Exposing the NSA’s Mass Surveillance of Americans | CYBERWAR
Summary
TLDRThe leaked documents expose the National Security Agency's (NSA) mass surveillance program, revealing their elite hacking unit, Tailored Access Operations (TAO), which is tasked with infiltrating digital communications to counter threats such as terrorism and cyber attacks. Established post-9/11, the NSA's mandate expanded to include American communications, leading to the 'collect it all' mantra. Whistleblowers like Thomas Drake and Edward Snowden have shed light on these activities, raising concerns about privacy and the potential undermining of internet security. TAO's sophisticated hacking skills are utilized to target elusive individuals, but the scope of their surveillance extends beyond terrorism to include foreign entities and corporations, blurring the line between mass and targeted surveillance and sparking a debate on the balance between national security and individual privacy.
Takeaways
- 📡 The NSA's mass surveillance program, revealed through leaked documents, includes a unit called Tailored Access Operations (TAO) that specializes in hacking into difficult targets.
- 🛡 Post-9/11, the NSA's mandate expanded to include the collection of American communications to and from foreign targets, leading to a massive increase in data collection.
- 🚨 Thomas Drake, an NSA senior executive, blew the whistle on the agency's activities and faced charges under the Espionage Act, highlighting the internal conflict over surveillance practices.
- 🔍 Edward Snowden leaked thousands of classified NSA documents, revealing the extent of the agency's surveillance capabilities, including the PRISM program which provided direct access to user data from major tech companies.
- 🔑 TAO, likened to the 'special forces' of the NSA, uses sophisticated tools to infiltrate, manipulate, and sabotage digital devices, often requiring physical access for implanting spy devices.
- 💡 The NSA recruits highly skilled hackers, often from top computer science programs, offering a unique opportunity to engage in legal hacking for national security purposes.
- 🔒 TAO's operations have been integral to the war on terror, aiding in the tracking and capture of high-value targets like Osama Bin Laden, but also raised concerns about the potential for abuse.
- 🌐 The NSA's activities, including those of TAO, can jeopardize internet security at large, as seen when they exploited a software bug in Mozilla Firefox to identify users of anonymizing software.
- 💸 The NSA's offensive hacking operations, such as those conducted by TAO, are costly, with the agency spending over $600 million annually on such initiatives.
- ⚖️ The debate over the value of mass versus targeted surveillance continues, with concerns that the NSA's actions may undermine the security of the same internet that everyone uses.
- 🏛 The legitimacy of TAO's targets is questioned, as除了 targeting terrorists, they have also been known to hack into the communications of friendly nations and other non-terrorist entities, blurring the lines between mass and targeted surveillance.
Q & A
What is the primary mandate of the National Security Agency (NSA)?
-The primary mandate of the NSA is to collect foreign intelligence. It was formed in 1952 and operates under the authority of the U.S. government to protect national security.
How did the NSA's surveillance capabilities expand post-9/11?
-After 9/11, George W. Bush authorized the NSA to expand its surveillance capabilities to include American communications to and from foreign targets, in an effort to better prevent terrorist attacks and cyber threats.
What is the role of the NSA's Tailored Access Operations (TAO) unit?
-The TAO unit is responsible for hacking into difficult targets, such as the mobile phones of Al Qaeda operatives, to gather intelligence that is considered 'ungettable.' They are likened to the special forces of the NSA.
Why did Thomas Drake blow the whistle on the NSA's activities?
-Thomas Drake, a decorated NSA veteran, blew the whistle on the NSA's activities due to his shock and disagreement with the agency's mass surveillance program, which he believed was a violation of the Constitution and the law.
What was the impact of Edward Snowden's leaks on the public's understanding of the NSA's surveillance programs?
-Edward Snowden's leaks revealed tens of thousands of classified NSA documents, including information about the Prism program and the TAO unit. This led to a greater public awareness and debate about the extent and legality of the NSA's surveillance activities.
How does the NSA's mass surveillance differ from the targeted surveillance conducted by TAO?
-Mass surveillance involves the large-scale collection of data from a broad population, whereas targeted surveillance focuses on specific individuals or groups. TAO's operations are more akin to targeted surveillance, as they aim to infiltrate and gather intelligence from specific, high-value targets.
What are some of the tools and methods used by TAO to infiltrate digital devices?
-TAO uses a variety of tools and methods, including spy devices installed in mobile phones or hardware implants, to infiltrate digital devices. They also exploit software vulnerabilities to gain access to systems and monitor or hijack internet traffic.
What is the 'ANT Catalog' and how is it related to TAO's activities?
-The ANT Catalog is a leaked document that lists various spy gear at TAO's disposal. It includes tools for surveillance and infiltration, such as implants for hardware and devices to intercept and manipulate digital communications.
How does TAO's hacking activity potentially compromise internet security?
-TAO's hacking activities can compromise internet security by exploiting software bugs and vulnerabilities, which can leave millions of users exposed to these security risks. This can undermine the overall security of the internet infrastructure.
What is the controversy surrounding the balance between the NSA's offensive hacking and the protection of internet security?
-The controversy lies in the fact that while the NSA invests heavily in offensive hacking through TAO, there is concern that this undermines the security of the internet. Critics argue that the balance between breaking things for intelligence purposes and protecting the security of the internet is uneven.
How do privacy activists view the distinction between mass surveillance and targeted surveillance conducted by the NSA?
-Privacy activists generally oppose mass surveillance but may support more targeted approaches. They argue that targeted surveillance is more acceptable because it focuses on specific, legitimate threats rather than indiscriminately collecting data on a large population.
Outlines
😀 NSA's Tailored Access Operations and Mass Surveillance
This paragraph discusses the National Security Agency's (NSA) mass surveillance program, which is designed to penetrate digital communications to prevent terrorist attacks and cyber threats. It introduces the NSA's elite unit, Tailored Access Operations (TAO), whose mission is to hack into systems that are otherwise impenetrable. The paragraph also covers the agency's expansion of surveillance post-9/11 under President George W. Bush, the revelation of the program by whistleblower Thomas Drake, and the subsequent leaks by Edward Snowden. It highlights the NSA's capabilities, its focus on foreign intelligence, and the ethical and legal concerns surrounding mass surveillance and the potential erosion of privacy and constitutional rights.
👥 Inside the NSA's Cyber Operations and Recruitment
The second paragraph delves into the operations of TAO, comparing it to special forces within the NSA. It discusses the recruitment of highly skilled hackers by the NSA, often from advanced computer science programs, and the challenges of competing with private tech companies for talent. The paragraph also explores the NSA's use of TAO in the War on Terror, including its role in tracking down Osama Bin Laden and other high-value targets. It touches on the tools used by TAO, such as spy devices and software vulnerabilities, and the potential risks to internet security posed by the agency's activities.
💻 TAO's Spy Tools and the Impact on Internet Security
This section focuses on the specific tools and techniques used by TAO, including implants in hardware and spy gear listed in the ANT catalog. It describes the efforts of security researchers to recreate these tools and the implications for privacy and security. The paragraph also addresses the broader impact of TAO's activities on the internet's infrastructure, suggesting that the NSA's tactics could compromise the security of the entire global network. It raises questions about the cost-effectiveness and ethics of TAO's methods, particularly when it comes to the potential for mass surveillance.
🛡️ The Debate Over Targeted vs. Mass Surveillance
The fourth paragraph presents contrasting views on the effectiveness and necessity of TAO's targeted surveillance. It includes perspectives from a former Air Force cyber officer who argues that targeted surveillance is more acceptable and efficient, and an investigative reporter who suggests that TAO's methods are not as targeted as they seem. The paragraph discusses the potential for overreach in TAO's operations, including the surveillance of foreign governments and private companies, and the difficulty in defining what constitutes a legitimate target. It also highlights the ongoing debate about the balance between security and privacy.
🔏 The Expanding Role of TAO in NSA Operations
The final paragraph addresses the expanding role of TAO within the NSA's broader surveillance efforts. It suggests that TAO may be more than just a tool for fighting terrorism and could be part of a larger mass surveillance apparatus. The paragraph discusses the potential for TAO's activities to go beyond the scope of what is publicly acknowledged and the implications of conducting surveillance in secret. It also touches on the historical context of surveillance and the importance of transparency and accountability in maintaining public trust.
Mindmap
Keywords
💡Mass Surveillance
💡Tailored Access Operations (TAO)
💡Edward Snowden
💡PRISM
💡Thomas Drake
💡Encryption
💡National Security Agency (NSA)
💡Data Collection
💡Cybersecurity
💡Hacking
💡Privacy Activist
Highlights
Leaked documents reveal the extent of the NSA's mass surveillance program, which includes unauthorized access to digital communications.
Tailored Access Operations (TAO), an NSA unit, is tasked with hacking into difficult targets, described as 'getting the ungettable'.
The NSA's post-9/11 mandate expansion led to the collection of American communications, raising constitutional concerns.
Thomas Drake, an NSA senior executive and decorated veteran, blew the whistle on the agency's activities and faced charges under the Espionage Act.
The NSA's culture shift post-9/11 involved an 'unleashed' approach to data collection, disregarding legal and constitutional boundaries.
Edward Snowden leaked tens of thousands of classified NSA documents, revealing secret programs like PRISM which gave the NSA direct access to user data from major tech companies.
TAO, or Tailored Access Operations, is likened to the 'special forces' of the NSA, with highly skilled operatives capable of infiltrating any digital device.
John Harbaugh, a former NSA executive, discusses the elite cyber operations he directed, emphasizing the team's ability to tackle challenging cyber problems.
TAO's recruitment strategy focuses on hiring highly skilled hackers, often from advanced computer science programs, despite lower pay scales compared to private tech companies.
TAO has been instrumental in high-profile operations such as the hunt for Osama Bin Laden and the capture of insurgents in Afghanistan.
The Snowden leaks exposed TAO's use of 'IMPL' spy devices and the ANT catalog, detailing various spy gear at the unit's disposal.
TAO's activities have raised concerns about compromised internet security, with vulnerabilities in software like Mozilla Firefox being exploited.
Investigative reporter Ryan Gallagher emphasizes the importance of TAO in the war on terror, highlighting their role in tracking and capturing elusive targets.
Claudio Guitierrez, a hacker, and privacy activist, discusses the financial cost of the NSA's black budget and the potential trade-offs between security and surveillance.
Robert M. Lee, a former Air Force cyber officer, argues that targeted surveillance by TAO is more acceptable than mass surveillance, given its focus on specific threats.
Despite TAO's focus on terrorism, there are concerns about the unit's broader surveillance activities, including targeting friendly nations and private entities.
The debate over the legitimacy of TAO's targets and the potential erosion of privacy and security in the name of national security is ongoing.
Privacy activists and whistleblowers continue to fight for transparency and the end of mass surveillance practices, citing potential abuses of power.
Transcripts
leaked documents reveal the scope of the
nsa's mass surveillance program we
cannot prevent terrorist attacks or
cyber threats without some capability to
penetrate digital Communications others
Unmasked A unit called tailored access
operations I don't need Mass
surveillance I need you to break into
that guy's computer their mission is to
get the ungettable if you want to hack
into systems lawfully the only game in
town is the government their targets are
secret they are very important actually
tracking down people who are then
subsequently killed and there's almost
nothing they can't
hack the National Security Agency is one
of the world's largest intelligence
agencies headquartered in Fort me
Maryland the nsa's Mandate is to collect
foreign intelligence after 911 George W
bush authorized the NSA to collect even
more including American Communications
to and from foreign
targets good morning this is a highly
classified
program that is crucial to our national
security this program shocked an NSA
senior executive named Thomas Drake
Drake is a decorated veteran who blew
the whistle on nsa's activities to the
Press he barely escaped 35 years in jail
after being charged under the Espionage
Act a law first written in
1917 Mr Drake hi Ben
yeah the National Security Agency is
focused on foreign intelligence it was
formed in 1952 people don't realize it
was not formed by an act of Congress it
was literally sign signed uh into
existence by The Stroke of a secret
presidential pen in fact the joke was it
was no such agency or never say anything
you never even referenced the actual
name people who used to work there oh I
work at DOD now I accelerate forward
internet explodes you have this rapid
transition from analog to digital and
the explosion of
data became
exponential what do you think is the
easiest way to deal with it just suck it
all so but what happened after 9/11 was
it NSA should do
better here's where you have culture and
secret meeting itself realizing it fail
but can't admit it failed it had not
prevented the next Pearl Harbor and now
NSA is literally Unleashed it's
Unleashed on an extraordinary scale a
scale we have never seen in US history
or the world all means necessary to
confront the threat who cares about the
Constitution who cares about law who
cares about the rights of us persons hey
if you've done nothing wrong I even
heard this then you should it shouldn't
matter and the Mantra was just get the
data collect it all so we can know it
all collect it all so we can know it
all Drake inspired another NSA worker to
sound the alarm this afternoon the
guardian newspapers revealed the name of
their Source in 2013 Edward Snowden
leaked tens of thousands of classified
NSA
documents the first to get published was
a secret court order forcing Verizon to
Fork over the call data of millions of
us customers the next big leak was a
PowerPoint presentation about a program
called prism the NSA boasted that prism
gave them direct access to emails video
chats and more from some of America's
biggest tech
companies the media was obsessed with
Snowden and the leaks but few people
noticed information hidden in the
documents about a top secret NSA unit
called Tao or Taylor ESS operations
until the German magazine Dar Spiegel
revealed more about it than ever before
jur Schindler is the Magazine's
award-winning National Security reporter
yeah you can call them the highly
skilled plumbers of the NSA who are able
to to get into every sort of pipe what
they are doing is getting the ungettable
they're like the special forces of the
NSA essentially yeah Special Hecker
Force I mean the whole NSA is a special
force uh but but those are the the
highly skilled handymen who who create
certain kind of tools um to to
infiltrate manipulate and sabotage every
kind of digital device you might think
of what's the relationship between
tailored access operations by the NSA
and their Mass surveillance I mean to
explain it easily I would say that mass
surveillance is like going into the to
the ocean with a huge fishing net and to
to draw everything out with whatever you
you find and uh what what the tailored
access operation units are doing is like
using the Harpoon to find special
targets and the the fishes they really
need so that that might be the the
difference so it's like U going hand in
hand and ta is pretty good at it they're
extremely good at it
yes the Snowden leaks revealed more
about tailor access operations but a lot
is still
unknown I wanted to talk to someone who
knows the NSA from the inside an Air
Force veteran and former NSA exact named
John
Harbaugh John Harbaugh ni to meet you
John please come in let's see this place
route 9B yeah why why that name by the
way so root is system level access 9B is
heximal for 911 ah so it's a it's a nod
to the fact that the
next uh 911 event is most likely going
to be cyber related route 9B which has
defense contracts aims to hunt and
pursue adversaries in side a client's
Network this is where we do all of our
hunt operations what we call it for our
clients so so what this is showing you
is is what the operator sees while
they're doing their op right so there'll
be Windows of time where they're
actually active inside the client's
Network pursuing the adversary and this
was really driven by our experiences in
the government space does it look like
this in Fort me this is
better your bio it says something like
you were the director of a super Elite
cyber operation Yeah so basically what
what that's about is what we've tried to
recreate here so my time inside the
organization I had the pleasure and the
and the fortune to be asked to run a
team of about eight individuals and that
team was focused on the most challenging
problems in cyber was that tailored
access operations so so you know there
is there there is elements of that space
right because if you're in cyber and you
do all of cyber then you're doing all of
those types of things mhm and so the
bosses could come in and say we have a
significant National event I need you
guys to be able to do this in the next
12 hours I could walk into that space
and say hey guys I need five minutes I
would give them what we would call the
op order this is what we need to achieve
we need we need to achieve it the next
12 24 48 hours and I could walk away and
I KN I knew when I came back no matter
what time of day how long they were
working on it they would get done and it
was it was that kind of again it was
that kind of teamwork teamwork that
really Drew people and it's a very
similar thing to the special ops
Community right and it does sound like a
a military chain of command yeah I mean
NSA is a very military
organization to build a team like Tao
the NSA has to hire highly skilled
hackers so how does it head hunt them to
find out I asked Chris seoan he's a
privacy activist with the American civil
liberties
Union who are they and where where's the
NSA recruiting them from the government
wants people who can get a security
clients more so than ever particularly
you know after Snowden and after uh uh
Chelsea Manning they want people who who
they know or are going to play by the
rules they want people who cannot easily
be blackmailed so I think you know NSA
tries to recruit the best and brightest
from computer science programs around
the country and in particular computer
security programs like Carnegie melan
that have probably the most
sophisticated offensive cyber security
programs in Academia in the United
States and their students are are
heavily recruited both by NSA but also
you know by Silicon Valley they're
competing for the same people so they're
competing for the same people and the
problem that NSA has is they can't pay
the same kind of money right they're not
going to be able to offer the smoothies
and massages and and sort of perks of
life that Google and Facebook can but
they have something that those companies
don't what they have is a monopoly on
violence right in the same way that if
you want to like repel out of
helicopters and shoot people in the head
you want to you go join the Special
Forces if you want to hack into systems
lawfully the only game in town is the
the government and in in many other
walks of life you would be you would be
a criminal you would be a stalker you'd
be a bad person but when you go to NSA
suddenly you get to wrap yourself on the
flag and do it for king and
country if Tao can legally do things no
one else can who are they hacking and
why not much is known about who tailored
access operations hacks but the Snowden
leaks reveal one major Target Osama Bin
Laden Tao hacked into the mobile phones
of Al qada operatives in the hunt for
bin Laden as reported by The Washington
Post the unit's work also led to the
capture of 40 insurgents in
Afghanistan Ryan Gallagher is an
investigative reporter at The Intercept
where he has covered the role of
surveillance in the ongoing war on
terror how did Tao and how does Tao fit
into the war on
terror well they are very important I
mean people don't necessarily think of
surveillance even as a as a thing being
integral to what the military is doing
on the ground but it is it's absolutely
vital what the tailored axis guys are
doing for instance is because they're so
skilled at actually you know breaking
into systems and going after like what
they would refer to as hard targets
people who are elusive or you know
skilled like dodging surveillance they
are very important actually tracking
down people who are then subsequently
killed or captured in past years
probably rendered and through the um the
black sits program that was going on
through the Bush Administration so they
are very um entwined with these physical
kind of kinetic they call it operations
on the ground so are they basically the
Commandos of the NSA you could put it
like that yeah I mean they're kind of
it's may be sort of glorifying them a
little bit but I mean essentially these
guys are just sort of like geeky nerds
do can to do that sort of Commando type
role they're
facilitating um military operations on
the ground by hacking into targets
they're actually directly you know able
to track people who are then like killed
and say a drone strike so what they do
yeah it's it is like kind of Commando
work but they are also um you know
providing assistance on the ground to
real Commando types who are out there
try to kill
people in the hunt for bin Laden Tao
reportedly used what the unit calls impl
spy devices installed in Mobile phones
or other
Hardware implants are just some of the
tools that appear in elak document
called the ant catalog which lists other
spy gear at Tao's
disposal security researchers Michael
Osman Joe Fitzpatrick and Dean Pierce
decided to build some of these spy tools
themselves the media kind of saw it and
reported on bits and pieces of it and
said oh look at this thing this is Magic
and I think all of us looked at it and
said oh yeah I know how I would do that
yeah I know how to do that Joe recreated
a graphics card that can see what's
running on a computer's active
memory and Dean rigged a phone so it
picks up the mobile traffic in the area
Mike reproduced ragem a tiny chip
implanted in a computer video cable to
reflect information via radar when this
is installed I can point one antenna at
it and that's transmitting a signal and
then my other anten is also pointed at
it and it's receiving the Reflection by
measuring that reflection ction I can on
my laptop recover information that's
going over the cable and what I get is a
video image a screen image uh from the
target computer system and it this is an
example of something where an implant is
required getting an implant into a piece
of Hardware like a video cable requires
physical
access but planting bugs into terrorist
cell phones isn't the only thing Tao
does some of their activity is
jeopardized Internet Security at
large one Snowden leak shows how Tao
found a vulnerability a software bug and
Mozilla
Firefox Tao used the bug to try to
identify some users also running an
anonymizing software called
tour not only did Tao need to be able to
Monitor and hijack internet traffic to
pull off its attack but hundreds of
millions of Firefox users were left
vulnerable to the software bug which has
since been patched
[Music]
Claudia hacker Claudia GUI has helped
expose Tao's
activities that's try I met him in an
old stazzy surveillance tower that still
stands in what used to be Soviet
controlled East Berlin a lot of the mass
surveillance and B collection capability
of the NSA is um empowered by some of
the break-ins that to is able to do for
example they would ask um too to break
into some core uh parts of the of the
internet infrastructure of the whole
Global backbone you know from from an
internet structure perspective when you
connect from Germany to Google you move
through a number of hops 10 15 noes that
relay your message from Berlin to you
know Hamburg and Frankfurt and then to
who knows Netherlands wherever the
cables are if the NSA is able to break
into any one of these points then
they're able to see you U communicating
with Google when they're able to observe
that they're also able to ey jacket so
pretend like you're getting a response
from Google while instead you're getting
a response from the NSA none of this
comes cheap claudo and I went inside to
look through a Snowden leak known as the
black budget the NSA spends more than
$600 million a year for just the kind of
offensive hacks Tao conducts yeah this
is what it's being called the black
budget and the trend that we see is that
you know again the balance between how
much it's invested in breaking things
and how much it's invested in protecting
things is uneven um you know part of the
Mandate of intelligent Services is to
keep the country secure at the same time
from a technological perspective they're
undermining the security of the country
and like you said we all use the exact
same internet once it's broken for one
it's broken for all mhm so the question
is is it worth it to break something and
keep it broken for catching one or two
terrorists that you probably could catch
otherwise breaking into the internet or
hacking into phones might make us all
less secure so is teo's hacking really
all that
targeted to find out more about who Tao
targets I met up with Robert M Lee he'
been out of the military for only a week
he was an Air Force cyber officer and
also worked for an intelligence agency
he won't confirm or deny that's the
NSA okay how did you get into being a
hacker so the Air Force has a wonderful
program where it volunteers you to do
and uh I
joined the Air Force said Here I Am Lord
what would you like me to do and they
said go be a cyber
guy so if you were to take Snowden
slides completely seriously you'd think
that it's all mass surveillance I
actually for the first time ended up
seeing slides that I had actually seen
before in real life I was like holy
like I've seen these ones but once you
bring something into the intelligence
Community it you don't delete files like
everything is stored and so there was
some files that like get translated out
like their truth and they were just
remnants of product pitches or something
like that and so I think that you can't
take all the slides seriously we also
know that there is something called Tao
in in the
NSA what what is that team like what
what are they doing yeah so I think when
you look at Tao it's actually the thing
that I think most of the community
should be cool with right so I'm I'm
actually a huge privacy Advocate I hate
and ironically enough I hate the idea of
any sort of mass surveillance from a
perspective of Tao or whoever would be
breaking into those networks that's
targeted retained intelligence and so
privacy Advocates should actually enjoy
that they should say hey uh Mass
surveillance sucks we need more targeted
surveillance we need more targeted if
you're going to do intelligence do the
kind that you put resources into and
have to think about and have to
prioritize your own efforts it's not
going to be some dissident or
accidentally picking up somebody else's
Communications so who are Tao's targets
I don't know exactly their targets right
I wouldn't be able to speak about it
anyway but I I would say that it would
be asinine to assume that anything in
our national policy of Interest isn't
one of their targets right so if we say
if the president says Global terrorism
is something we're concerned with well
then to is not doing their job like the
government is not doing their job if
they don't go after it anything that the
president wakes up in the morning and
says hey this is important to me anybody
in the government who's not supporting
his needs is not doing their job so I
would just off virtue of that say the to
has to be doing that stuff or they're
incompetent and they're wasting taxpayer
money you know so you can't have it both
ways Rob made a pretty convincing case
for the so-called targeted surveillance
too conducts but investigative reporter
Ryan Gallagher disagrees
he says the problem is that the unit's
methods aren't as targeted as they seem
too is doing some of the most aggressive
work that NS does um the traditional Le
stropping where they're listening in on
a a phone call just by like wiretapping
a cable which they call kind of passive
surveillance that's actually becoming
almost secondary now to the active
surveillance they call which is
attacking and hacking systems and part
of the reason for that is because
increasingly networks and Technologies
adopting encryption and so they can't
listen to it by just tapping the kale
because then they can't read it or
listen to it it's just you know jargon
going forward especially with the sort
of boom and encryption you're going to
see more and more of these hacking
attacks to the point that it there may
come a stage in the future where it is
described as a mass surveillance uh kind
of
technique Tao's hacking skills may be in
higher demand than ever before and while
the group goes after terrorists that's
not all they
do how does Tao decide who to Target and
are they really legitimate
threats the elite unit has gone after Al
Qaeda and Taliban fighters but the
Snowden laks also revealed the group
hacked into the president of Mexico's
emails and workers at a Belgian
telecommunications company were spied on
by the British possibly with help from
Tao generally there is consensus that
mass surveillance is a bad thing while
targeted surveillance is table uh
because they go after very specific
individuals or very specific
groups however there's multiple things
that you need to consider one is what
makes a legitimate Target um you know
ultimately the NSA only has to respond
to somehow to the US government but they
have no respect whatsoever towards
forigners in so we had cases where you
know they spied on UNICEF they spied on
forain Ministries they spied on private
companies energy companies and you know
so what at that point makes it
legitimate to hack directly and Target a
certain
organization we don't
know one of the S documents that that
came out about the Taylor dax's group is
um one of the guys from within the unit
is saying look we don't just do
terrorism we do everything we do all
operations we're here to support any
operations I think it's one of the comic
and
misconceptions that the government has
managed to build up around a lot of
these Revelations so it's like don't
worry about it we're only going after
these extreme terrorist people who are
you know we're trying to protect you and
all that but that's kind of disingenuous
because it's not at all just what
they're doing they're doing a lot more
than that ultimately it seems Tao maybe
just one more tool in the nsa's mass
surveillance Arsenal what happens in a
mass surveillance regime you sweep up
essentially everybody everybody by
definition becomes a Target which means
there's no target the problem is that
when you do this in secet secret and you
protect your your secret powers this
usually doesn't end well in terms of
History it just
doesn't you know in
1984 the extraordinary George orell
novel the only place
Winston the only place he could go to
out of sight was in the corner because
that's where the surveillance cameras
couldn't reach which meant what they
knew where he was and remember people
forget even in 1984 he didn't prevail he
basically cried
Uncle you can't fight them can't beat
them join them you're a whistleblower
you cried Uncle to some extent or you
cried out yeah do you think it was worth
it
yeah history was at
stake we know the nsa's elite hacking
unit has helped capture terrorists but
they've also targeted friendly nation
states so who else have they gone after
for now much of Tao's work remains
shrouded in secrecy but privacy
activists whistleblowers and others
aren't giving up on the fight to know
more and to live surveillance free
5.0 / 5 (0 votes)
This Israeli Company Is Spying On Everyone...
Please NEVER Connect Windows XP To The Internet...
Legend - Biden Admin Sends Your Tax Dollars to the Taliban | SRS #107
Microsoft CEO on How New Windows AI Copilot+ PCs Beat Apple's Macs | WSJ
Microsoft Windows Wants To Record Your Screen...
Is the US running out of Social Security?