{"id":102389,"date":"2014-01-01T08:13:00","date_gmt":"2014-01-01T08:13:00","guid":{"rendered":"http:\/\/rinf.com\/alt-news\/?guid=b1fc250e879fc76c89de3fd818a3f3e3"},"modified":"2014-01-01T08:13:00","modified_gmt":"2014-01-01T08:13:00","slug":"nsas-top-hacking-unit","status":"publish","type":"post","link":"https:\/\/rinf.com\/alt-news\/editorials\/nsas-top-hacking-unit\/","title":{"rendered":"NSA&#8217;s Top Hacking Unit"},"content":{"rendered":"<div style=\"font-family: Arial; font-size: 19px;\"><b>NSA&#8217;s Top Hacking Unit<\/b><\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">by Stephen Lendman<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">On December 29, <a href=\"http:\/\/www.spiegel.de\/international\/world\/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html\"><span style=\"color: #1255cc;\">Der Spiegel<\/span><\/a> headlined &#8220;Inside TAO: Documents Reveal Top NSA Hacking Unit.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">It&#8217;s &#8220;considered to be (its) top secret weapon.&#8221; Its covert network &#8220;infiltrates computers around the world and even intercepts shipping deliveries to plant back doors in electronics ordered by&#8221; whomever it targets.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">More on this below. Snowden documents remain the gift that keeps on giving. Doing so made him a world hero. Washington calls exposing wrongdoing illegal. Lawlessness is official US policy.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Since 1993, Britain&#8217;s Channel 4 broadcast an alternative Christmas message. It&#8217;s an antidote to Queen Elizabeth&#8217;s Royal Christmas Message.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">In 1932, King George began them on radio. In 1957, Queen Elizabeth delivered the first televised broadcast. It&#8217;s typical royal mumbo jumbo. Why Brits tune in they&#8217;ll have to explain.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Snowden&#8217;s comments are important. Orwell&#8217;s warnings &#8220;are nothing compared to what we have available today,&#8221; he said.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">&#8220;We have sensors in our pockets that track us everywhere we go. Think about what this means for the privacy of the average person.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Children &#8220;born today will grow up with no conception of privacy at all.&#8221;&nbsp;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">&#8220;They&#8217;ll never know what it means to have a private moment to themselves, an unrecorded, unanalyzed thought.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">&#8220;And that&#8217;s a problem because privacy matters. (It&#8217;s) what allows us to determine who we are and who we want to be.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Snowden wants ordinary people to decide how governments monitor them. &#8220;All I wanted was for the public to be able to have a say in how they&#8217;re governed,&#8221; he explained.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">He&#8217;s doing it by revealing the extent of NSA spying.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">&#8220;The conversation occurring today will determine the amount of trust we can place both in the technology that surrounds us and the government that regulates it,&#8221; he said.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">&#8220;Together we can find a better balance, end mass surveillance, and remind the government that if it really wants to know how we feel, asking is always cheaper than spying.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">&#8220;I already won,&#8221; he said. &#8220;As soon as the journalists were able to work, everything that I had been trying to do was validated.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">&#8220;Because, remember, I didn&#8217;t want to change society. I wanted to give society a chance to determine if it should change itself.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">&#8220;All I wanted was for the public to be able to have a say in how they are governed.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Not as long as NSA has its way. Not while Congress and US administrations let it. Previous articles discussed its Office of Tailored Operations (TAO).<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">It&#8217;s top secret. It has over 1,000 military and civilian hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">It identifies computer systems and supporting telecommunications networks to attack.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">It successfully penetrated Chinese computer and telecom systems. It&#8217;s been doing it for over 15 years. It does the same thing globally.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Most NSA employees and officials know little or nothing about TAO. Its operations are extraordinarily sensitive. Only those needing to know are kept informed.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Special security clearances are required to gain access to its top secret work spaces. Armed guards keep others out.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Entering requires a correct six digit code. Retinal scanner checks are used. TAO targets foreign computer systems.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">It collects hard to get intelligence. It does it by hacking, cracking passwords, compromising computer security systems, stealing hard drive data, and copying all subsequent emails and text messages.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">TAO personnel penetrate, steal, damage, destroy or otherwise compromise targeted sites. It&#8217;s perhaps the most important component of NSA&#8217;s Signal Intelligence (SIGINT) Directorate.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">It lets NSA get information not otherwise available. It can do it without being detected.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Der Spiegel called TAO NSA&#8217;s &#8216;top operative unit.&#8221; It&#8217;s &#8220;something like a squad of plumbers,&#8221; it said. They&#8217;re &#8220;called in when normal access to a target is blocked.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">They&#8217;re &#8220;involved in many sensitive operations conducted by American intelligence agencies.&#8221; They range from counterintelligence to cyberwar to espionage.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Snowden&#8217;s documents revealed TAO sophistication. It exploits technical weaknesses. It does so secretly, discreetly and efficiently.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">It gets the &#8220;ungettable.&#8221; According to a former unnamed TAO chief:<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">&#8220;It is not about the quantity produced but the quality of intelligence that is important,&#8221; she said. (It&#8217;s gotten) some of the most significant intelligence our country has ever seen.&#8221;&nbsp;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">It &#8220;access(es) our very hardest targets. (It) needs to continue to grow, and must lay the foundation for integrated Computer Network Operations.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">It must &#8220;support Computer Network Attacks as an integrated part of military operations. (It has to acquire) pervasive, persistent access on the global network.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Its mandate is conducting aggressive attacks. Through the middle of the last decade, it accessed 258 targets. It did so in 89 countries globally. In 2010, it conducted 279 operations.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">It penetrated protected networks of targeted world leaders. It did so against European telecommunications companies.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">It cracked Blackberry&#8217;s encrypted BES email servers. One document said doing so required &#8220;sustained TAO operation(al)&#8221; effort.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">In 1997, TAO was created. At the time, only 2% of the world&#8217;s population had Internet access. It was a year before Google was founded. Facebook, Twitter and YouTube weren&#8217;t around. Yahoo was a fledgling operation.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">TAO personnel work at NSA&#8217;s Fort Meade, MD headquarters. They&#8217;re in San Antonio, TX. They&#8217;re in other locations. They&#8217;re housed in their own wings. They&#8217;re separate from other NSA operations.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Their match Star Trek. They do it for real. They go where no one went before. They do it round-the-clock. They do it globally.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">They find ways to hack into global communications systems. They penetrate the most heavily protected ones.&nbsp;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">They do what never before was possible. They do it secretly. They do it without being detected.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">TAO employs new kinds of people. They&#8217;re much younger than other NSA personnel. They&#8217;re expert hackers. &#8220;Their job is breaking into, manipulating, and exploiting computer networks,&#8221; said Der Spiegel.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">They resemble geeks. They act like them. NSA director Keith Alexander is involved in recruiting. He attends major hacker conferences.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Sometimes it&#8217;s in formal military attire. Other times, he wears jeans and t-shirts. It&#8217;s to look and act like the geeks he&#8217;s recruiting. It works.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">TAO has operations in Wahiawa, Hawaii, Fort Gordon, GA, Buckley Air Force Base near Denver, Fort Meade, MD, San Antonio, TX and a liaison office near Frankfurt, Germany.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">It&#8217;s the European Security Operations Center (ESOC) &#8220;Dagger Complex. It&#8217;s at a US military compound in Griesheim. It&#8217;s a suburb of Darmstadt near Frankfort.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">It&#8217;s secured by a tall wire fence. It&#8217;s topped with barbed wire. It&#8217;s in relatively modest buildings. They&#8217;re surrounded by green space. It&#8217;s for added security.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">It&#8217;s one of Hesse state&#8217;s best protected sites. NSA&#8217;s European Cryptologic Center (ECC) is headquartered there. A 2011 NSA report calls it the &#8220;largest analysis and productivity (site) in Europe.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Information obtained ends up in Obama&#8217;s daily briefings. He gets them on average twice weekly.&nbsp;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">NSA considers Germany a prime target. Espionage is prioritized. So is German foreign policy.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Weeks after NSA spying on Angela Merkel was revealed, Berlin still awaits answers on what it&#8217;s up to in Germany.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Documents Der Spiegel saw revealed intense NSA spying. Its personnel consider German intelligence gotten a &#8220;success story.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Tons of information were collected. Former NSA director Michael Hayden told Der Spiegel: &#8220;(T)he damage for the German-American relationship is huge.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Post-9\/11, he tried working cooperatively with Germany&#8217;s BND intelligence, he said. &#8220;I tried to avoid acting as an occupier,&#8221; he claimed.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">&#8220;We extended our cooperation.&#8221; It&#8217;s now jeopardized. He admits NSA espionage. &#8220;We steal secrets,&#8221; he said. &#8220;We&#8217;re number one in (doing) it.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">NSA isn&#8217;t malicious, he claims. &#8220;We steal stuff to make you safe, not to make you rich.&#8221; NSA steals everything it gets its hands on. It compromises public safety. It does so globally.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Former NSA employee\/whistleblower Thomas Drake said &#8220;September 11 was the trigger that (made) Germany a target of high priority.&#8221;&nbsp;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Powerful tools are used to do whatever NSA wishes. To infiltrate wherever it wants to go. To steal as much as it can about virtually everything. NSA director Alexander says &#8220;get it all.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Der Spiegel called its Texas operations &#8220;uniquely impressive.&#8221; The Texas Cryptologic Center employs less than 60 TAO specialists.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">By 2015, plans are to increase staff to about 270. Another 85 specialists work in the Requirements &amp; Targeting division. In 2008, they numbered 13.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Software developers are expected to increase from three in 2008 to 38 in 2015. San Antonio-based operations target Middle East Countries, Cuba, Venezuela, Columbia and Mexico.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">According to Washington&#8217;s planned intelligence operations, around 85,000 computers worldwide were expected to be infiltrated by year end 2013. Most involve TAO operations.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Cyber criminals run them. They hack into computer systems. They send emails disguised as spam. They contain links directing users to virus-infected web sites.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">They implant NSA malware this way. They do it without targeted subjects knowing.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">A major TAO goal is &#8220;subvert(ing) endpoint devices.&#8221; They include &#8220;servers, workstations, firewalls, routers, handsets, phone switches, (and) SCADA systems, etc.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">According to Der Spiegel:&nbsp;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">&#8220;SCADAs are industrial control systems used in factories, as well as in power plants\u2026(The) most well-known and notorious use of this type of attack was the development of Stuxnet&#8230;&#8221;&nbsp;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">In spring 2010, Iranian intelligence discovered its malware contamination. It infected its Bushehr nuclear facility. At the time, operations were halted indefinitely.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Israel was responsible. So was Washington. Had the facility gone online infected, Iran&#8217;s entire electrical power grid could have been shut down.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">One of NSA&#8217;s &#8220;most productive operations&#8221; is its direct &#8220;interdiction.&#8221; Goods are rerouted from suppliers to secret TAO locations.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">According to Der Spiegel:<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">TAO personnel &#8220;carefully open&#8230;package(s) in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies.&#8221;&nbsp;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">&#8220;All subsequent steps can then be conducted from the comfort of a remote computer.&#8221; Operations are conducted globally.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">NSA targets virtually everyone. Its ultimate goal is leaving no one behind. Most important are &#8220;entire networks and network providers,&#8221; said Der Spiegel.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Fiber optic cables handling global Internet traffic &#8220;along the world&#8217;s ocean floors&#8221; are prime targets.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">NSA responded to Der Spiegel&#8217;s query. It lied saying TAO &#8220;is a unique national asset that is on the front lines of enabling NSA to defend the nation and its allies.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Domestic spying has nothing to do with national security. It&#8217;s for control. It&#8217;s global espionage for economic advantage. It&#8217;s to be one up on foreign competitors.&nbsp;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">It&#8217;s for information used advantageously in trade, political, and military relations. It&#8217;s lawlessly obtained. It&#8217;s unconstitutional. It doesn&#8217;t matter.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">NSA is one of many US rogue operations. America&#8217;s 15 other intelligence agencies operate the same way.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Congress, administrations and federal courts are worst of all. They function lawlessly. They legitimize the illegitimate.&nbsp;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">They threaten humanity in the process. Imagine what they plan this year. Expect worse conditions perhaps than earlier. Rogue states operate that way. America is by far the worst.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Stephen Lendman lives in Chicago. He can be reached at lendmanstephen@sbcglobal.net.&nbsp;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">His new book is titled &#8220;Banker Occupation: Waging Financial War on Humanity.&#8221;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">http:\/\/www.claritypress.com\/LendmanII.html<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Visit his blog site at sjlendman.blogspot.com.&nbsp;<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">Listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">It airs Fridays at 10AM US Central time and Saturdays and Sundays at noon. All programs are archived for easy listening.<\/div>\n<div style=\"font-size: 12px; min-height: 14px;\"><\/div>\n<div style=\"font-family: Arial; font-size: 19px;\">http:\/\/www.progressiveradionetwork.com\/the-progressive-news-hour<\/div>\n<div style=\"font-family: Arial; font-size: 19px; min-height: 22px;\"><\/div>\n<p><\/p>\n<div style=\"font-family: Arial; font-size: 19px;\">http:\/\/www.dailycensored.com\/nsas-top-hacking-unit\/<\/div>\n","protected":false},"excerpt":{"rendered":"<div><b>NSA&#8217;s Top Hacking Unit<\/b><\/div>\n<div><\/div>\n<div>by Stephen Lendman<\/div>\n<div><\/div>\n<div>On December 29, <a href=\"http:\/\/www.spiegel.de\/international\/world\/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html\"><span>Der Spiegel<\/span><\/a> headlined &#8220;Inside TAO: Documents Reveal Top NSA Hacking Unit.&#8221;<\/div>\n<div><\/div>\n<div>It&#8217;s &#8220;considered to be (its) top secret weapon.&#8221; Its covert network &#8220;infiltrates computers around the world and even intercepts shipping deliveries to plant back doors in electronics ordered by&#8221; whomever it targets.<\/div>\n<div><\/div>\n<div>More on this below. Snowden documents remain the gift that keeps on giving. Doing so made him a world hero. Washington calls exposing wrongdoing illegal. Lawlessness is official US policy.<\/div>\n<div><\/div>\n<div>Since 1993, Britain&#8217;s Channel 4 broadcast an alternative Christmas message. It&#8217;s an antidote to Queen Elizabeth&#8217;s Royal Christmas Message.<\/div>\n<div><\/div>\n<div>In 1932, King George began them on radio. In 1957, Queen Elizabeth delivered the first televised broadcast. It&#8217;s typical royal mumbo jumbo. Why Brits tune in they&#8217;ll have to explain.<\/div>\n<div><\/div>\n<div>Snowden&#8217;s comments are important. Orwell&#8217;s warnings &#8220;are nothing compared to what we have available today,&#8221; he said.<\/div>\n<div><\/div>\n<div>&#8220;We have sensors in our pockets that track us everywhere we go. Think about what this means for the privacy of the average person.&#8221;<\/div>\n<div><\/div>\n<div>Children &#8220;born today will grow up with no conception of privacy at all.&#8221;&nbsp;<\/div>\n<div><\/div>\n<div>&#8220;They&#8217;ll never know what it means to have a private moment to themselves, an unrecorded, unanalyzed thought.&#8221;<\/div>\n<div><\/div>\n<div>&#8220;And that&#8217;s a problem because privacy matters. (It&#8217;s) what allows us to determine who we are and who we want to be.&#8221;<\/div>\n<div><\/div>\n<div>Snowden wants ordinary people to decide how governments monitor them. &#8220;All I wanted was for the public to be able to have a say in how they&#8217;re governed,&#8221; he explained.<\/div>\n<div><\/div>\n<div>He&#8217;s doing it by revealing the extent of NSA spying.<\/div>\n<div><\/div>\n<div>&#8220;The conversation occurring today will determine the amount of trust we can place both in the technology that surrounds us and the government that regulates it,&#8221; he said.<\/div>\n<div><\/div>\n<div>&#8220;Together we can find a better balance, end mass surveillance, and remind the government that if it really wants to know how we feel, asking is always cheaper than spying.&#8221;<\/div>\n<div><\/div>\n<div>&#8220;I already won,&#8221; he said. &#8220;As soon as the journalists were able to work, everything that I had been trying to do was validated.&#8221;<\/div>\n<div><\/div>\n<div>&#8220;Because, remember, I didn&#8217;t want to change society. I wanted to give society a chance to determine if it should change itself.&#8221;<\/div>\n<div><\/div>\n<div>&#8220;All I wanted was for the public to be able to have a say in how they are governed.&#8221;<\/div>\n<div><\/div>\n<div>Not as long as NSA has its way. Not while Congress and US administrations let it. Previous articles discussed its Office of Tailored Operations (TAO).<\/div>\n<div><\/div>\n<div>It&#8217;s top secret. It has over 1,000 military and civilian hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.<\/div>\n<div><\/div>\n<div>It identifies computer systems and supporting telecommunications networks to attack.<\/div>\n<div><\/div>\n<div>It successfully penetrated Chinese computer and telecom systems. It&#8217;s been doing it for over 15 years. It does the same thing globally.<\/div>\n<div><\/div>\n<div>Most NSA employees and officials know little or nothing about TAO. Its operations are extraordinarily sensitive. Only those needing to know are kept informed.<\/div>\n<div><\/div>\n<div>Special security clearances are required to gain access to its top secret work spaces. Armed guards keep others out.<\/div>\n<div><\/div>\n<div>Entering requires a correct six digit code. Retinal scanner checks are used. TAO targets foreign computer systems.<\/div>\n<div><\/div>\n<div>It collects hard to get intelligence. It does it by hacking, cracking passwords, compromising computer security systems, stealing hard drive data, and copying all subsequent emails and text messages.<\/div>\n<div><\/div>\n<div>TAO personnel penetrate, steal, damage, destroy or otherwise compromise targeted sites. It&#8217;s perhaps the most important component of NSA&#8217;s Signal Intelligence (SIGINT) Directorate.<\/div>\n<div><\/div>\n<div>It lets NSA get information not otherwise available. It can do it without being detected.<\/div>\n<div><\/div>\n<div>Der Spiegel called TAO NSA&#8217;s &#8216;top operative unit.&#8221; It&#8217;s &#8220;something like a squad of plumbers,&#8221; it said. They&#8217;re &#8220;called in when normal access to a target is blocked.&#8221;<\/div>\n<div><\/div>\n<div>They&#8217;re &#8220;involved in many sensitive operations conducted by American intelligence agencies.&#8221; They range from counterintelligence to cyberwar to espionage.<\/div>\n<div><\/div>\n<div>Snowden&#8217;s documents revealed TAO sophistication. It exploits technical weaknesses. It does so secretly, discreetly and efficiently.<\/div>\n<div><\/div>\n<div>It gets the &#8220;ungettable.&#8221; According to a former unnamed TAO chief:<\/div>\n<div><\/div>\n<div>&#8220;It is not about the quantity produced but the quality of intelligence that is important,&#8221; she said. (It&#8217;s gotten) some of the most significant intelligence our country has ever seen.&#8221;&nbsp;<\/div>\n<div><\/div>\n<div>It &#8220;access(es) our very hardest targets. (It) needs to continue to grow, and must lay the foundation for integrated Computer Network Operations.&#8221;<\/div>\n<div><\/div>\n<div>It must &#8220;support Computer Network Attacks as an integrated part of military operations. (It has to acquire) pervasive, persistent access on the global network.&#8221;<\/div>\n<div><\/div>\n<div>Its mandate is conducting aggressive attacks. Through the middle of the last decade, it accessed 258 targets. It did so in 89 countries globally. In 2010, it conducted 279 operations.<\/div>\n<div><\/div>\n<div>It penetrated protected networks of targeted world leaders. It did so against European telecommunications companies.<\/div>\n<div><\/div>\n<div>It cracked Blackberry&#8217;s encrypted BES email servers. One document said doing so required &#8220;sustained TAO operation(al)&#8221; effort.<\/div>\n<div><\/div>\n<div>In 1997, TAO was created. At the time, only 2% of the world&#8217;s population had Internet access. It was a year before Google was founded. Facebook, Twitter and YouTube weren&#8217;t around. Yahoo was a fledgling operation.<\/div>\n<div><\/div>\n<div>TAO personnel work at NSA&#8217;s Fort Meade, MD headquarters. They&#8217;re in San Antonio, TX. They&#8217;re in other locations. They&#8217;re housed in their own wings. They&#8217;re separate from other NSA operations.<\/div>\n<div><\/div>\n<div>Their match Star Trek. They do it for real. They go where no one went before. They do it round-the-clock. They do it globally.<\/div>\n<div><\/div>\n<div>They find ways to hack into global communications systems. They penetrate the most heavily protected ones.&nbsp;<\/div>\n<div><\/div>\n<div>They do what never before was possible. They do it secretly. They do it without being detected.<\/div>\n<div><\/div>\n<div>TAO employs new kinds of people. They&#8217;re much younger than other NSA personnel. They&#8217;re expert hackers. &#8220;Their job is breaking into, manipulating, and exploiting computer networks,&#8221; said Der Spiegel.<\/div>\n<div><\/div>\n<div>They resemble geeks. They act like them. NSA director Keith Alexander is involved in recruiting. He attends major hacker conferences.<\/div>\n<div><\/div>\n<div>Sometimes it&#8217;s in formal military attire. Other times, he wears jeans and t-shirts. It&#8217;s to look and act like the geeks he&#8217;s recruiting. It works.<\/div>\n<div><\/div>\n<div>TAO has operations in Wahiawa, Hawaii, Fort Gordon, GA, Buckley Air Force Base near Denver, Fort Meade, MD, San Antonio, TX and a liaison office near Frankfurt, Germany.<\/div>\n<div><\/div>\n<div>It&#8217;s the European Security Operations Center (ESOC) &#8220;Dagger Complex. It&#8217;s at a US military compound in Griesheim. It&#8217;s a suburb of Darmstadt near Frankfort.<\/div>\n<div><\/div>\n<div>It&#8217;s secured by a tall wire fence. It&#8217;s topped with barbed wire. It&#8217;s in relatively modest buildings. They&#8217;re surrounded by green space. It&#8217;s for added security.<\/div>\n<div><\/div>\n<div>It&#8217;s one of Hesse state&#8217;s best protected sites. NSA&#8217;s European Cryptologic Center (ECC) is headquartered there. A 2011 NSA report calls it the &#8220;largest analysis and productivity (site) in Europe.&#8221;<\/div>\n<div><\/div>\n<div>Information obtained ends up in Obama&#8217;s daily briefings. He gets them on average twice weekly.&nbsp;<\/div>\n<div><\/div>\n<div>NSA considers Germany a prime target. Espionage is prioritized. So is German foreign policy.<\/div>\n<div><\/div>\n<div>Weeks after NSA spying on Angela Merkel was revealed, Berlin still awaits answers on what it&#8217;s up to in Germany.<\/div>\n<div><\/div>\n<div>Documents Der Spiegel saw revealed intense NSA spying. Its personnel consider German intelligence gotten a &#8220;success story.&#8221;<\/div>\n<div><\/div>\n<div>Tons of information were collected. Former NSA director Michael Hayden told Der Spiegel: &#8220;(T)he damage for the German-American relationship is huge.&#8221;<\/div>\n<div><\/div>\n<div>Post-9\/11, he tried working cooperatively with Germany&#8217;s BND intelligence, he said. &#8220;I tried to avoid acting as an occupier,&#8221; he claimed.<\/div>\n<div><\/div>\n<div>&#8220;We extended our cooperation.&#8221; It&#8217;s now jeopardized. He admits NSA espionage. &#8220;We steal secrets,&#8221; he said. &#8220;We&#8217;re number one in (doing) it.&#8221;<\/div>\n<div><\/div>\n<div>NSA isn&#8217;t malicious, he claims. &#8220;We steal stuff to make you safe, not to make you rich.&#8221; NSA steals everything it gets its hands on. It compromises public safety. It does so globally.<\/div>\n<div><\/div>\n<div>Former NSA employee\/whistleblower Thomas Drake said &#8220;September 11 was the trigger that (made) Germany a target of high priority.&#8221;&nbsp;<\/div>\n<div><\/div>\n<div>Powerful tools are used to do whatever NSA wishes. To infiltrate wherever it wants to go. To steal as much as it can about virtually everything. NSA director Alexander says &#8220;get it all.&#8221;<\/div>\n<div><\/div>\n<div>Der Spiegel called its Texas operations &#8220;uniquely impressive.&#8221; The Texas Cryptologic Center employs less than 60 TAO specialists.<\/div>\n<div><\/div>\n<div>By 2015, plans are to increase staff to about 270. Another 85 specialists work in the Requirements &amp; Targeting division. In 2008, they numbered 13.<\/div>\n<div><\/div>\n<div>Software developers are expected to increase from three in 2008 to 38 in 2015. San Antonio-based operations target Middle East Countries, Cuba, Venezuela, Columbia and Mexico.<\/div>\n<div><\/div>\n<div>According to Washington&#8217;s planned intelligence operations, around 85,000 computers worldwide were expected to be infiltrated by year end 2013. Most involve TAO operations.<\/div>\n<div><\/div>\n<div>Cyber criminals run them. They hack into computer systems. They send emails disguised as spam. They contain links directing users to virus-infected web sites.<\/div>\n<div><\/div>\n<div>They implant NSA malware this way. They do it without targeted subjects knowing.<\/div>\n<div><\/div>\n<div>A major TAO goal is &#8220;subvert(ing) endpoint devices.&#8221; They include &#8220;servers, workstations, firewalls, routers, handsets, phone switches, (and) SCADA systems, etc.&#8221;<\/div>\n<div><\/div>\n<div>According to Der Spiegel:&nbsp;<\/div>\n<div><\/div>\n<div>&#8220;SCADAs are industrial control systems used in factories, as well as in power plants&hellip;(The) most well-known and notorious use of this type of attack was the development of Stuxnet&#8230;&#8221;&nbsp;<\/div>\n<div><\/div>\n<div>In spring 2010, Iranian intelligence discovered its malware contamination. It infected its Bushehr nuclear facility. At the time, operations were halted indefinitely.<\/div>\n<div><\/div>\n<div>Israel was responsible. So was Washington. Had the facility gone online infected, Iran&#8217;s entire electrical power grid could have been shut down.<\/div>\n<div><\/div>\n<div>One of NSA&#8217;s &#8220;most productive operations&#8221; is its direct &#8220;interdiction.&#8221; Goods are rerouted from suppliers to secret TAO locations.<\/div>\n<div><\/div>\n<div>According to Der Spiegel:<\/div>\n<div><\/div>\n<div>TAO personnel &#8220;carefully open&#8230;package(s) in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies.&#8221;&nbsp;<\/div>\n<div><\/div>\n<div>&#8220;All subsequent steps can then be conducted from the comfort of a remote computer.&#8221; Operations are conducted globally.<\/div>\n<div><\/div>\n<div>NSA targets virtually everyone. Its ultimate goal is leaving no one behind. Most important are &#8220;entire networks and network providers,&#8221; said Der Spiegel.<\/div>\n<div><\/div>\n<div>Fiber optic cables handling global Internet traffic &#8220;along the world&#8217;s ocean floors&#8221; are prime targets.<\/div>\n<div><\/div>\n<div>NSA responded to Der Spiegel&#8217;s query. It lied saying TAO &#8220;is a unique national asset that is on the front lines of enabling NSA to defend the nation and its allies.&#8221;<\/div>\n<div><\/div>\n<div>Domestic spying has nothing to do with national security. It&#8217;s for control. It&#8217;s global espionage for economic advantage. It&#8217;s to be one up on foreign competitors.&nbsp;<\/div>\n<div><\/div>\n<div>It&#8217;s for information used advantageously in trade, political, and military relations. It&#8217;s lawlessly obtained. It&#8217;s unconstitutional. It doesn&#8217;t matter.<\/div>\n<div><\/div>\n<div>NSA is one of many US rogue operations. America&#8217;s 15 other intelligence agencies operate the same way.<\/div>\n<div><\/div>\n<div>Congress, administrations and federal courts are worst of all. They function lawlessly. They legitimize the illegitimate.&nbsp;<\/div>\n<div><\/div>\n<div>They threaten humanity in the process. Imagine what they plan this year. Expect worse conditions perhaps than earlier. Rogue states operate that way. America is by far the worst.<\/div>\n<div><\/div>\n<div>Stephen Lendman lives in Chicago. He can be reached at lendmanstephen@sbcglobal.net.&nbsp;<\/div>\n<div><\/div>\n<div>His new book is titled &#8220;Banker Occupation: Waging Financial War on Humanity.&#8221;<\/div>\n<div><\/div>\n<div>http:\/\/www.claritypress.com\/LendmanII.html<\/div>\n<div><\/div>\n<div>Visit his blog site at sjlendman.blogspot.com.&nbsp;<\/div>\n<div><\/div>\n<div>Listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network.<\/div>\n<div><\/div>\n<div>It airs Fridays at 10AM US Central time and Saturdays and Sundays at noon. All programs are archived for easy listening.<\/div>\n<div><\/div>\n<div>http:\/\/www.progressiveradionetwork.com\/the-progressive-news-hour<\/div>\n<div><\/div>\n<p><\/p>\n<div>http:\/\/www.dailycensored.com\/nsas-top-hacking-unit\/<\/div>\n","protected":false},"author":1217,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[461],"tags":[],"class_list":{"0":"post-102389","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-editorials"},"_links":{"self":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/102389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/users\/1217"}],"replies":[{"embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/comments?post=102389"}],"version-history":[{"count":0,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/102389\/revisions"}],"wp:attachment":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media?parent=102389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/categories?post=102389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/tags?post=102389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}