Page 88«..1020..87888990..100110..»

Category Archives: NSA

Russian Cybercriminals Are Loving Those Leaked NSA Windows Weapons – Forbes

Posted: April 28, 2017 at 2:48 pm


Forbes
Russian Cybercriminals Are Loving Those Leaked NSA Windows Weapons
Forbes
It's been little over a week and a half since a hacker crew called the Shadow Brokers released a batch of tools believed to have belonged to the NSA, designed to break through the defences of Windows systems. Whilst Microsoft mysteriously patched its ...
Leaked NSA tools, now infecting over 200000 machines, will be weaponized for yearsCyberScoop
How leaked NSA spy tools created a hacking free-for-allCNNMoney
NSA backdoor detected on >55000 Windows boxes can now be remotely removedArs Technica
TechTarget -LifeZette -TrendinTech -TechNet Blogs - Microsoft
all 63 news articles »

Read the original post:
Russian Cybercriminals Are Loving Those Leaked NSA Windows Weapons - Forbes

Posted in NSA | Comments Off on Russian Cybercriminals Are Loving Those Leaked NSA Windows Weapons – Forbes

Appeals to NSA college expansion could be coming – Moscow-Pullman Daily News

Posted: at 2:48 pm

While the Moscow Board of Adjustment approved New Saint Andrews College's conditional use permit application to allow the college to expand into the former Cadillac Jack's building on North Main Street, an appeal to the board's decision could be imminent.

Moscow's assistant community development director, Mike Ray, said his office has already fielded a number of calls and emails asking about the appeal process, and he anticipates an appeal will be made. The appeal period, which starts Tuesday, will last 10 days, meaning any objections must be filed by May 11.

Ray said the Board of Adjustment will meet at 5:30 p.m. Monday in the council chambers at City Hall to approve a relevant criteria and standards document, which will reflect the board's Tuesday decision, and finalize the conditional use permit's approval. Afterward, appeals can be filed by anyone.

To appeal, the appellant is required to submit a letter to the city stating his or her reasons for the appeal and to pay a $220 appeal fee, Ray said.

The City Council would then address the appeal. No new public testimony would be allowed at that time except for comments from the appellant, Ray said. The councilors would also refer to Tuesday night's Board of Adjustment meeting for information. Ray said the City Council would be allowed to sustain the Board of Adjustment's decision, reverse the board's decision or remand the decision back to the Board of Adjustment.

The CUP would allow NSA to convert the former CJ's building at 112 N. Main St. into a music conservatory. It would be allowed a maximum enrollment of 300 full-time equivalent students and 44 full-time equivalent faculty and staff. The facility would include five classrooms/studios, nine offices, a multi-purpose room, a student lounge and a music conservatory with seating for 680 occupants, according to the Board of Adjustment packet for Tuesday night's meeting.

NSA President Benjamin Merkle said 165 students are enrolled at the college's existing campus on Main Street.

The board approved the conditional use permit with two conditions related to parking that city staff recommended. NSA must provide 47 off-street parking spaces within approximately half of a mile of the property, subject to the approval of the zoning administrator.

NSA will be allowed to phase in the off-street parking requirement by providing 50 percent of the required parking mitigation upon occupancy of the building and the remainder when NSA's enrollment reaches 150 students, or five years from the date of the issuance of the Certificate of Occupancy of the building, whichever comes first.

Moscow Mayor Bill Lambert said he is fine with the private Christian college expanding downtown and he is happy someone plans to use the former CJ's building again. He said the proposed expansion is an emotional issue on both sides.

"It's a good use of the building as far as I'm concerned," Lambert said.

He said parking seemed to be the biggest concern and the Board of Adjustment appeared to address that with its conditions.

"I think they've been good for downtown businesses ... for restaurants and places like that," Lambert said of NSA students.

Some residents said Tuesday night that they believed colleges belong outside the Central Business Zoning District, but Lambert said he does not have a problem with allowing educational institutions downtown. He said NSA is a small school, unlike the University of Idaho.

City Councilman John Weber said his only conflict with the proposed expansion is that the former CJ's building might not be subject to property taxes. He said he would prefer to see a business that would be required to pay property taxes to occupy the building.

"Every year we're fighting the budget as all towns do and I would like to see more commercial development that pays property taxes and things like that," Weber said. "So it can be beneficial to the town as far as infrastructure and things like that."

Alyssa Hartford, Latah County senior residential appraiser, said NSA owns two buildings downtown. One of them, which fronts Friendship Square at 109 W. Fourth St., is partially exempt from property taxes since a portion of the building includes a restaurant. The other building at 409 S. Main St. is fully exempt from property taxes because it is used for educational purposes, Hartford said.

She said if NSA expanded to North Main Street, it would possibly qualify for a property tax exemption. The school could file as a property used for school or educational purposes and submit its application to the Board of County Commissioners, which would make a decision.

Excerpt from:
Appeals to NSA college expansion could be coming - Moscow-Pullman Daily News

Posted in NSA | Comments Off on Appeals to NSA college expansion could be coming – Moscow-Pullman Daily News

The NSA Is Building the Countrys Biggest Spy Center (Watch …

Posted: April 27, 2017 at 1:45 am

vF7wI%j%,DJjDJfu<}&I]U(pqVL@Ua=?_z|{y}{!{Jf^tK-T{Sx_nth5a4}~2%cRO8"U{AYn}2LU3rwf?M>]kzzQqU4]y2_ 2EAUA.2_NuziUA"E"%Ss-sO[{zlJDan1 Tgy=P@3>a !r2>XZ;<*Md Wo>ye5G%e3'q9iTx=LT8eYc?.TzluvZ'fcJ>:f_RM8qY>hJ$8[a>tyd7{?moyV L}W!3x/zG?O6B4~ujlb{o@I{M#}c" wT2]9 ^: 3 ~e8J.TzmT B EX0% ^?P^=a18=PQ~uy_U?xI@V6oQ }_&1|XkiblQ)0BgMw[OiNJc' t'a^l@ ;?p^sV{^^`zCi',s7{yrL*88*X_|~=nyH[h=:=q==_38?+/D/G9Q$!`(nAgVNxf_JRTr{qk;hJO

<"f6$j(0E'$(NUM4 /*V5lx[g]}xCew}wT;&u#wOT0P0M-wE.A.Cka}_0|R[f]HN-Oj0?5S!Mrj[#*kV?]% qwfw0nPPadgJ}@ W?Ks&2v5w8; 2Q>'Icop:$CLAN t!q(L@ KGP$$# )#2U1K3'p1II&@7< #uLKwKl6Vx9PyN0,Tq<;4?qh7[.Z|IkePV 16?;wD/1UBIoxsvTyP 32SBmw2e>[NDX#y>;=3T`/|hKOcM/7a?sbEk>N7 R t'dCX|e.~0(fUUN.~jy68YhB9`!v,e9]Ia'q(MIhi]B%qQpmF .A{ : z>pWs=Mkl&lA# * Q+eK]R.o.h ";oY'&^;8VG&rm)_|bNJ5,f}e k+K2ScdxkzV%5b~:{'mLA, pD>B.Mog=Gyx@TF7LAi5?? x1G.jnxllVlLtz9)o3} 4e8W,~TO-4~|{Z OHG1`OUq(!EYnlnnYG&a& p9=|%BynppVb_oFK%&= j)Xjg;+kF2QUK`:+yIX 9_$8+tn5G8&P2j<{kV?b@i]hzvi)C(@AlQD*RG)'z7Ds*w&ahi1z&w8U>T2$=dwc$$xYJ>0C/8s8`vL'}i6w4,m6`-Eg+c!hge38rjNW1'[Gx&ZaXm;BDF0.4:SqQz A]>b!BeC6r@NPAn 8#%zlzuW(QJ$,T]5G ~0*pBd# s{9E)@>cBQMz4Nzis4?rb[Q fspO4)EoD cfr6:XFuUl t{J[n9Y7`Saao`aAJFXl(CY{e,MSY4}=&h6k&xU-Fj USAX="336$7G(&K:l{Cd9}cKD`Hq4Npak~5%+8tfM>>|GN^~6;gu 9?9AkK(&qYh,~{Lbi-MQYd"ZBr$,$@x'>, U|82i=_?1\a/czak@ly<0)[gFiUN&KD{4fG#]m)^zo[X]i.B@l=Yrnx?ERR6`z@E_DE>> WfNI9PL'>RZng)/Gt9[dG9G 8{Slrs1(9GEK5mxLdTX|X&yFlXf(lO1nNc,wlX2LMA2!wL0j ,NCvlK.`!:6LrouO+M$;UI{qkjq>G{wi>dlnD%n9pU(lTK#Ag+0nGUo5]qKocOKaf4AuW.:VEW^TblWZx:>RnV6:)_c|c(lCm'%W]z2=~*;.Fk*=UC[YDB+% &:IYRMb6lhM8S!1a?I'aGpq#nHYkng}a?OzVo ={27H0U<0'IU)ZfCB;P`9>gZ3}M+lwE2{PHiB?}Y|$KS#e#!2{9I2>r`tuwh2s>U 0P#lt=&~s"=.0I/1S<.)ZO-g[8>MMH [C?q&OcbjxM|)&|`tyVT?uV 9UiBdycBUESDJ?@;$nnzSv?dK6'CD70"?,)C

yE5=zn6hCL&~b{bK&7LdU'ff% )->NMW[{X>Z9G m 0wq8UI43y>}t`Y%yo2y{ft,dc6(?`#E)ybBzUT D>!=jFuL1$}$$H)Tvv?9"byhESg@drk)<*?gJw$&?Wj(SMx.e,@j{sM `[U.iHbZ-?%AD'LcmFHqHged7iB*i~,6$*lK'"'%^@ |BP:0M9nG#H D'}Yi,BA&iHIL2%KcPpmBu$!Mx+ Fp8/OTp0 gG'P>IDH%1Q7F< B%q;W9+:F2)"F $8} :$>]Ph#3c(~0 cb)r'asMDF1'~L,"$Xz'7x@lE)pVBvgN4ezAzj&3}HB0brFhDh,13cAPzMsa"PdObJU}IUEid9JX?=!%"74 Xz#9f9bQoJ1BfO:LH+H0JOC$:}tY$C[6Cd14 z$~Hi!tH>A=CFv /e*vXK<8lD9!/&S9c`cK//cUj~w">BN !hSLg# HK{4$gF89rbX@Zs@/FEoL-czkQ"|(JSxKx^ff6P-}"y,HKfkOID#ls/7#8r,>8B-8qBcp4 iY3"?>/389dpk&)jQq2`+QZ{{g5Kt_O 9V!73Q}ZY*.*&;p8U 6vEV[d=W-$LB3{ppn|^SaHL4+F^;fh(sd4f1`v|k98)wPRlEa3KDYXv^I/IJcVi_4W/QEuW1}2{yeen*PX r%1cGpS~45QpsWU5 ;`s }r $Mz9 V*"*wBt'D=IaWqim*P5t@F9[O ykCz~ADL'z5JH[%Lr4i H$}p:7G9Q_CHzf!QT027R)P89M:NaYp%8s&'>i+;xUUs(1{*aKVnLdDO@{Sdt08 IFS'dg'An 1tj,}-$tF4#B-XW3.XsI12(Se%3fCi0,f`PXR"uv!:t)c:u-@y< j%50>;G eH@$F*Xb"3aM@DX%|6XJ ccJ iqa=1F:/X>ScGX|#c D2 AD+"a(D!~ vfNQ(lV0 tCc5b>S1)/W&"7'iXGflpr( :{I`SeP!7!6Ajl0+&H<{o-5UpRaKiz1'q7S,$HdNb66dlRHLW;>S!F Q[G!a|t.D@=&h[G$9Py^PH@GGcKrDa`F-q$oK8%:h 1"/ Cf$CA_p ?N[6"XGs 9q>JK[ISGF:96 +'-X,A|Dx[5ZJ1i9P>bthm fnK#l`; HI.]XX:e$lux H1 #as=#{qhpb cf?u4'|6kmh=N'$BN{2rL~"q}`&Rd9D.pq};e@01#9Q,Q$? ;z^y8b ,l13rQJOAO &HfE0sgflv=I{#@!KIOLYWAP,sRY+]K$SsOH5Gt -*Rq~?VG{DgZI D0ccF04Qb0Y$YL9D]aHK9Y>xt+_@0Pp ~6Vw9of-1, ,.3_6As%8o<:7i8Jm^?GJ boM&h!kH ,..h _#zrco8V{GFt6+%>0LY YY';hj:>Dbx6+QS8_gC/HCb"yQPp#Xy~+xSdtBbmli$p$$L#ZN0P~Eqk@Q&_g82rC x)DZY )ll2,7|(g| b"yggI#:HFktDghtyUe#4j1._dTJc:)-Cm_0(S f=ja-jDXqY'D9O^>=}4NvaK4HM!-Z"4@`+=Iamc6WjFU=9%hD z(b(qu#fBr(k^rE6b uK'V9v$:rL/ydL3!BhiJa /PvuVt9T:FOPfe2Ge{q9 JO4 c'&,E:X$,"qYM{h,;d9+hdr,k.`*"XSi.V e$&N}lhJ+Om"?(>*k`|u7qNIVVkU$BITf((~I7Ti".h9w EGa'QB@L>/3kC>X%rF&MGX0RQS#~wk;H$_T!!TlgN>hWwhc$!B`~iU8GzyM 's)5I9Q5LQH)|em{O`s@:(:^pJ E] $A>&R>[HsJ<_:JI@B|Em| >9>+qQ mG+9+w{fk&%'Sb^Kz'0$?T__ ^+So;]Gct%9AsR ]fF+% _ZdpJEi Bk{iB4uUY%^PjJSK0IkA,ZN"XMO(Sq 2tfj(Jkkw7S<#qv:JWI&$%b M*DENlvIT5% Q%}].'p{j]Kz.=_*pa,&{L3)_P^LzFlb6XZ$!)L.$q,&gA3 {K '3mfX9kT k)NR)s[qd+d6S] E.mb4FN|.W:F+o:n$2Z;k.5R:tL,w6d@ AbikAxw"* $5.cqC6 ~sHNfH8L60I(0kZSEO8[`1r b8/i!5sC= 1#IN+ 5WE}^wv.v%$o9+}arBSlYZrFb6)cY>3l>Nl@f%Dis#Hb`%FYj9%G*,*"`I|^ HpS,)u+b s r1c!q*?l]1FN0BQQ]>h2?%)$p=RHD.dHr<.'I|3{zM)SvEOSkRq %PbTfk n#s%LVI9@8}xKSDN+t!tMsQs)l#1gkMA|C?iS"#DiBq9n4X CK7%)27q>;jKx 9;+]wzEq_:sEuJ!6vsc4~Zn >ltecuiU^Eyy7Q<8lqAnd1:m t=8* /=wZ:81][I1QfKc9}jrm-'n?')d%sFWg .6tUf %Mu(a:Z(}S!MfM;IRK"4~q${OPi!}UFbzL+YN9*Y`s,Lqqz6q-',$glDTF4`?I:l9?ZARb/vpX - =(TVRpH\xP/YYmRG .%Ij]"q(^R0F U3>ZPmXq`@8:g Tg8-IMXY/r gr%UyEwI/ KP43M-i^U -2li6BCA<}ud%@bhc1(E8""O2Nrx) RfR=z:a_HNj7Ut@)c1wiQzu( +Lmr_$aAz&fLp)K78LMo]JCwDb_~/klTxZs- d3`CxUQ "n UXc>Z85&a9'Rsnd=V 0NW&jrT MZv@RO D1YtA!b%WjcWJs4q>INCD))Sq*ZmOJ )E=&'u}:zR=CG b6KBrhS "QPxgVA3FjIUI}!fbdnA ^w[ 7 qa KFaPk43[an&&4'I7.(h,V:3vqmpcxkJ NK$TI )/3#7R4W =7$JY1D: 5Zjg,uIWtS{moFnuHn0'}V;I>_3^VH<9-U!y29xfa2VE r*8vK^(AD:GGv9K:*Wz U 4]`-6T:S B;hMqllt jt kG;._g)|ujP;b)<>q cs)V31bw/C Rp f0S]tC!W<8<5$= AHd0u;hF8.UNF6|hFOG+sS avg12Q4&c j4eJ K&*),nIfXu-&qB63BD,Q^QDikW3v'|HbD:]"S..(No04 E%#1 bL):r K{a"-]&#U/9>45W]S! 3FB- kwcG{UCjox5pXT$`6mnKYBp#[-^#yy Hz? [T`}XH% %!P (T"i=7>T/,IKngX cAPI}xT}]i]RU+vcdy46UY"*b1*fKfzYHzuN.#m0PT+PLk?QFmUYTHi^~=y7M|mrY )fnu^GP rqx)!8U2 Jf-taTLX@NRD6:/Gu>p!%&v2p9bV;$X^(?2U7l6t$gF,g `Id*<@qR1g/8uK#js~'q8R^b&s"3HI6&l*&UXx4JSl)YR"HsWW6V&J/kjdRRv^nbHOOu)`JA }4c=s*2{,f3d>97>dcR#;tK};VKBs3P$&2Svsi' JfLqO]L^eu0i4SVjRV% Cu"/wu1V.%,lLl9o c;2GHj4uOpWivX [M7W}CFZ"PuO8b IF.0p+KxM`zP]X#StK$Ue*C_1*"LH#Qn$H3|12vEHT(m`|qJs(:VTep1WY&yn>'eEJ6p 'J,;] "K-e&QRTb] 5:+^b1iVZ*l|l 86]<1}-WJ1iqJE3;Vjx/DF(* Zixm+g$b17>RSxTvLK;EQ pBUf+1v9)% ncG&4_ZujI0 =`b*E)m}T:a:)R'&x B:AJ3dBr1*%%N>/#sZP?N3<(3&bpmG9*$(l9% Y-w3%a~9~CTL)gi &e(`*pZ6Yv]`8 mr W W.H9+v;#hJf!cU76+]c{PDlme&BO4vVbiI'JA4A!$?0hHnrt8aKGm|P'o.8{s`K9T_6[c#qs[nPAin.T4I 7e]&la9+D~sm3 z#qQx^1aKPILvu=Hmwt-8M}.Y-zl,M%"}_r2ib>]i,>b- eq)8pu=iyGtnQXH|5`/)9w0Dtn"Io/P&)rm{(1r-I` vtVFutk1Mo77s4>BmwD[ t;-bTc&_; xj#Gi;;cX}TjdYDI}0I krgrj].hJNUu"]kox $(Ee]7eumR^}oQ"n2(1gmkT*sBsJD*j@URH7V2&o]#U0&o;!3?>UgL^AEmOk|)59ZBybGCSNG'lU[:he%nyZw&(l]s3&[dfsB9SfF.64#H37K{hq"#PR-8!2k^y;d"]mR$e:)t[uJ6;ZLB1d9?N;gIv+tX4i#>*a`6ZGA9hK2[{[-qjF&HVs)<%3yq(8gw7#6sjRt/h^b1a!x)& Sy-P$mU$g$Nr+"{|~q l(%hl'jtw@7ax<'6Llp- 0aIJ%/v_!27(s^J&O/}09|yEt;3IfG.AF=va(gIm:!YsmbqF$d`|G-|COB$&=t(]1C=Xe+`wS/_E<-]tf%Jux=! f_pm2C%]3{ >8$#/Wo}8|BEXD}n3c}t':_G9cs}~W4Oa|+G|H8]PUHjId +bTqZI-$,yE9 L{CW"m0ikX$5cFiuZMOf!!h|,#2# z!i_qG$478W2t=UF^/Ua}OfC;B#C]COh_tRDAt/b%tcItR8C"XdGoAO(-LbEI?O'}>l{A]eAVf)j3,?Y(,";:Y9BRkUwl")~CY}i5L&SSmc5ny%Rj)pFC0>]f#Zf)1z(-:H.,k(|=!pQfcM4 Ua iq m~ZS~'{|l)4*!e@_&UC0Qq:[t!=R;Nv-onB<{=z/Tkz "bn3A7d?>%//7:[ 2b;?4[?4ZM]Bf- Id TpF`,GA_EBA2ysBuZc knfsk>m6'^%lvt??un~hG=g>ILSb2/>M2#:}Rcc3QUMlF-du761F1dH$a;=[:kF*:[RyR)3k8BS}zdEpo@{B(4 Q1'1C;~IVfF{g!(,-z4(3vJKHOQmuW?XyoJ)rIN:?NT#xGfktfN}xVI[OHcV

See the original post here:
The NSA Is Building the Countrys Biggest Spy Center (Watch ...

Posted in NSA | Comments Off on The NSA Is Building the Countrys Biggest Spy Center (Watch …

NSA blimp spied on US citizens – TRUNEWS

Posted: at 1:45 am

April 26, 2017

An NSA spying blimp known as the Hover Hammer was seen by several residents of Maryland, according to The Intercept.

To residents of Maryland, catching an occasional glimpse of a huge white blimp floating in the sky is not unusual. For more than a decade, the military has used the state as a proving ground for new airships destined for Afghanistan or Iraq. But less known is that the test flights have sometimes served a more secretive purpose involving National Security Agency surveillance.

Back in 2004, a division of the NSA called the National Tactical Integration Office fitted a 62-foot diameter airship called the Hover Hammer with an eavesdropping device, he continued, adding that The agency launched the three-engine airship at an airfield near Solomons Island, Maryland.

From there, the blimp was able to vacuum up international shipping data emanating from the Long Island, New York area,' Gallagher explained, citing a classified document published on Monday. The spy equipment on the airship was called Digital Receiver Technology a proprietary system manufactured by a Maryland-based company of the same name which can intercept wireless communications, including cellphone calls.

The report continuedby saying, Unsurprisingly, privacy groups have expressed concerns about the prospect of the blimps being used domestically to spy on Americans. However, military officials have often been quick to dismiss such fears.

TRUNEWS copy/TRUNEWS analysis

Donate Today!

We believe Christians need and deserve their own global news network to keep the worldwide Church informed, and to offer Christians a positive alternative to the anti-Christian bigotry of the mainstream news media

More here:
NSA blimp spied on US citizens - TRUNEWS

Posted in NSA | Comments Off on NSA blimp spied on US citizens – TRUNEWS

Russian Cybercriminals Are Loving Those Leaked NSA Windows … – Forbes

Posted: at 1:45 am


Forbes

Here is the original post:
Russian Cybercriminals Are Loving Those Leaked NSA Windows ... - Forbes

Posted in NSA | Comments Off on Russian Cybercriminals Are Loving Those Leaked NSA Windows … – Forbes

The NSA’s Eye in the Sky: Blimp Spies on Americans – The New American

Posted: at 1:45 am

The surveillance hawks it would appear are never satisfied. When it comes to harvesting the data of American citizens, their mantra seems to be too much is never enough. The most recently revealed tool in the considerable arsenal of the surveillance state is a three-engine blimp equipped with eavesdropping apparatus.

As the online magazine The Intercept is reporting, the 62-foot diameter airship ominously named the Hover Hammer was fitted with an eavesdropping device back in 2004. The Intercept published a classified document on Monday as part of the Snowden Archive. That classified document shows that the Hover Hammer can be manned or remotely piloted and has already done demonstration flights up to 10,700 feet including a test in which the airship launched from an airfield near Solomons Island, Maryland and was able to intercept international shipping data emanating from the Long Island, New York area, including lines of bearing. Just to clarify, both Maryland and Long Island, New York, are in the United States, so the fact that the Hover Hammer intercepted international shipping data is considerably less than the whole story. In sweeping up that data, the Digital Receiver Technology model 1301 receiver onboard the airship undoubtedly also picked up domestic communications including mobile phone calls, texts, mobile data traffic, and presumably WiFi and other signals.

Moreover, since the document dated August 9, 2004 also says that other experiments were being conducted at that time including the use of onboard imagery sensors, it is a foregone conclusion that the past 13 years have been a heyday of domestic surveillance for the NSA (which operates the aircraft) and other three-letter-agencies that make up the surveillance state. After all, imagery sensors is just tech jargon for cameras. It is to be expected that these imagery sensors would include heat signature sensors as well as infrared sensors. This aircraft even as it existed in 2004 is a surveillance dream come true and a privacy living nightmare.

Of course, it is certain that the aircraft is not what it was in 2004; technology never stands still. In fact, the classified document leaked by Snowden and only recently published by The Intercept as part of the Snowden Archive shows that in 2004, the craft was already being sized up for more changes than just the addition of onboard imagery sensors:

The current plans are to develop the airship for unmanned operations at altitudes of approximately 20,000 feet for up to 48 hours. Future variants are planned to be 200 feet in diameter and will operate at 68,000 feet with mission durations of up to six months. NTIO and S3's Tactical Platforms are already collaborating on options for deploying SIGINT systems on this platform.

So, bigger is better in the darkened minds of the surveillance hawks. If the Hover Hammer could read signals from Maryland to Long Island being a mere 62 feet in diameter and topping out at flights reaching just under 11,000 feet, imagine what could be done with a 200-foot diameter craft flying at 68,000 feet.

And, as The Intercepts Ryan Gallagher pointed out in the article linked above, these eyes in the sky are big business for the surveillance state, which has big plans for them:

In recent years, airships or aerostats, as they are formally called have been a source of major military investment. Between 2006 and 2015, the U.S. Army paid Raytheon some $1.8 billion to develop a massive missile-defense blimp called the JLENS, which is equipped with powerful radar that can scan in any direction 310 miles. (Thats almost the entire length of New York state.) In October 2015, the JLENS attracted national attention after one became untethered amid testing and drifted north from Maryland to Pennsylvania before it was brought back under control. In 2010, the Army commissioned another three airships called Long Endurance Multi-Intelligence Vehicles as part of a $517 million contract with Northrop Grumman. The company stated that the airships would shape the future of the militarys intelligence-gathering capabilities and provide a persistent unblinking stare from the sky.

Of course, the surveillance hawks are not the least bit above misleading or even outright lying to the American people for whom they presumably work. As The Intercept article says:

Unsurprisingly, privacy groups have expressed concerns about the prospect of the blimps being used domestically to spy on Americans. However, military officials have often been quick to dismiss such fears. In August 2015, Lt. Shane Glass told Baltimore broadcaster WBAL that the JLENS blimps being tested in Maryland were not equipped with cameras or eavesdropping devices. There are no cameras on the system, and we are not capable of tracking any individuals, Glass stated.

Even if that were true and considering the fact that the surveillance state is populated by pathological liars, that would be a thin limb to go out on it is irrelevant. JLENS is small fries compared to the Hover Hammer, and there are likely other such aircraft that we know nothing of yet.

While Americans have known about much of what the three-letter-agencies of the surveillance state have been up to, the truth, it turns out, is even darker than many may have imagined. The surveillance hawks have built their Panopticon; they just built it in the sky. The all-seeing eye giving them a persistent unblinking stare means that when the surveillance hawks in both the intelligence community and Congress have complained about the problem of terrorists and other criminals going dark, they were lying.

This does of course underscore the importance of encrypting as much of your data and communications as possible. Encryption truly is the great equalizer in the battle for digital privacy. As this writer has said time and again: encrypt everything. If the surveillance hawks are going to take to the skies to harvest your data, make them waste their time (and your money) harvesting unintelligible gibberish that does them no good (and you no harm) without the decryption keys.

Image: Screenshot of YouTube video of Raytheon JLENS airship

Follow this link:
The NSA's Eye in the Sky: Blimp Spies on Americans - The New American

Posted in NSA | Comments Off on The NSA’s Eye in the Sky: Blimp Spies on Americans – The New American

EXCLUSIVE: Only 2 House Dems Have Examined Those Susan Rice ‘Unmasking’ Docs – Daily Caller

Posted: at 1:45 am

5618254

Connecticut Rep. Jim Himes is the only Democrat on the House Permanent Select Committee on Intelligence other than Rep. Adam Schiff, the panels ranking minority member, to review intelligence files showing former White House National Security Adviser Susan Rice unmasked aides to President Donald Trump during his transition to the Oval Office, The Daily Caller News Foundations Investigative Group has learned.

The apparent lack of interest among the remaining seven Democrats on the intelligence panel is in striking contrast to their earlier vocal demands that they see the documents after committee chairman Rep. Devin Nunes disclosed he had read them at the White House complex.

According to a source with knowledge of congressional visits to the National Security Agency, the classified documents have been available to committee members for three weeks, but Himes and Schiff are the lone Democrats to review them.

Unmasking refers to what happens when somebody reveals a previously redacted name of an American citizen who was incidentally overheard by U.S. intelligence assets while talking to a foreigner.

Rice, who worked for President Barack Obama, was authorized to request such redacted names, but it is a criminal offense to make the name public or to ask another person to do so. Penalties include up to $10,000 and as many as five years in prison.

Im scheduled to go to one of our agencies tomorrow to view those documents, Himes toldCNNs Wolf Blitzer April 5.The lawmaker did not disclose where he would review the documents, but the source confirmed toTheDCNF that Himes did so at the NSAs Ft. Meade, Maryland, facility.

Schiff, who is fromCalifornia, especially slammed Trump administration officials for allowing Nunes to review the documents before other committee members were allowed to do so.

Were still trying to get those documents for the full committee, Schiff saidin an April 6 CNN interview.We would like the White Houses help if they are sincere about wanting to share this information. But as yet we have not been able to make those documents available to the full committee.

The absence of Democrats from the NSA reading room extends to their committee staffs. Both Democratic and Republican House intelligence committee staff were cleared to view the intelligence at Ft. Meade.

A large contingent of Republican staff have camped out at the NSA Headquarters reviewing the documents.

The Republican side staff is heavily engaged for weeks, the source told TheDCNF. Republican staffers have been spending all day at NSA, three days a week. The minority (Democratic) staff have been there a fraction of that time.

Two Republican members of the committee other than Nunes have since reviewed the documents, but the source declined to reveal their names. Nunes has since recused himself on the Russia meddling issue but is still the lead on the Rice issue. Texas Rep. Mike Conaway is fulfilling the chairmans duties on the Russian probe.

Ron Hosko, a 30-year FBI veteran and its former assistant director, condemned Democrats for not reviewing the documents, telling TheDCNF that it may be a reflection of hypocrisy that we see coming out of this committee.

Hosko also suggested, This could be information they do not want to possess. They dont want the facts to get in the way of what theyre saying publicly. So now theyre avoiding it.

White House counsel Donald F. McGahn II invitedSchiff March 30 to examine the documents at the NSC. The next day the congressman traveled to examine the files at the NSC offices on the White House grounds.

Since then, Schiff has been uncharacteristically mum about what he has seen. He has said nothing about what he saw in the files.

In deciding to share the NSA intelligence with all House intelligence committee members, the Trump administration broke tradition set in 1947 and upheld by every president since then.

The 1947 National Security Act limited intelligence sharing with Congress to only eight leaders of the House and Senate: the Speaker of the House, the House minority leader, the Senate majority and minority leaders, along with the chairmen of the House and Senate intelligence committees.

Previous chief executives have since fully informed Congress of intelligence matters by limiting the classified material to the group, which is informally known as the Gang of Eight.

It was McGahns March 30 invitation to Schiff that broke the precedent. Then the Trump administrations opened the door to unprecedented heights, allowing all members of the House intelligence committee to view the NSA intelligence.

Follow Richard on Twitter

Content created by The Daily Caller News Foundation is available without charge to any eligible news publisher that can provide a large audience. For licensing opportunities of our original content, please contact [emailprotected].

View original post here:
EXCLUSIVE: Only 2 House Dems Have Examined Those Susan Rice 'Unmasking' Docs - Daily Caller

Posted in NSA | Comments Off on EXCLUSIVE: Only 2 House Dems Have Examined Those Susan Rice ‘Unmasking’ Docs – Daily Caller

Japan Made Secret Deals With the NSA That Expanded Global … – The Intercept

Posted: April 25, 2017 at 4:45 am

It began as routinely as any other passenger flight. At gate 15 of New York Citys JFK Airport, more than 200 men, women, and children stood in line as they waited to board a Boeing 747. They were on their way to Seoul, South Koreas capital city. But none would ever make it to their destination. About 14 hours after its departure, the plane was cruising at around 35,000 feet not far from the north of Japan when it was shot out of the sky.

The downing of Korean Airlines Flight 007 occurred on September 1, 1983, in what was one of the Cold Wars most shocking incidents. The plane had veered off course and for a short time entered Soviet airspace. At Dolinsk-Sokol military base, Soviet commanders dispatched two fighter jets and issued an order to destroy the intruder. The plane was hit once by an air-to-air missile and plummeted into the sea, killing all passengers and crew. President Ronald Reagan declared it a crime against humanity, marking the dawn of a volatile new chapter in relations between the United States and the Soviet Union. Soon, tensions would escalate to a level not seen since the Cuban missile crisis, which 20 years earlier had brought the world to the brink of nuclear war.

Sisters of a passenger on Korean Airlines Flight 007weep as a South Korean government spokesman announced that it was almost certain the jetliner had been shot down en route to Seoul on Sept. 2, 1983.

Photo: Kim Chon-Kil/AP

As the international confrontation between the two adversaries played out publicly, behind closed doors another problem which has never before been revealed was developing. The U.S. and one of its closest allies, Japan, were embroiled in a dispute involving secret surveillance. Soviet officials were flat-out denying they had any role in shooting down the jet. At a spy base on Japanese territory, however, communications had been intercepted proving the Soviet military was the perpetrator. The U.S. wanted to obtain copies of the tapes but had to first receive approval from the head of a shadowy Japanese surveillance organization known as the G2 Annex.

After some bureaucratic wrangling, the Japanese eventually signed off on the release and the highly sensitive recordings were sent to Washington. From there, the tapes were forwarded to New York City, where U.S. Ambassador Jeane Kirkpatrick brought them to the United Nations headquarters in Manhattan. On September 6 just five days after the Korean Airlines jet was shot down Kirkpatrick attended a meeting at the U.N. Security Council where she blasted the Soviet Union for telling lies, half lies and excuses about its involvement in the downing of the plane. She then proceeded to play the copy of the intercepted conversations, stating that the evidence was being presented in cooperation with the government of Japan.

The case Kirkpatrick put forward against the Soviets was irrefutable and damning. But Japans spying capabilities had now been exposed and the countrys officials were not pleased about it. The G2 Annex received new orders limiting its cooperation with the U.S., which affected the NSAs relationship with its Japanese counterparts for the better part of a decade, at least until the Cold War ended in the early 1990s.

The details about the Korean Airlines case are revealed in classified National Security Agency documents, obtained by The Intercept from the whistleblower Edward Snowden. The documents, published Monday in collaboration with Japanese news broadcaster NHK, reveal the complicated relationship the NSA has maintained with Japan over a period of more than six decades. Japan has allowed NSA to maintain at least three bases on its territory and contributed more than half a billion dollars to help finance the NSAs facilities and operations. In return, NSA has kitted out Japanese spies with powerful surveillance tools and shared intelligence with them. However, there is a duplicitous dimension to the partnership. While the NSA has maintained friendly ties with its Japanese counterparts and benefited from their financial generosity, at the same time it has secretly spied on Japanese officials and institutions.

The NSA declined to comment for this story.

View of the radioactive plume from the bomb dropped on Nagasaki, as seen from 9.6 kilometers away, in Koyagi-jima, Japan, on Aug. 9, 1945.

Photo: Hiromichi Matsuda/Nagasaki Atomic Bomb Museum/Getty Images

On August 14, 1945, Japan announced its unconditional surrender just days after U.S. Air Force planes dropped two atomic bombs on the cities of Nagasaki and Hiroshima, killing more than 100,000 people. The war was over, but as part of the peace agreement, Japan agreed to U.S. military occupation. American forces led by Gen. Douglas MacArthur drafted a new Japanese constitution and reformed the countrys parliamentary system. In April 1952, Japans sovereignty was restored, but the U.S. continued to maintain a major presence in the country and that is where the NSAs story begins.

According to the agencys documents, its relationship with Japan dates back to the 1950s. NSAs presence in the country was for many years managed out of a cover office in the Minato area of downtown Tokyo, within a U.S. military compound called the Hardy Barracks. From there, NSA maintained close relations with a Japanese surveillance agency that it refers to as Japans Directorate for Signals Intelligence, or SIGINT.

At first, the NSA appears to have kept a low profile in Japan, concealing details about its presence and operating undercover. But as its relationship with the country developed, that changed. By 2007, the agency had determined that cover operations are no longer required and it relocated its main office in Japan to a space within the U.S. Embassy in Tokyo. NSAs partnership with Japan continues to grow in importance, the agency noted in a classified October 2007 report, adding that it planned to take the country to the next level as an intelligence partner with the U.S.

Beyond Tokyo, NSA has a presence today at several other facilities in Japan. The most important of these is located at a large U.S. airbase in Misawa, about 400 miles north of Tokyo. At what it calls its Misawa Security Operations Center, the agency carries out a mission under the code name LADYLOVE. Using about a dozen powerful antennas contained within large golf ball-like white domes, it vacuums up communications including phone calls, faxes, and internet data that are transmitted across satellites in the Asia-Pacific region.

Army Lt. Gen. Keith Alexander, former director of the National Security Agency, reviews his notes while testifying on Capitol Hill in Washington on May 1, 2007.

Photo: Haraz N. Ghanbari/AP

As of March 2009, Misawa was being used to monitor over 8,000 signals on 16 targeted satellites, one NSA document noted. At the same time, the agency was working on beefing up the spy hubs systems, so that it could meet a challenge set by then-Director Keith Alexander to collect it all meaning, to sweep up as many communications as possible. Misawas NSA employees responded to Alexanders call by developing technology to automatically scan and process more satellite signals. There are multitude of possibilities, one Misawa-based NSA engineer reported, predicting that the base would soon be one step closer to collecting it all.

Strategically, Japan is one of the NSAs most valuable partners. Because of its close proximity to major U.S. rivals like China and Russia, it has been used as a launching pad to spy on those countries. But NSAs operations in Japan are not limited to monitoring the communications of nearby adversaries. At Misawa, the NSA deployed programs called APPARITION and GHOSTHUNTER, which pinpoint the locations of people accessing the internet across the Middle East and North Africa. NSA documents detailing GHOSTHUNTERs deployment at the NSAs British base Menwith Hill state the program was used to facilitate lethal strikes, enabling a significant number of capture-kill operations against alleged terrorists. One November 2008 document noted that Misawa had proved particularly useful in tracking down terror suspects in Afghanistan and Pakistan, and was also being used in an effort to identify targets in Indonesia.

Over the past decade, the NSAs tactics have evolved dramatically and it has rolled out new and more controversial methods. By 2010, with the internet surging in popularity, the agency was continuing to focus on long-established spying tactics like eavesdropping on phone calls, but it was increasingly adopting more aggressive methods, such as hacking into its targets computers.

At Misawa, the NSA began integrating hacking operations into its repertoire of capabilities. One such method it deployed at the base is called a Quantum Insert attack, which involves monitoring the internet browsing habits of people targeted for surveillance, before covertly redirecting them to a malicious website or server that infects their computers with an implant. The implant then collects data from the infected computer and returns it to the NSA for analysis. If we can get the target to visit us in some sort of web browser, we can probably own them, an NSA employee claims in one document describing the hacking techniques. The only limitation is the how.

U.S. Marine Corps MV-22 Osprey aircraft sit on the tarmac at U.S. Marine Corps Air Station Futenma on Okinawa Island, Japan, on May 19, 2015.

Photo: Hitoshi Maeshiro/EPA/Redux

The Yokota Air Base, another U.S. military facility, sits at the foothills of Okutama mountains near the city of Fussa. The base is about a 90-minute drive west from central Tokyo and houses more than 3,400 personnel. According to the U.S. Air Force, Yokotas function is to enhance the U.S. deterrent posture and, if necessary, provide fighter and military airlift support for offensive air operations. But it also serves another, more secret, purpose.

NSA documents reveal that Yokota is home to what the agency calls its Engineering Support Facility, which supplies equipment used for surveillance operations across the world. In 2004, the agency opened a major new 32,000 square foot building at the site about half the size of a football field for the repair and manufacture of surveillance antennas it said would be used in places like Afghanistan, Korea, Thailand, the Balkans, Iraq, Central and South America, and Cyprus. The construction cost $6.6 million, which was paid almost entirely by the government of Japan, a July 2004 NSA report stated. Within the facility, Japan would finance the staff as well, the report noted, including seven designers, machinists, and other specialists, who were collectively receiving salaries worth $375,000.

About 1,200 miles southwest of Yokota is the NSAs most remote Japanese spying station, located on the island of Okinawa at a large U.S. Marine Corps base called Camp Hansen. It, too, has greatly benefited from a massive injection of Japanese money. In the early 2000s, NSA constructed a state-of-the-art surveillance facility on the island, paid for in full by Japan at a cost of some $500 million, according to the agencys documents. The site was carved out of a dense, hilly area called Landing Zone Ostrich that the Marines had previously used for jungle training. The facility, built to include an antenna field for its spying missions, was designed to be low profile, blending in with the landscape. It replaced a previous spy hub NSA had maintained on Okinawa that the islands Japanese residents had complained was unsightly. The role of the remote eavesdropping station is to collect high-frequency communications signals as part of a mission called STAKECLAIM. The NSA does not appear to have a large number of employees stationed on the island; instead, it remotely operates the Okinawa facility from a 24-hour collection operations center in Hawaii.

Hiroshi Miyashita, a former Japanese government data protection official, told The Intercept that Japans funding of U.S. intelligence activities is withheld from public disclosure under a state secrecy law, which he criticized. Its our money Japanese taxpayers money, he said. We should know how much was spent for intelligence activities in Japan. Miyashita, now an associate professor at Chuo University in Tokyo, said it was his understanding that NSA operates in the country outside Japans legal jurisdiction due to an agreement that grants U.S. military facilities in Japan extraterritoriality. There is no oversight mechanism, Miyashita said. There is limited knowledge of activities within the bases.

Members of the U.S. Marine Corps test fire M110 rifles at Camp Hansen in Okinawa Prefecture on Jan. 12, 2011.

Photo: Kyodo/AP

As recently as 2013, the NSA claimed to maintain robust working relations with its Japanese counterparts. The agency has two surveillance partners in Japan: the Directorate for SIGINT, and the Japanese National Police Agency. Japan has collaborated closely with the NSA on monitoring the communications of neighboring countries, and it also appears to rely heavily on U.S.-provided intelligence about North Korean missile launches. As of February 2013, the NSA was increasingly collaborating with its Japanese counterparts on cybersecurity issues. And in September 2012, Japan began sharing information with the NSA that could be used to identify particular kinds of malicious software being used by hackers. This was the first time the country had shared this kind of data and the NSA viewed it as highly valuable, potentially leading to the prevention or detection of hacking attacks on critical U.S. corporate information systems.

In return, the NSA has provided Japanese spies with training, and it has also furnished them with some of its most powerful spying tools. An April 2013 document revealed that the NSA had provided the Japanese Directorate for SIGINT with an installation of XKEYSCORE, a mass surveillance system the NSA describes as its widest reaching for sweeping up data from computer networks, monitoring nearly everything a typical user does on the internet.

Igeta Daisuke, a Japanese lawyer who specializes in civil liberties cases, said that the XKEYSCORE revelation was very important for the country. The Japanese governments use of the system could violate Japans Constitution, which protects privacy rights, Daisuke told The Intercept. He added that Japan has a limited legal framework covering surveillance issues, largely because the scope of the governments spying has never before been disclosed, debated, or ruled upon by judges. Japanese citizens know almost nothing about Japanese government surveillance, said Daisuke. It is extremely secret.

The Japanese governments defense ministry, which oversees the countrys surveillance capabilitites, declined to comment.

The Bank of Japan building in Tokyo on July 14, 2006.

Photo: Kazuhiro Nogi/AFP/Getty Images

The NSA works with a diverse range of counterparts in countries across the world from the United Kingdom and Sweden to Saudi Arabia and Ethiopia. But the agencys partnership with Japan is one of its most complex and seems tainted by a degree of distrust, highlighted by the dramatic aftermath of the Korean Airlines incident in 1983.

In a November 2008 document, one of NSAs then most senior officials in Japan offered an insight into the relationship. He described the Japanese as very accomplished at conducting signals intelligence but lamented that they were excessively secretive. The countrys spies were still caught in a Cold War way of doing business, the official wrote. They treat SIGINT as a special-access program the most sensitive program they have. The result is that they are rather stove-piped, somewhat like NSA was 10-or-more years ago.

The NSA participates in a group called the SIGINT Seniors Pacific, which has included surveillance agencies from Australia, Canada, the United Kingdom, France, India, New Zealand, Thailand, South Korea, and Singapore. The group keeps tabs on security issues in the Asia-Pacific region issues of great interest to Japan, given its geographic location. Yet the country refused to join the meetings. Japan was the only nation who was actually offered membership but turned it down, wrote one NSA employee in a March 2007 document. At the time, Japan expressed concerns that unintended disclosure of its participation would be too high a risk and had other reasons as well.

Some of the difficulties have directly impacted the NSAs operations. According to the agencys documents, for many years Japan participated in a surveillance program called CROSSHAIR, which involved sharing intelligence gathered from high-frequency signals. However, in 2009, the country abruptly ceased its participation in the program.

Four years later, the issue was still causing NSA concern. Ahead of a February 2013 meeting the agency had scheduled with the deputy director of Japans Directorate for SIGINT, it prepared a briefing document that outlined the CROSSHAIR problem and warned of a potential landmine associated with the discussions. In the past, the partner has mistakenly perceived that NSA was trying to force [the Directorate for SIGINT] to use U.S. technical solutions in place of their own, the memo stated. When this occurred, the partner reacted in a strong, negative manner.

But while NSA employees may walk on eggshells with Japan during face-to-face meetings, they have taken a different approach on a covert level. An NSA document from May 2006 indicated that a division of the agency called Western Europe and Strategic Partnerships was spying on Japan in an effort to gather intelligence about its foreign policy and trade activities. Moreover, as of July 2010, the NSA had obtained domestic court orders enabling it to conduct surveillance on U.S. territory of Japanese officials and the Bank of Japan, which has offices in Washington, D.C., and New York City.

The NSAs covert eavesdropping operations give it an insight into the Japanese governments private negotiations and dealmaking. As was the case in late May 2007, during a secret meeting at the luxury Hotel Captain Cook in downtown Anchorage, Alaska.

Delegates from more than 70 countries listen to proceedings during the International Whaling Commission meeting in Anchorage, Alaska, on May 29, 2007.

Photo: Michael Conti/AFP/Getty Images

The 59thannual gathering of the International Whaling Commission was being held in the hotel and Japan was lobbying to end a moratorium preventing countries from hunting whales for commercial purposes. U.S. officials supported maintaining the moratorium and called in the NSA to help spy on Japans representatives ahead of a crucial vote. The agency worked with its New Zealand counterparts to conduct the surveillance. New Zealand had the target access, and collected and provided insightful SIGINT that laid out the lobbying efforts of the Japanese and the response of countries whose votes were so coveted, noted an NSA document from July 2007, which outlined the operation.

One morning into the four-day gathering, at 7 a.m., an NSA employee arrived in a taxi at the agencys Alaska Mission Operations Center, a 20-minute drive from the hotel. She collected printed copies of the intelligence that had been gathered from the Japanese communications. She then returned to the hotel with the information stored in a locked bag, and brought it to a private conference room in the hotel. There, the material was shared with two U.S. delegates from the Department of Commerce, two officials from the State Department, two representatives from New Zealand, and one from Australia. The officials read the material in silence, pointing and nodding while they studied it.

The 77-member commission voted at the meeting to allow aboriginal whaling for indigenous people in the U.S., Russia, and Greenland. Japan put forward a proposal that it should be permitted to hunt minke whales for similar reasons, claiming that doing so has been part of its culture for thousands of years. But it failed in its efforts; at the end of proceedings in Anchorage, the moratorium stood and Japan was not granted any special exemptions.

Japans representatives were furious and threatened to quit the commission altogether. This hypocrisy leads us to seriously question the nature by which Japan will continue participating in this forum, complained Joji Morishita, Japans deputy whaling commissioner. As far as NSA was concerned, however, it was a job well done. Whatever intelligence the agency had gathered during the meetings the specifics of which are not revealed in the document it had apparently helped sway the vote and scupper Japans plans. Was the outcome worth the effort? The Australian, New Zealand, and American delegates would all say yes, noted one agency employee who was involved in the covert mission. I believe the whales would concur.

Documents published with this article:

Top photo: US Secretary of Defense Leon Panetta delivers a speech after arriving at the Yokota airforce base in Tokyo on October 24, 2011.

See original here:
Japan Made Secret Deals With the NSA That Expanded Global ... - The Intercept

Posted in NSA | Comments Off on Japan Made Secret Deals With the NSA That Expanded Global … – The Intercept

NSA Blimp Spied in the United States – The Intercept – The Intercept

Posted: at 4:45 am

To residents of Maryland, catching an occasional glimpse of a huge white blimp floating in the sky is not unusual. For more than a decade, the military has used the state as a proving ground for new airships destined for Afghanistan or Iraq. But less known is that the test flights have sometimes served a more secretive purpose involving National Security Agency surveillance.

Back in 2004, a division of the NSA called the National Tactical Integration Office fitted a 62-foot diameter airship called the Hover Hammer with an eavesdropping device, according to a classified document published Monday by The Intercept. The agency launched the three-engine airship at an airfield near Solomons Island, Maryland. And from there, the blimp was able to vacuum up international shipping data emanating from the Long Island, New York area, the document says. The spy equipment on the airship was called Digital Receiver Technology a proprietary system manufactured by a Maryland-based company of the same name which can intercept wireless communications, including cellphone calls.

With the exception of a few military websites that refer to the Hover Hammer as an antenna mounting platform, there is little information in the public domain about it. The classified NSA document describes the airship as a helium-filled sphere inside another sphere, constructed of Spectra, the same material used to make bullet-proof vests. It hovers above small arms fire, has a negligible [infrared] signature, and radar cant detect it. The agency added in the document that it planned to conduct more tests with the Hover Hammer, and said it wanted to develop a larger version of the blimp that would be capable of flying at altitudes of 68,000 feet for up to six months at a time. More experiments, including the use of onboard imagery sensors, are being conducted, it said.

The NSA declined to comment for this story.

In recent years, airships or aerostats, as they are formally called have been a source of major military investment. Between 2006 and 2015, the U.S. Army paid Raytheon some $1.8 billion to develop a massive missile-defense blimp called the JLENS, which is equipped with powerful radar that can scan in any direction 310 miles. (Thats almost the entire length of New York state.) In October 2015, the JLENS attracted national attention after one became untethered amid testing and drifted north from Maryland to Pennsylvania before it was brought back under control. In 2010, the Army commissioned another three airships called Long Endurance Multi-Intelligence Vehicles as part of a $517 million contract with Northrop Grumman. The company stated that the airships would shape the future of the militarys intelligence-gathering capabilities and provide a persistent unblinking stare from the sky.

Unsurprisingly, privacy groups have expressed concerns about the prospect of the blimps being used domestically to spy on Americans. However, military officials have often been quick to dismiss such fears. In August 2015, Lt. Shane Glass told Baltimore broadcaster WBAL that the JLENS blimps being tested in Maryland were not equipped with cameras or eavesdropping devices. There are no cameras on the system, and we are not capable of tracking any individuals, Glass stated. The same cannot be said, it seems, of the NSAs Hover Hammer.

Top photo: A flight crew launches a U.S. Army Joint Land Attack Cruise Missile Defense Elevated Sensor System (JLENS) at the Utah Test and Training Range, Utah, on Feb. 3, 2014.

Originally posted here:
NSA Blimp Spied in the United States - The Intercept - The Intercept

Posted in NSA | Comments Off on NSA Blimp Spied in the United States – The Intercept – The Intercept

Why Soviet Weather Was Secret, a Critical Gap in Korea, and Other NSA Newsletter Tales – The Intercept

Posted: at 4:45 am

Three years after the 9/11 attacks, a frustrated NSA employee complained that Osama bin Laden was alive and well, and yet the surveillance agency still had no automated way to search the Arabic language PDFs it had intercepted.

This is just one of many complaints and observations included in SIDtoday, the internal newsletter of the NSAs signals intelligence division. The Intercept today is publishing 251 articles from the newsletter, covering the second half of 2004 and the beginning of 2005. The newsletters were part of a large collection of NSA documents provided to The Intercept by Edward Snowden.

This latest batch of posts includes candid employee comments about over-classification, descriptions of tensions in the NSA-CIA relationship, and an interns enthusiastic appraisal of a stint in Pakistan.

Most revealing perhaps are insights into how NSA has operated domestically. The Intercept is publishing two stories on this topic, including one about NSA cooperation with law enforcement during American political conventions, and in a throwback to the movie Bladerunner, another article describes a spy balloon used over the United States.

Finally, The Intercept, in cooperation with the Japanese broadcaster NHK, is revealing the history of U.S. surveillance cooperation with Japan. Starting with the American occupation of Japan after World War II and reaching a standoff after the Soviet shoot-down of a South Korean aircraft, the long and sometimes tense relationship reveals how even close U.S. allies can find themselves targeted by the NSA.

The NSAs Follow-the-Money Branch (the actual name of the division) brings together experts from across a spectrum of disciplines and organizations. The division in 2004created a North Korea CRASH Team, short for Combined Rapid Analysis and Synthesis Hit, after the State Department issued a requirement for a new emphasis on regime finance and an increased emphasis on North Koreas financing of its nuclear proliferation. In response, the CRASH Team looked at North Korean transactions that went through foreign banks. In particular, the team targeted leadership finance, i.e. Kim Jong Il, the North Korean leader who died in 2011, and traced sales of precious metals allegedly owned by him, weapons shipments, and relationships among regime leaders.

The 6throck drill on Korea brought together NSA and officials from the U.K., Canada, Australia, and New Zealand to rehearse the scenarios involving civilian evacuations in Seoul and Pyongyang during a hypothetical Korean War. Participants planned a response to a North Korean attack and held a brainstorming session about signals intelligence operations in a hypothetical newly unified Korea. In the discussions, critical gaps were found in communications with trusted Five Eyes countries, which did not have access to the computer networks for the Korea Theater of Operations. Twenty-two other nations committed to defending South Korea are not included in intelligence sharing either.So NSA will be working through some of these problems, with the goal of exercising the resulting solutions sometime in early 2005.

Czech youngsters stand atop an overturned truck as the Soviet-led invasion by the Warsaw Pact armies crushes the so-called Prague Spring reform in former Czechoslovakia, in Prague on Aug. 21, 1968.

Photo: Libor Hajsky/AFP/Getty Images

Back in the late 1960s, Charlie Meals, the deputy director of SID, worked in the Soviet weather shop. The only way the U.S. could track weather in the Soviet Union was by listening to Soviet communications. The Soviets knew the U.S. was listening and so it encrypted the locations of weather reports. U.S. Strategic Air Command needed to have weather reports in case bombers ever had to fly into Soviet air space, and the weather reporting could also be an indicator of impending military action. For example, before the 1968 invasion of Czechoslovakia, the Soviets started including Czech weather reports in military broadcasts. (The intricacies of collecting weather data as intelligence is also described in this article by Jeffrey Richelson of National Security Archive.) The weather effort had at least 250 people at NSA and people at bases around the world. This desk was still in operation in 2004.

FBI field office staff made little use of signals intelligence and many didnt know how to access the information for themselves on the Intelligence Communitys Intelink system, according to an NSA intern, describing assignments at the bureau. The FBI field offices had little or no Sensitive Compartmented Information Facility space, which made it difficult to share the higher levels of intelligence between the agencies. The intern had higher regard for FBI headquarters. With data from the NSA, FBI analysts can now immediately tell if an individual in the U.S. has any foreign terrorism-related contacts.

A rebel is blessed during a Voodoo ceremony of the Gonaives Resistance Front, during a march in Gonaives, Haiti, on Feb. 13, 2004.

Photo: Walter Astrada/AP

The NSA tracked High Value Targets in Haiti following the 2004 coup, according to an article classified Top Secret. An NSA staffer reports that a task force on HVTs traveled to the central highlands of Haiti where they met with rebel leaders. During this trip they had collected several telephone numbers of these leaders and their associates, the staffer wrote. Soon thereafter, the NSA began to see multi-page reports of conversations between one important rebel leader and his wife which provided insight into his negotiating position and plans for control of the central highlands. Those private conversations proved useful. I received several emails from people who were incredulous that a conversation between an HVT target and his girlfriend was of any importance, the staffer went on. The truth is that a lot of SIGINT leavings that never make it into normal SIGINT reporting are actually valuable intelligence items for tactical warfighters.

NSA interns see the sights, even in Pakistan. An intelligence analysis intern working in SIDs Pakistan branch was deployed to assignments in Islamabad and Lahore. At the embassy, the intern focused on signals intelligence related to the non-tribal Settled Areas and coordinated communications among NSA, CIA and the local counterpart i.e. Pakistani partners, in tracking and targeting terrorists. The Settled Areas Office along with their local counterparts was responsible for the arrests of more than 600 alleged terrorists from September 11, 2001to 2004. Outside of working hours, the blonde American attracted a constant stream of stares and curious looks as she ventured out to tourist sites. Station Islamabad, which has been fictionalized in Homeland and Zero Dark Thirty, was to this staffer one of the most exciting, challenging, and fast-paced locations to work in the world.

Q: What do SIGINT and mad cows have in common?

A: Both are of critical interest to the U.S. Department of Agriculture

SIGINT isnt just for intelligence or military agencies. NSAs two-person Washington Liaison Office responds to signals intelligence requests from Departments of Agriculture, Health and Human Services, Interior, Transportation, the Environmental Protection Agency, Export-Import Bank, Federal Aviation Administration, Federal Communications Commission, Federal Reserve System, and National Aeronautics and Space Administration. With such a wide range of subject matter and competing priorities, the liaison officers have to balance topics from bovine spongiform encephalopathy to space launch vehicle capabilities; from narcotics interdiction techniques to wine labeling regulations; from toxin delivery technologies to secure communications options, and much, much more.

A protestor holding a portrait of Osama bin Laden shouts Allahu Akbar during a protest in front of Baiturrahman mosque, Banda Aceh, Indonesia, on Oct. 10, 2001.

Photo: AFP/Getty Images

Imagine if the NSA missed warning signs of an attack for no other reason than it couldnt search Arabic words in PDF format. If you were looking for Osama bin Laden, wrote an NSA employee in SIDtoday, and you had entered every Arabic word known to mankind in every possible encoding and Osama were doing nothing more than using PDF and writing in Arabic, youd never get a hit. Quite reassuring, isnt it?

Near the end of 2004, SIDtoday began publishing a technical advice column written by an experienced Digital Network Intelligence analyst under the pseudonym Raul. One articledescribes a gaping intelligence hole that NSA had at the time, three years after the 9/11 attacks. Though analysts at NSA understood exactly how foreign-language PDFs were encoded, they lacked the technology to untangle them in real-time in order to search them for keywords.

Apparently, this article hit a few nerves. Rauls subsequent column responded to a flood of complaints he had received. In the subsequent column, he outlined requirements for a hypothetical solution to the foreign-language PDF problem, and concluded with a bit of snark: Bin Laden is still safe and we, to the best of my knowledge, still have no reasonable solution to the PDF problem.

For some sensitive missions, NSA personnel need cover identities while working in the field. An article from October 2004 describes how agents go about making NSA personnel look like they actually work for an entity other than NSA. The Special Operational Support office is responsible for NSAs cover and sensitive personnel support programs. In addition to ensuring that cover operations comply with Department of Defense regulations, SOS provides logistics, transportation, personnel and medical support. The office also provides undercover operatives with DoD Common Access Cards (CAC), travel documents, state drivers licenses, credit cards, post office boxes, social security cards, pocket litter and telecommunications.

The NSA, it turns out, likes to stay on top of the latest scientific developments. Writing at the end of 2004, an NSA cryptanalyst described her experience working as an intern, and using her cryptography skills, on looking for information about genetic sequencing in the signals intelligence collected by the NSA. The ultimate goals of this project are to gain general knowledge about genetic engineering research activity by foreign entities, she wrote, and to identify laboratories and/or individuals who may be involved in nefarious use of genetic research.

Chairman Thomas Kean speaks during a news conference to release the 9/11 Commissions report in Washington on July 22, 2004.

Photo: Mark Wilson/Getty Images

Even though the 9/11 Commission report harshly criticized intelligence agencies failures to share information, the NSA touted its contribution to the July 22, 2004, report. It goes without saying that NSA Cooperation was absolutely vital to this effort, an article in SIDtoday says. SID staff aided in the declassification of material, turned over documents, and patiently explained the intricacies of their work. SID workers also scrubbed references to the NSA from the final report, rewording sections to avoid indications that certain pieces of intelligence derived from SIGINT. You should all feel proud, writes the posts author.

Yet the report itself points to specific SIGINT that could have led to the discovery of the attackers conspiracy that remained unshared due to agencies fear of disclosing intelligence to inappropriate channels and a culture of secrecy in which agencies feeling they own the information they gathered at taxpayer expense.

A prior SIDtoday article touted the agencys extraordinary level of cooperation and provision of large volumes of SIGINT assessment reporting on terrorism, strategic business plans, and a wide range of other topics.

Cooperation between the NSA and CIA runs deep, but it hasnt always been smooth. An August 6 post, CIAs Directorates . . . Understanding More About Them, talks about turf wars due to real or perceived mission overlap, particularly within the CIAs technical division. Yet the Special Collection Service (SCS), which surveils foreign communications from U.S. embassies, is seen as a positive example of joint CIA-NSA work. SIDtoday cites the achievements of that highly classified organization, which came under scrutiny in 2013 for reports that its Berlin office had been intercepting Chancellor Angela Merkels mobile phone data. The August 18 post, SCS and Executive Protection details the interception of Philippine police communications about a bomb that had been placed on President Clintons motorcade route, which the police were trying to defuse without informing the Americans. SCS passed this information to the Secret Service, who re-routed the cars.

The NSA-CIA relationship was also the subject of two SIDtoday articles in 2003.

Even the NSA acknowledges that it classifies too much. In an article, Do We Overclassify? Are We Sharing Enough Information? a senior SID leader echoes language from the 9/11 Commission report, specifically citing the need to go from a climate of need to know to one of need to share. This interview shares the reports concern that intelligence agencies err on the side of over-classification: If we continue to insist on classifying information which has already become known to our adversaries or for which disclosure would cause little or no harm to national security, we risk losing control over the really sensitive stuff. Tellingly, though, he fears that Congress itself will act to force the NSA to disclose more information.

Post-9/11, the NSA has expanded its cooperation with law enforcement agencies, including the U.S. Marshals Service. In February 2004, SID formalized a relationship with the Marshals and its Electronic Surveillance Unit, which functions like an intelligence operations team, as it both monitors fugitives and provides support and threat assessments to other agencies. The U.S. Marshals Service represents an ideal client for the NSA given its interest in stay(ing) out of the public limelight and courthouses.

Top photo: North Korean soldiers carry a portrait of late leader Kim Jong Il during a military parade to mark 100 years since the birth of the countrys founder Kim Il Sung in Pyongyang on April 15, 2012.

See the rest here:
Why Soviet Weather Was Secret, a Critical Gap in Korea, and Other NSA Newsletter Tales - The Intercept

Posted in NSA | Comments Off on Why Soviet Weather Was Secret, a Critical Gap in Korea, and Other NSA Newsletter Tales – The Intercept

Page 88«..1020..87888990..100110..»