From World Afropedia
Jump to: navigation, search

Script error: No such module "main".

This is a list of government surveillance projects and related databases throughout the world.


Snapshot of Boundless Informant's global map of data collection

European Union

  • Data Retention Directive: A directive requiring EU member states to store citizens' telecommunications data for six to 24 months and allowing police and security agencies to request access from a court to details such as IP address and time of use of every email, phone call, and text message sent or received.
  • INDECT: Research project funded by the European Union to develop surveillance methods (e.g. processing of CCTV camera data streams) for the monitoring of abnormal behaviours in an urban environment.[1]
  • Schengen Information System: A database kept for national security and law enforcement purposes.



Script error: No such module "main".

  • In August 2014 it was reported[2] that law-enforcement agencies had been accessing Australians' web browsing histories via internet providers such as Telstra without a warrant.
  • It was reported[3] that Australia had issued 75% more wiretap warrants in 2003 than the US did and this was 26 times greater than the US on a per capita basis.


Script error: No such module "main".


DGSE base near Domme in southwestern France






United Kingdom

United States

A top secret document leaked by Edward Snowden to The Guardian in 2013, originally due to be declassified on 12 April 2038.

Unclear origin

Recently discontinued

See also

Page Module:Portal/styles.css has no content.


  1. Welcome to INDECT homepage — indect-home. [1] Retrieved 16 June 2013.
  2. Ben Grubb (20 August 2014). "Telstra found divulging web browsing histories to law-enforcement agencies without a warrant". Sydney Morning Herald. Italic or bold markup not allowed in: |publisher= (help)
  3. "Wiretapping Australia". 2003.
  4. 4.0 4.1 4.2 "How China's Internet Police Control Speech on the Internet". Radio Free Asia. Retrieved 11 June 2013. China’s police authorities spent the three years between 2003 and 2006 completing the massive “Golden Shield Project.” Not only did over 50 percent of China’s policing agencies get on the Internet, there is also an agency called the Public Information Network Security and Monitoring Bureau, which boasts a huge number of technologically advanced and well-equipped network police. These are all the direct products of the Golden Shield Project.
  5. "La France se met à l'espionnage" (in French). Free (ISP). Retrieved 11 June 2013. Frenchelon (ou French Echelon) est le surnom donné au réseau d'écoute de la DGSE. Le véritable nom de ce système d'écoute n'est pas connu (contrairement à ce que nous expliquions, ce n'est pas Emeraude)CS1 maint: unrecognized language (link)
  6. "Datenschutzbeauftragte warnen vor Volltextsuche bei Verfassungsschutz und Polizei" (in German). Heise Online. Retrieved 20 December 2013.CS1 maint: unrecognized language (link)
  7. Matthias Gebauer, Hubert Gude, Veit Medick, Jörg Schindler and Fidelius Schmid. "CIA Worked With BND and BfV In Neuss on Secret Project". Der Spiegel. Retrieved 20 December 2013. Italic or bold markup not allowed in: |publisher= (help)CS1 maint: multiple names: authors list (link)
  8. "India's centralised monitoring system comes under scanner, reckless and irresponsible usage is chilling". Daily News and Analysis. Retrieved 12 June 2013. Italic or bold markup not allowed in: |publisher= (help)
  9. "India sets up elaborate system to tap phone calls, e-mail". Reuters. 20 June 2013. Retrieved 28 June 2013. The new system will allow the government to listen to and tape phone conversations, read e-mails and text messages, monitor posts on Facebook, Twitter or LinkedIn and track searches on Google of selected targets, according to interviews with two other officials involved in setting up the new surveillance programme, human rights activists and cyber experts.
  10. "Big Brother Awards Schweiz: Onyx zum zweiten" (in German). Retrieved 28 June 2013.CS1 maint: unrecognized language (link)
  11. "THE IMPACT NOMINAL INDEX (INI)". Warwickshire Police. Retrieved 24 June 2013.
  12. Spy chiefs plot £12bn IT spree for comms überdatabase
  13. MacAskill, Ewen; Borger, Julian; Hopkins, Nick (21 June 2013). "GCHQ taps fibre-optic cables for secret access to world's communications". London: The Guardian. Retrieved 21 June 2013. This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets. Italic or bold markup not allowed in: |publisher= (help)
  14. 14.0 14.1 Wallace, Helen. "The UK National DNA Database: Balancing crime detection, human rights and privacy". Science and Society. Retrieved 24 June 2013.
  15. MacAskill, Ewen; Borger, Julian; Hopkins, Nick (21 June 2013). "GCHQ taps fibre-optic cables for secret access to world's communications". London: The Guardian. Retrieved 21 June 2013. Italic or bold markup not allowed in: |publisher= (help)
  16. Poitras, Laura; Marcel Rosenbach; Holger Stark (17 November 2013). "'Royal Concierge': GCHQ Monitors Hotel Reservations to Track Diplomats". Spiegel. Retrieved 17 November 2013.
  17. "Meet 'Boundless Informant,' the NSA's Secret Tool for Tracking Global Surveillance Data". The Atlantic. Retrieved 13 June 2013. The country where the largest amount of intelligence was gathered was, unsurprisingly, Iran: Boundless Informant shows more than 14 billion reports in that period. The second-largest collection came from Pakistan, with 13.5 billion reports. Jordan -- which is, yes, one of America's closest Arab allies -- had 12.7 billion reports. Egypt came in fourth (7.6 billion reports), and India in fifth with 6.3 billion. And when it comes to the U.S.? "The Boundless Informant documents show the agency collecting almost 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013." Italic or bold markup not allowed in: |publisher= (help)
  18. Point, Click ... Eavesdrop: How the FBI Wiretap Net Operates.
  19. "FBI Has a Magic Lantern". Retrieved 23 February 2009.
  20. 20.0 20.1 Shorrock, Tim (23 July 2008). "Exposing Bush's historic abuse of power". Retrieved 19 December 2010.
  21. Maass, Poitras. "Core Secrets: NSA Saboteurs in China and Germany". The Intercept. Retrieved 11 October 2014.
  22. Lichtblau, Eric (28 February 2001). "Spy Suspect May Have Revealed U.S. Bugging; Espionage: Hanssen left signs that he told Russia where top-secret overseas eavesdropping devices are placed, officials say". Los Angeles Times. p. A1. Archived from the original on 17 April 2001.
  23. Riley, Michael (23 May 2013). "How the U.S. Government Hacks the World". Bloomberg Businessweek. Retrieved 23 May 2013.
  24. Aid, Matthew M. (8 June 2010). The Secret Sentry: The Untold History of the National Security Agency. Bloomsbury USA. p. 311. ISBN 978-1-60819-096-6. Retrieved 22 May 2013.
  25. Blustein, Paul, Gellman, Barton, and Linzer, Dafna. "Bank Records Secretly Tapped", Washington Post, 23 June 2006. Accessed 23 June 2006.
  26. Trenholm, Rich. "NSA to Store Yottabytes in Utah Data Centre". CNET. Retrieved 13 June 2013.
  27. Bamford, James (15 March 2012). "The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)". Wired. Retrieved 5 April 2012.
  28. Kenyon, Henry (7 January 2011). "New NSA data center breaks ground on construction -- Defense Systems". Defense Systems. Retrieved 11 August 2011.
  29. Markoff, John (28 March 2009). "Vast Spy System Loots Computers in 103 Countries". The New York Times. Retrieved 29 March 2009.
  30. Robert McMillan (16 September 2010). "Siemens: Stuxnet worm hit industrial systems". Computerworld. Retrieved 16 September 2010.
  31. Nakashima, Ellen; Warrick, Joby (3 June 2012). "Stuxnet was work of U.S. and Israeli experts, officials say". The Washington Post. Retrieved 11 June 2013. The officials, speaking on the condition of anonymity to describe the classified effort code-named Olympic Games, said it was first developed during the George W. Bush administration and was geared toward damaging Iran’s nuclear capability gradually while sowing confusion among Iranian scientists about the cause of mishaps at a nuclear plant. Italic or bold markup not allowed in: |publisher= (help)