Data Retention Directive: A defunct directive requiring EU member states to store citizens' telecommunications data for six to 24 months and allowing police and security agencies to request access from a court to details such as IP address and time of use of every email, phone call, and text message sent or received.
INDECT: Was a research project (until 2014) funded by the European Union to develop surveillance methods (e.g. processing of CCTV camera data streams) for the monitoring of abnormal behaviours in an urban environment.[1]
In August 2014 it was reported[2] that law-enforcement agencies had been accessing Australians' web browsing histories via internet providers such as Telstra without a warrant.
It was reported[3] that Australia had issued 75% more wiretap warrants in 2003 than the US did and this was 26 times greater than the US on a per capita basis.
The Integrated Joint Operations Platform (IJOP, 一体化联合作战平台) is used by the government to monitor the population, particularly Uyghurs.[5] The platform gathers biometrics, including DNA samples, to track individuals in Xinjiang.[6]
Gratitude of the Department of the Ministry of Internal Affairs of the Russian Federation for the Volkhov region of the organization Perspective Scientific Research Development for the creation of the "CAMERTON" system.SORM: A technical system used by the Federal Security Service of the Russian Federation to monitor internet and telephone communication.
Certificate of state registration of the "monitoring, control, tracking the target of ground vehicles" - "СAMERTON".СAMERTON: Is a global vehicle tracking system, control and tracking, identification of probable routes and places of the most frequent appearance of a particular vehicle, integrated with a distributed network of radar complexes of photo-video fixation and road surveillance camera.[16] Developed and implemented by the "Advanced Scientific - Research Projects" enterprise St. Petersburg.[17] Within the framework of the practical use of the system of the Ministry of Internal Affairs of the Russian Federation, it has made it possible to identify and solve grave and especially grave crimes, the system is also operated by other state services and departments;
Yarovaya Law is a piece of anti-terrorist legislation that includes a requirement to store all phone call and text messaging data, as well as providing cryptographic backdoors for security services.
X-Keyscore: A system used by the United States National Security Agency for searching and analysing internet data about foreign nationals. FRA has been granted access to the program.[19]
Onyx: A data gathering system maintained by several Swiss intelligence agencies to monitor military and civilian communications, such as e-mails, telefax and telephone calls. In 2001, Onyx received its second nomination from the ironically named "Big Brother Award".[20]
Impact Nominal Index: The Impact Nominal Index or INI is a computer system that enables the UK police force to establish whether other relevant authorities are holding information regarding a person of interest.[21]
UK National DNA Database (NDNAD): It is also the oldest national DNA database in the world.[24] Since its establishment in 1995, the database has grown to include DNA samples from 2.7 million individuals, or 5.2% of the UK's population, many of whom have neither been charged with, or convicted of, any offence.[24]
Tempora: Launched in the autumn of 2011, this initiative allows the GCHQ to set up a large-scale buffer that is capable of storing internet content for 3 days and metadata for 30 days.[25]
BULLRUN: a highly classified U.S. National Security Agency program to preserve its ability to eavesdrop on encrypted communications by influencing and weakening encryption standards, by obtaining master encryption keys, and by gaining access to data before or after it is encrypted either by agreement, by force of law, or by computer network exploitation (hacking).
Carnivore: A system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. Apparently replaced by commercial software such as NarusInsight.
ICREACH: Surveillance frontendGUI that is shared with 23 government agencies, including the CIA, DEA, and FBI, to search illegally collected personal records.
Main Core: A personal and financial database storing information of millions of U.S. citizens believed to be threats to national security.[31] The data mostly comes from the NSA, FBI, CIA, as well as other government sources.[31]
NSA ANT catalog: a 50-page document listing technology available to the United States National Security Agency (NSA) ANT division to aid in cyber-surveillance.
PRISM: A clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) which can target customers of participating corporations outside or inside the United States.
Room 641A: A telecommunication interception facility operated by AT&T for the U.S. National Security Agency.
Sentry Eagle: efforts to monitor and attack an adversary's cyberspace through capabilities include SIGINT, Computer Network Exploitation (CNE), Information Assurance, Computer Network Defense (CND), Network Warfare, and Computer Network Attack (CNA). The efforts included weakening US commercial encryption systems.[32]
Special Collection Service (SCS): A black budget program that is responsible for "close surveillance, burglary, wiretapping, breaking and entering." It employs covert listening device technologies to bug foreign embassies, communications centers, computer facilities, fiber-optic networks, and government installations.[33]
Turbulence (NSA): Turbulence is a United States National Security Agency (NSA) information-technology project started circa 2005. It was developed in small, inexpensive "test" pieces rather than one grand plan like its failed predecessor, the Trailblazer Project. It also includes offensive cyberwarfare capabilities, like injecting malware into remote computers. The U.S. Congress criticized the project in 2007 for having similar bureaucratic problems as the Trailblazer Project.[37]
US Intelligence Community (IC): A cooperative federation of 16 government agencies working together, but also separately, to gather intelligence and conduct espionage.
Information Awareness Office: An office established to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other threats to U.S. national security.
ThinThread: A U.S. National Security Agency (NSA) program that involved wiretapping and sophisticated analysis of the resulting data.
Trailblazer Project: U.S. National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks including cell phone networks and the Internet.
^ abc"How China's Internet Police Control Speech on the Internet". Radio Free Asia. Retrieved 11 June 2013. China's police authorities spent the three years between 2003 and 2006 completing the massive "Golden Shield Project". Not only did over 50 percent of China's policing agencies get on the Internet, there is also an agency called the Public Information Network Security and Monitoring Bureau, which boasts a huge number of technologically advanced and well-equipped network police. These are all the direct products of the Golden Shield Project.
^Josh Rogin (2 August 2018). "Ethnic cleansing makes a comeback – in China". No. Washington Post. Archived from the original on 31 March 2019. Retrieved 4 August 2018. Add to that the unprecedented security and surveillance state in Xinjiang, which includes all-encompassing monitoring based on identity cards, checkpoints, facial recognition and the collection of DNA from millions of individuals. The authorities feed all this data into an artificial-intelligence machine that rates people's loyalty to the Communist Party in order to control every aspect of their lives.
^"La France se met à l'espionnage" (in French). Free (ISP). Retrieved 11 June 2013. Frenchelon (ou French Echelon) est le surnom donné au réseau d'écoute de la DGSE. Le véritable nom de ce système d'écoute n'est pas connu (contrairement à ce que nous expliquions, ce n'est pas Emeraude)
^"India sets up elaborate system to tap phone calls, e-mail". Reuters. 20 June 2013. Archived from the original on 7 February 2016. Retrieved 28 June 2013. The new system will allow the government to listen to and tape phone conversations, read e-mails and text messages, monitor posts on Facebook, Twitter or LinkedIn and track searches on Google of selected targets, according to interviews with two other officials involved in setting up the new surveillance programme, human rights activists and cyber experts.
^"TITAN: A TRAFFIC MEASUREMENT SYSTEM USING IMAGE PROCESSING TECHNIQUES. SECOND INTERNATIONAL CONFERENCE ON ROAD TRAFFIC MONITORING". Institution of Electrical Engineers.
^MacAskill, Ewen; Borger, Julian; Hopkins, Nick (21 June 2013). "GCHQ taps fibre-optic cables for secret access to world's communications". The Guardian. London. Retrieved 21 June 2013. This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.
^"Meet 'Boundless Informant,' the NSA's Secret Tool for Tracking Global Surveillance Data". The Atlantic. Retrieved 13 June 2013. The country where the largest amount of intelligence was gathered was, unsurprisingly, Iran: Boundless Informant shows more than 14 billion reports in that period. The second-largest collection came from Pakistan, with 13.5 billion reports. Jordan -- which is, yes, one of America's closest Arab allies -- had 12.7 billion reports. Egypt came in fourth (7.6 billion reports), and India in fifth with 6.3 billion. And when it comes to the U.S.? "The Boundless Informant documents show the agency collecting almost 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013."
^Nakashima, Ellen; Warrick, Joby (3 June 2012). "Stuxnet was work of U.S. and Israeli experts, officials say". The Washington Post. Archived from the original on 1 January 2013. Retrieved 11 June 2013. The officials, speaking on the condition of anonymity to describe the classified effort code-named Olympic Games, said it was first developed during the George W. Bush administration and was geared toward damaging Iran's nuclear capability gradually while sowing confusion among Iranian scientists about the cause of mishaps at a nuclear plant.