Shadow NSA: Private Intelligence Contractors & NSAC

The sunsetting of the US Patriot Act was deliberate and was meant to render all contravening articles on the Net moot and academic. In its stead is the new USA Freedom Act that is advertised to reduce invasive surveillance of the state, and yet the actual gathering of metadata has not been curtailed, nor will it be even if we close down the NSA today.
The Surveillance State will continue undeterred and is in fact the primary agenda of the Bilderberg Conference this week.

This Shadow Government Agency Is Scarier Than the NSA

William M. Arkin This Shadow Government Agency Is Scarier Than the NSA
If you have a telephone number that has ever been called by an inmate in a federal prison, registered a change of address with the Postal Service, rented a car from Avis, used a corporate or Sears credit card, applied for nonprofit status with the IRS, or obtained non-driver’s legal identification from a private company, they have you on file.
They are not who you think they are. They are not the NSA or the CIA. They are the National Security Analysis Center (NSAC), an obscure element of the Justice Department that has grown from its creation in 2008 into a sprawling 400-person, $150 million-a-year multi-agency organization employing almost 300 analysts, the majority of whom are corporate contractors. [A list of contractors known to be associated with NSAC can be viewed here.] The Center has its roots in the Foreign Terrorist Tracking Task Force (FTTTF), a small cell established in October 2001 to look for additional 9/11-like terrorists who might have entered the United States. But with the emergence of significant “homegrown” threats in the late aughts, the Task Force’s focus was thought to be too narrow. NSAC was created to focus scrutiny on new threat, specifically on Americans, particularly Muslims, who might pose a hidden threat (the Task Force became a unit within NSAC’s bureaucratic umbrella). As Americans began traveling abroad to join al-Shabaab and then ISIS, the Center’s dragnet expanded to catch the vast pool of “youth” who also might fit a profile of either radicalism or law-breaking. Its mission runs the full gamut of “national security threats…to the United States and its interests,” according to a partially declassified Justice Department Inspector General report. That includes everything from terrorism to counter-narcotics, nuclear proliferation, and espionage.
NSAC not only has a focus beyond foreign investigations or terrorists, but in the past year-and-a-half, according to documents obtained by Phase Zero and extensive interviews with contractors and government officials who have worked with the Center and the Task Force, it has also aggressively built up a partnership with the military, taking on deep background investigations of foreign-born and foreign-connected soldiers, civilians, and contractors working for the government. Its investigations go far beyond traditional security “vetting”; NSAC scours certain select government employees, contractors and their affiliates, examining multiple layers of connected relatives and associates. And the Center hosts dozens of additional “liaison” officers from other government agencies, providing those agencies with frictionless access to private information about U.S. residents that they would otherwise not have.
Today, through a series of high-level classified authorities and commercial relationships, the Center has access to over 130 databases and datasets of information comprising some two billion records, over half of which are unique and not contained in any other government information warehouse. The Center is, in fact, according to interviews with government officials, the sole organization in the U.S. government with the authority to delve deeply into the activities and associations of foreigners and Americans alike. From its unmarked office in the Crystal City neighborhood of Arlington, Virginia, the Center can not only gain access to the full gamut of intelligence databases of the U.S. government, but also query and retain information contained in law enforcement and commercial data. It also conducts live searches, and retains classified and open datasets of identity and transactional data for later examination. In some ways then, the data that the Center accesses and regularly trawls against its data mining protocols is the FBI’s equivalent of NSA’s bulk collection, the examination of databases with the hope of finding triggers or links to terrorists rather than the specific accessing of information to look at an individual or even group of individuals. [A partial list of some of the databases used by NSAC and FTTTF can be seen here.] The Center’s powerful perch—and its virtually unlimited reach—brings the federal government closer than ever to the Holy Grail of connecting every dot, a dream that has been pursued by terrorist hunters since the failures that permitted the 9/11 attacks 14 years ago. The data access and analytic methods it uses grew out of a retrospective analysis of the vast reams of data about the 19 hijackers that law enforcement and intelligence agencies had indicators off, but never acted on. The Foreign Terrorist Tracking Task Force (originally called “F-tri-F” by insiders) meticulously reconstructed the actions of the 19 hijackers and other known law-breakers—how they lived their day-to-day lives and what they did to avoid intelligence detection—to find patterns and triggers of potential wrongdoing. They created thousands of pages of chronologies covering the 19 hijackers from the moment they entered the United States, trying to recreate what each did every day they were here.
Those patterns then became profiles that could be applied to vast amounts of disparate and unstructured data to sniff out similar attributes. Those attributes, once applied to individuals, became the legal predicate for collection and retention of data. If someone fit the profile, they were worthy of a second look. They were worthy of a second look if they might fit the profile.
Beyond public records and what appears on the internet, beyond news articles or what’s in law enforcement databases—but in addition to all of those things—the mere presence of a name becomes justification enough. NSAC’s methods turn the notion of legal predicate—a logical proposition or an earlier offense that justifies law enforcement action—on its head. Using big data analysis to discover non-obvious and even clandestine links, the Center looks not just for suspects, but for what the counter-terrorism world calls “clean skins”—people with no known affiliation to terrorism or crime, needles in a giant haystack that don’t necessarily look like needles. Or people who aren’t needles at all, but who might become needles in the future and thus warrant observation today.
The American people have repeatedly rejected the notion of a domestic intelligence agency operating within our borders. Yet NSAC has become the real-world equivalent. Along the way in its development though, the Center has rarely been discussed in the federal budget or in congressional oversight hearings available to the public. And being neither solely a part of the intelligence community (IC) nor solely a law enforcement agency (and yet both), it skirts limitations that exist in each community, allowing it to collect and examine information on people who are not otherwise accused of or suspected of any crime.
Homeland Security Presidential Directive-2 (HSPD-2), signed by George W. Bush in October 2001, established FTTTF and directed it to use “advanced data mining software” to find and prevent “aliens who engage in or support terrorist activity” from entering the United States. Though data mining was at the center of its mission, other agencies—particularly the Defense Advanced Projects Research Agency (DARPA) and the Pentagon’s Counterintelligence Field Activity (CIFA)—funded the development of many of the techniques. These efforts, nevertheless, ran into public opposition because of legal and civil liberties overreach: the ominous-sounding Total Information Awareness program was abandoned in 2003 and CIFA was shut down in 2008. With the CIA restricted from collecting information and conducting operations that were purely domestic, a gap existed. And though the NSA, which has been promiscuously described as the successor to total information awareness, conducts extensive data mining and advanced analytics to crunch its bulk data collection, it is still restricted to only intercepting electronic communications.
As data mining research and applications moved forward, and as the NSA built up its cyber empire, the FBI also transformed. FTTTF, which was administratively placed within the FBI in 2002, helped the Bureau evolve into what is now referred to as an “intelligence driven” law enforcement agency. In other words, stop crimes (in this case terrorist attacks) before they occur through the use of proactive and predictive intelligence. The National Counterterrorism Center is responsible for the foreign threat, while the FBI is responsible for the domestic. In 2004, the White House also mandated that FTTTF be provided “full access” to homeland security and intelligence databases.
To “satisfy unmet analytical and technical needs,” in 2006, the FBI established the National Security Analysis Center (NSAC). According to NSAC’s first budget:
The NSAC will provide subject-based “link analysis” through the utilization of the FBI’s collection data sets, combined with public records on predicated subjects. “Link analysis” uses data sets to find links between subjects, suspects, and addresses or other pieces of relevant information, and other persons, places, and things… the NSAC will provide improved processes and greater access to this technique to all [National Security Branch] components. The NSAC will also pursue “pattern analysis” as part of its service to the NSB. “Pattern analysis” queries take a predictive model or pattern of behavior and search for that pattern in data sets. The FBI’s efforts to define predictive models and patterns of behavior will improve efforts to identify “sleeper cells.” Information produced through data exploitation will be processed by analysts who are experts in the use of this information and used to produce products that comply with requirements for the proper handling of the information.
NSAC formally expanded the focus of the Task Force beyond just foreign terrorists. The internal data mart expanded in 2008 to support proactive work to identify potential counterintelligence and nuclear-proliferation threats via advanced analysis of financial, communication, and travel records. Both the ACLU and the Electronic Frontier Foundation have conducted investigations and obtained documents on FTTTF and the FBI’s data-collection efforts. That work, and additional documents obtained by Phase Zero, paint a picture of a massive, overlooked domestic intelligence operation with a mission that goes far beyond catching foreign terrorists.
One joint project between NSAC and the Department of Energy Office of Intelligence/Counterintelligence began to seek out foreign spies or businesspeople who were trying to infiltrate U.S. laboratories and entities. The Center has also provided assistance to the Committee on Foreign Investment in the United States (CFIUS), an inter-agency effort that vets foreign corporations investing in U.S. businesses. Under the Amon Project, in 2009, the Center started a program to look at foreign-connected scientists working in or with U.S. industry for potential counterintelligence markers. It analyzed data to identify potential targets and other threats through telephone and Voice over Internet Protocol (VOIP) pattern/link analysis, constantly monitoring a set of communications feeds between Known Intelligence Officers (KIOs) and Suspected Intelligence Officers (SIOs) of foreign governments residing in the United States, as well as unknown targets.
But the targets weren’t just foreign. Under Project Scarecrow, the Center has done data mining on sovereign citizens and other domestic threats. After receiving intelligence that helicopters might be used in future terrorist attacks, the Center data-mined 165 American-based pilots with helicopter licenses who were from “designated countries of interest.” Working with the Philadelphia police, the Center batch-matched dates of birth with licensed drivers to isolate a set of Pakistani men thought to be potentially connected to a terrorist group. The identities of foreign-born or connected hazardous materials (HAZMAT) drivers in the U.S. were added to a group of “special interest individuals” constantly run against suspect datasets. Under the Finding Terrorists in the United States (FINDUS) project, data-mining was used to find unlocated and even unknown individuals. A Syria Screening Cell was set up to support the screening of candidates for the manning of the Free Syrian Army in the fight against ISIS. By virtue of their presence in NSAC, Pentagon investigators now also have access to highly restricted datasets of known and suspected terrorists and their potential links to the United States, including two called Bedrock and Shoebox.
In many cases, according to individuals who have worked for FTTTF and Center contractors, target groups of thousands of individuals are checked and rechecked every month in a “batched” data processing search. As part of the Amon project, for instance, thousands of Chinese and Taiwanese nationals working in or with U.S. industry are constantly under investigation, their names thrown into the computers monthly looking for derogatory or suspicious information. According to an FTTTF document obtained by Phase Zero, an average of 6,000 target packages a month are prepared by the Center, many resulting in leads to law enforcement authorities, but the majority just human metadata living in perpetual link analysis limbo. The volume of data open to Center, and the complex queries made have resulted in the Task Force building four unique software systems to manage analyst access and data management.
The Foreign Terrorist Tracking Task Force was always meant to be a proactive lookout, using data mining and the full gamut of public and private information to identify hidden operatives based upon their associations, movements or transactions. An internal document provided to Phase Zero describes the Task Force as organizing “data from many divergent public, government and international sources for the purpose of monitoring the electronic footprints of terrorists and their supporters, identifying their behaviors, and providing actionable intelligence to appropriate law enforcement, government agencies, and the intelligence community.” And their supporters. And their supporters. And their supporters. How many mouseclicks away is your name?
[Art by Jim Cooke. All other documents from the FBI.] You can contact me at wi***********@ga****.com, and follow us on Twitter at @gawkerphasezero. If you are into the theater of being underground, you can anonymously deliver tips through the Gawker Media SecureDrop. I’m open to your input and your questions, tough questions.http://www.amazon.com/American-Coup-…
PhaseZero

Radio Sputnik Host: I Was Targeted by Secret ‘Shadow NSA’

04:47 09.06.2015(updated 16:24 09.06.2015)

1023111407

“I was, actually, personally, me and my family, were targeted by defense contractors who were contracted by the US Chamber of Commerce,” BradCast host Brad Friedman says, adding that he only found out through the hacktivist group Anonymous. As investigative journalist Tim Shorrock points out, Freidman is far from the only person to be affected by the so-called “shadow NSA.” This is what Shorrock calls a “cyberintelligence ruling class,” and refers to the military defense contractors who do much of the day-to-day work of the NSA. Many of the high-ranking employees in these contracting firms are former government intelligence officials. “In the past you had high level…officials, and people in government and in defense, moving to the private sector, but they would often go on to boards of companies not directly related to what they were doing while they were in government,” Shorrock says. “But now what we have are high-ranking – very high-ranking – officials from intelligence, and from DOD…moving into contractors…where they are sort of replicating the same type of work they did for the government, except they are being paid millions and millions of dollars for it.” That means that defense companies have the same access to intel as the NSA, and can use that knowledge to benefit their own corporate interests. “Many of them have security clearances – very high-level security clearances – where they can throw around years of experience and the classified information they get…and they can use that now for the benefit of the companies their firms will work with.” This straddling of the government and private sectors has very little oversight. “They may be working for the government, they may be working for the private sector, but they’re doing essentially the same thing.” Part of the problem also comes from the fact that many of these former intelligence officials go on to become “security experts” who mainstream media outlets rely on for information. Shorrock notes NBC and MSNBC in particular. While these experts are often cited as being former government intelligence officers, it’s rarely mentioned that they currently work for corporations which have a vested interest in maintaining the surveillance state. “By not telling the public, the public is misled,” he says. “[A security expert] also has money invested in this, he’s being paid by a company that’s making their money from those agencies.” “Someone else without that interest could have a very different interpretation of how important or how not important the Patriot Act is,” he adds, referring to the Bush-era legislation used to justify domestic surveillance in the name of national security. Congress hasn’t helped much, either. While the legislative body is supposed to oversee cooperation between the government and defense contractors, Congressional members and the states they represent also make a profit from these private companies. Still, the most alarming part of the shadow intelligence agency is the sheer size of it, given that nearly 3 million people have security clearances in the United States. “You have all these people with classified information, because that’s what a security clearance is for…and most of them are working for private companies that contract for the government…so you have a huge number of people in our country who are spying on us.” Sputnik One of the significant sources of funds for the fascist Nazionist Jesuit Khazarian Mafia is the healthcare industry which registered a whopping $3.09 trillion in 2014, and is projected to soar to $3.57 trillion in 2017, in the US alone. We can help take down the Dark Cabal by avoiding drugs, defeat any viral attack and scaremongering easily by knowing how to build our own comprehensive antiviral system. Find more about it here.

Leave a Reply