23 May 2019

Hubs + Networks: The National Security Agency's Hidden Spy Hubs

Hidden in plain sight: here are not one but four maps published last year in an online investigative report by Ryan Gallagher and Henrik Moltke on The Intercept .Much has previously been reported about the NSA’s surveillance programs. But few details have been disclosed about the physical infrastructure that enables the spying. They revealed for the first time a series of other buildings across the U.S. that appear to serve a similar function, as critical parts of one of the world’s most powerful electronic eavesdropping systems, hidden in plain sight.
_________________________________________________________________________
Blogger Note: Phoenix is "a background node"
_________________________________________________________________________
“It’s eye-opening and ominous the extent to which this is happening right here on American soil,” said Elizabeth Goitein, co-director of the Liberty and National Security Program at the Brennan Center for Justice. “It puts a face on surveillance that we could never think of before in terms of actual buildings and actual facilities in our own cities, in our own backyards.”
The NSA documents, which come from the trove provided to The Intercept by the whistleblower Edward Snowden, describe AT&T as having been “aggressively involved” in aiding the agency’s surveillance programs. . .  Without an individualized court order, it is illegal for the NSA to spy on communications that are wholly domestic, such as emails sent back and forth between two Americans living in Texas. However, in the aftermath of the 9/11 attacks, the agency began eavesdropping on Americans’ international calls and emails that were passing between the U.S. and other countries. That practice was exposed by the New York Times in 2005 and triggered what became known as the “warrantless wiretapping” scandal. . .
In April 2017, the agency publicly acknowledged these violations, which it described as “inadvertent compliance incidents.” It said that it would no longer use surveillance programs authorized under Section 702 of FISA to harvest messages that mentioned its targets, citing “technological constraints, United States person privacy interests, and certain difficulties in implementation.”
The messages that the NSA had unlawfully collected were swept up using a method of surveillance known as “upstream,” which the agency still deploys for other surveillance programs authorized under both Section 702 of FISA and Executive Order 12333. The upstream method involves tapping into communications as they are passing across internet networks . . .
CLICK ON THE OPENING IMAGE TO ENLARGE
________________________________________________________________________________
Related Content:
One of the National Security Agency’s most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse. Today, The Intercept is publishing 48 top-secret and other classified documents about XKEYSCORE dated up to 2013, which shed new light on the breadth, depth and functionality of this critical spy system >
https://theintercept.com/2015/07/01/nsas-google-worlds-private-communications/