan and Afghanistan were ranked highly on the NSA's list of spying priorities, followed by France, Germany, Japan, and Brazil. The <a href="/wiki/European_Union" title="European Union">European Union</a>'s "international trade" and "economic stability" are also of interest.<sup id="cite_ref-spiegellaurapoitras_26-3" class="reference"><a href="#cite_note-spiegellaurapoitras-26"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup> Other high priority targets include Cuba, Israel, and North Korea.<sup id="cite_ref-WaPo20130829_72-0" class="reference"><a href="#cite_note-WaPo20130829-72"><span class="cite-bracket">[</span>72<span class="cite-bracket">]</span></a></sup></li> <li><b>Irrelevant</b>: From a US intelligence perspective, countries such as Cambodia, Laos and Nepal were largely irrelevant, as were governments of smaller European Union countries such as Finland, Denmark, Croatia and the Czech Republic.<sup id="cite_ref-spiegellaurapoitras_26-4" class="reference"><a href="#cite_note-spiegellaurapoitras-26"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup></li></ul> <p>Other prominent targets included members and adherents of the Internet group known as "<a href="/wiki/Anonymous_(group)" class="mw-redirect" title="Anonymous (group)">Anonymous</a>",<sup id="cite_ref-spiegellaurapoitras_26-5" class="reference"><a href="#cite_note-spiegellaurapoitras-26"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup> as well as potential whistleblowers.<sup id="cite_ref-73" class="reference"><a href="#cite_note-73"><span class="cite-bracket">[</span>73<span class="cite-bracket">]</span></a></sup> According to Snowden, the NSA targeted reporters who wrote critically about the government after 9/11.<sup id="cite_ref-74" class="reference"><a href="#cite_note-74"><span class="cite-bracket">[</span>74<span class="cite-bracket">]</span></a></sup> </p><p>As part of a joint operation with the <a href="/wiki/Central_Intelligence_Agency" title="Central Intelligence Agency">Central Intelligence Agency</a> (CIA), the NSA deployed secret eavesdropping posts in eighty U.S. embassies and consulates worldwide.<sup id="cite_ref-spiegel1000_75-0" class="reference"><a href="#cite_note-spiegel1000-75"><span class="cite-bracket">[</span>75<span class="cite-bracket">]</span></a></sup> The headquarters of <a href="/wiki/NATO" title="NATO">NATO</a> were also used by NSA experts to spy on the European Union.<sup id="cite_ref-76" class="reference"><a href="#cite_note-76"><span class="cite-bracket">[</span>76<span class="cite-bracket">]</span></a></sup> </p><p>In 2013, documents provided by Edward Snowden revealed that the following <a href="/wiki/Intergovernmental_organization" class="mw-redirect" title="Intergovernmental organization">intergovernmental organizations</a>, diplomatic missions, and government ministries have been subjected to surveillance by the "<a href="/wiki/UKUSA_Agreement" title="UKUSA Agreement">Five Eyes</a>": </p> <table class="wikitable"> <tbody><tr> <th>Country/<br />Organization</th> <th>Target</th> <th>Method(s) </th></tr> <tr> <td><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/0/05/Flag_of_Brazil.svg/22px-Flag_of_Brazil.svg.png" decoding="async" width="22" height="15" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/0/05/Flag_of_Brazil.svg/33px-Flag_of_Brazil.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/0/05/Flag_of_Brazil.svg/43px-Flag_of_Brazil.svg.png 2x" data-file-width="1000" data-file-height="700" /></span></span> </span><a href="/wiki/Brazil" title="Brazil">Brazil</a> </td> <td><a href="/wiki/Ministry_of_Mines_and_Energy_(Brazil)" title="Ministry of Mines and Energy (Brazil)">Ministry of Energy</a> </td> <td>Collection of <a href="/wiki/Metadata" title="Metadata">metadata</a> records by the <a href="/wiki/Communications_Security_Establishment_Canada" class="mw-redirect" title="Communications Security Establishment Canada">Communications Security Establishment</a> of Canada (CSEC)<sup id="cite_ref-77" class="reference"><a href="#cite_note-77"><span class="cite-bracket">[</span>77<span class="cite-bracket">]</span></a></sup> </td></tr> <tr> <td rowspan="2"><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/c/c3/Flag_of_France.svg/23px-Flag_of_France.svg.png" decoding="async" width="23" height="15" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/c/c3/Flag_of_France.svg/35px-Flag_of_France.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/c/c3/Flag_of_France.svg/45px-Flag_of_France.svg.png 2x" data-file-width="900" data-file-height="600" /></span></span> </span><a href="/wiki/France" title="France">France</a> </td> <td><a href="/wiki/Ministry_of_Foreign_and_European_Affairs_(France)" class="mw-redirect" title="Ministry of Foreign and European Affairs (France)">Ministry of Foreign and European Affairs</a> </td> <td rowspan="2">Infiltration of <a href="/wiki/Virtual_private_network" title="Virtual private network">virtual private networks</a> (VPN)<sup id="cite_ref-78" class="reference"><a href="#cite_note-78"><span class="cite-bracket">[</span>78<span class="cite-bracket">]</span></a></sup> </td></tr> <tr> <td><a href="/wiki/Embassy_of_France,_Washington,_D.C." title="Embassy of France, Washington, D.C.">Embassy of France in Washington, D.C.</a> </td></tr> <tr> <td><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/b/ba/Flag_of_Germany.svg/23px-Flag_of_Germany.svg.png" decoding="async" width="23" height="14" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/b/ba/Flag_of_Germany.svg/35px-Flag_of_Germany.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/b/ba/Flag_of_Germany.svg/46px-Flag_of_Germany.svg.png 2x" data-file-width="1000" data-file-height="600" /></span></span> </span><a href="/wiki/Germany" title="Germany">Germany</a> </td> <td>Embassy of Germany in <a href="/wiki/Rwanda" title="Rwanda">Rwanda</a><sup id="cite_ref-gchqnsa20122013_79-0" class="reference"><a href="#cite_note-gchqnsa20122013-79"><span class="cite-bracket">[</span>79<span class="cite-bracket">]</span></a></sup> </td></tr> <tr> <td><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/0/03/Flag_of_Italy.svg/23px-Flag_of_Italy.svg.png" decoding="async" width="23" height="15" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/0/03/Flag_of_Italy.svg/35px-Flag_of_Italy.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/0/03/Flag_of_Italy.svg/45px-Flag_of_Italy.svg.png 2x" data-file-width="1500" data-file-height="1000" /></span></span> </span><a href="/wiki/Italy" title="Italy">Italy</a> </td> <td><a href="/wiki/Embassy_of_Italy,_Washington,_D.C." title="Embassy of Italy, Washington, D.C.">Embassy of Italy in Washington, D.C.</a> </td> <td> <ul><li>Installation of physical implants<sup id="cite_ref-espruit_80-0" class="reference"><a href="#cite_note-espruit-80"><span class="cite-bracket">[</span>80<span class="cite-bracket">]</span></a></sup></li> <li>Copying of entire <a href="/wiki/Hard_disk_drive" title="Hard disk drive">hard disk drives</a><sup id="cite_ref-espruit_80-1" class="reference"><a href="#cite_note-espruit-80"><span class="cite-bracket">[</span>80<span class="cite-bracket">]</span></a></sup></li></ul> </td></tr> <tr> <td rowspan="2"><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/41/Flag_of_India.svg/23px-Flag_of_India.svg.png" decoding="async" width="23" height="15" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/41/Flag_of_India.svg/35px-Flag_of_India.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/4/41/Flag_of_India.svg/45px-Flag_of_India.svg.png 2x" data-file-width="900" data-file-height="600" /></span></span> </span><a href="/wiki/India" title="India">India</a> </td> <td><a href="/wiki/Embassy_of_India,_Washington,_D.C." title="Embassy of India, Washington, D.C.">Embassy of India in Washington, D.C.</a> </td> <td rowspan="2"> <ul><li>Copying entire <a href="/wiki/Hard_disk_drive" title="Hard disk drive">hard disk drives</a><sup id="cite_ref-thehindunsa_81-0" class="reference"><a href="#cite_note-thehindunsa-81"><span class="cite-bracket">[</span>81<span class="cite-bracket">]</span></a></sup></li> <li>Picking data from <a href="/wiki/Screenshot" title="Screenshot">screenshots</a><sup id="cite_ref-thehindunsa_81-1" class="reference"><a href="#cite_note-thehindunsa-81"><span class="cite-bracket">[</span>81<span class="cite-bracket">]</span></a></sup></li></ul> </td></tr> <tr> <td><a href="/wiki/Permanent_Representative_of_India_to_the_United_Nations" title="Permanent Representative of India to the United Nations">Permanent Representative of India to the United Nations</a> </td></tr> <tr> <td><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/f/fc/Flag_of_Mexico.svg/23px-Flag_of_Mexico.svg.png" decoding="async" width="23" height="13" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/fc/Flag_of_Mexico.svg/35px-Flag_of_Mexico.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/fc/Flag_of_Mexico.svg/46px-Flag_of_Mexico.svg.png 2x" data-file-width="980" data-file-height="560" /></span></span> </span><a href="/wiki/Mexico" title="Mexico">Mexico</a> </td> <td><a href="/wiki/Secretariat_of_Public_Security_(Mexico)" class="mw-redirect" title="Secretariat of Public Security (Mexico)">Secretariat of Public Security</a> </td> <td> <ul><li>Hacking of <a href="/wiki/E-mail" class="mw-redirect" title="E-mail">e-mail</a> accounts as part of an operation code-named "<i>Whitetamale</i>"<sup id="cite_ref-82" class="reference"><a href="#cite_note-82"><span class="cite-bracket">[</span>82<span class="cite-bracket">]</span></a></sup></li></ul> </td></tr> <tr> <td rowspan="3"><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/b/b7/Flag_of_Europe.svg/23px-Flag_of_Europe.svg.png" decoding="async" width="23" height="15" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/b/b7/Flag_of_Europe.svg/35px-Flag_of_Europe.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/b/b7/Flag_of_Europe.svg/45px-Flag_of_Europe.svg.png 2x" data-file-width="810" data-file-height="540" /></span></span> </span><a href="/wiki/European_Union" title="European Union">European Union</a> </td> <td><a href="/wiki/Council_of_the_European_Union" title="Council of the European Union">Council of the European Union</a> in Brussels </td> <td rowspan="3"> <ul><li>Installation of <a href="/wiki/Covert_listening_device" title="Covert listening device">covert listening devices</a><sup id="cite_ref-eu_83-0" class="reference"><a href="#cite_note-eu-83"><span class="cite-bracket">[</span>83<span class="cite-bracket">]</span></a></sup></li> <li>Hacking and infiltration of <a href="/wiki/Virtual_private_network" title="Virtual private network">virtual private networks</a><sup id="cite_ref-unnewyork_84-0" class="reference"><a href="#cite_note-unnewyork-84"><span class="cite-bracket">[</span>84<span class="cite-bracket">]</span></a></sup></li> <li><a href="/wiki/Disk_cloning" title="Disk cloning">Disk cloning</a><sup id="cite_ref-unnewyork_84-1" class="reference"><a href="#cite_note-unnewyork-84"><span class="cite-bracket">[</span>84<span class="cite-bracket">]</span></a></sup></li></ul> </td></tr> <tr> <td><a href="/wiki/Delegation_of_the_European_Union_to_the_United_Nations" title="Delegation of the European Union to the United Nations">Delegation to the United Nations</a> in New York </td></tr> <tr> <td><a href="/wiki/Delegation_of_the_European_Union_to_the_United_States" title="Delegation of the European Union to the United States">Delegation to the United States</a> in <a href="/wiki/Washington,_D.C." title="Washington, D.C.">Washington, D.C.</a> </td></tr> <tr> <td rowspan="4"><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/2/2f/Flag_of_the_United_Nations.svg/23px-Flag_of_the_United_Nations.svg.png" decoding="async" width="23" height="15" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/2/2f/Flag_of_the_United_Nations.svg/35px-Flag_of_the_United_Nations.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/2/2f/Flag_of_the_United_Nations.svg/45px-Flag_of_the_United_Nations.svg.png 2x" data-file-width="1200" data-file-height="800" /></span></span> </span><a href="/wiki/United_Nations" title="United Nations">United Nations</a> </td> <td><a href="/wiki/United_Nations_Headquarters" class="mw-redirect" title="United Nations Headquarters">United Nations Headquarters</a> </td> <td rowspan="4"> <ul><li>Hacking of encrypted communications<sup id="cite_ref-unnewyork_84-2" class="reference"><a href="#cite_note-unnewyork-84"><span class="cite-bracket">[</span>84<span class="cite-bracket">]</span></a></sup></li> <li>Infiltration of internal <a href="/wiki/Videoconferencing" class="mw-redirect" title="Videoconferencing">video conferences</a><sup id="cite_ref-unnewyork_84-3" class="reference"><a href="#cite_note-unnewyork-84"><span class="cite-bracket">[</span>84<span class="cite-bracket">]</span></a></sup></li></ul> </td></tr> <tr> <td><a href="/wiki/International_Atomic_Energy_Agency" title="International Atomic Energy Agency">International Atomic Energy Agency</a> (<b>IAEA</b>) </td></tr> <tr> <td><a href="/wiki/United_Nations_Development_Programme" title="United Nations Development Programme">United Nations Development Programme</a> (<b>UNDP</b>)<sup id="cite_ref-gchqnsa20122013_79-1" class="reference"><a href="#cite_note-gchqnsa20122013-79"><span class="cite-bracket">[</span>79<span class="cite-bracket">]</span></a></sup> </td></tr> <tr> <td><a href="/wiki/United_Nations_Children%27s_Fund" class="mw-redirect" title="United Nations Children's Fund">United Nations Children's Fund</a> (<b>UNICEF</b>)<sup id="cite_ref-gchqnsa20122013_79-2" class="reference"><a href="#cite_note-gchqnsa20122013-79"><span class="cite-bracket">[</span>79<span class="cite-bracket">]</span></a></sup> </td></tr></tbody></table> <div class="mw-heading mw-heading2"><h2 id="International_Cooperation">International Cooperation</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=17" title="Edit section: International Cooperation"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:UKUSA_Map.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/5/5f/UKUSA_Map.svg/220px-UKUSA_Map.svg.png" decoding="async" width="220" height="112" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/5/5f/UKUSA_Map.svg/330px-UKUSA_Map.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/5/5f/UKUSA_Map.svg/440px-UKUSA_Map.svg.png 2x" data-file-width="2756" data-file-height="1399" /></a><figcaption>The "<a href="/wiki/Five_Eyes" title="Five Eyes">Five Eyes</a>" of Australia, Canada, New Zealand, the United Kingdom and the United States</figcaption></figure> <p>During <a href="/wiki/World_War_II" title="World War II">World War II</a>, the <a href="/wiki/1943_BRUSA_Agreement" title="1943 BRUSA Agreement">BRUSA Agreement</a> was signed by the governments of the United States and the United Kingdom for the purpose of intelligence sharing.<sup id="cite_ref-BRUSA_papers_85-0" class="reference"><a href="#cite_note-BRUSA_papers-85"><span class="cite-bracket">[</span>85<span class="cite-bracket">]</span></a></sup> This was later formalized in the <a href="/wiki/UKUSA_Agreement" title="UKUSA Agreement">UKUSA Agreement</a> of 1946 as a <a href="/wiki/Secret_treaty" title="Secret treaty">secret treaty</a>. The full text of the agreement was released to the public on 25 June 2010.<sup id="cite_ref-Guardian_2010_86-0" class="reference"><a href="#cite_note-Guardian_2010-86"><span class="cite-bracket">[</span>86<span class="cite-bracket">]</span></a></sup> </p><p>Although the treaty was later revised to include other countries such as Denmark, Germany, Ireland, Norway, Turkey, and the Philippines,<sup id="cite_ref-Guardian_2010_86-1" class="reference"><a href="#cite_note-Guardian_2010-86"><span class="cite-bracket">[</span>86<span class="cite-bracket">]</span></a></sup> most of the information sharing has been performed by the so-called "<b><a href="/wiki/Five_Eyes" title="Five Eyes">Five Eyes</a></b>",<sup id="cite_ref-fiveeyesap_87-0" class="reference"><a href="#cite_note-fiveeyesap-87"><span class="cite-bracket">[</span>87<span class="cite-bracket">]</span></a></sup> a term referring to the following English-speaking <a href="/wiki/Western_world" title="Western world">western democracies</a> and their respective intelligence agencies: </p> <ul><li><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><a href="/wiki/Australia" title="Australia"><img alt="Australia" src="//upload.wikimedia.org/wikipedia/commons/thumb/8/88/Flag_of_Australia_%28converted%29.svg/23px-Flag_of_Australia_%28converted%29.svg.png" decoding="async" width="23" height="12" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/8/88/Flag_of_Australia_%28converted%29.svg/35px-Flag_of_Australia_%28converted%29.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/8/88/Flag_of_Australia_%28converted%29.svg/46px-Flag_of_Australia_%28converted%29.svg.png 2x" data-file-width="1280" data-file-height="640" /></a></span></span> – The <a href="/wiki/Australian_Signals_Directorate" title="Australian Signals Directorate">Australian Signals Directorate</a> of Australia<sup id="cite_ref-fiveeyesap_87-1" class="reference"><a href="#cite_note-fiveeyesap-87"><span class="cite-bracket">[</span>87<span class="cite-bracket">]</span></a></sup></li> <li><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><a href="/wiki/Canada" title="Canada"><img alt="Canada" src="//upload.wikimedia.org/wikipedia/commons/thumb/d/d9/Flag_of_Canada_%28Pantone%29.svg/23px-Flag_of_Canada_%28Pantone%29.svg.png" decoding="async" width="23" height="12" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/d/d9/Flag_of_Canada_%28Pantone%29.svg/35px-Flag_of_Canada_%28Pantone%29.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/d/d9/Flag_of_Canada_%28Pantone%29.svg/46px-Flag_of_Canada_%28Pantone%29.svg.png 2x" data-file-width="1200" data-file-height="600" /></a></span></span> – The <a href="/wiki/Communications_Security_Establishment" title="Communications Security Establishment">Communications Security Establishment</a> of Canada<sup id="cite_ref-fiveeyesap_87-2" class="reference"><a href="#cite_note-fiveeyesap-87"><span class="cite-bracket">[</span>87<span class="cite-bracket">]</span></a></sup></li> <li><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><a href="/wiki/New_Zealand" title="New Zealand"><img alt="New Zealand" src="//upload.wikimedia.org/wikipedia/commons/thumb/3/3e/Flag_of_New_Zealand.svg/23px-Flag_of_New_Zealand.svg.png" decoding="async" width="23" height="12" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/3/3e/Flag_of_New_Zealand.svg/35px-Flag_of_New_Zealand.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/3/3e/Flag_of_New_Zealand.svg/46px-Flag_of_New_Zealand.svg.png 2x" data-file-width="1200" data-file-height="600" /></a></span></span> – The <a href="/wiki/Government_Communications_Security_Bureau" title="Government Communications Security Bureau">Government Communications Security Bureau</a> of New Zealand<sup id="cite_ref-fiveeyesap_87-3" class="reference"><a href="#cite_note-fiveeyesap-87"><span class="cite-bracket">[</span>87<span class="cite-bracket">]</span></a></sup></li> <li><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><a href="/wiki/United_Kingdom" title="United Kingdom"><img alt="United Kingdom" src="//upload.wikimedia.org/wikipedia/en/thumb/a/ae/Flag_of_the_United_Kingdom.svg/23px-Flag_of_the_United_Kingdom.svg.png" decoding="async" width="23" height="12" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/a/ae/Flag_of_the_United_Kingdom.svg/35px-Flag_of_the_United_Kingdom.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/a/ae/Flag_of_the_United_Kingdom.svg/46px-Flag_of_the_United_Kingdom.svg.png 2x" data-file-width="1200" data-file-height="600" /></a></span></span> – The <a href="/wiki/Government_Communications_Headquarters" class="mw-redirect" title="Government Communications Headquarters">Government Communications Headquarters</a> of the United Kingdom, which is widely considered to be a leader in traditional spying due to its influence on countries that were once part of the <a href="/wiki/British_Empire" title="British Empire">British Empire</a>.<sup id="cite_ref-fiveeyesap_87-4" class="reference"><a href="#cite_note-fiveeyesap-87"><span class="cite-bracket">[</span>87<span class="cite-bracket">]</span></a></sup></li> <li><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><a href="/wiki/United_States" title="United States"><img alt="United States" src="//upload.wikimedia.org/wikipedia/en/thumb/a/a4/Flag_of_the_United_States.svg/23px-Flag_of_the_United_States.svg.png" decoding="async" width="23" height="12" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/a/a4/Flag_of_the_United_States.svg/35px-Flag_of_the_United_States.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/a/a4/Flag_of_the_United_States.svg/46px-Flag_of_the_United_States.svg.png 2x" data-file-width="1235" data-file-height="650" /></a></span></span> – The <a href="/wiki/National_Security_Agency" title="National Security Agency">National Security Agency</a> of the United States, which has the biggest budget and the most advanced technical abilities among the "<i>five eyes</i>".<sup id="cite_ref-fiveeyesap_87-5" class="reference"><a href="#cite_note-fiveeyesap-87"><span class="cite-bracket">[</span>87<span class="cite-bracket">]</span></a></sup></li></ul> <figure class="mw-halign-center" typeof="mw:File/Thumb"><a href="/wiki/File:Asia-europe_cable_Route.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/c/cf/Asia-europe_cable_Route.png/800px-Asia-europe_cable_Route.png" decoding="async" width="800" height="251" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/c/cf/Asia-europe_cable_Route.png/1200px-Asia-europe_cable_Route.png 1.5x, //upload.wikimedia.org/wikipedia/commons/c/cf/Asia-europe_cable_Route.png 2x" data-file-width="1540" data-file-height="484" /></a><figcaption><a href="/wiki/Top_secret" class="mw-redirect mw-disambig" title="Top secret">Top secret</a> documents leaked by Snowden revealed that the "Five Eyes" have gained access to the majority of Internet and telephone communications flowing throughout Europe, the United States, and other parts of the world.</figcaption></figure> <p><br /> <b>Left</b>: <a href="/wiki/SEA-ME-WE_3" title="SEA-ME-WE 3">SEA-ME-WE 3</a>, which runs across the <a href="/wiki/Afro-Eurasia" title="Afro-Eurasia">Afro-Eurasian</a> <a href="/wiki/Supercontinent" title="Supercontinent">supercontinent</a> from Japan to <a href="/wiki/Northern_Germany" title="Northern Germany">Northern Germany</a>, is one of the most important <a href="/wiki/Submarine_communications_cable" title="Submarine communications cable">submarine cables</a> accessed by the "Five Eyes". Singapore, a former British colony in the Asia-Pacific region (blue dot), plays a vital role in intercepting Internet and telecommunications traffic heading from Australia/Japan to Europe, and vice versa. An intelligence-sharing agreement between Singapore and Australia allows the rest of the "Five Eyes" to gain access to <a href="/wiki/SEA-ME-WE_3" title="SEA-ME-WE 3">SEA-ME-WE 3</a>.<sup id="cite_ref-smhaug28_88-0" class="reference"><a href="#cite_note-smhaug28-88"><span class="cite-bracket">[</span>88<span class="cite-bracket">]</span></a></sup> <br /> <b>Right</b>: <a href="/wiki/TAT-14" title="TAT-14">TAT-14</a>, a telecommunications cable linking Europe with the United States, was identified as one of few assets of "Critical Infrastructure and Key Resources" of the US on foreign territory. In 2013, it was revealed that British officials "pressured a handful of telecommunications and Internet companies" to allow the British government to gain access to <a href="/wiki/TAT-14" title="TAT-14">TAT-14</a>.<sup id="cite_ref-SZAug28_89-0" class="reference"><a href="#cite_note-SZAug28-89"><span class="cite-bracket">[</span>89<span class="cite-bracket">]</span></a></sup> </p> <figure typeof="mw:File/Thumb"><a href="/wiki/File:Approved_SIGINT_countries_-_NSA_partners.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/3/3e/Approved_SIGINT_countries_-_NSA_partners.svg/350px-Approved_SIGINT_countries_-_NSA_partners.svg.png" decoding="async" width="350" height="180" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/3/3e/Approved_SIGINT_countries_-_NSA_partners.svg/525px-Approved_SIGINT_countries_-_NSA_partners.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/3/3e/Approved_SIGINT_countries_-_NSA_partners.svg/700px-Approved_SIGINT_countries_-_NSA_partners.svg.png 2x" data-file-width="1035" data-file-height="531" /></a><figcaption>NSA lists "Approved SIGINT countries" which are divided into two groups by their cooperation level with the NSA.<style data-mw-deduplicate="TemplateStyles:r981673959">.mw-parser-output .legend{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .legend-color{display:inline-block;min-width:1.25em;height:1.25em;line-height:1.25;margin:1px 0;text-align:center;border:1px solid black;background-color:transparent;color:black}.mw-parser-output .legend-text{}</style><div class="legend"><span class="legend-color mw-no-invert" style="background-color:#000080; color:white;"> </span> Second Parties</div><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r981673959"><div class="legend"><span class="legend-color mw-no-invert" style="background-color:#d40000; color:white;"> </span> Third Parties</div></figcaption></figure> <p>According to the leaked documents, aside from the Five Eyes, most other Western countries have also participated in the NSA surveillance system and are sharing information with each other.<sup id="cite_ref-90" class="reference"><a href="#cite_note-90"><span class="cite-bracket">[</span>90<span class="cite-bracket">]</span></a></sup> In the documents the NSA lists "approved SIGINT partners" which are partner countries in addition to the Five Eyes. Glenn Greenwald said that the "NSA often maintains these partnerships by paying its partner to develop certain technologies and engage in surveillance, and can thus direct how the spying is carried out." These partner countries are divided into two groups, "Second Parties" and "Third Parties". The Second Parties are doing comprehensive cooperation with the NSA, and the Third Parties are doing focused cooperation.<sup id="cite_ref-Greenwald2014_91-0" class="reference"><a href="#cite_note-Greenwald2014-91"><span class="cite-bracket">[</span>91<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-92" class="reference"><a href="#cite_note-92"><span class="cite-bracket">[</span>92<span class="cite-bracket">]</span></a></sup> However, being a partner of the NSA does not automatically exempt a country from being targeted by the NSA itself. According to an internal NSA document leaked by Snowden, "We (the NSA) can, and often do, target the signals of most 3rd party foreign partners."<sup id="cite_ref-93" class="reference"><a href="#cite_note-93"><span class="cite-bracket">[</span>93<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Australia">Australia</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=18" title="Edit section: Australia"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:Pine_Gap.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/5/5c/Pine_Gap.jpg/175px-Pine_Gap.jpg" decoding="async" width="175" height="105" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/5/5c/Pine_Gap.jpg/263px-Pine_Gap.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/5/5c/Pine_Gap.jpg/350px-Pine_Gap.jpg 2x" data-file-width="902" data-file-height="539" /></a><figcaption><a href="/wiki/Pine_Gap" title="Pine Gap">Pine Gap</a>, near the Australian town of <a href="/wiki/Alice_Springs" title="Alice Springs">Alice Springs</a>, is run by the CIA and it is part of the global surveillance program <b><a href="/wiki/ECHELON" title="ECHELON">ECHELON</a></b>.<sup id="cite_ref-94" class="reference"><a href="#cite_note-94"><span class="cite-bracket">[</span>94<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-95" class="reference"><a href="#cite_note-95"><span class="cite-bracket">[</span>95<span class="cite-bracket">]</span></a></sup></figcaption></figure> <p>The <a href="/wiki/Australian_Signals_Directorate" title="Australian Signals Directorate">Australian Signals Directorate</a> (<b>ASD</b>), formerly known as the Defence Signals Directorate (<b>DSD</b>), shares information on Australian citizens with the other members of the <a href="/wiki/UKUSA_Agreement" title="UKUSA Agreement">UKUSA Agreement</a>. According to a 2008 <a href="/wiki/UKUSA_Agreement" title="UKUSA Agreement">Five Eyes</a> document leaked by Snowden, data of Australian citizens shared with foreign countries include "bulk, unselected, unminimised metadata" as well as "medical, legal or religious information".<sup id="cite_ref-guardian031213_96-0" class="reference"><a href="#cite_note-guardian031213-96"><span class="cite-bracket">[</span>96<span class="cite-bracket">]</span></a></sup> </p><p>In close cooperation with other members of the <a href="/wiki/UKUSA_Agreement" title="UKUSA Agreement">Five Eyes</a> community, the ASD runs secret surveillance facilities in many parts of <a href="/wiki/Southeast_Asia" title="Southeast Asia">Southeast Asia</a> without the knowledge of Australian diplomats.<sup id="cite_ref-97" class="reference"><a href="#cite_note-97"><span class="cite-bracket">[</span>97<span class="cite-bracket">]</span></a></sup> In addition, the ASD cooperates with the <a href="/wiki/Security_and_Intelligence_Division" title="Security and Intelligence Division">Security and Intelligence Division</a> (SID) of the <a href="/wiki/Republic_of_Singapore" class="mw-redirect" title="Republic of Singapore">Republic of Singapore</a> in an international operation to intercept underwater telecommunications cables across the <a href="/wiki/Eastern_Hemisphere" title="Eastern Hemisphere">Eastern Hemisphere</a> and the <a href="/wiki/Pacific_Ocean" title="Pacific Ocean">Pacific Ocean</a>.<sup id="cite_ref-philipsg_98-0" class="reference"><a href="#cite_note-philipsg-98"><span class="cite-bracket">[</span>98<span class="cite-bracket">]</span></a></sup> </p><p>In March 2017 it was reported that, on advice from the <a href="/wiki/Five_Eyes" title="Five Eyes"> Five Eyes intelligence alliance</a>, more than 500 Iraqi and Syrian refugees, have been refused entry to Australia, in the last year.<sup id="cite_ref-99" class="reference"><a href="#cite_note-99"><span class="cite-bracket">[</span>99<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Canada">Canada</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=19" title="Edit section: Canada"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The <a href="/wiki/Communications_Security_Establishment_Canada" class="mw-redirect" title="Communications Security Establishment Canada">Communications Security Establishment Canada</a> (<b>CSEC</b>) offers the NSA resources for advanced collection, processing, and analysis. It has set up <a href="/wiki/Covert_operation" title="Covert operation">covert</a> sites at the request of NSA.<sup id="cite_ref-cbccanusa_100-0" class="reference"><a href="#cite_note-cbccanusa-100"><span class="cite-bracket">[</span>100<span class="cite-bracket">]</span></a></sup> The US-Canada <a href="/wiki/Signals_intelligence" title="Signals intelligence">SIGNT</a> relationship dates back to a secret alliance formed during <a href="/wiki/World_War_II" title="World War II">World War II</a>, and was formalized in 1949 under the CANUSA Agreement.<sup id="cite_ref-cbccanusa_100-1" class="reference"><a href="#cite_note-cbccanusa-100"><span class="cite-bracket">[</span>100<span class="cite-bracket">]</span></a></sup> </p><p>On behalf of the NSA, the CSEC opened secret surveillance facilities in 20 countries around the world.<sup id="cite_ref-101" class="reference"><a href="#cite_note-101"><span class="cite-bracket">[</span>101<span class="cite-bracket">]</span></a></sup> </p><p>As well, the <a href="/wiki/Communications_Security_Establishment_Canada" class="mw-redirect" title="Communications Security Establishment Canada">Communications Security Establishment Canada</a> has been revealed, following the <a href="/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)" class="mw-redirect" title="Global surveillance disclosures (2013–present)">global surveillance disclosures</a> to be engaging in surveillance on Wifi Hotspots of major Canadian Airports, collecting meta-data to use for engaging in surveillance on travelers, even days after their departure from said airports.<sup id="cite_ref-102" class="reference"><a href="#cite_note-102"><span class="cite-bracket">[</span>102<span class="cite-bracket">]</span></a></sup> </p> <ul class="gallery mw-gallery-traditional"> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:NSA_Canada_relationship.pdf" class="mw-file-description" title="The NSA's relationship with Canada's CSEC"><img alt="The NSA's relationship with Canada's CSEC" src="//upload.wikimedia.org/wikipedia/commons/thumb/3/3c/NSA_Canada_relationship.pdf/page1-92px-NSA_Canada_relationship.pdf.jpg" decoding="async" width="92" height="120" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/3/3c/NSA_Canada_relationship.pdf/page1-137px-NSA_Canada_relationship.pdf.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/3/3c/NSA_Canada_relationship.pdf/page1-183px-NSA_Canada_relationship.pdf.jpg 2x" data-file-width="1268" data-file-height="1660" /></a></span></div> <div class="gallerytext">The NSA's relationship with Canada's <a href="/wiki/Communications_Security_Establishment_Canada" class="mw-redirect" title="Communications Security Establishment Canada">CSEC</a></div> </li> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:NSA_Canada_G8_G20.pdf" class="mw-file-description" title="NSA document on a mass surveillance operation with Canada's CSEC agency during the G8 and G20 summits in Toronto in 2010"><img alt="NSA document on a mass surveillance operation with Canada's CSEC agency during the G8 and G20 summits in Toronto in 2010" src="//upload.wikimedia.org/wikipedia/commons/thumb/b/b2/NSA_Canada_G8_G20.pdf/page1-92px-NSA_Canada_G8_G20.pdf.jpg" decoding="async" width="92" height="120" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/b/b2/NSA_Canada_G8_G20.pdf/page1-137px-NSA_Canada_G8_G20.pdf.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/b/b2/NSA_Canada_G8_G20.pdf/page1-183px-NSA_Canada_G8_G20.pdf.jpg 2x" data-file-width="1266" data-file-height="1656" /></a></span></div> <div class="gallerytext">NSA document on a <a href="/wiki/Mass_surveillance" title="Mass surveillance">mass surveillance</a> operation with Canada's <a href="/wiki/Communications_Security_Establishment_Canada" class="mw-redirect" title="Communications Security Establishment Canada">CSEC</a> agency during the <a href="/wiki/G8" title="G8">G8</a> and <a href="/wiki/G-20_major_economies" class="mw-redirect" title="G-20 major economies">G20</a> summits in <a href="/wiki/Toronto" title="Toronto">Toronto</a> in 2010</div> </li> </ul> <div class="mw-heading mw-heading3"><h3 id="Denmark">Denmark</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=20" title="Edit section: Denmark"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The <a href="/wiki/Politiets_Efterretningstjeneste" class="mw-redirect" title="Politiets Efterretningstjeneste">Politiets Efterretningstjeneste</a> (<b>PET</b>) of Denmark, a domestic intelligence agency, exchanges data with the NSA on a regular basis, as part of a secret agreement with the United States.<sup id="cite_ref-103" class="reference"><a href="#cite_note-103"><span class="cite-bracket">[</span>103<span class="cite-bracket">]</span></a></sup> Being one of the "<a href="/wiki/UKUSA_Agreement#9_Eyes.2C_14_Eyes.2C_and_other_.22third_parties.22" title="UKUSA Agreement">9-Eyes</a>" of the <a href="/wiki/UKUSA_Agreement" title="UKUSA Agreement">UKUSA Agreement</a>, Denmark's relationship with the NSA is closer than the NSA's relationship with Germany, Sweden, Spain, Belgium or Italy.<sup id="cite_ref-104" class="reference"><a href="#cite_note-104"><span class="cite-bracket">[</span>104<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="France">France</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=21" title="Edit section: France"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The <a href="/wiki/Directorate-General_for_External_Security" title="Directorate-General for External Security">Directorate-General for External Security</a> (<b>DGSE</b>) of France maintains a close relationship with both the NSA and the GCHQ after discussions for increased cooperation began in November 2006.<sup id="cite_ref-frlemjac_105-0" class="reference"><a href="#cite_note-frlemjac-105"><span class="cite-bracket">[</span>105<span class="cite-bracket">]</span></a></sup> By the early 2010s, the extent of cooperation in the joint interception of digital data by the DGSE and the NSA was noted to have increased dramatically.<sup id="cite_ref-frlemjac_105-1" class="reference"><a href="#cite_note-frlemjac-105"><span class="cite-bracket">[</span>105<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-106" class="reference"><a href="#cite_note-106"><span class="cite-bracket">[</span>106<span class="cite-bracket">]</span></a></sup> </p><p>In 2011, a formal <a href="/wiki/Memorandum" title="Memorandum">memorandum</a> for data exchange was signed by the DGSE and the NSA, which facilitated the transfer of millions of <a href="/wiki/Metadata" title="Metadata">metadata</a> records from the DGSE to the NSA.<sup id="cite_ref-lemonde1_107-0" class="reference"><a href="#cite_note-lemonde1-107"><span class="cite-bracket">[</span>107<span class="cite-bracket">]</span></a></sup> From December 2012 to 8 January 2013, over 70 million metadata records were handed over to the NSA by French intelligence agencies.<sup id="cite_ref-lemonde1_107-1" class="reference"><a href="#cite_note-lemonde1-107"><span class="cite-bracket">[</span>107<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Germany">Germany</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=22" title="Edit section: Germany"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The <a href="/wiki/Bundesnachrichtendienst" class="mw-redirect" title="Bundesnachrichtendienst">Bundesnachrichtendienst</a> (<b>BND</b>) of Germany systematically transfers metadata from German intelligence sources to the NSA. In December 2012 alone, the BND provided the NSA with 500 million metadata records.<sup id="cite_ref-SpiegelMetadata_108-0" class="reference"><a href="#cite_note-SpiegelMetadata-108"><span class="cite-bracket">[</span>108<span class="cite-bracket">]</span></a></sup> The NSA granted the Bundesnachrichtendienst access to <b><a href="/wiki/X-Keyscore" class="mw-redirect" title="X-Keyscore">X-Keyscore</a></b>,<sup id="cite_ref-xKeyscoreGermany_109-0" class="reference"><a href="#cite_note-xKeyscoreGermany-109"><span class="cite-bracket">[</span>109<span class="cite-bracket">]</span></a></sup> in exchange for the German surveillance programs <b>Mira4</b> and <b>Veras</b>.<sup id="cite_ref-SpiegelMetadata_108-1" class="reference"><a href="#cite_note-SpiegelMetadata-108"><span class="cite-bracket">[</span>108<span class="cite-bracket">]</span></a></sup> </p><p>In early 2013, <a href="/wiki/Hans-Georg_Maa%C3%9Fen" title="Hans-Georg Maaßen">Hans-Georg Maaßen</a>, President of the German domestic security agency <a href="/wiki/Federal_Office_for_the_Protection_of_the_Constitution" title="Federal Office for the Protection of the Constitution">Bundesamt für Verfassungsschutz</a> (<b>BfV</b>), made several visits to the headquarters of the NSA. According to <a href="/wiki/Classified_information#Top_Secret_(TS)" title="Classified information">classified</a> documents of the German government, Maaßen agreed to transfer all data records of persons monitored in Germany by the BfV via <b>XKeyscore</b> to the NSA.<sup id="cite_ref-110" class="reference"><a href="#cite_note-110"><span class="cite-bracket">[</span>110<span class="cite-bracket">]</span></a></sup> In addition, the BfV works very closely with eight other U.S. government agencies, including the <a href="/wiki/CIA" class="mw-redirect" title="CIA">CIA</a>.<sup id="cite_ref-suddeutsche20131409_111-0" class="reference"><a href="#cite_note-suddeutsche20131409-111"><span class="cite-bracket">[</span>111<span class="cite-bracket">]</span></a></sup> Under <b><a href="/wiki/Project_6" title="Project 6">Project 6</a></b>, which is jointly operated by the CIA, BfV, and BND, a massive database containing personal information such as <a href="/wiki/Photography" title="Photography">photos</a>, <a href="/wiki/Vehicle_registration_plate" title="Vehicle registration plate">license plate numbers</a>, <a href="/wiki/Web_browsing_history" title="Web browsing history">Internet search histories</a> and telephone <a href="/wiki/Metadata" title="Metadata">metadata</a> was developed to gain a better understanding of the social relationships of presumed <a href="/wiki/Jihad" title="Jihad">jihadists</a>.<sup id="cite_ref-112" class="reference"><a href="#cite_note-112"><span class="cite-bracket">[</span>112<span class="cite-bracket">]</span></a></sup> </p><p>In 2012, the BfV handed over 864 <a href="/wiki/Data_set" title="Data set">data sets</a> of personal information to the CIA, NSA and seven other <a href="/wiki/United_States_Intelligence_Community" title="United States Intelligence Community">U.S. intelligence agencies</a>. In exchange, the BND received data from U.S. intelligence agencies on 1,830 occasions. The newly acquired data was handed over to the BfV and stored in a domestically accessible system known as <b><a href="/wiki/Nachrichtendienstliches_Informationssystem" title="Nachrichtendienstliches Informationssystem">NADIS WN</a></b>.<sup id="cite_ref-113" class="reference"><a href="#cite_note-113"><span class="cite-bracket">[</span>113<span class="cite-bracket">]</span></a></sup> </p> <ul class="gallery mw-gallery-traditional"> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:Dagger_Complex_01.jpg" class="mw-file-description" title="The Dagger Complex in Darmstadt, Germany, is operated by the United States Army on behalf of the NSA. Similar to the NSA's Utah Data Center, the Dagger Complex is able to process, store, and decrypt millions of data pieces.[114]"><img alt="The Dagger Complex in Darmstadt, Germany, is operated by the United States Army on behalf of the NSA. Similar to the NSA's Utah Data Center, the Dagger Complex is able to process, store, and decrypt millions of data pieces.[114]" src="//upload.wikimedia.org/wikipedia/commons/thumb/7/78/Dagger_Complex_01.jpg/120px-Dagger_Complex_01.jpg" decoding="async" width="120" height="39" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/7/78/Dagger_Complex_01.jpg/180px-Dagger_Complex_01.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/7/78/Dagger_Complex_01.jpg/240px-Dagger_Complex_01.jpg 2x" data-file-width="4076" data-file-height="1316" /></a></span></div> <div class="gallerytext">The <a href="/wiki/Dagger_Complex" title="Dagger Complex">Dagger Complex</a> in <a href="/wiki/Darmstadt" title="Darmstadt">Darmstadt</a>, Germany, is operated by the <a href="/wiki/United_States_Army" title="United States Army">United States Army</a> on behalf of the NSA. Similar to the NSA's <a href="/wiki/Utah_Data_Center" title="Utah Data Center">Utah Data Center</a>, the Dagger Complex is able to process, store, and decrypt millions of data pieces.<sup id="cite_ref-114" class="reference"><a href="#cite_note-114"><span class="cite-bracket">[</span>114<span class="cite-bracket">]</span></a></sup></div> </li> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:Radomes_of_Bad_Aibling_Station_1.jpg" class="mw-file-description" title="The Bad Aibling Station in Bavaria, Germany, was operated by the NSA until the early 2000s. It is currently run by the BND. As part of the global surveillance network ECHELON, it is the largest listening post outside Britain and the USA.[115]"><img alt="The Bad Aibling Station in Bavaria, Germany, was operated by the NSA until the early 2000s. It is currently run by the BND. As part of the global surveillance network ECHELON, it is the largest listening post outside Britain and the USA.[115]" src="//upload.wikimedia.org/wikipedia/commons/thumb/2/2d/Radomes_of_Bad_Aibling_Station_1.jpg/120px-Radomes_of_Bad_Aibling_Station_1.jpg" decoding="async" width="120" height="75" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/2/2d/Radomes_of_Bad_Aibling_Station_1.jpg/180px-Radomes_of_Bad_Aibling_Station_1.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/2/2d/Radomes_of_Bad_Aibling_Station_1.jpg/240px-Radomes_of_Bad_Aibling_Station_1.jpg 2x" data-file-width="1536" data-file-height="954" /></a></span></div> <div class="gallerytext">The <a href="/wiki/Bad_Aibling_Station" title="Bad Aibling Station">Bad Aibling Station</a> in <a href="/wiki/Bavaria" title="Bavaria">Bavaria</a>, Germany, was operated by the NSA until the early 2000s. It is currently run by the BND. As part of the global surveillance network <b><a href="/wiki/ECHELON" title="ECHELON">ECHELON</a></b>, it is the largest listening post outside Britain and the USA.<sup id="cite_ref-115" class="reference"><a href="#cite_note-115"><span class="cite-bracket">[</span>115<span class="cite-bracket">]</span></a></sup></div> </li> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:BND_XKeyscore.jpg" class="mw-file-description" title="In 2013, the German news magazine Der Spiegel published an excerpt of an NSA document leaked by Snowden, showing that the BND used the NSA's XKEYSCORE to wiretap a German domestic target."><img alt="In 2013, the German news magazine Der Spiegel published an excerpt of an NSA document leaked by Snowden, showing that the BND used the NSA's XKEYSCORE to wiretap a German domestic target." src="//upload.wikimedia.org/wikipedia/commons/thumb/4/46/BND_XKeyscore.jpg/120px-BND_XKeyscore.jpg" decoding="async" width="120" height="34" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/4/46/BND_XKeyscore.jpg/180px-BND_XKeyscore.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/4/46/BND_XKeyscore.jpg/240px-BND_XKeyscore.jpg 2x" data-file-width="791" data-file-height="222" /></a></span></div> <div class="gallerytext">In 2013, the German news magazine <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i> published an excerpt of an NSA document leaked by Snowden, showing that the BND used the NSA's <b><a href="/wiki/XKeyscore" title="XKeyscore">XKEYSCORE</a></b> to wiretap a German domestic target.</div> </li> </ul> <div class="mw-heading mw-heading3"><h3 id="Israel">Israel</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=23" title="Edit section: Israel"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Israel_Memorandum_of_Understanding_SIGINT.pdf" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/4/41/Israel_Memorandum_of_Understanding_SIGINT.pdf/page1-220px-Israel_Memorandum_of_Understanding_SIGINT.pdf.jpg" decoding="async" width="220" height="285" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/4/41/Israel_Memorandum_of_Understanding_SIGINT.pdf/page1-330px-Israel_Memorandum_of_Understanding_SIGINT.pdf.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/4/41/Israel_Memorandum_of_Understanding_SIGINT.pdf/page1-440px-Israel_Memorandum_of_Understanding_SIGINT.pdf.jpg 2x" data-file-width="1275" data-file-height="1650" /></a><figcaption>On 11 September 2013, <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i> released a secret NSA document leaked by Snowden, which reveals how Israel's <a href="/wiki/Unit_8200" title="Unit 8200">Unit 8200</a> (<b>ISNU</b>) was given raw, unfiltered data of U.S. citizens, as part of a secret agreement with the U.S. <a href="/wiki/National_Security_Agency" title="National Security Agency">National Security Agency</a>.<sup id="cite_ref-israelnsa1_116-0" class="reference"><a href="#cite_note-israelnsa1-116"><span class="cite-bracket">[</span>116<span class="cite-bracket">]</span></a></sup></figcaption></figure> <p>The <a href="/wiki/Unit_8200" title="Unit 8200">Israeli SIGINT National Unit</a> (<b>ISNU</b>) routinely receives raw, unfiltered data of U.S. citizens from the NSA. However, a secret NSA document leaked by Snowden revealed that U.S. government officials are explicitly exempted from such forms of <a href="/wiki/Data_sharing" title="Data sharing">data sharing</a> with the ISNU.<sup id="cite_ref-israelnsa1_116-1" class="reference"><a href="#cite_note-israelnsa1-116"><span class="cite-bracket">[</span>116<span class="cite-bracket">]</span></a></sup> As stated in a memorandum detailing the rules of data sharing on U.S. citizens, the ISNU is obligated to: </p> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1244412712"><blockquote class="templatequote"><p>Destroy upon recognition any communication contained in raw <a href="/wiki/Signals_intelligence" title="Signals intelligence">SIGINT</a> provided by NSA that is either to or from an official of the U.S. government. "U.S. government officials" include officials of the Executive Branch (including <a href="/wiki/White_House" title="White House">White House</a>, Cabinet Departments, and independent agencies); the <a href="/wiki/United_States_Congress" title="United States Congress">U.S. House of Representatives and Senate</a> (members and staff); and the U.S. Federal Court system (including, but not limited to, the <a href="/wiki/Supreme_Court_of_the_United_States" title="Supreme Court of the United States">Supreme Court</a>). </p><div class="templatequotecite">— <cite><a href="/wiki/File:Israel_Memorandum_of_Understanding_SIGINT.pdf" title="File:Israel Memorandum of Understanding SIGINT.pdf">Memorandum of understanding between the NSA and Israel</a> (circa 2009)</cite></div></blockquote> <p>According to the undated memorandum, the ground rules for intelligence sharing between the NSA and the ISNU were laid out in March 2009.<sup id="cite_ref-israelnsa1_116-2" class="reference"><a href="#cite_note-israelnsa1-116"><span class="cite-bracket">[</span>116<span class="cite-bracket">]</span></a></sup> Under the data sharing agreement, the ISNU is allowed to retain the identities of U.S. citizens (excluding U.S. government officials) for up to a year.<sup id="cite_ref-israelnsa1_116-3" class="reference"><a href="#cite_note-israelnsa1-116"><span class="cite-bracket">[</span>116<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Japan">Japan</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=24" title="Edit section: Japan"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In 2011, the NSA asked the Japanese government to intercept underwater fibre-optic cables carrying phone and Internet data in the <a href="/wiki/Asia-Pacific" class="mw-redirect" title="Asia-Pacific">Asia-Pacific</a> region. However, the Japanese government refused to comply.<sup id="cite_ref-117" class="reference"><a href="#cite_note-117"><span class="cite-bracket">[</span>117<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Libya">Libya</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=25" title="Edit section: Libya"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Under the reign of <a href="/wiki/Muammar_Gaddafi" title="Muammar Gaddafi">Muammar Gaddafi</a>, the Libyan regime forged a partnership with Britain's secret service <a href="/wiki/MI6" title="MI6">MI6</a> and the U.S. <a href="/wiki/Central_Intelligence_Agency" title="Central Intelligence Agency">Central Intelligence Agency</a> (CIA) to obtain information about Libyan dissidents living in the United States and Canada. In exchange, Gaddafi allowed the Western democracies to use Libya as a base for <a href="/wiki/Extraordinary_renditions" class="mw-redirect" title="Extraordinary renditions">extraordinary renditions</a>.<sup id="cite_ref-118" class="reference"><a href="#cite_note-118"><span class="cite-bracket">[</span>118<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-119" class="reference"><a href="#cite_note-119"><span class="cite-bracket">[</span>119<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-120" class="reference"><a href="#cite_note-120"><span class="cite-bracket">[</span>120<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-121" class="reference"><a href="#cite_note-121"><span class="cite-bracket">[</span>121<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-122" class="reference"><a href="#cite_note-122"><span class="cite-bracket">[</span>122<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Netherlands">Netherlands</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=26" title="Edit section: Netherlands"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The <a href="/wiki/Algemene_Inlichtingen_en_Veiligheidsdienst" class="mw-redirect" title="Algemene Inlichtingen en Veiligheidsdienst">Algemene Inlichtingen en Veiligheidsdienst</a> (<b>AIVD</b>) of the Netherlands has been receiving and storing data of Internet users gathered by U.S. intelligence sources such as the NSA's <b><a href="/wiki/PRISM_(surveillance_program)" class="mw-redirect" title="PRISM (surveillance program)">PRISM</a></b> surveillance program.<sup id="cite_ref-123" class="reference"><a href="#cite_note-123"><span class="cite-bracket">[</span>123<span class="cite-bracket">]</span></a></sup> During a meeting in February 2013, the AIVD and the <a href="/wiki/Dutch_Military_Intelligence_and_Security_Service" title="Dutch Military Intelligence and Security Service">MIVD</a> briefed the NSA on their attempts to hack <a href="/wiki/Internet_forums" class="mw-redirect" title="Internet forums">Internet forums</a> and to collect the data of all users using a technology known as <a href="/w/index.php?title=Computer_Network_Exploitation&action=edit&redlink=1" class="new" title="Computer Network Exploitation (page does not exist)">Computer Network Exploitation</a> (CNE).<sup id="cite_ref-124" class="reference"><a href="#cite_note-124"><span class="cite-bracket">[</span>124<span class="cite-bracket">]</span></a></sup> </p> <ul class="gallery mw-gallery-traditional"> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:Notes_for_Dutch_SIGINT-Cyber_Analytic_Exchange.jpg" class="mw-file-description" title="Summary of a meeting held in February 2013 between the NSA and the Dutch intelligence services AIVD and MIVD"><img alt="Summary of a meeting held in February 2013 between the NSA and the Dutch intelligence services AIVD and MIVD" src="//upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Notes_for_Dutch_SIGINT-Cyber_Analytic_Exchange.jpg/120px-Notes_for_Dutch_SIGINT-Cyber_Analytic_Exchange.jpg" decoding="async" width="120" height="50" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Notes_for_Dutch_SIGINT-Cyber_Analytic_Exchange.jpg/180px-Notes_for_Dutch_SIGINT-Cyber_Analytic_Exchange.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Notes_for_Dutch_SIGINT-Cyber_Analytic_Exchange.jpg/240px-Notes_for_Dutch_SIGINT-Cyber_Analytic_Exchange.jpg 2x" data-file-width="2580" data-file-height="1068" /></a></span></div> <div class="gallerytext">Summary of a meeting held in February 2013 between the NSA and the Dutch intelligence services <a href="/wiki/Algemene_Inlichtingen_en_Veiligheidsdienst" class="mw-redirect" title="Algemene Inlichtingen en Veiligheidsdienst">AIVD</a> and <a href="/wiki/Dutch_Military_Intelligence_and_Security_Service" title="Dutch Military Intelligence and Security Service">MIVD</a></div> </li> </ul> <div class="mw-heading mw-heading3"><h3 id="Norway">Norway</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=27" title="Edit section: Norway"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The <a href="/wiki/Norwegian_Intelligence_Service" title="Norwegian Intelligence Service">Norwegian Intelligence Service</a> (<b>NIS</b>) has confirmed that data collected by the agency is "shared with the Americans".<sup id="cite_ref-125" class="reference"><a href="#cite_note-125"><span class="cite-bracket">[</span>125<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Kjell_Grandhagen" title="Kjell Grandhagen">Kjell Grandhagen</a>, head of Norwegian military intelligence told reporters at a news conference that "We share this information with partners, and partners share with us ... We are talking about huge amounts of traffic data".<sup id="cite_ref-126" class="reference"><a href="#cite_note-126"><span class="cite-bracket">[</span>126<span class="cite-bracket">]</span></a></sup> </p><p>In cooperation with the NSA, the NIS has gained access to Russian targets in the <a href="/wiki/Kola_Peninsula" title="Kola Peninsula">Kola Peninsula</a> and other civilian targets. In general, the NIS provides information to the NSA about "Politicians", "Energy" and "Armament".<sup id="cite_ref-127" class="reference"><a href="#cite_note-127"><span class="cite-bracket">[</span>127<span class="cite-bracket">]</span></a></sup> A <a href="/wiki/Classified_information#Top_Secret_(TS)" title="Classified information">top secret</a> memo of the NSA lists the following years as milestones of the <b>Norway-United States of America SIGNT agreement</b>, or NORUS Agreement: </p> <ul><li><b>1952</b> – Informal starting year of cooperation between the NIS and the NSA<sup id="cite_ref-norwaynsa_128-0" class="reference"><a href="#cite_note-norwaynsa-128"><span class="cite-bracket">[</span>128<span class="cite-bracket">]</span></a></sup></li> <li><b>1954</b> – Formalization of the NORUS Agreement<sup id="cite_ref-norwaynsa_128-1" class="reference"><a href="#cite_note-norwaynsa-128"><span class="cite-bracket">[</span>128<span class="cite-bracket">]</span></a></sup></li> <li><b>1963</b> – Extension of the agreement for coverage of <a href="/wiki/Foreign_instrumentation_signals_intelligence" title="Foreign instrumentation signals intelligence">foreign instrumentation signals intelligence</a> (FISINT)<sup id="cite_ref-norwaynsa_128-2" class="reference"><a href="#cite_note-norwaynsa-128"><span class="cite-bracket">[</span>128<span class="cite-bracket">]</span></a></sup></li> <li><b>1970</b> – Extension of the agreement for coverage of <a href="/wiki/Electronic_intelligence" class="mw-redirect" title="Electronic intelligence">electronic intelligence</a> (ELINT)<sup id="cite_ref-norwaynsa_128-3" class="reference"><a href="#cite_note-norwaynsa-128"><span class="cite-bracket">[</span>128<span class="cite-bracket">]</span></a></sup></li> <li><b>1994</b> – Extension of the agreement for coverage of <a href="/wiki/Communications_intelligence" class="mw-redirect" title="Communications intelligence">communications intelligence</a> (COMINT)<sup id="cite_ref-norwaynsa_128-4" class="reference"><a href="#cite_note-norwaynsa-128"><span class="cite-bracket">[</span>128<span class="cite-bracket">]</span></a></sup></li></ul> <p>The NSA perceives the NIS as one of its most reliable partners. Both agencies also cooperate to crack the encryption systems of mutual targets. According to the NSA, Norway has made no objections to its requests.<sup id="cite_ref-norwaynsa_128-5" class="reference"><a href="#cite_note-norwaynsa-128"><span class="cite-bracket">[</span>128<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Singapore">Singapore</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=28" title="Edit section: Singapore"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The <a href="/wiki/Ministry_of_Defence_(Singapore)" title="Ministry of Defence (Singapore)">Defence Ministry of Singapore</a> and its <a href="/wiki/Security_and_Intelligence_Division" title="Security and Intelligence Division">Security and Intelligence Division</a> (SID) have been secretly intercepting much of the fibre optic cable traffic passing through the Asian continent. In close cooperation with the <a href="/wiki/Australian_Signals_Directorate" title="Australian Signals Directorate">Australian Signals Directorate</a> (ASD/DSD), Singapore's SID has been able to intercept <a href="/wiki/SEA-ME-WE_3" title="SEA-ME-WE 3">SEA-ME-WE 3</a> (Southeast Asia-Middle East-Western Europe 3) as well as <a href="/wiki/SEA-ME-WE_4" title="SEA-ME-WE 4">SEA-ME-WE 4</a> <a href="/wiki/Telecommunications_cable" title="Telecommunications cable">telecommunications cables</a>.<sup id="cite_ref-philipsg_98-1" class="reference"><a href="#cite_note-philipsg-98"><span class="cite-bracket">[</span>98<span class="cite-bracket">]</span></a></sup> Access to these international telecommunications channels is facilitated by Singapore's government-owned operator, <a href="/wiki/SingTel" class="mw-redirect" title="SingTel">SingTel</a>.<sup id="cite_ref-philipsg_98-2" class="reference"><a href="#cite_note-philipsg-98"><span class="cite-bracket">[</span>98<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Temasek_Holdings" class="mw-redirect" title="Temasek Holdings">Temasek Holdings</a>, a multibillion-dollar <a href="/wiki/Sovereign_wealth_fund" title="Sovereign wealth fund">sovereign wealth fund</a> with a majority stake in SingTel, has maintained close relations with the country's intelligence agencies.<sup id="cite_ref-philipsg_98-3" class="reference"><a href="#cite_note-philipsg-98"><span class="cite-bracket">[</span>98<span class="cite-bracket">]</span></a></sup> </p><p>Information gathered by the <a href="/wiki/Government_of_Singapore" title="Government of Singapore">Government of Singapore</a> is transferred to the <a href="/wiki/Government_of_Australia" class="mw-redirect" title="Government of Australia">Government of Australia</a> as part of an intelligence sharing agreement. This allows the "<a href="/wiki/UKUSA_Agreement" title="UKUSA Agreement">Five Eyes</a>" to maintain a "stranglehold on communications across the <a href="/wiki/Eastern_Hemisphere" title="Eastern Hemisphere">Eastern Hemisphere</a>".<sup id="cite_ref-smhaug28_88-1" class="reference"><a href="#cite_note-smhaug28-88"><span class="cite-bracket">[</span>88<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Spain">Spain</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=29" title="Edit section: Spain"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In close cooperation with the <a href="/wiki/National_Intelligence_Centre_(Spain)" title="National Intelligence Centre (Spain)">Centro Nacional de Inteligencia</a> (CNI), the NSA intercepted 60.5 million phone calls in Spain in a single month.<sup id="cite_ref-129" class="reference"><a href="#cite_note-129"><span class="cite-bracket">[</span>129<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-130" class="reference"><a href="#cite_note-130"><span class="cite-bracket">[</span>130<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Sweden">Sweden</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=30" title="Edit section: Sweden"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The <a href="/wiki/F%C3%B6rsvarets_radioanstalt" class="mw-redirect" title="Försvarets radioanstalt">Försvarets radioanstalt</a> (FRA) of Sweden (codenamed <b>Sardines</b>)<sup id="cite_ref-SvenskaDagbladet109_131-0" class="reference"><a href="#cite_note-SvenskaDagbladet109-131"><span class="cite-bracket">[</span>131<span class="cite-bracket">]</span></a></sup> has allowed the "<b><a href="/wiki/UKUSA_Agreement" title="UKUSA Agreement">Five Eyes</a></b>" to access underwater cables in the <a href="/wiki/Baltic_Sea" title="Baltic Sea">Baltic Sea</a>.<sup id="cite_ref-SvenskaDagbladet109_131-1" class="reference"><a href="#cite_note-SvenskaDagbladet109-131"><span class="cite-bracket">[</span>131<span class="cite-bracket">]</span></a></sup> On 5 December 2013, <a href="/wiki/Sveriges_Television" title="Sveriges Television">Sveriges Television</a> (<i>Swedish Television</i>) revealed that the FRA has been conducting a clandestine surveillance operation targeting the internal politics of Russia. The operation was conducted on behalf of the NSA, which receives data handed over to it by the FRA.<sup id="cite_ref-132" class="reference"><a href="#cite_note-132"><span class="cite-bracket">[</span>132<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-133" class="reference"><a href="#cite_note-133"><span class="cite-bracket">[</span>133<span class="cite-bracket">]</span></a></sup> </p><p>According to documents leaked by Snowden, the FRA of Sweden has been granted access to the NSA's international surveillance program <b><a href="/wiki/XKeyscore" title="XKeyscore">XKeyscore</a></b>.<sup id="cite_ref-svtsnowd1_134-0" class="reference"><a href="#cite_note-svtsnowd1-134"><span class="cite-bracket">[</span>134<span class="cite-bracket">]</span></a></sup> </p> <ul class="gallery mw-gallery-traditional"> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:Nsa-internal-pm-on-fra-and-sweden-relations.pdf" class="mw-file-description" title="The NSA's relationship with Sweden's FRA under the UKUSA Agreement"><img alt="The NSA's relationship with Sweden's FRA under the UKUSA Agreement" src="//upload.wikimedia.org/wikipedia/commons/thumb/a/a7/Nsa-internal-pm-on-fra-and-sweden-relations.pdf/page1-85px-Nsa-internal-pm-on-fra-and-sweden-relations.pdf.jpg" decoding="async" width="85" height="120" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/a/a7/Nsa-internal-pm-on-fra-and-sweden-relations.pdf/page1-127px-Nsa-internal-pm-on-fra-and-sweden-relations.pdf.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/a/a7/Nsa-internal-pm-on-fra-and-sweden-relations.pdf/page1-169px-Nsa-internal-pm-on-fra-and-sweden-relations.pdf.jpg 2x" data-file-width="1239" data-file-height="1754" /></a></span></div> <div class="gallerytext">The NSA's relationship with Sweden's <a href="/wiki/National_Defence_Radio_Establishment_(Sweden)" class="mw-redirect" title="National Defence Radio Establishment (Sweden)">FRA</a> under the <a href="/wiki/UKUSA_Agreement" title="UKUSA Agreement">UKUSA Agreement</a></div> </li> </ul> <div class="mw-heading mw-heading3"><h3 id="Switzerland">Switzerland</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=31" title="Edit section: Switzerland"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The <a href="/wiki/Swiss_intelligence_agencies#Federal_Intelligence_Service" title="Swiss intelligence agencies">Federal Intelligence Service</a> (NDB) of Switzerland exchanges information with the NSA regularly, on the basis of a secret agreement to circumvent domestic surveillance restrictions.<sup id="cite_ref-handelszeitungswiss_135-0" class="reference"><a href="#cite_note-handelszeitungswiss-135"><span class="cite-bracket">[</span>135<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-scherizamsonntag_136-0" class="reference"><a href="#cite_note-scherizamsonntag-136"><span class="cite-bracket">[</span>136<span class="cite-bracket">]</span></a></sup> In addition, the NSA has been granted access to Swiss surveillance facilities in <a href="/wiki/Leuk" title="Leuk">Leuk</a> (<a href="/wiki/Cantons_of_Switzerland" title="Cantons of Switzerland">canton</a> of <a href="/wiki/Valais" title="Valais">Valais</a>) and <a href="/wiki/Kirchlindach" title="Kirchlindach">Herrenschwanden</a> (canton of <a href="/wiki/Bern_(canton)" class="mw-redirect" title="Bern (canton)">Bern</a>), which are part of the Swiss surveillance program <b><a href="/wiki/Onyx_(interception_system)" title="Onyx (interception system)">Onyx</a></b>.<sup id="cite_ref-handelszeitungswiss_135-1" class="reference"><a href="#cite_note-handelszeitungswiss-135"><span class="cite-bracket">[</span>135<span class="cite-bracket">]</span></a></sup> </p><p>According to the NDB, the agency maintains working relationships with about 100 international organizations. However, the NDB has denied any form of cooperation with the NSA.<sup id="cite_ref-swfnsa_137-0" class="reference"><a href="#cite_note-swfnsa-137"><span class="cite-bracket">[</span>137<span class="cite-bracket">]</span></a></sup> Although the NSA does not have direct access to Switzerland's <a href="/wiki/Onyx_(interception_system)" title="Onyx (interception system)">Onyx</a> surveillance program, the Director of the NDB acknowledged that it is possible for other U.S. intelligence agencies to gain access to Switzerland's surveillance system.<sup id="cite_ref-swfnsa_137-1" class="reference"><a href="#cite_note-swfnsa-137"><span class="cite-bracket">[</span>137<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="United_Kingdom">United Kingdom</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=32" title="Edit section: United Kingdom"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Mass_surveillance_in_the_United_Kingdom" title="Mass surveillance in the United Kingdom">Mass surveillance in the United Kingdom</a></div> <p>The British government allowed the NSA to store personal data of British citizens.<sup id="cite_ref-138" class="reference"><a href="#cite_note-138"><span class="cite-bracket">[</span>138<span class="cite-bracket">]</span></a></sup> </p><p>Under <a href="/wiki/Project_MINARET" title="Project MINARET">Project MINARET</a>, anti-<a href="/wiki/Vietnam_War" title="Vietnam War">Vietnam War</a> dissidents in the United States were jointly targeted by the GCHQ and the NSA.<sup id="cite_ref-139" class="reference"><a href="#cite_note-139"><span class="cite-bracket">[</span>139<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-140" class="reference"><a href="#cite_note-140"><span class="cite-bracket">[</span>140<span class="cite-bracket">]</span></a></sup> </p> <ul class="gallery mw-gallery-traditional"> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:Menwith-hill-radomes.jpg" class="mw-file-description" title="RAF Menwith Hill, near Harrogate, North Yorkshire, is the biggest listening post outside the United States. It was used by U.S. military personnel to spy on Britons on behalf of MI5 and MI6.[141]"><img alt="RAF Menwith Hill, near Harrogate, North Yorkshire, is the biggest listening post outside the United States. It was used by U.S. military personnel to spy on Britons on behalf of MI5 and MI6.[141]" src="//upload.wikimedia.org/wikipedia/commons/thumb/e/e0/Menwith-hill-radomes.jpg/120px-Menwith-hill-radomes.jpg" decoding="async" width="120" height="90" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/e/e0/Menwith-hill-radomes.jpg/180px-Menwith-hill-radomes.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/e/e0/Menwith-hill-radomes.jpg/240px-Menwith-hill-radomes.jpg 2x" data-file-width="2048" data-file-height="1536" /></a></span></div> <div class="gallerytext"><a href="/wiki/RAF_Menwith_Hill" title="RAF Menwith Hill">RAF Menwith Hill</a>, near <a href="/wiki/Harrogate,_North_Yorkshire" class="mw-redirect" title="Harrogate, North Yorkshire">Harrogate, North Yorkshire</a>, is the biggest listening post outside the United States. It was used by U.S. military personnel to spy on Britons on behalf of <a href="/wiki/MI5" title="MI5">MI5</a> and <a href="/wiki/MI6" title="MI6">MI6</a>.<sup id="cite_ref-141" class="reference"><a href="#cite_note-141"><span class="cite-bracket">[</span>141<span class="cite-bracket">]</span></a></sup></div> </li> </ul> <div class="mw-heading mw-heading3"><h3 id="United_States">United States</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=33" title="Edit section: United States"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1246091330"><table class="sidebar sidebar-collapse nomobile nowraplinks"><tbody><tr><th class="sidebar-title"><span typeof="mw:File"><a href="/wiki/File:Seal_of_the_U.S._National_Security_Agency.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/8/8d/Seal_of_the_U.S._National_Security_Agency.svg/80px-Seal_of_the_U.S._National_Security_Agency.svg.png" decoding="async" width="80" height="80" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/8/8d/Seal_of_the_U.S._National_Security_Agency.svg/120px-Seal_of_the_U.S._National_Security_Agency.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/8/8d/Seal_of_the_U.S._National_Security_Agency.svg/160px-Seal_of_the_U.S._National_Security_Agency.svg.png 2x" data-file-width="718" data-file-height="718" /></a></span><br /><a href="/wiki/National_Security_Agency" title="National Security Agency">National Security Agency</a> surveillance</th></tr><tr><td class="sidebar-image"><span typeof="mw:File"><a href="/wiki/File:Boundless_Informant_data_collection_-_DNI.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/8/89/Boundless_Informant_data_collection_-_DNI.svg/240px-Boundless_Informant_data_collection_-_DNI.svg.png" decoding="async" width="240" height="102" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/8/89/Boundless_Informant_data_collection_-_DNI.svg/360px-Boundless_Informant_data_collection_-_DNI.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/8/89/Boundless_Informant_data_collection_-_DNI.svg/480px-Boundless_Informant_data_collection_-_DNI.svg.png 2x" data-file-width="842" data-file-height="358" /></a></span><div class="sidebar-caption"><a href="/wiki/Boundless_Informant" title="Boundless Informant">Map of global NSA data collection</a> as of 2007<sup class="plainlinks noexcerpt noprint asof-tag update" style="display:none;"><a class="external text" href="https://en.wikipedia.org/w/index.php?title=Global_surveillance&action=edit">[update]</a></sup>, with countries subject to the most data collection shown in red</div></td></tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Programs</div><div class="sidebar-list-content mw-collapsible-content hlist"> <dl><dt>Pre-1978</dt></dl> <ul><li><a href="/wiki/ECHELON" title="ECHELON">ECHELON</a></li> <li><a href="/wiki/Project_MINARET" title="Project MINARET">MINARET</a></li> <li><a href="/wiki/Project_SHAMROCK" title="Project SHAMROCK">SHAMROCK</a></li> <li><a href="/wiki/PROMIS_(intelligence_software)" class="mw-redirect" title="PROMIS (intelligence software)">PROMIS</a></li></ul> <dl><dt>Since 1978</dt></dl> <ul><li><a href="/wiki/Upstream_collection" title="Upstream collection">Upstream collection</a></li> <li><a href="/wiki/Blarney_(code_name)" title="Blarney (code name)">BLARNEY</a></li> <li><a href="/wiki/Fairview_(surveillance_program)" title="Fairview (surveillance program)">FAIRVIEW</a></li> <li><a href="/wiki/Main_Core" title="Main Core">Main Core</a></li> <li><a href="/wiki/ThinThread" title="ThinThread">ThinThread</a></li> <li><a href="/wiki/Project_Genoa" title="Project Genoa">Genoa</a></li></ul> <dl><dt>Since 1990</dt></dl> <ul><li><a href="/wiki/RAMPART-A" title="RAMPART-A">RAMPART-A</a></li></ul> <dl><dt>Since 1998</dt></dl> <ul><li><a href="/wiki/Tailored_Access_Operations" title="Tailored Access Operations">Tailored Access Operations</a></li></ul> <dl><dt>Since 2001</dt></dl> <ul><li><a href="/wiki/OAKSTAR" title="OAKSTAR">OAKSTAR</a></li> <li><a href="/wiki/STORMBREW" title="STORMBREW">STORMBREW</a></li> <li><a href="/wiki/Trailblazer_Project" title="Trailblazer Project">Trailblazer</a></li> <li><a href="/wiki/Turbulence_(NSA)" title="Turbulence (NSA)">Turbulence</a></li> <li><a href="/wiki/Project_Genoa_II" title="Project Genoa II">Genoa II</a></li> <li><a href="/wiki/Total_Information_Awareness" title="Total Information Awareness">Total Information Awareness</a></li> <li><a href="/wiki/President%27s_Surveillance_Program" title="President's Surveillance Program">President's Surveillance Program</a> <ul><li><a href="/wiki/Terrorist_Surveillance_Program" title="Terrorist Surveillance Program">Terrorist Surveillance Program</a></li></ul></li></ul> <dl><dt>Since 2007</dt></dl> <ul><li><a href="/wiki/PRISM" title="PRISM">PRISM</a></li> <li><a href="/wiki/Dropmire" title="Dropmire">Dropmire</a></li> <li><a href="/wiki/Stateroom_(surveillance_program)" title="Stateroom (surveillance program)">Stateroom</a></li> <li><a href="/wiki/Bullrun_(decryption_program)" title="Bullrun (decryption program)">Bullrun</a></li> <li><a href="/wiki/MYSTIC_(surveillance_program)" class="mw-redirect" title="MYSTIC (surveillance program)">MYSTIC</a></li></ul> <dl><dt>Databases, tools etc.</dt></dl> <ul><li><a href="/wiki/PINWALE" class="mw-redirect" title="PINWALE">PINWALE</a></li> <li><a href="/wiki/MARINA" title="MARINA">MARINA</a></li> <li><a href="/wiki/Main_Core" title="Main Core">Main Core</a></li> <li><a href="/wiki/MAINWAY" title="MAINWAY">MAINWAY</a></li> <li><a href="/wiki/TRAFFICTHIEF" title="TRAFFICTHIEF">TRAFFICTHIEF</a></li> <li><a href="/wiki/Dishfire" title="Dishfire">DISHFIRE</a></li> <li><a href="/wiki/XKeyscore" title="XKeyscore">XKeyscore</a></li> <li><a href="/wiki/ICREACH" title="ICREACH">ICREACH</a></li> <li><a href="/wiki/Boundless_Informant" title="Boundless Informant">BOUNDLESSINFORMANT</a></li></ul> <dl><dt>GCHQ collaboration</dt></dl> <ul><li><a href="/wiki/MUSCULAR_(surveillance_program)" class="mw-redirect" title="MUSCULAR (surveillance program)">MUSCULAR</a></li> <li><a href="/wiki/Tempora" title="Tempora">Tempora</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Legislation</div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Omnibus_Crime_Control_and_Safe_Streets_Act_of_1968#Wiretaps" title="Omnibus Crime Control and Safe Streets Act of 1968">Safe Streets Act</a></li> <li><a href="/wiki/Privacy_Act_of_1974" title="Privacy Act of 1974">Privacy Act of 1974</a></li> <li><a href="/wiki/Foreign_Intelligence_Surveillance_Act" title="Foreign Intelligence Surveillance Act">FISA</a></li> <li><a href="/wiki/Electronic_Communications_Privacy_Act" title="Electronic Communications Privacy Act">ECPA</a></li> <li><a href="/wiki/Patriot_Act" title="Patriot Act">Patriot Act</a></li> <li><a href="/wiki/Homeland_Security_Act" class="mw-redirect" title="Homeland Security Act">Homeland Security Act</a></li> <li><a href="/wiki/Protect_America_Act_of_2007" title="Protect America Act of 2007">Protect America Act of 2007</a></li> <li><a href="/wiki/Foreign_Intelligence_Surveillance_Act_of_1978_Amendments_Act_of_2008" class="mw-redirect" title="Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008">FISA Amendments Act of 2008</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Institutions</div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Foreign_Intelligence_Surveillance_Court" class="mw-redirect" title="Foreign Intelligence Surveillance Court">FISC</a></li> <li><a href="/wiki/Senate_Intelligence_Committee" class="mw-redirect" title="Senate Intelligence Committee">Senate Intelligence Committee</a></li> <li><a href="/wiki/United_States_National_Security_Council" title="United States National Security Council">National Security Council</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Lawsuits</div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/American_Civil_Liberties_Union_v._National_Security_Agency" title="American Civil Liberties Union v. National Security Agency">ACLU v. NSA</a></li> <li><a href="/wiki/Hepting_v._AT%26T" title="Hepting v. AT&T">Hepting v. AT&T</a></li> <li><a href="/wiki/Jewel_v._NSA" class="mw-redirect" title="Jewel v. NSA">Jewel v. NSA</a></li> <li><a href="/wiki/Clapper_v._Amnesty_International" class="mw-redirect" title="Clapper v. Amnesty International">Clapper v. Amnesty</a></li> <li><a href="/wiki/Klayman_v._Obama" title="Klayman v. Obama">Klayman v. Obama</a></li> <li><a href="/wiki/ACLU_v._Clapper" class="mw-redirect" title="ACLU v. Clapper">ACLU v. Clapper</a></li> <li><a href="/wiki/Wikimedia_v._NSA" class="mw-redirect" title="Wikimedia v. NSA">Wikimedia v. NSA</a></li> <li><a href="/wiki/United_States_v._Moalin" title="United States v. Moalin">US v. Moalin</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Whistleblowers</div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/William_Binney_(U.S._intelligence_official)" class="mw-redirect" title="William Binney (U.S. intelligence official)">William Binney</a></li> <li><a href="/wiki/Thomas_Andrews_Drake" class="mw-redirect" title="Thomas Andrews Drake">Thomas Drake</a></li> <li><a href="/wiki/Mark_Klein" title="Mark Klein">Mark Klein</a></li> <li><a href="/wiki/Thomas_Tamm" title="Thomas Tamm">Thomas Tamm</a></li> <li><a href="/wiki/Russ_Tice" title="Russ Tice">Russ Tice</a></li> <li><a href="/wiki/Edward_Snowden" title="Edward Snowden">Edward Snowden</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Publication</div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/NSA_warrantless_surveillance_(2001%E2%80%9307)" class="mw-redirect" title="NSA warrantless surveillance (2001–07)">2005 warrantless surveillance scandal</a></li> <li><a href="/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)" class="mw-redirect" title="Global surveillance disclosures (2013–present)">Global surveillance disclosures (2013–present)</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Related</div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Cablegate" class="mw-redirect" title="Cablegate">Cablegate</a></li> <li><a href="/wiki/2013_Department_of_Justice_investigations_of_reporters" class="mw-redirect" title="2013 Department of Justice investigations of reporters">Surveillance of reporters</a></li> <li><a href="/wiki/Mail_Isolation_Control_and_Tracking" title="Mail Isolation Control and Tracking">Mail tracking</a></li> <li><a href="/wiki/Spying_on_United_Nations_leaders_by_United_States_diplomats" class="mw-redirect" title="Spying on United Nations leaders by United States diplomats">UN diplomatic spying</a></li> <li><a href="/wiki/Insider_Threat_Program" title="Insider Threat Program">Insider Threat Program</a></li> <li><a href="/wiki/Mass_surveillance_in_the_United_States" title="Mass surveillance in the United States">Mass surveillance in the United States</a></li> <li><a href="/wiki/Mass_surveillance_in_the_United_Kingdom" title="Mass surveillance in the United Kingdom">Mass surveillance in the United Kingdom</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Concepts</div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Signals_intelligence" title="Signals intelligence">SIGINT</a></li> <li><a href="/wiki/Metadata" title="Metadata">Metadata</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Collaboration</div><div class="sidebar-list-content mw-collapsible-content hlist"> <dl><dt>United States</dt></dl> <ul><li><span typeof="mw:File"><a href="/wiki/File:US-CentralSecurityService-Seal.svg" class="mw-file-description" title="Central Security Service"><img alt="Central Security Service" src="//upload.wikimedia.org/wikipedia/commons/thumb/6/6a/US-CentralSecurityService-Seal.svg/20px-US-CentralSecurityService-Seal.svg.png" decoding="async" width="20" height="20" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/6/6a/US-CentralSecurityService-Seal.svg/30px-US-CentralSecurityService-Seal.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/6/6a/US-CentralSecurityService-Seal.svg/40px-US-CentralSecurityService-Seal.svg.png 2x" data-file-width="728" data-file-height="728" /></a></span> <a href="/wiki/Central_Security_Service" title="Central Security Service">CSS</a></li> <li><span typeof="mw:File"><a href="/wiki/File:Seal_of_the_United_States_Cyber_Command.svg" class="mw-file-description" title="United States Cyber Command"><img alt="United States Cyber Command" src="//upload.wikimedia.org/wikipedia/commons/thumb/8/87/Seal_of_the_United_States_Cyber_Command.svg/20px-Seal_of_the_United_States_Cyber_Command.svg.png" decoding="async" width="20" height="20" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/8/87/Seal_of_the_United_States_Cyber_Command.svg/30px-Seal_of_the_United_States_Cyber_Command.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/8/87/Seal_of_the_United_States_Cyber_Command.svg/40px-Seal_of_the_United_States_Cyber_Command.svg.png 2x" data-file-width="603" data-file-height="603" /></a></span> <a href="/wiki/United_States_Cyber_Command" title="United States Cyber Command">CYBERCOM</a></li> <li><span typeof="mw:File"><a href="/wiki/File:Seal_of_the_United_States_Department_of_Justice.svg" class="mw-file-description" title="Department of Justice"><img alt="Department of Justice" src="//upload.wikimedia.org/wikipedia/commons/thumb/5/54/Seal_of_the_United_States_Department_of_Justice.svg/20px-Seal_of_the_United_States_Department_of_Justice.svg.png" decoding="async" width="20" height="20" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/5/54/Seal_of_the_United_States_Department_of_Justice.svg/30px-Seal_of_the_United_States_Department_of_Justice.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/5/54/Seal_of_the_United_States_Department_of_Justice.svg/40px-Seal_of_the_United_States_Department_of_Justice.svg.png 2x" data-file-width="720" data-file-height="720" /></a></span> <a href="/wiki/United_States_Department_of_Justice" title="United States Department of Justice">DOJ</a></li> <li><span typeof="mw:File"><a href="/wiki/File:Seal_of_the_Federal_Bureau_of_Investigation.svg" class="mw-file-description" title="Federal Bureau of Investigation"><img alt="Federal Bureau of Investigation" src="//upload.wikimedia.org/wikipedia/commons/thumb/d/da/Seal_of_the_Federal_Bureau_of_Investigation.svg/20px-Seal_of_the_Federal_Bureau_of_Investigation.svg.png" decoding="async" width="20" height="21" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/d/da/Seal_of_the_Federal_Bureau_of_Investigation.svg/30px-Seal_of_the_Federal_Bureau_of_Investigation.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/d/da/Seal_of_the_Federal_Bureau_of_Investigation.svg/40px-Seal_of_the_Federal_Bureau_of_Investigation.svg.png 2x" data-file-width="699" data-file-height="720" /></a></span> <a href="/wiki/Federal_Bureau_of_Investigation" title="Federal Bureau of Investigation">FBI</a></li> <li><span typeof="mw:File"><a href="/wiki/File:Seal_of_the_Central_Intelligence_Agency.svg" class="mw-file-description" title="Central Intelligence Agency"><img alt="Central Intelligence Agency" src="//upload.wikimedia.org/wikipedia/commons/thumb/2/25/Seal_of_the_Central_Intelligence_Agency.svg/20px-Seal_of_the_Central_Intelligence_Agency.svg.png" decoding="async" width="20" height="20" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/2/25/Seal_of_the_Central_Intelligence_Agency.svg/30px-Seal_of_the_Central_Intelligence_Agency.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/2/25/Seal_of_the_Central_Intelligence_Agency.svg/40px-Seal_of_the_Central_Intelligence_Agency.svg.png 2x" data-file-width="510" data-file-height="510" /></a></span> <a href="/wiki/Central_Intelligence_Agency" title="Central Intelligence Agency">CIA</a></li> <li><span typeof="mw:File"><a href="/wiki/File:Seal_of_the_United_States_Department_of_Homeland_Security.svg" class="mw-file-description" title="Department of Homeland Security"><img alt="Department of Homeland Security" src="//upload.wikimedia.org/wikipedia/commons/thumb/8/8a/Seal_of_the_United_States_Department_of_Homeland_Security.svg/20px-Seal_of_the_United_States_Department_of_Homeland_Security.svg.png" decoding="async" width="20" height="20" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/8/8a/Seal_of_the_United_States_Department_of_Homeland_Security.svg/30px-Seal_of_the_United_States_Department_of_Homeland_Security.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/8/8a/Seal_of_the_United_States_Department_of_Homeland_Security.svg/40px-Seal_of_the_United_States_Department_of_Homeland_Security.svg.png 2x" data-file-width="247" data-file-height="247" /></a></span> <a href="/wiki/Department_of_Homeland_Security" class="mw-redirect" title="Department of Homeland Security">DHS</a></li> <li><span typeof="mw:File"><a href="/wiki/File:IAO-logo.png" class="mw-file-description" title="Information Awareness Office"><img alt="Information Awareness Office" src="//upload.wikimedia.org/wikipedia/commons/thumb/d/d1/IAO-logo.png/20px-IAO-logo.png" decoding="async" width="20" height="20" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/d/d1/IAO-logo.png/30px-IAO-logo.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/d/d1/IAO-logo.png/40px-IAO-logo.png 2x" data-file-width="658" data-file-height="669" /></a></span> <a href="/wiki/Information_Awareness_Office" title="Information Awareness Office">IAO</a></li></ul> <dl><dt><a href="/wiki/Five_Eyes" title="Five Eyes">Five Eyes</a></dt></dl> <ul><li><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><a href="/wiki/Canada" title="Canada"><img alt="Canada" src="//upload.wikimedia.org/wikipedia/commons/thumb/d/d9/Flag_of_Canada_%28Pantone%29.svg/23px-Flag_of_Canada_%28Pantone%29.svg.png" decoding="async" width="23" height="12" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/d/d9/Flag_of_Canada_%28Pantone%29.svg/35px-Flag_of_Canada_%28Pantone%29.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/d/d9/Flag_of_Canada_%28Pantone%29.svg/46px-Flag_of_Canada_%28Pantone%29.svg.png 2x" data-file-width="1200" data-file-height="600" /></a></span></span> <a href="/wiki/Communications_Security_Establishment_Canada" class="mw-redirect" title="Communications Security Establishment Canada">CSEC</a></li> <li><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><a href="/wiki/United_Kingdom" title="United Kingdom"><img alt="United Kingdom" src="//upload.wikimedia.org/wikipedia/en/thumb/a/ae/Flag_of_the_United_Kingdom.svg/23px-Flag_of_the_United_Kingdom.svg.png" decoding="async" width="23" height="12" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/a/ae/Flag_of_the_United_Kingdom.svg/35px-Flag_of_the_United_Kingdom.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/a/ae/Flag_of_the_United_Kingdom.svg/46px-Flag_of_the_United_Kingdom.svg.png 2x" data-file-width="1200" data-file-height="600" /></a></span></span> <a href="/wiki/Government_Communications_Headquarters" class="mw-redirect" title="Government Communications Headquarters">GCHQ</a></li> <li><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><a href="/wiki/Australia" title="Australia"><img alt="Australia" src="//upload.wikimedia.org/wikipedia/commons/thumb/8/88/Flag_of_Australia_%28converted%29.svg/23px-Flag_of_Australia_%28converted%29.svg.png" decoding="async" width="23" height="12" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/8/88/Flag_of_Australia_%28converted%29.svg/35px-Flag_of_Australia_%28converted%29.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/8/88/Flag_of_Australia_%28converted%29.svg/46px-Flag_of_Australia_%28converted%29.svg.png 2x" data-file-width="1280" data-file-height="640" /></a></span></span> <a href="/wiki/Australian_Signals_Directorate" title="Australian Signals Directorate">ASD</a></li> <li><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><a href="/wiki/New_Zealand" title="New Zealand"><img alt="New Zealand" src="//upload.wikimedia.org/wikipedia/commons/thumb/3/3e/Flag_of_New_Zealand.svg/23px-Flag_of_New_Zealand.svg.png" decoding="async" width="23" height="12" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/3/3e/Flag_of_New_Zealand.svg/35px-Flag_of_New_Zealand.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/3/3e/Flag_of_New_Zealand.svg/46px-Flag_of_New_Zealand.svg.png 2x" data-file-width="1200" data-file-height="600" /></a></span></span> <a href="/wiki/Government_Communications_Security_Bureau" title="Government Communications Security Bureau">GCSB</a></li></ul> <dl><dt>Other</dt></dl> <ul><li><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><a href="/wiki/France" title="France"><img alt="France" src="//upload.wikimedia.org/wikipedia/en/thumb/c/c3/Flag_of_France.svg/23px-Flag_of_France.svg.png" decoding="async" width="23" height="15" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/c/c3/Flag_of_France.svg/35px-Flag_of_France.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/c/c3/Flag_of_France.svg/45px-Flag_of_France.svg.png 2x" data-file-width="900" data-file-height="600" /></a></span></span> <a href="/wiki/Direction_G%C3%A9n%C3%A9rale_de_la_S%C3%A9curit%C3%A9_Ext%C3%A9rieure" class="mw-redirect" title="Direction Générale de la Sécurité Extérieure">DGSE</a></li> <li><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><a href="/wiki/Germany" title="Germany"><img alt="Germany" src="//upload.wikimedia.org/wikipedia/en/thumb/b/ba/Flag_of_Germany.svg/23px-Flag_of_Germany.svg.png" decoding="async" width="23" height="14" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/b/ba/Flag_of_Germany.svg/35px-Flag_of_Germany.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/b/ba/Flag_of_Germany.svg/46px-Flag_of_Germany.svg.png 2x" data-file-width="1000" data-file-height="600" /></a></span></span> <a href="/wiki/Bundesnachrichtendienst" class="mw-redirect" title="Bundesnachrichtendienst">BND</a></li></ul></div></div></td> </tr><tr><td class="sidebar-navbar"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:NSA_surveillance" title="Template:NSA surveillance"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:NSA_surveillance" title="Template talk:NSA surveillance"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:NSA_surveillance" title="Special:EditPage/Template:NSA surveillance"><abbr title="Edit this template">e</abbr></a></li></ul></div></td></tr></tbody></table> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Mass_surveillance_in_the_United_States" title="Mass surveillance in the United States">Mass surveillance in the United States</a></div> <dl><dt>Central Intelligence Agency (CIA)</dt></dl> <p>The CIA pays <a href="/wiki/AT%26T" title="AT&T">AT&T</a> more than US$10 million a year to gain access to international phone records, including those of U.S. citizens.<sup id="cite_ref-At5cia_142-0" class="reference"><a href="#cite_note-At5cia-142"><span class="cite-bracket">[</span>142<span class="cite-bracket">]</span></a></sup> </p> <dl><dt>National Security Agency (NSA)</dt></dl> <p>The NSA's <a href="/w/index.php?title=Foreign_Affairs_Directorate&action=edit&redlink=1" class="new" title="Foreign Affairs Directorate (page does not exist)">Foreign Affairs Directorate</a> interacts with foreign intelligence services and members of the <a href="/wiki/Five_Eyes" title="Five Eyes">Five Eyes</a> to implement global surveillance.<sup id="cite_ref-143" class="reference"><a href="#cite_note-143"><span class="cite-bracket">[</span>143<span class="cite-bracket">]</span></a></sup> </p> <dl><dt>Federal Bureau of Investigation (FBI)</dt></dl> <p>The FBI acts as the <a href="https://en.wiktionary.org/wiki/liaison" class="extiw" title="wikt:liaison">liaison</a> between U.S. intelligence agencies and <a href="/wiki/Silicon_Valley" title="Silicon Valley">Silicon Valley</a> giants such as <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a>.<sup id="cite_ref-microsoftencrypt_47-1" class="reference"><a href="#cite_note-microsoftencrypt-47"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup> </p> <dl><dt>Department of Homeland Security (DHS)</dt></dl> <p>In the early 2010s, the <a href="/wiki/United_States_Department_of_Homeland_Security" title="United States Department of Homeland Security">DHS</a> conducted a joint surveillance operation with the FBI to crack down on dissidents of the <a href="/wiki/Occupy_Wall_Street" title="Occupy Wall Street">Occupy Wall Street</a> protest movement.<sup id="cite_ref-144" class="reference"><a href="#cite_note-144"><span class="cite-bracket">[</span>144<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-145" class="reference"><a href="#cite_note-145"><span class="cite-bracket">[</span>145<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-146" class="reference"><a href="#cite_note-146"><span class="cite-bracket">[</span>146<span class="cite-bracket">]</span></a></sup> </p> <dl><dt>Other law enforcement agencies</dt></dl> <p>The NSA supplies domestic intercepts to the <a href="/wiki/Drug_Enforcement_Administration" title="Drug Enforcement Administration">Drug Enforcement Administration</a> (DEA), <a href="/wiki/Internal_Revenue_Service" title="Internal Revenue Service">Internal Revenue Service</a> (IRS), and other law enforcement agencies, who use intercepted data to initiate criminal investigations against US citizens. Federal agents are instructed to "recreate" the investigative trail in order to "cover up" where the information originated.<sup id="cite_ref-reuters3_33-3" class="reference"><a href="#cite_note-reuters3-33"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup> </p> <dl><dt>White House</dt></dl> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><span><video id="mwe_player_0" poster="//upload.wikimedia.org/wikipedia/commons/thumb/7/70/US_President_Barack_Obama%2C_surveillance_activities%2C_June_2013.ogv/220px--US_President_Barack_Obama%2C_surveillance_activities%2C_June_2013.ogv.jpg" controls="" preload="none" data-mw-tmh="" class="mw-file-element" width="220" height="166" data-durationhint="33" data-mwtitle="US_President_Barack_Obama,_surveillance_activities,_June_2013.ogv" data-mwprovider="wikimediacommons" resource="/wiki/File:US_President_Barack_Obama,_surveillance_activities,_June_2013.ogv"><source src="//upload.wikimedia.org/wikipedia/commons/transcoded/7/70/US_President_Barack_Obama%2C_surveillance_activities%2C_June_2013.ogv/US_President_Barack_Obama%2C_surveillance_activities%2C_June_2013.ogv.360p.vp9.webm" type="video/webm; codecs="vp9, opus"" data-transcodekey="360p.vp9.webm" data-width="478" data-height="360" /><source src="//upload.wikimedia.org/wikipedia/commons/transcoded/7/70/US_President_Barack_Obama%2C_surveillance_activities%2C_June_2013.ogv/US_President_Barack_Obama%2C_surveillance_activities%2C_June_2013.ogv.360p.webm" type="video/webm; codecs="vp8, vorbis"" data-transcodekey="360p.webm" data-width="478" data-height="360" /><source src="//upload.wikimedia.org/wikipedia/commons/7/70/US_President_Barack_Obama%2C_surveillance_activities%2C_June_2013.ogv" type="video/ogg; codecs="theora, vorbis"" data-width="478" data-height="360" /><source src="//upload.wikimedia.org/wikipedia/commons/transcoded/7/70/US_President_Barack_Obama%2C_surveillance_activities%2C_June_2013.ogv/US_President_Barack_Obama%2C_surveillance_activities%2C_June_2013.ogv.240p.vp9.webm" type="video/webm; codecs="vp9, opus"" data-transcodekey="240p.vp9.webm" data-width="318" data-height="240" /><track src="https://commons.wikimedia.org/w/api.php?action=timedtext&title=File%3AUS_President_Barack_Obama%2C_surveillance_activities%2C_June_2013.ogv&lang=en&trackformat=vtt&origin=%2A" kind="subtitles" type="text/vtt" srclang="en" label="English (en)" data-dir="ltr" /><track src="https://commons.wikimedia.org/w/api.php?action=timedtext&title=File%3AUS_President_Barack_Obama%2C_surveillance_activities%2C_June_2013.ogv&lang=es&trackformat=vtt&origin=%2A" kind="subtitles" type="text/vtt" srclang="es" label="español (es)" data-dir="ltr" /></video></span><figcaption>U.S. President <a href="/wiki/Barack_Obama" title="Barack Obama">Barack Obama</a> emphasizing the importance of global surveillance to prevent <a href="/wiki/Terrorism" title="Terrorism">terrorist attacks</a></figcaption></figure> <p>Weeks after the <a href="/wiki/September_11_attacks" title="September 11 attacks">September 11 attacks</a>, U.S. President <a href="/wiki/George_W._Bush" title="George W. Bush">George W. Bush</a> signed the <a href="/wiki/Patriot_Act" title="Patriot Act">Patriot Act</a> to ensure no disruption in the government's ability to conduct global surveillance: </p> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1244412712"><blockquote class="templatequote"><p>This new law that I sign today will allow surveillance of all communications used by <a href="/wiki/Terrorism" title="Terrorism">terrorists</a>, including <a href="/wiki/E-mails" class="mw-redirect" title="E-mails">e-mails</a>, the <a href="/wiki/Internet" title="Internet">Internet</a> and <a href="/wiki/Cell_phone" class="mw-redirect" title="Cell phone">cell phones</a>.</p><div class="templatequotecite">— <cite>U.S. President <a href="/wiki/George_W._Bush" title="George W. Bush">George W. Bush</a> on the implementation of the <b><a href="/wiki/Patriot_Act" title="Patriot Act">Patriot Act</a></b> after the <a href="/wiki/September_11_attacks" title="September 11 attacks">September 11 attacks</a><sup id="cite_ref-147" class="reference"><a href="#cite_note-147"><span class="cite-bracket">[</span>147<span class="cite-bracket">]</span></a></sup></cite></div></blockquote> <p>The Patriot Act was extended by U.S. President <a href="/wiki/Barack_Obama" title="Barack Obama">Barack Obama</a> in May 2011 to further extend the federal government's legal authority to conduct additional forms of surveillance such as <a href="/wiki/Roving_wiretap" title="Roving wiretap">roving wiretaps</a>.<sup id="cite_ref-148" class="reference"><a href="#cite_note-148"><span class="cite-bracket">[</span>148<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Commercial_cooperation">Commercial cooperation</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=34" title="Edit section: Commercial cooperation"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Over 70 percent of the <a href="/wiki/United_States_Intelligence_Community" title="United States Intelligence Community">United States Intelligence Community</a>'s budget is earmarked for payment to private firms.<sup id="cite_ref-wapoprivint_149-0" class="reference"><a href="#cite_note-wapoprivint-149"><span class="cite-bracket">[</span>149<span class="cite-bracket">]</span></a></sup> According to <i><a href="/wiki/Forbes" title="Forbes">Forbes</a></i> magazine, the defense technology company <a href="/wiki/Lockheed_Martin" title="Lockheed Martin">Lockheed Martin</a> is currently the US's biggest defense contractor, and it is destined to be the NSA's most powerful commercial partner and biggest contractor in terms of dollar revenue.<sup id="cite_ref-150" class="reference"><a href="#cite_note-150"><span class="cite-bracket">[</span>150<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="AT&T"><span id="AT.26T"></span>AT&T</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=35" title="Edit section: AT&T"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In a joint operation with the NSA, the American telecommunications corporation <b><a href="/wiki/AT%26T" title="AT&T">AT&T</a></b> operates <a href="/wiki/Room_641A" title="Room 641A">Room 641A</a> in the <a href="/wiki/SBC_Communications" class="mw-redirect" title="SBC Communications">SBC Communications</a> building in <a href="/wiki/San_Francisco" title="San Francisco">San Francisco</a> to spy on Internet traffic.<sup id="cite_ref-WiredEvidence_151-0" class="reference"><a href="#cite_note-WiredEvidence-151"><span class="cite-bracket">[</span>151<span class="cite-bracket">]</span></a></sup> The CIA pays <a href="/wiki/AT%26T" title="AT&T">AT&T</a> more than US$10 million a year to gain access to international phone records, including those of U.S. citizens.<sup id="cite_ref-At5cia_142-1" class="reference"><a href="#cite_note-At5cia-142"><span class="cite-bracket">[</span>142<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Booz_Allen_Hamilton">Booz Allen Hamilton</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=36" title="Edit section: Booz Allen Hamilton"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Projects developed by <b><a href="/wiki/Booz_Allen_Hamilton" title="Booz Allen Hamilton">Booz Allen Hamilton</a></b> include the <b>Strategic Innovation Group</b> to identify <a href="/wiki/Terrorism" title="Terrorism">terrorists</a> through social media, on behalf of government agencies.<sup id="cite_ref-boozwapo_152-0" class="reference"><a href="#cite_note-boozwapo-152"><span class="cite-bracket">[</span>152<span class="cite-bracket">]</span></a></sup> During the <a href="/wiki/Fiscal_year" title="Fiscal year">fiscal year</a> of 2013, Booz Allen Hamilton derived 99% of its income from the government, with the largest portion of its revenue coming from the <a href="/wiki/U.S._Army" class="mw-redirect" title="U.S. Army">U.S. Army</a>.<sup id="cite_ref-boozwapo_152-1" class="reference"><a href="#cite_note-boozwapo-152"><span class="cite-bracket">[</span>152<span class="cite-bracket">]</span></a></sup> In 2013, Booz Allen Hamilton was hailed by <a href="/wiki/Bloomberg_Businessweek" title="Bloomberg Businessweek">Bloomberg Businessweek</a> as "the World's Most Profitable Spy Organization".<sup id="cite_ref-153" class="reference"><a href="#cite_note-153"><span class="cite-bracket">[</span>153<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="British_Telecommunications">British Telecommunications</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=37" title="Edit section: British Telecommunications"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><b><a href="/wiki/British_Telecommunications" class="mw-redirect" title="British Telecommunications">British Telecommunications</a></b> (code-named <b>Remedy</b><sup id="cite_ref-btvodafone_154-0" class="reference"><a href="#cite_note-btvodafone-154"><span class="cite-bracket">[</span>154<span class="cite-bracket">]</span></a></sup>), a major supplier of telecommunications, granted Britain's intelligence agency GCHQ "unlimited access" to its network of undersea cables, according to documents leaked by Snowden.<sup id="cite_ref-btvodafone_154-1" class="reference"><a href="#cite_note-btvodafone-154"><span class="cite-bracket">[</span>154<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Microsoft">Microsoft</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=38" title="Edit section: Microsoft"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The American multinational corporation <b><a href="/wiki/Microsoft" title="Microsoft">Microsoft</a></b> helped the NSA to circumvent software encryption safeguards. It also allowed the federal government to monitor web chats on the <i><a href="/wiki/Outlook.com" title="Outlook.com">Outlook.com</a></i> portal.<sup id="cite_ref-microsoftencrypt_47-2" class="reference"><a href="#cite_note-microsoftencrypt-47"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup> In 2013, Microsoft worked with the FBI to allow the NSA to gain access to the company's <a href="/wiki/Cloud_storage_service" class="mw-redirect" title="Cloud storage service">cloud storage service</a> <a href="/wiki/File_system" title="File system">SkyDrive</a>.<sup id="cite_ref-microsoftencrypt_47-3" class="reference"><a href="#cite_note-microsoftencrypt-47"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Orange_S.A.">Orange S.A.</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=39" title="Edit section: Orange S.A."><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Orange_logo.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/c/c8/Orange_logo.svg/220px-Orange_logo.svg.png" decoding="async" width="220" height="220" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/c/c8/Orange_logo.svg/330px-Orange_logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/c/c8/Orange_logo.svg/440px-Orange_logo.svg.png 2x" data-file-width="284" data-file-height="284" /></a><figcaption>French telecommunications corporation <a href="/wiki/Orange_S.A." title="Orange S.A.">Orange S.A.</a> shares customer call data with intelligence agencies.<sup id="cite_ref-orangelemonde_155-0" class="reference"><a href="#cite_note-orangelemonde-155"><span class="cite-bracket">[</span>155<span class="cite-bracket">]</span></a></sup></figcaption></figure> <p>The French telecommunications corporation <a href="/wiki/Orange_S.A." title="Orange S.A.">Orange S.A.</a> shares customer call data with the French intelligence agency DGSE, and the intercepted data is handed over to GCHQ.<sup id="cite_ref-orangelemonde_155-1" class="reference"><a href="#cite_note-orangelemonde-155"><span class="cite-bracket">[</span>155<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="RSA_Security">RSA Security</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=40" title="Edit section: RSA Security"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><b><a href="/wiki/RSA_Security" title="RSA Security">RSA Security</a></b> was paid US$10 million by the NSA to introduce a <a href="/wiki/Cryptography" title="Cryptography">cryptographic</a> <a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">backdoor</a> in its encryption products.<sup id="cite_ref-RSApaid_156-0" class="reference"><a href="#cite_note-RSApaid-156"><span class="cite-bracket">[</span>156<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Stratfor">Stratfor</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=41" title="Edit section: Stratfor"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Strategic Forecasting, Inc., more commonly known as <b><a href="/wiki/Stratfor" title="Stratfor">Stratfor</a></b>, is a global intelligence company offering information to governments and private clients including <a href="/wiki/Dow_Chemical_Company" title="Dow Chemical Company">Dow Chemical Company</a>, <a href="/wiki/Lockheed_Martin" title="Lockheed Martin">Lockheed Martin</a>, <a href="/wiki/Northrop_Grumman" title="Northrop Grumman">Northrop Grumman</a>, <a href="/wiki/Raytheon" title="Raytheon">Raytheon</a>, the <a href="/wiki/United_States_Department_of_Homeland_Security" title="United States Department of Homeland Security">U.S. Department of Homeland Security</a>, the <a href="/wiki/Defense_Intelligence_Agency" title="Defense Intelligence Agency">U.S. Defense Intelligence Agency</a>, and the <a href="/wiki/United_States_Marine_Corps" title="United States Marine Corps">U.S. Marine Corps</a>.<sup id="cite_ref-stratforguardian_157-0" class="reference"><a href="#cite_note-stratforguardian-157"><span class="cite-bracket">[</span>157<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Vodafone">Vodafone</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=42" title="Edit section: Vodafone"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The British telecommunications company <b><a href="/wiki/Vodafone" title="Vodafone">Vodafone</a></b> (code-named <b>Gerontic</b><sup id="cite_ref-btvodafone_154-2" class="reference"><a href="#cite_note-btvodafone-154"><span class="cite-bracket">[</span>154<span class="cite-bracket">]</span></a></sup>) granted Britain's intelligence agency GCHQ "unlimited access" to its network of undersea cables, according to documents leaked by Snowden.<sup id="cite_ref-btvodafone_154-3" class="reference"><a href="#cite_note-btvodafone-154"><span class="cite-bracket">[</span>154<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="In-Q-Tel">In-Q-Tel</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=43" title="Edit section: In-Q-Tel"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><b><a href="/wiki/In-Q-Tel" title="In-Q-Tel">In-Q-Tel</a></b>, which receives more than US$56 million a year in government support,<sup id="cite_ref-inqtel_158-0" class="reference"><a href="#cite_note-inqtel-158"><span class="cite-bracket">[</span>158<span class="cite-bracket">]</span></a></sup> is a <a href="/wiki/Venture_capital" title="Venture capital">venture capital</a> firm that enables the CIA to invest in <a href="/wiki/Silicon_Valley" title="Silicon Valley">Silicon Valley</a>.<sup id="cite_ref-inqtel_158-1" class="reference"><a href="#cite_note-inqtel-158"><span class="cite-bracket">[</span>158<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Palantir_Technologies">Palantir Technologies</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=44" title="Edit section: Palantir Technologies"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><b><a href="/wiki/Palantir_Technologies" title="Palantir Technologies">Palantir Technologies</a></b> is a <a href="/wiki/Data_mining" title="Data mining">data mining</a> corporation with close ties to the FBI, NSA and CIA.<sup id="cite_ref-159" class="reference"><a href="#cite_note-159"><span class="cite-bracket">[</span>159<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-160" class="reference"><a href="#cite_note-160"><span class="cite-bracket">[</span>160<span class="cite-bracket">]</span></a></sup> </p><p>Based in <a href="/wiki/Palo_Alto,_California" title="Palo Alto, California">Palo Alto, California</a>, the company developed a data collection and analytical program known as <b>Prism</b>.<sup id="cite_ref-161" class="reference"><a href="#cite_note-161"><span class="cite-bracket">[</span>161<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-162" class="reference"><a href="#cite_note-162"><span class="cite-bracket">[</span>162<span class="cite-bracket">]</span></a></sup> </p><p>In 2011, it was revealed that the company conducted surveillance on <a href="/wiki/Glenn_Greenwald" title="Glenn Greenwald">Glenn Greenwald</a>.<sup id="cite_ref-163" class="reference"><a href="#cite_note-163"><span class="cite-bracket">[</span>163<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-164" class="reference"><a href="#cite_note-164"><span class="cite-bracket">[</span>164<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Surveillance_evasion">Surveillance evasion</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=45" title="Edit section: Surveillance evasion"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Several countries have evaded global surveillance by constructing secret <a href="/wiki/Bunker" title="Bunker">bunker</a> facilities deep below the Earth's surface.<sup id="cite_ref-thehindu_165-0" class="reference"><a href="#cite_note-thehindu-165"><span class="cite-bracket">[</span>165<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="North_Korea">North Korea</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=46" title="Edit section: North Korea"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Despite North Korea being a priority target, the NSA's internal documents acknowledged that it did not know much about <a href="/wiki/Kim_Jong_Un" title="Kim Jong Un">Kim Jong-un</a> and his regime's intentions.<sup id="cite_ref-WaPo20130829_72-1" class="reference"><a href="#cite_note-WaPo20130829-72"><span class="cite-bracket">[</span>72<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Iran">Iran</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=47" title="Edit section: Iran"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In October 2012, Iran's police chief Esmail Ahmadi Moghaddam alleged that <a href="/wiki/Google" title="Google">Google</a> is not a search engine but "a spying tool" for Western intelligence agencies.<sup id="cite_ref-166" class="reference"><a href="#cite_note-166"><span class="cite-bracket">[</span>166<span class="cite-bracket">]</span></a></sup> Six months later in April 2013, the country announced plans to introduce an "Islamic <a href="/wiki/Google_Earth" title="Google Earth">Google Earth</a>" to evade global surveillance.<sup id="cite_ref-167" class="reference"><a href="#cite_note-167"><span class="cite-bracket">[</span>167<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Libya_2">Libya</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=48" title="Edit section: Libya"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Libya" title="Libya">Libya</a> evaded surveillance by building "hardened and buried" bunkers at least 40 feet below ground level.<sup id="cite_ref-thehindu_165-1" class="reference"><a href="#cite_note-thehindu-165"><span class="cite-bracket">[</span>165<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Impact">Impact</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=49" title="Edit section: Impact"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Aftermath_of_the_global_surveillance_disclosures" class="mw-redirect" title="Aftermath of the global surveillance disclosures">Aftermath of the global surveillance disclosures</a></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:-FsA14_-_Freiheit_statt_Angst_009_(15082098181).jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/a/a9/-FsA14_-_Freiheit_statt_Angst_009_%2815082098181%29.jpg/220px--FsA14_-_Freiheit_statt_Angst_009_%2815082098181%29.jpg" decoding="async" width="220" height="147" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/a/a9/-FsA14_-_Freiheit_statt_Angst_009_%2815082098181%29.jpg/330px--FsA14_-_Freiheit_statt_Angst_009_%2815082098181%29.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/a/a9/-FsA14_-_Freiheit_statt_Angst_009_%2815082098181%29.jpg/440px--FsA14_-_Freiheit_statt_Angst_009_%2815082098181%29.jpg 2x" data-file-width="2736" data-file-height="1824" /></a><figcaption>"<a href="/wiki/Stop_Watching_Us" title="Stop Watching Us">Stop Watching Us</a>" rally in Berlin, Germany, August 2014</figcaption></figure> <p>The global surveillance disclosure has caused tension in the <a href="/wiki/Bilateral_relations" class="mw-redirect" title="Bilateral relations">bilateral relations</a> of the United States with several of its allies and economic partners as well as in its relationship with the <a href="/wiki/European_Union" title="European Union">European Union</a>. On 12 August 2013, President Obama announced the creation of an "independent" panel of "outside experts" to review the NSA's surveillance programs. The panel is due to be established by the Director of National Intelligence, <a href="/wiki/James_R._Clapper" class="mw-redirect" title="James R. Clapper">James R. Clapper</a>, who will consult and provide assistance to them.<sup id="cite_ref-obamafalloutsp_168-0" class="reference"><a href="#cite_note-obamafalloutsp-168"><span class="cite-bracket">[</span>168<span class="cite-bracket">]</span></a></sup> </p><p>According to a survey undertaken by the human rights group <a href="/wiki/PEN_International" title="PEN International">PEN International</a>, these disclosures have had a <a href="/wiki/Chilling_effect" title="Chilling effect">chilling effect</a> on American writers. Fearing the risk of being targeted by government surveillance, 28% of PEN's American members have curbed their usage of social media, and 16% have <a href="/wiki/Self-censorship" title="Self-censorship">self-censored</a> themselves by avoiding controversial topics in their writings.<sup id="cite_ref-penc_169-0" class="reference"><a href="#cite_note-penc-169"><span class="cite-bracket">[</span>169<span class="cite-bracket">]</span></a></sup> </p> <div style="clear:both;" class=""></div> <div class="mw-heading mw-heading2"><h2 id="Gallery">Gallery</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=50" title="Edit section: Gallery"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul class="gallery mw-gallery-traditional"> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:UN_General_Assembly_hall.jpg" class="mw-file-description" title="According to Snowden's documents, the United Nations Headquarters and the United Nations General Assembly were targeted by NSA employees disguised as diplomats.[75]"><img alt="According to Snowden's documents, the United Nations Headquarters and the United Nations General Assembly were targeted by NSA employees disguised as diplomats.[75]" src="//upload.wikimedia.org/wikipedia/commons/thumb/0/05/UN_General_Assembly_hall.jpg/120px-UN_General_Assembly_hall.jpg" decoding="async" width="120" height="74" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/05/UN_General_Assembly_hall.jpg/180px-UN_General_Assembly_hall.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/0/05/UN_General_Assembly_hall.jpg/240px-UN_General_Assembly_hall.jpg 2x" data-file-width="1920" data-file-height="1191" /></a></span></div> <div class="gallerytext">According to Snowden's documents, the <a href="/wiki/United_Nations_Headquarters" class="mw-redirect" title="United Nations Headquarters">United Nations Headquarters</a> and the <a href="/wiki/United_Nations_General_Assembly" title="United Nations General Assembly">United Nations General Assembly</a> were targeted by NSA employees disguised as diplomats.<sup id="cite_ref-spiegel1000_75-1" class="reference"><a href="#cite_note-spiegel1000-75"><span class="cite-bracket">[</span>75<span class="cite-bracket">]</span></a></sup></div> </li> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:London_Summit_2009-1.jpg" class="mw-file-description" title="Citing Snowden's documents, The Guardian reported that British officials had set up fake Internet cafes at the 2009 G-20 London summit to spy on the delegates' use of computers, and to install key-logging software on the delegates' phones. This allowed British representatives to gain a "negotiating advantage" at the summit.[170]"><img alt="Citing Snowden's documents, The Guardian reported that British officials had set up fake Internet cafes at the 2009 G-20 London summit to spy on the delegates' use of computers, and to install key-logging software on the delegates' phones. This allowed British representatives to gain a "negotiating advantage" at the summit.[170]" src="//upload.wikimedia.org/wikipedia/commons/thumb/0/0e/London_Summit_2009-1.jpg/120px-London_Summit_2009-1.jpg" decoding="async" width="120" height="66" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/0e/London_Summit_2009-1.jpg/180px-London_Summit_2009-1.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/0/0e/London_Summit_2009-1.jpg/240px-London_Summit_2009-1.jpg 2x" data-file-width="494" data-file-height="272" /></a></span></div> <div class="gallerytext">Citing Snowden's documents, <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i> reported that British officials had set up fake <a href="/wiki/Internet_cafe" class="mw-redirect" title="Internet cafe">Internet cafes</a> at the <a href="/wiki/2009_G-20_London_summit" class="mw-redirect" title="2009 G-20 London summit">2009 G-20 London summit</a> to spy on the delegates' use of computers, and to install <a href="/wiki/Keystroke_logging" title="Keystroke logging">key-logging software</a> on the delegates' phones. This allowed British representatives to gain a "negotiating advantage" at the summit.<sup id="cite_ref-guardiangchq_170-0" class="reference"><a href="#cite_note-guardiangchq-170"><span class="cite-bracket">[</span>170<span class="cite-bracket">]</span></a></sup></div> </li> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:Tsinghua_University_-_Square_building.JPG" class="mw-file-description" title="According to Snowden's interview with the South China Morning Post, the U.S. government has been hacking numerous non-military targets in China for years. Other high-priority targets include academic institutions such as the prestigious Tsinghua University in Beijing.[171]"><img alt="According to Snowden's interview with the South China Morning Post, the U.S. government has been hacking numerous non-military targets in China for years. Other high-priority targets include academic institutions such as the prestigious Tsinghua University in Beijing.[171]" src="//upload.wikimedia.org/wikipedia/commons/thumb/9/96/Tsinghua_University_-_Square_building.JPG/120px-Tsinghua_University_-_Square_building.JPG" decoding="async" width="120" height="90" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/9/96/Tsinghua_University_-_Square_building.JPG/180px-Tsinghua_University_-_Square_building.JPG 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/9/96/Tsinghua_University_-_Square_building.JPG/240px-Tsinghua_University_-_Square_building.JPG 2x" data-file-width="640" data-file-height="480" /></a></span></div> <div class="gallerytext">According to Snowden's interview with the <i><a href="/wiki/South_China_Morning_Post" title="South China Morning Post">South China Morning Post</a></i>, the U.S. government has been hacking numerous <a href="/wiki/Civilian" title="Civilian">non-military</a> targets in China for years. Other high-priority targets include <a href="/wiki/Academic_institution" title="Academic institution">academic institutions</a> such as the prestigious <a href="/wiki/Tsinghua_University" title="Tsinghua University">Tsinghua University</a> in <a href="/wiki/Beijing" title="Beijing">Beijing</a>.<sup id="cite_ref-171" class="reference"><a href="#cite_note-171"><span class="cite-bracket">[</span>171<span class="cite-bracket">]</span></a></sup></div> </li> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:Justus_Lipsius,_Eastern_side.jpg" class="mw-file-description" title="The Council of the European Union, with its headquarters at the Justus Lipsius building in Brussels, was targeted by NSA employees working near the headquarters of NATO. An NSA document dated September 2010 explicitly names the Europeans as a "location target".[172]"><img alt="The Council of the European Union, with its headquarters at the Justus Lipsius building in Brussels, was targeted by NSA employees working near the headquarters of NATO. An NSA document dated September 2010 explicitly names the Europeans as a "location target".[172]" src="//upload.wikimedia.org/wikipedia/commons/thumb/e/ea/Justus_Lipsius%2C_Eastern_side.jpg/120px-Justus_Lipsius%2C_Eastern_side.jpg" decoding="async" width="120" height="98" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/e/ea/Justus_Lipsius%2C_Eastern_side.jpg/180px-Justus_Lipsius%2C_Eastern_side.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/e/ea/Justus_Lipsius%2C_Eastern_side.jpg/240px-Justus_Lipsius%2C_Eastern_side.jpg 2x" data-file-width="1667" data-file-height="1360" /></a></span></div> <div class="gallerytext">The <a href="/wiki/Council_of_the_European_Union" title="Council of the European Union">Council of the European Union</a>, with its headquarters at the <a href="/wiki/Justus_Lipsius_building" title="Justus Lipsius building">Justus Lipsius building</a> in <a href="/wiki/Brussels" title="Brussels">Brussels</a>, was targeted by NSA employees working near the headquarters of <a href="/wiki/NATO" title="NATO">NATO</a>. An NSA document dated September 2010 explicitly names the Europeans as a "location target".<sup id="cite_ref-172" class="reference"><a href="#cite_note-172"><span class="cite-bracket">[</span>172<span class="cite-bracket">]</span></a></sup></div> </li> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:Aeroflot_A321-200_VP-BWN_SVO_Jun_2011.png" class="mw-file-description" title="The reservations system of Russia's Aeroflot airline was hacked by the NSA.[173]"><img alt="The reservations system of Russia's Aeroflot airline was hacked by the NSA.[173]" src="//upload.wikimedia.org/wikipedia/commons/thumb/0/00/Aeroflot_A321-200_VP-BWN_SVO_Jun_2011.png/120px-Aeroflot_A321-200_VP-BWN_SVO_Jun_2011.png" decoding="async" width="120" height="80" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/00/Aeroflot_A321-200_VP-BWN_SVO_Jun_2011.png/180px-Aeroflot_A321-200_VP-BWN_SVO_Jun_2011.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/0/00/Aeroflot_A321-200_VP-BWN_SVO_Jun_2011.png/240px-Aeroflot_A321-200_VP-BWN_SVO_Jun_2011.png 2x" data-file-width="1200" data-file-height="800" /></a></span></div> <div class="gallerytext">The <a href="/wiki/Airline_reservations_system" title="Airline reservations system">reservations system</a> of Russia's <a href="/wiki/Aeroflot" title="Aeroflot">Aeroflot</a> airline was hacked by the NSA.<sup id="cite_ref-Spiegel20130831_173-0" class="reference"><a href="#cite_note-Spiegel20130831-173"><span class="cite-bracket">[</span>173<span class="cite-bracket">]</span></a></sup></div> </li> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:Oil_platform_P-51_(Brazil).jpg" class="mw-file-description" title="Petrobras, currently the world's leader in offshore deepwater drilling, is a "prominent" target of the U.S. government.[174]"><img alt="Petrobras, currently the world's leader in offshore deepwater drilling, is a "prominent" target of the U.S. government.[174]" src="//upload.wikimedia.org/wikipedia/commons/thumb/a/ab/Oil_platform_P-51_%28Brazil%29.jpg/120px-Oil_platform_P-51_%28Brazil%29.jpg" decoding="async" width="120" height="80" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/a/ab/Oil_platform_P-51_%28Brazil%29.jpg/180px-Oil_platform_P-51_%28Brazil%29.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/a/ab/Oil_platform_P-51_%28Brazil%29.jpg/240px-Oil_platform_P-51_%28Brazil%29.jpg 2x" data-file-width="2657" data-file-height="1772" /></a></span></div> <div class="gallerytext"><a href="/wiki/Petrobras" title="Petrobras">Petrobras</a>, currently the world's leader in offshore <a href="/wiki/Deepwater_drilling" title="Deepwater drilling">deepwater drilling</a>, is a "prominent" target of the U.S. government.<sup id="cite_ref-nytimes20130909_174-0" class="reference"><a href="#cite_note-nytimes20130909-174"><span class="cite-bracket">[</span>174<span class="cite-bracket">]</span></a></sup></div> </li> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:Angela_Merkel_(2008).jpg" class="mw-file-description" title="From 2002 to 2013, the German Chancellor Angela Merkel was targeted by the U.S. Special Collection Service.[175]"><img alt="From 2002 to 2013, the German Chancellor Angela Merkel was targeted by the U.S. Special Collection Service.[175]" src="//upload.wikimedia.org/wikipedia/commons/thumb/f/fd/Angela_Merkel_%282008%29.jpg/120px-Angela_Merkel_%282008%29.jpg" decoding="async" width="120" height="90" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/fd/Angela_Merkel_%282008%29.jpg/180px-Angela_Merkel_%282008%29.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/fd/Angela_Merkel_%282008%29.jpg/240px-Angela_Merkel_%282008%29.jpg 2x" data-file-width="2666" data-file-height="2000" /></a></span></div> <div class="gallerytext">From 2002 to 2013, the German Chancellor <a href="/wiki/Angela_Merkel" title="Angela Merkel">Angela Merkel</a> was targeted by the U.S. <a href="/wiki/Special_Collection_Service" title="Special Collection Service">Special Collection Service</a>.<sup id="cite_ref-175" class="reference"><a href="#cite_note-175"><span class="cite-bracket">[</span>175<span class="cite-bracket">]</span></a></sup></div> </li> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:Ehud_Olmert_2006.jpg" class="mw-file-description" title="Israeli Prime Minister Ehud Olmert (pictured) and Defense Minister Ehud Barak were included in a list of surveillance targets used by the GCHQ and the NSA.[176]"><img alt="Israeli Prime Minister Ehud Olmert (pictured) and Defense Minister Ehud Barak were included in a list of surveillance targets used by the GCHQ and the NSA.[176]" src="//upload.wikimedia.org/wikipedia/commons/thumb/b/b5/Ehud_Olmert_2006.jpg/116px-Ehud_Olmert_2006.jpg" decoding="async" width="116" height="120" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/b/b5/Ehud_Olmert_2006.jpg/174px-Ehud_Olmert_2006.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/b/b5/Ehud_Olmert_2006.jpg 2x" data-file-width="205" data-file-height="212" /></a></span></div> <div class="gallerytext">Israeli Prime Minister <a href="/wiki/Ehud_Olmert" title="Ehud Olmert">Ehud Olmert</a> (pictured) and Defense Minister <a href="/wiki/Ehud_Barak" title="Ehud Barak">Ehud Barak</a> were included in a list of surveillance targets used by the GCHQ and the NSA.<sup id="cite_ref-176" class="reference"><a href="#cite_note-176"><span class="cite-bracket">[</span>176<span class="cite-bracket">]</span></a></sup></div> </li> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:Joaquin_Almunia_Mercosul.jpg" class="mw-file-description" title="Joaquín Almunia, who served as the European Commissioner for Competition and the Vice-President of the European Commission, was targeted by Britain's GCHQ agency.[79]"><img alt="Joaquín Almunia, who served as the European Commissioner for Competition and the Vice-President of the European Commission, was targeted by Britain's GCHQ agency.[79]" src="//upload.wikimedia.org/wikipedia/commons/thumb/2/2a/Joaquin_Almunia_Mercosul.jpg/82px-Joaquin_Almunia_Mercosul.jpg" decoding="async" width="82" height="120" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/2/2a/Joaquin_Almunia_Mercosul.jpg/123px-Joaquin_Almunia_Mercosul.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/2/2a/Joaquin_Almunia_Mercosul.jpg/164px-Joaquin_Almunia_Mercosul.jpg 2x" data-file-width="1772" data-file-height="2598" /></a></span></div> <div class="gallerytext"><a href="/wiki/Joaqu%C3%ADn_Almunia" title="Joaquín Almunia">Joaquín Almunia</a>, who served as the <a href="/wiki/European_Commissioner_for_Competition" title="European Commissioner for Competition">European Commissioner for Competition</a> and the <a href="/wiki/Vice-President_of_the_European_Commission" title="Vice-President of the European Commission">Vice-President of the European Commission</a>, was targeted by Britain's GCHQ agency.<sup id="cite_ref-gchqnsa20122013_79-3" class="reference"><a href="#cite_note-gchqnsa20122013-79"><span class="cite-bracket">[</span>79<span class="cite-bracket">]</span></a></sup></div> </li> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:Susilo_Bambang_Yudhoyono,_official_presidential_portrait_(2004).jpg" class="mw-file-description" title="Indonesia's President Susilo Bambang Yudhoyono and his wife were placed under surveillance by the Australian Signals Directorate (ASD).[177] During the 2007 United Nations Climate Change Conference in Bali, the ASD cooperated with the NSA to conduct mass surveillance on the Indonesian hosts.[178]"><img alt="Indonesia's President Susilo Bambang Yudhoyono and his wife were placed under surveillance by the Australian Signals Directorate (ASD).[177] During the 2007 United Nations Climate Change Conference in Bali, the ASD cooperated with the NSA to conduct mass surveillance on the Indonesian hosts.[178]" src="//upload.wikimedia.org/wikipedia/commons/thumb/4/42/Susilo_Bambang_Yudhoyono%2C_official_presidential_portrait_%282004%29.jpg/98px-Susilo_Bambang_Yudhoyono%2C_official_presidential_portrait_%282004%29.jpg" decoding="async" width="98" height="120" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/4/42/Susilo_Bambang_Yudhoyono%2C_official_presidential_portrait_%282004%29.jpg/147px-Susilo_Bambang_Yudhoyono%2C_official_presidential_portrait_%282004%29.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/4/42/Susilo_Bambang_Yudhoyono%2C_official_presidential_portrait_%282004%29.jpg/197px-Susilo_Bambang_Yudhoyono%2C_official_presidential_portrait_%282004%29.jpg 2x" data-file-width="1808" data-file-height="2206" /></a></span></div> <div class="gallerytext"><a href="/wiki/Indonesia" title="Indonesia">Indonesia</a>'s President <a href="/wiki/Susilo_Bambang_Yudhoyono" title="Susilo Bambang Yudhoyono">Susilo Bambang Yudhoyono</a> and his wife were placed under surveillance by the <a href="/wiki/Australian_Signals_Directorate" title="Australian Signals Directorate">Australian Signals Directorate</a> (ASD).<sup id="cite_ref-auind1_177-0" class="reference"><a href="#cite_note-auind1-177"><span class="cite-bracket">[</span>177<span class="cite-bracket">]</span></a></sup> During the <a href="/wiki/2007_United_Nations_Climate_Change_Conference" title="2007 United Nations Climate Change Conference">2007 United Nations Climate Change Conference</a> in <a href="/wiki/Bali" title="Bali">Bali</a>, the ASD cooperated with the NSA to conduct mass surveillance on the Indonesian hosts.<sup id="cite_ref-178" class="reference"><a href="#cite_note-178"><span class="cite-bracket">[</span>178<span class="cite-bracket">]</span></a></sup></div> </li> <li class="gallerybox" style="width: 155px"> <div class="thumb" style="width: 150px; height: 150px;"><span typeof="mw:File"><a href="/wiki/File:Xbox-Duke-Controller.jpg" class="mw-file-description" title="The video gaming network Xbox Live was placed under surveillance to unravel possible terrorist plots.[179]"><img alt="The video gaming network Xbox Live was placed under surveillance to unravel possible terrorist plots.[179]" src="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/Xbox-Duke-Controller.jpg/120px-Xbox-Duke-Controller.jpg" decoding="async" width="120" height="101" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/Xbox-Duke-Controller.jpg/180px-Xbox-Duke-Controller.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/c/c5/Xbox-Duke-Controller.jpg/240px-Xbox-Duke-Controller.jpg 2x" data-file-width="2840" data-file-height="2400" /></a></span></div> <div class="gallerytext">The <a href="/wiki/Video_game" title="Video game">video gaming</a> network <a href="/wiki/Xbox_Live" class="mw-redirect" title="Xbox Live">Xbox Live</a> was placed under surveillance to unravel possible terrorist plots.<sup id="cite_ref-179" class="reference"><a href="#cite_note-179"><span class="cite-bracket">[</span>179<span class="cite-bracket">]</span></a></sup></div> </li> </ul> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=51" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1259569809">.mw-parser-output .portalbox{padding:0;margin:0.5em 0;display:table;box-sizing:border-box;max-width:175px;list-style:none}.mw-parser-output .portalborder{border:1px solid var(--border-color-base,#a2a9b1);padding:0.1em;background:var(--background-color-neutral-subtle,#f8f9fa)}.mw-parser-output .portalbox-entry{display:table-row;font-size:85%;line-height:110%;height:1.9em;font-style:italic;font-weight:bold}.mw-parser-output .portalbox-image{display:table-cell;padding:0.2em;vertical-align:middle;text-align:center}.mw-parser-output .portalbox-link{display:table-cell;padding:0.2em 0.2em 0.2em 0.3em;vertical-align:middle}@media(min-width:720px){.mw-parser-output .portalleft{clear:left;float:left;margin:0.5em 1em 0.5em 0}.mw-parser-output .portalright{clear:right;float:right;margin:0.5em 0 0.5em 1em}}</style><ul role="navigation" aria-label="Portals" class="noprint portalbox portalright"> <li class="portalbox-entry"><span class="portalbox-image"><span class="noviewer" typeof="mw:File"><a href="/wiki/File:The_Earth_seen_from_Apollo_17.jpg" class="mw-file-description"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/9/97/The_Earth_seen_from_Apollo_17.jpg/28px-The_Earth_seen_from_Apollo_17.jpg" decoding="async" width="28" height="28" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/9/97/The_Earth_seen_from_Apollo_17.jpg/42px-The_Earth_seen_from_Apollo_17.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/9/97/The_Earth_seen_from_Apollo_17.jpg/56px-The_Earth_seen_from_Apollo_17.jpg 2x" data-file-width="3000" data-file-height="3002" /></a></span></span><span class="portalbox-link"><a href="/wiki/Portal:World" title="Portal:World">World portal</a></span></li></ul> <ul><li><a href="/wiki/2013_Department_of_Justice_investigations_of_reporters" class="mw-redirect" title="2013 Department of Justice investigations of reporters">2013 Department of Justice investigations of reporters</a></li> <li><a href="/wiki/Cyber_spying" title="Cyber spying">Cyber spying</a></li> <li><a href="/wiki/Terrorist_Finance_Tracking_Program" title="Terrorist Finance Tracking Program">Terrorist Finance Tracking Program</a></li> <li><a href="/wiki/Top_Secret_America" title="Top Secret America">Top Secret America</a></li></ul> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=52" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist reflist-columns references-column-width" style="column-width: 30em;"> <ol class="references"> <li id="cite_note-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-1">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite id="CITEREFWebb2007" class="citation book cs1">Webb, Maureen (2007). <span class="id-lock-registration" title="Free registration required"><a rel="nofollow" class="external text" href="https://archive.org/details/illusionsofsecur0000"><i>Illusions of Security: Global Surveillance and Democracy in the Post-9/11 World</i></a></span> (1st ed.). San Francisco: <a href="/wiki/City_Lights_Books" class="mw-redirect" title="City Lights Books">City Lights Books</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0872864764" title="Special:BookSources/978-0872864764"><bdi>978-0872864764</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Illusions+of+Security%3A+Global+Surveillance+and+Democracy+in+the+Post-9%2F11+World&rft.place=San+Francisco&rft.edition=1st&rft.pub=City+Lights+Books&rft.date=2007&rft.isbn=978-0872864764&rft.aulast=Webb&rft.aufirst=Maureen&rft_id=https%3A%2F%2Farchive.org%2Fdetails%2Fillusionsofsecur0000&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-2">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFZevenbergen2013" class="citation journal cs1">Zevenbergen, Bendert (3 December 2013). <a rel="nofollow" class="external text" href="https://doi.org/10.1007%2Fs12290-013-0287-x">"Adventures in digital surveillance"</a>. <i>European View</i>. <b>12</b> (2): 223–233. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1007%2Fs12290-013-0287-x">10.1007/s12290-013-0287-x</a></span>. <q>Snowden used the press to inform the world that a global surveillance state may be being built. This led to the beginning of a global political debate on digital communications surveillance.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=European+View&rft.atitle=Adventures+in+digital+surveillance&rft.volume=12&rft.issue=2&rft.pages=223-233&rft.date=2013-12-03&rft_id=info%3Adoi%2F10.1007%2Fs12290-013-0287-x&rft.aulast=Zevenbergen&rft.aufirst=Bendert&rft_id=https%3A%2F%2Fdoi.org%2F10.1007%252Fs12290-013-0287-x&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-RangerSteve1-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-RangerSteve1_3-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRanger2015" class="citation magazine cs1">Ranger, Steve (24 March 2015). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20160612190952/http://www.techrepublic.com/article/the-undercover-war-on-your-internet-secrets-how-online-surveillance-cracked-our-trust-in-the-web/">"The undercover war on your internet secrets: How online surveillance cracked our trust in the web"</a>. <i>TechRepublic</i>. Archived from <a rel="nofollow" class="external text" href="https://www.techrepublic.com/article/the-undercover-war-on-your-internet-secrets-how-online-surveillance-cracked-our-trust-in-the-web/">the original</a> on 12 June 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">12 June</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=TechRepublic&rft.atitle=The+undercover+war+on+your+internet+secrets%3A+How+online+surveillance+cracked+our+trust+in+the+web&rft.date=2015-03-24&rft.aulast=Ranger&rft.aufirst=Steve&rft_id=http%3A%2F%2Fwww.techrepublic.com%2Farticle%2Fthe-undercover-war-on-your-internet-secrets-how-online-surveillance-cracked-our-trust-in-the-web%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-4">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFÜnver2018" class="citation report cs1">Ünver, H. Akın (2018). <a rel="nofollow" class="external text" href="https://www.jstor.org/stable/resrep17009">Politics of Digital Surveillance, National Security and Privacy</a> (Report). Centre for Economics and Foreign Policy Studies.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=report&rft.btitle=Politics+of+Digital+Surveillance%2C+National+Security+and+Privacy&rft.pub=Centre+for+Economics+and+Foreign+Policy+Studies&rft.date=2018&rft.aulast=%C3%9Cnver&rft.aufirst=H.+Ak%C4%B1n&rft_id=https%3A%2F%2Fwww.jstor.org%2Fstable%2Fresrep17009&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPfluke2019" class="citation journal cs1">Pfluke, Corey (4 July 2019). <span class="id-lock-subscription" title="Paid subscription required"><a rel="nofollow" class="external text" href="https://doi.org/10.1080/01495933.2019.1633186">"A history of the Five Eyes Alliance: Possibility for reform and additions"</a></span>. <i>Comparative Strategy</i>. <b>38</b> (4): 302–315. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F01495933.2019.1633186">10.1080/01495933.2019.1633186</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0149-5933">0149-5933</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:202317080">202317080</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Comparative+Strategy&rft.atitle=A+history+of+the+Five+Eyes+Alliance%3A+Possibility+for+reform+and+additions&rft.volume=38&rft.issue=4&rft.pages=302-315&rft.date=2019-07-04&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A202317080%23id-name%3DS2CID&rft.issn=0149-5933&rft_id=info%3Adoi%2F10.1080%2F01495933.2019.1633186&rft.aulast=Pfluke&rft.aufirst=Corey&rft_id=https%3A%2F%2Fdoi.org%2F10.1080%2F01495933.2019.1633186&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-auto-6"><span class="mw-cite-backlink">^ <a href="#cite_ref-auto_6-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-auto_6-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://news.bbc.co.uk/2/hi/sci/tech/1357513.stm">"Q&A: What you need to know about Echelon"</a>. <a href="/wiki/BBC" title="BBC">BBC</a>. 29 May 2001.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Q%26A%3A+What+you+need+to+know+about+Echelon&rft.date=2001-05-29&rft_id=http%3A%2F%2Fnews.bbc.co.uk%2F2%2Fhi%2Fsci%2Ftech%2F1357513.stm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-Nabbali_2004_84–97-7"><span class="mw-cite-backlink">^ <a href="#cite_ref-Nabbali_2004_84–97_7-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Nabbali_2004_84–97_7-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNabbaliPerry,_Mark2004" class="citation journal cs1">Nabbali, Talitha; Perry, Mark (March 2004). "Going for the throat". <i>Computer Law & Security Review</i>. <b>20</b> (2): 84–97. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2FS0267-3649%2804%2900018-4">10.1016/S0267-3649(04)00018-4</a>. <q>It wasn't until 1971 that the UKUSA allies began ECHELON</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Computer+Law+%26+Security+Review&rft.atitle=Going+for+the+throat&rft.volume=20&rft.issue=2&rft.pages=84-97&rft.date=2004-03&rft_id=info%3Adoi%2F10.1016%2FS0267-3649%2804%2900018-4&rft.aulast=Nabbali&rft.aufirst=Talitha&rft.au=Perry%2C+Mark&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.pbs.org/wgbh/pages/frontline/homefront/preemption/telecoms.html">"Pre-Emption - The Nsa And The Telecoms - Spying On The Home Front - FRONTLINE - PBS"</a>. <i>pbs.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">8 March</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=pbs.org&rft.atitle=Pre-Emption+-+The+Nsa+And+The+Telecoms+-+Spying+On+The+Home+Front+-+FRONTLINE+-+PBS&rft_id=https%3A%2F%2Fwww.pbs.org%2Fwgbh%2Fpages%2Ffrontline%2Fhomefront%2Fpreemption%2Ftelecoms.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-9">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCohen2006" class="citation book cs1">Cohen, Martin (2006). <i>No Holiday</i>. New York: Disinformation Company Ltd. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-932857-29-0" title="Special:BookSources/978-1-932857-29-0"><bdi>978-1-932857-29-0</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=No+Holiday&rft.place=New+York&rft.pub=Disinformation+Company+Ltd&rft.date=2006&rft.isbn=978-1-932857-29-0&rft.aulast=Cohen&rft.aufirst=Martin&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-10"><span class="mw-cite-backlink"><b><a href="#cite_ref-10">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPeggy_Becker1999" class="citation report cs1">Peggy Becker (October 1999). <a rel="nofollow" class="external text" href="http://bookshop.europa.eu/en/development-of-surveillance-technology-and-risk-of-abuse-of-economic-information-pbQASTOA132/downloads/QA-ST-OA-132-EN-N/QASTOA132ENN_002.pdf;pgid=y8dIS7GUWMdSR0EAlMEUUsWb00002lUIfz2M;sid=w3lJEyGE1rNJH3CegDfXtEOhYbo1Q2zn3Qs=?FileName=QASTOA132ENN_002.pdf&SKU=QASTOA132ENN_PDF&CatalogueNumber=QA-ST-OA-132-EN-N">DEVELOPMENT OF SURVEILLANCE TECHNOLOGY AND RISK OF ABUSE OF ECONOMIC INFORMATION</a> (Report). STOA, European Parliament<span class="reference-accessdate">. Retrieved <span class="nowrap">31 January</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=report&rft.btitle=DEVELOPMENT+OF+SURVEILLANCE+TECHNOLOGY+AND+RISK+OF+ABUSE+OF+ECONOMIC+INFORMATION&rft.pub=STOA%2C+European+Parliament&rft.date=1999-10&rft.au=Peggy+Becker&rft_id=http%3A%2F%2Fbookshop.europa.eu%2Fen%2Fdevelopment-of-surveillance-technology-and-risk-of-abuse-of-economic-information-pbQASTOA132%2Fdownloads%2FQA-ST-OA-132-EN-N%2FQASTOA132ENN_002.pdf%3Bpgid%3Dy8dIS7GUWMdSR0EAlMEUUsWb00002lUIfz2M%3Bsid%3Dw3lJEyGE1rNJH3CegDfXtEOhYbo1Q2zn3Qs%3D%3FFileName%3DQASTOA132ENN_002.pdf%26SKU%3DQASTOA132ENN_PDF%26CatalogueNumber%3DQA-ST-OA-132-EN-N&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-11">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://tv.msnbc.com/2013/07/15/snowden-has-thousands-of-damaging-nsa-documents-says-greenwald/">"Snowden has 'thousands' of damaging NSA documents, says Greenwald"</a>. <i>MSNBC</i>. 15 July 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">8 March</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=MSNBC&rft.atitle=Snowden+has+%27thousands%27+of+damaging+NSA+documents%2C+says+Greenwald&rft.date=2013-07-15&rft_id=http%3A%2F%2Ftv.msnbc.com%2F2013%2F07%2F15%2Fsnowden-has-thousands-of-damaging-nsa-documents-says-greenwald%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-guardian1-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-guardian1_12-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGlenn_GreenwaldEwen_MacAskill2013" class="citation news cs1">Glenn Greenwald; Ewen MacAskill (8 June 2013). <a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining">"Boundless Informant: the NSA's secret tool to track global surveillance data"</a>. <i>The Guardian</i>. London<span class="reference-accessdate">. Retrieved <span class="nowrap">12 June</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=Boundless+Informant%3A+the+NSA%27s+secret+tool+to+track+global+surveillance+data&rft.date=2013-06-08&rft.au=Glenn+Greenwald&rft.au=Ewen+MacAskill&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2F2013%2Fjun%2F08%2Fnsa-boundless-informant-global-datamining&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-13">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20131029003314/http://bigstory.ap.org/article/senators-limit-nsa-snooping-us-phone-records">"Senators: Limit NSA snooping into US phone records"</a>. Associated Press. Archived from <a rel="nofollow" class="external text" href="http://bigstory.ap.org/article/senators-limit-nsa-snooping-us-phone-records">the original</a> on 29 October 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">15 October</span> 2013</span>. <q><span class="cs1-kern-left"></span>"Is it the goal of the NSA to collect the phone records of all Americans?" Udall asked at Thursday's hearing. "Yes, I believe it is in the nation's best interest to put all the phone records into a lockbox that we could search when the nation needs to do it. Yes," Alexander replied.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Senators%3A+Limit+NSA+snooping+into+US+phone+records&rft_id=http%3A%2F%2Fbigstory.ap.org%2Farticle%2Fsenators-limit-nsa-snooping-us-phone-records&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-14">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSiobhan_Gorman" class="citation news cs1">Siobhan Gorman. <a rel="nofollow" class="external text" href="https://www.wsj.com/news/articles/SB10001424052702304441404579119490744478398">"Meltdowns Hobble NSA Data Center"</a>. <i><a href="/wiki/The_Wall_Street_Journal" title="The Wall Street Journal">The Wall Street Journal</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">19 October</span> 2013</span>. <q>The Utah facility, one of the Pentagon's biggest U.S. construction projects, has become a symbol of the spy agency's surveillance prowess, which gained broad attention in the wake of leaks from NSA contractor Edward Snowden.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Wall+Street+Journal&rft.atitle=Meltdowns+Hobble+NSA+Data+Center&rft.au=Siobhan+Gorman&rft_id=https%3A%2F%2Fwww.wsj.com%2Fnews%2Farticles%2FSB10001424052702304441404579119490744478398&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFShane_Harris2012" class="citation news cs1"><a href="/wiki/Shane_Harris" title="Shane Harris">Shane Harris</a> (22 August 2012). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2012/08/23/opinion/whos-watching-the-nsa-watchers.html">"Who's Watching the N.S.A Watchers?"</a>. <i><a href="/wiki/The_New_York_Times" title="The New York Times">The New York Times</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">25 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+New+York+Times&rft.atitle=Who%27s+Watching+the+N.S.A+Watchers%3F&rft.date=2012-08-22&rft.au=Shane+Harris&rft_id=https%3A%2F%2Fwww.nytimes.com%2F2012%2F08%2F23%2Fopinion%2Fwhos-watching-the-nsa-watchers.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-cepr1-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-cepr1_16-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDuran-Sanchez,_Mabel2013" class="citation news cs1">Duran-Sanchez, Mabel (10 August 2013). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20150420185337/http://www.cepr.net/index.php/blogs/the-americas-blog/greenwald-testifies-to-brazilian-senate-about-nsa-espionage-targeting-brazil-and-latin-america">"Greenwald Testifies to Brazilian Senate about NSA Espionage Targeting Brazil and Latin America"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.cepr.net/index.php/blogs/the-americas-blog/greenwald-testifies-to-brazilian-senate-about-nsa-espionage-targeting-brazil-and-latin-america">the original</a> on 20 April 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">13 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Greenwald+Testifies+to+Brazilian+Senate+about+NSA+Espionage+Targeting+Brazil+and+Latin+America&rft.date=2013-08-10&rft.au=Duran-Sanchez%2C+Mabel&rft_id=http%3A%2F%2Fwww.cepr.net%2Findex.php%2Fblogs%2Fthe-americas-blog%2Fgreenwald-testifies-to-brazilian-senate-about-nsa-espionage-targeting-brazil-and-latin-america&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-Senado1-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-Senado1_17-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.senado.gov.br/noticias/TV/default.asp?IND_ACESSO=S&cod_midia=269827&cod_video=267526">"Glenn Greenwald afirma que documentos dizem respeito à interesses comerciais do governo americano"</a>. 6 August 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">13 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Glenn+Greenwald+afirma+que+documentos+dizem+respeito+%C3%A0+interesses+comerciais+do+governo+americano&rft.date=2013-08-06&rft_id=http%3A%2F%2Fwww.senado.gov.br%2Fnoticias%2FTV%2Fdefault.asp%3FIND_ACESSO%3DS%26cod_midia%3D269827%26cod_video%3D267526&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-microsoft-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-microsoft_18-0">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data">How Microsoft handed the NSA access to encrypted messages</a>, <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>, 12 July 2013. Retrieved 13 July 2013.</span> </li> <li id="cite_note-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-19">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBridie_Jabour_in_Sydney2013" class="citation news cs1">Bridie Jabour in Sydney (12 July 2013). <a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/jul/12/telstra-deal-america-government-spying">"Telstra signed deal that would have allowed US spying"</a>. <i>The Guardian</i>. London.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=Telstra+signed+deal+that+would+have+allowed+US+spying&rft.date=2013-07-12&rft.au=Bridie+Jabour+in+Sydney&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2F2013%2Fjul%2F12%2Ftelstra-deal-america-government-spying&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-20">^</a></b></span> <span class="reference-text">The first three days of revelations were: the FISC court order that Verizon provide bulk metadata to its customers to the NSA; presentation slides explaining the cooperation of nine US internet giants through the PRISM program; and the bulk collection of Chinese users' text messages, which coincided with <a href="/wiki/Xi_Jinping" title="Xi Jinping">Xi Jinping</a>'s visit to California to meet <a href="/wiki/Barack_Obama" title="Barack Obama">Barack Obama</a>.</span> </li> <li id="cite_note-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-21">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFShorrock2013" class="citation journal cs1"><a href="/wiki/Tim_Shorrock" title="Tim Shorrock">Shorrock, Tim</a> (15 April 2013). <a rel="nofollow" class="external text" href="http://www.thenation.com/article/173521/obamas-crackdown-whistleblowers">"The Untold Story: Obama's Crackdown on Whistleblowers: The NSA Four reveal how a toxic mix of cronyism and fraud blinded the agency before 9/11"</a>. <i>The Nation</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Nation&rft.atitle=The+Untold+Story%3A+Obama%27s+Crackdown+on+Whistleblowers%3A+The+NSA+Four+reveal+how+a+toxic+mix+of+cronyism+and+fraud+blinded+the+agency+before+9%2F11&rft.date=2013-04-15&rft.aulast=Shorrock&rft.aufirst=Tim&rft_id=http%3A%2F%2Fwww.thenation.com%2Farticle%2F173521%2Fobamas-crackdown-whistleblowers&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-nytimes2005-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-nytimes2005_22-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJAMES_RISENERIC_LICHTBLAU2005" class="citation news cs1">JAMES RISEN; ERIC LICHTBLAU (16 December 2005). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2005/12/16/politics/16program.html">"Bush Lets U.S. Spy on Callers Without Courts"</a>. <i><a href="/wiki/The_New_York_Times" title="The New York Times">The New York Times</a></i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+New+York+Times&rft.atitle=Bush+Lets+U.S.+Spy+on+Callers+Without+Courts&rft.date=2005-12-16&rft.au=JAMES+RISEN&rft.au=ERIC+LICHTBLAU&rft_id=https%3A%2F%2Fwww.nytimes.com%2F2005%2F12%2F16%2Fpolitics%2F16program.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-USATODAY1-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-USATODAY1_23-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLeslie_Cauley2006" class="citation news cs1">Leslie Cauley (11 May 2006). <a rel="nofollow" class="external text" href="http://usatoday30.usatoday.com/news/washington/2006-05-10-nsa_x.htm">"NSA has massive database of Americans' phone calls"</a>. <i><a href="/wiki/USA_Today" title="USA Today">USA Today</a></i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=USA+Today&rft.atitle=NSA+has+massive+database+of+Americans%27+phone+calls&rft.date=2006-05-11&rft.au=Leslie+Cauley&rft_id=http%3A%2F%2Fusatoday30.usatoday.com%2Fnews%2Fwashington%2F2006-05-10-nsa_x.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-Poulsen-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-Poulsen_24-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPoulsen2008" class="citation news cs1">Poulsen, Kevin (6 March 2008). <a rel="nofollow" class="external text" href="https://www.wired.com/threatlevel/2008/03/whistleblower-f/">"Whistle-Blower: Feds Have a Backdoor Into Wireless Carrier – Congress Reacts"</a>. <i>Wired</i><span class="reference-accessdate">. Retrieved <span class="nowrap">14 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Wired&rft.atitle=Whistle-Blower%3A+Feds+Have+a+Backdoor+Into+Wireless+Carrier+%E2%80%93+Congress+Reacts&rft.date=2008-03-06&rft.aulast=Poulsen&rft.aufirst=Kevin&rft_id=https%3A%2F%2Fwww.wired.com%2Fthreatlevel%2F2008%2F03%2Fwhistleblower-f%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-Maass-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-Maass_25-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMaass2013" class="citation news cs1"><a href="/wiki/Peter_Maass" title="Peter Maass">Maass, Peter</a> (18 August 2013). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2013/08/18/magazine/laura-poitras-snowden.html">"How Laura Poitras Helped Snowden Spill His Secrets"</a>. <i><a href="/wiki/The_New_York_Times" title="The New York Times">The New York Times</a></i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+New+York+Times&rft.atitle=How+Laura+Poitras+Helped+Snowden+Spill+His+Secrets&rft.date=2013-08-18&rft.aulast=Maass&rft.aufirst=Peter&rft_id=https%3A%2F%2Fwww.nytimes.com%2F2013%2F08%2F18%2Fmagazine%2Flaura-poitras-snowden.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-spiegellaurapoitras-26"><span class="mw-cite-backlink">^ <a href="#cite_ref-spiegellaurapoitras_26-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-spiegellaurapoitras_26-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-spiegellaurapoitras_26-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-spiegellaurapoitras_26-3"><sup><i><b>d</b></i></sup></a> <a href="#cite_ref-spiegellaurapoitras_26-4"><sup><i><b>e</b></i></sup></a> <a href="#cite_ref-spiegellaurapoitras_26-5"><sup><i><b>f</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLaura_PoitrasMarcel_RosenbachHolger_Stark2013" class="citation news cs1">Laura Poitras; Marcel Rosenbach; Holger Stark (12 August 2013). <a rel="nofollow" class="external text" href="http://www.spiegel.de/international/world/germany-is-a-both-a-partner-to-and-a-target-of-nsa-surveillance-a-916029.html">"Ally and Target: US Intelligence Watches Germany Closely"</a>. <i>Der Spiegel</i><span class="reference-accessdate">. Retrieved <span class="nowrap">13 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Der+Spiegel&rft.atitle=Ally+and+Target%3A+US+Intelligence+Watches+Germany+Closely&rft.date=2013-08-12&rft.au=Laura+Poitras&rft.au=Marcel+Rosenbach&rft.au=Holger+Stark&rft_id=http%3A%2F%2Fwww.spiegel.de%2Finternational%2Fworld%2Fgermany-is-a-both-a-partner-to-and-a-target-of-nsa-surveillance-a-916029.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDeYoung2013" class="citation news cs1">DeYoung, Karen (12 August 2013). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/politics/kerry-to-face-questions-on-nsa-spying-during-south-america-trip/2013/08/12/afdab47e-0382-11e3-88d6-d5795fab4637_story.html">"Colombia asks Kerry to explain NSA spying"</a>. <i>The Washington Post</i><span class="reference-accessdate">. Retrieved <span class="nowrap">13 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=Colombia+asks+Kerry+to+explain+NSA+spying&rft.date=2013-08-12&rft.aulast=DeYoung&rft.aufirst=Karen&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fpolitics%2Fkerry-to-face-questions-on-nsa-spying-during-south-america-trip%2F2013%2F08%2F12%2Fafdab47e-0382-11e3-88d6-d5795fab4637_story.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-28">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1 cs1-prop-foreign-lang-source"><a rel="nofollow" class="external text" href="http://www12.senado.gov.br/noticias/materias/2013/08/06/greenwald-diz-que-espionagem-da-vantagens-comerciais-e-industriais-aos-estados-unidos">"Greenwald diz que espionagem dá vantagens comerciais e industriais aos Estados Unidos"</a> (in Portuguese). Federal Senate of Brazil<span class="reference-accessdate">. Retrieved <span class="nowrap">13 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Greenwald+diz+que+espionagem+d%C3%A1+vantagens+comerciais+e+industriais+aos+Estados+Unidos&rft.pub=Federal+Senate+of+Brazil&rft_id=http%3A%2F%2Fwww12.senado.gov.br%2Fnoticias%2Fmaterias%2F2013%2F08%2F06%2Fgreenwald-diz-que-espionagem-da-vantagens-comerciais-e-industriais-aos-estados-unidos&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1 cs1-prop-foreign-lang-source"><a rel="nofollow" class="external text" href="http://www.dw.de/greenwald-diz-que-eua-espionam-para-obter-vantagens-comerciais/a-17002867">"Greenwald diz que EUA espionam para obter vantagens comerciais"</a> (in Portuguese). Deutsche Welle<span class="reference-accessdate">. Retrieved <span class="nowrap">13 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Greenwald+diz+que+EUA+espionam+para+obter+vantagens+comerciais&rft.pub=Deutsche+Welle&rft_id=http%3A%2F%2Fwww.dw.de%2Fgreenwald-diz-que-eua-espionam-para-obter-vantagens-comerciais%2Fa-17002867&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-autogenerated8-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-autogenerated8_30-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20131217122329/http://www.washingtonpost.com/world/the_americas/report-snowden-would-help-brazil-if-given-asylum/2013/12/17/6ca6b7f8-66f0-11e3-997b-9213b17dac97_story.html">"Snowden: NSA's indiscriminate spying 'collapsing' - The Washington Post"</a>. Archived from <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/world/the_americas/report-snowden-would-help-brazil-if-given-asylum/2013/12/17/6ca6b7f8-66f0-11e3-997b-9213b17dac97_story.html">the original</a> on 17 December 2013.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Snowden%3A+NSA%27s+indiscriminate+spying+%27collapsing%27+-+The+Washington+Post&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fworld%2Fthe_americas%2Freport-snowden-would-help-brazil-if-given-asylum%2F2013%2F12%2F17%2F6ca6b7f8-66f0-11e3-997b-9213b17dac97_story.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://investigations.nbcnews.com/_news/2013/12/20/21975158-nsa-program-stopped-no-terror-attacks-says-white-house-panel-member">"NSA program stopped no terror attacks, says White House panel member"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=NSA+program+stopped+no+terror+attacks%2C+says+White+House+panel+member&rft_id=http%3A%2F%2Finvestigations.nbcnews.com%2F_news%2F2013%2F12%2F20%2F21975158-nsa-program-stopped-no-terror-attacks-says-white-house-panel-member&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-32">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFinn2013" class="citation news cs1">Finn, Peter (28 June 2013). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/world/national-security/nsa-chief-says-surveillance-programs-helped-thwart-dozens-of-plots/2013/06/27/e97ab0a2-df70-11e2-963a-72d740e88c12_story.html">"National Security"</a>. <i>The Washington Post</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=National+Security&rft.date=2013-06-28&rft.aulast=Finn&rft.aufirst=Peter&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fworld%2Fnational-security%2Fnsa-chief-says-surveillance-programs-helped-thwart-dozens-of-plots%2F2013%2F06%2F27%2Fe97ab0a2-df70-11e2-963a-72d740e88c12_story.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-reuters3-33"><span class="mw-cite-backlink">^ <a href="#cite_ref-reuters3_33-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-reuters3_33-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-reuters3_33-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-reuters3_33-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.reuters.com/article/us-dea-sod-idUSBRE97409R20130805">"Exclusive: U.S. directs agents to cover up program used to investigate Americans"</a>. <i>Reuters</i>. 5 August 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">14 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Reuters&rft.atitle=Exclusive%3A+U.S.+directs+agents+to+cover+up+program+used+to+investigate+Americans&rft.date=2013-08-05&rft_id=https%3A%2F%2Fwww.reuters.com%2Farticle%2Fus-dea-sod-idUSBRE97409R20130805&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-34">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20131029003314/http://bigstory.ap.org/article/senators-limit-nsa-snooping-us-phone-records">"Senators: Limit NSA snooping into US phone records"</a>. Associated Press. Archived from <a rel="nofollow" class="external text" href="http://bigstory.ap.org/article/senators-limit-nsa-snooping-us-phone-records">the original</a> on 29 October 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">15 October</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Senators%3A+Limit+NSA+snooping+into+US+phone+records&rft_id=http%3A%2F%2Fbigstory.ap.org%2Farticle%2Fsenators-limit-nsa-snooping-us-phone-records&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-35">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHeymannRodier2004" class="citation journal cs1">Heymann, David L.; Rodier, Guénaël (February 2004). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.3201/eid1002.031038">"Global Surveillance, National Surveillance, and SARS"</a>. <i>Emerging Infectious Diseases</i>. <b>10</b> (2): 173–175. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.3201%2Feid1002.031038">10.3201/eid1002.031038</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1080-6040">1080-6040</a>. <a href="/wiki/PMC_(identifier)" class="mw-redirect" title="PMC (identifier)">PMC</a> <span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3322938">3322938</a></span>. <a href="/wiki/PMID_(identifier)" class="mw-redirect" title="PMID (identifier)">PMID</a> <a rel="nofollow" class="external text" href="https://pubmed.ncbi.nlm.nih.gov/15040346">15040346</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Emerging+Infectious+Diseases&rft.atitle=Global+Surveillance%2C+National+Surveillance%2C+and+SARS&rft.volume=10&rft.issue=2&rft.pages=173-175&rft.date=2004-02&rft_id=https%3A%2F%2Fwww.ncbi.nlm.nih.gov%2Fpmc%2Farticles%2FPMC3322938%23id-name%3DPMC&rft.issn=1080-6040&rft_id=info%3Apmid%2F15040346&rft_id=info%3Adoi%2F10.3201%2Feid1002.031038&rft.aulast=Heymann&rft.aufirst=David+L.&rft.au=Rodier%2C+Gu%C3%A9na%C3%ABl&rft_id=http%3A%2F%2Fdx.doi.org%2F10.3201%2Feid1002.031038&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-36">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJohn_Miller" class="citation news cs1">John Miller. <a rel="nofollow" class="external text" href="http://www.cbsnews.com/news/nsa-speaks-out-on-snowden-spying/">"NSA speaks out on Snowden, spying"</a>. <i><a href="/wiki/CBS_News" title="CBS News">CBS News</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">17 December</span> 2013</span>. <q>What they are doing is collecting the phone records of more than 300 million Americans.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=CBS+News&rft.atitle=NSA+speaks+out+on+Snowden%2C+spying&rft.au=John+Miller&rft_id=http%3A%2F%2Fwww.cbsnews.com%2Fnews%2Fnsa-speaks-out-on-snowden-spying%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-Guardian1-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-Guardian1_37-0">^</a></b></span> <span class="reference-text"><a href="/wiki/Glenn_Greenwald" title="Glenn Greenwald">Greenwald, Glenn</a> (31 July 2013).<a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data">"XKeyscore: NSA tool collects 'nearly everything a user does on the internet' –  XKeyscore Gives 'Widest-Reaching' Collection of Online Data –  NSA Analysts Require No Prior Authorization for Searches –  Sweeps Up Emails, Social Media Activity and Browsing History"</a>. <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>. Retrieved 1 August 2013.</span> </li> <li id="cite_note-autogenerated4-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-autogenerated4_38-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNakashima2013" class="citation news cs1">Nakashima, Ellen (31 July 2013). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/world/national-security/governments-secret-order-to-verizon-to-be-unveiled-at-senate-hearing/2013/07/31/233fdd3a-f9cf-11e2-a369-d1954abcb7e3_story.html">"Newly declassified documents on phone records program released"</a>. <i>The Washington Post</i><span class="reference-accessdate">. Retrieved <span class="nowrap">4 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=Newly+declassified+documents+on+phone+records+program+released&rft.date=2013-07-31&rft.aulast=Nakashima&rft.aufirst=Ellen&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fworld%2Fnational-security%2Fgovernments-secret-order-to-verizon-to-be-unveiled-at-senate-hearing%2F2013%2F07%2F31%2F233fdd3a-f9cf-11e2-a369-d1954abcb7e3_story.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-39">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCharlie_SavageDavid_E._Sanger2013" class="citation news cs1">Charlie Savage; David E. Sanger (31 July 2013). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2013/08/01/us/nsa-surveillance.html?pagewanted=all&_r=0">"Senate Panel Presses N.S.A. on Phone Logs"</a>. <i>The New York Times</i><span class="reference-accessdate">. Retrieved <span class="nowrap">4 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+New+York+Times&rft.atitle=Senate+Panel+Presses+N.S.A.+on+Phone+Logs&rft.date=2013-07-31&rft.au=Charlie+Savage&rft.au=David+E.+Sanger&rft_id=https%3A%2F%2Fwww.nytimes.com%2F2013%2F08%2F01%2Fus%2Fnsa-surveillance.html%3Fpagewanted%3Dall%26_r%3D0&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-Tempora20131025-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-Tempora20131025_40-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBall2013" class="citation news cs1">Ball, James (25 October 2013). <a rel="nofollow" class="external text" href="https://www.theguardian.com/uk-news/2013/oct/25/leaked-memos-gchq-mass-surveillance-secret-snowden">"Leaked memos reveal GCHQ efforts to keep mass surveillance secret"</a>. <i>The Guardian</i><span class="reference-accessdate">. Retrieved <span class="nowrap">25 October</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=Leaked+memos+reveal+GCHQ+efforts+to+keep+mass+surveillance+secret&rft.date=2013-10-25&rft.aulast=Ball&rft.aufirst=James&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fuk-news%2F2013%2Foct%2F25%2Fleaked-memos-gchq-mass-surveillance-secret-snowden&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-WaPo1-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-WaPo1_41-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGellman,_BartonPoitras,_Laura2013" class="citation news cs1"><a href="/wiki/Barton_Gellman" title="Barton Gellman">Gellman, Barton</a>; <a href="/wiki/Laura_Poitras" title="Laura Poitras">Poitras, Laura</a> (6 June 2013). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html">"US Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program"</a>. <i><a href="/wiki/The_Washington_Post" title="The Washington Post">The Washington Post</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">15 June</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=US+Intelligence+Mining+Data+from+Nine+U.S.+Internet+Companies+in+Broad+Secret+Program&rft.date=2013-06-06&rft.au=Gellman%2C+Barton&rft.au=Poitras%2C+Laura&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Finvestigations%2Fus-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program%2F2013%2F06%2F06%2F3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-42">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGreenwaldMacAskill2013" class="citation news cs1">Greenwald, Glenn; MacAskill, Ewen (7 June 2013). <a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data">"NSA Prism program taps in to user data of Apple, Google and others"</a>. <i>The Guardian</i>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0261-3077">0261-3077</a><span class="reference-accessdate">. Retrieved <span class="nowrap">12 May</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=NSA+Prism+program+taps+in+to+user+data+of+Apple%2C+Google+and+others&rft.date=2013-06-07&rft.issn=0261-3077&rft.aulast=Greenwald&rft.aufirst=Glenn&rft.au=MacAskill%2C+Ewen&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2F2013%2Fjun%2F06%2Fus-tech-giants-nsa-data&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-43">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.nytimes.com/interactive/2013/09/29/us/documents-on-nsa-efforts-to-diagram-social-networks-of-us-citizens.html">"Documents on N.S.A. Efforts to Diagram Social Networks of U.S. Citizens"</a>. <i><a href="/wiki/The_New_York_Times" title="The New York Times">The New York Times</a></i>. 28 September 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">17 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+New+York+Times&rft.atitle=Documents+on+N.S.A.+Efforts+to+Diagram+Social+Networks+of+U.S.+Citizens&rft.date=2013-09-28&rft_id=https%3A%2F%2Fwww.nytimes.com%2Finteractive%2F2013%2F09%2F29%2Fus%2Fdocuments-on-nsa-efforts-to-diagram-social-networks-of-us-citizens.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-nsasocial-44"><span class="mw-cite-backlink">^ <a href="#cite_ref-nsasocial_44-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-nsasocial_44-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-nsasocial_44-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJames_RisenLaura_Poitras2013" class="citation news cs1">James Risen; Laura Poitras (28 September 2013). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html?_r=0&pagewanted=all">"N.S.A. Gathers Data on Social Connections of U.S. Citizens"</a>. <i>The New York Times</i><span class="reference-accessdate">. Retrieved <span class="nowrap">30 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+New+York+Times&rft.atitle=N.S.A.+Gathers+Data+on+Social+Connections+of+U.S.+Citizens&rft.date=2013-09-28&rft.au=James+Risen&rft.au=Laura+Poitras&rft_id=https%3A%2F%2Fwww.nytimes.com%2F2013%2F09%2F29%2Fus%2Fnsa-examines-social-networks-of-us-citizens.html%3F_r%3D0%26pagewanted%3Dall&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-45">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSegalFeigenbaumFord2016" class="citation book cs1">Segal, Aaron; Feigenbaum, Joan; Ford, Bryan (24 October 2016). "Privacy-Preserving Lawful Contact Chaining: [Preliminary Report]". <i>Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society</i>. WPES '16. New York, NY, USA: Association for Computing Machinery. pp. 185–188. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F2994620.2994628">10.1145/2994620.2994628</a></span>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-4503-4569-9" title="Special:BookSources/978-1-4503-4569-9"><bdi>978-1-4503-4569-9</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Privacy-Preserving+Lawful+Contact+Chaining%3A+%26%2391%3BPreliminary+Report%26%2393%3B&rft.btitle=Proceedings+of+the+2016+ACM+on+Workshop+on+Privacy+in+the+Electronic+Society&rft.place=New+York%2C+NY%2C+USA&rft.series=WPES+%2716&rft.pages=185-188&rft.pub=Association+for+Computing+Machinery&rft.date=2016-10-24&rft_id=info%3Adoi%2F10.1145%2F2994620.2994628&rft.isbn=978-1-4503-4569-9&rft.aulast=Segal&rft.aufirst=Aaron&rft.au=Feigenbaum%2C+Joan&rft.au=Ford%2C+Bryan&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-wapo1-46"><span class="mw-cite-backlink">^ <a href="#cite_ref-wapo1_46-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-wapo1_46-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-wapo1_46-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-wapo1_46-3"><sup><i><b>d</b></i></sup></a> <a href="#cite_ref-wapo1_46-4"><sup><i><b>e</b></i></sup></a> <a href="#cite_ref-wapo1_46-5"><sup><i><b>f</b></i></sup></a> <a href="#cite_ref-wapo1_46-6"><sup><i><b>g</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBarton_GellmanAshkan_Soltani2013" class="citation news cs1">Barton Gellman; Ashkan Soltani (1 November 2013). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html">"NSA collects millions of e-mail address books globally"</a>. <i><a href="/wiki/The_Washington_Post" title="The Washington Post">The Washington Post</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">20 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=NSA+collects+millions+of+e-mail+address+books+globally&rft.date=2013-11-01&rft.au=Barton+Gellman&rft.au=Ashkan+Soltani&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fworld%2Fnational-security%2Fnsa-collects-millions-of-e-mail-address-books-globally%2F2013%2F10%2F14%2F8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-microsoftencrypt-47"><span class="mw-cite-backlink">^ <a href="#cite_ref-microsoftencrypt_47-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-microsoftencrypt_47-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-microsoftencrypt_47-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-microsoftencrypt_47-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGlenn_GreenwaldEwen_MacAskillLaura_PoitrasSpencer_Ackerman" class="citation news cs1">Glenn Greenwald; Ewen MacAskill; Laura Poitras; Spencer Ackerman; Dominic Rushe. <a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data">"Microsoft handed the NSA access to encrypted messages"</a>. <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">22 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=Microsoft+handed+the+NSA+access+to+encrypted+messages&rft.au=Glenn+Greenwald&rft.au=Ewen+MacAskill&rft.au=Laura+Poitras&rft.au=Spencer+Ackerman&rft.au=Dominic+Rushe&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2F2013%2Fjul%2F11%2Fmicrosoft-nsa-collaboration-user-data&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-nsafin-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-nsafin_48-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation magazine cs1"><a rel="nofollow" class="external text" href="http://www.spiegel.de/international/world/spiegel-exclusive-nsa-spies-on-international-bank-transactions-a-922276.html">"<span class="cs1-kern-left"></span>'Follow the Money': NSA Spies on International Payments"</a>. <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">23 October</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Der+Spiegel&rft.atitle=%27Follow+the+Money%27%3A+NSA+Spies+on+International+Payments&rft_id=http%3A%2F%2Fwww.spiegel.de%2Finternational%2Fworld%2Fspiegel-exclusive-nsa-spies-on-international-bank-transactions-a-922276.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-wapo52013-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-wapo52013_49-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBarton_GellmanAshkan_Soltani2013" class="citation news cs1">Barton Gellman; Ashkan Soltani (4 December 2013). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html">"NSA tracking cellphone locations worldwide, Snowden documents show"</a>. <i><a href="/wiki/The_Washington_Post" title="The Washington Post">The Washington Post</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">5 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=NSA+tracking+cellphone+locations+worldwide%2C+Snowden+documents+show&rft.date=2013-12-04&rft.au=Barton+Gellman&rft.au=Ashkan+Soltani&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fworld%2Fnational-security%2Fnsa-tracking-cellphone-locations-worldwide-snowden-documents-show%2F2013%2F12%2F04%2F5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-50">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20131205024432/http://apps.washingtonpost.com/g/page/national/how-the-nsa-is-tracking-people-right-now/634/">"How the NSA is tracking people right now"</a>. <i>The Washington Post</i>. 4 December 2013. Archived from <a rel="nofollow" class="external text" href="https://apps.washingtonpost.com/g/page/national/how-the-nsa-is-tracking-people-right-now/634/">the original</a> on 5 December 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">6 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=How+the+NSA+is+tracking+people+right+now&rft.date=2013-12-04&rft_id=https%3A%2F%2Fapps.washingtonpost.com%2Fg%2Fpage%2Fnational%2Fhow-the-nsa-is-tracking-people-right-now%2F634%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-51">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAshkan_SoltaniMatt_DeLong2013" class="citation news cs1">Ashkan Soltani; Matt DeLong (4 December 2013). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131206032940/http://apps.washingtonpost.com/g/page/world/what-is-fascia/637/">"FASCIA: The NSA's huge trove of location records"</a>. <i>The Washington Post</i>. Archived from <a rel="nofollow" class="external text" href="https://apps.washingtonpost.com/g/page/world/what-is-fascia/637/">the original</a> on 6 December 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">6 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=FASCIA%3A+The+NSA%27s+huge+trove+of+location+records&rft.date=2013-12-04&rft.au=Ashkan+Soltani&rft.au=Matt+DeLong&rft_id=https%3A%2F%2Fapps.washingtonpost.com%2Fg%2Fpage%2Fworld%2Fwhat-is-fascia%2F637%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-52">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.washingtonpost.com/posttv/national/how-the-nsa-uses-cellphone-tracking-to-find-and-develop-targets/2013/12/04/d9114d52-5d1f-11e3-95c2-13623eb2b0e1_video.html">"How the NSA uses cellphone tracking to find and 'develop' targets"</a>. <i>The Washington Post</i>. 4 December 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">6 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=How+the+NSA+uses+cellphone+tracking+to+find+and+%27develop%27+targets&rft.date=2013-12-04&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fposttv%2Fnational%2Fhow-the-nsa-uses-cellphone-tracking-to-find-and-develop-targets%2F2013%2F12%2F04%2Fd9114d52-5d1f-11e3-95c2-13623eb2b0e1_video.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-53">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.washingtonpost.com/posttv/politics/reporter-explains-nsa-collection-of-cellphone-data/2013/12/04/67b85252-5d26-11e3-95c2-13623eb2b0e1_video.html">"Reporter explains NSA collection of cellphone data"</a>. <i>The Washington Post</i>. 4 December 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">6 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=Reporter+explains+NSA+collection+of+cellphone+data&rft.date=2013-12-04&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fposttv%2Fpolitics%2Freporter-explains-nsa-collection-of-cellphone-data%2F2013%2F12%2F04%2F67b85252-5d26-11e3-95c2-13623eb2b0e1_video.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-54">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPeterson2013" class="citation news cs1">Peterson, Andrea (4 December 2013). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/blogs/the-switch/wp/2013/12/04/the-nsa-says-it-obviously-can-track-locations-without-a-warrant-thats-not-so-obvious/">"The NSA says it 'obviously' can track locations without a warrant. That's not so obvious"</a>. <i>The Washington Post's The Switch</i><span class="reference-accessdate">. Retrieved <span class="nowrap">6 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post%27s+The+Switch&rft.atitle=The+NSA+says+it+%27obviously%27+can+track+locations+without+a+warrant.+That%27s+not+so+obvious.&rft.date=2013-12-04&rft.aulast=Peterson&rft.aufirst=Andrea&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fblogs%2Fthe-switch%2Fwp%2F2013%2F12%2F04%2Fthe-nsa-says-it-obviously-can-track-locations-without-a-warrant-thats-not-so-obvious%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-55"><span class="mw-cite-backlink"><b><a href="#cite_ref-55">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLee2013" class="citation news cs1">Lee, Timothy (4 December 2013). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/blogs/the-switch/wp/2013/12/04/the-nsa-could-figure-out-how-many-americans-its-spying-on-it-just-doesnt-want-to/?tid=up_next">"The NSA could figure out how many Americans it's spying on. It just doesn't want to"</a>. <i>The Washington Post's The Switch</i><span class="reference-accessdate">. Retrieved <span class="nowrap">6 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post%27s+The+Switch&rft.atitle=The+NSA+could+figure+out+how+many+Americans+it%27s+spying+on.+It+just+doesn%27t+want+to.&rft.date=2013-12-04&rft.aulast=Lee&rft.aufirst=Timothy&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fblogs%2Fthe-switch%2Fwp%2F2013%2F12%2F04%2Fthe-nsa-could-figure-out-how-many-americans-its-spying-on-it-just-doesnt-want-to%2F%3Ftid%3Dup_next&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-56"><span class="mw-cite-backlink"><b><a href="#cite_ref-56">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCraig_TimbergAshkan_Soltani" class="citation news cs1">Craig Timberg; Ashkan Soltani. <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/business/technology/by-cracking-cellphone-code-nsa-has-capacity-for-decoding-private-conversations/2013/12/13/e119b598-612f-11e3-bf45-61f69f54fc5f_story.html">"By cracking cellphone code, NSA has capacity for decoding private conversations"</a>. <i><a href="/wiki/The_Washington_Post" title="The Washington Post">The Washington Post</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">14 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=By+cracking+cellphone+code%2C+NSA+has+capacity+for+decoding+private+conversations&rft.au=Craig+Timberg&rft.au=Ashkan+Soltani&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fbusiness%2Ftechnology%2Fby-cracking-cellphone-code-nsa-has-capacity-for-decoding-private-conversations%2F2013%2F12%2F13%2Fe119b598-612f-11e3-bf45-61f69f54fc5f_story.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-57"><span class="mw-cite-backlink"><b><a href="#cite_ref-57">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20131211084030/http://apps.washingtonpost.com/g/page/world/how-the-nsa-pinpoints-a-mobile-device/645/#document/p2/a135576">"How the NSA pinpoints a mobile device"</a>. <i><a href="/wiki/The_Washington_Post" title="The Washington Post">The Washington Post</a></i>. Archived from <a rel="nofollow" class="external text" href="https://apps.washingtonpost.com/g/page/world/how-the-nsa-pinpoints-a-mobile-device/645/#document/p2/a135576">the original</a> on 11 December 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">14 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=How+the+NSA+pinpoints+a+mobile+device&rft_id=https%3A%2F%2Fapps.washingtonpost.com%2Fg%2Fpage%2Fworld%2Fhow-the-nsa-pinpoints-a-mobile-device%2F645%2F%23document%2Fp2%2Fa135576&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-spiegel201399-58"><span class="mw-cite-backlink">^ <a href="#cite_ref-spiegel201399_58-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-spiegel201399_58-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-spiegel201399_58-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-spiegel201399_58-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLaura_PoitrasMarcel_RosenbachHolger_Stark" class="citation magazine cs1">Laura Poitras; Marcel Rosenbach; Holger Stark. <a rel="nofollow" class="external text" href="http://www.spiegel.de/international/world/how-the-nsa-spies-on-smartphones-including-the-blackberry-a-921161.html">"iSpy: How the NSA Accesses Smartphone Data"</a>. <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">9 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Der+Spiegel&rft.atitle=iSpy%3A+How+the+NSA+Accesses+Smartphone+Data&rft.au=Laura+Poitras&rft.au=Marcel+Rosenbach&rft.au=Holger+Stark&rft_id=http%3A%2F%2Fwww.spiegel.de%2Finternational%2Fworld%2Fhow-the-nsa-spies-on-smartphones-including-the-blackberry-a-921161.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-59"><span class="mw-cite-backlink"><b><a href="#cite_ref-59">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGellmanSoltani2013" class="citation news cs1">Gellman, Barton; Soltani, Ashkan (30 October 2013). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html">"NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say"</a>. <i><a href="/wiki/The_Washington_Post" title="The Washington Post">The Washington Post</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">31 October</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=NSA+infiltrates+links+to+Yahoo%2C+Google+data+centers+worldwide%2C+Snowden+documents+say&rft.date=2013-10-30&rft.aulast=Gellman&rft.aufirst=Barton&rft.au=Soltani%2C+Ashkan&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fworld%2Fnational-security%2Fnsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say%2F2013%2F10%2F30%2Fe51d661e-4166-11e3-8b74-d89d714ca4dd_story.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-How_we_know-60"><span class="mw-cite-backlink"><b><a href="#cite_ref-How_we_know_60-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGellmanSoltaniPeterson2013" class="citation news cs1">Gellman, Barton; Soltani, Ashkan; Peterson, Andrea (4 November 2013). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/how-we-know-the-nsa-had-access-to-internal-google-and-yahoo-cloud-data/">"How we know the NSA had access to internal Google and Yahoo cloud data"</a>. <i>The Washington Post</i><span class="reference-accessdate">. Retrieved <span class="nowrap">5 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=How+we+know+the+NSA+had+access+to+internal+Google+and+Yahoo+cloud+data&rft.date=2013-11-04&rft.aulast=Gellman&rft.aufirst=Barton&rft.au=Soltani%2C+Ashkan&rft.au=Peterson%2C+Andrea&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fblogs%2Fthe-switch%2Fwp%2F2013%2F11%2F04%2Fhow-we-know-the-nsa-had-access-to-internal-google-and-yahoo-cloud-data%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-61"><span class="mw-cite-backlink"><b><a href="#cite_ref-61">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBarton_GellmanCraig_TimbergSteven_Rich2013" class="citation news cs1">Barton Gellman; Craig Timberg; Steven Rich (4 October 2013). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html">"Secret NSA documents show campaign against Tor encrypted network"</a>. <i>The Washington Post</i><span class="reference-accessdate">. Retrieved <span class="nowrap">19 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=Secret+NSA+documents+show+campaign+against+Tor+encrypted+network&rft.date=2013-10-04&rft.au=Barton+Gellman&rft.au=Craig+Timberg&rft.au=Steven+Rich&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fworld%2Fnational-security%2Fsecret-nsa-documents-show-campaign-against-tor-encrypted-network%2F2013%2F10%2F04%2F610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-62"><span class="mw-cite-backlink"><b><a href="#cite_ref-62">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSteven_RichMatt_DeLong2013" class="citation news cs1">Steven Rich; Matt DeLong (4 October 2013). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131203051440/http://apps.washingtonpost.com/g/page/world/nsa-slideshow-on-the-tor-problem/499/">"NSA slideshow on 'The TOR problem'<span class="cs1-kern-right"></span>"</a>. <i>The Washington Post</i>. Archived from <a rel="nofollow" class="external text" href="https://apps.washingtonpost.com/g/page/world/nsa-slideshow-on-the-tor-problem/499/">the original</a> on 3 December 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">19 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=NSA+slideshow+on+%27The+TOR+problem%27&rft.date=2013-10-04&rft.au=Steven+Rich&rft.au=Matt+DeLong&rft_id=https%3A%2F%2Fapps.washingtonpost.com%2Fg%2Fpage%2Fworld%2Fnsa-slideshow-on-the-tor-problem%2F499%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-63"><span class="mw-cite-backlink"><b><a href="#cite_ref-63">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLee2013" class="citation news cs1">Lee, Timothy B. (4 October 2013). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/blogs/the-switch/wp/2013/10/04/everything-you-need-to-know-about-the-nsa-and-tor-in-one-faq/">"Everything you need to know about the NSA and Tor in one FAQ"</a>. <i>The Washington Post</i><span class="reference-accessdate">. Retrieved <span class="nowrap">19 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=Everything+you+need+to+know+about+the+NSA+and+Tor+in+one+FAQ&rft.date=2013-10-04&rft.aulast=Lee&rft.aufirst=Timothy+B.&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fblogs%2Fthe-switch%2Fwp%2F2013%2F10%2F04%2Feverything-you-need-to-know-about-the-nsa-and-tor-in-one-faq%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-64"><span class="mw-cite-backlink"><b><a href="#cite_ref-64">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20131030200327/http://apps.washingtonpost.com/g/page/world/nsa-research-report-on-the-tor-encryption-program/501/">"NSA report on the Tor encrypted network"</a>. <i>The Washington Post</i>. 4 October 2013. Archived from <a rel="nofollow" class="external text" href="https://apps.washingtonpost.com/g/page/world/nsa-research-report-on-the-tor-encryption-program/501/">the original</a> on 30 October 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">19 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=NSA+report+on+the+Tor+encrypted+network&rft.date=2013-10-04&rft_id=https%3A%2F%2Fapps.washingtonpost.com%2Fg%2Fpage%2Fworld%2Fnsa-research-report-on-the-tor-encryption-program%2F501%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-65"><span class="mw-cite-backlink"><b><a href="#cite_ref-65">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20131202233236/http://apps.washingtonpost.com/g/page/world/gchq-report-on-mullenize-program-to-stain-anonymous-electronic-traffic/502/">"GCHQ report on 'MULLENIZE' program to 'stain' anonymous electronic traffic"</a>. <i>The Washington Post</i>. 4 October 2013. Archived from <a rel="nofollow" class="external text" href="https://apps.washingtonpost.com/g/page/world/gchq-report-on-mullenize-program-to-stain-anonymous-electronic-traffic/502/">the original</a> on 2 December 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">19 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=GCHQ+report+on+%27MULLENIZE%27+program+to+%27stain%27+anonymous+electronic+traffic&rft.date=2013-10-04&rft_id=https%3A%2F%2Fapps.washingtonpost.com%2Fg%2Fpage%2Fworld%2Fgchq-report-on-mullenize-program-to-stain-anonymous-electronic-traffic%2F502%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-66"><span class="mw-cite-backlink"><b><a href="#cite_ref-66">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJames_BallBruce_SchneierGlenn_Greenwald2013" class="citation news cs1">James Ball; Bruce Schneier; Glenn Greenwald (4 October 2013). <a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption">"NSA and GCHQ target Tor network that protects anonymity of web users"</a>. <i>The Guardian</i><span class="reference-accessdate">. Retrieved <span class="nowrap">19 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=NSA+and+GCHQ+target+Tor+network+that+protects+anonymity+of+web+users&rft.date=2013-10-04&rft.au=James+Ball&rft.au=Bruce+Schneier&rft.au=Glenn+Greenwald&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2F2013%2Foct%2F04%2Fnsa-gchq-attack-tor-network-encryption&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-67"><span class="mw-cite-backlink"><b><a href="#cite_ref-67">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSchneier2013" class="citation news cs1">Schneier, Bruce (4 October 2013). <a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity">"Attacking Tor: how the NSA targets users' online anonymity"</a>. <i>The Guardian</i><span class="reference-accessdate">. Retrieved <span class="nowrap">19 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=Attacking+Tor%3A+how+the+NSA+targets+users%27+online+anonymity&rft.date=2013-10-04&rft.aulast=Schneier&rft.aufirst=Bruce&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2F2013%2Foct%2F04%2Ftor-attacks-nsa-users-online-anonymity&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-68"><span class="mw-cite-backlink"><b><a href="#cite_ref-68">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document">"<span class="cs1-kern-left"></span>'Tor Stinks' presentation – read the full document"</a>. <i>The Guardian</i>. 4 October 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">19 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=%27Tor+Stinks%27+presentation+%E2%80%93+read+the+full+document&rft.date=2013-10-04&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2Finteractive%2F2013%2Foct%2F04%2Ftor-stinks-nsa-presentation-document&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-69"><span class="mw-cite-backlink"><b><a href="#cite_ref-69">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity">"Tor: 'The king of high-secure, low-latency anonymity'<span class="cs1-kern-right"></span>"</a>. <i>The Guardian</i>. 4 October 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">19 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=Tor%3A+%27The+king+of+high-secure%2C+low-latency+anonymity%27&rft.date=2013-10-04&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2Finteractive%2F2013%2Foct%2F04%2Ftor-high-secure-internet-anonymity&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-spirgelconcierge-70"><span class="mw-cite-backlink">^ <a href="#cite_ref-spirgelconcierge_70-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-spirgelconcierge_70-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLaura_PoitrasMarcel_RosenbachHolger_Stark2013" class="citation news cs1">Laura Poitras; Marcel Rosenbach; Holger Stark (17 November 2013). <a rel="nofollow" class="external text" href="http://www.spiegel.de/international/europe/gchq-monitors-hotel-reservations-to-track-diplomats-a-933914.html">"<span class="cs1-kern-left"></span>'Royal Concierge': GCHQ Monitors Hotel Reservations to Track Diplomats"</a>. <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">17 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Der+Spiegel&rft.atitle=%27Royal+Concierge%27%3A+GCHQ+Monitors+Hotel+Reservations+to+Track+Diplomats&rft.date=2013-11-17&rft.au=Laura+Poitras&rft.au=Marcel+Rosenbach&rft.au=Holger+Stark&rft_id=http%3A%2F%2Fwww.spiegel.de%2Finternational%2Feurope%2Fgchq-monitors-hotel-reservations-to-track-diplomats-a-933914.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-71"><span class="mw-cite-backlink"><b><a href="#cite_ref-71">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMARK_MAZZETTIJUSTIN_ELLIOTT2013" class="citation news cs1">MARK MAZZETTI; JUSTIN ELLIOTT (9 December 2013). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2013/12/10/world/spies-dragnet-reaches-a-playing-field-of-elves-and-trolls.html">"Spies Infiltrate a Fantasy Realm of Online Games"</a>. <i><a href="/wiki/The_New_York_Times" title="The New York Times">The New York Times</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">12 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+New+York+Times&rft.atitle=Spies+Infiltrate+a+Fantasy+Realm+of+Online+Games&rft.date=2013-12-09&rft.au=MARK+MAZZETTI&rft.au=JUSTIN+ELLIOTT&rft_id=https%3A%2F%2Fwww.nytimes.com%2F2013%2F12%2F10%2Fworld%2Fspies-dragnet-reaches-a-playing-field-of-elves-and-trolls.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-WaPo20130829-72"><span class="mw-cite-backlink">^ <a href="#cite_ref-WaPo20130829_72-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-WaPo20130829_72-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBarton_GellmanGreg_Miller2013" class="citation news cs1">Barton Gellman; Greg Miller (29 August 2013). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/world/national-security/black-budget-summary-details-us-spy-networks-successes-failures-and-objectives/2013/08/29/7e57bb78-10ab-11e3-8cdd-bcdc09410972_story.html">"U.S. spy network's successes, failures and objectives detailed in 'black budget' summary"</a>. <i>The Washington Post</i><span class="reference-accessdate">. Retrieved <span class="nowrap">29 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=U.S.+spy+network%27s+successes%2C+failures+and+objectives+detailed+in+%27black+budget%27+summary&rft.date=2013-08-29&rft.au=Barton+Gellman&rft.au=Greg+Miller&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fworld%2Fnational-security%2Fblack-budget-summary-details-us-spy-networks-successes-failures-and-objectives%2F2013%2F08%2F29%2F7e57bb78-10ab-11e3-8cdd-bcdc09410972_story.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-73"><span class="mw-cite-backlink"><b><a href="#cite_ref-73">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMaass2013" class="citation news cs1">Maass, Peter (13 August 2013). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2013/08/18/magazine/laura-poitras-snowden.html?pagewanted=all">"How Laura Poitras Helped Snowden Spill His Secrets"</a>. <i>The New York Times</i><span class="reference-accessdate">. Retrieved <span class="nowrap">13 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+New+York+Times&rft.atitle=How+Laura+Poitras+Helped+Snowden+Spill+His+Secrets&rft.date=2013-08-13&rft.aulast=Maass&rft.aufirst=Peter&rft_id=https%3A%2F%2Fwww.nytimes.com%2F2013%2F08%2F18%2Fmagazine%2Flaura-poitras-snowden.html%3Fpagewanted%3Dall&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-74"><span class="mw-cite-backlink"><b><a href="#cite_ref-74">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEasley" class="citation news cs1">Easley, Jonathan. <a rel="nofollow" class="external text" href="https://thehill.com/blogs/blog-briefing-room/news/159053-snowden-nsa-targeted-journalists-critical-of-government-after-9-11/">"Snowden: NSA targeted journalists critical of government after 9/11"</a>. <i><a href="/wiki/The_Hill_(newspaper)" title="The Hill (newspaper)">The Hill</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">14 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Hill&rft.atitle=Snowden%3A+NSA+targeted+journalists+critical+of+government+after+9%2F11&rft.aulast=Easley&rft.aufirst=Jonathan&rft_id=https%3A%2F%2Fthehill.com%2Fblogs%2Fblog-briefing-room%2Fnews%2F159053-snowden-nsa-targeted-journalists-critical-of-government-after-9-11%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-spiegel1000-75"><span class="mw-cite-backlink">^ <a href="#cite_ref-spiegel1000_75-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-spiegel1000_75-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLaura_PoitrasMarcel_RosenbachHolger_Stark2013" class="citation news cs1">Laura Poitras; Marcel Rosenbach; Holger Stark (26 August 2013). <a rel="nofollow" class="external text" href="http://www.spiegel.de/international/world/secret-nsa-documents-show-how-the-us-spies-on-europe-and-the-un-a-918625-2.html">"Codename 'Apalachee': How America Spies on Europe and the UN"</a>. <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i>. p. 2<span class="reference-accessdate">. Retrieved <span class="nowrap">26 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Der+Spiegel&rft.atitle=Codename+%27Apalachee%27%3A+How+America+Spies+on+Europe+and+the+UN&rft.pages=2&rft.date=2013-08-26&rft.au=Laura+Poitras&rft.au=Marcel+Rosenbach&rft.au=Holger+Stark&rft_id=http%3A%2F%2Fwww.spiegel.de%2Finternational%2Fworld%2Fsecret-nsa-documents-show-how-the-us-spies-on-europe-and-the-un-a-918625-2.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-76"><span class="mw-cite-backlink"><b><a href="#cite_ref-76">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLaura_PoitrasMarcel_RosenbachFidelius_SchmidHolger_Stark2013" class="citation news cs1">Laura Poitras; Marcel Rosenbach; Fidelius Schmid; Holger Stark (29 June 2013). <a rel="nofollow" class="external text" href="http://www.spiegel.de/international/europe/nsa-spied-on-european-union-offices-a-908590.html">"Attacks from America: NSA Spied on European Union Offices"</a>. <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">26 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Der+Spiegel&rft.atitle=Attacks+from+America%3A+NSA+Spied+on+European+Union+Offices&rft.date=2013-06-29&rft.au=Laura+Poitras&rft.au=Marcel+Rosenbach&rft.au=Fidelius+Schmid&rft.au=Holger+Stark&rft_id=http%3A%2F%2Fwww.spiegel.de%2Finternational%2Feurope%2Fnsa-spied-on-european-union-offices-a-908590.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-77"><span class="mw-cite-backlink"><b><a href="#cite_ref-77">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20131010084202/http://bigstory.ap.org/article/report-canada-spies-targeted-brazil-mine-ministry">"Report: Canada spies targeted Brazil mine ministry"</a>. Associated Press. Archived from <a rel="nofollow" class="external text" href="http://bigstory.ap.org/article/report-canada-spies-targeted-brazil-mine-ministry">the original</a> on 10 October 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">7 October</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Report%3A+Canada+spies+targeted+Brazil+mine+ministry&rft_id=http%3A%2F%2Fbigstory.ap.org%2Farticle%2Freport-canada-spies-targeted-brazil-mine-ministry&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-78"><span class="mw-cite-backlink"><b><a href="#cite_ref-78">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation magazine cs1"><a rel="nofollow" class="external text" href="http://www.spiegel.de/international/world/nsa-targeted-french-foreign-ministry-a-919693.html">"<span class="cs1-kern-left"></span>'Success Story': NSA Targeted French Foreign Ministry"</a>. <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">24 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Der+Spiegel&rft.atitle=%27Success+Story%27%3A+NSA+Targeted+French+Foreign+Ministry&rft_id=http%3A%2F%2Fwww.spiegel.de%2Finternational%2Fworld%2Fnsa-targeted-french-foreign-ministry-a-919693.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-gchqnsa20122013-79"><span class="mw-cite-backlink">^ <a href="#cite_ref-gchqnsa20122013_79-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-gchqnsa20122013_79-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-gchqnsa20122013_79-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-gchqnsa20122013_79-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJames_BallNick_Hopkins" class="citation news cs1">James Ball; Nick Hopkins. <a rel="nofollow" class="external text" href="https://www.theguardian.com/uk-news/2013/dec/20/gchq-targeted-aid-agencies-german-government-eu-commissioner">"GCHQ and NSA targeted charities, Germans, Israeli PM and EU chief"</a>. <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">20 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=GCHQ+and+NSA+targeted+charities%2C+Germans%2C+Israeli+PM+and+EU+chief&rft.au=James+Ball&rft.au=Nick+Hopkins&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fuk-news%2F2013%2Fdec%2F20%2Fgchq-targeted-aid-agencies-german-government-eu-commissioner&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-espruit-80"><span class="mw-cite-backlink">^ <a href="#cite_ref-espruit_80-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-espruit_80-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGlenn_GreenwaldStefania_Maurizi2013" class="citation magazine cs1">Glenn Greenwald; Stefania Maurizi (5 December 2013). <a rel="nofollow" class="external text" href="http://espresso.repubblica.it/inchieste/2013/12/05/news/revealed-how-the-nsa-targets-italy-1.144428">"Revealed: How the Nsa Targets Italy"</a>. <i><a href="/wiki/L%27espresso" class="mw-redirect" title="L'espresso">L'espresso</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">13 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=L%27espresso&rft.atitle=Revealed%3A+How+the+Nsa+Targets+Italy&rft.date=2013-12-05&rft.au=Glenn+Greenwald&rft.au=Stefania+Maurizi&rft_id=http%3A%2F%2Fespresso.repubblica.it%2Finchieste%2F2013%2F12%2F05%2Fnews%2Frevealed-how-the-nsa-targets-italy-1.144428&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-thehindunsa-81"><span class="mw-cite-backlink">^ <a href="#cite_ref-thehindunsa_81-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-thehindunsa_81-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFShobhan_Saxena2013" class="citation news cs1">Shobhan Saxena (25 September 2013). <a rel="nofollow" class="external text" href="http://www.thehindu.com/news/international/world/nsa-planted-bugs-at-indian-missions-in-dc-un/article5164944.ece">"NSA planted bugs at Indian missions in D.C., U.N."</a> <i><a href="/wiki/The_Hindu" title="The Hindu">The Hindu</a></i>. Chennai, India<span class="reference-accessdate">. Retrieved <span class="nowrap">24 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Hindu&rft.atitle=NSA+planted+bugs+at+Indian+missions+in+D.C.%2C+U.N.&rft.date=2013-09-25&rft.au=Shobhan+Saxena&rft_id=http%3A%2F%2Fwww.thehindu.com%2Fnews%2Finternational%2Fworld%2Fnsa-planted-bugs-at-indian-missions-in-dc-un%2Farticle5164944.ece&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-82"><span class="mw-cite-backlink"><b><a href="#cite_ref-82">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJens_GlüsingLaura_PoitrasMarcel_RosenbachHolger_Stark" class="citation magazine cs1">Jens Glüsing; Laura Poitras; Marcel Rosenbach; Holger Stark. <a rel="nofollow" class="external text" href="http://www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html">"Fresh Leak on US Spying: NSA Accessed Mexican President's Email"</a>. <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">20 October</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Der+Spiegel&rft.atitle=Fresh+Leak+on+US+Spying%3A+NSA+Accessed+Mexican+President%27s+Email&rft.au=Jens+Gl%C3%BCsing&rft.au=Laura+Poitras&rft.au=Marcel+Rosenbach&rft.au=Holger+Stark&rft_id=http%3A%2F%2Fwww.spiegel.de%2Finternational%2Fworld%2Fnsa-hacked-email-account-of-mexican-president-a-928817.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-eu-83"><span class="mw-cite-backlink"><b><a href="#cite_ref-eu_83-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLaura_Poitras,_Marcel_Rosenbach,_Fidelius_Schmid_und_Holger_Stark2013" class="citation news cs1 cs1-prop-foreign-lang-source">Laura Poitras, Marcel Rosenbach, Fidelius Schmid und Holger Stark (29 June 2013). <a rel="nofollow" class="external text" href="http://www.spiegel.de/netzwelt/netzpolitik/nsa-hat-wanzen-in-eu-gebaeuden-installiert-a-908515.html">"Geheimdokumente: NSA horcht EU-Vertretungen mit Wanzen aus"</a>. <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i> (in German)<span class="reference-accessdate">. Retrieved <span class="nowrap">29 June</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Der+Spiegel&rft.atitle=Geheimdokumente%3A+NSA+horcht+EU-Vertretungen+mit+Wanzen+aus&rft.date=2013-06-29&rft.au=Laura+Poitras%2C+Marcel+Rosenbach%2C+Fidelius+Schmid+und+Holger+Stark&rft_id=http%3A%2F%2Fwww.spiegel.de%2Fnetzwelt%2Fnetzpolitik%2Fnsa-hat-wanzen-in-eu-gebaeuden-installiert-a-908515.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_news" title="Template:Cite news">cite news</a>}}</code>: CS1 maint: multiple names: authors list (<a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">link</a>)</span></span> </li> <li id="cite_note-unnewyork-84"><span class="mw-cite-backlink">^ <a href="#cite_ref-unnewyork_84-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-unnewyork_84-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-unnewyork_84-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-unnewyork_84-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1 cs1-prop-foreign-lang-source"><a rel="nofollow" class="external text" href="http://www.spiegel.de/politik/ausland/nsa-hoerte-zentrale-der-vereinte-nationen-in-new-york-ab-a-918421.html">"US-Geheimdienst hörte Zentrale der Vereinten Nationen ab"</a>. <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i> (in German). 25 August 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">25 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Der+Spiegel&rft.atitle=US-Geheimdienst+h%C3%B6rte+Zentrale+der+Vereinten+Nationen+ab&rft.date=2013-08-25&rft_id=http%3A%2F%2Fwww.spiegel.de%2Fpolitik%2Fausland%2Fnsa-hoerte-zentrale-der-vereinte-nationen-in-new-york-ab-a-918421.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-BRUSA_papers-85"><span class="mw-cite-backlink"><b><a href="#cite_ref-BRUSA_papers_85-0">^</a></b></span> <span class="reference-text">U.S. National Security Agency. <a rel="nofollow" class="external text" href="http://www.nsa.gov/public_info/_files/ukusa/early_papers_1940-1944.pdf">Early Papers Concerning US-UK Agreement – 1940–1944</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130918015422/http://www.nsa.gov/public_info/_files/ukusa/early_papers_1940-1944.pdf">Archived</a> 18 September 2013 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>. Agreement between British Government Code and Cipher School and U.S. War Department dated 17 May 1943. Retrieved: 5 October 2013.</span> </li> <li id="cite_note-Guardian_2010-86"><span class="mw-cite-backlink">^ <a href="#cite_ref-Guardian_2010_86-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Guardian_2010_86-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNorton-Taylor2010" class="citation news cs1">Norton-Taylor, Richard (25 June 2010). <a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2010/jun/25/intelligence-deal-uk-us-released">"Not so secret: deal at the heart of UK-US intelligence"</a>. <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>. London<span class="reference-accessdate">. Retrieved <span class="nowrap">25 June</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=Not+so+secret%3A+deal+at+the+heart+of+UK-US+intelligence&rft.date=2010-06-25&rft.aulast=Norton-Taylor&rft.aufirst=Richard&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2F2010%2Fjun%2F25%2Fintelligence-deal-uk-us-released&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-fiveeyesap-87"><span class="mw-cite-backlink">^ <a href="#cite_ref-fiveeyesap_87-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-fiveeyesap_87-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-fiveeyesap_87-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-fiveeyesap_87-3"><sup><i><b>d</b></i></sup></a> <a href="#cite_ref-fiveeyesap_87-4"><sup><i><b>e</b></i></sup></a> <a href="#cite_ref-fiveeyesap_87-5"><sup><i><b>f</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20150525025457/http://bigstory.ap.org/article/experts-say-us-spy-alliance-will-survive-snowden">"5-nation spy alliance too vital for leaks to harm"</a>. Associated Press. Archived from <a rel="nofollow" class="external text" href="http://bigstory.ap.org/article/experts-say-us-spy-alliance-will-survive-snowden">the original</a> on 25 May 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">29 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=5-nation+spy+alliance+too+vital+for+leaks+to+harm&rft_id=http%3A%2F%2Fbigstory.ap.org%2Farticle%2Fexperts-say-us-spy-alliance-will-survive-snowden&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-smhaug28-88"><span class="mw-cite-backlink">^ <a href="#cite_ref-smhaug28_88-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-smhaug28_88-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDorling" class="citation news cs1">Dorling, Philip. <a rel="nofollow" class="external text" href="http://www.smh.com.au/technology/technology-news/australian-spies-in-global-deal-to-tap-undersea-cables-20130828-2sr58.html">"Australian spies in global deal to tap undersea cables"</a>. <i>The Sydney Morning Herald</i><span class="reference-accessdate">. Retrieved <span class="nowrap">29 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Sydney+Morning+Herald&rft.atitle=Australian+spies+in+global+deal+to+tap+undersea+cables&rft.aulast=Dorling&rft.aufirst=Philip&rft_id=http%3A%2F%2Fwww.smh.com.au%2Ftechnology%2Ftechnology-news%2Faustralian-spies-in-global-deal-to-tap-undersea-cables-20130828-2sr58.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-SZAug28-89"><span class="mw-cite-backlink"><b><a href="#cite_ref-SZAug28_89-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJohn_GoetzHans_LeyendeckerFrederik_Obermaier2013" class="citation news cs1">John Goetz; Hans Leyendecker; Frederik Obermaier (28 August 2013). <a rel="nofollow" class="external text" href="http://international.sueddeutsche.de/post/59603415442/british-officials-have-far-reaching-access-to-internet">"British Officials Have Far-Reaching Access To Internet And Telephone Communications"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">28 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=British+Officials+Have+Far-Reaching+Access+To+Internet+And+Telephone+Communications&rft.date=2013-08-28&rft.au=John+Goetz&rft.au=Hans+Leyendecker&rft.au=Frederik+Obermaier&rft_id=http%3A%2F%2Finternational.sueddeutsche.de%2Fpost%2F59603415442%2Fbritish-officials-have-far-reaching-access-to-internet&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-90"><span class="mw-cite-backlink"><b><a href="#cite_ref-90">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://www.spiegel.de/international/world/interview-with-whistleblower-edward-snowden-on-global-spying-a-910006.html">"Edward Snowden Interview: The NSA and Its Willing Helpers"</a>. <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i>. 8 July 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">29 August</span> 2013</span>. <q>Snowden: Yes, of course. We're (the NSA) in bed together with the Germans the same as with most other Western countries.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Der+Spiegel&rft.atitle=Edward+Snowden+Interview%3A+The+NSA+and+Its+Willing+Helpers&rft.date=2013-07-08&rft_id=http%3A%2F%2Fwww.spiegel.de%2Finternational%2Fworld%2Finterview-with-whistleblower-edward-snowden-on-global-spying-a-910006.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-Greenwald2014-91"><span class="mw-cite-backlink"><b><a href="#cite_ref-Greenwald2014_91-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGlenn_Greenwald2014" class="citation book cs1">Glenn Greenwald (13 May 2014). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=AvFzAgAAQBAJ"><i>No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State</i></a>. Henry Holt and Company. pp. 104–105. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-62779-074-1" title="Special:BookSources/978-1-62779-074-1"><bdi>978-1-62779-074-1</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=No+Place+to+Hide%3A+Edward+Snowden%2C+the+NSA%2C+and+the+U.S.+Surveillance+State&rft.pages=104-105&rft.pub=Henry+Holt+and+Company&rft.date=2014-05-13&rft.isbn=978-1-62779-074-1&rft.au=Glenn+Greenwald&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DAvFzAgAAQBAJ&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-92"><span class="mw-cite-backlink"><b><a href="#cite_ref-92">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRyan2014" class="citation web cs1">Ryan, Gallagher (19 June 2014). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20180502020123/https://theintercept.com/2014/06/18/nsa-surveillance-secret-cable-partners-revealed-rampart-a/">"How Secret Partners Expand NSA's Surveillance Dragnet"</a>. <i>The Intercept</i>. In the table of "Approved SIGINT Countries". Archived from <a rel="nofollow" class="external text" href="https://theintercept.com/2014/06/18/nsa-surveillance-secret-cable-partners-revealed-rampart-a/">the original</a> on 2 May 2018.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+Intercept&rft.atitle=How+Secret+Partners+Expand+NSA%27s+Surveillance+Dragnet&rft.pages=In+the+table+of+%22Approved+SIGINT+Countries%22&rft.date=2014-06-19&rft.aulast=Ryan&rft.aufirst=Gallagher&rft_id=https%3A%2F%2Ftheintercept.com%2F2014%2F06%2F18%2Fnsa-surveillance-secret-cable-partners-revealed-rampart-a%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-93"><span class="mw-cite-backlink"><b><a href="#cite_ref-93">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLaura_PoitrasMarcel_RosenbachHolger_Stark2013" class="citation news cs1">Laura Poitras; Marcel Rosenbach; Holger Stark (12 August 2013). <a rel="nofollow" class="external text" href="http://www.spiegel.de/international/world/germany-is-a-both-a-partner-to-and-a-target-of-nsa-surveillance-a-916029.html">"Ally and Target: US Intelligence Watches Germany Closely"</a>. <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">29 August</span> 2013</span>. <q>The NSA classifies about 30 other countries as "3rd parties," with whom it cooperates, though with reservations. Germany is one of them. "We can, and often do, target the signals of most 3rd party foreign partners," the secret NSA document reads.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Der+Spiegel&rft.atitle=Ally+and+Target%3A+US+Intelligence+Watches+Germany+Closely&rft.date=2013-08-12&rft.au=Laura+Poitras&rft.au=Marcel+Rosenbach&rft.au=Holger+Stark&rft_id=http%3A%2F%2Fwww.spiegel.de%2Finternational%2Fworld%2Fgermany-is-a-both-a-partner-to-and-a-target-of-nsa-surveillance-a-916029.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-94"><span class="mw-cite-backlink"><b><a href="#cite_ref-94">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLoxley2011" class="citation book cs1">Loxley, Adam (2011). <i>The Teleios Ring</i>. Leicester: Matador. p. 296. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1848769205" title="Special:BookSources/978-1848769205"><bdi>978-1848769205</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Teleios+Ring&rft.place=Leicester&rft.pages=296&rft.pub=Matador&rft.date=2011&rft.isbn=978-1848769205&rft.aulast=Loxley&rft.aufirst=Adam&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-95"><span class="mw-cite-backlink"><b><a href="#cite_ref-95">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRobert_DoverMichael_S._GoodmanClaudia_Hillebrand2013" class="citation book cs1">Robert Dover; Michael S. Goodman; Claudia Hillebrand, eds. (2013). <i>Routledge Companion to Intelligence Studies</i>. Routledge. p. 164. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9781134480296" title="Special:BookSources/9781134480296"><bdi>9781134480296</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Routledge+Companion+to+Intelligence+Studies&rft.pages=164&rft.pub=Routledge&rft.date=2013&rft.isbn=9781134480296&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-guardian031213-96"><span class="mw-cite-backlink"><b><a href="#cite_ref-guardian031213_96-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEwen_MacAskillJames_BallKatharine_Murphy2013" class="citation news cs1">Ewen MacAskill; James Ball; Katharine Murphy (2 December 2013). <a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/dec/02/revealed-australian-spy-agency-offered-to-share-data-about-ordinary-citizens">"Revealed: Australian spy agency offered to share data about ordinary citizens"</a>. <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">3 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=Revealed%3A+Australian+spy+agency+offered+to+share+data+about+ordinary+citizens&rft.date=2013-12-02&rft.au=Ewen+MacAskill&rft.au=James+Ball&rft.au=Katharine+Murphy&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2F2013%2Fdec%2F02%2Frevealed-australian-spy-agency-offered-to-share-data-about-ordinary-citizens&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-97"><span class="mw-cite-backlink"><b><a href="#cite_ref-97">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPhilip_Dorling2013" class="citation news cs1">Philip Dorling (31 October 2013). <a rel="nofollow" class="external text" href="http://www.smh.com.au/federal-politics/political-news/exposed-australias-asia-spy-network-20131030-2whia.html">"Exposed: Australia's Asia spy network"</a>. <i><a href="/wiki/The_Sydney_Morning_Herald" title="The Sydney Morning Herald">The Sydney Morning Herald</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">22 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Sydney+Morning+Herald&rft.atitle=Exposed%3A+Australia%27s+Asia+spy+network&rft.date=2013-10-31&rft.au=Philip+Dorling&rft_id=http%3A%2F%2Fwww.smh.com.au%2Ffederal-politics%2Fpolitical-news%2Fexposed-australias-asia-spy-network-20131030-2whia.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-philipsg-98"><span class="mw-cite-backlink">^ <a href="#cite_ref-philipsg_98-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-philipsg_98-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-philipsg_98-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-philipsg_98-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPhilip_Dorling" class="citation news cs1">Philip Dorling. <a rel="nofollow" class="external text" href="http://www.smh.com.au/technology/technology-news/singapore-south-korea-revealed-as-five-eyes-spying-partners-20131124-2y433.html">"Singapore, South Korea revealed as Five Eyes spying partners"</a>. <i><a href="/wiki/The_Sydney_Morning_Herald" title="The Sydney Morning Herald">The Sydney Morning Herald</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">18 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Sydney+Morning+Herald&rft.atitle=Singapore%2C+South+Korea+revealed+as+Five+Eyes+spying+partners&rft.au=Philip+Dorling&rft_id=http%3A%2F%2Fwww.smh.com.au%2Ftechnology%2Ftechnology-news%2Fsingapore-south-korea-revealed-as-five-eyes-spying-partners-20131124-2y433.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-99"><span class="mw-cite-backlink"><b><a href="#cite_ref-99">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBenson,_Simon2017" class="citation news cs1">Benson, Simon (23 March 2017). <a rel="nofollow" class="external text" href="http://www.theaustralian.com.au/national-affairs/immigration/security-red-flag-for-500-refugees-on-international-watchlist/news-story/129957e81c26c099045685818b56ceea">"Security red flag for 500 refugees"</a>. <i><a href="/wiki/The_Australian" title="The Australian">The Australian</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">23 March</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Australian&rft.atitle=Security+red+flag+for+500+refugees&rft.date=2017-03-23&rft.au=Benson%2C+Simon&rft_id=http%3A%2F%2Fwww.theaustralian.com.au%2Fnational-affairs%2Fimmigration%2Fsecurity-red-flag-for-500-refugees-on-international-watchlist%2Fnews-story%2F129957e81c26c099045685818b56ceea&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-cbccanusa-100"><span class="mw-cite-backlink">^ <a href="#cite_ref-cbccanusa_100-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-cbccanusa_100-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://www.cbc.ca/news2/pdf/nsa-canada-april32013.pdf">"NSA's Intelligence Relationship with Canada's Communications Security Establishment Canada (CSEC)"</a> <span class="cs1-format">(PDF)</span>. <a href="/wiki/Canadian_Broadcasting_Corporation" title="Canadian Broadcasting Corporation">Canadian Broadcasting Corporation</a><span class="reference-accessdate">. Retrieved <span class="nowrap">22 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=NSA%27s+Intelligence+Relationship+with+Canada%27s+Communications+Security+Establishment+Canada+%28CSEC%29&rft_id=http%3A%2F%2Fwww.cbc.ca%2Fnews2%2Fpdf%2Fnsa-canada-april32013.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-101"><span class="mw-cite-backlink"><b><a href="#cite_ref-101">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGreg_WestonGlenn_GreenwaldRyan_Gallagher" class="citation news cs1">Greg Weston; Glenn Greenwald; Ryan Gallagher. <a rel="nofollow" class="external text" href="http://www.cbc.ca/news/politics/snowden-document-shows-canada-set-up-spy-posts-for-nsa-1.2456886">"Snowden document shows Canada set up spy posts for NSA"</a>. <a href="/wiki/Canadian_Broadcasting_Corporation" title="Canadian Broadcasting Corporation">Canadian Broadcasting Corporation</a><span class="reference-accessdate">. Retrieved <span class="nowrap">22 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Snowden+document+shows+Canada+set+up+spy+posts+for+NSA&rft.au=Greg+Weston&rft.au=Glenn+Greenwald&rft.au=Ryan+Gallagher&rft_id=http%3A%2F%2Fwww.cbc.ca%2Fnews%2Fpolitics%2Fsnowden-document-shows-canada-set-up-spy-posts-for-nsa-1.2456886&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-102"><span class="mw-cite-backlink"><b><a href="#cite_ref-102">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.cbc.ca/news/politics/csec-used-airport-wi-fi-to-track-canadian-travellers-edward-snowden-documents-1.2517881">"CSEC used airport Wi-Fi to track Canadian travellers: Edward Snowden documents"</a>. <i>cbc.ca</i>. 31 January 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">8 March</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=cbc.ca&rft.atitle=CSEC+used+airport+Wi-Fi+to+track+Canadian+travellers%3A+Edward+Snowden+documents&rft.date=2014-01-31&rft_id=http%3A%2F%2Fwww.cbc.ca%2Fnews%2Fpolitics%2Fcsec-used-airport-wi-fi-to-track-canadian-travellers-edward-snowden-documents-1.2517881&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-103"><span class="mw-cite-backlink"><b><a href="#cite_ref-103">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJustin_Cremer" class="citation news cs1">Justin Cremer. <a rel="nofollow" class="external text" href="http://cphpost.dk/news/snowden-leak-confirms-denmark-spying-deal-with-us.8185.html">"Snowden leak confirms Denmark spying deal with US"</a>. <i><a href="/wiki/The_Copenhagen_Post" title="The Copenhagen Post">The Copenhagen Post</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">18 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Copenhagen+Post&rft.atitle=Snowden+leak+confirms+Denmark+spying+deal+with+US&rft.au=Justin+Cremer&rft_id=http%3A%2F%2Fcphpost.dk%2Fnews%2Fsnowden-leak-confirms-denmark-spying-deal-with-us.8185.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-104"><span class="mw-cite-backlink"><b><a href="#cite_ref-104">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJustin_Cremer" class="citation news cs1">Justin Cremer. <a rel="nofollow" class="external text" href="http://cphpost.dk/news/denmark-is-one-of-the-nsas-9-eyes.7611.html">"Denmark is one of the NSA's '9-Eyes'<span class="cs1-kern-right"></span>"</a>. <i><a href="/wiki/The_Copenhagen_Post" title="The Copenhagen Post">The Copenhagen Post</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">18 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Copenhagen+Post&rft.atitle=Denmark+is+one+of+the+NSA%27s+%279-Eyes%27&rft.au=Justin+Cremer&rft_id=http%3A%2F%2Fcphpost.dk%2Fnews%2Fdenmark-is-one-of-the-nsas-9-eyes.7611.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-frlemjac-105"><span class="mw-cite-backlink">^ <a href="#cite_ref-frlemjac_105-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-frlemjac_105-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJacques_Follorou" class="citation news cs1 cs1-prop-foreign-lang-source">Jacques Follorou. <a rel="nofollow" class="external text" href="http://www.lemonde.fr/technologies/article/2013/11/29/la-france-precieux-partenaire-de-l-espionnage-de-la-nsa_3522653_651865.html">"La France, précieux partenaire de l'espionnage de la NSA"</a>. <i><a href="/wiki/Le_Monde" title="Le Monde">Le Monde</a></i> (in French)<span class="reference-accessdate">. Retrieved <span class="nowrap">30 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Le+Monde&rft.atitle=La+France%2C+pr%C3%A9cieux+partenaire+de+l%27espionnage+de+la+NSA&rft.au=Jacques+Follorou&rft_id=http%3A%2F%2Fwww.lemonde.fr%2Ftechnologies%2Farticle%2F2013%2F11%2F29%2Fla-france-precieux-partenaire-de-l-espionnage-de-la-nsa_3522653_651865.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-106"><span class="mw-cite-backlink"><b><a href="#cite_ref-106">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1 cs1-prop-foreign-lang-source"><a rel="nofollow" class="external text" href="http://www.rfi.fr/ameriques/20131130-espionnage-services-secrets-francais-precieux-partenaires-nsa-americaine?ns_campaign=google_choix_redactions&ns_mchannel=editors_picks&ns_source=google_actualite&ns_linkname=ameriques.20131130-espionnage-services-secrets-francais-precieux-partenaires-nsa-americaine&ns_fee=0">"Espionnage: les services secrets français précieux partenaires de la NSA américaine"</a> (in French). <a href="/wiki/Radio_France_Internationale" title="Radio France Internationale">Radio France Internationale</a>. 30 November 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">30 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Espionnage%3A+les+services+secrets+fran%C3%A7ais+pr%C3%A9cieux+partenaires+de+la+NSA+am%C3%A9ricaine&rft.pub=Radio+France+Internationale&rft.date=2013-11-30&rft_id=http%3A%2F%2Fwww.rfi.fr%2Fameriques%2F20131130-espionnage-services-secrets-francais-precieux-partenaires-nsa-americaine%3Fns_campaign%3Dgoogle_choix_redactions%26ns_mchannel%3Deditors_picks%26ns_source%3Dgoogle_actualite%26ns_linkname%3Dameriques.20131130-espionnage-services-secrets-francais-precieux-partenaires-nsa-americaine%26ns_fee%3D0&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-lemonde1-107"><span class="mw-cite-backlink">^ <a href="#cite_ref-lemonde1_107-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-lemonde1_107-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJacques_Follorou2013" class="citation news cs1 cs1-prop-foreign-lang-source">Jacques Follorou (30 October 2013). <a rel="nofollow" class="external text" href="http://www.lemonde.fr/international/article/2013/10/30/surveillance-la-dgse-a-transmis-des-donnees-a-la-nsa-americaine_3505266_3210.html">"Surveillance : la DGSE a transmis des données à la NSA américaine"</a>. <i><a href="/wiki/Le_Monde" title="Le Monde">Le Monde</a></i> (in French)<span class="reference-accessdate">. Retrieved <span class="nowrap">30 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Le+Monde&rft.atitle=Surveillance+%3A+la+DGSE+a+transmis+des+donn%C3%A9es+%C3%A0+la+NSA+am%C3%A9ricaine&rft.date=2013-10-30&rft.au=Jacques+Follorou&rft_id=http%3A%2F%2Fwww.lemonde.fr%2Finternational%2Farticle%2F2013%2F10%2F30%2Fsurveillance-la-dgse-a-transmis-des-donnees-a-la-nsa-americaine_3505266_3210.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-SpiegelMetadata-108"><span class="mw-cite-backlink">^ <a href="#cite_ref-SpiegelMetadata_108-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-SpiegelMetadata_108-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1 cs1-prop-foreign-lang-source"><a rel="nofollow" class="external text" href="http://www.spiegel.de/netzwelt/netzpolitik/bnd-leitet-laut-spiegel-massenhaft-metadaten-an-die-nsa-weiter-a-914682.html">"Überwachung: BND leitet massenhaft Metadaten an die NSA weiter"</a>. <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i> (in German). 3 August 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">3 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Der+Spiegel&rft.atitle=%C3%9Cberwachung%3A+BND+leitet+massenhaft+Metadaten+an+die+NSA+weiter&rft.date=2013-08-03&rft_id=http%3A%2F%2Fwww.spiegel.de%2Fnetzwelt%2Fnetzpolitik%2Fbnd-leitet-laut-spiegel-massenhaft-metadaten-an-die-nsa-weiter-a-914682.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-xKeyscoreGermany-109"><span class="mw-cite-backlink"><b><a href="#cite_ref-xKeyscoreGermany_109-0">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.spiegel.de/international/germany/german-intelligence-agencies-used-nsa-spying-program-a-912173.html">'Prolific Partner': German Intelligence Used NSA Spy Program</a>, <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i>. Retrieved 21 July 2013.</span> </li> <li id="cite_note-110"><span class="mw-cite-backlink"><b><a href="#cite_ref-110">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1 cs1-prop-foreign-lang-source"><a rel="nofollow" class="external text" href="http://www.sueddeutsche.de/politik/spionage-in-deutschland-verfassungsschutz-beliefert-nsa-1.1770672">"Verfassungsschutz beliefert NSA"</a>. <i><a href="/wiki/S%C3%BCddeutsche_Zeitung" title="Süddeutsche Zeitung">Süddeutsche Zeitung</a></i> (in German)<span class="reference-accessdate">. Retrieved <span class="nowrap">14 September</span> 2013</span>. <q>Seit Juli 2013 testet der Verfassungsschutz die Späh- und Analysesoftware XKeyscore. Sollte der Geheimdienst das Programm im Regelbetrieb nutzen, hat sich das BfV verpflichtet, alle Erkenntnisse mit der NSA zu teilen. Das hatte der Präsident des Bundesamtes, Hans-Georg Maaßen, dem US-Dienst zugesichert. Im Januar und Mai war Maaßen zu Besuchen bei der NSA.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=S%C3%BCddeutsche+Zeitung&rft.atitle=Verfassungsschutz+beliefert+NSA&rft_id=http%3A%2F%2Fwww.sueddeutsche.de%2Fpolitik%2Fspionage-in-deutschland-verfassungsschutz-beliefert-nsa-1.1770672&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-suddeutsche20131409-111"><span class="mw-cite-backlink"><b><a href="#cite_ref-suddeutsche20131409_111-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1 cs1-prop-foreign-lang-source"><a rel="nofollow" class="external text" href="http://www.sueddeutsche.de/politik/spionage-in-deutschland-verfassungsschutz-beliefert-nsa-1.1770672">"Verfassungsschutz beliefert NSA"</a>. <i><a href="/wiki/S%C3%BCddeutsche_Zeitung" title="Süddeutsche Zeitung">Süddeutsche Zeitung</a></i> (in German)<span class="reference-accessdate">. Retrieved <span class="nowrap">14 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=S%C3%BCddeutsche+Zeitung&rft.atitle=Verfassungsschutz+beliefert+NSA&rft_id=http%3A%2F%2Fwww.sueddeutsche.de%2Fpolitik%2Fspionage-in-deutschland-verfassungsschutz-beliefert-nsa-1.1770672&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-112"><span class="mw-cite-backlink"><b><a href="#cite_ref-112">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMatthias_GebauerHubert_GudeVeit_MedickJörg_Schindler" class="citation magazine cs1">Matthias Gebauer; Hubert Gude; Veit Medick; Jörg Schindler; Fidelius Schmid. <a rel="nofollow" class="external text" href="http://www.spiegel.de/international/germany/cia-worked-with-bnd-and-bfv-in-neuss-on-secret-project-a-921254.html">"CIA Worked With BND and BfV In Neuss on Secret Project"</a>. <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">20 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Der+Spiegel&rft.atitle=CIA+Worked+With+BND+and+BfV+In+Neuss+on+Secret+Project&rft.au=Matthias+Gebauer&rft.au=Hubert+Gude&rft.au=Veit+Medick&rft.au=J%C3%B6rg+Schindler&rft.au=Fidelius+Schmid&rft_id=http%3A%2F%2Fwww.spiegel.de%2Finternational%2Fgermany%2Fcia-worked-with-bnd-and-bfv-in-neuss-on-secret-project-a-921254.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-113"><span class="mw-cite-backlink"><b><a href="#cite_ref-113">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMatthias_GebauerHubert_GudeVeit_MedickJörg_Schindler" class="citation magazine cs1">Matthias Gebauer; Hubert Gude; Veit Medick; Jörg Schindler; Fidelius Schmid. <a rel="nofollow" class="external text" href="http://www.spiegel.de/international/germany/cia-worked-with-bnd-and-bfv-in-neuss-on-secret-project-a-921254-2.html">"CIA Worked With BND and BfV In Neuss on Secret Project"</a>. <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">20 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Der+Spiegel&rft.atitle=CIA+Worked+With+BND+and+BfV+In+Neuss+on+Secret+Project&rft.au=Matthias+Gebauer&rft.au=Hubert+Gude&rft.au=Veit+Medick&rft.au=J%C3%B6rg+Schindler&rft.au=Fidelius+Schmid&rft_id=http%3A%2F%2Fwww.spiegel.de%2Finternational%2Fgermany%2Fcia-worked-with-bnd-and-bfv-in-neuss-on-secret-project-a-921254-2.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-114"><span class="mw-cite-backlink"><b><a href="#cite_ref-114">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChristian_Fuchs,_John_Goetz,_Frederik_Obermaier,_Bastian_Obermayer_and_Tanjev_Schultz" class="citation news cs1">Christian Fuchs, John Goetz, Frederik Obermaier, <a href="/wiki/Bastian_Obermayer" title="Bastian Obermayer">Bastian Obermayer</a> and Tanjev Schultz. <a rel="nofollow" class="external text" href="http://international.sueddeutsche.de/post/67469252824/frankfurt-an-american-military-intel-metropolis">"Frankfurt: An American Military-Intel Metropolis"</a>. <i><a href="/wiki/S%C3%BCddeutsche_Zeitung" title="Süddeutsche Zeitung">Süddeutsche Zeitung</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">21 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=S%C3%BCddeutsche+Zeitung&rft.atitle=Frankfurt%3A+An+American+Military-Intel+Metropolis&rft.au=Christian+Fuchs%2C+John+Goetz%2C+Frederik+Obermaier%2C+Bastian+Obermayer+and+Tanjev+Schultz&rft_id=http%3A%2F%2Finternational.sueddeutsche.de%2Fpost%2F67469252824%2Ffrankfurt-an-american-military-intel-metropolis&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_news" title="Template:Cite news">cite news</a>}}</code>: CS1 maint: multiple names: authors list (<a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">link</a>)</span></span> </li> <li id="cite_note-115"><span class="mw-cite-backlink"><b><a href="#cite_ref-115">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFShafir2007" class="citation book cs1">Shafir, Reinhard Wobst; translated by Angelika (2007). <i>Cryptology unlocked</i>. Chichester: John Wiley & Sons. p. 5. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0470516195" title="Special:BookSources/978-0470516195"><bdi>978-0470516195</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Cryptology+unlocked&rft.place=Chichester&rft.pages=5&rft.pub=John+Wiley+%26+Sons&rft.date=2007&rft.isbn=978-0470516195&rft.aulast=Shafir&rft.aufirst=Reinhard+Wobst%3B+translated+by+Angelika&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_book" title="Template:Cite book">cite book</a>}}</code>: CS1 maint: multiple names: authors list (<a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">link</a>)</span></span> </li> <li id="cite_note-israelnsa1-116"><span class="mw-cite-backlink">^ <a href="#cite_ref-israelnsa1_116-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-israelnsa1_116-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-israelnsa1_116-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-israelnsa1_116-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGlenn_GreenwaldLaura_PoitrasEwen_MacAskill2013" class="citation news cs1">Glenn Greenwald; Laura Poitras; Ewen MacAskill (11 September 2013). <a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents">"NSA shares raw intelligence including Americans' data with Israel"</a>. <i>The Guardian</i><span class="reference-accessdate">. Retrieved <span class="nowrap">14 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=NSA+shares+raw+intelligence+including+Americans%27+data+with+Israel&rft.date=2013-09-11&rft.au=Glenn+Greenwald&rft.au=Laura+Poitras&rft.au=Ewen+MacAskill&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2F2013%2Fsep%2F11%2Fnsa-americans-personal-data-israel-documents&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-117"><span class="mw-cite-backlink"><b><a href="#cite_ref-117">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://www.japantimes.co.jp/news/2013/10/27/world/nsa-asked-japan-to-tap-regionwide-fiber-optic-cables-in-2011/#.Um4Lf1NVO28">"NSA asked Japan to tap regionwide fiber-optic cables in 2011"</a>. <i><a href="/wiki/The_Japan_Times" title="The Japan Times">The Japan Times</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">28 October</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Japan+Times&rft.atitle=NSA+asked+Japan+to+tap+regionwide+fiber-optic+cables+in+2011&rft_id=http%3A%2F%2Fwww.japantimes.co.jp%2Fnews%2F2013%2F10%2F27%2Fworld%2Fnsa-asked-japan-to-tap-regionwide-fiber-optic-cables-in-2011%2F%23.Um4Lf1NVO28&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-118"><span class="mw-cite-backlink"><b><a href="#cite_ref-118">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWedeman2011" class="citation news cs1">Wedeman, Ben (3 September 2011). <a rel="nofollow" class="external text" href="http://www.cnn.com/2011/WORLD/africa/09/03/libya.west.spies/">"Documents shed light on CIA, Gadhafi spy ties"</a>. <i>CNN</i><span class="reference-accessdate">. Retrieved <span class="nowrap">3 September</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=CNN&rft.atitle=Documents+shed+light+on+CIA%2C+Gadhafi+spy+ties&rft.date=2011-09-03&rft.aulast=Wedeman&rft.aufirst=Ben&rft_id=http%3A%2F%2Fwww.cnn.com%2F2011%2FWORLD%2Fafrica%2F09%2F03%2Flibya.west.spies%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-119"><span class="mw-cite-backlink"><b><a href="#cite_ref-119">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.bbc.co.uk/news/world-africa-14774533">"Libya: Gaddafi regime's US-UK spy links revealed"</a>. <a href="/wiki/BBC" title="BBC">BBC</a>. 4 September 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">20 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Libya%3A+Gaddafi+regime%27s+US-UK+spy+links+revealed&rft.date=2011-09-04&rft_id=https%3A%2F%2Fwww.bbc.co.uk%2Fnews%2Fworld-africa-14774533&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-120"><span class="mw-cite-backlink"><b><a href="#cite_ref-120">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAbigail_Hauslohner2011" class="citation magazine cs1">Abigail Hauslohner (2 September 2011). <a rel="nofollow" class="external text" href="http://content.time.com/time/world/article/0,8599,2091653,00.html">"How Libya Seems to Have Helped the CIA with Rendition of Terrorism Suspects"</a>. <i><a href="/wiki/Time_(magazine)" title="Time (magazine)">Time</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">20 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Time&rft.atitle=How+Libya+Seems+to+Have+Helped+the+CIA+with+Rendition+of+Terrorism+Suspects&rft.date=2011-09-02&rft.au=Abigail+Hauslohner&rft_id=http%3A%2F%2Fcontent.time.com%2Ftime%2Fworld%2Farticle%2F0%2C8599%2C2091653%2C00.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-121"><span class="mw-cite-backlink"><b><a href="#cite_ref-121">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://news.smh.com.au/breaking-news-world/files-show-mi6-cia-ties-to-libya-reports-20110904-1jrzy.html">"Files show MI6, CIA ties to Libya: reports"</a>. <i><a href="/wiki/The_Sydney_Morning_Herald" title="The Sydney Morning Herald">The Sydney Morning Herald</a></i>. 4 September 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">4 September</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Sydney+Morning+Herald&rft.atitle=Files+show+MI6%2C+CIA+ties+to+Libya%3A+reports&rft.date=2011-09-04&rft_id=http%3A%2F%2Fnews.smh.com.au%2Fbreaking-news-world%2Ffiles-show-mi6-cia-ties-to-libya-reports-20110904-1jrzy.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-122"><span class="mw-cite-backlink"><b><a href="#cite_ref-122">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSpencer2011" class="citation news cs1">Spencer, Richard (3 September 2011). <a rel="nofollow" class="external text" href="https://www.telegraph.co.uk/news/worldnews/africaandindianocean/libya/8739893/Libya-secret-dossier-reveals-Gaddafis-UK-spy-links.html">"Libya: secret dossier reveals Gaddafi's UK spy links"</a>. <i><a href="/wiki/The_Daily_Telegraph" title="The Daily Telegraph">The Daily Telegraph</a></i>. London<span class="reference-accessdate">. Retrieved <span class="nowrap">3 September</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Daily+Telegraph&rft.atitle=Libya%3A+secret+dossier+reveals+Gaddafi%27s+UK+spy+links&rft.date=2011-09-03&rft.aulast=Spencer&rft.aufirst=Richard&rft_id=https%3A%2F%2Fwww.telegraph.co.uk%2Fnews%2Fworldnews%2Fafricaandindianocean%2Flibya%2F8739893%2FLibya-secret-dossier-reveals-Gaddafis-UK-spy-links.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-123"><span class="mw-cite-backlink"><b><a href="#cite_ref-123">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFOlmer" class="citation news cs1 cs1-prop-foreign-lang-source">Olmer, Bart. <a rel="nofollow" class="external text" href="http://www.telegraaf.nl/binnenland/21638965/__Ook_AIVD_bespiedt_internetter__.html">"Ook AIVD bespiedt internetter"</a>. <i><a href="/wiki/De_Telegraaf" title="De Telegraaf">De Telegraaf</a></i> (in Dutch)<span class="reference-accessdate">. Retrieved <span class="nowrap">10 September</span> 2013</span>. <q>Niet alleen Amerikaanse inlichtingendiensten monitoren internetters wereldwijd. Ook Nederlandse geheime diensten krijgen informatie uit het omstreden surveillanceprogramma 'Prism'.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=De+Telegraaf&rft.atitle=Ook+AIVD+bespiedt+internetter&rft.aulast=Olmer&rft.aufirst=Bart&rft_id=http%3A%2F%2Fwww.telegraaf.nl%2Fbinnenland%2F21638965%2F__Ook_AIVD_bespiedt_internetter__.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-124"><span class="mw-cite-backlink"><b><a href="#cite_ref-124">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSteven_DerixGlenn_GreenwaldHuib_Modderkolk2013" class="citation news cs1">Steven Derix; <a href="/wiki/Glenn_Greenwald" title="Glenn Greenwald">Glenn Greenwald</a>; Huib Modderkolk (30 November 2013). <a rel="nofollow" class="external text" href="http://www.nrc.nl/nieuws/2013/11/30/dutch-intelligence-agency-aivd-hacks-internet-fora/">"Dutch intelligence agency AIVD hacks internet forums"</a>. <i><a href="/wiki/NRC_Handelsblad" class="mw-redirect" title="NRC Handelsblad">NRC Handelsblad</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">23 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=NRC+Handelsblad&rft.atitle=Dutch+intelligence+agency+AIVD+hacks+internet+forums&rft.date=2013-11-30&rft.au=Steven+Derix&rft.au=Glenn+Greenwald&rft.au=Huib+Modderkolk&rft_id=http%3A%2F%2Fwww.nrc.nl%2Fnieuws%2F2013%2F11%2F30%2Fdutch-intelligence-agency-aivd-hacks-internet-fora%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-125"><span class="mw-cite-backlink"><b><a href="#cite_ref-125">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.reuters.com/article/us-norway-usa-snowden-idUSBRE9AI0D920131119">"Norway denies U.S. spying, said it shared intelligence with U.S."</a> <i>Reuters</i>. 19 November 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">19 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Reuters&rft.atitle=Norway+denies+U.S.+spying%2C+said+it+shared+intelligence+with+U.S.&rft.date=2013-11-19&rft_id=https%3A%2F%2Fwww.reuters.com%2Farticle%2Fus-norway-usa-snowden-idUSBRE9AI0D920131119&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-126"><span class="mw-cite-backlink"><b><a href="#cite_ref-126">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKjetil_Malkenes_Hovland" class="citation news cs1">Kjetil Malkenes Hovland. <a rel="nofollow" class="external text" href="https://www.wsj.com/news/articles/SB10001424052702303985504579207500439573552">"Norway Monitored Phone Traffic and Shared Data With NSA"</a>. <i><a href="/wiki/The_Wall_Street_Journal" title="The Wall Street Journal">The Wall Street Journal</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">19 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Wall+Street+Journal&rft.atitle=Norway+Monitored+Phone+Traffic+and+Shared+Data+With+NSA&rft.au=Kjetil+Malkenes+Hovland&rft_id=https%3A%2F%2Fwww.wsj.com%2Fnews%2Farticles%2FSB10001424052702303985504579207500439573552&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-127"><span class="mw-cite-backlink"><b><a href="#cite_ref-127">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFArne_HalvorsenAnne_Marte_BlindheimHarald_S._KlungtveitKjetil_Magne_Sørenes" class="citation news cs1">Arne Halvorsen; Anne Marte Blindheim; Harald S. Klungtveit; Kjetil Magne Sørenes; Tore Bergsaker; Gunnar Hultgreen. <a rel="nofollow" class="external text" href="http://www.dagbladet.no/2013/12/17/nyheter/samfunn/politikk/utenriks/overvaking/30877258/">"Norway´s secret surveillance of Russian politics for the NSA"</a>. <i><a href="/wiki/Dagbladet" title="Dagbladet">Dagbladet</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">18 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Dagbladet&rft.atitle=Norway%C2%B4s+secret+surveillance+of+Russian+politics+for+the+NSA&rft.au=Arne+Halvorsen&rft.au=Anne+Marte+Blindheim&rft.au=Harald+S.+Klungtveit&rft.au=Kjetil+Magne+S%C3%B8renes&rft.au=Tore+Bergsaker&rft.au=Gunnar+Hultgreen&rft_id=http%3A%2F%2Fwww.dagbladet.no%2F2013%2F12%2F17%2Fnyheter%2Fsamfunn%2Fpolitikk%2Futenriks%2Fovervaking%2F30877258%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-norwaynsa-128"><span class="mw-cite-backlink">^ <a href="#cite_ref-norwaynsa_128-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-norwaynsa_128-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-norwaynsa_128-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-norwaynsa_128-3"><sup><i><b>d</b></i></sup></a> <a href="#cite_ref-norwaynsa_128-4"><sup><i><b>e</b></i></sup></a> <a href="#cite_ref-norwaynsa_128-5"><sup><i><b>f</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1 cs1-prop-foreign-lang-source"><a rel="nofollow" class="external text" href="http://www.dagbladet.no/2013/12/18/nyheter/nsa/etterretningstjenesten/snowden/overvakning/30891164/">"Snowden-dokumentene: Norge er NSAs drømmepartner"</a>. <i><a href="/wiki/Dagbladet" title="Dagbladet">Dagbladet</a></i> (in Norwegian)<span class="reference-accessdate">. Retrieved <span class="nowrap">18 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Dagbladet&rft.atitle=Snowden-dokumentene%3A+Norge+er+NSAs+dr%C3%B8mmepartner&rft_id=http%3A%2F%2Fwww.dagbladet.no%2F2013%2F12%2F18%2Fnyheter%2Fnsa%2Fetterretningstjenesten%2Fsnowden%2Fovervakning%2F30891164%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-129"><span class="mw-cite-backlink"><b><a href="#cite_ref-129">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPaul_Hamilos" class="citation news cs1">Paul Hamilos. <a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/oct/30/spain-colluded-nsa-spying-citizens-spanish-el-mundo-us">"Spain colluded in NSA spying on its citizens, Spanish newspaper reports"</a>. <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">22 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=Spain+colluded+in+NSA+spying+on+its+citizens%2C+Spanish+newspaper+reports&rft.au=Paul+Hamilos&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2F2013%2Foct%2F30%2Fspain-colluded-nsa-spying-citizens-spanish-el-mundo-us&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-130"><span class="mw-cite-backlink"><b><a href="#cite_ref-130">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGlenn_GreenwaldGermán_Aranda" class="citation news cs1 cs1-prop-foreign-lang-source">Glenn Greenwald; Germán Aranda. <a rel="nofollow" class="external text" href="http://www.elmundo.es/espana/2013/10/30/5270985d63fd3d7d778b4576.html">"El CNI facilitó el espionaje masivo de EEUU a España"</a>. <i><a href="/wiki/El_Mundo_(Spain)" title="El Mundo (Spain)">El Mundo</a></i> (in Spanish)<span class="reference-accessdate">. Retrieved <span class="nowrap">22 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=El+Mundo&rft.atitle=El+CNI+facilit%C3%B3+el+espionaje+masivo+de+EEUU+a+Espa%C3%B1a&rft.au=Glenn+Greenwald&rft.au=Germ%C3%A1n+Aranda&rft_id=http%3A%2F%2Fwww.elmundo.es%2Fespana%2F2013%2F10%2F30%2F5270985d63fd3d7d778b4576.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-SvenskaDagbladet109-131"><span class="mw-cite-backlink">^ <a href="#cite_ref-SvenskaDagbladet109_131-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-SvenskaDagbladet109_131-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1 cs1-prop-foreign-lang-source"><a rel="nofollow" class="external text" href="http://www.svd.se/nyheter/inrikes/sverige-deltog-i-nsa-overvakning_8492260.svd">"Sverige deltog i NSA-övervakning"</a>. <i><a href="/wiki/Svenska_Dagbladet" title="Svenska Dagbladet">Svenska Dagbladet</a></i> (in Swedish)<span class="reference-accessdate">. Retrieved <span class="nowrap">10 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Svenska+Dagbladet&rft.atitle=Sverige+deltog+i+NSA-%C3%B6vervakning&rft_id=http%3A%2F%2Fwww.svd.se%2Fnyheter%2Finrikes%2Fsverige-deltog-i-nsa-overvakning_8492260.svd&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-132"><span class="mw-cite-backlink"><b><a href="#cite_ref-132">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGlenn_Greenwald,_Ryan_Gallagher,_Filip_Struwe_and_Anna_H_Svensson2013" class="citation web cs1 cs1-prop-foreign-lang-source"><a href="/wiki/Glenn_Greenwald" title="Glenn Greenwald">Glenn Greenwald</a>, Ryan Gallagher, Filip Struwe and Anna H Svensson (5 December 2013). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131206130455/http://www.svt.se/nyheter/sverige/fra-spionerar-pa-ryssland-at-usa">"SVT avslöjar: FRA spionerar på Ryssland åt USA"</a> (in Swedish). <a href="/wiki/Sveriges_Television" title="Sveriges Television">Sveriges Television</a>. Archived from <a rel="nofollow" class="external text" href="http://www.svt.se/nyheter/sverige/fra-spionerar-pa-ryssland-at-usa">the original</a> on 6 December 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">5 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=SVT+avsl%C3%B6jar%3A+FRA+spionerar+p%C3%A5+Ryssland+%C3%A5t+USA&rft.pub=Sveriges+Television&rft.date=2013-12-05&rft.au=Glenn+Greenwald%2C+Ryan+Gallagher%2C+Filip+Struwe+and+Anna+H+Svensson&rft_id=http%3A%2F%2Fwww.svt.se%2Fnyheter%2Fsverige%2Ffra-spionerar-pa-ryssland-at-usa&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: CS1 maint: multiple names: authors list (<a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">link</a>)</span></span> </li> <li id="cite_note-133"><span class="mw-cite-backlink"><b><a href="#cite_ref-133">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFilip_Struwe,_Glenn_Greenwald,_Ryan_Gallagher,_Sven_Bergman,_Joachim_Dyfvermark_and_Fredrik_Laurin" class="citation web cs1 cs1-prop-foreign-lang-source">Filip Struwe, <a href="/wiki/Glenn_Greenwald" title="Glenn Greenwald">Glenn Greenwald</a>, Ryan Gallagher, Sven Bergman, Joachim Dyfvermark and Fredrik Laurin. <a rel="nofollow" class="external text" href="http://www.svt.se/ug/snowden-files-reveale-swedish-american-surveillance-of-russia">"Snowden files reveal Swedish-American surveillance of Russia"</a> (in Swedish). <a href="/wiki/Sveriges_Television" title="Sveriges Television">Sveriges Television</a><span class="reference-accessdate">. Retrieved <span class="nowrap">5 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Snowden+files+reveal+Swedish-American+surveillance+of+Russia&rft.pub=Sveriges+Television&rft.au=Filip+Struwe%2C+Glenn+Greenwald%2C+Ryan+Gallagher%2C+Sven+Bergman%2C+Joachim+Dyfvermark+and+Fredrik+Laurin&rft_id=http%3A%2F%2Fwww.svt.se%2Fug%2Fsnowden-files-reveale-swedish-american-surveillance-of-russia&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: CS1 maint: multiple names: authors list (<a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">link</a>)</span></span> </li> <li id="cite_note-svtsnowd1-134"><span class="mw-cite-backlink"><b><a href="#cite_ref-svtsnowd1_134-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa">"Read the Snowden Documents From the NSA"</a>. <a href="/wiki/Sveriges_Television" title="Sveriges Television">Sveriges Television</a><span class="reference-accessdate">. Retrieved <span class="nowrap">12 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Read+the+Snowden+Documents+From+the+NSA&rft.pub=Sveriges+Television&rft_id=http%3A%2F%2Fwww.svt.se%2Fug%2Fread-the-snowden-documents-from-the-nsa&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-handelszeitungswiss-135"><span class="mw-cite-backlink">^ <a href="#cite_ref-handelszeitungswiss_135-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-handelszeitungswiss_135-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1 cs1-prop-foreign-lang-source"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20170304160005/http://www.handelszeitung.ch/politik/ndb-und-nsa-kooperieren-enger-als-bisher-bekannt-496751">"NDB und NSA kooperieren enger als bisher bekannt"</a> (in German). Handelszeitung. Archived from <a rel="nofollow" class="external text" href="http://www.handelszeitung.ch/politik/ndb-und-nsa-kooperieren-enger-als-bisher-bekannt-496751">the original</a> on 4 March 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">18 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=NDB+und+NSA+kooperieren+enger+als+bisher+bekannt&rft.pub=Handelszeitung&rft_id=http%3A%2F%2Fwww.handelszeitung.ch%2Fpolitik%2Fndb-und-nsa-kooperieren-enger-als-bisher-bekannt-496751&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-scherizamsonntag-136"><span class="mw-cite-backlink"><b><a href="#cite_ref-scherizamsonntag_136-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChristof_MoserAlan_Cassidy" class="citation web cs1 cs1-prop-foreign-lang-source">Christof Moser; Alan Cassidy. <a rel="nofollow" class="external text" href="http://www.sonntagonline.ch/ressort/aktuell/3210/">"Geheimdienst-Aufsicht will Kooperation des NDB mit der NSA prüfen"</a> (in German). <a href="/wiki/Schweiz_am_Sonntag" title="Schweiz am Sonntag">Schweiz am Sonntag</a><span class="reference-accessdate">. Retrieved <span class="nowrap">18 September</span> 2013</span>. <q>Die NSA hat sowohl mit der Schweiz wie Dänemark eine geheime Vereinbarung abgeschlossen, die den Austausch von Geheimdienstinformationen regelt. Die Vereinbarung berechtigt die NSA, eigene Schlüsselbegriffe in die Abhörsysteme beider Staaten einspeisen zu lassen. Im Tausch für damit gewonnene Erkenntnisse der schweizerischen und dänischen Auslandaufklärung erhalten der NDB und der dänische Geheimdienst PET von der NSA Informationen, die sie im eigenen Land aufgrund gesetzlicher Schranken nicht selber sammeln dürfen. Das geheime Abkommen macht auch die Schweiz zu einem NSA-Horchposten.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Geheimdienst-Aufsicht+will+Kooperation+des+NDB+mit+der+NSA+pr%C3%BCfen&rft.pub=Schweiz+am+Sonntag&rft.au=Christof+Moser&rft.au=Alan+Cassidy&rft_id=http%3A%2F%2Fwww.sonntagonline.ch%2Fressort%2Faktuell%2F3210%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-swfnsa-137"><span class="mw-cite-backlink">^ <a href="#cite_ref-swfnsa_137-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-swfnsa_137-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAndy_Müller2013" class="citation web cs1 cs1-prop-foreign-lang-source">Andy Müller (31 October 2013). <a rel="nofollow" class="external text" href="http://www.srf.ch/news/schweiz/onyx-gelangen-schweizer-abhoerdaten-durch-die-hintertuer-zur-nsa">"Onyx: Gelangen Schweizer Abhördaten durch die Hintertür zur NSA?"</a> (in German). <a href="/wiki/Schweizer_Radio_und_Fernsehen" title="Schweizer Radio und Fernsehen">Schweizer Radio und Fernsehen</a><span class="reference-accessdate">. Retrieved <span class="nowrap">18 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Onyx%3A+Gelangen+Schweizer+Abh%C3%B6rdaten+durch+die+Hintert%C3%BCr+zur+NSA%3F&rft.pub=Schweizer+Radio+und+Fernsehen&rft.date=2013-10-31&rft.au=Andy+M%C3%BCller&rft_id=http%3A%2F%2Fwww.srf.ch%2Fnews%2Fschweiz%2Fonyx-gelangen-schweizer-abhoerdaten-durch-die-hintertuer-zur-nsa&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-138"><span class="mw-cite-backlink"><b><a href="#cite_ref-138">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPaul_Mason2013" class="citation web cs1">Paul Mason (20 November 2013). <a rel="nofollow" class="external text" href="http://www.channel4.com/news/nsa-edward-snowden-america-britain-tony-blair">"Documents show Blair government let US spy on Britons"</a>. <a href="/wiki/Channel_4" title="Channel 4">Channel 4</a><span class="reference-accessdate">. Retrieved <span class="nowrap">20 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Documents+show+Blair+government+let+US+spy+on+Britons&rft.pub=Channel+4&rft.date=2013-11-20&rft.au=Paul+Mason&rft_id=http%3A%2F%2Fwww.channel4.com%2Fnews%2Fnsa-edward-snowden-america-britain-tony-blair&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-139"><span class="mw-cite-backlink"><b><a href="#cite_ref-139">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChristopher_Hanson1982" class="citation news cs1">Christopher Hanson (13 August 1982). <a rel="nofollow" class="external text" href="https://news.google.com/newspapers?id=t6FlAAAAIBAJ&pg=1101,1439296&dq">"British 'helped U.S. in spying on activists'<span class="cs1-kern-right"></span>"</a>. <i><a href="/wiki/The_Vancouver_Sun" class="mw-redirect" title="The Vancouver Sun">The Vancouver Sun</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">30 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Vancouver+Sun&rft.atitle=British+%27helped+U.S.+in+spying+on+activists%27&rft.date=1982-08-13&rft.au=Christopher+Hanson&rft_id=https%3A%2F%2Fnews.google.com%2Fnewspapers%3Fid%3Dt6FlAAAAIBAJ%26pg%3D1101%2C1439296%26dq&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-140"><span class="mw-cite-backlink"><b><a href="#cite_ref-140">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://news.google.com/newspapers?id=uwA-AAAAIBAJ&pg=5300,1649773&dq=">"UK aided spy check"</a>. <i><a href="/wiki/Evening_Times" class="mw-redirect" title="Evening Times">Evening Times</a></i>. 13 August 1982<span class="reference-accessdate">. Retrieved <span class="nowrap">30 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Evening+Times&rft.atitle=UK+aided+spy+check&rft.date=1982-08-13&rft_id=https%3A%2F%2Fnews.google.com%2Fnewspapers%3Fid%3DuwA-AAAAIBAJ%26pg%3D5300%2C1649773%26dq%3D&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-141"><span class="mw-cite-backlink"><b><a href="#cite_ref-141">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChris_BlackhurstJohn_Gilbert1996" class="citation news cs1">Chris Blackhurst; John Gilbert (22 September 1996). <a rel="nofollow" class="external text" href="https://www.independent.co.uk/news/uk/home-news/us-spy-base-taps-uk-phones-for-mi5-1364399.html">"US spy base 'taps UK phones for MI5'<span class="cs1-kern-right"></span>"</a>. <i><a href="/wiki/The_Independent" title="The Independent">The Independent</a></i>. London<span class="reference-accessdate">. Retrieved <span class="nowrap">21 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Independent&rft.atitle=US+spy+base+%27taps+UK+phones+for+MI5%27&rft.date=1996-09-22&rft.au=Chris+Blackhurst&rft.au=John+Gilbert&rft_id=https%3A%2F%2Fwww.independent.co.uk%2Fnews%2Fuk%2Fhome-news%2Fus-spy-base-taps-uk-phones-for-mi5-1364399.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-At5cia-142"><span class="mw-cite-backlink">^ <a href="#cite_ref-At5cia_142-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-At5cia_142-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCHARLIE_SAVAGE2013" class="citation news cs1">CHARLIE SAVAGE (7 November 2013). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2013/11/07/us/cia-is-said-to-pay-att-for-call-data.html">"C.I.A. Is Said to Pay AT&T for Call Data"</a>. <i><a href="/wiki/The_New_York_Times" title="The New York Times">The New York Times</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">21 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+New+York+Times&rft.atitle=C.I.A.+Is+Said+to+Pay+AT%26T+for+Call+Data&rft.date=2013-11-07&rft.au=CHARLIE+SAVAGE&rft_id=https%3A%2F%2Fwww.nytimes.com%2F2013%2F11%2F07%2Fus%2Fcia-is-said-to-pay-att-for-call-data.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-143"><span class="mw-cite-backlink"><b><a href="#cite_ref-143">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMarc_Ambinder" class="citation magazine cs1">Marc Ambinder. <a rel="nofollow" class="external text" href="https://www.theatlantic.com/technology/archive/2013/08/an-educated-guess-about-how-the-nsa-is-structured/278697/">"An Educated Guess About How the NSA Is Structured"</a>. <i><a href="/wiki/The_Atlantic" title="The Atlantic">The Atlantic</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">21 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Atlantic&rft.atitle=An+Educated+Guess+About+How+the+NSA+Is+Structured&rft.au=Marc+Ambinder&rft_id=https%3A%2F%2Fwww.theatlantic.com%2Ftechnology%2Farchive%2F2013%2F08%2Fan-educated-guess-about-how-the-nsa-is-structured%2F278697%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-144"><span class="mw-cite-backlink"><b><a href="#cite_ref-144">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMichael_Hastings2012" class="citation magazine cs1"><a href="/wiki/Michael_Hastings_(journalist)" title="Michael Hastings (journalist)">Michael Hastings</a> (28 February 2012). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120229194900/http://www.rollingstone.com/politics/blogs/national-affairs/exclusive-homeland-security-kept-tabs-on-occupy-wall-street-20120228">"Exclusive: Homeland Security Kept Tabs on Occupy Wall Street"</a>. <i><a href="/wiki/Rolling_Stone" title="Rolling Stone">Rolling Stone</a></i>. Archived from <a rel="nofollow" class="external text" href="https://www.rollingstone.com/politics/blogs/national-affairs/exclusive-homeland-security-kept-tabs-on-occupy-wall-street-20120228">the original</a> on 29 February 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">5 January</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Rolling+Stone&rft.atitle=Exclusive%3A+Homeland+Security+Kept+Tabs+on+Occupy+Wall+Street&rft.date=2012-02-28&rft.au=Michael+Hastings&rft_id=https%3A%2F%2Fwww.rollingstone.com%2Fpolitics%2Fblogs%2Fnational-affairs%2Fexclusive-homeland-security-kept-tabs-on-occupy-wall-street-20120228&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-145"><span class="mw-cite-backlink"><b><a href="#cite_ref-145">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNaomi_Wolf2012" class="citation news cs1">Naomi Wolf (29 December 2012). <a rel="nofollow" class="external text" href="https://www.theguardian.com/commentisfree/2012/dec/29/fbi-coordinated-crackdown-occupy">"Revealed: how the FBI coordinated the crackdown on Occupy"</a>. <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">5 January</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=Revealed%3A+how+the+FBI+coordinated+the+crackdown+on+Occupy&rft.date=2012-12-29&rft.au=Naomi+Wolf&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fcommentisfree%2F2012%2Fdec%2F29%2Ffbi-coordinated-crackdown-occupy&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-146"><span class="mw-cite-backlink"><b><a href="#cite_ref-146">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMICHAEL_S._SCHMIDTCOLIN_MOYNIHAN2012" class="citation news cs1">MICHAEL S. SCHMIDT; COLIN MOYNIHAN (24 December 2012). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2012/12/25/nyregion/occupy-movement-was-investigated-by-fbi-counterterrorism-agents-records-show.html">"F.B.I. Counterterrorism Agents Monitored Occupy Movement, Records Show"</a>. <i><a href="/wiki/The_New_York_Times" title="The New York Times">The New York Times</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">5 January</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+New+York+Times&rft.atitle=F.B.I.+Counterterrorism+Agents+Monitored+Occupy+Movement%2C+Records+Show&rft.date=2012-12-24&rft.au=MICHAEL+S.+SCHMIDT&rft.au=COLIN+MOYNIHAN&rft_id=https%3A%2F%2Fwww.nytimes.com%2F2012%2F12%2F25%2Fnyregion%2Foccupy-movement-was-investigated-by-fbi-counterterrorism-agents-records-show.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-147"><span class="mw-cite-backlink"><b><a href="#cite_ref-147">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.washingtonpost.com/wp-srv/nation/specials/attacked/transcripts/bushtext_102601.html">"Text: Bush Signs Anti-Terrorism Legislation"</a>. <i><a href="/wiki/The_Washington_Post" title="The Washington Post">The Washington Post</a></i>. 26 October 2001<span class="reference-accessdate">. Retrieved <span class="nowrap">21 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=Text%3A+Bush+Signs+Anti-Terrorism+Legislation&rft.date=2001-10-26&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fwp-srv%2Fnation%2Fspecials%2Fattacked%2Ftranscripts%2Fbushtext_102601.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-148"><span class="mw-cite-backlink"><b><a href="#cite_ref-148">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLisa_Mascaro" class="citation news cs1">Lisa Mascaro. <a rel="nofollow" class="external text" href="https://www.latimes.com/archives/la-xpm-2011-may-27-la-na-patriot-act-20110527-story.html">"Patriot Act provisions extended just in time"</a>. <i><a href="/wiki/The_Los_Angeles_Times" class="mw-redirect" title="The Los Angeles Times">The Los Angeles Times</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">22 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Los+Angeles+Times&rft.atitle=Patriot+Act+provisions+extended+just+in+time&rft.au=Lisa+Mascaro&rft_id=https%3A%2F%2Fwww.latimes.com%2Farchives%2Fla-xpm-2011-may-27-la-na-patriot-act-20110527-story.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-wapoprivint-149"><span class="mw-cite-backlink"><b><a href="#cite_ref-wapoprivint_149-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRobert_O'Harrow_Jr.,_Dana_Priest_and_Marjorie_Censer2013" class="citation news cs1">Robert O'Harrow Jr., Dana Priest and Marjorie Censer (11 June 2013). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/business/nsa-leaks-put-focus-on-intelligence-apparatuss-reliance-on-outside-contractors/2013/06/10/e940c4ba-d20e-11e2-9f1a-1a7cdee20287_story.html">"NSA leaks put focus on intelligence apparatus's reliance on outside contractors"</a>. <i><a href="/wiki/The_Washington_Post" title="The Washington Post">The Washington Post</a></i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130928010248/http://articles.washingtonpost.com/2013-06-10/business/39873303_1_intelligence-agencies-intelligence-community-intelligence-analysts">Archived</a> from the original on 28 September 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">22 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=NSA+leaks+put+focus+on+intelligence+apparatus%27s+reliance+on+outside+contractors&rft.date=2013-06-11&rft.au=Robert+O%27Harrow+Jr.%2C+Dana+Priest+and+Marjorie+Censer&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fbusiness%2Fnsa-leaks-put-focus-on-intelligence-apparatuss-reliance-on-outside-contractors%2F2013%2F06%2F10%2Fe940c4ba-d20e-11e2-9f1a-1a7cdee20287_story.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-150"><span class="mw-cite-backlink"><b><a href="#cite_ref-150">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLoren_Thompson2013" class="citation magazine cs1">Loren Thompson (12 November 2013). <a rel="nofollow" class="external text" href="https://www.forbes.com/sites/lorenthompson/2013/11/12/lockheed-martin-emerging-as-dominant-player-in-federal-cybersecurity-market/">"Lockheed Martin Emerging As Dominant Player In Federal Cybersecurity Market"</a>. <i><a href="/wiki/Forbes" title="Forbes">Forbes</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">22 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Forbes&rft.atitle=Lockheed+Martin+Emerging+As+Dominant+Player+In+Federal+Cybersecurity+Market&rft.date=2013-11-12&rft.au=Loren+Thompson&rft_id=https%3A%2F%2Fwww.forbes.com%2Fsites%2Florenthompson%2F2013%2F11%2F12%2Flockheed-martin-emerging-as-dominant-player-in-federal-cybersecurity-market%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-WiredEvidence-151"><span class="mw-cite-backlink"><b><a href="#cite_ref-WiredEvidence_151-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation magazine cs1"><a rel="nofollow" class="external text" href="https://www.wired.com/science/discoveries/news/2006/05/70908">"AT&T Whistle-Blower's Evidence"</a>. <i><a href="/wiki/Wired_(magazine)" title="Wired (magazine)">Wired</a></i>. 17 May 2006<span class="reference-accessdate">. Retrieved <span class="nowrap">27 February</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Wired&rft.atitle=AT%26T+Whistle-Blower%27s+Evidence&rft.date=2006-05-17&rft_id=https%3A%2F%2Fwww.wired.com%2Fscience%2Fdiscoveries%2Fnews%2F2006%2F05%2F70908&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-boozwapo-152"><span class="mw-cite-backlink">^ <a href="#cite_ref-boozwapo_152-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-boozwapo_152-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNeil_Irwin" class="citation news cs1">Neil Irwin. <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/10/seven-facts-about-booz-allen-hamilton/">"Seven facts about Booz Allen Hamilton"</a>. <i><a href="/wiki/The_Washington_Post" title="The Washington Post">The Washington Post</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">23 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=Seven+facts+about+Booz+Allen+Hamilton&rft.au=Neil+Irwin&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fblogs%2Fwonkblog%2Fwp%2F2013%2F06%2F10%2Fseven-facts-about-booz-allen-hamilton%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-153"><span class="mw-cite-backlink"><b><a href="#cite_ref-153">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation magazine cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20130620143358/http://www.businessweek.com/articles/2013-06-20/booz-allen-the-worlds-most-profitable-spy-organization">"Booz Allen, the World's Most Profitable Spy Organization"</a>. <i><a href="/wiki/Bloomberg_Businessweek" title="Bloomberg Businessweek">Bloomberg Businessweek</a></i>. Archived from <a rel="nofollow" class="external text" href="http://www.businessweek.com/articles/2013-06-20/booz-allen-the-worlds-most-profitable-spy-organization">the original</a> on 20 June 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">23 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Bloomberg+Businessweek&rft.atitle=Booz+Allen%2C+the+World%27s+Most+Profitable+Spy+Organization&rft_id=http%3A%2F%2Fwww.businessweek.com%2Farticles%2F2013-06-20%2Fbooz-allen-the-worlds-most-profitable-spy-organization&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-btvodafone-154"><span class="mw-cite-backlink">^ <a href="#cite_ref-btvodafone_154-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-btvodafone_154-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-btvodafone_154-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-btvodafone_154-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJames_BallLuke_HardingJuliette_Garside" class="citation news cs1">James Ball; Luke Harding; Juliette Garside. <a rel="nofollow" class="external text" href="https://www.theguardian.com/business/2013/aug/02/telecoms-bt-vodafone-cables-gchq">"BT and Vodafone among telecoms companies passing details to GCHQ"</a>. <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">22 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=BT+and+Vodafone+among+telecoms+companies+passing+details+to+GCHQ&rft.au=James+Ball&rft.au=Luke+Harding&rft.au=Juliette+Garside&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fbusiness%2F2013%2Faug%2F02%2Ftelecoms-bt-vodafone-cables-gchq&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-orangelemonde-155"><span class="mw-cite-backlink">^ <a href="#cite_ref-orangelemonde_155-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-orangelemonde_155-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFollorou2014" class="citation news cs1 cs1-prop-foreign-lang-source">Follorou, Jacques (20 March 2014). <a rel="nofollow" class="external text" href="http://www.lemonde.fr/international/article/2014/03/20/dgse-orange-des-liaisons-incestueuses_4386264_3210.html">"Espionnage : comment Orange et les services secrets coopèrent"</a>. <i><a href="/wiki/Le_Monde" title="Le Monde">Le Monde</a></i> (in French)<span class="reference-accessdate">. Retrieved <span class="nowrap">22 March</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Le+Monde&rft.atitle=Espionnage+%3A+comment+Orange+et+les+services+secrets+coop%C3%A8rent&rft.date=2014-03-20&rft.aulast=Follorou&rft.aufirst=Jacques&rft_id=http%3A%2F%2Fwww.lemonde.fr%2Finternational%2Farticle%2F2014%2F03%2F20%2Fdgse-orange-des-liaisons-incestueuses_4386264_3210.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-RSApaid-156"><span class="mw-cite-backlink"><b><a href="#cite_ref-RSApaid_156-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMenn,_Joseph2013" class="citation news cs1">Menn, Joseph (20 December 2013). <a rel="nofollow" class="external text" href="https://www.reuters.com/article/us-usa-security-rsa-idUSBRE9BJ1C220131220">"Exclusive: Secret contract tied NSA and security industry pioneer"</a>. <i><a href="/wiki/Reuters" title="Reuters">Reuters</a></i>. San Francisco<span class="reference-accessdate">. Retrieved <span class="nowrap">20 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Reuters&rft.atitle=Exclusive%3A+Secret+contract+tied+NSA+and+security+industry+pioneer&rft.date=2013-12-20&rft.au=Menn%2C+Joseph&rft_id=https%3A%2F%2Fwww.reuters.com%2Farticle%2Fus-usa-security-rsa-idUSBRE9BJ1C220131220&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-stratforguardian-157"><span class="mw-cite-backlink"><b><a href="#cite_ref-stratforguardian_157-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPratap_Chatterjee" class="citation news cs1">Pratap Chatterjee. <a rel="nofollow" class="external text" href="https://www.theguardian.com/commentisfree/cifamerica/2012/feb/28/wikileaks-intelligence-industrial-complex">"WikiLeaks' Stratfor dump lifts lid on intelligence-industrial complex"</a>. <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">22 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=WikiLeaks%27+Stratfor+dump+lifts+lid+on+intelligence-industrial+complex&rft.au=Pratap+Chatterjee&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fcommentisfree%2Fcifamerica%2F2012%2Ffeb%2F28%2Fwikileaks-intelligence-industrial-complex&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-inqtel-158"><span class="mw-cite-backlink">^ <a href="#cite_ref-inqtel_158-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-inqtel_158-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSteve_Henn2012" class="citation web cs1">Steve Henn (16 July 2012). <a rel="nofollow" class="external text" href="https://www.npr.org/blogs/alltechconsidered/2012/07/16/156839153/in-q-tel-the-cias-tax-funded-player-in-silicon-valley">"In-Q-Tel: The CIA's Tax-Funded Player In Silicon Valley"</a>. <a href="/wiki/NPR" title="NPR">NPR</a><span class="reference-accessdate">. Retrieved <span class="nowrap">5 January</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=In-Q-Tel%3A+The+CIA%27s+Tax-Funded+Player+In+Silicon+Valley&rft.pub=NPR&rft.date=2012-07-16&rft.au=Steve+Henn&rft_id=https%3A%2F%2Fwww.npr.org%2Fblogs%2Falltechconsidered%2F2012%2F07%2F16%2F156839153%2Fin-q-tel-the-cias-tax-funded-player-in-silicon-valley&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-159"><span class="mw-cite-backlink"><b><a href="#cite_ref-159">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.reuters.com/article/venture-palantir-funding-idUSL1N0JQ1OE20131211">"CIA-backed Palantir Technologies raises $107.5 million"</a>. <i><a href="/wiki/Reuters" title="Reuters">Reuters</a></i>. 11 December 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">5 January</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Reuters&rft.atitle=CIA-backed+Palantir+Technologies+raises+%24107.5+million&rft.date=2013-12-11&rft_id=https%3A%2F%2Fwww.reuters.com%2Farticle%2Fventure-palantir-funding-idUSL1N0JQ1OE20131211&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-160"><span class="mw-cite-backlink"><b><a href="#cite_ref-160">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAndy_Greenberg2013" class="citation magazine cs1">Andy Greenberg (14 August 2013). <a rel="nofollow" class="external text" href="https://www.forbes.com/sites/andygreenberg/2013/08/14/agent-of-intelligence-how-a-deviant-philosopher-built-palantir-a-cia-funded-data-mining-juggernaut/">"How A 'Deviant' Philosopher Built Palantir, A CIA-Funded Data-Mining Juggernaut"</a>. <i><a href="/wiki/Forbes" title="Forbes">Forbes</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">5 January</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Forbes&rft.atitle=How+A+%27Deviant%27+Philosopher+Built+Palantir%2C+A+CIA-Funded+Data-Mining+Juggernaut&rft.date=2013-08-14&rft.au=Andy+Greenberg&rft_id=https%3A%2F%2Fwww.forbes.com%2Fsites%2Fandygreenberg%2F2013%2F08%2F14%2Fagent-of-intelligence-how-a-deviant-philosopher-built-palantir-a-cia-funded-data-mining-juggernaut%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-161"><span class="mw-cite-backlink"><b><a href="#cite_ref-161">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.reuters.com/article/venture-palantir-funding-idUSL1N0JQ1OE20131211">"CIA-backed Palantir Technologies raises $107.5 million"</a>. <i><a href="/wiki/Reuters" title="Reuters">Reuters</a></i>. 11 December 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">5 January</span> 2014</span>. <q>The Palo Alto., California-based start-up has drawn attention because of its Prism software product</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Reuters&rft.atitle=CIA-backed+Palantir+Technologies+raises+%24107.5+million&rft.date=2013-12-11&rft_id=https%3A%2F%2Fwww.reuters.com%2Farticle%2Fventure-palantir-funding-idUSL1N0JQ1OE20131211&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-162"><span class="mw-cite-backlink"><b><a href="#cite_ref-162">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRyan_W._Neal2013" class="citation web cs1">Ryan W. Neal (7 June 2013). <a rel="nofollow" class="external text" href="http://www.ibtimes.com/nsa-scandal-palantirs-prism-powering-prism-1296963">"NSA Scandal: Is Palantir's Prism Powering PRISM?"</a>. <i><a href="/wiki/International_Business_Times" title="International Business Times">International Business Times</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">5 January</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=International+Business+Times&rft.atitle=NSA+Scandal%3A+Is+Palantir%27s+Prism+Powering+PRISM%3F&rft.date=2013-06-07&rft.au=Ryan+W.+Neal&rft_id=http%3A%2F%2Fwww.ibtimes.com%2Fnsa-scandal-palantirs-prism-powering-prism-1296963&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-163"><span class="mw-cite-backlink"><b><a href="#cite_ref-163">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMike_Masnick2011" class="citation news cs1"><a href="/wiki/Mike_Masnick" title="Mike Masnick">Mike Masnick</a> (10 February 2011). <a rel="nofollow" class="external text" href="https://www.techdirt.com/articles/20110209/22340513034/leaked-hbgary-documents-show-plan-to-spread-wikileaks-propaganda-bofa-attack-glenn-greenwald.shtml">"Leaked HBGary Documents Show Plan To Spread Wikileaks Propaganda For BofA ... And 'Attack' Glenn Greenwald"</a>. <i><a href="/wiki/Techdirt" title="Techdirt">Techdirt</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">5 January</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Techdirt&rft.atitle=Leaked+HBGary+Documents+Show+Plan+To+Spread+Wikileaks+Propaganda+For+BofA+...+And+%27Attack%27+Glenn+Greenwald&rft.date=2011-02-10&rft.au=Mike+Masnick&rft_id=http%3A%2F%2Fwww.techdirt.com%2Farticles%2F20110209%2F22340513034%2Fleaked-hbgary-documents-show-plan-to-spread-wikileaks-propaganda-bofa-attack-glenn-greenwald.shtml&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-164"><span class="mw-cite-backlink"><b><a href="#cite_ref-164">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMic_Wright2013" class="citation news cs1">Mic Wright (21 September 2013). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130924101340/http://blogs.telegraph.co.uk/technology/micwright/100010629/is-shadow-the-creepiest-startup-ever-no-cia-investment-palantir-still-owns-that-crown/">"Is 'Shadow' the creepiest startup ever? No, CIA investment Palantir still owns that crown"</a>. <i><a href="/wiki/The_Daily_Telegraph" title="The Daily Telegraph">The Daily Telegraph</a></i>. London. Archived from <a rel="nofollow" class="external text" href="http://blogs.telegraph.co.uk/technology/micwright/100010629/is-shadow-the-creepiest-startup-ever-no-cia-investment-palantir-still-owns-that-crown/">the original</a> on 24 September 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">5 January</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Daily+Telegraph&rft.atitle=Is+%27Shadow%27+the+creepiest+startup+ever%3F+No%2C+CIA+investment+Palantir+still+owns+that+crown&rft.date=2013-09-21&rft.au=Mic+Wright&rft_id=http%3A%2F%2Fblogs.telegraph.co.uk%2Ftechnology%2Fmicwright%2F100010629%2Fis-shadow-the-creepiest-startup-ever-no-cia-investment-palantir-still-owns-that-crown%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-thehindu-165"><span class="mw-cite-backlink">^ <a href="#cite_ref-thehindu_165-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-thehindu_165-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNarayan_Lakshman2013" class="citation news cs1">Narayan Lakshman (24 September 2013). <a rel="nofollow" class="external text" href="http://www.thehindu.com/news/international/world/secret-bunkers-a-challenge-for-us-intelligence/article5164833.ece">"Secret bunkers, a challenge for U.S. intelligence"</a>. <i><a href="/wiki/The_Hindu" title="The Hindu">The Hindu</a></i>. Chennai, India<span class="reference-accessdate">. Retrieved <span class="nowrap">24 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Hindu&rft.atitle=Secret+bunkers%2C+a+challenge+for+U.S.+intelligence&rft.date=2013-09-24&rft.au=Narayan+Lakshman&rft_id=http%3A%2F%2Fwww.thehindu.com%2Fnews%2Finternational%2Fworld%2Fsecret-bunkers-a-challenge-for-us-intelligence%2Farticle5164833.ece&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-166"><span class="mw-cite-backlink"><b><a href="#cite_ref-166">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFElizabeth_Flock2012" class="citation news cs1">Elizabeth Flock (10 January 2012). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/blogs/blogpost/post/google-is-a-spying-tool-iran-police-chief-says/2012/01/10/gIQAl3b2nP_blog.html">"Google is 'a spying tool,' Iran police chief says"</a>. <i><a href="/wiki/The_Washington_Post" title="The Washington Post">The Washington Post</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">25 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=Google+is+%27a+spying+tool%2C%27+Iran+police+chief+says&rft.date=2012-01-10&rft.au=Elizabeth+Flock&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fblogs%2Fblogpost%2Fpost%2Fgoogle-is-a-spying-tool-iran-police-chief-says%2F2012%2F01%2F10%2FgIQAl3b2nP_blog.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-167"><span class="mw-cite-backlink"><b><a href="#cite_ref-167">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSaeed_Kamali_Dehghan2013" class="citation news cs1">Saeed Kamali Dehghan (10 April 2013). <a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/apr/10/iran-plans-islamic-google-earth">"Iran plans 'Islamic Google Earth'<span class="cs1-kern-right"></span>"</a>. <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">25 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=Iran+plans+%27Islamic+Google+Earth%27&rft.date=2013-04-10&rft.au=Saeed+Kamali+Dehghan&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2F2013%2Fapr%2F10%2Firan-plans-islamic-google-earth&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-obamafalloutsp-168"><span class="mw-cite-backlink"><b><a href="#cite_ref-obamafalloutsp_168-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJohnson2013" class="citation news cs1">Johnson, Luke (13 August 2013). <a rel="nofollow" class="external text" href="http://www.huffingtonpost.com/2013/08/13/james-clapper_n_3748431.html">"James Clapper, Director of National Intelligence Who Misled Congress, To Establish Surveillance Review Group"</a>. <i>Huffington Post</i><span class="reference-accessdate">. Retrieved <span class="nowrap">13 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Huffington+Post&rft.atitle=James+Clapper%2C+Director+of+National+Intelligence+Who+Misled+Congress%2C+To+Establish+Surveillance+Review+Group&rft.date=2013-08-13&rft.aulast=Johnson&rft.aufirst=Luke&rft_id=http%3A%2F%2Fwww.huffingtonpost.com%2F2013%2F08%2F13%2Fjames-clapper_n_3748431.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-penc-169"><span class="mw-cite-backlink"><b><a href="#cite_ref-penc_169-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMatt_Sledge2013" class="citation news cs1">Matt Sledge (13 November 2013). <a rel="nofollow" class="external text" href="http://www.huffingtonpost.com/2013/11/13/nsa-writers_n_4267716.html">"NSA 'Chilling' Effect Feared By Writers"</a>. <i><a href="/wiki/The_Huffington_Post" class="mw-redirect" title="The Huffington Post">The Huffington Post</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">14 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Huffington+Post&rft.atitle=NSA+%27Chilling%27+Effect+Feared+By+Writers&rft.date=2013-11-13&rft.au=Matt+Sledge&rft_id=http%3A%2F%2Fwww.huffingtonpost.com%2F2013%2F11%2F13%2Fnsa-writers_n_4267716.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-guardiangchq-170"><span class="mw-cite-backlink"><b><a href="#cite_ref-guardiangchq_170-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMacAskill,_EwenDavies,_NickHopkins,_NickBorger,_Julian2013" class="citation news cs1">MacAskill, Ewen; Davies, Nick; Hopkins, Nick; Borger, Julian; <a href="/wiki/James_Ball_(journalist)" title="James Ball (journalist)">Ball, James</a> (17 June 2013). <a rel="nofollow" class="external text" href="https://www.theguardian.com/uk/2013/jun/16/gchq-intercepted-communications-g20-summits">"GCHQ intercepted foreign politicians' communications at G20 summits"</a>. <i>The Guardian</i>. London.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=GCHQ+intercepted+foreign+politicians%27+communications+at+G20+summits&rft.date=2013-06-17&rft.au=MacAskill%2C+Ewen&rft.au=Davies%2C+Nick&rft.au=Hopkins%2C+Nick&rft.au=Borger%2C+Julian&rft.au=Ball%2C+James&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fuk%2F2013%2Fjun%2F16%2Fgchq-intercepted-communications-g20-summits&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-171"><span class="mw-cite-backlink"><b><a href="#cite_ref-171">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://www.scmp.com/news/hong-kong/article/1259508/edward-snowden-us-government-has-been-hacking-hong-kong-and-china?page=all">"Edward Snowden: US government has been hacking Hong Kong and China for years"</a>. <i><a href="/wiki/South_China_Morning_Post" title="South China Morning Post">South China Morning Post</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">9 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=South+China+Morning+Post&rft.atitle=Edward+Snowden%3A+US+government+has+been+hacking+Hong+Kong+and+China+for+years&rft_id=http%3A%2F%2Fwww.scmp.com%2Fnews%2Fhong-kong%2Farticle%2F1259508%2Fedward-snowden-us-government-has-been-hacking-hong-kong-and-china%3Fpage%3Dall&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-172"><span class="mw-cite-backlink"><b><a href="#cite_ref-172">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLaura_PoitrasMarcel_RosenbachFidelius_SchmidHolger_Stark" class="citation magazine cs1">Laura Poitras; Marcel Rosenbach; Fidelius Schmid; Holger Stark. <a rel="nofollow" class="external text" href="http://www.spiegel.de/international/europe/nsa-spied-on-european-union-offices-a-908590.html">"Attacks from America: NSA Spied on European Union Offices"</a>. <i><a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">9 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Der+Spiegel&rft.atitle=Attacks+from+America%3A+NSA+Spied+on+European+Union+Offices&rft.au=Laura+Poitras&rft.au=Marcel+Rosenbach&rft.au=Fidelius+Schmid&rft.au=Holger+Stark&rft_id=http%3A%2F%2Fwww.spiegel.de%2Finternational%2Feurope%2Fnsa-spied-on-european-union-offices-a-908590.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-Spiegel20130831-173"><span class="mw-cite-backlink"><b><a href="#cite_ref-Spiegel20130831_173-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFStaff2013" class="citation news cs1">Staff (31 August 2013). <a rel="nofollow" class="external text" href="http://www.spiegel.de/international/world/nsa-spied-on-al-jazeera-communications-snowden-document-a-919681.html">"Snowden Document: NSA Spied On Al Jazeera Communications"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">31 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Snowden+Document%3A+NSA+Spied+On+Al+Jazeera+Communications&rft.date=2013-08-31&rft.au=Staff&rft_id=http%3A%2F%2Fwww.spiegel.de%2Finternational%2Fworld%2Fnsa-spied-on-al-jazeera-communications-snowden-document-a-919681.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-nytimes20130909-174"><span class="mw-cite-backlink"><b><a href="#cite_ref-nytimes20130909_174-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFROMERO2013" class="citation news cs1">ROMERO, SIMON (9 September 2013). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2013/09/09/world/americas/nsa-spied-on-brazilian-oil-company-report-says.html?_r=0">"N.S.A. Spied on Brazilian Oil Company, Report Says"</a>. <i><a href="/wiki/The_New_York_Times" title="The New York Times">The New York Times</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">9 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+New+York+Times&rft.atitle=N.S.A.+Spied+on+Brazilian+Oil+Company%2C+Report+Says&rft.date=2013-09-09&rft.aulast=ROMERO&rft.aufirst=SIMON&rft_id=https%3A%2F%2Fwww.nytimes.com%2F2013%2F09%2F09%2Fworld%2Famericas%2Fnsa-spied-on-brazilian-oil-company-report-says.html%3F_r%3D0&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-175"><span class="mw-cite-backlink"><b><a href="#cite_ref-175">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.bbc.co.uk/news/world-europe-24690055">"US bugged Merkel's phone from 2002 until 2013, report claims"</a>. BBC. 27 October 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">27 October</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=US+bugged+Merkel%27s+phone+from+2002+until+2013%2C+report+claims&rft.date=2013-10-27&rft_id=https%3A%2F%2Fwww.bbc.co.uk%2Fnews%2Fworld-europe-24690055&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-176"><span class="mw-cite-backlink"><b><a href="#cite_ref-176">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFOfer_Aderet" class="citation news cs1">Ofer Aderet. <a rel="nofollow" class="external text" href="http://www.haaretz.com/news/diplomacy-defense/1.564607">"Snowden documents reveal U.S., British intelligence spied on former Prime Minister Olmert, Defense Minister Barak"</a>. <i><a href="/wiki/Haaretz" title="Haaretz">Haaretz</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">20 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Haaretz&rft.atitle=Snowden+documents+reveal+U.S.%2C+British+intelligence+spied+on+former+Prime+Minister+Olmert%2C+Defense+Minister+Barak&rft.au=Ofer+Aderet&rft_id=http%3A%2F%2Fwww.haaretz.com%2Fnews%2Fdiplomacy-defense%2F1.564607&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-auind1-177"><span class="mw-cite-backlink"><b><a href="#cite_ref-auind1_177-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMichael_Brissenden2013" class="citation web cs1">Michael Brissenden (18 November 2013). <a rel="nofollow" class="external text" href="http://www.abc.net.au/news/2013-11-18/australia-spied-on-indonesian-president-leaked-documents-reveal/5098860">"Australia spied on Indonesian president Susilo Bambang Yudhoyono, leaked Edward Snowden documents reveal"</a>. <a href="/wiki/Australian_Broadcasting_Corporation" title="Australian Broadcasting Corporation">Australian Broadcasting Corporation</a><span class="reference-accessdate">. Retrieved <span class="nowrap">13 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Australia+spied+on+Indonesian+president+Susilo+Bambang+Yudhoyono%2C+leaked+Edward+Snowden+documents+reveal&rft.pub=Australian+Broadcasting+Corporation&rft.date=2013-11-18&rft.au=Michael+Brissenden&rft_id=http%3A%2F%2Fwww.abc.net.au%2Fnews%2F2013-11-18%2Faustralia-spied-on-indonesian-president-leaked-documents-reveal%2F5098860&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-178"><span class="mw-cite-backlink"><b><a href="#cite_ref-178">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEwen_MacAskill_nd_Lenore_Taylor" class="citation news cs1">Ewen MacAskill nd Lenore Taylor. <a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/nov/02/nsa-australia-bali-conference-spy-indonesia">"NSA: Australia and US used climate change conference to spy on Indonesia"</a>. <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">21 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=NSA%3A+Australia+and+US+used+climate+change+conference+to+spy+on+Indonesia&rft.au=Ewen+MacAskill+nd+Lenore+Taylor&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2F2013%2Fnov%2F02%2Fnsa-australia-bali-conference-spy-indonesia&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-179"><span class="mw-cite-backlink"><b><a href="#cite_ref-179">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJames_Ball" class="citation news cs1">James Ball. <a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/dec/09/nsa-spies-online-games-world-warcraft-second-life">"Xbox Live among game services targeted by US and UK spy agencies"</a>. <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">25 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=Xbox+Live+among+game+services+targeted+by+US+and+UK+spy+agencies&rft.au=James+Ball&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2F2013%2Fdec%2F09%2Fnsa-spies-online-games-world-warcraft-second-life&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></span> </li> </ol></div> <div class="mw-heading mw-heading2"><h2 id="Further_reading">Further reading</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Global_surveillance&action=edit&section=53" title="Edit section: Further reading"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1251242444">.mw-parser-output .ambox{border:1px solid #a2a9b1;border-left:10px solid #36c;background-color:#fbfbfb;box-sizing:border-box}.mw-parser-output .ambox+link+.ambox,.mw-parser-output .ambox+link+style+.ambox,.mw-parser-output .ambox+link+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+style+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+link+.ambox{margin-top:-1px}html body.mediawiki .mw-parser-output .ambox.mbox-small-left{margin:4px 1em 4px 0;overflow:hidden;width:238px;border-collapse:collapse;font-size:88%;line-height:1.25em}.mw-parser-output .ambox-speedy{border-left:10px solid #b32424;background-color:#fee7e6}.mw-parser-output .ambox-delete{border-left:10px solid #b32424}.mw-parser-output .ambox-content{border-left:10px solid #f28500}.mw-parser-output .ambox-style{border-left:10px solid #fc3}.mw-parser-output .ambox-move{border-left:10px solid #9932cc}.mw-parser-output .ambox-protection{border-left:10px solid #a2a9b1}.mw-parser-output .ambox .mbox-text{border:none;padding:0.25em 0.5em;width:100%}.mw-parser-output .ambox .mbox-image{border:none;padding:2px 0 2px 0.5em;text-align:center}.mw-parser-output .ambox .mbox-imageright{border:none;padding:2px 0.5em 2px 0;text-align:center}.mw-parser-output .ambox .mbox-empty-cell{border:none;padding:0;width:1px}.mw-parser-output .ambox .mbox-image-div{width:52px}@media(min-width:720px){.mw-parser-output .ambox{margin:0 10%}}@media print{body.ns-0 .mw-parser-output .ambox{display:none!important}}</style><table class="box-External_links plainlinks metadata ambox ambox-style ambox-external_links" role="presentation"><tbody><tr><td class="mbox-image"><div class="mbox-image-div"><span typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/f/f2/Edit-clear.svg/40px-Edit-clear.svg.png" decoding="async" width="40" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/f/f2/Edit-clear.svg/60px-Edit-clear.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/f/f2/Edit-clear.svg/80px-Edit-clear.svg.png 2x" data-file-width="48" data-file-height="48" /></span></span></div></td><td class="mbox-text"><div class="mbox-text-span">This article's <b>use of <a href="/wiki/Wikipedia:External_links" title="Wikipedia:External links">external links</a> may not follow Wikipedia's policies or guidelines</b>.<span class="hide-when-compact"> Please <a class="external text" href="https://en.wikipedia.org/w/index.php?title=Global_surveillance&action=edit">improve this article</a> by removing <a href="/wiki/Wikipedia:What_Wikipedia_is_not#Wikipedia_is_not_a_mirror_or_a_repository_of_links,_images,_or_media_files" title="Wikipedia:What Wikipedia is not">excessive</a> or <a href="/wiki/Wikipedia:External_links" title="Wikipedia:External links">inappropriate</a> external links, and converting useful links where appropriate into <a href="/wiki/Wikipedia:Citing_sources" title="Wikipedia:Citing sources">footnote references</a>.</span> <span class="date-container"><i>(<span class="date">August 2022</span>)</i></span><span class="hide-when-compact"><i> (<small><a href="/wiki/Help:Maintenance_template_removal" title="Help:Maintenance template removal">Learn how and when to remove this message</a></small>)</i></span></div></td></tr></tbody></table> <ul><li><a rel="nofollow" class="external text" href="http://www.ub.uio.no/fag/informatikk-matematikk/informatikk/faglig/bibliografier/no21984.html">"Global Surveillance"</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190105104332/https://www.ub.uio.no/fag/informatikk-matematikk/informatikk/faglig/bibliografier/no21984.html">Archived</a> 5 January 2019 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>. An annotated and categorized "overview of the revelations following the leaks by the whistleblower Edward Snowden. There are also some links to comments and followups". By Oslo University Library.</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.theguardian.com/world/the-nsa-files">"The NSA Files"</a>. <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>. London. 8 June 2013.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=The+NSA+Files&rft.date=2013-06-08&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2Fthe-nsa-files&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span></li> <li><i>Politico</i> Staff. "<a rel="nofollow" class="external text" href="http://www.politico.com/story/2013/06/nsa-leaks-cause-flood-of-political-problems-92703.html">NSA leaks cause flood of political problems</a>." <i><a href="/wiki/Politico" title="Politico">Politico</a></i>. 13 June 2013.</li> <li><a rel="nofollow" class="external text" href="https://www.theguardian.com/world/interactive/2013/jun/27/nsa-inspector-general-report-document-data-collection">NSA inspector general report on email and internet data collection under Stellar Wind</a> as provided by The Guardian on 27 June 2013.</li> <li>"<a rel="nofollow" class="external text" href="https://www.youtube.com/watch?v=33oIF-ggK5U">Putin talks NSA, Syria, Iran, drones in exclusive RT interview (FULL VIDEO)</a>." <a href="/wiki/Russia_Today" class="mw-redirect" title="Russia Today">Russia Today</a>. 12 June 2013.</li> <li><a href="/wiki/Spencer_Ackerman" title="Spencer Ackerman">Ackerman, Spencer</a>. "<a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/jul/17/nsa-surveillance-house-hearing">NSA warned to rein in surveillance as agency reveals even greater scope</a>." <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>. 17 July 2013.</li> <li><a href="/wiki/Spencer_Ackerman" title="Spencer Ackerman">Ackerman, Spencer</a>. "<a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/jul/17/nsa-court-challenges-tech-firms">Slew of court challenges threaten NSA's relationship with tech firms</a>." <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>. Wednesday, 17 July 2013.</li> <li><a href="/wiki/Spencer_Ackerman" title="Spencer Ackerman">Ackerman, Spencer</a> and Paul Lewis. "<a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/jul/25/narrow-defeat-nsa-amendment-privacy-advocates">NSA amendment's narrow defeat spurs privacy advocates for surveillance fight</a>." <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>. Thursday, 25 July 2013.</li> <li><a href="/wiki/Spencer_Ackerman" title="Spencer Ackerman">Ackerman, Spencer</a> and Dan Roberts. "<a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/aug/05/us-embassy-closure-nsa-surveillance">US embassy closures used to bolster the case for NSA surveillance programs</a>." <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>. Monday 5 August 2013.</li> <li>Two of the 'trips' (numbers 29 and 76) in the 2006 book, 'No Holiday', <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCohen2006" class="citation book cs1">Cohen, Martin (2006). <i>No Holiday</i>. New York: Disinformation Company Ltd. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-932857-29-0" title="Special:BookSources/978-1-932857-29-0"><bdi>978-1-932857-29-0</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=No+Holiday&rft.place=New+York&rft.pub=Disinformation+Company+Ltd&rft.date=2006&rft.isbn=978-1-932857-29-0&rft.aulast=Cohen&rft.aufirst=Martin&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span> are investigating the NSA and its activities.</li> <li><a href="/wiki/Glenn_Greenwald" title="Glenn Greenwald">Greenwald, Glenn</a>. "<a rel="nofollow" class="external text" href="https://www.theguardian.com/commentisfree/2013/aug/04/congress-nsa-denied-access">Members of Congress denied access to basic information about NSA</a>." <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>. Sunday 4 August 2013.</li> <li>Liu, Edward C. <a rel="nofollow" class="external text" href="https://fas.org/sgp/crs/intel/R44457.pdf">Surveillance of Foreigners Outside the United States Under Section 702 of the Foreign Intelligence Surveillance Act (FISA)</a> <a href="/wiki/Congressional_Research_Service" title="Congressional Research Service">Congressional Research Service</a>, 13 April 2016.</li> <li>MacAskill, Ewen. "<a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/jul/25/justice-department-case-nsa-collection">Justice Department fails in bid to delay landmark case on NSA collection</a>." <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>. Thursday 25 July 2013.</li> <li>Rushe, Dominic. "<a rel="nofollow" class="external text" href="https://www.theguardian.com/technology/2013/jul/16/microsoft-eric-holder-permission-information-national-security">Microsoft pushes Eric Holder to lift block on public information sharing</a>." <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>. Tuesday 16 July 2013.</li> <li>Perez, Evan. "<a rel="nofollow" class="external text" href="http://www.cnn.com/2013/08/09/politics/nsa-documents-scope/index.html">Documents shed light on U.S. surveillance programs</a>." (<a rel="nofollow" class="external text" href="https://archive.today/20130810061150/http://edition.cnn.com/2013/08/09/politics/nsa-documents-scope/index.html">Archive</a>) <a href="/wiki/CNN" title="CNN">CNN</a>. 9 August 2013.</li> <li>Gellman, Barton. "<a rel="nofollow" class="external text" href="https://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story.html">NSA broke privacy rules thousands of times per year, audit finds</a>." <i><a href="/wiki/Washington_Post" class="mw-redirect" title="Washington Post">Washington Post</a></i>. Thursday 15 August 2013.</li> <li>Roberts, Dan and Robert Booth. "<a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/aug/04/nsa-us-embassy-closures-terrorist-threat">NSA defenders: embassy closures followed pre-9/11 levels of 'chatter'</a>." <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>. Sunday 4 August 2013.</li> <li><a href="/wiki/Glenn_Greenwald" title="Glenn Greenwald">Greenwald, Glenn</a>. "<a rel="nofollow" class="external text" href="https://www.theguardian.com/commentisfree/2013/jul/15/crux-nsa-collect-it-all">The crux of the NSA story in one phrase: 'collect it all'</a>." <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>. Monday 15 July 2013.</li> <li>Sanchez, Julian. "<a rel="nofollow" class="external text" href="https://arstechnica.com/tech-policy/2013/07/5-things-snowden-leaks-revealed-about-nsas-original-warrantless-wiretaps/">Five things Snowden leaks revealed about NSA’s original warrantless wiretaps</a>." <i><a href="/wiki/Ars_Technica" title="Ars Technica">Ars Technica</a></i>. 9 July 2013.</li> <li>Forero, Juan. "<a rel="nofollow" class="external text" href="https://www.washingtonpost.com/world/the_americas/paper-reveals-nsa-ops-in-latin-america/2013/07/09/eff0cc7e-e8e3-11e2-818e-aa29e855f3ab_story.html">Paper reveals NSA ops in Latin America</a>." <i><a href="/wiki/Washington_Post" class="mw-redirect" title="Washington Post">Washington Post</a></i>. 9 July 2013.</li> <li>Jabour, Bridie. "<a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/jul/12/telstra-deal-america-government-spying">Telstra signed deal that would have allowed US spying</a>." <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>. Friday 12 July 2013.</li> <li><a href="/wiki/Spencer_Ackerman" title="Spencer Ackerman">Ackerman, Spencer</a>. "<a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/jul/18/white-house-silent-renewal-nsa-court-order#start-of-comments">White House stays silent on renewal of NSA data collection order</a>." <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>. Thursday 18 July 2013.</li> <li>Naughton, John. "<a rel="nofollow" class="external text" href="https://www.theguardian.com/technology/2013/jul/28/edward-snowden-death-of-internet">Edward Snowden's not the story. The fate of the internet is</a>." <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>. 28 July 2013.</li> <li>"<a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/aug/21/edward-snowden-nsa-files-revelations">Edward Snowden NSA files: secret surveillance and our revelations so far – Leaked National Security Agency documents have led to several hundred Guardian stories on electronic privacy and the state</a>" by <i>The Guardian</i><span class="nowrap" style="padding-left:0.1em;">'</span>s James Ball on 21 August 2013</li> <li><a rel="nofollow" class="external text" href="http://www.leahy.senate.gov/download/honorable-patrick-j-leahy">2013-07-29 Letter of FISA Court president Reggie B. Walton to the Chairman of the U.S. Senate Judiciary Committee Patrick J. Leahy about certain operations of the FISA Court</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130818103512/http://www.leahy.senate.gov/download/honorable-patrick-j-leahy">Archived</a> 18 August 2013 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>; among other things the process of accepting, modifying and/or rejecting surveillance measures proposed by the U.S. government, the interaction between the FISA Court and the U.S. government, the appearance of non-governmental parties before the court and the process used by the Court to consider and resolve any instances where the government entities notifies the court of compliance concerns with any of the FISA authorities.</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1 cs1-prop-foreign-lang-source"><a rel="nofollow" class="external text" href="http://g1.globo.com/fantastico/noticia/2013/09/veja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html">"Veja os documentos ultrassecretos que comprovam espionagem a Dilma"</a> (in Portuguese). 2 September 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">4 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Veja+os+documentos+ultrassecretos+que+comprovam+espionagem+a+Dilma&rft.date=2013-09-02&rft_id=http%3A%2F%2Fg1.globo.com%2Ffantastico%2Fnoticia%2F2013%2F09%2Fveja-os-documentos-ultrassecretos-que-comprovam-espionagem-dilma.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AGlobal+surveillance" class="Z3988"></span> Documents relating to the surveillance against <a href="/wiki/Dilma_Rousseff" title="Dilma Rousseff">Dilma Rousseff</a> and <a href="/wiki/Enrique_Pe%C3%B1a_Nieto" title="Enrique Peña Nieto">Enrique Peña Nieto</a></li> <li><a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance">NSA surveillance: A guide to staying secure - The NSA has huge capabilities – and if it wants in to your computer, it's in. With that in mind, here are five ways to stay safe</a> by <i>The Guardian</i><span class="nowrap" style="padding-left:0.1em;">'</span>s Bruce Schneier on 5 September 2013.</li></ul> <style data-mw-deduplicate="TemplateStyles:r1235681985">.mw-parser-output .side-box{margin:4px 0;box-sizing:border-box;border:1px solid #aaa;font-size:88%;line-height:1.25em;background-color:var(--background-color-interactive-subtle,#f8f9fa);display:flow-root}.mw-parser-output .side-box-abovebelow,.mw-parser-output .side-box-text{padding:0.25em 0.9em}.mw-parser-output .side-box-image{padding:2px 0 2px 0.9em;text-align:center}.mw-parser-output .side-box-imageright{padding:2px 0.9em 2px 0;text-align:center}@media(min-width:500px){.mw-parser-output .side-box-flex{display:flex;align-items:center}.mw-parser-output .side-box-text{flex:1;min-width:0}}@media(min-width:720px){.mw-parser-output .side-box{width:238px}.mw-parser-output .side-box-right{clear:right;float:right;margin-left:1em}.mw-parser-output .side-box-left{margin-right:1em}}</style><style data-mw-deduplicate="TemplateStyles:r1237033735">@media print{body.ns-0 .mw-parser-output .sistersitebox{display:none!important}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}</style><div class="side-box side-box-right plainlinks sistersitebox"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1126788409"> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/30px-Commons-logo.svg.png" decoding="async" width="30" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/45px-Commons-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/59px-Commons-logo.svg.png 2x" data-file-width="1024" data-file-height="1376" /></span></span></div> <div class="side-box-text plainlist">Wikimedia Commons has media related to <span style="font-weight: bold; font-style: italic;"><a href="https://commons.wikimedia.org/wiki/Category:2013_Mass_Surveillance_Disclosures" class="extiw" title="commons:Category:2013 Mass Surveillance Disclosures">2013 Mass Surveillance Disclosures</a></span>.</div></div> </div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style></div><div role="navigation" class="navbox" aria-labelledby="Privacy" style="padding:3px"><table class="nowraplinks hlist mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Privacy" title="Template:Privacy"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Privacy" title="Template talk:Privacy"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Privacy" title="Special:EditPage/Template:Privacy"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Privacy" style="font-size:114%;margin:0 4em"><a href="/wiki/Privacy" title="Privacy">Privacy</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Principles</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Right_of_access_to_personal_data" title="Right of access to personal data">Right of access to personal data</a></li> <li><a href="/wiki/Expectation_of_privacy" class="mw-redirect" title="Expectation of privacy">Expectation of privacy</a></li> <li><a href="/wiki/Right_to_privacy" title="Right to privacy">Right to privacy</a></li> <li><a href="/wiki/Right_to_be_forgotten" title="Right to be forgotten">Right to be forgotten</a></li> <li><a href="/wiki/Post-mortem_privacy" title="Post-mortem privacy">Post-mortem privacy</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Privacy_law" title="Privacy law">Privacy laws</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Privacy_in_Australian_law" title="Privacy in Australian law">Australia</a></li> <li><a href="/wiki/General_Personal_Data_Protection_Law" title="General Personal Data Protection Law">Brazil</a></li> <li><a href="/wiki/Canadian_privacy_law" title="Canadian privacy law">Canada</a></li> <li><a href="/wiki/Personal_Information_Protection_Law_of_the_People%27s_Republic_of_China" title="Personal Information Protection Law of the People's Republic of China">China</a></li> <li><a href="/wiki/Privacy_law_in_Denmark" title="Privacy law in Denmark">Denmark</a></li> <li><a href="/wiki/Privacy_in_English_law" title="Privacy in English law">England</a></li> <li><a href="/wiki/General_Data_Protection_Regulation" title="General Data Protection Regulation">European Union</a></li> <li><a href="/wiki/Bundesdatenschutzgesetz" title="Bundesdatenschutzgesetz">Germany</a></li> <li><a href="/wiki/Data_Protection_Act,_2012" title="Data Protection Act, 2012">Ghana</a></li> <li><a href="/wiki/Right_to_privacy_in_New_Zealand" title="Right to privacy in New Zealand">New Zealand</a></li> <li><a href="/wiki/Data_protection_(privacy)_laws_in_Russia" title="Data protection (privacy) laws in Russia">Russia</a></li> <li><a href="/wiki/Personal_Data_Protection_Act_2012_(Singapore)" class="mw-redirect" title="Personal Data Protection Act 2012 (Singapore)">Singapore</a></li> <li><a href="/wiki/Personal_Data_Protection_Act_(Sri_Lanka)" title="Personal Data Protection Act (Sri Lanka)">Sri Lanka</a></li> <li><a href="/wiki/Federal_Data_Protection_and_Information_Commissioner" title="Federal Data Protection and Information Commissioner">Switzerland</a></li> <li><a href="/wiki/Privacy_laws_of_the_United_Kingdom" class="mw-redirect" title="Privacy laws of the United Kingdom">United Kingdom</a></li> <li><a href="/wiki/Privacy_laws_of_the_United_States" title="Privacy laws of the United States">United States</a> <ul><li><a href="/wiki/California_Consumer_Privacy_Act" title="California Consumer Privacy Act">California</a>, <a href="/wiki/California_Privacy_Rights_Act" title="California Privacy Rights Act">amended in 2020</a></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/National_data_protection_authority" title="National data protection authority">Data protection authorities</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Office_of_the_Australian_Information_Commissioner" title="Office of the Australian Information Commissioner">Australia</a></li> <li><a href="/wiki/Danish_Data_Protection_Agency" title="Danish Data Protection Agency">Denmark</a></li> <li><a href="/wiki/European_Data_Protection_Supervisor" title="European Data Protection Supervisor">European Union</a></li> <li><a href="/wiki/Commission_nationale_de_l%27informatique_et_des_libert%C3%A9s" title="Commission nationale de l'informatique et des libertés">France</a></li> <li><a href="/wiki/Federal_Commissioner_for_Data_Protection_and_Freedom_of_Information" title="Federal Commissioner for Data Protection and Freedom of Information">Germany</a></li> <li><a href="/wiki/Data_Protection_Board_of_India" title="Data Protection Board of India">India</a></li> <li><a href="/wiki/Personal_Data_Protection_Authority_Institute" title="Personal Data Protection Authority Institute">Indonesia</a></li> <li><a href="/wiki/Data_Protection_Commissioner" title="Data Protection Commissioner">Ireland</a></li> <li><a href="/wiki/Office_of_the_Data_Protection_Supervisor" title="Office of the Data Protection Supervisor">Isle of Man</a></li> <li><a href="/wiki/Dutch_Data_Protection_Authority" title="Dutch Data Protection Authority">Netherlands</a></li> <li><a href="/wiki/Norwegian_Data_Protection_Authority" title="Norwegian Data Protection Authority">Norway</a></li> <li><a href="/wiki/National_Privacy_Commission" title="National Privacy Commission">Philippines</a></li> <li><a href="/wiki/Polish_Data_Protection_Commissioner" title="Polish Data Protection Commissioner">Poland</a></li> <li><a href="/wiki/Personal_Information_Protection_Commission_(South_Korea)" title="Personal Information Protection Commission (South Korea)">South Korea</a></li> <li><a href="/wiki/Spanish_Data_Protection_Agency" title="Spanish Data Protection Agency">Spain</a></li> <li><a href="/wiki/Swedish_Data_Protection_Authority" class="mw-redirect" title="Swedish Data Protection Authority">Sweden</a></li> <li><a href="/wiki/Federal_Data_Protection_and_Information_Commissioner" title="Federal Data Protection and Information Commissioner">Switzerland</a></li> <li><a href="/wiki/Office_of_the_Personal_Data_Protection_Committee" class="mw-redirect" title="Office of the Personal Data Protection Committee">Thailand</a></li> <li><a href="/wiki/Turkish_Data_Protection_Authority" title="Turkish Data Protection Authority">Turkey</a></li> <li><a href="/wiki/Information_Commissioner%27s_Office" title="Information Commissioner's Office">United Kingdom</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Areas</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Consumer_privacy" title="Consumer privacy">Consumer</a></li> <li><a href="/wiki/Digital_privacy" title="Digital privacy">Digital</a></li> <li><a href="/wiki/Privacy_in_education" title="Privacy in education">Education</a></li> <li><a href="/wiki/Medical_privacy" title="Medical privacy">Medical</a></li> <li><a href="/wiki/Workplace_privacy" title="Workplace privacy">Workplace</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Information_privacy" title="Information privacy">Information privacy</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Information_privacy_law" title="Information privacy law">Law</a></li> <li><a href="/wiki/Bank_secrecy" title="Bank secrecy">Financial</a></li> <li><a href="/wiki/Internet_privacy" title="Internet privacy">Internet</a> <ul><li><a href="/wiki/Privacy_concerns_with_Facebook" title="Privacy concerns with Facebook">Facebook</a></li> <li><a href="/wiki/Privacy_concerns_regarding_Google" class="mw-redirect" title="Privacy concerns regarding Google">Google</a></li> <li><a href="/wiki/Privacy_concerns_with_Twitter" class="mw-redirect" title="Privacy concerns with Twitter">Twitter</a></li></ul></li> <li><a href="/wiki/Email_privacy" title="Email privacy">Email</a></li> <li><a href="/wiki/Personal_data" title="Personal data">Personal data</a></li> <li><a href="/wiki/Personal_identifier" title="Personal identifier">Personal identifier</a></li> <li><a href="/wiki/Privacy_concerns_with_social_networking_services" title="Privacy concerns with social networking services">Social networking services</a></li> <li><a href="/wiki/Privacy-enhancing_technologies" title="Privacy-enhancing technologies">Privacy-enhancing technologies</a></li> <li><a href="/wiki/Privacy_engineering" title="Privacy engineering">Privacy engineering</a></li> <li><a href="/wiki/Privacy-invasive_software" title="Privacy-invasive software">Privacy-invasive software</a></li> <li><a href="/wiki/Privacy_policy" title="Privacy policy">Privacy policy</a></li> <li><a href="/wiki/Privacy_software" title="Privacy software">Privacy software</a></li> <li><a href="/wiki/Secret_ballot" title="Secret ballot">Secret ballot</a></li> <li><a href="/wiki/Virtual_assistant_privacy" title="Virtual assistant privacy">Virtual assistant privacy</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Advocacy organizations</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/American_Civil_Liberties_Union" title="American Civil Liberties Union">American Civil Liberties Union</a></li> <li><a href="/wiki/Center_for_Democracy_and_Technology" title="Center for Democracy and Technology">Center for Democracy and Technology</a></li> <li><a href="/wiki/Computer_Professionals_for_Social_Responsibility" title="Computer Professionals for Social Responsibility">Computer Professionals for Social Responsibility</a></li> <li><a href="/wiki/Data_Privacy_Lab" title="Data Privacy Lab">Data Privacy Lab</a></li> <li><a href="/wiki/Electronic_Frontier_Foundation" title="Electronic Frontier Foundation">Electronic Frontier Foundation</a></li> <li><a href="/wiki/Electronic_Privacy_Information_Center" title="Electronic Privacy Information Center">Electronic Privacy Information Center</a></li> <li><a href="/wiki/European_Digital_Rights" title="European Digital Rights">European Digital Rights</a></li> <li><a href="/wiki/Future_of_Privacy_Forum" title="Future of Privacy Forum">Future of Privacy Forum</a></li> <li><a href="/wiki/Global_Network_Initiative" title="Global Network Initiative">Global Network Initiative</a></li> <li><a href="/wiki/International_Association_of_Privacy_Professionals" title="International Association of Privacy Professionals">International Association of Privacy Professionals</a></li> <li><a href="/wiki/NOYB" title="NOYB">NOYB</a></li> <li><a href="/wiki/Privacy_International" title="Privacy International">Privacy International</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">See also</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Anonymity" title="Anonymity">Anonymity</a></li> <li><a href="/wiki/Cellphone_surveillance" title="Cellphone surveillance">Cellphone surveillance</a></li> <li><a href="/wiki/Data_security" title="Data security">Data security</a></li> <li><a href="/wiki/Eavesdropping" title="Eavesdropping">Eavesdropping</a></li> <li><a class="mw-selflink selflink">Global surveillance</a></li> <li><a href="/wiki/Identity_theft" title="Identity theft">Identity theft</a></li> <li><a href="/wiki/Mass_surveillance" title="Mass surveillance">Mass surveillance</a></li> <li><a href="/wiki/Panopticon" title="Panopticon">Panopticon</a></li> <li><a href="/wiki/PRISM" title="PRISM">PRISM</a></li> <li><a href="/wiki/Search_warrant" title="Search warrant">Search warrant</a></li> <li><a href="/wiki/Wiretapping" title="Wiretapping">Wiretapping</a></li> <li><a href="/wiki/Human_rights" title="Human rights">Human rights</a></li> <li><a href="/wiki/Personality_rights" title="Personality rights">Personality rights</a></li></ul> </div></td></tr><tr><td class="navbox-abovebelow" colspan="2"><div> <ul><li><span class="noviewer" typeof="mw:File"><span title="Category"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/16px-Symbol_category_class.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/23px-Symbol_category_class.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/31px-Symbol_category_class.svg.png 2x" data-file-width="180" data-file-height="185" /></span></span> <a href="/wiki/Category:Privacy" title="Category:Privacy">Category</a></li></ul> </div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐api‐ext.eqiad.main‐f5b79cb58‐sh8fj Cached time: 20241128114121 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 1.478 seconds Real time usage: 1.819 seconds Preprocessor visited node count: 12323/1000000 Post‐expand include size: 423684/2097152 bytes Template argument size: 7440/2097152 bytes Highest expansion depth: 18/100 Expensive parser function count: 12/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 712681/5000000 bytes Lua time usage: 0.841/10.000 seconds Lua memory usage: 7775744/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 1507.265 1 -total 53.92% 812.744 1 Template:Reflist 30.07% 453.180 126 Template:Cite_news 6.60% 99.498 2 Template:Sidebar_with_collapsible_lists 6.04% 91.002 8 Template:Cite_book 5.23% 78.848 1 Template:Global_surveillance 4.58% 69.092 1 Template:Commons_category 4.48% 67.547 1 Template:Short_description 4.45% 67.100 1 Template:Sister_project 4.41% 66.463 20 Template:Cite_web --> <!-- Saved in parser cache with key enwiki:pcache:41227816:|#|:idhash:canonical and timestamp 20241128114121 and revision id 1260024867. Rendering was triggered because: api-parse --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Global_surveillance&oldid=1260024867">https://en.wikipedia.org/w/index.php?title=Global_surveillance&oldid=1260024867</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Global_surveillance" title="Category:Global surveillance">Global surveillance</a></li><li><a href="/wiki/Category:GCHQ" title="Category:GCHQ">GCHQ</a></li><li><a href="/wiki/Category:National_Security_Agency" title="Category:National Security Agency">National Security Agency</a></li><li><a href="/wiki/Category:Mass_surveillance" title="Category:Mass surveillance">Mass surveillance</a></li><li><a href="/wiki/Category:2013_controversies" title="Category:2013 controversies">2013 controversies</a></li><li><a href="/wiki/Category:Edward_Snowden" title="Category:Edward Snowden">Edward Snowden</a></li><li><a href="/wiki/Category:Espionage" title="Category:Espionage">Espionage</a></li><li><a href="/wiki/Category:Intelligence_operations" title="Category:Intelligence operations">Intelligence operations</a></li><li><a href="/wiki/Category:National_security" title="Category:National security">National security</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:CS1_Portuguese-language_sources_(pt)" title="Category:CS1 Portuguese-language sources (pt)">CS1 Portuguese-language sources (pt)</a></li><li><a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">CS1 maint: multiple names: authors list</a></li><li><a href="/wiki/Category:CS1_German-language_sources_(de)" title="Category:CS1 German-language sources (de)">CS1 German-language sources (de)</a></li><li><a href="/wiki/Category:Webarchive_template_wayback_links" title="Category:Webarchive template wayback links">Webarchive template wayback links</a></li><li><a href="/wiki/Category:CS1_French-language_sources_(fr)" title="Category:CS1 French-language sources (fr)">CS1 French-language sources (fr)</a></li><li><a href="/wiki/Category:CS1_Dutch-language_sources_(nl)" title="Category:CS1 Dutch-language sources (nl)">CS1 Dutch-language sources (nl)</a></li><li><a href="/wiki/Category:CS1_Norwegian-language_sources_(no)" title="Category:CS1 Norwegian-language sources (no)">CS1 Norwegian-language sources (no)</a></li><li><a href="/wiki/Category:CS1_Spanish-language_sources_(es)" title="Category:CS1 Spanish-language sources (es)">CS1 Spanish-language sources (es)</a></li><li><a href="/wiki/Category:CS1_Swedish-language_sources_(sv)" title="Category:CS1 Swedish-language sources (sv)">CS1 Swedish-language sources (sv)</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_is_different_from_Wikidata" title="Category:Short description is different from Wikidata">Short description is different from Wikidata</a></li><li><a href="/wiki/Category:Use_dmy_dates_from_July_2019" title="Category:Use dmy dates from July 2019">Use dmy dates from July 2019</a></li><li><a href="/wiki/Category:All_articles_with_unsourced_statements" title="Category:All articles with unsourced statements">All articles with unsourced statements</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_October_2023" title="Category:Articles with unsourced statements from October 2023">Articles with unsourced statements from October 2023</a></li><li><a href="/wiki/Category:Articles_containing_potentially_dated_statements_from_2007" title="Category:Articles containing potentially dated statements from 2007">Articles containing potentially dated statements from 2007</a></li><li><a href="/wiki/Category:All_articles_containing_potentially_dated_statements" title="Category:All articles containing potentially dated statements">All articles containing potentially dated statements</a></li><li><a href="/wiki/Category:Wikipedia_external_links_cleanup_from_August_2022" title="Category:Wikipedia external links cleanup from August 2022">Wikipedia external links cleanup from August 2022</a></li><li><a href="/wiki/Category:Commons_category_link_is_on_Wikidata" title="Category:Commons category link is on Wikidata">Commons category link is on Wikidata</a></li><li><a href="/wiki/Category:Articles_containing_video_clips" title="Category:Articles containing video clips">Articles containing video clips</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 28 November 2024, at 11:41<span class="anonymous-show"> (UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Global_surveillance&mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-76c6b8f495-zg499","wgBackendResponseTime":180,"wgPageParseReport":{"limitreport":{"cputime":"1.478","walltime":"1.819","ppvisitednodes":{"value":12323,"limit":1000000},"postexpandincludesize":{"value":423684,"limit":2097152},"templateargumentsize":{"value":7440,"limit":2097152},"expansiondepth":{"value":18,"limit":100},"expensivefunctioncount":{"value":12,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":712681,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 1507.265 1 -total"," 53.92% 812.744 1 Template:Reflist"," 30.07% 453.180 126 Template:Cite_news"," 6.60% 99.498 2 Template:Sidebar_with_collapsible_lists"," 6.04% 91.002 8 Template:Cite_book"," 5.23% 78.848 1 Template:Global_surveillance"," 4.58% 69.092 1 Template:Commons_category"," 4.48% 67.547 1 Template:Short_description"," 4.45% 67.100 1 Template:Sister_project"," 4.41% 66.463 20 Template:Cite_web"]},"scribunto":{"limitreport-timeusage":{"value":"0.841","limit":"10.000"},"limitreport-memusage":{"value":7775744,"limit":52428800}},"cachereport":{"origin":"mw-api-ext.eqiad.main-f5b79cb58-sh8fj","timestamp":"20241128114121","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Global surveillance","url":"https:\/\/en.wikipedia.org\/wiki\/Global_surveillance","sameAs":"http:\/\/www.wikidata.org\/entity\/Q15653954","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q15653954","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2013-11-30T01:46:34Z","dateModified":"2024-11-28T11:41:10Z","image":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/0\/08\/Globe_eye_icon.png","headline":"mass surveillance of entire populations across national borders"}</script> </body> </html>