Turbulence (NSA)

Last updated

A reference to Turbulence and Turmoil in an XKeyscore slide. XKeyscore presentation from 2008.pdf
A reference to Turbulence and Turmoil in an XKeyscore slide.

Turbulence is a United States National Security Agency (NSA) information-technology project started c. 2005. It was developed in small, inexpensive "test" pieces rather than one grand plan like its failed predecessor, the Trailblazer Project. It also includes offensive cyberwarfare capabilities, like injecting malware into remote computers. The U.S. Congress criticized the project in 2007 for having similar bureaucratic problems as the Trailblazer Project. [1]

Contents

Criticism

According to Siobhan Gorman in a 2007 Baltimore Sun article, "The conclusion in Congress, two former government officials said, was that Turbulence was over budget, not delivering and poorly led, and that there was little or no strategy to pull it all together." [2]

Trailblazer, the predecessor of Turbulence, had been cancelled in 2006 after a congressional investigation and a Defense Department's Inspector General's report found it over budget, wasteful, and ineffective. [1] [3]

One of the Trailblazer whistleblowers who helped with the inspector-general report, Thomas Andrews Drake, was later charged under the Espionage Act of 1917 for allegedly retaining five documents in his home. Two of those documents were about Turbulence; his defense pointed out that one of these documents was clearly marked "UNCLASSIFIED" and the other was declassified shortly after his indictment. [3] Thomas Drake pleaded guilty to a misdemeanor count of unauthorized use of a computer on June 10, 2011, and was sentenced to one year probation. [4]

Programs

Turbulence includes nine core programs, of which names are known: [2]

See also

Related Research Articles

<span class="mw-page-title-main">ThinThread</span>

ThinThread was an intelligence gathering project by the United States National Security Agency (NSA) conducted throughout the 1990s. The program involved wiretapping and sophisticated analysis of the resulting data. The program was discontinued three weeks before the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority.

The Government Accountability Project (GAP) is a nonprofit whistleblower protection and advocacy organization in the United States. It was founded in 1977.

<span class="mw-page-title-main">Pinwale</span>

Pinwale is the code name for a National Security Agency (NSA) collection and retrieval system for so-called "Digital Network Intelligence", including internet e-mail. It is searchable by monitored NSA analysts.

<span class="mw-page-title-main">Trailblazer Project</span>

Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.

<span class="mw-page-title-main">Thomas A. Drake</span> Former NSA senior executive, military veteran, and whistleblower (born 1957)

Thomas Andrews Drake is a former senior executive of the National Security Agency (NSA), a decorated United States Air Force and United States Navy veteran, and a whistleblower. In 2010, the government alleged that Drake mishandled documents, one of the few such Espionage Act cases in U.S. history. Drake's defenders claim that he was instead being persecuted for challenging the Trailblazer Project. He is the 2011 recipient of the Ridenhour Prize for Truth-Telling and co-recipient of the Sam Adams Associates for Integrity in Intelligence (SAAII) award.

<span class="mw-page-title-main">Utah Data Center</span> NSA data storage facility

The Utah Data Center (UDC), also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, is a data storage facility for the United States Intelligence Community that is designed to store data estimated to be on the order of exabytes or larger. Its purpose is to support the Comprehensive National Cybersecurity Initiative (CNCI), though its precise mission is classified. The National Security Agency (NSA) leads operations at the facility as the executive agent for the Director of National Intelligence. It is located at Camp Williams near Bluffdale, Utah, between Utah Lake and Great Salt Lake and was completed in May 2014 at a cost of $1.5 billion.

<span class="mw-page-title-main">William Binney (intelligence official)</span> Former U.S. intelligence official and cryptoanalyst; whistleblower; conspiracy theorist

William "Bill" Edward Binney is a former intelligence official with the United States National Security Agency (NSA),whistleblower, and conspiracy theorist. He retired on October 31, 2001, after more than 30 years with the agency.

<span class="mw-page-title-main">Boundless Informant</span> Big data analysis and visualization tool used by the NSA

Boundless Informant is a big data analysis and data visualization tool used by the United States National Security Agency (NSA). It gives NSA managers summaries of the NSA's worldwide data collection activities by counting metadata. The existence of this tool was disclosed by documents leaked by Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton. Those disclosed documents were in a direct contradiction to the NSA's assurance to United States Congress that it does not collect any type of data on millions of Americans.

<span class="mw-page-title-main">XKeyscore</span> Mass surveillance system

XKeyscore is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligence agencies, including the Australian Signals Directorate, Canada's Communications Security Establishment, New Zealand's Government Communications Security Bureau, Britain's Government Communications Headquarters, Japan's Defense Intelligence Headquarters, and Germany's Bundesnachrichtendienst.

<span class="mw-page-title-main">Blarney (code name)</span> US NSA communications surveillance program

BLARNEY is a communications surveillance program of the National Security Agency (NSA) of the United States. It started in 1978, operated under the Foreign Intelligence Surveillance Act and was expanded after the September 11 attacks.

This is a category of disclosures related to global surveillance.

<span class="mw-page-title-main">Global surveillance</span> Mass surveillance across national borders

Global mass surveillance can be defined as the mass surveillance of entire populations across national borders.

The Fourth Amendment Protection Acts, are a collection of state legislation aimed at withdrawing state support for bulk data (metadata) collection and ban the use of warrant-less data in state courts. They are proposed nullification laws that, if enacted as law, would prohibit the state governments from co-operating with the National Security Agency, whose mass surveillance efforts are seen as unconstitutional by the proposals' proponents. Specific examples include the Kansas Fourth Amendment Preservation and Protection Act and the Arizona Fourth Amendment Protection Act. The original proposals were made in 2013 and 2014 by legislators in the American states of Utah, Washington, Arizona, Kansas, Missouri, Oklahoma and California. Some of the bills would require a warrant before information could be released, whereas others would forbid state universities from doing NSA research or hosting NSA recruiters, or prevent the provision of services such as water to NSA facilities.

<span class="mw-page-title-main">Upstream collection</span> Term used by the National Security Agency (NSA) of the United States

Upstream collection is a term used by the National Security Agency (NSA) of the United States for intercepting telephone and Internet traffic from the Internet backbone, meaning major Internet cables and switches, both domestic and foreign. Besides the Upstream collection, NSA also gathers information from Internet communications through arrangements with Internet companies under the program codenamed PRISM. Both the Upstream programs and PRISM are part of the Special Source Operations (SSO) division, which is responsible for collection in cooperation with corporate partners.

<span class="mw-page-title-main">Global surveillance whistleblowers</span>

Global surveillance whistleblowers are whistleblowers who provided public knowledge of global surveillance.

<span class="mw-page-title-main">Timeline of global surveillance disclosures (2013–present)</span>

This timeline of global surveillance disclosures from 2013 to the present day is a chronological list of the global surveillance disclosures that began in 2013. The disclosures have been largely instigated by revelations from the former American National Security Agency contractor Edward Snowden.

The German Parliamentary Committee investigation of the NSA spying scandal was started on March 20, 2014, by the German Parliament in order to investigate the extent and background of foreign secret services spying in Germany in the light of the Global surveillance disclosures (2013–present). The Committee is also in search of strategies on how to protect telecommunication with technical means.

<span class="mw-page-title-main">Diane Roark</span> American whistleblower (born 1949)

Diane Roark is an American whistleblower who served as a Republican staffer on the House Intelligence Committee from 1985 to 2002. She was, right after 9/11, "the House Intelligence Committee staffer in charge of oversight of the NSA". In late 2001, Roark was informed by NSA official William Binney about the Bush administration's domestic surveillance programs, including Stellar Wind. Along with Binney, Ed Loomis, and J. Kirk Wiebe, she filed a complaint to the Department of Defense's Inspector General about the National Security Agency's highly classified Trailblazer Project. Her house was raided by armed FBI agents in 2007 after she was wrongly suspected of leaking to The New York Times reporter James Risen and to Siobhan Gorman at The Baltimore Sun in stories about NSA warrantless surveillance. This led her to sue the government in 2012 for not having returned her computer, which they had seized during the raid, and because the government failed to clear her name. The punitive treatment of Roark, Binney, Wiebe, and Loomis, as well as, and, in particular, then still-active NSA executive Thomas Andrews Drake, who had gone in confidence with anonymity assured to the DoD IG, led the Assistant Inspector General John Crane to eventually become a public whistleblower himself and also led Edward Snowden to go public with revelations rather than to report within the internal whistleblower program.

<span class="mw-page-title-main">TRAFFICTHIEF</span>

Trafficthief is a database maintained by the United States' National Security Agency (NSA) and operated under the Turbulence program, containing "Meta-data from a subset of tasked strong-selectors," according to an XKeyscore presentation. An example of a strong selector is an email address. In other words, it would be a database of the metadata associated with names, phone numbers, email addresses, and other identifying information that intelligence services are specifically targeting. Journalist Marc Ambinder speculates the program is a "raw SIGINT viewer for data analysis."

Targeted surveillance is a form of surveillance, such as wiretapping, that is directed towards specific persons of interest, and is distinguishable from mass surveillance. Both untargeted and targeted surveillance is routinely accused of treating innocent people as suspects in ways that are unfair, of violating human rights, international treaties and conventions as well as national laws, and of failing to pursue security effectively.

References

  1. 1 2 Bamford, James (2008). The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America . New York City: Doubleday. ISBN   978-0-385-52132-1. p. 325340.
  2. 1 2 Gorman, Siobhan (February 11, 2007). "Costly NSA Initiative Has a Shaky Takeoff  Vexing Snags for Cyberspace Tool 'Turbulence'". The Baltimore Sun . Retrieved July 6, 2013.
  3. 1 2 Mayer, Jane (May 23, 2011). "The Secret Sharer  Is Thomas Drake an Enemy of the State?". The New Yorker . Retrieved July 6, 2013.
  4. "Transcript of Sentencing Proceeding, United States of America v. Thomas A. Drake" (PDF). United States District Court of Maryland. July 15, 2011. Retrieved August 8, 2013.
  5. James Ball; Julian Borger; Glenn Greenwald (September 5, 2013). "Revealed: how US and UK spy agencies defeat internet privacy and security" . Retrieved September 6, 2013.
  6. Greenwald, Glenn (July 31, 2013). "XKeyscore: NSA tool collects 'nearly everything a user does on the internet'" . Retrieved August 5, 2013.
  7. Ambinder, Marc (August 14, 2013). "An Educated Guess About How the NSA Is Structured". The Atlantic.com. Retrieved August 14, 2013.