List of government mass surveillance projects

This is a list of government surveillance projects and related databases throughout the world.

International

Snapshot of Boundless Informant's global map of data collection

European Union

  • Data Retention Directive: A directive requiring EU member states to store citizens' telecommunications data for six to 24 months and allowing police and security agencies to request access from a court to details such as IP address and time of use of every email, phone call, and text message sent or received.
  • INDECT: Research project funded by the European Union to develop surveillance methods (e.g. processing of CCTV camera data streams) for the monitoring of abnormal behaviours in an urban environment.[1]
  • Schengen Information System: A database kept for national security and law enforcement purposes.

National

Australia

  • In August 2014 it was reported[2] that law-enforcement agencies had been accessing Australians' web browsing histories via internet providers such as Telstra without a warrant.
  • It was reported[3] that Australia had issued 75% more wiretap warrants in 2003 than the US did and this was 26 times greater than the US on a per capita basis.

China

France

DGSE base near Domme in southwestern France

Germany

India

Russia

  • SORM: A technical system used by the Federal Security Service of the Russian Federation to monitor internet and telephone communication.
  • Yarovaya Law is a piece of anti-terrorist legislation that includes a requirement to store all phone call and text messaging data, as well as providing cryptographic backdoors for security services.

Sweden

Switzerland

United Kingdom

United States

A top secret document leaked by Edward Snowden to The Guardian in 2013, originally due to be declassified on 12 April 2038.
  • Boundless Informant: A system deployed by the National Security Agency to analyze global electronic information. In March 2013, Boundless Informant gathered 14 billion data reports from Iran, 6.3 billion from India, and 2.8 billion from the United States.[21]
  • BULLRUN: a highly classified U.S. National Security Agency program to preserve its ability to eavesdrop on encrypted communications by influencing and weakening encryption standards, by obtaining master encryption keys, and by gaining access to data before or after it is encrypted either by agreement, by force of law, or by computer network exploitation (hacking).
  • Carnivore: A system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. Apparently replaced by commercial software such as NarusInsight.
  • Comprehensive National Cybersecurity Initiative
  • DCSNet: The Federal Bureau of Investigation (FBI)'s point-and-click surveillance system that can perform instant wiretaps on any telecommunications device located in the United States.[22]
  • Fairview: A mass surveillance program directed at foreign mobile phone users.
  • Financial Crimes Enforcement Network: A bureau of the Department of the Treasury that collects and analyzes financial transactions in order to combat financial crimes.
  • ICREACH: Surveillance frontend GUI that is shared with 23 government agencies, including the CIA, DEA, and FBI, to search illegally collected personal records.
  • Magic Lantern: A keystroke logging software deployed by the FBI in the form of an e-mail attachment. When activated, it acts as a trojan horse and allows the FBI to decrypt user communications.[23]
  • Main Core: A personal and financial database storing information of millions of U.S. citizens believed to be threats to national security.[24] The data mostly comes from the NSA, FBI, CIA, as well as other government sources.[24]
  • MAINWAY: NSA database containing metadata for hundreds of billions of telephone calls made through the four largest telephone carriers in the United States.
  • Media monitoring services, A proposed DHS database for monitoring all global news sources and media influencers.
  • MUSCULAR: Overseas wiretapping of Google's and Yahoo's unencrypted internal networks by the NSA.
  • MYSTIC is a voice interception program used by the National Security Agency.
  • Nationwide Suspicious Activity Reporting Initiative: Under this government initiative, a Suspicious Activity Report (SAR) may be filed by law enforcers, public safety personnel, owners of critical infrastructure or the general public.
  • NSA ANT catalog: a 50-page document listing technology available to the United States National Security Agency (NSA) ANT division to aid in cyber-surveillance.
  • PRISM: A clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) which can target customers of participating corporations outside or inside the United States.
  • Room 641A: A telecommunication interception facility operated by AT&T for the U.S. National Security Agency.
  • Sentry Eagle: efforts to monitor and attack an adversary's cyberspace through capabilities include SIGINT, Computer Network Exploitation (CNE), Information Assurance, Computer Network Defense (CND), Network Warfare, and Computer Network Attack (CNA). The efforts included weakening US commercial encryption systems.[25]
  • Special Collection Service (SCS): A black budget program that is responsible for "close surveillance, burglary, wiretapping, breaking and entering." It employs covert listening device technologies to bug foreign embassies, communications centers, computer facilities, fiber-optic networks, and government installations.[26]
  • Stellar Wind (code name): The open secret code name for four surveillance programs.
  • Tailored Access Operations: Intelligence-gathering unit of the NSA that is capable of harvesting approximately 2 petabytes of data per hour.[27][28]
  • Terrorist Finance Tracking Program: A joint initiative run by the CIA and the Department of the Treasury to access the SWIFT (Society for Worldwide Interbank Financial Telecommunication) transaction database as part of the Bush administration's "Global War on Terrorism". According to the U.S. government, its efforts to counter terrorist activities were compromised after the existence of the Terrorist Finance Tracking Program was leaked to the media.[29]
  • Turbulence (NSA): Turbulence is a United States National Security Agency (NSA) information-technology project started circa 2005. It was developed in small, inexpensive "test" pieces rather than one grand plan like its failed predecessor, the Trailblazer Project. It also includes offensive cyberwarfare capabilities, like injecting malware into remote computers. The U.S. Congress criticized the project in 2007 for having similar bureaucratic problems as the Trailblazer Project.[30]
  • US Intelligence Community (IC): A cooperative federation of 16 government agencies working together, but also separately, to gather intelligence and conduct espionage.
  • Utah Data Center: The Intelligence Community's US$1.5 billion data storage center that is designed to store extremely large amounts of data, on the scale of yottabytes.[31][32][33]
  • X-Keyscore: A system used by the United States National Security Agency for searching and analysing internet data about foreign nationals.

Unclear origin

  • GhostNet: A fictitious code name given to a large-scale surveillance project that is believed to be operated by the People's Republic of China.[34]
  • Stuxnet: It is the first discovered malware that spies on industrial systems, and it was used to attack Iran's nuclear facilities.[35] It is believed to have originated from the United States under the Bush administration.[36]

Recently discontinued

See also

References

  1. Welcome to INDECT homepage — indect-home. Archived 8 January 2011 at the Wayback Machine Retrieved 16 June 2013.
  2. Ben Grubb (20 August 2014). "Telstra found divulging web browsing histories to law-enforcement agencies without a warrant". Sydney Morning Herald.
  3. "Wiretapping Australia". 2003. Archived from the original on 21 August 2014. Retrieved 20 August 2014.
  4. "How China's Internet Police Control Speech on the Internet". Radio Free Asia. Retrieved 11 June 2013. China’s police authorities spent the three years between 2003 and 2006 completing the massive “Golden Shield Project.” Not only did over 50 percent of China’s policing agencies get on the Internet, there is also an agency called the Public Information Network Security and Monitoring Bureau, which boasts a huge number of technologically advanced and well-equipped network police. These are all the direct products of the Golden Shield Project.
  5. Josh Rogin (2 August 2018). "Ethnic cleansing makes a comeback – in China" (Washington Post). Retrieved 4 August 2018. Add to that the unprecedented security and surveillance state in Xinjiang, which includes all-encompassing monitoring based on identity cards, checkpoints, facial recognition and the collection of DNA from millions of individuals. The authorities feed all this data into an artificial-intelligence machine that rates people's loyalty to the Communist Party in order to control every aspect of their lives.
  6. "China: Big Data Fuels Crackdown in Minority Region: Predictive Policing Program Flags Individuals for Investigations, Detentions". hrw.org. Human Rights Watch. 26 February 2018. Retrieved 4 August 2018.
  7. Vincent, Alice (15 December 2017). "Black Mirror is coming true in China, where your 'rating' affects your home, transport and social circle". The Daily Telegraph.
  8. "La France se met à l'espionnage" (in French). Free (ISP). Retrieved 11 June 2013. Frenchelon (ou French Echelon) est le surnom donné au réseau d'écoute de la DGSE. Le véritable nom de ce système d'écoute n'est pas connu (contrairement à ce que nous expliquions, ce n'est pas Emeraude)
  9. "Datenschutzbeauftragte warnen vor Volltextsuche bei Verfassungsschutz und Polizei" (in German). Heise Online. Retrieved 20 December 2013.
  10. Matthias Gebauer; Hubert Gude; Veit Medick; Jörg Schindler; Fidelius Schmid. "CIA Worked With BND and BfV In Neuss on Secret Project". Der Spiegel. Retrieved 20 December 2013.
  11. "India's centralised monitoring system comes under scanner, reckless and irresponsible usage is chilling". Daily News and Analysis. Retrieved 12 June 2013.
  12. "India sets up elaborate system to tap phone calls, e-mail". Reuters. 20 June 2013. Retrieved 28 June 2013. The new system will allow the government to listen to and tape phone conversations, read e-mails and text messages, monitor posts on Facebook, Twitter or LinkedIn and track searches on Google of selected targets, according to interviews with two other officials involved in setting up the new surveillance programme, human rights activists and cyber experts.
  13. Nyheter, SVT. "FRA har tillgång till kontroversiellt övervakningssystem".
  14. "Big Brother Awards Schweiz: Onyx zum zweiten" (in German). Heise.de. Retrieved 28 June 2013.
  15. "THE IMPACT NOMINAL INDEX (INI)". Warwickshire Police. Archived from the original on 8 July 2013. Retrieved 24 June 2013.
  16. Williams, Christopher (7 October 2008). "Spy chiefs plot £12bn IT spree for comms überdatabase". The Register.
  17. MacAskill, Ewen; Borger, Julian; Hopkins, Nick (21 June 2013). "GCHQ taps fibre-optic cables for secret access to world's communications". The Guardian. London. Retrieved 21 June 2013. This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.
  18. Wallace, Helen (2006). "The UK National DNA Database: Balancing crime detection, human rights and privacy". EMBO Reports. Science and Society. 7 (Spec No): S26–S30. doi:10.1038/sj.embor.7400727. PMC 1490298. PMID 16819445.
  19. MacAskill, Ewen; Borger, Julian; Hopkins, Nick (21 June 2013). "GCHQ taps fibre-optic cables for secret access to world's communications". The Guardian. London. Retrieved 21 June 2013.
  20. Poitras, Laura; Marcel Rosenbach; Holger Stark (17 November 2013). "'Royal Concierge': GCHQ Monitors Hotel Reservations to Track Diplomats". Spiegel. Retrieved 17 November 2013.
  21. "Meet 'Boundless Informant,' the NSA's Secret Tool for Tracking Global Surveillance Data". The Atlantic. Retrieved 13 June 2013. The country where the largest amount of intelligence was gathered was, unsurprisingly, Iran: Boundless Informant shows more than 14 billion reports in that period. The second-largest collection came from Pakistan, with 13.5 billion reports. Jordan -- which is, yes, one of America's closest Arab allies -- had 12.7 billion reports. Egypt came in fourth (7.6 billion reports), and India in fifth with 6.3 billion. And when it comes to the U.S.? "The Boundless Informant documents show the agency collecting almost 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013."
  22. Point, Click ... Eavesdrop: How the FBI Wiretap Net Operates.
  23. "FBI Has a Magic Lantern". Usgovinfo.about.com. Retrieved 23 February 2009.
  24. Shorrock, Tim (23 July 2008). "Exposing Bush's historic abuse of power". Salon.com. Retrieved 19 December 2010.
  25. Maass, Poitras (10 October 2014). "Core Secrets: NSA Saboteurs in China and Germany". The Intercept. Retrieved 11 October 2014.
  26. Lichtblau, Eric (28 February 2001). "Spy Suspect May Have Revealed U.S. Bugging; Espionage: Hanssen left signs that he told Russia where top-secret overseas eavesdropping devices are placed, officials say". Los Angeles Times. p. A1. Archived from the original on 17 April 2001.
  27. Riley, Michael (23 May 2013). "How the U.S. Government Hacks the World". Bloomberg Businessweek. Retrieved 23 May 2013.
  28. Aid, Matthew M. (8 June 2010). The Secret Sentry: The Untold History of the National Security Agency. Bloomsbury USA. p. 311. ISBN 978-1-60819-096-6. Retrieved 22 May 2013.
  29. Blustein, Paul, Gellman, Barton, and Linzer, Dafna. "Bank Records Secretly Tapped", Washington Post, 23 June 2006. Accessed 23 June 2006.
  30. Thomas Drake on The Real News "", The Real News, 3 August 2015. Accessed 19 August 2015.
  31. Trenholm, Rich. "NSA to Store Yottabytes in Utah Data Centre". CNET. Archived from the original on 3 July 2013. Retrieved 13 June 2013.
  32. Bamford, James (15 March 2012). "The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)". Wired. Retrieved 5 April 2012.
  33. Kenyon, Henry (7 January 2011). "New NSA data center breaks ground on construction -- Defense Systems". Defense Systems. Retrieved 11 August 2011.
  34. Markoff, John (28 March 2009). "Vast Spy System Loots Computers in 103 Countries". The New York Times. Retrieved 29 March 2009.
  35. Robert McMillan (16 September 2010). "Siemens: Stuxnet worm hit industrial systems". Computerworld. Archived from the original on 25 May 2012. Retrieved 16 September 2010.
  36. Nakashima, Ellen; Warrick, Joby (3 June 2012). "Stuxnet was work of U.S. and Israeli experts, officials say". The Washington Post. Retrieved 11 June 2013. The officials, speaking on the condition of anonymity to describe the classified effort code-named Olympic Games, said it was first developed during the George W. Bush administration and was geared toward damaging Iran’s nuclear capability gradually while sowing confusion among Iranian scientists about the cause of mishaps at a nuclear plant.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.