List of government mass surveillance projects explained
See main article: Mass surveillance.
This is a list of government surveillance projects and related databases throughout the world.
International
European Union
Former
- Data Retention Directive: A defunct directive requiring EU member states to store citizens' telecommunications data for six to 24 months and allowing police and security agencies to request access from a court to details such as IP address and time of use of every email, phone call, and text message sent or received.
- INDECT: Was a research project (until 2014) funded by the European Union to develop surveillance methods (e.g. processing of CCTV camera data streams) for the monitoring of abnormal behaviours in an urban environment.[1]
Current (as per 2024)
National
Australia
See main article: Mass surveillance in Australia.
- In August 2014 it was reported[2] that law-enforcement agencies had been accessing Australians' web browsing histories via internet providers such as Telstra without a warrant.
- It was reported[3] that Australia had issued 75% more wiretap warrants in 2003 than the US did and this was 26 times greater than the US on a per capita basis.
China
See main article: Mass surveillance in China.
France
Germany
India
Russia
Is a global vehicle tracking system, control and tracking, identification of probable routes and places of the most frequent appearance of a particular vehicle, integrated with a distributed network of radar complexes of photo-video fixation and road surveillance camera.[16] Developed and implemented by the "Advanced Scientific - Research Projects" enterprise St. Petersburg.[17] Within the framework of the practical use of the system of the Ministry of Internal Affairs of the Russian Federation, it has made it possible to identify and solve grave and especially grave crimes, the system is also operated by other state services and departments;
- Yarovaya Law is a piece of anti-terrorist legislation that includes a requirement to store all phone call and text messaging data, as well as providing cryptographic backdoors for security services.
Sweden
Switzerland
A data gathering system maintained by several Swiss intelligence agencies to monitor military and civilian communications, such as e-mails, telefax and telephone calls. In 2001, Onyx received its second nomination from the ironically named "Big Brother Award".[20]
United Kingdom
Launched in the autumn of 2011, this initiative allows the GCHQ to set up a large-scale buffer that is capable of storing internet content for 3 days and metadata for 30 days.[25]
prototyped in 2010, sends daily alerts to GCHQ whenever a booking is made from a ".gov." second-level domain at select hotels worldwide.[26]
United States
- Boundless Informant: A system deployed by the National Security Agency to analyze global electronic information. In March 2013, Boundless Informant gathered 14 billion data reports from Iran, 6.3 billion from India, and 2.8 billion from the United States.[28]
- BULLRUN: a highly classified U.S. National Security Agency program to preserve its ability to eavesdrop on encrypted communications by influencing and weakening encryption standards, by obtaining master encryption keys, and by gaining access to data before or after it is encrypted either by agreement, by force of law, or by computer network exploitation (hacking).
- Carnivore: A system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. Apparently replaced by commercial software such as NarusInsight.
- Comprehensive National Cybersecurity Initiative
- DCSNet: The Federal Bureau of Investigation (FBI)'s point-and-click surveillance system that can perform instant wiretaps on any telecommunications device located in the United States.[29]
- Fairview: A mass surveillance program directed at foreign mobile phone users.
- Financial Crimes Enforcement Network: A bureau of the Department of the Treasury that collects and analyzes financial transactions in order to combat financial crimes.
- ICREACH: Surveillance frontend GUI that is shared with 23 government agencies, including the CIA, DEA, and FBI, to search illegally collected personal records.
- Magic Lantern: A keystroke logging software deployed by the FBI in the form of an e-mail attachment. When activated, it acts as a trojan horse and allows the FBI to decrypt user communications.[30]
- Main Core: A personal and financial database storing information of millions of U.S. citizens believed to be threats to national security.[31] The data mostly comes from the NSA, FBI, CIA, as well as other government sources.[31]
- MAINWAY: NSA database containing metadata for hundreds of billions of telephone calls made through the four largest telephone carriers in the United States.
- Media monitoring services, A proposed DHS database for monitoring all global news sources and media influencers.
- MUSCULAR: Overseas wiretapping of Google's and Yahoo's unencrypted internal networks by the NSA.
- MYSTIC is a voice interception program used by the National Security Agency.
- Nationwide Suspicious Activity Reporting Initiative: Under this government initiative, a Suspicious Activity Report (SAR) may be filed by law enforcers, public safety personnel, owners of critical infrastructure or the general public.
- NSA ANT catalog: a 50-page document listing technology available to the United States National Security Agency (NSA) ANT division to aid in cyber-surveillance.
- PRISM: A clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) which can target customers of participating corporations outside or inside the United States.
- Room 641A: A telecommunication interception facility operated by AT&T for the U.S. National Security Agency.
- Sentry Eagle: efforts to monitor and attack an adversary's cyberspace through capabilities include SIGINT, Computer Network Exploitation (CNE), Information Assurance, Computer Network Defense (CND), Network Warfare, and Computer Network Attack (CNA). The efforts included weakening US commercial encryption systems.[32]
- Special Collection Service (SCS): A black budget program that is responsible for "close surveillance, burglary, wiretapping, breaking and entering." It employs covert listening device technologies to bug foreign embassies, communications centers, computer facilities, fiber-optic networks, and government installations.[33]
- Stellar Wind (code name): The open secret code name for four surveillance programs.
- Tailored Access Operations: Intelligence-gathering unit of the NSA that is capable of harvesting approximately 2 petabytes of data per hour.[34] [35]
- Terrorist Finance Tracking Program: A joint initiative run by the CIA and the Department of the Treasury to access the SWIFT (Society for Worldwide Interbank Financial Telecommunication) transaction database as part of the Bush administration's "Global War on Terrorism". According to the U.S. government, its efforts to counter terrorist activities were compromised after the existence of the Terrorist Finance Tracking Program was leaked to the media.[36]
- Turbulence (NSA): Turbulence is a United States National Security Agency (NSA) information-technology project started circa 2005. It was developed in small, inexpensive "test" pieces rather than one grand plan like its failed predecessor, the Trailblazer Project. It also includes offensive cyberwarfare capabilities, like injecting malware into remote computers. The U.S. Congress criticized the project in 2007 for having similar bureaucratic problems as the Trailblazer Project.[37]
- US Intelligence Community (IC): A cooperative federation of 16 government agencies working together, but also separately, to gather intelligence and conduct espionage.
- Utah Data Center: The Intelligence Community's US$1.5 billion data storage center that is designed to store extremely large amounts of data, on the scale of yottabytes.[38] [39] [40]
- X-Keyscore: A system used by the United States National Security Agency for searching and analysing internet data about foreign nationals.
Unclear origin
- GhostNet: A fictitious code name given to a large-scale surveillance project that is believed to be operated by the People's Republic of China.[41]
- Stuxnet: It is the first discovered malware that spies on industrial systems, and it was used to attack Iran's nuclear facilities.[42] It is believed to have originated from the United States under the Bush administration.[43]
Recently discontinued
See also
Notes and References
- Welcome to INDECT homepage – indect-home. http://www.indect-project.eu/ Retrieved 16 June 2013.
- News: Telstra found divulging web browsing histories to law-enforcement agencies without a warrant. Ben Grubb. 20 August 2014. The Sydney Morning Herald.
- Web site: Wiretapping Australia. 2003. 20 August 2014. https://web.archive.org/web/20140821041029/http://www.southsearepublic.org/article/838/read/wiretapping_australia/. 21 August 2014. dead.
- Web site: How China's Internet Police Control Speech on the Internet. Radio Free Asia. 11 June 2013. China’s police authorities spent the three years between 2003 and 2006 completing the massive "Golden Shield Project". Not only did over 50 percent of China’s policing agencies get on the Internet, there is also an agency called the Public Information Network Security and Monitoring Bureau, which boasts a huge number of technologically advanced and well-equipped network police. These are all the direct products of the Golden Shield Project..
- News: Ethnic cleansing makes a comeback – in China. https://web.archive.org/web/20190331161843/https://www.washingtonpost.com/opinions/global-opinions/ethnic-cleansing-makes-a-comeback--in-china/2018/08/02/. dead. 31 March 2019. Josh Rogin. 2 August 2018. 4 August 2018. Washington Post. Add to that the unprecedented security and surveillance state in Xinjiang, which includes all-encompassing monitoring based on identity cards, checkpoints, facial recognition and the collection of DNA from millions of individuals. The authorities feed all this data into an artificial-intelligence machine that rates people's loyalty to the Communist Party in order to control every aspect of their lives..
- Web site: China: Big Data Fuels Crackdown in Minority Region: Predictive Policing Program Flags Individuals for Investigations, Detentions. 26 February 2018. hrw.org. Human Rights Watch. 4 August 2018.
- News: Black Mirror is coming true in China, where your 'rating' affects your home, transport and social circle . Alice . Vincent . 15 December 2017 . The Daily Telegraph.
- The complicated truth about China's social credit system . en-GB . Wired UK . 2023-01-07 . 1357-0978.
- Web site: Mok . Katie Canales, Aaron . China's 'social credit' system ranks citizens and punishes them with throttled internet speeds and flight bans if the Communist Party deems them untrustworthy . 2023-01-07 . Business Insider . en-US.
- Web site: The Social Credit System: Not Just Another Chinese Idiosyncrasy . 2023-01-07 . Journal of Public and International Affairs . en.
- Web site: La France se met à l'espionnage. Free (ISP). 11 June 2013. fr. Frenchelon (ou French Echelon) est le surnom donné au réseau d'écoute de la DGSE. Le véritable nom de ce système d'écoute n'est pas connu (contrairement à ce que nous expliquions, ce n'est pas Emeraude).
- Web site: Datenschutzbeauftragte warnen vor Volltextsuche bei Verfassungsschutz und Polizei. 5 November 2010 . Heise Online. 20 December 2013. de.
- Matthias Gebauer . Hubert Gude . Veit Medick . Jörg Schindler . Fidelius Schmid . CIA Worked With BND and BfV in Neuss on Secret Project. Der Spiegel. 20 December 2013.
- News: India's centralised monitoring system comes under scanner, reckless and irresponsible usage is chilling. Daily News and Analysis. 12 June 2013.
- News: India sets up elaborate system to tap phone calls, e-mail. Reuters. 28 June 2013. The new system will allow the government to listen to and tape phone conversations, read e-mails and text messages, monitor posts on Facebook, Twitter or LinkedIn and track searches on Google of selected targets, according to interviews with two other officials involved in setting up the new surveillance programme, human rights activists and cyber experts.. 20 June 2013.
- Web site: What is "professionalitet", how it will be useful for a student, a specialist and the labor market. 2021-10-15. Website about business and economics. ru.
- Web site: "Digital-Report" - information and analytical magazin. 2021-08-12. Saboteur developers: pests at work and how to find them. 2021-10-15. Digital Report. ru-RU.
- TITAN: A TRAFFIC MEASUREMENT SYSTEM USING IMAGE PROCESSING TECHNIQUES. SECOND INTERNATIONAL CONFERENCE ON ROAD TRAFFIC MONITORING. Institution of Electrical Engineers.
- Web site: FRA har tillgång till kontroversiellt övervakningssystem. SVT. Nyheter.
- Web site: Big Brother Awards Schweiz: Onyx zum zweiten. 27 October 2001 . Heise.de. 28 June 2013. de.
- Web site: THE IMPACT NOMINAL INDEX (INI). Warwickshire Police. 24 June 2013. dead. https://web.archive.org/web/20130708091252/http://www.warwickshire.police.uk/onlineservices/INIfolder. 8 July 2013.
- Web site: Spy chiefs plot £12bn IT spree for comms überdatabase. Christopher. Williams. 7 October 2008. The Register.
- News: GCHQ taps fibre-optic cables for secret access to world's communications. The Guardian. 21 June 2013. This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.. London. Ewen. MacAskill. Julian. Borger. Nick. Hopkins. 21 June 2013.
- Wallace. Helen. The UK National DNA Database: Balancing crime detection, human rights and privacy. EMBO Reports. 7. Spec No. S26–S30. 1490298. Science and Society. 2006. 16819445. 10.1038/sj.embor.7400727.
- News: GCHQ taps fibre-optic cables for secret access to world's communications. The Guardian. 21 June 2013. London. Ewen. MacAskill. Julian. Borger. Nick. Hopkins. 21 June 2013.
- News: 'Royal Concierge': GCHQ Monitors Hotel Reservations to Track Diplomats. Poitras. Laura. Marcel Rosenbach . Holger Stark . 2013-11-17. Spiegel. 17 November 2013.
- Burgess. Matt. 2021-03-11. The UK is secretly testing a controversial web snooping tool. en-GB. Wired UK. 2021-03-11. 1357-0978.
- Meet 'Boundless Informant,' the NSA's Secret Tool for Tracking Global Surveillance Data. The Atlantic. 13 June 2013. The country where the largest amount of intelligence was gathered was, unsurprisingly, Iran: Boundless Informant shows more than 14 billion reports in that period. The second-largest collection came from Pakistan, with 13.5 billion reports. Jordan -- which is, yes, one of America's closest Arab allies -- had 12.7 billion reports. Egypt came in fourth (7.6 billion reports), and India in fifth with 6.3 billion. And when it comes to the U.S.? "The Boundless Informant documents show the agency collecting almost 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013.".
- https://www.wired.com/politics/security/news/2007/08/wiretap Point, Click ... Eavesdrop: How the FBI Wiretap Net Operates
- Web site: FBI Has a Magic Lantern . Usgovinfo.about.com . 23 February 2009.
- News: Exposing Bush's historic abuse of power. Shorrock. Tim. Salon.com. 23 July 2008. 19 December 2010.
- Web site: Core Secrets: NSA Saboteurs in China and Germany. The Intercept . 11 October 2014 . Maass, Poitras. 10 October 2014.
- News: Lichtblau . Eric . Eric Lichtblau . Spy Suspect May Have Revealed U.S. Bugging; Espionage: Hanssen left signs that he told Russia where top-secret overseas eavesdropping devices are placed, officials say . . 28 February 2001 . A1 . 17 April 2001 . dead . https://web.archive.org/web/20010417230720/http://www.latimes.com/news/nation/updates2/lat_spy010228.htm.
- Web site: Riley. Michael. How the U.S. Government Hacks the World. https://web.archive.org/web/20130525063903/http://www.businessweek.com/articles/2013-05-23/how-the-u-dot-s-dot-government-hacks-the-world. dead. 25 May 2013. Bloomberg Businessweek. 23 May 2013. 23 May 2013.
- Book: Aid, Matthew M.. The Secret Sentry: The Untold History of the National Security Agency. 22 May 2013. 8 June 2010. Bloomsbury USA. 978-1-60819-096-6. 311.
- Blustein, Paul, Gellman, Barton, and Linzer, Dafna. "Bank Records Secretly Tapped", Washington Post, 23 June 2006. Accessed 23 June 2006.
- Thomas Drake on The Real News "https://www.youtube.com/watch?v=ygCduZKJF0o", The Real News, 3 August 2015. Accessed 19 August 2015.
- Web site: Trenholm, Rich . NSA to Store Yottabytes in Utah Data Centre . . 13 June 2013 . https://web.archive.org/web/20130623005612/http://crave.cnet.co.uk/gadgets/nsa-to-store-yottabytes-in-utah-data-centre-49304118/ . 23 June 2013 . dead .
- The NSA Is Building the Country's Biggest Spy Center (Watch What You Say). James. Bamford. James Bamford. Wired. 15 March 2012. 5 April 2012.
- News: New NSA data center breaks ground on construction -- Defense Systems. Kenyon. Henry. 7 January 2011. Defense Systems. 11 August 2011.
- News: Vast Spy System Loots Computers in 103 Countries . . 28 March 2009 . 29 March 2009 . Markoff, John. John Markoff .
- Web site: Siemens: Stuxnet worm hit industrial systems . Robert McMillan . 16 September 2010 . Computerworld . 16 September 2010 . dead . https://archive.today/20120525053210/http://www.computerworld.com/s/article/print/9185419/Siemens_Stuxnet_worm_hit_industrial_systems?taxonomyName=Network+Security&taxonomyId=142 . 25 May 2012.
- News: Stuxnet was work of U.S. and Israeli experts, officials say. https://web.archive.org/web/20130101140228/http://articles.washingtonpost.com/2012-06-01/world/35459494_1_nuclear-program-stuxnet-senior-iranian-officials. dead. 1 January 2013. The Washington Post. 11 June 2013. The officials, speaking on the condition of anonymity to describe the classified effort code-named Olympic Games, said it was first developed during the George W. Bush administration and was geared toward damaging Iran’s nuclear capability gradually while sowing confusion among Iranian scientists about the cause of mishaps at a nuclear plant.. Ellen. Nakashima. Joby. Warrick. 3 June 2012.