<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:snf="http://www.smartnews.be/snf"
     xmlns:media="http://search.yahoo.com/mrss/" >

    <channel>
        <title>The Intercept</title>
        <atom:link href="https://theintercept.com/snowden-archive/feed/" rel="self" type="application/rss+xml" />
        <link>https://theintercept.com/snowden-archive/</link>
        <description></description>
        <lastBuildDate>Fri, 01 May 2026 21:36:32 +0000</lastBuildDate>
        <language>en-US</language>
                <sy:updatePeriod>hourly</sy:updatePeriod>
        <sy:updateFrequency>1</sy:updateFrequency>
        <generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">220955519</site>
            <item>
                <title><![CDATA[Meltdown Showed Extent of NSA Surveillance — and Other Tales From Hundreds of Intelligence Documents]]></title>
                <link>https://theintercept.com/2019/05/29/nsa-sidtoday-surveillance-intelligence/</link>
                <comments>https://theintercept.com/2019/05/29/nsa-sidtoday-surveillance-intelligence/#respond</comments>
                <pubDate>Wed, 29 May 2019 16:06:58 +0000</pubDate>
                                    <dc:creator><![CDATA[Margot Williams]]></dc:creator>
                                    <dc:creator><![CDATA[Henrik Moltke]]></dc:creator>
                                    <dc:creator><![CDATA[Micah Lee]]></dc:creator>
                                    <dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
                                		<category><![CDATA[National Security]]></category>
		<category><![CDATA[release-may-2019]]></category>
		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=247109</guid>
                                    <description><![CDATA[<p>Internal NSA reports reveal the exploits of a secret commando unit, new details of a joint venture with the CIA, and spying against Middle Eastern satellite internet.</p>
<p>The post <a href="https://theintercept.com/2019/05/29/nsa-sidtoday-surveillance-intelligence/">Meltdown Showed Extent of NSA Surveillance — and Other Tales From Hundreds of Intelligence Documents</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p><u>The problem had</u> been brewing for nearly a decade, intelligence sources had warned, as the National Security Agency vacuumed up more and more surveillance information into computer systems at its Fort Meade, Maryland, headquarters: There just wasn’t enough power coming through the local electric grid to support the rate at which the agency was hoarding other people’s communications.</p>
<p>“If there&#8217;s a major power failure out there, any backup systems would be inadequate to power the whole facility,” a former NSA manager <a href="https://www.baltimoresun.com/news/bs-xpm-2006-08-06-0608060158-story.html">told the Baltimore Sun</a> in August 2006.</p>
<p>&#8220;It&#8217;s obviously worrisome, particularly on days like today.&#8221;</p>
<p>It turns out that manager, and other sources quoted in the Sun piece, were even more correct than was publicly known at the time: The NSA had, just the prior month, already experienced a major power outage and been forced for the first time to switch over its most critical monitoring — its nerve center, the National Security Operations Center — to a backup facility in Augusta, Georgia, according to an <a href="https://theintercept.com/snowden-sidtoday/5987402-for-the-first-time-alternate-nsoc-in-georgia-is/">internal report</a> classified “secret.” The culprit: hot weather and electric company problems generating sufficient power, according to an article posted on the internal agency news site known as SIDtoday.</p>
<p>For the NSA, the relatively smooth handoff was a triumph. But the incident marked an important turning point, underlining how the NSA was collecting too much information for its facilities to handle. The agency would go on to build a massive data center in a barren stretch of Utah desert, estimated to be capable of holding billions of gigabytes of information.</p>
<p>Indeed, the story of the 2006 Fort Meade brownout is one of several stories of overwhelming mass surveillance to emerge from a review of 287 SIDtoday articles, provided by NSA whistleblower Edward Snowden. Other tales, collected below, include <a href="https://theintercept.com/snowden-sidtoday/5987252-sigint-helps-end-the-career-of-bomb-maker-in/">how</a> an NSA intern working in the English countryside marked for killing or capture nine people in Iraq; <a href="https://theintercept.com/snowden-sidtoday/5987279-40-years-of-musketeer/">how</a> a secret team of NSA commandos deployed to foreign countries to <a href="https://theintercept.com/snowden-sidtoday/5987320-the-wizards-of-oz-ii-looking-over-the-shoulder/">break codes</a>; and <a href="https://theintercept.com/snowden-sidtoday/5987486-mhs-system-locates-high-interest-internet-cafes/">how</a> the NSA spied on satellite internet systems in the Middle East.</p>
<p>The Intercept is publishing three other articles taken from this cache of documents, including an <a href="https://theintercept.com/2019/05/29/nsa-data-afghanistan-iraq-mexico-border/">investigation</a> by Henrik Moltke into how revolutionary intelligence pooling technology first used by the U.S., Norway, and other allies in Afghanistan spread to the U.S.-Mexico border — raising questions about over-sharing at home and abroad. In another article, Miriam Pensack <a href="https://theintercept.com/2019/05/29/russia-submarine-kursk-norway-nsa">reveals</a> how the sinking of the Russian submarine Kursk in 2000 was closely monitored by Norwegian (and eventually U.S.) intelligence, which knew more about the tragedy than was initially revealed. And Murtaza Hussain <a href="https://theintercept.com/2019/05/29/israel-drone-strikes-intelligence-nsa">shows</a> how the NSA drew up new rules in response to a request from its Israeli counterpart, which had sought to use U.S. intelligence to target killings, apparently at Hezbollah.</p>
<h3>NSA Commando Unit Promised “Any Target, Anywhere, Any Time”</h3>
<p>In 1966, a new NSA project was hatched to figure out why an electronic signal under surveillance was “exhibiting parameters outside normal operating conditions,” as an NSA history later put it. Members of “WEREWOLF,” as the project was to be called, concluded that the equipment used to monitor the signal was causing the abnormalities.</p>
<p>The team behind WEREWOLF would go on to conduct other “special deployment” missions, but not before a change of cover name. The unit chief decided that WEREWOLF, atop a list of automatically generated possibilities, wasn’t quite right and, reading further down, settled on the more heroic-sounding “MUSKETEEER.” At some point, the unit took on the credo “Any Target, Anywhere, Any Time.”</p>
<p>While technology, as well as the NSA’s mission, would change dramatically over the next 40 years, MUSKETEER teams would steadily “deploy on special collection and survey missions,” according to the <a href="https://theintercept.com/snowden-sidtoday/5987279-40-years-of-musketeer/">NSA history</a>, which ran in SIDtoday. They fixed signal monitoring problems, ran boutique surveillance operations from inside U.S. embassies, and surveyed transmissions in far-off places, often invited by other U.S. government entities.</p>
<p><a name="OLE_LINK1"></a><a name="OLE_LINK2"></a> In more colorful moments, they foiled an assassination attempt against a U.S. special operations commander in the Philippines and discovered vulnerabilities in a Russian-made anti-aircraft missile system, known as SA-6, as used by Bosnia during the Balkans conflict. The latter work resulted in the “neutralization of multiple batteries” of the missiles by U.S. fighter aircraft, according to the history. (The article does not mention whether MUSKETEER’s involvement was linked to the 1995 downing of U.S. fighter pilot Scott O&#8217;Grady by a Serbian SA-6 missile. The NSA was <span lang="zxx"><a href="http://articles.latimes.com/1995-06-12/news/mn-12357_1_intelligence-agencies">harshly</a></span> criticized for failing to relay intelligence that could have prevented the shoot-down. )</p>
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[1] -->
<a href="https://theintercept.com/wp-content/uploads/2019/05/AP_05081202608-SA6-russian-1558388039.jpg"><img loading="lazy" decoding="async" width="2000" height="1353" class="aligncenter size-large wp-image-250960" src="https://theintercept.com/wp-content/uploads/2019/05/AP_05081202608-SA6-russian-1558388039.jpg" alt="AP_05081202608-SA6-russian-1558388039" srcset="https://theintercept.com/wp-content/uploads/2019/05/AP_05081202608-SA6-russian-1558388039.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2019/05/AP_05081202608-SA6-russian-1558388039.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2019/05/AP_05081202608-SA6-russian-1558388039.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2019/05/AP_05081202608-SA6-russian-1558388039.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2019/05/AP_05081202608-SA6-russian-1558388039.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2019/05/AP_05081202608-SA6-russian-1558388039.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2019/05/AP_05081202608-SA6-russian-1558388039.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">Russian SA-6 self-propelled surface-to-air missiles systems, sans missiles, are loaded onto ships at a Russian military base in the Black Sea port of Batumi in Georgia, on Aug. 12, 2005.<br/>Photo: Seiran Baroyan/AP</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] -->
<p>One SIDtoday <a href="https://theintercept.com/snowden-sidtoday/5987320-the-wizards-of-oz-ii-looking-over-the-shoulder/">article</a> recounts how a MUSKETEER team, having deployed to the U.S. embassy in Beijing, struck gold during a survey of Wi-Fi signals from “the embassies of India, Singapore, Pakistan, Colombia, and Mongolia.” At the Indian Embassy, the team discovered that someone, possibly sponsored by the Chinese government, had hacked computers inside and was transmitting “approximately 10 sensitive diplomatic documents” every day (“often Microsoft Office-compatible files or Adobe PDF documents”) to drop boxes on the “public internet.” The NSA began regularly collecting the information from these drop boxes for itself and “analyzing the Indian Embassy’s diplomatic communications,” according to SIDtoday.</p>
<p>Later, by analyzing “how the Chinese conduct computer-to-computer (C2C) operations against foreign targets,” the team was able to find hacking by China “in several other locations.”</p>
<p>This type of operation, in which a spy agency piggybacks off the work of a different spy agency against a shared target, is referred to as “fourth-party collection.”</p>
<p>Snooping on diplomatic communications is a violation of Article 27 of the 1961 Vienna Convention on Diplomatic Relations, which states that the “the official correspondence of the mission shall be inviolable.”</p>
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[2] -->
<a href="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-457058321-merkel-1558387636.jpg"><img loading="lazy" decoding="async" class="aligncenter wp-image-250958 size-large" src="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-457058321-merkel-1558387636.jpg?w=1024" alt="" width="1024" height="699" srcset="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-457058321-merkel-1558387636.jpg?w=3000 3000w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-457058321-merkel-1558387636.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-457058321-merkel-1558387636.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-457058321-merkel-1558387636.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-457058321-merkel-1558387636.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-457058321-merkel-1558387636.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-457058321-merkel-1558387636.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-457058321-merkel-1558387636.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-457058321-merkel-1558387636.jpg?w=2400 2400w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a>
<figcaption class="caption source">Angela Merkel, chancellor and chair of the German Christian Democrats, attends a reception in Berlin, on Dec. 16, 2013.<br/>Photo: Sean Gallup/Getty Images</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->
<h3>The Secret History of the NSA’s Joint Venture with the CIA</h3>
<p>A <a href="https://theintercept.com/snowden-sidtoday/5987449-the-state-of-covert-collection-an-interview-with/">two</a>&#8211;<a href="https://theintercept.com/snowden-sidtoday/5987451-the-state-of-covert-collection-an-interview-with/">part</a> interview in SIDtoday provides new details about the Special Collection Service, the covert NSA joint effort with the CIA to collect signals intelligence from U.S. embassies abroad. The revelations include information on SCS’s history and examples of its missions.</p>
<p><span lang="zxx"><a href="http://www.spiegel.de/international/germany/cover-story-how-nsa-spied-on-merkel-cell-phone-from-berlin-embassy-a-930205.html">Der Spiegel</a></span> disclosed important details about SCS in 2013 using Snowden documents, including that SCS tapped the mobile phone of German Chancellor Angela Merkel.</p>
<p>Before SCS was created in 1979, the NSA and CIA ran independent, covert signals intelligence programs — sometimes &#8220;at opposite ends&#8221; of the same building — serving different missions, the director and deputy director of SCS told SIDtoday in the interview. Congress intervened, directing the CIA and NSA to run the SCS program together, presumably to save money and avoid duplicated efforts.</p>
<!-- BLOCK(pullquote)[3](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[3] --> At the Indian Embassy in Beijing, the NSA discovered that someone, possibly the Chinese government, had hacked computers inside. The NSA began regularly collecting the information for itself.<!-- END-CONTENT(pullquote)[3] --></blockquote><!-- END-BLOCK(pullquote)[3] -->
<p>Since then, the number of SCS sites has ebbed and flowed depending on budgets and operational needs. In 1988, before the Berlin Wall came down, SCS reached a peak of 88 sites worldwide, the director said. In the following years, the number decreased, only to drastically increase in the aftermath of 9/11, when no fewer than 12 new sites were added. At one point, the SCS Caracas site was shut down when it was no longer needed, only to be reopened when “anti-American Venezuelan President” Hugo Chávez was elected in 1998.</p>
<p>A separate SIDtoday <a href="https://theintercept.com/snowden-sidtoday/5987431-f6-nsa-texas-and-yakima-research-station/">article</a>, written by two NSA managers, described an SCS operation conducted against Venezuelan communications. For years, an NSA facility in Yakima, Washington, had been spying on Venezuelan satellite signals, but the “large regional satellite beams” visible from there provided “only moderately successful results.” So agents from SCS, along with an NSA analyst from Yakima, traveled to an undisclosed location, presumably close to or in Venezuela, for a clandestine three-week survey of narrow “spot beam” satellite signals sent to the country. As they collected data from over 400 newly discovered signals, team members sent this information back to analysts in Yakima, as well as San Antonio, Texas, where “dozens of links carrying traffic for Venezuelan targets of interest” were discovered.</p>
<p>The most important SCS site is probably its headquarters, located in an “attractive (&#8230;) rural location outside Laurel, MD,” according to the interview. While the address of the “tree-lined corporate campus” was included in James Bamford’s 2008 book “The Shadow Factory,” and is identified as “Special Collection Service” on <span lang="zxx"><a href="https://goo.gl/maps/hRAQAjpzSGR2">Google Maps</a></span>, the SIDtoday article is the first public document confirming the existence of the joint NSA-CIA facility.</p>
<p>“You can’t tell NSAers and the CIA people here apart” as all SCS staff wear “purple badges, a sign of our status as a joint organization,” Ron Moultrie, the deputy SCS director, told SIDtoday.</p>
<p>The CIA uses SCS sites as places from which to monitor foreign intelligence services as they attempt to track CIA assets, a practice known as counterintelligence, according to the SCS directors. The NSA, meanwhile, uses SCS sites as a “platform” for a number of operations, including computer hacking, carried out in 2006 by a unit known as Tailored Access Operations (and today called Computer Network Operations).</p>
<p>Throughout the nine years of the SIDtoday archive, SCS is promoted as an assignment for those with “a sense of adventure” and a taste for “attractive” locations. Sometimes, as was the case at SCS Damascus on September 12, 2006, things get “a little hectic.”</p>
<p>According to a firsthand account by an SCS staffer of an attack on the U.S. Embassy in Damascus, <a href="https://theintercept.com/snowden-sidtoday/5987437-was-that-a-mortar-or-a-grenade/">published</a> in SIDtoday, the sound of an explosion sent the SCS staff into lockdown mode and triggered “full emergency destruction” preparations. The attack was eventually subdued by Syrian security forces and the attackers killed. One casualty was SCS’s microwave search system: Bullets penetrated “maintenance sheds” on the embassy roof, which were actually concealing SCS antennas. One slug “severed a control cable” for the microwave searcher, “rendering the antenna inoperable,” according to SIDtoday.</p>
<p>The SCS staffer’s account stated that “two explosive-laden cars” were involved in the attack.</p>
<p>Publicly available media <span lang="zxx"><a href="http://www.washingtonpost.com/wp-dyn/content/article/2006/09/12/AR2006091200345.html">reports</a></span> <span lang="zxx"><a href="https://www.theguardian.com/world/2006/sep/12/usa.syria">describing the </a><a href="https://www.theguardian.com/world/2006/sep/12/usa.syria">incident</a></span> painted a dark picture of what would have happened if a truck “loaded with pipe bombs strapped to large propane gas canisters outside the embassy” had not failed to detonate.</p>
<!-- BLOCK(photo)[4](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[4] -->
<a href="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-57521436-dickcheney-lithuania-1558387506.jpg"><img loading="lazy" decoding="async" class="aligncenter wp-image-250957 size-large" src="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-57521436-dickcheney-lithuania-1558387506.jpg?w=1024" alt="" width="1024" height="695" srcset="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-57521436-dickcheney-lithuania-1558387506.jpg?w=3000 3000w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-57521436-dickcheney-lithuania-1558387506.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-57521436-dickcheney-lithuania-1558387506.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-57521436-dickcheney-lithuania-1558387506.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-57521436-dickcheney-lithuania-1558387506.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-57521436-dickcheney-lithuania-1558387506.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-57521436-dickcheney-lithuania-1558387506.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-57521436-dickcheney-lithuania-1558387506.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-57521436-dickcheney-lithuania-1558387506.jpg?w=2400 2400w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a>
<figcaption class="caption source">Former U.S. Vice President Dick Cheney, left, meets with Lithuanian President Valdas Adamkus at the presidential palace in Vilnius, Lithuania, on May 3, 2006.<br/>Photo: Shawn Thew/AFP/Getty Images</figcaption><!-- END-CONTENT(photo)[4] --></figure><!-- END-BLOCK(photo)[4] -->
<h3>NSA Pioneers Use of “Stingray” Cellphone Spy Towers</h3>
<p>In May 2006, the NSA made an early — and largely fruitless — attempt to use so-called Stingray devices to monitor local mobile phone conversations in Lithuania’s capital city of Vilnius, where Vice President Dick Cheney had traveled to attend a conference with regional leaders, according to an <a href="https://theintercept.com/snowden-sidtoday/5987304-going-on-tdy-to-help-protect-a-vip/">account</a> in SIDtoday.</p>
<p>Stingrays mimic cellphone towers, tricking mobile phones into connecting to them instead of to legitimate towers. This allows the Stingrays to intercept calls and texts. Two NSA linguists, as part of an SCS team, used <a href="https://theintercept.com/surveillance-catalogue/drt-1101b/">this</a> Stingray-type device to try and eavesdrop on local cellular networks. They did not have much luck; SIDtoday noted that the device “did not provide a capability against the primary cellular systems found,” although agents were able to identify “relevant airport communications and police networks.”</p>
<p>It is not clear if the effort violated <a href="http://www.lithuanialaw.com/lithuanian-criminal-code-495">laws</a> against wiretapping in Lithuania, a U.S. ally and member of NATO.</p>
<p>Unlike similar operations in which “teams need to work from unsecured hotel rooms or out-of-the-way locations such as unimproved attics,” SIDtoday said, this team worked from the comfort of a shielded enclosure within the U.S. Embassy, from which they could survey the “local wireless and [radio frequency] environment.”</p>
<p>Beginning a few days before Cheney landed in Vilnius, the SCS team monitored police communication 24 hours a day looking for “any indications of threats or problems on which the Secret Service might need to act.”</p>
<p>It didn’t find any.</p>
<h3>Weather Takes Down NSA Headquarters</h3>
<p>In summer 2006, a heat wave rendered the intelligence nerve center within the NSA’s headquarters inoperable. As the record-setting wave toasted the East Coast and brought triple-digit temperatures to the spy agency’s home in Fort Meade, Maryland, conditions “in the Baltimore area and problems with Baltimore Gas and Electric power generation caused server and communications failures around the NSA Washington complex,” SIDtoday <a href="https://theintercept.com/snowden-sidtoday/5987402-for-the-first-time-alternate-nsoc-in-georgia-is/">reported</a>. For the first time, the agency’s time-sensitive watch center functions were taken over by a backup installation of the National Security Operations Center at Fort Gordon in Augusta, Georgia.</p>
<p>The story of the NSA’s overall struggle to supply power to Fort Meade was <a href="https://www.baltimoresun.com/news/bs-xpm-2006-08-06-0608060158-story.html">reported</a> by the Baltimore Sun around the time of the outage. Author James Bamford further discussed the issue in his book “Body of Secrets,” noting that energy problems at the NSA dated to the late 1990s and seemed to be coming to a head by 2006. Bamford wrote that abundant power and a “less vulnerable” electric grid in Texas led the NSA to decide in 2007 to place a new data center there.</p>
<!-- BLOCK(pullquote)[5](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[5] -->&#8220;Problems with Baltimore Gas and Electric power generation caused server and communications failures around the NSA Washington complex.&#8221;<!-- END-CONTENT(pullquote)[5] --></blockquote><!-- END-BLOCK(pullquote)[5] -->
<p>But the 2006 outage and the switchover to Fort Gordon are revelations.</p>
<p>The National Security Operations Center, or NSOC, operates 24 hours a day, seven days a week, managing critical functions concerning possible foreign threats to national security.</p>
<p>What could have been a calamity was avoided by the emergency switch over to NSA Georgia, located at the Fort Gordon Army base near Augusta. On August 1, 2006, a backup high-priority operations center there, codenamed DECKPIN, was activated at 4:00 Zulu (Greenwich Mean Time), according to the SIDtoday story, written by the DECKPIN coordinator at Fort Gordon. Four hours later, Baltimore-area power was stabilized, and operations switched back to the NSOC at Fort Meade. The Georgia staff was put on standby again on August 3, “to ensure availability while the [electric company] work was completed.” The NSA around this time was Baltimore Gas and Electric’s biggest customer, using the same amount of power as half the city of Annapolis, according to Bamford.</p>
<p>Since 2006, new NSA facilities in Texas, Hawaii, Georgia, and Utah are sharing the load of the agency’s enormous power requirements.</p>
<h3>U.K. Base, and NSA Intern, Facilitated Death or Capture of “Chicken Man” and Other Iraq Militants</h3>
<p>In mid-2006, the NSA was closely watching a “most wanted” militant organization with a presence in Iraq, known as the Moroccan Islamic Fighting Group. The agency was struggling to eavesdrop on the group’s communications, which it said had led to a “critical gap” in intelligence.</p>
<p><span lang="en-US">However, the NSA got lucky when an intern working at the agency’s Menwith Hill surveillance base in England uncovered a network associated with the group. By tracking the communications of an Algerian bombmaker associated with the Moroccan organization, the NSA was able to identify other Islamist fighters working to manufacture explosives in Iraq, according to a July 2006 SIDtoday <a href="https://theintercept.com/snowden-sidtoday/5987252-sigint-helps-end-the-career-of-bomb-maker-in/">article</a>. The NSA discovered chatter between militants, who were apparently fighting with the Moroccan jihadis against the U.S. and its allies in Iraq. One of the militants on an intercepted phone call referred to “chickens” falling from the sky, an apparent coded reference to the downing of U.S. helicopters that previous May. The man on the phone call became known to the NSA as “Chicken Man,” and his communications proved invaluable to the U.S. spies who were listening in.</span></p>
<p>The NSA passed the intelligence it gathered from the phone calls to U.S. forces in Iraq. The analysts at Menwith Hill — working with NSA employees at the agency’s base in Augusta, Georgia — continued to keep tabs on the jihadis. Then, between May 23 and May 25, 2006, the U.S. military launched operations that resulted in the killing and capture of nine mostly foreign fighters, including Chicken Man, according to the SIDtoday article.</p>
<p><span lang="en-US">Menwith Hill is the NSA’s largest overseas surveillance base and continues to play a key role in U.S. military operations around the world. As The Intercept has </span><span lang="zxx"><a href="https://theintercept.com/2016/09/06/nsa-menwith-hill-targeted-killing-surveillance/"><span lang="en-US">previously reported</span></a></span><span lang="en-US">, the spy hub has been used to aid “a significant number of capture-kill operations” across the Middle East and North Africa, according to NSA documents, and is equipped with eavesdropping technology that can vacuum up more than 300 million emails and phone calls a day. Human rights groups and some British politicians have demanded more information about the role of Menwith Hill in controversial U.S. drone strikes and other lethal operations, arguing that the base is unaccountable to British citizens and is shrouded in too much secrecy.</span></p>
<!-- BLOCK(photo)[6](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[6] -->
<a href="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-833395188-menwith-hill-1558387917.jpg"><img loading="lazy" decoding="async" width="2187" height="1379" class="aligncenter size-large wp-image-250959" src="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-833395188-menwith-hill-1558387917.jpg" alt="GettyImages-833395188-menwith-hill-1558387917" srcset="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-833395188-menwith-hill-1558387917.jpg?w=2187 2187w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-833395188-menwith-hill-1558387917.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-833395188-menwith-hill-1558387917.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-833395188-menwith-hill-1558387917.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-833395188-menwith-hill-1558387917.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-833395188-menwith-hill-1558387917.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-833395188-menwith-hill-1558387917.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2019/05/GettyImages-833395188-menwith-hill-1558387917.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">Menwith Hill Station, located about nine miles west of the small town of Harrogate in North Yorkshire, is a vital part of the NSA’s sprawling global surveillance network.<br/>Photo: John Giles/PA Images/Getty Images</figcaption><!-- END-CONTENT(photo)[6] --></figure><!-- END-BLOCK(photo)[6] -->
<h3>Breakthroughs in Locating Internet Cafes in Iraq</h3>
<p>During the Iraq War, suspected insurgents often accessed the internet from public computers at internet cafes, as <a href="https://theintercept.com/2017/09/13/sloppy-u-s-spies-misused-covert-network-for-personal-shopping-and-other-stories-from-internal-nsa-documents/#cafes">previous SIDtoday reporting described</a>. Even when the NSA could intercept internet traffic from a cafe, the agency couldn’t always determine where the cafe was located. But in 2006, the NSA had two separate breakthroughs in how it conducted surveillance against internet service providers in Iraq, allowing them to pinpoint the exact location of many more cafes.</p>
<p>“We’ve had success in targeting cafes over the past year,” a July 2006 <a href="https://theintercept.com/snowden-sidtoday/5987272-breakthrough-previously-unfindable-internet/">article</a> stated, “but until recently there was a major gap in our capabilities.” The network run by a popular provider of internet service to cafes across Iraq was so complicated that, even when analysts knew the IP addresses of the cafes, they couldn’t narrow down their locations beyond what city they were in.</p>

<p>By surveilling satellite signals, and with the help of hackers at a division known as Tailored Access Operations, the NSA managed to intercept the internet service provider’s customer database. The agency also installed its system for searching signals intelligence, <a href="https://theintercept.com/2015/07/01/nsas-google-worlds-private-communications/">XKEYSCORE</a>, at a new field site in Mosul, allowing it to conduct bulk surveillance of internet traffic traveling through the region. With the knowledge of who the ISP’s customers were, combined with internet surveillance, “previously un-locatable cafes have been found and at least four ‘wanted’ [alleged] terrorists have been captured.”</p>
<p>Another SIDtoday <a href="https://theintercept.com/snowden-sidtoday/5987486-mhs-system-locates-high-interest-internet-cafes/">article</a>, from December 2006, credited analysts working in the NSA’s British base at Menwith Hill with locating internet cafes in the Iraqi city of Ramadi that were allegedly used by associates of Al Qaeda leader Abu Ayyub Al-Masri. It did this through an intiative known as GHOSTHUNTER, which mapped locations of small, &#8220;<a href="https://www.mobilsat.com/VSAT/">VSAT</a>&#8221; satellite dishes throughout the region.</p>
<p>&#8220;Terminals from the current top three VSAT technologies in the Middle East — DirecWay, Linkstar, and iDirect — have<br />
all been successfully located as part of the GHOSTHUNTER initiative,&#8221; the article said, including 150 terminals &#8220;on networks of interest&#8230; in Baghdad, Ramadi, and neighboring cities.”</p>
<h3>Intellipedia: the Intelligence Community’s Classified Wiki</h3>
<p>A November 2006 <a href="https://theintercept.com/snowden-sidtoday/5987446-intellipedia-it-s-for-analysts/">article</a> in SIDtoday described Intellipedia, a wiki for analysts throughout the intelligence community, with information limited based on clearance level. At the time, the tool had “only about 20 registered users” from the NSA, compared with over 200 at the CIA, which had been leading the charge to promote the wiki, even offering staff a six-day sabbatical to study it and other collaboration tools.</p>
<p>After hearing “rave reviews” about a CIA’s Intellipedia sabbatical, plans to adopt the training for NSA employees were in the works, according to an early 2007 <a href="https://theintercept.com/snowden-sidtoday/5987509-a-new-day-intellipedian-pioneers-speak-at-nsa/">article</a>, and one of the CIA’s Intellipedia “pioneers” gave presentations to NSA analysts about the platform.</p>
<p>On January 28, 2014, the top-secret version of Intellipedia had 255,402 users and 113,379 pages; the secret version had 214,801 users and 107,349 pages; and the unclassified version had 127,294 users and 48,274 pages, according to the NSA’s <a href="https://www.muckrock.com/foi/united-states-of-america-10/intellipedia-usage-statistics-10058/">response</a> to a Freedom of Information Act request.</p>
<p>As part of an investigation into cyberattacks that target hardware supply chains, The Intercept published multiple top-secret Intellipedia wiki pages. These include the “<a href="https://theintercept.com/document/2019/01/24/intellipedia-air-gapped-network-threats/">Air-Gapped Network Threats</a>” page, the “<a href="https://theintercept.com/document/2019/01/24/intellipedia-bios-threats/">BIOS Threats</a>” page, and “<a href="https://theintercept.com/document/2019/01/24/intellipedia-supply-chain-cyber-threats/">Supply Chain Cyber Threats</a>” page.</p>
<p>According to SIDtoday, Intellipedia was introduced alongside two other tools to bring classified information into the internet age: a classified instant messaging system linking the NSA, CIA, and other intelligence agencies, as well as blog platform “for sharing your knowledge and your point of view with others.”</p>
<p>The post <a href="https://theintercept.com/2019/05/29/nsa-sidtoday-surveillance-intelligence/">Meltdown Showed Extent of NSA Surveillance — and Other Tales From Hundreds of Intelligence Documents</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2019/05/29/nsa-sidtoday-surveillance-intelligence/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2019/05/GettyImages-56667803-nsa-1558386852-e1558386936364.jpg?fit=3000%2C1492' width='3000' height='1492' /><post-id xmlns="com-wordpress:feed-additions:1">247109</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/AP_05081202608-SA6-russian-1558388039.jpg?fit=2000%2C1353" medium="image">
			<media:title type="html">AP_05081202608-SA6-russian-1558388039</media:title>
			<media:description type="html">Russian SA-6 self-propelled surface-to-air missiles systems, sans missiles, are loaded onto ships at a Russian military base in the Black Sea port of Batumi in Georgia, on Aug. 12, 2005.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/05/AP_05081202608-SA6-russian-1558388039.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-457058321-merkel-1558387636.jpg?fit=3000%2C2047" medium="image">
			<media:title type="html">GettyImages-457058321-merkel-1558387636</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-457058321-merkel-1558387636.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-57521436-dickcheney-lithuania-1558387506.jpg?fit=3000%2C2035" medium="image">
			<media:title type="html">GettyImages-57521436-dickcheney-lithuania-1558387506</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-57521436-dickcheney-lithuania-1558387506.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-833395188-menwith-hill-1558387917.jpg?fit=2187%2C1379" medium="image">
			<media:title type="html">GettyImages-833395188-menwith-hill-1558387917</media:title>
			<media:description type="html">Menwith Hill Station, located about nine miles west of the small town of Harrogate in North Yorkshire, is a vital part of the NSA’s sprawling global surveillance network.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-833395188-menwith-hill-1558387917.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Mission Creep: How the NSA’s Game-Changing Targeting System Built for Iraq and Afghanistan Ended Up on the Mexico Border]]></title>
                <link>https://theintercept.com/2019/05/29/nsa-data-afghanistan-iraq-mexico-border/</link>
                <comments>https://theintercept.com/2019/05/29/nsa-data-afghanistan-iraq-mexico-border/#respond</comments>
                <pubDate>Wed, 29 May 2019 16:06:17 +0000</pubDate>
                                    <dc:creator><![CDATA[Henrik Moltke]]></dc:creator>
                                		<category><![CDATA[National Security]]></category>
		<category><![CDATA[release-may-2019]]></category>
		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=248560</guid>
                                    <description><![CDATA[<p>The revolutionary NSA system merged different sources of electronic surveillance to rapidly map enemy fighters. The ramifications are still being felt.</p>
<p>The post <a href="https://theintercept.com/2019/05/29/nsa-data-afghanistan-iraq-mexico-border/">Mission Creep: How the NSA’s Game-Changing Targeting System Built for Iraq and Afghanistan Ended Up on the Mexico Border</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-65243" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" srcset="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=720 720w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=540 540w" sizes="auto, (max-width: 720px) 100vw, 720px" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] --><u>In November 2005,</u> two terminals for a new secure communications platform arrived at the&nbsp;U.S. military base at Bagram Airfield, outside Afghanistan’s capital, Kabul. The first of its kind, the system would enable the U.S.’s electronic eavesdropping organization, the National Security Agency, to instantaneously share select classified information with America’s closest allies in the fight against the Taliban, speeding the delivery of critical information to soldiers. Previously, the only way to pass intelligence at Bagram between the U.S. and partner nations was to <a href="https://theintercept.com/snowden-sidtoday/4755568-new-tool-put-into-play-in-afghanistan/">hand it over as hard copy</a>. These two first nodes in what would eventually become a larger network, known as CENTER ICE, would end the paper shuffling, ultimately saving the lives of troops in combat.</p>
<p>The NSA was to set up one of the two initial systems at Bagram for its own use, and the other for its counterpart from Norway, the Norwegian Intelligence Service, or NIS. The Norwegians were perfect guinea pigs. A “gregarious, friendly bunch” who threw good barbecue parties, they had “almost no collection capability” to eavesdrop independently and were thus “heavily dependent on the U.S.,” an NSA staffer at Bagram later <a href="https://theintercept.com/snowden-sidtoday/5987257-putting-a-new-tactical-comms-system-to-good-use/">wrote on an internal agency news site</a>, SIDtoday. (The article and the other intelligence documents in this story were provided by NSA whistleblower Edward Snowden.) One of the new terminals failed when the NSA attempted to turn it on, but after the provision of some “<a href="https://theintercept.com/snowden-sidtoday/4755568-new-tool-put-into-play-in-afghanistan/">necessary spares</a>,” both were operational.</p>
<p>Spies from the two nations were about to get a dramatic example of how powerful the digitization of intelligence-sharing could be. One morning a few weeks after CENTER ICE went live, the Norwegians sent an urgent email using the new system: “Our guys think they are being shadowed&#8230; Are you seeing anything?”</p>
<p>Norwegian marines were indeed being followed and “were ambushed later in the day,” the NSA staffer wrote. But thanks to CENTER ICE, the “ambush ended with bombs dropped on some ACMs [anti-coalition militants] and all Norwegian personnel unharmed.” In another incident, Norwegian forces suddenly found themselves surrounded and under heavy gunfire in Helmand Province, an insurgent hotbed in Afghanistan’s south. More enemies were approaching. NIS staff “weren&#8217;t hearing anything,” so they messaged the Americans on CENTER ICE and once again were able to “extricate themselves with no injuries” thanks to the NSA’s ability to track the militants.</p>
<p>“This initial success was exactly what we hoped would happen as a CENTER ICE proof of concept,” <a href="https://theintercept.com/snowden-sidtoday/4755568-new-tool-put-into-play-in-afghanistan/">wrote</a> the NSA staffer.</p>
<p>CENTER ICE was just the beginning, a step toward a much more aggressive experiment in the same vein. Norway would soon be among the first coalition partners to share, in real time, a wide range of data on Afghanistan, including essentially raw information scooped up from cellphones and fed into a revolutionary new local processing system called the Real Time Regional Gateway, or RT-RG. In 2011, according to documents published with this story, intelligence drawn from RT-RG was involved in more than 70 percent of all combat operations in Afghanistan, including 6,534 “enemies killed in action.”</p>
<p>There has been some public scrutiny of how the United States relied heavily on signals intelligence for those killings, which often resulted in civilian casualties.</p>
<p>But the fact that Norway and some of the U.S.’s closest allies helped feed this system with their own spy work has not been reported before. This is partly because documents linked to Norway’s participation in RT-RG, when examined in 2013, were misunderstood by various journalists, including two co-founders of The Intercept, as indicating that the NSA was engaged in mass spying on the citizens of allied countries, including Germany, France, Spain, Norway, and Italy.</p>
<p>A set of documents from the Snowden archive about RT-RG, reviewed by The Intercept <a href="https://www.nrk.no/dokumentar/xl/norges-hemmelige-krig-1.14539055">in partnership with the Norwegian Broadcasting Corporation</a>, or NRK, sheds new light on how Norway came to depend on real-time intelligence-sharing to save Norwegian lives, while at the same time contributing to targeted killings and captures with no oversight or control over how data it had collected was used.</p>
<p>The revelations raise questions about the complicity of the U.S.&#8217;s other European partners in such controversial targeting practices and underline how RT-RG blurred the lines between sources of intelligence, corroding the ability of partners to impose special rules on how their data was handled — a particularly salient issue now that the system is in use by U.S. law enforcement entities.</p>
<p>Norwegian Defense Minister Frank Bakke-Jensen told NRK that Norway is not responsible if intelligence it shared was used by other nations — such as the U.S. — to kill innocent civilians. &#8220;We have no control over how another nation uses this information, but we require that they operate within International Law,&#8221; the defense minister said. He added that Norway does not review how data shared by the Norwegian intelligence service is used.</p>
<p>“There is no doubt that Norway was a full-fledged participant in this cooperation,” Kristian Berg Harpviken, a leading Afghanistan expert from the Peace Research Institute Oslo, told NRK. “We bought the whole package, so we must take responsibility for the totality of the war.&#8221;</p>
<!-- BLOCK(pullquote)[1](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[1] -->“We bought the whole package, so we must take responsibility for the totality of the war.&#8221;<!-- END-CONTENT(pullquote)[1] --></blockquote><!-- END-BLOCK(pullquote)[1] -->
<p>The documents also show how RT-RG, within less than five years, migrated from the battlefields of Iraq and Afghanistan to the U.S.-Mexico border, where it was used to combat drug trafficking and people smuggling — a vastly different type of mission.</p>
<p>“The news that the NSA transported a mass spying program designed for war zones in Iraq and Afghanistan to the U.S.-Mexico border is both alarming and totally unsurprising,” said Elizabeth Goitein, co-director of the Liberty and National Security Program at the Brennan Center for Justice. “Mass surveillance is always initially justified as a necessary defense against foreign enemies. Then comes the inevitable mission creep, as surveillance methods originally conceived as tools of war or foreign espionage are brought home and turned inward.”</p>
<h3>The Whole Haystack</h3>
<p>The first Real Time Regional Gateway was deployed to Baghdad in early 2007. The timing was no coincidence. Four years in, Operation Iraqi Freedom, the U.S.-led military invasion of Iraq, had descended into sectarian violence and anti-coalition attacks, resulting in an all-time high number of casualties.</p>
<p>In spite of a massive surge of U.S. troops, the security situation was deteriorating, with roadside bombs and other improvised explosive devices increasingly common. In the Green Zone, Baghdad’s fortress-like international area, mortars and rockets rained down, requiring U.S. Embassy staffers to wear flak jackets and bulletproof helmets when walking between buildings, “worn out and tired of sitting in hallways,” as one SIDToday <a href="https://theintercept.com/snowden-sidtoday/5987519-hollywood-special-effects-no-it-s-modern-day/">update</a> put it.</p>
<p>This dire situation provided an opportunity for then-NSA Director Keith Alexander, who firmly believed that his agency could make the difference needed to win the war. His opening gambit was a system called RT10 — a “very high-priority initiative at NSA” at the time, according to Alexander’s science adviser, engineer James E. Heath. “The goal of RT10 is to get essential NSA cryptologic capabilities to the military front lines in a matter of seconds and minutes (‘real time’), not hours and days,” Heath <a href="https://theintercept.com/snowden-sidtoday/5987511-rt10-getting-information-to-the-front-lines-in/">wrote</a> in SIDtoday.</p>
<p>The new system, Heath explained, would do away with the “latencies associated with transmitting and ingesting collection,&#8221; i.e. sending data acquired in Iraq back to NSA facilities in the U.S. By storing and processing the data locally, there would be less need to filter it, allowing for a wider net to be cast so that the NSA would have much more data available for retrospective analysis.</p>
<p>“Collection that would otherwise have been discarded because it could not be directly linked to a known target is now subjected to analytic algorithms that can reveal new targets of interest,” Heath wrote. In order to cover Baghdad, the RT10 system would need to be able to ingest 100 million “call events” or metadata records,&nbsp;1 million “voice cuts” or recordings of phone calls, and another 100 million internet metadata records — per day.</p>
<p>At these volumes, RT10, the first iteration of what would become Real Time Regional Gateway, signaled a radical shift from traditional signals intelligence doctrine: from collecting and storing only what’s needed to find the “needle in the haystack” to Alexander’s “collect-it-all” philosophy, first described in a <a href="https://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html?utm_term=.ea413328e507">Wa</a><a href="https://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html?utm_term=.ea413328e507">shington </a><a href="https://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html?utm_term=.ea413328e507">P</a><a href="https://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html?utm_term=.ea413328e507">ost</a> article by a former intelligence official as “Let’s collect the whole haystack.”</p>
<p>According to a PowerPoint <a href="https://theintercept.com/document/2018/01/19/rt-initiative-overview/">presentation</a> authored by Heath, RT10 would result in “better decisions in less time.” Not only would it be able to geolocate targets almost immediately based on their cellphones, if offered “pattern-of-life” analysis, detecting when targets used multiple phones or otherwise “deviate in behavior.”</p>
<p>In one instance, RT-RG was put to task against a “particularly elusive” Iraqi target who was ”known to take his cell phone completely apart when he went home to prevent our tracking,” <a href="https://theintercept.com/snowden-sidtoday/5987513-follow-the-honey/">according</a> to SIDtoday.</p>
<p>Unable to properly distill&nbsp;the target&#8217;s pattern of life, NSA analysts instead turned the powerful surveillance tool against his wife. She would travel to south Baghdad on weekends to be with her husband, thus revealing a likely future location at which he would be vulnerable. So the combat team “locked onto the wife&#8217;s cell phone selector for confirmation” and “raided the location identified by the RT-RG tools.”</p>
<h3>The Rockets Stopped Falling</h3>
<p>RT-RG soon attracted interest from outside the military and for military operations well outside Iraq. An NSA employee deployed to Baghdad in 2009 <a href="https://theintercept.com/snowden-sidtoday/5987519-hollywood-special-effects-no-it-s-modern-day/">described, in SIDtoday</a>, how he was asked to demonstrate the system to enthusiastic representatives from the FBI and other government agencies. The employee showed off a screen mapping live insurgent movements, with “Arabic text messages scrolling across the bottom as the insurgents sent messages” to one another.</p>
<blockquote><p>I could see it was starting to sink in with many of the ops guys&#8230; An analyst from the FBI raised his hand and, pointing at the screen, asked, “Is this why the rockets stopped falling on the Green Zone?” &#8212; shaking his head in awe, he watched [as] one of his own targets moved across the screen, tracked in near real-time &#8212; to which I nodded and smiled.</p></blockquote>
<p>By the time the Real Time Regional Gateway was churning away at the haystacks of data emerging from the Baghdad area, plans for a new RT-RG installation in Afghanistan were already in full swing.</p>
<p>Back at Bagram, where CENTER ICE had made its debut, a new state-of-the-art data center was to be erected for RT-RG in a mine-strewn, far-off corner of the airfield called Area 82. Several <a href="https://theintercept.com/document/2019/05/29/gchq-bagram-presentation-2010/">documents</a> in the Snowden archive reflect an unmistakable <a href="https://theintercept.com/snowden-sidtoday/5987523-innovative-super-sized-sigint-facility-opens-in/">pride</a> in bringing advanced cloud computing infrastructure to this desert plot in Afghanistan, a country&nbsp;where internet access was banned by the Taliban in 2001.</p>

<div class="photo-grid photo-grid--2-col photo-grid--xtra-large">
  <div class="photo-grid__row">
          <div class="photo-grid__item photo-grid__item--1">
        <img decoding="async"
          class="photo-grid__photo"
          src="https://theintercept.com/wp-content/uploads/2019/05/Bagram_Build_map-left-1557954429-1000x673.jpg"
          alt=""
          loading="lazy" >
      </div>
          <div class="photo-grid__item photo-grid__item--2">
        <img decoding="async"
          class="photo-grid__photo"
          src="https://theintercept.com/wp-content/uploads/2019/05/Bagram_Build_map-right-1557954430-1000x673.jpg"
          alt=""
          loading="lazy" >
      </div>
      </div>

  <p class="photo-grid__description">
    <span class="photo-grid__caption">Right/Top: Area 82 in early 2009. The RT-RG data center is seen in the middle. Left/Bottom: Area 82 in June 2010.</span>
    <span class="photo-grid__credit">Photos: NSA</span>
  </p>
</div>
<p>In August 2007, around the time when construction started on Area 82, Dutch military intelligence in Oruzgan Province in central Afghanistan, followed in early 2008 by Germans in the northern cities of Mazar-e-Sharif and Kunduz, and Danes in Helmand in the southwest, began using a new technology they had acquired through an NSA technology transfer program, <a href="https://theintercept.com/document/2019/05/29/nsa-afghanistan-coalition-dissemination-brief-to-senior-leadership-forum-2009">an agency slide indicates</a>.</p>
<p>The new technology simulated the radio receivers operated by mobile phone companies, tricking cellphones into connecting and then intercepting their communications. It was employed by devices commonly referred to as Stingrays, after one early brand, and dirtboxes, after the manufacturer Digital Receiver Technology Inc., which <a href="https://boeing.mediaroom.com/2008-11-14-Boeing-Boeing-to-Acquire-Digital-Receiver-Technology-to-Enhance-Capabilities-in-Intelligence-Market">Boeing bought in 2008</a>.</p>
<p>Ahead of European allies’ deployment to Afghanistan, they would have purchased and received training from the NSA in “specific Digital Receiver Technology (DRT) capabilities” in order to “exploit the communications they are expected to encounter,” as arranged for Spanish forces in 2005 and <a href="https://theintercept.com/snowden-sidtoday/4389791-spanish-partner-seeks-nsa-assistance-with/">described by</a> SIDtoday.</p>
<p>The DRT collection units were part of a bigger plan: to feed the newly constructed data center in Bagram with intercepted mobile phone communications from areas in Afghanistan&nbsp;where the NSA previously had little or no coverage.</p>
<p><!-- BLOCK(photo)[5](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[5] -->
<img loading="lazy" decoding="async" width="1493" height="1120" class="aligncenter size-large wp-image-250342" src="https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-MAP-tiff-1557954582.jpg" alt="Afghan-sharing-slides-MAP-tiff-1557954582" srcset="https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-MAP-tiff-1557954582.jpg?w=1493 1493w, https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-MAP-tiff-1557954582.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-MAP-tiff-1557954582.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-MAP-tiff-1557954582.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-MAP-tiff-1557954582.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-MAP-tiff-1557954582.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source">A map included in an NSA PowerPoint presentation “partner operating locations” in Afghanistan in February 2009. For each partner, the number of DRTs or &#8220;dirtboxes&#8221; is indicated, along with the&nbsp;month and year&nbsp;they became operational. France would deploy their DRTs later.<br/>Image: NSA</figcaption><!-- END-CONTENT(photo)[5] --></figure><!-- END-BLOCK(photo)[5] -->Photographs included in the data flow document show the RT-RG data center at Area 82 during the final stages of construction, with trucks bringing reinforced steel beams into a hangar and an advanced cooling system in place for the servers.<br />
<!-- BLOCK(photo)[6](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[6] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-250357 size-large" src="https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08-2-TIFF-copy-1557955508.jpg?w=1024" alt="Afghan_RTRG_dataflow_status_21_May_08-2-TIFF-copy-1557955508" width="1024" height="769" srcset="https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08-2-TIFF-copy-1557955508.jpg?w=1495 1495w, https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08-2-TIFF-copy-1557955508.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08-2-TIFF-copy-1557955508.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08-2-TIFF-copy-1557955508.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08-2-TIFF-copy-1557955508.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08-2-TIFF-copy-1557955508.jpg?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<figcaption class="caption source">The Afghanistan Real Time Regional Gateway data center at Area 82 in Bagram airfield, during construction. Several documents in the Snowden archive reflect an unmistakable pride in bringing advanced cloud-computing infrastructure to this desert plot in Afghanistan, where the Taliban banned&nbsp;internet access in 2001.<br/>Image: NSA</figcaption><!-- END-CONTENT(photo)[6] --></figure><!-- END-BLOCK(photo)[6] --></p>
<p>The “gregarious” Norwegians started collecting cellphone communications using two DRT systems from two locations outside Kabul in February 2008. Sometime between April and June the same year, Norway, Denmark, the Netherlands, Germany, and Spain were scheduled to start feeding metadata intercepted from mobile phones by DRTs into RT-RG, according a <a href="https://theintercept.com/document/2019/05/29/excerpt-of-may-2008-nsa-afghanistan-dataflow-analysis">document tracking the “dataflow status” of the project</a>.</p>
<p><!-- BLOCK(photo)[7](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[7] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-250358 size-large" src="https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08_excerpt-TIFF-copy-1557955591.jpg?w=1024" alt="Afghan_RTRG_dataflow_status_21_May_08_excerpt-TIFF-copy-1557955591" width="1024" height="760" srcset="https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08_excerpt-TIFF-copy-1557955591.jpg?w=1650 1650w, https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08_excerpt-TIFF-copy-1557955591.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08_excerpt-TIFF-copy-1557955591.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08_excerpt-TIFF-copy-1557955591.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08_excerpt-TIFF-copy-1557955591.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08_excerpt-TIFF-copy-1557955591.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08_excerpt-TIFF-copy-1557955591.jpg?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<figcaption class="caption source">An NSA document shows that the Netherlands, Denmark, Norway, Germany, and Spain were scheduled to start feeding cellphone metadata intercepted with DRTs or “dirtboxes” in Afghanistan into the Real Time-Regional Gateway by May 2008.<br/>Image: NSA</figcaption><!-- END-CONTENT(photo)[7] --></figure><!-- END-BLOCK(photo)[7] -->By <a href="https://theintercept.com/document/2018/01/19/sidtoday-real-time-regional-gateway-overview/">July 2008</a>, the Afghanistan Real Time Regional Gateway was operational and cellphone metadata from numerous sources poured into the system. RT-RG now had new features, such as notifications when “specified terms of interest,” presumably words or names flagged by analysts, were used during phone conversations, or when a targeted speaker was identified based on previous recordings. (For more on voice recognition, see this Intercept <a href="https://theintercept.com/2018/01/19/voice-recognition-technology-nsa/">report</a> and <a href="https://theintercept.com/2018/08/15/nsa-edward-snowden-whistleblower-document-leaks/#voice">follow-up</a>.)</p>
<p>Voice-monitoring capabilities were provided by a system called ONEROOF, which held audio intercepts. Together, ONEROOF and RT-RG enhanced “the warfighter&#8217;s ability to ‘find, fix, and finish’ the adversary,” that is, to locate, kill, or capture a human target, <a href="https://theintercept.com/snowden-sidtoday/5987522-what-are-the-latest-sigint-developments-in-iraq/">an NSA liaison to the military’s Central Command told SIDtoday</a>.</p>
<p>So-called target development procedures that would normally require an analyst on the other side of the globe to query different databases and use a number of tools to manually enrich the intelligence <a href="https://theintercept.com/document/2019/05/29/nsa-presentation-on-rtrg-analytics-for-forward-users">were automatically available in RT-RG</a>, provided it had enough data.</p>
<p>For example, instead of an analyst manually querying phone metadata for specific events that would help determine the likely “bed down” location where a target would sleep, RT-RG would automatically pre-calculate such locations for all entered targets. It would automatically look for people traveling with a target. And it would visualize the results of these traditionally time-consuming tasks with color-coded overlays on satellite images, so that military commanders could make quicker, and supposedly better, decisions in the theater.</p>
<!-- BLOCK(photo)[8](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[8] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-250346 size-large" src="https://theintercept.com/wp-content/uploads/2019/05/Presentation1-2-1557954725.jpg?w=1024" alt="Presentation1-2-1557954725" width="1024" height="703" srcset="https://theintercept.com/wp-content/uploads/2019/05/Presentation1-2-1557954725.jpg?w=1818 1818w, https://theintercept.com/wp-content/uploads/2019/05/Presentation1-2-1557954725.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2019/05/Presentation1-2-1557954725.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2019/05/Presentation1-2-1557954725.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2019/05/Presentation1-2-1557954725.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2019/05/Presentation1-2-1557954725.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2019/05/Presentation1-2-1557954725.jpg?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<figcaption class="caption source">An example from a presentation about RT-RG&#8217;s ability to visualize intercepted data spatially. This “heat map” show a target’s call activity (blue means &#8220;fewer calls,” red means “more calls”). A text message sent by a target is automatically translated from Arabic and overlaid on Google Earth. This information helps a military commander “find, fix, and finish” the adversary.<br/>Image: NSA</figcaption><!-- END-CONTENT(photo)[8] --></figure><!-- END-BLOCK(photo)[8] -->
<h3>In One Year, 6,534 “Enemies Killed in Action&#8221;</h3>
<p>RT-RG did not just make U.S. forces more lethal; it changed how they fought. A longtime NSA analyst <a href="https://theintercept.com/snowden-sidtoday/5987517-sigint-then-and-now-vietnam-vs-iraq/">put it this way in SIDtoday</a>: Unlike in Vietnam, where the enemy mainly used Morse code over the radio, today’s enemy “is mainly using the mobile phone to communicate.” New technology “has allowed us to exploit a mobile communication for its content (‘find’) (..) and pinpoint its location (‘fix’) within a very small radius,” requiring “only a platoon-sized force (if that) &#8230; to action (‘finish’) the target.” A platoon normally includes roughly one dozen to four dozen soldiers.</p>
<p>In the words of the then commander of U.S. and allied Afghanistan forces, Gen. David Petraeus, quoted in <a href="https://theintercept.com/document/2019/05/29/nsa-presentation-on-rtrg-analytics-for-forward-users">a presentation prepared for a conference of technical minds from the NSA and its closest allies</a>, “RTRG is the most significant [signals intelligence] support to the war fighter in the last decade.” But while RT-RG would reduce the number of troops needed on the ground, it coincided with an increased number of NSA staffers and soldier-spies deployed to war zones. As former NSA Deputy Director Rick Ledgett <a href="https://cryptologicfoundation.org/visit/museum/museum_exhibits/recentexhibits/real-time-regional-gateway-display.html">stated</a> publicly, the NSA “deployed 5,000 NSA people to Iraq, and 8,000 to Afghanistan – and in total 18,000 to hostile areas around the world.”</p>
<p>At the same time, reliance on signals intelligence, or “SIGINT,” increased dramatically in the battlefield.</p>
<p>“Over 80% of combat operations in Afghanistan are driven by SIGINT or have SIGINT contribution,” former NSA Afghanistan representative Brian Goodman <a href="https://theintercept.com/snowden-sidtoday/5987518-what-s-really-going-on-in-afghanistan-an/">told SIDtoday in 2009</a>. ”That is an indisputable fact. … Not a single combat operation goes on without SIGINT coverage.”</p>
<p>Two years later, in 2011, RT-RG “played a key role in 90 percent of all SIGINT developed operations,” according to the conference presentation. This translated to 2,270 capture/kill operations, 6,534 “enemies killed in action,” and 1,117 detainees. In comparison, the U.S. recorded 415 casualties in Afghanistan in 2011, while the U.K. and other nations recorded a total 148, according to <a href="http://icasualties.org/">iCasualties.org</a>. (The presentation did not qualify the terms “enemy” or “killed in action,” or mention whether operations based on intelligence from RT-RG lead to the death or capture of the wrong people.)</p>
<!-- BLOCK(photo)[9](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[9] -->
<img loading="lazy" decoding="async" width="2000" height="1500" class="aligncenter size-large wp-image-250347" src="https://theintercept.com/wp-content/uploads/2019/05/readfiles_042_slide4-1557954777.jpg" alt="readfiles_042_slide4-1557954777" srcset="https://theintercept.com/wp-content/uploads/2019/05/readfiles_042_slide4-1557954777.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2019/05/readfiles_042_slide4-1557954777.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2019/05/readfiles_042_slide4-1557954777.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2019/05/readfiles_042_slide4-1557954777.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2019/05/readfiles_042_slide4-1557954777.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2019/05/readfiles_042_slide4-1557954777.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2019/05/readfiles_042_slide4-1557954777.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source">A top-secret NSA statistic shows that the Afghanistan Real Time Regional Gateway played a key role in 90 percent of operations that involved signals intelligence. According to another NSA document, 80 percent of all combat operations involved RT-RG. In 2011, this translated into 2,270 capture/kill operations, 6,534 “enemies killed in action,” and 1,117 detainees.<br/>Image: NSA</figcaption><!-- END-CONTENT(photo)[9] --></figure><!-- END-BLOCK(photo)[9] -->
<h3>Quid Pro Quo Intelligence-Sharing</h3>
<p>As RT-RG became increasingly central to waging war in Afghanistan, the U.S. encouraged allies to put more data into it, upping their complicity in what would later be exposed as a deeply flawed infrastructure for killing and capturing those flagged as enemies.</p>
<p>The U.S. side of this system for killing people, often on the basis of phone monitoring, has been documented. One Intercept <a href="https://theintercept.com/2014/02/10/the-nsas-secret-role/">report</a> described how U.S. drone strikes would hit the wrong people because targets had begun swapping identifying SIM cards out of their phones, aware of their adversary’s ability to track handsets. <a href="https://theintercept.com/drone-papers/manhunting-in-the-hindu-kush/">Another</a>&nbsp;report, part of the <a href="https://theintercept.com/drone-papers/">Drone Papers</a>, detailed how, during a five-month campaign in northeastern Afghanistan, “nearly nine out of 10 people who died in airstrikes were not the Americans’ direct targets.” The Drone Papers also <a href="https://theintercept.com/drone-papers/manhunting-in-the-hindu-kush/">revealed</a> how “military-aged males” killed in drone strikes would be labeled as enemies killed in action unless there was information indicating otherwise.</p>
<p>The participation of Norway, and other U.S. intelligence partners, in feeding this lethal system has not received the same level of popular attention.</p>
<p>Indeed, the main difference between the Iraq and Afghanistan implementations of the Real Time Regional Gateway was the introduction of extensive intelligence-sharing between coalition partners.</p>
<p>To manage this complex, multinational environment, the U.S. came up with what was essentially a tiered model,&nbsp;in which the closest partners enjoyed the best access to lifesaving intelligence in return for filling collection gaps and sharing scarce resources, such as linguists<i>.</i> This new approach, <a href="https://theintercept.com/snowden-sidtoday/5987521-sid-fad-presentation-enabling-coalition-partners/">according to a SIDtoday announcement</a>, was put in motion on the NSA’s initiative “to include greater reliance on our” signals intelligence partners in response to a “potential troop buildup in Afghanistan” and “expected new information needs.”</p>
<p>A June 2009 NSA <a href="https://theintercept.com/document/2019/05/29/nsa-afghanistan-coalition-dissemination-brief-to-senior-leadership-forum-2009">briefing</a> laid out the structure of the Afghanistan spying coalition.</p>
<!-- BLOCK(photo)[10](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[10] -->
<img loading="lazy" decoding="async" width="2000" height="1500" class="aligncenter size-large wp-image-250348" src="https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2-1557954833.jpg" alt="Afghan-sharing-slides-18-June-09_Version2-1557954833" srcset="https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2-1557954833.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2-1557954833.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2-1557954833.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2-1557954833.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2-1557954833.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2-1557954833.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2-1557954833.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source">In Afghanistan, the NSA&#8217;s foreign partner agencies were given access to lifesaving intelligence according to their level of relationships. The closest partners shared cellphone metadata and other intelligence in “real time.”<br/>Image: NSA</figcaption><!-- END-CONTENT(photo)[10] --></figure><!-- END-BLOCK(photo)[10] -->
<p>At the top level was the U.S. plus its so-called second-party partners: the U.K., Canada, Australia, and New Zealand, also known as the Five Eyes, with full access to signals intelligence and “complete integration of SIGINT operations.”</p>
<p>At the second-highest tier was the newly formed group called the Afghanistan SIGINT Coalition or Nine Eyes, which added Norway, Denmark, France, and the Netherlands to the five.</p>
<p>Access to Nine Eyes required sharing the mobile phone surveillance collected using the newly acquired dirtboxes in real time or near real time. In return, members got access to data from RT-RG, “real-time threat warning,” “find-fix-focus collaboration and analysis,” and superior targeting and geolocation data, according to the June 2009 briefing.</p>
<!-- BLOCK(photo)[11](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[11] -->
<img loading="lazy" decoding="async" width="1997" height="1498" class="aligncenter size-large wp-image-250359" src="https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2TIFF-1557955682.jpg" alt="Afghan-sharing-slides-18-June-09_Version2TIFF-1557955682" srcset="https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2TIFF-1557955682.jpg?w=1997 1997w, https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2TIFF-1557955682.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2TIFF-1557955682.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2TIFF-1557955682.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2TIFF-1557955682.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2TIFF-1557955682.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2TIFF-1557955682.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source">By the summer of 2009, several of the NSA&#8217;s closest partners in Afghanistan were feeding the newly constructed Real Time Regional Gateway with cellphone metadata they had collected. The data was used to locate and then kill or capture human targets.<br/>Image: NSA</figcaption><!-- END-CONTENT(photo)[11] --></figure><!-- END-BLOCK(photo)[11] -->
<p>The Nine Eyes nations, except for France, were ingesting data from their dirtboxes into RT-RG by mid-2009, according to an NSA presentation. (The reason for France’s absence could be that its military intelligence didn’t receive the necessary training before October 2008, when an <a>NSA team traveled to</a> Haguenau in Alsace, France<i>, </i>to give its counterpart from the 54e Regiment de Transmissions — the electronic warfare branch of the French army — a “crash course in exploiting metadata from GSM, CENTER ICE and RT-RG,” <a href="https://theintercept.com/snowden-sidtoday/5987516-puis-je-vous-aider-highlights-from-a-third-party/">according to SIDtoday</a>.)</p>
<p>At the next membership level — 14-Eyes — were Belgium, Germany, Italy, Spain, and Sweden, with access to the CENTER ICE communications and sharing platform, and some of the same benefits but with delays and limitations.</p>
<p>At the bottom, dubbed 41 Eyes, were the remaining countries participating in the International Security Assistance Force coalition in Afghanistan, or ISAF, getting the standard NATO intelligence fare.</p>
<p>In this quid pro quo structure, the most aggressive participants in the U.S.-designed surveillance regime would be rewarded with a constant flow of lifesaving intelligence on enemy movement and accurate targeting data. This is spelled out in a <a href="https://theintercept.com/document/2018/03/01/nsa-intelligence-relationship-with-norway-april-2013/">memo</a> on the “NSA intelligence relationship with Norway,” which shows that the Norwegians provided signals intelligence “analysis as well as geolocational and communications metadata specific to Afghan targets of mutual interest” in return for “daily force protection support in Afghanistan and technical expertise to support target development of Afghan insurgent targets”.</p>
<h3>The NSA “Could Be at Area 82 for 50 Years”</h3>
<p>By late 2009, international Afghan surveillance-sharing through RT-RG was becoming entrenched and institutionalized. As it grew, problems surfaced.</p>
<p>In October, a new and “&#8217;<a href="https://theintercept.com/snowden-sidtoday/5987523-innovative-super-sized-sigint-facility-opens-in/">Super Sized&#8217; SIGINT Facility</a>” opened at Area 82 in Bagram. The Afghanistan Regional Operations Cryptologic Center, or A-ROCC, was constructed in less than a year, offering facilities, housing, and even a fitness center for more than 250 people. All materials and equipment had to be transported from the U.S. via ship and “overland via the Khyber Pass” or flown “directly to Bagram Airfield on six Boeing 747s,” a member of the NSA Afghanistan-Pakistan management team <a href="https://theintercept.com/snowden-sidtoday/5987523-innovative-super-sized-sigint-facility-opens-in/">wrote</a> in SIDtoday.</p>
<p>French, British, and American spies were already “working side-by-side,” the manager wrote, with personnel from “Canada, Australia, New Zealand, Norway, Denmark, and possibly the Netherlands” soon to follow. The new facility, the article noted, was the result of “major policy decisions” and would allow “nine SIGINT coalition nations to work together as one.” It would also double the number of linguists available to process intercepted texts, phone calls, and other material: “Who could have imagined even a year ago that a French linguist, using U.S. collection sources, would be providing tactical support for operations being carried out by Polish forces on behalf of ISAF?”</p>
<p>The new facility allowed the inner circle Afghanistan SIGINT Coalition partners to plug into RT-RG “via several ‘peering points,’&#8221; an <a href="https://theintercept.com/snowden-sidtoday/5987522-what-are-the-latest-sigint-developments-in-iraq/">NSA liaison to Central Command told SIDtoday</a>. Peering is a networking term for the exchange of traffic between networks, essentially the act of plugging one into another.</p>
<p>Connecting the partners to RT-RG posed a growing challenge in terms of different national, legal, and political environments. “With the increase in partnering,&#8221; the liaison, Col. Parker Schenecker, wrote, “sanitization and dissemination presents a growing challenge” — a reference to the need for intelligence to be filtered and “cleaned” before it can be shared, and for restrictions on its distribution to be observed. But, according to Schenecker, the NSA stepped up and showed a “willingness to take manageable risks to maximize effectiveness.”</p>
<p>In 2010, Sweden and Germany joined what had been the Nine Eyes coalition and by January 2013, according to a <a href="http://www.spiegel.de/media/media-34053.pdf">document previously published</a> by Der Spiegel, Belgium, Italy, and Spain had joined the group, bringing the total number of nations participating in the Afghanistan SIGINT Coalition to 14. According to the same document, the Germans had become the “third largest contributor” to RT-RG.</p>

<div class="photo-grid photo-grid--2-col photo-grid--xtra-large">
  <div class="photo-grid__row">
          <div class="photo-grid__item photo-grid__item--1">
        <img data-recalc-dims="1" decoding="async"
          class="photo-grid__photo"
          src="https://theintercept.com/wp-content/uploads/2019/05/Campaign_Update_4_03_2009_nonotes-left-1557955052.jpg?w=1200"
          alt=""
          loading="lazy" >
      </div>
          <div class="photo-grid__item photo-grid__item--2">
        <img data-recalc-dims="1" decoding="async"
          class="photo-grid__photo"
          src="https://theintercept.com/wp-content/uploads/2019/05/Campaign_Update_4_03_2009_nonotes-right-1557955063.jpg?w=1200"
          alt=""
          loading="lazy" >
      </div>
      </div>

  <p class="photo-grid__description">
    <span class="photo-grid__caption"></span>
    <span class="photo-grid__credit">Images: NSA</span>
  </p>
</div>
<p>At Area 82, it seems safe to say, the sort of extensive intelligence-sharing exemplified by RT-RG became a cornerstone of U.S. intelligence strategy. In his SIDtoday interview, Goodman, the former NSA Afghanistan representative, called Area 82 the “NSA&#8217;s foundation for the long term &#8212; we could be at Area 82 for 50 years if we needed to!”</p>
<h3>Showdown in Oslo</h3>
<p>The U.S. military was so gung-ho about RT-RG that it produced, judging from the Snowden archive, many documents about the system&#8217;s results. Some of this material, created using an NSA data management and visualization tool called BOUNDLESSINFORMANT, was misunderstood by journalists, including Intercept co-founders Glenn Greenwald and Laura Poitras, working with European news outlets during the early days of reporting on Snowden material. This led to a dramatic showdown.</p>
<!-- BLOCK(pullquote)[15](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[15] -->NSA material was misunderstood by journalists, including Intercept co-founders. This led to a dramatic showdown.<!-- END-CONTENT(pullquote)[15] --></blockquote><!-- END-BLOCK(pullquote)[15] -->
<p>On November 19, 2013 in Oslo, Norway, in the Ministry of Defense press room, chaos reigned, with reporters and photographers frantically trying to get ready. E-tjenesten, as the Norwegian Intelligence Service is known locally, rarely spoke to the press. This — a briefing with less than half an hour notice in response to a news story — was unprecedented.</p>
<p>Earlier that November morning, Norway’s second-largest paper, Dagbladet, had detonated the potentially biggest spy bombshell in decades. “Secret documents about Norway,” the front page of the tabloid said, next to the iconic image of Snowden: “<a href="https://www.dagbladet.no/nyheter/dette-sier-snowden-dokumentet-om-usas-overvakning-av-norske-telefonsamtaler/61837718">The US spied on 33 MILLION Norwegian calls</a>.”</p>
<p>The report was based on a graphic from BOUNDLESSINFORMANT. It showed a graph labeled “NORWAY Last 30 Days,” suggesting that the NSA hoovered up information about ordinary Norwegian citizens’ phone calls. “Even a child&#8217;s phone could have been tapped,” the paper stated.</p>
<p>The story completely dominated the morning news cycle. “Friends should not spy on each other,” Prime Minister Erna Solberg <a href="https://www.nrk.no/nyheter/_-venner-bor-ikke-overvake-hverandre-1.11366044">told reporters</a> shortly before 10 a.m.</p>
<p>In the Ministry of Defense press room, at 11:15 a.m., head of E-tjenesten Kjell Grandhagen entered the room, making a rare public appearance in full uniform. The day before, he had tried to convince Dagbladet not to publish the story.</p>
<p>“Today, Dagbladet printed several articles alleging that the U.S. intelligence organization NSA collected traffic data on 33 million telephone calls in Norway,” he read, looking up from behind his reading glasses. “This is not correct.”</p>
<p>The document, Grandhagen said, was not about NSA spying in Norway. Instead it reflected data that his service had collected abroad in support of Norwegian military operations&nbsp;and “related to international terrorism, also abroad.” The data had been shared with multiple foreign partners, including the NSA. This was perfectly legal and had been reported to the Norwegian Parliamentary Intelligence Oversight Committee as per standard procedure.</p>
<p>&#8220;We know the content of this  and perfectly recognize the traffic pattern presented by Dagbladet. We are the ones who collected it,” Grandhagen <a href="https://www.dagbladet.no/nyheter/nsa-files-repeatedly-show-collection-of-data-against-countries---not-from/61855244">told</a> a reporter from Dagbladet during the ensuing Q&amp;A. “We are 100 percent sure that our explanation is correct.”</p>
<p>The counterattack worked. In a follow-up <a href="https://www.nrk.no/norge/avviser-overvaking-av-nordmenn-1.11366261">statement</a>, Solberg, retreating from her earlier proclamation that that “friends should not spy on each other,” now dismissed Dagbladet’s allegations as “wrong.” The 33 million call events, she said, adding a new piece to the puzzle, had been recorded in Afghanistan, not in Norway. By the end of the day, Dagbladet’s news editor <a href="https://www.vg.no/nyheter/innenriks/i/6bg7W/e-sjefen-det-er-vi-som-har-samlet-inn-dette">said</a> his colleagues might have “misunderstood parts of the document.”</p>
<p>Norway was not the only country where military officials complained about reporting that stemmed from RT-RG. On October 29, 2013, after diplomatic tensions in both <a href="https://www.theguardian.com/world/2013/oct/28/spain-warns-us-ambassador-breakdown-trust-nsa">Spain</a> and <a href="https://www.nytimes.com/2013/10/22/world/europe/new-report-of-nsa-spying-angers-france.html">France </a>following publications in <a href="https://www.elmundo.es/espana/2013/10/28/526dcbad61fd3d07678b456b.html">El Mundo</a> and <a href="https://www.lemonde.fr/technologies/article/2013/10/21/france-in-the-nsa-s-crosshair-phone-networks-under-surveillance_3499741_651865.html">Le Monde</a>, Alexander, the NSA director, told the U.S. Congress that allegations in those newspapers were “completely false.”</p>
<p>“This is not information that we collected on European citizens,” Alexander said. “It represents information that we and our NATO allies have collected in defense of our countries and in support of military operations.”</p>
<p>It is now clear that the call events reported by Dagbladet were indeed collected by the Norwegian Intelligence Service and shared with the NSA during a 30-day period&nbsp;between&nbsp;December 2012 to January 2013. Greenwald and the other journalists interpreted them incorrectly in part because contextual information available elsewhere in the Snowden archive was not understood at the time or even available to the European publications.</p>
<p>Such information would have explained why documents used as evidence that the NSA conduced mass surveillance on cellphones in<i> </i>Spain, France, Norway, and Italy all indicated that “DRTBOX” was the primary collection method: The countries partnered with the NSA to buy dirtboxes for use in Afghanistan (and, in some cases, elsewhere), and shared the cellphone data they then collected. Denmark, France, Italy, Spain, Sweden, and Norway, all members of the Afghanistan SIGINT Coalition, shared a total of 258,703,534 metadata records collected using dirtboxes with the NSA between December 10, 2012 and January 8, 2013, according to the documents.<br />
<!-- BLOCK(photo)[16](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[16] -->
<img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-250361" src="https://theintercept.com/wp-content/uploads/2019/05/gif-animation-01-zoom-in-1557955849.gif?fit=1024%2C1024" alt="gif-animation-01-zoom-in-1557955849">
<figcaption class="caption source">In 2013 journalists in France, Spain, Norway, and Italy working with Intercept co-founder Glenn Greenwald interpreted these documents&nbsp;as evidence of NSA mass surveillance&nbsp;on cellphones in Europe. But they were unable to account for the word &#8220;DRTBOX&#8221; prominently listed in all of them as the primary collection method. Had they been able to properly research the Snowden archive contextually, they would have found that the documents reflected intelligence collected by the NSA’s so-called third-party partners, not against these allied nations. Having purchased DRT systems from the NSA, a number of allies used them in Afghanistan to collect and share cellphone metadata for targeting purposes. The documents show that Denmark, France, Italy, Spain, Sweden, and Norway — all members of the Afghanistan SIGINT Coalition — shared with the NSA a total of 258,703,534 cellphone metadata records collected using dirtboxes between December 10, 2012 and January 8, 2013.<br/>Images: NSA</figcaption><!-- END-CONTENT(photo)[16] --></figure><!-- END-BLOCK(photo)[16] --></p>
<p>The Intercept has conducted a thorough examination of all the BOUNDLESSINFORMANT documents used in the disputed 2013 articles by European outlets. At the heart of the misunderstanding was how journalists interpreted two documents published with the first article about BOUNDLESSINFORMANT, co-authored by Greenwald and Ewen MacAskill for The Guardian newspaper and <a href="https://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining">published</a> on June 8, 2013. The <a href="https://www.theguardian.com/world/interactive/2013/jun/08/nsa-boundless-informant-data-mining-slides">first</a> document was an NSA presentation on how BOUNDLESSINFORMANT worked, the second an NSA set of <a href="https://www.theguardian.com/world/interactive/2013/jun/08/boundless-informant-nsa-full-text">Frequently Asked Questions</a> about the tool. The first document said the tool could be used to determine &#8220;what assets collect <em>against</em> a specific country&#8221; — as well as &#8220;how many records are collected <em>for</em> an organizational unit &#8230; or country&#8221; (emphases added). The second document similarly stated that BOUNDLESSINFORMANT could show &#8220;how many records (and what type) are collected against a particular country&#8221; or &#8220;how many records are collected for an organizational unit (e.g. FORNSAT).&#8221; Journalists focused on the statements about collection&nbsp;<em>against</em> countries while disregarding the statement about collection <em>for</em> countries.</p>
<!-- BLOCK(pullquote)[17](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[17] -->&#8220;I am totally in favor of correcting the record if the reporting was inaccurate.&#8221;<!-- END-CONTENT(pullquote)[17] --></blockquote><!-- END-BLOCK(pullquote)[17] -->
<p>On July 1 2013, journalists from German newsweekly Der Spiegel, in collaboration with filmmaker Laura Poitras, <a href="https://www.spiegel.de/international/world/secret-documents-nsa-targeted-germany-and-eu-buildings-a-908609.html">published</a> a cover story that drew on new BOUNDLESSINFORMANT documents purporting to represent collection against Germany, France, Italy, the Netherlands, and Spain. In reality, the documents reflected records shared with the NSA by foreign partners, including the BND in Germany.</p>
<p>A week later, Spiegel and Poitras, who stepped down from The Intercept in 2016, <a href="https://www.spiegel.de/international/world/german-intelligence-sends-massive-amounts-of-data-to-the-nsa-a-914821.html">reported</a> corrective information from the BND, which told the magazine that it was responsible for intelligence collection in Germany that had been attributed to the NSA; BND sources even identified for Spiegel a specific listening station in south Germany where some of the data originated — and said the rest came from German “telecommunications surveillance in Afghanistan.&#8221;</p>
<p>Journalists from Le Monde and El Mundo in Spain, working with Greenwald, went on to report on BOUNDLESSINFORMANT documents on&nbsp;France and Spain as evidence of mass surveillance by&nbsp;the NSA <em>against </em>these countries. Responding to denials from Grandhagen and others, Greenwald <a href="https://www.dagbladet.no/nyheter/nsa-files-repeatedly-show-collection-of-data-against-countries---not-from/61855244">reiterated</a> this interpretation in a piece in Dagbladet.</p>
<p>Greenwald, referring to this period in 2013, said, “At the time, Der Spiegel had already reported this interpretation, the NSA wouldn’t answer our questions, and they wouldn’t give us any additional information. I am totally in favor of correcting the record if the reporting was inaccurate.&#8221;</p>
<p>“The NSA documents themselves, in repeated places, <a href="https://www.dagbladet.no/nyheter/nsa-files-repeatedly-show-collection-of-data-against-countries---not-from/61855244">stated that they purported</a> to show how much data the NSA was collecting against each country,” he added. Further, when he and other journalists asked intelligence agencies to disprove their coverage, “those agencies repeatedly refused to provide any documentary proof that the NSA had erroneously characterized its own spreadsheets.”</p>
<p>“As a result, we noted the agencies&#8217; objections to our stories, while also noting they were in conflict with the NSA&#8217;s own documents, but their refusal to provide any documentation made it impossible to conclude that the NSA&#8217;s own descriptions were false,&#8221; he continued. &#8220;It now appears that subsequent reporting has revealed that the NSA&#8217;s description was erroneous, and that these slides showed how much communication data was being collected by those countries in Afghanistan, rather than collected about those countries by the NSA.”</p>
<p>Spiegel issued a statement that read, &#8220;DER SPIEGEL has set the record straight six years ago. As soon as German Foreign Intelligence (BND) answered our reporters&#8217; questions on the &#8216;Boundless Informant&#8217; slides and their context back in the summer of 2013, we reported their version. BND&#8217;s detailed explanations and Keith Alexanders remarks before Congress have subsequently also been covered in the SPIEGEL-Book &#8216;Der NSA-Komplex.'&#8221;</p>
<p>Dagbladet News Editor Frode Hansen said the newspaper assumes that what Kjell Grandhagen said at the press conference in 2013 was correct. &#8220;His information corrects what we brought to the fore, that it is about monitoring telephone calls made in Norway,&#8221; Hansen said. &#8220;It appears that there’s massive surveillance abroad, but that this monitoring stops at the Norwegian borders. We published several articles associated with the documents, the same day we published the first article, and in the following weeks, we had several stories related to the documents.&#8221;</p>
<h3>Faster Intelligence, at a Great Price</h3>
<p>At the November 19, 2013, press conference, Grandhagen told a <a href="https://www.aftenposten.no/norge/i/e13ol/E-tjenesten---Tallene-viser-ikke-amerikansk-overvaking-i-Norge">reporter from Aftenposten</a>, the country’s largest newspaper, that Norway had been carrying out this type of collection for years, and would continue to do so. Asked whether “we are talking hundreds of millions of phone calls,” he said, “That may well be.”</p>
<p>It was not just Norway that collected and shared metadata with the NSA. The BOUNDLESSINFORMANT documents show that Denmark, France, Italy, Poland, Spain, and Sweden shared data collected using dirtboxes with the NSA by 2013. Germany and the Netherlands, both Afghanistan SIGINT coalition members, also shared cellphone metadata by 2013 and used DRTs in Afghanistan in 2009, the documents show.</p>
<p>There is no evidence to suggest that the data shared into RT-RG and used by coalition partners was subjected to any special limits or were exempt from find-find-finish and capture/kill operations.</p>
<p>Harpviken, from the the Peace Research Institute Oslo, was unaware until now of Norway’s role in the Afghanistan intelligence-sharing coalition and the RT-RG program. But he saw what happened in practice.</p>
<p>“Many called it an industrialization of warfare. We used special forces operations — especially night raids — on a huge scale, to either kill or capture Taliban commanders,&#8221; he told NRK. &#8220;We got the intelligence much faster. But it had great consequences for the civilian population. &#8230; Many civilian lives were lost due to imprecise intelligence. The rapid turnaround made it harder to insure the quality of the intelligence, and the large number of operations meant that civilian injuries increased accordingly.”</p>
<!-- BLOCK(pullquote)[18](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[18] -->&#8220;Many called it an industrialization of warfare. It had great consequences for the civilian population.&#8221;<!-- END-CONTENT(pullquote)[18] --></blockquote><!-- END-BLOCK(pullquote)[18] -->
<p>In 2010, U.S. Special Forces killed a number of people in a convoy that belonged to a candidate in the Afghan parliamentary election. It later turned out that the U.S. military had targeted the SIM card of a person believed to be a senior Taliban leader, when in fact the card belonged to a completely innocent person who contributed to the election campaign of a relative.</p>
<p>The incident was “illustrative of what can go wrong when your intelligence is bad,&#8221; said Kate Clark, a former BBC Afghanistan correspondent. She <a href="https://www.afghanistan-analysts.org/publication/aan-papers/the-takhar-attack-targeted-killings-and-the-parallel-worlds-of-us-intelligence-and-afghanistan/">investigated</a> the attack as a researcher for the independent think tank Afghanistan Analysts Network, interviewing survivors, witnesses, and Afghan officials, and speaking to senior officers in the special forces unit that executed the attack.</p>
<p>According to Clark, the investigation revealed “parallel worlds” between signals intelligence and the Afghan reality on the ground.&nbsp;“They were blind to human intelligence. Had they had any understanding of HUMINT, they would have discovered that [the relative of the parliamentary candidate] was well-known,” and not Taliban, she said.</p>
<p>There is at least one official acknowledgment that Norway was potentially complicit in such abuses. The <a href="https://www.regjeringen.no/contentassets/09faceca099c4b8bac85ca8495e12d2d/no/pdfs/nou201620160008000dddpdfs.pdf">Godal Committee</a>, tasked with investigating Norway’s engagement in Afghanistan, said in its <a href="https://www.cmi.no/news/1711-a-good-ally-norway-in-afghanistan">final report</a> that Norwegian forces frequently acted based on statistics and technical analysis and had no control over how intelligence it shared was used by allies.</p>
<p>But the Norwegian military remains defensive.</p>
<p>“Good intelligence and good intelligence cooperation with allied countries result in lower risk of loss of military lives. We also reduce the risk of loss of civilian lives in this type of operation,” Norwegian Defense Minister Frank Bakke-Jensen told NRK.</p>
<p>According to a general statement by the director of the Norwegian Intelligence Service, Morten Haga Lunde, provided to NRK and The Intercept, sharing data “within an established intelligence partnership” is “neither in violation of international law nor Norwegian law,” and it is “legally unproblematic for such operations to include the use of drones or other legal weapons platforms, as long as the operations are conducted within the framework of the law of war and international law.”</p>
<h3>RT-RG on the Mexican Border</h3>
<p>In the spring of 2017, the NSA took RT-RG public and began hinting at other deployments of the system.</p>
<p>On May 7, the National Cryptologic Museum, a small, public-facing corner of the NSA campus in Fort Meade, Maryland, added a <a href="https://cryptologicfoundation.org/visit/museum/museum_exhibits/recentexhibits/real-time-regional-gateway-display.html">new display</a> to its collection. Carefully avoiding any mention of cellphones or metadata, it explained how RT-RG represented a completely new way to combat the threats from improvised explosive devices and “Al Qaeda’s bomb making capabilities,” and how the program had been “extended from Iraq to Afghanistan <i>and other conflict zones around the world</i>” (emphasis added).</p>
<p>Days later, in a <a href="https://www.foxnews.com/politics/inside-the-governments-secret-nsa-program-to-target-terrorists">Fox Ne</a><a href="https://www.foxnews.com/politics/inside-the-governments-secret-nsa-program-to-target-terrorists">w</a><a href="https://www.foxnews.com/politics/inside-the-governments-secret-nsa-program-to-target-terrorists">s</a> exclusive, Richard Ledgett, the NSA deputy director, spoke about the program in a rare public interview. In the segment, Ledgett explained how RT-RG “might connect something like a phone number to a location&nbsp;&#8230; and then display that to an analyst,” who would in turn warn a troop convoy about an impending ambush.</p>
<p>The two-minute segment, “Inside the government&#8217;s secret NSA program to target terrorists,” mentioned in passing that since it was fielded in Iraq and Afghanistan, the system had been used in “other conflict zones which the NSA will not publicly identify.” The Fox segment also didn’t mention whether these “other conflict zones” were linked to terrorism or interventions involving the U.S. military.</p>
<p>The Intercept can now reveal that one of the “conflict zones” in which the powerful Real Time Regional Gateway was deployed was the U.S.-Mexico border, where the system became operational in 2010.</p>
<!-- BLOCK(photo)[19](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[19] -->
<img loading="lazy" decoding="async" width="2000" height="1500" class="aligncenter size-large wp-image-250354" src="https://theintercept.com/wp-content/uploads/2019/05/readfiles_042-1557955299.jpg" alt="readfiles_042-1557955299" srcset="https://theintercept.com/wp-content/uploads/2019/05/readfiles_042-1557955299.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2019/05/readfiles_042-1557955299.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2019/05/readfiles_042-1557955299.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2019/05/readfiles_042-1557955299.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2019/05/readfiles_042-1557955299.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2019/05/readfiles_042-1557955299.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2019/05/readfiles_042-1557955299.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source">By 2012 there were 11 global RT-RG global operations. A system running at NSA Texas targeted the US–Mexican border, with “counternarcotics” as its primary mission.<br/>Image: NSA</figcaption><!-- END-CONTENT(photo)[19] --></figure><!-- END-BLOCK(photo)[19] -->
<p>Indeed, after Iraq and Afghanistan, the RT-RG program spread around the world. By 2012, there were 11 RT-RG sites tailored to “the telecommunications technologies prevalent in the region,” as a <a href="https://theintercept.com/document/2019/05/29/gchq-summary-of-rtrg">GCHQ document put it</a>, with Iraq in “draw down” and two submarines able to serve as mobile regional gateways, according to an NSA PowerPoint <a href="https://theintercept.com/document/2019/05/29/nsa-presentation-on-rtrg-analytics-for-forward-users">presentation</a> from 2012.</p>
<p>In one week, the NSA document boasted, RT-RG was used “afloat on [a] subsurface platform[,] USS Georgia,” where it was able to receive “31 million GSM [mobile phone] events, leading to 10 high-value target voice ID and 90 tactical tip-offs.”</p>
<p>But&nbsp;perhaps the most controversial application of Alexander’s new tool dates back to February 2008, when a meeting was convened at the El Paso Intelligence Center, or EPIC, a Drug Enforcement Administration-led facility established in Texas to help secure the southern border and encourage information-sharing between federal agencies. An <a href="https://theintercept.com/document/2019/05/29/nsa-el-paso-intelligence-center-trip-report-2008">NSA memo summarizing the meeting</a> shows that, the same month that Norway started using dirtboxes near Kabul, and several months before RT-RG in Afghanistan was declared operational, discussions were held about using RT-RG on the U.S.-Mexico border.</p>
<!-- BLOCK(newsletter)[20](%7B%22componentName%22%3A%22NEWSLETTER%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%7D) --><div class="newsletter-embed flex-col items-center print:hidden" id="third-party--article-mid" data-module="InlineNewsletter" data-module-source="web_intercept_20241230_Inline_Signup_Replacement">
  <div class="-mx-5 sm:-mx-10 p-5 sm:px-10 xl:-ml-5 lg:mr-0 xl:px-5 bg-accentLight hidden" data-name="subscribed">
    <h2 class="font-sans font-light uppercase text-[30px] leading-8 text-white tracking-[0.01em] mb-0">
      We’re independent of corporate interests — and powered by members. Join us.    </h2>
    <p class="text-white font-sans text-[27px] font-bold leading-[29px] tracking-[0.01em] uppercase mb-3.5">
          </p>
    <a
        href="https://join.theintercept.com/donate/now/?referrer_post_id=248560&#038;referrer_url=https%3A%2F%2Ftheintercept.com%2F2019%2F05%2F29%2Fnsa-data-afghanistan-iraq-mexico-border%2F&#038;source=web_intercept_20241230_Inline_Signup_Replacement"
        class="border border-white !text-white font-mono uppercase p-5 inline-flex items-center gap-3 hover:bg-white hover:!text-accentLight focus:bg-white focus:!text-accentLight"
        data-name="donateCTA"
        data-action="handleDonate"
    >
      Become a member      <span class="font-icons icon-TI_Arrow_02_Right"></span>
    </a>
  </div>
  <div class="group default w-full px-5 hidden" data-name="unsubscribed">
    <div class="px-5 border-[10px] border-accentLight">
      <div class="bg-white -my-2.5 relative block px-4 md:px-5">
        <h2 class="font-sans font-body text-[30px] font-bold tracking-[0.01em] leading-8 mb-0 xl:text-[37px] xl:leading-[39px]">
          <span class="group-[.subscribed]:hidden">
            Join Our Newsletter          </span>
          <span class="group-[.default]:hidden">
            Thank You For Joining!          </span>
        </h2>
        <p class="text-[27px] mb-3.5 font-bold text-accentLight tracking-[0.01em] leading-[29px] font-sans xl:text-[37px] xl:leading-[39px]">
          <span class="group-[.subscribed]:hidden">
            Original reporting. Fearless journalism. Delivered to you.          </span>
          <span class="group-[.default]:hidden">
            Will you take the next step to support our independent journalism by becoming a member of The Intercept?          </span>
        </p>
        <form class="mb-2.5 flex gap-2.5 group-[.subscribed]:hidden" data-action="handleForm" data-action-type="submit">
          <input type="email" class="w-1/2 border border-accentLight placeholder-accentLight p-5 font-mono text-base text-accentLight" data-name="email" placeholder="Email address" aria-label="Email address" required>
          <button class="w-1/2 inline-flex gap-3 items-center border border-accentLight text-accentLight p-5 text-[20px] font-bold leading-[18px] text-left font-sans hover:bg-accentLight hover:text-white focus:bg-accentLight focus:text-white" type="submit" data-name="submit">
            I&#039;m in            <span class="font-icons icon-TI_Arrow_02_Right"></span>
          </button>
        </form>
        <a href="https://join.theintercept.com/donate/now/?referrer_post_id=248560&#038;referrer_url=https%3A%2F%2Ftheintercept.com%2F2019%2F05%2F29%2Fnsa-data-afghanistan-iraq-mexico-border%2F&#038;source=web_intercept_20241230_Inline_Signup_Replacement" class="group-[.default]:hidden border border-accentLight text-accentLight font-sans px-5 py-3.5 inline-flex items-center gap-3 text-[20px] font-bold" data-action="handleDonate">
          Become a member          <span class="font-icons icon-TI_Arrow_02_Right"></span>
        </a>

        <div class="font-sans text-accentLight text-[10px] leading-[13px] text-balance [&_a]:text-accentLight [&_a]:font-bold [&_a:hover]:underline group-[.subscribed]:hidden">
          <p>By signing up, I agree to receive emails from The Intercept and to the <a href="/privacy-policy/">Privacy Policy</a> and <a href="/terms-use/">Terms of Use</a>.</p>
        </div>
      </div>
    </div>
  </div>
  <div class="newsletter-shortcode flex hidden" data-name="fallback">
    <a class="newsletter-shortcode__wrapper" href="/newsletter/?source=Article-In&#038;referrer_post_id=248560" data-analytics-id="inline-article-newsletter-shortcode">
      <span class="newsletter-shortcode__container">
        <h2 class="newsletter-shortcode__headline">
          Join Our Newsletter        </h2>
        <h2 class="newsletter-shortcode__subhead">
          Original reporting. Fearless journalism. Delivered to you.        </h2>
        <span class="newsletter-shortcode__link">
          I&#039;m in
          <span class="Icon Icon--Arrow_02_Right icon-TI_Arrow_02_Right"></span>
        </span>
      </span>
    </a>
  </div>
</div><!-- END-BLOCK(newsletter)[20] -->
<p>At the meeting were officials from the DEA, the anti-drug trafficking Joint Interagency Task Force South, the NSA, and EPIC, including a representative from U.S. Customs and Border Protection. Discussions with the Department of Homeland Security about sponsoring NSA network connectivity at EPIC are also referenced in the memo. At the meeting, the NSA was represented by Col. Barb Trent, <a href="https://www.linkedin.com/in/barb-trent-129036a/">deputy</a> to Heath, the science adviser to the NSA’s director and an early RT-RG proponent.</p>
<p>According to the memo, the DEA was “very enthusiastic about and anxious to move ahead smartly on the acquisition of an RT-RG capability located at EPIC” and had requested “up to $10 Million for RT-RG” in El Paso. Another official present at the meeting was of “the opinion that the ‘funding will shake loose,’ because intelligence leadership was “in accord about the ‘value of sharing interagency data.&#8217;”</p>
<!-- BLOCK(pullquote)[21](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[21] -->The DEA was “very enthusiastic about and anxious to move ahead smartly on RT-RG.&#8221;<!-- END-CONTENT(pullquote)[21] --></blockquote><!-- END-BLOCK(pullquote)[21] -->
<p>EPIC has “a particular emphasis on … illegal drugs, weapons trafficking, terrorism, human trafficking, human smuggling, illegal migration, money laundering and bulk cash smuggling,” according to <a href="https://www.dea.gov/epics-mission">the center&#8217;s website</a>. No fewer than 21 federal agencies have staffers at the center, including the NSA.</p>
<p>Bringing RT-RG to EPIC was tricky because many law enforcement “customers” did not hold sufficient security clearances, the memo said. The solution, Trent said, was for the RT-RG tool to present the underlying data according to the clearance level of the user and that “these same issues were being worked in the RT-RG deployments in Iraq and Afghanistan.”</p>
<p>Another challenge was to ensure that the role of the NSA system was obscured if necessary when investigations arising from its use ever ended up in court. The NSA memo addressed this issue cryptically, saying that the “RT-RG capability in whatever form it exists at EPIC would have to respect and incorporate Special Operations Division’s (SOD’s) role.” The SOD is a controversial DEA division that uses NSA intelligence to create leads for federal and local police, but since the source can’t be known, the division trains agents to use so-called parallel construction to cover up where the information originated, as <a href="https://theintercept.com/2018/01/09/dark-side-fbi-dea-illegal-searches-secret-evidence/">reported by The Intercept</a>.</p>
<p>The ultimate goal, the memo stated, was “linkage between the law enforcement and SIGINT worlds” — that is, between the NSA and law enforcement entities like the DEA. But there were “multiple policy issues to be addressed before that can be realized.”</p>
<p>One thing that was unclear in 2008 was whether EPIC would get its own RT-RG or use the one at NSA Texas.</p>
<p>It is, however, clear that the latter facility, located in San Antonio and focused on intelligence needs to the south of the U.S., used RT-RG starting in June 2010 to help stanch the flow of migrants and drugs into the U.S. Six staffers from NSA Texas People Smuggling Organization branch had received RT-RG training, <a href="https://theintercept.com/document/2019/05/29/nsa-presentation-on-border-use-of-rtrg-2010">according to an NSA document dated August 12, 2010</a>. The cellphone of one alleged such person, “SIA [Special Interest Alien] smuggler Chuy in Reynosa,” was targeted “for geolocational purposes,” the document said.</p>
<p>The document stated that getting “formal RT-RG training” was a challenge and that only 13 of 28 NSA Texas Southern Arc Target Development staffers had received it.</p>
<p>The main targets tracked by RT-RG at NSA Texas, the document made clear, would belong to Mexican drug cartels, and RT-RG was expected to bring ”substantial operational benefit for Mexican Cartel HVT [high-value targets] and Border Security missions.”</p>
<p>RT-RG brought to the border region a tactic used in Iraq: pattern-of-life analysis, in which a target’s future movements are anticipated by mapping their past activities and those of their associates. In Iraq, the NSA had hunted down an elusive insurgent, who frequently disassembled his phone, by targeting his wife’s phone, thus homing in on the couple’s jaunts to south Baghdad. In or around Mexico, it used similar types of analysis against three “hit squad” members of the Vicente Carrillo Fuentes Organization, a cartel based in Ciudad Juárez across the border from El Paso. This pattern-of-life work led to the capture of two of the cartel members, with “an imminent operation pending to capture the third,” according to the August 2010 document.<br />
<!-- BLOCK(photo)[22](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[22] -->
<img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-250355" src="https://theintercept.com/wp-content/uploads/2019/05/Jul2010MOU_excerpt-1557955358.jpg?fit=1024%2C1024" alt="Jul2010MOU_excerpt-1557955358">
<figcaption class="caption source">A presentation from NSA Texas Southern Arc division shows that RT-RG was installed in March 2010 and was expected to be fully operational by end of the same year. RT-RG was expected to bring ”substantial operational benefit for Mexican Cartel HVT [high value targets] and Border Security&#8221; missions.<br/>Image: NSA</figcaption><!-- END-CONTENT(photo)[22] --></figure><!-- END-BLOCK(photo)[22] --></p>
<p style="text-align: left;">RT-RG also brought close to home another tactic from Iraq: Alexander’s “collect it all” approach. In 2012, RT-RG at NSA Texas began receiving metadata gleaned from the U.S. internet backbone, as well as from internet trunks <a href="https://theintercept.com/2014/06/18/nsa-surveillance-secret-cable-partners-revealed-rampart-a/">outside</a> the U.S., according to a <a href="https://theintercept.com/document/2019/05/29/sso-news-on-mystic-shelltrumpet-for-june-20-2012">June 2012 NSA report</a>. The data was laundered by “obfuscating the source information and filtering out metadata from countries of no interest to that area of responsibility” and would “provide RT-RG Texas with 85% of their input volume, which contains 60% of the hits on their targets,” <a href="https://theintercept.com/document/2019/05/29/nsa-june-2012-sso-weekly-brief-excerpt">another report said</a>.</p>
<p style="text-align: left;" align="justify">Beyond the backbone data, RT-RG at NSA Texas in 2012 also added data obtained from <a href="https://theintercept.com/2018/06/25/att-internet-nsa-spy-hubs/">AT&amp;T’s network under a program known as FAIRVIEW</a>. It is not clear how data was processed for use at NSA Texas, but one document mentions a filter system called SHELLTRUMPET that handled the mass surveillance data flowing into San Antonio.</p>
<p>To the NSA, the deployment was a success story, according to a geospatial analyst at NSA Texas, <a href="https://theintercept.com/snowden-sidtoday/5987520-from-the-sandbox-to-mexico-applying-wartime/">writing in SIDtoday</a>. To take surveillance strategies developed to minimize U.S. casualties in battle and use them for law enforcement was, the analyst wrote, the “perfect example of taking techniques developed in one environment and applying them in other targeting situations.”</p>
<p>To the rest of us, such transplantation of spycraft, whether among federal agencies at the U.S. border or among various countries in Afghanistan, might serve instead as an example of the dangerous path that technological innovations can take as they slowly — but surely — “creep” from one context to another.</p>
<p>“Foreigners also have privacy rights under international law, including treaties the U.S. has signed. The Snowden documents make clear that these rights were systematically violated,” said&nbsp; Goitein, the national security specialist from Brennan Center.</p>
<p>“Although government officials have claimed that the RT-RG program was highly effective, such claims are always based on classified evidence and must be taken with a grain of salt. The last time such a claim was rigorously investigated — when officials claimed in 2013 that “bulk collection” of Americans’ phone records was a valuable counterterrorism tool — it quickly fell apart.”</p>
<p>The NSA declined comment for this story.</p>
<h3>Documents published with this story:</h3>
<ul>
<li><a href="https://theintercept.com/snowden-sidtoday/5987257-putting-a-new-tactical-comms-system-to-good-use/">SIDtoday: Putting a New Tactical Comms System to Good Use in Afghanistan</a> (NSA, July 2006)</li>
<li><a href="https://theintercept.com/snowden-sidtoday/4755568-new-tool-put-into-play-in-afghanistan/">SIDtoday: New Tool Put Into Play in Afghanistan</a> (NSA, March 2006)</li>
<li><a href="https://theintercept.com/snowden-sidtoday/5987511-rt10-getting-information-to-the-front-lines-in/">SIDtoday: RT10: Getting Information to the Front Lines in Time to Make a Difference</a></li>
<li><a href="https://theintercept.com/snowden-sidtoday/5987513-follow-the-honey/">SIDtoday: Follow the &#8220;Honey&#8221;</a> (NSA, June 2008)</li>
<li><a href="https://theintercept.com/snowden-sidtoday/5987519-hollywood-special-effects-no-it-s-modern-day/">SIDtoday: Hollywood Special Effects? No, It&#8217;s Modern-Day SIGINT</a> (NSA, July 2009)</li>
<li><a href="https://theintercept.com/snowden-sidtoday/5987523-innovative-super-sized-sigint-facility-opens-in/">SIDtoday: Innovative Super Sized SIGINT Facility Opens in Afghanistan</a> (NSA, November 2009)</li>
<li><a href="https://theintercept.com/document/2019/05/29/gchq-bagram-presentation-2010/">GCHQ Bagram Presentation 2010</a></li>
<li><a href="https://theintercept.com/document/2019/05/29/nsa-area-82-update-april-2009/">NSA Area 82 Update April 2009</a></li>
<li><a href="https://theintercept.com/document/2019/05/29/nsa-afghanistan-coalition-dissemination-brief-to-senior-leadership-forum-2009/">NSA Afghanistan Coalition Dissemination Brief to Senior Leadership Forum 2009</a></li>
<li><a href="https://theintercept.com/document/2019/05/29/excerpt-of-may-2008-nsa-afghanistan-dataflow-analysis/">Excerpt of May 2008 NSA Afghanistan Dataflow Analysis</a></li>
<li><a href="https://theintercept.com/snowden-sidtoday/5987522-what-are-the-latest-sigint-developments-in-iraq/">SIDtoday: What Are the Latest SIGINT Developments in Iraq and Afghanistan? An Interview with Colonel Parker Schenecker</a> (NSA, October 2009)</li>
<li><a href="https://theintercept.com/document/2019/05/29/nsa-presentation-on-rtrg-analytics-for-forward-users/">NSA Presentation on RTRG Analytics for Forward Users</a></li>
<li><a href="https://theintercept.com/snowden-sidtoday/5987517-sigint-then-and-now-vietnam-vs-iraq/">SIDtoday: SIGINT Then and Now: Vietnam vs Iraq</a> (NSA, March 2009)</li>
<li><a href="https://theintercept.com/snowden-sidtoday/5987521-sid-fad-presentation-enabling-coalition-partners/">SIDtoday: SID/FAD Presentation: Enabling Coalition Partners in Afghanistan</a> (NSA, October 2009)</li>
<li><a href="https://theintercept.com/snowden-sidtoday/5987516-puis-je-vous-aider-highlights-from-a-third-party/">SIDtoday: Puis-je vous aider? Highlights from a Third-Party-Training TDY</a> (NSA, December 2008)</li>
<li><a href="https://theintercept.com/snowden-sidtoday/5987524-new-policy-for-the-coalition-in-afghanistan-is/">SIDtoday: New Policy for the Coalition in Afghanistan Is Signed</a> (NSA, April 2011)</li>
<li><a href="https://theintercept.com/document/2019/05/29/gchq-summary-of-rtrg/">GCHQ Summary of RTRG</a></li>
<li><a href="https://theintercept.com/document/2019/05/29/nsa-el-paso-intelligence-center-trip-report-2008/">NSA El Paso Intelligence Center Trip Report 2008</a></li>
<li><a href="https://theintercept.com/document/2019/05/29/sso-news-on-mystic-shelltrumpet-for-june-20-2012/">SSO News on MYSTIC SHELLTRUMPET for June 20, 2012</a></li>
<li><a href="https://theintercept.com/document/2019/05/29/nsa-june-2012-sso-weekly-brief-excerpt/">NSA June 2012 SSO Weekly Brief Excerpt</a></li>
<li><a href="https://theintercept.com/snowden-sidtoday/5987520-from-the-sandbox-to-mexico-applying-wartime/">SIDtoday: From the Sandbox to Mexico: Applying Wartime Tactical Techniques to Strategic Missions</a> (October, 2009)</li>
<li><a href="https://theintercept.com/document/2019/05/29/nsa-boundlessinformant-chart-on-sweden/">NSA BOUNDLESSINFORMANT Chart on Sweden</a></li>
<li><a href="https://theintercept.com/document/2019/05/29/nsa-boundlessinformant-chart-on-denmark/">NSA BOUNDLESSINFORMANT Chart on Denmark</a></li>
</ul>
<p>The post <a href="https://theintercept.com/2019/05/29/nsa-data-afghanistan-iraq-mexico-border/">Mission Creep: How the NSA’s Game-Changing Targeting System Built for Iraq and Afghanistan Ended Up on the Mexico Border</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2019/05/29/nsa-data-afghanistan-iraq-mexico-border/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2019/05/norwegian-feature-01-1557953994.jpg?fit=1440%2C721' width='1440' height='721' /><post-id xmlns="com-wordpress:feed-additions:1">248560</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?fit=720%2C98" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/Bagram_Build_map-left-1557954429-1000x673.jpg" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/Bagram_Build_map-right-1557954430-1000x673.jpg" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-MAP-tiff-1557954582.jpg?fit=1493%2C1120" medium="image">
			<media:title type="html">Afghan-sharing-slides-MAP-tiff-1557954582</media:title>
			<media:description type="html">A map included in an NSA PowerPoint presentation “partner operating locations” in Afghanistan in February 2009 . For each partner, the number of DRTs or Dirtboxes is indicated, along with the year/month they became operational. France would deploy their DRTs later.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-MAP-tiff-1557954582.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08-2-TIFF-copy-1557955508.jpg?fit=1495%2C1122" medium="image">
			<media:title type="html">Afghan_RTRG_dataflow_status_21_May_08-2-TIFF-copy-1557955508</media:title>
			<media:description type="html">The Afghanistan Real Time Regional Gateway data center at Area 82
in Bagram airfield 82, during construction. Several documents in the Snowden
archive reflect an unmistakable pride in bringing advanced cloud computing
infrastructure to this desert plot in Afghanistan – a country in which internet
access was banned by the Taliban in 2001.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08-2-TIFF-copy-1557955508.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08_excerpt-TIFF-copy-1557955591.jpg?fit=1650%2C1225" medium="image">
			<media:title type="html">Afghan_RTRG_dataflow_status_21_May_08_excerpt-TIFF-copy-1557955591</media:title>
			<media:description type="html">An NSA document shows that the Netherlands, Denmark, Norway,
Germany and Spain were scheduled to start feeding cell phone metadata
intercepted with DRTs or “dirtboxes” in Afghanistan into the Real Time-
Regional Gateway by May 2008.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/05/Afghan_RTRG_dataflow_status_21_May_08_excerpt-TIFF-copy-1557955591.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/Presentation1-2-1557954725.jpg?fit=1818%2C1248" medium="image">
			<media:title type="html">Presentation1-2-1557954725</media:title>
			<media:description type="html">An example from a presentation about RT-RGs ability to visualize intercepted data spatially. This “heatmap” show a target’s call activity (blue = &#34;Fewer calls”, red = “More calls”. A text message sent by a target is automatically translated from Arabic and overlaid on Google Earth. This information helps a military commander “find, fix, and finish” the adversary.”</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/05/Presentation1-2-1557954725.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/readfiles_042_slide4-1557954777.jpg?fit=2000%2C1500" medium="image">
			<media:title type="html">readfiles_042_slide4-1557954777</media:title>
			<media:description type="html">An top secret NSA statistic shows that the Afghanistan Real Time
Regional Gateway played a key role in 90 percent of operations that involved
SIGINT or Signals Intelligence. According to another NSA document 80% of all
combat operations did. In 2011 this translated to 2,270 capture/kill operations,
6,534 “enemies killed in action,” and 1117 detainees.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/05/readfiles_042_slide4-1557954777.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2-1557954833.jpg?fit=2000%2C1500" medium="image">
			<media:title type="html">Afghan-sharing-slides-18-June-09_Version2-1557954833</media:title>
			<media:description type="html">In Afghanistan, NSAs foreign partner agencies were given access to life-saving intelligence according to their level of relationships. The closest partners shared cell phone metadata and other intelligence in “real time”.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2-1557954833.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2TIFF-1557955682.jpg?fit=1997%2C1498" medium="image">
			<media:title type="html">Afghan-sharing-slides-18-June-09_Version2TIFF-1557955682</media:title>
			<media:description type="html">By the summer of 2009 several of NSAs closest partners in Afghanistan were feeding the newly constructed Real Time Regional Gateway with cell phone metadata they had collected. The data was used to locate and kill, or capture,
human targets.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/05/Afghan-sharing-slides-18-June-09_Version2TIFF-1557955682.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/Campaign_Update_4_03_2009_nonotes-left-1557955052.jpg?w=1200" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/Campaign_Update_4_03_2009_nonotes-right-1557955063.jpg?w=1200" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/gif-animation-01-zoom-in-1557955849.gif?fit=1430%2C683" medium="image">
			<media:title type="html">gif-animation-01-zoom-in-1557955849</media:title>
			<media:description type="html">In 2013 journalists in France, Spain, Norway and Italy working with Intercept co-founder Glenn Greenwald interpreted these documents to evidence of NSA mass surveillance against cell phones in Europe. But they were unable to account for the the word ‘DRTBOX’  prominently listed  in all of them as the primary collection method. Had they been able to properly research the Snowden archive contextually, they would have found out that the documents reflected intelligence collected by NSA’s so-called third-party partners, not against these allied nations. Having purchased DRT systems from the NSA, a number of allies used them in Afghanistan to collect and share cell phone metadata for targeting purposes. The documents show that Denmark, France, Italy, Spain, Sweden and Norway, – all members of the Afghanistan SIGINT Coalition, - shared with the NSA a total of 258,703,534 cell phone metadata records collected using Dirtboxes between December 10, 2012 and January 8, 2013.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/05/gif-animation-01-zoom-in-1557955849.gif?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/readfiles_042-1557955299.jpg?fit=2000%2C1500" medium="image">
			<media:title type="html">readfiles_042-1557955299</media:title>
			<media:description type="html">By 2012 there were 11 global RT-RG global operations. A system running at NSA Texas targeted the US–Mexican border, with “counternarcotics” as its primary mission.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/05/readfiles_042-1557955299.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/Jul2010MOU_excerpt-1557955358.jpg?fit=2000%2C1125" medium="image">
			<media:title type="html">Jul2010MOU_excerpt-1557955358</media:title>
			<media:description type="html">A presentation from NSA Texas Southern Arc division shows that RT-RG was installed in March 2010 and was expected to be fully operational by end of the same year. RT-RG was expected to bring ”substantial operational benefit for Mexican Cartel HVT [high value targets] and Border Security&#34; missions.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/05/Jul2010MOU_excerpt-1557955358.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Israel Hated American Ban on Sharing Intel for Assassinations, So U.S. Made New Rules]]></title>
                <link>https://theintercept.com/2019/05/29/israel-drone-strikes-intelligence-nsa/</link>
                <comments>https://theintercept.com/2019/05/29/israel-drone-strikes-intelligence-nsa/#respond</comments>
                <pubDate>Wed, 29 May 2019 16:05:56 +0000</pubDate>
                                    <dc:creator><![CDATA[Murtaza Hussain]]></dc:creator>
                                		<category><![CDATA[release-may-2019]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[World]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=248628</guid>
                                    <description><![CDATA[<p>Israeli military officials privately pressed for an exemption to intelligence restrictions during a 2006 war with Hezbollah.</p>
<p>The post <a href="https://theintercept.com/2019/05/29/israel-drone-strikes-intelligence-nsa/">Israel Hated American Ban on Sharing Intel for Assassinations, So U.S. Made New Rules</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank"><img loading="lazy" decoding="async" class="aligncenter wp-image-65243" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" srcset="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=720 720w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=540 540w" sizes="auto, (max-width: 720px) 100vw, 720px" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] --><u>As Israel and</u> the Lebanese militia Hezbollah exchanged blows during their short-lived but devastating 2006 war, Israeli military officials used private channels to pressure their American counterparts in the National Security Agency for intelligence to help assassinate Hezbollah operatives, according to a <a href="https://theintercept.com/snowden-sidtoday/5987391-the-israel-hizballah-crisis-perspectives-from-an/">pair</a> of top-secret NSA <a href="https://theintercept.com/snowden-sidtoday/5987393-israel-hizballah-crisis-perspectives-from-an/">documents</a>. The NSA was legally restricted from providing such information but, after Israeli officials asked for an exemption, U.S. intelligence officials decided on a new framework for information-sharing.</p>
<p>The documents, published on an NSA internal news site called SIDtoday and provided by agency whistleblower Edward Snowden, provide a glimpse into the intelligence relationship between two countries during the 2006 conflict.</p>
<p>They form a two-part SIDtoday article titled “The Israel-Hizballah Crisis — Perspectives from an Acting SLO Tel Aviv,” the personal account of a Tel Aviv-based NSA official — a signals intelligence liaison officer, who is tasked with managing relations with foreign partners — and their experience with their Israeli counterparts during the war. By their account, the NSA relationship with Israel during the 2006 war was strained. The NSA liaison officer recounted disputes that occurred with the Israelis over intelligence requests made by the Israeli SIGINT National Unit, or ISNU, the elite Israeli counterpart to the NSA.</p>
<p>“ISNU&#8217;s reliance on NSA was equally demanding and centered on requests for time sensitive tasking, threat warning, including tactical ELINT” — electronic intelligence — “and receipt of geolocational information on Hizballah elements,” the NSA official <a href="https://theintercept.com/snowden-sidtoday/5987391-the-israel-hizballah-crisis-perspectives-from-an/">wrote</a>. “The latter request was particularly problematic and I had several late-night, sometimes tense, discussions with ISNU detailing NSA&#8217;s legal prohibition on providing information that could be used in targeted killings.&#8221;</p>
<p>&#8220;Even with his full understanding of the US statutes, [ISNU Commander] BG Harari sought assistance from NSA for an exemption to this legal policy. To ISNU, this prohibition was contrary not only to supporting Israel in its fight against Hizballah but overall, to support the US Global War on Terrorism.&#8221;</p>
<!-- BLOCK(pullquote)[1](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[1] -->&#8220;I had several late-night, sometimes tense, discussions with ISNU.&#8221;<!-- END-CONTENT(pullquote)[1] --></blockquote><!-- END-BLOCK(pullquote)[1] -->
<p>The account goes on to suggest that the NSA ultimately reached a compromise with its Israeli counterpart by working with the Office of the Director of National Intelligence, or ODNI, the cabinet-level office that oversees U.S. intelligence efforts. “In the end,&#8221; the article states, &#8220;a framework was decided upon by ODNI that defined the parameters and methods of what could and could not be shared with the Israelis.” The documents do not give details of this framework.</p>
<p>With tensions between Israel and Hezbollah constantly being ratcheted up — and persistent chatter about a new conflict — the logistical, geopolitical, and legal contours of U.S. intelligence-sharing with the Israelis takes on increasing import. The reluctance of U.S. officials to share intelligence information in 2006 highlights the thorny geopolitical dynamic between these longtime allies, whose intelligence agencies are sometimes at odds with each other; it also raises questions about the legality of sharing intelligence with a partner nation operating outside U.S. legal constraints.</p>
<p>The question of what intelligence the United States can legally share with a foreign government is notoriously murky. An executive order signed under President Ronald Reagan in 1981 established that the United States “may enter into intelligence and counterintelligence arrangements and agreements with foreign governments and international organizations.” Decades later, despite revolutions in information collection and retention, as well as numerous campaigns for <a href="https://privacyinternational.org/sites/default/files/2018-04/Secret%20Global%20Surveillance%20Networks%20report%20web%20(200)_0.pdf">greater transparency on foreign intelligence-sharing</a>, legal experts say that the legal rules about what can and cannot be shared remain opaque.</p>
<p>“There is very little we know about the U.S. government regulations pertaining to the sharing of intelligence with foreign governments,” said Asaf Lubin, a legal expert on cybersecurity and privacy at the Fletcher School of Law and Diplomacy at Tufts University. “It is fair to assume that the Office of the Director of National Intelligence together with the attorney general have developed certain policies on the formulation and application of these intelligence-sharing regimes, but they are not publicly available.”</p>
<p>The NSA and Israeli intelligence drew up a memorandum of understanding in 2009, authorizing the sharing of certain raw intelligence data, according to a Snowden document <a href="https://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents">published by the Guardian</a>. The memo was controversial for apparently giving the Israelis access to data about American citizens, including private messages and metadata. But the civil liberties implications of the agreement were even more troubling when it came to data vacuumed up by the NSA about non-U.S. persons — people who are not residents or citizens of the United States — and then shared with Israeli intelligence.</p>
<p>As a 2016 Brennan Center for Justice <a href="https://www.brennancenter.org/publication/overseas-surveillance-interconnected-world">report</a> on the memo noted, “None of the publicly available directives explains how intelligence agencies take into account the impact of intelligence sharing on the human rights of non-U.S. persons.” The report added, “The lack of transparency raises concern that shared information could be used to repress, censor, or persecute, or commit other human rights abuses.”</p>
<h3>Handwritten Note Refers to Israeli Request as &#8220;Problem Area&#8221;</h3>
<p>The memorandum of understanding between Israel and the NSA suggests a deal was reached nearly three years after the 2006 Israel-Lebanon War. It’s unclear how much cooperation the NSA provided to Israel during that conflict.</p>
<p>An <a href="https://theintercept.com/document/2019/05/29/nsa-presentation-on-isnu-relationship">internal NSA presentation</a>, which was also classified, recapped some of the key issues that arose between the NSA and ISNU during the fighting between Israel and Hezbollah. Dated April 2007, the slide deck also described the NSA’s relationship with ISNU more generally. The document noted that ISNU had roughly 5,500 enlisted conscripts and 1,200 career officers, and that the Israeli agency was headquartered in Tel Aviv with “production centers” in Syria, the Palestinian territories, Egypt, and Lebanon.</p>
<!-- BLOCK(pullquote)[2](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[2] -->&#8220;There is very little we know about the U.S. government regulations pertaining to the sharing of intelligence.&#8221;<!-- END-CONTENT(pullquote)[2] --></blockquote><!-- END-BLOCK(pullquote)[2] -->
<p>According to the slides, Israeli officials experienced “high anxiety” and were heavily reliant on the NSA for support during the 2006 war with Hezbollah. A slide titled “What Did ISNU Want?” indicated that the Israelis sought information on kidnapped soldiers in Lebanon, Iran’s role in those kidnappings, electronic signals intelligence, and geolocational data. A handwritten note on the margins of the slide — affixed by an unknown person — described this last point as a “problem area.”</p>
<p>The presentation also appraised the war effort, noting that Hezbollah was well-prepared for the conflict and enjoyed logistical support from Iran and Syria. The group operated in civilian neighborhoods, and the Israelis were receiving “bad world press” — presumably a reference to critical news stories about the destruction wrought on Lebanon during the war. As the SIDToday documents noted, life in Tel Aviv carried on more or less normally during the fighting, with hotels and restaurants packed with customers. The presentation also observed that there was “little sympathy for civilian non-Israeli casualties from man-on-the-street.”</p>
<p>The widespread civilian harm caused by the fighting also makes the details of U.S. intelligence cooperation with Israel controversial. Human Rights Watch estimated that over 1,100 Lebanese were killed over the course of the war, largely as a result of Israeli airstrikes and shelling in southern Lebanon. Several dozen Israeli civilians were also killed by Hezbollah rocket and mortar attacks that targeted Israeli border towns. Human Rights Watch later criticized the Israel Defense Forces for using indiscriminate force, claiming that the IDF had shown “<a href="https://www.hrw.org/report/2007/09/05/why-they-died/civilian-casualties-lebanon-during-2006-war">reckless indifference to the fate of Lebanese civilians</a>.”</p>
<p>“Israel repeatedly, and in some cases egregiously, violated the laws of war,” Nadim Houry, co-author of the Human Rights Watch report, said. “The Israeli military engaged in indiscriminate aerial attacks and massive use of cluster munitions, repeatedly targeting civilian infrastructure that was not tied in any way to the armed conflict.”</p>
<p>Israeli officials’ own statements seemed to back up human rights groups’ allegations that the IDF had deliberately targeted civilian infrastructure as a means of deterrence. Israeli officials later publicly dubbed this strategy the “<a href="https://imeu.org/article/the-dahiya-doctrine-and-israels-use-of-disproportionate-force">Dahiyeh Doctrine</a>,” a name taken from a south Beirut neighborhood that suffered catastrophic destruction during the fighting. Despite employing such tactics, the IDF was largely seen to have lost the war — or at least been fought to a draw by Hezbollah. Two points on the NSA slide presentation stated that, in the aftermath of the war, “public confidence in the IDF erodes” and “military morale/confidence low.”</p>

<p>There are ominous signs that Israel and Lebanon are nearing another confrontation, during which the ISNU may again lean on the NSA for support. Although Israeli intelligence-gathering capabilities are believed to have improved since the last war, Hezbollah has also reportedly acquired <a href="https://www.brookings.edu/blog/order-from-chaos/2018/09/07/another-war-in-lebanon/">significant new arms and fortified areas</a> under its control in southern Lebanon. The IDF <a href="https://www.reuters.com/article/us-israel-lebanon-tunnels/israel-may-expand-anti-tunnel-operation-into-lebanon-minister-says-idUSKBN1O61E6">recently carried out operations</a> near the Lebanese border to uncover tunnels said to have been dug by Hezbollah, and the Israeli Air Force periodically strikes Hezbollah targets in neighboring Syria.</p>
<p>Over the past several years, Hezbollah leaders claimed to have received “game-changing” weapons that would alter the course of any future war with Israel. For their part, Israeli officials have issued a steady drumbeat of statements emphasizing the level of destruction that Lebanon would suffer during another war, specifically highlighting the grievous harm that would be caused not just to Hezbollah, but also to Lebanese civilians and infrastructure.</p>
<p>“If the next war indeed breaks out, it will be rough. But, first and foremost, it will be rough for the other side,” IDF Maj. Gen. Nitzan Alon warned in an <a href="https://www.timesofisrael.com/top-general-says-idf-gearing-up-for-war-in-2018/">interview</a> last year. “I don’t think any Israeli citizen would want to switch places with a Lebanese citizen during the next war.”</p>
<p>The post <a href="https://theintercept.com/2019/05/29/israel-drone-strikes-intelligence-nsa/">Israel Hated American Ban on Sharing Intel for Assassinations, So U.S. Made New Rules</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2019/05/29/israel-drone-strikes-intelligence-nsa/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2019/05/GettyImages-72798085-hussain-1558538546-e1558538972999.jpg?fit=2985%2C1485' width='2985' height='1485' /><post-id xmlns="com-wordpress:feed-additions:1">248628</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?fit=720%2C98" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Sinking of Russian Nuclear Submarine Known to West Much Earlier Than Stated, NSA Document Indicates]]></title>
                <link>https://theintercept.com/2019/05/29/russia-submarine-kursk-norway-nsa/</link>
                <comments>https://theintercept.com/2019/05/29/russia-submarine-kursk-norway-nsa/#respond</comments>
                <pubDate>Wed, 29 May 2019 16:05:40 +0000</pubDate>
                                    <dc:creator><![CDATA[Miriam Pensack]]></dc:creator>
                                		<category><![CDATA[release-may-2019]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[World]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=248260</guid>
                                    <description><![CDATA[<p>The report about Kursk also stated that the Russian navy did not try to contact the submarine for five hours after explosions that sank it.</p>
<p>The post <a href="https://theintercept.com/2019/05/29/russia-submarine-kursk-norway-nsa/">Sinking of Russian Nuclear Submarine Known to West Much Earlier Than Stated, NSA Document Indicates</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank"><img loading="lazy" decoding="async" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p><u>If one were </u>to draw a map of the locales most pivotal to Vladimir Putin’s political trajectory, the bottom of the Barents Sea might not immediately come to mind. And yet, long before his incursions in Syria, Ukraine, and the U.S. elections, it was in those frigid waters off the navy base at Vidyayevo, in the northwestern corner of his country, that the Russian leader’s career took an indelible turn.</p>
<p>On August 12, 2000, a year after Putin took the helm as President Boris Yeltsin’s premier and less than six months into his own presidency, an explosion rocked the forward torpedo room of the Oscar II class Russian submarine Kursk. The blast was followed by a second, larger explosion that drove the vessel to the bottom of the Barents, inciting a crisis during what was to have been a milestone show of force by the Russian Northern Fleet.</p>
<p>A National Security Agency staffer monitored the dismal events from Oslo, Norway, where he had arrived as a signals liaison officer barely one month prior. The officer later described responses to the disaster from the NSA and its counterpart the Norwegian Intelligence Service in an <a href="https://theintercept.com/snowden-sidtoday/5987384-remembering-the-kursk-the-view-from-norway/">account he wrote for an NSA internal news site, SIDtoday</a>. The account, provided by whistleblower Edward Snowden and published with this article, indicates that Norwegian intelligence was aware the catastrophe had occurred two days earlier than it has said was the case, and provides new details on the timeline of the Russian naval response to the explosions, underscoring the extent to which the crisis was mismanaged.</p>
<!-- BLOCK(pullquote)[1](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[1] -->&#8220;Three and a half hours passed before any [Russian] suspicion of problems on board OSCAR II 850 arose.&#8221;<!-- END-CONTENT(pullquote)[1] --></blockquote><!-- END-BLOCK(pullquote)[1] -->
<p>For Putin, that mismanagement stood among the most prominent examples of how Russia’s military and diplomatic capabilities broke down after the fall of the Soviet Union, staining the early years of his presidency and ultimately spurring him to tighten his political grip.</p>
<p>The Barents is a contentious place, not only for its Arctic climate, but because it hugs the Russian and Norwegian coastlines. There, over decades of Cold War tensions, Western powers stood at their Soviet adversary’s doorstep, before geography and geopolitics merged to seal the fate of the 118 sailors who died aboard the Kursk.</p>
<p>Much remains unknown about the Russian navy’s handling of the disaster, and the official Russian narrative was not without its switchbacks. Initially, Moscow claimed that the Kursk collided with another vessel in the Barents, causing it to sink. In fact, a leaking torpedo blew up during a training exercise, Russia’s official investigation later concluded. Russian authorities also initially said that all aboard perished almost immediately; in fact, 23 sailors survived the blasts and sinking, likely for at least <a href="https://www.nytimes.com/2000/10/27/world/none-of-us-can-get-out-kursk-sailor-wrote.html">several hours</a>, if not <a href="https://www.theguardian.com/books/2002/aug/24/highereducation.kursk">days</a>, according to evidence later found by divers. Their resilience made it all the more lamentable that it took the Russian navy more than 15 hours to launch a rescue, which ultimately failed. As SIDtoday recounted, the Kursk’s sinking “occurred without any distress calls or communications of its problems.” By the time the Kursk landed on the seafloor, it was unable to contact the Northern Fleet command, and the aftermath of the explosion demonstrated a communication failure in which the Russian navy effectively lost track of its submarine.</p>
<p>“It seems as if the Northern Fleet was not aware that the explosions had occurred on one of their vessels,” an NIS report quoted in the SIDtoday article stated. “Thus, 3 ½ hours passed before any suspicion of problems on board OSCAR II 850 arose. Another 1 ½ hour passed before the sub call dissemination activity started.&#8221; Experts believe this dissemination activity was the fleet’s first attempts to communicate with the Kursk. These delays do not appear to have been reported previously.</p>
<p>SIDtoday also stated that the NIS report was issued on “Saturday 12 August,” the same day as the Kursk explosions. This is significant because the Norwegian military told the press in the wake of the incident that it did not realize an accident had occurred until Monday, the same day Russia announced the sinking — but the NIS report makes clear that Norway knew a Russian sub had been in a severe accident. Quoted at length in SIDtoday, it gives timings for the two explosions that are specific to the minute, adding:</p>
<blockquote><p>THIS CATASTROPHIC CASUALTY CAUSING ENTRY OF WATER INTO THE NOSE COMPARTMENTS AND PL850 [Kursk] HIT THE BOTTOM PROBABLY A FEW SECONDS LATER [sic]. BASED ON UPDATED DATA, PL850 OSCAR II WAS LOCATED AT BOTTOM OF THE SEA IN POSITION 6936.59N 3734.32E ATA DEPTH OF 108 METERS WITH PERISCOPE AND ANTENNAS ERECTED.</p></blockquote>
<p>A Norwegian spy ship, FS Marjata, was tracking the Northern Fleet exercise and collected information related to the Kursk, military officials told Norwegian newspapers, including Dagbladet and Bergens Tidende. The spy ship was within 15 nautical miles of the Kursk accident, <a href="http://ret.nu/fYvw6Dnc" target="_blank">said</a> the latter publication; a Norwegian Defense Command spokesperson told the paper that the military recorded the sound of the explosions but did not register anything unusual at the time, only noticing the explosions when reviewing the recordings after Russia disclosed the accident on Monday.</p>
<p>Dagbladet <a href="http://ret.nu/dcZ3G3UD" target="_blank">reported</a> that the Ministry of Defense said just after the accident, on Monday, that it received indications over the weekend of an accident involving a Russian nuclear submarine. But by Tuesday night, the ministry backtracked, telling Dagbladet that the information it received over the weekend could be interpreted in various different ways and that only on Monday was it certain that an accident had occurred.</p>
<!-- BLOCK(pullquote)[2](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[2] -->The Norwegian report, apparently issued Saturday, gives timings for explosions specific to the minute. But Norway said it did not realize an accident occurred until Monday.<!-- END-CONTENT(pullquote)[2] --></blockquote><!-- END-BLOCK(pullquote)[2] -->
<p>But journalist Robert Moore, in a 2003 book on the accident, “A Time to Die,” reported that Marjata’s &#8220;data are sent in real time to Oslo for analysis by naval intelligence specialists,” bolstering the idea that NIS could have been aware of the accident on Saturday, as indicated by SIDtoday.</p>
<p>NIS declined to comment for this article. The Russian government did not respond to a request for comment. NSA did not comment.</p>
<p>According to the SIDtoday document, “It was clear that the [Russian] Northern Fleet command had no information on the condition of the sub or crew” just after the sinking, and that once they managed to locate the Kursk, “the Russians did not have the ability to reach the sub to conduct any type of rescue/extraction operations.”</p>
<p>As European media began reporting on a “missing” Russian submarine in the following days, Britain, the U.S., and Norway offered publicly and, reportedly, through backchannel communications to aid in location and rescue efforts. In a move that would mar the early days of Putin’s leadership, the Northern Fleet waited until Wednesday — four days after the Kursk sank — before accepting any help from foreign powers. Norwegian and British rescuers wouldn’t arrive until that Saturday, a week after the accident.</p>
<p>Fourteen months after the disaster, the Dutch company Mammoet lead the initiative to lift the 17,000-ton submarine from more than 300 feet beneath the surface of the Barents. The recovery operation, which ultimately took 15 hours, proved particularly sensitive due to the twin nuclear reactors and stock of torpedoes and cruise missiles aboard the vessel. Upon surfacing, the Kursk was towed to dry dock at Roslyakovo.</p>
<h3>How Kursk Lead to &#8220;Clear Subordination&#8221; Under Putin</h3>
<p>The dysfunctional response to the crisis proved an unflattering revelation of the status of the Russian navy at the turn of the century, according to Michael Kofman, a senior research scientist at CNA, a Virginia nonprofit that operates the Center for Naval Analyses and developed early techniques for U.S. anti-submarine warfare. After a decade of economic and political instability following the collapse of the USSR in 1991, Russia’s defense infrastructure was underfunded and relied heavily on vestiges of Soviet military power. “Russia inherited a large percentage of the Soviet Union’s navy with a tiny fraction of its budget,” Kofman told The Intercept. Thus, Russia’s navy had on its hands equipment “meant to fight World War III with NATO,” Kofman said, without the need for such force and without the finances to maintain it.</p>
<p>Kofman also recalled that the Kursk’s grandeur — “an undersea atomic guided missile cruiser, as well as a capital ship and one of the largest submarines you can find at sea” — compounded the already unflattering optics surrounding the crisis. (A “capital ship” is one of a navy’s most important vessels and typically among its largest.)</p>
<!-- BLOCK(pullquote)[3](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[3] -->&#8220;Putin learned you&#8217;ve got to get a lid on TV and control how they portray you.&#8221;<!-- END-CONTENT(pullquote)[3] --></blockquote><!-- END-BLOCK(pullquote)[3] -->
<p>The crisis struck at a sensitive moment in Russia’s history. As the country was renegotiating its footing on the world stage, the Kursk disaster undermined equivalencies Russia drew between itself and other major Western powers. According to Sean Guillory, a scholar at the University of Pittsburgh’s Center for Russian, East European, and Eurasian Studies, a desire to reassert Russian geopolitical leadership offers one potential explanation for Putin’s unwillingness to accept assistance from Western powers immediately after the disaster. But for Guillory, there is also a security argument to be made, insofar as accepting military aid from NATO members would potentially expose sensitive Russian military information. “You can be sure that if the Americans are going to assist and rescue a submarine, they’re going to be taking notes,” Guillory said.</p>
<p>Whatever factors ultimately informed Putin’s delayed response to the crisis and to Western offers of aid, the historical moment Putin found himself in heightened the implications of the tragedy. Guillory pointed out that the events of August 2000 occurred at a time when, despite the formal demise of the USSR in 1991, “the Soviet system is still continuing to collapse,” the Kursk proving one of its most telling relics.</p>
<!-- BLOCK(photo)[4](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[4] -->
<a href="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-97578371-vladimir-putin-1558546166.jpg"><img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-251244" src="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-97578371-vladimir-putin-1558546166.jpg?fit=1024%2C1024" alt="GettyImages-97578371-vladimir-putin-1558546166" /></a>
<figcaption class="caption source">Russian President Vladimir Putin makes his first public comment on the Kursk submarine disaster at the Black Sea resort of Sochi, on Aug. 16, 2000.<br/>Photo: ITAR-TASS/AFP/Getty Images</figcaption><!-- END-CONTENT(photo)[4] --></figure><!-- END-BLOCK(photo)[4] -->
<p>From a public relations standpoint, both domestically and internationally, the Kursk disaster was what one might euphemistically call a teachable moment. Media coverage of Putin’s handling of the crisis was less than flattering, largely because Putin had yet to yoke Russian media firmly to his bidding, according to Tony Wood, author of the recent book, “<a href="https://www.versobooks.com/books/2839-russia-without-putin" target="_blank">Russia Without Putin: Money, Power and the Myths of the New Cold War</a>.” “The lessons Putin learned were, you’ve got to be a bit smoother, and you’ve also got to get a lid on TV and control how they portray you, otherwise they could finish your presidency,” said Wood. While families of missing sailors sought information on the state of their loved ones in the days following the blasts aboard the sub, Putin could be seen on vacation at a Black Sea resort at Sochi. Though he did go on Russian national television to take responsibility for the mismanagement of the disaster in late August, he also gave a remarkable interview to CNN journalist Larry King some weeks later that demonstrated an altogether different sort of statesmanship. In response to King’s inquiry into just what happened to the submarine, Putin responded flatly, through a translator: “It sank.”</p>

<p>Such obfuscations from Russian leadership did not go unchallenged, however. The NSA document recounts another dubious development in the weeks following the disaster that recalled “shades of the KGB in the 50s.” During a meeting between Russian officials and the families of some of the Kursk sailors in late August, Nadezhda Tylik, the mother of Kursk sailor Sergei Tylik, was yelling at First Deputy Prime Minister Ilya Klebanov when a trench coat-clad figure appeared behind her with a syringe in hand. In a video that aired on several major European news outlets, Tylik can be seen receiving an injection before collapsing into the arms of surrounding military officials, her diatribe interrupted. The SIDtoday document, as well as a number of media outlets, described the event as a forced sedation intended to silence Tylik. In a subsequent statement, Tylik countered the sedation narrative, claiming that the syringe captured on video contained medication for her heart. Tylik declined to offer comment for The Intercept. “Sorry,” she wrote via email, “but it is hard for me to remember those tragic days and for that reason I refuse to do interviews of any kind.”</p>
<p>Much as the disaster and its aftermath forever altered the lives of those who lost loved ones aboard the Kursk, so too did it change the tenor of Putin’s distinct flavor of statecraft. According to Wood, what emerged in the aftermath of Kursk was a strict adherence to “the vertical of power,” a catchphrase ascribed to Putin in the 2000s. Wood describes this as the “clear subordination and hierarchical functioning of all parts of the government,” essentially “a strict chain of command.” While this effectively sounds like any well-functioning form of governance, it also became associated with what critics view as Moscow’s emerging authoritarian predilections. The concept of the vertical of power actually predated Putin. “Yeltsin talked about it in the 1990s as well,” said Wood. “The difference is that, at that point in time, it was talked about as something that didn’t exist.” While the Kursk might not have singlehandedly prompted Putin to impose a stronger grasp on Russia’s media and military apparatuses, the scandal and dysfunction surrounding the disaster do delineate a clear before and after in Putin’s political and diplomatic trajectory. Indeed, by the mid- to late 2000s, Russia had experienced significant economic growth and had made notable funding and infrastructural advancements within its military. “If a crisis like the Kursk had happened several years later, Russia probably would have had the money and the wherewithal to handle it themselves,” said Wood.</p>
<p>The post <a href="https://theintercept.com/2019/05/29/russia-submarine-kursk-norway-nsa/">Sinking of Russian Nuclear Submarine Known to West Much Earlier Than Stated, NSA Document Indicates</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2019/05/29/russia-submarine-kursk-norway-nsa/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2019/05/AP_050812016249-russian-kursk-1558546164-e1558547978698.jpg?fit=1855%2C927' width='1855' height='927' /><post-id xmlns="com-wordpress:feed-additions:1">248260</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-97578371-vladimir-putin-1558546166.jpg?fit=2048%2C1651" medium="image">
			<media:title type="html">GettyImages-97578371-vladimir-putin-1558546166</media:title>
			<media:description type="html">Russian President Vladimir Putin makes his first public comment on the Kursk submarine disaster at the Black Sea resort of Sochi, on Aug. 16 2000.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/05/GettyImages-97578371-vladimir-putin-1558546166.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[328 NSA Documents Reveal “Vast Network” of Iranian Agents, Details of a Key Intelligence Coup, and a Fervor for Voice-Matching Technology]]></title>
                <link>https://theintercept.com/2018/08/15/nsa-edward-snowden-whistleblower-document-leaks/</link>
                <comments>https://theintercept.com/2018/08/15/nsa-edward-snowden-whistleblower-document-leaks/#respond</comments>
                <pubDate>Wed, 15 Aug 2018 18:12:42 +0000</pubDate>
                                    <dc:creator><![CDATA[Margot Williams]]></dc:creator>
                                    <dc:creator><![CDATA[Talya Cooper]]></dc:creator>
                                    <dc:creator><![CDATA[Henrik Moltke]]></dc:creator>
                                    <dc:creator><![CDATA[Micah Lee]]></dc:creator>
                                		<category><![CDATA[Environment]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[release-august-2018]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=204074</guid>
                                    <description><![CDATA[<p>Highlights from the seventh release of the internal NSA newsletter, SIDtoday.</p>
<p>The post <a href="https://theintercept.com/2018/08/15/nsa-edward-snowden-whistleblower-document-leaks/">328 NSA Documents Reveal “Vast Network” of Iranian Agents, Details of a Key Intelligence Coup, and a Fervor for Voice-Matching Technology</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-65243" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" srcset="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=720 720w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=540 540w" sizes="auto, (max-width: 720px) 100vw, 720px" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p class="P1"><u>It began not</u> by tapping enemy insurgents&#8217; phones or capturing their emails, but by following the money.</p>
<p class="Standard"><span class="T1">When the National Security Agency discovered</span><span class="T1"> that Iran may have been buying computer chips from the United States, routing them through a U.S. ally, and potentially supplying them to detonate bombs against U.S. forces in Iraq and Afghanistan, it credited so-called economic intelligence with the find. </span></p>
<p class="P1">And the solution was not a death blow delivered by the military, but rather a new regulation on the export of certain technologies via the Commerce Department, which the spy agency said would end up “saving American and coalition lives.”</p>
<p class="P1">The unusual strategy of tracing monetary flows to stop explosions is one of many significant disclosures contained in a batch of 328 internal NSA documents provided by whistleblower Edward Snowden and released by The Intercept today after research and redaction.</p>
<p class="P1">Also included in the material, which originates from SIDtoday, the newsletter of the agency’s core Signals Intelligence Directorate, is the untold story of how intelligence related to <a href="#zarqawi">Al Qaeda leader Abu Musab al-Zarqawi</a> was finally acquired; an assessment that a &#8220;<a href="#iran">vast … network of Iranian agents</a>&#8221;  operated in Iraq and influenced its government; a major push to hone the agency&#8217;s <a href="#voice">voice identification technology</a>; <a href="#world">details on how NSA staff deployed abroad</a> viewed, and sometimes stereotyped, their host countries; and grumbling about having to <a href="#foia">comply with public-records laws</a>.</p>
<p class="P1">Those stories and others are detailed in the highlights below; the NSA declined to answer questions about them. Also with this SIDtoday release, drawing on the same set of documents, Peter Maass <a href="https://theintercept.com/2018/08/15/nsa-sigint-curmudgeon-sidtoday">profiles the NSA&#8217;s &#8220;SIGINT Curmudgeon,&#8221;</a> Rahe Clancy, who wrote a beloved set of articles for SIDtoday, trying to instigate change from within the agency and riling up his fellow spies against its corporatization. Alleen Brown and Miriam Pensack, meanwhile, <a href="https://theintercept.com/2018/08/15/nsa-snowden-documents-climate-change">detail instances in which the NSA has spied on environmental disputes and around issues like climate change, overfishing, and water scarcity</a>. And Micah Lee <a href="https://theintercept.com/2018/08/15/nsa-vpn-hack-al-jazeera-sidtoday">reveals that the NSA infiltrated virtual private computer networks used by various airlines, the Al Jazeera news network, and the Iraqi government</a>.</p>
<p class="P1"><!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[1] --> <img loading="lazy" decoding="async" class="aligncenter wp-image-204602 size-large" src="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-72651504-1534169618.jpg?w=1024" alt="RAWAH, IRAQ - NOVEMBER 23:  In this handout provided by the USMC and released on November 27, 2006, U.S. Army Gen. George W. Casey, Jr., commander for Multi-National Forces-Iraq, speaks with U.S. Army Maj. Sean Bastian, commanding officer of a military transition team, during a Thanksgiving Day visit November 23, 2006 at Combat Outpost Rawah in Iraq's Al Anbar Province. Military transition teams are groups of U.S. service members who mentor Iraqi soldiers to eventually relieve Coalition Forces of security operations in Iraq. Casey complimented the Marines on the good work they've done in the region, and urged them to continue that work. Marines from the Camp Lejeune, North Carolina-based 2nd Light Armored Reconnaissance Battalion arrived in Iraq three months ago and provides security to this region of the Al Anbar Province.  (Photo by Lance Cpl. Nathaniel Sapp/USMC via Getty Images)" width="1024" height="748" srcset="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-72651504-1534169618.jpg?w=3200 3200w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-72651504-1534169618.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-72651504-1534169618.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-72651504-1534169618.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-72651504-1534169618.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-72651504-1534169618.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-72651504-1534169618.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-72651504-1534169618.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-72651504-1534169618.jpg?w=2400 2400w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<p class="caption overlayed">U.S. Army Gen. George W. Casey, Jr., commander for Multi-National Force-Iraq, speaks with U.S. Army Maj. Sean Bastian, commanding officer of a military transition team, during a Thanksgiving Day visit Nov. 23, 2006, at Combat Outpost Rawah in Iraq&#8217;s Al Anbar province.</p>
<p class="P1">
<figcaption class="caption source pullright">Photo: Lance Cpl. Nathaniel Sapp/USMC via Getty Images</figcaption></p><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] --></p>
<h3 id="iran">In Iraq, a “Vast and Disperse Network of Iranian Agents”</h3>
<p class="Standard"><span class="T2">The NSA caught Iran smuggling American microprocessors that may have been used to bomb U.S. troops in Iraq, according to a <a href="https://theintercept.com/snowden-sidtoday/4755695-economic-reporting-strives-to-interdict-the-flow">May 2006 SIDtoday article</a></span><span class="T2">. To import the chips, Iran set up front companies in the United Arab Emirates, an agency staffer wrote; the front companies then sent the microprocessors to customers in Iran and Syria.</span></p>
<p class="Standard"><span class="T2">The chips had both civilian and military capabilities and “have been used or are capable of being used” in the improvised explosive devices used extensively against U.S. forces in Iraq, the report concluded. Intelligence on the chip smuggling came not from intercepted military or diplomatic communications, as is typical at the agency, but rather through &#8220;economic reporting.&#8221;<br />
</span></p>
<p class="Standard"><span class="T2">Earlier the same year, an NSA representative who was embedded with U.S. Special Operations Command stated in a <a href="https://theintercept.com/snowden-sidtoday/4755473-embedded-with-ussocom-nsa-reps-provide-direct">top-secret SIDtoday report</a> that</span><span class="T2"> analysts had discovered “a vast and disperse network of Iranian agents in Iraq serving the Iranian Ministry of Intelligence or the Islamic Revolutionary Guards Corps</span><span class="T2">.”<br />
</span></p>
<p class="Standard"><span class="T2">In Kuwait, different NSA units deployed a satellite interception system to hear conversations between Iranian agents, <a href="https://theintercept.com/snowden-sidtoday/4755716-deployment-of-new-system-improves-access-to">according to SIDtoday</a></span><span class="T2">. This produced new intelligence reports that “have focused on Iran’s (and specifically Iran’s external paramilitary and intelligence forces’) activities in Iraq and the influence they wield on important figures in the new Iraqi Government.”</span></p>
<p class="Standard"><span class="T2">SIDtoday’s 2006 reporting on Iran’s involvement in Iraq buttressed comments by Gen. George W. Casey Jr., the top American military commander in Iraq, who </span><a class="ListLabel_20_1" href="https://www.nytimes.com/2006/06/23/world/middleeast/23military.html"><span class="Internet_20_link"><span class="T2">told reporters</span></span></a><span class="T2"> in June that year that the military was “quite confident that the Iranians, through their covert special operations forces, are providing weapons, I.E.D. technology and training to Shia extremist groups in Iraq.” By 2017, the New York Times would </span><a class="ListLabel_20_1" href="https://www.nytimes.com/2017/07/15/world/middleeast/iran-iraq-iranian-power.html"><span class="Internet_20_link"><span class="T2">say</span></span></a><span class="T2"> that Iran dominated Iraq: Iran-sponsored militias dominated in Iraq&#8217;s south, and cabinet politicians who resisted Iran lost their jobs, while U.S. efforts in Iraq primarily focused on chasing the Islamic State in the country’s north.</span></p>
<p class="Standard"><!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[2] --> <img loading="lazy" decoding="async" width="2000" height="1333" class="aligncenter size-large wp-image-204603" src="https://theintercept.com/wp-content/uploads/2018/08/AP_05060501931-1534169746.jpg" alt="U.S. Army soldiers make radio contact after arriving by helicopter at night at an undisclosed location south of Baghdad, Iraq where they believed a top leader of the insurgency and close associated of Abu Musab al-Zarqawi was hiding, Sunday, June 5, 2005. Although the insurgent leader was not found, Americans and soldiers from the Iraqi Intervention Force detained 15 people. (AP Photo/Jacob Silberberg)" srcset="https://theintercept.com/wp-content/uploads/2018/08/AP_05060501931-1534169746.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2018/08/AP_05060501931-1534169746.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/08/AP_05060501931-1534169746.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/08/AP_05060501931-1534169746.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/08/AP_05060501931-1534169746.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/08/AP_05060501931-1534169746.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/08/AP_05060501931-1534169746.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<p class="caption overlayed">U.S. Army soldiers make radio contact after arriving by helicopter at night at an undisclosed location south of Baghdad, where they believed a top leader of the insurgency and close associated of Abu Musab al-Zarqawi was hiding, June 5, 2005.</p>
<p class="Standard">
<figcaption class="caption source pullright">Photo: Jacob Silberberg/AP</figcaption></p><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] --></p>
<h3 id="zarqawi">How Key Al-Zarqawi Intelligence Was Obtained</h3>
<p class="Standard"><span class="T1">In Iraq, at a strategic level, the U.S. was concerned about Iran; at the ground level, its top priority in 2006 was finding the Jordanian Ahmad Fadil al-Khalayleh, better known as Abu Musab al-Zarqawi — the most wanted terrorist in the country. Al-Zarqawi was the leader of the insurgent group Al Qaeda in Iraq and a fugitive from a Jordanian death sentence. The <a href="https://web.archive.org/web/20060420063137/http://www.rewardsforjustice.net:80/english/wanted_captured/index.cfm?page=Al_Zarqawi">reward</a> for information resulting in his capture or death reached $25 million</span><span class="T1">.<br />
</span></p>
<p><span class="T1">Zarqawi was brutal to Iraqis as well as Americans. </span><span class="Internet_20_link"><span class="T1">According</span></span><span class="T1"> to <a href="https://www.washingtonpost.com/world/national-security/isiss-gains-in-iraq-fulfill-founders-violent-vision/2014/06/14/921ff6d2-f3b5-11e3-914c-1fbd0614e2d4_story.html">Joby Warrick</a>, author of the Pulitzer Prize-winning book &#8220;</span><span class="T3">Black Flags: The Rise of ISIS</span><span class="T1">,&#8221; “The Jordanian also would seek to strike fear into Americans and other Westerners in Iraq with a series of kidnappings and videotaped beheadings. </span><span class="T1">The first victim, Pennsylvania businessman Nicholas Berg, was butchered on camera by a hooded Islamist that CIA officers later confirmed was Zarqawi himself</span><span class="T3">.”</span></p>
<p class="Standard"><!-- BLOCK(pullquote)[3](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[3] --><span class="T1">NSA specialists were able to figure out the location of the internet cafe in Baghdad where the courier was about to access an email account.  An important message from al-Zawahiri to al-Zarqawi, &#8220;outlining al-Qaeda’s strategic vision for Iraq,&#8221; was obtained.<!-- END-CONTENT(pullquote)[3] --></blockquote><!-- END-BLOCK(pullquote)[3] --></span></p>
<p class="Standard"><span class="T1">A major breakthrough had come in 2005, when NSA analysts intercepted, via a courier in Iraq, emails that were intended for al-Zarqawi from Al Qaeda No. 2 Ayman al-Zawahiri in Pakistan. In partnership with U.S. forces, NSA specialists in geospatial intelligence and counterterrorism were able to figure out the location of the internet cafe in Baghdad where the courier was about to access an email account. The courier and a “traveling partner” were caught, and an important message from al-Zawahiri to al-Zarqawi, &#8220;<a href="https://theintercept.com/snowden-sidtoday/4755486-intercepted-letter-for-zarqawi-from-al-qa-ida">outlining al-Qaeda’s strategic vision for Iraq,</a>&#8221; was obtained</span><span class="T1">. The 15-page <a href="https://ctc.usma.edu/harmony-program/zawahiris-letter-to-zarqawi-original-language-2/">document</a> was made public by the Office of the Director of National Intelligence in 2005, but the circumstances under which it was obtained appear to have not been previously reported</span><span class="T1">. (Warrick’s book said “the CIA’s acquisition of the letter was a closely-guarded secret” and stated only that “the surveillance net” around al-Zarqawi “had snagged a singular piece of correspondence.”)</span></p>
<p class="Standard"><span class="T1">By early 2006, SIDtoday continued to report on how signals intelligence successes <a href="https://theintercept.com/snowden-sidtoday/4755643-sigint-contributes-to-the-capture-of-the-butcher">helped capture</a> <a href="https://theintercept.com/snowden-sidtoday/4755558-nsa-css-georgia-contributes-to-capture-of-iraqi">lesser-known figures</a></span><span class="T3">. But</span><span class="T1"> the primary target</span><span class="T1"> remained at large and continued to issue propaganda videos. </span><span class="T1">An intelligence analyst <a href="https://theintercept.com/snowden-sidtoday/4755532-instant-gratification-sigint">described the intensity</a> of an assignment to a task force in Mosul, Iraq: “We worked for 14 to 18 hours a day, pouring over traffic and piecing together data to find threats or information that would help us locate and go get bad guys. You would feel every minute of those days, but you&#8217;d wake up one morning and it would be August.&#8221; </span></p>
<p class="Standard"><span class="T1">Back at NSA headquarters, <a href="https://theintercept.com/document/2018/01/19/open-source-signals-analysis-not-your-grandfathers-sigint/">new mathematical analysis tools</a> supplemented old-school language expertise in the process of reviewing audio recordings of al-Zarqawi posted on the open web, confirming his voice</span><span class="T1">. </span></p>
<p class="P15"><span class="T1">At last, on June 7, 2006, the “primary PC,” which stands for “precious cargo,” was found and dealt a death blow. <a href="https://theintercept.com/snowden-sidtoday/4757888-catch-of-the-day-abu-mu-sab-al-zarqawi-and-friends">In SIDtoday</a>, an analyst from the NSA Cryptologic Services Group described the work of the Special Operations Task Force leading up to the targeted bomb strike that killed al-Zarqawi and others, reportedly in a two-story house near Baqubah, northeast of Baghdad</span><span class="T3">, saying</span><span class="T1"> that a combination of signals intelligence, imagery intelligence, human intelligence, and “detainee reporting” uncovered the identity and location of al-Zarqawi’s “personal religious advisor,” </span><span class="T1">Sheikh &#8216;Abd-al-Rahman, who was followed to al-Zarqawi’s hiding place and perished with him.</span></p>
<p class="P15"><!-- BLOCK(photo)[4](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[4] --> <img loading="lazy" decoding="async" class="aligncenter wp-image-204611 size-large" src="https://theintercept.com/wp-content/uploads/2018/08/AP_02041502773-1534170419.jpg?w=1024" alt="In this television image from Arab satellite station Al-Jazeera, Osama bin Laden, right, listens as his top deputy Ayman al-Zawahri speaks at an undisclosed location, in this image made from undated video tape broadcast by the station Monday April 15, 2002. Al-Jazeera editor-in-chief Ibrahim Hilal said the excerpts were from an hour-long video, complete with narration and graphics, delivered by hand to the station's Doha, Qatar offices a week ago. At bottom right is the station's logo. (AP Photo/Al-Jazeera/APTN)" width="1024" height="804" srcset="https://theintercept.com/wp-content/uploads/2018/08/AP_02041502773-1534170419.jpg?w=1900 1900w, https://theintercept.com/wp-content/uploads/2018/08/AP_02041502773-1534170419.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/08/AP_02041502773-1534170419.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/08/AP_02041502773-1534170419.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/08/AP_02041502773-1534170419.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/08/AP_02041502773-1534170419.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/08/AP_02041502773-1534170419.jpg?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<p class="caption overlayed">In this television image from Arab satellite station Al Jazeera, Osama bin Laden, right, listens as his top deputy Ayman al-Zawahiri speaks at an undisclosed location, in this image made from undated video tape broadcast by the station, April 15, 2002.</p>
<p class="P15">
<figcaption class="caption source pullright">Photo: Al-Jazeera/APTN/AP</figcaption></p><!-- END-CONTENT(photo)[4] --></figure><!-- END-BLOCK(photo)[4] --></p>
<h3 id="voice">Fervor for Voice Matching Technology</h3>
<p class="Standard"><span class="T1">By the end of 2006, the NSA had come to believe that audio fingerprinting as performed against al-Zarqawi could be used as a simple fix for a host of complex problems, from freeing hostages to curbing nuclear weapons proliferation, according to a series of SIDtoday articles.</span></p>
<p class="Standard"><span class="T1">Despite repeated setbacks, the NSA remained enthusiastic about voice matching technology, which identifies people by the sound of their voice. The agency had help: According to SIDtoday,</span><span class="T4"> voice matching techniques were developed by the </span><a class="ListLabel_20_1" href="https://www.ll.mit.edu/"><span class="Internet_20_link"><span class="T4">Massachusetts Institute of Technology Lincoln Laboratory</span></span></a><span class="T4"> on the back of efforts to confirm the authenticity of broadcasts by Al Qaeda leaders Osama bin Laden and Ayman al-Zawahiri.</span></p>
<p class="No_20_Spacing"><span class="T4">A <a href="https://theintercept.com/snowden-sidtoday/4755516-al-zawahiri-speaks-yet-again">February 2006 SIDtoday article</a> described some of the difficulties inherent in voice matching, noting that Al Qaeda second-in-command al-Zawahiri displayed more “tonal diversity” than usual following a </span><a class="ListLabel_20_1" href="https://www.theguardian.com/world/2006/jan/15/alqaida.pakistan"><span class="Internet_20_link"><span class="T4">botched drone strike</span></span></a><span class="T4"> against him. (The attack killed at least 18 in the Pakistani village of Damadola but missed al-Zawahiri, </span><a class="ListLabel_20_1" href="http://www.washingtonpost.com/wp-dyn/content/article/2007/09/08/AR2007090801845_pf.html"><span class="Internet_20_link"><span class="T4">reportedly</span></span></a><span class="T4"> due to faulty intelligence on his location.)</span></p>
<p class="Standard"><span class="T4">“During the 30 Jan message &#8212; lasting about three minutes &#8212; the terrorist never quite settled down, probably rattled by the attempt on his life and the vehement content,” the article stated. Despite al-Zawahiri’s shaky voice, &#8220;mathematical voice matching produced a perfect score of 99% upon comparison with previous soundfiles on this speaker from the same source.&#8221;</span></p>
<p class="Normal_20__28_Web_29_"><span class="T4">Six weeks later, <a href="https://theintercept.com/snowden-sidtoday/4755587-al-zawahiri-at-it-again">another article</a> described how two of five transmissions by al-Zawahiri in a nine-month span failed to yield a high-confidence voice match with previous transmissions. This was solved with new technology from MIT, which “allows optimal combination of vocal-tract models from contentious intercepts,” according to SIDtoday. The lesson to NSA: “Careful modeling” is “critical” for making voice identification actually work — and particularly important once </span><span class="T5">voice matching is applied on a “large scale” to identify those “</span><span class="T4">bent on terrorist activities against U.S. forces or the local populace.&#8221;</span></p>
<p class="Normal_20__28_Web_29_"><span class="T4">The same article goes on to describe a </span><span class="T5">hand-held device, close to going into production, which would provide field access to MIT’s &#8220;</span><span class="T5">mathematical engine&#8221; and voice matching estimates in “hostile environments.” </span></p>
<p class="Standard"><span class="T4">A <a href="https://theintercept.com/snowden-sidtoday/4755667-public-enemy-no-1-speaks">May 2006 article</a> describes another voice recognition stumble, when an October 2003 audio recording of bin Laden could not identify the Al Qaeda chief’s voice because it “proved to be of too low quality.” The file was later “enhanced” using software from a “local vendor … to yield a perfect match.” Still, there were successes, credited to the MIT software, with which “voice matching has become simplicity itself.” For example, an April 2006 recording of bin Laden was successfully matched against a January 2005 recording of bin Laden and against multiple other recordings.</span></p>
<p class="Standard"><span class="T4">The May SIDtoday article included references to screenshots of the MIT software’s “Speaker Comparison Algorithm” interface. Though those screenshots were not included in the SIDtoday articles as provided by Snowden, two images from an article on Lincoln Laboratory’s webpage &#8212; which were </span><a class="ListLabel_20_1" href="https://web.archive.org/web/20150316140809/https:/www.ll.mit.edu/publications/technotes/TechNote_VOCALinc.pdf"><span class="Internet_20_link"><span class="T4">removed</span></span></a><span class="T4"> during the course of reporting this article &#8212; refer to a similarly named interface</span><span class="T6">:  </span></p>
<p class="Standard"><!-- BLOCK(photo)[5](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221000px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1000px;"><!-- CONTENT(photo)[5] --> <img data-recalc-dims="1" height="99999" width="1000" decoding="async" class="aligncenter size-article-large wp-image-204613" src="https://theintercept.com/wp-content/uploads/2018/08/Untitled-2-1000-1534170686.jpg?fit=1000%2C99999" alt="" /> <!-- END-CONTENT(photo)[5] --></figure><!-- END-BLOCK(photo)[5] --><!-- BLOCK(photo)[6](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22933px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 933px;"><!-- CONTENT(photo)[6] --> <img loading="lazy" decoding="async" class="aligncenter wp-image-204614 size-large" src="https://theintercept.com/wp-content/uploads/2018/08/Untitled-1000-1534170687.jpg?w=933" alt="" width="933" height="1024" srcset="https://theintercept.com/wp-content/uploads/2018/08/Untitled-1000-1534170687.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2018/08/Untitled-1000-1534170687.jpg?w=273 273w, https://theintercept.com/wp-content/uploads/2018/08/Untitled-1000-1534170687.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/08/Untitled-1000-1534170687.jpg?w=933 933w, https://theintercept.com/wp-content/uploads/2018/08/Untitled-1000-1534170687.jpg?w=540 540w" sizes="auto, (max-width: 933px) 100vw, 933px" />
<p class="caption">Screenshots of MIT Lincoln Lab’s VOCALinc tool, which was “sponsored by the Department of Defense” and developed &#8220;utilizing U.S. government operational data.&#8221;</p>
<p class="Standard">
<figcaption class="caption source">Screenshots: MIT Lincoln Lab</figcaption></p><!-- END-CONTENT(photo)[6] --></figure><!-- END-BLOCK(photo)[6] --></p>
<p class="Standard"><span class="T6">The MIT voice identification software was so important to the NSA that the agency approved a four-hour course on it based on MIT documentation and added the class to the National Cryptologic School syllabus, according to a </span><a href="https://theintercept.com/document/2018/08/15/nsa-sidtoday-voicematch-a-new-offering-at-ncs"><span class="T1">July 2006 </span></a><span class="T6"><a href="https://theintercept.com/document/2018/08/15/nsa-sidtoday-voicematch-a-new-offering-at-ncs">SIDtoday article</a></span><span class="T1">.</span></p>
<p class="Standard"><span class="T4">The code, or an MIT-updated version of it, appears to have still been in use nearly eight years later. According to publicly available documentation from 2014, </span><a class="ListLabel_20_1" href="https://web.archive.org/web/20150316140809/https:/www.ll.mit.edu/publications/technotes/TechNote_VOCALinc.pdf"><span class="Internet_20_link"><span class="T4">MIT Lincoln Lab’s VOCALinc tool</span></span></a><span class="T4"> was “already in use by several entities,” including “intelligence missions concerning national security” in areas such as terrorism. The document also references the development of “unseen devices such as body microphones and multirecording systems.” (Lincoln Lab did not provide responses to questions in the weeks leading up to publication of this article, although a spokesperson indicated he would try to get a response from a staffer &#8220;if sponsors allow him to discuss these topics.&#8221;)</span></p>
<p class="Standard"><span class="T4">Perhaps the clearest example of the enthusiasm for audio fingerprinting at the NSA in 2006 comes from an article written in March by the agency’s “Technical Director, Operational Technologies,” Adolf Cusmariu. </span></p>
<p class="Standard"><span class="T5">In the article — titled &#8220;<a href="https://theintercept.com/snowden-sidtoday/4755615-nuclear-sleuthing-can-sigint-help">Nuclear Sleuthing &#8212; Can SIGINT Help?</a>&#8221; —</span><span class="T4"> </span><span class="T5">Cusmariu took the idea at the base of the NSA&#8217;s voice matching technology to a new level of optimism. </span></p>
<p class="P6"><span class="T4">What if, Cusmariu asked, the NSA scanned intercepted phone calls for the distinct sound generated by centrifuges used in uranium enrichment facilities? Could this help identify hidden nuclear weapons facilities in &#8220;rogue states like Iran and North Korea?&#8221;</span></p>
<p class="P6"><!-- BLOCK(pullquote)[7](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[7] --><span class="T4">What if, Cusmariu asked, the NSA scanned intercepted phone calls for the distinct sound generated by centrifuges used in uranium enrichment facilities?</span><!-- END-CONTENT(pullquote)[7] --></blockquote><!-- END-BLOCK(pullquote)[7] --></p>
<p class="P6"><span class="T2">There were</span><span class="T4"> several problems with the idea. First, there was the issue of background noise &#8212; the sound of the centrifuges inevitably mixing with other audio sources &#8212; &#8220;making unequivocal fingerprinting problematic.&#8221; Then, there was the fact that </span><span class="T3">&#8220;the person making the call would have to be located inside, or at least near, the centrifuge compound for the acoustical signature to be audible.&#8221;</span></p>
<p class="P6"><span class="T2">“Yes, a needle in a haystack!&#8221; Cusmariu admitted, but nonetheless, &#8220;</span><span class="T3">algorithms have been developed … looking for just such signatures.” Unfortunately, “no convincing evidence has been found so far.&#8221;</span></p>
<p><span class="T2">Public records show that, in the months following these articles, </span><span class="T4">Cusmariu filed for patents on “</span><a class="ListLabel_20_1" href="https://patents.google.com/patent/US7571093"><span class="Internet_20_link"><span class="T4">identifying duplicate voice recording</span></span></a><span class="T4">” and “</span><span class="Internet_20_link"><span class="T4"><a class="ListLabel_20_1" href="https://patents.google.com/patent/US7650281B1/">comparing voice signals that reduces false alarms</a>.</span></span><span class="T4">” Both were granted and describe methods similar to those discussed in SIDtoday, but with different applications.</span></p>
<p class="P6"><span class="T3">To be sure, there was reason for some level of optimism about voice recognition technology. A brief — and top secret — <a href="https://theintercept.com/snowden-sidtoday/4755709-scs-baghdad-teams-with-brits-to-help-free-hostages">SIDtoday article</a></span><span class="T4"><a href="https://theintercept.com/snowden-sidtoday/4755709-scs-baghdad-teams-with-brits-to-help-free-hostages"> from May 2006</a> suggested that </span><span class="T3">voice identification </span><span class="T4">helped free the Briton </span><span class="T5">Norman Kember and two Canadian fellow peace activists, who were held hostage in Baghdad. The successful operation was widely reported at the time, but the </span><span class="T4">fact that voice ID helped identify the hostage-takers was not made public.</span></p>
<p class="Standard"><span class="T4">The CIA and the NSA staff of the Special Collection Service site in Baghdad worked together to find the kidnappers for several nights leading up to March 23, 2006, the article disclosed. On the final night, British and American spies, working side by side &#8220;to eliminate incorrect targets through voice identification,&#8221; were able to isolate &#8220;the specific terrorist believed to be holding the hostages.&#8221; The article does not, however, state whether the match was made by a computer, human, or combination of the two.</span></p>
<p class="P6"><span class="T2">Eventually, the NSA played a pivotal role in developing voice matching technology, as described in Ava Kofman’s exposé earlier this year in </span><a class="ListLabel_20_3" href="https://theintercept.com/2018/01/19/voice-recognition-technology-nsa/"><span class="Internet_20_link"><span class="T5">The Intercept</span></span></a><span class="T2">. </span></p>
<h3 id="dragon"> “Dragon Team” Helped NSA Thwart Cordless Phones Used by Insurgents</h3>
<p class="Standard_20__28_user_29_"><span class="T1">Although it lacked the technical glamour of voice matching, the NSA saw its effort against high-powered cordless phones as critical to protecting U.S. troops on the ground. Early on in the Afghanistan and Iraq wars, the simple, rugged devices, also known as HPCPs, were in common use by insurgents, including as a means of triggering improvised explosive devices, or IEDs. SIDtoday articles </span><a class="ListLabel_20_4" href="https://theintercept.com/2016/08/10/iraqi-insurgents-stymied-the-nsa-and-other-highlights-from-263-internal-agency-reports/"><span class="T1">from 2003</span></a> <a class="ListLabel_20_2" href="https://theintercept.com/2016/08/10/iraqi-insurgents-stymied-the-nsa-and-other-highlights-from-263-internal-agency-reports/"><span class="Internet_20_link"><span class="T1">complained</span></span></a><span class="T1"> that these handsets, which could communicate with other handsets that were also within a 50-mile range of the radio base station, created an “intelligence gap,” and were such a problem that the NSA hosted a “Worldwide HPCP Conference” to understand, and design attacks against, this technology.<br />
</span></p>
<p class="T1"><span class="T1">Less than three years later, the NSA had made significant progress. A <a href="https://theintercept.com/snowden-sidtoday/4755683-new-cno-capability-poised-to-help-counter-ieds">SIDtoday article</a></span><span class="T1"> from May 2006 said a “dragon team” of NSA researchers</span> developed a tool called &#8220;FIRESTORM&#8221; that supported a denial-of-service attack capability against cordless phone networks. FIRESTORM could prevent IED attacks and support an ability to “ping” a specific device, “forcing the targeted HPCP to emit an RF signal that can be geolocated by any asset in the area.” The dragon team had been “eagerly working with potential users to move this capability out of the development lab and into the fight.”</p>
<p class="T1"><!-- BLOCK(photo)[8](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[8] --> <img loading="lazy" decoding="async" width="2393" height="1212" class="aligncenter size-large wp-image-204776" src="https://theintercept.com/wp-content/uploads/2018/08/sugar-grove-1-1534195038.jpg" alt="sugar-grove-1-1534195038" srcset="https://theintercept.com/wp-content/uploads/2018/08/sugar-grove-1-1534195038.jpg?w=2393 2393w, https://theintercept.com/wp-content/uploads/2018/08/sugar-grove-1-1534195038.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/08/sugar-grove-1-1534195038.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/08/sugar-grove-1-1534195038.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/08/sugar-grove-1-1534195038.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/08/sugar-grove-1-1534195038.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2018/08/sugar-grove-1-1534195038.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/08/sugar-grove-1-1534195038.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<p class="caption overlayed">Sugar Grove station in West Virginia.</p>
<p class="T1">
<figcaption class="caption source pullright">Screenshot: Google Map</figcaption></p><!-- END-CONTENT(photo)[8] --></figure><!-- END-BLOCK(photo)[8] --></p>
<h3 id="world">How NSA Staff Viewed the Rest of the World</h3>
<p class="Standard"><span class="T1">The NSA needed staff paying attention to issues, like HPCPs, that resonated only once you were outside the bubble of Washington, D.C., and Fort Meade, Maryland — or which could only be addressed effectively from another country. To do so, it needed to convince them of the benefits of relocation. The perennial &#8220;SID Around the World&#8221; series within SIDtoday described daily life on assignment to global NSA locations, often in glowing terms. With a substantial portion of agency postings in remote locations, where big satellite dishes can dominate empty landscapes, or in offices on military bases, or in the underground bunkers below them, the idea was to make working abroad for the NSA sound fun. But in just its third year, the series seemed to fall back on lazy stereotypes and imperious complaining.</span></p>
<p class="Standard"><!-- BLOCK(pullquote)[9](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[9] -->T<span class="T1">he series seemed to fall back on lazy stereotypes and imperious complaining</span>.<!-- END-CONTENT(pullquote)[9] --></blockquote><!-- END-BLOCK(pullquote)[9] --></p>
<p class="Standard"><span class="T1">A lucky staffer in Bangkok, an “adventurous woman,” is most enthusiastic about the cost of living there. “You can hire a maid for less than $100 a month or $1200 per year as a single person,” <a href="https://theintercept.com/snowden-sidtoday/4755578-sid-around-the-world-living-in-thailand-a-single">she wrote</a></span><span class="T1">. “Most domestic services include: cooking, cleaning, washing, ironing, and babysitting children and/or pets. Tell me where you find that kind of help so cheaply? And the Thai domestic help are kind and trustworthy; therefore, no </span><span class="T1">need to worry about your valuables.” You can live like a queen</span><span class="T1">.</span></p>
<p class="P1"><span class="T1">In 2006, <a href="https://theintercept.com/snowden-sidtoday/4755668-sid-around-the-world-misawa-and-tokyo">to one staffer</a>, the Japanese “fascination with technology” was notable; they carried cellphones equipped with two-way video conferencing and web browsing, and drove cars equipped with GPS. </span></p>
<p class="P1">Yet “[d]espite having one of the oldest cultures in the world, the Japanese seem very innocent and naive.” Really?</p>
<p class="P1">It seems there were some ugly Americans on assignment.</p>
<p class="Standard"><span class="T1">Traffic was bad, or the roads are narrow, in <a href="https://theintercept.com/snowden-sidtoday/4757930-sid-around-the-world-jumping-into-yorkshire-s">England</a></span><span class="T1">, <a href="https://theintercept.com/snowden-sidtoday/4755668-sid-around-the-world-misawa-and-tokyo">Japan</a></span><span class="T1">, and <a href="https://theintercept.com/snowden-sidtoday/4757929-sid-around-the-world-walking-the-streets-of-turkey">Turkey</a></span><span class="T1">, too.</span></p>
<p class="Standard"><span class="T1">In Turkey, the cuisine was “world-class,” although lacking variety: “Probably 90 percent of Turkish restaurants offer no more than 4 or 5 traditional Turkish dishes</span><span class="T1">.” </span></p>
<p class="Standard"><span class="T1">Indeed, culinary attractions, a staple of the series, seemed sparse. In fact, NSA staffers were introducing America’s Fourth of July fare and Italian dishes to the villagers of rural Yorkshire, </span><span class="T1">where they tasted English boiled beef and potatoes with a “wilted sprig of parsley” on top. No really, “it is actually very good and certainly doesn’t deserve the bad reviews that it has been getting.” </span></p>
<p class="P1">But the shopping! In Ankara, the fruit was so fresh, the price was so cheap, and there were, again, “world-class” handicrafts. In Thailand, there were many “wonders for a single woman to enjoy,” like gorgeous silk fabrics, gems, and jewelry.</p>
<p class="Standard"><span class="T1">Meanwhile, back in the U.S., <a href="https://theintercept.com/snowden-sidtoday/4755611-sid-around-the-world-a-glimpse-of-utah">one of the best parts of a Utah posting</a> was the dusty road trip on I-15 to California</span><span class="T1">. And from the <a href="https://theintercept.com/snowden-sidtoday/4755540-sid-around-the-world-sugar-grove-west-virginia">Sugar Grove station in West Virginia</a>, the nearest shopping was 40 miles away, in another state, over snow, black ice, and curvy roads in the winter. Nothing was said about the cuisine. Getting to work at the underground NSA site required driving to the top of a mountain from the U.S. Naval Information Operations </span><span class="T1">Command center at Sugar Grove, a naval base in landlocked West Virginia. There were occasional bear sightings. Since its 2006 appearance in SIDtoday, the naval base has been decommissioned and sold, but the underground NSA facility continues to operate with its secret mission.</span></p>
<p class="Standard"><span class="T1">Through its sister publication Field of Vision, The Intercept covered Sugar Grove with a film and </span><a class="ListLabel_20_2" href="https://theintercept.com/2017/08/12/film-the-tiny-west-virginia-town-haunted-by-an-nsa-secret/"><span class="Internet_20_link"><span class="T1">story</span></span></a><span class="T1"> last year. As Sam Biddle reported at the time, “antennas at the NSA listening post, codenamed TIMBERLINE, were built to capture Soviet satellite messages as they bounced off the moon, imbuing a pristine stretch of Appalachia with a sort of cosmic gravity.” The former base is scheduled to reopen in October as a <a href="http://www.theintermountain.com/news/local-news/2018/03/former-navy-base-to-house-recovery-facility/">substance abuse treatment center</a></span><span class="T1">. </span></p>
<p class="Standard"><span class="T1">The most enthusiastic appraisal of daily signals intelligence life <a href="https://theintercept.com/snowden-sidtoday/4757928-sid-around-the-world-life-in-central-maryland">was contributed by a GCHQ staffer</a> assigned to the NSA Fort Meade headquarters from the United Kingdom. The temporary Marylander loved the food (“crab cakes!!</span><span class="T1"> Maryland crab soup!”), the climate, the roads, the local countryside, and the cheap gas. They and their wife were delighted by football and baseball games, and even by deer nibbling on flower beds. The Britons also enjoyed the friendly neighbors and, in a turnaround, were the hosts for the Fourth of July barbecue, leading “several spirited renderings of the Star-Spangled Banner.” </span></p>
<h3 id="foia">Informing the Public at the NSA: “A Dirty Job, But Someone’s Got To Do It”</h3>
<p class="Standard"><span class="T6">It wasn’t just people in other countries who seemed foreign to some NSA staff; voluntarily providing information to the American public provoked some strange and not entirely welcome sensations as well. James Risen and Eric Lichtblau of the New York Times reported in December 2005 that the NSA had been secretly authorized to spy on U.S. communications without a warrant. The Pulitzer Prize Board, in awarding the U.S.’s highest journalism honor, credited the pair with inspiring “a national debate on the boundary line between fighting terrorism and protecting civil liberty.” </span></p>
<p class="Standard"><!-- BLOCK(pullquote)[10](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[10] -->F<span class="T6">ulfilling public information requests is a &#8220;disruption to &#8230; day-to-day operations.&#8221;<!-- END-CONTENT(pullquote)[10] --></blockquote><!-- END-BLOCK(pullquote)[10] --></span></p>
<p class="Standard"><span class="T6">This debate, in turn, seems to have inspired a surge in Freedom of Information Act requests directed at the NSA. The requests, in which journalists and other citizens try and pry information from the notoriously secretive agency, spiked to more than 1,600 in the first half of 2006, from 800 in the course of an entire normal year, a member of the Intelligence Security Issues division disclosed in SIDtoday</span><span class="T6">. The staffer did not mention Risen </span><span class="T6">(now at The Intercept) or Lichtblau, but did cite “the agency appearing so frequently in the news” as the cause of the increase.</span></p>
<p class="Standard"><span class="T6">In SIDtoday, the Intelligence Security Issues staffer <a href="https://theintercept.com/snowden-sidtoday/4755723-what-is-a-foia-request-and-why-is-s02l3-always">portrayed the NSA’s response</a> to handling FOIA requests in terms typically reserved for a trip to the dentist for a root canal, describing his department’s work as “a dirty job, but someone’s got to do it,” and promising to make fulfilling FOIA requests “as painless as possible,” even though fulfilling the requests is a &#8220;disruption to &#8230; day-to-day operations.&#8221; One wonders what adjectives the Intelligence Security Issues division deployed seven years later to explicate the process, when the Snowden revelations</span> <a class="ListLabel_20_7" href="https://www.usatoday.com/story/news/nation/2013/11/17/nsa-grapples-with-988-increase-in-open-records-requests/3519889/"><span class="Internet_20_link"><span class="T6">prompted</span></span></a><span class="T6"> an 888 percent rise in FOIA requests to the agency.  </span></p>
<p class="P7"><!-- BLOCK(photo)[11](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[11] --> <img loading="lazy" decoding="async" class="aligncenter wp-image-204604 size-large" src="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-90257711-1534169894.jpg?w=1024" alt="NEW YORK - SEPTEMBER 01:  In this photo illustration, the Skype internet phone program is seen September 1, 2009 in New York City. EBay announced it will sell most of its Skype online phone service to a group of investors for $1.9 billion, a deal that values Skype at $2.75 billion.  (Photo Illustration by Mario Tama/Getty Images)" width="1024" height="623" srcset="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-90257711-1534169894.jpg?w=3000 3000w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-90257711-1534169894.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-90257711-1534169894.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-90257711-1534169894.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-90257711-1534169894.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-90257711-1534169894.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-90257711-1534169894.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-90257711-1534169894.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-90257711-1534169894.jpg?w=2400 2400w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<p class="caption overlayed">The Skype internet phone program is seen on Sept. 1, 2009, in New York City.</p>
<p class="P7">
<figcaption class="caption source pullright">Photo: Mario Tama/Getty Images</figcaption></p><!-- END-CONTENT(photo)[11] --></figure><!-- END-BLOCK(photo)[11] --></p>
<h3 id="phone">NSA Decided It Was Legal To Spy on Some U.S. Phone Numbers</h3>
<p class="P7">Sometimes, if a law became inconvenient, the NSA could do more than grumble; it could change its interpretation of the rule. For most people, the arrival of online phone call services like Skype and Vonage was a boon; it allowed them to dodge long-distance calling fees and to take their number with them anywhere around the world. The NSA, however, realized in 2006 that it had a big problem with such convenience: Online calling services might allow targets to acquire phone numbers with U.S. area codes and thus become off-limits to the agency, which is not supposed to conduct domestic spying.</p>
<p class="Standard_20__28_user_29_"><span class="T1">“A target may be physically located in Iraq but have a US or UK phone number,” an NSA staffer grappling with the issue <a href="https://theintercept.com/snowden-sidtoday/4755489-exploiting-us-uk-can-phone-numbers-in-compliance">wrote in SIDtoday</a></span><span class="T1">. NSA had previously interpreted a federal legal document, United States Signals Intelligence Directive 18, as barring the targeting of U.S. numbers, and built safeguards into various online systems, causing U.S. numbers to be “minimized upon presentation &#8230; and restricted from contact chaining,” a process in which a network of connected people is mapped, according to SIDtoday. In response to the rise of internet calling, the NSA developed techniques “for identifying the foreign status” of phone numbers, and the agency’s Office of General Counsel ruled that U.S. phone numbers affiliated with online calling services could be classified as foreign and targeted for surveillance if the number was “identified on foreign links” and was associated with an online calling service such as Vonage.</span></p>
<p class="Standard_20__28_user_29_"><!-- BLOCK(photo)[12](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[12] --> <img loading="lazy" decoding="async" class="aligncenter wp-image-204605 size-large" src="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-52514086-1534169967.jpg?w=1024" alt="WASHINGTON - MARCH 31:  U.S. President George W. Bush (C) holds a copy of a presidential commision's report on pre-war intelligence on weapons of mass destruction while flanked by Judge Laurence Silberman (R) and former Democratic Sen. Charles Robb (L) of Virginia, co-chairmen of the commission during a press conference March 31, 2005 in Washington, DC. Among other issues, the report indicated that U.S. intelligence agencies were wrong in most prewar assessments about weapons of mass destruction in Iraq.  (Photo by Mark Wilson/Getty Images)" width="1024" height="765" srcset="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-52514086-1534169967.jpg?w=3000 3000w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-52514086-1534169967.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-52514086-1534169967.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-52514086-1534169967.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-52514086-1534169967.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-52514086-1534169967.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-52514086-1534169967.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-52514086-1534169967.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-52514086-1534169967.jpg?w=2400 2400w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<p class="caption overlayed">U.S. President George W. Bush holds a copy of a presidential commission&#8217;s report on pre-war intelligence on weapons of mass destruction while flanked by Judge Laurence Silberman and former Democratic Sen. Charles Robb of Virginia, co-chairs of the commission, during a press conference on March 31, 2005, in Washington, D.C.</p>
<p class="Standard_20__28_user_29_">
<figcaption class="caption source pullright">Photo: Mark Wilson/Getty Images</figcaption></p><!-- END-CONTENT(photo)[12] --></figure><!-- END-BLOCK(photo)[12] --></p>
<h3 id="writeright">Back to Basics: NSA Staff Instructed on Better Analyzing and Sharing Information</h3>
<p class="Standard"><span class="T1">Whatever its success collecting and exploiting signals intelligence, the NSA was concerned its staff might not be communicating or disseminating this intelligence properly. &#8220;Write Right,&#8221; SIDtoday’s monthly column on authoring effective reports, brought to its 2006 edition a new focus on how to effectively route information to other intelligence agencies and federal entities, a process referred to officially (and dully) within NSA as “information sharing.”</span></p>
<p class="Standard"><span class="T1">The new attention to broad intelligence dissemination may </span><span class="T1">have been a response to the scathing <a href="https://www.gpo.gov/fdsys/search/pagedetails.action?granuleId=&amp;packageId=GPO-WMD">report</a> of the so-called WMD Commission </span><span class="T5">in March 2005, which stated, among other things:</span></p>
<blockquote>
<p class="P1">The Intelligence Community’s performance in assessing Iraq’s pre-war weapons of mass destruction programs was a major intelligence failure. The failure was not merely that the Intelligence Community’s assessments were wrong. There were also serious shortcomings in the way these assessments were made and communicated to policymakers.</p>
</blockquote>
<p class="Standard"><span class="T1">A maxim on intelligence from <a href="http://www.newsweek.com/colin-powell-bush-administrations-iraq-war-mistakes-65023">Colin Powell</a>, the former chair of the Joint Chiefs of Staff,</span><span class="T1"> is quoted twice in SIDtoday’s 2006 &#8220;Write Right&#8221; columns, <a href="https://theintercept.com/snowden-sidtoday/4755701-write-right-is-that-collateral-or-is-it-a-comment">once in May</a> and <a href="https://theintercept.com/snowden-sidtoday/4757926-write-right-loaded-words-don-t-politicize-reports">again in December</a></span><span class="T1">: “Tell me what you know, tell me what you don&#8217;t know, tell me what you think; always distinguish which is which.” Columns previously devoted to spell-checking or capitalization began giving advice on adding context (“collateral”) and analysis (“comment”) —</span><span class="T1"> and on how to provide analysis without editorializing</span><span class="T1">. Warnings about the use of web research as “collateral” sources included a <a href="https://theintercept.com/snowden-sidtoday/4757911-write-right-caveat-scrutator-or-but-i-saw-it-on">prohibition on citing Wikipedia</a></span><span class="T1">.</span></p>
<p class="Standard"><span class="T1">With information sharing as the new norm, the &#8220;Write Right&#8221; author (and guest authors) repeated the need to understand and follow changing policies and to <a href="https://theintercept.com/snowden-sidtoday/4757924-write-right-where-does-it-say-i-can-t">make sure that a report is releasable to the intended recipients</a></span><span class="T1">. This guidance included what could or could not be discussed on the agency’s collaborative discussion forum, called &#8220;Enlighten.&#8221; No chit-chat: “The ENLIGHTEN system is an aid to professionals in doing their jobs,” according to the forum’s primer, which is quoted in an October 2006 &#8220;Write Right.&#8221; “All information posted on ENLIGHTEN must pertain to Agency-related (official) business. UNDER NO CIRCUMSTANCES IS ENLIGHTEN AUTHORIZED FOR DISSEMINATING PERSONAL OR NON-OFFICIAL INFORMATION.”</span></p>
<p class="Standard"><!-- BLOCK(photo)[13](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[13] --> <img loading="lazy" decoding="async" class="aligncenter wp-image-204606 size-large" src="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-175852322-1534170043.jpg?w=1024" alt="Customers queue outside the Apple Store in London for the launch of the iPhone 3G on July 11, 2008. O2, Apple's network partner for the handset, said Apple stores were having &quot;technical issues&quot; connecting to 02's online systems. AFP PHOTO/Leon Neal        (Photo credit should read LEON NEAL/AFP/Getty Images)" width="1024" height="627" srcset="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-175852322-1534170043.jpg?w=2500 2500w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-175852322-1534170043.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-175852322-1534170043.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-175852322-1534170043.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-175852322-1534170043.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-175852322-1534170043.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-175852322-1534170043.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-175852322-1534170043.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-175852322-1534170043.jpg?w=2400 2400w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<p class="caption overlayed">Customers queue outside the Apple Store in London for the launch of the iPhone 3G on July 11, 2008.</p>
<p class="Standard">
<figcaption class="caption source pullright">Photo: Leon Neal/AFP/Getty Images</figcaption></p><!-- END-CONTENT(photo)[13] --></figure><!-- END-BLOCK(photo)[13] --></p>
<h3 id="3g">The NSA Goes After Newer (3G!) Phones and &#8220;Social Networks&#8221;</h3>
<p class="P7">Rapid change was buffeting not just NSA’s information-sharing practices but some of the core communications systems the agency surveilled as well, and in early 2006 the agency held multiple internal events to explain newly developed techniques to evolve its intelligence collection in parallel with these systems.</p>
<p class="Standard_20__28_user_29_"><span class="T1">One <a href="https://theintercept.com/snowden-sidtoday/4755522-brown-bag-session-exploiting-video-from-third">SIDtoday article</a></span><span class="T1"> announced a “brown bag session” about exploiting video from third-generation, or 3G, cellphones, including “basic instructions on how best to search, analyze and use camera cell phone video data.” 3G mobile data networks first became commercially available in Japan in 2001, in South Korea and the United States in 2002, and in the United Kingdom in 2003. By 2008, the United States and Europe alone </span><a class="ListLabel_20_4" href="http://www.washingtonpost.com/wp-dyn/content/article/2008/09/04/AR2008090400776.html"><span class="T1">had</span></a><span class="T1"> over 127 million 3G users.</span></p>
<p class="Standard_20__28_user_29_"><span class="T1">Another <a href="https://theintercept.com/snowden-sidtoday/4755573-new-sna-tool-and-more-to-be-unveiled-at-open-house">article</a></span><span class="T1"> announced an “open house” hosted by the “Social Network Analysis Workcenter” to show off &#8220;ASSIMILATOR,&#8221; a new web-based tool for analyzing the social networks of surveillance targets. In this case, “social network” refers to the list of people a target communicates with based on signals intelligence from a variety of sources, not social networking services.</span></p>
<p class="caption">Top photo: A U.S. soldier at a press conference in Baghdad takes down an older photo in order to display the latest image purporting to show the body of Abu Musab al-Zarqawi, an Al Qaeda-linked militant who led a bloody campaign of suicide bombings, kidnappings, and hostage beheadings in Iraq.</p>
<p>The post <a href="https://theintercept.com/2018/08/15/nsa-edward-snowden-whistleblower-document-leaks/">328 NSA Documents Reveal “Vast Network” of Iranian Agents, Details of a Key Intelligence Coup, and a Fervor for Voice-Matching Technology</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2018/08/15/nsa-edward-snowden-whistleblower-document-leaks/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2018/08/SID-highlight-feature-1534169236.jpg?fit=2000%2C1000' width='2000' height='1000' /><post-id xmlns="com-wordpress:feed-additions:1">204074</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?fit=720%2C98" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-72651504-1534169618.jpg?fit=3200%2C2336" medium="image">
			<media:title type="html">US Military Celebrates Thanksgiving In Iraq</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-72651504-1534169618.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/08/AP_05060501931-1534169746.jpg?fit=2000%2C1333" medium="image">
			<media:title type="html">IRAQ</media:title>
			<media:description type="html">U.S. Army soldiers make radio contact after arriving by helicopter at night at an undisclosed location south of Baghdad, Iraq where they believed a top leader of the insurgency and close associated of Abu Musab al-Zarqawi was hiding, Sunday, June 5, 2005.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/08/AP_05060501931-1534169746.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/08/AP_02041502773-1534170419.jpg?fit=1900%2C1491" medium="image">
			<media:title type="html">BIN LADEN TAPE</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/08/AP_02041502773-1534170419.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/08/Untitled-2-1000-1534170686.jpg?fit=1000%2C564" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/08/Untitled-2-1000-1534170686.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/08/Untitled-1000-1534170687.jpg?fit=1000%2C1097" medium="image">
			<media:title type="html">Untitled-1000-1534170687</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/08/Untitled-1000-1534170687.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/08/sugar-grove-1-1534195038.jpg?fit=2393%2C1212" medium="image">
			<media:title type="html">sugar-grove-1-1534195038</media:title>
			<media:description type="html">Sugar Grove.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/08/sugar-grove-1-1534195038.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-90257711-1534169894.jpg?fit=3000%2C1824" medium="image">
			<media:title type="html">Ebay To Sell Majority Stake In Internet Phone Company Skype</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-90257711-1534169894.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-52514086-1534169967.jpg?fit=3000%2C2241" medium="image">
			<media:title type="html">President Bush Comments On Intelligence Commission Findings</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-52514086-1534169967.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-175852322-1534170043.jpg?fit=2500%2C1530" medium="image">
			<media:title type="html">BRITAIN-ECONOMY-TECHNOLOGY-APPLE-IPHONE</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-175852322-1534170043.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Before Snowden, an NSA Spy Tried to Incite Change From the Inside. He Called Himself the “Curmudgeon” of Signals Intelligence.]]></title>
                <link>https://theintercept.com/2018/08/15/nsa-sigint-curmudgeon-sidtoday/</link>
                <comments>https://theintercept.com/2018/08/15/nsa-sigint-curmudgeon-sidtoday/#respond</comments>
                <pubDate>Wed, 15 Aug 2018 18:11:59 +0000</pubDate>
                                    <dc:creator><![CDATA[Peter Maass]]></dc:creator>
                                		<category><![CDATA[National Security]]></category>
		<category><![CDATA[release-august-2018]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=201995</guid>
                                    <description><![CDATA[<p>Rahe Clancy thought the NSA had become too corporate. So he wrote an agitated series of missives — for the agency.</p>
<p>The post <a href="https://theintercept.com/2018/08/15/nsa-sigint-curmudgeon-sidtoday/">Before Snowden, an NSA Spy Tried to Incite Change From the Inside. He Called Himself the “Curmudgeon” of Signals Intelligence.</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank"><img loading="lazy" decoding="async" class="aligncenter wp-image-65243" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" srcset="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=720 720w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=540 540w" sizes="auto, (max-width: 720px) 100vw, 720px" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p><u>You know</u> the type.</p>
<p>Middle-aged, male, tired of his job. He’s been around for ages and moans about how things were done 10 times better back in the day. Every so often, he snaps pointlessly at a co-worker. He’s the office curmudgeon. It’s time for him to go, and he probably realizes it.</p>
<p>Workplace grouches are usually ignored or fired, but the National Security Agency gave a unique platform to one of its own. In the mid-aughts, in an internal newsletter, the NSA published a series of articles by Rahe Clancy, an eavesdropper disillusioned with what the agency had become and what he was doing there. It’s not that Clancy disliked spying on people or governments — he supported the collection of signals intelligence, or SIGINT — but he felt that the NSA had lost its way.</p>
<p>After 30 years on the job, he wrote, “I found myself turning into a SIGINT Curmudgeon.” In 2005, he published his <a href="https://theintercept.com/snowden-sidtoday/3991090-the-regruntlement-of-a-sigint-collector/">coming-out article</a> for the newsletter, SIDtoday, which was targeted at the agency&#8217;s core Signals Intelligence Directorate. Clancy wrote that he was particularly worried about the future of his area of <a href="https://theintercept.com/snowden-sidtoday/4755601-can-you-cut-the-mustard-as-a-sco-what-it-takes">expertise</a>, known as &#8220;collection,&#8221; through which the NSA intercepts and downloads a variety of transmissions, both earthbound and from satellites. “I was convinced,” he continued, “that collection was a dying career field and that NSA management was hastening its demise through neglect.” Clancy was writing for a distinctive audience — the thousands of eavesdroppers, hackers, and analysts who worked for the NSA. His articles for SIDtoday, posted on a secure computer network, were provided to The Intercept by whistleblower Edward Snowden.</p>
<p>Clancy had a theory about what was going wrong: The NSA was being run like a corporation, not a spy agency. It emphasized managers, clients, products, and customer satisfaction. There were substantial pay-and-perk gaps between leadership and the workforce. And the lingo was maddening, a daily hailstorm of “paradigm,” “synergy,” “enterprise,” and “teaming.” It was all driving him nuts — literally. One day, he broke down and had a loud disagreement with his bosses in the middle of the office. He considered early retirement, but had to stick it out because he needed his full benefits.</p>
<p>“I fail to see how running a Cryptologic Intelligence Agency bears more than a superficial resemblance to running a corporation,” he wrote in his final column. “If we had a product to sell, and competition selling that product, I would gladly embrace the corporate model for NSA. But we don’t have competition.”</p>
<p>A strange thing happened on his grumbling way out the door. Clancy’s final column, published as he retired in 2006, was an unexpected hit. Titled “<a href="https://theintercept.com/snowden-sidtoday/4755629-opinion-piece-the-sigint-curmudgeon-s-last-shot">The SIGINT Curmudgeon’s Last Shot!</a>,” it made bitter fun of what he defined as the “Corp-speak” that had overtaken the agency (&#8220;SYNERGISTIC: Isn&#8217;t that from &#8216;Mary Poppins&#8217;?&#8221;). In a <a href="https://theintercept.com/snowden-sidtoday/4755647-letters-to-the-editor-views-on-the">follow-up article</a>, the editors of SIDtoday said they received an “unprecedented amount of feedback” and published a sampling of it. “Spot on!” a staffer wrote. “Too many think it’s more important to &#8216;get ahead&#8217; than get things done!” Another eavesdropper remarked, “Wonderful and to the point. Too much is spent on hype and pointless nonsense.” A longtime veteran added, “I have often mourned the NSA that I joined in 1982. … If anyone knows where it went, please send me a map.”</p>
<p>With his last shot, the curmudgeon became a hero.</p>
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[1] --> <img loading="lazy" decoding="async" width="3807" height="2538" class="aligncenter size-large wp-image-204621" src="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-534816900-1534173323.jpg" alt="An aerial view of The National Security Agency and Central Security Service (NSA CSS) building in Fort Meade, Maryland. (Photo by Brooks Kraft LLC/Corbis via Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-534816900-1534173323.jpg?w=3807 3807w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-534816900-1534173323.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-534816900-1534173323.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-534816900-1534173323.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-534816900-1534173323.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-534816900-1534173323.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-534816900-1534173323.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-534816900-1534173323.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-534816900-1534173323.jpg?w=2400 2400w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-534816900-1534173323.jpg?w=3600 3600w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">An aerial view of the National Security Agency and Central Security Service (NSA CSS) building in Fort Meade, Md.<br/>Photo: Brooks Kraft LLC/Corbis via Getty Images</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] -->
<h3>A Bookworm and a Collector</h3>
<p>In the style of tabloids, SIDtoday had a rotating cast of columnists drawn from the agency’s workforce. There was the “<a href="https://theintercept.com/2015/08/11/surveillance-philosopher-nsa/">SIGINT Philosopher</a>” who wrote about ethical issues of surveillance; there was a column called “<a href="https://theintercept.com/2014/03/07/nsa-advice-columnist-seriously/">Ask Zelda</a>!” that was akin to &#8220;Dear Abby&#8221; for spies; and there was “<a href="https://theintercept.com/2015/05/28/nsa-officials-privately-criticize-collect-it-all-surveillance/">Signal v. Noise</a>,” which explored the intricacies of data collection. Clancy, as the &#8220;SIGINT Curmudgeon,&#8221; cast a critical eye on the internal discourse at the world’s largest eavesdropping agency. He was, in his cranky way, an amateur anthropologist of modern surveillance culture.</p>
<p>In retirement, Clancy continues his curmudgeonly ways, in the sense of being a bit grumpy about talking with a reporter. He eventually came around to discussing, in an exchange of emails, his critique of the agency, though he kept to generalities. &#8220;The numerous oaths I have taken to protect classified information and the Constitution are still very much real to me,&#8221; he told The Intercept. &#8220;If that leads to me being &#8216;overcautious,&#8217; so be it.&#8221;</p>
<p>My attempts to contact Clancy began several years ago, when I was able to get an email address and phone number for his wife. The first time I spoke with her, in 2015, she said the NSA told her husband not to talk with me. The next time I spoke with her, in early July as I began writing this article, she gave me his phone number. I left several voicemails over several days and emailed his wife again; there was no response. However, about a week later, Clancy emailed me. “Apologies for ignoring your attempts to communicate for so long,” he wrote. “I was not anxious to discuss any of the leaked documents nor was I eager to have my name made public. I’m still not thrilled about it!”</p>
<!-- BLOCK(pullquote)[2](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[2] -->“I’ve never been very good with authority, especially the military type.”<!-- END-CONTENT(pullquote)[2] --></blockquote><!-- END-BLOCK(pullquote)[2] -->
<p>I had sent a few general questions, and he answered some of them. He said he’s an avid reader — the genres he likes include alternative history, westerns, war novels, historical novels, Egyptology, and sci-fi, specifically space opera. He has 1,000 books in his home library and 500 in his digital collection. He does not consider himself a writer. “I wrote for work and sometimes for fun,” he said. “If I have any talent in that arena it’s because of dedicated teachers and a very small high school. There were never more than 100 students in grades 9-12.”</p>
<p>A few minutes on Google helped fill in the blanks about that high school and other parts of Clancy&#8217;s biography. He comes from salt-of-the-earth America. He was born in 1948, and his father was a North Dakota farmer and World War II veteran who served in the Guadalcanal campaign. He was raised in a small town, Buffalo, and after graduating from the local high school, he attended the University of North Dakota in Grand Forks. He left after a year to enlist in the Army and apparently served in <a href="https://army.togetherweserved.com/army/servlet/tws.webapp.WebApp?cmd=ShadowBoxProfile&amp;type=AssignmentExt&amp;ID=550132">military intelligence</a> during the Vietnam War. But he lasted only three years — he acknowledged in <a href="https://theintercept.com/snowden-sidtoday/3991090-the-regruntlement-of-a-sigint-collector/">one of his articles</a> that “I’ve never been very good with authority, especially the military type.” After returning to North Dakota and getting married in 1974, he took a civilian job in England with the Department of Defense; this was the start of his career at the NSA, which is under the aegis of the DOD. His three children were born in England, and in 1990 they moved back to the U.S., settling in Maryland, not far from the NSA’s headquarters in Fort Meade.</p>
<p>Like pretty much everyone else at the NSA, Clancy’s work was classified. He described a bit of it in <a href="https://theintercept.com/snowden-sidtoday/3991090-the-regruntlement-of-a-sigint-collector/">one</a> of his articles, however, referencing “20 years of FORNSAT experience and 10 years of HF collection.” His reference to FORNSAT indicates <a href="https://theintercept.com/document/2018/03/01/fornsat-technologies-nsa/">satellite collection</a>, which involves targeting the streams of data coming from satellites down to receivers on earth. His reference to “HF collection” seems to mean the collection of “<a href="https://theintercept.com/snowden-sidtoday/3675950-nsa-and-gchq-team-up-to-tackle-hf/">High Frequency</a>” radio signals, a traditional backbone of the NSA’s eavesdropping. In the last stretch of his career, Clancy served for 17 months as a senior collection officer at the NSA’s <a href="https://en.wikipedia.org/wiki/National_Security_Operations_Center">National Security Operation’s Center</a>, where he was involved in responding to events as they happened across the globe. It was a job he loved, and it softened his curmudgeonly edges.</p>
<p>“I supported Afghan military operations, Iraqi military operations, numerous CSAR (Combat Search and Rescue) missions, downed aircraft, hostage situations, and a myriad of other tasks,” he <a href="https://theintercept.com/snowden-sidtoday/3991090-the-regruntlement-of-a-sigint-collector/">wrote</a> in SIDtoday. “I helped track Al Qaeda operatives, Taliban members, members of the former Iraqi regime, and aircraft and ships carrying weapons to/from proscribed nations. Sometimes all at once! I was on duty the night we went into Iraq and I went home that night feeling wrung-out, but with a feeling of accomplishment. When I think back on all of the history to which I had a ringside seat during that tour, it’s almost overwhelming!”</p>
<p>Clancy had a different kind of ringside seat throughout his career: He saw the NSA metastasize.</p>
<h3>“Corp-speak” Divides the NSA</h3>
<p>When Clancy started in the 1970s, the NSA focused primarily on intercepting the pre-digital murmurings of foreign governments and armies. It was, for sure, a secretive organization and engaged in its share of <a href="https://www.brookings.edu/blog/brookings-now/2015/05/06/40-years-ago-church-committee-investigated-americans-spying-on-americans/">legally dubious spying</a>, but it wasn’t the <a href="https://www.theguardian.com/us-news/the-nsa-files">hyper-controversial</a> behemoth it later became. The advent of the web in the 1990s changed the scope of the NSA’s work. As the world’s communications broadened to the digital sphere, the NSA widened its eavesdropping beyond satellites, phone lines, and telegraph cables to include the new infrastructure for online communications used by governments, non-state actors, and regular people. After 9/11, the NSA took on new duties and resources in a huge rush, engaging in <a href="https://www.nytimes.com/2005/12/16/politics/bush-lets-us-spy-on-callers-without-courts.html">vast eavesdropping activities</a> that, in many cases, again likely <a href="https://www.aclu.org/other/nsa-spying-americans-illegal">violated the law</a>.</p>
<p>By 2013, the most recent year for which statistics are available, thanks to documents leaked by Snowden, the NSA’s budget was <a href="https://www.washingtonpost.com/world/national-security/black-budget-summary-details-us-spy-networks-successes-failures-and-objectives/2013/08/29/7e57bb78-10ab-11e3-8cdd-bcdc09410972_story.html?utm_term=.cf188c371860">$10.8 billion</a>. It had become a massive bureaucracy and adopted the techniques of large corporations, to the chagrin of Clancy and others. You don’t have to take the curmudgeon’s word for it. The archive of documents leaked by Snowden includes a large number of files that extoll a business school approach to managing the NSA, using a type of language that almost seems to parody corporate communications. For instance, one SIDtoday <a href="https://theintercept.com/snowden-sidtoday/3676077-the-customer-scorecard/">article</a> was titled “The Customer Scorecard,” and here’s its first paragraph:</p>
<blockquote><p>One of the key initiatives for the Customer Relationships Directorate for 2004 is to update and improve the customer Support Plans (CSPs) for each customer of the Signals Intelligence Directorate (SID). The main element required in making the CSPs better is feedback from the customer. To obtain this feedback, the CRD began a pilot program called the ‘customer scorecard’. This scorecard will be used to determine how the Signals Intelligence Directorate is meeting its customers’ product and service needs.</p></blockquote>
<p>Intentionally or not, the NSA was draping its life-and-death activities in corporate jargon, offering its staff a layer of semantic insulation that distanced them from the lethal nature of what they were doing. After all, their “customers” are not customers in the usual sense of the term. They are military services, intelligence agencies, the White House, State Department, and other parts of the U.S. government. The “products” of the NSA are, similarly, unlike the products most companies make. They are intelligence reports that include, for instance, electronic surveillance used to <a href="https://theintercept.com/2014/02/10/the-nsas-secret-role/">locate people for drone assassination</a> and find targets in foreign countries to bomb.</p>
<!-- BLOCK(pullquote)[3](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22none%22%7D) --><blockquote class="stylized pull-none" data-shortcode-type="pullquote" data-pull="none"><!-- CONTENT(pullquote)[3] -->The NSA was draping its life-and-death activities in corporate jargon.<!-- END-CONTENT(pullquote)[3] --></blockquote><!-- END-BLOCK(pullquote)[3] -->
<p>Another SIDtoday <a href="https://theintercept.com/snowden-sidtoday/2829996-making-customer-feedback-work-for-everyone/">document</a>, titled “Making Customer Feedback Work for Everyone,” is a mind-bending exercise in funneling lethal activities through the blender of corporate pablum. “Today,” the document states, “our vision is providing the right information to the right customer at the right time &#8212; within their information space &#8212; completely focused on our customers’ successful outcomes.” It continues:</p>
<blockquote><p>Toward that end, we are embracing processes and technology that will make available the intended outcomes of customer Information Needs, customer feedback, observed customer behavior and preferences, outright customer complaints and their resolution across the SIGINT enterprise at the touch of a button. We have been developing the business processes for this technology for the past 18 months and are now ready to prototype the technology that will lead us to trending and analysis of customer feedback and behavior. We expect this to result in improved one-to-one customer relationships that benefit many customers across the board.</p></blockquote>
<p>Clancy was mystified by language of this sort.</p>
<p>“The lure of the ‘lingo’ is very strong,” he wrote in his <a href="https://theintercept.com/snowden-sidtoday/4755629-opinion-piece-the-sigint-curmudgeon-s-last-shot">last column</a>. “To listen to someone speak ‘Corp-speak’ fluently is like listening to a Bushman speaking a Khoisan ‘click’ language. It&#8217;s absolutely fascinating, but, except for some of the hand waving, it&#8217;s totally incomprehensible to outsiders! A few months ago I was in a meeting that was attended by a couple of seniors who were not technical people. They were staff or HR types and they spoke ‘Corp-speak.’ One of them did a lot of talking during the hour meeting, but I have no idea what he said. I&#8217;m not a stupid person (really!) but I was clueless. I mean, I recognized the words: ‘Leverage,’ ‘paradigm,’ ‘synergy,’ ‘synergistic,’ ‘enterprise,’ ‘extended enterprise,’ ‘teaming,’ ‘corporateness,’ etc., but they didn&#8217;t fit together in a way that I understood.”</p>
<p>In response to Clancy’s column, the editors of SIDtoday published <a href="https://theintercept.com/snowden-sidtoday/4755647-letters-to-the-editor-views-on-the">nine comments</a> from NSA staffers. The final comment summed up the general reaction. “I laughed and cried,” the comment began. “It became a part of me. But seriously, Clancy hit the nail on the head for me. We spend so much time in this agency talking about unique product, as if it&#8217;s the greatest cleanser or whitener to hit the market, that we forget that as a government agency we are not in a ‘for profit’ business. &#8230; Our job, first and foremost, is to get intelligence out to the people who need it, period. Words such as ‘actionable’ or slogans like ‘Ahead with SIGINT that counts’ don&#8217;t really mean anything.”</p>
<p>The NSA, contacted by The Intercept, declined to comment on the accusations that the agency had become too corporate.</p>
<!-- BLOCK(photo)[4](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[4] --> <img loading="lazy" decoding="async" width="1440" height="1148" class="aligncenter size-large wp-image-204622" src="https://theintercept.com/wp-content/uploads/2018/08/puppy-resize-1534173463.jpg" alt="puppy-resize-1534173463" srcset="https://theintercept.com/wp-content/uploads/2018/08/puppy-resize-1534173463.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2018/08/puppy-resize-1534173463.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/08/puppy-resize-1534173463.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/08/puppy-resize-1534173463.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/08/puppy-resize-1534173463.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/08/puppy-resize-1534173463.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">One of the photos of Clancy&#8217;s puppies on his Facebook page.<br/>Photo: Facebook</figcaption><!-- END-CONTENT(photo)[4] --></figure><!-- END-BLOCK(photo)[4] -->
<h3>Life After the Agency</h3>
<p>Clancy still lives in Maryland and, in his retirement, worked for a while as a dog trainer at PetSmart. He and his wife raise Alaskan klee kais, a smaller version of Siberian huskies. “About two litters each year for the love of our dogs,” he wrote me. “Our dogs are our family.” He has a Facebook page where he posts pictures and videos of their puppies, which are indeed very cute. He occasionally takes them on outings to a local Starbucks.</p>
<p>Some of his Facebook posts are exactly what you’d expect from a self-described curmudgeon. Last year, he posted a graphic that said, “The fact that Jellyfish have survived for 650 million years despite not having brains gives hope to many people.” He also shared a video that began with this notice: “Just because you went to college doesn’t make you smarter than anyone else. … Common sense doesn’t come with a degree.” He even looks a bit like a curmudgeon — bald head, long, gray beard, a few extra pounds at his girth — though in most pictures, he has a broad smile.</p>
<p>His parting with the NSA has the hallmarks of being quietly triumphant. I asked, in one of my emails, whether he was aware that his final SIDtoday article had elicited such a strong and positive response inside the agency. He didn&#8217;t reply directly, though he wrote, &#8220;I have been approached by current employees who found out who I am and just wanted to shake my hand, so I know that at least some people remember me.&#8221;</p>
<!-- BLOCK(pullquote)[5](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[5] -->&#8220;I had hoped to encourage the ‘worker bees’ to become more vocal and involved.&#8221;<!-- END-CONTENT(pullquote)[5] --></blockquote><!-- END-BLOCK(pullquote)[5] -->
<p>In his grouchy way, was the SIGINT Curmudgeon a whistleblower of some sort? Certainly not in the way of Snowden or Chelsea Manning — they took their critiques to the public by leaking vast amounts of classified documents, hoping that their actions would spur greater awareness of secret government abuses. Clancy was hardly a rebel of that type. Last year, he posted onto his Facebook page a graphic that said, “President Trump is focused on ‘America First’! Democrats are focused on stopping Trump! Think about that.” He also gave a five-star review to a pro-Trump outlet, One America News Network, and shared several posts from the <a href="https://conventionofstates.com/">Convention of States</a>, which seeks to hold a constitutional convention that would greatly restrict the powers of the federal government.</p>
<p>These posts raise some interesting questions. In his nostalgia for returning the NSA to its cultural roots, does Clancy think the government should throttle back its post-9/11 spying activity? One of the most controversial aspects of the NSA’s work is that, in its efforts to vacuum up the worldwide communications of foreigners, it also acquires immense quantities of American citizens&#8217; emails, texts, and phone records — what it calls “<a href="https://www.justsecurity.org/51272/stop-calling-incidental-collection-americans-emails-govts-renewed-surveillance-powers/">incidental</a>” collection. Although conservatives tend to support NSA surveillance as an anti-terrorism matter, the scope of the agency’s spying has attracted deep criticism from, among others, libertarian lawmakers like Sen. Rand Paul.</p>
<p>I asked Clancy about this.</p>
<p>&#8220;My personal political views had no bearing on my job performance,&#8221; he replied. &#8220;I am politically conservative and believe governance should be as close to the people as possible. Privacy must be protected but so must our intelligence gathering capability to protect the country.&#8221;</p>
<p>His aims were apparently modest: He sought to incite quiet changes from the inside. &#8220;I wrote these articles not only to voice my personal concerns (and frustration) about the state of the Agency but to get people talking and thinking,&#8221; he told me. &#8220;I had hoped to encourage the &#8216;worker bees&#8217; to become more vocal and involved. Get ideas rolling uphill if possible.&#8221;</p>
<p>I asked for a bit of detail about the reforms he wanted to encourage, but he shied away from explaining more. In any event, he doesn&#8217;t appear to believe that his curmudgeonly dissent reached the people who matter the most. As he noted in one of his emails to me, &#8220;If I influenced Agency seniors in any way, I would be pleasantly surprised.&#8221;</p>
<h3>Documents</h3>
<p>Articles by (and about) Rahe Clancy, the &#8220;SIGINT Curmudgeon,&#8221; for SIDtoday:</p>
<ul>
<li><a href="https://theintercept.com/snowden-sidtoday/4755629-opinion-piece-the-sigint-curmudgeon-s-last-shot">Opinion Piece: The SIGINT Curmudgeon&#8217;s Last Shot!</a> &#8211; April 10, 2006</li>
<li><a href="https://theintercept.com/snowden-sidtoday/4755647-letters-to-the-editor-views-on-the">Letters to the Editor: Views on the &#8216;Corporatization&#8217; of NSA</a> &#8211; April 20, 2006</li>
<li><a href="https://theintercept.com/snowden-sidtoday/3991090-the-regruntlement-of-a-sigint-collector/">The &#8216;Regruntlement&#8217; of a SIGINT Collector</a> &#8211; February 3, 2005</li>
<li><a href="https://theintercept.com/snowden-sidtoday/4755513-sigint-curmudgeon-excited-by-sco-fest">&#8216;SIGINT Curmudgeon&#8217; Excited By SCO-FEST</a> &#8211; February 1, 2006</li>
<li>
<div class="DV-descriptionHead"><a href="https://theintercept.com/snowden-sidtoday/4755601-can-you-cut-the-mustard-as-a-sco-what-it-takes">Can You Cut the Mustard as a SCO? &#8212; What It Takes</a> &#8211; March 27, 2006</div>
</li>
</ul>
<p class="caption">Top photo: Rahe Clancy.</p>
<p>The post <a href="https://theintercept.com/2018/08/15/nsa-sigint-curmudgeon-sidtoday/">Before Snowden, an NSA Spy Tried to Incite Change From the Inside. He Called Himself the “Curmudgeon” of Signals Intelligence.</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2018/08/15/nsa-sigint-curmudgeon-sidtoday/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2018/08/Curmudgeon-feature-1534173035.jpg?fit=1440%2C720' width='1440' height='720' /><post-id xmlns="com-wordpress:feed-additions:1">201995</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?fit=720%2C98" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-534816900-1534173323.jpg?fit=3807%2C2538" medium="image">
			<media:title type="html">USA &#8211; Government &#8211; National Security Agency and Central Security Service Building</media:title>
			<media:description type="html">An aerial view of The National Security Agency and Central Security Service (NSA CSS) building in Fort Meade, Maryland.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-534816900-1534173323.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/08/puppy-resize-1534173463.jpg?fit=1440%2C1148" medium="image">
			<media:title type="html">puppy-resize-1534173463</media:title>
			<media:description type="html">One of the photos of Clancy&#039;s puppies on Facebook page.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/08/puppy-resize-1534173463.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[The NSA's Role in a Climate-Changed World: Spying on Nonprofits, Fishing Boats, and the North Pole]]></title>
                <link>https://theintercept.com/2018/08/15/nsa-snowden-documents-climate-change/</link>
                <comments>https://theintercept.com/2018/08/15/nsa-snowden-documents-climate-change/#respond</comments>
                <pubDate>Wed, 15 Aug 2018 18:10:28 +0000</pubDate>
                                    <dc:creator><![CDATA[Alleen Brown]]></dc:creator>
                                    <dc:creator><![CDATA[Miriam Pensack]]></dc:creator>
                                		<category><![CDATA[Environment]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[release-august-2018]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=204058</guid>
                                    <description><![CDATA[<p>New documents show how U.S. spies gathered intelligence related to environmental conflicts, disasters, and resources</p>
<p>The post <a href="https://theintercept.com/2018/08/15/nsa-snowden-documents-climate-change/">The NSA&#8217;s Role in a Climate-Changed World: Spying on Nonprofits, Fishing Boats, and the North Pole</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank"><img loading="lazy" decoding="async" class="aligncenter wp-image-65243" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" srcset="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=720 720w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=540 540w" sizes="auto, (max-width: 720px) 100vw, 720px" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p class="P3"><span class="T1"><u>In the northernmost</u> place in the United States, Point Barrow, Alaska, a National Security Agency collection site has allowed analysts to observe Russia’s military buildup 24/7, as melting Arctic ice opens a new conflict zone. The NSA has also monitored a dispute between India and Pakistan over access to the Indus River system, which is fed by glaciers high in the Himalayas, now shrinking. And as fisheries are facing increasing pressure from seas whose currents and temperatures have already been altered significantly by climate change, the NSA has listened in on phone conversations and monitored the movement of fishing boats engaged in potentially illegal practices that threaten dwindling stocks.</span></p>
<p class="P3"><span class="T1">Previously unreleased documents leaked by former NSA contractor Edward Snowden show how the agency has gathered intelligence meant to support U.S. interests related to environmental disasters, conflicts, and resources. In the coming years, greenhouse gas pollution caused by the burning of fossil fuels will increase the frequency of ecological crises and conflicts over natural resources. The documents provide a window into the role the United States’s most sprawling international surveillance agency will play in an altered world. </span></p>
<p class="P3"><span class="T1">The documents show that although the NSA’s interest in environmental issues is limited, it’s wide-reaching and has grown over the years. Unsurprisingly, the agency is driven not by an imperative to avoid climate-induced ecological crises, but by a need to respond to such crises as they threaten U.S. political and economic interests or explode into violent clashes. </span></p>
<p class="P3"><span class="T1">According to the documents, the NSA targets its surveillance at disputes over natural resources, from the dwindling fisheries of the South China Sea to the newly opened shipping channels of the Arctic. It also plays a role in monitoring natural disasters, including by <a href="https://theintercept.com/document/2018/08/15/nsa-sidtoday-japan-eternal-land-of-the-rising-sun">gathering intelligence after an earthquake and tsunami struck Japan in 2011</a>. Documents previously reported on show the agency routinely surveils climate talks, <a href="https://theintercept.com/document/2018/08/15/nsa-telegraph-sigdev-efforts-in-support-of-the-united-nations-framework-for-climate-change-conference-bali-indonesia">giving U.S. negotiators an edge</a> as they avoid committing to the dramatic emissions reductions necessary to avoid the most dire potential effects of climate change. Intelligence is shared not only with diplomats and emergency responders but <a href="https://theintercept.com/snowden-sidtoday/4755713-an-intern-learns-that-customers-do-value-sigint">also with officials from agencies like the Environmental Protection Agency </a>and the Interior Department.<br />
</span></p>
<p class="P3"><span class="T1">The NSA’s eco-spying coincided with repeated findings within the intelligence community that environmental concerns had national security implications. The military has long recognized climate change as a major threat, and over the years, the Defense Department has framed it as a “</span><a class="Internet_20_link" href="https://www.acq.osd.mil/eie/Downloads/CCARprint_wForward_e.pdf">threat multiplier</a><span class="T1">,” enflaming conflicts by adding to the mix issues like drought, loss of access to drinking water or irrigation, rising sea levels, migration and die-offs of wild game, wildfires, catastrophic storms, and the human displacement that comes with all such issues. A previously published NSA document, dated May 14, 2007, </span><a class="Internet_20_link" href="https://www.information.dk/udland/2014/01/the-nsa-espionage-was-a-means-to-strengthen-the-us-position-in-climate-negotiations">quoted</a><span class="T1"> then-Under Secretary of Defense for Intelligence James Clapper at an internal NSA conference saying, “Increasingly, the environment is becoming an adversary for us. And I believe that the capabilities and assets of the Intelligence Community are going to be brought to bear increasingly in assessing the environment as an adversary.” </span></p>
<p class="P3"><span class="T1">The U.S. intelligence community’s Worldwide Threat Assessment, released in February 2018, dedicates a section to the issue of climate change. “The impacts of the long-term trends toward a warming climate, more air pollution, biodiversity loss, and water scarcity are likely to fuel economic and social discontent—and possibly upheaval—through 2018,” the assessment said. </span></p>
<p class="P3"><span class="T1">But under President Donald Trump, security officials have sometimes avoided talking about climate change. Neither the Defense Department’s </span><a class="Internet_20_link" href="https://www.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf">2018 defense strategy</a><span class="T1"> nor the president’s </span><a class="Internet_20_link" href="https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf">national security strategy</a><span class="T1"> highlight the issue as a security threat. Nonetheless, Trump’s military, intelligence, and border agencies are responding to issues whose links to climate change may not be outwardly apparent — from the war in Syria, which has been linked to an earlier drought; to the hurricanes that ravaged Houston and Puerto Rico; to emigration from Central America, where a prolonged period without rain in recent years made agriculture in the region’s Dry Corridor extremely difficult. The documents hint at, but do not fully capture, the potentially vast role of the surveillance state in a climate-changed world.</span></p>
<p class="P3">The NSA declined to comment.</p>
<p class="P3"><!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[1] --> <img loading="lazy" decoding="async" width="3000" height="1666" class="aligncenter size-large wp-image-204627" src="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-494614151-1534174018.jpg" alt="AT SEA - MAY 27:  (CHINA OUT, SOUTH KOREA OUT) A Chinese Maritime Police Bureau ship uses water canon to harass a Vietnamese fisheries surveillance force vessel near the disputed Paracel Islands on May 27, 2014 in At Sea. Dozens of Vietnamese and Chinese vessels square off near the disputed Paracel Islands in the South China Sea.  (Photo by The Asahi Shimbun via Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-494614151-1534174018.jpg?w=3000 3000w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-494614151-1534174018.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-494614151-1534174018.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-494614151-1534174018.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-494614151-1534174018.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-494614151-1534174018.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-494614151-1534174018.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-494614151-1534174018.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-494614151-1534174018.jpg?w=2400 2400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<p class="caption overlayed">A Chinese Maritime Police Bureau ship uses water canons to harass a Vietnamese Fisheries Surveillance Force vessel near the disputed Paracel Islands on May 27, 2014, while at sea.</p>
<p class="P3">
<figcaption class="caption source pullright">Photo: The Asahi Shimbun via Getty Images</figcaption></p><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] --></p>
<h3 class="P4"><span class="T2">Monitoring the Movements of Chinese Fishing Vessels</span></h3>
<p class="P3"><span class="T1">One particularly vexing environmental challenge for the NSA was the tracking of Chinese commercial fishing boats, which routinely became electronic phantoms, believed to be hundreds or thousands of miles from where they actually were. This was due to a combination of strange errors occurring at hemispheric boundaries in addition to an intricate system of intentional misinformation adopted by the Chinese, according to a <a href="https://theintercept.com/document/2018/08/15/nsa-sidtoday-one-fish-two-fish-my-fish-your-fish">2012 article in SIDtoday</a>, the internal news site of the NSA’s Signals Intelligence Directorate. The boats “are often involved in [Exclusive Economic Zone] incursions and illegal fishing activities,” the document stated.</span></p>
<p class="P3"><span class="T1">Indeed, in the South China Sea, a fight over fishing has become a proxy for a broader power struggle among the nations located along its banks. China has laid claim to a wide swath of the sea. Waters it claims as its own overlap with maritime territories claimed by other nations under the U.N.’s system of exclusive economic zones, or EEZs. The territorial conflicts are often framed as being about oil, but perhaps just as important is the sea life that represents a key part of several nations’ economies and diets.</span></p>
<p class="P3"><span class="T1">The fisheries of the South China Sea are declining — and are on the brink of collapse, according to scientists. Stocks have shrunk by 70 to 90 percent since the 1950s, largely due to overfishing. This has further <a href="https://www.fni.no/news/fish-not-oil-at-the-heart-of-the-south-china-sea-conflict-article1556-330.html">incentivized</a> nations that surround the sea to go to battle over the disputed territories. </span><span class="T1">Regulating fishing has become </span><a class="Internet_20_link" href="https://news.nationalgeographic.com/2016/08/wildlife-south-china-sea-overfishing-threatens-collapse/">impossible</a><span class="T1">, since accepting another nation’s fishing laws would be accepting its jurisdiction over the territory. Fishermen who can no longer access areas dominated by the Chinese, in nations like the Philippines — a U.S. ally — have increasingly turned to illegal fishing methods. And occasionally, disputes over </span><span class="T1">fishing have exploded into military standoffs. </span></p>
<p class="P3"><!-- BLOCK(pullquote)[2](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[2] -->&#8220;D<span class="T1">isputes over fishing rights are increasingly becoming flash points for international incidents.&#8221;<!-- END-CONTENT(pullquote)[2] --></blockquote><!-- END-BLOCK(pullquote)[2] --></span></p>
<p class="P3"><span class="T1">“As maritime resources are stressed by increased fishing pressures, disputes over fishing rights and violations of EEZ are a growing concern and are increasingly becoming flash points for international incidents,” the SIDtoday article, dated June 27, 2012, said. “Monitoring of the locations and activities of foreign fishing fleets is an important mission of the United States Coast Guard, many of our Second Party partners, as well as being an item of concern for the US State Department.” </span></p>
<p class="P3"><span class="T1">Most large maritime vessels use what’s known as the automatic identification system, which lets other ships in the area know where and who they are. “Naturally, it wasn&#8217;t surprising to hear our customers&#8217; concerns when a large number of Chinese fishing vessels were observed broadcasting their position 1,000 miles from where they actually were,&#8221; the article stated. &#8220;Not only did this pose a threat to the safety of navigation for ships operating in proximity to these fishing vessels, it also complicated the monitoring of the EEZ for the United States and our Second Party partners. A combined effort between NSA Colorado and Second Party partners surged on this problem.”</span></p>
<p class="P3"><span class="T1">One of the problem’s causes seemed to be accidental — the Chinese boats’ coordinates “would appear to ‘bounce or reflect’ off the equator and the international dateline as the ships continued east or south,” the article said.</span></p>
<p class="P3"><span class="T1">So, for example, a boat located on the Pacific coast of South America would appear to be in northern India. Alerted to the problem, China corrected it in 2011, according to the document. </span></p>
<p class="P3"><span class="T1">A second problem “was not an error but an intentional ‘misuse’ of the AIS messaging protocol to produce a different (home-grown) coordinate system,” the document said. At least 18 Chinese ships were found to be using an alternative definition of the latitude and longitude system, which threw off their coordinates for everyone else using the standard system. The result: While the Chinese knew where their ships were, neighboring boats did not. “The underlying reason for why the PRC has opted to use this alternate coordinate system for some of their fishing vessels is still unknown,” the article said. </span></p>
<h3 class="P4"><a id="a__Eavesdropping_on_Phone_Calls_to_Stop_a_Stateless_Fishing_Boat"></a><span class="T2">Eavesdropping on Phone Calls to Stop a Stateless Fishing Boat</span></h3>
<p class="P3"><span class="T1">The NSA has also been involved in policing banned fishing practices used by stateless ships. High seas drift-net fishing involves attaching buoys to the top of a miles-long net that descends into the depths of the ocean. The net is sometimes attached to a ship, but other times is left to float, passively collecting any marine life that comes by, including fish or whales that are not of any commercial interest to the fishermen. The net works by entangling the gills of fish in its fine mesh. The nets are often made of nylon and put in place at night, so that they become invisible to sea life. </span></p>
<p class="P3"><span class="T1"><a href="https://theintercept.com/document/2018/08/15/nsa-sidtoday-persistence-and-collaboration-thwart-criminals-on-the-high-seas">Another SIDtoday article</a>, written by a technical director at NSA Hawaii and dated October 16, 2012, indicates the NSA works with the </span><span class="T1">U.S. Coast Guard in chasing down fishing boats that use the destructive fishing method. In September 2011, the Coast Guard caught a large fishing vessel using drift nets 2,600 miles south of Kodiak, Alaska, but the boat’s partner vessel escaped. Seven months later, the NSA picked up a signal from a satellite phone associated with the boat. “It was time to take action,” the document stated. </span></p>
<p class="P3"><span class="T1">“An NSA Hawaii linguist listened in on the fishing vessel&#8217;s communications for any signs that the crew would resist a boarding operation by the Coast Guard,” the article said. A packet of intel related to the chase was provided by Hawaii analysts to the Coast Guard’s Maritime Intelligence Fusion Center twice a week.</span></p>
<p class="P3"><span class="T1">Finally, on July 27, 2012, 700 nautical miles east of Yokosuka, Japan, the Coast Guard boarded the fishing vessel. “The vessel&#8217;s crew consisted of 26 Chinese and one Taiwanese, and the vessel claimed to be Indonesian flagged, but after contacting Indonesia the vessel was determined to be stateless,” the document said.</span></p>
<p class="P3"><span class="T1">It continued, “While on board the Da Cheng, the boarding team discovered 10 NM of driftnet, 500 kilograms of shark fins, over five tons of shark carcasses, and 30 tons of tuna.” The vessel was turned over to the Chinese Bureau of Fisheries for further investigation.</span></p>
<p class="P3"><!-- BLOCK(photo)[3](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[3] -->
<img loading="lazy" decoding="async" width="2000" height="1338" class="aligncenter size-large wp-image-204674" src="https://theintercept.com/wp-content/uploads/2018/08/AP_08101009811-edit-1534181750.jpg" alt="Laborers walk on a bridge in the backdrop of the 450 MW Baglihar hydro electric project built on the river Chenab, in Chanderkot, about 154 kilometers (96 miles) north of Jammu, India, Friday, Oct. 10, 2008. The construction of the dam, built on the river Chenab, began in 2000 despite protests from Pakistan who fears it will cut crucial water supplies downstream to its key farming region of Punjab. Indian Prime Minister Manmohan Singh inaugurated the dam Friday. (AP Photo/Channi Anand)" srcset="https://theintercept.com/wp-content/uploads/2018/08/AP_08101009811-edit-1534181750.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2018/08/AP_08101009811-edit-1534181750.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/08/AP_08101009811-edit-1534181750.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/08/AP_08101009811-edit-1534181750.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/08/AP_08101009811-edit-1534181750.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/08/AP_08101009811-edit-1534181750.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/08/AP_08101009811-edit-1534181750.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">Laborers walk on a bridge in the backdrop of the 450 MW Baglihar hydroelectric project built on the  Chenab River, in Chanderkot, about 154 kilometers, or 96 miles, north of Jammu, India, Oct. 10, 2008.<br/>Photo: Channi Anand/AP</figcaption><!-- END-CONTENT(photo)[3] --></figure><!-- END-BLOCK(photo)[3] --></p>
<h3 class="P4"><a id="a__During_a_Dam_Dispute_in_India-Pakistan__the_NSA_was_Watching"></a><span class="T2">During a Dam Dispute in India and Pakistan, the NSA Was Watching</span></h3>
<p class="P3"><span class="T1">It’s not just oceans and seas that the NSA keeps an eye on for aquatic disputes. One of South Asia’s most important sources of water is the Indus River system, which is fed by glacial water high in the Himalayas. One recent study </span><a class="Internet_20_link" href="https://www.theguardian.com/environment/2017/sep/14/asia-glaciers-shrink-threatening-water-supply">projected</a><span class="T1"> that at least a third of Asia’s mountain glaciers will melt away by the end of the century, potentially destabilizing water sources. Changing monsoon patterns will exacerbate the situation. </span></p>
<p class="P3"><span class="T1">Access to water has long been a point of tension between India and Pakistan, and disputes are perennial over access to the tributaries, which were divided between the two nations under the Indus Waters Treaty. In the mid-2000s, India’s Baglihar Dam project was a key point of contention. Pakistan claimed it could deprive the nation of water that should be designated for its agricultural sector, which in some areas of the country relies almost exclusively on the Indus system. </span></p>
<p><span class="P3">The NSA was listening in. </span></p>
<p class="P3"><!-- BLOCK(pullquote)[4](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[4] -->T<span class="T1">he NSA spied on nongovernmental entities in order to access intel on water conflicts.<!-- END-CONTENT(pullquote)[4] --></blockquote><!-- END-BLOCK(pullquote)[4] --></span></p>
<p class="P3"><span class="T1"><a href="https://theintercept.com/snowden-sidtoday/4755593-a-growing-security-challenge-competition-for-water">A SIDtoday article published March 22, 2006</a>, on World Water Day, noted, “NSA reporting has followed the ongoing tensions surrounding the India-Pakistan Indus Water Treaty and construction of Baglihar Dam, providing our customers with unique information as they monitor this volatile region.”</span></p>
<p class="P3"><span class="T1">In fact, the agency had its eye on a number of riparian disputes and predicted a future of increasing water scarcity and conflict. “As competition for water grows </span><span class="T1">among the Nile Basin countries in Africa, analysts continue to report on contentious water extraction projects that could potentially lead to conflict in this area,” wrote the author, an NSA liaison on “economics and global issues.”</span></p>
<p class="P3"><span class="T1">The document indicates that the NSA spied on an array of both governmental and nongovernmental entities in order to access intel on water conflicts, stating, “NSA&#8217;s broad access to government officials, multilateral organizations, and NGOs has yielded unique perspectives on water availability for internally-displaced persons (IDPs) in Sudan, flooding in Afghanistan, and contaminated water sources in Baghdad.”</span></p>
<p class="P3"><span class="T1">And this &#8220;broad access&#8221; predicted a future where such collection could be increasingly important. “While the world&#8217;s population tripled in the 20th century, the use of water resources has grown six-fold. At this rate, more than 2.7 billion people will face severe water shortages by the year 2025 and another 2.5 billion will live in areas where it will be difficult to find sufficient fresh water,” the document said. Signals intelligence “has provided critical insight on issues ranging from inter-state water disputes and food security, to economics and technology sharing, health infrastructure, and natural disasters.”</span></p>
<p class="P3"><!-- BLOCK(photo)[5](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[5] --> <img loading="lazy" decoding="async" width="4187" height="2791" class="aligncenter size-large wp-image-204630" src="https://theintercept.com/wp-content/uploads/2018/08/AP_663840585364-1534174339.jpg" alt="2827393 04/13/2016 Barneo expedition drift ice camp in the Arctic. Valeriy Melnikov/Sputnik via AP" srcset="https://theintercept.com/wp-content/uploads/2018/08/AP_663840585364-1534174339.jpg?w=4187 4187w, https://theintercept.com/wp-content/uploads/2018/08/AP_663840585364-1534174339.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/08/AP_663840585364-1534174339.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/08/AP_663840585364-1534174339.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/08/AP_663840585364-1534174339.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/08/AP_663840585364-1534174339.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2018/08/AP_663840585364-1534174339.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/08/AP_663840585364-1534174339.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2018/08/AP_663840585364-1534174339.jpg?w=2400 2400w, https://theintercept.com/wp-content/uploads/2018/08/AP_663840585364-1534174339.jpg?w=3600 3600w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<p class="caption overlayed">Barneo expedition drift ice camp in the Arctic, on April 13, 2016.</p>
<p class="P3">
<figcaption class="caption source pullright">Photo: Valeriy Melnikov/Sputnik via AP</figcaption></p><!-- END-CONTENT(photo)[5] --></figure><!-- END-BLOCK(photo)[5] --></p>
<h3 class="P4"><a id="a__In_the_Arctic__a_24_7_Watch_on_the_Russians"></a><span class="T2">In the Arctic, a 24/7 Watch on the Russians </span></h3>
<p class="P3"><span class="T1">In response to climate change, the NSA has increased its northernmost surveillance, an internal document indicates. This past winter, ice cover in the Arctic was the </span><a class="Internet_20_link" href="https://www.theverge.com/2018/5/10/17339046/arctic-sea-ice-decline-albedo-effect-climate-change-global-warming">second lowest</a><span class="T1"> it’s ever been, after the year before. Sea ice in the summers has shrunk by </span><a class="Internet_20_link" href="https://www.nasa.gov/feature/goddard/2017/nasa-scientists-seek-to-improve-sea-ice-predictions">about</a><span class="T1"> 40 percent since the 1980s, and what’s left is much thinner. A 2018 study led by researchers with the federal National Oceanic and Atmospheric Administration </span><a class="Internet_20_link" href="https://mashable.com/2018/05/08/arctic-heat-wave-2016-climate-change/#dNLBTLmWgZqi">shows</a><span class="T1"> that it would be nearly impossible for temperatures in the Arctic to rise as high as they have without the impact of greenhouse gases.</span></p>
<p class="P3"><span class="T1">The result is that new shipping lanes have opened up at the top of the globe. Areas once impassible have become accessible for the transport of goods, movement of military vessels, and exploration of fossil fuels. A 2009 assessment </span><a class="Internet_20_link" href="https://pubs.er.usgs.gov/publication/70035000">indicated</a><span class="T1"> that the Arctic potentially contains 13 percent of the undiscovered oil left in the world, and 30 percent of the remaining natural gas. In response, Russia has built up its military presence dramatically.</span></p>
<p class="P3"><!-- BLOCK(pullquote)[6](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[6] -->Special bases will &#8220;<span class="T1">be a vital part of NSA&#8217;s efforts against the emerging Arctic Intelligence problem.&#8221;<!-- END-CONTENT(pullquote)[6] --></blockquote><!-- END-BLOCK(pullquote)[6] --></span></p>
<p class="P3"><span class="T1">Ice melt in the Arctic and increasing competition for hydrocarbons and minerals has forced the U.S. to make the Arctic a higher priority, an NSA technical director at the Alaska Mission Operations Center acknowledged <a href="https://theintercept.com/document/2018/08/15/nsa-sidtoday-did-you-know-that-nsa-has-an-arctic-presence">in a SIDtoday article dated November 29, 2011</a>.</span></p>
<p class="P3"><span class="T1">For the NSA, Russia’s plans for two new Arctic </span><a class="Internet_20_link" href="https://www.npr.org/2011/08/16/139577789/russia-pushes-to-claim-arctic-as-its-own">army</a><span class="T1"> brigades and new icebreaker boats were of particular concern. “These plans, along with an increasing Chinese presence and expressed interest in the Arctic, pose a significant intelligence challenge to the United States, Canada, and the other Arctic countries,” the document </span><span class="T1">said. </span></p>
<p class="P3"><span class="T1">The NSA “maintains a 24/7 watch over Russian military air activity in the Arctic,” the document added. Using various collection techniques, including intercepts of shortwave radio and foreign satellite transmissions, the NSA monitored for Russian bombers and watched for Russian resupply flights to its Barneo ice station, near the North Pole.</span></p>
<p class="P3"><span class="T1">The NSA’s Arctic operation was centered at the time at the Alaska Missions Operations Center on Joint Base Elmendorf-Richardson in Anchorage, but the agency also had a “remote intercept facility” at Point Barrow, Alaska.</span></p>
<p class="P3"><span class="T1">The facility, housed at the Air Force’s Long Range Radar Site, included an antenna array, an FRD-13 Pusher — a massive circular antenna, nicknamed an “elephant cage,” used to intercept radio communications — and a Sensitive Compartmented Information Facility, containing collection equipment. Two personnel were stationed at all times at Point Barrow. </span></p>
<p class="P3"><span class="T1">“The facility at Barrow is moving into the future of NSA operations,” the document said, noting that there would soon be upgrades to the Barrow facility, including a wideband radio collection system known as “</span><a class="Internet_20_link" href="https://theintercept.com/snowden-sidtoday/4757895-new-glaive-hf-collection-system-course-is/">GLAIVE</a><span class="T1">.”</span></p>
<p class="P3"><span class="T1">“The</span> <span class="T1">AMOC is uniquely positioned to continue to be a vital part of NSA&#8217;s efforts against the emerging Arctic Intelligence problem,” it said.</span></p>
<p class="P3"><!-- BLOCK(photo)[7](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[7] --> <img loading="lazy" decoding="async" width="2000" height="1333" class="aligncenter size-large wp-image-204633" src="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-462906873-edit-1534174564.jpg" alt="BEIJING, CHINA - JANUARY 16:  (CHINA OUT) People visit the Tiananmen Square which is shrouded with heavy smog on January 16, 2014 in Beijing, China. Beijing Municipal Government issued a yellow smog alert this morning.  (Photo by VCG/VCG via Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-462906873-edit-1534174564.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-462906873-edit-1534174564.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-462906873-edit-1534174564.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-462906873-edit-1534174564.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-462906873-edit-1534174564.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-462906873-edit-1534174564.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/08/GettyImages-462906873-edit-1534174564.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<p class="caption overlayed">People visit Tiananmen Square, which is shrouded with heavy smog, on Jan. 16, 2014, in Beijing.</p>
<p class="P3">
<figcaption class="caption source pullright">Photo: VCG via Getty Images</figcaption></p><!-- END-CONTENT(photo)[7] --></figure><!-- END-BLOCK(photo)[7] --></p>
<h3 class="P4"><a id="a__Climate_Change_a_Growing_Priority_for_the_NSA"></a><span class="T2">Climate Change a Growing Priority for the NSA</span></h3>
<p class="P3"><span class="T1">Previously unreleased documents indicate that climate change increasingly became a topic of interest in the mid-2000s and early 2010s. Climate change is mentioned repeatedly in reports describing the NSA’s priority issues. A <a href="https://theintercept.com/document/2018/08/15/nsa-responsibility-3b-implications-of-technology-geopolitical-trends">secret NSA report describing geopolitical trends</a> for 2011 to 2016, for example, ranked climate change as No. 31 out of 34 priorities (No. 1 was “global energy security”).</span></p>
<p class="P3"><span class="T1">To bring analysts up to date on this increasingly urgent issue, the NSA offered various learning opportunities. For example, in advance of the U.N.&#8217;s Cancún, Mexico, climate talks in 2010, approximately 50 analysts attended an entire &#8220;Climate Change Day,&#8221; <a href="https://theintercept.com/document/2018/08/15/nsa-sidtoday-nsa-hosts-successful-climate-change-day-in-advance-of-un-conference">according to SIDtoday</a>. And in the summer of 2006, the agency held a seminar on the causes and effects of climate change titled “Fire and Ice.” A <a href="https://theintercept.com/document/2018/08/15/nsa-sidtoday-sinio-seminar-fire-and-ice-a-discussion-on-climate-change">description</a> says, “Climate change (most likely as a result of global warming) is expected to accelerate at an </span><span class="T1">unprecedented rate over the coming decades and has already been linked to drought and related famine, shifts in precipitation, and the loss of fresh water resources. Extreme weather patterns are a growing threat.” It adds, “Alternative viewpoints will also be addressed.” </span></p>
<p class="P3"><span class="T1">More than a decade later, the intelligence community appears less concerned about the validity of alternative viewpoints. The intelligence community’s publicly released 2018 Worldwide Threat Assessment notes, “The past 115 years have been the warmest period in the history of modern civilization, and the past few years have been the warmest years on record. Extreme weather events in a warmer world have the potential for greater impacts and can compound with other drivers to raise the risk of humanitarian disasters, conflict, water and food shortages, population migration, labor shortfalls, price shocks, and power outages. Research has not identified indicators of tipping points in climate-linked earth systems, suggesting a possibility of abrupt climate change.”</span></p>
<p class="P3"><span class="T1">It underlines that bad air pollution may drive protests in China, India, and Iran. Water scarcity will drive conflicts related to the construction of dams and will complicate agreements around the use of river water. And accelerating biodiversity loss caused by pollution, warming, unsustainable fishing, and acidifying oceans “will jeopardize vital ecosystems that support critical human systems.”</span></p>
<p class="caption">Top photo: Fishing boats set sail from a harbor to catch fish in the South China Sea on Aug. 16, 2017, in Sanya, Hainan Province, China.</p>
<p>The post <a href="https://theintercept.com/2018/08/15/nsa-snowden-documents-climate-change/">The NSA&#8217;s Role in a Climate-Changed World: Spying on Nonprofits, Fishing Boats, and the North Pole</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2018/08/15/nsa-snowden-documents-climate-change/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2018/08/NSA-environment-feature-1534173906.jpg?fit=2000%2C1000' width='2000' height='1000' /><post-id xmlns="com-wordpress:feed-additions:1">204058</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?fit=720%2C98" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-494614151-1534174018.jpg?fit=3000%2C1666" medium="image">
			<media:title type="html">Tension Rises In Disputed Area of South China Sea</media:title>
			<media:description type="html">A Chinese Maritime Police Bureau ship uses water canon to harass a Vietnamese fisheries surveillance force vessel near the disputed Paracel Islands on May 27, 2014 in At Sea.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-494614151-1534174018.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/08/AP_08101009811-edit-1534181750.jpg?fit=2000%2C1338" medium="image">
			<media:title type="html">India Power</media:title>
			<media:description type="html">Laborers walk on a bridge in the backdrop of the 450 MW Baglihar hydro electric project built on the river Chenab, in Chanderkot, about 154 kilometers (96 miles) north of Jammu, India, Friday, Oct. 10, 2008.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/08/AP_08101009811-edit-1534181750.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/08/AP_663840585364-1534174339.jpg?fit=4187%2C2791" medium="image">
			<media:title type="html">Barneo drift ice camp in Arctic</media:title>
			<media:description type="html">Barneo expedition drift ice camp in the Arctic in April 13, 2016.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/08/AP_663840585364-1534174339.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-462906873-edit-1534174564.jpg?fit=2000%2C1333" medium="image">
			<media:title type="html">Heavy Smog Hits Beijing</media:title>
			<media:description type="html">People visit the Tiananmen Square which is shrouded with heavy smog on January 16, 2014 in Beijing, China.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/08/GettyImages-462906873-edit-1534174564.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[NSA Cracked Open Encrypted Networks of Russian Airlines, Al Jazeera, and Other “High Potential” Targets]]></title>
                <link>https://theintercept.com/2018/08/15/nsa-vpn-hack-al-jazeera-sidtoday/</link>
                <comments>https://theintercept.com/2018/08/15/nsa-vpn-hack-al-jazeera-sidtoday/#respond</comments>
                <pubDate>Wed, 15 Aug 2018 18:09:34 +0000</pubDate>
                                    <dc:creator><![CDATA[Micah Lee]]></dc:creator>
                                		<category><![CDATA[release-august-2018]]></category>
		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=201600</guid>
                                    <description><![CDATA[<p>The agency broke into virtual private networks for several key targets, including two government entities in Iraq.</p>
<p>The post <a href="https://theintercept.com/2018/08/15/nsa-vpn-hack-al-jazeera-sidtoday/">NSA Cracked Open Encrypted Networks of Russian Airlines, Al Jazeera, and Other “High Potential” Targets</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --><a href="https://theintercept.com/snowden-sidtoday/" target="_blank"><img loading="lazy" decoding="async" class="aligncenter wp-image-65243" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" srcset="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=720 720w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=540 540w" sizes="auto, (max-width: 720px) 100vw, 720px" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] --><u>The National Security Agency</u> successfully broke the encryption on a number of “high potential” virtual private networks, including those of media organization Al Jazeera, the Iraqi military and internet service organizations, and a number of airline reservation systems, according to a <a href="https://theintercept.com/snowden-sidtoday/4755596-efforts-against-virtual-private-networks-bear">March 2006 NSA document</a>.</p>
<p>A virtual private network, or VPN, uses an encrypted connection to enable users to go over the internet and connect to a private network, such as a corporate intranet. This allows an organization’s staff to access internal services like file-sharing servers or private wikis without having to physically be in the office.</p>
<p>The NSA&#8217;s ability to crack into sensitive VPNs belonging to large organizations, all the way back in 2006, raises broader questions about the security of such networks. Many consumers pay for access to VPNs in order to mask the origin of their internet traffic from the sites they visit, hide their surfing habits from their internet service providers, and to protect against eavesdroppers on public Wi-Fi networks.</p>
<p>The fact that the NSA spied on Al Jazeera’s communications was <a href="http://www.spiegel.de/international/world/nsa-spied-on-al-jazeera-communications-snowden-document-a-919681.html">reported by the German newsmagazine Der Spiegel</a> in 2013, but that reporting did not mention that the spying was accomplished through the NSA’s compromise of Al Jazeera’s VPN. During the Bush administration, high-ranking U.S. officials <a href="https://cpj.org/reports/2001/10/aljazeera-oct01.php">criticized</a> Al Jazeera, accusing the Qatar-based news organization of having an anti-American bias, including because it broadcasted taped messages from Osama bin Laden.</p>
<!-- BLOCK(pullquote)[1](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[1] -->&#8220;Both protocols offer a zillion configurable options, which is a source of a lot of the vulnerabilities.&#8221;<!-- END-CONTENT(pullquote)[1] --></blockquote><!-- END-BLOCK(pullquote)[1] -->
<p>At the time, Al Jazeera defended itself against this criticism, insisting that its reporting was objective. &#8220;Osama bin Laden, like it or not, is a party to this present crisis,&#8221; news editor Ahmed Al Sheikh <a href="http://news.bbc.co.uk/2/hi/middle_east/1591361.stm">told</a> the BBC <a href="http://news.bbc.co.uk/2/hi/middle_east/1591361.stm">in 2001</a>. &#8220;If we said that we were not going to allow him the air time, then we would have lost our integrity and objectivity and our coverage of the story would have become unbalanced.&#8221;</p>
<p>According to the document, contained in the cache of materials provided by NSA whistleblower Edward Snowden, the NSA also compromised VPNs used by airline reservation systems Iran Air, “Paraguayan SABRE,” Russian airline Aeroflot, and “Russian Galileo.” Sabre and Galileo are both privately operated, centralized computer systems that facilitate travel transactions like booking airline tickets. Collectively, they are used by hundreds of airlines around the world.</p>
<p>In Iraq, the NSA compromised VPNs at the Ministries of Defense and the Interior; the Ministry of Defense had been established by the U.S. in 2004 after the prior iteration was dissolved. Exploitation against the ministries’ VPNs appears to have occurred at roughly the same time as a broader “all-out campaign to penetrate Iraqi networks,” <a href="https://theintercept.com/2017/09/13/sloppy-u-s-spies-misused-covert-network-for-personal-shopping-and-other-stories-from-internal-nsa-documents/#spying-on-iraq">described by an NSA staffer</a> <a href="https://theintercept.com/2017/09/13/sloppy-u-s-spies-misused-covert-network-for-personal-shopping-and-other-stories-from-internal-nsa-documents/#spying-on-iraq">in 2005</a>.</p>
<p>“Although VPNs pose special challenges for SIGINT (signals intelligence) collection and processing, we’ve recently had notable success in exploiting these communications,” wrote the author of the document, an article for the internal NSA news site SIDtoday. The author added that the NSA’s Network Analysis Center had been focusing on “VPN SIGINT Development (SIGDev) for over three years now, and the investment is paying off!” The article does not say what VPN technology any of the targets used, nor does it give any technical details on how the NSA broke the encryption on them.</p>
<p>The technical details that describe how the NSA exploits VPNs are a closely-guarded secret, according to <a href="https://theintercept.com/document/2018/08/15/nsa-sidtoday-giving-answers-keeping-secrets">another SIDtoday article,</a> from December 2006. “Exploiting VPNs makes use of some of the newest state-of-the-art techniques,” the article stated, “and because of this, the exploitation details are held closely and generally not available to field sites.” The author went on to describe a tool called VIVIDDREAM that lets analysts who discover new VPNs test whether the NSA has the capability to exploit it, all without revealing to the analyst any sensitive information about how the exploit works.</p>
<p>Documents provided to news organizations by Snowden do not conclusively list which VPN technologies have been compromised by the NSA and which have not. However, there have been a number of news reports about the NSA’s VPN hacking capabilities based on these documents, and cryptographers who have reviewed them have come up with some educated guesses.</p>
<p>In 2014, The Intercept <a href="https://theintercept.com/2014/03/12/nsa-plans-infect-millions-computers-malware/">reported</a> on the NSA’s plans, dated August 2009, to use an automated system called TURBINE to covertly infect millions of computers with malware. The revelations described a piece of NSA malware called HAMMERSTEIN, installed on routers that VPN traffic traverses. The malware was able to forward VPN traffic that uses the IPSec protocol back to the NSA to decrypt. However, the documents did not explain precisely how the decryption occurred.</p>
<p>Later that year, Der Spiegel <a href="http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html">published 17 documents</a> from the Snowden archive related to the NSA’s attacks against VPNs, many of them providing more details about TURBINE, HAMMERSTEIN, and related programs.</p>
<p>There are many different VPN protocols in use, some of them <a href="https://www.howtogeek.com/211329/which-is-the-best-vpn-protocol-pptp-vs.-openvpn-vs.-l2tpipsec-vs.-sstp/">known</a> to be less secure than others, and each can be configured in ways to make them more or less secure. One, Point-to-Point Tunneling Protocol, “is old and insecure and there are a bunch of known security vulnerabilities since forever,” Nadia Heninger, cryptography researcher at the University of Pennsylvania, told me in an email. “I would not at all be shocked if these were being exploited in the wild.”</p>
<p>The NSA also appears to have, at least in some situations, broken the security of another VPN protocol, Internet Protocol Security, or IPSec, according to the Snowden documents published by The Intercept and Der Spiegel in 2014.</p>
<p>“For both TLS and IPsec, there are both secure and insecure ways of configuring these protocols, so they can&#8217;t really be labeled as blanket ‘secure’ or ‘insecure,’” Heninger explained. “Both protocols offer a zillion configurable options, which is a source of a lot of the published protocol-level vulnerabilities, and there are cipher suites and parameter choices for both protocols that are definitely known to be cryptographically vulnerable.” Still, she was “pretty confident” that there are ways to configure TLS and IPsec that “should resist all known attacks.”</p>

<p>Another possibility is that the NSA figured out how to break the encryption on VPNs without even using cryptography. “I should also note that we&#8217;ve seen a lot of hardcoded credentials and other software vulnerabilities get found in various VPN implementations, which would enable a bunch of boring noncryptographic attacks like just running a script on an end host to exfiltrate login credentials or other data as desired. This is the kind of thing that most of the Shadow Brokers tools were actually doing,” Heninger said, referring to the cache of post-Snowden <a href="https://theintercept.com/2018/03/06/leaked-files-show-how-nsa-tracks-other-countries-hackers/">NSA exploits and hacking tools</a> that were published on the internet in 2016 and 2017.</p>
<p>In 2015, Heninger and a team of 13 other cryptographers <a href="https://weakdh.org/">published</a> a paper, titled &#8220;Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice,&#8221; that revealed major weaknesses in the security of several of the internet’s most popular protocols. Their paper described a new attack called Logjam and concluded that it was within the resources of a nation-state to use this attack to compromise 66 percent of all IPSec VPNs. “A close reading of published NSA leaks shows that the agency’s attacks on VPNs are consistent with having achieved such a break,” the authors speculated.</p>
<p>The NSA declined to comment for this story.</p>
<p class="caption">Top photo: A Qatari employee of Al Jazeera Arabic language TV news channel walks past the logo of Al Jazeera in Doha, Qatar in Nov. 1, 2006.</p>
<p>The post <a href="https://theintercept.com/2018/08/15/nsa-vpn-hack-al-jazeera-sidtoday/">NSA Cracked Open Encrypted Networks of Russian Airlines, Al Jazeera, and Other “High Potential” Targets</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2018/08/15/nsa-vpn-hack-al-jazeera-sidtoday/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2018/08/VPN-Al-Jazeera-feature-1534174800.jpg?fit=2000%2C1000' width='2000' height='1000' /><post-id xmlns="com-wordpress:feed-additions:1">201600</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?fit=720%2C98" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents]]></title>
                <link>https://theintercept.com/2018/03/01/iraq-porn-nsa-snowden-files-sidtoday/</link>
                <comments>https://theintercept.com/2018/03/01/iraq-porn-nsa-snowden-files-sidtoday/#respond</comments>
                <pubDate>Thu, 01 Mar 2018 17:08:25 +0000</pubDate>
                                    <dc:creator><![CDATA[Margot Williams]]></dc:creator>
                                    <dc:creator><![CDATA[Talya Cooper]]></dc:creator>
                                    <dc:creator><![CDATA[Micah Lee]]></dc:creator>
                                		<category><![CDATA[release-march-2018]]></category>
		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=173470</guid>
                                    <description><![CDATA[<p>The documents, from an internal NSA newsletter, also reveal problems recruiting Arabic speakers to the spy agency and evidence of election fraud in Egypt.</p>
<p>The post <a href="https://theintercept.com/2018/03/01/iraq-porn-nsa-snowden-files-sidtoday/">NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-65243" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" srcset="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=720 720w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=540 540w" sizes="auto, (max-width: 720px) 100vw, 720px" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] --><br />
<u>He was an</u> NSA staffer but also a volunteer, having signed up to provide technical expertise for a wide-ranging, joint CIA mission in Iraq. He did not know what he was getting himself into.</p>
<p>After arriving in Baghdad “grungy and tired,” the staffer would later write, he discovered that the CIA and its partner, the Defense Intelligence Agency, had moved beyond talking to locals and were now intent on looking through their computer files. Marines would bring the NSA man “laptops, hard drives, CDs, phones and radios.” Sometimes the devices were covered in blood — and quite often they contained pornography, deemed “extremely useful” in humiliating and “breaking down” for interrogation the people who owned them.</p>
<p>The story of how the National Security Agency harvested porn for use against prisoners in Iraq is just one of the revelations disclosed in the agency’s internal newsletter SIDtoday during the second half of 2005.</p>
<p>There’s also the tale of how some intercepts would be rushed almost instantly to the president at Camp David via golf cart “with virtually no oversight.”</p>
<p>Then there’s one about how the NSA declared it could find “not many” Arabic translators it could trust among “the largest Arabic-speaking population in the United States.”</p>
<p>Or the story of how the agency listened as the Egyptian government dictated through its communication channels the final results for an election that had barely begun.</p>
<p>Told in more detail below, these are highlights from some 297 SIDtoday articles <a href="https://theintercept.com/snowden-sidtoday/">published today</a> by The Intercept as part of an ongoing project to release, after careful review, material provided by whistleblower Edward Snowden.</p>
<p>From the same SIDtoday release &#8212; our sixth thus far &#8212; we are publishing three other articles. One is an investigation into a <a href="https://theintercept.com/2018/03/01/nsa-global-surveillance-sigint-seniors/">secretive global intelligence-sharing alliance</a> led by the NSA, comprising 18 members and known as the SIGINT Seniors. Another looks at <a href="https://theintercept.com/2018/03/01/london-7-7-bombings-gchq-nsa-surveillance/">increased surveillance in the United Kingdom</a> following the London bombings in 2005 — and discloses for the first time a secret agreement to share metadata harvested from the vast data repositories of the NSA and its counterparts in the U.K., Canada, Australia, and New Zealand.</p>
<p>Also today, in collaboration with the Norwegian Broadcaster NRK, we shine light on a <a href="https://theintercept.com/2018/03/01/norway-nsa-victory-garden-surveillance/">large spy base located outside Oslo</a>. The base was built with the NSA’s help to aid Norway’s military and counterterrorism operations overseas. But it has also swept up Norwegian citizens’ phone and email records – and is now at the center of a dispute over illegal surveillance.</p>
<p>The NSA declined to comment for this article.</p>
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[1] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-51453487-1519853175.jpg"><img loading="lazy" decoding="async" width="2000" height="1325" class="alignleft size-large wp-image-173537" src="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-51453487-1519853175.jpg" alt="HASWAH, IRAQ - OCTOBER 8:  U.S. Marines of the 1st Battalion 2nd Marines inspect the bedroom of a suspect, while patroling October 8, 2004 in the insurgent stronghold of Haswah, 25 miles south of Baghdad, Iraq. The patrol is part of a new Marine offensive called &quot;Operation Phantom Fury&quot;, aimed at cutting off supply lines for Iraqi insurgents that shift cash, weapons, car bombs and militants from Fallujah and Ramadi to Baghdad. The operation is part of a wider U.S. assault on insurgent strongholds across Iraq before elections in January.  (Photo by Scott Peterson/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-51453487-1519853175.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-51453487-1519853175.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-51453487-1519853175.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-51453487-1519853175.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-51453487-1519853175.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-51453487-1519853175.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-51453487-1519853175.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">U.S. Marines of the 1st Battalion 2nd Marines inspect the bedroom of a suspect, while patrolling on Oct. 8, 2004 in the insurgent stronghold of Haswah, 25 miles south of Baghdad, Iraq.<br/>Photo: Scott Peterson/Getty Images</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] -->
<h3>Porn Recovered by NSA Used to “Break Down Detainees” in Iraq</h3>
<p>An NSA staffer deployed to Iraq led a counterterrorism and counterintelligence mission involving forensic investigations on computers seized in raids. The staffer’s “Media Exploitation” team <a href="https://theintercept.com/snowden-sidtoday/4389680-nsaer-investigates-computers-seized-in-raids-in/">found pornographic videos and photos</a> alongside thousands of audio files of the Quran and sermons, and recruitment and training CDs with video of bombings, torture, and beheadings. The team “jokingly” referred to the content as the “three big &#8216;P&#8217;s – porn, propaganda and prayer.”</p>
<p>Reports and files were distributed to the NSA and other intelligence agencies; the staffer was detailed to the Iraq Survey Group, a joint venture between the CIA and the Defense Intelligence Agency to find <a href="https://theintercept.com/snowden-sidtoday/3991048-the-little-card-that-made-a-big-impact-in-iraq/">weapons of mass destruction</a> and <a href="https://theintercept.com/snowden-sidtoday/3008492-volunteer-position-for-a-ct-analyst-in-baghdad/">disrupt terrorist activities</a>. But among the customers of the material gathered by the NSA staffer were the military units interrogating captured insurgents and suspects. Special Forces interrogators found the pornography “extremely useful in breaking down detainees who maintained that they were devout Muslims, but had porn on their computers,” according to an account by the NSA staffer in SIDtoday. (The account makes no acknowledgment of the human rights abuses by staff at Abu Ghraib prison in Baghdad, which were in the news starting in April 2004, nearly four months before the account was published, and which were, at the time, still under investigation.)</p>
<p>As the conflict with insurgents escalated in Fallujah into Operation Phantom Fury/Al Fajr, NSA staff with “top-secret” clearances were deployed to the combat zone. Marines gave the NSA staff seized computers, CDs, phones, and radios directly from the battlefield, some “covered in blood.” This material, too, was used in interrogations that helped keep the “bad guys” behind bars. No “smoking WMD” evidence was found, according to the SIDtoday account.</p>
<p>A former interrogator at the U.S. detention center at Guantánamo Bay, Cuba, has said, in a statement <a href="https://www.newyorker.com/magazine/2005/07/11/the-experiment-3">obtained by the New Yorker</a>, that pornography was used at the facility to reward some detainees and as a tool against others, who were forced to look at the material. The Associated Press has also <a href="http://www.businessinsider.com/penny-lane-this-secret-cia-facility-at-guantnamo-bay-turned-detainees-into-double-agents-2013-11">reported</a> on the use of pornography at Guantánamo as an inducement.</p>
<p>The intelligence community has also used seized pornography as a form of propaganda. In November 2017, the CIA <a href="https://www.cia.gov/library/abbottabad-compound/index.html">released</a> files recovered from the fatal raid of Osama bin Laden’s hideaway in Abbottabad, Pakistan “in an effort to further enhance public understanding of al-Qa&#8217;ida.” The agency noted that the overall trove recovered from the compound contained pornography that it was not releasing with the other files. The discovery of pornography on bin Laden’s computers in 2011 was leaked to the media within days of the raid, and a New York Times <a href="http://www.nytimes.com/2011/05/14/world/asia/14binladen.html">story focused on the porn</a> reported that the adult material “will be welcomed by counterterrorism officials because it could tarnish his legacy and erode the appeal of his brand of religious extremism.”</p>
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[2] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-73081175-1519853345.jpg"><img loading="lazy" decoding="async" width="2000" height="1333" class="aligncenter size-large wp-image-173538" src="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-73081175-1519853345.jpg" alt="Cairo, EGYPT:  Egypt's jailed opposition leader Ayman Nur sits in the dock behind bars during his trial at a court in Cairo 23 January 2007. The 42-year-old lawyer was found not guilty today of physically assaulting a voter during the September 2005 presidential elections, his wife and security sources told AFP. The Bab al-Sharia criminal court acquitted Nur because of the lack of evidence, the source said. Nur, a insulin-dependent diabetic, has complained of the lack of medical care in prison, resulting in a steep decline in his health. He still faces another 31 charges, mostly filed by private citizens.  AFP PHOTO/KHALED DESOUKI  (Photo credit should read KHALED DESOUKI/AFP/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-73081175-1519853345.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-73081175-1519853345.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-73081175-1519853345.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-73081175-1519853345.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-73081175-1519853345.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-73081175-1519853345.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-73081175-1519853345.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">Egypt&#8217;s jailed opposition leader Ayman Nur sits in the dock behind bars during his trial at a court in Cairo on Jan. 23, 2007.<br/>Photo: Khaled Desouki/AFP/Getty Images</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->
<h3>Evidence of Election Fraud in Egypt</h3>
<p>The NSA <a href="https://theintercept.com/snowden-sidtoday/4389789-what-sigint-revealed-about-the-egyptian-election/">used signals intelligence to uncover apparent fraud</a> in a referendum on how Egypt’s presidential elections would be run.</p>
<p>Rules supported by Egyptian President Hosni Mubarak would allow direct election of the president, abolishing the old system, in which the parliament forwarded a single candidate to voters for approval. But the rules also imposed major barriers to appearing on the ballot, including a requirement that independent candidates win support from 65 of 444 members of parliament and that other candidates come from a party with at least 5 percent representation in parliament — which at the time no opposition party held. These requirements engendered significant opposition, including a call to boycott the referendum.</p>
<p>The agency apparently intercepted government communications early on election day, instructing underlings to report a “yes” vote of about 80 percent and turnout of 40 to 50 percent. Official results then showed a “yes” vote of 83 percent and turnout of 54 percent, “pretty much in line with the instructions. Most foreign observers on the scene described actual voter turnout as very light, nowhere near 50 percent,” SIDtoday reported.</p>
<p>The referendum was followed by Egypt’s historic first multi-candidate presidential election, on September 7, 2005. Although the winner, Mubarak, was a “foregone conclusion,” there was “much interest” about whether this vote count would be honest. With only 23 percent voter turnout, Mubarak won 88.6 percent of the vote. The NSA’s analysis? “SIGINT provided good evidence that there was no massive fraud in the vote count,” according to the same “senior reporter/subject matter expert” who described the suspicious referendum. “Local vote totals reported on the day of the election by Egyptian authorities conformed closely to the final results.” Also, the runner-up, Ayman Nour, with 7.6 percent of votes, was a surprise to “top Egyptian officials” who had wanted a different candidate to come in second, the NSA staffer added. The opposition claimed there were irregularities, but Egypt’s electoral commission was satisfied with the process.</p>
<p>Just three months after the election, surprise favorite Nour was jailed on charges of election fraud and imprisoned for the next five years.</p>
<!-- BLOCK(photo)[3](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[3] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/AP_050930024323-1519853430.jpg"><img loading="lazy" decoding="async" width="2000" height="1292" class="aligncenter size-large wp-image-173539" src="https://theintercept.com/wp-content/uploads/2018/02/AP_050930024323-1519853430.jpg" alt="**ADVANCE FOR WEEKEND EDITIONS, SEPT. 2-3 ** FILE** Samuel Chahrour is illuminated by a shaft of light at while praying at the The Islamic Center of America mosque in Dearborn, Mich., Sept. 30, 2005. Five years after Sept. 11, 2001, Arab Americans are still sorting through the profound and varied consequences of the attacks and events that followed. The Detroit suburb of Dearborn is arguably the capital of Arab America and anchors an estimated 300,000-strong Arab American community in southeastern Michigan. The Arab American National Museum, which opened last year in a 38,500-square-foot Middle Eastern-style building opposite City Hall is a symbol of the community's increasing visibility. Across town, the minarets of the Islamic Center of America, which claims to be the largest mosque in the U.S., are hard to miss. (AP Photo/Paul Sancya)" srcset="https://theintercept.com/wp-content/uploads/2018/02/AP_050930024323-1519853430.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2018/02/AP_050930024323-1519853430.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/02/AP_050930024323-1519853430.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/02/AP_050930024323-1519853430.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/02/AP_050930024323-1519853430.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/02/AP_050930024323-1519853430.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/02/AP_050930024323-1519853430.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">Samuel Chahrour is illuminated by a shaft of light at while praying at the the Islamic Center of America mosque in Dearborn, Mich., Sept. 30, 2005. The Detroit suburb of Dearborn is arguably the capital of Arab America and anchors an estimated 300,000-strong Arab-American community in southeastern Michigan.<br/>Photo: Paul Sancya/AP</figcaption><!-- END-CONTENT(photo)[3] --></figure><!-- END-BLOCK(photo)[3] -->
<h3>NSA Trusts Few Arabic-Speaking Americans It Finds at Detroit Job Fair</h3>
<p>As the NSA swept up Arabic communications from Iraq and other hotspots in the “global war on terror,” it found its translation capabilities severely lacking. “This shortcoming must be rectified,” an NSA senior language authority <a href="https://theintercept.com/snowden-sidtoday/3233200-now-you-re-speaking-my-language-nsa-s-linguistic/">wrote</a> in 2004.  In September 2005, the agency convened a “career invitational” in Detroit, hoping to draw on the high proportion of Arabic-speaking residents in the area and recruit them as linguists for a language center on nearby Selfridge Army National Guard Base.</p>
<p>But the invitational “may not yield many hires” due to unspecified agency concerns about the candidates, an NSA assistant deputy directory <a href="https://theintercept.com/snowden-sidtoday/4389902-can-motor-city-manufacture-some-arabic-language/">wrote in SIDtoday</a>. After gathering 750 resumes, the NSA homed in on 145 potential candidates through “preliminary processing,” and of these, at least 43 passed two placement exams. These finalists were subjected to “special source checks&#8221;; other documents throughout the Snowden archive use the phrase “special source” in connection with surveillance operations, including by the agency’s Special Source Operations unit, which at one point was <a href="https://www.eff.org/files/2015/08/15/20150815-nyt-att-fairview-stormbrew.pdf">said</a> to be responsible for 80 percent of NSA collection, including its notorious PRISM program — implying that signals intelligence may have been used to vet the candidates. The “special source checks” caused eight individuals to be removed from the applicant pool and led to plans for “significant and lengthy investigation[s]” into at least some of the remaining candidates — investigations that “may not sufficiently resolve the identified issues,” SIDtoday noted. Although the language center on the Selfridge base could accommodate 85 linguists across four daily shifts, the assistant deputy director made clear that filling the seats was far from imminent and wrote, “We will continue to review other sites” to fill the need for linguists.</p>
<p>The NSA’s aggressive probing of Americans of Middle Eastern descent was not confined to job applicants or to Detroit; earlier Intercept <a href="https://theintercept.com/2014/07/09/under-surveillance/">reporting</a> on documents supplied by Snowden revealed that the agency used the Foreign Intelligence Surveillance Act to monitor the communications of prominent Muslim-American community leaders and politicians. Internally, the intelligence community continues to lag in employee diversity, with a 2015 <a href="https://www.dni.gov/files/documents/FY-2015-Annual-Demographic-Report.pdf">report</a> from the Office of the Director of National Intelligence showing that racial and ethnic minorities comprise less than a quarter of the agencies’ staff.</p>
<!-- BLOCK(photo)[4](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[4] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-1306623-1519853565.jpg"><img loading="lazy" decoding="async" width="2000" height="1360" class="aligncenter size-large wp-image-173540" src="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-1306623-1519853565.jpg" alt="374228 01: U.S. President Bill Clinton, center, speaks during a morning meeting with Israeli Prime Minister Ehud Barak, left, and Palestinian Chairman Yasser Arafat July 25, 2000 at Camp David in Maryland. Clinton announced later in the day that the Middle East peace summit had collapsed because of a deadlock over the status of the disputed city of Jerusalem. (Photo by Ralph Alswang/Newsmakers)" srcset="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-1306623-1519853565.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-1306623-1519853565.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-1306623-1519853565.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-1306623-1519853565.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-1306623-1519853565.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-1306623-1519853565.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-1306623-1519853565.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">U.S. President Bill Clinton, center, speaks during a morning meeting with Israeli Prime Minister Ehud Barak, left, and Palestinian Chair Yasser Arafat on July 25, 2000 at Camp David in Maryland.<br/>Photo: Ralph Alswang/Newsmakers</figcaption><!-- END-CONTENT(photo)[4] --></figure><!-- END-BLOCK(photo)[4] -->
<h3>“Smoking Gun Evidence” Against Yasser Arafat</h3>
<p>In the course of arguing for more new hires, the deputy chief of the NSA’s Middle East and North Africa line <a href="https://theintercept.com/snowden-sidtoday/4389809-is-nsa-going-deaf-what-is-golf-cart-reporting-an/">told an interviewer in SIDtoday</a> that intelligence provided by the unit had “shaped history.” One way this occurred was through “golf cart reporting.&#8221; During the 2000 peace talks between the Israelis and Palestinians at Camp David, the NSA intercepted communications on the stances of participating diplomats in “near real-time,” the deputy chief said, and would “stamp ‘draft’ on it and fax it to a CIA liaison officer up in Thurmont, Maryland who in his own golf cart would race across the grounds to give it directly to the President or Secretary of State. Imagine the thrill and the responsibility of providing &#8212; with virtually no oversight &#8212; intelligence going directly to the President!”</p>
<p>U.S. negotiators would know the Israeli and Palestinians’ positions prior to the teams’ arrival.</p>
<p>The deputy chief further credits his unit’s reporting as the basis for the U.S.’s refusal to negotiate with Palestinian Liberation Organization leader Yasser Arafat, stating the division “had smoking-gun evidence that Arafat was still supporting terrorism.” It’s unclear to which precise chapter of Middle East peace talks this claim refers, but President George W. Bush <a href="https://www.theguardian.com/world/2002/jun/25/usa.israel">formally refused </a>to accept Arafat as a negotiation partner in 2002, amid <a href="https://www.theguardian.com/news/2014/nov/13/-sp-yasser-arafat-why-he-still-matters">speculation</a> that the Palestinian leader was implicated in the 2000 outbreak of the second Intifada.</p>
<p>The Camp David talks were hardly the first instance of NSA diplomatic spying, a key activity for the agency. Previously published documents have shown the agency spying on <a href="https://theintercept.com/2015/07/04/nsa-top-brazilian-political-and-financial-targets-wikileaks/">heads of state</a>, <a href="https://www.nytimes.com/2015/08/16/us/politics/att-helped-nsa-spy-on-an-array-of-internet-traffic.html">U.N. headquarters</a>, and representatives to a <a href="https://www.information.dk/adblock?return=https://www.information.dk/udland/2014/01/the-nsa-espionage-was-a-means-to-strengthen-the-us-position-in-climate-negotiations)">climate change summit</a>.</p>
<!-- BLOCK(photo)[5](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[5] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/AP_060603036561-1519853643.jpg"><img loading="lazy" decoding="async" width="2100" height="1407" class="aligncenter size-large wp-image-173541" src="https://theintercept.com/wp-content/uploads/2018/02/AP_060603036561-1519853643.jpg" alt="Mirek Topolanek, chairman of Czech opposition Civic Democratic Party (ODS), watches a general elections exit poll in the party election headquarters in Prague, Saturday, June 3, 2006. The exit polls indicated Topolanek's conservative Civic Democrats were likely headed for victory with 37 percent of the ballot against 31 percent of left-leaning governing Social Democrats. (AP Photo/CTK, Michal Kamaryt)" srcset="https://theintercept.com/wp-content/uploads/2018/02/AP_060603036561-1519853643.jpg?w=2100 2100w, https://theintercept.com/wp-content/uploads/2018/02/AP_060603036561-1519853643.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/02/AP_060603036561-1519853643.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/02/AP_060603036561-1519853643.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/02/AP_060603036561-1519853643.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/02/AP_060603036561-1519853643.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2018/02/AP_060603036561-1519853643.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/02/AP_060603036561-1519853643.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">Mirek Topolanek, chair of Czech opposition Civic Democratic Party, known as ODS, watches a general elections exit poll in the party election headquarters in Prague, Saturday, June 3, 2006.<br/>Photo: Michal Kamaryt/AP</figcaption><!-- END-CONTENT(photo)[5] --></figure><!-- END-BLOCK(photo)[5] -->
<h3>Czech Partnership</h3>
<p>In 2006, then-U.S. Ambassador William J. Cabaniss was worried and unburdened himself to Czech Prime Minister Mirek Topolánek, saying he hoped intelligence-sharing between the two nations would not be adversely affected by structural changes in how Czech intelligence was managed. Topolánek assured the ambassador that things would be fine, despite a transition of a key spy agency to parliamentary control. As described in a State Department <a href="https://search.wikileaks.org/plusd/cables/06PRAGUE1167_a.html">cable</a> published by WikiLeaks, “the Prime Minister said that UZSI, the foreign intelligence branch, ‘has been effective and we don&#8217;t want to change that.’”</p>
<p>U.S. concern over changes at UZSI was understandable, as at least one element of the American intelligence community had spent the prior year gushing over the benefits of newly secured access to UZSI intel. The NSA, as previously reported, was essentially let inside UZSI’s “<a href="https://theintercept.com/snowden-sidtoday/3991169-czech-mates/">SIGINT vault</a>” in early 2005. By late 2005, the U.S. and Czech Republic appeared to have officially solidified their “Third Party” signals intelligence-sharing partnership and UZSI, over the course of at least three visits in six months, presented their American counterparts with a slew of information, largely about Russian government and business interests according to <a href="https://theintercept.com/snowden-sidtoday/4389720-this-could-be-the-start-of-a-beautiful-friendship/">two</a> <a href="https://theintercept.com/snowden-sidtoday/4389863-us-czech-and-japanese-all-at-the-same-table/">articles</a> in SIDtoday. These files included information about the communications of Russian and Belarusian arms dealers, banking networks, and counterintelligence targets. They also gave the Americans a program designed to identify Russian words in voice communications. “Our ability to jointly produce valuable SIGINT while enjoying each other&#8217;s company and learning about our cultural differences may indeed make this the start of a beautiful friendship,” wrote a staffer from the central European branch of the NSA’s foreign affairs directorate.</p>
<p>(One of the SIDtoday articles alleged that the Belarus company, BELTECHEXPORT, was involved in weapons proliferation. The U.S. State Department in 2011 <a href="https://www.state.gov/t/isn/inksna/c28836.htm">imposed, but in 2013 lifted</a>, sanctions against the company for weapons proliferation.)</p>
<!-- BLOCK(photo)[6](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[6] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/AP_05090101184-1519853707.jpg"><img loading="lazy" decoding="async" width="2000" height="1281" class="aligncenter size-large wp-image-173542" src="https://theintercept.com/wp-content/uploads/2018/02/AP_05090101184-1519853707.jpg" alt="An anti-imperialist activist sets a tent in front of the Italian Foreign Ministry building  in Rome, Thursday, Sept. 1, 2005. Members of the Anti-Imperialist camp(Campo Antimperialista) sterted the hunger strike to protest against the decision of Foreign Minister Gianfranco Fini to deny Visas to nine Iraqi invited by the anti-imperialist organization to join  their meeting that will start in Chianciano Terme Oct. 1. (AP Photo/Gregorio Borgia)" srcset="https://theintercept.com/wp-content/uploads/2018/02/AP_05090101184-1519853707.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2018/02/AP_05090101184-1519853707.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/02/AP_05090101184-1519853707.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/02/AP_05090101184-1519853707.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/02/AP_05090101184-1519853707.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/02/AP_05090101184-1519853707.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/02/AP_05090101184-1519853707.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">An anti-imperialist activist sets a tent in front of the Italian Foreign Ministry building in Rome, Thursday, Sept. 1, 2005.<br/>Photo: Gregorio Borgia/AP</figcaption><!-- END-CONTENT(photo)[6] --></figure><!-- END-BLOCK(photo)[6] -->
<h3>Anti-Imperialist Camp</h3>
<p>A previous SIDtoday release <a href="https://theintercept.com/2016/12/07/drowning-in-information-nsa-revelations-from-262-spy-documents/#aic">noted</a> the NSA’s interest in a European leftist group called the Anti-Imperialist Camp. The NSA had accused the group of toeing a line between “legitimate political activity” and abetting terrorism. In a <a href="https://theintercept.com/snowden-sidtoday/4389703-terrorism-or-political-action-the-anti/">later SIDtoday article</a>, titled “Terrorism or Political Action? The Anti-Imperialist Camp Crosses the Line,” a member of the NSA’s “indigenous European terrorism branch” describes the AIC as a “duplicitous organization” and touts the NSA’s interception of Anti-Imperialist Camp’s communications as a pathway into “[an] expansive network of extremists and terrorists.” The article alleged that the organization maintained contacts with such individuals, and said that “insights into [this] expansive network” led to the identification of “a Jordanian extremist with extensive links to other extremists,” “a new organization that calls itself the Resistant Arab People’s Alliance,” and several other individuals and groups.</p>
<p>Longtime Anti-Imperialist Camp member and spokesperson Wilhelm Langthaler told The Intercept that he could not “identify one single activity, participant, or interlocutor” from this list of what SIDtoday strongly implied were contacts of the group.</p>
<p>The SIDtoday article further stated that the U.S. government had “recent[ly],” as of August 2005, approached the Italian government and “demanded the arrest of individuals involved with the Italian wing of the AIC.” Several individuals associated with the AIC had been <a href="http://articles.latimes.com/2004/apr/02/world/fg-dragnet2">arrested</a> in April 2004 as part of a multinational effort against the Turkish militant organization, DHKP-C. The three AIC members, initially charged with conspiracy or “subversive association” with an alleged member of the terrorist group, were released and ultimately absolved of all charges in September 2010. In her decision, Judge Beatrice Cristiani observed that if the AIC did indeed help the DHPK-C, it was because they intended to assist “a dissident and not a terrorist” —essentially verifying the group’s legitimate political intent, which the NSA so adamantly decried.</p>
<h3>Breakthrough in Cellphone Tracking</h3>
<p>NSA analysts can often identify and track particular mobile phones by monitoring cellular networks for 15-digit handset identifiers called the International Mobile Subscriber Identities. Events on the network, like making a call, receiving an SMS text message, or connecting to a new cell tower, are normally tagged with such numbers.</p>
<p>But starting in the 1990s, NSA analysts had struggled whenever cellular networks implemented Temporary Mobile Subscriber Identities (TMSIs), according to a <a href="https://theintercept.com/snowden-sidtoday/4389665-gsm-temporary-selectors-breakthroughs-in/">July 2005 SIDtoday article</a>. “TMSIs obscure the true identities of the cellular subscribers being referenced in call records, location events, and SMS,” the author wrote, because “TMSIs can change every few hours or even with every phone call.” And, to make matters worse, two cellular networks in Iraq had just implemented TMSIs, obscuring the NSA’s collection efforts there.</p>
<p>The ASSOCIATION program solved this problem. With advances in metadata collection, processing, and storage, the NSA discovered that it could use individual metadata records to work backward from a TMSI to obtain the original IMSI and thus, associate cellphone events with the exact phone that made them.</p>
<!-- BLOCK(photo)[7](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[7] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-476564856-1519853764.jpg"><img loading="lazy" decoding="async" width="2000" height="1333" class="aligncenter size-large wp-image-173543" src="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-476564856-1519853764.jpg" alt="WASHINGTON, DC - JUNE 10:  A guest uses Skype and Microsoft automatic translation software to live-chat with a man in China during the Microsoft Innovation and Policy Center's TechFair June 10, 2015 in Washington, DC. Fairgoers had the opportunity to interact with researchers and scientists demonstrating projects ranging from visualizing Big Data to 'machine learning technologies.'  (Photo by Chip Somodevilla/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-476564856-1519853764.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-476564856-1519853764.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-476564856-1519853764.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-476564856-1519853764.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-476564856-1519853764.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-476564856-1519853764.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-476564856-1519853764.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">A guest uses Skype and Microsoft automatic translation software to live-chat with a man in China during the Microsoft Innovation and Policy Center&#8217;s TechFair, June 10, 2015 in Washington, D.C.<br/>Photo: Chip Somodevilla/Getty Images</figcaption><!-- END-CONTENT(photo)[7] --></figure><!-- END-BLOCK(photo)[7] -->
<h3>Early on, Skype Posed Challenges</h3>
<p>At the end of 2005, the NSA faced serious new challenges in spying on Skype calls. At the time, Skype was a 2-year-old service that was growing in popularity. “At this time, SIGINT targets have a method to freely obscure their communications on the global Internet,” <a href="https://theintercept.com/snowden-sidtoday/4389869-a-tough-targeting-challenge-skype/">an analyst wrote in SIDtoday</a>, “thus hindering our ability to collect vital communications intelligence.”</p>
<p>Unlike traditional phone calls, anyone with internet access anywhere in the world could make a free, anonymous Skype account, identified only by a username. And unlike the phone network, in which calls get routed through (and eavesdropped on) at central offices, Skype calls were peer-to-peer, making central eavesdropping impossible. On top of all this, Skype calls were also encrypted, and the NSA did not yet know how to decrypt them.</p>
<p>A reader <a href="https://theintercept.com/snowden-sidtoday/4389896-letter-to-the-editor-about-skype/">wrote a letter to the editor</a> pointing out that internet calling systems like Skype also complicate the NSA’s ability to comply with USSID-18, an NSA policy through which the agency attempts to not spy on Americans. &#8220;Anyone with any brains&#8221; will register a U.S. phone number for their account, they wrote, even though this phone number can be used from anywhere in the world.</p>
<p>The NSA’s troubles with spying on Skype calls were eventually resolved. New York Times <a href="http://www.nytimes.com/2013/06/20/technology/silicon-valley-and-spy-agency-bound-by-strengthening-web.html">reporting</a>, based on Snowden documents, revealed that in 2008, Skype &#8220;began its own secret program, Project Chess, to explore the legal and technical issues in making Skype calls readily available to intelligence agencies and law enforcement officials.&#8221;</p>
<!-- BLOCK(photo)[8](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221000px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1000px;"><!-- CONTENT(photo)[8] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/tint-rs_560x374-160203165526-560-Facebook-layout-2004harvard.jm_.20316-1519857977.jpg"><img loading="lazy" decoding="async" class="aligncenter wp-image-173584 size-large" src="https://theintercept.com/wp-content/uploads/2018/02/tint-rs_560x374-160203165526-560-Facebook-layout-2004harvard.jm_.20316-1519857977.jpg?w=1000" alt="" width="1000" height="668" srcset="https://theintercept.com/wp-content/uploads/2018/02/tint-rs_560x374-160203165526-560-Facebook-layout-2004harvard.jm_.20316-1519857977.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2018/02/tint-rs_560x374-160203165526-560-Facebook-layout-2004harvard.jm_.20316-1519857977.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/02/tint-rs_560x374-160203165526-560-Facebook-layout-2004harvard.jm_.20316-1519857977.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/02/tint-rs_560x374-160203165526-560-Facebook-layout-2004harvard.jm_.20316-1519857977.jpg?w=540 540w" sizes="auto, (max-width: 1000px) 100vw, 1000px" /></a>
<figcaption class="caption source">Archive of thefacebook.com at Feb. 12, 2004.<br/>Image: Facebook</figcaption><!-- END-CONTENT(photo)[8] --></figure><!-- END-BLOCK(photo)[8] -->
<h3>Blast from the Past</h3>
<p>“Social networking is truly the wave of the future,” Eric Mesa, a young software engineer at the NSA <a href="https://theintercept.com/snowden-sidtoday/4389915-letter-to-the-editor-more-comments-on-social/">wrote</a> in a December 2005 letter to the editor of SIDtoday. “A lot of you may not know this, but college students (of which I finally ceased to be in May 2005) have been voluntarily assembling their own social networks online!”</p>
<p>He went on to describe a service “known as The Facebook” and explained how it worked, including that &#8220;through the link &#8216;visualize my social network&#8217; they can see a diagram similar to the ones we use to map terrorist networks.&#8221;</p>
<p class="caption">Top photo: U.S. Marines escort nine detainees captured in Fallujah, half of them from other countries such as Yemen, Saudi Arabia, and Gulf states, to a local &#8220;prison&#8221; as other U.S. Marines of the 1st Battalion 3rd Marines, Alpha company engage four insurgents during house searches on Nov. 23, 2004 in Fallujah, Iraq.</p>
<p>The post <a href="https://theintercept.com/2018/03/01/iraq-porn-nsa-snowden-files-sidtoday/">NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2018/03/01/iraq-porn-nsa-snowden-files-sidtoday/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2018/02/highlight-sid-today-1519853089.jpg?fit=1440%2C720' width='1440' height='720' /><post-id xmlns="com-wordpress:feed-additions:1">173470</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?fit=720%2C98" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-51453487-1519853175.jpg?fit=2000%2C1325" medium="image">
			<media:title type="html">U.S. Marines Patrol Insurgent Stronghold</media:title>
			<media:description type="html">U.S. Marines of the 1st Battalion 2nd Marines inspect the bedroom of a suspect, while patroling October 8, 2004 in the insurgent stronghold of Haswah, 25 miles south of Baghdad, Iraq.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-51453487-1519853175.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-73081175-1519853345.jpg?fit=2000%2C1333" medium="image">
			<media:title type="html">Egypt&#8217;s jailed opposition leader Ayman N</media:title>
			<media:description type="html">Egypt&#039;s jailed opposition leader Ayman Nur sits in the dock behind bars during his trial at a court in Cairo 23 January 2007.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-73081175-1519853345.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/AP_050930024323-1519853430.jpg?fit=2000%2C1292" medium="image">
			<media:title type="html">Samuel Chahrour</media:title>
			<media:description type="html">Samuel Chahrour is illuminated by a shaft of light at while praying at the The Islamic Center of America mosque in Dearborn, Mich., Sept. 30, 2005.  The Detroit suburb of Dearborn is arguably the capital of Arab America and anchors an estimated 300,000-strong Arab American community in southeastern Michigan.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/AP_050930024323-1519853430.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-1306623-1519853565.jpg?fit=2000%2C1360" medium="image">
			<media:title type="html">President Clinton Holds Meeting with Barak and Arafat</media:title>
			<media:description type="html">U.S. President Bill Clinton, center, speaks during a morning meeting with Israeli Prime Minister Ehud Barak, left, and Palestinian Chairman Yasser Arafat July 25, 2000 at Camp David in Maryland.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-1306623-1519853565.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/AP_060603036561-1519853643.jpg?fit=2100%2C1407" medium="image">
			<media:title type="html">Mirek Topolanek</media:title>
			<media:description type="html">Mirek Topolanek, chairman of Czech opposition Civic Democratic Party (ODS), watches a general elections exit poll in the party election headquarters in Prague, Saturday, June 3, 2006.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/AP_060603036561-1519853643.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/AP_05090101184-1519853707.jpg?fit=2000%2C1281" medium="image">
			<media:title type="html">ITALY IRAQ VISAS</media:title>
			<media:description type="html">An anti-imperialist activist sets a tent in front of the Italian Foreign Ministry building  in Rome, Thursday, Sept. 1, 2005.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/AP_05090101184-1519853707.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-476564856-1519853764.jpg?fit=2000%2C1333" medium="image">
			<media:title type="html">Microsoft Shows Off Its New Technology At Tech Fair In Washington, DC</media:title>
			<media:description type="html">A guest uses Skype and Microsoft automatic translation software to live-chat with a man in China during the Microsoft Innovation and Policy Center&#039;s TechFair June 10, 2015 in Washington, DC.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-476564856-1519853764.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/tint-rs_560x374-160203165526-560-Facebook-layout-2004harvard.jm_.20316-1519857977.jpg?fit=1000%2C668" medium="image">
			<media:title type="html">tint-rs_560x374-160203165526-560-Facebook-layout-2004harvard.jm_.20316-1519857977</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/tint-rs_560x374-160203165526-560-Facebook-layout-2004harvard.jm_.20316-1519857977.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Norway Used NSA Technology for Potentially Illegal Spying]]></title>
                <link>https://theintercept.com/2018/03/01/norway-nsa-victory-garden-surveillance/</link>
                <comments>https://theintercept.com/2018/03/01/norway-nsa-victory-garden-surveillance/#respond</comments>
                <pubDate>Thu, 01 Mar 2018 17:04:47 +0000</pubDate>
                                    <dc:creator><![CDATA[Henrik Moltke]]></dc:creator>
                                		<category><![CDATA[release-march-2018]]></category>
		<category><![CDATA[Uncategorized]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=173328</guid>
                                    <description><![CDATA[<p>A base called VICTORY GARDEN, north of Oslo, secretly captured records of phone calls and emails transmitted between law-abiding Norwegians and their friends, families, or colleagues in foreign countries.</p>
<p>The post <a href="https://theintercept.com/2018/03/01/norway-nsa-victory-garden-surveillance/">Norway Used NSA Technology for Potentially Illegal Spying</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank"><img loading="lazy" decoding="async" class="aligncenter wp-image-65243" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" srcset="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=720 720w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=540 540w" sizes="auto, (max-width: 720px) 100vw, 720px" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p style="font-family: TIActuBeta-Regular_web,Tahoma,sans-serif">In partnership with <a href="https://www.nrk.no/dokumentar/xl/1.13881286">NRK</a></p>
<p><u>Behind an abandoned</u> military facility 40 miles northwest of Oslo, Norway built a surveillance base in close collaboration with the National Security Agency. Its bright, white satellite dishes, some of them 60 feet in diameter, stand out against the backdrop of pine-covered hills and red-roofed buildings that scatter the area.</p>
<p>Classified documents describe the facility as “state-of-the-art,” with capabilities “previously not released outside of NSA.” Despite a hefty price tag of more than $33 million paid by Norwegian taxpayers, the Norwegian Intelligence Service has kept the operations at the site beyond public scrutiny.</p>
<p>The station, code-named VICTORY GARDEN, was ostensibly built to support Norwegian troops serving overseas and to combat terrorism. But its dragnet has also secretly captured records of phone calls and emails transmitted between law-abiding Norwegians and their friends, families, or colleagues in foreign countries, an investigation by The Intercept and the Norwegian Broadcasting Corporation, known as NRK, has found.</p>
<p>In 2014, the data collection at the base was central to a behind-closed-doors dispute between the Norwegian Intelligence Service and the oversight committee that monitors the conduct of the country’s spy agencies, according to sources with knowledge of the incident. The intelligence service argued that the surveillance was lawful and necessary. But the committee disagreed and claimed that the storing and searching of Norwegians’ communication records was legally dubious. The disagreement remains unresolved; meanwhile, the surveillance appears to have continued unabated.</p>
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221000px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1000px;"><!-- CONTENT(photo)[1] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/TI-gif-2.5M-1519850036.gif"><img data-recalc-dims="1" height="99999" width="1000" decoding="async" class="aligncenter size-article-large wp-image-173499" src="https://theintercept.com/wp-content/uploads/2018/02/TI-gif-2.5M-1519850036.gif?fit=1000%2C99999" alt="TI-gif-2.5M-1519850036" /></a>
<figcaption class="caption source">The station in Norway grew in the time period from 2004 to 2016.<br/>Images: NRK/Norwegian Mapping Authority</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] -->
<p><u>The cooperation between</u> the Norwegian Intelligence Service and the NSA <a href="https://theintercept.com/document/2018/03/01/nsa-intelligence-relationship-with-norway-april-2013">began officially</a> in the early 1950s, when Norway and the United States signed an agreement called NORUSA. Due to its geographical proximity to the Soviet Union and its submarine bases on the Kola Peninsula, Norway was uniquely positioned to provide intelligence on Soviet submarines, missile systems, and military activity during the Cold War.</p>
<p>The countries have since continued to cooperate closely. In 2001, Norway approached the NSA seeking to buy foreign satellite surveillance technology, known as FORNSAT, according to <a href="https://theintercept.com/snowden-sidtoday/4389926-norway-gets-fornsat-collection-capability-on-par">documents</a> obtained by The Intercept from Edward Snowden. Two years later, the NSA provided the Norwegians with four specialist antennas. Each capability was <a href="https://theintercept.com/snowden-sidtoday/4389634-victory-garden-growing-a-norwegian-national">given code names</a> seemingly inspired by different types of gardens – WINTERGARDEN, FLOWERGARDEN, TOPIARYGARDEN, and so forth – together forming a VICTORYGARDEN.</p>
<p>Norwegian intelligence sent employees on multiple trips to receive training and test equipment at the NSA, and a delegation from a now-defunct NSA Yakima facility in Washington state traveled to Norway. Meanwhile, NSA employees based in Oslo took delivery of more than 90 containers crammed with electronic equipment, which were sent by boat and airplane, according to an October 2005 article in SIDtoday, an internal NSA newsletter. Two months later, on December 15, 2005, the Norwegian Intelligence Service&#8217;s director, Torgeir Hagen, declared VICTORYGARDEN operational. An NSA article describing the base&#8217;s opening ceremony concluded: “We have only begun to see future possibilities to benefit both our nations and the free world.”</p>
<p>Erik Reichborn-Kjennerud, a researcher at the Norwegian Institute of International Affairs, said that the documents provided a rare insight into how Norway’s relationship with the NSA has evolved. It “seems that Norway is asking for more and more capabilities, including training that enables them to better conduct surveillance,” Reichborn-Kjennerud said. &#8220;There’s been very little public debate about this in Norway.”</p>
<p>Until recently, the surveillance station located near Oslo was so secret that the oversight committee could not mention it in unclassified annual reports. Cryptic references in Norway’s defense budget pointed to “modernization of the Defense Satellite Earth Station” without linking these to the intelligence service. Local media were told the large dishes were used for communications with NATO partners and Norwegian forces overseas.</p>
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[2] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/AP_18011606989687-1519849746.jpg"><img loading="lazy" decoding="async" width="2000" height="1255" class="aligncenter size-large wp-image-173496" src="https://theintercept.com/wp-content/uploads/2018/02/AP_18011606989687-1519849746.jpg" alt="Secretary of State Rex Tillerson, right, talks as he stands with Norwegian Foreign Minister Ine Marie Eriksen Soreide, left, at the State Department in Washington, Thursday, Jan. 11, 2018, (AP Photo/Susan Walsh)" srcset="https://theintercept.com/wp-content/uploads/2018/02/AP_18011606989687-1519849746.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2018/02/AP_18011606989687-1519849746.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/02/AP_18011606989687-1519849746.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/02/AP_18011606989687-1519849746.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/02/AP_18011606989687-1519849746.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/02/AP_18011606989687-1519849746.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/02/AP_18011606989687-1519849746.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">U.S. Secretary of State Rex Tillerson, right, talks as he stands with Norwegian Foreign Minister Ine Marie Eriksen Soreide, left, at the State Department in Washington, Thursday, Jan. 11, 2018.<br/>Photo: Susan Walsh/AP</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->
<p><u>During the country’s</u> parliamentary elections in 2017, then-Minister of Defense Ine Eriksen Søreide visited the facility. “Satellite communication is extremely important,” she <a href="https://www.ringblad.no/nyheter/forsvaret/eggemoen/skalte-for-200-millioner-til-cyberforsvaret-pa-eggemoen/s/5-45-436112">told</a> Ringerikes Blad, a local newspaper, “when frigates at sea need to communicate with the command center.” She announced an additional 200 million Norwegian kroner ($25 million) funding to strengthen cyber defense and additional satellite equipment.</p>
<p>But there is a lot more to the station than enabling “satellite communication.” The documents provided by Snowden state that VICTORY GARDEN can “<a href="https://theintercept.com/snowden-sidtoday/4389929-norwegian-us-conference-held-at-ft-meade-and">see 130 foreign satellites</a>” – indicating that it can tap into communications passing across them, including the contents of international phone calls and emails, as well as various types of metadata. (Metadata reveals information about a communication — such as the sender and recipient of an email and the time and date it was sent — but not the written content of the message.)</p>
<p>VICTORY GARDEN’s antennas are aimed at countries from which the Norwegian Intelligence Service collects information in support of Norwegian interests and interventions in countries such as Afghanistan, Iraq, and Syria. But Norway’s spies have also used the base for a more controversial purpose, not previously publicly disclosed: For several years, they have collected metadata about Norwegians’ communications with people located in foreign countries and accessed those records through searchable databases. In 2014, the oversight committee found out about that practice and began raising concerns.</p>
<p>&#8220;Our most important task is to ensure that the Norwegian Intelligence Service does not monitor Norwegians in Norway. It&#8217;s not their job,” said the committee’s chair, Eldbjørg Løwer, in an interview for this story. &#8220;We were uncertain whether the way they conducted these operations was sufficiently grounded in the law.”</p>
<!-- BLOCK(photo)[3](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[3] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/norway-sid-today-1-1519857760.jpg"><img loading="lazy" decoding="async" width="2000" height="1279" class="aligncenter size-large wp-image-173579" src="https://theintercept.com/wp-content/uploads/2018/02/norway-sid-today-1-1519857760.jpg" alt="Forsvarets stasjon Ringerike; driver innsamling mot utvalgte satellitter i verdensrommet." srcset="https://theintercept.com/wp-content/uploads/2018/02/norway-sid-today-1-1519857760.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2018/02/norway-sid-today-1-1519857760.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/02/norway-sid-today-1-1519857760.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/02/norway-sid-today-1-1519857760.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/02/norway-sid-today-1-1519857760.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/02/norway-sid-today-1-1519857760.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/02/norway-sid-today-1-1519857760.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">Antennas at the Norwegian Intelligence Service surveillance base in Ringerike, 40 miles northwest of Oslo.<br/>Photo: Norwegian Armed Forces</figcaption><!-- END-CONTENT(photo)[3] --></figure><!-- END-BLOCK(photo)[3] -->
<p>The intelligence service told the committee that Norwegian citizens’ metadata is used to identify new targets. It denied that it used the intercepted communications for “mapping domestic relations or matters relating to Norwegian persons.” The country’s defense minister, Frank Bakke-Jensen, claimed that the spy agency “does not conduct surveillance against Norwegians in Norway.&#8221; He added, however, that &#8220;the legislation needs to be updated.”</p>
<p>In response to questions for this story, Norwegian spy chief Morten Haga Lunde said that a new law currently in the works will solve the oversight committee’s legal concerns. The VICTORY GARDEN base, he added, served an important purpose and helped save lives in 2013 during a terrorist attack on an Algerian gas facility.</p>
<p>It is unclear how many Norwegians’ communications have been swept up by the surveillance to date. A spokesperson for the intelligence service said he could not provide that information.</p>
<p>The NSA declined to comment.</p>
<p>———<br />
<em>Documents published with this article:</em></p>
<ul>
<li><a href="https://theintercept.com/snowden-sidtoday/4389803-life-as-a-tlo-in-oslo">Life as a TLO in Oslo</a></li>
<li><a href="https://theintercept.com/snowden-sidtoday/4389767-sigint-development-working-group-meets-in-oslo">SIGINT development working group meets in Oslo</a></li>
<li><a href="https://theintercept.com/snowden-sidtoday/4389926-norway-gets-fornsat-collection-capability-on-par">Norway gets FORNSAT collection capability on par with NSA</a></li>
<li><a href="https://theintercept.com/snowden-sidtoday/4389634-victory-garden-growing-a-norwegian-national">VICTORY GARDEN: &#8216;Growing&#8217; a Norwegian national FORNSAT capability</a></li>
<li><a href="https://theintercept.com/snowden-sidtoday/4389929-norwegian-us-conference-held-at-ft-meade-and/">Norwegian-US conference held at Ft Meade and Colorado</a></li>
<li><a href="https://theintercept.com/document/2018/03/01/nsa-intelligence-relationship-with-norway-april-2013">NSA&#8217;s intelligence relationship with Norway</a></li>
<li><a href="https://theintercept.com/document/2018/03/01/canyondust-coverage-regions-nsa">Canyondust coverage regions</a></li>
<li><a href="https://theintercept.com/document/2018/03/01/fornsat-technologies-nsa">FORNSAT technologies</a></li>
</ul>
<p>———</p>
<p class="caption">Top photo: A surveillance base in Norway.</p>
<p>The post <a href="https://theintercept.com/2018/03/01/norway-nsa-victory-garden-surveillance/">Norway Used NSA Technology for Potentially Illegal Spying</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2018/03/01/norway-nsa-victory-garden-surveillance/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2018/02/Ringerike_01-1519857586.jpg?fit=1440%2C720' width='1440' height='720' /><post-id xmlns="com-wordpress:feed-additions:1">173328</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?fit=720%2C98" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/TI-gif-2.5M-1519850036.gif?fit=1000%2C1000" medium="image">
			<media:title type="html">TI-gif-2.5M-1519850036</media:title>
			<media:description type="html">The station in Norway grew in the time period from 2004 to 2016.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/TI-gif-2.5M-1519850036.gif?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/AP_18011606989687-1519849746.jpg?fit=2000%2C1255" medium="image">
			<media:title type="html">Rex Tillerson,Ine Marie Eriksen Soreide</media:title>
			<media:description type="html">Secretary of State Rex Tillerson, right, talks as he stands with Norwegian Foreign Minister Ine Marie Eriksen Soreide, left, at the State Department in Washington, Thursday, Jan. 11, 2018.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/AP_18011606989687-1519849746.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/norway-sid-today-1-1519857760.jpg?fit=2000%2C1279" medium="image">
			<media:title type="html">norway-sid-today-1-1519857760</media:title>
			<media:description type="html">A surveillance base in Norway.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/norway-sid-today-1-1519857760.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[The Powerful Global Spy Alliance You Never Knew Existed]]></title>
                <link>https://theintercept.com/2018/03/01/nsa-global-surveillance-sigint-seniors/</link>
                <comments>https://theintercept.com/2018/03/01/nsa-global-surveillance-sigint-seniors/#respond</comments>
                <pubDate>Thu, 01 Mar 2018 17:03:02 +0000</pubDate>
                                    <dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
                                		<category><![CDATA[release-march-2018]]></category>
		<category><![CDATA[World]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=173257</guid>
                                    <description><![CDATA[<p>Documents shine light on a secretive coalition that eavesdrops on communications in countries across the world.</p>
<p>The post <a href="https://theintercept.com/2018/03/01/nsa-global-surveillance-sigint-seniors/">The Powerful Global Spy Alliance You Never Knew Existed</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank"><img loading="lazy" decoding="async" class="aligncenter wp-image-65243" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" srcset="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=720 720w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=540 540w" sizes="auto, (max-width: 720px) 100vw, 720px" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] --><br />
<u>It is one</u> of the world’s most powerful alliances. And yet most people have probably never heard of it, because its existence is a closely guarded government secret.</p>
<p>The “SIGINT Seniors” is a spy agency coalition that meets annually to collaborate on global security issues. It has two divisions, each focusing on different parts of the world: SIGINT Seniors Europe and SIGINT Seniors Pacific. Both are led by the U.S. National Security Agency, and together they include representatives from at least 17 other countries. Members of the group are from spy agencies that eavesdrop on communications – a practice known as “signals intelligence,” or SIGINT.</p>
<p>Details about the meetings of the SIGINT Seniors are disclosed in a batch of classified documents from the NSA’s internal newsletter SIDToday, provided by whistleblower Edward Snowden and published today by The Intercept. The documents shine light on the secret history of the coalition, the issues that the participating agencies have focused on in recent years, and the systems that allow allied countries to share sensitive surveillance data with each other.</p>
<p>The SIGINT Seniors Europe was formed in 1982, amid the Cold War. Back then, the alliance had nine members, whose primary focus was on uncovering information about the Soviet Union’s military. Following the attacks on the U.S. in September 2001, the group grew to 14 and began focusing its efforts on counterterrorism.</p>
<p>The core participants of the Seniors Europe are the surveillance agencies from the so-called Five Eyes: the NSA and its counterparts from the U.K., Australia, Canada, and New Zealand. As of April 2013, the other members were intelligence agencies from Belgium, Denmark, France, Germany, Italy, the Netherlands, Norway, Spain, and Sweden.</p>
<p>The alliance – which the NSA sometimes refers to as the “14 Eyes” – has collaborated to monitor communications during major European events, such as the Olympics in 2004 (hosted in Greece), the Winter Olympics in 2006 (hosted in Italy), and the soccer World Cup in summer 2006 (hosted in Germany). Between 2006 and 2007, as part of a counterterrorism operation, the agencies <a href="https://theintercept.com/document/2018/03/01/sidtoday-2007-01-08-counterterrorism-analytic-working-group-meets-in-madrid">began working</a> on “exploitation of the Internet,” which was described by the NSA as a “huge step forward” for the group, because some members of the alliance had previously been “reluctant to acknowledge there was such a thing as the Internet.”</p>
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[1] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-82862034-1519848830.jpg"><img data-recalc-dims="1" loading="lazy" decoding="async" class="aligncenter wp-image-173488 size-large" src="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-82862034-1519848830-e1519849227300.jpg" alt="A Canadian Navy sailor on board a helicopter patrols the waters off the coast of Somalia as they escort a World Food Programme (WFP) ship on September 17, 2008, providing an anti-pirate escort for the ship taking food aid to Somalia. The UN Security Council in June adopted a resolution authorising foreign warships to enter Somalia's territorial waters with the government's consent to combat pirates, though it has yet to be implemented. European foreign ministers agreed to set up a special unit to coordinate the fight against piracy off Somalia, raising the possibility of a EU naval mission to the region. Ninety percent of food aid is delivered to the Horn of Africa country by ship, the last lifeline for starving millions since insurgents armed with surface-to-air missiles make air and road deliveries too dangerous. AFP PHOTO/SIMON MAINA (Photo credit should read SIMON MAINA/AFP/Getty Images)" width="1024" height="665" /></a>
<figcaption class="caption source pullright">A Canadian Navy sailor on board a helicopter patrols the waters off the coast of Somalia as they escort a World Food Program ship on Sept. 17, 2008, providing an anti-pirate escort for the ship taking food aid to Somalia.<br/>Photo: Simon Maina/AFP/Getty Images</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] -->
<p><u>As of 2010</u>, the agencies <a href="https://theintercept.com/document/2018/03/01/sidtoday-2010-08-12-sigint-partnership-agrees-to-greater-sharing">were focused</a> on targeting suspected terrorists, sharing intelligence related to piracy in the Horn of Africa, and they were collaborating on the development of new surveillance tools and techniques. According to the documents, the Seniors Europe had its own dedicated communication network called SIGDASYS, through which each agency can share copies of intercepted communications. The group also used a system called CENTER ICE to share intelligence about the war in Afghanistan.</p>
<p>The documents indicate that the Seniors Europe hold an annual conference, each time in a different location. In 2013, for instance, the group gathered in Sweden; in 2011, it met in the U.K; in 2010, in Germany; and in 2009, in Canada. In 2013, the NSA expressed an interest in creating a permanent facility that would host representatives from the Seniors Europe in a joint collaborative space. The NSA discussed the idea with its U.K. counterpart, Government Communications Headquarters, or GCHQ. The British were “all in” on the proposal, according to the NSA. However, from some unnamed members of the SIGINT Seniors, there was “persistent pushback” on the plan.</p>
<p>The NSA <a href="https://theintercept.com/document/2018/03/01/global-collaboration-environment-directors-talking-points-nsa">thought the facility</a> would be best hosted in the U.K., as this would “be optimal in terms of having the most flexibility in tuning the operation to benefit the Five Eyes.” The agency also suggested the idea of France potentially hosting the unit, but outlined its reservations about setting up the spy hub in continental Europe. “Some European nations may be leery about hosting a facility in their nation,” the NSA noted, partly due to “associated concerns for European human rights laws.” (Both NSA and its British counterpart, GCHQ, declined to answer questions for this story. GCHQ issued a statement asserting that it adheres to “a strict legal and policy framework, which ensures that our activities are authorised, necessary and proportionate.”)</p>
<p>The Pacific division of the SIGINT Seniors is younger than the European branch. The NSA formed it in 2005, with the aim of “establishing a collaborative effort to fight terrorism in the Asia-Pacific region.” In March 2007, the NSA <a href="https://theintercept.com/document/2018/03/01/sidtoday-2007-11-05-linguistic-resource-sharing-in-asia-pacific-takes-step-forward">said that it was</a> in the process of “raising ideas for expanding [SIGINT Seniors Pacific’s] intelligence focus beyond counterterrorism.”</p>
<!-- BLOCK(pullquote)[2](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22none%22%7D) --><blockquote class="stylized pull-none" data-shortcode-type="pullquote" data-pull="none"><!-- CONTENT(pullquote)[2] -->The NSA was passing the Indians selected top-secret material, and India began leaking some of the intelligence.<!-- END-CONTENT(pullquote)[2] --></blockquote><!-- END-BLOCK(pullquote)[2] -->
<p>The founder members of the Pacific alliance were the spy agencies from the Five Eyes, as well as South Korea, Singapore, and Thailand. By 2013, France and India had joined the Pacific group. The NSA was <a href="https://theintercept.com/document/2018/03/01/sidtoday-2009-06-15-nsas-changing-counterterrorism-relationship-with-india">particularly keen</a> on having India on board as part of a broader U.S. government effort to improve relations with the country, and “felt strongly that India’s participation in multilateral intelligence sharing would help mature its Indian SIGINT agencies as well as provide regional [counterterrorism] expertise.” In March 2008, then-NSA Director Gen. Keith Alexander led a delegation of officials – including representatives from Singapore and New Zealand – to New Delhi, where he asked India’s spy agencies if they would like to join forces. Three months later, the Indians accepted.</p>
<p>The Pacific group used a system called CRUSHED ICE to share information. According to <a href="https://theintercept.com/document/2018/03/01/sidtoday-2007-11-05-linguistic-resource-sharing-in-asia-pacific-takes-step-forward">an NSA document dated from November 2007</a>, CRUSHED ICE is a secure network that enables sharing of secret intelligence, collected from intercepted communications, about counterterrorism. “The system allows for collaboration by way of voice, binary-file/email exchanges, analysis and reporting, graphics and mapping, communities of interest, collection management, and other applications as needed,” the November 2007 document stated.</p>
<p>For the countries invited to participate in the SIGINT Seniors, there are obvious benefits. They can learn new surveillance techniques from the world’s most powerful spy agencies and at the same time, obtain information about their own countries or regions that they otherwise may have been unable to access. But not all nations who have been invited to join the alliance have jumped on board. According to <a href="https://theintercept.com/document/2018/03/01/sidtoday-2007-03-16-sigint-seniors-pacific-successes-highlighted-at-conference">an NSA document</a> from March 2007, Japan refused to sign up to the Pacific group, expressing concerns that “unintended disclosure of its participation would be too high a risk.”</p>
<p>A downside of SIGINT Seniors is the risk that a partner will mishandle sensitive information. This happened on at least one occasion with India. By the time terrorists had struck Mumbai in a series of attacks in November 2008, the country had been admitted to the Pacific group. The NSA was passing the Indians selected top-secret material, such as interrogation reports and recordings of intercepted phone calls. In the weeks following the Mumbai incident, India began leaking some of the intelligence — “at times it seemed a daily occurrence,” the NSA’s country desk officer <a href="https://theintercept.com/document/2018/03/01/sidtoday-2009-06-15-nsas-changing-counterterrorism-relationship-with-india">complained</a>. The NSA limited the provisioning of top-secret information to India after repeated warnings and meetings left it dissatisfied. Still, the NSA, which had deployed analysts to India, remained hopeful Indian intelligence agencies would “mature … into the partners NSA needs in South Asia.”</p>
<p>The SIGINT Seniors likely remains active today and has probably grown its capabilities in recent years. According to the 2013 “black budget” – a portion of the U.S. federal budget dedicated to secret intelligence-gathering work – the NSA was that year working to bolster both the European and Pacific branches of the SIGINT Seniors, and planned to “expand the level of cooperation on [counterterrorism] and explore other potential areas of collaboration.”</p>
<p>———</p>
<p><em>Documents published with this article:</em></p>
<ul>
<li><a href="https://theintercept.com/document/2018/03/01/sidtoday-2010-08-12-sigint-partnership-agrees-to-greater-sharing">SIGINT partnership agrees to greater sharing</a></li>
<li><a href="https://theintercept.com/document/2018/03/01/sidtoday-2007-11-05-linguistic-resource-sharing-in-asia-pacific-takes-step-forward">Linguistic resource sharing in Asia-Pacific takes step forward</a></li>
<li><a href="https://theintercept.com/document/2018/03/01/sidtoday-2009-06-15-nsas-changing-counterterrorism-relationship-with-india">NSA&#8217;s changing counterterrorism relationship with India</a></li>
<li><a href="https://theintercept.com/document/2018/03/01/sidtoday-2007-03-16-sigint-seniors-pacific-successes-highlighted-at-conference">SIGINT Seniors Pacific successes highlighted at conference</a></li>
<li><a href="https://theintercept.com/document/2018/03/01/sidtoday-2007-01-08-counterterrorism-analytic-working-group-meets-in-madrid">Counterterrorism analytic working group meets in Madrid</a></li>
<li><a href="https://theintercept.com/document/2018/03/01/global-collaboration-environment-directors-talking-points-nsa">Global Collaboration Environment: Director&#8217;s talkinig points</a></li>
<li><a href="https://theintercept.com/document/2018/03/01/sidtoday-2006-08-25-world-cup-report-from-suslag">World Cup report from SUSLAG</a></li>
<li><a href="https://theintercept.com/document/2018/03/01/sidtoday-2009-11-02-whos-who-in-afghanistan">Who&#8217;s Who in Afghanistan</a></li>
<li><a href="https://theintercept.com/snowden-sidtoday/4389674-sigint-seniors-making-history-in-a-good-way">SIGINT Seniors: Making history in a good way</a></li>
</ul>
<p>———</p>
<p class="caption">Top photo: Australian Defense Facilities Pine Gap, Feb. 19, 2016.</p>
<p>The post <a href="https://theintercept.com/2018/03/01/nsa-global-surveillance-sigint-seniors/">The Powerful Global Spy Alliance You Never Knew Existed</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2018/03/01/nsa-global-surveillance-sigint-seniors/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2018/02/seniors-SID-today-1519848637.jpg?fit=1440%2C720' width='1440' height='720' /><post-id xmlns="com-wordpress:feed-additions:1">173257</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?fit=720%2C98" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-82862034-1519848830-e1519849227300.jpg?fit=1995%2C1295" medium="image">
			<media:title type="html">A Canadian Navy sailor on board a helico</media:title>
			<media:description type="html">A Canadian Navy sailor on board a helicopter patrols the waters off the coast of Somalia as they escort a World Food Programme (WFP) ship on September 17, 2008, providing an anti-pirate escort for the ship taking food aid to Somalia.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-82862034-1519848830-e1519849227300.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[How London's 7/7 Bombings Led to "Unprecedented" Surveillance Tactics]]></title>
                <link>https://theintercept.com/2018/03/01/london-7-7-bombings-gchq-nsa-surveillance/</link>
                <comments>https://theintercept.com/2018/03/01/london-7-7-bombings-gchq-nsa-surveillance/#respond</comments>
                <pubDate>Thu, 01 Mar 2018 17:02:00 +0000</pubDate>
                                    <dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
                                		<category><![CDATA[release-march-2018]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[World]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=173249</guid>
                                    <description><![CDATA[<p>After attacks in London in 2005, British and American spies accelerated a secret plan for "unfettered" sharing of people's communication records.</p>
<p>The post <a href="https://theintercept.com/2018/03/01/london-7-7-bombings-gchq-nsa-surveillance/">How London&#8217;s 7/7 Bombings Led to &#8220;Unprecedented&#8221; Surveillance Tactics</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank"><img loading="lazy" decoding="async" class="aligncenter wp-image-65243" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" srcset="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=720 720w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=540 540w" sizes="auto, (max-width: 720px) 100vw, 720px" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] --><br />
<u>It was early-morning</u> rush hour in London on Thursday, July 7, 2005, when a series of explosions shut down the city’s transport network. At first, the authorities suspected an electricity fault was to blame. But it soon emerged that four Islamist suicide attackers had detonated bombs on three underground trains and a bus, killing 52 people and injuring more than 700.</p>
<p>The incident, one of the worst terrorist atrocities in British history, resulted in a major overhaul of policing across the United Kingdom. The government beefed up security, introduced new counterterrorism measures, and retrained first-responders to handle major crises. The attack also reshaped British spy agencies’ tactics and led to a more aggressive use of electronic surveillance – details of which are revealed for the first time in classified documents published today by The Intercept.</p>
<p>The documents – from the National Security Agency and its British counterpart Government Communications Headquarters, or GCHQ – offer a unique insight into how U.K. and U.S. intelligence agencies responded in the aftermath of the London bombings. They reveal how the attackers may have been able to evade detection and disclose the existence of a secret intelligence-sharing agreement designed to enable “unfettered” sharing of phone and email records across the Five Eyes, an alliance of spy agencies from the U.K., the U.S., Australia, Canada, and New Zealand.</p>
<p>Immediately following the bombing, GCHQ developed a three-tiered strategy, according to the documents, which were obtained by The Intercept from the whistleblower Edward Snowden. The agency focused on providing operational support to the police and security services; worked on “target discovery,” sifting its databases in an effort to find information about the attackers or those connected to them; and formed a think tank called the “Blue Skies Team,” which developed new tools and techniques that could be used to identify people associated with the attackers.</p>
<p>A surveillance base in the north of England played a key role. Menwith Hill, located about 9 miles from the small town of Harrogate in North Yorkshire, began listening in on calls that were passing between the U.K. and foreign countries. The base – a “ground station” from which spy satellites are operated – used its surveillance technology to home in on calls associated with Thuraya satellite phones, which are often used in remote parts of the world where there is no access to conventional cellphone or landline networks.</p>
<p>“We worked with GCHQ’s International Terrorism Team to put coverage on nine U.K. cities, and compiled a list of U.K. cities and external locations (including Copenhagen, Brussels, and various locations in Spain, South Africa, and Morocco) requiring tighter focus,” <a href="https://theintercept.com/snowden-sidtoday/4389713-mhs-lends-a-hand-in-the-aftermath-of-the-london/">explained an NSA employee</a> who was working at Menwith Hill through the incident. “At GCHQ’s request, analysts examined calls from [Thuraya satellite] handsets that had dialed into London from Iraq.”</p>
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[1] --> <a href="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-77559906-1519847945.jpg"><img loading="lazy" decoding="async" width="2000" height="1228" class="aligncenter size-large wp-image-173473" src="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-77559906-1519847945.jpg" alt="HARROGATE, UNITED KINGDOM - OCTOBER 30:  The radar domes of RAF Menwith Hill in north Yorkshire dominate the skyline on 30 October, 2007, Harrogate, England. The base is reported to be the biggest spy base in the world. Britain recently agreed to a United States request for the RAF Menwith Hill monitoring station, also known as the 13th field station of the US national security agency, in North Yorkshire to be used as part of its missile defence system. Dubbed 'Star Wars Bases' by anti-war and CND campaigners. The facility houses British and United States personnel.  (Photo by Christopher Furlong/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-77559906-1519847945.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-77559906-1519847945.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-77559906-1519847945.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-77559906-1519847945.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-77559906-1519847945.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-77559906-1519847945.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/02/GettyImages-77559906-1519847945.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">The radar domes of RAF Menwith Hill in north Yorkshire dominate the skyline on Oct. 30, 2007, Harrogate, England.<br/>Photo: Christopher Furlong/Getty Images</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] -->
<p><u>Analysts at Menwith</u> Hill discovered that “high priority targets … had phoned specific areas in the U.K. from Pakistan, Afghanistan, Egypt, and Iraq.” They identified particular calls of interest that appeared to be coming from a compound in the self-governing Azad Kashmir region of northeastern Pakistan. The documents do not state whether a link was proven between these calls and the bombings. However, it was <a href="http://edition.cnn.com/2012/04/30/world/al-qaeda-documents-london-bombings/">reported in 2012</a> that a British-born Al Qaeda operative named Rashid Rauf – who lived in Pakistan – helped direct the 2005 attack, which was carried out by four men, three of whom were born and raised in England, and one of whom was born in Jamaica and brought to England as a young child.</p>
<p>The NSA worked closely with GCHQ through the investigation, <a href="https://theintercept.com/snowden-sidtoday/4389818-ct-staff-and-augmentees-focus-on-bombings-in/">providing analysis</a> and technical advice on surveillance methods. Twenty-two NSA employees <a href="https://theintercept.com/snowden-sidtoday/4389715-the-london-bombings-an-insider-s-view/">were transferred</a> to a specialist unit to help with the effort, alongside a department called the Counterterrorism Primary Production Center. After three months, the 22 analysts moved on to other operations. But the impact of the London attack continued to be felt across the Western intelligence community.</p>
<p>In June 2004, the Five Eyes had negotiated a secret treaty called <a href="https://theintercept.com/document/2018/03/01/alice-springs-resolution-nsa">the Alice Springs Resolution</a>. The arrangement laid out plans for a single surveillance system that each of the five countries’ spies would be able to access. The system would be used to share metadata, which reveals information about a communication – such as the sender and recipient of an email, or the phone numbers someone called and at what time – but not the written content of the message or the audio of the call. Analysts would be able to search across all available metadata with a single query.</p>
<p>The aim of the Alice Springs Resolution was to “enable unfettered access to metadata repositories among our five agencies,” according to <a href="https://theintercept.com/document/2018/03/01/transnational-dni-training-nsa">an NSA document</a>. The agreement was personally signed off by the director of each agency, presumably during a meeting held in the Australian town of Alice Springs, which hosts a large surveillance facility. The text of the resolution stated that the new arrangement was necessary due to the “increasing importance of the analysis of metadata to the generation of intelligence, particularly against the terrorist target.” The NSA later cited the agreement as a “foundational document” for the agency.</p>
<!-- BLOCK(pullquote)[2](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22none%22%7D) --><blockquote class="stylized pull-none" data-shortcode-type="pullquote" data-pull="none"><!-- CONTENT(pullquote)[2] -->The secret agreement aimed to “enable unfettered access to metadata repositories.”<!-- END-CONTENT(pullquote)[2] --></blockquote><!-- END-BLOCK(pullquote)[2] -->
<p>When the London bombings occurred, the implementation of the agreement accelerated. According to <a href="https://theintercept.com/document/2018/03/01/smac-concept-of-operations">an October 2006 document</a>, following the attack there was “unprecedented metadata sharing” between the NSA and GCHQ and a “solid commitment to action” regarding the Alice Springs Resolution. The agencies developed a system called the “Sensitive Metadata Analytic Collaboration,” known as SMAC, through which the Five Eyes agencies planned to share their troves of metadata records, the October 2006 document reveals.</p>
<p>By October 2007, each of the partners had a representative participating in SMAC at NSA’s Fort Meade headquarters. The agency announced in a top-secret report that the mission to share the metadata had been “accomplished, just not as initially contemplated.” The NSA voiced displeasure that the Canadian and Australian participants, in particular, had “not taken full advantage” of the program, and complained that policy differences were among several “systemic barriers” to its progress. Three years later, in 2010, a GCHQ document seemed to declare the effort dead or supplanted, noting that “SMAC was an effective approach for a while, but is now no longer required.” A takeaway for GCHQ, the document added, was to look for “opportunities to circumvent policy challenges.”</p>
<p>GCHQ’s work related to the bombings was code-named OCTAMER. Working alongside the NSA, as well as the British domestic and foreign spy agencies MI5 and MI6, GCHQ sifted through troves of communication records in an effort to identify people associated with the attackers. The British eavesdropping agency developed a specialized tool that it called MOAG, which was used to carry out “<a href="https://theintercept.com/document/2018/03/01/contact-chaining-gchq">contact chaining</a>.” This involves an analyst looking at the phone number or email address of a target, and then reviewing all of the people the target had made or received calls or messages to or from. The aim of the method was to discover new, previously unknown individuals who may be of interest to investigators.</p>
<p>In the days and weeks after the bombings, the U.K.’s media and lawmakers <a href="https://www.theguardian.com/uk/2006/may/11/july7.uksecurity">questioned</a> how the security services had failed to prevent the atrocity from taking place. Two of the four attackers had been under surveillance before they carried out their plot, but they had not been fully investigated due to a lack of resources, an inquiry later found.</p>
<p>GCHQ documents offer insight into another reason why the attackers may have managed to evade detection: At least three of them used cheap Nokia 1100 phones – probably “burner” devices that were not registered to them personally – and they communicated in what GCHQ called a “closed loop.” In other words, they only used their phones to talk to each other and did not make calls to anyone else, which appears to have thwarted the spy agency’s powerful surveillance apparatus.</p>
<p>GCHQ later began specifically seeking out closed loops. In <a href="https://theintercept.com/document/2018/03/01/graph-theory-in-the-operational-environment-gchq">an October 2011 document</a>, the agency described how it had analyzed “anonymised metadata for bulk U.K.-U.K. mobile call records” in an effort to identify people who were communicating exclusively in small groups. They were a “rare phenomenon,” the agency concluded, but it added that among the few cases it did find, there were “possible target discovery opportunities.”</p>
<p>The NSA declined to comment for this story. GCHQ declined to comment on specifics and instead, issued a statement asserting that its work is &#8220;carried out in accordance with a strict legal and policy framework, which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight.&#8221;</p>
<p>———<br />
<em>Documents published with this article: </em></p>
<ul>
<li><a href="https://theintercept.com/snowden-sidtoday/4389713-mhs-lends-a-hand-in-the-aftermath-of-the-london">MHS lends a hand in the aftermath of the London bombings</a></li>
<li><a href="https://theintercept.com/snowden-sidtoday/4389818-ct-staff-and-augmentees-focus-on-bombings-in/">CT staff and augmentees focus on bombings in London</a></li>
<li><a href="https://theintercept.com/snowden-sidtoday/4389715-the-london-bombings-an-insider-s-view/">The London bombings: an insider&#8217;s view</a></li>
<li><a href="https://theintercept.com/document/2018/03/01/contact-chaining-gchq">Contact chaining &#8211; GCHQ</a></li>
<li><a href="https://theintercept.com/document/2018/03/01/graph-theory-in-the-operational-environment-gchq">Graph theory in the operational environment &#8211; GCHQ</a></li>
<li><a href="https://theintercept.com/document/2018/03/01/smac-concept-of-operations">SMAC concept of operations</a></li>
<li><a href="https://theintercept.com/document/2018/03/01/alice-springs-resolution-nsa">Alice Springs Resolution</a></li>
<li><a href="https://theintercept.com/document/2018/03/01/transnational-dni-training-nsa">Transnational DNI training</a></li>
</ul>
<p>———</p>
<p class="caption">Top photo: A front view of the bus which was destroyed by a bomb in London on Thursday, July 7, 2005.</p>
<p>The post <a href="https://theintercept.com/2018/03/01/london-7-7-bombings-gchq-nsa-surveillance/">How London&#8217;s 7/7 Bombings Led to &#8220;Unprecedented&#8221; Surveillance Tactics</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2018/03/01/london-7-7-bombings-gchq-nsa-surveillance/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2018/02/london-SID-today-1519847948.jpg?fit=1440%2C720' width='1440' height='720' /><post-id xmlns="com-wordpress:feed-additions:1">173249</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?fit=720%2C98" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-77559906-1519847945.jpg?fit=2000%2C1228" medium="image">
			<media:title type="html">Secret Airbase RAF Menwith Hill</media:title>
			<media:description type="html">The radar domes of RAF Menwith Hill in north Yorkshire dominate the skyline on 30 October, 2007, Harrogate, England.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/02/GettyImages-77559906-1519847945.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Sloppy U.S. Spies Misused a Covert Network for Personal Shopping — and Other Stories from Internal NSA Documents]]></title>
                <link>https://theintercept.com/2017/09/13/sloppy-u-s-spies-misused-covert-network-for-personal-shopping-and-other-stories-from-internal-nsa-documents/</link>
                <comments>https://theintercept.com/2017/09/13/sloppy-u-s-spies-misused-covert-network-for-personal-shopping-and-other-stories-from-internal-nsa-documents/#comments</comments>
                <pubDate>Wed, 13 Sep 2017 19:47:44 +0000</pubDate>
                                    <dc:creator><![CDATA[Micah Lee]]></dc:creator>
                                    <dc:creator><![CDATA[Margot Williams]]></dc:creator>
                                    <dc:creator><![CDATA[Talya Cooper]]></dc:creator>
                                		<category><![CDATA[release-september-2017]]></category>
		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=145891</guid>
                                    <description><![CDATA[<p>Campaigns to spy on internet cafes and tap Iraqi communications, as well as an intimate NSA examination of Czech spying, are detailed in NSA newsletters.</p>
<p>The post <a href="https://theintercept.com/2017/09/13/sloppy-u-s-spies-misused-covert-network-for-personal-shopping-and-other-stories-from-internal-nsa-documents/">Sloppy U.S. Spies Misused a Covert Network for Personal Shopping — and Other Stories from Internal NSA Documents</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank"><img loading="lazy" decoding="async" class="aligncenter wp-image-65243" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" srcset="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=720 720w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=540 540w" sizes="auto, (max-width: 720px) 100vw, 720px" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p><u>NSA agents successfully</u> targeted “the entire business chain” connecting foreign cafes to the internet, bragged about an “all-out effort” to spy on liberated Iraq, and began systematically trying to break into virtual private networks, according to a set of internal agency news reports dating to the first half of 2005.</p>
<p>British spies, meanwhile, were made to begin providing new details about their informants via a system of “Intelligence Source Descriptors” created in response to intelligence failures in Iraq. Hungary and the Czech Republic pulled closer to the National Security Agency.</p>
<p>And future Intercept backer Pierre Omidyar visited NSA headquarters for an internal conference panel on “human networking” and open-source intelligence.</p>
<p>These stories and more are contained in a <a href="https://theintercept.com/snowden-sidtoday/">batch of 294 articles from SIDtoday</a>, the internal news website of the NSA’s core Signals Intelligence Directorate. The Intercept is publishing the articles in redacted form as part of an ongoing project to release material from the files provided by NSA whistleblower Edward Snowden.</p>
<p>In addition to the aforementioned highlights, summarized in further detail below, the documents show how the NSA greatly expanded a secret eavesdropping partnership with Ethiopia’s draconian security forces in the Horn of Africa, as <a href="https://theintercept.com/2017/09/13/nsa-ethiopia-surveillance-human-rights/">detailed in an investigation</a> by longtime Intercept contributor Nick Turse. They describe the NSA&#8217;s operations at a base in Digby, England, where the agency worked with its British counterpart GCHQ to help direct drones in the Middle East and tap into communications through the Arab Spring uprisings, <a href="https://theintercept.com/2017/09/13/digby-uk-nsa-gchq-surveillance/">according to a separate article</a> by Intercept reporter Ryan Gallagher. And they show how the NSA and GCHQ thwarted encryption systems used to protect peer-to-peer file sharing through the apps Kazaa and eDonkey, <a href="https://theintercept.com/2017/09/13/nsa-broke-the-encryption-on-file-sharing-apps-kazaa-and-edonkey">as explained here</a> by Intercept technologist Micah Lee.</p>
<p>NSA did not comment for this article.</p>
<h3>American Intelligence Agents Outed Themselves Online</h3>
<p>Members of the U.S. intelligence community routinely thwarted a system designed to mask their identities online by using it for personal shopping and to log on to websites, according to an NSA information technology manager.</p>
<p>The system, called &#8220;AIRGAP,&#8221; was run by &#8220;one of the world&#8217;s largest ISPs&#8221; and created around 1998 at the behest of the NSA, according to NSA Internet Program Manager Charlie Speight, <a href="https://theintercept.com/snowden-sidtoday/3991276-putting-the-gap-in-airgap/">writing in SIDtoday</a>. Its purpose was to allow “non-attribution internet access,” Speight added, meaning that intelligence analysts could surf the internet without revealing that they were coming from U.S. spy agencies. By 2005, it was used by the whole U.S. intelligence community.</p>
<p>One early concern about the firewall was that it funneled all internet traffic through a single IP address, meaning that if any activity on the address was revealed to be associated with U.S. spies, a broad swath of other activity could then be attributed to other U.S. spies. More IP addresses were subsequently added, but “occasionally we find that the ISP reverts to one address, or does not effectively rotate those assigned,” Speight wrote.</p>
<p>Speight added that the “greater security concern” was the very intelligence agents the system was designed to protect. &#8220;Despite rules and warnings to the contrary, all too frequently users will use AIRGAP for registering on web sites or for services, logging into other sites and services and even ordering personal items from on-line vendors,” Speight wrote in a classified passage. “By doing so, these users reveal information about themselves and, potentially, other users on the network. So much for &#8216;non-attribution.'&#8221;</p>
<p>This sort of sloppiness mirrors behavior that has undermined Russian intelligence operatives. A slide presentation by Canadian intelligence, dating to 2011 or later, <a href="https://theintercept.com/2017/08/02/white-house-says-russias-hackers-are-too-good-to-be-caught-but-nsa-partner-called-them-morons/">labeled as “morons”</a> members of a Russian hacking group code-named &#8220;MAKERSMARK,&#8221; who thwarted a “really well-designed” system to hide their identities by using it to log on to their personal social and email accounts.</p>
<p>The two situations are not perfectly comparable; the U.S. system was managed as part of a network for obtaining unclassified information, while the Russian system was used for the more sensitive activity of staging hack attacks. But Speight hinted at aggressive use of the U.S. system, writing in his piece that the NSA had begun “using AIRGAP for reasons and in volumes not intended in its formation” &#8212; the agency thus began developing its own separate firewall.</p>
<p>The NSA had systems with the same goal as AIRGAP — anonymization — but for phone calls. According to a <a href="https://theintercept.com/snowden-sidtoday/3991105-lost-in-the-open/">February 2005 SIDtoday article</a>, the NSA controlled 40,000 telephone numbers, but these were almost all prefixed with area- and exchange-code combinations that were publicly associated with the agency. An analyst who needed to make a public phone call without leaking their affiliation could use &#8220;anonymous telephones,&#8221; most of them registered to Department of Defense, or “cover telephones,” registered using alias names and P.O. boxes. No security protocol lapses were described in connection with the old-fashioned voice networks.</p>
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[1] --> <a href="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-78681829-1505247889.jpg"><img loading="lazy" decoding="async" width="1440" height="967" class="aligncenter size-large wp-image-145960" src="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-78681829-1505247889.jpg" alt="Iraqi youth surf the web at an internet cafe in Baghdad's impoverished district of Sadr city, 15 November 2007. Iraqi youth are spending more time on the internet; following local and international news or chatting with far away friends as they try to escape their bitter reality by staying in connection with the outside world through the virtual world of the internet. AFP PHOTO/ALI AL-SAADI (Photo credit should read ALI AL-SAADI/AFP/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-78681829-1505247889.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-78681829-1505247889.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-78681829-1505247889.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-78681829-1505247889.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-78681829-1505247889.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-78681829-1505247889.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">Iraqi youth surf the web at an internet cafe in Baghdad&#8217;s impoverished district of Sadr City, Nov. 15 2007.<br/>Photo: Ali Al-Saadi/AFP/Getty Images</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] -->
<h3 id="cafes">NSA Targeted “the Entire Business Chain” to Spy on Internet Cafes</h3>
<p>While hiding, or at least trying to hide, its own online operations, the NSA launched an all-encompassing campaign to trace online activity in internet cafes, down to specific seats.</p>
<p>A program called &#8220;MASTERSHAKE&#8221; accomplished this by exploiting equipment used by the cafes, including satellite internet modems, according to top-secret information reported by SIDtoday. “MASTERSHAKE targets the entire business chain, from manufacturer to Internet café installation, to ascertain any and all available data regarding … geolocation, the network connectivity of the modem, as well as the actual physical location of the installation,” <a href="https://theintercept.com/snowden-sidtoday/3991264-mastershake-locating-terrorists-at-internet-caf%C3%A3-s/">according to SIDtoday</a>.</p>
<p>MASTERSHAKE data was “enriched” with other information, including <a href="https://theintercept.com/snowden-sidtoday/3991287-june-analytic-showcase-scheduled/">“geolocatable phone events,”</a> as well as intelligence from throughout the NSA’s Signals Intelligence Directorate and from the agency’s XKeyscore search system.</p>
<p>The NSA knew the precise location of over 400 internet cafes. For over 50 of these cafes, it could locate a target to a specific seat within the cafe. One goal of the monitoring was to hunt down Al Qaeda leaders, like Abu Musab al-Zarqawi. SIDtoday focused on the use of MASTERSHAKE in Iraq, describing an incident in the city of Ramadi where two “counterterrorism targets” began using a messenger service at an internet cafe, and the two men were arrested. But it also indicated the system was used more broadly, “in the Middle East and Africa.”</p>
<p>As the Intercept <a href="https://theintercept.com/2016/09/06/nsa-menwith-hill-targeted-killing-surveillance/">previously reported</a>, the NSA has surveilled internet cafes in Yemen, Afghanistan, Syria, Lebanon, and Iran, as <a href="https://www.documentcloud.org/documents/3089512-Ghosthunter-and-the-geolocating-of-internet-cafes.html">detailed</a> in agency <a href="https://theintercept.com/document/2016/09/06/new-technique-geolocates-targets-active-at-yemeni-cafes/">documents</a>.</p>
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[2] --> <a href="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-52578586-1505247952.jpg"><img loading="lazy" decoding="async" width="1440" height="996" class="aligncenter size-large wp-image-145961" src="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-52578586-1505247952.jpg" alt="BAGHDAD, IRAQ - APRIL 2:  Sunni Arab member of Iraqi Transitional National Assembly (TNA) and a candidate for the post of parliament speaker Meshaan al-Jubouri speaks on the phone April 2, 2005 in Baghdad, Iraq. Iraqi Transitional National Assembly will hold its third-ever session on April 3, 2005 after it failed Tuesday to agree on a parliament speaker. The TNA tries to choose a Sunni Arab speaker for the assembly a step officials hope will quell the Sunni-led insurgency. (Photo by Wathiq Khuzaie/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-52578586-1505247952.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-52578586-1505247952.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-52578586-1505247952.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-52578586-1505247952.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-52578586-1505247952.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-52578586-1505247952.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<p id="spying-on-iraq" class="caption overlayed">Sunni Arab member of Iraqi Transitional National Assembly and a candidate for the post of parliament speaker Misha&#8217;an al-Juburi speaks on the phone April 2, 2005 in Baghdad.</p>
<figcaption class="caption source pullright">Photo: Wathiq Khuzaie/Getty Images</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->
<h3>An “All-Out Effort” To Spy on Liberated Iraq</h3>
<p>The NSA’s surveillance against Iraqis went far beyond cafe computers. Two years after President George W. Bush’s infamous “Mission Accomplished” speech and a year after the Coalition Provisional Authority handed over the reins to the Iraqi Interim Government, the agency was trying to tap the nation’s communications — and enlist friendly Iraqis and the new government to do likewise.</p>
<p>In a <a href="https://theintercept.com/snowden-sidtoday/3991096-experiences-of-a-sigint-er-in-baghdad/">top-secret SIDtoday report</a>, an NSA “data acquisition lead” in Baghdad described “an all-out effort to penetrate Iraqi networks using everything in the tool box of the most sophisticated SIGINT agency in the world.” The “very forward-leaning and aggressive” collection effort brought “our technology to bear at the optimum access points” in the country. The identity of those access points is hinted at by the list of people the NSA staffer met with as the “field rep on a number of projects&#8221;: “Iraqi government personnel engaged in telecommunications and IT issues for Iraq; small and medium sized Iraqi communications contractors; the CEO&#8217;s and Chief Technical Officers of the major Iraqi telecommunications service providers; [and] Iraqi cabinet level officials,” among others.</p>
<p><a href="https://theintercept.com/snowden-sidtoday/3991073-team-re-establishes-crucial-collection-in-iraq/">Another article</a> confirmed the NSA was spying on Iraqi telecommunications, describing a “dramatic drop” in information the agency collected from links carrying mobile phone traffic between Fallujah and northern Baghdad and a consequent gap in intelligence gathering. A team from the NSA and CIA was able to restore the collection within two weeks by targeting microwave signals carrying the traffic.</p>
<p>In addition to its own electronic spying within Iraq, the NSA sought to rebuild the country’s ability to spy on itself through another joint project with the CIA, along with GCHQ. The Western intelligence entities would build a new Iraqi spy agency, dubbed the Iraq SIGINT Element, according to another SIDtoday article. The Iraqi SIGINT Element’s expertise would come, of course, from veterans of Saddam Hussein’s regime; the NSA and GCHQ made a list of candidates “gleaned from years of targeting the Iraqi civil and military SIGINT units,” <a href="https://theintercept.com/snowden-sidtoday/3991117-what-a-difference-a-year-makes-%C3%A2-reconstructing/">SIDtoday reported</a>. The former targets were the new recruits. The CIA assisted in the vetting process with polygraphers, psychologists, and background checks, and the NSA trained the selected candidates on “how we do SIGINT.” The new intelligence agents’ first assignment was to find communications of former Saddam “elements” and insurgents in Baghdad. They went covertly into Baghdad neighborhoods, which U.S. and U.K. forces were unable to do.</p>
<p>It was at the behest of the director of central intelligence that the NSA “moved aggressively to help [Iraq] establish and enhance their signals intelligence capabilities,” SIDtoday <a href="https://theintercept.com/snowden-sidtoday/3991163-a-glimpse-of-the-future-of-nsa-s-foreign/">reported separately</a>. A similar effort was underway in Afghanistan. “Both relationships come with risks, but the overall benefit to U.S. objectives in the region outweighs these risks,” wrote an NSA foreign affairs staff officer.</p>
<!-- BLOCK(photo)[3](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[3] --> <a href="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-56487102-1505248006.jpg"><img loading="lazy" decoding="async" width="1440" height="1185" class="aligncenter size-large wp-image-145962" src="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-56487102-1505248006.jpg" alt="HAWIJAH, Iraq:  An Iraqi soldier checks the detonator on spot where an Improvised Explosive Device blew up as a convoy of the 1st battalion 327th infantry regiment was driving along a country road on the outskirts of the northern city of Hawijah,  25 December 2005. A US soldier was killed by a roadside bomb on Christmas day, in Baghdad, the US military said. AFP PHOTO / Filippo MONTEFORTE  (Photo credit should read FILIPPO MONTEFORTE/AFP/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-56487102-1505248006.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-56487102-1505248006.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-56487102-1505248006.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-56487102-1505248006.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-56487102-1505248006.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-56487102-1505248006.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">An Iraqi soldier checks the detonator on spot where an improvised explosive device blew up as a convoy of the 1st battalion 327th infantry regiment was driving along a country road on the outskirts of the northern city of Hawija, Dec. 25, 2005.<br/>Photo: Filippo Monteforte/AFP/Getty Images</figcaption><!-- END-CONTENT(photo)[3] --></figure><!-- END-BLOCK(photo)[3] -->
<h3>Targeting Bombers in Iraq</h3>
<p>Mass surveillance efforts in Iraq were part of a broader NSA effort to address the consequences of the coalition’s victory over Saddam Hussein. Immediately after the Ba’athist government fell to the invading forces in 2003, signals intelligence collection on the regime ceased to exist. NSA staff, some of whom had been monitoring the country for more than a decade, woke up to “no more audio cuts, no more transcripts … no more product reports,” according to <a href="https://theintercept.com/snowden-sidtoday/3991146-the-day-the-trigraphs-disappeared/">an account in SIDtoday</a>. One official wondered, “Will we lose resources because of our success?” Postwar insurgency and sectarian strife ensured this was not the case.</p>
<p>For example, an NSA team set about thwarting detonation systems for bombs set by insurgents. The bombs, known within the U.S. military as improvised explosive devices, were triggered from a distance, often using high-powered cordless phone systems, in which a common base station, controlled by a triggerman, connects to a cluster of wireless handsets. The team devised a way to locate triggermen: Intercepting and identifying security codes emitted by captured handsets. The codes, intended to tether a handset to a particular base station, could then be used to locate base stations, resulting in military targeting and “hopefully, the IED makers neutralized,” <a href="https://theintercept.com/snowden-sidtoday/3991082-countering-improvised-explosive-devices-in-iraq/">SIDtoday stated</a>.</p>
<p>The NSA may have had a chance to deploy this technique at the end of January 2005, when Iraq’s first parliamentary elections took place. An <a href="https://theintercept.com/snowden-sidtoday/3991110-30-january-iraq-election-day/">article in SIDtoday</a> said that signals intelligence helped prevent 50 to 60 suicide bombers from making it into polling centers. Still, 285 other insurgent attacks occurred that day, and CNN <a href="http://www.cnn.com/2005/WORLD/meast/01/30/iraq.attacks/">reported</a> several incidents of suicide bombings that hit police officers and Iraqis waiting to vote.</p>
<h3>How British Spies Were Made To Atone for Bad Iraq Intel</h3>
<p>In Iraq and elsewhere, the NSA expanded the scope of its intelligence sharing to U.S. government “customers,” as described in <a href="https://theintercept.com/snowden-sidtoday/3991048-the-little-card-that-made-a-big-impact-in-iraq/">a January 2005 article</a>, in which an NSA staffer in Baghdad read a new sharing guideline aloud to a hesitant colleague: “It’s OK to talk about, show and share evaluated, minimized unpublished SIGINT to customers/partners in order to facilitate analytic collaboration.”</p>
<p>Even amid the aggressive intelligence sharing, the NSA was taking note of what could happen when such sharing went terribly wrong. <a href="https://theintercept.com/snowden-sidtoday/3991271-coming-soon-to-gchq-reports-source-descriptors/">A SIDtoday story</a> about a British government inquiry into prewar intelligence on Iraq, the Butler Review, describes how the U.K.’s signals intelligence agency GCHQ was now required to provide “Intelligence Source Descriptors” on all intel reports. This requirement came in response to the finding that the British foreign spying agency, MI6, did not adequately check human sources and relied on third-hand reporting about Iraqi chemical weapons, including “seriously flawed” information from “another country’s intelligence service.”</p>
<p>The new British source descriptors would include identification of sources by name or role along with judgments on whether the source had direct or indirect access to the information reported. The GCHQ descriptor would also indicate whether a source is “reliable,” “unknown,” or “uncertain” as to reliability. “There are no plans at present to use a like program on NSA reports,” SIDtoday reported.</p>
<p>Despite reporting on fallout from the U.K. postwar review, SIDtoday did not cover a U.S. presidential commission that prominently <a href="http://www.mcclatchydc.com/news/special-reports/iraq-intelligence/article24445969.html">reported</a> in March 2005 on how the American intelligence community was “dead wrong” in its prewar assessment of weapons of mass destruction in Iraq.<strong><br />
</strong></p>
<!-- BLOCK(photo)[4](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[4] --> <a href="https://theintercept.com/wp-content/uploads/2017/09/Budova_UZSI-1505248056.jpg"><img loading="lazy" decoding="async" width="1440" height="1080" class="aligncenter size-large wp-image-145963" src="https://theintercept.com/wp-content/uploads/2017/09/Budova_UZSI-1505248056.jpg" alt="Budova_UZSI-1505248056" srcset="https://theintercept.com/wp-content/uploads/2017/09/Budova_UZSI-1505248056.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2017/09/Budova_UZSI-1505248056.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2017/09/Budova_UZSI-1505248056.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2017/09/Budova_UZSI-1505248056.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2017/09/Budova_UZSI-1505248056.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2017/09/Budova_UZSI-1505248056.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">The Czech External Intelligence Service Headquarters (ÚZSI).<br/>Photo: Irib/Wikipedia</figcaption><!-- END-CONTENT(photo)[4] --></figure><!-- END-BLOCK(photo)[4] -->
<h3>NSA Works with Hungary, Pakistan, Ethiopia — and an Eager Czech Republic</h3>
<p>In parallel with its efforts to share information with more U.S. government and intelligence agencies, the NSA also forged connections with foreign partners whose collaboration would have, in previous decades, seemed inconceivable.</p>
<p>In early 2005, the NSA entered into a partnership with Hungary’s Military Intelligence Office, inviting the spy agency to “work with NSA as part of our extended SIGINT enterprise,” <a href="https://theintercept.com/snowden-sidtoday/3991131-hungarian-mio-reporting-initiative-to-serve-as/">according to SIDtoday</a>, and “write SIGINT reports for dissemination through the NSA system to our intelligence community customers.&#8221; The partnership allowed the NSA to tap into the Hungarian agency’s “unique access to Serbian and Ukrainian military targets.”</p>
<p>A contemporaneous NSA visit to the Czech Republic, <a href="https://theintercept.com/snowden-sidtoday/3991169-czech-mates/">as described in SIDtoday</a>, showed how such “third party” partnerships can come to fruition. The trip was conducted to establish whether the NSA should partner with the Czech External Intelligence Service, or ÚZSI, which wanted to tap NSA expertise “on many technical issues.” In order to win over the Americans, spy agency “personnel essentially opened the door to their SIGINT vault,” displaying an “exceptional degree of openness.” The NSA team came away impressed, judging ÚZSI “exceptionally good at analysis of material associated with Russian [counterintelligence] targets,” and impressed with the agency’s “very good analytic effort against Russian and Ukrainian HF networks” and “overall levels of sophistication, knowledge, practical experience, ingenuity and enthusiasm that allow them to overcome many financial and equipment shortfalls.” Perhaps best of all, ÚZSI “has not requested financial support from the NSA.” The Czech Republic eventually <a href="https://theintercept.com/2014/06/18/nsa-surveillance-secret-cable-partners-revealed-rampart-a/">became</a> a third-party <a href="https://cdn01.theintercept.com/wp-content/uploads/2014/06/sigint-partners.png">partner</a>.</p>
<p>A March 2005<a href="https://theintercept.com/snowden-sidtoday/3991163-a-glimpse-of-the-future-of-nsa-s-foreign/"> SIDtoday article</a>, summarizing a briefing from the NSA’s principal director for foreign affairs, alluded to agency “relationships” with Pakistan and Ethiopia, “work” with Iraq (discussed elsewhere in this article) and Afghanistan, and a “multinational collaboration in the Pacific.”</p>
<p>More generally, third parties became vital at this time simply for providing additional staffing and coverage. For instance, after the U.S. closed several bases, the NSA <a href="https://theintercept.com/snowden-sidtoday/3991121-crosshair-%C3%A2-foreign-partners-filling-hf-df-gaps/">developed a reliance</a> on third-party partners to participate in High Frequency Directional Finding networks for locating the origins of targeted radio signals. And the U.S. partnered with Hungary’s military intelligence organization in part <a href="https://theintercept.com/snowden-sidtoday/3991131-hungarian-mio-reporting-initiative-to-serve-as/">because</a> it “has been instrumental in providing intelligence that answers high-priority CIA and DIA (Defense Intelligence Agency) requirements that NSA would otherwise not be able to answer due to manpower constraints.”</p>
<h3>Intercept Backer Spoke at NSA Headquarters</h3>
<p>Back in the U.S., the NSA’s post-9/11 “transformation,” initiated by Director Michael Hayden, promoted information sharing and collaboration to the traditionally closed community at Fort Meade. Invitations to participate at agency seminars and conferences were made not just to partners from the intelligence and military communities, but also to members of private industry and academia.</p>
<p>An <a href="https://theintercept.com/snowden-sidtoday/3991244-analysis-no-boundaries-a-necessary-approach-for/">announcement in SIDtoday</a> for the third annual Analysis Conference from the NSA’s Analysis and Production division proclaimed the need to “keep communications open and leverage our partners&#8217; insights.” Speakers at the May 2005 event, held at agency headquarters, included authors, U.S. senators, corporate executives, and journalists.</p>
<p>One “high-powered panel” at the conference on “human networking” featured eBay founder Pierre Omidyar, who would go on to provide funding for The Intercept, which covers and is frequently critical of the NSA. A <a href="https://theintercept.com/snowden-sidtoday/3991239-industry-experts-to-discuss-human-networking-an/">separate SIDtoday article</a> touting the panel  indicated that corporate anthropologist Karen Stephenson and Wired founding executive editor Kevin Kelly also participated and that panelists were recruited through the Global Business Network, a consulting firm specializing in scenario-based forecasting. The GBN had been asked to harness its network of experts, “most of whom have had no previous involvement with the intelligence community,” to apply strategies from “the competitive marketplace” to NSA challenges.</p>
<p>Omidyar told The Intercept that the GBN “asked me to participate in an unclassified meeting at NSA headquarters at Fort Meade on the topic of ‘open source’ intelligence. My recollection of the people I met there is that they were very smart and genuinely interested in bringing outside ideas into the agency. I stayed involved with the GBN for some time after that meeting but when they approached me many months later to participate in additional meetings with the NSA, I declined. The invitation was made after news broke in December 2005 about the agency’s ‘warrantless wiretapping’ — and those events were deeply concerning to me. In addition, I didn’t have anything else to add beyond what I had already shared. I was not asked to meet with the NSA again after declining that invitation.”</p>
<p>Omidyar said he was not paid for his appearance.<!-- BLOCK(photo)[5](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[5] --> <a href="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-526254496-1505251597.jpg"><img loading="lazy" decoding="async" width="1440" height="825" class="aligncenter size-large wp-image-146014" src="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-526254496-1505251597.jpg" alt="India tested its medium range Submarine Launched Ballistic Missile system, it was launched from a secret location in the Bay of Bengal from a depth of 50 meters. This nuclear capable missile will now be deployed on INS Arihant, India's locally made N-powered submarine. India became the fifth nation to have this potent technology by which it can stealthily hide its nuclear weapons deep in the ocean and strike at will. India calls these Weapons of Peace. It is an intelligent missile (Photo by Pallava Bagla/Corbis via Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-526254496-1505251597.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-526254496-1505251597.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-526254496-1505251597.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-526254496-1505251597.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-526254496-1505251597.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-526254496-1505251597.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">India tested its medium-range submarine-launched ballistic missile system. It was launched from a secret location in the Bay of Bengal from a depth of 50 meters.<br/>Photo: Pallava Bagla/Corbis/Getty Images</figcaption><!-- END-CONTENT(photo)[5] --></figure><!-- END-BLOCK(photo)[5] --></p>
<h3>Advanced Word on Indian Nuclear Weapons</h3>
<p>A series of nuclear weapons tests conducted by India in the spring of 1998 took the intelligence community by surprise, prompting an internal investigation into why these tests had not been foreseen; <a href="http://www.congressionalresearch.com/98-672/document.php">a subsequent report</a> was harshly critical of the U.S. intelligence community. A similar lapse in data gathering would not happen again in 2005. An Australian NSA site, RAINFALL, isolated a signal it suspected was associated with an Indian nuclear facility, <a href="https://theintercept.com/snowden-sidtoday/3991061-new-collection-access-yields-spectacular-intel/">according to SIDtoday</a>. Collaboration between RAINFALL and two NSA stations in Thailand (<a href="https://theintercept.com/snowden-sidtoday/3991064-letter-to-the-editor-new-collection-access/">INDRA</a> and LEMONWOOD) confirmed the source of the signals and allowed for the interception of information about several new Indian missile initiatives. Although these missile systems did not come to public attention for several more years (the Sagarika submarine-launched ballistic missile was <a href="http://www.thehindu.com/todays-paper/Sagarika-missile-test-fired-successfully/article15174369.ece">first tested in 2008</a>), the NSA’s access to these signals gave them foreknowledge of their <a href="https://theintercept.com/2014/06/18/nsa-surveillance-secret-cable-partners-revealed-rampart-a/">Third Party SIGINT partner’s</a> (see last image) actions.</p>
<h3>Attacking VPNs</h3>
<p>An NSA working group focused on virtual private networks, or VPNs, was established in November 2004 to “conduct systematic and thorough SIGINT Development of VPN communications (typically encrypted),” <a href="https://theintercept.com/snowden-sidtoday/3991242-about-the-virtual-private-network-sigdev-working/">SIDtoday reported</a> — meaning that the agency wanted to break into the networks. The group published regular “VPN Target Activity Reports” on a large number of countries throughout Europe, the Middle East, North Africa, Russia, and China, as well as “specific financial, governmental, communication service providers and international organizations.” These reports may help analysts “exploit targets’ VPNs more successfully.”</p>
<h3>Women at the NSA</h3>
<p>Sonia Kovalevsky Days take place at schools and colleges nationwide, with competitions and talks to encourage young women to pursue careers in mathematics. Although the events’ namesake was a radical socialist and pioneering female mathematician, members of the NSA’s Women in Mathematics Society participated as part of the agency’s effort to recruit more female mathematicians. The NSA <a href="http://articles.baltimoresun.com/1998-01-10/news/1998010034_1_mathematicians-math-minds-cold-war">believed itself to be</a> the largest employer of mathematicians in the country, but between 1987 to 1993, only one of the 30 math Ph.D.s the agency hired identified as a woman, and only 26 percent of women hired into the agency’s mathematics community had an advanced degree, <a href="https://theintercept.com/snowden-sidtoday/3991330-nsa-s-women-in-mathematics-society/">according to SIDtoday</a>. After the Women in Mathematics Society was formed, from 1994 through 2005, about 38 percent of women mathematicians hired into NSA had a doctoral degree and 27 percent held a master’s degree.</p>
<h3>Hold the Spam, Please</h3>
<p>“Spam affects NSA by impeding our collection, processing and storage of [Digital Network Intelligence] traffic,” said the author of a <a href="https://theintercept.com/snowden-sidtoday/3991089-hold-the-spam-please/">February 2005 SIDtoday article</a>. “Unfortunately, filtering out spam has proven to be an extremely difficult and cumbersome task.”According to the author, analysts developed technology that tagged “an average of 150,000 spam sessions a day,” which greatly reduced the amount of spam that shows up in “daily searches” of intercepted emails.</p>
<p><strong>Correction: September 13, 2017, 9:15 p.m. </strong><strong><em><br />
</em></strong><em>Due to an editing error, an earlier version of this story gave an incorrect year for the NSA&#8217;s third annual Analysis Conference; the event occurred in May 2005, not May 2015.</em></p>
<p class="caption">Top photo: In this May 1, 2003 file photo, President George W. Bush gives a &#8220;thumbs-up&#8221; sign after declaring the end of major combat in Iraq as he speaks aboard the aircraft carrier USS Abraham Lincoln off the California coast.</p>
<p>The post <a href="https://theintercept.com/2017/09/13/sloppy-u-s-spies-misused-covert-network-for-personal-shopping-and-other-stories-from-internal-nsa-documents/">Sloppy U.S. Spies Misused a Covert Network for Personal Shopping — and Other Stories from Internal NSA Documents</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2017/09/13/sloppy-u-s-spies-misused-covert-network-for-personal-shopping-and-other-stories-from-internal-nsa-documents/feed/</wfw:commentRss>
                <slash:comments>24</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2017/09/bush-sid-highlight-1505247729.jpg?fit=1440%2C720' width='1440' height='720' /><post-id xmlns="com-wordpress:feed-additions:1">145891</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?fit=720%2C98" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-78681829-1505247889.jpg?fit=1440%2C967" medium="image">
			<media:title type="html">Iraqi youth surf the web at an internet</media:title>
			<media:description type="html">Iraqi youth surf the web at an internet cafe in Baghdad&#039;s impoverished district of Sadr city, 15 November 2007.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-78681829-1505247889.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-52578586-1505247952.jpg?fit=1440%2C996" medium="image">
			<media:title type="html">Iraq&#8217;s National Assembly To Meet For Third Session Tomorrow</media:title>
			<media:description type="html">Sunni Arab member of Iraqi Transitional National Assembly (TNA) and a candidate for the post of parliament speaker Meshaan al-Jubouri speaks on the phone April 2, 2005 in Baghdad, Iraq.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-52578586-1505247952.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-56487102-1505248006.jpg?fit=1440%2C1185" medium="image">
			<media:title type="html">An Iraqi soldier checks the detonator on</media:title>
			<media:description type="html">An Iraqi soldier checks the detonator on spot where an Improvised Explosive Device blew up as a convoy of the 1st battalion 327th infantry regiment was driving along a country road on the outskirts of the northern city of Hawijah,  25 December 2005.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-56487102-1505248006.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/09/Budova_UZSI-1505248056.jpg?fit=1440%2C1080" medium="image">
			<media:title type="html">Budova_UZSI-1505248056</media:title>
			<media:description type="html">Headquarters of ÚZSI.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/09/Budova_UZSI-1505248056.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-526254496-1505251597.jpg?fit=1440%2C825" medium="image">
			<media:title type="html">India tests submarine launched ballistic missile</media:title>
			<media:description type="html">India tested its medium range Submarine Launched Ballistic Missile system, it was launched from a secret location in the Bay of Bengal from a depth of 50 meters.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-526254496-1505251597.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[How the NSA Built a Secret Surveillance Network for Ethiopia]]></title>
                <link>https://theintercept.com/2017/09/13/nsa-ethiopia-surveillance-human-rights/</link>
                <comments>https://theintercept.com/2017/09/13/nsa-ethiopia-surveillance-human-rights/#comments</comments>
                <pubDate>Wed, 13 Sep 2017 19:46:33 +0000</pubDate>
                                    <dc:creator><![CDATA[Nick Turse]]></dc:creator>
                                		<category><![CDATA[release-september-2017]]></category>
		<category><![CDATA[Uncategorized]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=145906</guid>
                                    <description><![CDATA[<p>Amid concerns about Ethiopia's human rights abuses, the NSA forged a secret relationship with the country that expanded exponentially over the years.</p>
<p>The post <a href="https://theintercept.com/2017/09/13/nsa-ethiopia-surveillance-human-rights/">How the NSA Built a Secret Surveillance Network for Ethiopia</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-65243" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" srcset="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=720 720w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=540 540w" sizes="auto, (max-width: 720px) 100vw, 720px" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p><u>“A warm friendship</u> connects the Ethiopian and American people,” U.S. Secretary of State Rex Tillerson announced earlier this year. “We remain committed to working with Ethiopia to foster liberty, democracy, economic growth, protection of human rights, and the rule of law.”</p>
<p>Indeed, the website for the U.S. Embassy in Ethiopia is marked by press releases touting U.S. aid for farmers and support for public health infrastructure in that East African nation. “Ethiopia remains among the most effective development partners, particularly in the areas of health care, education, and food security,” <a href="https://www.state.gov/r/pa/ei/bgn/2859.htm">says</a> the State Department.</p>
<p>Behind the scenes, however, Ethiopia and the U.S. are bound together by long-standing relationships built on far more than <a href="https://et.usembassy.gov/usaid-hands-equipment-worth-nearly-18-4-million-etb/">dairy processing equipment</a> or <a href="https://et.usembassy.gov/usaid-opens-health-center-southern-nations-nationalities-peoples-region/">health centers</a> to treat people with HIV. Fifteen years ago, the U.S. began setting up very different centers, filled with technology that is not normally associated with the protection of human rights.</p>
<p>In the aftermath of 9/11, according to classified U.S. documents published Wednesday by The Intercept, the National Security Agency forged a relationship with the Ethiopian government that has expanded exponentially over the years. What began as one small facility soon grew into a network of clandestine eavesdropping outposts designed to listen in on the communications of Ethiopians and their neighbors across the Horn of Africa in the name of counterterrorism.</p>
<p>In exchange for local knowledge and an advantageous location, the NSA provided the East African nation with technology and training integral to electronic surveillance. “Ethiopia’s position provides the partnership unique access to the targets,” a commander of the U.S. spying operation wrote in a classified 2005 report. (The report is one of <a href="https://theintercept.com/snowden-sidtoday/">294 internal NSA newsletters released today</a> by The Intercept.)</p>
<p>The NSA’s collaboration with Ethiopia is high risk, placing the agency in controversial territory. For more than a decade, Ethiopia has been engaged in a fight against Islamist militant groups, such as Al Qaeda and Shabab. But the country’s security forces have taken a draconian approach to countering the threat posed by jihadis and stand accused of routinely torturing suspects and abusing terrorism powers to target political dissidents.</p>
<p>“The Ethiopian government uses surveillance not only to fight terrorism and crime, but as a key tactic in its abusive efforts to silence dissenting voices in-country,” says Felix Horne, a senior researcher for Human Rights Watch. “Essentially anyone that opposes or expresses dissent against the government is considered to be an ‘anti-peace element’ or a ‘terrorist.’”</p>
<p>The NSA declined to comment for this story.</p>
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[1] --> <a href="https://theintercept.com/wp-content/uploads/2017/09/AP_423973924189-1505250803.jpg"><img loading="lazy" decoding="async" width="1440" height="961" class="aligncenter size-large wp-image-145992" src="https://theintercept.com/wp-content/uploads/2017/09/AP_423973924189-1505250803.jpg" alt="Addis Ababa is the capital city of Ethiopia. It is the largest city in Ethiopia with a population of 3.4 million. (Photo from March 2014) | usage worldwide Photo by: Yannick Tylle/picture-alliance/dpa/AP Images" srcset="https://theintercept.com/wp-content/uploads/2017/09/AP_423973924189-1505250803.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2017/09/AP_423973924189-1505250803.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2017/09/AP_423973924189-1505250803.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2017/09/AP_423973924189-1505250803.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2017/09/AP_423973924189-1505250803.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2017/09/AP_423973924189-1505250803.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">Addis Ababa is the capital city of Ethiopia.<br/>Photo: Yannick Tylle/picture-alliance/dpa/AP</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] -->
<p>In February 2002, the NSA set up the Deployed Signals Intelligence Operations Center – also known as “Lion’s Pride” – in Ethiopia’s capital, Addis Ababa, according to secret documents obtained by The Intercept from the whistleblower Edward Snowden. It began as a modest counterterrorism effort involving around 12 Ethiopians performing a single mission at 12 workstations. But by 2005, the operation had evolved into eight U.S. military personnel and 103 Ethiopians, working at “46 multifunctional workstations,” eavesdropping on communications in Somalia, Sudan, and Yemen. By then, the outpost in Addis Ababa had already been joined by “three Lion’s Pride Remote Sites,” including one located in the town of Gondar, in northwestern Ethiopia.</p>
<p>“[The] NSA has an advantage when dealing with the Global War on Terrorism in the Horn of Africa,” reads <a href="https://theintercept.com/snowden-sidtoday/3991127-lion-s-pride-fighting-terrorism-on-the-horn-of/">an NSA document</a> authored in 2005 by Katie Pierce, who was then the officer-in-charge of Lion’s Pride and the commander of the agency’s Signal Exploitation Detachment. “The benefit of this relationship is that the Ethiopians provide the location and linguists and we provide the technology and training,” she wrote.  According to Pierce, Lion’s Pride had already produced almost 7,700 transcripts and more than 900 reports based on its regional spying effort.</p>
<p>Pierce, now a lieutenant colonel in the Army Reserve and a lawyer in private practice, had noted her role with the NSA’s Ethiopia unit in an online biography. When contacted by The Intercept, she said little about her time with Lion’s Pride or the work of the NSA detachment. “We provided a sort of security for that region,” she said. The reference to the NSA in Pierce’s online biography has since <a href="http://www.lawyercommercecityco.com/about_us.html">disappeared</a>.</p>
<p>Reta Alemu Nega, the minister of political affairs at the Ethiopian Embassy in Washington, D.C., told The Intercept that the U.S. and Ethiopia maintained “very close cooperation” on issues related to intelligence and counterterrorism. While he did not address questions about Lion’s Pride, Alemu described regular meetings in which U.S. and Ethiopian defense officials “exchange views” about their partnership and shared activities.</p>
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[2] --> <a href="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147107888-1505250810.jpg"><img loading="lazy" decoding="async" width="1440" height="960" class="aligncenter size-large wp-image-145995" src="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147107888-1505250810.jpg" alt="Al-Shabab and Hizbul Islam militants take a break at a front-line section in sanca district in Mogadishu,  on July 21, 2009. Somalia's hard line Shabab militia yesterday raided the offices of three UN organisations hours after they banned their operations on accusation that they were &quot;enemies of Islam and Muslims. The armed group stormed the United Nations Development Programme, UN Department of Safety and Security and the UN Political Office for Somalia in two southern Somalia towns and impounded office equipment. The above foreign agencies have been found to be working against the benefit of the Somali Muslim population and against the establishment of an Islamic state in Somalia,&quot; the Shebab said in a statement. AFP PHOTO/ MOHAMED DAHIR        (Photo credit should read MOHAMED DAHIR/AFP/GettyImages)" srcset="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147107888-1505250810.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147107888-1505250810.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147107888-1505250810.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147107888-1505250810.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147107888-1505250810.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147107888-1505250810.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">Shabab and Hizbul Islam militants take a break at a front-line section in Sanca district in Mogadishu, on July 21, 2009.<br/>Photo: Mohamed Dahir/AFP/Getty Images</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->
<p>Lion’s Pride does not represent the first time that Ethiopia has played a vital role in U.S. signals surveillance. In 1953, the U.S. <a href="http://nsarchive.gwu.edu/NSAEBB/NSAEBB278/20.PDF">signed</a> a 25-year agreement for a base at Kagnew Station in Asmara, Ethiopia (now the capital of Eritrea), according to a declassified NSA report obtained by the nonprofit National Security Archive. Navy and Army communications facilities based there were joined by an NSA outpost just over a decade later.</p>
<p>On April 23, 1965, the Soviet Union <a href="https://www.cia.gov/library/readingroom/docs/CIA-RDP78T04759A000500010016-5.pdf">launched</a> Molniya-1, its first international communications satellite. The next month, the NSA opened STONEHOUSE, a remote listening post in Asmara. The facility was originally aimed at Soviet deep space probes but, in the end, “[its] main value turned out to be the collection of Soviet MOLNIYA communications satellites,” <a href="https://theintercept.com/snowden-sidtoday/3233035-yakima-research-station-at-30-years-the-beginning/">according</a> to a 2004 NSA document that mentions STONEHOUSE.</p>
<p>STONEHOUSE was closed down in 1975 due to a civil war in Ethiopia. But its modern-day successor, Lion’s Pride, has proved to be “such a lucrative source for SIGINT reports” that a new facility was built in the town of Dire Dawa in early 2006, according to a secret <a href="https://theintercept.com/document/2017/09/12/expanding-joint-us-ethiopian-sigint-collection">NSA document</a>. “The state of the art antenna field surrounded by camels and donkey-drawn carts is a sight to behold,” reads the NSA file. The effort, code-named &#8220;LADON,&#8221; was aimed at listening in on communications across a larger swath of Somalia, down to the capital Mogadishu, the Darfur region of Sudan, and parts of eastern Ethiopia.</p>
<p>At a May 2006 planning conference, the Americans and Ethiopians decided on steps to “take the partnership to a new level” through an expanded mission that stretched beyond strictly counterterrorism. Targeting eastern Ethiopia’s Ogaden region and the nearby Somali borderlands, the allied eavesdroppers agreed on a mission of listening in on cordless phones in order to identify not only “suspected al-Qa’ida sympathizers” but also “illicit smugglers.”</p>
<!-- BLOCK(pullquote)[3](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22none%22%7D) --><blockquote class="stylized pull-none" data-shortcode-type="pullquote" data-pull="none"><!-- CONTENT(pullquote)[3] -->“It is very troubling to hear the U.S. is providing surveillance capacities to a government that is committing such egregious human rights abuses in that region.”<!-- END-CONTENT(pullquote)[3] --></blockquote><!-- END-BLOCK(pullquote)[3] -->
<p>From the time Lion’s Pride was set up until predominantly <a href="https://www.state.gov/j/drl/rls/irf/2010_5/168407.htm">Christian</a> Ethiopia invaded mostly <a href="https://www.state.gov/j/drl/rls/irf/2010/148720.htm">Muslim</a> Somalia in December 2006, the U.S. <a href="http://usatoday30.usatoday.com/news/world/2007-01-07-ethiopia_x.htm">poured</a> about $20 million in military aid into the former country. As Ethiopian troops attempted to oust a fundamentalist movement called the Council of Islamic Courts, which had defeated several warlords to take power in Somalia, Pentagon spokesperson Lt. Cmdr. Joe Carpenter said the two nations had “a close working relationship” that included sharing intelligence. Within a year, Ethiopian forces were <a href="http://news.bbc.co.uk/2/hi/africa/7155868.stm">stuck</a> in a military quagmire in Somalia and were facing a growing rebellion in the Ogaden region as well.</p>
<p>“While the exact nature of U.S. support for Ethiopian surveillance efforts in the Ogaden region is not clear, it is very troubling to hear the U.S. is providing surveillance capacities to a government that is committing such egregious human rights abuses in that region,” says Horne, the Human Rights Watch researcher.  “Between 2007-2008 the Ethiopian army committed possible war crimes and crimes against humanity against civilians in this region during its conflict with the Ogaden National Liberation Front.&#8221;</p>
<p>For the U.S., “the chaos” caused by the invasion “yielded opportunities for progress in the war on terrorism,” stated a top secret NSA <a href="https://theintercept.com/document/2017/09/12/instability-creates-opportunity-against-counterterrorism-targets">document</a> dated February 2007.  According to the document, the Council of Islamic Courts was harboring members of an Al Qaeda cell that the NSA’s African Threat Branch had been tracking since 2003. After being flushed from hiding by the Ethiopian invasion, the NSA provided “24-hour support to CIA and U.S. military units in the Horn of Africa,” utilizing various surveillance programs to track Council of Islamic Courts leaders and their Al Qaeda allies. “Intelligence,” says the document, “was also shared with the Ethiopian SIGINT partner to enable their troops to track High Value Individuals.” The NSA deemed the effort a success as the “#1 individual on the list” was “believed killed in early January” 2007, while another target was arrested in Kenya the next month. The identities of the people killed and captured, as well as those responsible, are absent from the document.</p>
<p>As the Council of Islamic Courts <a href="https://csis-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/publication/110715_Wise_AlShabaab_AQAM%20Futures%20Case%20Study_WEB.pdf">crumbled</a> in the face of the invasion, its ally, the militant group Shabab, saw Somalis flock to its resistance effort. Fueled and radicalized by the same chaos exploited by the NSA, Shabab grew in strength. By 2012, the terrorist group had formally <a href="https://www.thebureauinvestigates.com/drone-war/data/somalia-reported-us-covert-actions-2001-2017">become</a> an Al Qaeda affiliate. Today, the U.S. <a href="https://www.washingtonpost.com/news/monkey-cage/wp/2017/05/08/a-navy-seal-was-killed-in-somalia-heres-what-you-need-to-know-about-u-s-operations-there/?utm_term=.07fb2f1809a4">continues</a> to battle Shabab in an <a href="http://www.newsweek.com/us-troops-somalia-donald-trump-al-shabab-586004">escalating</a> conflict in Somalia that shows <a href="https://www.nytimes.com/2017/06/11/us/politics/us-airstrike-somalia-trump.html?_r=0">no sign</a> of abating.</p>
<!-- BLOCK(photo)[4](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[4] --> <a href="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147105754-1505250808.jpg"><img loading="lazy" decoding="async" width="1440" height="1080" class="aligncenter size-large wp-image-145994" src="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147105754-1505250808.jpg" alt="The first batch of Ethiopian troops leaving the Somali capital Mogadishu hold a departure ceremony 23 January 2007 at Afisiyooni Air Base. Ethiopian troops began withdrawing from Mogadishu nearly four weeks after they helped oust Islamist forces from the Somali capital. A special departure ceremony was held for the pullout of the first batch of around 200 soldiers at the former headquarters of the Somali air force in the southern outskirts of the capital. AFP PHOTO/STRINGER        (Photo credit should read STRINGER/AFP/GettyImages)" srcset="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147105754-1505250808.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147105754-1505250808.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147105754-1505250808.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147105754-1505250808.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147105754-1505250808.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147105754-1505250808.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">The first batch of Ethiopian troops leaving the Somali capital Mogadishu hold a departure ceremony Jan. 23, 2007 at Afisiyooni Air Base.<br/>Photo: Stringer/AFP/Getty Images</figcaption><!-- END-CONTENT(photo)[4] --></figure><!-- END-BLOCK(photo)[4] -->
<p>At the time the NSA set up Lion’s Pride, the U.S. State Department had criticized Ethiopia’s security forces for having “infringed on citizens’ privacy rights,” ignoring the law regarding search warrants, beating detainees, and conducting extrajudicial killings. By 2005, with Lion’s Pride markedly expanded, nothing had changed. The State Department <a href="https://www.state.gov/j/drl/rls/hrrpt/2001/af/8372.htm">found</a>:</p>
<blockquote><p>The Government&#8217;s human rights record remained poor. … Security forces committed a number of unlawful killings, including alleged political killings, and beat, tortured, and mistreated detainees. … The Government infringed on citizens&#8217; privacy rights, and the law regarding search warrants was often ignored. The Government restricted freedom of the press. … The Government at times restricted freedom of assembly, particularly for members of opposition political parties; security forces at times used excessive force to disperse demonstrations. The Government limited freedom of association. …</p></blockquote>
<p>A separate State Department report on Ethiopia’s counterterrorism and anti-terrorism capabilities, issued in November 2013 and obtained by The Intercept via the Freedom of Information Act, noted that there were “inconsistent efforts to institutionalize” anti-terrorism training within Ethiopian law enforcement and added that while the Ethiopian Federal Police use surveillance and informants, “laws do not allow the interception of telephone or electronic communications.” The readable sections of the redacted report make no mention of the NSA program and state that the U.S. “maintains an important but distant security relationship with Ethiopia.”</p>
<p>A 2010 NSA <a href="https://theintercept.com/document/2017/09/12/a-behind-the-scenes-look-at-the-nsa-ethiopian-relationship">document</a> offers a far different picture of the bond between the security agencies of the two countries, noting that the “NSA-Ethiopian SIGINT relationship continues to thrive.”</p>
<p>In an after-action report, a trainer from NSA Georgia’s “Sudan/Horn of Africa Division” described teaching a class attended by soldiers from the Ethiopian National Defense Forces and civilians from Ethiopia&#8217;s Information Network Security Agency. He praised the Ethiopians for “work[ing] so hard on our behalf” and wrote that his students were “excited and eager to learn.”</p>
<p>According to the documents, analysts from the Army’s 741st Military Intelligence Battalion were still detailed to Lion’s Pride while the Ethiopians they worked beside had increased their skills at analyzing intercepted communications. “More importantly, however,” the American trainer noted, “is the strengthening of the relationship” between NSA and Ethiopian security forces. NSA Georgia, he declared, was eager to continue “developing the relationship between us and our Ethiopian counterparts.”</p>
<p>The NSA refused to comment on whether Lion’s Pride continues to eavesdrop on the region, but no evidence suggests it was ever shut down. There is, however, good reason to believe that U.S. efforts have strengthened the hand of the Ethiopian government. And a decade and a half after it was launched, Ethiopia’s human rights record remains as <a href="https://www.state.gov/j/drl/rls/hrrpt/humanrightsreport/index.htm#wrapper">dismal</a> as ever.</p>
<p>“Governments that provide Ethiopia with surveillance capabilities that are being used to suppress lawful expressions of dissent risk complicity in abuses,” says Horne. “The United States should come clean about its role in surveillance in the Horn of Africa and should have policies in place to ensure Ethiopia is not using information gleaned from surveillance to crack down on legitimate expressions of dissent inside Ethiopia.”</p>
<p>———</p>
<p><em>Documents published with this article: </em></p>
<ul>
<li><a href="https://theintercept.com/snowden-sidtoday/3991127-lion-s-pride-fighting-terrorism-on-the-horn-of/">Lion&#8217;s Pride: Fighting terrorism in the Horn of Africa</a></li>
<li><a href="https://theintercept.com/document/instability-creates-opportunity-against-counterterrorism-targets">Instability creates opportunity against counter-terrorism targets</a></li>
<li><a href="https://theintercept.com/document/a-behind-the-scenes-look-at-the-nsa-ethiopian-relationship">A behind the scenes look at the NSA-Ethiopian relationship</a></li>
<li><a href="https://theintercept.com/document/expanding-joint-us-ethiopian-sigint-collection">Expanding joine US-Ethiopian SIGINT collection</a></li>
<li><a href="https://theintercept.com/document/nsa-ethiopians-take-sigint-partnership-to-new-level/">NSA and Ethiopians take SIGINT partnership to new level</a></li>
</ul>
<p class="caption">Top photo: Ethiopian President Mulatu Teshome holds a press conference at the National Palace in Addis Ababa, Ethiopia, on May 7, 2015.</p>
<p>The post <a href="https://theintercept.com/2017/09/13/nsa-ethiopia-surveillance-human-rights/">How the NSA Built a Secret Surveillance Network for Ethiopia</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2017/09/13/nsa-ethiopia-surveillance-human-rights/feed/</wfw:commentRss>
                <slash:comments>17</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2017/09/TI-ethiopia-sid-1505253213.jpg?fit=1440%2C720' width='1440' height='720' /><post-id xmlns="com-wordpress:feed-additions:1">145906</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?fit=720%2C98" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/09/AP_423973924189-1505250803.jpg?fit=1440%2C961" medium="image">
			<media:title type="html">Cityscape Addis Ababa</media:title>
			<media:description type="html">Addis Ababa is the capital city of Ethiopia.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/09/AP_423973924189-1505250803.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147107888-1505250810.jpg?fit=1440%2C960" medium="image">
			<media:title type="html">Al-Shabab and Hizbul Islam militants tak</media:title>
			<media:description type="html">Al-Shabab and Hizbul Islam militants take a break at a front-line section in sanca district in Mogadishu,  on July 21, 2009. Somalia&#039;s hard line Shebab militia yesterday raided the offices of three UN organisations hours after they banned their operations on accusation that they were &#34;enemies of Islam and Muslims. The armed group stormed the United Nations Development Programme, UN Department of Safety and Security and the UN Political Office for Somalia in two southern Somalia towns and impounded office equipment. The above foreign agencies have been found to be working against the benefit of the Somali Muslim population and against the establishment of an Islamic state in Somalia,&#34; the Shebab said in a statement. AFP PHOTO/ MOHAMED DAHIR        (Photo credit should read MOHAMED DAHIR/AFP/GettyImages)</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147107888-1505250810.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147105754-1505250808.jpg?fit=1440%2C1080" medium="image">
			<media:title type="html">The first batch of Ethiopian troops leav</media:title>
			<media:description type="html">The first batch of Ethiopian troops leaving the Somali capital Mogadishu hold a departure ceremony 23 January 2007 at Afisiyooni Air Base.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-147105754-1505250808.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[NSA’s Quiet Presence at a Base in England’s Countryside Revealed in Snowden Documents]]></title>
                <link>https://theintercept.com/2017/09/13/digby-uk-nsa-gchq-surveillance/</link>
                <comments>https://theintercept.com/2017/09/13/digby-uk-nsa-gchq-surveillance/#comments</comments>
                <pubDate>Wed, 13 Sep 2017 19:46:05 +0000</pubDate>
                                    <dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
                                		<category><![CDATA[release-september-2017]]></category>
		<category><![CDATA[World]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=145907</guid>
                                    <description><![CDATA[<p>From a countryside compound in Lincolnshire, British and American spies eavesdropped on the Arab Spring and directed drones in the Middle East.</p>
<p>The post <a href="https://theintercept.com/2017/09/13/digby-uk-nsa-gchq-surveillance/">NSA’s Quiet Presence at a Base in England’s Countryside Revealed in Snowden Documents</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank"><img loading="lazy" decoding="async" class="aligncenter wp-image-65243" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" srcset="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=720 720w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=540 540w" sizes="auto, (max-width: 720px) 100vw, 720px" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p><u>Civil war was</u> raging in Libya, and Col. Moammar Gadhafi was in hiding. Two thousand miles away, on the outskirts of a small village in the English countryside, British and American spies were monitoring the chaos, listening in on the Gadhafi regime’s phone calls.</p>
<p>The spies were part of a group known as Joint Service Signal Unit Digby, operating from within a nearly 100-year-old military base near the village of Ashby de la Launde in Lincolnshire, a county in England’s east midlands. About a three-hour drive north of London, it is a scantly populated area encompassing flat fields that stretch across the landscape. The British government says publicly that the Digby facility conducts “research into new communications systems.” A more truthful account is that it is an important part of the sprawling covert surveillance network maintained by British and American spy agencies, GCHQ and the National Security Agency.</p>
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221000px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1000px;"><!-- CONTENT(photo)[1] --> <a href="https://theintercept.com/wp-content/uploads/2017/09/Aerials_at_R.A.F._Digby_-_geograph.org_.uk_-_490129-1505248774.jpg"><img data-recalc-dims="1" height="99999" width="1000" decoding="async" class="aligncenter size-article-large wp-image-145975" src="https://theintercept.com/wp-content/uploads/2017/09/Aerials_at_R.A.F._Digby_-_geograph.org_.uk_-_490129-1505248774.jpg?fit=1000%2C99999" alt="Aerials_at_R.A.F._Digby_-_geograph.org_.uk_-_490129-1505248774" /></a>
<figcaption class="caption source">Aerials at Royal Air Force Digby on July 9, 2007.<br/>Photo: Ian Paterson/Wikipedia</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] -->
<p>Digby has attracted little media scrutiny in the United Kingdom, perhaps because it is smaller in size and not as visually striking as other surveillance bases in the country. It consists of a nondescript, single-story building and a series of attached offices, all in the southwest corner of a larger military compound. There is an adjacent field equipped with about two dozen antennas, according to <a href="http://www.streetmap.co.uk/map.srf?X=504150&amp;Y=357090&amp;A=Y&amp;Z=115">maps</a> of the area, but these cannot be seen from a distance. Unlike better-known NSA and GCHQ bases in England, such as the facilities in <a href="https://www.cornwalls.co.uk/photos/gchq-cso-morwenstow-gchq-bude-2592.htm">Bude</a>, Cornwall, and <a href="https://theintercept.com/2016/09/06/nsa-menwith-hill-targeted-killing-surveillance/">Menwith Hill</a>, Yorkshire, there are no massive, golf ball-like domes visible from miles away; instead, Digby blends in with the landscape.</p>
<p>The NSA’s presence at Digby has never been reported before. And secret documents published Wednesday by The Intercept show that the agency has prized its low profile at the obscure site. The base “does not attract the kind of press attention lavished on RAF Menwith Hill to the north &#8212; and long may that continue,” one NSA employee wrote in <a href="https://theintercept.com/snowden-sidtoday/3991133-the-other-end-to-end-sigint-site-in-the-uk/">a March 2005 article for SIDtoday</a>, an internal NSA newsletter. “The American presence here is a quiet one,” the employee added, “but [it] has a profound impact as soldiers, sailors and airmen work together with their British counterparts to produce critical intelligence on an amazing variety of targets.”</p>
<p>The documents, obtained from NSA whistleblower Edward Snowden, indicate that Digby focuses on monitoring communications across the Middle East and North Africa. In recent years, it has targeted Lebanese, Sudanese, and Palestinian communications. And through the Arab Spring uprisings that spread across the region between 2010 and 2011, the base was at the forefront of British and American government efforts to get a handle on events.</p>
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[2] --> <a href="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-129259830-1505248781.jpg"><img loading="lazy" decoding="async" width="3600" height="2400" class="aligncenter size-large wp-image-145978" src="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-129259830-1505248781.jpg" alt="National Transitional Council (NTC) fighters confiscate posters of former Libyan leader Moammar Gadhafi in the apartment of a man suspected of being a loyalist in the restive Abu Salim district of Tripoli October 15, 2011. AFP PHOTO/MARCO LONGARI (Photo credit should read MARCO LONGARI/AFP/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-129259830-1505248781.jpg?w=3600 3600w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-129259830-1505248781.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-129259830-1505248781.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-129259830-1505248781.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-129259830-1505248781.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-129259830-1505248781.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-129259830-1505248781.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-129259830-1505248781.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2017/09/GettyImages-129259830-1505248781.jpg?w=2400 2400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">National Transitional Council fighters confiscate posters of former Libyan leader Moammar Gadhafi in the apartment of a man suspected of being a loyalist in the restive Abu Salim district of Tripoli, Oct. 15, 2011.<br/>Photo: Marco Longari/AFP/Getty Images</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->
<p>In Libya, where pro-democracy protests spiraled into a full-blown civil war, Digby’s electronic eavesdroppers were at one point working 24 hours a day, seven days a week to analyze what was happening on the ground. In mid-May 2011, with the conflict at its height and a NATO-led coalition enforcing a no-fly zone across the North African country, GCHQ employees at the Lincolnshire spy base identified their primary target as “Libyan regime command and control use of mobile satellite phones.” By late June, the Digby team was still tapping into the regime’s calls, but it was also focused on gathering intelligence about the command and control structure of opposition forces located in the mountainous Jabal Nafusa area, about 120 miles southwest of Tripoli.</p>
<p>Similarly, through the conflict in Syria, personnel at Digby closely watched the situation. A top-secret April 2013 <a href="https://theintercept.com/document/2017/09/12/nsa-posture-on-syria">document</a>, authored by senior NSA officials, noted that GCHQ staff at the base were paying particular attention to Syrian President Bashar al-Assad’s security services in the country’s coastal region. A small team of five Digby-based analysts were tasked with the Syrian surveillance mission, according to the document, after the intelligence community assessed that the “regime will relocate and create a strong-hold there [on the coast] should Damascus fall.”</p>
<p>Digby’s function is not limited to that of a passive observer, however. Its central mission, one GCHQ document explains, is to “produce and deliver near-real time intelligence … in order to support military and contingency operations.” It has been integral to a program code-named &#8220;<a href="https://theintercept.com/document/2017/09/12/uk-airhandler-trainees">AIRHANDLER</a>,&#8221; for example, which uses surveillance equipment on Predator and Reaper drones to gather data that is then passed to military commanders. During one six-month period in 2009, there were 148 AIRHANDLER missions flown out of Digby – averaging about five each week. The base was also equipped with a <a href="https://theintercept.com/document/2017/09/12/digby-geolocation">capability</a> enabling it to perform “(near) real-time co-location” of GSM cellphones.</p>
<!-- BLOCK(photo)[3](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221000px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1000px;"><!-- CONTENT(photo)[3] --><a href="https://theintercept.com/wp-content/uploads/2017/09/digby-1505248777.jpg"><img data-recalc-dims="1" height="99999" width="1000" decoding="async" class="aligncenter size-article-large wp-image-145977" src="https://theintercept.com/wp-content/uploads/2017/09/digby-1505248777.jpg?fit=1000%2C99999" alt="digby-1505248777" /></a>
<figcaption class="caption source">An aerial photograph of the Digby surveillance center, sourced from the Snowden archive.<br/>Photo: NSA</figcaption><!-- END-CONTENT(photo)[3] --></figure><!-- END-BLOCK(photo)[3] -->
<p>The documents indicate that Digby’s assistance to military forces on the ground has centered around missions in Iraq and Afghanistan, where British and American troops have been deployed. But the facility also carries out a broader global role when it comes to providing tactical military support. One confidential document describes Digby as a “<a href="https://theintercept.com/document/2017/09/12/cryptologic-shore-support">unique</a>” site because it has a joint British and American navy surveillance department within it. This department – known as a Maritime Cryptologic Integration Center – backs up mobile sea, air, and land units operating in parts of the North Atlantic Ocean, the Barents, Baltic, and Black seas, and across North and sub-Saharan Africa.</p>
<p>According to the 2005 NSA report, in addition to providing direct support to operations in Iraq and Afghanistan, Digby performs an “incredibly diverse” mission that is tailored to the intelligence needs of U.S. Strategic Command, Central Command, Northern Command, and European Command. In recent years, it is likely that its capabilities have been expanded. A GCHQ planning document dated from 2011 revealed that the British agency was working to broaden Digby’s function, “growing a cyber mission” out of the base. The agency also wanted to develop a “center of excellence” at the facility, which it said would be a key hub for delivering intelligence to “military partners and customers.”</p>
<p>The NSA and GCHQ declined to comment for this story. GCHQ said in a statement that its work “is carried out in accordance with a strict legal and policy framework, which ensures that our activities are authorised, necessary, and proportionate.”</p>
<p>Other NSA documents — some 294 — and related stories released by The Intercept today <a href="https://theintercept.com/snowden-sidtoday/">are available here</a>.</p>
<p>———</p>
<p><em>Documents published with this article: </em></p>
<ul>
<li><a href="https://theintercept.com/snowden-sidtoday/3991133-the-other-end-to-end-sigint-site-in-the-uk/">The other end-to-end SIGINT site in the UK</a></li>
<li><a href="https://theintercept.com/document/2017/09/12/airhandler-missions-feb-2010">AIRHANDLER missions Feb 2010</a></li>
<li><a href="https://theintercept.com/document/2017/09/12/cryptologic-shore-support">Cryptologic shore support</a></li>
<li><a href="https://theintercept.com/document/2017/09/12/producing-the-best-possible-sigint-on-sudan">Producing the best possible SIGINT on Sudan</a></li>
<li><a href="https://theintercept.com/document/2017/09/12/virtual-teaming-pays-off">Virtual teaming pays off</a></li>
<li><a href="https://theintercept.com/document/2017/09/12/nsa-posture-on-syria">NSA posture on Syria</a></li>
<li><a href="https://theintercept.com/document/2017/09/12/uk-airhandler-trainees">UK AIRHANDLER trainees</a></li>
<li><a href="https://theintercept.com/document/2017/09/12/event-rare-weekly-summaries">Event RARE weekly summaries</a></li>
<li><a href="https://theintercept.com/document/2017/09/12/digby-geolocation">Digby geolocation</a></li>
</ul>
<p class="caption">Top photo: Image of U.K. Digby base from Google Maps.</p>
<p>The post <a href="https://theintercept.com/2017/09/13/digby-uk-nsa-gchq-surveillance/">NSA’s Quiet Presence at a Base in England’s Countryside Revealed in Snowden Documents</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2017/09/13/digby-uk-nsa-gchq-surveillance/feed/</wfw:commentRss>
                <slash:comments>7</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2017/09/digby-googlemap-1505248776.jpg?fit=1440%2C720' width='1440' height='720' /><post-id xmlns="com-wordpress:feed-additions:1">145907</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?fit=720%2C98" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/09/Aerials_at_R.A.F._Digby_-_geograph.org_.uk_-_490129-1505248774.jpg?fit=1000%2C634" medium="image">
			<media:title type="html">Aerials_at_R.A.F._Digby_-_geograph.org_.uk_-_490129-1505248774</media:title>
			<media:description type="html">Aerials at R.A.F. Digby on July 9, 2007.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/09/Aerials_at_R.A.F._Digby_-_geograph.org_.uk_-_490129-1505248774.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-129259830-1505248781.jpg?fit=3600%2C2400" medium="image">
			<media:title type="html">National Transitional Council (NTC) figh</media:title>
			<media:description type="html">National Transitional Council (NTC) fighters confiscate posters of former Libyan leader Moamer Kadhafi in the apartment of a man suspected of being a loyalist in the restive Abu Salim district of Tripoli October 15, 2011, one day after pro-Kadhafi gunmen clashed with fighters loyal to the Libya&#039;s new rulers in the neighbourhood known to harbour supporters of the fugitive strongman.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/09/GettyImages-129259830-1505248781.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/09/digby-1505248777.jpg?fit=1000%2C565" medium="image">
			<media:title type="html">digby-1505248777</media:title>
			<media:description type="html">Aerial view of Digby.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/09/digby-1505248777.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[NSA Broke the Encryption on File-Sharing Apps Kazaa and eDonkey]]></title>
                <link>https://theintercept.com/2017/09/13/nsa-broke-the-encryption-on-file-sharing-apps-kazaa-and-edonkey/</link>
                <comments>https://theintercept.com/2017/09/13/nsa-broke-the-encryption-on-file-sharing-apps-kazaa-and-edonkey/#comments</comments>
                <pubDate>Wed, 13 Sep 2017 19:45:40 +0000</pubDate>
                                    <dc:creator><![CDATA[Micah Lee]]></dc:creator>
                                		<category><![CDATA[release-september-2017]]></category>
		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=134576</guid>
                                    <description><![CDATA[<p>The spy agency didn’t care about copyright violations; it was trying to determine if it could find valuable intelligence.</p>
<p>The post <a href="https://theintercept.com/2017/09/13/nsa-broke-the-encryption-on-file-sharing-apps-kazaa-and-edonkey/">NSA Broke the Encryption on File-Sharing Apps Kazaa and eDonkey</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank"><img loading="lazy" decoding="async" class="aligncenter wp-image-65243" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" srcset="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=720 720w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=540 540w" sizes="auto, (max-width: 720px) 100vw, 720px" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p><u>Before services like</u> Spotify and Netflix proliferated, people who wanted to listen to music or watch movies online, on demand, had few legal options. Instead, they would download copies of pirated media using file-sharing technology. In early 2004, <a href="http://www.pewinternet.org/files/old-media//Files/Reports/2003/PIP_Copyright_Memo.pdf.pdf">close to 8 million people</a> in the U.S. alone were estimated to have downloaded music through so-called peer-to-peer apps like LimeWire, eDonkey, Kazaa, and BitTorrent. While it’s difficult to measure exactly how much of the world’s internet traffic consists of people swapping files, at the time some estimates <a href="http://www.caida.org/publications/papers/2004/p2p-dying/p2p-dying.pdf">said</a> it was approaching 40 percent. (It was closer to 11 percent by 2016, according to another <a href="http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/complete-white-paper-c11-481360.html#_Toc484531509">estimate</a>.)</p>
<p>With this much file sharing occurring online, it’s no surprise that the National Security Agency took notice. According to documents provided by NSA whistleblower Edward Snowden, the spy agency formed a research group dedicated to studying peer-to-peer, or P2P, internet traffic. NSA didn’t care about violations of copyright law, according to <a href="https://theintercept.com/snowden-sidtoday/3991308-the-answer-is-peer-to-peer-file-sharing/">a 2005 article on one of the agency&#8217;s internal news sites, SIDtoday</a>. It was trying to determine if it could find valuable intelligence by monitoring such activity.</p>
<p>“By searching our collection databases, it is clear that many targets are using popular file sharing applications,” a researcher from NSA’s File-Sharing Analysis and Vulnerability Assessment Pod wrote in a SIDtoday article. “But if they are merely sharing the latest release of their favorite pop star, this traffic is of dubious value (no offense to Britney Spears intended).”</p>
<p>In order to monitor peer-to-peer networks, the NSA needed to both decode the protocols that various services used and, in some cases, break the encryption to see which files were being swapped. This last hurdle was cleared in at least two cases. “We have developed the capability to decrypt and decode both Kazaa and eDonkey traffic to determine which files are being shared, and what queries are being performed,” the researcher wrote.</p>
<p>The NSA developed ways to exploit Kazaa in order to extract information from registry entries stored on a computer, including “e-mail addresses, country codes, user names, location of the downloaded files, and a list of recent searches &#8212; encrypted of course,” according to the article. And, while the author doesn&#8217;t go into details, they claim that they “discovered that our targets are using P2P systems to search for and share files which are at the very least somewhat surprising &#8212; not simply harmless music and movie files.”</p>
<p>Kazaa is no longer in use and its website shut down in 2012.</p>
<p>The eDonkey network, however, is still active, although the system is not nearly as popular as it once was. EDonkey still uses the same vulnerable encryption it did in 2004. EMule, a popular program for connecting to the eDonkey network, hasn’t had an update in over seven years.</p>
<p>A representative of the eMule developer team told The Intercept that security was never a goal for eDonkey&#8217;s encryption. “EMule calls its protocol encryption ‘obfuscation’ rather than encryption,” the developer said. “It was a feature intended to stop ISPs and local routers from throttling the protocol by doing simple deep packet inspections, not one to mainly protect the communication against eavesdropping.”</p>
<p>“There is no doubt the NSA could spy on the traffic if they wanted to,” the developer added, “preventing this was not the aim of the protocol encryption (and not much of an issue back then in the old days when this feature was coded).”</p>
<p>Researchers from NSA’s FAVA Pod were not the only spooks interested in peer-to-peer technology. An NSA program called GRIMPLATE was developed to study how Department of Defense employees used BitTorrent, discover if this use was malicious, and potentially build a case for ending such use. According to a <a href="https://theintercept.com/document/2017/09/13/grimplate-first-steps-toward-identifying-adversarial-use-of-bittorrent">classified presentation</a> from the 2012 iteration of the NSA&#8217;s annual SIGDEV conference, which aims to develop new sources of signals intelligence, “BitTorrent sessions are seen on a daily basis between NIPRnet hosts,” referring to computers on the DOD network for sensitive but unclassified information, “and [in] adversary space,” that is, outside networks run by U.S. targets like Russia and China.</p>
<p>By 2010, the British electronic eavesdropping agency Government Communications Headquarters was also interested in “active P2P exploitation research,” <a href="https://theintercept.com/document/2017/09/13/sebacium-from-gcwiki">according to a page on an internal GCHQ wiki</a>. The page describes DIRTY RAT, a GCHQ web application used by analysts that at the time had “the capability to identify users sharing/downloading files of interest on the eMule (Kademlia) and BitTorrent networks. &#8230; For example, we can report on who (IP address and user ID) is sharing files with ‘jihad’ in the filename on eMule. If there is a new publication of an extremist magazine then we can report who is sharing that unique file on the eMule and BitTorrent networks.”</p>
<p>The wiki article also hints at information sharing with law enforcement. “DIRTY RAT will soon be delivered to the [London] Metropolitan Police and we are in the early stages of relationships with [U.K. child protection agency] CEOP and the FBI,” it stated.</p>
<p>GCHQ also developed the technology to leverage its peer-to-peer monitoring for active attacks against users of file-sharing networks. A tool called PLAGUE RAT “has the capability to alter the search results of eMule and deliver tailored content to a target,&#8221; the wiki article states. “This capability has been tested successfully on the Internet against ourselves and testing against a real target is being pursued.”</p>
<p>NSA declined to comment. GCHQ did not address specific questions and sent a statement saying, “All of GCHQ’s work is carried out in accordance with a strict legal and policy framework, which ensures that our activities are authorized, necessary, and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Investigatory Powers Commissioner&#8217;s Office (IPCO), and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position. In addition, the U.K.’s interception regime is entirely compatible with the European Convention on Human Rights.”</p>
<p>Other stories and NSA documents released today by The Intercept are available on <a href="https://theintercept.com/snowden-sidtoday/">our SIDtoday home page</a>.</p>
<p class="caption">Top photo: Kazaa&#8217;s website for music downloads.</p>
<p>The post <a href="https://theintercept.com/2017/09/13/nsa-broke-the-encryption-on-file-sharing-apps-kazaa-and-edonkey/">NSA Broke the Encryption on File-Sharing Apps Kazaa and eDonkey</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2017/09/13/nsa-broke-the-encryption-on-file-sharing-apps-kazaa-and-edonkey/feed/</wfw:commentRss>
                <slash:comments>11</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2017/09/kazaa-sidtoday-1505312068.jpg?fit=1440%2C720' width='1440' height='720' /><post-id xmlns="com-wordpress:feed-additions:1">134576</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?fit=720%2C98" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Japan Made Secret Deals With the NSA That Expanded Global Surveillance]]></title>
                <link>https://theintercept.com/2017/04/24/japans-secret-deals-with-the-nsa-that-expand-global-surveillance/</link>
                <comments>https://theintercept.com/2017/04/24/japans-secret-deals-with-the-nsa-that-expand-global-surveillance/#comments</comments>
                <pubDate>Mon, 24 Apr 2017 09:00:22 +0000</pubDate>
                                    <dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
                                		<category><![CDATA[release-april-2017]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=123473</guid>
                                    <description><![CDATA[<p>Top-secret documents reveal the complex relationship the NSA has maintained with Japan over a period of more than six decades.</p>
<p>The post <a href="https://theintercept.com/2017/04/24/japans-secret-deals-with-the-nsa-that-expand-global-surveillance/">Japan Made Secret Deals With the NSA That Expanded Global Surveillance</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank"><img loading="lazy" decoding="async" class="aligncenter wp-image-65243" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" srcset="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=720 720w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=540 540w" sizes="auto, (max-width: 720px) 100vw, 720px" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p><!-- INLINE(dropcap)[1](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3Anull%7D)(%7B%22text%22%3A%22I%22%7D) --><span data-shortcode-type='dropcap' class='dropcap'><!-- INLINE-CONTENT(dropcap)[1] -->I<!-- END-INLINE-CONTENT(dropcap)[1] --></span><!-- END-INLINE(dropcap)[1] --><u>t began as routinely</u> as any other passenger flight. At gate 15 of New York City&#8217;s JFK Airport, more than 200 men, women, and children stood in line as they waited to board a Boeing 747. They were on their way to Seoul, South Korea&#8217;s capital city. But none would ever make it to their destination. About 14 hours after its departure, the plane was cruising at around 35,000 feet not far from the north of Japan when it was shot out of the sky.</p>
<p>The downing of Korean Airlines Flight 007 occurred on September 1, 1983, in what was one of the Cold War&#8217;s most shocking incidents. The plane had veered off course and for a short time entered Soviet airspace. At Dolinsk-Sokol military base, Soviet commanders dispatched two fighter jets and issued an order to “destroy the intruder.” The plane was hit once by an air-to-air missile and plummeted into the sea, killing all passengers and crew. President Ronald Reagan declared it a “crime against humanity,” marking the dawn of a volatile new chapter in relations between the United States and the Soviet Union. Soon, tensions would escalate to a level not seen since the Cuban missile crisis, which 20 years earlier had brought the world to the brink of nuclear war.</p>
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[2] --> <a href="https://theintercept.com/wp-content/uploads/2017/04/japan-us-nsa-security-flight-007-korean-airlines-russia-1492793023.jpg"><img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-123920" src="https://theintercept.com/wp-content/uploads/2017/04/japan-us-nsa-security-flight-007-korean-airlines-russia-1492793023.jpg?fit=1024%2C1024" alt="Sisters of Lee Chul-Kyu, a passenger on the Ill-fated Korean-Air Lines 747 jetliner, weep, Sept. 2, 1983, as South Korean government spokesman Lee Jin-Hie announced in Seoul, that it was “almost certain” the jetliner had been shot down en route to Seoul, South Korea. (AP Photo/Kim Chon-Kil)" /></a>
<figcaption class="caption source">Sisters of a passenger on Korean Airlines Flight 007 weep as a South Korean government spokesman announced that it was “almost certain” the jetliner had been shot down en route to Seoul on Sept. 2, 1983.<br/>Photo: Kim Chon-Kil/AP</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->
<p>As the international confrontation between the two adversaries played out publicly, behind closed doors another problem — which has never before been revealed — was developing. The U.S. and one of its closest allies, Japan, were embroiled in a dispute involving secret surveillance. Soviet officials were flat-out denying they had any role in shooting down the jet. At a spy base on Japanese territory, however, communications had been intercepted proving the Soviet military was the perpetrator. The U.S. wanted to obtain copies of the tapes but had to first receive approval from the head of a shadowy Japanese surveillance organization known as the “G2 Annex.”</p>
<p>After some bureaucratic wrangling, the Japanese eventually signed off on the release and the highly sensitive recordings were sent to Washington. From there, the tapes were forwarded to New York City, where U.S. Ambassador Jeane Kirkpatrick brought them to the United Nations headquarters in Manhattan. On September 6 — just five days after the Korean Airlines jet was shot down — Kirkpatrick attended a meeting at the U.N. Security Council where she <a href="http://www.upi.com/Archives/1983/09/06/The-following-is-the-full-text-of-the-speech/9884431668800/">blasted</a> the Soviet Union for telling “lies, half lies and excuses” about its involvement in the downing of the plane. She then proceeded to play the copy of the intercepted conversations, stating that the evidence was being presented in “cooperation with the government of Japan.”</p>
<p>The case Kirkpatrick put forward against the Soviets was irrefutable and damning. But Japan&#8217;s spying capabilities had now been exposed — and the country&#8217;s officials were not pleased about it. The G2 Annex received new orders limiting its cooperation with the U.S., which affected the NSA&#8217;s relationship with its Japanese counterparts for the better part of a decade, at least until the Cold War ended in the early 1990s.</p>
<p>The details about the Korean Airlines case are <a href="https://theintercept.com/document/2017/04/24/the-kal-007-shootdown">revealed</a> in classified National Security Agency documents, obtained by The Intercept from the whistleblower Edward Snowden. The documents, published Monday in collaboration with Japanese news broadcaster <a href="http://www3.nhk.or.jp/news/html/20170424/k10010959721000.html">NHK</a>, reveal the complicated relationship the NSA has maintained with Japan over a period of more than six decades. Japan has allowed NSA to maintain at least three bases on its territory and contributed more than half a billion dollars to help finance the NSA&#8217;s facilities and operations. In return, NSA has kitted out Japanese spies with powerful surveillance tools and shared intelligence with them. However, there is a duplicitous dimension to the partnership. While the NSA has maintained friendly ties with its Japanese counterparts and benefited from their financial generosity, at the same time it has secretly spied on Japanese officials and institutions.</p>
<p>The NSA declined to comment for this story.</p>
<!-- BLOCK(photo)[3](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[3] --> <a href="https://theintercept.com/wp-content/uploads/2017/04/japan-nsa-hiroshima-nagasaki-us-1492701923.jpg"><img loading="lazy" decoding="async" width="2000" height="1561" class="aligncenter size-large wp-image-123603" src="https://theintercept.com/wp-content/uploads/2017/04/japan-nsa-hiroshima-nagasaki-us-1492701923.jpg" alt="View of the radioactive plume from the bomb dropped on Nagasaki City, as seen from 9.6 km away, in Koyagi-jima, Japan, August 9, 1945. The US B-29 superfortress Bockscar dropped the atomic bomb nicknamed 'Fat Man,' which detonated above the ground, on northern part of Nagasaki City just after 11am. (Photo by Hiromichi Matsuda/Handout from Nagasaki Atomic Bomb Museum/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2017/04/japan-nsa-hiroshima-nagasaki-us-1492701923.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2017/04/japan-nsa-hiroshima-nagasaki-us-1492701923.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2017/04/japan-nsa-hiroshima-nagasaki-us-1492701923.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2017/04/japan-nsa-hiroshima-nagasaki-us-1492701923.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2017/04/japan-nsa-hiroshima-nagasaki-us-1492701923.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2017/04/japan-nsa-hiroshima-nagasaki-us-1492701923.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2017/04/japan-nsa-hiroshima-nagasaki-us-1492701923.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">View of the radioactive plume from the bomb dropped on Nagasaki, as seen from 9.6 kilometers away, in Koyagi-jima, Japan, on Aug. 9, 1945.<br/>Photo: Hiromichi Matsuda/Nagasaki Atomic Bomb Museum/Getty Images</figcaption><!-- END-CONTENT(photo)[3] --></figure><!-- END-BLOCK(photo)[3] -->
<p><!-- INLINE(dropcap)[4](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3Anull%7D)(%7B%22text%22%3A%22O%22%7D) --><span data-shortcode-type='dropcap' class='dropcap'><!-- INLINE-CONTENT(dropcap)[4] -->O<!-- END-INLINE-CONTENT(dropcap)[4] --></span><!-- END-INLINE(dropcap)[4] --><u>n August 14, 1945,</u> Japan announced its unconditional surrender just days after U.S. Air Force planes dropped two atomic bombs on the cities of Nagasaki and Hiroshima, killing more than 100,000 people. The war was over, but as part of the peace agreement, Japan agreed to U.S. military occupation. American forces — led by Gen. Douglas MacArthur — drafted a new Japanese constitution and reformed the country&#8217;s parliamentary system. In April 1952, Japan&#8217;s sovereignty was restored, but the U.S. continued to maintain a major presence in the country — and that is where the NSA&#8217;s story begins.</p>
<p>According to the agency&#8217;s <a href="https://theintercept.com/document/2017/04/24/nsa-liaison-in-tokyo-opens-new-office">documents</a>, its relationship with Japan dates back to the 1950s. NSA’s presence in the country was for many years managed out of a “cover office” in the Minato area of downtown Tokyo, within a U.S. military compound called the Hardy Barracks. From there, NSA maintained close relations with a Japanese surveillance agency that it refers to as Japan&#8217;s Directorate for Signals Intelligence, or SIGINT.</p>
<p>At first, the NSA appears to have kept a low profile in Japan, concealing details about its presence and operating undercover. But as its relationship with the country developed, that changed. By 2007, the agency had determined that “cover operations are no longer required” and it relocated its main office in Japan to a space within the U.S. Embassy in Tokyo. “NSA&#8217;s partnership with Japan continues to grow in importance,” the agency noted in a classified October 2007 report, adding that it planned to take the country “to the next level as an intelligence partner with the U.S.”</p>
<p>Beyond Tokyo, NSA has a presence today at several other facilities in Japan. The most important of these is located at a large U.S. airbase in Misawa, about 400 miles north of Tokyo. At what it calls its “Misawa Security Operations Center,” the agency carries out a mission under the code name LADYLOVE. Using about a dozen powerful antennas contained within large golf ball-like white domes, it vacuums up communications — including phone calls, faxes, and internet data — that are transmitted across satellites in the Asia-Pacific region.</p>
<!-- BLOCK(photo)[5](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[5] --> <a href="https://theintercept.com/wp-content/uploads/2017/04/japan-nsa-Keith-aelxander-Security-1492702257.jpg"><img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-123617" src="https://theintercept.com/wp-content/uploads/2017/04/japan-nsa-Keith-aelxander-Security-1492702257.jpg?fit=1024%2C1024" alt="Army Lt. Gen. Keith Alexander, director of the National Security Agency, reviews his notes, while testifying on Capitol Hill in Washington, Tuesday, May 1, 2007, before the Senate Intelligence Committee. (AP Photo/Haraz N. Ghanbari)" /></a>
<figcaption class="caption source">Army Lt. Gen. Keith Alexander, former director of the National Security Agency, reviews his notes while testifying on Capitol Hill in Washington on May 1, 2007.<br/>Photo: Haraz N. Ghanbari/AP</figcaption><!-- END-CONTENT(photo)[5] --></figure><!-- END-BLOCK(photo)[5] -->
<p>As of March 2009, Misawa was being used to monitor “over 8,000 signals on 16 targeted satellites,” one NSA document <a href="https://theintercept.com/document/2017/04/24/shift-to-software-demodulation-in-misawa-expands-collection-saves-money">noted</a>. At the same time, the agency was working on beefing up the spy hub&#8217;s systems, so that it could meet a challenge set by then-Director Keith Alexander to “collect it all” — meaning, to sweep up as many communications as possible. Misawa&#8217;s NSA employees responded to Alexander&#8217;s call by developing technology to automatically scan and process more satellite signals. “There are multitude of possibilities,” one Misawa-based NSA engineer <a href="https://theintercept.com/document/2017/04/24/shift-to-software-demodulation-in-misawa-expands-collection-saves-money">reported</a>, predicting that the base would soon be “one step closer to &#8216;collecting it all.&#8217;”</p>
<p>Strategically, Japan is one of the NSA&#8217;s most valuable partners. Because of its close proximity to major U.S. rivals like China and Russia, it has been used as a launching pad to spy on those countries. But NSA&#8217;s operations in Japan are not limited to monitoring the communications of nearby adversaries. At Misawa, the NSA deployed programs called APPARITION and GHOSTHUNTER, which pinpoint the locations of people accessing the internet across the Middle East and North Africa. NSA documents detailing GHOSTHUNTER’s deployment at <a href="https://theintercept.com/2016/09/06/nsa-menwith-hill-targeted-killing-surveillance/">the NSA’s British base Menwith Hill</a> state the program was used to facilitate lethal strikes, enabling “a significant number of capture-kill operations” against alleged terrorists. One <a href="https://theintercept.com/document/2016/09/06/apparition-becomes-a-reality-new-corporate-vsat-geolocation-capability-sees-its-first-deployment/">November 2008 document</a> noted that Misawa had proved particularly useful in tracking down terror suspects in Afghanistan and Pakistan, and was also being used in an effort to identify targets in Indonesia.</p>
<p>Over the past decade, the NSA&#8217;s tactics have evolved dramatically — and it has rolled out new and more controversial methods. By 2010, with the internet surging in popularity, the agency was continuing to focus on long-established spying tactics like eavesdropping on phone calls, but it was increasingly adopting more aggressive methods, such as hacking into its targets&#8217; computers.</p>
<p>At Misawa, the NSA <a href="https://theintercept.com/wp-content/uploads/2017/04/misawa-quantum-1492963760.png">began integrating hacking operations</a> into its repertoire of capabilities. One such method it deployed at the base is called a “<a href="https://theintercept.com/document/2014/03/12/quantum-insert-diagrams/">Quantum Insert</a>” attack, which involves monitoring the internet browsing habits of people targeted for surveillance, before covertly redirecting them to a malicious website or server that infects their computers with an “implant.” The implant then collects data from the infected computer and returns it to the NSA for analysis. “If we can get the target to visit us in some sort of web browser, we can probably own them,” an NSA employee claims in <a href="https://theintercept.com/wp-content/uploads/2017/04/quantum-foxacid-1492987089.png">one document</a> describing the hacking techniques. “The only limitation is the ‘how.’”</p>
<!-- BLOCK(photo)[6](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[6] --> <a href="https://theintercept.com/wp-content/uploads/2017/04/nsa-us-yokota-air-base-nsa-1492725254.jpg"><img loading="lazy" decoding="async" width="2850" height="1953" class="aligncenter size-large wp-image-123789" src="https://theintercept.com/wp-content/uploads/2017/04/nsa-us-yokota-air-base-nsa-1492725254.jpg" alt="epa04756429 US Marine Corps MV-22 Osprey aircrafts are sitting on the tarmac at US Marine Corps Air Station Futenma surrounded by overcrowded residential areas in Ginowan on Okinawa Island, southwestern Japan, 19 May 2015. Japanese government just announced on May 12 that CV-22 Ospreys would be deployed to the U.S. Air Force's Yokota base on the outskirt of Tokyo. CV-22 Ospreys is for special operations forces, engage in low-altitude and nighttime flights, and the accident rate is three times higher than Marines MV-22 Ospreys. Japanese four local cities' leaders in Tokyo surrounding US Air Force's Yokota Base have expressed deep concern over the deployment of CV-22 Ospreys in 2017, as Pentagon announced on 18 May 2015 it had no plan to change Osprey operations in Japan after a CV-22 Osprey crash in Hawaii killing one and injuring 21 on last weekend.  EPA/HITOSHI MAESHIRO" srcset="https://theintercept.com/wp-content/uploads/2017/04/nsa-us-yokota-air-base-nsa-1492725254.jpg?w=2850 2850w, https://theintercept.com/wp-content/uploads/2017/04/nsa-us-yokota-air-base-nsa-1492725254.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2017/04/nsa-us-yokota-air-base-nsa-1492725254.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2017/04/nsa-us-yokota-air-base-nsa-1492725254.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2017/04/nsa-us-yokota-air-base-nsa-1492725254.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2017/04/nsa-us-yokota-air-base-nsa-1492725254.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2017/04/nsa-us-yokota-air-base-nsa-1492725254.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2017/04/nsa-us-yokota-air-base-nsa-1492725254.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2017/04/nsa-us-yokota-air-base-nsa-1492725254.jpg?w=2400 2400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">U.S. Marine Corps MV-22 Osprey aircraft sit on the tarmac at U.S. Marine Corps Air Station Futenma on Okinawa Island, Japan, on May 19, 2015.<br/>Photo: Hitoshi Maeshiro/EPA/Redux</figcaption><!-- END-CONTENT(photo)[6] --></figure><!-- END-BLOCK(photo)[6] -->
<p><!-- INLINE(dropcap)[7](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3Anull%7D)(%7B%22text%22%3A%22T%22%7D) --><span data-shortcode-type='dropcap' class='dropcap'><!-- INLINE-CONTENT(dropcap)[7] -->T<!-- END-INLINE-CONTENT(dropcap)[7] --></span><!-- END-INLINE(dropcap)[7] --><u>he Yokota Air Base,</u> another U.S. military facility, sits at the foothills of Okutama mountains near the city of Fussa. The base is about a 90-minute drive west from central Tokyo and houses more than 3,400 personnel. According to the U.S. Air Force, Yokota&#8217;s function is to “enhance the U.S. deterrent posture and, if necessary, provide fighter and military airlift support for offensive air operations.” But it also serves another, more secret, purpose.</p>
<p>NSA documents <a href="https://theintercept.com/document/2017/04/24/nsa-opens-new-engineering-support-facility-in-japan">reveal</a> that Yokota is home to what the agency calls its Engineering Support Facility, which supplies equipment used for surveillance operations across the world. In 2004, the agency opened a major new 32,000 square foot building at the site – about half the size of a football field – for the repair and manufacture of surveillance antennas it said would be used in places like Afghanistan, Korea, Thailand, the Balkans, Iraq, Central and South America, and Cyprus. The construction cost $6.6 million, which was paid almost entirely by the government of Japan, a July 2004 NSA report stated. Within the facility, Japan would finance the staff as well, the report noted, including seven designers, machinists, and other specialists, who were collectively receiving salaries worth $375,000.</p>
<p>About 1,200 miles southwest of Yokota is the NSA&#8217;s most remote Japanese spying station, located on the island of Okinawa at a large U.S. Marine Corps base called Camp Hansen. It, too, has greatly benefited from a massive injection of Japanese money. In the early 2000s, NSA constructed a state-of-the-art surveillance facility on the island, paid for in full by Japan at a cost of some $500 million, according to <a href="https://theintercept.com/document/2017/04/24/the-story-behind-the-move/">the agency&#8217;s documents</a>. The site was carved out of a “dense, hilly area” called Landing Zone Ostrich that the Marines had previously used for jungle training. The facility, built to include an “antenna field” for its spying missions, was designed to be low profile, blending in with the landscape. It <a href="https://theintercept.com/snowden-sidtoday/3008482-collection-facility-goes-low-profile-on-okinawa/">replaced a previous spy hub</a> NSA had maintained on Okinawa that the island&#8217;s Japanese residents had complained was unsightly. The role of the remote eavesdropping station is to collect high-frequency communications signals as part of a mission called STAKECLAIM. The NSA does not appear to have a large number of employees stationed on the island; instead, it remotely operates the Okinawa facility from a “24-hour collection operations center” in Hawaii.</p>
<p>Hiroshi Miyashita, a former Japanese government data protection official, told The Intercept that Japan&#8217;s funding of U.S. intelligence activities is withheld from public disclosure under a state secrecy law, which he criticized. “It&#8217;s our money — Japanese taxpayers&#8217; money,” he said. “We should know how much was spent for intelligence activities in Japan.” Miyashita, now an associate professor at Chuo University in Tokyo, said it was his understanding that NSA operates in the country outside Japan&#8217;s legal jurisdiction due to <a href="http://www.mofa.go.jp/region/n-america/us/security/agree0009.html">an agreement</a> that grants U.S. military facilities in Japan extraterritoriality. “There is no oversight mechanism,&#8221; Miyashita said. &#8220;There is limited knowledge of activities within the bases.”</p>
<!-- BLOCK(photo)[8](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[8] --> <a href="https://theintercept.com/wp-content/uploads/2017/04/nsa-us-japan-camp-hansen-1492725506.jpg"><img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-123794" src="https://theintercept.com/wp-content/uploads/2017/04/nsa-us-japan-camp-hansen-1492725506.jpg?fit=1024%2C1024" alt="NAHA, Japan - Members of the U.S. Marine Corps test fire M110 rifles, the newest model, at Camp Hansen in Okinawa Prefecture on Jan. 12, 2011. (Kyodo)" /></a>
<figcaption class="caption source">Members of the U.S. Marine Corps test fire M110 rifles at Camp Hansen in Okinawa Prefecture on Jan. 12, 2011.<br/>Photo: Kyodo/AP</figcaption><!-- END-CONTENT(photo)[8] --></figure><!-- END-BLOCK(photo)[8] -->
<p>As recently as 2013, the NSA claimed to maintain “robust” working relations with its Japanese counterparts. The agency has two surveillance partners in Japan: the Directorate for SIGINT, and the Japanese National Police Agency. Japan has collaborated closely with the NSA on monitoring the communications of neighboring countries, and it also appears to rely heavily on U.S.-provided intelligence about North Korean missile launches. As of February 2013, the NSA was increasingly collaborating with its Japanese counterparts on cybersecurity issues. And in September 2012, Japan began sharing information with the NSA that could be used to identify particular kinds of malicious software being used by hackers. This was the first time the country had shared this kind of data and the NSA viewed it as highly valuable, potentially leading to the prevention or detection of hacking attacks on “critical U.S. corporate information systems.&#8221;</p>
<!-- BLOCK(pullquote)[9](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[9] -->“Japanese citizens know almost nothing about Japanese government surveillance. It is extremely secret.”<!-- END-CONTENT(pullquote)[9] --></blockquote><!-- END-BLOCK(pullquote)[9] -->
<p>In return, the NSA has provided Japanese spies with training, and it has also furnished them with some of its most powerful spying tools. An <a href="https://theintercept.com/document/2017/04/24/japan-provided-with-xkeyscore/">April 2013 document</a> revealed that the NSA had provided the Japanese Directorate for SIGINT with an installation of <a href="https://theintercept.com/2015/07/01/nsas-google-worlds-private-communications/">XKEYSCORE</a>, a mass surveillance system the NSA describes as its “widest reaching” for sweeping up data from computer networks, monitoring &#8220;nearly everything a typical user does on the internet.”</p>
<p>Igeta Daisuke, a Japanese lawyer who specializes in civil liberties cases, said that the XKEYSCORE revelation was “very important” for the country. The Japanese government&#8217;s use of the system could violate Japan&#8217;s Constitution, which protects privacy rights, Daisuke told The Intercept. He added that Japan has a limited legal framework covering surveillance issues, largely because the scope of the government&#8217;s spying has never before been disclosed, debated, or ruled upon by judges. “Japanese citizens know almost nothing about Japanese government surveillance,” said Daisuke. “It is extremely secret.”</p>
<p>The Japanese government&#8217;s defense ministry, which oversees the country&#8217;s surveillance capabilitites, declined to comment.</p>
<!-- BLOCK(photo)[10](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[10] --> <a href="https://theintercept.com/wp-content/uploads/2017/04/bank-of-japan-nsa-us-security-sid-today-files-1492801669.jpg"><img loading="lazy" decoding="async" width="2000" height="1322" class="aligncenter size-large wp-image-123991" src="https://theintercept.com/wp-content/uploads/2017/04/bank-of-japan-nsa-us-security-sid-today-files-1492801669.jpg" alt="Tokyo, JAPAN:  This photo shows the Bank of Japan (BOJ) building in Tokyo, 14 July 2006. Japanese share prices fell sharply in the morning trading before its central bank was widely expected to end over five years of zero interest rates. AFP PHOTO/Kazuhiro NOGI  (Photo credit should read KAZUHIRO NOGI/AFP/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2017/04/bank-of-japan-nsa-us-security-sid-today-files-1492801669.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2017/04/bank-of-japan-nsa-us-security-sid-today-files-1492801669.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2017/04/bank-of-japan-nsa-us-security-sid-today-files-1492801669.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2017/04/bank-of-japan-nsa-us-security-sid-today-files-1492801669.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2017/04/bank-of-japan-nsa-us-security-sid-today-files-1492801669.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2017/04/bank-of-japan-nsa-us-security-sid-today-files-1492801669.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2017/04/bank-of-japan-nsa-us-security-sid-today-files-1492801669.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">The Bank of Japan building in Tokyo on July 14, 2006.<br/>Photo: Kazuhiro Nogi/AFP/Getty Images</figcaption><!-- END-CONTENT(photo)[10] --></figure><!-- END-BLOCK(photo)[10] -->
<p><!-- INLINE(dropcap)[11](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3Anull%7D)(%7B%22text%22%3A%22T%22%7D) --><span data-shortcode-type='dropcap' class='dropcap'><!-- INLINE-CONTENT(dropcap)[11] -->T<!-- END-INLINE-CONTENT(dropcap)[11] --></span><!-- END-INLINE(dropcap)[11] --><u>he NSA works</u> with a diverse range of counterparts in countries across the world — from the United Kingdom and Sweden to Saudi Arabia and Ethiopia. But the agency&#8217;s partnership with Japan is one of its most complex and seems tainted by a degree of distrust, highlighted by the dramatic aftermath of the Korean Airlines incident in 1983.</p>
<p>In <a href="https://theintercept.com/document/2017/04/24/what-are-the-japanese-like-as-siginters">a November 2008 document</a>, one of NSA&#8217;s then most senior officials in Japan offered an insight into the relationship. He described the Japanese as “very accomplished” at conducting signals intelligence but lamented that they were excessively secretive. The country&#8217;s spies were “still caught in a Cold War way of doing business,” the official wrote. “They treat SIGINT as a special-access program — the most sensitive program they have. The result is that they are rather stove-piped, somewhat like NSA was 10-or-more years ago.”</p>
<p>The NSA participates in a group called the SIGINT Seniors Pacific, which has included surveillance agencies from Australia, Canada, the United Kingdom, France, India, New Zealand, Thailand, South Korea, and Singapore. The group keeps tabs on security issues in the Asia-Pacific region — issues of great interest to Japan, given its geographic location. Yet the country refused to join the meetings. “Japan was the only nation who was actually offered membership but turned it down,” wrote one NSA employee in a March 2007 document. “At the time, Japan expressed concerns that unintended disclosure of its participation would be too high a risk and had other reasons as well.”</p>
<p>Some of the difficulties have directly impacted the NSA&#8217;s operations. According to the agency&#8217;s documents, for many years Japan participated in a surveillance program called <a href="https://theintercept.com/document/2017/04/24/crosshair-foreign-partners-filling-hfdf-gaps-for-the-us">CROSSHAIR</a>, which involved sharing intelligence gathered from high-frequency signals. However, in 2009, the country abruptly ceased its participation in the program.</p>
<p>Four years later, the issue was still causing NSA concern. Ahead of a February 2013 meeting the agency had scheduled with the deputy director of Japan&#8217;s Directorate for SIGINT, it prepared <a href="https://theintercept.com/document/2017/04/24/nsa-japan-hf-briefing">a briefing document</a> that outlined the CROSSHAIR problem and warned of a “potential landmine” associated with the discussions. “In the past, the partner has mistakenly perceived that NSA was trying to force [the Directorate for SIGINT] to use U.S. technical solutions in place of their own,” the memo stated. “When this occurred, the partner reacted in a strong, negative manner.”</p>
<p>But while NSA employees may walk on eggshells with Japan during face-to-face meetings, they have taken a different approach on a covert level. An NSA <a href="https://theintercept.com/document/2017/04/24/nsa-policy-and-trade-surveillance-of-japan">document</a> from May 2006 indicated that a division of the agency — called Western Europe and Strategic Partnerships — was spying on Japan in an effort to gather intelligence about its foreign policy and trade activities. Moreover, as of July 2010, the NSA had obtained <a href="https://theintercept.com/wp-content/uploads/2017/04/nsa-blarney-court-orders-1492963793.png">domestic court orders</a> enabling it to conduct surveillance on U.S. territory of Japanese officials and the Bank of Japan, which has offices in Washington, D.C., and New York City.</p>
<p>The NSA&#8217;s covert eavesdropping operations give it an insight into the Japanese government&#8217;s private negotiations and dealmaking. As was the case in late May 2007, during a secret meeting at the luxury Hotel Captain Cook in downtown Anchorage, Alaska.</p>
<!-- BLOCK(photo)[12](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[12] --> <a href="https://theintercept.com/wp-content/uploads/2017/04/international-whaling-commission-alaska-japan-1492711496.jpg"><img loading="lazy" decoding="async" width="2000" height="1330" class="aligncenter size-large wp-image-123680" src="https://theintercept.com/wp-content/uploads/2017/04/international-whaling-commission-alaska-japan-1492711496.jpg" alt="Delegates from more than 70 countries listen to proceedings during the International Whaling Commission meeting 29 May 2007 in Anchorage, Alaska. The fate of the great whales hung in the balance as officials from 75 nations opened talks amid pressure, notably from Japan, to reverse a ban on commercial hunting of the mammals.   AFP PHOTO/Michael CONTI (Photo credit should read Michael Conti/AFP/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2017/04/international-whaling-commission-alaska-japan-1492711496.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2017/04/international-whaling-commission-alaska-japan-1492711496.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2017/04/international-whaling-commission-alaska-japan-1492711496.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2017/04/international-whaling-commission-alaska-japan-1492711496.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2017/04/international-whaling-commission-alaska-japan-1492711496.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2017/04/international-whaling-commission-alaska-japan-1492711496.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2017/04/international-whaling-commission-alaska-japan-1492711496.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source">Delegates from more than 70 countries listen to proceedings during the International Whaling Commission meeting in Anchorage, Alaska, on May 29, 2007.<br/>Photo: Michael Conti/AFP/Getty Images</figcaption><!-- END-CONTENT(photo)[12] --></figure><!-- END-BLOCK(photo)[12] -->
<p>The 59th annual gathering of the International Whaling Commission was being held in the hotel — and Japan was lobbying to end a moratorium preventing countries from hunting whales for commercial purposes. U.S. officials supported maintaining the moratorium and called in the NSA to help spy on Japan&#8217;s representatives ahead of a crucial vote. The agency worked with its New Zealand counterparts to conduct the surveillance. “New Zealand had the target access, and collected and provided insightful SIGINT that laid out the lobbying efforts of the Japanese and the response of countries whose votes were so coveted,” noted <a href="https://theintercept.com/document/2017/04/24/nsa-special-sigint-delivery">an NSA document</a> from July 2007, which outlined the operation.</p>
<p>One morning into the four-day gathering, at 7 a.m., an NSA employee arrived in a taxi at the agency&#8217;s Alaska Mission Operations Center, a 20-minute drive from the hotel. She collected printed copies of the intelligence that had been gathered from the Japanese communications. She then returned to the hotel with the information stored in a locked bag, and brought it to a private conference room in the hotel. There, the material was shared with two U.S. delegates from the Department of Commerce, two officials from the State Department, two representatives from New Zealand, and one from Australia. The officials read the material in silence, pointing and nodding while they studied it.</p>
<p>The 77-member commission voted at the meeting to allow aboriginal whaling for indigenous people in the U.S., Russia, and Greenland. Japan put forward a proposal that it should be permitted to hunt minke whales for similar reasons, claiming that doing so has been part of its culture for thousands of years. But it failed in its efforts; at the end of proceedings in Anchorage, the moratorium stood and Japan was not granted any special exemptions.</p>
<p>Japan&#8217;s representatives were furious and <a href="http://www.reuters.com/article/us-iwc-idUSN3122850020070601">threatened to quit</a> the commission altogether. &#8220;This hypocrisy leads us to seriously question the nature by which Japan will continue participating in this forum,&#8221; complained Joji Morishita, Japan&#8217;s deputy whaling commissioner. As far as NSA was concerned, however, it was a job well done. Whatever intelligence the agency had gathered during the meetings — the specifics of which are not revealed in the document — it had apparently helped sway the vote and scupper Japan&#8217;s plans. “Was the outcome worth the effort? The Australian, New Zealand, and American delegates would all say &#8216;yes,&#8217;” noted one agency employee who was involved in the covert mission. “I believe the whales would concur.”</p>
<p>———<br />
<em>Documents published with this article:</em></p>
<ul>
<li><a href="https://theintercept.com/document/2017/04/24/what-are-the-japanese-like-as-siginters">What are the Japanese like as SIGINTers</a></li>
<li><a href="https://theintercept.com/document/2017/04/24/nsa-opens-new-engineering-support-facility-in-japan">NSA opens new engineering support facility in Japan</a></li>
<li><a href="https://theintercept.com/document/2017/04/24/the-story-behind-the-move/">The story behind the move</a></li>
<li><a href="https://theintercept.com/document/2017/04/24/the-kal-007-shootdown">The KAL 007 shootdown</a></li>
<li><a href="https://theintercept.com/document/2017/04/24/japan-provided-with-xkeyscore/">Japan provided with XKEYSCORE</a></li>
<li><a href="https://theintercept.com/document/2017/04/24/nsa-special-sigint-delivery">NSA special SIGINT delivery</a></li>
<li><a href="https://theintercept.com/document/2017/04/24/us-japan-now-exchanging-collection-from-reconnaissance-missions">U.S. and Japan now exchanging collection from reconnaissance missions</a></li>
<li><a href="https://theintercept.com/document/2017/04/24/shift-to-software-demodulation-in-misawa-expands-collection-saves-money">Shift to software demodulation in Misawa expands collection, saves money</a></li>
<li><a href="https://theintercept.com/document/2017/04/24/nsa-liaison-in-tokyo-opens-new-office">NSA liaison in Tokyo opens new office</a></li>
<li><a href="https://theintercept.com/document/2017/04/24/crosshair-foreign-partners-filling-hfdf-gaps-for-the-us">Crosshair: foreign partners filling HFDF gaps for the U.S.</a></li>
<li><a href="https://theintercept.com/document/2017/04/24/nsa-policy-and-trade-surveillance-of-japan">NSA policy and trade surveillance of Japan</a></li>
<li><a href="https://theintercept.com/document/2017/04/24/nsa-japan-cyber-briefing/">Japan official NSA visit, cyber briefing</a></li>
<li><a href="https://theintercept.com/document/2017/04/24/nsa-japan-hf-briefing">Japan official NSA visit, HF briefing</a></li>
</ul>
<p class="caption">Top photo: US Secretary of Defense Leon Panetta delivers a speech after arriving at the Yokota airforce base in Tokyo on October 24, 2011.</p>
<p>The post <a href="https://theintercept.com/2017/04/24/japans-secret-deals-with-the-nsa-that-expand-global-surveillance/">Japan Made Secret Deals With the NSA That Expanded Global Surveillance</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2017/04/24/japans-secret-deals-with-the-nsa-that-expand-global-surveillance/feed/</wfw:commentRss>
                <slash:comments>56</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2017/04/japan-us-yokota-air-base-nsa-sid-1493047288.jpg?fit=2000%2C1000' width='2000' height='1000' /><post-id xmlns="com-wordpress:feed-additions:1">123473</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?fit=720%2C98" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/04/japan-us-nsa-security-flight-007-korean-airlines-russia-1492793023.jpg?fit=2000%2C1358" medium="image">
			<media:title type="html">grief; emotional; shock</media:title>
			<media:description type="html">Sisters of Lee Chul-Kyu, a passenger on the Ill-fated Korean-Air Lines 747 jetliner, weep as South Korean government spokesman Lee Jin-Hie announced in Seoul, that it was “almost certain” the jetliner had been shot down en route to Seoul, South Korea, on Sept. 2, 1983.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/04/japan-us-nsa-security-flight-007-korean-airlines-russia-1492793023.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/04/japan-nsa-hiroshima-nagasaki-us-1492701923.jpg?fit=2000%2C1561" medium="image">
			<media:title type="html">60th Anniversary Of The Atomic Bomb Of Nagasaki</media:title>
			<media:description type="html">View of the radioactive plume from the bomb dropped on Nagasaki City, as seen from 9.6 km away, in Koyagi-jima, Japan, on Aug. 9, 1945. (Photo by Hiromichi Matsuda/Handout from Nagasaki Atomic Bomb Museum/Getty Images)</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/04/japan-nsa-hiroshima-nagasaki-us-1492701923.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/04/japan-nsa-Keith-aelxander-Security-1492702257.jpg?fit=2000%2C1322" medium="image">
			<media:title type="html">Keith Alexander</media:title>
			<media:description type="html">Army Lt. Gen. Keith Alexander, and former director of the National Security Agency, reviews his notes, while testifying on Capitol Hill in Washington, on May 1, 2007.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/04/japan-nsa-Keith-aelxander-Security-1492702257.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/04/nsa-us-yokota-air-base-nsa-1492725254.jpg?fit=2850%2C1953" medium="image">
			<media:title type="html">US Marine Corps MV-22 Osprey aircrafts sitting at US Marine Corps Air Station Futenma</media:title>
			<media:description type="html">US Marine Corps MV-22 Osprey aircrafts sit on the tarmac at US Marine Corps Air Station Futenma surrounded by overcrowded residential areas in Ginowan on Okinawa Island, southwestern Japan, on May 19, 2015.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/04/nsa-us-yokota-air-base-nsa-1492725254.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/04/nsa-us-japan-camp-hansen-1492725506.jpg?fit=2000%2C1358" medium="image">
			<media:title type="html">U.S. Marines shooting drill at Camp Hansen</media:title>
			<media:description type="html">Members of the U.S. Marine Corps test fire M110 rifles at Camp Hansen in Okinawa Prefecture on Jan. 12, 2011.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/04/nsa-us-japan-camp-hansen-1492725506.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/04/bank-of-japan-nsa-us-security-sid-today-files-1492801669.jpg?fit=2000%2C1322" medium="image">
			<media:title type="html">This photo shows the Bank of Japan (BOJ)</media:title>
			<media:description type="html">The Bank of Japan building in Tokyo, on July 14, 2006.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/04/bank-of-japan-nsa-us-security-sid-today-files-1492801669.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/04/international-whaling-commission-alaska-japan-1492711496.jpg?fit=2000%2C1330" medium="image">
			<media:title type="html">Delegates from more than 80 countries li</media:title>
			<media:description type="html">Delegates from more than 80 countries listen to proceedings during the International Whaling Commission meeting in Anchorage, Alaska, on May 29, 2007.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/04/international-whaling-commission-alaska-japan-1492711496.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Drowning in Information: NSA Revelations From 262 Spy Documents]]></title>
                <link>https://theintercept.com/2016/12/07/drowning-in-information-nsa-revelations-from-262-spy-documents/</link>
                <comments>https://theintercept.com/2016/12/07/drowning-in-information-nsa-revelations-from-262-spy-documents/#comments</comments>
                <pubDate>Wed, 07 Dec 2016 17:40:35 +0000</pubDate>
                                    <dc:creator><![CDATA[Micah Lee]]></dc:creator>
                                    <dc:creator><![CDATA[Margot Williams]]></dc:creator>
                                		<category><![CDATA[release-december-2016]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=101036</guid>
                                    <description><![CDATA[<p>Highlights from 2004 editions of the internal NSA newsletter SIDtoday also show NSA support of the FBI and OPSEC slip-ups by NSA employees.</p>
<p>The post <a href="https://theintercept.com/2016/12/07/drowning-in-information-nsa-revelations-from-262-spy-documents/">Drowning in Information: NSA Revelations From 262 Spy Documents</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank"><img loading="lazy" decoding="async" class="aligncenter wp-image-65243" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" srcset="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=720 720w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=540 540w" sizes="auto, (max-width: 720px) 100vw, 720px" /></a><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p><u>By the first</u> half of 2004, the National Security Agency was drowning in information. It had amassed 85 billion phone and online call records and cut the ribbon on a new hacking center in Hawaii — but it was woefully short on linguists who could make sense of captured communications and lacked enough network analysts to effectively monitor all the systems it had hacked.</p>
<p>The signals intelligence collected by the agency was being used for critically important decisions even as NSA struggled to understand it. Some bombs in Iraq were being targeted based entirely on signals intelligence, a senior NSA official told staff at the time — with decisions being made in a matter of “minutes” with “less and less review.”</p>
<p>Information overload is just one of several themes running through 262 articles from the NSA’s internal news site, SIDtoday, which The Intercept is now <a href="https://theintercept.com/snowden-sidtoday/">releasing</a> after careful review. The documents also detailed an incident in which the Reagan administration appears to have leaked classified intelligence to the press for political purposes, described in an accompanying <a href="https://theintercept.com/2016/12/06/reagan-administration-cavalierly-leaked-nsa-signals-intelligence-apparently-without-informing-the-agency/">article</a> by reporter Jon Schwarz.</p>
<p>SIDtoday articles published today also describe how the NSA <a href="https://theintercept.com/snowden-sidtoday/3233009-nsa-trains-fbi-officers-in-intelligence-reporting/">trained FBI agents</a>, enabled U.S. intervention in Latin America, and, with the help of a gifted analyst at the Defense Intelligence Agency, learned the value of simply reading information that was <a href="https://theintercept.com/snowden-sidtoday/3233145-sid-and-dia-collaborate-virtually-on-russian/">already public</a>. One document even suggests that NSA personnel routinely got dangerously chatty at restaurants near headquarters. These stories and more are described in the highlights reel below. The NSA declined to comment.</p>
<h3>Dropping Bombs in Iraq “With Less and Less Review”</h3>
<p>A top NSA official disclosed in a January 2004 SIDtoday <a href="https://theintercept.com/snowden-sidtoday/3232975-insider-s-view-of-history-a-lesson-in-personal/">column</a> that U.S. forces were “dropping bombs” based entirely on signals intelligence, the type of intelligence collected by the agency. He then implied that the American officers involved risked prosecution for war crimes.</p>
<p>Charles Berlin, chief of staff in the Signals Intelligence Directorate, recounted an anecdote about a former commander of his who, in one session in the winter of 1995-96, personally reviewed more than 100 possible airstrike targets in the Balkans. The commander’s motivation, Berlin said, was to protect his underlings from being prosecuted for war crimes, and his actions “really brought home the concepts of responsibility and accountability.”</p>
<p>“For us today this lesson is especially important,” he added. “The planning cycle for dropping a bomb has compressed from a day to minutes and the criterion for the aiming point has less and less review.”</p>
<p>“As many of you know, our forces in Iraq are dropping bombs on the strength of SIGINT alone. We are proud of their confidence in us, but have you ever considered the enormous risk the commanders are assuming in this regard? Are you ready to share that risk?”</p>
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[1] --> <a href="https://theintercept.com/wp-content/uploads/2016/12/bomb-war-cont.jpg"><img loading="lazy" decoding="async" width="1440" height="897" class="aligncenter size-large wp-image-101147" src="https://theintercept.com/wp-content/uploads/2016/12/bomb-war-cont.jpg" alt="BAGHDAD, IRAQ:  An Iraqi family looks out of the front gate of their home following a car bomb 19 November 2004, in Baghdad. Three people were killed, a policeman and two civilians, and 10 others wounded when a suicide car bomb exploded in Baghdad, police said. AFP PHOTO/MARWAN NAAMANI  (Photo credit should read MARWAN NAAMANI/AFP/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2016/12/bomb-war-cont.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2016/12/bomb-war-cont.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/12/bomb-war-cont.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2016/12/bomb-war-cont.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2016/12/bomb-war-cont.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2016/12/bomb-war-cont.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">An Iraqi family looks out the front gate of their home following a car bomb on Nov. 19, 2004, in Baghdad.<br/>Photo: Marwan Naamani/AFP/Getty Images</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] -->
<h3>Inside the NSA’s Call-Logging Machine</h3>
<p>Among the ways the NSA identified potential terrorists was through a practice known as “information chaining,” which uses communications metadata to draw a social graph. And there’s no question the agency had lots of metadata: As of 2004, the NSA had amassed a database of more than 85 billion metadata records related to phone calls, billing, and online calls — and was adding 125 million records a day, according to a January 2004 SIDtoday article titled “<a href="https://theintercept.com/snowden-sidtoday/3232989-the-rewards-of-metadata/">The Rewards of Metadata</a>.”</p>
<p>The database, known as FASCIA II, would at some unspecified point in the future begin processing 205 million records a day and storing 10 years of data, the article added. One of the world&#8217;s largest Oracle databases at the time, FASCIA II held metadata records from telephone calls, wireless calls, billing, the use of media over the internet, and high-powered cordless phones, with plans to add email metadata in the future.</p>
<p>The article explained that metadata is used by the agency in the process of “information chaining,” in which analysts spy on relationships between people. It further claimed that two senior al Qaeda operatives had been captured with the help of such techniques. A March 2004 SIDtoday <a href="https://theintercept.com/snowden-sidtoday/3233040-the-tac-s-metadata-analysis-cell-mac/">article</a> said a chaining tool called MAINWAY helped a counterterrorism analyst uncover six new “terrorist-related numbers.”</p>
<h3>Short on Linguists, NSA Struggled to Understand Targets</h3>
<p>It’s one thing to collect phone calls, email messages, and other signals intelligence. It’s quite another to make sense of it. Several SIDtoday articles from the first half of 2004 made clear that the NSA was falling far short in its attempts to process communications conducted in languages other than English.</p>
<p>Only half of the agency’s more than 2,300 “language missions” worldwide had qualified personnel, according to a June 2004 SIDtoday <a href="https://theintercept.com/snowden-sidtoday/3233200-now-you-re-speaking-my-language-nsa-s-linguistic/">article</a> by an NSA “senior language authority.” The author declared that “this shortcoming must be rectified.” An NSA report to an oversight council, quoted in the article, said that the lack of qualified language analysts was particularly acute in the “Global War on Terrorism.”</p>
<p>Exacerbating the situation was the fact that captured communications require a high level of linguistic proficiency to understand. “The cryptologic language analyst must be able to read and listen ‘between the lines’ to unformatted, unpredictable discourse,” as the article put it. Only a quarter of military cryptologic linguists, who formed the vast majority of the workforce, could work at this level, known as “level 3” proficiency, while barely half of the civilian cryptologic linguists could, according to a follow-up SIDtoday <a href="https://theintercept.com/snowden-sidtoday/3233205-now-you-re-speaking-my-language-nsa-s-linguistic/">article</a>. The military’s language training institute offered “virtually no existing curriculum” above level 2.</p>
<p>NSA’s plan to address the problem included reforms to the training institute and on-site instruction to bring existing linguists up to higher levels. The agency planned to invest about $80 million per year in training over five years. Other efforts included an internal online <a href="https://theintercept.com/snowden-sidtoday/3233206-now-you-re-speaking-my-language-nsa-s-linguistic/">language training tool</a>, an <a href="https://theintercept.com/snowden-sidtoday/3232986-machines-translating-arabic/">evaluation</a> of redundant Arabic machine translation projects underway in various government agencies, and the <a href="https://theintercept.com/snowden-sidtoday/3233019-establishment-of-a-human-language-technology-ipt/">formation</a> of a language technology team within the NSA.</p>
<h3>How the NSA Over-Hacked</h3>
<p>Sometimes metadata isn’t enough and the NSA decides it needs to compromise targets’ computers to collect much more data. The first half of 2004 saw a ramp-up of NSA’s hacking capabilities. In March, SIDtoday <a href="https://theintercept.com/snowden-sidtoday/3233058-advanced-cne-at-the-kunia-rsoc/">reported</a>, the agency’s elite hacking team Tailored Access Operations approved Kunia Regional Security Operations Center in Hawaii — the same facility where Edward Snowden later worked — as the first NSA field office to conduct “advanced” Computer Network Exploitation. Other facilities conduct the first stage of hacking, “target mapping,” but the Kunia facility began doing “vulnerability scanning” all the way through to “sustained SIGINT collection.”</p>
<p>Another March SIDtoday <a href="https://theintercept.com/snowden-sidtoday/3233071-the-nac-s-advanced-network-development-amp/">article</a> said that an advanced network analysis division used to help “exploit targets of interest” had “played an instrumental part” in capturing alleged al Qaeda operative Husam al-Yemeni, had developed a “more complete understanding of the Pakistani Army Defense Network (ADN) infrastructure,” and had assisted with the hacking of “an important digital network associated” with the leader of Venezuela at the time, referred to erroneously as “Victor Chavez.”</p>
<p>The NSA was so successful at hacking networks that the agency was overwhelmed with information. “We simply do not have enough network analysts to effectively monitor these targeted networks,” an NSA division chief wrote in an April 2004 SIDtoday <a href="https://theintercept.com/snowden-sidtoday/3233113-the-nac-s-data-network-operations-center-dnoc/">article</a>. To solve the problem, the agency began prototyping an automated monitoring system.</p>
<h3><strong>“Outstanding” Bookworm Spy Doesn’t Need to Really Spy</strong></h3>
<p>Even as the NSA made enormous efforts to collect vast quantities of private communications, a lone SIDtoday <a href="https://theintercept.com/snowden-sidtoday/3233145-sid-and-dia-collaborate-virtually-on-russian/">article</a> extolled the value of publicly available data. The piece, from May 2004, gushed about a Defense Intelligence Agency analyst who dug up leads by poring over Russian material that was “open source.” The DIA bookworm searched in newspapers, government documents, and “obscure websites” for information that aided the NSA in collecting intelligence, including names, telephone numbers, and addresses. The article, co-authored by an NSA director with responsibility for Russia, praised the analyst’s “outstanding language and research skills.” It turned out that “critical lead information” on Russian underground facilities, including a mysterious and widely discussed site at Yamantau Mountain in the Urals, was “often only available in open source literature, such as the Internet.”</p>
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[2] --> <a href="https://theintercept.com/wp-content/uploads/2016/12/hugo-chavez.jpg"><img loading="lazy" decoding="async" width="1440" height="860" class="aligncenter size-large wp-image-101203" src="https://theintercept.com/wp-content/uploads/2016/12/hugo-chavez.jpg" alt="Cuba's President Raul Castro (R) whispers in Venezuela's President Hugo Chavez's ear during the South America and the Caribbean Summit in Sauipe, Brazil, on December 16, 2008. Latin American presidents gathered in northeastern Brazil for a summit dominated by concern over the accelerating global economic crisis. The two-day meeting of leaders of 33 Latin American and Caribbean nations -- including, for the first time, Cuban President Raul Castro -- comes as the region's governments grapple with slumping currencies, plummeting trade, shaved growth and climbing debt.  AFP PHOTO/Antonio Scorza (Photo credit should read ANTONIO SCORZA/AFP/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2016/12/hugo-chavez.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2016/12/hugo-chavez.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/12/hugo-chavez.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2016/12/hugo-chavez.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2016/12/hugo-chavez.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2016/12/hugo-chavez.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<p class="caption overlayed">Cuba&#8217;s President Raul Castro whispers in Venezuelan President Hugo Chavez&#8217;s ear during the South America and the Caribbean Summit in Sauipe, Brazil, on Dec. 16, 2008. 
<figcaption class="caption source pullright">Photo: Antonio Scorza/AFP/Getty Images</figcaption></p><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->
<h3>How the NSA Secures — and Routinely Puts at Risk — Sensitive Information</h3>
<p>Knowing how much intelligence value could be reaped from openly circulated information, the NSA worked to encourage discretion among members of its workforce. NSA employees practiced poor operational security on a “monthly” basis by disclosing too much information in restaurants and other public settings near the agency’s Fort Meade headquarters, an agency security manager indicated in a tutorial on operational security that ran in SIDtoday in April 2004.</p>
<p>The <a href="https://theintercept.com/snowden-sidtoday/3233086-opsec-why-should-you-care/">article</a> used a hypothetical scenario to explain why operational security, or OPSEC, was important for everyone. The author, OPSEC manager for the NSA’s Signals Intelligence Directorate, wrote: “You’re at a luncheon at a local restaurant to bid farewell to Sue, a co-worker who is moving on to a new office.” Your boss makes a toast to Sue, describing her contributions against organized crime and offering various details of her work. Sue then gives a toast thanking some of the gathered individuals.</p>
<p>“Sound familiar?” the OPSEC manager asked. “Then you’ve witnessed (or perhaps participated in) a demonstration of poor OPSEC. … Have you ever stopped to consider what your unclassified public discussions might be giving away? Take the scenario, for instance. This is a scene that is played out monthly in the Fort Meade area.” The article went on to list the pieces of information that an adversary, who could have been listening in from a nearby table, would have learned.</p>
<p>OPSEC turned out to be a recurring theme for SIDtoday — OPSEC training is, after all, <a href="https://theintercept.com/snowden-sidtoday/3008488-operations-security-opsec-in-sid/">mandatory</a> for all NSA personnel. A January 2004 <a href="https://theintercept.com/snowden-sidtoday/3232973-opsec-in-sid-some-answers/">article</a>, written by the author of the April 2004 piece, listed some tips to help personnel to apply OPSEC to their day-to-day activities: Identify your critical information, analyze the threat, identify vulnerabilities, assess risk, and apply countermeasures.</p>
<p>NSA employees aren’t the only ones trained to practice good OPSEC. A March 2005 <a href="https://theintercept.com/snowden-sidtoday/3233216-venezuela-s-president-chavez-castro-s/">article</a> reported that the leaders of Venezuela and Cuba practiced OPSEC successfully. President Bush considered Venezuelan President Hugo Chavez a &#8220;threat to democracy in the region and a threat to U.S. interests in particular.&#8221; But &#8220;from a SIGINT perspective, Venezuela poses a particularly difficult challenge. With Castro as his mentor, Chavez has learned the importance of communications security and has made sure that his subordinates understand this as well.&#8221;</p>
<h3>Law &amp; Order &amp; the NSA</h3>
<p>Various 2004 SIDtoday articles highlight the NSA’s behind-the-scenes work on behalf of federal law enforcement.</p>
<p>One <a href="https://theintercept.com/snowden-sidtoday/3233009-nsa-trains-fbi-officers-in-intelligence-reporting/">detailed</a> a two-week training course on “intelligence reporting” given by NSA staff to FBI officers working on terrorism cases. The course, which had a component dubbed “SIGINT Reporting 101,” aimed to provide “insight into the complexity and difficulty of our business” and to dispel “Hollywood myths about the NSA.”</p>
<p>Another SIDtoday <a href="https://theintercept.com/snowden-sidtoday/3233056-siginters-help-interdict-snow-white/">article</a> showed how the U.S. Coast Guard was able to interdict a boat carrying 3.2 metric tons of cocaine thanks to the NSA’s monitoring of VHF radio signals, which carried voice communications of narcotraffickers. An <a href="https://www.uscg.mil/history/cutters/378/boutwell/docs/history/boutwell_history_final.pdf.pdf">official Coast Guard history</a> of the incident elides the NSA’s role. The same SIDtoday article also disclosed that the Colombian air force carried out a strike against a suspected trafficker aircraft after a tip-off from the NSA.</p>
<h3>NSA vs. FARC</h3>
<p>Colombian guerrillas holding American hostages evaded massive NSA surveillance, according to a February 2004 SIDtoday <a href="https://theintercept.com/snowden-sidtoday/3233017-sid-support-to-southcom-update-on-u-s-hostages/">article</a>.</p>
<p>One year after three American contractors, who had been on a surveillance mission for the U.S. military, were captured by the Revolutionary Armed Forces of Colombia, a Marxist guerilla group, the U.S. “has not been able to determine with high confidence the exact location and status of the hostages,” wrote an NSA account manager for the military’s Southern Command. This despite “hundreds” of U.S. government personnel having worked to gain their release. U.S. efforts were stymied when FARC’s leadership ordered that personnel cease mentioning hostage operations directly in their communications; the best the NSA could achieve at the time of the SIDtoday article was to monitor calls between two radio operators, “Paula and Adriana,” who in turn were connected to the FARC leaders “we strongly suspect are linked to the hostages.”</p>
<p>The author of the SIDtoday article added that the agency continued to try and get a fix on the location of the hostages. Yet their captors eluded the Americans for another four years. The three Americans were <a href="http://www.nytimes.com/2008/07/03/world/americas/03colombia.html">freed</a> by Colombian commandos in July 2008.</p>
<p>A March 2004 SIDtoday <a href="https://theintercept.com/snowden-sidtoday/3233056-siginters-help-interdict-snow-white/">article</a> noted a success against FARC, bragging that the arrest of FARC financial leader Anayibe Rojas Valderrama, known as “Sonya,” and a number of her associates a month earlier “resulted from years of monitoring. … Accurate geolocational data as to where she was and when, allowed a vetted Colombian team to capture them by surprise and without any loss of life.” Valderrama was <a href="https://www.justice.gov/archive/opa/pr/2007/July/07_crm_481.html">extradited</a> to the United States where she was tried and convicted on drug trafficking charges in 2007.</p>
<!-- BLOCK(photo)[3](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[3] --> <a href="https://theintercept.com/wp-content/uploads/2016/12/farc-hostage.jpg"><img loading="lazy" decoding="async" width="1440" height="938" class="aligncenter size-large wp-image-101108" src="https://theintercept.com/wp-content/uploads/2016/12/farc-hostage.jpg" alt="Former guerrilla hostage Oscar Tulio Lizcano (R) and his wife Martha look at pictures of the FARC hostages released during the Army's Jaque Operation, after thanking the soldiers of the third division of the National Army during a religious ceremony in Cali, department of Valle del Cauca, Colombia, on October 31, 2008. Former lawmaker Lizcano thanked the soldiers for helping him after he escape to freedom the past weekend, towed by his jailer, former guerrilla member Wilson Bueno Largo, aka 'Isaza', who deserted from the rebel ranks.  AFP PHOTO/Luis ROBAYO (Photo credit should read LUIS ROBAYO/AFP/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2016/12/farc-hostage.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2016/12/farc-hostage.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/12/farc-hostage.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2016/12/farc-hostage.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2016/12/farc-hostage.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2016/12/farc-hostage.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">Former guerrilla hostage Oscar Tulio Lizcano and his wife, Martha, look at pictures of the FARC hostages released during the army&#8217;s Jaque Operation, in Cali, Colombia, on Oct. 31, 2008.<br/>Photo: Luis Robayo/AFP/Getty Images</figcaption><!-- END-CONTENT(photo)[3] --></figure><!-- END-BLOCK(photo)[3] -->
<h3 id="aic">Internal NSA Criticism of Political Groups and the News Media</h3>
<p>A national intelligence officer gave a top-secret “issue seminar” to NSA staff on the question of “where political action fades into terrorism,” according to a seminar announcement <a href="https://theintercept.com/snowden-sidtoday/3233184-sinio-summer-seminar-playing-the-line-between/">published</a> in June 2004. The announcement suggested that the line between “legitimate political activity” and “activity that is the precursor to, or supportive of, terrorism” is fuzzy. The course used the Vienna-based organization Anti-Imperialist Camp as a case study, describing it as “ostensibly a political organization” but noting that “its many ties to terrorist organizations — and its attempts to collaborate with Muslim extremists — raise questions about where political action fades into terrorism.” No further details were given to substantiate the alleged ties; the group’s <a href="http://www.antiimperialista.org/">website</a> remains online. A spokesperson for the group, Wilhelm Langthaler, told The Intercept that the group was targeted for such accusations for political reasons, including its opposition to the war in Iraq and “our public support for the resistance against occupation which we have compared with the antifascist resistance against German occupation.”</p>
<p>Another seminar announcement <a href="https://theintercept.com/snowden-sidtoday/3233195-sinio-summer-seminar-by-listening-and-learning/">said</a> the news media helped stymie U.S. intelligence collection. “A day hasn&#8217;t gone by that our adversaries haven&#8217;t picked up a newspaper or gone on the Internet to learn something new about how the US intelligence gathering system operates and what its capabilities or limitations are,” the course overview explained. “And in response, a day hasn&#8217;t gone by that our adversaries haven&#8217;t modified their operations and activities to avoid being detected and collected against by the US intelligence gathering system.”</p>
<h3>NSA’s Role in the Failed Iran Hostage Rescue Attempt</h3>
<p>In an anecdote about signals intelligence during the 1980 Iranian hostage rescue mission, a SIGINT staffer recalled the night of April 24 of that year, when he was told he was monitoring the ongoing “Operation Ricebowl.” In a May 2004 SIDtoday <a href="https://theintercept.com/snowden-sidtoday/3233150-insider-s-view-of-history-desert-one-the-iranian/">article</a>, the staffer wrote: “We knew the parameters of the Iranian Air Defense system because it was U.S. equipment and installed by U.S. contractors while the Shah of Iran was still in power. We knew exactly where the gaps in coverage were and we exploited it during the rescue attempt.” The author went on to describe his shock the next morning when he saw on TV news at home that the mission had ended with a disastrous helicopter crash.</p>
<p class="caption">Top photo: American soldiers from the 1st Cavalry Division 2nd Battalion 7th Cavalry run through a smoke screen as they try to avoid sniper fire during an offensive operation on Aug. 16, 2004, in Najaf, Iraq.</p>
<p>&nbsp;</p>
<p>The post <a href="https://theintercept.com/2016/12/07/drowning-in-information-nsa-revelations-from-262-spy-documents/">Drowning in Information: NSA Revelations From 262 Spy Documents</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2016/12/07/drowning-in-information-nsa-revelations-from-262-spy-documents/feed/</wfw:commentRss>
                <slash:comments>35</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2016/12/soldier-iraq.jpg?fit=1440%2C720' width='1440' height='720' /><post-id xmlns="com-wordpress:feed-additions:1">101036</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?fit=720%2C98" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2016/12/bomb-war-cont.jpg?fit=1440%2C897" medium="image">
			<media:title type="html">An Iraqi family looks out of the front g</media:title>
			<media:description type="html">BAGHDAD, IRAQ:  An Iraqi family looks out of the front gate of their home following a car bomb 19 November 2004, in Baghdad. Three people were killed, a policeman and two civilians, and 10 others wounded when a suicide car bomb exploded in Baghdad, police said.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/12/bomb-war-cont.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2016/12/hugo-chavez.jpg?fit=1440%2C860" medium="image">
			<media:title type="html">Cuba&#8217;s President Raul Castro (R) whisper</media:title>
			<media:description type="html">Cuba&#039;s President Raul Castro (R) whispers in Venezuela&#039;s President Hugo Chavez&#039;s ear during the South America and the Caribbean Summit in Sauipe, Brazil, on December 16, 2008. Latin American presidents gathered in northeastern Brazil for a summit dominated by concern over the accelerating global economic crisis. The two-day meeting of leaders of 33 Latin American and Caribbean nations -- including, for the first time, Cuban President Raul Castro -- comes as the region&#039;s governments grapple with slumping currencies, plummeting trade, shaved growth and climbing debt.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/12/hugo-chavez.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2016/12/farc-hostage.jpg?fit=1440%2C938" medium="image">
			<media:title type="html">Former guerrilla hostage Oscar Tulio Liz</media:title>
			<media:description type="html">Former guerrilla hostage Oscar Tulio Lizcano (R) and his wife Martha look at pictures of the FARC hostages released during the Army&#039;s Jaque Operation, after thanking the soldiers of the third division of the National Army during a religious ceremony in Cali, department of Valle del Cauca, Colombia, on October 31, 2008. Former lawmaker Lizcano thanked the soldiers for helping him after he escape to freedom the past weekend, towed by his jailer, former guerrilla member Wilson Bueno Largo, aka &#039;Isaza&#039;, who deserted from the rebel ranks.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/12/farc-hostage.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[How We Prepared the NSA's Sensitive Internal Reports for Release]]></title>
                <link>https://theintercept.com/2016/05/16/how-we-prepared-the-nsas-sensitive-internal-reports-for-release/</link>
                <comments>https://theintercept.com/2016/05/16/how-we-prepared-the-nsas-sensitive-internal-reports-for-release/#comments</comments>
                <pubDate>Mon, 16 May 2016 15:35:50 +0000</pubDate>
                                    <dc:creator><![CDATA[The Intercept]]></dc:creator>
                                		<category><![CDATA[release-may-2016]]></category>
		<category><![CDATA[release-may-2016-front]]></category>
		<category><![CDATA[Snowden Archive]]></category>
		<category><![CDATA[The SIDtoday Files]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=64773</guid>
                                    <description><![CDATA[<p>A team of Intercept staffers subjected the documents to a careful process of research, editorial evaluation, legal review, reporting, redaction, and digital processing. Here are the details.</p>
<p>The post <a href="https://theintercept.com/2016/05/16/how-we-prepared-the-nsas-sensitive-internal-reports-for-release/">How We Prepared the NSA&#8217;s Sensitive Internal Reports for Release</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22720px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 720px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/snowden-sidtoday/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-65243" src="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg" alt="" width="720" height="98" srcset="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=720 720w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=540 540w" sizes="auto, (max-width: 720px) 100vw, 720px" /></a> <!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p><u>The 166 articles</u> we’re releasing today from an internal NSA publication, <em>SIDtoday</em>, were subjected to a careful process of research, editorial evaluation, legal review, reporting, redaction, and digital processing. This article explains how that process worked.</p>
<p>After <a href="https://theintercept.com/2016/05/16/the-intercept-is-broadening-access-to-the-snowden-archive-heres-why">deciding it was in the public interest</a> to release and write about large batches of documents supplied by whistleblower Edward Snowden, <em>The Intercept</em> settled on beginning with <em>SIDtoday</em>, the online newsletter of the NSA’s core spying division, the Signals Intelligence Directorate. Written in accessible, non-technical language, <a href="https://theintercept.com/2016/05/16/what-its-like-to-read-the-nsas-newspaper-for-spies"><em>SIDtoday</em> offers a window into the NSA’s culture and operations</a>. Although much of its content is unclassified and often appears largely designed to burnish the agency’s self-image, <em>SIDtoday</em> also includes more revelatory sections that are officially “secret” and “top secret.”</p>
<p>Our initial goal was to release in one batch the first three months of <em>SIDtoday</em>, starting at the end of March 2003, as well as all 2003 installments of <em>SIDtoday</em> article series that began during this period. Before we could do that, we needed to build a pipeline that would allow us to securely handle these sensitive documents and prepare them for publication.</p>
<h3>From Messy HTML to Clean PDF</h3>
<p>In its original home at the NSA, <em>SIDtoday</em> is a website, but, unlike normal websites that are accessible from the internet, this one is only accessible from computers that are connected to an internal spy agency network. This means <em>SIDtoday</em> articles, as provided by Snowden, were in Hypertext Markup Language, or HTML, the native format of the web. To be fully readable, most webpages require HTML files as well as associated images, stylesheets, and other files, but unfortunately those other elements were not included in the Snowden archive. This meant the original webpages looked rather chaotic when viewed in a web browser. They also included broken links to the internal NSA network.</p>
<p>Staff technologist Micah Lee prepared software that parsed the original <em>SIDtoday</em> HTML files and extracted the usable content. This content was then placed into a template with minimalist design and converted to PDF format. PDF files, unlike HTML files, could be edited by multiple staffers using widely available, easy-to-use software tools with native redaction facilities.</p>
<p>The PDF files don&#8217;t look the same way the original <em>SIDtoday</em> website looked — they don&#8217;t use the original layout or style elements — but they do contain the same text content. They also include the original clip art-style <em>SIDtoday</em> logo.</p>
<h3>Research and Redaction</h3>
<p>Once the files were formatted, Research Editor for Investigations Margot Williams combed through each article, doing several things at once: identifying names that we might need to redact, researching those individuals to see what was publicly known about them, summarizing the document, and looking for material that could be the basis of stories for <em>The Intercept</em>.</p>
<p>In keeping with <em>The Intercept</em>’s editorial standards, we redacted the names of covert agents and the names and contact information of government personnel who are neither high-ranking nor already publicly associated with the NSA. We also removed information if we believed its release could cause serious injury or death to innocent people.</p>
<p>After Williams reviewed each article, the article was reviewed again by Lee, by a senior editor, and by our legal counsel. Redacted articles were also shown to the NSA, which was offered a chance to respond, resulting in the redaction of two additional names.</p>
<h3>Writing and Publishing</h3>
<p><em>The Intercept</em>’s examination of this first batch of <em>SIDtoday</em> content yielded an <a href="https://theintercept.com/2016/05/16/nsa-closely-involved-in-guantanamo-interrogations-documents-show">article on the NSA’s involvement with interrogations at Guantánamo Bay</a>&nbsp;as well as a <a href="https://theintercept.com/2016/05/16/the-most-intriguing-spy-stories-from-166-internal-nsa-reports">“highlights reel” summarizing insights gleaned from the material</a> that struck us as most relevant for our readers. In addition, Senior Editor Peter Maass <a href="https://theintercept.com/2016/05/16/what-its-like-to-read-the-nsas-newspaper-for-spies">places <em>SIDtoday</em> in context</a> with his story describing the publication, and co-founder Glenn Greenwald <a href="https://theintercept.com/2016/05/16/the-intercept-is-broadening-access-to-the-snowden-archive-heres-why">explains why we decided to begin making large batches of Snowden material available to the public</a>. While we have focused on the parts of these documents we find most compelling, we anticipate readers will find other information of interest in the files we are sharing — which is why we decided to approach the release in the way we did.</p>
<p><a href="https://theintercept.com/snowden-sidtoday">A landing page dedicated to our <em>SIDtoday</em> releases is available</a>. On this special section of <em>The Intercept</em>’s website, readers can download the files individually or all at once, navigate by tag or date, and view <em>SIDtoday</em> articles alongside a wealth of metadata, including summary, original publication date, citations pointing to prior publication of unredacted names, tags, and related links. This represents the first phase of an evolving project, which will eventually include additional features, such as a search capability, as well as a growing number of documents.</p>
<p><em>Related Stories:</em></p>
<ul>
<li><a href="https://theintercept.com/snowden-sidtoday">Snowden Archive — The SIDtoday Files</a></li>
<li><a href="https://theintercept.com/2016/05/16/the-intercept-is-broadening-access-to-the-snowden-archive-heres-why">The Intercept Is Broadening Access to the Snowden Archive. Here’s Why</a></li>
<li><a href="https://theintercept.com/2016/05/15/the-most-intriguing-spy-stories-from-166-internal-nsa-reports">The Most Intriguing Spy Stories From 166 Internal NSA Reports</a></li>
<li><a href="https://theintercept.com/2016/05/15/nsa-closely-involved-in-guantanamo-interrogations-documents-show">NSA Closely Involved in Guantánamo Interrogations, Documents Show</a></li>
<li><a href="https://theintercept.com/2016/05/16/what-its-like-to-read-the-nsas-newspaper-for-spies/">The NSA’s Newspaper Reveals the Human Side of America’s Digital Spies</a></li>
</ul>
<p>The post <a href="https://theintercept.com/2016/05/16/how-we-prepared-the-nsas-sensitive-internal-reports-for-release/">How We Prepared the NSA&#8217;s Sensitive Internal Reports for Release</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2016/05/16/how-we-prepared-the-nsas-sensitive-internal-reports-for-release/feed/</wfw:commentRss>
                <slash:comments>6</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2016/05/redact-lines21.png?fit=1440%2C720' width='1440' height='720' /><post-id xmlns="com-wordpress:feed-additions:1">64773</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?fit=720%2C98" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/05/CYD_logo03.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
            </channel>
</rss>
