NSA Spy Tools of the Global Surveillance State

“These programs were never about terrorism: they’re about economic spying, social control, and diplomatic manipulation. They’re about power.” – Edward Snowden, NSA whistleblower

Brooks, Bradley. “NSA’s indiscriminate spying ‘collapsing,’ Snowden says in open letter.The Washington Post, WP Company, 17 Dec. 2013.

Government surveillance is nothing new, but it has taken on a new life in the digital age. Revelations made by Edward Snowden and Julian Assange have shown that advanced surveillance technology is very much real.

The National Security Agency has its roots in early cryptography. In 1943, the US and UK formed the BRUSA Agreement, in which they agreed to share all special intelligence derived by cryptanalysis of the communications of the Axis powers. This would lead to the establishment of Five Eyes—a signals intelligence sharing alliance between the United States, United Kingdom, Canada, Australia, and New Zealand.

Fast forward to January 2019, and over half of the world’s population actively uses the Internet. As the world has evolved, so too has Signals Intelligence (SIGINT) gathering, to the extent that a cyber-military-industrial-complex has been born. Many had speculated about the capabilities of the NSA, but it wasn’t until Edward Snowden leaked troves of top secret documents in 2013 that we had proof. Here is just a small fraction of the Intelligence Community’s spy tools.

ECHELON is a global surveillance system originally disclosed by former Lockheed employee Margaret Newsham in 1988. She blew the whistle after becoming disillusioned by the unconstitutional surveillance of US citizens when she realized the voice on a private call she was intercepting was that of US Senator Strom Thurmond. After she blew the whistle Journalists started investigating the program and discovered that it could intercept almost any electronic communication, be it a phone conversation, mobile phone call, e-mail message, fax transmission, Internet browsing history, or satellite transmission. Radomes at a Royal Air Force base in North Yorkshire, England, are used to intercept satellite communications.

BOUNDLESSINFORMANT is a tool used to analyze the exabytes of data (which is millions of terabytes) that is stored at the NSA’s Utah Data Center. BOUNDLESSINFORMANT slides reveal that in a 30-day period in 2013, the NSA collected over 97 billion internet data records and 124 billion telephone data records. Three billion of those data elements came from inside the United States—more than came from Russia.

XKeyscore allows NSA analysts to access emails, online chats, and browsing histories of millions people around the world. The Guardian revealed that the program can collect “nearly everything a user does on the internet” and allows analysts to “search without prior authorization through vast databases containing emails, chats and the browsing histories of millions of individuals.”

PRISM harvests data directly from the servers of Big Tech companies including Microsoft, Yahoo!, Google, Facebook, Skype, YouTube, and Apple. PRISM began with the passage of the Protect America Act under George W. Bush in 2007.

According to a 2014 report by the Privacy and Civil Liberties Oversight Board, under PRISM the government needs only send an email address to a communications provider in order to acquire that person’s communications. A portion of that information is shared with the CIA and FBI.

Leaked NSA slides show the year that collection began with each provider. Note that Apple didn’t get on board until after the death of Steve Jobs.

DoublePulsar was a backdoor implant that allowed the NSA to take complete and unrestricted control over a target’s computer. A mysterious hacker group called The Shadow Brokers leaked this powerful tool to the world in April 2017. Within weeks, it and its predecessors had caused the worldwide WannaCry ransomware event, which infected more than 230,000 computers in over 150 countries in its first day and ultimately infected over 400,000 computers.

EternalBlue was another leaked NSA exploit which was part of the WannaCry virus. The NSA only grudgingly revealed the security flaw to Microsoft after they found out about its theft. Brad Smith, Microsoft’s president and chief legal officer, lambasted the NSA for stockpiling vulnerabilities rather than disclosing them to developers in order to protect citizens.

Weeping Angel was published by WikiLeaks in 2017 and shows how the CIA can turn Samsung smart TVs into bugging devices. Once installed, the tool enables covert recording through the TV’s built-in microphones, and while the television falsely appears to be turned off.

That program was part of a larger publication called Vault7, which also showed CIA plans to infect vehicle control systems used by modern cars and trucks. This would permit the CIA to engage in nearly undetectable assassinations, and some speculate that the death of Michael Hastings could have been pulled off this way.

This only begins to scratch the surface of cyber surveillance programs, but we encourage you to check out Wikipedia’s Global Surveillance portal, as it has a lot of great information on the subject.

Has the NSA gone too far? Are these surveillance programs necessary? Do you think they spy on ordinary people without justification? Let us know what you think in the comments below, like, share, and stay strange!

One thought on “NSA Spy Tools of the Global Surveillance State

  • May 30, 2019 at 3:29 pm

    Things i have seen in terms of laptop or computer memory is that there are specifications such as SDRAM, DDR and many others, that must match the features of the motherboard. If the computer’s motherboard is pretty current and there are no operating-system issues, updating the ram literally takes under an hour. It’s one of several easiest pc upgrade methods one can imagine. Thanks for revealing your ideas.


Leave a Reply

Your email address will not be published. Required fields are marked *