Guardian and Snowden revelations 2013

See also Edward Snowden

Here you can find a timeline of all the 'Snowden revelations' starting from July 2013. This page is updated on a regular basis as the news breaks.

Major UK relevant programmes

Full list of revelations

August 2014

2014-08-25 - The Intercept - The Surveillance Engine: How the NSA Built Its Own Secret Google
Summary: NSA constructed search engine allowing nearly two-dozen government agencies access to million of American and non-American's information collected by the agency.
2014-08-04 - The Intercept - Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack
Summary: Documents obtained by Edward Snowden show a close cooperation between the NSA and the Israeli Defence Forces Unit 8200, revealing covert money transfers and a close cooperation between other Middle Eastern leadership for the surveillance of Palestinian targets.

July 2014

2014-07-25 - The Intercept - The NSA’s New Partner in Spying: Saudi Arabia’s Brutal State Police
Summary: Top secret memo dated April 2013 details the NSA's plans “to provide direct analytic and technical support” to Saudi Arabia's internal security.


2014-07-14 - The Intercept - Hacking Online Polls and Other Ways British Spies Seek to Control the Internet
Summary: A new document named “JTRIG Tools and Techniques” shows that the GCHQ's Joint Threat Research Intelligence Group (JTRIG), has developed tools to change the results of online polls, change the pageview counts on web sites, censor 'extremist' video content and to "amplify sanctioned messaged on YouTube".

May 2014

2014-05-19 - The Intercept - Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas
Summary:Through system codenamed SOMALGET, the NSA has been intercepting, recording and storing all of Bahama's telephone communications. Such an operation was initially disclosed as working under Mystic, and it was suspected that the country's whose phone communications were intercepted was Iraq.

April 2014

2014-04-08 - The Guardian - Edward Snowden: US government spied on human rights workers
Summary: Edward Snowden when giving evidence to the European Council, said that the NSA and GCHQ spied on leaders and staff members of human rights organisations in the based in the US or internationally.

March 2014

2014-03-31 - The Guardian -NSA revelations 'changing how businesses store sensitive data'
Summary: "many [businesses] are questioning their reliance on "cloud computing" in favour of more secure forms of data storage as the whistleblower's revelations continue to reverberate."


2014-03-22 - The New York Times - N.S.A. Breached Chinese Servers Seen as Security Threat
Summary:NSA infiltrated Chinese telecommunications company, Huawei. Initially the plan was to find any activity between the company and the People's Liberation Army (the Chinese military), but then spread to monitoring the equipment sold to third parties. This allowed the NSA to roam through their telephone and computer networks.


2014-03-20 - The Intercept - Inside the NSA’s Secret Efforts to Hunt and Hack System Administrators
Summary: The Intercept published an analytical report detailing how the NSA has been infiltrating networks through system administrators. The NSA finds the personal email and Facebook accounts of system administrators before hacking into their computers. The purpose of the hacking is to collect passwords, network maps, customer lists and business correspondence.


2014-03-18 - The Washington Post - NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls
Summary: NSA programme (MYSTIC) can collect 100% of a foreign country's telephone communications and store them for 30 days. This allows them to go into their archive and listen back on any communications they hadn't tagged on the day.
2014-05-13 - The Intercept - Foreign Officials In the Dark About Their Own Spy Agencies’ Cooperation with NSA
Summary: Document revealing an internal interview with an NSA SIGINT (Signals Intelligence), shows that the surveillance operations are mostly kept secret form heads of state and other government officials.
2014-03-12 - The Intercept - How the NSA Plans to Infect ‘Millions’ of Computers with Malware
Summary: The NSA has been developing strong capabilities to remotely infiltrate people's computers, through emails, false facebook pages and other pathways. In a presentation dated from 2009, they discuss plans to develop the technology of such a programme, in order to allow for computer systems to carry out tasks that would normally be completed by human operators.

February 2014

2014-02-04 - The Guardian - NSA tapped German ex-chancellor Gerhard Schröder's phone – report
Summary: Documents previously interpreted as revealing the wire-tapping of German Chancellor's, Angela Merkel's, phone are now being viewed as indication that the position of German Chancellor, rather than specific leaders, are being spied on.


2014-02-05 - NBC - War on Anonymous: British Spies Attacked Hackers, Snowden Docs Show
Summary: GCHQ targeted 'hacktivist' group Anonymous and LulzSec with a Denial-of-service attack (DoS or DDoS)


2014-02-07 - NBC News - Snowden Docs: British Spies Used Sex and 'Dirty Tricks'
Summary: GHCQ's secret unit, called Joint Threat Research and Intelligence Group (JTRIG), used 'dirty tactics' to attack adversaries. These include spreading false stories through Facebook, Flickr, YouTube, Twitter and blogs. 'False flag' operations, which are actions made to look as though they were carried out by British adversaries.


2014-02-18 - The Intercept - Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters
Summary: Documents show that American and British security agencies directly targeted Wikileaks and “the human network that supports WikiLeaks.”. They have also targeted torrent sharing site Pirate-Bay and 'hacktivist' group Anonymous


2014-02-27 - The Guardian - UK spy agency intercepted webcam images of millions of Yahoo users
Summary: GCHQ programme called 'Optic Nerve' described in documents as "a web interface to display Yahoo Webcam images sampled from unselected intercept and a system for proportionate target discovery". The programme collected images of Yahoo Webchat users every five minutes.

January 2014

2014-01-02 - Washington Post - NSA seeks to build quantum computer that could crack most types of encryption
Summary: New documents provided by Snowden reveal that the NSA is looking to develop a Quantum computer that will have the ability to break nearly all encryption tools. The documents also reveal a programme called "Owning the Net", that seeks to use quantum technology to break widely used RSA encryption tool.


2014-01-09 - The Guardian - NSA and GCHQ activities appear illegal, says EU parliamentary inquiry
Summary: European Committee on Civil Liberties, Justice and Home Affairs inquiry into mass surveillance, published their first report stating that the mass surveillance programmes are illegal.


2014-01-09 - Washington Post - Obama, lawmakers discuss whether to end NSA collection of Americans’ phone records
Summary: President Obama met with lawmakers on Thursday to discuss ending mass government surveillance.


2014-01-10 - Washington Post - Pentagon Finds Snowden Took Most U.S. Secrets Ever, Rogers Says
Summary: A Pentagon report found that Edward Snowden downloaded 1.7 million intelligence files, committing the biggest theft in US history.


2014-01-14 - New York Times - N.S.A. Devises Radio Pathway Into Computers
Summary: Through programme 'Quantum', the NSA has implanted software in around 100,000 computers worldwide which allows them to access the systems without internet connection. The most regular targets have been the Chinese army, but also include European trade unions and partner countries in the fight against the war on terror, like Saudi Arabia. The technology is said to have been in use since 2008 and has to be placed manually through tiny circuit boards or USB cards. Transceivers that have been implanted in the computer connect with a 'field station' that can be located up to 8 miles from the 'target'. All data and malware is transmitted through a covert radio frequency. The 'field station' then communicates with the NSA's remote operations centre.
There has been no evidence of domestic use of the programme.


2014-01-16 - The Guardian - NSA collects millions of text messages daily in 'untargeted' global sweep
Summary:the NSA has been collecting millions of text messages. Programme 'Dishfire' has the ability to collect information on location, financial transactions and contacts. British counterpart GCHQ uses the information log to search through the metadata from UK numbers.


2014-01-17 - The Guardian - Obama presents NSA reforms with plan to end government storage of call data
Summary: American president announced a series of reforms to the NSA and the collection of phone records. The reforms called for an end to the collection of bulk phone data by the NSA, but not an end to the programme itselfprompted Congress to create an independent panel of advocates that can provide a voice in front of the Foreign Intelligence Surveillance Court


2014-01-27 - NBC News - Snowden docs reveal British spies snooped on YouTube and Facebook
Summary: In a programme called "Squeaky Dolphin", it appears GCHQ was able to monitor the real-time activity of users in popular social media sites, such as Facebook, YouTube and blogging websites.GCHQ was able to obtain the information either through physical taps in the cables or by using third parties to gain physical access to the data stream.


2014 -01-27 - The New York Times - Spy Agencies Tap Data Streaming From Phone Apps
Summary: The NSA has been collecting information on users through popular mobile applications.


2014-01-30 - CBC News - CSEC used airport Wi-Fi to track Canadian travellers: Edward Snowden documents
Summary: The Communications Security Establishment Canada ( CSEC), used free wifi internet, at a major Canadian airport, to track the wireless devices of thousands of travellers for days.

December 2013

2013-12-02 - Guardian - Revealed: Australian spy agency offered to share data about ordinary citizens
Summary: the Australian security agency offered to share information on ordinary citizens. The documents are the exchange with their surveillance agency partners about whether they should share "medical, legal or religious information".


2013-12-05 - Washington Post - NSA tracking cellphone locations worldwide, Snowden documents show
Summary:The NSA is collecting location information on nearly 5 billion cell phones a day, by tapping into cables that connect mobile networks globally. The information is primarily gathered from non-US citizens, but 'incidentally' also tracks information on US citizens.US officials maintain that the practise is lawful and intended to only gather information on foreign targets.


2013-12-09 - Guardian - Amnesty to take legal action against UK security services
Summary: The human rights group has issued a claim at the Investigatory Powers Tribunal against the British intelligence agencies. The group alleges that it is very likely their communications have been intercepted by GCHQ and have violated Article 8 (right to privacy) and Article 10 (freedom of expression) of the Human Rights Act.


2013-12-09 - BBC - US and UK 'spy on virtual games like World of Warcraft'
Summary: NSA and GCHQ have been following conversations and payments in virtual games, suspecting that they may be an alternative place for terrorist groups to discuss plans or for arms dealers to make transactions.


2013-12-10 - Washington Post - NSA uses Google cookies to pinpoint targets for hacking
Summary: NSA and GCHQ use cookies designated for commercial purposes, as a way of tracking and infiltrating user's computers. Documents show that the intelligence agencies have been using Google's REF cookies. Previous Snowden files have revealed that cookie data can be obtained under a FISA order in which case the companies handing over the information are fully aware of the process.


2013-12-10 - Washington Post - New documents show how the NSA infers relationships based on mobile location data
Summary: Operation called HAPPYFOOT enables the NSA to track the location of their surveillance targets.


2013-12-17 - CNN - Judge: NSA domestic phone data-mining unconstitutional
Summary: A US federal judge found that the collection of domestic bulk data including details on phone records of time and numbers by the NSA was unconstitutional. His ruling was connected to five plaintiffs that protested against this activity, but was limited only to the specific case.


2013-12-18 - Reuters - White House review panel proposes curbs on some NSA programs
Summary: White House review panel set up by President Obama published their assessment report titled "Liberty and Security in a Changing World" on the NSA surveillance programme. The review made 46 suggestions including stripping the security service of their power to store communications metadata collected through the surveillance programme.


2013-12-19 - The Guardian - Tech companies call for 'aggressive' NSA reforms at White House meeting
Summary: On Tuesday, major tech firms met with president Obama to discuss scaling down on mass surveillance. Those attending included Tim Cook, CEO of Apple, Marissa Mayer, CEO of Yahoo, Eric Schmidt, Google’s executive chairman, senior representatives from Comcast, Facebook, Microsoft, Twitter, Randall Stephenson, and CEO of AT&T.

November 2013

2013-11-02 - Judiciary Senates hearing - “The Surveillance Transparency Act of 2013”
Summary: Hearing on Senator Franken's bill " "The Surveillance Transparency Act of 2013". The bill will allow companies to report on any surveillance orders they receive and will introduce stricter reporting on the Government's use of FISA.


2013-11-11 - Der Spiegel - Quantum Spying: GCHQ Used Fake LinkedIn Pages to Target Engineers
Summary: GCHQ infiltrated Belgacom employee’s computers by using fake copies of their LinkedIn profiles. Belgacom is a Belgian telecommunications company that is partially owned by the Belgian government.


2013-11-14 - New York Times - C.I.A. Collects Global Data on Transfers of Money
Summary: CIA is collecting bulk information of international money transfers under the same law that allows the NSA to collect phone records. The information includes transfers from the United States. A spokesperson for a bank handling money transfers from abroad said that they collect consumer information in order to comply with the 'Bank Secrecy Act'.


2013-11-27 - Guardian - NSA 'collected details of online sexual activity' of Islamist radicals
Summary: The NSA was targeting six 'radical islamists' and collecting information on their online 'sexual activity' in order to discredit them by creating a list of their 'vulnerabilities'.

October 2013

2013-10-04 - Guardian - NSA and GCHQ target Tor network that protects anonymity of web users
Summary: Documents describe attempts to identify Tor users and attack computers. Includes an attack called EgotisticalGiraffe against the Tor browser bundle.


2013-10-06 - Guardian - Prism and Tempora: the cabinet was told nothing of the surveillance state's excesses
Summary: Chris Huhne says the National Security Council, a Cabinet sub committee, was not told about key surveillance programmes.


2013-10-14 - Washington Post - NSA collects millions of e-mail address books globally
Summary: “collection depends on secret arrangements with foreign telecommunications companies or allied intelligence services in control of facilities that direct traffic along the Internet’s main data routes.”


2013-10-25 - Guardian - Leaked memos reveal GCHQ efforts to keep mass surveillance secret
Summary:


2013-10-26 - Guardian - NSA surveillance: Merkel's phone may have been monitored 'for over 10 years'
Summary: “Merkel's mobile number had been listed by the NSA's Special Collection Service (SCS) since 2002 and may have been monitored for more than 10 years.” 80 unregistered locations are used for surveillance by the USA, in “Paris, Madrid, Rome, Prague, Geneva and Frankfurt” as well as Berlin.


2013-10-28 - BBC reporting on Spanish media - NSA 'monitored 60m Spanish calls in a month'
Summary: El Pais and El Mundo “alleged that the NSA tracked millions of phone calls, texts and emails from Spanish citizens between 10 December 2012 and 8 January this year”


2013-10-30 - Washington Post - NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say
Summary: Documents detail taps on unencrypted private data links at Google and Yahoo! and detail “full take,” “bulk access” and “high volume” data grabs. These actions would be illegal overseas.

September 2013

2013-09-02 - Bloomberg reporting on Globo TV - U.S. Spied on Presidents of Brazil and Mexico, Globo Reports
Summary: Documents show President Dilma Rousseff’s communications being intercepted, and those of Pena Nieto, one month before he was elected. The “document highlights software that was used to probe President Dilma Rousseff’s communications with several unidentified aides.”


2013-09-05 - Guardian - Revealed: how US and UK spy agencies defeat internet privacy and security

New York Times - N.S.A. Able to Foil Basic Safeguards of Privacy on Web

Summary: Programmes aim at inserting backdoors and weakening crytographic products to make them exploitable under US and UK operations known as Bullrun and Edgehill.


2013-09-05 - Der Speigel - NSA Can Spy on Smart Phone Data; iSpy: How the NSA Accesses Smartphone Data
Summary: “The documents state that it is possible for the NSA to tap most sensitive data held on these smart phones, including contact lists, SMS traffic, notes and location information about where a user has been.” Includes iPhones, Blackberrys and Android systems.


2013-09-08 - Reuters reporting on Globo TV - U.S. government spied on Brazil's Petrobras oil firm: Globo TV
Summary: Fantastico


2013-09-11 - Guardian - NSA shares raw intelligence including Americans' data with Israel
Summary: MoU does not set any legal limits on Israeli use of data which includes Internet data – “"Raw Sigint includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content.”


2013-09-20 - TechWeekEurope, reporting on Der Speigel - GCHQ ‘Hacked Belgium ISP Belgacom’
Summary: GCHQ targeted Belgacom under Operation Socialist; customers include the European Commission, the European Council and the European Parliament.


2013-09-25 - Guardian - NSA spied on Indian embassy and UN mission, Edward Snowden files reveal
Summary: NSA “may have accessed computers within the Indian embassy in Washington and mission at the United Nations in New York as part of a huge clandestine effort to mine electronic data held by its south Asian ally”; documents show vast attempt to target India through datamining.


2013-09-30 - Guardian - NSA stores metadata of millions of web users for up to a year, secret files show
Summary: A year's worth of metadata is stored by the NSA for data mining, say documents. "The Marina metadata application tracks a user's browser experience, gathers contact information/content and develops summaries of target … This tool offers the ability to export the data in a variety of formats, as well as create various charts to assist in pattern-of-life development."

August 2013

2013-08-01 - Guardian - Exclusive: NSA pays £100m in secret funding for GCHQ
Summary: GCHQ funding secured from NSA at a time of cuts, partly for Mastering the Internet “Britain's surveillance laws and regulatory regime as a "selling point" for the Americans.”


2013-08-02 - Guardian - BT and Vodafone among telecoms companies passing details to GCHQ
Summary: “BT, Vodafone Cable, and the American firm Verizon Business – together with four other smaller providers – have given GCHQ secret unlimited access to their network of undersea cables.”, the physical basis for Tempora.


2013-08-09 - Guardian - NSA loophole allows warrantless search for US citizens' emails and phone calls
Summary: “previously undisclosed rule change allows NSA operatives to hunt for individual Americans' communications using their name or other identifying information” specifically “communications of Americans in direct contact with foreign targets can also be collected without a warrant”. Not clear if or when this started, as the document cites instructions from 2011 saying “analysts may NOT/NOT [not repeat not] implement any USP [US persons] queries until an effective oversight process has been developed by NSA and agreed to by DOJ/ODNI [Office of the Director of National Intelligence].”


2013-08-23 - Guardian - NSA paid millions to cover Prism compliance costs for tech companies
Summary: FISA court's ruling on lack of compliance with US privacy standards forces NSA to fund changes in operations for US Internet companies

July 2013

2013-07-07 - Guardian - The NSA's mass and indiscriminate spying on Brazilians
Summary: A report on the NSA tapping into the Brazilian telecommunications network and intercepting, collecting and storing the email and telephone records of Brazilians


2013-07-11 - Guardian - Microsoft handed the NSA access to encrypted messages
Summary: Secret files show scale of Silicon Valley co-operation on Prism; Outlook.com encryption unlocked even before official launch; Skype worked to enable Prism collection of video calls; Company says it is legally compelled to comply


2013-07-19 - Guardian - Secret court lets NSA extend its trawl of Verizon customers' phone records
Summary: Office of the Director of National Intelligence (ODNI) announces extension "in order to provide the public with a more thorough and balanced understanding of the program"


2013-07-19 - Guardian - XKeyscore: NSA tool collects 'nearly everything a user does on the internet'
Summary: "training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search"; XKeyscore "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites"

June 2013

2013-06-05 - Guardian - NSA collecting phone records of millions of Verizon customers daily
Summary: Verizon NSA phone record collection


2013-06-06 - Guardian - NSA Prism program taps in to user data of Apple, Google and others
Summary: NSA's PRISM tool's existence revealed


2013-06-07 - Guardian - UK gathering secret intelligence via covert NSA operation
Summary: PRISM usage in UK revealed


2013-06-07 - Guardian - Obama orders US to draw up overseas target list for cyber-attacks
Summary: Cyber attack targets from Presidential Policy Directive 20, October 2012


2013-06-11 - Guardian - Boundless Informant: the NSA's secret tool to track global surveillance data
Summary: Boundless Informant, showing international metadata collection “details and even maps by country the voluminous amount of information it collects from computer and telephone networks”


2013-06-11 - Guardian - Edward Snowden: the whistleblower behind the NSA surveillance revelations
Summary: Reveals identity of whistleblower Edward Snowden, “I have no intention of hiding who I am because I know I have done nothing wrong"


2013-06-16 - Guardian - GCHQ intercepted foreign politicians' communications at G20 summits
Summary: computers monitored and their phone calls intercepted on the instructions of their British government


2013-06-20 - Guardian - The top secret rules that allow NSA to use US data without a warrant
Summary: “judges have signed off on broad orders which allow the NSA to make use of information "inadvertently" collected from domestic US communications without a warrant.”


2013-06-21 - Guardian - GCHQ taps fibre-optic cables for secret access to world's communications
Summary: “scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation”; Tempora has run for 18 months and stores data for up to 30 days


2013-06-27 - Guardian - NSA collected US email records in bulk for more than two years under Obama
Summary: “Fisa court would approve a bulk collection order for internet metadata "every 90 days". A senior administration official confirmed the program, stating that it ended in 2011.” … “collection of these records began under the Bush administration's wide-ranging warrantless surveillance program, collectively known by the NSA codename Stellar Wind


2013-06-29 - Der Spiegel - NSA Spied on European Union Offices
Summary: “conducted online surveillance of European citizens, but also appears to have specifically targeted buildings housing European Union institutions” including bugging rooms and infiltrating the EU representation’s computer network at the UN.


2013-06-30 - Guardian - New NSA leaks show how US is bugging its European allies
Summary: document lists 38 embassies and missions, describing them as "targets" “ list of targets includes the EU missions and the French, Italian and Greek embassies, as well as a number of other American allies, including Japan, Mexico, South Korea, India and Turkey” Dropmire "implanted on the Cryptofax at the EU embassy, DC"

Political reactions

See also: Mass Surveillance 2013 Commentaries

March 2014

2014-03-04 - The Guardian - Edward Snowden's revelations made it clear: security oversight must be fit for the internet age
Summary: Deputy Prime Minister, Nick Clegg discusses the need to make surveillance legislation fit for the internet age. He says "It is not enough for the agencies to claim that they strike the correct balance between privacy and national security: they must be seen to do so." He also calls for a reform of the intelligence and security committees and to the Investigatory Powers Tribunal. He welcomes the investigation of the government's mass surveillance by the Royal United Services Institute.
2014-03-04 - GOV.uk - Security and privacy in the internet age
Summary: Nick Clegg makes speech at Royal United Services Institute think tank, where he discussed balancing privacy and security in the digital age. He said it was not a binary debate between a democracy and a surveillance state, but rather "a debate about the strength of our democracy and its interaction with parts of the state that are, by their nature, secret".
2014-03-07 - The Guardian - Digital bill of rights needed to safeguard online freedoms, says Lib Dem chief
Summary: President of Liberal Democracts, Tim Farron, calls for a Digital Bill of Rights at LibDem spring conference on 9th March 2014.
2014-04-12 - BBC - Sir Tim Berners-Lee: World wide web needs bill of rights
Summary: Tim Berner-Lee has made calls for an international charter to protect and enshrine the internet. He said "Unless we have an open, neutral internet we can rely on without worrying about what's happening at the back door, we can't have open government, good democracy, good healthcare, connected communities and diversity of culture (...) Our rights are being infringed more and more on every side, and the danger is that we get used to it".
2014-03-27 - The White House - Statement by the President on the Section 215 Bulk Metadata Program
Summary: President of the United States makes a statement on ending mass collection of American phone data. He has referred to Congressional leadership and the Judiciary and Intelligence Committees, to pass legislation that would discontinue the collection of metadata by the government. Since there will be no legislation available by March 28, he has looked to the Department of Justice for a reauthorisation of the programme.

October 2013

2013-10-08 - Guardian - MI5 chief: GCHQ surveillance plays vital role in fight against terrorism
Summary: New MI5 chief Sir Andrew Parker says: "In some quarters there seems to be a vague notion that we monitor everyone and all their communications, browsing at will through people's private lives for anything that looks interesting." Says this is nonsense, and “"We are facing an international threat and GCHQ provides many of the intelligence leads upon which we rely. It causes enormous damage to make public the reach and limits of GCHQ techniques. Such information hands the advantage to the terrorists. … It is the gift they need to evade us and strike at will. Unfashionable as it might seem, that is why we must keep secrets secret, and why not doing so causes such harm."
2013-10-09 - BBC - Guardian's Alan Rusbridger defends Snowden leaks
Summary: The Guardian's deputy editor, Alan Rusbridger, defends the publications by the Guardian
2013-10-10 - Guardian - Editors on the NSA files: 'What the Guardian is doing is important for democracy'
Summary: Editors of a number of international publications respond to attacks on the Guardian by the Daily Mail for endangering national security to defend their choice to publish
2013-10-10 - The Telegraph - Nick Clegg criticises Guardian Edward Snowden leaks
Summary: Nick Clegg says "technical information", from CIA whistleblower Edward Snowden, is of "immense interest" to "people who want to do us harm".
2013-10-11 - Guardian - Guardian was 'entirely correct' to publish NSA stories, says Vince Cable
Summary: Nick Clegg is to launch review of oversight of intelligence agencies, Vince Cable defends Guardian
2013-10-11 - Guardian - New York Times says UK tried to get it to hand over Snowden documents
Summary: New York Times Editor Jill Abramson says she was asked by UK officials to ‘hand over’ leaked documents.

September 2013

2013-09-16 - Guardian - Academics criticise NSA and GCHQ for weakening online encryption

Open Letter Open Letter From UK Security Researchers

Summary: 10 researchers warn that "by weakening all our security so that they can listen in to the communications of our enemies, [the agencies] also weaken our security against our potential enemies".
2013-09-19 - Guardian - UK information commissioner to examine Snowden disclosures impact
Summary: “Christopher Graham, has asked his expert advisers to investigate the impact of Edward Snowden's disclosures of the spy agencies' mass internet surveillance on the privacy of UK citizens.”

August 2013

2013-08-02 - Guardian - GCHQ accused of selling its services after revelations of funding by NSA
Summary: Shami Chakrabati says: “Once upon a time the rule of law was as great a British export as Beckham's right foot. Now it seems our most powerful security agency capitalises on weak legal privacy protections to sell its services to a foreign power.”
2013-08-18 - Guardian - Glenn Greenwald's partner detained at Heathrow airport for nine hours
Summary: “David Miranda, who lives with Glenn Greenwald, was returning from a trip to Berlin when he was stopped by officers at 8.05am and informed that he was to be questioned under schedule 7 of the Terrorism Act 2000.”
2013-08-20 - Guardian - NSA files: why the Guardian in London destroyed hard drives of leaked files
Summary: “The decision was taken after a threat of legal action by the government that could have stopped reporting on the extent of American and British government surveillance revealed by the documents.”

July 2013

2013-07-03 - Guardian - Angela Merkel: NSA snooping claims 'extremely serious'
Summary: Merkel says: "Using bugs to listen in on friends in our embassies and EU representations is not on. The cold war is over. There is no doubt whatsoever that the fight against terrorism is essential, and it needs to harness intelligence about what happens online, but nor is there any doubt that things have to be kept proportionate. That is what guides Germany in talks with our partners."
2013-07-04 - Guardian - European firms 'could quit US internet providers over NSA scandal'
Summary: Neelie Kroes says:"If businesses or governments think they might be spied on, they will have less reason to trust cloud, and it will be cloud providers who ultimately miss out. Why would you pay someone else to hold your commercial or other secrets if you suspect or know they are being shared against your wishes?"

June 2013

2013-06-05 - Guardian - NSA surveillance: anger mounts in Congress at 'spying on Americans'
Summary: Intelligence chiefs private meeting briefs Congress but “senior figures from both parties emerged from the meeting alarmed at the extent of a surveillance program that many claimed never to have heard of” prior to the revelations
2013-06-22 - Guardian - GCHQ monitoring described as a 'catastrophe' by German politicians
Summary: Reacting to the Tempora revelations, Sabine Leutheusser-Schnarrenberger, the German justice minister says. "If these accusations are correct, this would be a catastrophe … The accusations against Great Britain sound like a Hollywood nightmare. The European institutions should seek straight away to clarify the situation."

Links

References