Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
NSA locates cell phones even when they are turned off
by Staff Writers
Moscow (Voice of Russia) Jul 23, 2013


File image.

Never mind the non-stop collection of metadata and other sneaky surveillance tools being implemented by the NSA: a new report has revealed that the National Security Agency's spy powers allow the government to grab location data on just about anyone.

In an article published by the Washington Post over the weekend, journalist Dana Priest detailed how one of the most secretive agencies administered by the United States government has expanded drastically in the decade-plus since the terrorist attacks of September 11, 2001. An increased demand for intelligence encouraged the development and implementation of surveillance tactics previous confined to the pages of science fiction, she wrote, and those tools today rival even what has already been unearthed by the NSA's undercover operations.

"Lacking a strong informant network to provide details about al-Qaeda, US intelligence and the military turned to the NSA's technology to fill the void," Priest wrote.

According to Priest, policies enacted in a post-9/11 intelligence community involved a pivotal role played by the National Geospatial-Intelligence Agency, a Department of Defense office that was created to collect battlefield intelligence using the most sophisticated of means available. In the wake of 9/11, that involved being able to pinpoint the location of a suspected adversary using only a cell phone number, and agents with that kind of access quickly were on-demand outside of the walls of the NGIA and NSA.

In one incident reported by Priest, a Navy SEAL working within a makeshift Central Intelligence Agency operations center in one part of the US called up an agent in the basement of the NSA's base in Augusta, Georgia and insisted a team of geolocation specialists identify the exact location of an insurgent in Afghanistan using only the suspect's telephone number.

Once all parties were properly coordinated, Priest wrote "they aimed the NSA's many sensors toward individual targets while tactical units aimed their weaponry against them."

Priest went on to call that moment and others like it revolutionary with regards to what was to come for the NSA. The intelligence tools once used to track and spy on the leaders of competing countries and adversaries around the world had been deployed to target a single suspected terrorists 8,000 miles away using the resources utilized by an ever-expanding agency still only in its infancy.

Thanks to a bevy of whistleblowers who exposed the agency's use of domestic surveillance years before the name Edward Snowden was known, today it's common knowledge that the communications of American citizens can be inadvertently collected by the NSA. Leaked documents attributed to Snowden during the last several weeks have shined further light on how the Foreign Intelligence Surveillance Act, the PATRIOT Act and an array of tactics take conversations sent over telephone wires, fiber optic cables and Wi-Fi signals and send them to Uncle Sam.

In her article for the Post, though, Priest wrote that these tools are coupled with military agencies at times to create a quick and coordinated action that often ends in the execution of an alleged enemy.

"By September 2004, a new NSA technique enabled the agency to find cellphones even when they were turned off," Priest wrote. The tactic was called "The Find," and reportedly it gave the Joint Special Operations Command the tools to track down members of al-Qaeda and other extremist group and then order a hit. Combining it with another new system, the Real Time Regional Gateway, both intelligence and military officers could access any type of surveillance in a given region under which a target could be tracked.

"We Track 'Em, You Whack 'Em," was a motto that the Augusta, Georgia geolocation agents quickly adopted, Priest wrote.

But 12 years after the September 11 attack - and more than three since al-Qaeda leader Osama bin Laden was executed thanks to tactics employed by the NSA, CIA and others - these operations have not been scaled back. Instead, rather, the NSA has expanded around the globe and is currently in the midst of building what will be one of the largest intelligence facilities in America.

That structure, a million-square-foot data storage facility in Bluffdale, Utah, when all is said and done will collect domestic intelligence that one former NSA worker said isn't necessarily relevant to anything.

Bill Binney, a former NSA agent that resigned after 9/11 with more than three decades of experience under his belt, said the government is collecting data before even figuring out what to do with it.

"They would have plenty of space with five zettabytes to store at least something on the order of 100 years' worth of the worldwide communications, phones and emails and stuff like that," Binney told Wired last year, "and then have plenty of space left over to do any kind of parallel processing to try to break codes."

"It's everything - phones, emails, twitter, any kind of digital communications that they've had. I think it's into banking as well, but I don't know that for sure. I do believe they're doing it," he added to Libertas Institute in an interview last month.

"My estimate is that there's a little over 280 million Americans in the database, several times because one person can have a work phone, home phone, mobile phone, online banking, multiple email addresses. Two-hundred-and-eighty million people are in there at least, and the ones that aren't are babies in cribs, people in hospice, others not doing anything electronic. Each person is in there between several hundred and several thousand times. It's aggregated data over a now 12 year period."

Meanwhile, the NSA defends the construction of both foreign and domestic facilities, citing to Priest the need to stay one-step ahead of the adversary.

"The notion of constant, unchecked, or senseless growth is a myth," the NSA said in a statement to the Post.

Source: Voice of Russia

.


Related Links
NSA
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Cybercrime costs up to $500 bn: study
Washington, District Of Columbia (AFP) July 22, 2013
Cybercrime costs the global economy between $100 billion and $500 billion annually, according to a study released Monday which acknowledged more data is needed for precise estimates. The study by the security firm McAfee and the Center for Strategic and International Studies said the US economy loses some $100 billion to cyber crime and cyber espionage, including loss of key business data an ... read more


CYBER WARS
First-ever lunar south pole mission could be attempted by 2016

Engine recovered from Atlantic confirmed as Apollo 11 unit

Soviet Moon rover moved farther than thought

Scientist says Earth may once have been orbited by two moons

CYBER WARS
Ancient snowfall likely carved Martian valleys

Reports Detail Mars Rover Clues to Atmosphere's Past

MAVEN Spectrometer Opens Window to Red Planet's Past

Curiosity Mars Rover Passes Kilometer of Driving

CYBER WARS
Boeing CST-100 Spacecraft Model Passes Water-Recovery Tests

NASA announces funding for far-out space research

The Zero Gravity Coffee Cup

Outside View: Future science fiction

CYBER WARS
China launches three experimental satellites

Medical quarantine over for Shenzhou-10 astronauts

China's astronauts ready for longer missions

Chinese probe reaches record height in space travel

CYBER WARS
NASA launches new probe of spacesuit failure

Space Station ARISS Software Upgraded by Student For Students

Astronaut's helmet leak forces abrupt end to spacewalk

NASA puzzled as astronaut's helmet leak halts spacewalk

CYBER WARS
Both payloads for Arianespace's next Ariane 5 flight are now mated to the launcher

SpaceX Testing Complete at NASA Glenn's Renovated Facility

Alphasat stacks up

ESA Signs Off On Baseline Configuration Of Ariane 6

CYBER WARS
Snow falling around infant solar system

'Water-Trapped' Worlds

A snow line in an infant solar system: Astronomers take first images

In the Zone: The Search For Habitable Planets

CYBER WARS
Magnets make droplets dance

Delayed Shield game gadget to hit market on July 31

World's cheapest computer gets millions tinkering

Thyroid cancer risk for 2,000 Fukushima workers: TEPCO




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement