National Security Agency: Difference between revisions

m
Text replacement - "The Guardian" to "The Guardian"
m (Text replacement - "George W. Bush" to "George W. Bush")
m (Text replacement - "The Guardian" to "The Guardian")
 
(One intermediate revision by the same user not shown)
Line 150: Line 150:
To support its [[Facial recognition system|facial recognition]] program, the NSA is intercepting "millions of images per day".<ref>{{cite news|author1=James Risen|author2=Laura Poitras|title=N.S.A. Collecting Millions of Faces From Web Images|url=https://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-web-images.html|access-date=June 1, 2014|newspaper=The New York Times|date=May 31, 2014|archive-date=June 1, 2014|archive-url=https://web.archive.org/web/20140601084735/http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-web-images.html|url-status=live}}</ref>
To support its [[Facial recognition system|facial recognition]] program, the NSA is intercepting "millions of images per day".<ref>{{cite news|author1=James Risen|author2=Laura Poitras|title=N.S.A. Collecting Millions of Faces From Web Images|url=https://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-web-images.html|access-date=June 1, 2014|newspaper=The New York Times|date=May 31, 2014|archive-date=June 1, 2014|archive-url=https://web.archive.org/web/20140601084735/http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-web-images.html|url-status=live}}</ref>


The [[Real Time Regional Gateway]] is a data collection program introduced in 2005 in Iraq by the NSA during the [[Iraq War]] that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.<ref name="WP71413">{{cite news|title=For NSA chief, terrorist threat drives passion to 'collect it all,' observers say|url=https://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html|access-date=July 15, 2013|newspaper=The Washington Post|date=July 14, 2013|author=Ellen Nakashima|author2=Joby Warrick|quote=Collect it all, tag it, store it. . . . And whatever it is you want, you go searching for it.|archive-date=March 1, 2017|archive-url=https://web.archive.org/web/20170301114727/https://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html|url-status=live}}</ref> This "collect it all" strategy introduced by NSA director, [[Keith B. Alexander]], is believed by [[Glenn Greenwald]] of ''[[The Guardian]]'' to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.<ref name="NSA71513">{{cite news|title=The crux of the NSA story in one phrase: 'collect it all': The actual story that matters is not hard to see: the NSA is attempting to collect, monitor, and store all forms of human communication|url=https://www.theguardian.com/commentisfree/2013/jul/15/crux-nsa-collect-it-all|access-date=July 16, 2013|newspaper=The Guardian|date=July 15, 2013|author=Glenn Greenwald|archive-date=March 10, 2017|archive-url=https://web.archive.org/web/20170310132541/https://www.theguardian.com/commentisfree/2013/jul/15/crux-nsa-collect-it-all|url-status=live}}</ref>
The [[Real Time Regional Gateway]] is a data collection program introduced in 2005 in Iraq by the NSA during the [[Iraq War]] that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.<ref name="WP71413">{{cite news|title=For NSA chief, terrorist threat drives passion to 'collect it all,' observers say|url=https://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html|access-date=July 15, 2013|newspaper=The Washington Post|date=July 14, 2013|author=Ellen Nakashima|author2=Joby Warrick|quote=Collect it all, tag it, store it. . . . And whatever it is you want, you go searching for it.|archive-date=March 1, 2017|archive-url=https://web.archive.org/web/20170301114727/https://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html|url-status=live}}</ref> This "collect it all" strategy introduced by NSA director, [[Keith B. Alexander]], is believed by [[Glenn Greenwald]] of ''The Guardian'' to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.<ref name="NSA71513">{{cite news|title=The crux of the NSA story in one phrase: 'collect it all': The actual story that matters is not hard to see: the NSA is attempting to collect, monitor, and store all forms of human communication|url=https://www.theguardian.com/commentisfree/2013/jul/15/crux-nsa-collect-it-all|access-date=July 16, 2013|newspaper=The Guardian|date=July 15, 2013|author=Glenn Greenwald|archive-date=March 10, 2017|archive-url=https://web.archive.org/web/20170310132541/https://www.theguardian.com/commentisfree/2013/jul/15/crux-nsa-collect-it-all|url-status=live}}</ref>


A dedicated unit of the NSA locates targets for the [[CIA]] for extrajudicial assassination in the Middle East.<ref name="MillerTateTargeted">Greg Miller and Julie Tate, October 17, 2013, "[https://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story.html Documents reveal NSA's extensive involvement in targeted killing program] {{Webarchive|url=https://web.archive.org/web/20170823063930/https://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story.html |date=2017-08-23 }}", ''The Washington Post''. Retrieved October 18, 2013.</ref> The NSA has also spied extensively on the European Union, the United Nations, and numerous governments including allies and trading partners in Europe, South America, and Asia.<ref>Laura Poitras, Marcel Rosenbach, Fidelius Schmid und Holger Stark. "[http://www.spiegel.de/netzwelt/netzpolitik/nsa-hat-wanzen-in-eu-gebaeuden-installiert-a-908515.html Geheimdokumente: NSA horcht EU-Vertretungen mit Wanzen aus] {{Webarchive|url=https://web.archive.org/web/20240518182038/https://www.spiegel.de/netzwelt/netzpolitik/nsa-hat-wanzen-in-eu-gebaeuden-installiert-a-908515.html |date=2024-05-18 }}". ''Der Spiegel'' (in German). Retrieved June 29, 2013.</ref><ref>"[http://www.spiegel.de/politik/ausland/nsa-hoerte-zentrale-der-vereinte-nationen-in-new-york-ab-a-918421.html US-Geheimdienst hörte Zentrale der Vereinten Nationen ab] {{Webarchive|url=https://web.archive.org/web/20240512130608/https://www.spiegel.de/politik/ausland/nsa-hoerte-zentrale-der-vereinte-nationen-in-new-york-ab-a-918421.html |date=2024-05-12 }}". ''Der Spiegel'' (in German). Retrieved August 25, 2013.</ref> In June 2015, [[WikiLeaks]] published documents showing that NSA spied on [[France|French]] companies.<ref>[http://www.spiegel.de/politik/ausland/wikileaks-enthuellung-nsa-soll-auch-franzoesische-wirtschaft-bespitzelt-haben-a-1041268.html Spiegel.de: Wikileaks-Enthüllung, NSA soll auch französische Wirtschaft bespizelt haben (German)] {{Webarchive|url=https://web.archive.org/web/20160919202253/http://www.spiegel.de/politik/ausland/wikileaks-enthuellung-nsa-soll-auch-franzoesische-wirtschaft-bespitzelt-haben-a-1041268.html |date=2016-09-19 }}, June 2015</ref> WikiLeaks also published documents showing that NSA spied on federal German ministries since the 1990s.<ref>{{cite web|url=https://www.handelsblatt.com/politik/deutschland/wikileaks-und-taeglich-gruesst-die-nsa/12034888.html|title=Wikileaks: Und täglich grüßt die NSA|author=|date=July 9, 2015|website=Handelsblatt.com|access-date=March 10, 2017|archive-date=October 18, 2017|archive-url=https://web.archive.org/web/20171018075016/https://www.handelsblatt.com/politik/deutschland/wikileaks-und-taeglich-gruesst-die-nsa/12034888.html|url-status=dead}}</ref><ref>{{Cite web|url=https://www.sueddeutsche.de/politik/nsa-skanal-us-spionage-ist-eine-demuetigung-fuer-deutschland-1.2558131|title=US-Spionage ist eine Demütigung für Deutschland|first=Tanjev|last=Schultz|website=Süddeutsche.de|date=9 July 2015|access-date=23 February 2022|archive-date=23 February 2022|archive-url=https://web.archive.org/web/20220223192449/https://www.sueddeutsche.de/politik/nsa-skanal-us-spionage-ist-eine-demuetigung-fuer-deutschland-1.2558131|url-status=live}}</ref> Even Germany's Chancellor [[Angela Merkel]]'s cellphones and phones of her predecessors had been intercepted.<ref>{{cite news|url=https://www.theguardian.com/us-news/2015/jul/08/nsa-tapped-german-chancellery-decades-wikileaks-claims-merkel|title=NSA tapped German Chancellery for decades, WikiLeaks claims|agency=Reuters|date=8 July 2015 |work=The Guardian}}</ref>
A dedicated unit of the NSA locates targets for the [[CIA]] for extrajudicial assassination in the Middle East.<ref name="MillerTateTargeted">Greg Miller and Julie Tate, October 17, 2013, "[https://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story.html Documents reveal NSA's extensive involvement in targeted killing program] {{Webarchive|url=https://web.archive.org/web/20170823063930/https://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story.html |date=2017-08-23 }}", ''The Washington Post''. Retrieved October 18, 2013.</ref> The NSA has also spied extensively on the European Union, the United Nations, and numerous governments including allies and trading partners in Europe, South America, and Asia.<ref>Laura Poitras, Marcel Rosenbach, Fidelius Schmid und Holger Stark. "[http://www.spiegel.de/netzwelt/netzpolitik/nsa-hat-wanzen-in-eu-gebaeuden-installiert-a-908515.html Geheimdokumente: NSA horcht EU-Vertretungen mit Wanzen aus] {{Webarchive|url=https://web.archive.org/web/20240518182038/https://www.spiegel.de/netzwelt/netzpolitik/nsa-hat-wanzen-in-eu-gebaeuden-installiert-a-908515.html |date=2024-05-18 }}". ''Der Spiegel'' (in German). Retrieved June 29, 2013.</ref><ref>"[http://www.spiegel.de/politik/ausland/nsa-hoerte-zentrale-der-vereinte-nationen-in-new-york-ab-a-918421.html US-Geheimdienst hörte Zentrale der Vereinten Nationen ab] {{Webarchive|url=https://web.archive.org/web/20240512130608/https://www.spiegel.de/politik/ausland/nsa-hoerte-zentrale-der-vereinte-nationen-in-new-york-ab-a-918421.html |date=2024-05-12 }}". ''Der Spiegel'' (in German). Retrieved August 25, 2013.</ref> In June 2015, [[WikiLeaks]] published documents showing that NSA spied on [[France|French]] companies.<ref>[http://www.spiegel.de/politik/ausland/wikileaks-enthuellung-nsa-soll-auch-franzoesische-wirtschaft-bespitzelt-haben-a-1041268.html Spiegel.de: Wikileaks-Enthüllung, NSA soll auch französische Wirtschaft bespizelt haben (German)] {{Webarchive|url=https://web.archive.org/web/20160919202253/http://www.spiegel.de/politik/ausland/wikileaks-enthuellung-nsa-soll-auch-franzoesische-wirtschaft-bespitzelt-haben-a-1041268.html |date=2016-09-19 }}, June 2015</ref> WikiLeaks also published documents showing that NSA spied on federal German ministries since the 1990s.<ref>{{cite web|url=https://www.handelsblatt.com/politik/deutschland/wikileaks-und-taeglich-gruesst-die-nsa/12034888.html|title=Wikileaks: Und täglich grüßt die NSA|author=|date=July 9, 2015|website=Handelsblatt.com|access-date=March 10, 2017|archive-date=October 18, 2017|archive-url=https://web.archive.org/web/20171018075016/https://www.handelsblatt.com/politik/deutschland/wikileaks-und-taeglich-gruesst-die-nsa/12034888.html|url-status=dead}}</ref><ref>{{Cite web|url=https://www.sueddeutsche.de/politik/nsa-skanal-us-spionage-ist-eine-demuetigung-fuer-deutschland-1.2558131|title=US-Spionage ist eine Demütigung für Deutschland|first=Tanjev|last=Schultz|website=Süddeutsche.de|date=9 July 2015|access-date=23 February 2022|archive-date=23 February 2022|archive-url=https://web.archive.org/web/20220223192449/https://www.sueddeutsche.de/politik/nsa-skanal-us-spionage-ist-eine-demuetigung-fuer-deutschland-1.2558131|url-status=live}}</ref> Even Germany's Chancellor [[Angela Merkel]]'s cellphones and phones of her predecessors had been intercepted.<ref>{{cite news|url=https://www.theguardian.com/us-news/2015/jul/08/nsa-tapped-german-chancellery-decades-wikileaks-claims-merkel|title=NSA tapped German Chancellery for decades, WikiLeaks claims|agency=Reuters|date=8 July 2015 |work=The Guardian}}</ref>
Line 271: Line 271:


=== Personnel security ===
=== Personnel security ===
The NSA received criticism early on in 1960 after two agents had defected to the [[Soviet Union]]. Investigations by the [[House Un-American Activities Committee]] and a special subcommittee of the [[United States House Committee on Armed Services]] revealed severe cases of ignorance of personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.<ref name="Kahn">David Kahn, ''The Codebreakers'', Scribner Press, 1967, chapter 19, pp. 672–733.</ref> Nonetheless, security breaches reoccurred only a year later when in an issue of ''[[Izvestia]]'' of July 23, 1963, a former NSA employee published several cryptologic secrets.
The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the [[House Un-American Activities Committee]] and a special subcommittee of the [[United States House Committee on Armed Services]] revealed severe cases of ignorance of personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.<ref name="Kahn">David Kahn, ''The Codebreakers'', Scribner Press, 1967, chapter 19, pp. 672–733.</ref> Nonetheless, security breaches reoccurred only a year later when in an issue of ''[[Izvestia]]'' of July 23, 1963, a former NSA employee published several cryptologic secrets.


The very same day, an NSA clerk-messenger committed [[suicide]] as ongoing investigations disclosed that he had sold secret information to the Soviets regularly. The reluctance of congressional houses to look into these affairs prompted a journalist to write, "If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired." [[David Kahn (writer)|David Kahn]] criticized the NSA's tactics of concealing its doings as smug and the Congress' blind faith in the agency's right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.<ref name="Kahn" />
The very same day, an NSA clerk-messenger committed [[suicide]] as ongoing investigations disclosed that he had sold secret information to the Soviets regularly. The reluctance of congressional houses to look into these affairs prompted a journalist to write, "If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired." [[David Kahn (writer)|David Kahn]] criticized the NSA's tactics of concealing its doings as smug and the Congress' blind faith in the agency's right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.<ref name="Kahn" />
Line 296: Line 296:
[[File:NSA-Fort Meade-1950.png|thumb|Headquarters at [[Fort Meade]] circa 1950s]]
[[File:NSA-Fort Meade-1950.png|thumb|Headquarters at [[Fort Meade]] circa 1950s]]


When the agency was first established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in [[Arlington Hall]] in [[Northern Virginia]], which served as the headquarters of the [[United States Army|U.S. Army]]'s cryptographic operations.<ref name=60yearsp15>{{cite web|title=60 Years of Defending Our Nation|publisher=National Security Agency|year=2012|url=https://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf|access-date=July 6, 2013|page=15|archive-url=https://web.archive.org/web/20130614022314/http://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf|archive-date=2013-06-14|url-status=dead}}</ref> Because the [[Soviet Union]] had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered [[Fort Knox]], but [[Fort George G. Meade|Fort Meade]], [[Maryland]], was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.<ref name="60yearsp10" />
When the agency was first established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in [[Arlington Hall]] in [[Northern Virginia]], which served as the headquarters of the [[United States Army|U.S. Army]]'s cryptographic operations.<ref name=60yearsp15>{{cite web|title=60 Years of Defending Our Nation|publisher=National Security Agency|year=2012|url=https://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf|access-date=July 6, 2013|page=15|archive-url=https://web.archive.org/web/20130614022314/http://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf|archive-date=2013-06-14|url-status=dead}}</ref> Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered [[Fort Knox]], but [[Fort George G. Meade|Fort Meade]], [[Maryland]], was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.<ref name="60yearsp10" />


Construction of additional buildings began after the agency occupied buildings at Fort Meade in the late 1950s, which they soon outgrew.<ref name=60yearsp10>{{cite web|title=60 Years of Defending Our Nation|publisher=National Security Agency|year=2012|url=https://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf|access-date=July 6, 2013|page=10|archive-url=https://web.archive.org/web/20130614022314/http://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf|archive-date=2013-06-14|url-status=dead}}</ref> In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the "Headquarters Building" and since the NSA management occupied the top floor, workers used "Ninth Floor" to refer to their leaders.<ref>{{cite web|title=60 Years of Defending Our Nation|publisher=National Security Agency|year=2012|url=https://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf|access-date=July 6, 2013|page=23|archive-url=https://web.archive.org/web/20130614022314/http://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf|archive-date=2013-06-14|url-status=dead}}</ref> COMSEC remained in Washington, D.C., until its new building was completed in 1968.<ref name=60yearsp10 /> In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent [[eavesdropping]], opened with a dedication by President [[Ronald Reagan]].<ref name=60yearsp39 /> The four NSA buildings became known as the "Big Four."<ref name=60yearsp39 /> The NSA director moved to 2B when it opened.<ref name=60yearsp39>{{cite web|title=60 Years of Defending Our Nation|publisher=National Security Agency|year=2012|url=https://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf|access-date=July 6, 2013|page=39|archive-url=https://web.archive.org/web/20130614022314/http://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf|archive-date=2013-06-14|url-status=dead}}</ref>
Construction of additional buildings began after the agency occupied buildings at Fort Meade in the late 1950s, which they soon outgrew.<ref name=60yearsp10>{{cite web|title=60 Years of Defending Our Nation|publisher=National Security Agency|year=2012|url=https://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf|access-date=July 6, 2013|page=10|archive-url=https://web.archive.org/web/20130614022314/http://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf|archive-date=2013-06-14|url-status=dead}}</ref> In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the "Headquarters Building" and since the NSA management occupied the top floor, workers used "Ninth Floor" to refer to their leaders.<ref>{{cite web|title=60 Years of Defending Our Nation|publisher=National Security Agency|year=2012|url=https://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf|access-date=July 6, 2013|page=23|archive-url=https://web.archive.org/web/20130614022314/http://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf|archive-date=2013-06-14|url-status=dead}}</ref> COMSEC remained in Washington, D.C., until its new building was completed in 1968.<ref name=60yearsp10 /> In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent [[eavesdropping]], opened with a dedication by President [[Ronald Reagan]].<ref name=60yearsp39 /> The four NSA buildings became known as the "Big Four."<ref name=60yearsp39 /> The NSA director moved to 2B when it opened.<ref name=60yearsp39>{{cite web|title=60 Years of Defending Our Nation|publisher=National Security Agency|year=2012|url=https://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf|access-date=July 6, 2013|page=39|archive-url=https://web.archive.org/web/20130614022314/http://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf|archive-date=2013-06-14|url-status=dead}}</ref>
Line 523: Line 523:


=== Section 215 metadata collection ===
=== Section 215 metadata collection ===
On April 25, 2013, the NSA obtained a court order requiring [[Verizon]]'s Business Network Services to provide [[metadata]] on all calls in its system to the NSA "on an ongoing daily basis" for three months, as reported by ''[[The Guardian]]'' on June 6, 2013. This information includes "the numbers of both parties on a call&nbsp;... location data, call duration, unique identifiers, and the time and duration of all calls" but not "[t]he contents of the conversation itself". The order relies on the so-called "business records" provision of the Patriot Act.<ref>{{cite news|author=Glenn Greenwald|title=Revealed: NSA collecting phone records of millions of Americans daily|url=https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order|access-date=June 6, 2013|location=London|work=The Guardian|date=June 6, 2013|author-link=Glenn Greenwald|archive-date=October 12, 2019|archive-url=https://web.archive.org/web/20191012153115/https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order|url-status=live}}</ref><ref name=NYTimes2013-06-05>{{cite news| url = https://www.nytimes.com/2013/06/06/us/us-secretly-collecting-logs-of-business-calls.html| title = U.S. Is Secretly Collecting Records of Verizon Calls| newspaper = The New York Times| date = 2013-06-05| author = [[Charlie Savage (author)|Charlie Savage]], Edward Wyatt| access-date = 2024-06-07| archive-date = 2024-05-12| archive-url = https://web.archive.org/web/20240512131030/https://www.nytimes.com/2013/06/06/us/us-secretly-collecting-logs-of-business-calls.html| url-status = live}}</ref>
On April 25, 2013, the NSA obtained a court order requiring [[Verizon]]'s Business Network Services to provide [[metadata]] on all calls in its system to the NSA "on an ongoing daily basis" for three months, as reported by ''The Guardian'' on June 6, 2013. This information includes "the numbers of both parties on a call&nbsp;... location data, call duration, unique identifiers, and the time and duration of all calls" but not "[t]he contents of the conversation itself". The order relies on the so-called "business records" provision of the Patriot Act.<ref>{{cite news|author=Glenn Greenwald|title=Revealed: NSA collecting phone records of millions of Americans daily|url=https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order|access-date=June 6, 2013|location=London|work=The Guardian|date=June 6, 2013|author-link=Glenn Greenwald|archive-date=October 12, 2019|archive-url=https://web.archive.org/web/20191012153115/https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order|url-status=live}}</ref><ref name=NYTimes2013-06-05>{{cite news| url = https://www.nytimes.com/2013/06/06/us/us-secretly-collecting-logs-of-business-calls.html| title = U.S. Is Secretly Collecting Records of Verizon Calls| newspaper = The New York Times| date = 2013-06-05| author = [[Charlie Savage (author)|Charlie Savage]], Edward Wyatt| access-date = 2024-06-07| archive-date = 2024-05-12| archive-url = https://web.archive.org/web/20240512131030/https://www.nytimes.com/2013/06/06/us/us-secretly-collecting-logs-of-business-calls.html| url-status = live}}</ref>


In August 2013, following the Snowden leaks, new details about the NSA's data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at "selected communications links" and automatically analyzed for keywords or other "selectors". Emails that do not match are deleted.<ref name="SavageBroaderSifting">{{cite news|url=https://www.nytimes.com/2013/08/08/us/broader-sifting-of-data-abroad-is-seen-by-nsa.html|title=N.S.A. Said to Search Content of Messages to and From U.S|author=Savage, Charlie|date=August 8, 2013|access-date=August 13, 2013|work=The New York Times|author-link=Charlie Savage (author)|archive-date=August 13, 2013|archive-url=https://web.archive.org/web/20130813023342/https://www.nytimes.com/2013/08/08/us/broader-sifting-of-data-abroad-is-seen-by-nsa.html|url-status=live}}</ref>
In August 2013, following the Snowden leaks, new details about the NSA's data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at "selected communications links" and automatically analyzed for keywords or other "selectors". Emails that do not match are deleted.<ref name="SavageBroaderSifting">{{cite news|url=https://www.nytimes.com/2013/08/08/us/broader-sifting-of-data-abroad-is-seen-by-nsa.html|title=N.S.A. Said to Search Content of Messages to and From U.S|author=Savage, Charlie|date=August 8, 2013|access-date=August 13, 2013|work=The New York Times|author-link=Charlie Savage (author)|archive-date=August 13, 2013|archive-url=https://web.archive.org/web/20130813023342/https://www.nytimes.com/2013/08/08/us/broader-sifting-of-data-abroad-is-seen-by-nsa.html|url-status=live}}</ref>
Line 567: Line 567:
The U.S. government has aggressively sought to dismiss and challenge [[Fourth Amendment to the United States Constitution|Fourth Amendment]] cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.<ref>{{cite web |url=https://arstechnica.com/security/2008/02/democrats-fail-to-block-telecom-immunity-provision/ |title=Senate caves, votes to give telecoms retroactive immunity |website=Ars Technica |date=February 13, 2008 |access-date=September 16, 2013 |archive-date=July 8, 2017 |archive-url=https://web.archive.org/web/20170708072335/https://arstechnica.com/security/2008/02/democrats-fail-to-block-telecom-immunity-provision/ |url-status=live }}</ref><ref>{{cite web |url=http://progressive.org/mag/wx071008.html |title=Forget Retroactive Immunity, FISA Bill is also about Prospective Immunity |publisher=[[The Progressive]] |date=July 10, 2008 |access-date=September 16, 2013 |url-status=dead |archive-url=https://web.archive.org/web/20130918200841/http://progressive.org/mag/wx071008.html |archive-date=September 18, 2013 }}</ref>
The U.S. government has aggressively sought to dismiss and challenge [[Fourth Amendment to the United States Constitution|Fourth Amendment]] cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.<ref>{{cite web |url=https://arstechnica.com/security/2008/02/democrats-fail-to-block-telecom-immunity-provision/ |title=Senate caves, votes to give telecoms retroactive immunity |website=Ars Technica |date=February 13, 2008 |access-date=September 16, 2013 |archive-date=July 8, 2017 |archive-url=https://web.archive.org/web/20170708072335/https://arstechnica.com/security/2008/02/democrats-fail-to-block-telecom-immunity-provision/ |url-status=live }}</ref><ref>{{cite web |url=http://progressive.org/mag/wx071008.html |title=Forget Retroactive Immunity, FISA Bill is also about Prospective Immunity |publisher=[[The Progressive]] |date=July 10, 2008 |access-date=September 16, 2013 |url-status=dead |archive-url=https://web.archive.org/web/20130918200841/http://progressive.org/mag/wx071008.html |archive-date=September 18, 2013 }}</ref>


The U.S. military has acknowledged blocking access to parts of ''The Guardian'' website for thousands of defense personnel across the country,<ref>[http://www.montereyherald.com/local/ci_23554739/restricted-web-access-guardian-is-army-wide-officials "Restricted Web access to the Guardian is Armywide, say officials"] {{Webarchive|url=https://web.archive.org/web/20141020150616/http://www.montereyherald.com/local/ci_23554739/restricted-web-access-guardian-is-army-wide-officials |date=2014-10-20 }}, Philipp Molnar, ''Monterey Herald'', June 27, 2013. Retrieved October 15, 2014.</ref><ref name="guardarmy">[[Spencer Ackerman|Ackerman, Spencer]]; Roberts, Dan (June 28, 2013). [https://www.theguardian.com/world/2013/jun/28/us-army-blocks-guardian-website-access "US Army Blocks Access to Guardian Website to Preserve 'Network Hygiene'—Military Admits to Filtering Reports and Content Relating to Government Surveillance Programs for Thousands of Personnel"] {{Webarchive|url=https://web.archive.org/web/20170103143200/https://www.theguardian.com/world/2013/jun/28/us-army-blocks-guardian-website-access |date=2017-01-03 }}. ''[[The Guardian]]''. Retrieved June 30, 2013.</ref> and blocking the entire ''Guardian'' website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.<ref name="guardmil">{{cite news|last=Ackerman|first=Spencer|title=US military blocks entire Guardian website for troops stationed abroad|url=https://www.theguardian.com/world/2013/jul/01/us-military-blocks-guardian-troops|newspaper=The Guardian|date=July 1, 2013|access-date=June 7, 2024|archive-date=February 2, 2017|archive-url=https://web.archive.org/web/20170202141818/https://www.theguardian.com/world/2013/jul/01/us-military-blocks-guardian-troops|url-status=live}}</ref>
The U.S. military has acknowledged blocking access to parts of ''The Guardian'' website for thousands of defense personnel across the country,<ref>[http://www.montereyherald.com/local/ci_23554739/restricted-web-access-guardian-is-army-wide-officials "Restricted Web access to the Guardian is Armywide, say officials"] {{Webarchive|url=https://web.archive.org/web/20141020150616/http://www.montereyherald.com/local/ci_23554739/restricted-web-access-guardian-is-army-wide-officials |date=2014-10-20 }}, Philipp Molnar, ''Monterey Herald'', June 27, 2013. Retrieved October 15, 2014.</ref><ref name="guardarmy">[[Spencer Ackerman|Ackerman, Spencer]]; Roberts, Dan (June 28, 2013). [https://www.theguardian.com/world/2013/jun/28/us-army-blocks-guardian-website-access "US Army Blocks Access to Guardian Website to Preserve 'Network Hygiene'—Military Admits to Filtering Reports and Content Relating to Government Surveillance Programs for Thousands of Personnel"] {{Webarchive|url=https://web.archive.org/web/20170103143200/https://www.theguardian.com/world/2013/jun/28/us-army-blocks-guardian-website-access |date=2017-01-03 }}. ''The Guardian''. Retrieved June 30, 2013.</ref> and blocking the entire ''Guardian'' website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.<ref name="guardmil">{{cite news|last=Ackerman|first=Spencer|title=US military blocks entire Guardian website for troops stationed abroad|url=https://www.theguardian.com/world/2013/jul/01/us-military-blocks-guardian-troops|newspaper=The Guardian|date=July 1, 2013|access-date=June 7, 2024|archive-date=February 2, 2017|archive-url=https://web.archive.org/web/20170202141818/https://www.theguardian.com/world/2013/jul/01/us-military-blocks-guardian-troops|url-status=live}}</ref>


An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.<ref>{{cite web|last=Greenwald|first=Glenn|title=UN Report Finds Mass Surveillance Violates International Treaties and Privacy Rights|url=https://firstlook.org/theintercept/2014/10/15/un-investigator-report-condemns-mass-surveillance/|date=October 16, 2014|access-date=October 23, 2014|archive-date=January 3, 2015|archive-url=https://web.archive.org/web/20150103001936/https://firstlook.org/theintercept/2014/10/15/un-investigator-report-condemns-mass-surveillance/|url-status=dead}}</ref>
An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.<ref>{{cite web|last=Greenwald|first=Glenn|title=UN Report Finds Mass Surveillance Violates International Treaties and Privacy Rights|url=https://firstlook.org/theintercept/2014/10/15/un-investigator-report-condemns-mass-surveillance/|date=October 16, 2014|access-date=October 23, 2014|archive-date=January 3, 2015|archive-url=https://web.archive.org/web/20150103001936/https://firstlook.org/theintercept/2014/10/15/un-investigator-report-condemns-mass-surveillance/|url-status=dead}}</ref>
Line 642: Line 642:
* [[Church Committee]], ''Intelligence Activities and the Rights of Americans: 1976 US Senate Report on Illegal Wiretaps and Domestic Spying by the FBI, CIA and NSA'', Red and Black Publishers (May 1, 2008).
* [[Church Committee]], ''Intelligence Activities and the Rights of Americans: 1976 US Senate Report on Illegal Wiretaps and Domestic Spying by the FBI, CIA and NSA'', Red and Black Publishers (May 1, 2008).
* "[http://www.cnn.com/video/data/2.0/video/us/2013/06/07/lawrence-nsa-no-such-agency.cnn.html Just what is the NSA?] {{Webarchive|url=https://web.archive.org/web/20141022062022/http://www.cnn.com/video/data/2.0/video/us/2013/06/07/lawrence-nsa-no-such-agency.cnn.html |date=2014-10-22 }}" (video). CNN. June 7, 2013.
* "[http://www.cnn.com/video/data/2.0/video/us/2013/06/07/lawrence-nsa-no-such-agency.cnn.html Just what is the NSA?] {{Webarchive|url=https://web.archive.org/web/20141022062022/http://www.cnn.com/video/data/2.0/video/us/2013/06/07/lawrence-nsa-no-such-agency.cnn.html |date=2014-10-22 }}" (video). CNN. June 7, 2013.
* {{cite news|url=https://www.theguardian.com/world/the-nsa-files|title=The NSA Files|newspaper=[[The Guardian]]|location=London|date=June 8, 2013|access-date=June 7, 2024|archive-date=October 3, 2014|archive-url=https://web.archive.org/web/20141003122712/http://www.theguardian.com/world/the-nsa-files|url-status=live}}
* {{cite news|url=https://www.theguardian.com/world/the-nsa-files|title=The NSA Files|newspaper=The Guardian|location=London|date=June 8, 2013|access-date=June 7, 2024|archive-date=October 3, 2014|archive-url=https://web.archive.org/web/20141003122712/http://www.theguardian.com/world/the-nsa-files|url-status=live}}
* "[http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB260/ National Security Agency Releases History of Cold War Intelligence Activities] {{Webarchive|url=https://web.archive.org/web/20081224044110/http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB260/ |date=2008-12-24 }}." [[George Washington University]]. National Security Archive Electronic Briefing Book No. 260. Posted November 14, 2008.
* "[http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB260/ National Security Agency Releases History of Cold War Intelligence Activities] {{Webarchive|url=https://web.archive.org/web/20081224044110/http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB260/ |date=2008-12-24 }}." [[George Washington University]]. National Security Archive Electronic Briefing Book No. 260. Posted November 14, 2008.
* {{cite web|url=https://theintercept.com/snowden-sidtoday/?orderBy=publishedTime&orderDirection=desc#archive|title=The Snowden Archive|website=[[The Intercept]]|location=London|date=June 8, 2013|access-date=June 7, 2024|archive-date=May 12, 2024|archive-url=https://web.archive.org/web/20240512131635/https://theintercept.com/snowden-sidtoday/?orderBy=publishedTime&orderDirection=desc#archive|url-status=live}}
* {{cite web|url=https://theintercept.com/snowden-sidtoday/?orderBy=publishedTime&orderDirection=desc#archive|title=The Snowden Archive|website=[[The Intercept]]|location=London|date=June 8, 2013|access-date=June 7, 2024|archive-date=May 12, 2024|archive-url=https://web.archive.org/web/20240512131635/https://theintercept.com/snowden-sidtoday/?orderBy=publishedTime&orderDirection=desc#archive|url-status=live}}