Timeline masters of the internet

From Gender and Tech Resources

Revision as of 15:39, 5 June 2015 by Lilith2 (Talk | contribs)

This page contains links gathered and shared by anonymii over four years (crowdsourced as it were) on "things", told and leaked stories and whistle spit, for further investigation into and analysis of "things" to find (counter) moves healthy for self, life, and others, moves aiding survival of the greatest scope of life to a greater degree than any associated destruction.

Masters of the internet

Even during the 1970s, the rhetoric of “free flow of information” had long functioned as a central tenet of US foreign policy. During the era of decolonisation and cold war the doctrine purported to be a shining beacon, lighting the world’s way to emancipation from imperialism and state repression. Today it continues to paint deep-seated economic and strategic interests in an appealing language of universal human rights. “Internet freedom”, “freedom to connect”, “net freedom” — terms circulated by Secretary of State Hillary Clinton and Google executives together in the run-up to the WCIT — are today’s version of the longstanding “free flow” precept. But just as before, “Internet freedom” is a red herring (see Logical fallacies in Propaganda). Calculatingly manipulative, it tells us to entrust a fundamental human right to a pair of powerfully self-interested social actors: corporations and states. [1]

The making of the US surveillance state, 1898-2020

The Making of the U.S. Surveillance State, 1898-2020: The American surveillance state is now an omnipresent reality, but its deep history is little known and its future little grasped. Edward Snowden’s leaked documents reveal that, in a post-9/11 state of war, the National Security Agency (NSA) was able to create a surveillance system that could secretly monitor the private communications of almost every American in the name of fighting foreign terrorists. The technology used is state of the art; the impulse, it turns out, is nothing new. For well over a century, what might be called “surveillance blowback” from America’s wars has ensured the creation of an ever more massive and omnipresent internal security and surveillance apparatus. Its future (though not ours) looks bright indeed. [2]

Interception capabilities 2000

Interception Capabilities 2000: eport to the Director General for Research of the European Parliament (Scientific and Technical Options Assessment programme office) on the development of surveillance technology and risk of abuse of economic information. This study considers the state of the art in Communications intelligence (Comint) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems, and its applicability to Comint targeting and selection, including speech recognition. [3]

Glimpses of planned information operations

Propaganda for the middle east

In 2005 the BBC reports that the US military is planning to win the hearts of young people in the Middle East by publishing a new comic in order to "achieve long-term peace and stability in the Middle East" [4] .

Fight the net

In 2006 the BBC reveals US plans to 'fight the net': A newly declassified document gives a fascinating glimpse into the US military's plans for "information operations" - from psychological operations, to attacks on hostile computer networks [5].

The FBI wiretap net

August 2007: The FBI has quietly built a sophisticated, point-and-click surveillance system that performs instant wiretaps on almost any communications device, according to nearly a thousand pages of restricted documents newly released under the Freedom of Information Act. The surveillance system, called DCSNet, for Digital Collection System Network, connects FBI wiretapping rooms to switches controlled by traditional land-line operators, internet-telephony providers and cellular companies. It is far more intricately woven into the nation's telecom infrastructure than observers suspected.

It's a "comprehensive wiretap system that intercepts wire-line phones, cellular phones, SMS and push-to-talk systems," says Steven Bellovin, a Columbia University computer science professor and longtime surveillance expert. [6]

Bloggers on guard

The Raw Story reports in 2007 that CENTCOM sent emails to "bloggers who are posting inaccurate or untrue information, as well as bloggers who are posting incomplete information" [7].

In 2009 the US Air Force releases ‘Counter-Blog’ marching orders to its airmen as part of an Air Force push to "counter the people out there in the blogosphere who have negative opinions about the U.S. government and the Air Force" [8]

Wargame simulations

More alarming seems to be the article from the Register on wargame simulations: Sentient world: war games on the grandest scale informing us that the US DOD is developing a parallel to Planet Earth, with billions of individual "nodes" to reflect every man, woman, and child this side of the dividing line between reality and artificial reality to see how long you can go without food or water, or how you will respond to televised propaganda [9].

The secret eu surveillance plan that wasn't

CLEAN IT: the secret EU surveillance plan that wasn't: There are elements in Europe who would dearly like to see the CLEAN IT wish list put into practice, but we must distinguish between transnational talking shops, EU working groups and draft EU policy. [10]

Snowden leaks

PRISM

June 6, 2013: First Snowden leak containing the PRISM slides. All known slides are shown in an article by Top Level Communications on what is known about NSA's PRISM program. If new slides of this PRISM presentation become available, they will be added. [11]. PRISM is not for mass surveillance but for collecting communications of specifically identified targets. NSA also has no "direct access" to the servers of companies like Microsoft, Facebook and Google. A unit of the FBI picks up the data and the NSA does the analysis.

Overseas target list

June 7, 2013: Second Snowden leak on Obama ordering his senior national security and intelligence officials to draw up an overseas target list for cyber-attacks. The 18-page Presidential Policy Directive 20, issued in October last year but never published, states that what it calls Offensive Cyber Effects Operations (OCEO) "can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging".

It says the government will "identify potential targets of national importance where OCEO can offer a favorable balance of effectiveness and risk as compared with other instruments of national power".

The directive also contemplates the possible use of cyber actions inside the US, though it specifies that no such domestic operations can be conducted without the prior order of the president, except in cases of emergency. [12]

Boundless Informant

June 8, 2013: Apparently the NSA has a tool that records and analyzes all the flow of data that the spy agency collects around the world, a global data-mining software that details exactly how much intelligence, and of what type, has been collected from every country in the world. That is "Boundless Informant." The tool allows users to select a country on a map and view the metadata volume and select details about the collections against that country, according to an NSA factsheet on the program. [13]

Top Level Communications notes that Screenshots from BOUNDLESSINFORMANT can be misleading. [14]

US spies on Hong Kong and Chinese citizens

June 14, 2013: Edward Snowden: US government has been hacking Hong Kong and China for years. [15]

US and Britain monitor foreign diplomats

June 16, 2013: GCHQ intercepted foreign politicians' communications at G20 summits: Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic. [16]

June 17, 2013: G20 summit: NSA targeted Russian president Medvedev in London: American spies based in the UK intercepted the top-secret communications of the then Russian president, Dmitry Medvedev, during his visit to Britain for the G20 summit in London, leaked documents reveal. [17]

June 16, 2013: Read extracts from the leaked documents describing the agency's 'recent successes'. [18]

Top secret rules

June 20, 2013: The top secret rules that allow NSA to use US data without a warrant: Top secret documents submitted to the court that oversees surveillance by US intelligence agencies show the judges have signed off on broad orders which allow the NSA to make use of information "inadvertently" collected from domestic US communications without a warrant. The documents show that even under authorities governing the collection of foreign intelligence from foreign targets, US communications can still be collected, retained and used. [19]

GCHQ taps fibre-optic cables

June 21, 2013: GCHQ taps fibre-optic cables for secret access to world's communications: Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).

The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate. One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months. [20]

Stellar wind

June 27, 2013 Guardian: NSA inspector general report on email and internet data collection under Stellar Wind: Top-secret draft report from 2009 by the NSA's inspector general shows development of 'collection of bulk internet metadata' under program launched under Bush. [21]

Spying on europeans

June 29, 2013 Der Spiegel: Information shows that America's National Security Agency (NSA) not only conducted online surveillance of European citizens, but also appears to have specifically targeted buildings housing European Union institutions. A "top secret" 2010 document describes how the secret service attacked the EU's diplomatic representation in Washington.

The document suggests that in addition to installing bugs in the building in downtown Washington, DC, the European Union representation's computer network was also infiltrated. In this way, the Americans were able to access discussions in EU rooms as well as emails and internal documents on computers. [22]

June 30, 2013 Der Spiegel: Internal NSA statistics indicate that the agency stores data from around half a billion communications connections in Germany each month. This data includes telephone calls, emails, mobile-phone text messages and chat transcripts. The metadata -- or information about which call or data connections were made and when -- is then stored at the NSA's headquarters in Fort Meade, near Washington, DC. [23]

Big brother in france

July 4, 2013: Le Monde: Si les révélations sur le programme d'espionnage américain Prism ont provoqué un concert d'indignation en Europe, la France, elle, n'a que faiblement protesté. Pour deux excellentes raisons : Paris était déjà au courant. Et fait la même chose.

Le Monde est en mesure de révéler que la Direction générale de la sécurité extérieure (DGSE, les services spéciaux) collecte systématiquement les signaux électromagnétiques émis par les ordinateurs ou les téléphones en France, tout comme les flux entre les Français et l'étranger : la totalité de nos communications sont espionnées. L'ensemble des mails, des SMS, des relevés d'appels téléphoniques, des accès à Facebook, Twitter, sont ensuite stockés pendant des années. [24]

Big brother in australia

July 6, 2013: Classified US National Security Agency maps leaked by Mr Snowden and published by US journalist Glenn Greenwald in the Brazilian O Globo newspaper reveal the locations of dozens of US and allied signals intelligence collection sites that contribute to interception of telecommunications and internet traffic worldwide. [25]

The US Australian Joint Defence Facility at Pine Gap near Alice Springs and three Australian Signals Directorate facilities: the Shoal Bay Receiving Station near Darwin, the Australian Defence Satellite Communications Facility at Geraldton and the naval communications station HMAS Harman outside Canberra are among contributors to the NSA's collection program codenamed X-Keyscore. [26]

Big brother in latin america

July 6, 2013, O Globo: Os documentos da NSA são eloquentes. O Brasil, com extensas redes públicas e privadas digitalizadas, operadas por grandes companhias de telecomunicações e de internet, aparece destacado em mapas da agência americana como alvo prioritário no tráfego de telefonia e dados (origem e destino), ao lado de nações como China, Rússia, Irã e Paquistão. É incerto o número de pessoas e empresas espionadas no Brasil. Mas há evidências de que o volume de dados capturados pelo sistema de filtragem nas redes locais de telefonia e internet é constante e em grande escala.

Criada há 61 anos, na Guerra Fria, a NSA tem como tarefa espionar comunicações de outros países, decifrando códigos governamentais. Dedica-se, também, a desenvolver sistemas de criptografia para o governo. [27]

July 6, 2013, O Globo: Os Estados Unidos têm programas de espionagem e rastreamento funcionando em vários outros países da América Latina, além do Brasil. Documentos sigilosos da Agência de Segurança Nacional (NSA, na sigla em inglês) aos quais o GLOBO teve acesso mostram que situações similares ocorrem no México, Venezuela, Argentina, Colômbia e Equador, entre outros.

Um dos aspectos que se destaca nos documentos é que, de acordo com eles, os Estados Unidos parecem não estar interessados apenas em assuntos militares, mas também em segredos comerciais -“petróleo” na Venezuela e “energia” no México, segundo uma listagem produzida pela NSA no primeiro semestre deste ano (veja acima). [28]

The CIA’s new black bag is digital

The CIA’s clandestine service is now conducting these sorts of black bag operations on behalf of the NSA, but at a tempo not seen since the height of the Cold War. Moreover, these missions, as well as a series of parallel signals intelligence (SIGINT) collection operations conducted by the CIA’s Office of Technical Collection, have proven to be instrumental in facilitating and improving the NSA’s SIGINT collection efforts in the years since the 9/11 terrorist attacks.

Over the past decade specially-trained CIA clandestine operators have mounted over one hundred extremely sensitive black bag jobs designed to penetrate foreign government and military communications and computer systems, as well as the computer systems of some of the world’s largest foreign multinational corporations. Spyware software has been secretly planted in computer servers; secure telephone lines have been bugged; fiber optic cables, data switching centers and telephone exchanges have been tapped; and computer backup tapes and disks have been stolen or surreptitiously copied in these operations. In other words, the CIA has become instrumental in setting up the shadowy surveillance dragnet that has now been thrown into public view. Sources within the U.S. intelligence community confirm that since 9/11, CIA clandestine operations have given the NSA access to a number of new and critically important targets around the world, especially in China and elsewhere in East Asia, as well as the Middle East, the Near East, and South Asia. (I’m not aware of any such operations here on U.S. soil.) [29]

Snowden leaks

German intelligence used NSA spy program

July 20, 2013, Der Spiegel: Germany's foreign intelligence service, the BND, and its domestic intelligence agency, the Federal Office for the Protection of the Constitution (BfV), used a spying program of the American National Security Agency (NSA). The documents show that the Office for the Protection of the Constitution was equipped with a program called XKeyScore intended to "expand their ability to support NSA as we jointly prosecute CT (counterterrorism) targets." The BND is tasked with instructing the domestic intelligence agency on how to use the program, the documents say.

According to an internal NSA presentation from 2008, the program is a productive espionage tool. Starting with the metadata -- or information about which data connections were made and when -- it is able, for instance, to retroactively reveal any terms the target person has typed into a search engine, the documents show. In addition, the system is able to receive a "full take" of all unfiltered data over a period of several days -- including, at least in part, the content of communications.

This is relevant from a German perspective, because the documents show that of the up to 500 million data connections from Germany accessed monthly by the NSA, a major part is collected with XKeyScore (for instance, around 180 million in December 2012). The BND and BfV, when contacted by Spiegel, would not discuss the espionage tool. The NSA, as well, declined to comment, referring instead to the words of US President Barack Obama during his visit to Berlin and saying there was nothing to add. [30] [31]

XKeyscore

July 31, 2013, Der Spiegel: A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. [32]

NSA funding GCHQ

August 1, 2013, The Guardian: The US government has paid at least £100m to the UK spy agency GCHQ over the last three years to secure access to and influence over Britain's intelligence gathering programmes. The top secret payments are set out in documents which make clear that the Americans expect a return on the investment, and that GCHQ has to work hard to meet their demands. "GCHQ must pull its weight and be seen to pull its weight," a GCHQ strategy briefing said.

The funding underlines the closeness of the relationship between GCHQ and its US equivalent, the National Security Agency. But it will raise fears about the hold Washington has over the UK's biggest and most important intelligence agency, and whether Britain's dependency on the NSA has become too great. [33]

The death of irony

University of Penn’s Secret Meetings on Secret Surveillance Law: [...] She soon passes me off to another attendee: the ACLU’s Alex Abdo.

"There’s a non-attribution agreement that applies, a 'Chatham House Rule' [34] that people here are talking about," Alex Abdo tells me. Finally, we’re getting somewhere.

Abdo is an ACLU staff attorney and participant in that organization’s National Security Project. He arrived here this morning after doing battle with the National Security Agency in U.S. District Court in Lower Manhattan the day before. Abdo is also a conference participant. At moments during our conversation, he seems embarrassed when I press him on the absurdly-ironic secrecy cloaking a conference whose very theme ostensibly seeks to take a critical look at Intelligence Community obfuscation. Hell, even several participants (including Dr. Hans Blix) during a 2006 UK conference on freedom of information and the Iraq War scoffed at invoking the Chatham House rule. [35]

Snowden leaks

Cover up program used to investigate americans

August 2013: A secretive U.S. Drug Enforcement Administration (DEA) unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges.

The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses. [36]

Meet the spies doing the NSA’s dirty work

November 2013: With every fresh leak, the world learns more about the U.S. National Security Agency’s massive and controversial surveillance apparatus. Lost in the commotion has been the story of the NSA’s indispensable partner in its global spying operations: an obscure, clandestine unit of the Federal Bureau of Investigation that, even for a surveillance agency, keeps a low profile. [37] [...] But the FBI is no mere errand boy for the United States’ biggest intelligence agency. It carries out its own signals intelligence operations and is trying to collect huge amounts of email and Internet data from U.S. companies — an operation that the NSA once conducted, was reprimanded for, and says it abandoned. [38] The heart of the FBI’s signals intelligence activities is an obscure organization called the Data Intercept Technology Unit, or DITU (pronounced DEE-too). The handful of news articles that mentioned it prior to revelations of NSA surveillance this summer did so mostly in passing. It has barely been discussed in congressional testimony. An NSA PowerPoint presentation given to journalists by former NSA contractor Edward Snowden hints at DITU’s pivotal role in the NSA’s Prism system — it appears as a nondescript box on a flowchart showing how the NSA "task[s]" information to be collected, which is then gathered and delivered by the DITU.

NSA tracking cellphone locations worldwide

The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with U.S. intelligence officials, enabling the agency to track the movements of individuals — and map their relationships — in ways that would have been previously unimaginable. [39]

The ACLU created Meet Jack. Or, What The Government Could Do With All That Location Data. [40]

Multistakeholder global (internet) governance?

The multistakeholder model, neo-liberalism and global (internet) governance

Gurstein writes in March 2014: What is new and somewhat startling is the full court press by the US government (USG) and its allies and acolytes among the corporate, technical and civil society participants in Internet Governance discussions to extend the use of the highly locally adapted versions of the MS model. The intent is to move the use of the MS model from the quite narrow and technical areas where it has achieved a considerable degree of success towards becoming the fundamental and effectively, only, basis on which such Internet Governance discussions are to be allowed to go forward (as per the USG’s statement concerning the transfer of the DNS management function). Notably as well "multistakeholderism" seems to have replaced "Internet Freedom" as the mobilizing Internet meme of choice ("Internet Freedom" having been somewhat discredited by post-Snowden associations of the "Internet Freedom" meme with the freedom of the USG –to "surveille", "sabotage", and "subvert" at will via the Internet). [41]

Domain name expansion signals political shift of the internet

More than 1,000 new generic top-level domain names – the part of an internet address that comes after the “dot” – are being rolled out by the International Corporation for Assigned Names and Numbers. It’s a move that will change how the internet as we know it looks and feels and has significant political implications to boot. [42]

Surveillance is about control, not security

2014, NSA Surveillance is about Control & Leverage, not Security: For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places. Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington. The answer is remarkably simple. For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line — like, in fact, the steal of the century. Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.

For well over a century, from the pacification of the Philippines in 1898 to trade negotiations with the European Union today, surveillance and its kissing cousins, scandal and scurrilous information, have been key weapons in Washington’s search for global dominion. Not surprisingly, in a post-9/11 bipartisan exercise of executive power, George W. Bush and Barack Obama have presided over building the NSA step by secret step into a digital panopticon designed to monitor the communications of every American and foreign leaders worldwide. [43]

Snowden leaks

Meet the muslim-american leaders the FBI have been spying on

The National Security Agency and FBI have covertly monitored the emails of prominent Muslim-Americans—including a political candidate and several civil rights activists, academics, and lawyers—under secretive procedures intended to target terrorists and foreign spies. [44]

Top Level Communications notes that the document that was published contains no evidence of any involvement of the NSA in this particular case: Everything indicates that it was actually an FBI operation, so it seems not justified to have NSA mentioned in the article. [45]

DEA operations exposed

April 8, 2015: Rights group sues DEA over bulk collection of phone records: Opening another front in the legal challenges to U.S. government surveillance, a human rights group has sued the Drug Enforcement Administration for collecting bulk records of Americans' telephone calls to some foreign countries.

Lawyers for Human Rights Watch filed the lawsuit on Tuesday in U.S. District Court in Los Angeles. The lawsuit asks a judge to declare unlawful the DEA program, which ended in September 2013 after about 15 years, and to bar the DEA from collecting call records in bulk again. [46]

April 9, 2015: DEA Global Surveillance Dragnet Exposed; Access to Data Likely Continues: The vast program reported on by USA Today shares some of the same hallmarks of Project Crisscross: it began in the early 1990s, was ostensibly aimed at gathering intelligence about drug trafficking, and targeted countries worldwide, with focus on Central and South America.

It is also reminiscent of the so-called Hemisphere Project, a DEA operation revealed in September 2013 by The New York Times, which dated as far back as 1987, and used subpoenas to collect vast amounts of international call records every day. [47]

It's politics!

June 4, 2015: A bipartisan group of Washington lawmakers solicited details from Pentagon officials that they could use to "damage" former NSA contractor Edward Snowden's "credibility in the press and the court of public opinion."

That's according to declassified government documents obtained by VICE News in response to a long-running Freedom of Information Act (FOIA) lawsuit. The lawmakers' requests for information were made in December 2013 and again in February 2014, following classified briefings top officials at the Defense Intelligence Agency (DIA) held for oversight committees in the House and Senate about a DIA assessment of the alleged damage to national security caused by Snowden's leak of top-secret documents to journalists Glenn Greenwald, Barton Gellman, and Laura Poitras. [48]

Documents reveal secret memos expanding spying

June 4, 2015: Without public notice or debate, the Obama administration has expanded the National Security Agency’s warrantless surveillance of Americans’ international Internet traffic to search for evidence of malicious computer hacking, according to classified NSA documents.

In mid-2012, Justice Department lawyers wrote two secret memos permitting the spy agency to begin hunting on Internet cables, without a warrant and on American soil, for data linked to computer intrusions originating abroad — including traffic that flows to suspicious Internet addresses or contains malware, the documents show.

The Justice Department allowed the agency to monitor only addresses and “cybersignatures” — patterns associated with computer intrusions — that it could tie to foreign governments. But the documents also note that the NSA sought permission to target hackers even when it could not establish any links to foreign powers. [49]

Related

References

  1. Monde Diplo: Masters of the Internet http://mondediplo.com/2013/02/15internet
  2. Surveillance Blowback: The Making of the U.S. Surveillance State, 1898-2020 http://www.tomdispatch.com/blog/175724/alfred_mccoy_surveillance_blowback
  3. Interception Capabilities 2000 http://fas.org/irp/eprint/ic2000/ic2000.htm
  4. US army to produce Mid-East comic http://news.bbc.co.uk/2/hi/middle_east/4396351.stm
  5. US plans to 'fight the net' revealed http://news.bbc.co.uk/2/hi/americas/4655196.stm
  6. Wired: Point, Click ... Eavesdrop: How the FBI Wiretap Net Operates http://archive.wired.com/politics/security/news/2007/08/wiretap?currentPage=all
  7. Raw obtains CENTCOM email to bloggers http://www.rawstory.com/news/2006/Raw_obtains_CENTCOM_email_to_bloggers_1016.html
  8. Air Force Releases ‘Counter-Blog’ Marching Orders http://www.wired.com/2009/01/usaf-blog-respo/
  9. Sentient world: war games on the grandest scale http://www.theregister.co.uk/2007/06/23/sentient_worlds/
  10. Transnational CLEAN IT: the secret EU surveillance plan that wasn't, October 2012 http://www.tni.org/article/clean-it-secret-eu-surveillance-plan-wasnt
  11. What is known about NSA's PRISM program http://electrospaces.blogspot.nl/2014/04/what-is-known-about-nsas-prism-program.html
  12. Guardian: Obama orders US to draw up overseas target list for cyber-attacks http://www.theguardian.com/world/2013/jun/07/obama-china-targets-cyber-overseas
  13. Boundless Informant: NSA explainer – full document text http://www.theguardian.com/world/interactive/2013/jun/08/boundless-informant-nsa-full-text
  14. Top Level Communications: Screenshots from BOUNDLESSINFORMANT can be misleading http://electrospaces.blogspot.nl/2013/11/screenshots-from-boundlessinformant-can.html
  15. South China Morning Post: Edward Snowden: US government has been hacking Hong Kong and China for years http://www.scmp.com/news/hong-kong/article/1259508/edward-snowden-us-government-has-been-hacking-hong-kong-and-china
  16. Guardian: GCHQ intercepted foreign politicians' communications at G20 summits http://www.theguardian.com/uk/2013/jun/16/gchq-intercepted-communications-g20-summits
  17. G20 summit: NSA targeted Russian president Medvedev in London http://www.theguardian.com/world/2013/jun/16/nsa-dmitry-medvedev-g20-summit
  18. GCHQ surveillance – the documents http://www.theguardian.com/uk/interactive/2013/jun/16/gchq-surveillance-the-documents
  19. The top secret rules that allow NSA to use US data without a warrant http://www.theguardian.com/world/2013/jun/20/fisa-court-nsa-without-warrant
  20. GCHQ taps fibre-optic cables for secret access to world's communications http://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa
  21. NSA inspector general report on email and internet data collection under Stellar Wind – full document http://www.theguardian.com/world/interactive/2013/jun/27/nsa-inspector-general-report-document-data-collection
  22. Der Spiegel: Attacks from America: NSA Spied on European Union Offices http://www.spiegel.de/international/europe/nsa-spied-on-european-union-offices-a-908590.html
  23. Der Spiegel: NSA Snoops on 500 Million German Data Connections http://www.spiegel.de/international/germany/nsa-spies-on-500-million-german-data-connections-a-908648.html
  24. Le Monde: Révélations sur le Big Brother français http://www.lemonde.fr/societe/article/2013/07/04/revelations-sur-le-big-brother-francais_3441973_3224.html
  25. EUA expandem o aparato de vigilância continuamente http://oglobo.globo.com/mundo/eua-expandem-aparato-de-vigilancia-continuamente-8941149
  26. The Sydney Morning Herald: Australia aids in covert data collection http://www.smh.com.au/world/snowden-reveals-australias-links-to-us-spy-web-20130708-2plyg.html
  27. O Globo: EUA espionaram milhões de e-mails e ligações de brasileiros http://oglobo.globo.com/mundo/eua-espionaram-milhoes-de-mails-ligacoes-de-brasileiros-8940934
  28. O Globo: Espionagem dos EUA se espalhou pela América Latina http://oglobo.globo.com/mundo/espionagem-dos-eua-se-espalhou-pela-america-latina-8966619
  29. Foreign policy: The CIA’s New Black Bag Is Digital http://foreignpolicy.com/2013/07/17/the-cias-new-black-bag-is-digital/
  30. Der Spiegel: German Intelligence Used NSA Spy Program http://www.spiegel.de/international/germany/german-intelligence-agencies-used-nsa-spying-program-a-912173.html
  31. Obama Visit Highlights 'Genuine Trans-Atlantic Dissonance' http://www.spiegel.de/international/world/german-press-reactions-to-us-president-obama-berlin-visit-a-906894.html
  32. XKeyscore: NSA tool collects 'nearly everything a user does on the internet' http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
  33. The Guardian: NSA pays £100m in secret funding for GCHQ http://www.theguardian.com/uk-news/2013/aug/01/nsa-paid-gchq-spying-edward-snowden
  34. Chatham House Rule http://www.chathamhouse.org/about/chatham-house-rule
  35. The Death of Irony: University of Penn’s Secret Meetings on Secret Surveillance Law http://mediaroots.org/the-death-of-irony-or-university-of-penns-secret-meetings-on-secret-surveillance-law/
  36. U.S. directs agents to cover up program used to investigate Americans http://www.reuters.com/article/2013/08/05/us-dea-sod-idUSBRE97409R20130805
  37. Meet the Spies Doing the NSA’s Dirty Work http://foreignpolicy.com/2013/11/21/meet-the-spies-doing-the-nsas-dirty-work/
  38. Spy Copters, Lasers, and Break-In Teams How the FBI keeps watch on foreign diplomats http://foreignpolicy.com/2013/11/19/spy-copters-lasers-and-break-in-teams/
  39. NSA tracking cellphone locations worldwide, Snowden documents show http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html
  40. Meet Jack. Or, What The Government Could Do With All That Location Data https://www.aclu.org/feature/meet-jack?redirect=meet-jack-or-what-government-could-do-all-location-data
  41. The Multistakeholder Model, Neo-liberalism and Global (Internet) Governance https://gurstein.wordpress.com/2014/03/26/the-multistakeholder-model-neo-liberalism-and-global-internet-governance/
  42. Domain name expansion signals political shift of the internet https://theconversation.com/domain-name-expansion-signals-political-shift-of-the-internet-22865
  43. NSA Surveillance is about Control & Leverage, not Security http://www.juancole.com/2014/01/surveillance-leverage-security.html
  44. The Intercept: Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On https://firstlook.org/theintercept/2014/07/09/under-surveillance/
  45. Top Level Communications: Document shows that it was not NSA, but FBI that monitored 5 Americans http://electrospaces.blogspot.nl/2014/07/document-shows-that-it-was-not-nsa-but.html#uds-search-results
  46. Reuters: Rights group sues DEA over bulk collection of phone records http://www.reuters.com/article/2015/04/08/us-usa-dea-lawsuit-idUSKBN0MZ1F720150408
  47. DEA Global Surveillance Dragnet Exposed; Access to Data Likely Continues https://firstlook.org/theintercept/2015/04/08/dea-surveillance-phone-records-crisscross-nsa/
  48. Inside Washington's Quest to Bring Down Edward Snowden https://news.vice.com/article/exclusive-inside-washingtons-quest-to-bring-down-edward-snowden
  49. ProPublica: New Snowden Documents Reveal Secret Memos Expanding Spying https://www.propublica.org/article/new-snowden-documents-reveal-secret-memos-expanding-spying