The Shadow Factory

Last updated
The Shadow Factory
The Shadow Factory.jpg
First edition
Author James Bamford
CountryUnited States
LanguageEnglish
Subject National Security Agency, September 11 attacks, War on Terror, Iraq War
Publisher Doubleday
Publication date
2008
ISBN 0-385-52132-4
OCLC 229309155
Preceded by A Pretext for War  

The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America is a book on the National Security Agency by author James Bamford.

Contents

Fort Gordon, Georgia

Bamford's book contains a description of a processing center at NSA's Fort Gordon, Georgia facility, and Operation Highlander, with which it was associated. The staff there analyzed satellite telephone signals (like Inmarsat) from all over the Middle East. They performed various operations such as matching up phone numbers with names of organizations or individuals, recording messages, finding the locations of cellphones, call chaining analysis, language identification and translation, and assigning 'importance' numbers to the "cuts" (recordings).

Bamford's book contains the statements of people who worked there, including Adrienne J. Kinne and John Berry. Berry says that the operation never violated Americans' rights and contributed a good deal to the war effort. Kinne says that they were listening to the phone calls of Americans in the Middle East making calls back to the States, including NGOs, aid workers, and journalists at the Palestine Hotel. Kinne contrasts her years of work before 9/11 in SIGINT and the careful attention paid to USSID 18 with her work after 9/11 and the way USSID 18 was essentially ignored. [1] [2] Kinne later became part of Iraq Veterans Against the War. [3]

The NSA and US Army Intelligence and Security Command (USAINSCOM) Inspectors General investigated her allegations. They found no evidence to support Kinne's allegations of improper intelligence activities. Kinne says the NSA IG never even interviewed her. Both the NSA and Army investigators attempted to conduct interviews with Kinne, but Kinne would not agree to be interviewed. The Congress also questioned the NSA and the Army about the matter. [4] [5]

Related Research Articles

<span class="mw-page-title-main">ECHELON</span> Signals intelligence collection and analysis network

ECHELON, originally a secret government code name, is a surveillance program operated by the five signatory states to the UKUSA Security Agreement: Australia, Canada, New Zealand, the United Kingdom and the United States, also known as the Five Eyes.

<span class="mw-page-title-main">National Security Agency</span> U.S. signals intelligence organization

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The existence of the NSA was not revealed until 1975. The NSA has roughly 32,000 employees.

<i>The Puzzle Palace</i>

The Puzzle Palace is a book written by James Bamford and published in 1982. It is the first major, popular work devoted entirely to the history and workings of the National Security Agency (NSA), a United States intelligence organization. The title refers to a nickname for the NSA, which is headquartered in Fort Meade, Maryland. In addition to describing the role of the NSA and explaining how it was organized, the book exposed details of a massive eavesdropping operation called Operation Shamrock. According to security expert Bruce Schneier, the book was popular within the NSA itself, as "the agency's secrecy prevents its employees from knowing much about their own history".

The Black Chamber (1919–1929), also known as the Cipher Bureau, was the United States' first peacetime cryptanalytic organization, and a forerunner of the National Security Agency. The only prior codes and cypher organizations maintained by the US government had been some intermittent, and always abandoned, attempts by Armed Forces branches prior to World War I.

<span class="mw-page-title-main">James Bamford</span> American author, journalist and documentary producer

James Bamford is an American author, journalist and documentary producer noted for his writing about United States intelligence agencies, especially the National Security Agency (NSA). The New York Times has called him "the nation's premier journalist on the subject of the National Security Agency" and The New Yorker named him "the NSA's chief chronicler."

<span class="mw-page-title-main">Keith B. Alexander</span> Former Director of the United States National Security Agency

Keith Brian Alexander is a retired four-star general of the United States Army, who served as director of the National Security Agency, chief of the Central Security Service, and commander of the United States Cyber Command. He previously served as Deputy Chief of Staff, G-2 (Intelligence), United States Army from 2003 to 2005. He assumed the positions of Director of the National Security Agency and Chief of the Central Security Service on August 1, 2005, and the additional duties as Commander United States Cyber Command on May 21, 2010.

<span class="mw-page-title-main">Russ Tice</span> American intelligence analyst (born 1961)

Russell D. Tice is a former intelligence analyst for the United States Air Force, Office of Naval Intelligence, Defense Intelligence Agency (DIA), and National Security Agency (NSA).

<span class="mw-page-title-main">Terrorist Surveillance Program</span> NSA program

The Terrorist Surveillance Program was an electronic surveillance program implemented by the National Security Agency (NSA) of the United States in the wake of the September 11, 2001 attacks. It was part of the President's Surveillance Program, which was in turn conducted under the overall umbrella of the War on Terrorism. The NSA, a signals intelligence agency, implemented the program to intercept al Qaeda communications overseas where at least one party is not a U.S. person. In 2005, The New York Times disclosed that technical glitches resulted in some of the intercepts including communications which were "purely domestic" in nature, igniting the NSA warrantless surveillance controversy. Later works, such as James Bamford's The Shadow Factory, described how the nature of the domestic surveillance was much, much more widespread than initially disclosed. In a 2011 New Yorker article, former NSA employee Bill Binney said that his colleagues told him that the NSA had begun storing billing and phone records from "everyone in the country."

<i>Body of Secrets</i>

Body of Secrets: Anatomy of the Ultra-Secret National Security Agency is a book by James Bamford about the NSA and its operations. It also covers the history of espionage in the United States from uses of the Fulton surface-to-air recovery system to retrieve personnel on Arctic Ocean drift stations to Operation Northwoods, a declassified US military plan that Bamford describes as a "secret and bloody war of terrorism against their own country in order to trick the American public into supporting an ill-conceived war they intended to launch against Cuba."

<span class="mw-page-title-main">Special Collection Service</span> Classified joint CIA–NSA program to insert eavesdropping equipment in difficult places

The Special Collection Service (SCS), codenamed F6, is a highly classified joint U.S. Central Intelligence Agency–National Security Agency program charged with inserting eavesdropping equipment in difficult-to-reach places, such as foreign embassies, communications centers, and foreign government installations. Established in the late 1970s and headquartered in Beltsville, Maryland, the SCS has been involved in operations ranging from the Cold War to the Global War on Terrorism.

<span class="mw-page-title-main">Digital Collection System Network</span>

The Digital Collection System Network (DCSNet) is the Federal Bureau of Investigation (FBI)'s point-and-click surveillance system that can perform instant wiretaps on almost any telecommunications device in the US.

Vint Hill Farms Station (VHFS) was a United States Army and National Security Agency (NSA) signals intelligence and electronic warfare facility located in Fauquier County, Virginia, near Warrenton. VHFS was closed in 1997 and the land was sold off in 1999. Today the site hosts various engineering and technology companies, as well as two Federal Aviation Administration (FAA) air traffic control facilities.

<span class="mw-page-title-main">Utah Data Center</span> NSA data storage facility

The Utah Data Center (UDC), also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, is a data storage facility for the United States Intelligence Community that is designed to store data estimated to be on the order of exabytes or larger. Its purpose is to support the Comprehensive National Cybersecurity Initiative (CNCI), though its precise mission is classified. The National Security Agency (NSA) leads operations at the facility as the executive agent for the Director of National Intelligence. It is located at Camp Williams near Bluffdale, Utah, between Utah Lake and Great Salt Lake and was completed in May 2014 at a cost of $1.5 billion.

<span class="mw-page-title-main">Turbulence (NSA)</span>

Turbulence is a United States National Security Agency (NSA) information-technology project started c. 2005. It was developed in small, inexpensive "test" pieces rather than one grand plan like its failed predecessor, the Trailblazer Project. It also includes offensive cyberwarfare capabilities, like injecting malware into remote computers. The U.S. Congress criticized the project in 2007 for having similar bureaucratic problems as the Trailblazer Project.

<span class="mw-page-title-main">Tailored Access Operations</span> Unit of the U.S. National Security Agency

The Office of Tailored Access Operations (TAO), now Computer Network Operations, and structured as S32, is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA). It has been active since at least 1998, possibly 1997, but was not named or structured as TAO until "the last days of 2000," according to General Michael Hayden.

<span class="mw-page-title-main">Charles R. Lord</span>

Charles Richard Lord was an American intelligence official who was Deputy Director of the National Security Agency from 1986 to 1988 during which time he was the highest ranking civilian in the agency.

<span class="mw-page-title-main">Mass surveillance in the United States</span>

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

<span class="mw-page-title-main">Global surveillance disclosures (2013–present)</span> Disclosures of NSA and related global espionage

Ongoing news reports in the international media have revealed operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly emanate from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden, which he obtained whilst working for Booz Allen Hamilton, one of the largest contractors for defense and intelligence in the United States. In addition to a trove of U.S. federal documents, Snowden's cache reportedly contains thousands of Australian, British, Canadian and New Zealand intelligence files that he had accessed via the exclusive "Five Eyes" network. In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention. The disclosure continued throughout 2013, and a small portion of the estimated full cache of documents was later published by other media outlets worldwide, most notably The New York Times, the Canadian Broadcasting Corporation, the Australian Broadcasting Corporation, Der Spiegel (Germany), O Globo (Brazil), Le Monde (France), L'espresso (Italy), NRC Handelsblad, Dagbladet (Norway), El País (Spain), and Sveriges Television (Sweden).

<span class="mw-page-title-main">Global surveillance disclosures (1970–2013)</span>

Global surveillance refers to the practice of globalized mass surveillance on entire populations across national borders. Although its existence was first revealed in the 1970s and led legislators to attempt to curb domestic spying by the National Security Agency (NSA), it did not receive sustained public attention until the existence of ECHELON was revealed in the 1980s and confirmed in the 1990s. In 2013 it gained substantial worldwide media attention due to the global surveillance disclosure by Edward Snowden.

The Georgia Cryptologic Center (GCC) or NSA Georgia is a U.S. National Security Agency (NSA) and Central Security Service (CSS) facility located within Fort Gordon, located outside of Augusta, Georgia. The 604,000 sq ft (56,100 m2) facility opened on March 5, 2012, at a cost of $286 million. The GCC's facilities has capacity to employ up to 4,000 personnel. Its primary focus is on signals intelligence intercepts from Europe, the Middle East, and North Africa. The facility is known by the codename "Sweet Tea".

References

  1. Bamford, p 128–150
  2. New NSA Whistleblower Speaks, 7.7.1, David Swanson
  3. Adrienne Kinne, IVAW
  4. FOIA requests for NSA Intelligence Oversight Board reports, Electronic Frontier Foundation
  5. Did NSA Lie, Cover-Up? Senators Open Second Probe, ABC News, By BRIAN ROSS and ANNA SCHECTER, Oct 13 2008

Further reading