Misplaced Pages

List of NSA controversies: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Next edit →Content deleted Content addedVisualWikitext
Revision as of 06:13, 17 December 2021 edit Thewolfchild (talk | contribs)Extended confirmed users, New page reviewers, Pending changes reviewers, Rollbackers51,833 edits Created page with '{{Dynamic list}} This is a '''list of NSA controversies'''. During it's history the National Security Agency has been involved in a number of controversies. == Controversy and litigation == {{main|Mass surveillance in the United States}} In the United States, at least since 2001,<ref> by Lawre...'Tag: citing a blog or free web hostNext edit →
(No difference)

Revision as of 06:13, 17 December 2021

This is a dynamic list and may never be able to satisfy particular standards for completeness. You can help by adding missing items with reliable sources.

This is a list of NSA controversies. During it's history the National Security Agency has been involved in a number of controversies.

Controversy and litigation

Main article: Mass surveillance in the United States

In the United States, at least since 2001, there has been legal controversy over what signal intelligence can be used for and how much freedom the National Security Agency has to use signal intelligence. In 2015, the government made slight changes in how it uses and collects certain types of data, specifically phone records. The government was not analyzing the phone records as of early 2019. The surveillance programs were deemed unlawful in September 2020 in a court of appeals case.

Warrantless wiretaps

Main article: NSA warrantless surveillance (2001–07)

On December 16, 2005, The New York Times reported that, under White House pressure and with an executive order from President George W. Bush, the National Security Agency, in an attempt to thwart terrorism, had been tapping phone calls made to persons outside the country, without obtaining warrants from the United States Foreign Intelligence Surveillance Court, a secret court created for that purpose under the Foreign Intelligence Surveillance Act (FISA).

One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.

Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President's Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court's ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA's warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007, the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit.

On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the George W. Bush Presidency. The lawsuit challenged the National Security Agency's (NSA's) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.

In September 2008, the Electronic Frontier Foundation (EFF) filed a class action lawsuit against the NSA and several high-ranking officials of the Bush administration, charging an "illegal and unconstitutional program of dragnet communications surveillance," based on documentation provided by former AT&T technician Mark Klein.

As a result of the USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case, the agency must ask the telecom companies for the record, which will only be kept for six months. The NSA's use of large telecom companies to assist it with its surveillance efforts has caused several privacy concerns.

AT&T Internet monitoring

Further information: Hepting v. AT&T, Jewel v. NSA, Mark Klein, and NSA warrantless surveillance controversy

In May 2008, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between U.S. citizens.

Data mining

NSA was reported in 2008 to use its computing capability to analyze "transactional" data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.

A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden. mentioned in 'Recommendation 30' on page 37, "...that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application." Retired cybersecurity expert Richard A. Clarke was a group member and stated on April 11, 2014, that NSA had no advance knowledge of Heartbleed.

Illegally obtained evidence

Further information: Parallel construction § Parallel construction in the United States Drug Enforcement Administration

In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.

Barack Obama administration

In the months leading to April 2009, the NSA intercepted the communications of U.S. citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws. United States Attorney General Eric Holder resumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.

Polls conducted in June 2013 found divided results among Americans regarding NSA's secret data collection. Rasmussen Reports found that 59% of Americans disapprove, Gallup found that 53% disapprove, and Pew found that 56% are in favor of NSA data collection.

Section 215 metadata collection

On April 25, 2013, the NSA obtained a court order requiring Verizon's Business Network Services to provide metadata on all calls in its system to the NSA "on an ongoing daily basis" for a three-month period, as reported by The Guardian on June 6, 2013. This information includes "the numbers of both parties on a call ... location data, call duration, unique identifiers, and the time and duration of all calls" but not "he contents of the conversation itself". The order relies on the so-called "business records" provision of the Patriot Act.

In August 2013, following the Snowden leaks, new details about the NSA's data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at "selected communications links" and automatically analyzed for keywords or other "selectors". Emails that do not match are deleted.

The utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA "had no discernible impact on preventing acts of terrorism."

Defenders of the program said that while metadata alone cannot provide all the information necessary to prevent an attack, it assures the ability to "connect the dots" between suspect foreign numbers and domestic numbers with a speed only the NSA's software is capable of. One benefit of this is quickly being able to determine the difference between suspicious activity and real threats. As an example, NSA director General Keith B. Alexander mentioned at the annual Cybersecurity Summit in 2013, that metadata analysis of domestic phone call records after the Boston Marathon bombing helped determine that rumors of a follow-up attack in New York were baseless.

In addition to doubts about its effectiveness, many people argue that the collection of metadata is an unconstitutional invasion of privacy. As of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979). A prominent opponent of the data collection and its legality is U.S. District Judge Richard J. Leon, who issued a report in 2013 in which he stated: "I cannot imagine a more 'indiscriminate' and 'arbitrary invasion' than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval...Surely, such a program infringes on 'that degree of privacy' that the founders enshrined in the Fourth Amendment".

As of May 7, 2015, the United States Court of Appeals for the Second Circuit ruled that the interpretation of Section 215 of the Patriot Act was wrong and that the NSA program that has been collecting Americans' phone records in bulk is illegal. It stated that Section 215 cannot be clearly interpreted to allow government to collect national phone data and, as a result, expired on June 1, 2015. This ruling "is the first time a higher-level court in the regular judicial system has reviewed the N.S.A. phone records program." The replacement law known as the USA Freedom Act, which will enable the NSA to continue to have bulk access to citizens' metadata but with the stipulation that the data will now be stored by the companies themselves. This change will not have any effect on other Agency procedures – outside of metadata collection – which have purportedly challenged Americans' Fourth Amendment rights;, including Upstream collection, a mass of techniques used by the Agency to collect and store American's data/communications directly from the Internet backbone.

Under the Upstream collection program, the NSA paid telecommunications companies hundreds of millions of dollars in order to collect data from them. While companies such as Google and Yahoo! claim that they do not provide "direct access" from their servers to the NSA unless under a court order, the NSA had access to emails, phone calls and cellular data users. Under this new ruling, telecommunications companies maintain bulk user metadata on their servers for at least 18 months, to be provided upon request to the NSA. This ruling made the mass storage of specific phone records at NSA datacenters illegal, but it did not rule on Section 215's constitutionality.

Fourth Amendment encroachment

In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted "alert list" from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring. Eleven percent of these monitored phone lines met the agency's legal standard for "reasonably articulable suspicion" (RAS).

The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people's movements and relationships in detail. The NSA has been reported to have access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk, and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year. It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies to leave "backdoors" into their systems), so that the majority of encryption is inadvertently vulnerable to different forms of attack.

Domestically, the NSA has been proven to collect and store metadata records of phone calls, including over 120 million US Verizon subscribers, as well as intercept vast amounts of communications via the internet (Upstream). The government's legal standing had been to rely on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered "relevant" to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism. The NSA also supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to "recreate" the investigative trail via parallel construction.

The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed "radical" by the NSA.

According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.

Congressional oversight

Excerpt of James Clapper's testimony before the Senate Select Committee on Intelligence

Despite White House claims that these programs have congressional oversight, many members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them. The United States Foreign Intelligence Surveillance Court, the secret court charged with regulating the NSA's activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules. It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions. NSA officers have even used data intercepts to spy on love interests; "most of the NSA violations were self-reported, and each instance resulted in administrative action of termination."

The NSA has "generally disregarded the special rules for disseminating United States person information" by illegally sharing its intercepts with other law enforcement agencies. A March 2009 FISA Court opinion, which the court released, states that protocols restricting data queries had been "so frequently and systemically violated that it can be fairly said that this critical element of the overall ... regime has never functioned effectively." In 2011 the same court noted that the "volume and nature" of the NSA's bulk foreign Internet intercepts was "fundamentally different from what the court had been led to believe". Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.

Legal opinions on the NSA's bulk collection program have differed. In mid-December 2013, U.S. District Judge Richard Leon ruled that the "almost-Orwellian" program likely violates the Constitution, and wrote, "I cannot imagine a more 'indiscriminate' and 'arbitrary invasion' than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on 'that degree of privacy' that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware 'the abridgement of freedom of the people by gradual and silent encroachments by those in power,' would be aghast."

Later that month, U.S. District Judge William Pauley ruled that the NSA's collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, "a bulk telephony metadata collection program a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data" and noted that a similar collection of data prior to 9/11 might have prevented the attack.

Official responses

At a March 2013 Senate Intelligence Committee hearing, Senator Ron Wyden asked Director of National Intelligence James Clapper, "does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Clapper replied "No, sir. ... Not wittingly. There are cases where they could inadvertently perhaps collect, but not wittingly." This statement came under scrutiny months later, in June 2013, details of the PRISM surveillance program were published, showing that "the NSA apparently can gain access to the servers of nine Internet companies for a wide range of digital data." Wyden said that Clapper had failed to give a "straight answer" in his testimony. Clapper, in response to criticism, said, "I responded in what I thought was the most truthful, or least untruthful manner." Clapper added, "There are honest differences on the semantics of what -- when someone says 'collection' to me, that has a specific meaning, which may have a different meaning to him."

NSA whistle-blower Edward Snowden additionally revealed the existence of XKeyscore, a top secret NSA program that allows the agency to search vast databases of "the metadata as well as the content of emails and other internet activity, such as browser history," with capability to search by "name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used." XKeyscore "provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst."

Regarding the necessity of these NSA programs, Alexander stated on June 27, 2013, that the NSA's bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist "events", including 13 in the US, and in all but one of these cases had provided the initial tip to "unravel the threat stream". On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were "close" to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.

The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.

The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country, and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.

An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.

Responsibility for international ransomware attack

An exploit dubbed EternalBlue, which was claimed to have been created by the NSA by hacker group The Shadow Brokers and whistleblower Edward Snowden, was used in the unprecedented worldwide WannaCry ransomware attack in May 2017. The exploit had been leaked online by a hacking group, The Shadow Brokers, nearly a month prior to the attack. A number of experts have pointed the finger at the NSA's non-disclosure of the underlying vulnerability, and their loss of control over the EternalBlue attack tool that exploited it. Edward Snowden said that if the NSA had "privately disclosed the flaw used to attack hospitals when they found it, not when they lost it, might not have happened". Misplaced Pages co-founder, Jimmy Wales, stated that he joined "with Microsoft and the other leaders of the industry in saying this is a huge screw-up by the government ... the moment the NSA found it, they should have notified Microsoft so they could quietly issue a patch and really chivvy people along, long before it became a huge problem."

2015 Michelle Obama email hack

Former employee David Evenden, who had left the NSA to work for US defense contractor Cyperpoint at a position in the United Arab Emirates, was tasked with hacking UAE neighbor Qatar in 2015 to determine if they were funding terrorist group Muslim Brotherhood. He quit the company after learning his team had hacked Qatari Sheikha Moza bint Nasser's email exchanges with Michelle Obama, just prior to her visit to Doha. Upon Everden's return to the US, he reported his experiences to the FBI. The incident highlights a growing trend of former NSA employees and contractors leaving the agency to start up their own firms, and then hiring out to countries like Turkey, Sudan and even Russia, a country involved in numerous cyberattacks against the US.

Loujain al-Hathloul Hacking

In a 9 December 2021 lawsuit, Saudi women’s rights activist Loujain al-Hathloul sued three US intelligence and military officials – Marc Baier, Daniel Gericke and Ryan Adams – for hacking her. Baier formerly worker with the NSA. The lawsuit was filed on behalf of Loujain by the Electronic Frontier Foundation, a non-profit organization in the US federal court. Loujain served 1001 days in jail to end a ban on women driving in Saudi Arabia after being hacked for the Saudi government under a project codenamed “Purple Sword” overseen by DarkMatter, an Abu Dhabi-based cybersecurity firm accused in the past for conducting mass surveillance.

2021 Denmark-NSA collaborative surveillance scandal

Further information: Operation Dunhammer

In May 2021, it was reported that Danish Defence Intelligence Service collaborated with NSA to wiretap on fellow EU members and leaders, leading to wide backlash among EU countries and demands for explanation from Danish and American governments.

See also

External links

References

  1. Echelon and the Legal Restraints on Signals Intelligence: A Need For Reevalualtion by Lawrence D. Sloan on April 30, 2001
  2. Liu, Edward C. et. al. (May 21, 2015) Overview of Constitutional Challenges to NSA Collection Activities. Washington, DC: Congressional Research Service.
  3. Sanger, David E. (3 February 2015). "Obama's changes to NSA data collection published on February 5, 2015, by Christina Murray quoting David E. Sanger of The New York Times". The New York Times.
  4. Savage, Charlie (2019-03-04). "Disputed N.S.A. Phone Program Is Shut Down, Aide Says". The New York Times. ISSN 0362-4331. Retrieved 2019-03-06.
  5. "NSA surveillance exposed by Snowden ruled unlawful". BBC News. 3 September 2020. Retrieved 4 September 2020.
  6. James Risen & Eric Lichtblau (December 16, 2005), Bush Lets U.S. Spy on Callers Without Courts, The New York Times
  7. "Gwu.edu". Gwu.edu. Retrieved October 9, 2013.
  8. "6th Circuit Court of Appeals Decision" (PDF). Archived from the original (PDF) on January 17, 2013. Retrieved October 9, 2013.
  9. Mike Rosen-Molina (May 19, 2007). "Ex-Guantanamo lawyers sue for recordings of client meetings". The Jurist. Archived from the original on May 2, 2008. Retrieved May 22, 2007.
  10. "CCR v. Bush". Center for Constitutional Rights. Retrieved June 15, 2009.
  11. KJ Mullins (September 20, 2008). "Jewel Vs. NSA Aims To Stop Illegal Surveillance". Digital Journal. Retrieved December 30, 2011.
  12. Jewel v. NSA (complaint). September 18, 2008. Electronic Frontier Foundation. Retrieved December 30, 2011.
  13. Kravets, David (July 15, 2009). "Obama Claims Immunity, As New Spy Case Takes Center Stage". Wired. Retrieved December 30, 2011.
  14. Van Loo, Rory (2019-10-01). "The Missing Regulatory State: Monitoring Businesses in an Age of Surveillance". Vanderbilt Law Review. 72 (5): 1563.
  15. "For Your Eyes Only?". NOW. February 16, 2007. on PBS
  16. Gorman, Siobahn (March 10, 2008). "NSA's Domestic Spying Grows As Agency Sweeps Up Data". The Wall Street Journal Online. Archived from the original on January 24, 2009. Retrieved March 14, 2014.
  17. Liberty and Security in a Changing World Archived 2017-01-24 at the Wayback Machine – Report and Recommendations of The President's Review Group on Intelligence and Communications Technologies, December 12, 2013, 308 pages
  18. Mark Hosenball; Will Dunham (April 11, 2014). "White House, spy agencies deny NSA exploited 'Heartbleed' bug". Reuters. Archived from the original on April 15, 2014. Retrieved April 16, 2014.
  19. John Shiffman and Kristina Cooke (August 5, 2013) Exclusive: U.S. directs agents to cover up program used to investigate Americans Archived 2013-08-14 at the Wayback Machine. Reuters. Retrieved August 12, 2013.
  20. John Shiffman and David Ingram (August 7, 2013) Exclusive: IRS manual detailed DEA's use of hidden intel evidence. Reuters. Retrieved August 12, 2013.
  21. Lichtblau, Eric & Risen, James (April 15, 2009). "N.S.A.'s Intercepts Exceed Limits Set by Congress". The New York Times. Retrieved April 15, 2009.
  22. Ackerman, Spencer (April 16, 2009). "NSA Revelations Spark Push to Restore FISA". The Washington Independent. Center for Independent Media. Archived from the original on April 18, 2009. Retrieved April 19, 2009.
  23. "Statistics on whether the NSA's Secret Data Collection is Acceptable". Statista. Retrieved July 19, 2013.
  24. "59% Oppose Government's Secret Collecting of Phone Records". Rasmussen Reports. June 9, 2013. Retrieved July 19, 2013.
  25. Newport, Frank (June 12, 2013). "Americans Disapprove of Government Surveillance Programs". Gallup. Retrieved July 19, 2013.
  26. "Majority Views NSA Phone Tracking as Acceptable Anti-terror Tactic". Pew Research Center. June 10, 2013. Retrieved July 19, 2013.
  27. Glenn Greenwald (June 6, 2013). "Revealed: NSA collecting phone records of millions of Americans daily". The Guardian. London. Retrieved June 6, 2013.
  28. Charlie Savage, Edward Wyatt (2013-06-05). "U.S. Is Secretly Collecting Records of Verizon Calls". The New York Times.
  29. Savage, Charlie (August 8, 2013). "N.S.A. Said to Search Content of Messages to and From U.S". The New York Times. Retrieved August 13, 2013.
  30. Nakashima, Ellen. "NSA phone record collection does little to prevent terrorist attacks, group says", The Washington Post, January 12, 2014
  31. ^ Nakashima, Ellen. / "NSA chief defends collecting Americans' data", The Washington Post, September 25, 2013
  32. Read "Engaging Privacy and Information Technology in a Digital Age" at NAP.edu. 2007. doi:10.17226/11896. ISBN 978-0-309-10392-3.
  33. Federal judge rules NSA program is likely unconstitutional, The Washington Post, December 16, 2013
  34. New Rules for the National Security Agency by the Editorial Board on May 10, 2015
  35. ^ Charlie Savage, Jonathan Weisman (2015-05-07). "N.S.A. Collection of Bulk Call Data is Ruled Illegal". The New York Times.
  36. "Rand Paul vs. Washington DC on the USA Freedom Act". HotAir. Archived from the original on 2015-06-02. Retrieved 2015-06-02.
  37. Top Level Telecommunications, Slides about NSA's Upstream collection, January 17, 2014
  38. NSA paying U.S. companies for access to communications networks by Craig Timberg and Barton Gellman on August 29, 2013
  39. NSA PRISM Controversy: Apple, Facebook, Google, more deny knowledge by Digital Spy on June 6, 2013
  40. Microsoft, Facebook, Google and Yahoo release US surveillance requests by Spencer Ackerman and Dominic Rushe on February 3, 2014
  41. ^ Memorandum of the United States in Response to the Court's Order Dated January 28, 2009 (PDF). Washington DC: Foreign Intelligence Surveillance Court Washington DC. January 28, 2009. p. 11.
  42. Greenberg, Andy. "NSA Secretly Admitted Illegally Tracking Thousands Of 'Alert List' Phone Numbers For Years". Forbes. Retrieved February 25, 2014.
  43. Brandon, Russel (10 September 2013). "NSA illegally searched 15,000 suspects' phone records, according to declassified report". The Verge. Retrieved February 25, 2014.
  44. Timm, Trevor (10 September 2013). "Government Releases NSA Surveillance Docs and Previously Secret FISA Court Opinions in Response to EFF Lawsuit". Electronic Frontier Foundation. Retrieved February 25, 2014.
  45. Barton Gellman and Ashton Solanti, December 5, 2013, "NSA tracking cellphone locations worldwide, Snowden documents show", The Washington Post. Retrieved December 7, 2013.
  46. ^ Greenwald, Glenn; MacAskill, Ewen (June 6, 2013). "NSA Prism program taps in to user data of Apple, Google and others". The Guardian. Retrieved June 15, 2013.
  47. ^ Gellman and Soltani, October 15, 2013 "NSA collects millions of e-mail address books globally", The Washington Post. Retrieved October 16, 2013.
  48. Perlroth, Larson and Shane, "N.S.A. Able to Foil Basic Safeguards of Privacy on Web", The New York Times September 5, 2013. Retrieved September 23, 2013.
  49. Arthur, Charles "Academics criticise NSA and GCHQ for weakening online encryption", The Guardian September 16, 2013. Retrieved September 23, 2013.
  50. "Senators: Limit NSA snooping into US phone records". Associated Press. Retrieved October 15, 2013. "Is it the goal of the NSA to collect the phone records of all Americans?" Udall asked at Thursday's hearing. "Yes, I believe it is in the nation's best interest to put all the phone records into a lockbox that we could search when the nation needs to do it. Yes," Alexander replied.
  51. Glenn Greenwald (June 6, 2013). "NSA collecting phone records of millions of Verizon customers daily". The Guardian. Retrieved September 16, 2013.
  52. Court Reveals 'Secret Interpretation' Of The Patriot Act, Allowing NSA To Collect All Phone Call Data, September 17, 2013. Retrieved September 19, 2013.
  53. "Exclusive: U.S. directs agents to cover up program used to investigate Americans". Reuters. August 5, 2013. Archived from the original on August 14, 2013. Retrieved August 14, 2013.
  54. Glenn Greenwald, Ryan Gallagher & Ryan Grim, November 26, 2013, "Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radicalizers'", Huffington Post. Retrieved November 28, 2013.
  55. "Vast majority of NSA spy targets are mistakenly monitored". Philadelphia News.Net. Archived from the original on 2014-07-14. Retrieved July 7, 2014.
  56. Greenwald, Glen, "Members of Congress denied access to basic information about NSA", The Guardian, August 4, 2013. Retrieved September 23, 2013.
  57. Loennig, C., "Court: Ability to police U.S. spying program limited", The Washington Post, August 16, 2013. Retrieved September 23, 2013.
  58. Gellman, B. NSA broke privacy rules thousands of times per year, audit finds Archived 2013-12-18 at the Wayback Machine, The Washington Post, August 15, 2013. Retrieved September 23, 2013.
  59. Gorman, S. NSA Officers Spy on Love Interests, Wall St Journal, August 23, 2013. Retrieved September 23, 2013.
  60. Andrea Peterson, LOVEINT: When NSA officers use their spying power on love interests, The Washington Post (August 24, 2013).
  61. ^ Spencer Ackerman, November 19, 2013, "Fisa court documents reveal extent of NSA disregard for privacy restrictions", The Guardian. Retrieved November 21, 2013.
  62. John D Bates (October 3, 2011). "[redacted]". p. 16.
  63. Ellen Nakashima, Julie Tate and Carol Leonnig (September 10, 2013). "Declassified court documents highlight NSA violations in data collection for surveillance". The Washington Post. Retrieved September 14, 2013.
  64. Richard Leon, December 16, 2013, Memorandum Opinion, Klayman vs. Obama. U.S. District Court for the District of Columbia. Reproduced on The Guardian website. Retrieved February 3, 2013.
  65. Bazzle, Steph (December 27, 2013). "Judge Says NSA's Data Collection Is Legal". Indyposted. Archived from the original on December 28, 2013. Retrieved December 28, 2013.
  66. ^ Kessler, Glenn, James Clapper's 'least untruthful' statement to the Senate, June 12, 2013. Retrieved September 23, 2013.
  67. ^ Glenn Greenwald, XKeyscore: NSA tool collects 'nearly everything a user does on the internet', The Guardian (July 31, 2013).
  68. Kube, C., June 27, 2013, "NSA chief says surveillance programs helped foil 54 plots", US News on nbcnews.com. Retrieved September 27, 2013.
  69. "NSA Confirms Dragnet Phone Records Collection, But Admits It Was Key in Stopping Just 1 Terror Plot", Democracy Now August 1, 2013. Retrieved September 27, 2013.
  70. "Indictment: USA vs Basaaly Saeed Moalin, Mohamed Mohamed Mohamud and Issa Doreh". Southern District of California July 2010 Grand Jury. Retrieved September 30, 2013.
  71. "54 Attacks in 20 Countries Thwarted By NSA Collection" (Press release). The Permanent Select Committee on Intelligence. July 23, 2013. Archived from the original on October 23, 2013. Retrieved March 14, 2014.
  72. "Senate caves, votes to give telecoms retroactive immunity". Ars Technica. February 13, 2008. Retrieved September 16, 2013.
  73. "Forget Retroactive Immunity, FISA Bill is also about Prospective Immunity". The Progressive. July 10, 2008. Archived from the original on September 18, 2013. Retrieved September 16, 2013.
  74. "Restricted Web access to the Guardian is Armywide, say officials" Archived 2014-10-20 at the Wayback Machine, Philipp Molnar, Monterey Herald, June 27, 2013. Retrieved October 15, 2014.
  75. Ackerman, Spencer; Roberts, Dan (June 28, 2013). "US Army Blocks Access to Guardian Website to Preserve 'Network Hygiene'—Military Admits to Filtering Reports and Content Relating to Government Surveillance Programs for Thousands of Personnel". The Guardian. Retrieved June 30, 2013.
  76. Ackerman, Spencer (July 1, 2013). "US military blocks entire Guardian website for troops stationed abroad". The Guardian.
  77. Greenwald, Glenn (October 16, 2014). "UN Report Finds Mass Surveillance Violates International Treaties and Privacy Rights". Retrieved October 23, 2014.
  78. Wong, Julia Carrie; Solon, Olivia (12 May 2017). "Massive ransomware cyber-attack hits 74 countries around the world". The Guardian. Retrieved 12 May 2017.
  79. Kharpal, Arjun (19 May 2017). "Cyberattack that hit 200,000 users was 'huge screw-up' by government, Misplaced Pages's Jimmy Wales says". CNBC. Retrieved 2 June 2017.
  80. ^ Perlroth, Nicole (6 February 2021). "How the United States Lost to Hackers". The New York Times. Retrieved 6 February 2021.
  81. "Saudi activist Loujain al-Hathloul files lawsuit claiming 3 former U.S. officials helped hack her iPhone before she was imprisoned, tortured". CBS News. Retrieved 10 December 2021.
  82. "Danish secret service helped US spy on Germany's Angela Merkel: report". Deutsche Welle. 30 May 2021.
  83. "How Denmark became the NSA's listening post in Europe". France 24. 1 June 2021.
  84. "NSA spying row: US and Denmark pressed over allegations". BBC News. 31 May 2021.