• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Electrical Engineering News and Products

Electronics Engineering Resources, Articles, Forums, Tear Down Videos and Technical Electronics How-To's

  • Products / Components
    • Analog ICs
    • Battery Power
    • Connectors
    • Microcontrollers
    • Power Electronics
    • Sensors
    • Test and Measurement
    • Wire / Cable
  • Applications
    • 5G
    • Automotive/Transportation
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Handbooks
    • EE Training Days
    • Tutorials
    • Learning Center
    • Tech Toolboxes
    • Webinars & Digital Events
  • Resources
    • White Papers
    • Educational Assets
    • Design Guide Library
    • Digital Issues
    • Engineering Diversity & Inclusion
    • LEAP Awards
    • Podcasts
    • DesignFast
  • Videos
    • EE Videos and Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Bill’s Blogs
  • Advertise
  • Subscribe

In Worldwide Surveillance Age, U.S. Has Big Edge

July 2, 2013 By RAPHAEL SATTER, Associated Press

The saga of Edward Snowden and the NSA makes one thing clear: The United States’ central role in developing the Internet and hosting its most powerful players has made it the global leader in the surveillance game.

Other countries, from dictatorships to democracies, are also avid snoopers, tapping into the high-capacity fiber optic cables to intercept Internet traffic, scooping their citizens’ data off domestic servers, and even launching cyberattacks to win access to foreign networks.

But experts in the field say that Silicon Valley has made America a surveillance superpower, allowing its spies access to massive mountains of data being collected by the world’s leading communications, social media, and online storage companies. That’s on top of the United States’ fiber optic infrastructure — responsible for just under a third of the world’s international Internet capacity, according to telecom research firm TeleGeography — which allows it to act as a global postmaster, complete with the ability to peek at a big chunk of the world’s messages in transit.

“The sheer power of the U.S. infrastructure is that quite often data would be routed though the U.S. even if it didn’t make geographical sense,” Joss Wright, a researcher with the Oxford Internet Institute, said in a telephone interview. “The current status quo is a huge benefit to the U.S.”

The status quo is particularly favorable to America because online spying drills into people’s private everyday lives in a way that other, more traditional forms of espionage can’t match. So countries like Italy, where a culture of rampant wiretapping means that authorities regularly eavesdrop on private conversations, can’t match the level of detail drawn from Internet searches or email traffic analysis.

“It’s as bad as reading your diary,” Wright said. Then he corrected himself: “It’s FAR WORSE than reading your diary. Because you don’t write everything in your diary.”

Although the details of how the NSA’s PRISM program draws its data from these firms remain shrouded in secrecy, documents leaked by spy agency systems analyst Edward Snowden to the Guardian and The Washington Post newspapers said its inside track with U.S. tech firms afforded “one of the most valuable, unique, and productive” avenues for intelligence-gathering. How much cooperation America’s Internet giants are giving the government in this inside track relationship is a key unanswered question.

Whatever the case, the pool of information in American hands is vast. Redmond, Washington-based Microsoft Corp.’s popular Internet Explorer accounts for between a quarter and half of all browsers, according to various estimates. Mountain View, California-based Google Inc. carries two-thirds of the world’s online search traffic, analysts say. Menlo Park, California-based Facebook Inc. has some 900 million users — a figure that accounts for a third of the world’s estimated 2.7 billion Internet-goers.

Electronic eavesdropping is, of course, far from an exclusively American pursuit. Many other nations pry further and with less oversight.

China and Russia have long hosted intrusive surveillance regimes. Russia’s “SORM,” the Russian-language acronym for System for Operational-Investigative Activities, allows government officials to directly access nearly every Internet service provider in the country. Initially set up to allow the FSB, the successor organization to the KGB, unfettered access to Russia’s Internet traffic, the scope of SORM has grown dramatically since Vladimir Putin took power in 2000 and now allows a wide range law enforcement agencies to monitor Russians’ messages.

In China, surveillance is “pervasive, extensive, but perhaps not as high-tech” as in the United States, said Andrew Lih, a professor of journalism at American University in Washington. He said major Internet players such as microblogging service Sina, chat service QQ, or Chinese search giant Baidu were required to have staff — perhaps as many as several hundred people — specially tasked with carrying out the state’s bidding, from surveillance to censorship.

What sets America apart is that it sits at the center of gravity for much of world’s social media, communications, and online storage.

Americans’ “position in the network, the range of services that they offer globally, the size of their infrastructure, and the amount of bandwidth means that the U.S. is in a very privileged position to surveil internationally,” said Wright. “That’s particularly true when you’re talking about cloud services such as Gmail” — which had 425 million active users as of last year.

Many are trying to beat America’s tech dominance by demanding that U.S. companies open local branches — something the Turkish government recently asked of San Francisco-based Twitter Inc., for example — or by banning them altogether. Santa Clara, California-based WhatsApp, for example, may soon be prohibited in Saudi Arabia.

Governments are also racing to capture traffic as it bounces back and forth from California, importing bulk surveillance devices, loosening spy laws, and installing centralized monitoring centers to offer officials a one-stop shop for intercepted data.

—Middle Eastern governments have installed Western-made surveillance technology to monitor domestic communications in bulk — sometimes with help the very same contractors which do work for the NSA.

—India’s government has begun deploying a centralized system which would route the nation’s Internet traffic through a single monitoring point — one of several countries working to give law enforcement a one-stop shop for intercepted data.

—Recently-passed Brazilian money laundering laws allow authorities to access Internet and communication data without a court order — a no-warrants-needed trend the report said was being repeated across the globe.

“Eventually, it won’t just be Big Brother,” said Richard J. Aldrich, the author of a book about Britain’s GCHQ eavesdropping agency. “There will be hundreds of little brothers.”

But the siblings have a lot of catching up to do if they want to match surveillance powers of the United States, and some have turned to cyberespionage to try to even the playing field. A high-profile attack on Gmail users in 2010, for example, was blamed on Chinese hackers, while suspicion for separate 2011 attack on various U.S. webmail services fell on Iran.

But even in the dark arts of cyberespionage, America seems to have mastered the field. The FBI has been targeting criminals with sophisticated surveillance software for years, while one U.S. general recently boasted of hacking his enemies in Afghanistan.

In his comments to the South China Morning Post, Snowden said Americans had broken into computer systems belonging to a prominent Chinese research university, a fiber optic cable company and Chinese telecoms providers.

“We hack everyone everywhere,” Snowden said.

U.S. officials haven’t exactly denied it.

“You’re commuting to where the information is stored and extracting the information from the adversaries’ network,” ex-NSA chief Michael Hayden told Bloomberg Businessweek earlier this year. “We are the best at doing it. Period.”

___

Paisley Dodds in London and Nicole Winfield in Rome contributed to this report.

You Might Also Like

Filed Under: Artificial intelligence

Primary Sidebar

EE Engineering Training Days

engineering

Featured Contributions

Five challenges for developing next-generation ADAS and autonomous vehicles

Robust design for Variable Frequency Drives and starters

Meeting demand for hidden wearables via Schottky rectifiers

GaN reliability milestones break through the silicon ceiling

From extreme to mainstream: how industrial connectors are evolving to meet today’s harsh demands

More Featured Contributions

EE Tech Toolbox

“ee
Tech Toolbox: 5G Technology
This Tech Toolbox covers the basics of 5G technology plus a story about how engineers designed and built a prototype DSL router mostly from old cellphone parts. Download this first 5G/wired/wireless communications Tech Toolbox to learn more!

EE Learning Center

EE Learning Center
“ee
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.
“bills
contribute

R&D World Podcasts

R&D 100 Episode 10
See More >

Sponsored Content

Advanced Embedded Systems Debug with Jitter and Real-Time Eye Analysis

Connectors Enabling the Evolution of AR/VR/MR Devices

Award-Winning Thermal Management for 5G Designs

Making Rugged and Reliable Connections

Omron’s systematic approach to a better PCB connector

Looking for an Excellent Resource on RF & Microwave Power Measurements? Read This eBook

More Sponsored Content >>

RSS Current EDABoard.com discussions

  • reverse polarity circuit protection between to power sources
  • Cascade Amplifier at High Frequency
  • Keysight ADS Oscillator using Negative Resistance method
  • Equipment to see if household should buy battery/solar/inverter?
  • How to simulate a microstrip gap with such a reference plane

RSS Current Electro-Tech-Online.com Discussions

  • Fun with AI and swordfish basic
  • Epson crystal oscillators
  • Simple LED Analog Clock Idea
  • Microinverters and storeage batteries?
  • PIC KIT 3 not able to program dsPIC
Search Millions of Parts from Thousands of Suppliers.

Search Now!
design fast globle

Footer

EE World Online

EE WORLD ONLINE NETWORK

  • 5G Technology World
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Engineer's Garage
  • EV Engineering
  • Microcontroller Tips
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

EE WORLD ONLINE

  • Subscribe to our newsletter
  • Teardown Videos
  • Advertise with us
  • Contact us
  • About Us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy