Fact-checked by Grok 2 weeks ago

LOVEINT

LOVEINT refers to the unauthorized use of (SIGINT) tools by employees of the (NSA) and other intelligence agencies to surveil romantic partners, spouses, ex-partners, or other personal acquaintances, often involving queries into phone records, emails, or intercepted communications. The term, patterned after standard intelligence suffixes like for , emerged from internal NSA audits revealing willful policy violations, with the agency publicly acknowledging in that such abuses, though described as "very rare," had occurred in at least a dozen substantiated instances over the prior decade. These cases typically involved analysts inputting personal contacts into vast databases on their first days of access or during relational disputes, prompting disciplinary actions ranging from reprimands to termination, alongside enhanced compliance training and automated safeguards to detect anomalous queries. While official tallies emphasize infrequency—one per year on average—the revelations highlighted inherent risks in concentrating authority, including opportunities for individual overreach despite procedural rules limiting domestic targeting, and fueled broader debates on oversight mechanisms for programs like Section 702 of the FISA Amendments Act.

Definition and Origins

Core Definition

LOVEINT denotes the unauthorized exploitation of intelligence surveillance capabilities by agency personnel to monitor the communications or activities of romantic partners, spouses, ex-partners, or other personal interests, constituting a willful violation of operational rules and safeguards. The term, derived from "love" combined with the intelligence suffix "INT" (as in for ), originated within the U.S. (NSA) to categorize such internal abuses, where employees accessed intercepted data like phone records, emails, or overseas communications without legitimate foreign intelligence justification. This practice emerged as a recognized risk in operations due to the expansive access granted to analysts handling global data streams, enabling personal cyber-stalking under the guise of routine queries. NSA officials confirmed in 2013 that LOVEINT incidents represented the majority of deliberate policy breaches, often involving overseas targets to circumvent stricter domestic restrictions, though such actions breached both agency protocols and broader legal frameworks like the .

Etymology and Historical Context

The term LOVEINT is an intelligence-community neologism denoting the unauthorized surveillance of romantic partners, spouses, or personal acquaintances using signals intelligence tools, coined by personnel at the U.S. (NSA). It derives from a portmanteau of "love" and the suffix "INT," shorthand for intelligence disciplines such as SIGINT (), reflecting the repurposing of professional surveillance assets for personal motives. Public awareness of LOVEINT emerged in August 2013, when reported on NSA internal audits revealing willful misuse of surveillance systems by analysts, prompting the agency's Office of the Inspector General to document such incidents as a distinct category of violation. These disclosures occurred amid broader scrutiny of NSA programs like , following leaks by , though LOVEINT specifically highlighted insider abuses rather than systemic policy flaws. The NSA characterized the practice as rare, with reports indicating roughly one confirmed case annually prior to 2013, often involving overseas communications intercepted under foreign intelligence authorities. Historically, LOVEINT exemplifies the risks of concentrated access to expansive infrastructure, a vulnerability amplified by expansions in U.S. intelligence capabilities under laws like the , which broadened collection of foreign-targeted data incidentally capturing domestic communications. While analogous personal misuses likely occurred in earlier eras of and electronic monitoring—such as during the Cold War-era NSA operations—documented cases trace primarily to the digital age, where bulk and content interception enable granular, low-effort queries on individuals. The term's adoption underscores an internal recognition within agencies that such temptations, driven by human factors like jealousy or curiosity, persist despite training and oversight, predating formal admissions but surfacing only through whistleblower-enabled transparency in the .

Enabling Surveillance Infrastructure

Relevant Intelligence Programs

Section 702 of the , as amended by the FISA Amendments Act of 2008, authorizes the (NSA) to target non-U.S. persons reasonably believed to be located abroad for foreign intelligence purposes, resulting in the collection of communications that may incidentally include U.S. persons' data. This framework encompasses multiple collection methods, including downstream acquisition from U.S. electronic communication service providers—previously codenamed —which obtains stored and real-time content such as s, chats, and videos directly from companies like and , and upstream collection, which intercepts communications transiting the via compelled cooperation with network operators. These programs generate vast repositories of queryable data, accessible by NSA analysts through interfaces that enable searches by selectors like email addresses or phone numbers, creating opportunities for unauthorized personal queries known as LOVEINT. NSA compliance reports and oversight reviews have documented instances where personnel conducted improper queries under Section 702 authorities for non-intelligence purposes, including spying on romantic partners, with such willful violations comprising a significant portion of intentional misconduct cases. Tools like , which allow analysts to sift through global internet activity without prior warrants for foreign targets, further facilitate such access by aggregating data from Section 702 and other sources into searchable databases. Although designed for and foreign , the scale of collection—billions of records annually—combined with minimal oversight for queries, has enabled at least a dozen confirmed LOVEINT incidents over a decade, as reported by the NSA's internal watchdog. The German Federal Intelligence Service (BND) operates analogous strategic programs under the Federal Constitutional Protection Act and G-10 Ordinance, permitting selective and strategic of international for foreign intelligence, including and content filtering. BND capabilities, enhanced through cooperation with the NSA—such as joint use of querying systems at —provide employees access to intercepted data streams, which have been abused for of spouses and partners, mirroring NSA patterns. These programs, involving filtering of for selectors, lack stringent domestic querying restrictions, contributing to documented cases of internal misuse without specific codenames equivalent to LOVEINT but involving similar unauthorized access.

Technical Mechanisms

NSA's signals intelligence (SIGINT) infrastructure facilitates LOVEINT by providing analysts with query access to bulk-collected communications data, where personal identifiers like phone numbers and email addresses serve as selectors to retrieve associated metadata and content. These selectors enable searches across databases storing intercepted emails, phone calls, and online activity, often without requiring prior supervisory approval for initial queries under certain authorities like Executive Order 12333. In documented abuses, employees inputted romantic partners' contact details into these systems to monitor communications, exploiting the low barriers to data retrieval designed for rapid foreign intelligence analysis. Key querying tools, such as , aggregate data from multiple collection streams and allow analysts to perform broad searches on virtually all online activities tied to a selector, including emails, chats, and browsing history. This system interfaces with upstream collection methods—like taps on international fiber-optic cables via programs such as FAIRVIEW—and downstream acquisitions from cooperating U.S. internet firms, amassing petabytes of raw SIGINT for storage in repositories like for content or for telephony metadata. Abuses arise from the insider access granted to cleared personnel, who can bypass tasking justifications to view incidentally collected domestic data or foreign targets with personal ties, as revealed in internal compliance audits spanning 2003–2013. While safeguards like auditing logs exist, the scale of data—billions of daily records—and the normalization of selector-based querying lower the threshold for willful violations, with at least 12 confirmed NSA cases involving unauthorized of spouses or partners via these mechanisms. Similar technical enablers apply to allied agencies like Germany's BND, which maintains comparable SIGINT query interfaces for satellite and cable intercepts, though specific LOVEINT incidents there involved manual database lookups rather than automated tools.

Documented Incidents

National Security Agency Cases

In August 2013, the publicly acknowledged instances of employees misusing surveillance tools under to monitor personal romantic interests, a practice internally termed "LOVEINT" by analysts. These admissions, reported amid broader disclosures of NSA activities, involved querying databases for emails, phone records, or other communications of spouses, ex-partners, or acquaintances, primarily targeting overseas signals but occasionally including U.S. persons. The agency described such willful violations as "very rare," emphasizing a zero-tolerance policy with disciplinary measures applied in each confirmed case. Agency Inspector General reports, disclosed in September 2013, detailed at least 12 substantiated cases of intentional misuse over the decade prior to 2013, averaging roughly one per year. These incidents often involved employees entering personal contacts' identifiers into signals intelligence systems out of curiosity or for unauthorized "practice," with some self-reported and others detected via internal audits. At least six cases were referred to the Department of Justice for potential prosecution, though no criminal charges resulted in the documented examples. Punishments varied, including termination, demotion, pay reductions, extra duties, and revocation of database access, with some employees resigning or retiring before formal action. Documented examples include a 2005 case where a newly hired NSA employee, on their first day of access to systems, queried six addresses belonging to an ex-girlfriend—a U.S. person—to "practice" using the tools; an detected the violation four days later, leading to a grade reduction, 45 days of restrictions and extra duty, a two-month pay cut, and a recommendation to revoke . Another incident from 1998 to 2003 involved an employee accessing numbers of nine foreign women met socially and two U.S. communications, resulting in upon discovery. A separate case saw an track a former spouse's activities, while a 2011 misuse targeted a boyfriend's number, prompting the employee's . NSA officials noted that most LOVEINT episodes constituted the bulk of willful misconduct but stressed robust oversight, including mandatory reporting and compliance training, to prevent recurrence.

German Federal Intelligence Service Cases

In 2007, a Bundesnachrichtendienst (BND) employee responsible for electronic communications in misused agency tools to intercept and monitor the traffic of a German citizen. The targeted the individual due to his extramarital affair with the employee's wife, constituting a personal misuse of official capabilities akin to LOVEINT practices. The incident prompted an immediate investigation by the , highlighting vulnerabilities in internal controls over access. BND officials expressed concern over the timing, as it coincided with legislative debates on expanding domestic powers, potentially fueling public skepticism about potential abuses. No further details on disciplinary outcomes or convictions were publicly disclosed, reflecting the classified nature of BND operations. This case remains one of the few documented instances of personal misuse within the BND, contrasting with more extensive admissions from agencies like the NSA.

Institutional Responses

Investigations and Admissions

In response to congressional inquiries prompted by Edward Snowden's 2013 disclosures and subsequent media reports, the National Security Agency's Office of the Inspector General (OIG) conducted internal audits and investigations into willful misuse of surveillance tools, including LOVEINT incidents. A September 11, 2013, letter from the NSA OIG to Senator detailed 12 substantiated cases of intentional violations of querying authority from 2003 to 2013, with the majority classified as LOVEINT involving unauthorized surveillance of spouses, girlfriends, boyfriends, or other personal contacts, often overseas foreign nationals. These admissions highlighted self-reported detections via automated auditing systems, though officials noted that such violations represented a small fraction of overall queries, averaging roughly one per year. Specific investigations revealed patterns of abuse shortly after access grants or during personal disputes. For instance, in 2005, an NSA employee's first-day access to SIGINT systems led to unauthorized queries on six email addresses associated with his ex-girlfriend, a U.S. person; an internal audit detected the violation within four days, resulting in disciplinary measures including a grade reduction, 45 days of restriction and extra duty, halved pay for two months, and a recommendation to deny security clearance renewal. Other probed cases included a five-year veteran querying nine foreign nationals' calls without purpose (resigned pre-discipline), a 2011 incident of eavesdropping on foreign numbers from social contexts (resignation), and attempts to access a girlfriend's metadata (referred to Justice Department, no prosecution). The OIG emphasized that two additional investigations remained open and one was under review as of September 2013, with most perpetrators resigning before full adjudication, underscoring gaps in enforcement despite policy prohibitions. For the German Federal Intelligence Service (BND), investigations into LOVEINT-like misuse have been less publicly detailed but include at least one admitted case of an officer querying a spouse's and computer records over two years during a foreign assignment, ruled illegal under German law. Internal BND probes, often triggered by access logs, have led to admissions of procedural violations, though outcomes prioritize administrative sanctions over criminal prosecution, reflecting broader European intelligence oversight frameworks that emphasize data protection compliance. No comprehensive tally akin to the NSA's has been publicly released, with details emerging sporadically via parliamentary inquiries rather than systematic OIG-style reporting.

Disciplinary and Policy Measures

In response to documented LOVEINT incidents, the (NSA) enforced disciplinary measures against implicated personnel, maintaining a policy of for willful misuse of authorities. Between 2003 and 2012, the agency substantiated 12 cases of intentional violations involving employees accessing on romantic partners, spouses, or ex-partners, averaging roughly one per year; each instance resulted in administrative sanctions, including termination of system access, formal reprimands, or revocation of security clearances. For example, in one 2005 case, a newly onboarded employee queried data on an ex-girlfriend within hours of gaining access, prompting an investigation that recommended denying future clearance eligibility. The NSA's Office of the Inspector General (OIG) conducted probes into these and related abuses, with ongoing reviews of potential SIGINT misuse reported as of September 2013. Agency protocols emphasized self-reporting and internal audits to detect violations, with most LOVEINT cases uncovered through voluntary disclosures or routine compliance checks rather than external complaints. Post-2013 disclosures, the NSA integrated LOVEINT prevention into broader programs, enhancing employee training on ethical boundaries and surveillance restrictions, though no wholesale policy overhauls specific to personal misuse were publicly detailed beyond existing accountability frameworks. These measures aligned with U.S. intelligence community standards under , which mandates safeguards against unauthorized domestic targeting but relies on agency-level enforcement for internal abuses. For the German Federal Intelligence Service (BND), public records of analogous surveillance abuses by personnel yielded limited details on disciplinary outcomes, with no confirmed LOVEINT-equivalent cases leading to specified sanctions; however, broader BND reforms following revelations included strengthened oversight by parliamentary committees and judicial reviews of practices, indirectly addressing potential internal misuse through stricter data access logging and compliance mandates. Absent declassified BND-specific admissions, such responses appear subsumed under general protocols rather than targeted LOVEINT policies.

Controversies and Implications

Privacy and Abuse Concerns

LOVEINT practices represent a profound breach of , as intelligence personnel exploit surveillance infrastructure designed for foreign gathering to monitor the intimate communications of romantic partners, spouses, or ex-partners without legal . In at least 12 substantiated cases over a 10-year period documented by the (NSA), employees willfully accessed emails, phone calls, and other data on personal love interests, violating internal rules that prohibit such domestic spying. These incidents, often self-reported, underscore the inherent risks of entrusting unmonitored access to tools capable of intercepting global communications, where a single operator's discretion can override protections against unwarranted intrusions into private lives. The abuses erode by normalizing the commodification of as a tool for gratification rather than security, potentially enabling , , or emotional without recourse for victims unaware of the violation. Critics, including oversight watchdogs, contend that while agencies claim "" and impose discipline—such as termination or reprimands—the opacity of classified operations likely conceals a higher incidence, as not all misuse requires and detection relies on internal audits prone to minimization. This dynamic amplifies power asymmetries, where cleared individuals wield capabilities far exceeding those available to , bypassing Fourth Amendment-like safeguards and fostering a culture of impunity. Beyond individual harm, LOVEINT exemplifies systemic vulnerabilities in oversight, where the vast scale of —intended for —creates temptations for into personal domains, desensitizing personnel to boundaries and risking broader societal distrust in efficacy. Although agencies assert such violations are "very rare" and respond with and revocations of access, the persistence of cases post-policy reinforcements suggests that technical and procedural barriers alone fail to deter human incentives, prompting calls for enhanced external audits and stricter penalties to align with democratic accountability.

National Security Trade-offs

The expansive surveillance authorities granted to intelligence agencies like the (NSA) to monitor foreign threats create inherent trade-offs, as the same tools enabling the detection of terrorist plots and state-sponsored also facilitate potential internal abuses such as LOVEINT. These capabilities, which involve querying petabyte-scale databases of intercepted communications, are justified by their role in preempting attacks—NSA programs have been credited with contributing to the disruption of over 50 terrorist activities since 2001, according to declassified assessments—yet they demand granting analysts broad, real-time access that tests human discipline. LOVEINT incidents, documented in at least 12 cases from to , primarily involved employees querying romantic interests' overseas phone numbers or emails, often on their first day of access or amid personal suspicions, without violating domestic targeting rules but breaching internal policies. Such willful , while rare—estimated at roughly one per year over a decade relative to thousands of personnel—highlights the risk that unchecked personal motives could escalate to operational leaks or selective data withholding, though no such compromises materialized in these instances. Mitigation relies on layered safeguards including screenings, where most LOVEINT cases were self-reported during clearance renewals, automated query audits, and disciplinary measures like termination, demotion, or Department of Justice referrals in at least six instances. These controls preserve by detecting abuses early but impose administrative overhead—such as enhanced training and investigations—that diverts analytic resources from threat prioritization, potentially delaying responses in time-sensitive scenarios like imminent attacks. compliance officers have emphasized a "zero tolerance" stance, distinguishing these petty violations from the far more numerous unintentional errors (nearly 3,000 annually in one reporting period), underscoring that operational necessities outweigh isolated human failings when contained effectively. Public exposure of LOVEINT, amplified by leaks, intensifies the trade-off by eroding trust and inviting legislative curbs, as seen in post-2013 reforms that ended certain bulk metadata programs under the of 2015, measures some officials argue reduced agility without proportionally curbing abuses. Civil liberties groups contend these incidents signal deeper safeguard lapses that justify requirements for U.S. person queries, potentially hampering foreign intelligence yields; however, empirical reviews, including those by the Privacy and Civil Liberties Oversight Board, have found limited evidence that restricting access meaningfully diminishes abuse rates while affirming the net security value of targeted SIGINT. Ultimately, LOVEINT illustrates that demands tolerating managed risks to sustain capabilities proven essential against existential threats, rather than dismantling them over exceptional .

Rarity and Systemic Safeguards

Documented cases of LOVEINT remain infrequent relative to the scale of operations. The (NSA) publicly acknowledged in 2013 that its internal investigations substantiated only 12 instances of willful misuse of tools for personal purposes, including spying on romantic partners, over a roughly 10-year period ending around that time—equating to approximately one case per year among an agency employing tens of thousands. At least eight of these involved targeting spouses, girlfriends, boyfriends, or similar personal contacts, often under pretexts like "curiosity" but violating explicit prohibitions on non-mission-related queries. No significant increase in reported LOVEINT incidents has been disclosed in subsequent years, despite expanded scrutiny following the 2013 leaks, suggesting sustained low incidence amid heightened oversight. Systemic safeguards within agencies like the NSA include mandatory training on legal and ethical boundaries, which emphasize that surveillance tools are restricted to foreign intelligence objectives under authorities such as Section 702 of the FISA Amendments Act. Query logs are maintained and subject to automated alerts, randomized audits by compliance officers, and reviews by the agency's , enabling detection of anomalous patterns such as repeated searches on personal identifiers. Violations trigger immediate investigations, with consequences ranging from administrative sanctions to termination and potential criminal referral to the Department of Justice; the NSA has described its stance as one of "" for such abuses. Post-2013 reforms further strengthened these measures, including enhanced internal reporting mechanisms and congressional mandates for semi-annual compliance reports to the Foreign Intelligence Surveillance Court, though critics argue that the classified nature of operations limits full transparency on efficacy. Similar protocols apply in other agencies, such as the German Federal Intelligence Service (BND), where documented LOVEINT cases—numbering in the single digits as of 2015 parliamentary inquiries—have prompted reinforced data access controls and inter-agency oversight committees to prevent unauthorized personal use. These layered deterrents, combining technological monitoring with punitive repercussions, appear effective in curbing widespread abuse, as evidenced by the paucity of substantiated incidents despite the incentives posed by accessible capabilities. However, the reliance on self-reported detections raises questions about undetected cases, particularly given historical underreporting in classified environments prior to public exposures.

References

  1. [1]
  2. [2]
    NSA staff used spy tools on spouses, ex-lovers: watchdog | Reuters
    Sep 27, 2013 · At least a dozen U.S. National Security Agency employees have been caught using secret government surveillance tools to spy on the emails or ...
  3. [3]
    LOVEINT: When NSA officers use their spying power on love interests
    Aug 24, 2013 · Some NSA agents were using the agency's spying powers to check in on love interests.Missing: definition | Show results with:definition
  4. [4]
    'Loveint': NSA employees eavesdropped on girlfriends, spouses
    Sep 26, 2013 · The NSA director said his agency has found "only 12 substantiated cases of willful violations over 10 years, essentially one per year."
  5. [5]
    NSA analysts 'wilfully violated' surveillance systems, agency admits
    Aug 24, 2013 · NSA acknowledges that one analyst used agency tools to track former spouse but insists it has 'zero tolerance' for abuses.Missing: examples | Show results with:examples
  6. [6]
    LOVEINT: On his first day of work, NSA employee spied on ex ...
    Sep 27, 2013 · In 2005, a National Security Agency employee was given his first day of access to the United States' SIGINT (signals intelligence) ...
  7. [7]
  8. [8]
    A Powerful Tool US Spies Misused to Stalk Women Faces ... - WIRED
    Oct 24, 2023 · Though often viewed as the “crown jewel” of the US intelligence community, fresh reports of abuse by NSA employees and chaos in the US ...
  9. [9]
    10 Reasons You Should Still Worry About NSA Surveillance
    Mar 16, 2017 · ... agents using databases of private information to spy on their lovers or spouses. This problem is common enough that agencies call it “LOVEINT ...
  10. [10]
    The NSA reveals how many analysts abused its database to spy on ...
    Sep 26, 2013 · Reports in August gave the world a new word in the intelligence lexicon: LOVEINT, the act of illicitly looking up a significant other with ...
  11. [11]
    LOVEINT: Abusing NSA surveillance power in the name of 'love'
    Aug 25, 2013 · Some NSA officers have tapped into the agency's massive surveillance capabilities to spy on “love interests,” according to The Wall Street Journal.Missing: definition | Show results with:definition
  12. [12]
    Foreign Intelligence Surveillance Act / FISA Section 702 - INTEL.gov
    Section 702 authorizes targeted intelligence collection of specific types of foreign intelligence information—such as information concerning international ...
  13. [13]
    Upstream vs. PRISM - Electronic Frontier Foundation
    Upstream surveillance involves collecting communications as they travel over the Internet backbone, and downstream surveillance (formerly PRISM) involves ...Missing: LOVEINT | Show results with:LOVEINT
  14. [14]
    Reining In Warrantless Wiretapping of Americans
    Mar 16, 2017 · Section 702, passed in 2008 as part of the FISA Amendments Act ... This problem is common enough that agencies call it LOVEINT, a ...
  15. [15]
    How the NSA Spying Programs Have Changed Since Snowden - PBS
    Feb 9, 2015 · The abuse happened so often it was nicknamed LOVEINT, after the intelligence community's practice of assigning nicknames to their intelligence ...
  16. [16]
    XKeyscore: NSA tool collects 'nearly everything a user does on the ...
    Jul 31, 2013 · A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and ...Missing: LOVEINT | Show results with:LOVEINT
  17. [17]
    NSA: Some used spying power to snoop on lovers | CNN Politics
    Sep 27, 2013 · The NSA's internal watchdog detailed a dozen instances in the past decade in which its employees intentionally misused the agency's ...
  18. [18]
    BND: Homepage
    The Bundesnachrichtendienst is the foreign intelligence service of the Federal Republic of Germany, compiling political, economic and military foreign ...Missing: LOVEINT | Show results with:LOVEINT
  19. [19]
    LOVEINT: Cyber-Stalking by Spies - Grey Dynamics
    A term coined by NSA staff refers to the practice of using access to surveillance technology to gather information on partners or love interests.
  20. [20]
    Worldwide mass surveillance by Germany's intelligence service ...
    May 19, 2020 · Germany's Federal Constitutional Court has put an end to the groundless mass surveillance of global internet traffic by Germany's foreign intelligence service.Missing: programs LOVEINT
  21. [21]
    'LoveINT': Given Immense Powers, NSA Employees Super Cyber ...
    Sep 27, 2013 · NSA employees broke NSA rules to enter phone numbers or email addresses associated with their romantic interests, in one case an ex, into vast databases.
  22. [22]
    Signals Intelligence (SIGINT) Overview - National Security Agency
    NSA collects SIGINT from various sources, including foreign communications, radar and other electronic systems. This information is frequently in foreign ...
  23. [23]
    20070831 BND Mitarbeiter spioniert privat
    Aug 31, 2007 · Er soll während seines Dienstes den Email-Verkehr eines Deutschen ausgespäht haben, weil dieser ein Verhältnis mit seiner Frau hatte. Die ...
  24. [24]
  25. [25]
    50 Ways to Monitor Your Lover Online - LOVEINT - ClearanceJobs
    Jan 16, 2018 · LOVEINT - the art of using national intelligence capabilities to monitor the activities of one's love interest happens far too often.Missing: programs | Show results with:programs
  26. [26]
    [PDF] Grassley Letter - National Security Agency
    Sep 20, 2013 · The NSA Office of the Inspector General (OIG) currently has two open investigations into alleged misuse of SIG INT and is reviewing one ...
  27. [27]
    The State of Insider Threat Initiatives 10 Years After Snowden
    Apr 17, 2023 · New efforts arose to assess the risk of insider threats and implement policies and procedures for responding to them.<|control11|><|separator|>
  28. [28]
    Judgment of 19 May 2020 - Bundesverfassungsgericht
    May 19, 2020 · Since § 6(4) BNDG (where applicable in conjunction with § 14(2) BNDG) does not permit surveillance measures targeting German citizens and ...
  29. [29]
    Most NSA Abuses Are Self-Reported - Business Insider
    Aug 27, 2013 · Last week Siobhan Gorman of The Wall Street Journal reported that National Security Agency analysts have occasionally used vast surveillance ...Missing: investigations | Show results with:investigations
  30. [30]