Espionage Activities (Global Surveillance and Espionage Affair)

from Wikipedia, the free encyclopedia

This article describes the known espionage activities of the Five Eyes in the global surveillance and espionage affair .

Recruiting a banker in Switzerland

In an interview published by the Guardian at the beginning of June 2013 , Snowden described the recruitment of a banker in Switzerland in order to get banking information through him. In 2007 Snowden worked for the CIA with diplomatic status in Geneva. According to his report, CIA agents first induced a banker to drink a lot of alcohol and later induced him to drive home. The police are said to have picked him up and taken into custody. An undercover CIA employee offered him his help - from which a friendship developed and the banker was finally recruited. The Swiss media speculated that it could be Bradley Birkenfeld , who handed over evidence to US authorities that the Swiss bank UBS was helping US Americans evade taxes. At the request of the Neue Zürcher Zeitung , the Geneva canton police said they could not say anything on the subject, as the incident was too insignificant from the police point of view.

G20 meeting in London in 2009

On the opening day of the G8 summit in Northern Ireland, June 17, 2013, the Guardian published a report and documents that the British secret service Government Communications Headquarters (GCHQ) at the two G20 meetings in April and September 2009 in London systematically monitored politicians from other nations. Internet cafés were set up as a "service" for guests. Among other things, not only the addresses but also the content of e-mails and computers were spied on and - in some cases even after the G20 summit - data was spied out using keyloggers . 45 analysts are said to have overheard the phone calls of all participants around the clock. During the meeting, British politicians are said to have received the results of the monitoring of the other participants in almost real time.

Commonwealth meeting in Trinidad in 2009

One of the top-secret GCHQ documents shows the GCHQ's preparations and plans to oversee the 2009 Commonwealth meeting in Trinidad , according to the Guardian . It is not clear from the document whether the plans have been implemented. However, there is a detailed schedule of who could be informed when on the British side during the meeting:

  • Glenys Kinnock (then Minister of State for Europe): November 25-29, 2009
  • David Miliband (then British Foreign Secretary): 26-29 November 2009
  • Gordon Brown (then British Prime Minister): November 29, 2009

A list of the intended secret service requirements as well as a list of the surveillance objectives are also included:

Monitoring of Chancellor Merkel and other top politicians

According to Spiegel reports , internal NSA documents describe a wiretapping program called the Special Collection Service (SCS). Allegedly more than 80 embassies and consulates around the world are involved. 19 of them are in Europe - for example in Paris, Madrid, Rome, Prague, Vienna and Geneva. Listening posts in Germany are said to be in the US Consulate General in Frankfurt and in the Embassy of the United States in Berlin , which have the highest level of equipment - i.e. H. are manned by active employees. According to the reports, the SCS teams operate their own wiretapping systems with which they can eavesdrop on all common communication technologies, such as mobile phones, WLANs, satellite communication, etc. The devices required for this are usually installed on the upper floors of the embassy building or on roofs and are protected with screens and superstructures.

On October 24, 2013, there were reports of eavesdropping attacks on a cell phone belonging to German Chancellor Angela Merkel . But not only the German Chancellor was monitored, but also the telephone communications of a large number of top politicians from Mexico, Brazil, possibly France and Italy. 36 heads of state and government are said to be affected, but their names are not yet known (Signals Intelligence Directorate (SID)), as the Guardian published a day later. Merkel's cell phone is a cell phone intended for communication in the CDU , which is made available by her party. The official Chancellor mobile phone for business use did not appear to be affected. The United States Embassy in Berlin was allegedly used as the base of operations for the eavesdropping.

Also on October 24th, John B. Emerson - for the first time in the history of the Federal Republic - the ambassador of the United States to Germany was summoned to the Foreign Office . Furthermore, the parliamentary control body of the German Bundestag was convened for a special session on this day . The responsible for Europe Unit S2C32 "European States Branch" (Department of European States) had apparently Angela Merkel in 2002 as a spying target under the name "GE Chancellor Merkel" (DE Chancellor Merkel) entered in a list of educational goals for the NSA.

As the New York Times reported, the US secret service spied not only the Chancellor, but also the entire Berlin political scene - including high-ranking German officials. The US agents were not just interested in metadata , but clearly on the content. The spied conversations are said to have been stored in databases and are available there for weeks or even months. The greatest interest in the phone calls was in the US State Department, the US Treasury Department, other US intelligence agencies and President Barack Obama's National Security Council. Since some of the intelligence reports in the New York Times contained the tapped phone calls in the rough version, Obama's security advisors could not have "overlooked" the spying on politicians.

According to the emails published by Marcel Lazăr Lehel under the pseudonym Guccifer from the journalist Sidney Blumenthal , who also acted as an advisor to US President Bill Clinton and US Secretary of State Hillary Clinton , the US repeatedly monitored Angela Merkel's talks with Treasury Secretary Wolfgang Schäuble , and von Merkel and Schäuble with Gerhard Schindler and Major General Norbert Stier , President and Vice President of the Federal Intelligence Service . On May 6, 2012, a secure telephone conference with Merkel on the election of François Hollande as French President and the result of the state elections in Schleswig-Holstein was intercepted by Schäuble . In the conversation, Schäuble suggested, among other things, that early federal elections should be considered in order to prevent a possible left-wing trend and thus an impending loss of the government majority. Schäuble also reported on information from the Federal Office for the Protection of the Constitution about the rise of right-wing extremist parties in France and Greece, and right-wing extremist paramilitary groups in Sweden, Germany, Belgium and the Netherlands, while Merkel expressed concern about the CSU's relations with right-wing extremists in Germany and Austria. Talks in July, August and September 2012 dealt with the euro crisis and the upcoming elections in the Netherlands and Italy.

On February 5, 2014, the Süddeutsche Zeitung and the Norddeutsche Rundfunk published after joint research that not only Angela Merkel as Federal Chancellor, but also her predecessor Gerhard Schröder had been bugged by the NSA between 2002 and 2005 . According to unnamed NSA insiders, Schröder's course of confrontation against the United States in preparation for the Iraq war and also worries about a break in NATO were the reason for Schröder's surveillance.

Special Collection Service

According to the Spiegel Online report of August 25, 2013 and the report “Der unheimliche Freund” in the 44/2013 issue of the Spiegel, internal NSA documents describe a wiretapping program called the “Special Collection Service” (SCS). Allegedly more than 80 embassies and consulates around the world are involved. 19 of them are in Europe - e.g. B. in Paris, Madrid, Rome, Prague, Vienna and Geneva. Listening posts in Germany are said to be in the US Consulate General in Frankfurt and in the Embassy of the United States in Berlin , which have the highest level of equipment - i.e. H. are manned by active employees. According to the reports, the SCS teams operate their own wiretapping systems with which they can eavesdrop on all common communication technologies, such as mobile phones, WLANs, satellite communication, etc. The devices required for this are usually installed on the upper floors of the embassy building or on roofs and are protected with screens and superstructures.

On October 24, 2013, there were reports of eavesdropping attacks on a cell phone belonging to German Chancellor Angela Merkel . It is a mobile phone intended for communication in the CDU , which is made available by your party. The official Chancellor mobile phone for business use did not appear to be affected. The United States Embassy in Berlin is said to have been used as the base of operations for the eavesdropping.

Also on October 24th, John B. Emerson - for the first time in the history of the Federal Republic - the ambassador of the United States to Germany was summoned to the Foreign Office . Furthermore, the parliamentary control body of the German Bundestag was convened for a special session on this day . The responsible for Europe Unit S2C32 "European States Branch" ( Department of European States ) had apparently Angela Merkel in 2002 as a spying target under the name "GE Chancellor Merkel" ( DE Chancellor Merkel entered) in a list of educational goals for the NSA.

As the New York Times reported, the US secret service spied not only the Chancellor, but the entire Berlin political scene - including high-ranking German officials. The US agents were not only interested in metadata , but clearly on the content. The spied conversations would be saved in databases and would be available there for weeks or even months. The greatest interest in the phone calls was in the US State Department, the US Treasury Department, other US intelligence agencies and President Barack Obama's National Security Council. Since some of the New York Times' intelligence reports contained the tapped phone calls in raw form, Obama's security advisers could not have "overlooked" the spying on politicians.

Monitoring of institutions of the European Union and national representations

In the course of the revelations, it became known that the NSA had been monitoring various European Union bodies. According to the Guardian , 38 embassies or representations at the United Nations have also been spied on.

year Facility place Code name description
2012 Embassy building of the EU Washington, DC Magothy Eavesdropping bugs, attack on the internal computer network and copying of hard drives
2012 EU representation at the UN new York Apalachee similar to that in Washington
2010 EU representation at the UN new York Perdido Wiretapping bugs, traffic
2008 Justus Lipsius building of the Council of the EU Brussels - Access to the telephone system from a part of the NATO headquarters in the Brussels suburb of Evere used by the NSA
2010 Brazilian embassy Washington Kateel Copying hard drives, implanted components
2010 Brazilian representation at the UN new York Pocomoke implanted components, screen monitoring, copying of hard drives
2010 Bulgarian Embassy Washington Merced implanted components
2010 French representation at the UN new York Blackfoot implanted components, screen monitoring
2010 French embassy Washington Wabash implanted components, monitoring of the telephone system
2010 Georgian Embassy new York Navarro implanted components, screen monitoring
2010 Greek representation at the UN new York Powell implanted components, copying of hard drives
2010 Greek embassy Washington Klondyke implanted components, copying hard drives, monitoring the telephone system
2010 Indian representation at the UN new York Nashua implanted components, detection of magnetic fields, screen monitoring, copying of hard drives
2010 Indian embassy Washington Osage / Oswayo Copying hard drives, implanted components, screen monitoring
2010 Italian embassy Washington Bruneau / Hemlock Copying hard drives, implanted components
2010 Japanese representation at the UN new York Mulberry LAN implants, implanted components, detection of magnetic fields, screen monitoring
2010 Colombian commercial agency new York Banister Copying hard drives
2010 Mexican representation at the UN new York Alamito Copying hard drives
2010 Slovak Embassy Washington Fleming implanted components, screen monitoring
2010 South African representation at the UN / South African consulate new York Dobie implanted components, screen monitoring
2010 South Korean mission to the UN new York Sulfur Screen monitoring
2010 Taiwanese commercial agency new York Requette Screen monitoring
2010 Venezuelan Embassy Washington Yukon Copying hard drives
2010 Venezuelan representation at the UN new York Westport Copying hard drives
2010 Vietnamese representation at the UN new York Navajo implanted components, screen monitoring
2010 Vietnamese embassy Washington Panther implanted components

Supervision of the headquarters of the United Nations and the IAEA

On August 25, 2013, Der Spiegel wrote that the United Nations headquarters in New York was being wiretapped by the NSA. In the summer of 2012, the NSA managed to break into the internal video conference system of the international community and crack the encryption. In one case, the NSA caught the Chinese secret service spying, whereupon the NSA is said to have recorded the data spied on by China. Such espionage activities are illegal - in an agreement with the UN that is still valid today, the US has committed itself not to undertake any covert actions.

The International Atomic Energy Agency (IAEA, English International Atomic Energy Agency, IAEA), based in Vienna, was intercepted by the NSA. The IAEA is an autonomous scientific and technical organization that has a special status within the United Nations system.

Belgacom scandal

After the revelations by Edward Snowden, the largest Belgian telecommunications company Belgacom and its mobile phone subsidiary Proximus , whose customers include the European Commission , the European Council , the European Parliament and NATO , carried out extensive internal security measures and were able to track down the traces in June 2013 detect digital intrusion . As the Brussels newspaper De Standaard reported, Belgacom saw itself as the victim of a large-scale state espionage attack since at least 2011 using highly complex software and filed a lawsuit against unknown persons on July 19. Weekend 14./15. September 2013 specialists at Belgacom cleaned the whole system.

The Belgian public prosecutor's office has since initiated investigations into unknown persons following the complaint from Belgacom. The Belgian public prosecutor suspected that the attackers wanted to obtain "strategic information". The investigation shows that the attack was only possible with "considerable financial and logistical means". The large-scale, complex cyberattacks apparently focused in particular on the international telephony data of the Belgacom subsidiary Belgacom International Carrier Services (BICS). BICS is a joint venture with Swisscom (22.4%) and the South African telephone company Mobile Telephone Networks (MTN), which specializes in telecommunications traffic controls and services in the Middle East and Africa and offers its services to telecommunications companies based there . In particular, phone calls with area codes to countries such as Yemen, Syria and others, which the USA calls “ rogue states ”, were spied on.

BICS is one of the companies that operate the submarine cables SEA-ME-WE 3 and SEA-ME-WE 4, which run from Europe via North Africa and the Middle East to Singapore . An interesting target for spies from the US secret services in their so-called " war on terror ".

There was little doubt in security circles that the originator of this “international state espionage operation” was the US secret service NSA or one of its partners, such as the British secret service GCHQ.

The case is politically explosive because the Belgian government is the main shareholder of the semi-public telecommunications company. The Belgian government reacted indignantly: "If this hypothesis is confirmed and it is indeed cyber espionage, the government strongly condemns this intrusion and the violation of the integrity of a public company," said Prime Minister of the Parti Socialiste , Elio Di Rupo , Minister of the Interior Joëlle Milquet and Justice Minister Annemie Turtelboom in a joint communication.

In fact, in a preliminary report on September 20, 2013 , Der Spiegel was able to publish information on the basis of documents from a GCHQ presentation classified as top secret from Edward Snowden's archives, according to which the British secret service had been accessing the Belgacom system since 2010 at the latest. The cyber attack with the code name Sozialist ( Operation Socialist ) was carried out with the help of a technology called Quantum Insert (QI), which was developed by the NSA to smuggle malware into target computers. Belgacom became the second company to be known by name as a target for the Anglo-American secret services. Previously, reports caused a sensation that the NSA was spying on the Brazilian oil company Petrobras .

In view of these revelations, the Social Democratic MEPs Josef Weidenholzer and Birgit Sippel repeat their call for an investigation into the work of European intelligence services:

“When the work of secret services spreads uncontrollably and everything and everyone is a target, it is a serious danger for European integration and democracy itself. We not only need binding and far-reaching transparency rules at national and European level, but above all sensitive sanctions against cases of abuse. "

The primary task of secret services is to fight terrorism. Comprehensive surveillance of European citizens and political institutions does not serve this purpose, but represents a violation of fundamental rights that threatens the foundations of the European rule of law, explained Weidenholzer and Sippel.

NSA back doors in IT hardware

According to Edward Snowden's documents, the NSA not only installs back doors in standard software, but also in the hardware or firmware of electronic devices such as routers , hardware firewalls or PCs (especially in the BIOS , the motherboard or in hard drives ). The Office of Tailored Access Operations (German Department for operations with customized access ) begins to deliveries of electrical appliances and integrates its own Spionagehard- and software as the electrical appliance would have been delivered around the plant. According to the documents, the manufacturers Cisco Systems , Dell , Hewlett-Packard , Huawei , Juniper Networks , Samsung Electronics , Seagate Technology (including the acquired Maxtor Corporation ) and Western Digital are affected by the malicious software and hardware installations designated as implants . The various tools and techniques (including IRONCHEF, IRATEMONK, SWAP) are described in more detail in a 50-page catalog, which the NSA calls ANT (Advanced / Access Network Technology) .

Monitoring and reading of smartphones

In its 37/2013 issue, the news magazine Der Spiegel reported on the attack by the NSA and GCHQ on smartphones ( Blackberry , iPhone , Android ). According to their own information, the secret services can access the operating systems of Apple, Blackberry and Google and read almost all sensitive information on a smartphone. With reference to the dystopian novel 1984 by George Orwell , an internal NSA presentation asks “Who in 1984 could have imagined that Steve Jobs would be the real big brother and the zombies the paying customers.” (Note / Background: see also the 1984 commercial commissioned by Steve Jobs ). The information that can be read includes the contact lists, short messages, data from various application programs, notes and the current location of the smartphone. The materials seen by the mirror suggest that it is not a matter of mass spying, but rather targeted operations, some of which are tailored to the individual case.

NSA back door in cryptography programs

In the 1990s, the NSA tried to enforce a legal regulation by which providers of cryptographic encryption for digital data should be obliged to insert a back door for the secret service into their programs in order to be able to decrypt the supposedly protected data. This project failed. Assumptions that the NSA would have smuggled such kleptographic access options into numerous cryptography programs via an encryption method it propagated , have existed since the 2000s. In particular, the cryptographic random number generator Dual EC DRBG , established at the instigation of the secret service by the National Institute of Standards and Technology (NIST), showed abnormalities when examined by experts in cryptography. In early September 2013, the New York Times reported from documents submitted by Snowden, including on the NSA's Bullrun and Edgehill programs of the British GCHQ, that the secret services have databases of cryptographic keys with which they can view encrypted messages. Regarding the standardization of the algorithm developed by the NSA by the NIST, it is noted that the secret service thus became the "sole author" of cryptographic random number generators. In mid-September 2013, the company RSA Security , provider of the RSA BSafe cryptography program library and the SecurID authentication system , published a recommendation to developers who work with their program libraries not to continue using the Dual_EC_DRBG standard algorithm contained therein and to use a different one instead. This affects all applications that use RSA BSafe . The standardization institute NIST has announced that it will subject the standard to a new review. In 2015, NIST withdrew the recommendation for Dual_EC_DRBG. Well-known cryptologists such as Bruce Schneier or Rüdiger Weis see a way out in open-source encryption programs, as these offer the necessary transparency towards backdoors and their functionality can be verified.

Monitoring of 320 German politicians, decision-makers and business representatives

The Bild am Sonntag reports on 23. February 2014 in its possession documents and information, according to which 320 German politicians, decision makers and business leaders are intercepted by the NSA. This includes the German Interior Minister Thomas de Maizière . For this purpose, the secret service stationed 297 employees in Germany. One of the high-ranking sources from the US secret service environment is quoted as saying, " We have been ordered not to allow any loss of information, since the Chancellor's communications may no longer be monitored directly. "(Picture on Sunday)

Chinese President and Huawei

In March 2014, according to available documents, Der Spiegel published a report that the NSA had spied on targets in the People's Republic of China. The targets included former President Hu Jintao , the Ministry of Foreign Affairs and Commerce in Beijing, various banks and telecommunications companies, and the Huawei group. With many NSA targets using Huawei hardware, the service was a hassle and not content with spying on the company's email accounts. The secret service is said to have gained access to around 100 points on the Huawei network. In addition to the e-mails, the NSA is said to have obtained a list of more than 1400 customers, training documents and source code of individual Huawei products.

CIA espionage in Germany

On July 4, 2014, it became public knowledge that BND employee Markus R. was arrested by the Federal Prosecutor's Office on July 2 on suspicion of being an agent of the secret service. The BND employee is said to have taken a total of 218 secret BND papers since 2012 and sold them to US services on USB sticks at conspiratorial meetings in Austria for a total of 25,000 euros. At least three documents are said to have been related to the NSA committee of inquiry . The alleged double agent stated that he had sent secret documents to the CIA once a week .

According to information from NDR, WDR and Süddeutscher Zeitung, there was a second espionage case on July 7, 2014. Officials of the Federal Criminal Police Office and the Federal Prosecutor's Office searched the living and office space of an employee of the Federal Ministry of Defense in the Berlin area, who is said to have spied for an American secret service in Germany. This was followed by an exit request to the top US secret service representative in Berlin.

On July 13, 2014, the news magazine “Der Spiegel” reported that the affair of spying on German politicians was apparently expanding; In addition to Chancellor Merkel's cell phone, the telecommunications of other members of the Bundestag may also have been the target of espionage. The telecommunications of the CDU chairman in the NSA investigation committee Roderich Kiesewetter and the former left-wing member of the Bundestag Steffen Bockhahn are therefore affected . The latter was a member of the Parliamentary Control Committee (PKGr) in the last legislative period and was therefore responsible for overseeing the secret services, and he was one of the most determined critics of the NSA after its activities in Germany became known through Edward Snowden. The Federal Criminal Police Office and the State Criminal Police Office Mecklenburg-Western Pomerania are investigating suspected computer sabotage and spying on state secrets .

Also on July 13, 2014, "Bild am Sonntag" reported, citing US intelligence circles, that the CIA had more than a dozen government employees in Germany as sources. The US foreign intelligence service is targeting the Department of Defense , the Department of Commerce , the Department of the Interior and the Department of Development . The latter is of interest to the CIA because this department is used to conduct covert BND operations abroad. Many of the spies had worked for the US service for years.

The (then still) President-designate of the European Commission, Jean-Claude Juncker , warned of a lasting breach of trust and accused the governments of failure: “We have a real problem of democracy here. The governments have lost control of their secret services, which are normally not allowed to operate in a lawless area and which should also answer to the governments ”.

NSA spies on sexually oriented online activities of possible “radicalizers”

According to a top-secret NSA document dated October 3, 2012, the NSA monitors and records sexually-oriented online activities by people classified as "radicalizers" with the aim of using this information to improve the credibility and reputation of the individuals concerned to weaken. The document states that the relevant information has been recorded and stored - but not whether the planned use to "weaken reputation" has been implemented or carried out. The six example persons shown have in common that they seem to share the Muslim faith. Their actual contact with terrorists is classified as very low or nonexistent: 1% of the total number of 217 people mentioned had contact with known terrorists according to NSA findings. The document suggests that the classification made as a target is based on the fact that these people expressed themselves critical of the United States online and were also assessed as people who could possibly radicalize other users via social networks such as YouTube or Facebook.

TAREX

According to Snowden documents published on The Intercept, the NSA has apparently also stationed agents in Germany who, for example, intercept mail under the "TAREX" program and manipulate the network technology contained therein before it is forwarded to its actual destination. According to this, NSA employees are smuggled undercover into companies.

Individual evidence

  1. Nicolai Kwasniewski: Prism Revelation: How the CIA Recruited a Swiss Banker . In: Spiegel Online . June 10, 2013. Archived from the original on February 9, 2014. Retrieved February 25, 2014.
  2. Glenn Greenwald, Ewen Macaskill, Laura Poitras: Edward Snowden: the whistleblower behind the NSA surveillance revelations. In: The Guardian. June 11, 2013, accessed May 16, 2015 .
  3. Marcel Gyr: CIA recruitment of a Swiss banker: explosive facts about Snowden's past in Geneva. In: Neue Zürcher Zeitung. June 10, 2013, accessed May 16, 2015 .
  4. Ewen Macaskill, Nick Davies, Nick Hopkins, Julian Borger, James Ball: GCHQ intercepted foreign politicians' communications at G20 summits ( English ) In: The Guardian . June 17, 2013. Archived from the original on May 6, 2014. Retrieved February 25, 2014.
  5. Süddeutsche Zeitung -Autoren odg, bavo: Secret Service brings Premier Cameron to explanations. In: Süddeutsche Zeitung. June 17, 2013, accessed May 16, 2015 .
  6. a b c Ewen Macaskill, Nick Davies, Nick Hopkins, Julian Borger, James Ball: UK intelligence agencies planned to spy on Commonwealth summit delegates ( English ) In: The Guardian . June 16, 2013. Archived from the original on March 3, 2014. Retrieved on February 27, 2014.
  7. Jacob Appelbaum, Nikolaus Blome, Hubert Gude, Ralf Neukirch, René Pfister, Laura Poitras, Marcel Rosenbach, Jörg Schindlisa Erdmann, Gregor Peter Schmitz, Holger Stark: The uncanny friend . In: Spiegel Online . October 28, 2013. Retrieved May 14, 2015.
  8. James Ball: NSA monitored calls of 35 world leaders after US official handed over contacts . In: The Guardian . October 24, 2013. Archived from the original on February 9, 2014. Retrieved on March 16, 2014.
  9. ^ A b Martin Holland: NSA espionage against Merkel: Westerwelle appoints US ambassador . In: Heise Online . October 24, 2013. Archived from the original on February 6, 2014. Retrieved October 25, 2013.
  10. ^ A b Fabian A. Scherschel, Martin Holland: NSA affair: eavesdropping on Merkel causes riot in Berlin . In: Heise Online . October 24, 2013. Archived from the original on February 6, 2014. Retrieved October 25, 2013.
  11. ^ A b Zeit Online -Author hs: NSA surveillance: Merkel solves puzzles about her cell phone . In: Zeit Online . October 25, 2013. Archived from the original on October 29, 2013. Retrieved on February 26, 2014.
  12. a b Florian Festl: Suspicion: Americans use their consulates for spying attacks: US eavesdropping on Merkel - US cell phone hackers are suspected in the middle of Berlin . In: Focus Online . October 24, 2013. Archived from the original on October 29, 2013. Retrieved on October 24, 2013.
  13. ^ A b Hans Leyendecker, John Goetz: Affair about Merkel cell phone: Suspected espionage against the US embassy . In: Süddeutsche Zeitung . October 24, 2013. Archived from the original on October 27, 2013. Retrieved on October 24, 2013.
  14. ^ A b Severin Weiland: Westerwelle appoints US ambassador to the Foreign Office . In: Spiegel Online . October 24, 2013. Archived from the original on October 27, 2013. Retrieved on February 26, 2014.
  15. ^ Frankfurter Allgemeine Zeitung: Spying Affair: The Espionage Message . In: Frankfurter Allgemeine Zeitung . October 26, 2013. Archived from the original on October 27, 2013. Retrieved on March 16, 2014.
  16. ^ A b Süddeutsche Zeitung - Authors Dmo, Odg, Sekr: Affair about Merkel's cell phone - Obama supposedly knew nothing . In: Süddeutsche Zeitung . October 27, 2013. Archived from the original on October 28, 2013. Retrieved on March 16, 2014.
  17. a b Süddeutsche Zeitung -authors weave, ana: NSA spy action in Germany - "They suck up every number they can get" . In: Süddeutsche Zeitung . October 31, 2013. Archived from the original on November 3, 2013. Retrieved March 16, 2014.
  18. a b David E. Sanger, Mark Mazzetti : Allegation of US Spying on Merkel puts Obama at Crossroads ( English ) In: The New York Times . October 24, 2013. Archived from the original on November 4, 2013. Retrieved on February 26, 2014.
  19. "Hackerul" Guccifer "care ia saves contul sefului SRI, George Maior, a fost prins la Arad". January 22, 2014, accessed March 30, 2014 .
  20. Byron Acohido: Q&A: 'Guccifer' hacks Hillary Clinton's e-mails via aide's account . In: USA Today . March 20, 2013. Retrieved March 20, 2013.
  21. ^ "Hillary Clinton-Sidney Blumenthal Intel: 2013-0330.zip". Sidney Blumenthal, April 5, 2013, accessed January 29, 2014 .
  22. ^ A b Stefan Kornelius, Hans Leyendecker, Georg Mascolo: NSA listened to Federal Chancellor Gerhard Schröder . In: Süddeutsche Zeitung . February 4, 2014. Archived from the original on February 5, 2014. Retrieved on March 23, 2014.
  23. Georg Mascolo, Stephan Wels: NSA apparently already wired Chancellor Schröder . In: Tagesschau.de . ARD. February 4, 2014. Archived from the original on February 5, 2014. Retrieved on March 23, 2014.
  24. ^ A b Frankfurter Allgemeine Zeitung - Author made: American Embassy in Berlin: The top floor belongs to the spies . In: Frankfurter Allgemeine Zeitung . October 27, 2013. Archived from the original on January 18, 2014. Retrieved on February 26, 2014.
  25. a b c d Spiegel Online: NSA wiretapped United Nations headquarters in New York . In: Der Spiegel . August 25, 2013. Archived from the original on August 30, 2013. Retrieved on August 30, 2013.
  26. DER SPIEGEL issue 44/2013, p. 20 "The uncanny friend"
  27. ^ Frankfurter Allgemeine Zeitung: Spying Affair: The Espionage Message . In: Frankfurter Allgemeine Zeitung . October 26, 2013. Archived from the original on March 9, 2014. Retrieved on February 26, 2014.
  28. a b Laura Poitras, Marcel Rosenbach, Fidelius Schmid, Holger Stark: NSA has installed bugs in EU buildings . In: Der Spiegel . June 29, 2013. Archived from the original on August 30, 2013. Retrieved on August 30, 2013.
  29. a b Ewen Macaskill, Julian Borger: New NSA leaks show how US is bugging its European allies ( English ) In: The Guardian . June 30, 2013. Retrieved May 18, 2015.
  30. a b c d e f g h i j k l m n o p q r s t u v Glenn Greenwald: No Place to Hide: Edward Snowden, the NSA, and the US Surveillance State ( English ) In: books.google .de . Retrieved May 18, 2015.
  31. Laura Poitras, Marcel Rosenbach , Holger Stark : Secret NSA Documents Show How the US Spies on Europe and the UN ( English ) In: Der Spiegel . August 26, 2013. Archived from the original on August 30, 2013. Retrieved on August 30, 2013.
  32. Standaard authors: jvt, evg: Parket: "Onderzoek wijst op internationale cyberspionage" ( Dutch ) De Standaard. September 16, 2013. Archived from the original on October 16, 2013. Retrieved October 15, 2013.
  33. a b Mark Eeckhaut, Peter De Lobel, Nikolas Vanhecke: NSA suspects van hacking Belgacom ( Dutch ) De Standaard. September 16, 2013. Archived from the original on March 27, 2014. Retrieved on October 15, 2013.
  34. David Meyer: Belgian telco says it was hacked, while reports point to NSA or GCHQ as culprit ( English ) In: GigaOm . September 16, 2013. Archived from the original on February 21, 2014. Retrieved on February 26, 2014.
  35. Tageblatt: Belgacom was attacked . In: Tageblatt . September 16, 2013. Archived from the original on October 29, 2013. Retrieved on February 26, 2014.
  36. ^ Gregor Peter Schmitz: Belgian premier the Rupo in an uproar over British Belgacom espionage . In: Spiegel Online . September 20, 2013. Archived from the original on November 24, 2013. Retrieved on February 26, 2014.
  37. ^ Spiegel Online: Belgacom: Secret service GCHQ hacked Belgian telephone company . In: Spiegel Online . September 20, 2013. Retrieved March 16, 2014.
  38. SPÖ authors bj, mp: Weidenholzer / Sippel: “Social Democrats demand sanctions against cases of abuse in secret service work” . In: APA-OTS . Social Democratic Party of Austria. September 20, 2013. Archived from the original on January 1, 2014. Retrieved on February 26, 2014.
  39. ANT Product Data: IRONCHEF
  40. ANT Product Data: IRATEMONK
  41. ANT Product Data: SWAP
  42. Jacob Appelbaum, Judith Horchert, Ole Reißmann, Marcel Rosenbach, Joerg Schindler, Christian Stocker: New documents: The Secret toolbox of NSA . In: Spiegel Online . December 30, 2013. Archived from the original on April 14, 2014. Retrieved on February 26, 2014.
  43. Florian Kalenda: Report: NSA malware is also found on PCs and hard drives as well as in routers . In: ZDNet . December 30, 2013. Archived from the original on December 30, 2013. Retrieved on February 26, 2014.
  44. Spiegel Online: NSA: Phone data from iPhone, BlackBerry and Android can be read . In: Spiegel Online . September 8, 2013. Archived from the original on January 1, 2014. Retrieved on February 26, 2014.
  45. Laura Poitras, Marcel Rosenbach, Holger Stark: Photo Gallery: Spying on Smartphones ( English ) In: Spiegel Online . September 9, 2013. Archived from the original on March 27, 2014. Retrieved on February 26, 2014., Slides 2 ( Memento from October 24, 2013 in the Internet Archive ), 3 ( Memento from October 21, 2013 in the Internet Archive ), 4 ( Memento from October 21, 2013 in the Internet Archive ) and 5 ( Memento from October 21, 2013 in the Internet Archive ) in the archive
  46. Spiegel Online: NSA can also read iPhone, BlackBerry and Android phones . In: Spiegel Online . September 7, 2013. Archived from the original on March 27, 2014. Retrieved on February 26, 2014.
  47. a b Nicole Perlroth, Jeff Larson, Scott Shane: NSA Able to Foil Basic Safeguards of Privacy on the Web ( English ) In: The New York Times . September 5, 2013. Archived from the original on April 27, 2014. Retrieved on February 26, 2014.
  48. Dan Shumow, Niels Ferguson: On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng ( English , PDF 57 kB) In: rump2007.cr.yp.to . August 21, 2007. Archived from the original on February 26, 2014. Retrieved on February 26, 2014.
  49. Bruce Schneier: Did NSA Put a Secret Backdoor in New Encryption Standard? ( English ) In: schneier.com . November 15, 2007. Archived from the original on December 10, 2013. Retrieved on February 26, 2014.
  50. Holger Dambeck: Cryptography back doors: The NSA master key for the Internet . In: Spiegel Online . September 19, 2013. Archived from the original on April 30, 2014. Retrieved on February 26, 2014.
  51. Kim Zetter: RSA Tells Its Developer Customers: Stop Using NSA-Linked Algorithm ( English ) In: Wired . September 19, 2013. Archived from the original on February 9, 2014. Retrieved on February 26, 2014.
  52. Marin Majica: NSA hacked cryptography: Security company RSA warns of itself . In: Zeit Online . September 20, 2013. Archived from the original on October 19, 2013. Retrieved on February 26, 2014.
  53. Fabian A. Scherschel: NIST buries the controversial random number generator Dual_EC_DRBG. The US standardization authority reacts to the severe criticism of the algorithm. Crypto experts fear that this was provided with a back door by the NSA. (No longer available online.) In: heise.de. June 30, 2015, formerly in the original ; accessed on August 6, 2018 .  ( Page no longer available , search in web archives )@1@ 2Template: Toter Link / www.heise.de
  54. Bruce Schneier: Schneier on Security: Defending Against Crypto Backdoors ( English ) In: schneier.com . October 22, 2013. Archived from the original on October 24, 2013. Retrieved on February 26, 2014.
  55. Prof. Dr. Rüdiger Weis: NPA 19.4 Krypto according to Snowden (Video 35:22 minutes) In: YouTube . Digital society. December 10, 2013. Retrieved February 26, 2014.
  56. a b c image: New NSA revelations - eavesdropping attack on 320 important Germans . In: image . February 23, 2014. Accessed February 23, 2014.
  57. Handelsblatt: NSA affair: Interior Minister de Maizière is also bugged . In: Handelsblatt . February 23, 2014. Archived from the original on February 28, 2014. Retrieved on March 23, 2014.
  58. a b Spiegel Online: SPIEGEL: NSA spies on Chinese government and Huawei ( English ) In: Spiegel Online . March 22, 2014. Archived from the original on March 22, 2014. Retrieved on March 22, 2014.
  59. ^ Dpa: US secret service: NSA spied on Chinese leadership . In: Handelsblatt . March 23, 2014. Archived from the original on March 23, 2014. Retrieved on March 23, 2014.
  60. Till Schwarze: BND affair: the archives hold power . In: Zeit Online . July 8, 2014. Retrieved May 13, 2015.
  61. Martin Holland: Arrest: BND employees are said to have spied on NSA investigative committee . In: Heise Online . July 4, 2014. Retrieved May 13, 2015.
  62. ^ Hans Leyendecker, Georg Mascolo: Second US spy in the Ministry of Defense . In: Süddeutsche Zeitung . July 9, 2014. Retrieved May 13, 2015.
  63. Judith Horchert: espionage: Steffen Bockhahn and Roderich Kiesewetter affected . In: Spiegel Online . July 13, 2014. Retrieved May 13, 2015.
  64. Der Tagesspiegel: NSA affair: cell phones spied on by members of the Bundestag . In: Der Tagesspiegel . July 13, 2014. Retrieved May 13, 2015.
  65. Die Welt -author me: Secret Service Affair: Allegedly more US spies in German ministries . In: The world . July 13, 2014. Retrieved May 13, 2015.
  66. Glenn Greenwald, Ryan Gallagher, Grimryan Grim: Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radicalizers' ( English ) In: The Huffington Post . November 26, 2013. Archived from the original on April 23, 2014. Retrieved on February 27, 2014.
  67. Martin Holland: NSA apparently also sabotages directly in Germany. According to new documents, NSA agents are not only picking up mail in the US in order to manipulate them, but also in Germany. In addition, not only US companies are cooperating to facilitate surveillance. In: heise.de. November 10, 2014, accessed April 5, 2015 .
  68. symbol: Mboe: Snowden documents: NSA employees may sabotage in Germany. NSA agents who intercept devices in order to install espionage software on them: This could possibly also happen in Germany. The Intercept has published Snowden documents suggesting this. In: spiegel.de. November 10, 2014, accessed April 5, 2015 .