Snowden Revelations

This page catalogs various revelations by Edward Snowden, regarding the United States’ surveillance activities.

Each disclosure is assigned to one of the following categories: tools and methods, overseas USG locations from which operations are undertaken, foreign officials and systems that NSA has targeted, encryption that NSA has broken, ISPs or platforms that NSA has penetrated or attempted to penetrate, and identities of cooperating companies and governments.  Each entry includes the date the information was first published.

The page will be updated from time to time and is intended as a resource regarding Snowden and the debate over U.S. surveillance.  Comments and suggestions thus are welcomed, and should be sent to [email protected]

In addition to this page, Lawfare has cataloged and summarized the FISA documents the government has declassified in response to the Snowden controversy in the 

1. Tools and methods

2. Overseas USG locations from which operations are undertaken

3. Foreign officials and systems that NSA has targeted

4. Encryption that NSA has broken

  • December 13, 2013: NSA has broken the  used by many GSM cell phones.

5. Identity of ISPs and platforms that NSA has penetrated or attempted to penetrate

6. Identities of cooperating companies and governments

  • September 15, 2014: NSA worked with  to start collecting metadata on communications entering and exiting New Zealand.
  • August 4, 2014: NSA has increased the surveillance assistance it provides to the , including monetary support for covert operations.
  • July 25, 2014: NSA has significantly expanded its relationship with the  by providing it “direct and analytic technical support” on “internal security” matters.
  • May 19, 2014: NSA has worked with  to collect the contents or metadata of all cell phone calls in the Bahamas, Mexico, the Philippines, and Kenya. The Australian Signals Directorate has cooperated with NSA on the collection in the Philippines.
  • April 30, 2014:  had extensive access to NSA’s PRISM data during the London Olympics and later sought similar access on an ongoing basis.
  • February 18, 2014: As of August 2010, the USG was attempting to persuade  to file criminal charges against WikiLeaks founder Julian Assange.
  • February 15, 2014:  cooperated with NSA to collect information about Indonesia’s trade negotiations with the United States.
  • February 15, 2004:  cooperated with NSA in an effort to break the encryption used by Papua New Guinea’s military.
  • December 20, 2013: NSA entered into a contract with  to use an NSA formula as the default option for number generation in the Bsafe security software, enabling NSA to penetrate the software more easily. RSA asked consumers to stop using the formula after the Snowden leaks revealed its weaknesses.
  • December 17, 2013:  cooperates with NSA to collect information about Russia, particularly Russian military activities in the Kola Peninsula and Russian energy policy.
  • December 9, 2013:  has established listening posts in approximately twenty countries at NSA’s request.
  • December 5, 2013:  cooperates with NSA to collect information about Russia.
  • November 27, 2013:  cooperated with NSA to collect information about the 2010 G20 summit in Toronto.
  • November 17, 2013:  cooperated with NSA in an attempt to monitor the communications of senior Indonesian officials, including the President, the Vice President, and several ministers.
  • November 17, 2013:  has been more willing than other allies to share unminimized bulk metadata with NSA.
  • November 2, 2013: As of 2009, NSA was considering establishing an intelligence-sharing relationship with 
  • November 2, 2013: NSA has an intelligence-sharing relationship with 
  • October 7, 2013:  cooperated with NSA to monitor the communications of Brazil’s Ministry of Mines and Energy.
  • June 7, 2013: NSA has collected international communications from  as part of its PRISM program.