Worldwide automated mass surveillance

from Wikipedia, the free encyclopedia
The articles Globale_Überwachungs-_und_Spionageaffäre # Weltweit_automatisiert_Massenwissenschaften and Worldwide automated mass surveillance overlap thematically. Help me to better differentiate or merge the articles (→  instructions ) . To do this, take part in the relevant redundancy discussion . Please remove this module only after the redundancy has been completely processed and do not forget to include the relevant entry on the redundancy discussion page{{ Done | 1 = ~~~~}}to mark. DrLee ( discussion ) 08:06, Jan. 9, 2014 (CET)

This article describes the worldwide automated mass surveillance in the global surveillance and espionage affair .

United States

The "five eyes" of Australia, Canada, New Zealand, the United Kingdom and the United States
Location and landing points of the transatlantic submarine cable TAT-14
Location and landing points of the SEA-ME-WE 3 sea ​​cable
Location and landing points of the SEA-ME-WE 4 sea ​​cable
Routes and landing points of the SEA-ME-WE 5 sea ​​cable

The Utah Data Center , located at Camp Williams south of the city of Bluffdale , Utah , is a fusion center under construction of the United States Intelligence Community (IC). The building owner of the facility is the NSA. The exact purpose of the facility is kept secret; it is intended to support the Comprehensive National Cybersecurity Initiative (CNCI). The memory space of the system varies depending on the information between a Yottabyte (1 YB = 10 24 bytes, which corresponds to when said system costs about 0.17 per cent terabytes, source: the mirror), 5 Zettabyte (1 ZB = 10 21 bytes = 1 Billion terabytes; source: NPR) or only approx. 3–12 exabytes (1 EB = 10 18 bytes = 1 million terabytes; with a price of approx. 170 dollars per terabyte, source: Forbes). Converted to the world population, this would correspond to a data volume of around 140 gigabytes to 1.4 megabytes per person. This enables the step towards complete monitoring and storage of worldwide communication.

The amount of data currently generated by US surveillance is 29 petabytes per day.

In the United States, the secret FISA court ordered that the telecommunications company Verizon Communications , based on the USA PATRIOT Act , must transfer all metadata of its US customers to the NSA. This order is issued for 90 days and is routinely extended. It is not known whether similar orders were made for other telecommunications companies. With the decision of August 29, 2013, the court determined that the disclosure of such data does not violate the US Constitution and that no search and no court order is necessary.

In 2010, the NSA began creating social networks from collected US metadata and overseas surveillance data from public, commercial and other sources, according to the New York Times . The aim was to uncover connections between Americans and target persons abroad.

In November 2013 it became known that the NSA had infiltrated 50,000 computer networks worldwide with malware and that it had set itself the goal of having access to 85,000 systems by the end of 2013.

Five Eyes (UKUSA)

The British GCHQ is said to have gained access to more than 200 fiber optic cables worldwide. In 2012, GCHQ's data processing system is said to have been able to process 600 million telephone events per day. It is assumed that Vodafone Cable , British Telecommunications (BT) , Verizon Business, as well as the network operators Level 3 , Interoute , Viatel and Global Crossing are acting on the instructions of the British government.

The secret service thus theoretically had access to communication links between Europe and North America, via the submarine cables TAT-14 and Atlantic Crossing 1 , and within Europe, as well as in Germany. The Pan-European-Crossing PEC submarine cable is important for communication in Europe . The submarine cable SEA-ME-WE 3 , which runs from northern Germany to the Strait of Gibraltar, via Egypt, Djibouti (East Africa), via Singapore to Japan and Australia, is important for communication between Europe, East Africa and the Asian Pacific states.

The Australian intelligence service Defense Signals Directorate is helping to tap the SEA-ME-WE-3 cable under the UKUSA (Five Eyes) agreement . The secret services of Singapore and Australia work together here (the submarine cable SEA-ME-WE-4 ends in Singapore). There are other surveillance and listening systems in Australia, such as Pine Gap and the Shoal Bay Receiving Station , which exchange data with the NSA. In Canada, the Communications Security Establishment is the authority responsible for these tasks.

In 2012, 657 "data transfers" were made to British secret services by the Federal Office for the Protection of the Constitution.

According to the documents published by Snowden, it should have been possible for the NSA to gain access to the Blackberry mail system. In the Belgacom scandal , it became known that the British GCHQ succeeded in gaining access to Belgacom's central roaming routers in order to carry out man-in-the-middle attacks , among other things .

According to the news magazine "Der Spiegel", the NSA has also managed to obtain information about the network management of the SEA-ME-WE 4 submarine cable system.

Brazil

According to a report by the Brazilian newspaper O Globo, the NSA is said to have gained access to the Brazilian telecommunications network "over the years and systematically". Millions of emails and phone calls have been tapped, according to an article written by Guardian journalist Glenn Greenwald together with reporters from O Globo . The volume of data is constant and large, which makes Brazil stand out in Latin America. Brazil decided to phone the United Nations (UN) in response to US wiretapping. The aim is an initiative to better protect the privacy of Internet users. However, it is not clear whether the NSA has an increased interest in Brazilian data or whether Brazil is just the place where the data is passed to the NSA, since Brazil is an important international hub for telecommunications submarine cables and a satellite listening station near the capital Brasília is located.

France

SIGINT system of the DGSE in Domme in south-west France, which is part of the Frenchelon program

The French daily Le Monde reported in July 2013 that the French foreign intelligence service Direction Générale de la Sécurité Extérieure (DGSE) is recording, storing and making available to French authorities and other French intelligence services on a large scale metadata about electronic communications and Internet use by the French. According to Edward Snowden's documents, France concluded a cooperation agreement with the “Five Eyes” some time ago under the code name “Luster” and, according to the Süddeutsche Zeitung, should systematically provide them with information. At the end of October 2013, Edward Snowden's documents revealed that the NSA had obtained surveillance data from France. This aroused great protest in France. A few days later, the director of the NSA testified in the US Congress that the 70 million telephone calls recorded between December 2012 and January 2013 had been collected by French secret services outside the country and shared with the NSA.

Spain

In addition to spying on members of the Spanish government from December 2012 to the end of January 2013, the NSA also collected data from 60.5 million telephone calls and other personal data from Internet and e-mail services, Facebook and Twitter. Keith B. Alexander , director of the NSA, told the US Congress that the bulk data had been collected by Spanish intelligence agencies outside the country and shared with the NSA.

Germany

Technical reconnaissance has been an integral part of the US services in the FRG since it has existed; For this purpose a network of partner services was set up early on. Adenauer already signed a surveillance reservation, which still granted the former occupying powers the right to control domestic and foreign postal and telecommunications traffic. Among the German services, the BND has always been the main partner for this practice; In 1993 he was granted the exclusive right to exchange information with the partner services. The news magazine Der Spiegel wrote in February 1989: Four years after George Orwell wrote down his dystopia in 1984 , in 1952, the US government founded a secret organization of Orwell's format, which from then on was empowered by Allied special rights in Europe , was able to operate largely at his own discretion. Telecommunications secrecy does not apply in the FRG: "Whoever picks up the phone between the North Sea and the Alps must be aware that the NSA is also in contact - friend listens." That on West German soil "everyone, apparently with the knowledge and approval of the federal government Beeper is tapped ", is considered safe among intelligence experts.

In the worldwide surveillance of electronic voice and data communication without suspicion, Germany is today an important partner of the NSA and the US companies that support it. At the same time, the Germans are being monitored by the western partners. Der Spiegel writes: “A confidential classification shows that the NSA sees the Federal Republic as a partner, but also as a target. According to this, Germany is one of the so-called third-class partners. Only Canada, Australia, Great Britain and New Zealand, which are listed as second-class partners, are expressly excluded from espionage attacks. 'We can attack the signals of most foreign third-class partners - and we do so too', it said in a presentation. "

NSA locations in Germany

Since 1952, the Upper Bavarian town of Bad Aibling had a listening station operated by the NSA ( Bad Aibling Station ). The facility was also used by British and German secret services and closed in 2004 under pressure from the European Union , individual departments were relocated to Darmstadt in the Dagger Complex and to the August Euler airfield near Griesheim . Parts of the facilities are still operated today by the Federal Intelligence Service, whose telecommunications center is stationed in a neighboring Bundeswehr barracks. According to Edward Snowden, "NSA eavesdropping specialists maintain their own communications center and a direct electronic connection to the NSA's data network on the grounds of the Mangfall barracks in Bad Aibling."

On July 7, the pointing mirror out that the United States Armed Forces in Wiesbaden Consolidated Intelligence Center (German " United News of the service center build"), which should be used after completion in late 2015 by the NSA. The staff of the Dagger complex is also to be relocated here. This includes around 1100 “Intelligence Professionals” and “Special Security Officers”.

Cooperation between the Federal Intelligence Service and the NSA

Demonstration of the Pirate Party against PRISM during the Berlin visit of US President Barack Obama in June 2013

In addition, the Spiegel reports that the Federal Intelligence Service (BND) transmitted a large amount of metadata from its own telecommunications intelligence to the American secret service NSA. Metadata is basically to be understood as connection data for phone calls, e-mails, SMS and chat contributions - for example, when which connection was connected to which connection for how long. According to statistics that Der Spiegel was able to see, up to 20 million telephone connections and around 10 million Internet data records from Germany are saved on normal days. In December 2012, around 500 million metadata are said to have been recorded in Bad Aibling. On peak days like January 7, 2013, the NSA collected around 60 million telephone calls in Germany.

The German foreign secret service had admitted this disclosure, but assured that this data would be "cleaned up" beforehand to remove any personal data from German citizens. The time , according to this .de about all e-mail addresses ending and filtered out all phone numbers with the country code +49. The powers of the German foreign secret service are essentially regulated in two laws: the so-called Article 10 Act and the BND Act . On April 28, 2002, a “Memorandum of Agreement” was signed between the BND and the NSA for future cooperation on the establishment of a joint SIGINT office in Bad Aibling, the exact content of which is secret. This happened at about the same time as other German legislative changes as part of the German contribution to the US war on terror . This agreement is the current basis for cooperation between the BND and the NSA.

According to research by the NDR and the Süddeutsche Zeitung, statements from asylum seekers about the security situation in their home countries are collected by German intelligence officers from the "Main Office for Interviewing" (HBW) (an institution that works closely with the Federal Intelligence Service and reports directly to the Chancellery) and then passed on from the BND to US and UK military intelligence. There they also flow into target acquisition for US killings with combat drones in crisis areas such as Somalia or Iraq.

Cooperation between the Office for the Protection of the Constitution and the NSA

According to a report in the Süddeutsche Zeitung on September 13, 2013, the Federal Office for the Protection of the Constitution (BfV) regularly sends confidential data to the NSA and works with eight other US services. According to a confidential paper, the Federal Office sent 864 records to the NSA in 2012. In return, the BfV received 4,700 connection data in the last four years. The BfV is currently testing the XKeyscore monitoring software . The Süddeutsche Zeitung writes: "Should the secret service use the program in regular operation, the BfV has undertaken to share all findings with the NSA." This had promised the NSA BfV President Hans-Georg Maassen . In addition, there should be regular meetings between representatives of the NSA and the BfV. An NSA employee allegedly meets weekly with German secret service employees in the "BfV property Treptow " to exchange information . Furthermore, analysts from the BfV are said to have met several times with their American colleagues in the US base Dagger Complex in Darmstadt. The parliamentary control body of the German Bundestag is said to have been "fully" informed.

Analytical activities for US companies

The announcement of the German-American agreement on the granting of exemptions and benefits to the companies "Lockheed Martin Integrated Systems, Inc." and " Booz Allen Hamilton , Inc." was announced on February 12, 2009 ( Federal Law Gazette II p. 110 ) . The legal basis for the agreement was Article 72 (4) of the Additional Agreement to the NATO Forces Statute . In Drucksache 17/5586 the Federal Government's answer to the minor question from MPs Paul Schäfer (Cologne) et.al. on April 14, 2011, the German government confirmed that in the period from January 2005 to February 2011, 292 US companies were granted discounts on the basis of the additional agreement to the NATO troop statute. The concessions are exemptions from the German regulations on the exercise of trade and commerce, with the exception of regulations on occupational safety and health.

The IT service provider Computer Sciences Corporation (CSC), which among other things is a contractor for the CIA and NSA and was involved in kidnappings and torture, operates the subsidiary CSC Deutschland Solutions GmbH in Germany with its headquarters in Wiesbaden . Since the 1990s, it has received orders from federal ministries with a total volume of approx. 300 million euros and access to sensitive data. In addition to the De-Mail project , which, according to the federal government, should allow secure communication with the authorities, CSC Germany was involved in setting up the national weapons register , checking the state Trojan and introducing the new identity card. Neither CSC Germany nor the Federal Ministry of the Interior wanted to comment on a possible transfer of German (citizen) data by CSC Germany via CSC to the US service in November 2013.

Other states

The alliance of states ("Five Eyes"), revealed by Edward Snowden, which has been monitoring the Internet independently of suspicion since 2007 at the latest and storing the data obtained in this way, has entered into collaborations with a number of other states. These states were mentioned in the press: Germany, Switzerland and Denmark, Israel, Sweden, Singapore, France, Italy and Spain.

Cooperation between companies and secret services

According to media reports, the British secret service GCHQ has been working with:
Companies Code name Branch
British Telecom Remedy telecommunications
Global crossing Pinnage Network operator
Interoute Streetcar Network operator
Level 3 Little Network operator
Verizon Dacron telecommunications
Viatel Vitreous Network operator
Vodafone Cable Gerontic telecommunications

At the beginning of August 2013, the Süddeutsche Zeitung and the NDR reported, after viewing documents provided by Edward Snowden, that US and British telecommunications companies and network operators are working with national secret services on the basis of legal instructions to enable them to gain access to data abroad. Some of the companies are said to have actively supported the secret services by developing computer programs against payment that make it easier for the secret services to intercept data from their networks. In 2013, the NSA reportedly paid US backbone providers US $ 278 million to access their infrastructure. Another US $ 56.6 million has gone to foreign partners ("Foreign Partner Access"), whereby these are foreign companies or secret services. US companies that cooperate with US authorities under PRISM are said to have received no money.

Glass fiber test access port (passive network monitoring component for data networks)

Level 3 operates several large data centers and internet nodes in Germany . On August 1, 2013, Level 3 indirectly admitted that it would enable the American secret services to monitor the world's largest Internet node DE-CIX in Frankfurt am Main . Interoute operates 102 so-called Point of Presence in Europe - 15 in Germany alone. Global Crossing controls an important transatlantic cable Atlantic Crossing 1 , which is connected to German networks on Sylt . Verizon operates two intra-European submarine cables, Ulysses 1 and 2 .

Viatel denied cooperating with the UK GCHQ, but at the same time referred to laws that can force companies to disclose information and cooperate with the government and the authorities, even in secrecy. All of the other companies named indirectly admitted the allegations at the request of the Süddeutsche Zeitung.

Edward Snowden's documents, which the NDR and the Süddeutsche Zeitung were able to inspect, are said to show that the GCHQ is also expressly committed to the “economic well-being” of the United Kingdom - state-financed industrial espionage could therefore be conceivable.

Monitoring of international payments by the NSA

A branch of the NSA called “ Follow the Money ” is responsible for spying on financial data. The information obtained flows into a financial database called “Tracfin” and contained around 180 million data records in 2011 alone. 84% of the data is credit card data. One of the goals was the transactions of Visa customers in Europe, the Middle East and Africa, according to a presentation. It is still a matter of “collecting, storing and analyzing the transaction data of leading credit card companies.” According to the Brazilian television broadcaster TV Globo, the NSA also taps into the SWIFT communication network used for data exchange between banks . US Intelligence Director James Clapper said it was "no secret that the intelligence community collects information on all economic and financial matters and the financing of terrorism." Even without the NSA, American authorities evaluate European bank data via SWIFT. There is a corresponding agreement between the USA and the EU. As the EU Commission admitted in 2011, the USA can access transfers from one EU country to another, provided they are made via the FIN service of the SWIFT network. A spokesman for the financial services provider SWIFT also confirmed this. In mid-September 2013, EU Interior Commissioner Cecilia Malmström spoke publicly of a possible end to the bank data agreement. After the European Parliament called for a suspension of the agreement on October 23, 2013 in a resolution adopted by the plenary, Malmström claimed that the agreement offered an effective protection of the rights of Europeans and would not be suspended, although there are known significant shortcomings in the agreement .

Collection of email contact details by the NSA

On October 15, the Washington Post published a report based on Snowden records, according to which the NSA was collecting contacts from the address books of online services. Since this practice is not allowed in the United States, the NSA would cooperate with foreign telecommunications providers. By linking the address books, contact profiles are to be created. According to the Washington Post, there are references to terrorists, human traffickers and drug smugglers .

FoxAcid

FoxAcid is an automated attack and monitoring system of the NSA, which independently categorizes people as suspicious, scans their target computers and telephones for security gaps and infiltrates them with individually suitable malware based on this analysis ("Tailored Access Operations") .

The technical weaknesses used for this purpose and officially mostly unknown come directly from software manufacturers and telephone providers and they are also bought on the black market. FoxAcid also codenames the secret Internet servers to which users are redirected unnoticed in order to infect browsers and computers and carry out further attacks, thus ensuring long-term compromise. Special cookies , such as those from Google, can uniquely identify the browser and are used to place targeted spy software on individual computers and "exploit it remotely".

In order to be identified as an attack target, it is sufficient to use certain keywords in communication or to visit certain websites. According to official records of the US Department of Defense, protests in the form of demonstrations are considered "low level terrorism" .

GCHQ monitors Yahoo webcams

The Guardian published an article on February 27, 2014 revealing the GCHQ's Optic Nerve spying program . Accordingly, the secret service saved the webcam images of millions of Internet users - at least for the period from 2008 to 2010, which is documented in the documents. In a six-month period in 2008, images of 1.8 million Yahoo users worldwide are said to have been saved. According to the report, the GCHQ is not able to differentiate the data collected by nationality - British, US or foreign. The GCHQ also attached great importance to withholding sexually offensive images from its own employees. This effort failed because the automatic face recognition had identified faces on the large skin area as photographs of the genitals. The GCHQ reports about 11% of the images as "unwanted nudity".

No live stream of the Yahoo webcams is recorded, only 1 photo is saved every 5 minutes. This is justified with

"Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users' feeds, partly to comply with human rights legislation, and also to avoid overloading GCHQ's servers."

"Instead of recording the webcam chat in its entirety, the program saves an image every five minutes from the user's data stream in order to respect the guidelines of the human rights charter and also to avoid overcrowding the GCHQ servers"

This is heavily criticized in an unusually harsh article by Netzpolitik.org : “ There are human rights legislation that is not violated if you only take the pictures every 5 minutes? Amazing. Somehow about the servers is the more credible argument ... "(Netzpolitik.org)

According to the Guardian , Yahoo said:

"We are not aware of the reported activity, nor would we condone it ... If this report is true, it will show a new level of invasion of our users' privacy that is completely unacceptable."

Yahoo appealed to governments around the world to reform surveillance laws. The GCHQ made the well-known announcement that no activist statements were made.

See also

Individual evidence

  1. Steve Fidel: Utah's $ 1.5 billion cyber-security center under way ( English ) In: Desert News . January 6, 2011. Archived from the original on July 22, 2013. Retrieved July 22, 2013.
  2. ^ Frank Patalong: Bluffdale: The NSA's data collection center . In: Der Spiegel . June 8, 2013. Archived from the original on August 20, 2013. Retrieved on August 11, 2013.
  3. ^ NPR: Amid Data Controversy, NSA Builds Its Biggest Data Farm ( English ) In: National Public Radio . June 10, 2013. Archived from the original on October 11, 2012. Retrieved on February 24, 2014.
  4. Kashmir Hill: Blueprints Of NSA's Ridiculously Expensive Data Center In Utah Suggest It Holds Less Info Than Thought ( English ) In: Forbes . July 24, 2013. Archived from the original on February 13, 2014. Retrieved on February 24, 2014.
  5. Chris Duckett: NSA hunger demands 29 petabytes of data a day . In: zdnet.com . August 12, 2013. Archived from the original on April 7, 2014. Retrieved October 24, 2013.
  6. NSA: Missions, Authorities, Oversight and Partnerships (PDF; 117 kB) In: nsa.gov . National Security Agency. August 9, 2013. Archived from the original on February 24, 2014. Retrieved March 25, 2014.
  7. Werner Pluta: Surveillance: NSA stores traffic data from Verizon . In: golem.de . June 6, 2013. Archived from the original on December 24, 2013. Retrieved on October 24, 2013.
  8. Glenn Greenwald: NSA collecting phone records of millions of Verizon customers daily ( English ) In: The Guardian . June 6, 2013. Archived from the original on May 6, 2014. Retrieved on February 24, 2014.
  9. Martin Holland: US Secret Court: Connection data are not part of privacy . In: Heise Online . September 18, 2013. Archived from the original on January 25, 2014. Retrieved on February 24, 2014.
  10. Martin Holland: NSA affair: Secret service comprehensively analyzes social relationships . In: Heise Online . September 30, 2013. Archived from the original on April 20, 2014. Retrieved on February 24, 2014.
  11. Matthias Kremp: NSA is said to have infiltrated 50,000 networks worldwide . In: Spiegel Online . November 24, 2013. Archived from the original on February 9, 2014. Retrieved on February 24, 2014.
  12. ^ John Goetz, Hans Leyendecker, Frederik Obermaier: Intelligence Service GCHQ - British skim off German Internet . In: Süddeutsche Zeitung . publisher. July 24, 2013. Archived from the original on April 5, 2014. Retrieved on February 24, 2014.
  13. a b James Ball, Luke Harding , Juliette Garside: BT and Vodafone among telecoms companies passing details to GCHQ ( English ) In: The Guardian . August 2, 2013. Archived from the original on August 30, 2013. Retrieved on February 24, 2014.
  14. John Goetz, Hans Leyendecker, Frederik Obermaier: British secret service taps data from Germany . In: Süddeutsche Zeitung . August 28, 2013. Archived from the original on April 1, 2014. Retrieved on February 24, 2014.
  15. ^ A b Philip Dorling: Australian spies in global deal to tap undersea cables ( English ) In: The Age . August 29, 2013. Archived from the original on December 5, 2013. Retrieved on February 24, 2014.
  16. Zeit Online -Autor kg: Espionage: Canada also collects online data worldwide . In: Zeit Online . June 11, 2013. Archived from the original on September 21, 2013. Retrieved on February 24, 2014.
  17. ^ A b Christian Fuchs, John Goetz: A partnership with mutual benefit . In: Tagesschau . September 13, 2013. Archived from the original on January 25, 2014. Retrieved on February 24, 2014.
  18. Michail Hengstenberg: NSA can also read iPhone, BlackBerry and Android phones . In: Spiegel Online . September 7, 2013. Archived from the original on March 27, 2014. Retrieved on February 24, 2014.
  19. ^ Spiegel Online: Belgacom: Secret service GCHQ hacked Belgian telephone company . In: Spiegel Online . September 20, 2013. Accessed February 24, 2014.
  20. SPON: NSA spies on data cables from Europe to Asia . In: Spiegel Online . December 29, 2013. Archived from the original on April 4, 2014. Retrieved on February 24, 2014.
  21. ^ Deutsche Welle authors mak, wa: NSA taps data cables from Europe to Asia . In: Deutsche Welle . December 29, 2013. Archived from the original on January 3, 2014. Retrieved on February 24, 2014.
  22. ^ Andreas Wilkens: Newspaper: Also Brazil in the crosshairs of the US secret service . In: Heise Online . July 7, 2013. Archived from the original on March 19, 2014. Retrieved October 25, 2013.
  23. Katharina Peters: NSA scandal: Brazil reacts angrily to espionage . In: Spiegel Online . July 8, 2013. Archived from the original on April 4, 2014. Retrieved October 25, 2013.
  24. Reuters: Brazil tries to Elude NSA with new Cables, Satellite ( English ) In: Voice of America . October 25, 2013. Archived from the original on October 29, 2013. Retrieved October 25, 2013.
  25. Martin Holland: Report: France sniffs with its own PRISM . In: Heise Online . July 4, 2013. Archived from the original on March 19, 2014. Retrieved on February 24, 2014.
  26. ^ A b c John Goetz, Frederik Obermaier: Code name "Luster" - France provides information to British and US secret services , Süddeutsche Zeitung, October 26, 2013
  27. ^ A b c Maximilian Rau: France and Spain's secret services should support NSA . In: Spiegel Online . October 29, 2013. Archived from the original on April 3, 2014. Retrieved on February 24, 2014.
  28. Zeit Online Author kg: New Revelations: NSA collected millions of data in Spain . In: Zeit Online . October 28, 2013. Archived from the original on January 6, 2014. Retrieved on February 24, 2014.
  29. Florian Rötzer: US government wants to be spying on friendly heads of government . In: Telepolis . Heise Online. October 29, 2013. Archived from the original on January 6, 2014. Retrieved on February 24, 2014.
  30. ^ Matthias Rude: Partner services - US secret services in the FRG (PDF; 1968 KB) In: danieleganser.ch . Archived from the original on February 24, 2014. Retrieved on February 24, 2014.
  31. Quoted from ibid .; the original Spiegel article with the title "NSA: America's Big Ear. The National Security Agency, the most aggressive US intelligence service, intercepts friends and foes," can be found online in issue 8/1989, pp. 30-49
  32. a b Laura Poitras, Marcel Rosenbach, Holger Stark: NSA monitors 500 million connections in Germany . In: Spiegel Online . June 30, 2013. Archived from the original on February 9, 2014. Retrieved July 10, 2013.
  33. a b c Spiegel Online: According to SPIEGEL, BND forwards massive amounts of metadata to the NSA . In: Spiegel Online . August 3, 2013. Retrieved February 24, 2014.
  34. Res Strehle: Interview: "Russia will probably smuggle Snowden out" . In: Basler Zeitung . July 12, 2013. Archived from the original on July 27, 2013. Retrieved July 27, 2013.
  35. ^ Spiegel Online: Interview with Edward Snowden in SPIEGEL: NSA and BND are working together . In: Spiegel Online . July 7, 2013. Archived from the original on February 9, 2014. Retrieved July 11, 2013.
  36. ^ John Goetz, Hans Leyendecker, Frederik Obermaier, Tanjev Schultz: NSA in Germany: Listening friends . In: Süddeutsche Zeitung . July 10, 2013. Archived from the original on April 7, 2014. Retrieved on February 24, 2014., page 2 ( Memento from November 1, 2013 in the Internet Archive ) in the archive
  37. ^ Karl Weisel: Wiesbaden: Upgrades, new facilities transforming garrison ( English ) In: army.mil . The United States Army. September 26, 2009. Archived from the original on October 29, 2013. Retrieved on February 24, 2014.
  38. ^ Frankfurter Allgemeine Zeitung: NSA affair: BND gives details about data transfer to NSA . In: Frankfurter Allgemeine Zeitung . August 3, 2013. Archived from the original on March 9, 2014. Retrieved on February 24, 2014.
  39. ^ Till Schwarze, Angela Gruber: NSA data transfer: Can the BND do that? . In: zeit.de . August 5, 2013. Archived from the original on January 26, 2014. Retrieved on October 24, 2013.
  40. ^ BND-NSA cooperation: dispute over Steinmeier's role . In: tagesschau.de . August 7, 2013. Archived from the original on October 29, 2013. Retrieved on October 24, 2013.
  41. ^ Christian Fuchs, John Goetz, Niklas Schenck, Alexander Tieg, Jan Lukas Strozyk: Secret services put pressure on asylum seekers . In: ndr.de . Northern German Radio. November 19, 2013. Archived from the original on December 4, 2013. Retrieved on February 24, 2014.
  42. Bastian Brinkmann, Oliver Hollenstein: Secret War: Opposition demands clarification from the government . In: Süddeutsche Zeitung . November 15, 2013. Archived from the original on April 10, 2014. Retrieved on February 24, 2014.
  43. John Goetz, Hans Leyendecker: Main office for questioning hears out asylum seekers . In: Süddeutsche Zeitung . November 19, 2013. Archived from the original on April 3, 2014. Retrieved on February 24, 2014.
  44. Niklas Schenck, Benedikt Strunz, Christoph Heinzle: Criticism of questioning asylum seekers . In: Norddeutscher Rundfunk . November 20, 2013. Archived from the original on December 7, 2013. Retrieved on February 24, 2014.
  45. ^ Christian Fuchs, John Goetz, Frederik Obermaier: Espionage in Germany - the protection of the constitution supplies NSA . In: Süddeutsche Zeitung . September 13, 2013. Archived from the original on March 31, 2014. Retrieved on February 24, 2014.
  46. Answer of the Federal Government to the minor question from MPs Paul Schäfer (Cologne), Inge Höger, Jan van Aken, other MPs and the DIE LINKE parliamentary group. - Printed matter 17/5279 - (PDF; 309 kB) In: bundestag.de . April 14, 2011. Archived from the original on February 24, 2014. Retrieved March 25, 2014.
  47. Christian Fuchs, John Goetz, Frederik Obermaier, Bastian Obermayer: Secret War: Germany awards orders to CSC . In: Süddeutsche Zeitung . November 16, 2013. Archived from the original on March 19, 2014. Retrieved on February 24, 2014. Page 2 ( Memento from December 7, 2013 in the Internet Archive ) in the archive
  48. ^ Christian Fuchs, Christoph Heinzle, Arne Meyer: Federal government commissions US espionage company . In: Norddeutscher Rundfunk . November 15, 2013. Archived from the original on December 10, 2013. Retrieved on February 24, 2014.
  49. Bastian Brinkmann, Oliver Hollenstein, Antonius Kempmann: What espionage companies in Germany do for the USA . In: Süddeutsche Zeitung . November 16, 2013. Archived from the original on April 5, 2014. Retrieved on February 24, 2014.
  50. Christof Moser, Alan Cassidy: Secret service supervision wants to examine cooperation between the NDB and the NSA . In: Switzerland on Sunday . September 14, 2013. Archived from the original on October 29, 2013. Retrieved on October 24, 2013.
  51. SZ -Autoren: EBRI, olkl, lala: Snowden documents - NSA transmits information to Israel . In: Süddeutsche Zeitung . September 11, 2013. Archived from the original on September 23, 2013. Retrieved on October 24, 2013.
  52. LeakSourceTV: Duncan Campbell @ LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens ( English , Video 23m45s) In: YouTube . LeakSourceTV. September 7, 2013. Accessed May 12, 2015.
  53. a b c d e Frederik Obermaier: Edward Snowden reveals names of spying Internet companies . In: Süddeutsche Zeitung . August 2, 2013. Archived from the original on August 30, 2013. Retrieved on August 30, 2013.
  54. Martin Holland: Surveillance affair: NSA pays hundreds of millions of dollars to providers . In: Heise Online . August 30, 2013. Archived from the original on April 27, 2014. Retrieved on February 24, 2014.
  55. ^ A b c John Goetz, Jan Lukas Strozyk: Internet companies sniff on behalf of the secret services . In: Tagesschau . North German broadcast. August 1, 2013. Archived from the original on August 30, 2013. Retrieved on August 30, 2013.
  56. ^ Jon Paul McLeary, Mark Stoutenberg: Level 3 Issues Statement . In: prnewswire.com . Level 3. August 1, 2013. Archived from the original on August 30, 2013. Retrieved on August 30, 2013.
  57. Achim Sawall: NSA scandal: How the DE-CIX is bugged . In: Golem . Archived from the original on August 30, 2013. Retrieved August 30, 2013.
  58. ^ Matthias Kremp: NDR and SZ: Telecommunications companies cooperate with secret services . In: Der Spiegel . August 2, 2013. Archived from the original on August 30, 2013. Retrieved on August 11, 2013.
  59. Christian Stöcker: NSA monitors Swift bank transfers and the oil company Petrobras . In: Spiegel Online . September 9, 2013. Archived from the original on April 3, 2014. Retrieved on April 3, 2014.
  60. Tim Gerber: NSA monitors international payments . In: Heise Online . September 15, 2013. Archived from the original on April 21, 2014. Retrieved on February 24, 2014.
  61. Lena Greiner: Swift Agreement: USA have access to intra-European bank data . In: Spiegel Online . February 1, 2014. Archived from the original on October 28, 2013. Retrieved on February 24, 2014.
  62. Claus Hecking: EU Commission threatens the USA with the end of the Swift Agreement . In: Spiegel Online . September 13, 2013. Archived from the original on April 5, 2014. Retrieved on February 24, 2014.
  63. Spiegel Online: NSA spies out international payment transactions . In: Spiegel Online . September 15, 2013. Archived from the original on September 16, 2013. Retrieved on February 24, 2014.
  64. Kilian Froitzhuber: After the NSA scandal: European Parliament officially calls for suspension of the SWIFT agreement (update) . In: Netzpolitik.org . October 23, 2013. Archived from the original on October 26, 2013. Retrieved on February 24, 2014.
  65. Barton Gellman, Ashkan Soltani: NSA collects millions of e-mail address books globally ( English ) The Washington Post. October 15, 2013. Archived from the original on October 15, 2013. Retrieved on October 15, 2013., page 2 ( memento of October 15, 2013 in the Internet Archive ) and page 3 ( memento of October 15, 2013 in the Internet Archive ) in archive
  66. Till Schwarze: Snowden Revelations: NSA is said to have collected hundreds of millions of email contacts . The time. October 15, 2013. Archived from the original on November 30, 2018. Retrieved October 15, 2013.
  67. a b Constanze Kurz: NSA surveillance: attack with FoxAcid . In: Frankfurter Allgemeine Zeitung . October 31, 2013. Archived from the original on November 1, 2013. Retrieved on February 24, 2014.
  68. a b Bruce Schneier: Attacking Tor: how the NSA targets users' online anonymity ( English ) In: The Guardian . October 4, 2013. Archived from the original on October 4, 2013. Retrieved on February 24, 2014.
  69. Matthias Kremp: NSA spies on Internet users with Google cookies . In: Spiegel Online . December 11, 2013. Archived from the original on February 9, 2014. Retrieved on February 24, 2014.
  70. Sascha Lobo: Sascha Lobo on the spying scandal: Secret services hate our freedom . In: Spiegel Online . December 10, 2013. Archived from the original on February 18, 2014. Retrieved on February 24, 2014.
  71. American Civil Liberties Union: ACLU Challenges Defense Department Personnel Policy To Regard Lawful Protests As “Low-Level Terrorism” ( English ) In: American Civil Liberties Union . June 10, 2013. Archived from the original on April 4, 2014. Retrieved on February 24, 2014.
  72. a b Spencer Ackerman, James Ball: Yahoo webcam images from millions of users intercepted by GCHQ ( English ) In: The Guardian . February 27, 2014. Archived from the original on February 27, 2014. Retrieved on February 27, 2014.
  73. a b Kilian Froitzhuber: GCHQ viewed 1.8 million Yahoo users through their webcams . In: Netzpolitik.org . February 27, 2014. Archived from the original on February 27, 2014. Retrieved on February 27, 2014.
  74. Friedhelm Greis: Webcam monitoring: GCHQ records millions of video chats . In: Golem . February 27, 2014. Archived from the original on March 14, 2014. Retrieved on February 27, 2014.