Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
NSA locates cell phones even when they are turned off
by Staff Writers
Moscow (Voice of Russia) Jul 23, 2013


File image.

Never mind the non-stop collection of metadata and other sneaky surveillance tools being implemented by the NSA: a new report has revealed that the National Security Agency's spy powers allow the government to grab location data on just about anyone.

In an article published by the Washington Post over the weekend, journalist Dana Priest detailed how one of the most secretive agencies administered by the United States government has expanded drastically in the decade-plus since the terrorist attacks of September 11, 2001. An increased demand for intelligence encouraged the development and implementation of surveillance tactics previous confined to the pages of science fiction, she wrote, and those tools today rival even what has already been unearthed by the NSA's undercover operations.

"Lacking a strong informant network to provide details about al-Qaeda, US intelligence and the military turned to the NSA's technology to fill the void," Priest wrote.

According to Priest, policies enacted in a post-9/11 intelligence community involved a pivotal role played by the National Geospatial-Intelligence Agency, a Department of Defense office that was created to collect battlefield intelligence using the most sophisticated of means available. In the wake of 9/11, that involved being able to pinpoint the location of a suspected adversary using only a cell phone number, and agents with that kind of access quickly were on-demand outside of the walls of the NGIA and NSA.

In one incident reported by Priest, a Navy SEAL working within a makeshift Central Intelligence Agency operations center in one part of the US called up an agent in the basement of the NSA's base in Augusta, Georgia and insisted a team of geolocation specialists identify the exact location of an insurgent in Afghanistan using only the suspect's telephone number.

Once all parties were properly coordinated, Priest wrote "they aimed the NSA's many sensors toward individual targets while tactical units aimed their weaponry against them."

Priest went on to call that moment and others like it revolutionary with regards to what was to come for the NSA. The intelligence tools once used to track and spy on the leaders of competing countries and adversaries around the world had been deployed to target a single suspected terrorists 8,000 miles away using the resources utilized by an ever-expanding agency still only in its infancy.

Thanks to a bevy of whistleblowers who exposed the agency's use of domestic surveillance years before the name Edward Snowden was known, today it's common knowledge that the communications of American citizens can be inadvertently collected by the NSA. Leaked documents attributed to Snowden during the last several weeks have shined further light on how the Foreign Intelligence Surveillance Act, the PATRIOT Act and an array of tactics take conversations sent over telephone wires, fiber optic cables and Wi-Fi signals and send them to Uncle Sam.

In her article for the Post, though, Priest wrote that these tools are coupled with military agencies at times to create a quick and coordinated action that often ends in the execution of an alleged enemy.

"By September 2004, a new NSA technique enabled the agency to find cellphones even when they were turned off," Priest wrote. The tactic was called "The Find," and reportedly it gave the Joint Special Operations Command the tools to track down members of al-Qaeda and other extremist group and then order a hit. Combining it with another new system, the Real Time Regional Gateway, both intelligence and military officers could access any type of surveillance in a given region under which a target could be tracked.

"We Track 'Em, You Whack 'Em," was a motto that the Augusta, Georgia geolocation agents quickly adopted, Priest wrote.

But 12 years after the September 11 attack - and more than three since al-Qaeda leader Osama bin Laden was executed thanks to tactics employed by the NSA, CIA and others - these operations have not been scaled back. Instead, rather, the NSA has expanded around the globe and is currently in the midst of building what will be one of the largest intelligence facilities in America.

That structure, a million-square-foot data storage facility in Bluffdale, Utah, when all is said and done will collect domestic intelligence that one former NSA worker said isn't necessarily relevant to anything.

Bill Binney, a former NSA agent that resigned after 9/11 with more than three decades of experience under his belt, said the government is collecting data before even figuring out what to do with it.

"They would have plenty of space with five zettabytes to store at least something on the order of 100 years' worth of the worldwide communications, phones and emails and stuff like that," Binney told Wired last year, "and then have plenty of space left over to do any kind of parallel processing to try to break codes."

"It's everything - phones, emails, twitter, any kind of digital communications that they've had. I think it's into banking as well, but I don't know that for sure. I do believe they're doing it," he added to Libertas Institute in an interview last month.

"My estimate is that there's a little over 280 million Americans in the database, several times because one person can have a work phone, home phone, mobile phone, online banking, multiple email addresses. Two-hundred-and-eighty million people are in there at least, and the ones that aren't are babies in cribs, people in hospice, others not doing anything electronic. Each person is in there between several hundred and several thousand times. It's aggregated data over a now 12 year period."

Meanwhile, the NSA defends the construction of both foreign and domestic facilities, citing to Priest the need to stay one-step ahead of the adversary.

"The notion of constant, unchecked, or senseless growth is a myth," the NSA said in a statement to the Post.

Source: Voice of Russia

.


Related Links
NSA
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Cybercrime costs up to $500 bn: study
Washington, District Of Columbia (AFP) July 22, 2013
Cybercrime costs the global economy between $100 billion and $500 billion annually, according to a study released Monday which acknowledged more data is needed for precise estimates. The study by the security firm McAfee and the Center for Strategic and International Studies said the US economy loses some $100 billion to cyber crime and cyber espionage, including loss of key business data an ... read more


CYBER WARS
Early hardware delivery enables deployment of crucial missile defense radar

Israel deploys Iron Dome near Red Sea resort of Eilat

Missile plan to go ahead despite test failure: US

US missile defense test fails: Pentagon

CYBER WARS
Raytheon demonstrates high-definition, two-color Third Generation FLIR System

Raytheon, Chemring Group plan live missile firing for next phase of CENTURION development

Panama says suspected missile material found on N. Korea ship

Lockheed Martin Completes Captive Carry Tests with LRASM

CYBER WARS
First Upgraded MQ-8C Fire Scout Delivered to U.S. Navy

US drone strike kills two militants in Pakistan

Northrop Grumman, U.S. Navy Complete First Arrested Landing of a Tailless Unmanned Aircraft Aboard an Aircraft Carrier

US drone lands on carrier deck in historic flight

CYBER WARS
US Navy Poised to Launch Lockheed Martin-Built Secure Communications Satellite for Mobile Users

Northrop Grumman Moves New B-2 Satellite Communications Concept to the High Ground

Canada links up on secure U.S. military telecoms network

Lockheed Martin-Built MUOS Satellite Encapsulated In Launch Vehicle Payload Fairing

CYBER WARS
Novel Hollow-Core Optical Fiber to Enable High-Power Military Sensors

US jets drop unarmed bombs on Australia's Great Barrier Reef

Northrop Grumman Awarded Contract for LITENING Targeting System Sustainment

Raytheon's advanced uncooled thermal technology preferred by international land forces

CYBER WARS
Rheinmetall, MAN announce military deal in Australia

Israeli defense industry exports under scrutiny

EU to unveil plans to integrate defence industry

Britain exporting arms to rights violators: lawmakers

CYBER WARS
China's Li says 7% 'bottom line' for growth: report

Commentary: Flat broke superpower

Airport bomb exposes public anger at China abuse

India, China officials hold border talks after stand-off

CYBER WARS
Desktop printing at the nano level

New nanoscale imaging method finds application in plasmonics

York Nanocentre researchers image individual atoms in a living catalytic reaction

NASA Engineer Achieves Another Milestone in Emerging Nanotechnology




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement