NSA locates cell phones even when they are turned off

July 22, 2013

Never mind the non-stop collection of metadata and other sneaky surveillance tools being implemented by the NSA: a new report has revealed that the National Security Agency’s spy powers allow the government to grab location data on just about anyone.

In an article published by the Washington Post over the weekend, journalist Dana Priest detailed how one of the most secretive agencies administered by the United States government has expanded drastically in the decade-plus since the terrorist attacks of September 11, 2001. An increased demand for intelligence encouraged the development and implementation of surveillance tactics previous confined to the pages of science fiction, she wrote, and those tools today rival even what has already been unearthed by the NSA’s undercover operations.

Lacking a strong informant network to provide details about al-Qaeda, US intelligence and the military turned to the NSA’s technology to fill the void,” Priest wrote.

According to Priest, policies enacted in a post-9/11 intelligence community involved a pivotal role played by the National Geospatial-Intelligence Agency, a Department of Defense office that was created to collect battlefield intelligence using the most sophisticated of means available. In the wake of 9/11, that involved being able to pinpoint the location of a suspected adversary using only a cell phone number, and agents with that kind of access quickly were on-demand outside of the walls of the NGIA and NSA.

In one incident reported by Priest, a Navy SEAL working within a makeshift Central Intelligence Agency operations center in one part of the US called up an agent in the basement of the NSA’s base in Augusta, Georgia and insisted a team of geolocation specialists identify the exact location of an insurgent in Afghanistan using only the suspect’s telephone number.

Once all parties were properly coordinated, Priest wrote “they aimed the NSA’s many sensors toward individual targets while tactical units aimed their weaponry against them.”

Priest went on to call that moment and others like it revolutionary with regards to what was to come for the NSA. The intelligence tools once used to track and spy on the leaders of competing countries and adversaries around the world had been deployed to target a single suspected terrorists 8,000 miles away using the resources utilized by an ever-expanding agency still only in its infancy.

Thanks to a bevy of whistleblowers who exposed the agency’s use of domestic surveillance years before the name Edward Snowden was known, today it’s common knowledge that the communications of American citizens can be inadvertently collected by the NSA. Leaked documents attributed to Snowden during the last several weeks have shined further light on how the Foreign Intelligence Surveillance Act, the PATRIOT Act and an array of tactics take conversations sent over telephone wires, fiber optic cables and Wi-Fi signals and send them to Uncle Sam. In her article for the Post, though, Priest wrote that these tools are coupled with military agencies at times to create a quick and coordinated action that often ends in the execution of an alleged enemy.

By September 2004, a new NSA technique enabled the agency to find cellphones even when they were turned off,” Priest wrote. The tactic was called “The Find,” and reportedly it gave the Joint Special Operations Command the tools to track down members of al-Qaeda and other extremist group and then order a hit. Combining it with another new system, the Real Time Regional Gateway, both intelligence and military officers could access any type of surveillance in a given region under which a target could be tracked.

We Track ’Em, You Whack ’Em,” was a motto that the Augusta, Georgia geolocation agents quickly adopted, Priest wrote.

But 12 years after the September 11 attack — and more than three since al-Qaeda leader Osama bin Laden was executed thanks to tactics employed by the NSA, CIA and others — these operations have not been scaled back. Instead, rather, the NSA has expanded around the globe and is currently in the midst of building what will be one of the largest intelligence facilities in America.

That structure, a million-square-foot data storage facility in Bluffdale, Utah, when all is said and done will collect domestic intelligence that one former NSA worker said isn’t necessarily relevant to anything.

Bill Binney, a former NSA agent that resigned after 9/11 with more than three decades of experience under his belt, said the government is collecting data before even figuring out what to do with it.

"They would have plenty of space with five zettabytes to store at least something on the order of 100 years’ worth of the worldwide communications, phones and emails and stuff like that," Binney told Wired last year, "and then have plenty of space left over to do any kind of parallel processing to try to break codes."

It’s everything — phones, emails, twitter, any kind of digital communications that they’ve had. I think it’s into banking as well, but I don’t know that for sure. I do believe they’re doing it,” he added to Libertas Institute in an interview last month. “My estimate is that there’s a little over 280 million Americans in the database, several times because one person can have a work phone, home phone, mobile phone, online banking, multiple email addresses. Two-hundred-and-eighty million people are in there at least, and the ones that aren’t are babies in cribs, people in hospice, others not doing anything electronic. Each person is in there between several hundred and several thousand times. It’s aggregated data over a now 12 year period.”

Meanwhile, the NSA defends the construction of both foreign and domestic facilities, citing to Priest the need to stay one-step ahead of the adversary.

The notion of constant, unchecked, or senseless growth is a myth,” the NSA said in a statement to the Post.

http://rt.com/usa/nsa-cell-phone-tracking-436/

Views: 143

Comment

You need to be a member of United Truth Seekers to add comments!

Join United Truth Seekers

Comment by Kerry Hay on July 23, 2013 at 2:01am

I've been spied on for years. I've been followed at times in shopping centers and on the street. Once they even turned off both mobile phones for two weeks on two separate mobile networks, no calls in or out, so I drove down to the local store to use their red phone to order a gas bottle, but my money just fell through, so then I drove to the next town to use a phone box, and again the money just fell through and so I let someone else use that phone and he have no problem calling out, so I tried the phone again and again, even put in a two dollar coin, and again the money fell through. I drove back to a garage and tried their red phone, again the money fell through and would not connect my call. So I used the service stations phone in their office and it worked and I was able to talk but only for about 20 seconds because I was cut off. It make you think how much technology big brother has. Why am I a problem for them? They even had a security van with darkened windows and all these antennas parked on the roof parked for two weeks. I never saw anyone enter or leave the van, weird!!!

http://www.kerryhay.spiderweb.com.au

   

Rocks2Rings

Help Pay The Rent. "United Truth Seekers" Is an informative Social Network exposing the truth that the mainstream media ignores. The truth will set you free!

This website is brought to you exclusively by member donations. Click Above, Thank you.

About

Eastern Standard Time

We’re “mining” cryptocurrency with our phones! I’m looking for people who want to join me and my friends and figured this would be a good way to get the word out. 🚀 I am sending you 1π! Pi is a new digital currency developed by Stanford PhDs, with over 10 million members worldwide. To claim your Pi, follow this link https://minepi.com/PAMUTS and use my username PAMUTS as your invitation code.

Download this and you will get cryptocurrency mining on your phone, and remember every 24 hours to open the app and touch the Pi button that way it automatically starts mining for you, you basically have to do nothing after that just let it Stay in the background mining cryptocurrency for you until one day it’s worth money for enough to cash it out!

~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~

DEMAND THE TRUTH!

"It was the poverty caused by the bad influence of the
 English Bankers on the Parliament which has caused in the colonies hatred of the English and...the Revolutionary War."
– Benjamin Franklin

"Guard with jealous attention the public liberty. Suspect every one who approaches that jewel. Unfortunately, nothing will preserve it but downright force. Whenever you give up that force, you are ruined."

Patrick Henry
June 26, 1788

 

© 2024   Created by Pam Vredenburg.   Powered by

Badges  |  Report an Issue  |  Terms of Service

google-site-verification: google4dc7c778a884c7b9.html