634:
604:
614:
1928:(domestic intelligence) were also allowed to use the XKeyscore system. In those documents the BND agency was described as the NSA's most prolific partner in information gathering. This led to political confrontations, after which the directors of the German intelligence agencies briefed members of the German parliamentary intelligence oversight committee on July 25, 2013. They declared that XKeyscore has been used by the BND since 2007 and that the BfV has been using a test version since 2012. The directors also explained that the program is not for collecting data, but rather only for the analysis of collected data.
624:
594:
3362:
37:
23:
1510:
to defend the nation and to protect U.S. and allied troops abroad." In terms of access, an NSA press statement reads that there is no "unchecked analyst access to NSA collection data. Access to XKeyscore, as well as all of NSA's analytic tools, is limited to only those personnel who require access for their assigned tasks." and that there are "stringent oversight and compliance mechanisms built in at several levels. One feature is the system's ability to limit what an analyst can do with a tool, based on the source of the collection and each analyst's defined responsibilities."
688:
584:
664:
676:
1470:
It's a one-stop-shop for access to the NSA's information. ... You can tag individuals ... Let's say you work at a major German corporation and I want access to that network, I can track your username on a website on a forum somewhere, I can track your real name, I can track associations with your friends and I can build what's called a fingerprint, which is network activity unique to you, which means anywhere you go in the world, anywhere you try to sort of hide your online presence, your identity.
1985:
700:
1519:
1999:
1535:
4232:
1527:
731:
719:
886:
644:
1899:
1741:
1727:: This latest version can process internet traffic at data rates of 10 gigabits per second. Data that could be useful for intelligence purposes are then selected and forwarded by using the "GENESIS selection language". GCHQ also operates a number of Deep Dive versions of XKeyscore at three locations under the codename
2728:"XKeyscore: NSA tool collects 'nearly everything a user does on the internet' – XKeyscore Gives 'Widest-Reaching' Collection of Online Data – NSA Analysts Require No Prior Authorization for Searches – Sweeps Up Emails, Social Media Activity and Browsing History"
1884:
features. For instance, analysts who were especially good at using XKeyscore could acquire "skilz" points and "unlock achievements." The training units in
Griesheim were apparently successful and analysts there had achieved the "highest average of skilz points" compared with all other NSA departments
1748:
For analysts, XKeyscore provides a "series of viewers for common data types", which allows them to query terabytes of raw data gathered at the aforementioned collection sites. This enables them to find targets that cannot be found by searching only the metadata, and also to do this against data sets
1490:
He added that the NSA's database of collected communications allows its analysts to listen "to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you've entered, and it also alerts them to any further activity that people
1509:
collection system" to legally obtain information about "legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests. ... to collect the information, that enables us to perform our missions successfully –
1469:
You could read anyone's email in the world, anybody you've got an email address for. Any website: You can watch traffic to and from it. Any computer that an individual sits at: You can watch it. Any laptop that you're tracking: you can follow it as it moves from place to place throughout the world.
1588:
in Japan, and numerous military and non-military locations within the US. Trafficthief, a core program of
Turbulence, can alert NSA analysts when their targets communicate, and trigger other software programs, so select data is "promoted" from the local XKeyscore data store to the NSA's "corporate
1872:
in
Germany) said that XKeyscore made it easier and more efficient to target surveillance. Previously, analysis often accessed data NSA was not interested in. XKeyscore allowed them to focus on the intended topics, while ignoring unrelated data. XKeyscore also proved to be outstanding for tracking
1675: – foreign partners of the NSA such as the (signals) intelligence agencies of Belgium, Denmark, France, Germany, Italy, Japan, the Netherlands, Norway, Sweden, etc. However the Netherlands is out of any cooperation concerning intelligence gathering and sharing for illegal spying.
1679:
From these sources, XKeyscore stores "full-take data", which are indexed by plug-ins that extract certain types of metadata (like phone numbers, e-mail addresses, log-ins, and user activity) and index them in metadata tables, which can be queried by analysts. XKeyscore has been integrated with
1760:
This is useful because "a large amount of time spent on the web is performing actions that are anonymous" and therefore those activities can't be found by just looking for e-mail addresses of a target. When content has been found, the analyst might be able to find new intelligence or a strong
1756:
Because XKeyscore holds raw and unselected communications traffic, analysts can not only perform queries using "strong selectors" like e-mail addresses, but also using "soft selectors", like keywords, against the body texts of e-mail and chat messages and digital documents and spreadsheets in
1487:, low-level NSA analysts can, via systems like XKeyscore, "listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents. And it's all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst."
1597:
XKeyscore consists of over 700 servers at approximately 150 sites where the NSA collects data, like "US and allied military and other facilities as well as US embassies and consulates" in many countries around the world. Among the facilities involved in the program are four bases in
1687:
However, the system continuously gets so much
Internet data that it can be stored only for short periods of time. Content data remain on the system for only three to five days, while metadata is stored for up to thirty days. A detailed commentary on an NSA presentation published in
2266:
1829:
revealed in 2013 that most of these things cannot be detected by other NSA tools, because they operate with strong selectors (like e-mail and IP addresses and phone numbers) and the raw data volumes are too high to be forwarded to other NSA databases.
1775:
Look for "anomalies" without any specific person attached, like detecting the nationality of foreigners by analyzing the language used within intercepted emails. An example would be a German speaker in
Pakistan. The Brazilian paper
1960:
In an ongoing scandal, where it has been revealed that NSA helped FE (Danish
Military Intelligence Service) build a new Spy datacenter at SandagergĂĄrd, Amager, XKeyscore has been made available for FE to use on the collected data.
1717:: This version of XKeyscore is used for higher data rates. The data are first processed by the TURMOIL system, which sends 5% of the internet data packets to XKeyscore. GCHQ only uses this version for its collection under the
1711:: The initial version of XKeyscore is fed with data from low-rate data signals, after being processed by the WEALTHYCLUSTER system. This traditional version is not only used by NSA but also at many intercept sites of GCHQ.
1749:
that otherwise would have been dropped by the front-end data processing systems. According to a slide from an XKeyscore presentation, NSA collection sites select and forward less than 5% of the internet traffic to the
2256:
2328:
1571:
XKeyscore is considered a "passive" program, in that it listens, but does not transmit anything on the networks that it targets. But it can trigger other systems, which perform "active" attacks through
1861:
during 2013 claimed that XKeyscore had played a role in capturing 300 terrorists by 2008, which could not be substantiated as the redacted documents do not cite instances of terrorist interventions.
2905:
2877:
1877:
movement in
Germany, because it allows for searching on patterns, rather than particular individuals. An analyst is able to determine when targets research new topics, or develop new behaviors.
2800:
3523:
1192:
341:
4330:
3558:
2289:
3997:
1692:
in July 2013 cites a document published in 2008 declaring that "At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours."
3069:
3692:
2092:"How the NSA Is Still Harvesting Your Online Data – Files Show Vast Scale of Current NSA Metadata Programs, with One Stream Alone Celebrating 'One Trillion Records Processed'"
2958:
2430:
2561:
837:
newspapers. The code name was already public knowledge because it was mentioned in earlier articles, and, like many other code names, it appears in job postings and online
2138:
521:
3350:
2829:[U.S. Spying Spread Through Latin America – After Brazil, Colombia Was the Most Watched Country – Venezuela Also Came in the Crosshairs of American Programs].
1263:
387:
2985:
2836:
794:(NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligence agencies, including the
2597:
723:
2827:"Espionagem dos EUA se espalhou pela AmĂ©rica Latina – Depois do Brasil, ColĂ´mbia foi o paĂs mais vigiado – Venezuela tambĂ©m entrou na mira de programas americanos"
306:
2318:
1227:
511:
2730:
1665:
2902:
3038:
2101:
1576:
which are "tipping", for example, the QUANTUM family of programs, including QUANTUMINSERT, QUANTUMHAND, QUANTUMTHEORY, QUANTUMBOT and QUANTUMCOPPER and
4038:
3650:
3165:
2873:
488:
2708:
3098:
2792:
633:
2858:
2619:
2241:
2123:
2922:
2793:"NSA's Internet Taps Can Find Systems to Hack, Track VPNs and Word Docs – X-Keyscore Gives NSA the Ability to Find and Exploit Vulnerable Systems"
1618: – joint operation of the CIA and NSA that carries out clandestine operations including espionage on foreign diplomats and leaders
4310:
4033:
905:
2363:
4340:
4265:
3836:
2388:
1546:
Exploitation System/Analytic
Framework". DNI stands for Digital Network Intelligence, which means intelligence derived from internet traffic.
4145:
1949:
1407:
4325:
4300:
4043:
3861:
3685:
1638:
In a single, undated slide published by
Swedish media in December 2013, the following additional data sources for XKeyscore are mentioned:
915:
668:
3016:
2680:
4285:
4004:
2512:
1940:, a secret treaty was signed in 1954 by Sweden with the United States, the United Kingdom, Canada, Australia and New Zealand (called the
440:
3065:
2452:
2219:
2051:
4275:
763:
483:
613:
4150:
2649:
2022:
1072:
803:
704:
3093:
2420:
3889:
3370:
2955:
2176:
2012:
1969:
The classified documents leaked by
Snowden also indicate that in April 2013, NSA had secretly provided the XKeyscore system to the
2551:
946:
536:
369:
359:
603:
4295:
3158:
2142:
807:
680:
531:
2588:"EUA expandem o aparato de vigilância continuamente – Software de vigilância usa mais de 700 servidores espalhados pelo mundo"
623:
593:
4335:
4290:
1660:
1609:
According to an NSA presentation from 2008, these XKeyscore servers are fed with data from the following collection systems:
1052:
910:
799:
321:
316:
4140:
3105:
2975:
2826:
1062:
2775:
3565:
2755:
2587:
1306:
607:
516:
180:
1787:
usage in Iran". The caveat given is that very broad queries can result in too much data to transmit back to the analyst.
4165:
1212:
1087:
1026:
4186:
3280:
3151:
2025:, a redacted presentation about X-Keyscore via The Guardian (UK) via Edward Snowden via U.S. National Security Agency
1400:
986:
811:
1744:
Slide from a 2008 NSA presentation about XKeyscore, showing the differences between the various NSA database systems
3963:
3203:
3189:
2727:
1671:
1133:
402:
209:
1420:
XKeyscore is a complicated system, and various authors have different interpretations of its actual capabilities.
583:
3759:
976:
637:
617:
283:
99:
4305:
4191:
4028:
3921:
3752:
3287:
2091:
1838:
1780:
claims that this has been applied to Latin America and specifically to Colombia, Ecuador, Mexico and Venezuela.
1530:
Slide from a 2008 NSA presentation about XKeyscore, showing a world map with the locations of XKeyscore servers
1505:
In an official statement from July 30, 2013, the NSA said "XKeyscore is used as a part of NSA's lawful foreign
1432:
of anyone anywhere in the world, while the NSA has claimed that usage of the system is limited and restricted.
1067:
900:
795:
756:
692:
185:
77:
3780:
3273:
2773:
GCHQ report on the technical abilities of the powerful spying program TEMPORA, which allows for a "full take"
1237:
981:
364:
219:
1626: – which stands for "foreign satellite collection", and refers to intercepts from satellites
4135:
3125:
2705:
2017:
1543:
1465:
asked Edward Snowden in its TV interview: "What could you do if you would use XKeyscore?" and he answered:
1393:
1057:
996:
867:
647:
214:
3935:
3928:
3266:
627:
597:
336:
175:
4280:
4090:
3990:
3794:
3551:
3537:
3252:
3210:
1799:
1795:
1649:
1614:
1573:
1047:
138:
1549:
Edward Snowden said about XKeyscore: "It's a front end search engine" in an interview with the German
3604:
3544:
3259:
3231:
2556:
2351:
1846:
1630:
1222:
1207:
827:
749:
2385:
4320:
4160:
4130:
3530:
3516:
3477:
3336:
3196:
3174:
2323:
2206:
1381:
1371:
1347:
1202:
1082:
1042:
791:
587:
27:
3942:
2483:
1925:
1921:
1907:
1813:
1791:
1700:
According to a document from an internal GCHQ website which was disclosed by the German magazine
1581:
1342:
815:
735:
422:
1772:
and terms entered into a search engine by known targets looking for suspicious things or places.
1764:
Besides using soft selectors, analysts can also use the following other XKeyscore capabilities:
643:
4315:
4260:
3766:
3463:
3008:
2874:"NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance"
2672:
2456:
2056:
1550:
1462:
1021:
1006:
848:
526:
2522:
3449:
3308:
3217:
2460:
2211:
2061:
2028:
1258:
331:
36:
22:
3706:
1990:
1833:
In 2008, NSA planned to add a number of new capabilities in the future including access to
1506:
1445:, XKeyscore is an NSA data-retrieval system which consists of a series of user interfaces,
1296:
1291:
951:
554:
445:
2637:
8:
3822:
3808:
3738:
3393:
3329:
3012:
2676:
2293:
2261:
1970:
1784:
1634: – a division of the NSA that cooperates with telecommunication providers
1437:
1327:
1143:
991:
876:
845:
311:
271:
160:
94:
89:
41:
2164:
4270:
3484:
3421:
3322:
2613:
2290:"Is XKeyscore Still Active? Defense Contractor Posted a Job Listing for it 2 weeks Ago"
2235:
2117:
1645: – intelligence derived from American spy planes, drones and satellites
1301:
392:
3039:"Ny afsløring: FE masseindsamler oplysninger om danskere gennem avanceret spionsystem"
4231:
4013:
3949:
3491:
3442:
2930:
2852:
2172:
1874:
1869:
1809:
1561:
1281:
852:
3815:
3657:
3597:
3343:
3301:
3245:
2087:
1577:
1446:
1376:
1359:
1138:
1123:
417:
407:
170:
165:
72:
2319:"Glenn Greenwald: Low-Level NSA Analysts Have 'Powerful and Invasive' Search Tool"
1837:
and other, unspecified network protocols and additional forms of metadata such as
4215:
4210:
3970:
3470:
3435:
3407:
3386:
2962:
2909:
2822:
2779:
2759:
2734:
2723:
2712:
2583:
2392:
2207:
2083:
2004:
1937:
1805:
Track the source and authorship of a document that has passed through many hands.
1585:
1484:
1425:
1364:
1286:
1187:
1177:
1172:
412:
67:
3982:
2515:[Targeted By The U.S. – Big Brother in Latin America and in the World].
4181:
3956:
3914:
3664:
3224:
2547:
1903:
1865:
1538:
Slide from a 2008 NSA presentation about XKeyscore, showing the query hierarchy
1421:
1148:
822:
675:
465:
2772:
2752:
1816:, people who search for privacy-enhancing software on the web, and readers of
1518:
4254:
3678:
3632:
3498:
3456:
2934:
2633:
1834:
1818:
1442:
1337:
114:
2821:
2582:
3801:
3400:
3379:
3143:
2739:
2425:
2096:
1945:
1881:
1654:
1542:
According to an NSA slide presentation about XKeyscore from 2013, it is a "
1476:
1429:
1354:
1332:
1113:
397:
251:
44:
as of 2007, with countries subject to the most data collection shown in red
4096:
3720:
3713:
3583:
3414:
1916:
1842:
1769:
1603:
961:
838:
699:
455:
326:
3066:"Japan made secret deals with the NSA that expanded global surveillance"
1998:
4084:
3238:
1704:
in June 2014, there are three different types of the XKeyscore system:
1118:
971:
450:
109:
1556:
XKeyscore is a "piece of Linux software that is typically deployed on
1534:
1491:
connected to that email address or that IP address do in the future".
4155:
3868:
3699:
3590:
3428:
3315:
3126:"Behind the Curtain; A Look at the Inner Workings of NSA's XKEYSCORE"
2980:
2210:, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge (July 3, 2014).
1941:
1653: – a division of the NSA that deals with hacking and
1599:
1526:
1322:
1153:
1077:
1016:
687:
654:
506:
460:
241:
155:
126:
104:
3124:
Lee, Micah; Greenwald, Glenn; Marquis-Boire, Morgan (July 2, 2015).
3104:
Marquis-Boire, Morgan; Greenwald, Glenn; Lee, Micah (July 1, 2015).
2482:
Lee, Micah; Greenwald, Glenn; Marquis-Boire, Morgan (July 2, 2015).
1761:
selector, which can then be used for starting a traditional search.
3854:
3773:
3745:
3294:
2643:
2355:
2139:"Job Networking Site LinkedIn Filled With Secret NSA Program Names"
2082:
1910:'s usage of the NSA's XKeyscore to wiretap a German domestic target
1718:
1450:
1428:
have said that XKeyscore is a system that enables almost unlimited
1128:
956:
559:
256:
204:
4072:
3896:
3875:
3671:
3625:
2831:
2592:
2517:
1750:
1728:
1622:
1557:
1001:
966:
941:
885:
833:
730:
288:
266:
246:
231:
150:
62:
3106:"XKEYSCORE: NSA's Google for the World's Private Communications"
2257:"Newly Declassified Documents on Phone Records Program Released"
1898:
1812:
revealed that XKeyscore is used to closely monitor users of the
3882:
3618:
1681:
1500:
1097:
718:
663:
236:
2513:"No alvo dos EUA – O big-brother na América Latina e no mundo"
2045:
2043:
1880:
To create additional motivation, the NSA incorporated various
1449:, servers and software that selects certain types of data and
825:
publicly revealed the program's purpose and use by the NSA in
4111:
4066:
3787:
3611:
1783:
Detect people who use encryption by doing searches like "all
1664: – all types of surveillance approved by the
1565:
936:
199:
3099:
Building a panopticon: The evolution of the NSA’s XKeyscore
2040:
1740:
1092:
1011:
4331:
Intelligence agency programmes revealed by Edward Snowden
3123:
3103:
2481:
2359:
1580:. These run at so-called "defensive sites" including the
2903:
Ally and Target: US Intelligence Watches Germany Closely
1920:
acquired from Snowden, the German intelligence agencies
1453:
that the NSA has already collected using other methods.
790:) is a secret computer system used by the United States
1888:
2923:"German Intelligence Agencies Used NSA Spying Program"
2352:"New Snowden Leak: NSA Program Taps All You Do Online"
1456:
2700:
2698:
1980:
1944:) for the purpose of intelligence collaboration and
2901:Laura Poitras, Marcel Rosenbach and Holger Stark,
855:, published excerpts of XKeyscore's source code.
4012:
3094:A full NSA presentation about XKeyscore from 2008
2976:"Cold War treaty confirms Sweden was not neutral"
2695:
2552:"Snowden Reveals Australia's Links to US Spy Web"
2484:"A Look at the Inner Workings of NSA's XKEYSCORE"
2421:"XKeyscore Presentation from 2008 – Read in Full"
2312:
2310:
1684:, which is NSA's database for internet metadata.
4252:
1948:. According to documents leaked by Snowden, the
1852:
2790:
2546:
2130:
3651:Global surveillance disclosures (2013–present)
3063:
2825:; Casado, Roberto Kaz e José (July 13, 2013).
2632:
2506:
2504:
2307:
489:Global surveillance disclosures (2013–present)
3998:
3159:
2586:; Casado, Roberto Kaz e José (July 6, 2013).
1401:
757:
3173:
3006:
2857:: CS1 maint: multiple names: authors list (
2670:
2618:: CS1 maint: multiple names: authors list (
2414:
2412:
2410:
2408:
2406:
2404:
2402:
2400:
2240:: CS1 maint: multiple names: authors list (
2122:: CS1 maint: multiple names: authors list (
1952:(FRA) has been granted access to XKeyscore.
1794:(VPNs) and machines that can potentially be
1461:On January 26, 2014, the German broadcaster
2897:
2895:
2871:
2762:, published by Der Spiegel on June 18, 2014
2501:
4005:
3991:
3166:
3152:
2136:
1408:
1394:
764:
750:
3009:"Read the Snowden Documents From the NSA"
3000:
2717:
2673:"Read the Snowden Documents From the NSA"
2664:
2397:
2254:
2023:File:XKeyscore presentation from 2008.pdf
804:Government Communications Security Bureau
3686:NSA warrantless surveillance (2001–2007)
2956:New slides about NSA collection programs
2892:
2626:
2510:
2076:
2013:List of government surveillance projects
1897:
1739:
1533:
1525:
1517:
858:
2915:
2815:
1885:participating in the training program.
1864:A 2011 report from the NSA unit in the
1666:Foreign Intelligence Surveillance Court
1494:
537:Mass surveillance in the United Kingdom
4311:United States national security policy
4253:
2988:from the original on December 11, 2013
2542:
2540:
2287:
2049:
808:Government Communications Headquarters
532:Mass surveillance in the United States
4341:Communications Security Establishment
4266:Counterterrorism in the United States
3986:
3147:
3019:from the original on February 9, 2014
2683:from the original on February 9, 2014
2652:from the original on January 30, 2014
2576:
2418:
2349:
2202:
2200:
2198:
2196:
2194:
1902:Excerpt of an NSA document leaked by
1695:
1589:repositories" for long term storage.
800:Communications Security Establishment
484:2005 warrantless surveillance scandal
2784:
2706:3 slides about the XKeyscore program
2564:from the original on August 10, 2013
2281:
2248:
1950:National Defence Radio Establishment
1889:Usage by foreign partners of the NSA
4326:National Security Agency operations
4301:American secret government programs
3072:from the original on April 24, 2017
2803:from the original on August 4, 2013
2537:
2433:from the original on August 1, 2013
2366:from the original on August 4, 2013
2316:
2212:"NSA targets the privacy-conscious"
2104:from the original on August 4, 2013
2050:Seipel, Hubert (January 26, 2014).
1307:Surveillance issues in smart cities
13:
4286:Obama administration controversies
3524:Information Warfare Support Center
2839:from the original on July 15, 2013
2791:Gallagher, Sean (August 1, 2013).
2600:from the original on July 10, 2013
2331:from the original on July 30, 2013
2255:Nakashima, Ellen (July 31, 2013).
2191:
2157:
1873:active groups associated with the
1457:According to Snowden and Greenwald
1027:Jindalee Operational Radar Network
14:
4352:
4276:Human rights in the United States
3281:Misawa Security Operations Center
3087:
3064:Ryan Gallagher (April 24, 2017).
2880:from the original on July 3, 2014
2269:from the original on July 2, 2014
2222:from the original on July 3, 2014
2179:from the original on July 7, 2014
812:Defense Intelligence Headquarters
42:Map of global NSA data collection
4230:
3964:Vulnerabilities Equities Process
3360:
3204:Consolidated Intelligence Center
3190:Alaska Mission Operations Center
2350:Wills, Amanda (August 1, 2013).
1997:
1983:
884:
729:
717:
698:
686:
674:
662:
642:
632:
622:
612:
602:
592:
582:
181:President's Surveillance Program
35:
21:
3605:Secure Terminal Equipment (STE)
3057:
3045:(in Danish). September 24, 2020
3031:
2968:
2948:
2865:
2765:
2746:
2521:(in Portuguese). Archived from
2475:
2445:
2386:Press Statement on 30 July 2013
2378:
2052:"Snowden Interview: Transcript"
1753:database for internet content.
1735:
1631:SSO (Special Source Operations)
1615:F6 (Special Collection Service)
1592:
1441:and national security reporter
3922:Institute for Defense Analyses
3288:Multiprogram Research Facility
2954:Top Level Telecommunications,
2453:"Snowden Interview Transcript"
2343:
2288:Fisher, Max (August 1, 2013).
796:Australian Signals Directorate
186:Terrorist Surveillance Program
1:
4296:Privacy of telecommunications
2753:XKeyscoreTabs XKS Development
2034:
1853:Contribution to U.S. security
1757:English, Arabic and Chinese.
1564:and stores collected data in
1238:Investigatory Powers Act 2016
365:Senate Intelligence Committee
4336:Federal Intelligence Service
4291:Privacy in the United States
2872:Kyle Rankin (July 3, 2014).
2137:Layne, Ken (June 18, 2013).
1857:The NSA slides published in
7:
3936:National Cryptologic School
3929:National Cryptologic Museum
3267:Interagency Training Center
3225:European Cryptologic Center
3197:Colorado Cryptologic Center
2743:. Retrieved August 1, 2013.
2317:Rea, Kari (July 28, 2013).
2060:. p. 3. Archived from
1976:
1924:(foreign intelligence) and
1513:
342:FISA Amendments Act of 2008
337:Protect America Act of 2007
176:Total Information Awareness
10:
4357:
3795:Real Time Regional Gateway
3538:Special Collection Service
3253:Georgia Cryptologic Center
2733:December 31, 2013, at the
2218:. Norddeutscher Rundfunk.
1955:
1893:
1841:tags, which often include
1650:Tailored Access Operations
1574:Tailored Access Operations
1498:
139:Tailored Access Operations
4226:
4200:
4174:
4123:
4106:
4059:
4052:
4021:
3906:
3846:
3730:
3642:
3575:
3508:
3369:
3358:
3260:Hawaii Cryptologic Center
3232:European Technical Center
3181:
2711:February 2, 2014, at the
2557:The Sydney Morning Herald
1931:
1223:National Intelligence Law
1208:Data Protection Directive
828:The Sydney Morning Herald
512:Surveillance of reporters
370:National Security Council
3351:Pacific Technical Center
3337:Texas Cryptologic Center
3175:National Security Agency
2908:August 20, 2013, at the
1964:
1792:virtual private networks
1382:Nothing to hide argument
1203:Data Retention Directive
844:On July 3, 2014, German
792:National Security Agency
776:Mass surveillance system
28:National Security Agency
3943:National Vigilance Park
2419:Staff (July 31, 2013).
2391:August 1, 2013, at the
1914:According to documents
1582:Ramstein Air Force base
816:Bundesnachrichtendienst
3767:Insider Threat Program
3464:John Michael McConnell
2961:July 26, 2013, at the
2758:June 30, 2014, at the
2457:Norddeutscher Rundfunk
2292:. WorldViews, blog of
2057:Norddeutscher Rundfunk
1911:
1768:Look for the usage of
1745:
1551:Norddeutscher Rundfunk
1539:
1531:
1523:
1472:
1463:Norddeutscher Rundfunk
1022:Mastering the Internet
849:Norddeutscher Rundfunk
527:Insider Threat Program
4306:Surveillance scandals
3450:William Eldridge Odom
2778:June 5, 2019, at the
2642:The Compass (blog of
2459:. n.d. Archived from
2029:Targeted surveillance
1901:
1814:Tor anonymity network
1790:Showing the usage of
1743:
1560:servers. It uses the
1537:
1529:
1521:
1499:Further information:
1467:
1259:FISA Improvements Act
859:Scope and functioning
332:Homeland Security Act
226:Databases, tools etc.
4114:(Germany, 1950–1990)
3707:Thomas Andrews Drake
1991:United States portal
1507:signals intelligence
1495:According to the NSA
1292:Secure communication
1134:Southern Cross Cable
522:UN diplomatic spying
3739:Boundless Informant
3394:Laurence Hugh Frost
3013:Sveriges Television
2677:Sveriges Television
2638:"What's XKEYSCORE?"
2463:on January 28, 2014
2294:The Washington Post
2262:The Washington Post
2165:"xkeyscorerules100"
2145:on December 8, 2017
2064:on January 28, 2014
1971:Japanese government
1438:The Washington Post
1328:Intelligence agency
1144:Bad Aibling Station
992:Boundless Informant
877:Global surveillance
393:Hepting v. AT&T
312:Privacy Act of 1974
90:Upstream collection
4235:Portals: Terrorism
3485:Keith B. Alexander
3422:Samuel C. Phillips
3007:Gunnar Rensfeldt.
2912:, August 12, 2013.
2671:Gunnar Rensfeldt.
1912:
1746:
1696:Types of XKeyscore
1540:
1532:
1524:
1302:Call detail record
846:public broadcaster
403:Clapper v. Amnesty
278:GCHQ collaboration
272:BOUNDLESSINFORMANT
4281:Mass surveillance
4248:
4247:
4119:
4118:
4014:Mass surveillance
3980:
3979:
3950:NSA Hall of Honor
3492:Michael S. Rogers
3443:Lincoln D. Faurer
2929:. July 20, 2013.
2835:(in Portuguese).
2636:(July 31, 2013).
2596:(in Portuguese).
2511:Staff (c. 2013).
2173:ARD (broadcaster)
2090:(June 27, 2013).
2088:Ackerman, Spencer
1906:that reveals the
1562:Apache web server
1447:backend databases
1418:
1417:
1282:Mass surveillance
1228:Cybersecurity Law
774:
773:
4348:
4234:
4057:
4056:
4007:
4000:
3993:
3984:
3983:
3973:
3966:
3959:
3952:
3945:
3938:
3931:
3924:
3917:
3899:
3892:
3885:
3878:
3871:
3864:
3857:
3839:
3832:
3825:
3818:
3811:
3804:
3797:
3790:
3783:
3776:
3769:
3762:
3755:
3748:
3741:
3723:
3716:
3709:
3702:
3695:
3688:
3681:
3674:
3667:
3660:
3658:Church Committee
3653:
3635:
3628:
3621:
3614:
3607:
3600:
3593:
3586:
3568:
3561:
3554:
3547:
3540:
3533:
3526:
3519:
3501:
3494:
3487:
3480:
3473:
3466:
3459:
3452:
3445:
3438:
3431:
3424:
3417:
3410:
3403:
3396:
3389:
3382:
3364:
3363:
3353:
3346:
3344:Utah Data Center
3339:
3332:
3325:
3318:
3311:
3304:
3302:RAF Menwith Hill
3297:
3290:
3283:
3276:
3269:
3262:
3255:
3248:
3246:Friendship Annex
3241:
3234:
3227:
3220:
3213:
3206:
3199:
3192:
3168:
3161:
3154:
3145:
3144:
3140:
3138:
3136:
3120:
3118:
3116:
3082:
3081:
3079:
3077:
3061:
3055:
3054:
3052:
3050:
3035:
3029:
3028:
3026:
3024:
3004:
2998:
2997:
2995:
2993:
2972:
2966:
2952:
2946:
2945:
2943:
2941:
2919:
2913:
2899:
2890:
2889:
2887:
2885:
2869:
2863:
2862:
2856:
2848:
2846:
2844:
2823:Greenwald, Glenn
2819:
2813:
2812:
2810:
2808:
2788:
2782:
2769:
2763:
2750:
2744:
2726:(July 31, 2013).
2724:Greenwald, Glenn
2721:
2715:
2702:
2693:
2692:
2690:
2688:
2668:
2662:
2661:
2659:
2657:
2630:
2624:
2623:
2617:
2609:
2607:
2605:
2584:Greenwald, Glenn
2580:
2574:
2573:
2571:
2569:
2550:(July 8, 2013).
2544:
2535:
2534:
2532:
2530:
2525:on July 12, 2013
2508:
2499:
2498:
2496:
2494:
2479:
2473:
2472:
2470:
2468:
2449:
2443:
2442:
2440:
2438:
2416:
2395:
2382:
2376:
2375:
2373:
2371:
2347:
2341:
2340:
2338:
2336:
2314:
2305:
2304:
2302:
2300:
2285:
2279:
2278:
2276:
2274:
2252:
2246:
2245:
2239:
2231:
2229:
2227:
2204:
2189:
2188:
2186:
2184:
2175:. July 3, 2014.
2161:
2155:
2154:
2152:
2150:
2141:. Archived from
2134:
2128:
2127:
2121:
2113:
2111:
2109:
2084:Greenwald, Glenn
2080:
2074:
2073:
2071:
2069:
2047:
2007:
2002:
2001:
1993:
1988:
1987:
1986:
1808:On July 3, 2014
1482:
1410:
1403:
1396:
1377:Stop Watching Us
1248:Proposed changes
1139:Utah Data Center
888:
863:
862:
814:, and Germany's
802:, New Zealand's
766:
759:
752:
734:
733:
722:
721:
703:
702:
691:
690:
679:
678:
667:
666:
646:
636:
626:
616:
606:
596:
586:
418:Wikimedia v. NSA
408:Klayman v. Obama
307:Safe Streets Act
39:
25:
18:
17:
4356:
4355:
4351:
4350:
4349:
4347:
4346:
4345:
4321:GCHQ operations
4251:
4250:
4249:
4244:
4222:
4211:UKUSA Agreement
4196:
4170:
4115:
4102:
4048:
4017:
4011:
3981:
3976:
3971:Zendian Problem
3969:
3962:
3955:
3948:
3941:
3934:
3927:
3920:
3913:
3902:
3895:
3888:
3881:
3874:
3867:
3860:
3853:
3842:
3835:
3828:
3821:
3814:
3807:
3800:
3793:
3786:
3779:
3772:
3765:
3758:
3751:
3744:
3737:
3726:
3719:
3712:
3705:
3698:
3691:
3684:
3677:
3670:
3663:
3656:
3649:
3638:
3631:
3624:
3617:
3610:
3603:
3596:
3589:
3582:
3571:
3564:
3557:
3550:
3543:
3536:
3529:
3522:
3515:
3504:
3497:
3490:
3483:
3476:
3471:Kenneth Minihan
3469:
3462:
3455:
3448:
3441:
3436:Bobby Ray Inman
3434:
3427:
3420:
3413:
3408:Marshall Carter
3406:
3399:
3392:
3387:John A. Samford
3385:
3378:
3365:
3361:
3356:
3349:
3342:
3335:
3328:
3321:
3314:
3307:
3300:
3293:
3286:
3279:
3272:
3265:
3258:
3251:
3244:
3237:
3230:
3223:
3216:
3209:
3202:
3195:
3188:
3177:
3172:
3134:
3132:
3114:
3112:
3090:
3085:
3075:
3073:
3062:
3058:
3048:
3046:
3037:
3036:
3032:
3022:
3020:
3005:
3001:
2991:
2989:
2974:
2973:
2969:
2965:, July 16, 2013
2963:Wayback Machine
2953:
2949:
2939:
2937:
2921:
2920:
2916:
2910:Wayback Machine
2900:
2893:
2883:
2881:
2870:
2866:
2850:
2849:
2842:
2840:
2820:
2816:
2806:
2804:
2789:
2785:
2780:Wayback Machine
2770:
2766:
2760:Wayback Machine
2751:
2747:
2735:Wayback Machine
2722:
2718:
2713:Wayback Machine
2703:
2696:
2686:
2684:
2669:
2665:
2655:
2653:
2631:
2627:
2611:
2610:
2603:
2601:
2581:
2577:
2567:
2565:
2548:Dorling, Philip
2545:
2538:
2528:
2526:
2509:
2502:
2492:
2490:
2480:
2476:
2466:
2464:
2451:
2450:
2446:
2436:
2434:
2417:
2398:
2393:Wayback Machine
2383:
2379:
2369:
2367:
2348:
2344:
2334:
2332:
2315:
2308:
2298:
2296:
2286:
2282:
2272:
2270:
2253:
2249:
2233:
2232:
2225:
2223:
2208:Jacob Appelbaum
2205:
2192:
2182:
2180:
2163:
2162:
2158:
2148:
2146:
2135:
2131:
2115:
2114:
2107:
2105:
2081:
2077:
2067:
2065:
2048:
2041:
2037:
2005:Politics portal
2003:
1996:
1989:
1984:
1982:
1979:
1967:
1958:
1938:UKUSA Agreement
1936:As part of the
1934:
1896:
1891:
1855:
1738:
1698:
1595:
1586:Yokota Air Base
1516:
1503:
1497:
1485:Glenn Greenwald
1480:
1459:
1426:Glenn Greenwald
1414:
1287:Culture of fear
1264:Other proposals
1193:FISA amendments
1188:USA Freedom Act
1173:UKUSA Agreement
861:
777:
770:
741:
740:
728:
716:
697:
685:
673:
661:
573:
565:
564:
550:
542:
541:
502:
494:
493:
479:
471:
470:
436:
428:
427:
413:ACLU v. Clapper
383:
375:
374:
355:
347:
346:
302:
294:
293:
53:
45:
26:
12:
11:
5:
4354:
4344:
4343:
4338:
4333:
4328:
4323:
4318:
4313:
4308:
4303:
4298:
4293:
4288:
4283:
4278:
4273:
4268:
4263:
4246:
4245:
4243:
4242:
4239:
4236:
4227:
4224:
4223:
4221:
4220:
4219:
4218:
4213:
4204:
4202:
4198:
4197:
4195:
4194:
4192:Julian Assange
4189:
4184:
4182:Edward Snowden
4178:
4176:
4172:
4171:
4169:
4168:
4163:
4158:
4153:
4148:
4143:
4138:
4133:
4127:
4125:
4121:
4120:
4117:
4116:
4110:
4108:
4104:
4103:
4101:
4100:
4094:
4088:
4082:
4076:
4070:
4063:
4061:
4054:
4050:
4049:
4047:
4046:
4041:
4036:
4031:
4025:
4023:
4019:
4018:
4010:
4009:
4002:
3995:
3987:
3978:
3977:
3975:
3974:
3967:
3960:
3953:
3946:
3939:
3932:
3925:
3918:
3915:Dundee Society
3910:
3908:
3904:
3903:
3901:
3900:
3893:
3886:
3879:
3872:
3865:
3858:
3850:
3848:
3844:
3843:
3841:
3840:
3833:
3826:
3819:
3812:
3805:
3798:
3791:
3784:
3777:
3770:
3763:
3756:
3749:
3742:
3734:
3732:
3728:
3727:
3725:
3724:
3717:
3710:
3703:
3696:
3693:Pike Committee
3689:
3682:
3675:
3668:
3665:Edward Snowden
3661:
3654:
3646:
3644:
3640:
3639:
3637:
3636:
3629:
3622:
3615:
3608:
3601:
3594:
3587:
3579:
3577:
3573:
3572:
3570:
3569:
3562:
3555:
3548:
3541:
3534:
3527:
3520:
3512:
3510:
3506:
3505:
3503:
3502:
3495:
3488:
3481:
3478:Michael Hayden
3474:
3467:
3460:
3453:
3446:
3439:
3432:
3425:
3418:
3411:
3404:
3397:
3390:
3383:
3375:
3373:
3367:
3366:
3359:
3357:
3355:
3354:
3347:
3340:
3333:
3326:
3319:
3312:
3305:
3298:
3291:
3284:
3277:
3270:
3263:
3256:
3249:
3242:
3235:
3228:
3221:
3214:
3207:
3200:
3193:
3185:
3183:
3179:
3178:
3171:
3170:
3163:
3156:
3148:
3142:
3141:
3121:
3101:
3096:
3089:
3088:External links
3086:
3084:
3083:
3056:
3030:
2999:
2967:
2947:
2914:
2891:
2864:
2814:
2783:
2764:
2745:
2716:
2694:
2663:
2634:Ambinder, Marc
2625:
2575:
2536:
2500:
2474:
2444:
2396:
2377:
2342:
2306:
2280:
2247:
2190:
2156:
2129:
2075:
2038:
2036:
2033:
2032:
2031:
2026:
2020:
2015:
2009:
2008:
1994:
1978:
1975:
1966:
1963:
1957:
1954:
1933:
1930:
1904:Edward Snowden
1895:
1892:
1890:
1887:
1866:Dagger Complex
1854:
1851:
1824:
1823:
1806:
1803:
1788:
1781:
1773:
1737:
1734:
1733:
1732:
1722:
1712:
1697:
1694:
1677:
1676:
1668:
1657:
1646:
1636:
1635:
1627:
1619:
1594:
1591:
1522:XKeyscore logo
1515:
1512:
1496:
1493:
1458:
1455:
1422:Edward Snowden
1416:
1415:
1413:
1412:
1405:
1398:
1390:
1387:
1386:
1385:
1384:
1379:
1374:
1369:
1368:
1367:
1362:
1352:
1351:
1350:
1345:
1340:
1330:
1325:
1317:
1316:
1315:Related topics
1312:
1311:
1310:
1309:
1304:
1299:
1294:
1289:
1284:
1276:
1275:
1271:
1270:
1269:
1268:
1267:
1266:
1261:
1250:
1249:
1245:
1244:
1243:
1242:
1241:
1240:
1232:
1231:
1230:
1225:
1217:
1216:
1215:
1210:
1205:
1197:
1196:
1195:
1190:
1182:
1181:
1180:
1175:
1164:
1163:
1159:
1158:
1157:
1156:
1151:
1149:Dagger Complex
1146:
1141:
1136:
1131:
1126:
1121:
1116:
1108:
1107:
1103:
1102:
1101:
1100:
1095:
1090:
1085:
1080:
1075:
1070:
1065:
1060:
1055:
1050:
1045:
1037:
1036:
1032:
1031:
1030:
1029:
1024:
1019:
1014:
1009:
1004:
999:
994:
989:
984:
979:
974:
969:
964:
959:
954:
949:
944:
939:
934:
926:
925:
921:
920:
919:
918:
913:
908:
903:
895:
894:
890:
889:
881:
880:
872:
871:
860:
857:
851:, a member of
841:of employees.
823:Edward Snowden
821:In July 2013,
775:
772:
771:
769:
768:
761:
754:
746:
743:
742:
739:
738:
726:
713:
712:
708:
707:
695:
683:
671:
658:
657:
651:
650:
640:
630:
620:
610:
600:
590:
579:
578:
574:
571:
570:
567:
566:
563:
562:
557:
551:
548:
547:
544:
543:
540:
539:
534:
529:
524:
519:
514:
509:
503:
500:
499:
496:
495:
492:
491:
486:
480:
477:
476:
473:
472:
469:
468:
466:Edward Snowden
463:
458:
453:
448:
443:
441:William Binney
437:
435:Whistleblowers
434:
433:
430:
429:
426:
425:
420:
415:
410:
405:
400:
395:
390:
384:
381:
380:
377:
376:
373:
372:
367:
362:
356:
353:
352:
349:
348:
345:
344:
339:
334:
329:
324:
319:
314:
309:
303:
300:
299:
296:
295:
292:
291:
286:
280:
279:
275:
274:
269:
264:
259:
254:
249:
244:
239:
234:
228:
227:
223:
222:
217:
212:
207:
202:
196:
195:
191:
190:
189:
188:
178:
173:
168:
163:
158:
153:
147:
146:
142:
141:
135:
134:
130:
129:
123:
122:
118:
117:
112:
107:
102:
97:
92:
86:
85:
81:
80:
75:
70:
65:
59:
58:
54:
51:
50:
47:
46:
40:
32:
31:
9:
6:
4:
3:
2:
4353:
4342:
4339:
4337:
4334:
4332:
4329:
4327:
4324:
4322:
4319:
4317:
4316:War on terror
4314:
4312:
4309:
4307:
4304:
4302:
4299:
4297:
4294:
4292:
4289:
4287:
4284:
4282:
4279:
4277:
4274:
4272:
4269:
4267:
4264:
4262:
4261:2013 scandals
4259:
4258:
4256:
4240:
4237:
4233:
4229:
4228:
4225:
4217:
4214:
4212:
4209:
4208:
4206:
4205:
4203:
4199:
4193:
4190:
4188:
4185:
4183:
4180:
4179:
4177:
4173:
4167:
4164:
4162:
4159:
4157:
4154:
4152:
4149:
4147:
4144:
4142:
4139:
4137:
4134:
4132:
4129:
4128:
4126:
4122:
4113:
4109:
4105:
4098:
4095:
4093:(Switzerland)
4092:
4089:
4086:
4083:
4080:
4077:
4074:
4071:
4068:
4065:
4064:
4062:
4058:
4055:
4051:
4045:
4042:
4040:
4037:
4035:
4032:
4030:
4027:
4026:
4024:
4020:
4015:
4008:
4003:
4001:
3996:
3994:
3989:
3988:
3985:
3972:
3968:
3965:
3961:
3958:
3954:
3951:
3947:
3944:
3940:
3937:
3933:
3930:
3926:
3923:
3919:
3916:
3912:
3911:
3909:
3905:
3898:
3894:
3891:
3887:
3884:
3880:
3877:
3873:
3870:
3866:
3863:
3859:
3856:
3852:
3851:
3849:
3845:
3838:
3834:
3831:
3827:
3824:
3820:
3817:
3813:
3810:
3806:
3803:
3799:
3796:
3792:
3789:
3785:
3782:
3778:
3775:
3771:
3768:
3764:
3761:
3757:
3754:
3750:
3747:
3743:
3740:
3736:
3735:
3733:
3729:
3722:
3718:
3715:
3711:
3708:
3704:
3701:
3697:
3694:
3690:
3687:
3683:
3680:
3679:James Bamford
3676:
3673:
3669:
3666:
3662:
3659:
3655:
3652:
3648:
3647:
3645:
3641:
3634:
3633:WARRIOR PRIDE
3630:
3627:
3623:
3620:
3616:
3613:
3609:
3606:
3602:
3599:
3595:
3592:
3588:
3585:
3581:
3580:
3578:
3574:
3567:
3563:
3560:
3556:
3553:
3549:
3546:
3542:
3539:
3535:
3532:
3528:
3525:
3521:
3518:
3514:
3513:
3511:
3507:
3500:
3499:Paul Nakasone
3496:
3493:
3489:
3486:
3482:
3479:
3475:
3472:
3468:
3465:
3461:
3458:
3457:Bill Studeman
3454:
3451:
3447:
3444:
3440:
3437:
3433:
3430:
3426:
3423:
3419:
3416:
3412:
3409:
3405:
3402:
3398:
3395:
3391:
3388:
3384:
3381:
3377:
3376:
3374:
3372:
3368:
3352:
3348:
3345:
3341:
3338:
3334:
3331:
3327:
3324:
3320:
3317:
3313:
3310:
3309:Roaring Creek
3306:
3303:
3299:
3296:
3292:
3289:
3285:
3282:
3278:
3275:
3271:
3268:
3264:
3261:
3257:
3254:
3250:
3247:
3243:
3240:
3236:
3233:
3229:
3226:
3222:
3219:
3215:
3212:
3208:
3205:
3201:
3198:
3194:
3191:
3187:
3186:
3184:
3180:
3176:
3169:
3164:
3162:
3157:
3155:
3150:
3149:
3146:
3131:
3130:The Intercept
3127:
3122:
3111:
3110:The Intercept
3107:
3102:
3100:
3097:
3095:
3092:
3091:
3071:
3067:
3060:
3049:September 24,
3044:
3040:
3034:
3018:
3014:
3010:
3003:
2987:
2983:
2982:
2977:
2971:
2964:
2960:
2957:
2951:
2940:September 14,
2936:
2932:
2928:
2924:
2918:
2911:
2907:
2904:
2898:
2896:
2879:
2875:
2868:
2860:
2854:
2838:
2834:
2833:
2828:
2824:
2818:
2802:
2798:
2794:
2787:
2781:
2777:
2774:
2771:Der Spiegel:
2768:
2761:
2757:
2754:
2749:
2742:
2741:
2736:
2732:
2729:
2725:
2720:
2714:
2710:
2707:
2701:
2699:
2682:
2678:
2674:
2667:
2651:
2647:
2645:
2639:
2635:
2629:
2621:
2615:
2599:
2595:
2594:
2589:
2585:
2579:
2563:
2559:
2558:
2553:
2549:
2543:
2541:
2524:
2520:
2519:
2514:
2507:
2505:
2489:
2488:The Intercept
2485:
2478:
2462:
2458:
2454:
2448:
2432:
2428:
2427:
2422:
2415:
2413:
2411:
2409:
2407:
2405:
2403:
2401:
2394:
2390:
2387:
2381:
2365:
2361:
2357:
2353:
2346:
2330:
2326:
2325:
2320:
2313:
2311:
2295:
2291:
2284:
2268:
2264:
2263:
2258:
2251:
2243:
2237:
2221:
2217:
2213:
2209:
2203:
2201:
2199:
2197:
2195:
2178:
2174:
2170:
2166:
2160:
2144:
2140:
2133:
2125:
2119:
2103:
2099:
2098:
2093:
2089:
2085:
2079:
2063:
2059:
2058:
2053:
2046:
2044:
2039:
2030:
2027:
2024:
2021:
2019:
2016:
2014:
2011:
2010:
2006:
2000:
1995:
1992:
1981:
1974:
1972:
1962:
1953:
1951:
1947:
1943:
1939:
1929:
1927:
1923:
1919:
1918:
1909:
1905:
1900:
1886:
1883:
1878:
1876:
1871:
1867:
1862:
1860:
1850:
1848:
1844:
1840:
1836:
1831:
1828:
1821:
1820:
1819:Linux Journal
1815:
1811:
1807:
1804:
1801:
1797:
1793:
1789:
1786:
1782:
1779:
1774:
1771:
1767:
1766:
1765:
1762:
1758:
1754:
1752:
1742:
1730:
1726:
1723:
1720:
1716:
1713:
1710:
1707:
1706:
1705:
1703:
1693:
1691:
1685:
1683:
1674:
1673:
1669:
1667:
1663:
1662:
1658:
1656:
1652:
1651:
1647:
1644:
1641:
1640:
1639:
1633:
1632:
1628:
1625:
1624:
1620:
1617:
1616:
1612:
1611:
1610:
1607:
1605:
1601:
1590:
1587:
1583:
1579:
1575:
1569:
1567:
1563:
1559:
1554:
1552:
1547:
1545:
1536:
1528:
1520:
1511:
1508:
1502:
1492:
1488:
1486:
1479:
1478:
1474:According to
1471:
1466:
1464:
1454:
1452:
1448:
1444:
1443:Marc Ambinder
1440:
1439:
1435:According to
1433:
1431:
1427:
1423:
1411:
1406:
1404:
1399:
1397:
1392:
1391:
1389:
1388:
1383:
1380:
1378:
1375:
1373:
1370:
1366:
1363:
1361:
1358:
1357:
1356:
1353:
1349:
1346:
1344:
1341:
1339:
1336:
1335:
1334:
1331:
1329:
1326:
1324:
1321:
1320:
1319:
1318:
1314:
1313:
1308:
1305:
1303:
1300:
1298:
1295:
1293:
1290:
1288:
1285:
1283:
1280:
1279:
1278:
1277:
1273:
1272:
1265:
1262:
1260:
1257:
1256:
1254:
1253:
1252:
1251:
1247:
1246:
1239:
1236:
1235:
1233:
1229:
1226:
1224:
1221:
1220:
1218:
1214:
1211:
1209:
1206:
1204:
1201:
1200:
1198:
1194:
1191:
1189:
1186:
1185:
1183:
1179:
1176:
1174:
1171:
1170:
1168:
1167:
1166:
1165:
1161:
1160:
1155:
1152:
1150:
1147:
1145:
1142:
1140:
1137:
1135:
1132:
1130:
1127:
1125:
1122:
1120:
1117:
1115:
1112:
1111:
1110:
1109:
1105:
1104:
1099:
1096:
1094:
1091:
1089:
1086:
1084:
1081:
1079:
1076:
1074:
1071:
1069:
1066:
1064:
1061:
1059:
1056:
1054:
1051:
1049:
1046:
1044:
1041:
1040:
1039:
1038:
1034:
1033:
1028:
1025:
1023:
1020:
1018:
1015:
1013:
1010:
1008:
1005:
1003:
1000:
998:
995:
993:
990:
988:
985:
983:
980:
978:
975:
973:
970:
968:
965:
963:
960:
958:
955:
953:
950:
948:
945:
943:
940:
938:
935:
933:
930:
929:
928:
927:
923:
922:
917:
914:
912:
909:
907:
904:
902:
899:
898:
897:
896:
892:
891:
887:
883:
882:
879:
878:
874:
873:
869:
865:
864:
856:
854:
850:
847:
842:
840:
836:
835:
830:
829:
824:
819:
817:
813:
809:
805:
801:
797:
793:
789:
785:
781:
767:
762:
760:
755:
753:
748:
747:
745:
744:
737:
732:
727:
725:
720:
715:
714:
710:
709:
706:
701:
696:
694:
689:
684:
682:
677:
672:
670:
665:
660:
659:
656:
653:
652:
649:
645:
641:
639:
635:
631:
629:
625:
621:
619:
615:
611:
609:
605:
601:
599:
595:
591:
589:
585:
581:
580:
577:United States
576:
575:
572:Collaboration
569:
568:
561:
558:
556:
553:
552:
546:
545:
538:
535:
533:
530:
528:
525:
523:
520:
518:
517:Mail tracking
515:
513:
510:
508:
505:
504:
498:
497:
490:
487:
485:
482:
481:
475:
474:
467:
464:
462:
459:
457:
454:
452:
449:
447:
444:
442:
439:
438:
432:
431:
424:
421:
419:
416:
414:
411:
409:
406:
404:
401:
399:
396:
394:
391:
389:
386:
385:
379:
378:
371:
368:
366:
363:
361:
358:
357:
351:
350:
343:
340:
338:
335:
333:
330:
328:
325:
323:
320:
318:
315:
313:
310:
308:
305:
304:
298:
297:
290:
287:
285:
282:
281:
277:
276:
273:
270:
268:
265:
263:
260:
258:
255:
253:
250:
248:
245:
243:
240:
238:
235:
233:
230:
229:
225:
224:
221:
218:
216:
213:
211:
208:
206:
203:
201:
198:
197:
193:
192:
187:
184:
183:
182:
179:
177:
174:
172:
169:
167:
164:
162:
159:
157:
154:
152:
149:
148:
144:
143:
140:
137:
136:
132:
131:
128:
125:
124:
120:
119:
116:
113:
111:
108:
106:
103:
101:
98:
96:
93:
91:
88:
87:
83:
82:
79:
76:
74:
71:
69:
66:
64:
61:
60:
56:
55:
49:
48:
43:
38:
34:
33:
29:
24:
20:
19:
16:
4241:Human Rights
4187:Barack Obama
4107:Discontinued
4078:
4039:2013–present
3837:Epic Shelter
3829:
3802:Stellar Wind
3401:Gordon Blake
3380:Ralph Canine
3133:. Retrieved
3129:
3113:. Retrieved
3109:
3074:. Retrieved
3059:
3047:. Retrieved
3042:
3033:
3023:December 12,
3021:. Retrieved
3002:
2992:December 12,
2990:. Retrieved
2979:
2970:
2950:
2938:. Retrieved
2926:
2917:
2882:. Retrieved
2867:
2841:. Retrieved
2830:
2817:
2805:. Retrieved
2797:Ars Technica
2796:
2786:
2767:
2748:
2740:The Guardian
2738:
2719:
2687:December 21,
2685:. Retrieved
2666:
2654:. Retrieved
2641:
2628:
2602:. Retrieved
2591:
2578:
2566:. Retrieved
2555:
2527:. Retrieved
2523:the original
2516:
2491:. Retrieved
2487:
2477:
2465:. Retrieved
2461:the original
2447:
2435:. Retrieved
2426:The Guardian
2424:
2380:
2368:. Retrieved
2345:
2333:. Retrieved
2322:
2297:. Retrieved
2283:
2271:. Retrieved
2260:
2250:
2224:. Retrieved
2215:
2181:. Retrieved
2168:
2159:
2147:. Retrieved
2143:the original
2132:
2106:. Retrieved
2097:The Guardian
2095:
2078:
2066:. Retrieved
2062:the original
2055:
1968:
1959:
1946:data sharing
1935:
1915:
1913:
1882:gamification
1879:
1863:
1859:The Guardian
1858:
1856:
1832:
1827:The Guardian
1826:
1825:
1817:
1777:
1763:
1759:
1755:
1747:
1736:Capabilities
1724:
1714:
1708:
1701:
1699:
1690:The Guardian
1689:
1686:
1678:
1670:
1659:
1655:cyberwarfare
1648:
1642:
1637:
1629:
1621:
1613:
1608:
1596:
1593:Data sources
1584:in Germany,
1570:
1568:databases".
1555:
1548:
1541:
1504:
1489:
1477:The Guardian
1475:
1473:
1468:
1460:
1436:
1434:
1430:surveillance
1419:
1355:Human rights
1333:Cryptography
1124:Menwith Hill
1114:The Doughnut
931:
911:2013–present
875:
843:
832:
826:
820:
806:, Britain's
787:
783:
779:
778:
446:Thomas Drake
423:US v. Moalin
398:Jewel v. NSA
354:Institutions
261:
252:TRAFFICTHIEF
30:surveillance
15:
4022:Disclosures
4016:on citizens
3809:TRAILBLAZER
3721:Matthew Aid
3714:Thomas Tamm
3643:Controversy
3584:ANT catalog
3415:Noel Gayler
3330:Sugar Grove
3274:Kent Island
3218:Dorsey Road
2927:Der Spiegel
2467:January 27,
1917:Der Spiegel
1843:geolocation
1770:Google Maps
1709:Traditional
1702:Der Spiegel
1672:Third party
1604:New Zealand
1602:and one in
962:Stone Ghost
893:Disclosures
798:, Canada's
478:Publication
456:Thomas Tamm
388:ACLU v. NSA
327:Patriot Act
301:Legislation
161:Trailblazer
4255:Categories
4207:Five Eyes
4085:Frenchelon
3862:Interquake
3816:Turbulence
3576:Technology
3323:Salt Creek
3239:Fort Meade
2704:See also:
2035:References
1868:(close to
1578:Turbulence
1372:Satellites
1169:Five Eyes
1119:Fort Meade
972:Frenchelon
810:, Japan's
451:Mark Klein
194:Since 2007
166:Turbulence
145:Since 2001
133:Since 1998
121:Since 1990
110:ThinThread
84:Since 1978
4271:Espionage
4156:Five Eyes
4097:FETĂ–meter
4079:XKeyscore
4044:Reactions
3869:Main Core
3847:Databases
3830:XKeyscore
3700:Russ Tice
3591:FROSTBURG
3509:Divisions
3429:Lew Allen
3316:Room 641A
3182:Locations
3076:April 24,
2981:The Local
2935:2195-1349
2843:August 5,
2807:August 4,
2656:August 4,
2614:cite news
2604:August 2,
2568:August 2,
2529:August 5,
2437:August 6,
2370:August 4,
2335:August 4,
2299:August 6,
2273:August 6,
2236:cite news
2149:August 6,
2118:cite news
2108:August 5,
1942:Five Eyes
1875:Anonymous
1870:Griesheim
1725:Deep Dive
1600:Australia
1323:Espionage
1154:GCHQ Bude
1078:Five Eyes
1017:RAMPART-A
952:Carnivore
932:XKeyscore
916:Reactions
784:XKEYSCORE
780:XKeyscore
655:Five Eyes
507:Cablegate
461:Russ Tice
262:XKeyscore
242:Main Core
210:Stateroom
156:STORMBREW
127:RAMPART-A
105:Main Core
4238:Freedoms
4124:Agencies
4099:(Turkey)
4087:(France)
4034:Pre-2013
3855:DISHFIRE
3823:Upstream
3774:MUSCULAR
3760:Fairview
3746:Dropmire
3731:Programs
3295:Pine Gap
3070:Archived
3017:Archived
2986:Archived
2959:Archived
2906:Archived
2878:Archived
2853:cite web
2837:Archived
2801:Archived
2776:Archived
2756:Archived
2731:Archived
2709:Archived
2681:Archived
2650:Archived
2644:The Week
2598:Archived
2562:Archived
2431:Archived
2389:Archived
2364:Archived
2356:Mashable
2329:Archived
2324:ABC News
2267:Archived
2220:Archived
2216:Panorama
2177:Archived
2169:Panorama
2102:Archived
1977:See also
1849:) data.
1721:program.
1719:MUSCULAR
1643:Overhead
1514:Workings
1451:metadata
1274:Concepts
1129:Pine Gap
1048:R&AW
1035:Agencies
1007:Stingray
977:Fairview
957:Dishfire
947:Sentient
906:Pre-2013
868:a series
866:Part of
598:CYBERCOM
560:Metadata
549:Concepts
382:Lawsuits
284:MUSCULAR
257:DISHFIRE
205:Dropmire
171:Genoa II
100:FAIRVIEW
73:SHAMROCK
57:Pre-1978
52:Programs
4073:ECHELON
4060:Current
4053:Systems
4029:Origins
3897:PINWALE
3876:MAINWAY
3753:ECHELON
3672:LOVEINT
3626:STU-III
3598:HARVEST
3371:Leaders
3135:July 5,
3115:July 5,
2884:July 3,
2832:O Globo
2593:O Globo
2518:O Globo
2493:July 2,
2226:July 4,
2183:July 4,
1956:Denmark
1894:Germany
1778:O Globo
1751:PINWALE
1729:TEMPORA
1715:Stage 2
1623:FORNSAT
1558:Red Hat
1365:Liberty
1360:Privacy
1002:Pinwale
997:Bullrun
967:Tempora
942:ECHELON
924:Systems
901:Origins
839:résumés
834:O Globo
501:Related
289:Tempora
267:ICREACH
247:MAINWAY
232:PINWALE
215:Bullrun
151:OAKSTAR
95:BLARNEY
68:MINARET
63:ECHELON
4216:Lustre
4175:People
3957:VENONA
3890:Nymrod
3883:MARINA
3781:MYSTIC
3619:STU-II
2933:
2068:May 6,
1932:Sweden
1796:hacked
1682:MARINA
1501:SIGINT
1297:SIGINT
1219:China
1178:Lustre
1106:Places
1098:Mossad
982:MYSTIC
555:SIGINT
237:MARINA
220:MYSTIC
78:PROMIS
4112:Stasi
4081:(USA)
4075:(USA)
4069:(USA)
4067:PRISM
3907:Other
3788:PRISM
3612:STU-I
2358:(via
2018:PRISM
1965:Japan
1566:MySQL
1481:'
1255:U.S.
1184:U.S.
937:PRISM
711:Other
200:PRISM
115:Genoa
4201:Laws
4151:DGSE
4146:ASIO
4091:Onyx
3566:NSOC
3559:NTOC
3211:CSSG
3137:2015
3117:2015
3078:2017
3051:2020
3025:2013
2994:2013
2942:2024
2931:ISSN
2886:2014
2859:link
2845:2013
2809:2013
2689:2013
2658:2013
2620:link
2606:2013
2570:2013
2531:2013
2495:2020
2469:2014
2439:2013
2384:NSA
2372:2013
2337:2013
2301:2013
2275:2013
2242:link
2228:2014
2185:2014
2151:2013
2124:link
2110:2013
2070:2019
1839:Exif
1835:VoIP
1798:via
1661:FISA
1424:and
1343:VPNs
1213:GDPR
1162:Laws
1093:GCHQ
1073:DGSE
1012:SORM
987:DCSN
831:and
724:DGSE
705:GCSB
681:GCHQ
669:CSEC
360:FISC
322:ECPA
317:FISA
4166:MSS
4161:FSB
4141:CNI
4136:BND
4131:NSA
3552:TAO
3545:SSO
3531:ROC
3517:CSS
2362:).
2360:CNN
1926:BfV
1922:BND
1908:BND
1847:GPS
1810:ARD
1800:TAO
1785:PGP
1544:DNI
1348:TLS
1338:Tor
1234:UK
1199:EU
1088:MSS
1083:FSB
1068:ASD
1063:CNI
1058:BND
1053:CSE
1043:NSA
853:ARD
788:XKS
786:or
736:BND
693:ASD
648:IAO
638:DHS
628:CIA
618:FBI
608:DOJ
588:CSS
4257::
3128:.
3108:.
3068:.
3043:DR
3041:.
3015:.
3011:.
2984:.
2978:.
2925:.
2894:^
2876:.
2855:}}
2851:{{
2799:.
2795:.
2737:.
2697:^
2679:.
2675:.
2648:.
2640:.
2616:}}
2612:{{
2590:.
2560:.
2554:.
2539:^
2503:^
2486:.
2455:.
2429:.
2423:.
2399:^
2354:.
2327:.
2321:.
2309:^
2265:.
2259:.
2238:}}
2234:{{
2214:.
2193:^
2171:.
2167:.
2120:}}
2116:{{
2100:.
2094:.
2086:;
2054:.
2042:^
1973:.
1606:.
1553:.
1483:s
870:on
818:.
4006:e
3999:t
3992:v
3167:e
3160:t
3153:v
3139:.
3119:.
3080:.
3053:.
3027:.
2996:.
2944:.
2888:.
2861:)
2847:.
2811:.
2691:.
2660:.
2646:)
2622:)
2608:.
2572:.
2533:.
2497:.
2471:.
2441:.
2374:.
2339:.
2303:.
2277:.
2244:)
2230:.
2187:.
2153:.
2126:)
2112:.
2072:.
1845:(
1822:.
1802:.
1731:.
1409:e
1402:t
1395:v
782:(
765:e
758:t
751:v
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.