NSA Global Information Collection Map
The list contains a list of computer tracking and electronic intelligence programs implemented or currently being implemented by the governments of the countries of the world, as well as international projects in this field.
Content
- 1 International
- 2 National
- 2.1 UK
- 2.2 India
- 2.3 China
- 2.4 Russian Federation
- 2.5 US
- 2.6 France
- 2.7 Switzerland
- 2.8 Sweden
- 3 notes
International
- The echelon is a global electronic intelligence system operating under the radio-electronic and intelligence security agreement of Australia, Canada, New Zealand, the United Kingdom and the USA, also known as the UKUSA Agreement, AUSCANNZUKUS or Five Eyes [1] .
- SOUD is a classified information interception system created by the USSR and the Warsaw Pact countries for conducting global electronic intelligence [2] .
National
UK
- Interception Modernization Program - an initiative to empower the UK government to legally intercept communications and store the data in a single database [3] .
- Tempora - a secret computer tracking program launched in the fall of 2011, used by the UK Government Communications Center (GCHQ) in conjunction with the US National Security Agency [4] .
- Mastering the Internet (MTI) is one of the components of the Tempora program [4] .
- Impact Nominal Index - a computer system designed for the police and other law enforcement agencies in the UK, which allows you to quickly make inquiries about persons of interest [5] .
- Karma Police is a program for collecting metadata from Internet users.
- Squeaky Dolphin is a program developed by GCHQ for collecting and analyzing data from social networks.
- MUSCULAR is a program used by GCHQ in conjunction with the NSA to crack communications between Yahoo and Google data centers.
India
- NATGRID is an integrated computer network of Indian special services, which should consolidate the databases of several ministries and departments in order to facilitate the special services of India quick access to the required information [6] .
- Centralized monitoring system - a computer tracking system used by the government of India, an analogue of the US NSA PRISM program [7] .
- DRDO NETRA - A computer network controlled by Indian Foreign Intelligence (RAW), designed to intercept e-mail messages, web forums, blogs, social networks, images using predefined filters [8] [9] .
China
- The Golden Shield ( Chinese 金盾 工程 , jīndùn gōngchéng ; unofficial name is “The Great Chinese Firewall ”) is an Internet censorship and computer tracking program implemented by the PRC Ministry of Public Security . The project was initiated in 1998 and began to operate in November 2003 [10] .
- Public Safety Information Network [10] .
- Bureau of Oversight [10] .
Russian Federation
- SORM ( abbreviated from the System of technical means for providing functions of operative search measures ) - a set of technical means and measures designed to conduct operational-search measures in telephone , mobile and wireless networks and radio communications (according to the Law “On Communications” ”And Order of the Ministry of Communications No. 2339 dated August 9, 2000 [11] ). It is necessary to distinguish between the concepts:
- "SORM-1" - a system for listening to telephone conversations, organized in 1996;
- “SORM-2” (the name was suggested by V. Ionov) is a system for recording Internet access , developed by a working group of representatives of the State Communications Committee of Russia , the Federal Security Service of Russia , Central Research Institute of Communications and the Central Communications Inspection under the leadership of Yu. V. Zlatkis [12] and organized in 2000 (PTP CTX );
- “SORM-3” - provides the collection of information from all types of communications and its long-term storage [13] .
USA
The top secret document published by E. Snowden in The Guardian in 2013 was to be declassified on April 12, 2038.
- The US intelligence community is a system of 16 intelligence services whose activities include, among other things, computer tracking and electronic intelligence.
- The Comprehensive National Cybersecurity Initiative is a doctrine in the field of US cybersecurity , the main provisions of which are classified.
- NSA Data Center (Utah) - An NSA data center under construction is designed to store very large amounts of data [14] [15] .
- MAINWAY is the NSA database containing metadata about hundreds of billions of phone calls made through the four largest US phone companies: AT & T, SBC, BellSouth and Verizon.
- Stellar Wind - a program for tracking electronic communications (including control of e-mail messages, telephone conversations, financial transactions and Internet activity) [16]
- Room 641A is a room in the building of the AT&T backbone provider used to intercept Internet telecommunications in the interests of the NSA [17] .
- Tailored Access Operations (TAO) - established in 1997 by the NSA, which is engaged in active (hacking, installing backdoors) and passive monitoring of computers [18] [19] . For example, it is able to collect approximately 2 petabytes of data transmitted over the network per hour [20] [21] .
- Boundless Informant - NSA system for analyzing global electronic communications. In March 2013, it had a database with 14 billion reports on Iran, 6.3 billion on India, and 2.8 billion on the United States [22] .
- National Suspicious Activity Control Initiative - A joint project of the US Department of Justice and the US Department of Homeland Security , providing for computer tracking capabilities.
- PRISM (intelligence program) is an in-depth monitoring program for Internet traffic, formally classified as top secret , adopted by the NSA in 2007 [23] as a replacement for the Terrorist Surveillance Program .
- DCSNet is a Point-and-click FBI tracking system that can listen to telephone conversations on any telecommunication devices located in the USA [24] .
- Main Core is a database that stores personal and financial information about millions of US citizens who may pose a threat to national security [25] . The data source is the NSA, the FBI, the CIA, and other government sources [25] .
- Magic Lantern is a keylogger program sent by the FBI as an attachment to e-mail messages. When activated, it acts like a Trojan and allows the FBI to track the actions of an Internet user [26] .
- NarusInsight is a supercomputer cluster-class espionage system designed to listen and analyze network traffic data on the Internet. It uses the Carnivore system as an auxiliary data delivery node. The system operator in the United States is the FBI; users are all federal agencies in the United States.
- Carnivore - (from the English “Carnivorous” ) - an automatic spying system for listening to information coming and going from Web sites, analyzing databases on Web sites, as well as for opening and analyzing e-mail, an analogue of the Russian SORM-2. Element of the NarusInsight total tracking cluster of a supercomputing cluster.
- Terrorist Finance Tracking Program - a joint program of the CIA and the US Department of the Treasury to gain access to the SWIFT transaction database. According to the US government, its efforts to counter terrorist activities were compromised after information about the existence of the program was leaked to the media [27] .
- X-Keyscore is a secret computer tracking program implemented jointly by the US National Security Agency, the Australian Radio Defense Authority and the New Zealand Government Communications Security Service [28] .
France
Station Frenchelon in Domme, Dordogne department
- Frenchelon - the French global electronic intelligence system, an analogue of the Anglo-Saxon Echelon system, is run by the Directorate-General for External Security (DGSE) and the Military Intelligence Directorate (DRM) [29] [30] .
Switzerland
- Onyx is a Swiss-based intelligence intelligence system designed to intercept military and civilian communications (e-mail, fax, and phone calls). In 2001 she was awarded the Big Brother Award (an international award for the most flagrant violation of privacy and freedom of citizens) [31] .
Sweden
- Titan - a database created by the Radio Engineering Department of the Ministry of Defense of Sweden , which stores records of telephone conversations, Internet traffic and electronic transaction data intercepted in international communications [32] [33] .
Notes
- ↑ John O'Neill. Echelon , ISBN 978-1-59571-071-0
- ↑ Agreement on the Joint Enemy Data Records System
- ↑ Spy chiefs plot £ 12bn IT spree for comms überdatabase
- ↑ 1 2 GCHQ taps fiber-optic cables for secret access to world communications . The Guardian . Date of treatment June 21, 2013. Archived July 10, 2013.
- ↑ THE IMPACT NOMINAL INDEX (INI) (inaccessible link) . Warwickshire Police . Date of treatment June 24, 2013. Archived July 11, 2013.
- ↑ NATGRID to show its first result in 18 months - Times Of India . Archived July 11, 2013.
- ↑ India's centralized monitoring system comes under scanner, reckless and irresponsible usage is chilling . Daily News and Analysis . Date of treatment June 12, 2013. Archived July 11, 2013.
- ↑ Home seeks system to intercept Net chatter (June 23, 2013). Date of treatment June 23, 2013.
- ↑ Govt holds contest between two Internet spy systems . Date of treatment August 17, 2012. Archived July 11, 2013.
- ↑ 1 2 3 How China's Internet Police Control Speech on the Internet . Radio Free Asia . Date of treatment June 11, 2013. Archived July 11, 2013.
- ↑ About the procedure for introducing a system of technical means to ensure operational-search measures - Order No. 130 of July 25, 2000
- ↑ SORM-2 on the website Agentura.ru (inaccessible link) . Date of treatment July 5, 2013. Archived June 5, 2009.
- ↑ http://ria.ru/infografika/20130815/956535235.html Telephone wiretapping and traffic interception in Russia
- ↑ NSA to store yottabytes in Utah data center | CNET UK (inaccessible link) . Date of treatment July 5, 2013. Archived July 3, 2013.
- ↑ Bamford, James . The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) (March 15, 2012). Date of treatment April 5, 2012.
- ↑ The Whistleblower Who Exposed Warrantless Wiretaps - Newsweek and The Daily Beast (link not available) . Date of treatment July 5, 2013. Archived July 11, 2013.
- ↑ AT&T Whistle-Blower's Evidence . Archived July 11, 2013.
- ↑ NSA installs backdoors on laptops from online stores , Xakep (12.30.2013). Date of treatment January 1, 2014.
- ↑ Inside TAO: Documents Reveal Top NSA Hacking Unit , SPIEGEL (December 29, 2013). Date of treatment January 1, 2014.
- ↑ Riley, Michael How the US Government Hacks the World . Bloomberg Businessweek (May 23, 2013). Date of treatment May 23, 2013. Archived July 11, 2013.
- ↑ Aid, Matthew M. The Secret Sentry: The Untold History of the National Security Agency . - Bloomsbury USA, June 8, 2010. - P. 311. - ISBN 978-1-60819-096-6 .
- ↑ Meet 'Boundless Informant,' the NSA's Secret Tool for Tracking Global Surveillance Data . The Atlantic . Date of treatment June 13, 2013. Archived July 11, 2013.
- ↑ US intelligence mining data from nine US Internet companies in broad secret program . The Washington Post (June 6, 2013). Date of treatment June 6, 2013. Archived June 9, 2013.
- ↑ Point, Click ... Eavesdrop: How the FBI Wiretap Net Operates .
- ↑ 1 2 Shorrock, Tim Exposing Bush's historic abuse of power . Salon.com (July 23, 2008). Date of treatment December 19, 2010. Archived July 11, 2013.
- ↑ FBI Has a Magic Lantern . Usgovinfo.about.com. Date of treatment February 23, 2009. Archived July 11, 2013.
- ↑ Bank Records Secretly Tapped . Archived July 11, 2013.
- ↑ Snowden reveals Australia's links to US spy web , Sydney Morning Herald , 8 Jul 2013. Retrieved 11 Jul 2013.
- ↑ Espionnage - Les Français aussi écoutent leurs alliés , Le Point, par Jean Guisnel, http://www.maurizioturco.it/iniziative_politiche/echelon_dossier/banca_dati/rassegna_stampa/1998_06_06_le_point_esp
- ↑ Espionnage Comment la France écoute le monde , Le Nouvel Observateur, par Vincent Jauvert, le 04/04/2001 http://hebdo.nouvelobs.com/hebdo/parution/p1900/dossier/a41085-espionnage_comment_la_france_ecoute_lemlmon.mon
- ↑ Big Brother Awards Schweiz: Onyx zum zweiten (German) . Heise.de. Date of treatment June 28, 2013. Archived July 11, 2013.
- ↑ Frågor & Svar, fråga 5 SVT Rapport 2008-06-16
- ↑ FRA lagrar svenska telesamtal och mail SVT Rapport 2008-06-16