These classified annexes to the Obama administration’s Cyberspace Policy Review were not published with the rest of the report in May 2009 and acknowledge that cyber defence initiatives have civil liberties implications: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.
This undated page from GCHQ’s GCWiki describes agents attending meetings of the Internet Engineering Task Force (IETF), primarily concerning emerging voice over IP technologies: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
This undated GCHQ document provides a classification guide for BULLRUN – NSA and GCHQ’s attempts to weaken or defeat cryptographic protocols – and specifies some of its achievements: see the ProPublica article Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security, 5 September 2013.
The World Wide Web Consortium (W3C) and the Internet Engineering Taskforce (IETF), two of the bodies responsible for developing and codifying internet standards, have announced a workshop in London aimed at combatting the “pervasive monitoring” revealed by Edward Snowden.
Pervasive monitoring targets protocol data that we also need for network manageability and security. This data is captured and correlated with other data. There is an open problem as to how to enhance protocols so as to maintain network manageability and security but still limit data capture and correlation.
The overall goal of the workshop is to steer IETF and W3C work so as to be able to improve or “strengthen” the Internet in the face of pervasive monitoring. A workshop report in the form of an IAB RFC will be produced after the event.
Further information is available on the workshop website.