388 online
 
Most Popular Choices
Share on Facebook 112 Printer Friendly Page More Sharing Summarizing
General News    H4'ed 10/8/13

Tomgram: Pratap Chatterjee, Big Bro Wants You

By       (Page 2 of 3 pages) Become a premium member to see this article and all articles as one long page.   1 comment

Tom Engelhardt
Follow Me on Twitter     Message Tom Engelhardt
Become a Fan
  (29 fans)

So just what do these companies do and who are they?

The simplest form of surveillance technology is an IMSI catcher. (IMSI stands for International Mobile Subscriber Identity, which is unique to every mobile phone.) These highly portable devices pose as mini-mobile phone towers and can capture all the mobile-phone signals in an area.  In this way, they can effectively identify and locate all phone users in a particular place. Some are small enough to fit into a briefcase, others are no larger than a mobile phone. Once deployed, the IMSI catcher tricks phones into wirelessly sending it data.

By setting up several IMSI catchers in an area and measuring the speed of the responses or "pings" from a phone, an analyst can follow the movement of anyone with a mobile phone even when they are not in use.

One of the key players in this field is the Melbourne, Florida-based Harris Corporation, which has been awarded almost $7 million in public contracts by the Federal Bureau of Investigation (FBI) since 2001, mostly for radio communication equipment. For years, the company has also designed software for the agency's National Crime Information Center to track missing persons, fugitives, criminals, and stolen property.

Harris was recently revealed to have designed an IMSI catcher for the FBI that the company named "Stingray." Court testimony by FBI agents has confirmed the existence of the devices dating back to at least 2002.  Other companies like James Bimen Associates of Virginia have allegedly designed custom software to help the FBI hack into people's computers, according to research by Chris Soghoian of the American Civil Liberties Union (ACLU).

The FBI has not denied this. The Bureau "hires people who have hacking skill, and they purchase tools that are capable of doing these things," a former official in the FBI's cyber division told the Wall Street Journal recently. "When you do, it's because you don't have any other choice."

The technologies these kinds of companies exploit often rely on software vulnerabilities. Hacking software can be installed from a USB drive, or delivered remotely by disguising it as an email attachment or software update. Once in place, an analyst can rifle through a target's files, log every keystroke, and take pictures of the screen every second. For example, SS8 of Milpitas, California, sells software called Intellego that claims to allow government agencies to "see what [the targets] see, in real time" including "draft-only emails, attached files, pictures, and videos." Such technology can also remotely turn on phone and computer microphones, as well as computer or cellphone cameras to spy on the target in real-time.

Charting You

What the FBI does, however intrusive, is small potatoes compared to what the National Security Agency dreams of doing: getting and storing the data traffic not just of an entire nation, but of an entire planet. This became a tangible reality some two decades ago as the telecommunications industry began mass adoption of fiber-optic technology.  This means that data is no longer transmitted as electrical signals along wires that were prone to interference and static, but as light beams.

Enter companies like Glimmerglass, yet another northern California outfit. In September 2002, Glimmerglass started to sell a newly patented product consisting of 210 tiny gold-coated mirrors mounted on microscopic hinges etched on to a single wafer of silicon.  It can help transmit data as beams of light across the undersea fiber optic cables that carry an estimated 90% of trans-border telecommunications data. The advantage of this technology is that it is dirt cheap and -- for the purposes of the intelligence agencies -- the light beams can easily be copied with almost no noticeable loss in quality.

"With Glimmerglass Intelligent Optical Systems (IOS), any signal travelling over fiber can be redirected in milliseconds, without adversely affecting customer traffic," says the company on its public website.

Glimmerglass does not deny that its equipment can be used by intelligence agencies to capture global Internet traffic.  In fact, it assumes that this is probably happening.  "We believe that our 3D MEMS technology -- as used by governments and various agencies -- is involved in the collection of intelligence from sensors, satellites, and undersea fiber systems," Keith May, Glimmerglass's director of business development, told the trade magazine Aviation Week in 2010. "We are deployed in several countries that are using it for lawful interception."

In a confidential brochure, Glimmerglass has a series of graphics that, it claims, show just what its software is capable of. One displays a visual grid of the Facebook messages of a presumably fictional "John Smith." His profile is linked to a number of other individuals (identified with images, user names, and IDs) via arrows indicating how often he connected to each of them. A second graphic shows a grid of phone calls made by a single individual that allows an operator to select and listen to audio of any of his specific conversations. Yet others display Glimmerglass software being used to monitor webmail and instant message chats.

"The challenge of managing information has become the challenge of managing the light," says an announcer in a company video on their public website. "With Glimmerglass, customers have full control of massive flows of intelligence from the moment they access them." This description mirrors technology described in documents provided by Edward Snowden to the Guardian newspaper.

Predicting You

Listening to phone calls, recording locations, and breaking into computers are just one part of the tool kit that the data-mining companies offer to U.S. (and other) intelligence agencies.  Think of them as the data equivalents of oil and natural gas drilling companies that are ready to extract the underground riches that have been stashed over the years in strongboxes in our basements.

Next Page  1  |  2  |  3

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Rate It | View Ratings

Tom Engelhardt Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

Tom Engelhardt, who runs the Nation Institute's Tomdispatch.com ("a regular antidote to the mainstream media"), is the co-founder of the American Empire Project and, most recently, the author of Mission Unaccomplished: Tomdispatch (more...)
 

Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines

 
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter

Name
Email
   (Opens new browser window)
 

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Tomgram: Rajan Menon, A War for the Record Books

Tomgram: Nick Turse, Uncovering the Military's Secret Military

Noam Chomsky: A Rebellious World or a New Dark Age?

Andy Kroll: Flat-Lining the Middle Class

Christian Parenti: Big Storms Require Big Government

Noam Chomsky, Who Owns the World?

To View Comments or Join the Conversation:

Tell A Friend