Knowledge

XKeyscore

Source đź“ť

634: 604: 614: 1928:(domestic intelligence) were also allowed to use the XKeyscore system. In those documents the BND agency was described as the NSA's most prolific partner in information gathering. This led to political confrontations, after which the directors of the German intelligence agencies briefed members of the German parliamentary intelligence oversight committee on July 25, 2013. They declared that XKeyscore has been used by the BND since 2007 and that the BfV has been using a test version since 2012. The directors also explained that the program is not for collecting data, but rather only for the analysis of collected data. 624: 594: 3362: 37: 23: 1510:
to defend the nation and to protect U.S. and allied troops abroad." In terms of access, an NSA press statement reads that there is no "unchecked analyst access to NSA collection data. Access to XKeyscore, as well as all of NSA's analytic tools, is limited to only those personnel who require access for their assigned tasks." and that there are "stringent oversight and compliance mechanisms built in at several levels. One feature is the system's ability to limit what an analyst can do with a tool, based on the source of the collection and each analyst's defined responsibilities."
688: 584: 664: 676: 1470:
It's a one-stop-shop for access to the NSA's information. ... You can tag individuals ... Let's say you work at a major German corporation and I want access to that network, I can track your username on a website on a forum somewhere, I can track your real name, I can track associations with your friends and I can build what's called a fingerprint, which is network activity unique to you, which means anywhere you go in the world, anywhere you try to sort of hide your online presence, your identity.
1985: 700: 1519: 1999: 1535: 4232: 1527: 731: 719: 886: 644: 1899: 1741: 1727:: This latest version can process internet traffic at data rates of 10 gigabits per second. Data that could be useful for intelligence purposes are then selected and forwarded by using the "GENESIS selection language". GCHQ also operates a number of Deep Dive versions of XKeyscore at three locations under the codename 2728:"XKeyscore: NSA tool collects 'nearly everything a user does on the internet' – XKeyscore Gives 'Widest-Reaching' Collection of Online Data – NSA Analysts Require No Prior Authorization for Searches – Sweeps Up Emails, Social Media Activity and Browsing History" 1884:
features. For instance, analysts who were especially good at using XKeyscore could acquire "skilz" points and "unlock achievements." The training units in Griesheim were apparently successful and analysts there had achieved the "highest average of skilz points" compared with all other NSA departments
1748:
For analysts, XKeyscore provides a "series of viewers for common data types", which allows them to query terabytes of raw data gathered at the aforementioned collection sites. This enables them to find targets that cannot be found by searching only the metadata, and also to do this against data sets
1490:
He added that the NSA's database of collected communications allows its analysts to listen "to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you've entered, and it also alerts them to any further activity that people
1509:
collection system" to legally obtain information about "legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests. ... to collect the information, that enables us to perform our missions successfully –
1469:
You could read anyone's email in the world, anybody you've got an email address for. Any website: You can watch traffic to and from it. Any computer that an individual sits at: You can watch it. Any laptop that you're tracking: you can follow it as it moves from place to place throughout the world.
1588:
in Japan, and numerous military and non-military locations within the US. Trafficthief, a core program of Turbulence, can alert NSA analysts when their targets communicate, and trigger other software programs, so select data is "promoted" from the local XKeyscore data store to the NSA's "corporate
1872:
in Germany) said that XKeyscore made it easier and more efficient to target surveillance. Previously, analysis often accessed data NSA was not interested in. XKeyscore allowed them to focus on the intended topics, while ignoring unrelated data. XKeyscore also proved to be outstanding for tracking
1675: – foreign partners of the NSA such as the (signals) intelligence agencies of Belgium, Denmark, France, Germany, Italy, Japan, the Netherlands, Norway, Sweden, etc. However the Netherlands is out of any cooperation concerning intelligence gathering and sharing for illegal spying. 1679:
From these sources, XKeyscore stores "full-take data", which are indexed by plug-ins that extract certain types of metadata (like phone numbers, e-mail addresses, log-ins, and user activity) and index them in metadata tables, which can be queried by analysts. XKeyscore has been integrated with
1760:
This is useful because "a large amount of time spent on the web is performing actions that are anonymous" and therefore those activities can't be found by just looking for e-mail addresses of a target. When content has been found, the analyst might be able to find new intelligence or a strong
1756:
Because XKeyscore holds raw and unselected communications traffic, analysts can not only perform queries using "strong selectors" like e-mail addresses, but also using "soft selectors", like keywords, against the body texts of e-mail and chat messages and digital documents and spreadsheets in
1487:, low-level NSA analysts can, via systems like XKeyscore, "listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents. And it's all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst." 1597:
XKeyscore consists of over 700 servers at approximately 150 sites where the NSA collects data, like "US and allied military and other facilities as well as US embassies and consulates" in many countries around the world. Among the facilities involved in the program are four bases in
1687:
However, the system continuously gets so much Internet data that it can be stored only for short periods of time. Content data remain on the system for only three to five days, while metadata is stored for up to thirty days. A detailed commentary on an NSA presentation published in
2266: 1829:
revealed in 2013 that most of these things cannot be detected by other NSA tools, because they operate with strong selectors (like e-mail and IP addresses and phone numbers) and the raw data volumes are too high to be forwarded to other NSA databases.
1775:
Look for "anomalies" without any specific person attached, like detecting the nationality of foreigners by analyzing the language used within intercepted emails. An example would be a German speaker in Pakistan. The Brazilian paper
1960:
In an ongoing scandal, where it has been revealed that NSA helped FE (Danish Military Intelligence Service) build a new Spy datacenter at SandagergĂĄrd, Amager, XKeyscore has been made available for FE to use on the collected data.
1717:: This version of XKeyscore is used for higher data rates. The data are first processed by the TURMOIL system, which sends 5% of the internet data packets to XKeyscore. GCHQ only uses this version for its collection under the 1711:: The initial version of XKeyscore is fed with data from low-rate data signals, after being processed by the WEALTHYCLUSTER system. This traditional version is not only used by NSA but also at many intercept sites of GCHQ. 1749:
that otherwise would have been dropped by the front-end data processing systems. According to a slide from an XKeyscore presentation, NSA collection sites select and forward less than 5% of the internet traffic to the
2256: 2328: 1571:
XKeyscore is considered a "passive" program, in that it listens, but does not transmit anything on the networks that it targets. But it can trigger other systems, which perform "active" attacks through
1861:
during 2013 claimed that XKeyscore had played a role in capturing 300 terrorists by 2008, which could not be substantiated as the redacted documents do not cite instances of terrorist interventions.
2905: 2877: 1877:
movement in Germany, because it allows for searching on patterns, rather than particular individuals. An analyst is able to determine when targets research new topics, or develop new behaviors.
2800: 3523: 1192: 341: 4330: 3558: 2289: 3997: 1692:
in July 2013 cites a document published in 2008 declaring that "At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours."
3069: 3692: 2092:"How the NSA Is Still Harvesting Your Online Data – Files Show Vast Scale of Current NSA Metadata Programs, with One Stream Alone Celebrating 'One Trillion Records Processed'" 2958: 2430: 2561: 837:
newspapers. The code name was already public knowledge because it was mentioned in earlier articles, and, like many other code names, it appears in job postings and online
2138: 521: 3350: 2829:[U.S. Spying Spread Through Latin America – After Brazil, Colombia Was the Most Watched Country – Venezuela Also Came in the Crosshairs of American Programs]. 1263: 387: 2985: 2836: 794:(NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligence agencies, including the 2597: 723: 2827:"Espionagem dos EUA se espalhou pela América Latina – Depois do Brasil, Colômbia foi o país mais vigiado – Venezuela também entrou na mira de programas americanos" 306: 2318: 1227: 511: 2730: 1665: 2902: 3038: 2101: 1576:
which are "tipping", for example, the QUANTUM family of programs, including QUANTUMINSERT, QUANTUMHAND, QUANTUMTHEORY, QUANTUMBOT and QUANTUMCOPPER and
4038: 3650: 3165: 2873: 488: 2708: 3098: 2792: 633: 2858: 2619: 2241: 2123: 2922: 2793:"NSA's Internet Taps Can Find Systems to Hack, Track VPNs and Word Docs – X-Keyscore Gives NSA the Ability to Find and Exploit Vulnerable Systems" 1618: – joint operation of the CIA and NSA that carries out clandestine operations including espionage on foreign diplomats and leaders 4310: 4033: 905: 2363: 4340: 4265: 3836: 2388: 1546:
Exploitation System/Analytic Framework". DNI stands for Digital Network Intelligence, which means intelligence derived from internet traffic.
4145: 1949: 1407: 4325: 4300: 4043: 3861: 3685: 1638:
In a single, undated slide published by Swedish media in December 2013, the following additional data sources for XKeyscore are mentioned:
915: 668: 3016: 2680: 4285: 4004: 2512: 1940:, a secret treaty was signed in 1954 by Sweden with the United States, the United Kingdom, Canada, Australia and New Zealand (called the 440: 3065: 2452: 2219: 2051: 4275: 763: 483: 613: 4150: 2649: 2022: 1072: 803: 704: 3093: 2420: 3889: 3370: 2955: 2176: 2012: 1969:
The classified documents leaked by Snowden also indicate that in April 2013, NSA had secretly provided the XKeyscore system to the
2551: 946: 536: 369: 359: 603: 4295: 3158: 2142: 807: 680: 531: 2588:"EUA expandem o aparato de vigilância continuamente – Software de vigilância usa mais de 700 servidores espalhados pelo mundo" 623: 593: 4335: 4290: 1660: 1609:
According to an NSA presentation from 2008, these XKeyscore servers are fed with data from the following collection systems:
1052: 910: 799: 321: 316: 4140: 3105: 2975: 2826: 1062: 2775: 3565: 2755: 2587: 1306: 607: 516: 180: 1787:
usage in Iran". The caveat given is that very broad queries can result in too much data to transmit back to the analyst.
4165: 1212: 1087: 1026: 4186: 3280: 3151: 2025:, a redacted presentation about X-Keyscore via The Guardian (UK) via Edward Snowden via U.S. National Security Agency 1400: 986: 811: 1744:
Slide from a 2008 NSA presentation about XKeyscore, showing the differences between the various NSA database systems
3963: 3203: 3189: 2727: 1671: 1133: 402: 209: 1420:
XKeyscore is a complicated system, and various authors have different interpretations of its actual capabilities.
583: 3759: 976: 637: 617: 283: 99: 4305: 4191: 4028: 3921: 3752: 3287: 2091: 1838: 1780:
claims that this has been applied to Latin America and specifically to Colombia, Ecuador, Mexico and Venezuela.
1530:
Slide from a 2008 NSA presentation about XKeyscore, showing a world map with the locations of XKeyscore servers
1505:
In an official statement from July 30, 2013, the NSA said "XKeyscore is used as a part of NSA's lawful foreign
1432:
of anyone anywhere in the world, while the NSA has claimed that usage of the system is limited and restricted.
1067: 900: 795: 756: 692: 185: 77: 3780: 3273: 2773:
GCHQ report on the technical abilities of the powerful spying program TEMPORA, which allows for a "full take"
1237: 981: 364: 219: 1626: – which stands for "foreign satellite collection", and refers to intercepts from satellites 4135: 3125: 2705: 2017: 1543: 1465:
asked Edward Snowden in its TV interview: "What could you do if you would use XKeyscore?" and he answered:
1393: 1057: 996: 867: 647: 214: 3935: 3928: 3266: 627: 597: 336: 175: 4280: 4090: 3990: 3794: 3551: 3537: 3252: 3210: 1799: 1795: 1649: 1614: 1573: 1047: 138: 1549:
Edward Snowden said about XKeyscore: "It's a front end search engine" in an interview with the German
3604: 3544: 3259: 3231: 2556: 2351: 1846: 1630: 1222: 1207: 827: 749: 2385: 4320: 4160: 4130: 3530: 3516: 3477: 3336: 3196: 3174: 2323: 2206: 1381: 1371: 1347: 1202: 1082: 1042: 791: 587: 27: 3942: 2483: 1925: 1921: 1907: 1813: 1791: 1700:
According to a document from an internal GCHQ website which was disclosed by the German magazine
1581: 1342: 815: 735: 422: 1772:
and terms entered into a search engine by known targets looking for suspicious things or places.
1764:
Besides using soft selectors, analysts can also use the following other XKeyscore capabilities:
643: 4315: 4260: 3766: 3463: 3008: 2874:"NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance" 2672: 2456: 2056: 1550: 1462: 1021: 1006: 848: 526: 2522: 3449: 3308: 3217: 2460: 2211: 2061: 2028: 1258: 331: 36: 22: 3706: 1990: 1833:
In 2008, NSA planned to add a number of new capabilities in the future including access to
1506: 1445:, XKeyscore is an NSA data-retrieval system which consists of a series of user interfaces, 1296: 1291: 951: 554: 445: 2637: 8: 3822: 3808: 3738: 3393: 3329: 3012: 2676: 2293: 2261: 1970: 1784: 1634: – a division of the NSA that cooperates with telecommunication providers 1437: 1327: 1143: 991: 876: 845: 311: 271: 160: 94: 89: 41: 2164: 4270: 3484: 3421: 3322: 2613: 2290:"Is XKeyscore Still Active? Defense Contractor Posted a Job Listing for it 2 weeks Ago" 2235: 2117: 1645: – intelligence derived from American spy planes, drones and satellites 1301: 392: 3039:"Ny afsløring: FE masseindsamler oplysninger om danskere gennem avanceret spionsystem" 4231: 4013: 3949: 3491: 3442: 2930: 2852: 2172: 1874: 1869: 1809: 1561: 1281: 852: 3815: 3657: 3597: 3343: 3301: 3245: 2087: 1577: 1446: 1376: 1359: 1138: 1123: 417: 407: 170: 165: 72: 2319:"Glenn Greenwald: Low-Level NSA Analysts Have 'Powerful and Invasive' Search Tool" 1837:
and other, unspecified network protocols and additional forms of metadata such as
4215: 4210: 3970: 3470: 3435: 3407: 3386: 2962: 2909: 2822: 2779: 2759: 2734: 2723: 2712: 2583: 2392: 2207: 2083: 2004: 1937: 1805:
Track the source and authorship of a document that has passed through many hands.
1585: 1484: 1425: 1364: 1286: 1187: 1177: 1172: 412: 67: 3982: 2515:[Targeted By The U.S. – Big Brother in Latin America and in the World]. 4181: 3956: 3914: 3664: 3224: 2547: 1903: 1865: 1538:
Slide from a 2008 NSA presentation about XKeyscore, showing the query hierarchy
1421: 1148: 822: 675: 465: 2772: 2752: 1816:, people who search for privacy-enhancing software on the web, and readers of 1518: 4254: 3678: 3632: 3498: 3456: 2934: 2633: 1834: 1818: 1442: 1337: 114: 2821: 2582: 3801: 3400: 3379: 3143: 2739: 2425: 2096: 1945: 1881: 1654: 1542:
According to an NSA slide presentation about XKeyscore from 2013, it is a "
1476: 1429: 1354: 1332: 1113: 397: 251: 44:
as of 2007, with countries subject to the most data collection shown in red
4096: 3720: 3713: 3583: 3414: 1916: 1842: 1769: 1603: 961: 838: 699: 455: 326: 3066:"Japan made secret deals with the NSA that expanded global surveillance" 1998: 4084: 3238: 1704:
in June 2014, there are three different types of the XKeyscore system:
1118: 971: 450: 109: 1556:
XKeyscore is a "piece of Linux software that is typically deployed on
1534: 1491:
connected to that email address or that IP address do in the future".
4155: 3868: 3699: 3590: 3428: 3315: 3126:"Behind the Curtain; A Look at the Inner Workings of NSA's XKEYSCORE" 2980: 2210:, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge (July 3, 2014). 1941: 1653: – a division of the NSA that deals with hacking and 1599: 1526: 1322: 1153: 1077: 1016: 687: 654: 506: 460: 241: 155: 126: 104: 3124:
Lee, Micah; Greenwald, Glenn; Marquis-Boire, Morgan (July 2, 2015).
3104:
Marquis-Boire, Morgan; Greenwald, Glenn; Lee, Micah (July 1, 2015).
2482:
Lee, Micah; Greenwald, Glenn; Marquis-Boire, Morgan (July 2, 2015).
1761:
selector, which can then be used for starting a traditional search.
3854: 3773: 3745: 3294: 2643: 2355: 2139:"Job Networking Site LinkedIn Filled With Secret NSA Program Names" 2082: 1910:'s usage of the NSA's XKeyscore to wiretap a German domestic target 1718: 1450: 1428:
have said that XKeyscore is a system that enables almost unlimited
1128: 956: 559: 256: 204: 4072: 3896: 3875: 3671: 3625: 2831: 2592: 2517: 1750: 1728: 1622: 1557: 1001: 966: 941: 885: 833: 730: 288: 266: 246: 231: 150: 62: 3106:"XKEYSCORE: NSA's Google for the World's Private Communications" 2257:"Newly Declassified Documents on Phone Records Program Released" 1898: 1812:
revealed that XKeyscore is used to closely monitor users of the
3882: 3618: 1681: 1500: 1097: 718: 663: 236: 2513:"No alvo dos EUA – O big-brother na América Latina e no mundo" 2045: 2043: 1880:
To create additional motivation, the NSA incorporated various
1449:, servers and software that selects certain types of data and 825:
publicly revealed the program's purpose and use by the NSA in
4111: 4066: 3787: 3611: 1783:
Detect people who use encryption by doing searches like "all
1664: – all types of surveillance approved by the 1565: 936: 199: 3099:
Building a panopticon: The evolution of the NSA’s XKeyscore
2040: 1740: 1092: 1011: 4331:
Intelligence agency programmes revealed by Edward Snowden
3123: 3103: 2481: 2359: 1580:. These run at so-called "defensive sites" including the 2903:
Ally and Target: US Intelligence Watches Germany Closely
1920:
acquired from Snowden, the German intelligence agencies
1453:
that the NSA has already collected using other methods.
790:) is a secret computer system used by the United States 1888: 2923:"German Intelligence Agencies Used NSA Spying Program" 2352:"New Snowden Leak: NSA Program Taps All You Do Online" 1456: 2700: 2698: 1980: 1944:) for the purpose of intelligence collaboration and 2901:Laura Poitras, Marcel Rosenbach and Holger Stark, 855:, published excerpts of XKeyscore's source code. 4012: 3094:A full NSA presentation about XKeyscore from 2008 2976:"Cold War treaty confirms Sweden was not neutral" 2695: 2552:"Snowden Reveals Australia's Links to US Spy Web" 2484:"A Look at the Inner Workings of NSA's XKEYSCORE" 2421:"XKeyscore Presentation from 2008 – Read in Full" 2312: 2310: 1684:, which is NSA's database for internet metadata. 4252: 1948:. According to documents leaked by Snowden, the 1852: 2790: 2546: 2130: 3651:Global surveillance disclosures (2013–present) 3063: 2825:; Casado, Roberto Kaz e JosĂ© (July 13, 2013). 2632: 2506: 2504: 2307: 489:Global surveillance disclosures (2013–present) 3998: 3159: 2586:; Casado, Roberto Kaz e JosĂ© (July 6, 2013). 1401: 757: 3173: 3006: 2857:: CS1 maint: multiple names: authors list ( 2670: 2618:: CS1 maint: multiple names: authors list ( 2414: 2412: 2410: 2408: 2406: 2404: 2402: 2400: 2240:: CS1 maint: multiple names: authors list ( 2122:: CS1 maint: multiple names: authors list ( 1952:(FRA) has been granted access to XKeyscore. 1794:(VPNs) and machines that can potentially be 1461:On January 26, 2014, the German broadcaster 2897: 2895: 2871: 2762:, published by Der Spiegel on June 18, 2014 2501: 4005: 3991: 3166: 3152: 2136: 1408: 1394: 764: 750: 3009:"Read the Snowden Documents From the NSA" 3000: 2717: 2673:"Read the Snowden Documents From the NSA" 2664: 2397: 2254: 2023:File:XKeyscore presentation from 2008.pdf 804:Government Communications Security Bureau 3686:NSA warrantless surveillance (2001–2007) 2956:New slides about NSA collection programs 2892: 2626: 2510: 2076: 2013:List of government surveillance projects 1897: 1739: 1533: 1525: 1517: 858: 2915: 2815: 1885:participating in the training program. 1864:A 2011 report from the NSA unit in the 1666:Foreign Intelligence Surveillance Court 1494: 537:Mass surveillance in the United Kingdom 4311:United States national security policy 4253: 2988:from the original on December 11, 2013 2542: 2540: 2287: 2049: 808:Government Communications Headquarters 532:Mass surveillance in the United States 4341:Communications Security Establishment 4266:Counterterrorism in the United States 3986: 3147: 3019:from the original on February 9, 2014 2683:from the original on February 9, 2014 2652:from the original on January 30, 2014 2576: 2418: 2349: 2202: 2200: 2198: 2196: 2194: 1902:Excerpt of an NSA document leaked by 1695: 1589:repositories" for long term storage. 800:Communications Security Establishment 484:2005 warrantless surveillance scandal 2784: 2706:3 slides about the XKeyscore program 2564:from the original on August 10, 2013 2281: 2248: 1950:National Defence Radio Establishment 1889:Usage by foreign partners of the NSA 4326:National Security Agency operations 4301:American secret government programs 3072:from the original on April 24, 2017 2803:from the original on August 4, 2013 2537: 2433:from the original on August 1, 2013 2366:from the original on August 4, 2013 2316: 2212:"NSA targets the privacy-conscious" 2104:from the original on August 4, 2013 2050:Seipel, Hubert (January 26, 2014). 1307:Surveillance issues in smart cities 13: 4286:Obama administration controversies 3524:Information Warfare Support Center 2839:from the original on July 15, 2013 2791:Gallagher, Sean (August 1, 2013). 2600:from the original on July 10, 2013 2331:from the original on July 30, 2013 2255:Nakashima, Ellen (July 31, 2013). 2191: 2157: 1873:active groups associated with the 1457:According to Snowden and Greenwald 1027:Jindalee Operational Radar Network 14: 4352: 4276:Human rights in the United States 3281:Misawa Security Operations Center 3087: 3064:Ryan Gallagher (April 24, 2017). 2880:from the original on July 3, 2014 2269:from the original on July 2, 2014 2222:from the original on July 3, 2014 2179:from the original on July 7, 2014 812:Defense Intelligence Headquarters 42:Map of global NSA data collection 4230: 3964:Vulnerabilities Equities Process 3360: 3204:Consolidated Intelligence Center 3190:Alaska Mission Operations Center 2350:Wills, Amanda (August 1, 2013). 1997: 1983: 884: 729: 717: 698: 686: 674: 662: 642: 632: 622: 612: 602: 592: 582: 181:President's Surveillance Program 35: 21: 3605:Secure Terminal Equipment (STE) 3057: 3045:(in Danish). September 24, 2020 3031: 2968: 2948: 2865: 2765: 2746: 2521:(in Portuguese). Archived from 2475: 2445: 2386:Press Statement on 30 July 2013 2378: 2052:"Snowden Interview: Transcript" 1753:database for internet content. 1735: 1631:SSO (Special Source Operations) 1615:F6 (Special Collection Service) 1592: 1441:and national security reporter 3922:Institute for Defense Analyses 3288:Multiprogram Research Facility 2954:Top Level Telecommunications, 2453:"Snowden Interview Transcript" 2343: 2288:Fisher, Max (August 1, 2013). 796:Australian Signals Directorate 186:Terrorist Surveillance Program 1: 4296:Privacy of telecommunications 2753:XKeyscoreTabs XKS Development 2034: 1853:Contribution to U.S. security 1757:English, Arabic and Chinese. 1564:and stores collected data in 1238:Investigatory Powers Act 2016 365:Senate Intelligence Committee 4336:Federal Intelligence Service 4291:Privacy in the United States 2872:Kyle Rankin (July 3, 2014). 2137:Layne, Ken (June 18, 2013). 1857:The NSA slides published in 7: 3936:National Cryptologic School 3929:National Cryptologic Museum 3267:Interagency Training Center 3225:European Cryptologic Center 3197:Colorado Cryptologic Center 2743:. Retrieved August 1, 2013. 2317:Rea, Kari (July 28, 2013). 2060:. p. 3. Archived from 1976: 1924:(foreign intelligence) and 1513: 342:FISA Amendments Act of 2008 337:Protect America Act of 2007 176:Total Information Awareness 10: 4357: 3795:Real Time Regional Gateway 3538:Special Collection Service 3253:Georgia Cryptologic Center 2733:December 31, 2013, at the 2218:. Norddeutscher Rundfunk. 1955: 1893: 1841:tags, which often include 1650:Tailored Access Operations 1574:Tailored Access Operations 1498: 139:Tailored Access Operations 4226: 4200: 4174: 4123: 4106: 4059: 4052: 4021: 3906: 3846: 3730: 3642: 3575: 3508: 3369: 3358: 3260:Hawaii Cryptologic Center 3232:European Technical Center 3181: 2711:February 2, 2014, at the 2557:The Sydney Morning Herald 1931: 1223:National Intelligence Law 1208:Data Protection Directive 828:The Sydney Morning Herald 512:Surveillance of reporters 370:National Security Council 3351:Pacific Technical Center 3337:Texas Cryptologic Center 3175:National Security Agency 2908:August 20, 2013, at the 1964: 1792:virtual private networks 1382:Nothing to hide argument 1203:Data Retention Directive 844:On July 3, 2014, German 792:National Security Agency 776:Mass surveillance system 28:National Security Agency 3943:National Vigilance Park 2419:Staff (July 31, 2013). 2391:August 1, 2013, at the 1914:According to documents 1582:Ramstein Air Force base 816:Bundesnachrichtendienst 3767:Insider Threat Program 3464:John Michael McConnell 2961:July 26, 2013, at the 2758:June 30, 2014, at the 2457:Norddeutscher Rundfunk 2292:. WorldViews, blog of 2057:Norddeutscher Rundfunk 1911: 1768:Look for the usage of 1745: 1551:Norddeutscher Rundfunk 1539: 1531: 1523: 1472: 1463:Norddeutscher Rundfunk 1022:Mastering the Internet 849:Norddeutscher Rundfunk 527:Insider Threat Program 4306:Surveillance scandals 3450:William Eldridge Odom 2778:June 5, 2019, at the 2642:The Compass (blog of 2459:. n.d. Archived from 2029:Targeted surveillance 1901: 1814:Tor anonymity network 1790:Showing the usage of 1743: 1560:servers. It uses the 1537: 1529: 1521: 1499:Further information: 1467: 1259:FISA Improvements Act 859:Scope and functioning 332:Homeland Security Act 226:Databases, tools etc. 4114:(Germany, 1950–1990) 3707:Thomas Andrews Drake 1991:United States portal 1507:signals intelligence 1495:According to the NSA 1292:Secure communication 1134:Southern Cross Cable 522:UN diplomatic spying 3739:Boundless Informant 3394:Laurence Hugh Frost 3013:Sveriges Television 2677:Sveriges Television 2638:"What's XKEYSCORE?" 2463:on January 28, 2014 2294:The Washington Post 2262:The Washington Post 2165:"xkeyscorerules100" 2145:on December 8, 2017 2064:on January 28, 2014 1971:Japanese government 1438:The Washington Post 1328:Intelligence agency 1144:Bad Aibling Station 992:Boundless Informant 877:Global surveillance 393:Hepting v. AT&T 312:Privacy Act of 1974 90:Upstream collection 4235:Portals: Terrorism 3485:Keith B. Alexander 3422:Samuel C. Phillips 3007:Gunnar Rensfeldt. 2912:, August 12, 2013. 2671:Gunnar Rensfeldt. 1912: 1746: 1696:Types of XKeyscore 1540: 1532: 1524: 1302:Call detail record 846:public broadcaster 403:Clapper v. Amnesty 278:GCHQ collaboration 272:BOUNDLESSINFORMANT 4281:Mass surveillance 4248: 4247: 4119: 4118: 4014:Mass surveillance 3980: 3979: 3950:NSA Hall of Honor 3492:Michael S. Rogers 3443:Lincoln D. Faurer 2929:. July 20, 2013. 2835:(in Portuguese). 2636:(July 31, 2013). 2596:(in Portuguese). 2511:Staff (c. 2013). 2173:ARD (broadcaster) 2090:(June 27, 2013). 2088:Ackerman, Spencer 1906:that reveals the 1562:Apache web server 1447:backend databases 1418: 1417: 1282:Mass surveillance 1228:Cybersecurity Law 774: 773: 4348: 4234: 4057: 4056: 4007: 4000: 3993: 3984: 3983: 3973: 3966: 3959: 3952: 3945: 3938: 3931: 3924: 3917: 3899: 3892: 3885: 3878: 3871: 3864: 3857: 3839: 3832: 3825: 3818: 3811: 3804: 3797: 3790: 3783: 3776: 3769: 3762: 3755: 3748: 3741: 3723: 3716: 3709: 3702: 3695: 3688: 3681: 3674: 3667: 3660: 3658:Church Committee 3653: 3635: 3628: 3621: 3614: 3607: 3600: 3593: 3586: 3568: 3561: 3554: 3547: 3540: 3533: 3526: 3519: 3501: 3494: 3487: 3480: 3473: 3466: 3459: 3452: 3445: 3438: 3431: 3424: 3417: 3410: 3403: 3396: 3389: 3382: 3364: 3363: 3353: 3346: 3344:Utah Data Center 3339: 3332: 3325: 3318: 3311: 3304: 3302:RAF Menwith Hill 3297: 3290: 3283: 3276: 3269: 3262: 3255: 3248: 3246:Friendship Annex 3241: 3234: 3227: 3220: 3213: 3206: 3199: 3192: 3168: 3161: 3154: 3145: 3144: 3140: 3138: 3136: 3120: 3118: 3116: 3082: 3081: 3079: 3077: 3061: 3055: 3054: 3052: 3050: 3035: 3029: 3028: 3026: 3024: 3004: 2998: 2997: 2995: 2993: 2972: 2966: 2952: 2946: 2945: 2943: 2941: 2919: 2913: 2899: 2890: 2889: 2887: 2885: 2869: 2863: 2862: 2856: 2848: 2846: 2844: 2823:Greenwald, Glenn 2819: 2813: 2812: 2810: 2808: 2788: 2782: 2769: 2763: 2750: 2744: 2726:(July 31, 2013). 2724:Greenwald, Glenn 2721: 2715: 2702: 2693: 2692: 2690: 2688: 2668: 2662: 2661: 2659: 2657: 2630: 2624: 2623: 2617: 2609: 2607: 2605: 2584:Greenwald, Glenn 2580: 2574: 2573: 2571: 2569: 2550:(July 8, 2013). 2544: 2535: 2534: 2532: 2530: 2525:on July 12, 2013 2508: 2499: 2498: 2496: 2494: 2479: 2473: 2472: 2470: 2468: 2449: 2443: 2442: 2440: 2438: 2416: 2395: 2382: 2376: 2375: 2373: 2371: 2347: 2341: 2340: 2338: 2336: 2314: 2305: 2304: 2302: 2300: 2285: 2279: 2278: 2276: 2274: 2252: 2246: 2245: 2239: 2231: 2229: 2227: 2204: 2189: 2188: 2186: 2184: 2175:. July 3, 2014. 2161: 2155: 2154: 2152: 2150: 2141:. Archived from 2134: 2128: 2127: 2121: 2113: 2111: 2109: 2084:Greenwald, Glenn 2080: 2074: 2073: 2071: 2069: 2047: 2007: 2002: 2001: 1993: 1988: 1987: 1986: 1808:On July 3, 2014 1482: 1410: 1403: 1396: 1377:Stop Watching Us 1248:Proposed changes 1139:Utah Data Center 888: 863: 862: 814:, and Germany's 802:, New Zealand's 766: 759: 752: 734: 733: 722: 721: 703: 702: 691: 690: 679: 678: 667: 666: 646: 636: 626: 616: 606: 596: 586: 418:Wikimedia v. NSA 408:Klayman v. Obama 307:Safe Streets Act 39: 25: 18: 17: 4356: 4355: 4351: 4350: 4349: 4347: 4346: 4345: 4321:GCHQ operations 4251: 4250: 4249: 4244: 4222: 4211:UKUSA Agreement 4196: 4170: 4115: 4102: 4048: 4017: 4011: 3981: 3976: 3971:Zendian Problem 3969: 3962: 3955: 3948: 3941: 3934: 3927: 3920: 3913: 3902: 3895: 3888: 3881: 3874: 3867: 3860: 3853: 3842: 3835: 3828: 3821: 3814: 3807: 3800: 3793: 3786: 3779: 3772: 3765: 3758: 3751: 3744: 3737: 3726: 3719: 3712: 3705: 3698: 3691: 3684: 3677: 3670: 3663: 3656: 3649: 3638: 3631: 3624: 3617: 3610: 3603: 3596: 3589: 3582: 3571: 3564: 3557: 3550: 3543: 3536: 3529: 3522: 3515: 3504: 3497: 3490: 3483: 3476: 3471:Kenneth Minihan 3469: 3462: 3455: 3448: 3441: 3436:Bobby Ray Inman 3434: 3427: 3420: 3413: 3408:Marshall Carter 3406: 3399: 3392: 3387:John A. Samford 3385: 3378: 3365: 3361: 3356: 3349: 3342: 3335: 3328: 3321: 3314: 3307: 3300: 3293: 3286: 3279: 3272: 3265: 3258: 3251: 3244: 3237: 3230: 3223: 3216: 3209: 3202: 3195: 3188: 3177: 3172: 3134: 3132: 3114: 3112: 3090: 3085: 3075: 3073: 3062: 3058: 3048: 3046: 3037: 3036: 3032: 3022: 3020: 3005: 3001: 2991: 2989: 2974: 2973: 2969: 2965:, July 16, 2013 2963:Wayback Machine 2953: 2949: 2939: 2937: 2921: 2920: 2916: 2910:Wayback Machine 2900: 2893: 2883: 2881: 2870: 2866: 2850: 2849: 2842: 2840: 2820: 2816: 2806: 2804: 2789: 2785: 2780:Wayback Machine 2770: 2766: 2760:Wayback Machine 2751: 2747: 2735:Wayback Machine 2722: 2718: 2713:Wayback Machine 2703: 2696: 2686: 2684: 2669: 2665: 2655: 2653: 2631: 2627: 2611: 2610: 2603: 2601: 2581: 2577: 2567: 2565: 2548:Dorling, Philip 2545: 2538: 2528: 2526: 2509: 2502: 2492: 2490: 2480: 2476: 2466: 2464: 2451: 2450: 2446: 2436: 2434: 2417: 2398: 2393:Wayback Machine 2383: 2379: 2369: 2367: 2348: 2344: 2334: 2332: 2315: 2308: 2298: 2296: 2286: 2282: 2272: 2270: 2253: 2249: 2233: 2232: 2225: 2223: 2208:Jacob Appelbaum 2205: 2192: 2182: 2180: 2163: 2162: 2158: 2148: 2146: 2135: 2131: 2115: 2114: 2107: 2105: 2081: 2077: 2067: 2065: 2048: 2041: 2037: 2005:Politics portal 2003: 1996: 1989: 1984: 1982: 1979: 1967: 1958: 1938:UKUSA Agreement 1936:As part of the 1934: 1896: 1891: 1855: 1738: 1698: 1595: 1586:Yokota Air Base 1516: 1503: 1497: 1485:Glenn Greenwald 1480: 1459: 1426:Glenn Greenwald 1414: 1287:Culture of fear 1264:Other proposals 1193:FISA amendments 1188:USA Freedom Act 1173:UKUSA Agreement 861: 777: 770: 741: 740: 728: 716: 697: 685: 673: 661: 573: 565: 564: 550: 542: 541: 502: 494: 493: 479: 471: 470: 436: 428: 427: 413:ACLU v. Clapper 383: 375: 374: 355: 347: 346: 302: 294: 293: 53: 45: 26: 12: 11: 5: 4354: 4344: 4343: 4338: 4333: 4328: 4323: 4318: 4313: 4308: 4303: 4298: 4293: 4288: 4283: 4278: 4273: 4268: 4263: 4246: 4245: 4243: 4242: 4239: 4236: 4227: 4224: 4223: 4221: 4220: 4219: 4218: 4213: 4204: 4202: 4198: 4197: 4195: 4194: 4192:Julian Assange 4189: 4184: 4182:Edward Snowden 4178: 4176: 4172: 4171: 4169: 4168: 4163: 4158: 4153: 4148: 4143: 4138: 4133: 4127: 4125: 4121: 4120: 4117: 4116: 4110: 4108: 4104: 4103: 4101: 4100: 4094: 4088: 4082: 4076: 4070: 4063: 4061: 4054: 4050: 4049: 4047: 4046: 4041: 4036: 4031: 4025: 4023: 4019: 4018: 4010: 4009: 4002: 3995: 3987: 3978: 3977: 3975: 3974: 3967: 3960: 3953: 3946: 3939: 3932: 3925: 3918: 3915:Dundee Society 3910: 3908: 3904: 3903: 3901: 3900: 3893: 3886: 3879: 3872: 3865: 3858: 3850: 3848: 3844: 3843: 3841: 3840: 3833: 3826: 3819: 3812: 3805: 3798: 3791: 3784: 3777: 3770: 3763: 3756: 3749: 3742: 3734: 3732: 3728: 3727: 3725: 3724: 3717: 3710: 3703: 3696: 3693:Pike Committee 3689: 3682: 3675: 3668: 3665:Edward Snowden 3661: 3654: 3646: 3644: 3640: 3639: 3637: 3636: 3629: 3622: 3615: 3608: 3601: 3594: 3587: 3579: 3577: 3573: 3572: 3570: 3569: 3562: 3555: 3548: 3541: 3534: 3527: 3520: 3512: 3510: 3506: 3505: 3503: 3502: 3495: 3488: 3481: 3478:Michael Hayden 3474: 3467: 3460: 3453: 3446: 3439: 3432: 3425: 3418: 3411: 3404: 3397: 3390: 3383: 3375: 3373: 3367: 3366: 3359: 3357: 3355: 3354: 3347: 3340: 3333: 3326: 3319: 3312: 3305: 3298: 3291: 3284: 3277: 3270: 3263: 3256: 3249: 3242: 3235: 3228: 3221: 3214: 3207: 3200: 3193: 3185: 3183: 3179: 3178: 3171: 3170: 3163: 3156: 3148: 3142: 3141: 3121: 3101: 3096: 3089: 3088:External links 3086: 3084: 3083: 3056: 3030: 2999: 2967: 2947: 2914: 2891: 2864: 2814: 2783: 2764: 2745: 2716: 2694: 2663: 2634:Ambinder, Marc 2625: 2575: 2536: 2500: 2474: 2444: 2396: 2377: 2342: 2306: 2280: 2247: 2190: 2156: 2129: 2075: 2038: 2036: 2033: 2032: 2031: 2026: 2020: 2015: 2009: 2008: 1994: 1978: 1975: 1966: 1963: 1957: 1954: 1933: 1930: 1904:Edward Snowden 1895: 1892: 1890: 1887: 1866:Dagger Complex 1854: 1851: 1824: 1823: 1806: 1803: 1788: 1781: 1773: 1737: 1734: 1733: 1732: 1722: 1712: 1697: 1694: 1677: 1676: 1668: 1657: 1646: 1636: 1635: 1627: 1619: 1594: 1591: 1522:XKeyscore logo 1515: 1512: 1496: 1493: 1458: 1455: 1422:Edward Snowden 1416: 1415: 1413: 1412: 1405: 1398: 1390: 1387: 1386: 1385: 1384: 1379: 1374: 1369: 1368: 1367: 1362: 1352: 1351: 1350: 1345: 1340: 1330: 1325: 1317: 1316: 1315:Related topics 1312: 1311: 1310: 1309: 1304: 1299: 1294: 1289: 1284: 1276: 1275: 1271: 1270: 1269: 1268: 1267: 1266: 1261: 1250: 1249: 1245: 1244: 1243: 1242: 1241: 1240: 1232: 1231: 1230: 1225: 1217: 1216: 1215: 1210: 1205: 1197: 1196: 1195: 1190: 1182: 1181: 1180: 1175: 1164: 1163: 1159: 1158: 1157: 1156: 1151: 1149:Dagger Complex 1146: 1141: 1136: 1131: 1126: 1121: 1116: 1108: 1107: 1103: 1102: 1101: 1100: 1095: 1090: 1085: 1080: 1075: 1070: 1065: 1060: 1055: 1050: 1045: 1037: 1036: 1032: 1031: 1030: 1029: 1024: 1019: 1014: 1009: 1004: 999: 994: 989: 984: 979: 974: 969: 964: 959: 954: 949: 944: 939: 934: 926: 925: 921: 920: 919: 918: 913: 908: 903: 895: 894: 890: 889: 881: 880: 872: 871: 860: 857: 851:, a member of 841:of employees. 823:Edward Snowden 821:In July 2013, 775: 772: 771: 769: 768: 761: 754: 746: 743: 742: 739: 738: 726: 713: 712: 708: 707: 695: 683: 671: 658: 657: 651: 650: 640: 630: 620: 610: 600: 590: 579: 578: 574: 571: 570: 567: 566: 563: 562: 557: 551: 548: 547: 544: 543: 540: 539: 534: 529: 524: 519: 514: 509: 503: 500: 499: 496: 495: 492: 491: 486: 480: 477: 476: 473: 472: 469: 468: 466:Edward Snowden 463: 458: 453: 448: 443: 441:William Binney 437: 435:Whistleblowers 434: 433: 430: 429: 426: 425: 420: 415: 410: 405: 400: 395: 390: 384: 381: 380: 377: 376: 373: 372: 367: 362: 356: 353: 352: 349: 348: 345: 344: 339: 334: 329: 324: 319: 314: 309: 303: 300: 299: 296: 295: 292: 291: 286: 280: 279: 275: 274: 269: 264: 259: 254: 249: 244: 239: 234: 228: 227: 223: 222: 217: 212: 207: 202: 196: 195: 191: 190: 189: 188: 178: 173: 168: 163: 158: 153: 147: 146: 142: 141: 135: 134: 130: 129: 123: 122: 118: 117: 112: 107: 102: 97: 92: 86: 85: 81: 80: 75: 70: 65: 59: 58: 54: 51: 50: 47: 46: 40: 32: 31: 9: 6: 4: 3: 2: 4353: 4342: 4339: 4337: 4334: 4332: 4329: 4327: 4324: 4322: 4319: 4317: 4316:War on terror 4314: 4312: 4309: 4307: 4304: 4302: 4299: 4297: 4294: 4292: 4289: 4287: 4284: 4282: 4279: 4277: 4274: 4272: 4269: 4267: 4264: 4262: 4261:2013 scandals 4259: 4258: 4256: 4240: 4237: 4233: 4229: 4228: 4225: 4217: 4214: 4212: 4209: 4208: 4206: 4205: 4203: 4199: 4193: 4190: 4188: 4185: 4183: 4180: 4179: 4177: 4173: 4167: 4164: 4162: 4159: 4157: 4154: 4152: 4149: 4147: 4144: 4142: 4139: 4137: 4134: 4132: 4129: 4128: 4126: 4122: 4113: 4109: 4105: 4098: 4095: 4093:(Switzerland) 4092: 4089: 4086: 4083: 4080: 4077: 4074: 4071: 4068: 4065: 4064: 4062: 4058: 4055: 4051: 4045: 4042: 4040: 4037: 4035: 4032: 4030: 4027: 4026: 4024: 4020: 4015: 4008: 4003: 4001: 3996: 3994: 3989: 3988: 3985: 3972: 3968: 3965: 3961: 3958: 3954: 3951: 3947: 3944: 3940: 3937: 3933: 3930: 3926: 3923: 3919: 3916: 3912: 3911: 3909: 3905: 3898: 3894: 3891: 3887: 3884: 3880: 3877: 3873: 3870: 3866: 3863: 3859: 3856: 3852: 3851: 3849: 3845: 3838: 3834: 3831: 3827: 3824: 3820: 3817: 3813: 3810: 3806: 3803: 3799: 3796: 3792: 3789: 3785: 3782: 3778: 3775: 3771: 3768: 3764: 3761: 3757: 3754: 3750: 3747: 3743: 3740: 3736: 3735: 3733: 3729: 3722: 3718: 3715: 3711: 3708: 3704: 3701: 3697: 3694: 3690: 3687: 3683: 3680: 3679:James Bamford 3676: 3673: 3669: 3666: 3662: 3659: 3655: 3652: 3648: 3647: 3645: 3641: 3634: 3633:WARRIOR PRIDE 3630: 3627: 3623: 3620: 3616: 3613: 3609: 3606: 3602: 3599: 3595: 3592: 3588: 3585: 3581: 3580: 3578: 3574: 3567: 3563: 3560: 3556: 3553: 3549: 3546: 3542: 3539: 3535: 3532: 3528: 3525: 3521: 3518: 3514: 3513: 3511: 3507: 3500: 3499:Paul Nakasone 3496: 3493: 3489: 3486: 3482: 3479: 3475: 3472: 3468: 3465: 3461: 3458: 3457:Bill Studeman 3454: 3451: 3447: 3444: 3440: 3437: 3433: 3430: 3426: 3423: 3419: 3416: 3412: 3409: 3405: 3402: 3398: 3395: 3391: 3388: 3384: 3381: 3377: 3376: 3374: 3372: 3368: 3352: 3348: 3345: 3341: 3338: 3334: 3331: 3327: 3324: 3320: 3317: 3313: 3310: 3309:Roaring Creek 3306: 3303: 3299: 3296: 3292: 3289: 3285: 3282: 3278: 3275: 3271: 3268: 3264: 3261: 3257: 3254: 3250: 3247: 3243: 3240: 3236: 3233: 3229: 3226: 3222: 3219: 3215: 3212: 3208: 3205: 3201: 3198: 3194: 3191: 3187: 3186: 3184: 3180: 3176: 3169: 3164: 3162: 3157: 3155: 3150: 3149: 3146: 3131: 3130:The Intercept 3127: 3122: 3111: 3110:The Intercept 3107: 3102: 3100: 3097: 3095: 3092: 3091: 3071: 3067: 3060: 3049:September 24, 3044: 3040: 3034: 3018: 3014: 3010: 3003: 2987: 2983: 2982: 2977: 2971: 2964: 2960: 2957: 2951: 2940:September 14, 2936: 2932: 2928: 2924: 2918: 2911: 2907: 2904: 2898: 2896: 2879: 2875: 2868: 2860: 2854: 2838: 2834: 2833: 2828: 2824: 2818: 2802: 2798: 2794: 2787: 2781: 2777: 2774: 2771:Der Spiegel: 2768: 2761: 2757: 2754: 2749: 2742: 2741: 2736: 2732: 2729: 2725: 2720: 2714: 2710: 2707: 2701: 2699: 2682: 2678: 2674: 2667: 2651: 2647: 2645: 2639: 2635: 2629: 2621: 2615: 2599: 2595: 2594: 2589: 2585: 2579: 2563: 2559: 2558: 2553: 2549: 2543: 2541: 2524: 2520: 2519: 2514: 2507: 2505: 2489: 2488:The Intercept 2485: 2478: 2462: 2458: 2454: 2448: 2432: 2428: 2427: 2422: 2415: 2413: 2411: 2409: 2407: 2405: 2403: 2401: 2394: 2390: 2387: 2381: 2365: 2361: 2357: 2353: 2346: 2330: 2326: 2325: 2320: 2313: 2311: 2295: 2291: 2284: 2268: 2264: 2263: 2258: 2251: 2243: 2237: 2221: 2217: 2213: 2209: 2203: 2201: 2199: 2197: 2195: 2178: 2174: 2170: 2166: 2160: 2144: 2140: 2133: 2125: 2119: 2103: 2099: 2098: 2093: 2089: 2085: 2079: 2063: 2059: 2058: 2053: 2046: 2044: 2039: 2030: 2027: 2024: 2021: 2019: 2016: 2014: 2011: 2010: 2006: 2000: 1995: 1992: 1981: 1974: 1972: 1962: 1953: 1951: 1947: 1943: 1939: 1929: 1927: 1923: 1919: 1918: 1909: 1905: 1900: 1886: 1883: 1878: 1876: 1871: 1867: 1862: 1860: 1850: 1848: 1844: 1840: 1836: 1831: 1828: 1821: 1820: 1819:Linux Journal 1815: 1811: 1807: 1804: 1801: 1797: 1793: 1789: 1786: 1782: 1779: 1774: 1771: 1767: 1766: 1765: 1762: 1758: 1754: 1752: 1742: 1730: 1726: 1723: 1720: 1716: 1713: 1710: 1707: 1706: 1705: 1703: 1693: 1691: 1685: 1683: 1674: 1673: 1669: 1667: 1663: 1662: 1658: 1656: 1652: 1651: 1647: 1644: 1641: 1640: 1639: 1633: 1632: 1628: 1625: 1624: 1620: 1617: 1616: 1612: 1611: 1610: 1607: 1605: 1601: 1590: 1587: 1583: 1579: 1575: 1569: 1567: 1563: 1559: 1554: 1552: 1547: 1545: 1536: 1528: 1520: 1511: 1508: 1502: 1492: 1488: 1486: 1479: 1478: 1474:According to 1471: 1466: 1464: 1454: 1452: 1448: 1444: 1443:Marc Ambinder 1440: 1439: 1435:According to 1433: 1431: 1427: 1423: 1411: 1406: 1404: 1399: 1397: 1392: 1391: 1389: 1388: 1383: 1380: 1378: 1375: 1373: 1370: 1366: 1363: 1361: 1358: 1357: 1356: 1353: 1349: 1346: 1344: 1341: 1339: 1336: 1335: 1334: 1331: 1329: 1326: 1324: 1321: 1320: 1319: 1318: 1314: 1313: 1308: 1305: 1303: 1300: 1298: 1295: 1293: 1290: 1288: 1285: 1283: 1280: 1279: 1278: 1277: 1273: 1272: 1265: 1262: 1260: 1257: 1256: 1254: 1253: 1252: 1251: 1247: 1246: 1239: 1236: 1235: 1233: 1229: 1226: 1224: 1221: 1220: 1218: 1214: 1211: 1209: 1206: 1204: 1201: 1200: 1198: 1194: 1191: 1189: 1186: 1185: 1183: 1179: 1176: 1174: 1171: 1170: 1168: 1167: 1166: 1165: 1161: 1160: 1155: 1152: 1150: 1147: 1145: 1142: 1140: 1137: 1135: 1132: 1130: 1127: 1125: 1122: 1120: 1117: 1115: 1112: 1111: 1110: 1109: 1105: 1104: 1099: 1096: 1094: 1091: 1089: 1086: 1084: 1081: 1079: 1076: 1074: 1071: 1069: 1066: 1064: 1061: 1059: 1056: 1054: 1051: 1049: 1046: 1044: 1041: 1040: 1039: 1038: 1034: 1033: 1028: 1025: 1023: 1020: 1018: 1015: 1013: 1010: 1008: 1005: 1003: 1000: 998: 995: 993: 990: 988: 985: 983: 980: 978: 975: 973: 970: 968: 965: 963: 960: 958: 955: 953: 950: 948: 945: 943: 940: 938: 935: 933: 930: 929: 928: 927: 923: 922: 917: 914: 912: 909: 907: 904: 902: 899: 898: 897: 896: 892: 891: 887: 883: 882: 879: 878: 874: 873: 869: 865: 864: 856: 854: 850: 847: 842: 840: 836: 835: 830: 829: 824: 819: 817: 813: 809: 805: 801: 797: 793: 789: 785: 781: 767: 762: 760: 755: 753: 748: 747: 745: 744: 737: 732: 727: 725: 720: 715: 714: 710: 709: 706: 701: 696: 694: 689: 684: 682: 677: 672: 670: 665: 660: 659: 656: 653: 652: 649: 645: 641: 639: 635: 631: 629: 625: 621: 619: 615: 611: 609: 605: 601: 599: 595: 591: 589: 585: 581: 580: 577:United States 576: 575: 572:Collaboration 569: 568: 561: 558: 556: 553: 552: 546: 545: 538: 535: 533: 530: 528: 525: 523: 520: 518: 517:Mail tracking 515: 513: 510: 508: 505: 504: 498: 497: 490: 487: 485: 482: 481: 475: 474: 467: 464: 462: 459: 457: 454: 452: 449: 447: 444: 442: 439: 438: 432: 431: 424: 421: 419: 416: 414: 411: 409: 406: 404: 401: 399: 396: 394: 391: 389: 386: 385: 379: 378: 371: 368: 366: 363: 361: 358: 357: 351: 350: 343: 340: 338: 335: 333: 330: 328: 325: 323: 320: 318: 315: 313: 310: 308: 305: 304: 298: 297: 290: 287: 285: 282: 281: 277: 276: 273: 270: 268: 265: 263: 260: 258: 255: 253: 250: 248: 245: 243: 240: 238: 235: 233: 230: 229: 225: 224: 221: 218: 216: 213: 211: 208: 206: 203: 201: 198: 197: 193: 192: 187: 184: 183: 182: 179: 177: 174: 172: 169: 167: 164: 162: 159: 157: 154: 152: 149: 148: 144: 143: 140: 137: 136: 132: 131: 128: 125: 124: 120: 119: 116: 113: 111: 108: 106: 103: 101: 98: 96: 93: 91: 88: 87: 83: 82: 79: 76: 74: 71: 69: 66: 64: 61: 60: 56: 55: 49: 48: 43: 38: 34: 33: 29: 24: 20: 19: 16: 4241:Human Rights 4187:Barack Obama 4107:Discontinued 4078: 4039:2013–present 3837:Epic Shelter 3829: 3802:Stellar Wind 3401:Gordon Blake 3380:Ralph Canine 3133:. Retrieved 3129: 3113:. Retrieved 3109: 3074:. Retrieved 3059: 3047:. Retrieved 3042: 3033: 3023:December 12, 3021:. Retrieved 3002: 2992:December 12, 2990:. Retrieved 2979: 2970: 2950: 2938:. Retrieved 2926: 2917: 2882:. Retrieved 2867: 2841:. Retrieved 2830: 2817: 2805:. Retrieved 2797:Ars Technica 2796: 2786: 2767: 2748: 2740:The Guardian 2738: 2719: 2687:December 21, 2685:. Retrieved 2666: 2654:. Retrieved 2641: 2628: 2602:. Retrieved 2591: 2578: 2566:. Retrieved 2555: 2527:. Retrieved 2523:the original 2516: 2491:. Retrieved 2487: 2477: 2465:. Retrieved 2461:the original 2447: 2435:. Retrieved 2426:The Guardian 2424: 2380: 2368:. Retrieved 2345: 2333:. Retrieved 2322: 2297:. Retrieved 2283: 2271:. Retrieved 2260: 2250: 2224:. Retrieved 2215: 2181:. Retrieved 2168: 2159: 2147:. Retrieved 2143:the original 2132: 2106:. Retrieved 2097:The Guardian 2095: 2078: 2066:. Retrieved 2062:the original 2055: 1968: 1959: 1946:data sharing 1935: 1915: 1913: 1882:gamification 1879: 1863: 1859:The Guardian 1858: 1856: 1832: 1827:The Guardian 1826: 1825: 1817: 1777: 1763: 1759: 1755: 1747: 1736:Capabilities 1724: 1714: 1708: 1701: 1699: 1690:The Guardian 1689: 1686: 1678: 1670: 1659: 1655:cyberwarfare 1648: 1642: 1637: 1629: 1621: 1613: 1608: 1596: 1593:Data sources 1584:in Germany, 1570: 1568:databases". 1555: 1548: 1541: 1504: 1489: 1477:The Guardian 1475: 1473: 1468: 1460: 1436: 1434: 1430:surveillance 1419: 1355:Human rights 1333:Cryptography 1124:Menwith Hill 1114:The Doughnut 931: 911:2013–present 875: 843: 832: 826: 820: 806:, Britain's 787: 783: 779: 778: 446:Thomas Drake 423:US v. Moalin 398:Jewel v. NSA 354:Institutions 261: 252:TRAFFICTHIEF 30:surveillance 15: 4022:Disclosures 4016:on citizens 3809:TRAILBLAZER 3721:Matthew Aid 3714:Thomas Tamm 3643:Controversy 3584:ANT catalog 3415:Noel Gayler 3330:Sugar Grove 3274:Kent Island 3218:Dorsey Road 2927:Der Spiegel 2467:January 27, 1917:Der Spiegel 1843:geolocation 1770:Google Maps 1709:Traditional 1702:Der Spiegel 1672:Third party 1604:New Zealand 1602:and one in 962:Stone Ghost 893:Disclosures 798:, Canada's 478:Publication 456:Thomas Tamm 388:ACLU v. NSA 327:Patriot Act 301:Legislation 161:Trailblazer 4255:Categories 4207:Five Eyes 4085:Frenchelon 3862:Interquake 3816:Turbulence 3576:Technology 3323:Salt Creek 3239:Fort Meade 2704:See also: 2035:References 1868:(close to 1578:Turbulence 1372:Satellites 1169:Five Eyes 1119:Fort Meade 972:Frenchelon 810:, Japan's 451:Mark Klein 194:Since 2007 166:Turbulence 145:Since 2001 133:Since 1998 121:Since 1990 110:ThinThread 84:Since 1978 4271:Espionage 4156:Five Eyes 4097:FETĂ–meter 4079:XKeyscore 4044:Reactions 3869:Main Core 3847:Databases 3830:XKeyscore 3700:Russ Tice 3591:FROSTBURG 3509:Divisions 3429:Lew Allen 3316:Room 641A 3182:Locations 3076:April 24, 2981:The Local 2935:2195-1349 2843:August 5, 2807:August 4, 2656:August 4, 2614:cite news 2604:August 2, 2568:August 2, 2529:August 5, 2437:August 6, 2370:August 4, 2335:August 4, 2299:August 6, 2273:August 6, 2236:cite news 2149:August 6, 2118:cite news 2108:August 5, 1942:Five Eyes 1875:Anonymous 1870:Griesheim 1725:Deep Dive 1600:Australia 1323:Espionage 1154:GCHQ Bude 1078:Five Eyes 1017:RAMPART-A 952:Carnivore 932:XKeyscore 916:Reactions 784:XKEYSCORE 780:XKeyscore 655:Five Eyes 507:Cablegate 461:Russ Tice 262:XKeyscore 242:Main Core 210:Stateroom 156:STORMBREW 127:RAMPART-A 105:Main Core 4238:Freedoms 4124:Agencies 4099:(Turkey) 4087:(France) 4034:Pre-2013 3855:DISHFIRE 3823:Upstream 3774:MUSCULAR 3760:Fairview 3746:Dropmire 3731:Programs 3295:Pine Gap 3070:Archived 3017:Archived 2986:Archived 2959:Archived 2906:Archived 2878:Archived 2853:cite web 2837:Archived 2801:Archived 2776:Archived 2756:Archived 2731:Archived 2709:Archived 2681:Archived 2650:Archived 2644:The Week 2598:Archived 2562:Archived 2431:Archived 2389:Archived 2364:Archived 2356:Mashable 2329:Archived 2324:ABC News 2267:Archived 2220:Archived 2216:Panorama 2177:Archived 2169:Panorama 2102:Archived 1977:See also 1849:) data. 1721:program. 1719:MUSCULAR 1643:Overhead 1514:Workings 1451:metadata 1274:Concepts 1129:Pine Gap 1048:R&AW 1035:Agencies 1007:Stingray 977:Fairview 957:Dishfire 947:Sentient 906:Pre-2013 868:a series 866:Part of 598:CYBERCOM 560:Metadata 549:Concepts 382:Lawsuits 284:MUSCULAR 257:DISHFIRE 205:Dropmire 171:Genoa II 100:FAIRVIEW 73:SHAMROCK 57:Pre-1978 52:Programs 4073:ECHELON 4060:Current 4053:Systems 4029:Origins 3897:PINWALE 3876:MAINWAY 3753:ECHELON 3672:LOVEINT 3626:STU-III 3598:HARVEST 3371:Leaders 3135:July 5, 3115:July 5, 2884:July 3, 2832:O Globo 2593:O Globo 2518:O Globo 2493:July 2, 2226:July 4, 2183:July 4, 1956:Denmark 1894:Germany 1778:O Globo 1751:PINWALE 1729:TEMPORA 1715:Stage 2 1623:FORNSAT 1558:Red Hat 1365:Liberty 1360:Privacy 1002:Pinwale 997:Bullrun 967:Tempora 942:ECHELON 924:Systems 901:Origins 839:rĂ©sumĂ©s 834:O Globo 501:Related 289:Tempora 267:ICREACH 247:MAINWAY 232:PINWALE 215:Bullrun 151:OAKSTAR 95:BLARNEY 68:MINARET 63:ECHELON 4216:Lustre 4175:People 3957:VENONA 3890:Nymrod 3883:MARINA 3781:MYSTIC 3619:STU-II 2933:  2068:May 6, 1932:Sweden 1796:hacked 1682:MARINA 1501:SIGINT 1297:SIGINT 1219:China 1178:Lustre 1106:Places 1098:Mossad 982:MYSTIC 555:SIGINT 237:MARINA 220:MYSTIC 78:PROMIS 4112:Stasi 4081:(USA) 4075:(USA) 4069:(USA) 4067:PRISM 3907:Other 3788:PRISM 3612:STU-I 2358:(via 2018:PRISM 1965:Japan 1566:MySQL 1481:' 1255:U.S. 1184:U.S. 937:PRISM 711:Other 200:PRISM 115:Genoa 4201:Laws 4151:DGSE 4146:ASIO 4091:Onyx 3566:NSOC 3559:NTOC 3211:CSSG 3137:2015 3117:2015 3078:2017 3051:2020 3025:2013 2994:2013 2942:2024 2931:ISSN 2886:2014 2859:link 2845:2013 2809:2013 2689:2013 2658:2013 2620:link 2606:2013 2570:2013 2531:2013 2495:2020 2469:2014 2439:2013 2384:NSA 2372:2013 2337:2013 2301:2013 2275:2013 2242:link 2228:2014 2185:2014 2151:2013 2124:link 2110:2013 2070:2019 1839:Exif 1835:VoIP 1798:via 1661:FISA 1424:and 1343:VPNs 1213:GDPR 1162:Laws 1093:GCHQ 1073:DGSE 1012:SORM 987:DCSN 831:and 724:DGSE 705:GCSB 681:GCHQ 669:CSEC 360:FISC 322:ECPA 317:FISA 4166:MSS 4161:FSB 4141:CNI 4136:BND 4131:NSA 3552:TAO 3545:SSO 3531:ROC 3517:CSS 2362:). 2360:CNN 1926:BfV 1922:BND 1908:BND 1847:GPS 1810:ARD 1800:TAO 1785:PGP 1544:DNI 1348:TLS 1338:Tor 1234:UK 1199:EU 1088:MSS 1083:FSB 1068:ASD 1063:CNI 1058:BND 1053:CSE 1043:NSA 853:ARD 788:XKS 786:or 736:BND 693:ASD 648:IAO 638:DHS 628:CIA 618:FBI 608:DOJ 588:CSS 4257:: 3128:. 3108:. 3068:. 3043:DR 3041:. 3015:. 3011:. 2984:. 2978:. 2925:. 2894:^ 2876:. 2855:}} 2851:{{ 2799:. 2795:. 2737:. 2697:^ 2679:. 2675:. 2648:. 2640:. 2616:}} 2612:{{ 2590:. 2560:. 2554:. 2539:^ 2503:^ 2486:. 2455:. 2429:. 2423:. 2399:^ 2354:. 2327:. 2321:. 2309:^ 2265:. 2259:. 2238:}} 2234:{{ 2214:. 2193:^ 2171:. 2167:. 2120:}} 2116:{{ 2100:. 2094:. 2086:; 2054:. 2042:^ 1973:. 1606:. 1553:. 1483:s 870:on 818:. 4006:e 3999:t 3992:v 3167:e 3160:t 3153:v 3139:. 3119:. 3080:. 3053:. 3027:. 2996:. 2944:. 2888:. 2861:) 2847:. 2811:. 2691:. 2660:. 2646:) 2622:) 2608:. 2572:. 2533:. 2497:. 2471:. 2441:. 2374:. 2339:. 2303:. 2277:. 2244:) 2230:. 2187:. 2153:. 2126:) 2112:. 2072:. 1845:( 1822:. 1802:. 1731:. 1409:e 1402:t 1395:v 782:( 765:e 758:t 751:v

Index


National Security Agency

Map of global NSA data collection
ECHELON
MINARET
SHAMROCK
PROMIS
Upstream collection
BLARNEY
FAIRVIEW
Main Core
ThinThread
Genoa
RAMPART-A
Tailored Access Operations
OAKSTAR
STORMBREW
Trailblazer
Turbulence
Genoa II
Total Information Awareness
President's Surveillance Program
Terrorist Surveillance Program
PRISM
Dropmire
Stateroom
Bullrun
MYSTIC
PINWALE

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑