Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Networking

    NSA Rolls with Tech Changes to Keep Spying

    Written by

    Lisa Vaas
    Published June 4, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      WASHINGTON—On Dec. 15, 2005, the New York Times broke the news that soon after the Sept. 11 attacks President Bush had secretly authorized the National Security Agency to eavesdrop on U.S. citizens and other persons within the country.

      A Federal judge has since ruled that the NSAs actions were both illegal and unconstitutional—a matter that will likely be decided by the Supreme Court.

      But how, exactly, did the NSA do that snooping?

      James Bamford, an expert on intelligence gathering and author of several books on the NSA, including “A Pretext for War: 9/11, Iraq, and the Abuse of Americas Intelligence Agencies,” described the technological underpinnings of the NSAs ongoing eavesdropping and how it has had to change to keep up with technology at his keynote here at the Gartner IT Security Summit on June 4.

      One of the NSAs main jobs is to eavesdrop—to intercept communications and thereby gather intelligence from countries outside of the United States. Some might picture an agent climbing a telephone pole and attaching a wire to a telephone line, but such a technique, called retail eavesdropping, is only useful for going after one phone line at a time.

      The NSA, on the other hand, goes after entire streams of communications, with each channel containing millions of conversations, Bamford said.

      At one point, the NSAs job was fairly easy. The agency was targeting microwave communications, which travel in a straight line from one tower to the next. Thats “a nice thing for the NSA,” Bamford said, “especially when theyre trying to get Russian communications or those from outside the United States. Those signals go right out into space.”

      /zimages/3/28571.gifClick here to read more about how AT&T helped the NSA monitor telephone communications and Internet traffic.

      In the former Soviet Union, cables cant easily be buried due to permafrost. At one point, this led the country to depend heavily on microwave communications. In order to gather intelligence, the NSA would put one of its many satellites in space and position it where it can capture the microwaves. The method is so elegant that many times the NSA can capture information even before a person receiving a given call has picked it up, Bamford said, given the lack of atmospheric interference in space.

      The satellites capture communications, convert them and retransmit them, through another satellite or through a ground station, back to earth. The NSA also has ground stations all over the world to pick up satellite and other communications. “Theyre enormous facilities; they look like moon bases,” Bamford said. Most of these bases are covered so observers cant tell where their antennas are pointing. Listening posts also eavesdrop on scores of communications satellites orbiting the earth, picking up on some 2 million pieces of communications per hour.

      The NSA has another type of antenna array, nicknamed an elephant cage, which houses 360 elements. When the agency marries multiple elephant cages together, it can pinpoint exactly where a signal is coming from. If a submarine pops to the surface even for a brief moment to send a message, the array can pinpoint it. This type of array is going out of style, Bamford said, but there are still a number around.

      This was all well and good until the late 90s, at which point most telecommunications companies began switching from satellites to fiber-optic undersea cables due to their lower cost, higher quality and improved speed. Such undersea cables avoid atmosphere and bandwidth problems, are faster since they dont have to travel as far, and are fairly cheap, Bamford said.

      When satellites ruled the communications interception business, all NSA had to do was put a dish out, sit back and collect signals, without having to ask anybody for permission, Bamford said. “Phone calls, e-mail, data communications, all that information came down like rain into dishes,” he said. The switch to undersea cables made it more challenging to collect the same information.

      “When [telcos] switched to fiber optics, [the question became,] how do you get access to cables? [The cables] go under the ocean, come up and go into a little building owned by AT&T or another company,” Bamford said.

      It was a big problem for the agency in the late 90s, he said. One way to handle the issue was to build a submarine to go right to the source of communications, and hence the USS Jimmy Carter was commissioned in June 2004. According to Bamford and others, the sub was designed to tap undersea cables and eavesdrop on the communications passing through them.

      The United States wont admit that it designed undersea “bugs” to tap the systems, Bamford said, but an earlier version of such a device is on exhibit at the KGB museum in Moscow.

      Referring to this earlier version of the cable bug, which the United States used to listen in on Soviet communications during the Cold War in an operation called “Ivy Bells,” Bamford said, “They put this big thing underwater and used induction from copper cable. They would program it [to listen] for the most important channel. One good one they listened to was on Soviet missile testing. NSA did that by having the sub sail into [the Northern part of the Sea of Okhotsk]. Theyd look at the shore, looking for warning signs to fishermen saying, Dont drag nets, there are cables here. They found it.”

      Its more difficult to tap fiber-optic cables, however. “Information doesnt leak out as with copper cables,” Bamford said. “Youve got glass fibers and photons, not electricity going through.”

      Bamford didnt offer any thoughts on how the NSA has overcome the difficulties presented by fiber-optic cables in relation to tapping by submarine, but he did describe an internal network that the NSA has set up to achieve its monitoring goals, including junction point hubs.

      “The NSA began going to AT&T and began building secret rooms,” he said. “A cable from overseas would terminate in this room. They would convert it to usable signals to be sent out around the country” to NSA agents. “They had a big splitter put on the cable, so when it came in you built a mirror copy of it. The mirror copy goes to a secret room that only two people had access to,” Bamford said.

      That activity began after Sept. 11 and continued until 2003, he said, only coming to light after a whistleblower at AT&T publicized photos and internal blueprints of the setup. The whistleblower was a retired communications technician, Mark Klein, who has joined the Electronic Frontier Federation in a lawsuit against AT&T.

      Bamford himself said he has joined the ACLU in a lawsuit against the NSA over its spying on U.S. residents.

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEKs Security Watch blog.

      Lisa Vaas
      Lisa Vaas
      Lisa Vaas is News Editor/Operations for eWEEK.com and also serves as editor of the Database topic center. She has focused on customer relationship management technology, IT salaries and careers, effects of the H1-B visa on the technology workforce, wireless technology, security, and, most recently, databases and the technologies that touch upon them. Her articles have appeared in eWEEK's print edition, on eWEEK.com, and in the startup IT magazine PC Connection.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×