The origins of global surveillance can be traced back to the late 1940s, when the UKUSA Agreement was jointly enacted by the United Kingdom and the United States, whose close cooperation eventually culminated in the creation of the global surveillance network, code-named "ECHELON", in 1971.[1][2]
However, for the general public, it was a series of detailed disclosures of internal NSA documents in June 2013 that first revealed the massive extent of the NSA's spying, both foreign and domestic. Most of these were leaked by an ex-contractor, Edward Snowden. Even so, a number of these older global surveillance programs such as PRISM, XKeyscore, and Tempora were referenced in the 2013 release of thousands of documents.[6] As confirmed by the NSA's director Keith B. Alexander in 2013, the NSA collects and stores all phone records of all American citizens.[7] Much of the data is kept in large storage facilities such as the Utah Data Center, a US$1.5 billion megaproject referred to by The Wall Street Journal as a "symbol of the spy agency's surveillance prowess."[8]
Wartime censorship of communications during the World Wars was paralleled by peacetime decipherment of communications by the Black Chamber (Cipher Bureau, MI-8), operating with the approval of the U.S. State Department from 1919 to 1929.[9] In 1945 the now-defunct Project SHAMROCK was created to gather all telegraphic data entering into or exiting from the United States.[9][10] Major communication companies such as Western Union, RCA Global and ITT World Communications actively aided the U.S. government in the latter's attempt to gain access to international message traffic.[11]
Some of these activities were uncovered when documents were released in 1971 by the Citizens' Commission to Investigate the FBI, followed by the information revealed in the investigations of the 1972 Watergate scandal.[28] Following the 1974 resignation of Richard Nixon, and in light of the cumulative revelations, the U.S. Senate Church Committee was appointed in 1975 to investigate intelligence abuses by federal agencies. In a May 1976 Time article, Nobody Asked: Is It Moral?, the magazine stated:
During World War II the U.K. and U.S. governments entered into a series of agreements for sharing of signals intelligence of enemy communications traffic.[31] In March 1946, a secret agreement, the "British-US Communication Intelligence Agreement", known as BRUSA, was established, based on the wartime agreements. The agreement "tied the two countries into a worldwide network of listening posts run by Government Communications Headquarters (GCHQ), the U.K.'s biggest spying organisation, and its U.S. equivalent, the National Security Agency."[32]
In 1988, an article titled "Somebody's listening" by Duncan Campbell in the New Statesman, described the signals intelligence gathering activities of a program code-named "ECHELON.[33] The program was engaged by English-speaking World War II Allied powers Australia, Canada, New Zealand, the United Kingdom and the United States (collectively known as AUSCANNZUKUS). Based on the UKUSA Agreement, it was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.[34] Though its existence had long been known, the UKUSA agreement only became public in 2010. It enabled the U.S. and the U.K. to exchange "knowledge from operations involving intercepting, decoding and translating foreign communications." The agreement forbade the parties to reveal its existence to any third party.[32]
By the late 1990s the ECHELON system was capable of intercepting satellite transmissions, public switched telephone network (PSTN) communications (including most Internet traffic), and transmissions carried by microwave. A detailed description of ECHELON was provided by New Zealand journalist Nicky Hager in his 1996 book "Secret Power". While the existence of ECHELON was denied by some member governments, a report by a committee of the European Parliament in 2001 confirmed the program's use and warned Europeans about its reach and effects.[35] The European Parliament stated in its report that the term "ECHELON" was used in a number of contexts, but that the evidence presented indicated it was a signals intelligence collection system capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally. The report to the European Parliament confirmed that this was a "global system for the interception of private and commercial communications."[34]
Echelon spy network revealed
Imagine a global spying network that can eavesdrop on every single phone call, fax or e-mail, anywhere on the planet. It sounds like science fiction, but it's true. Two of the chief protagonists - Britain and America - officially deny its existence. But the BBC has confirmation from the Australian Government that such a network really does exist..."
— The British Broadcasting Corporation (BBC), November 1999[36]
In the aftermath of the September 11 attacks in 2001 on the World Trade Center and the Pentagon, the scope of domestic spying in the United States increased significantly. The bid to prevent future attacks of this scale led to the passage of the Patriot Act. Later acts include the Protect America Act (which removes the warrant requirement for government surveillance of foreign targets[41]) and the FISA Amendments Act (which relaxed some of the original FISA court requirements).
In 2005, the existence of STELLARWIND was revealed by Thomas Tamm. On January 1, 2006, days after The New York Times wrote that "Bush Lets U.S. Spy on Callers Without Courts,[42] the President emphasized that "This is a limited program designed to prevent attacks on the United States of America. And I repeat, limited."[43]
In 2006, Mark Klein revealed the existence of Room 641A that he had wired back in 2003.[44] In 2008, Babak Pasdar, a computer security expert, and CEO of Bat Blue publicly revealed the existence of the "Quantico circuit", that he and his team found in 2003. He described it as a back door to the federal government in the systems of an unnamed wireless provider; the company was later independently identified as Verizon.[45] Additional disclosures regarding a mass surveillance program involving U.S. citizens had been made in the U.S. media in 2006.[46]
You Are a Suspect
Every purchase you make with a credit card, every magazinesubscription you buy and medical prescription you fill, every Web site you visit and e-mail you send or receive, every academic grade you receive, every bank deposit you make, every trip you book and every event you attend—all these transactions and communications will go into what the Defense Department describes as a virtual, centralized grand database. To this computerized dossier on your private life from commercial sources, add every piece of information that government has about you—passport application, driver's license and toll records, judicial and divorce records, complaints from nosy neighbors to the F.B.I., your lifetime paper trail plus the latest hidden camera surveillance—and you have the supersnoop's dream: a Total Information Awareness about every U.S. citizen.
The 7th U.N. Secretary-General Kofi Annan was placed under surveillance by British intelligence agents, who bugged his office in the lead up to the Iraq War.[48]
The 8th U.N. Secretary-General Ban Ki-moon was placed under surveillance by U.S. diplomats, who also collected iris scans, fingerprints and DNA of foreign diplomats, according to leaked documents released by WikiLeaks.[49][50]
On March 15, 2012, the American magazine Wired published an article with the headline "The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)",[52] which was later mentioned by U.S. Rep. Hank Johnson during a congressional hearing. In response to Johnson's inquiry, NSA director Keith B. Alexander testified that these allegations made by Wired magazine were untrue.[53]
^Nabbali, Talitha; Perry, Mark (March 2004). "Going for the throat". Computer Law & Security Review. 20 (2): 84–97. doi:10.1016/S0267-3649(04)00018-4. It wasn't until 1971 that the UKUSA allies began ECHELON
^"Senators: Limit NSA snooping into US phone records". Associated Press. Retrieved October 15, 2013. "Is it the goal of the NSA to collect the phone records of all Americans?" Udall asked at Thursday's hearing. "Yes, I believe it is in the nation's best interest to put all the phone records into a lockbox that we could search when the nation needs to do it. Yes," Alexander replied.
^Siobhan Gorman. "Meltdowns Hobble NSA Data Center". The Wall Street Journal. Retrieved October 19, 2013. The Utah facility, one of the Pentagon's biggest U.S. construction projects, has become a symbol of the spy agency's surveillance prowess, which gained broad attention in the wake of leaks from NSA contractor Edward Snowden.
^"Albert Einstein: Fact or Fiction?". History (U.S. TV channel). Retrieved September 17, 2013. Because of his controversial political beliefs-his support for socialism, civil rights, and nuclear disarmament, for example-many anti-Communist crusaders believed that Einstein was a dangerous subversive. Some, like FBI director J. Edgar Hoover, even thought he was a spy. For 22 years, Hoover's agents tapped Einstein's phones, opened his mail, rifled through his trash and even bugged his secretary's nephew's house, all to prove that he was more radical (as his 1,500-page FBI dossier noted) than "even Stalin himself."
^"Eleanor Roosevelt". History (U.S. TV channel). Retrieved September 18, 2013. J. Edgar Hoover (1895–1972), the longtime director of the Federal Bureau of Investigation, considered Eleanor Roosevelt's liberal views dangerous and believed she might be involved in communist activities. He ordered his agents to monitor Roosevelt and keep what became an extensive file on her.
^"'Life Lessons' From a White House Plumber". NPR.org. NPR. When Daniel Ellsberg leaked the Pentagon Papers to The New York Times in 1971, the Nixon White House tried to discredit him. Among other things, Nixon loyalists burglarized the office of Ellsberg's psychiatrist.
^"The Watergate Story". The Washington Post. Retrieved September 17, 2013. The White House "plumbers" unit - named for their orders to plug leaks in the administration - burglarizes a psychiatrist's office to find files on Daniel Ellsberg, the former defense analyst who leaked the Pentagon Papers.
^Risen, James; Lichtblau, Eric (December 16, 2005). "Bush Lets U.S. Spy on Callers Without Courts". The New York Times. Retrieved August 14, 2013. The White House asked The New York Times not to publish this article
^"Ex-CIA employee source of leak on PRISM program". France 24. 9 June 2013. Retrieved September 17, 2013. Snowden's decision to reveal his identity and whereabouts lifts the lid on one of the biggest security leaks in US history and escalates a story that has placed a bright light on Obama's extensive use of secret surveillance.