« Jewish War Against ChristmasTerrorist Crimes Against Humanity »

NSA's Top Hacking Unit

January 2nd, 2014

by Stephen Lendman

On December 29, Der Spiegel headlined "Inside TAO: Documents Reveal Top NSA Hacking Unit."

It's "considered to be (its) top secret weapon." Its covert network "infiltrates computers around the world and even intercepts shipping deliveries to plant back doors in electronics ordered by" whomever it targets.

More on this below. Snowden documents remain the gift that keeps on giving. Doing so made him a world hero. Washington calls exposing wrongdoing illegal. Lawlessness is official US policy.

Since 1993, Britain's Channel 4 broadcast an alternative Christmas message. It's an antidote to Queen Elizabeth's Royal Christmas Message.

In 1932, King George began them on radio. In 1957, Queen Elizabeth delivered the first televised broadcast. It's typical royal mumbo jumbo. Why Brits tune in they'll have to explain.

Snowden's comments are important. Orwell's warnings "are nothing compared to what we have available today," he said.

"We have sensors in our pockets that track us everywhere we go. Think about what this means for the privacy of the average person."

Children "born today will grow up with no conception of privacy at all."

"They'll never know what it means to have a private moment to themselves, an unrecorded, unanalyzed thought."

"And that's a problem because privacy matters. (It's) what allows us to determine who we are and who we want to be."

Snowden wants ordinary people to decide how governments monitor them. "All I wanted was for the public to be able to have a say in how they're governed," he explained.

He's doing it by revealing the extent of NSA spying.

"The conversation occurring today will determine the amount of trust we can place both in the technology that surrounds us and the government that regulates it," he said.

"Together we can find a better balance, end mass surveillance, and remind the government that if it really wants to know how we feel, asking is always cheaper than spying."

"I already won," he said. "As soon as the journalists were able to work, everything that I had been trying to do was validated."

"Because, remember, I didn't want to change society. I wanted to give society a chance to determine if it should change itself."

"All I wanted was for the public to be able to have a say in how they are governed."

Not as long as NSA has its way. Not while Congress and US administrations let it. Previous articles discussed its Office of Tailored Operations (TAO).

It's top secret. It has over 1,000 military and civilian hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.

It identifies computer systems and supporting telecommunications networks to attack.

It successfully penetrated Chinese computer and telecom systems. It's been doing it for over 15 years. It does the same thing globally.

Most NSA employees and officials know little or nothing about TAO. Its operations are extraordinarily sensitive. Only those needing to know are kept informed.

Special security clearances are required to gain access to its top secret work spaces. Armed guards keep others out.

Entering requires a correct six digit code. Retinal scanner checks are used. TAO targets foreign computer systems.

It collects hard to get intelligence. It does it by hacking, cracking passwords, compromising computer security systems, stealing hard drive data, and copying all subsequent emails and text messages.

TAO personnel penetrate, steal, damage, destroy or otherwise compromise targeted sites. It's perhaps the most important component of NSA's Signal Intelligence (SIGINT) Directorate.

It lets NSA get information not otherwise available. It can do it without being detected.

Der Spiegel called TAO NSA's 'top operative unit." It's "something like a squad of plumbers," it said. They're "called in when normal access to a target is blocked."

They're "involved in many sensitive operations conducted by American intelligence agencies." They range from counterintelligence to cyberwar to espionage.

Snowden's documents revealed TAO sophistication. It exploits technical weaknesses. It does so secretly, discreetly and efficiently.

It gets the "ungettable." According to a former unnamed TAO chief:

"It is not about the quantity produced but the quality of intelligence that is important," she said. (It's gotten) some of the most significant intelligence our country has ever seen."

It "access(es) our very hardest targets. (It) needs to continue to grow, and must lay the foundation for integrated Computer Network Operations."

It must "support Computer Network Attacks as an integrated part of military operations. (It has to acquire) pervasive, persistent access on the global network."

Its mandate is conducting aggressive attacks. Through the middle of the last decade, it accessed 258 targets. It did so in 89 countries globally. In 2010, it conducted 279 operations.

It penetrated protected networks of targeted world leaders. It did so against European telecommunications companies.

It cracked Blackberry's encrypted BES email servers. One document said doing so required "sustained TAO operation(al)" effort.

In 1997, TAO was created. At the time, only 2% of the world's population had Internet access. It was a year before Google was founded. Facebook, Twitter and YouTube weren't around. Yahoo was a fledgling operation.

TAO personnel work at NSA's Fort Meade, MD headquarters. They're in San Antonio, TX. They're in other locations. They're housed in their own wings. They're separate from other NSA operations.

Their match Star Trek. They do it for real. They go where no one went before. They do it round-the-clock. They do it globally.

They find ways to hack into global communications systems. They penetrate the most heavily protected ones.

They do what never before was possible. They do it secretly. They do it without being detected.

TAO employs new kinds of people. They're much younger than other NSA personnel. They're expert hackers. "Their job is breaking into, manipulating, and exploiting computer networks," said Der Spiegel.

They resemble geeks. They act like them. NSA director Keith Alexander is involved in recruiting. He attends major hacker conferences.

Sometimes it's in formal military attire. Other times, he wears jeans and t-shirts. It's to look and act like the geeks he's recruiting. It works.

TAO has operations in Wahiawa, Hawaii, Fort Gordon, GA, Buckley Air Force Base near Denver, Fort Meade, MD, San Antonio, TX and a liaison office near Frankfurt, Germany.

It's the European Security Operations Center (ESOC) "Dagger Complex. It's at a US military compound in Griesheim. It's a suburb of Darmstadt near Frankfort.

It's secured by a tall wire fence. It's topped with barbed wire. It's in relatively modest buildings. They're surrounded by green space. It's for added security.

It's one of Hesse state's best protected sites. NSA's European Cryptologic Center (ECC) is headquartered there. A 2011 NSA report calls it the "largest analysis and productivity (site) in Europe."

Information obtained ends up in Obama's daily briefings. He gets them on average twice weekly.

NSA considers Germany a prime target. Espionage is prioritized. So is German foreign policy.

Weeks after NSA spying on Angela Merkel was revealed, Berlin still awaits answers on what it's up to in Germany.

Documents Der Spiegel saw revealed intense NSA spying. Its personnel consider German intelligence gotten a "success story."

Tons of information were collected. Former NSA director Michael Hayden told Der Spiegel: "(T)he damage for the German-American relationship is huge."

Post-9/11, he tried working cooperatively with Germany's BND intelligence, he said. "I tried to avoid acting as an occupier," he claimed.

"We extended our cooperation." It's now jeopardized. He admits NSA espionage. "We steal secrets," he said. "We're number one in (doing) it."

NSA isn't malicious, he claims. "We steal stuff to make you safe, not to make you rich." NSA steals everything it gets its hands on. It compromises public safety. It does so globally.

Former NSA employee/whistleblower Thomas Drake said "September 11 was the trigger that (made) Germany a target of high priority."

Powerful tools are used to do whatever NSA wishes. To infiltrate wherever it wants to go. To steal as much as it can about virtually everything. NSA director Alexander says "get it all."

Der Spiegel called its Texas operations "uniquely impressive." The Texas Cryptologic Center employs less than 60 TAO specialists.

By 2015, plans are to increase staff to about 270. Another 85 specialists work in the Requirements & Targeting division. In 2008, they numbered 13.

Software developers are expected to increase from three in 2008 to 38 in 2015. San Antonio-based operations target Middle East Countries, Cuba, Venezuela, Columbia and Mexico.

According to Washington's planned intelligence operations, around 85,000 computers worldwide were expected to be infiltrated by year end 2013. Most involve TAO operations.

Cyber criminals run them. They hack into computer systems. They send emails disguised as spam. They contain links directing users to virus-infected web sites.

They implant NSA malware this way. They do it without targeted subjects knowing.

A major TAO goal is "subvert(ing) endpoint devices." They include "servers, workstations, firewalls, routers, handsets, phone switches, (and) SCADA systems, etc."

According to Der Spiegel:

"SCADAs are industrial control systems used in factories, as well as in power plants…(The) most well-known and notorious use of this type of attack was the development of Stuxnet..."

In spring 2010, Iranian intelligence discovered its malware contamination. It infected its Bushehr nuclear facility. At the time, operations were halted indefinitely.

Israel was responsible. So was Washington. Had the facility gone online infected, Iran's entire electrical power grid could have been shut down.

One of NSA's "most productive operations" is its direct "interdiction." Goods are rerouted from suppliers to secret TAO locations.

According to Der Spiegel:

TAO personnel "carefully open...package(s) in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies."

"All subsequent steps can then be conducted from the comfort of a remote computer." Operations are conducted globally.

NSA targets virtually everyone. Its ultimate goal is leaving no one behind. Most important are "entire networks and network providers," said Der Spiegel.

Fiber optic cables handling global Internet traffic "along the world's ocean floors" are prime targets.

NSA responded to Der Spiegel's query. It lied saying TAO "is a unique national asset that is on the front lines of enabling NSA to defend the nation and its allies."

Domestic spying has nothing to do with national security. It's for control. It's global espionage for economic advantage. It's to be one up on foreign competitors.

It's for information used advantageously in trade, political, and military relations. It's lawlessly obtained. It's unconstitutional. It doesn't matter.

NSA is one of many US rogue operations. America's 15 other intelligence agencies operate the same way.

Congress, administrations and federal courts are worst of all. They function lawlessly. They legitimize the illegitimate.

They threaten humanity in the process. Imagine what they plan this year. Expect worse conditions perhaps than earlier. Rogue states operate that way. America is by far the worst.

-###-

Stephen Lendman lives in Chicago and can be reached at lendmanstephen@sbcglobal.net.

His new book is titled "Banker Occupation: Waging Financial War on Humanity"

http://www.claritypress.com/Lendman.html

Visit his blog site at sjlendman.blogspot.com

Listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network.

It airs Fridays at 10AM US Central time and Saturdays and Sundays at noon. All programs are archived for easy listening.

http://www.progressiveradionetwork.com/the-progressive-news-hour

http://www.dailycensored.com/nsas-top-hacking-unit/

No feedback yet

Voices

Voices

  • by Tracy Turner The preceding nuclear pollution article, "Fukushima Daiichi Nuclear Disaster: 2024 Aftermath, Risks, and Insights, " examined the millennial-spanning consequences of nuclear disasters like Chornobyl and Fukushima, atomic testing, and…
  • By David Swanson, World BEYOND War I do see a problem with justifying the U.S. Civil War while recognizing the damage done by of regrettable dreams of vengeance... I wasn’t going to read The Message by Ta-Nehisi Coates because I’m doing what I can to…
  • By Kathy Kelly, World BEYOND War The Biblical Book of Job chronicles a string of catastrophes relentlessly plaguing the main character, Job, who loses his prosperity, his home, his health, and his children. Eventually, an agonized Job curses his own…
  • LifeSiteNews The president-elect praised the former Democratic congresswomen and said she'll bring a 'fearless spirit' to the intelligence community as a member of his cabinet. President-elect Donald Trump announced Wednesday that he would nominate…
  • Paul Craig Roberts There’s many a slip between cup and lip I have been speaking with MAGA Americans and, as I suspected, there is little comprehension of the vast impediments to renewal. The swamp that Trump is to drain is entrenched and…
  • PDF's for Einstein, Dr. Rosaly M. C. Lopes, Darwin, Lorenzo Langstroth, Marie Curie, Shakespeare & Many More! by Tracy Turner Shakespeare, Curie, Orwell, Hemingway, Dostoevsky, Lopes, Einstein Dr. Rosaly Lopes Director of the Planetary Science…
  • RT.com Speaking just one day after the Republican candidate's US election victory, the Russian president explained Moscow's position on a range of global issues Russian President Vladimir Putin addressed pressing global issues at Sochi's annual Valdai…
  • The Pretender's Magic is their diversity in musical range. Mystifying the sultry blues of "Blue Sun" to the punk-infused anthems like "Brass in Pocket," the band slips into these heterogeneous grooves with greased skids. Chrissie's wide-ranging influences pair with The Pretenders, evolving while retaining core elements of its personality. The eclectic portfolio will consistently deliver a "new" live surprise. Sorry, but there is no raucous Lynyrd Skynyrd "Play Free Bird" here. Everybody has a favorite, many favorites. The diversity of the songs makes every new and old fan curious to learn more about one aspect or another of the band's expression.
  • By Joe Granville When the formula is calculated, it yields a very small probability—around 1.45 × 10⁻¹⁴, or 0.00014%. This result suggests that, mathematically, Trump's victory is extremely unlikely under these assumptions. A centrist in the Tea Party,…
  • by Ellen Brown Buncombe County North Carolina – damage after Hurricane Helene floods. NCDOTcommunications, CC BY 2.0 https://creativecommons.org/licenses/by/2.0, via Wikimedia Commons Asheville, North Carolina, is known for its historic architecture,…
November 2024
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
          1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30

  XML Feeds

powered by b2evolution
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi