A list of every important capabilities that the NSA has. Here's what I've compiled so far, and I'm hoping the community can help me expand it and add their 2 cents.
67 2014-03-06 by Three_Letter_Agency
“When I'm president, one of the first things I'm going to do is call in my attorney general and say to him or her, I want you to review every executive order that was issued by George Bush, whether it relates to warrantless wiretaps or detaining people or reading e- mails, or whatever it is. I want you to go through every single one of them and if they are unconstitutional, if they're encroaching on civil liberties unnecessarily, we are going to overturn them. We're going to change them.” - Barack Obama, 2007
I'm hoping to compile a list of every important capability that the NSA has. Here's what I've compiled so far, and I'm wondering if anyone has input or leads on items I have missed. It would be fantastic if others who have researched this can add their two cents because I know that this is not a completely comprehensive list. Also, feel free to use this for any educational purpose.
The following is the known actions of the NSA and their UK counterpart GHCQ:
Collect the domestic meta-data of both parties in a phone-call.1
Set up fake internet cafés to steal data.2
Has intercepted the phone calls of at least 35 world leaders, including allies such as German Chancellor Angela Merkel.3
Can tap into the underwater fibre-optic cables that carry a majority of the world's internet traffic.4
Tracks communications within media institutions such as Al Jazeera.5
Has 'bugged' the United Nations headquarters.6
Has set up a financial database to track international banking and credit card transactions.7
Collects and stores over 200 million domestic and foreign text messages each day.8
Collects and has real-time access to browsing history, email, and social media activity. To gain access, an analyst simply needs to fill out an on-screen form with a broad justification for the search that is not reviewed by any court or NSA personnel.9
"I, sitting at my desk, could wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". - Edward Snowden
Creates maps of the social networks of United States citizens.10
Has access to smartphone app data.11
Uses spies in embassies to collect data, often by setting up 'listening stations' on the roofs of buildings.12
Uses fake LinkedIn profiles and other doctored web pages to secretly install surveillance software in unwitting companies and individuals.13
Tracks reservations at upscale hotels.14
Has intercepted the talking-points of world leaders before meetings with Barack Obama.15
Can crack encryption codes on cellphones.16
Has implanted software on over 100,000 computers worldwide allowing them to hack data without internet connection, using radio waves.17
Has access to computers through fake wireless connections.18
Monitors communications in online games such as World of Warcraft.19
Intercepts shipping deliveries and install back-door devices allowing access.20
Has direct access to the data centers of Google, Yahoo and other major companies.21
Covertly and overtly infiltrate United States and foreign IT industries to weaken or gain access to encryption, often by collaborating with software companies and internet service providers themselves. They are also, according to an internal document, "responsible for identifying, recruiting and running covert agents in the global telecommunications industry."22
The use of “honey traps”, luring targets into compromising positions using sex.23
The sharing of raw intelligence data with Israel. Only official U.S. communications are affected, and there are no legal limits on the use of the data from Israel.24
Possibly the most shocking revelation was made on February 24, 2014. Internal documents show that the NSA is attempting to manipulate and control online discourse with “extreme tactics of deception and reputation-destruction.”25 The documents revealed a top-secret unit known as the Joint Threat Research Intelligence Unit, or JTRIG. Two of the core self-identified purposes of JTRIG are to inject all sorts of false material onto the internet in an effort to discredit a target, and to use social sciences such as psychology to manipulate online discourse and activism in order to generate a desirable outcome. The unit posts false information on the internet and falsely attributes it to someone else, pretend to be a 'victim' of a target they want to discredit, and post negative information on various forums. In some instances, to discredit a target, JTRIG sends out 'false flag' emails to family and friends.
One slide describes the methods to discredit a company: Leak confidential information to the press, post negative information on forums, to interfere with business deals and ruin business relationships.
The use of psychological techniques to fracture activist groups and to 'game' online discourse is very interesting. One document describes creating tension in a group by exploiting personal power, pre-existing cleavages and minor ideological differences. In online discourse, another document describes how to use 'mirroring' of language cues, expressions and emotions, and the adjustment of speech, patterns and language to manipulate opinion.
Now, consider the words of former NSA employee turned whistleblower Russ Tice:
“Okay. They went after–and I know this because I had my hands literally on the paperwork for these sort of things–they went after high-ranking military officers; they went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees and some of the–and judicial.
But they went after other ones, too. They went after lawyers and law firms. All kinds of–heaps of lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court that I had his wiretap information in my hand. Two are former FISA court judges. They went after State Department officials.
They went after people in the executive service that were part of the White House–their own people. They went after antiwar groups. They went after U.S. international–U.S. companies that that do international business, you know, business around the world. They went after U.S. banking firms and financial firms that do international business. They went after NGOs that–like the Red Cross, people like that that go overseas and do humanitarian work. They went after a few antiwar civil rights groups.
Now here’s the big one. I haven’t given you any names. This was is summer of 2004. One of the papers that I held in my hand was to wiretap a bunch of numbers associated with, with a 40-something-year-old wannabe senator from Illinois. You wouldn’t happen to know where that guy lives right now, would you? It’s a big white house in Washington, DC. That’s who they went after. And that’s the president of the United States now.” Russ Tice, NSA Whistleblower
25 comments
16 Three_Letter_Agency 2014-03-06
This is going to be a section in a chapter of a book I am writing, this particular chapter will analyze the 'One Party State', where democrats and republicans have historically followed the same agenda for the last 35 years. The book will be free, I'm not profiting off of this list, and also, please PM me if you are interested in a pdf copy when I finish tidying it up over the next week.
9 FreudsHedgehog 2014-03-06
Blackmailing dissidents with their porn habits http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html
9 Three_Letter_Agency 2014-03-06
oooo this needs to be a top one. thanks for the lead again.
2 pSy_Tech_Eco_Marxist 2014-03-06
Another link related: http://cyberlaw.stanford.edu/blog/2013/11/nsa-sexint-abuse-you%E2%80%99ve-all-been-waiting
They've also literally watched people through their webcams: http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo
Oh! And no terrorist attacks have been stopped: http://www.nbcnews.com/news/investigations/nsa-program-stopped-no-terror-attacks-says-white-house-panel-v21975158
despite the NSA director having come out to say 54 terrorist acts were stopped and then later admitting he lied. Embarrassing.
3 Ambiguously_Ironic 2014-03-06
Global information grid, in real time. When did science fiction stop being fiction?
3 FreudsHedgehog 2014-03-06
Intercepting everybody's webcam images on Yahoo http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo
2 Three_Letter_Agency 2014-03-06
thanks for the lead! I will add this.
3 FreudsHedgehog 2014-03-06
If this is a limited hangout it's not very 'limited' at all.
1 Necronomiconomics 2014-03-06
It appears to be limited to the NSA.
Why make artificial distinctions between agencies & the Pentagon? Or JSOC?
http://en.wikipedia.org/wiki/Gorgon_Stare
One example off the top of my head. There are dozens of others from various agencies, such as the JSOC assassination ring, et al.
1 Necronomiconomics 2014-03-06
Other various capabilities beyond the NSA:
Guardian reveals that NASA succeeded in using space telescope to decipher voices in a room. Telescope analysed the vibrations of the clothing being worn by the room occupants. This was in 2005. CIA also allegedly has a "laser microphone": "If you shine a laser beam on those windows [of the buildings], you can detect those vibrations, and using voice identification, you can figure out how many different voices are speaking in each of the rooms of the compound."
1952's "The Thing" listening device, precursor to god-knows-what types of "passive resonant" listening devices are technologically possible now, implanted in passports & IDs
Before cell phones, landlines could be eavesdropped on -- even when hung-up -- by amplifying volume thousands of times, and this was known as an "infinity mike" (infinity microphone). Since the advent of intelligence community techniques such as keyword hijacking -- itself a phrase that has been keyword hijacked as the Internet's name for "fraudulent prevention of Google-advertised sites from receiving their fair share of hits" -- Googling "infinity mike" will, now, only uncover harmless cartoon characters, obscuring the original meaning of that phrase: Classic keyword hijacking.
Room-mapping cell phone sonar
2 Necronomiconomics 2014-03-06
And more fringe:
—————————
1 FreudsHedgehog 2014-03-06
"It appears to be limited to the NSA.
Why make artificial distinctions between agencies & the Pentagon? Or JSOC?"
Not quite; https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/
1 Necronomiconomics 2014-03-06
Another ignored issue here is the relevance of international interagency functionality such as the Safari Club and its heirs.
TL;DR - When the 1970s Church/Pike Committee reforms of the intelligence community were afoot, and when Carter allegedly "purged" the CIA, rogue elements (including those purged) formed rogue alliances with international agencies (such as Saudi intelligence, etc.), including rogue alliances within the framework of legitimate international alliances.
Everybody knows about Escheleon of the 1990s -- circumventing domestic U.S. surveillance laws by having English-speaking countries eavesdrop on each other & share third-party data -- but this is also the surreptitious model for operations like kidnappings & assassinations & torture, quasi-"legitimized" since Bush, but routine for decades using wildcard third-party agency allies (and rogue factions within those agencies) like Saudi intelligence.
Which all means that any international capabilities -- technologically or otherwise -- are on the table for any agency within the U.S. via third-party.
3 smokinbluebear 2014-03-06
Just to add perspective it might be good to include some info about this article which is entirely derived from just one page of a four-volume internal NSA history (which is shown at the bottom of the article). The NSA has been spying on Americans (and senators) since at least the mid-60's...
http://www.foreignpolicy.com/articles/2013/09/25/it_happened_here_NSA_spied_on_senators_1970s
3 Three_Letter_Agency 2014-03-06
thanks for the leads, this isn't the first time you've helped me out with some quality research, I am grateful.
2 smokinbluebear 2014-03-06
look forward to the book...
3 Orangutan 2014-03-06
I wish you'd update your awesome Mega-List of 9/11 Suspicious Circumstances and Flaws in the Official Story.
http://www.thepeopleshistory.net/2013/08/the-mega-list-of-holes-in-official.html
http://www.reddit.com/r/conspiracy/comments/1korgs/the_official_megalist_of_911_suspicious/
Thanks for all this work, much appreciated!
3 Salvador_Allende 2014-03-06
welcome back /u/Three_Letter_Agency
im curious as to your opinion on limited hangouts?
2 smokinbluebear 2014-03-06
A reminder that even with all these BILLIONS poured into the NSA (and the CIA, FBI, DIA, etc)--they still f'ed up 9/11...
Full Letter: http://consortiumnews.com/2014/01/07/nsa-insiders-reveal-what-went-wrong/
"The sadder reality, Mr. President, is that NSA itself had enough information to prevent 9/11, but chose to sit on it rather than share it with the FBI or CIA. We know; we were there. We were witness to the many bureaucratic indignities that made NSA at least as culpable for pre-9/11 failures as are other U.S. intelligence agencies...
...“My first day on the job at NSA was 9/11. I was immediately charged as the lead NSA executive to find and deploy the best technology at NSA for the fight against terrorism....
...“That’s where I found the pre- and post-9/11 intelligence from NSA monitoring of some of the hijackers as they planned the attacks of 9/11 had not been shared outside NSA. This includes critical pre-9/11 intelligence on al-Qaeda, even though it had been worked on by NSA analysts. I learned, for example, that in early 2001 NSA had produced a critical long-term analytic report unraveling the entire heart of al-Qaeda and associated movements. That report also was not disseminated outside of NSA.
“Make no mistake. That data and the analytic report could have, should have prevented 9/11...
...“In short, when confronted with the prospect of fessing up, NSA chose instead to obstruct the 9/11 congressional investigation, play dumb, and keep the truth buried, including the fact that it knew about all inbound and outbound calls to the safe house switchboard in Yemen. NSA’s senior leaders took me off the task because they realized – belatedly, for some reason – that I would not take part in covering up the truth about how much NSA knew but did not share.
“When the 9/11 Commission hearings began, Director Hayden chortled at executive staff meetings over the fact that the FBI and CIA were feeling the heat for not having prevented 9/11. This was particularly difficult for me to sit through, for I was aware that NSA had been able to cover up its own culpability by keeping investigators, committees, and commissions away from the truth."
2 [deleted] 2014-03-06
You know when you say it like that it seems so much worse. If you have followed the Snowden leaks from the beginning you wouldn't think he divulged this information. That's why I am still suspicious of the whole situation.
1 [deleted] 2014-03-06
I didn't see it in your list so apologies if it's there but I missed it...
Setting up fake cell phone towers to trick your phone into connecting to a massive spy tower (pardon my lack of technical terms...)
1 Three_Letter_Agency 2014-03-06
thanks for the lead! I'm having difficulty finding the original source but I will try harder in an hour or two.
3 PublicIntelAnalyst 2014-03-06
Considering the recent revelations (claims) made by Snowden, with reference to the cooperation of telecommunications companies with the NSA, I don't think "fake cell phone towers" are necessary to involve anyone's cell phone in a massive spy operation. You know... just sayin... it stands to reason.
1 shockaDee 2014-03-06
He may be confusing this with the Stingray Device
1 NotAFrenchSupermodel 2014-03-06
Many years ago, a friend from college who I would trust with my life cam bcd through town. He went to work in telecommunications, I didn't. We had lunch. After a while, he told me the story if when he installed the terminal at the NSA Into Verizon's main frame. This was shortly after it was renamed Verizon frm GTE. He didn't question it, but then when it was inspected there was of course a login, they made him remove it. He objected sincewith full admin access, they could do much damage by accident and everything had a log. He was told it was an open terminal, no log in, no log files created situation. They could create accts, change dates, add or delete accts or details of accounts and the record would how no change. He was visibly shaken even telling me this. I can provide no proof of this or his name, please don't ask.
9 Three_Letter_Agency 2014-03-06
oooo this needs to be a top one. thanks for the lead again.