Jump to content

Global surveillance

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by A1candidate (talk | contribs) at 01:46, 30 November 2013 (Created page with '{{See|Edward Snowden}} {{NSA surveillance}} '''Global surveillance''' refers to the mass surveillance of entire populations across the globe. == Historical...'). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

Global surveillance refers to the mass surveillance of entire populations across the globe.

Historical background

General disclosures regarding a mass surveillance program involving U.S. citizens had been made in the U.S. media in 2006.[1] In early 2013, Edward Snowden handed over 15,000 – 20,000 top secret documents to various media outlets, triggering one of the biggest news leaks in the modern history of the United States.[2]

Global surveillance emerged as a phenomenon in the late 1940s (as demonstrated by the joint U.S.-British program code-named "ECHELON"),[3] In the aftermath of the 1970s Watergate affair and a subsequent congressional inquiry led by Sen. Frank Church,[4] it was revealed that the NSA, in collaboration with Britain's GCHQ, had routinely intercepted the international communications of prominent anti-Vietnam War leaders such as Jane Fonda and Dr. Benjamin Spock.[5] Decades later, a multi-year investigation by the European Parliament highlighted the NSA's role in economic espionage in a report entitled 'Development of Surveillance Technology and Risk of Abuse of Economic Information', in 1999.[6] However, for the general public, it was a series of detailed disclosures of internal NSA documents in June 2013 that first revealed the massive extent of the NSA's spying, both foreign and domestic. Most of these were leaked by an ex-contractor, Edward Snowden. Even so, a number of these older global surveillance programs such as PRISM, XKeyscore, and Tempora were referenced in the 2013 release of thousands of documents.[7] Many countries around the world, including Western Allies and member states of NATO, have been targeted by the "Five Eyes" strategic alliance of Australia, Canada, New Zealand, the UK and the USA—five English-speaking Western democracies aiming to achieve Total Information Awareness by mastering the Internet with analytical tools such as the Boundless Informant.[8] As confirmed by the NSA's director Keith B. Alexander on September 26, 2013, the NSA collects and stores all phone records of all American citizens.[9] Much of the data is kept in large storage facilities such as the Utah Data Center, a US$1.5 billion megaproject referred to by The Wall Street Journal as a "symbol of the spy agency's surveillance prowess."[10]

Global surveillance

According to Snowden's documents, the United Nations Headquarters and the United Nations General Assembly were targeted by NSA employees disguised as diplomats.[11]
Citing Snowden's documents, The Guardian reported that British officials had set up fake internet cafes at the 2009 G-20 London summit to spy on the delegates' use of computers, and to install key-logging software on the delegates' phones. This allowed British representatives to gain a "negotiating advantage" at the summit[12]
According to Snowden's interview with the South China Morning Post, the U.S. government has been hacking numerous non-military targets in China for years. Other high-priority targets include academic institutions such as the prestigious Tsinghua University in Beijing[13]
The Council of the European Union, with its headquarters at the Justus Lipsius building in Brussels, was targeted by NSA employees working near the headquarters of NATO. An NSA document dated September 2010 explicitly names the Europeans as a "location target".[14]
The reservations system of Russia's Aeroflot airline was hacked by the NSA[15]
Petrobras, currently the world's leader in offshore deepwater drilling, is a "prominent" target of the U.S. government[16]
From 2002 to 2013, the German Chancellor Angela Merkel was targeted by the U.S. Special Collection Service[17]

On June 6, 2013, Britain's The Guardian newspaper began publishing a series of revelations by an as yet unknown American whistleblower, revealed several days later to be ex-CIA and ex-NSA-contracted systems analyst Edward Snowden. Snowden gave a cache of documents to two journalists: Glenn Greenwald and Laura Poitras, Greenwald later estimated that the cache contains 15,000 – 20,000 documents, some very large and very detailed, and some very small.[18][19] In over two subsequent months of publications, it became clear that the NSA had operated a complex web of spying programs which allowed it to intercept internet and telephone conversations from over a billion users from dozens of countries around the world. Specific revelations were made about China, the European Union, Latin America, Iran and Pakistan, and Australia and New Zealand, however the published documentation reveals that many of the programs indiscriminately collected bulk information directly from central servers and internet backbones, which almost invariably carry and reroute information from distant countries.

Due to this central server and backbone monitoring, many of the programs overlapped and interrelated among one another. These programs were often carried out with the assistance of US entities such as the United States Department of Justice and the FBI,[20] were sanctioned by US laws such as the FISA Amendments Act, and the necessary court orders for them were signed by the secret Foreign Intelligence Surveillance Court. Some of the NSA's programs were directly aided by national and foreign intelligence agencies, Britain's GCHQ and Australia's DSD, as well as by large private telecommunications and internet corporations, such as Verizon, Telstra,[21] Google and Facebook.[22]

Purposes

According to the April 2013 summary of documents leaked by Snowden, other than to combat terrorism, these surveillance programs were employed to assess the foreign policy and economic stability of other countries,[23] and to gather "commercial secrets".[24]

In a statement addressed to the National Congress of Brazil in early August 2013, journalist Glenn Greenwald maintained that the U.S. government had used counter-terrorism as a pretext for clandestine surveillance in order to compete with other countries in the "business, industrial and economic fields".[25][26][27]

In an interview with Der Spiegel published on August 12, 2013, former NSA Director Michael Hayden admitted that "We (the NSA) steal secrets. We're number one in it". Hayden also added: "We steal stuff to make you safe, not to make you rich".[23]

According to documents seen by the news agency Reuters, these "secrets" were subsequently funnelled to authorities across the nation to help them launch criminal investigations of Americans.[28] Federal agents are then instructed to "recreate" the investigative trail in order to "cover up" where the information originated.[28]

Targets

According to the April 2013 summary of disclosures, the NSA defined its "intelligence priorities" on a scale of "1" (highest interest) to "5" (lowest interest).[23] It classified about 30 countries as "3rd parties", with whom it cooperates but also spies on:

  • Main targets: China, Russia, Iran, Pakistan and Afghanistan were ranked highly on the NSA's list of spying priorities, followed by France, Germany, Japan, and Brazil. The European Union's "international trade" and "economic stability" are also of interest.[23] Other high priority targets include Cuba, Israel, and North Korea.[29]
    • North Korea: Despite being a priority target, and despite continuous surveillance from sensors located outside the country, the NSA knew little about North Korea and Kim Jong Un.[29]
    • Syria: Syria was being closely monitored, particularly for signs of chemical weapons use.[29]
    • Iran: suspected nuclear sites that did not show up on satellite imagery were identified by new surveillance techniques.[29]
  • Irrelevant : From a US intelligence perspective, countries such as Cambodia, Laos and Nepal were largely irrelevant, as were most European countries like Finland, Denmark, Croatia and the Czech Republic.[23]

Other prominent targets included members and adherents of the internet group known as "Anonymous",[23] as well as potential whistleblowers.[30] According to Edward Snowden, the NSA targeted reporters who wrote critically about the government after 9/11.[31]

As part of a joint operation with the Central Intelligence Agency (CIA), the NSA deployed secret eavesdropping posts in eighty U.S. embassies and consulates worldwide.[11] The headquarters of NATO were also used by NSA experts to spy on the European Union.[32]

In 2013, documents provided by Edward Snowden revealed that the following intergovernmental organizations, diplomatic missions, and government ministries have been subjected to surveillance by the "Five Eyes":

Country/
Organization
Target Method(s)
 Brazil Ministry of Energy Collection of metadata records by the Communications Security Establishment of Canada (CSEC)[33]
 France Ministry of Foreign and European Affairs Infiltration of virtual private networks (VPN)[34]
Embassy of France in Washington, D.C
 India Embassy of India in Washington, D.C
Permanent Representative of India to the United Nations
 Mexico Secretariat of Public Security
  • Hacking of e-mail accounts as part of an operation code-named "Whitetamale"[36]
 European Union Council of the European Union in Brussels
Delegation to the United Nations in New York
Delegation to the United States in Washington, D.C
 United Nations United Nations Headquarters in New York
International Atomic Energy Agency in Vienna

International cooperation

The "Five Eyes" of Australia, Canada, New Zealand, the United Kingdom and the United States

During World War II, the BRUSA Agreement was signed by the governments of the United States and the United Kingdom for the purpose of intelligence sharing.[39] This was later formalized in the UKUSA Agreement of 1946 as a secret treaty. The full text of the agreement was released to the public on June 25, 2010.[40]

Although the treaty was later revised to include other countries such as Denmark, Germany, Ireland, Norway, Turkey, and the Philippines,[40] most of the information sharing has been performed by the so-called "Five Eyes",[41] a term referring to the following English-speaking western democracies and their respective intelligence agencies:

In 2013, media disclosures revealed how other government agencies have cooperated extensively with the "Five Eyes":

  • Denmark - The Politiets Efterretningstjeneste (PET) of Denmark, a domestic intelligence agency, exchanges data with the NSA on a regular basis, as part of a secret agreement with the United States.[42]
  • Germany – The Bundesnachrichtendienst (Federal Intelligence Service) of Germany systematically transfers metadata from German intelligence sources to the NSA. In December 2012 alone, Germany provided the NSA with 500 million metadata records.[43] The NSA granted the Bundesnachrichtendienst access to X-Keyscore,[44] in exchange for Mira4 and Veras.[43] In early 2013, Hans-Georg Maaßen, President of the German domestic security agency BfV, made several visits to the headquarters of the NSA. According to classified documents of the German government, Maaßen had agreed to transfer all data collected by the BfV via XKeyscore to the NSA.[45] In addition, the BfV has been working very closely with eight other U.S. government agencies, including the CIA.[46]
  • Japan - In 2011, the Japanese government was asked by the NSA to intercept fiber-optic cables carrying phone and Internet data from across the entire Asia-Pacific region, including China. However, the Japanese government refused to comply.[48]
  • Norway - The Norwegian Intelligence Service has confirmed that data collected by the agency is "shared with the Americans".[50] Kjell Grandhagen, head of Norwegian military intelligence told reporters at a news conference that "We share this information with partners, and partners share with us...We are talking about huge amounts of traffic data".[51]
Top secret documents leaked by Edward Snowden revealed that the "Five Eyes" have gained access to the majority of internet and telephone communications flowing throughout Europe, the United States, and other parts of the world.


Left: SEA-ME-WE 3, which runs across the Afro-Eurasian supercontinent from Japan to Northern Germany, is one of the most important submarine cables accessed by the "Five Eyes". Singapore, a former British colony in the Asia-Pacific region (blue dot), plays a vital role in intercepting internet and telecommunications traffic heading from Australia/Japan to Europe, and vice versa. An intelligence sharing agreement between Singapore and Australia allows the rest of the "Five Eyes" to gain access to SEA-ME-WE 3.[52]
Right:TAT-14, a telecommunications cable linking Europe with the United States, was identified as one of few assets of "Critical Infrastructure and Key Resources" of the USA on foreign territory. In 2013, it was revealed that British officials "pressured a handful of telecommunications and internet companies" to allow the British government to gain access to TAT-14.[55]

According to the leaked documents, aside from the Five Eyes, most other Western countries have also participatied in the NSA surveillance system and are sharing information with each other.[56] However, being a partner of the NSA does not automatically exempt a country from being targeted by the NSA. According to an internal NSA document leaked by Snowden, "We (the NSA) can, and often do, target the signals of most 3rd party foreign partners."[57]

Timeline of disclosures

Edward Snowden's disclosures of the NSA's surveillance activities are a continuation of news leaks which have been ongoing since the early 2000s. One year after the September 11, 2001 attacks, former U.S. intelligence official William Binney, was publicly critical of the NSA for spying on U.S. citizens.[58]

Further disclosures followed. On December 16, 2005, The New York Times published a report under the headline "Bush Lets U.S. Spy on Callers Without Courts."[59] In 2006, further evidence of the NSA's domestic surveillance of U.S. citizens was provided by USA Today. The newspaper released a report on May 11, 2006 regarding the NSA's "massive database" of phone records collected from "tens of millions" of U.S. citizens. According to USA Today, these phone records were provided by several telecom companies such as AT&T, Verizon and BellSouth.[60] In 2008, the security analyst Babak Pasdar revealed the existence of the so-called "Quantico circuit" that he and his team had set up in 2003. The circuit provided the U.S. federal government with a backdoor into the network of an unnamed wireless provider, which was later independently identified as Verizon.[61]

Snowden made his first contact with journalist Glenn Greenwald of The Guardian in late 2012.[62] The timeline of mass surveillance disclosures by Snowden continued through 2013.

By category

Documents leaked by Edward Snowden in 2013 include court orders, memos, and policy documents related to a wide range of surveillance activities.

Impact

The global surveillance disclosure has caused tension in the bilateral relations of the United States with several of its allies and economic partners as well as in its relationship with the European Union. On August 12, 2013, President Obama announced the creation of an "independent" panel of "outside experts" to review the NSA's surveillance programs. The panel is due to be established by the Director of National Intelligence, James R. Clapper, who will consult and provide assistance to them.[63]

According to a survey undertaken by the human rights group PEN International, these disclosures have had a chilling effect on American writers. Fearing the risk of being targeted by government surveillance, 28% of PEN's American members have curbed their usage of social media, and 16% have self-censored themselves by avoiding controversial topics in their writings.[64]

See also

References

  1. ^ Cauley, Leslie. "NSA has massive database of Americans' phone calls". "USA Today".
  2. ^ "Ex-CIA employee source of leak on PRISM program". France 24. Retrieved September 17, 2013. Snowden's decision to reveal his identity and whereabouts lifts the lid on one of the biggest security leaks in US history and escalates a story that has placed a bright light on Obama's extensive use of secret surveillance.
  3. ^ Fiddler, Stephen (July 1, 2013). Echoes of Echelon in Charges of NSA Spying in Europe. The Wall Street Journal.
  4. ^ Pre-Emption - The Nsa And The Telecoms | Spying On The Home Front | FRONTLINE | PBS
  5. ^ Cohen, Martin. No Holiday. New York: Disinformation Company Ltd. ISBN 978-1-932857-29-0. {{cite book}}: |access-date= requires |url= (help)
  6. ^ Peggy Becker (October 1999). DEVELOPMENT OF SURVEILLANCE TECHNOLOGY AND RISK OF ABUSE OF ECONOMIC INFORMATION (Report). STOA, European Parliament. Retrieved November 3, 2013. {{cite report}}: Cite has empty unknown parameter: |coauthors= (help)
  7. ^ Snowden has ‘thousands’ of damaging NSA documents, says Greenwald
  8. ^ Glenn Greenwald and Ewen MacAskill. "Boundless Informant: the NSA's secret tool to track global surveillance data". The Guardian. Retrieved June 12, 2013.
  9. ^ "Senators: Limit NSA snooping into US phone records". Associated Press. Retrieved October 15, 2013. "Is it the goal of the NSA to collect the phone records of all Americans?" Udall asked at Thursday's hearing. "Yes, I believe it is in the nation's best interest to put all the phone records into a lockbox that we could search when the nation needs to do it. Yes," Alexander replied.
  10. ^ Siobhan Gorman. "Meltdowns Hobble NSA Data Center". The Wall Street Journal. Retrieved October 19, 2013. The Utah facility, one of the Pentagon's biggest U.S. construction projects, has become a symbol of the spy agency's surveillance prowess, which gained broad attention in the wake of leaks from NSA contractor Edward Snowden. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  11. ^ a b Laura Poitras, Marcel Rosenbach and Holger Stark. "Codename 'Apalachee': How America Spies on Europe and the UN". Der Spiegel. p. 2. Retrieved August 26, 2013.
  12. ^ MacAskill, Ewen; Davies, Nick; Hopkins, Nick; Borger, Julian; Ball, James (June 17, 2013). "GCHQ intercepted foreign politicians' communications at G20 summits". The Guardian. London.{{cite news}}: CS1 maint: multiple names: authors list (link)
  13. ^ "Edward Snowden: US government has been hacking Hong Kong and China for years". South China Morning Post. Retrieved September 9, 2013. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  14. ^ Laura Poitras, Marcel Rosenbach, Fidelius Schmid and Holger Stark. "Attacks from America: NSA Spied on European Union Offices". Der Spiegel. Retrieved September 9, 2013. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)CS1 maint: multiple names: authors list (link)
  15. ^ Cite error: The named reference Spiegel20130831 was invoked but never defined (see the help page).
  16. ^ ROMERO, SIMON. "N.S.A. Spied on Brazilian Oil Company, Report Says". The New York Times. Retrieved September 9, 2013. {{cite news}}: Italic or bold markup not allowed in: |publisher= (help)
  17. ^ "US bugged Merkel's phone from 2002 until 2013, report claims". BBC. Retrieved October 27, 2013.
  18. ^ Duran-Sanchez, Mabel (August 10, 2013). "Greenwald Testifies to Brazilian Senate about NSA Espionage Targeting Brazil and Latin America". Retrieved August 13, 2013.
  19. ^ "Glenn Greenwald afirma que documentos dizem respeito à interesses comerciais do governo americano". August 6, 2013. Retrieved August 13, 2013.
  20. ^ Cite error: The named reference microsoft was invoked but never defined (see the help page).
  21. ^ Bridie Jabour in Sydney (July 12, 2013). "Telstra signed deal that would have allowed US spying". The Guardian.
  22. ^ The first three days of revelations were: the FISC court order that Verizon provide bulk metadata on its customers to the NSA; presentation slides explaining the cooperation of nine US internet giants through the PRISM program; and the bulk collection of Chinese users' text messages, which coincided with Xi Jinping's visit to California to meet Barack Obama.
  23. ^ a b c d e f Laura Poitras, Marcel Rosenbach and Holger Stark. "Ally and Target: US Intelligence Watches Germany Closely". Der Spiegel. Retrieved August 13, 2013.
  24. ^ "Colombia asks Kerry to explain NSA spying". The Washington Post. Retrieved August 13, 2013.
  25. ^ "Greenwald diz que espionagem dá vantagens comerciais e industriais aos Estados Unidos" (in Portuguese). Federal Senate of Brazil. Retrieved August 13, 2013.
  26. ^ "Greenwald diz que EUA espionam para obter vantagens comerciais" (in Portuguese). Deutsche Welle. Retrieved August 13, 2013.
  27. ^ "NSA's activity in Latin America is 'collection of data on oil and military purchases from Venezuela, energy and narcotics from Mexico' – Greenwald". Voice of Russia. Retrieved August 13, 2013.
  28. ^ a b "Exclusive: U.S. directs agents to cover up program used to investigate Americans". Reuters. Retrieved August 14, 2013.
  29. ^ a b c d Cite error: The named reference WaPo20130829 was invoked but never defined (see the help page).
  30. ^ Maass, Peter. "How Laura Poitras Helped Snowden Spill His Secrets". The New York Times. Retrieved August 13, 2013.
  31. ^ Easley, Jonathan. "Snowden: NSA targeted journalists critical of government after 9/11". The Hill. Retrieved August 14, 2013.
  32. ^ Laura Poitras, Marcel Rosenbach, Fidelius Schmid and Holger Stark. "Attacks from America: NSA Spied on European Union Offices". Der Spiegel. Retrieved August 26, 2013.{{cite web}}: CS1 maint: multiple names: authors list (link)
  33. ^ "Report: Canada spies targeted Brazil mine ministry". Associated Press. Retrieved October 7, 2013.
  34. ^ "'Success Story': NSA Targeted French Foreign Ministry". Der Spiegel. Retrieved September 24, 2013. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  35. ^ a b Shobhan Saxena. "NSA planted bugs at Indian missions in D.C., U.N." The Hindu. Retrieved September 24, 2013. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  36. ^ Jens Glüsing, Laura Poitras, Marcel Rosenbach and Holger Stark. "Fresh Leak on US Spying: NSA Accessed Mexican President's Email". Der Spiegel. Retrieved October 20, 2013. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)CS1 maint: multiple names: authors list (link)
  37. ^ Laura Poitras, Marcel Rosenbach, Fidelius Schmid und Holger Stark. "Geheimdokumente: NSA horcht EU-Vertretungen mit Wanzen aus". Der Spiegel (in German). Retrieved June 29, 2013.{{cite web}}: CS1 maint: multiple names: authors list (link)
  38. ^ a b c d "US-Geheimdienst hörte Zentrale der Vereinten Nationen ab". Der Spiegel (in German). Retrieved August 25, 2013.
  39. ^ Cite error: The named reference BRUSA papers was invoked but never defined (see the help page).
  40. ^ a b Cite error: The named reference Guardian 2010 was invoked but never defined (see the help page).
  41. ^ a b c d e f "5-nation spy alliance too vital for leaks to harm". Associated Press. Retrieved August 29, 2013.
  42. ^ a b c "NDB und NSA kooperieren enger als bisher bekannt" (in German). Handelszeitung. Retrieved September 18, 2013.
  43. ^ a b unlisted (August 3, 2013). "Überwachung: BND leitet massenhaft Metadaten an die NSA weiter". Der Spiegel (in German). Retrieved August 3, 2013.
  44. ^ 'Prolific Partner': German Intelligence Used NSA Spy Program, Der Spiegel. Retrieved July 21, 2013.
  45. ^ "Verfassungsschutz beliefert NSA" (in German). Süddeutsche Zeitung. Retrieved September 14, 2013. Seit Juli 2013 testet der Verfassungsschutz die Späh- und Analysesoftware XKeyscore. Sollte der Geheimdienst das Programm im Regelbetrieb nutzen, hat sich das BfV verpflichtet, alle Erkenntnisse mit der NSA zu teilen. Das hatte der Präsident des Bundesamtes, Hans-Georg Maaßen, dem US-Dienst zugesichert. Im Januar und Mai war Maaßen zu Besuchen bei der NSA. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  46. ^ "Verfassungsschutz beliefert NSA" (in German). Süddeutsche Zeitung. Retrieved September 14, 2013. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  47. ^ Glenn Greenwald, Laura Poitras and Ewen MacAskill (September 11, 2013). "NSA shares raw intelligence including Americans' data with Israel". The Guardian. Retrieved September 14, 2013.
  48. ^ "NSA asked Japan to tap regionwide fiber-optic cables in 2011". The Japan Times. Retrieved October 28, 2013. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  49. ^ Olmer, Bart. "Ook AIVD bespiedt internetter" (in Dutch). De Telegraaf. Retrieved September 10, 2013. Niet alleen Amerikaanse inlichtingendiensten monitoren internetters wereldwijd. Ook Nederlandse geheime diensten krijgen informatie uit het omstreden surveillanceprogramma 'Prism'. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  50. ^ "Norway denies U.S. spying, said it shared intelligence with U.S." Reuters. Retrieved 19 November 2013.
  51. ^ Kjetil Malkenes Hovland. "Norway Monitored Phone Traffic and Shared Data With NSA". The Wall Street Journal. Retrieved 19 November 2013. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  52. ^ a b Dorling, Philip. "Australian spies in global deal to tap undersea cables". The Sydney Morning Herald. Retrieved August 29, 2013.
  53. ^ a b "Sverige deltog i NSA-övervakning" (in Swedish). Svenska Dagbladet. Retrieved September 10, 2013. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  54. ^ Christof Moser and Alan Cassidy. "Geheimdienst-Aufsicht will Kooperation des NDB mit der NSA prüfen" (in German). Schweiz am Sonntag. Retrieved September 18, 2013. Die NSA hat sowohl mit der Schweiz wie Dänemark eine geheime Vereinbarung abgeschlossen, die den Austausch von Geheimdienstinformationen regelt. Die Vereinbarung berechtigt die NSA, eigene Schlüsselbegriffe in die Abhörsysteme beider Staaten einspeisen zu lassen. Im Tausch für damit gewonnene Erkenntnisse der schweizerischen und dänischen Auslandaufklärung erhalten der NDB und der dänische Geheimdienst PET von der NSA Informationen, die sie im eigenen Land aufgrund gesetzlicher Schranken nicht selber sammeln dürfen. Das geheime Abkommen macht auch die Schweiz zu einem NSA-Horchposten.
  55. ^ Cite error: The named reference SZAug28 was invoked but never defined (see the help page).
  56. ^ "Edward Snowden Interview: The NSA and Its Willing Helpers". Der Spiegel. Retrieved August 29, 2013. Snowden: Yes, of course. We're (the NSA) in bed together with the Germans the same as with most other Western countries.
  57. ^ Laura Poitras, Marcel Rosenbach and Holger Stark. "Ally and Target: US Intelligence Watches Germany Closely". Der Spiegel. Retrieved August 29, 2013. The NSA classifies about 30 other countries as "3rd parties," with whom it cooperates, though with reservations. Germany is one of them. "We can, and often do, target the signals of most 3rd party foreign partners," the secret NSA document reads.
  58. ^ Shorrock, Tim (April 15, 2013). "The Untold Story: Obama's Crackdown on Whistleblowers: The NSA Four reveal how a toxic mix of cronyism and fraud blinded the agency before 9/11". The Nation.
  59. ^ JAMES RISEN and ERIC LICHTBLAU (December 16, 2005). "Bush Lets U.S. Spy on Callers Without Courts". The New York Times. {{cite news}}: Italic or bold markup not allowed in: |publisher= (help)
  60. ^ Leslie Cauley (5/11/2006). "NSA has massive database of Americans' phone calls". USA Today. {{cite web}}: Check date values in: |year= (help); Italic or bold markup not allowed in: |publisher= (help)
  61. ^ Poulsen, Kevin. "Whistle-Blower: Feds Have a Backdoor Into Wireless Carrier — Congress Reacts". Wired. Retrieved August 14, 2013.
  62. ^ Peter Maass (August 18, 2013), How Laura Poitras Helped Snowden Spill His Secrets The New York Times
  63. ^ Cite error: The named reference obamafalloutsp was invoked but never defined (see the help page).
  64. ^ Cite error: The named reference penc was invoked but never defined (see the help page).

Further reading