Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Have Intelligence Agencies Become Too Reliant on Technology?
Townhall.com ^ | July 16, 2014 | Rachel Marsden

Posted on 07/16/2014 11:55:36 AM PDT by Kaslin

PARIS -- A newly leaked document stolen by former National Security Agency contractor Edward Snowden last year reveals that one of the NSA's partner agencies within the "Five Eyes" Anglo-intelligence network -- Britain's Government Communications Headquarters (GCHQ), responsible for signals intelligence -- dedicated vast resources to fooling around on the Internet, according to journalist Glenn Greenwald. The GCHQ has reportedly developed tools capable of playing with the results of online polls; sending out spoof emails and Microsoft Office documents that, once opened, can grab and transmit files and info from a user's computer; collecting data from public profiles on LinkedIn and other social-networking websites; and discreetly increasing website traffic and rankings.

It's a troubling revelation, because it makes this very important government agency appear no more distinguished than a 15-year-compold computer hacker. I don't think British citizens are paying for that sort of thing.

We've all received emails purporting to be from our bank or email service provider, with instructions to click legitimate-looking links that would no doubt compromise our computer systems. If government intelligence services are just getting into the same game now, then the lack of return on the intelligence budget investment should be of more concern than the potential for abuse.

There are two possibilities. Either, as critics argue, these technical intelligence agencies are interested in vacuuming up as much nonspecific data as possible, regardless of whose data it is, or they are already employing these methods and tactics in a targeted fashion. In both cases, their efforts are misguided. Here's why.

If the general public is the target of volume collection, then it's like going to the grocery store to buy eggs but instead spending days emptying all the shelves. If an agency is spending that much time on everyone, there should be legitimate concern about whether it's adequately drilling down to the actual threats.

While intelligence agencies are busy playing with online polls and website traffic rankings, how much targeting is actually happening? I'm much less concerned about intelligence agencies scooping up information on random innocents than I am about the extent to which agencies' initiatives are effective on actual targets. No doubt satellite navigation systems have enabled successful drone attacks against terrorists, for example, but that's just one aspect of an entire defense system -- the one that we keep hearing about. What other tools have proven useful?

Can the sort of technological initiatives revealed by the latest Snowden leak produce an effective national security result, should the need ever arise? Is there measurable proof of increased effectiveness commensurate with the increased usage of these technological initiatives? Or are they just being fobbed off as a poor substitute for critical thinking and human analysis?

Oddly enough, it's probably easier to justify budgetary increases by laying claim to the creation of new technological programs, regardless of their proven effectiveness, rather than pointing to tangible results of plots that were foiled the boring, old-fashioned way.

These agencies appear to be concocting initiatives that suggest their targets are technologically imbecilic and oblivious to concepts related to manipulation and social engineering. The reality is anything but.

As reported by several EU member states in the latest European Union Terrorism Situation and Trend Report, published by Europol, terrorist fundraising already takes place in plain view on the Internet. Forget data trawling; only an astute understanding of pretext and cover, plus specific political knowledge, could enable the detection of what would otherwise look like benign "charity" fundraising.

According to the report: "In most cases, calls for donations were published on Internet sites and forums. In one counter-terrorism investigation, it was noted that supposed humanitarian aid activities were promoted via Facebook. Monetary donations were requested via an associated PayPal account. ... Raised funds are moved by various means, including money remittance companies, hawala (Arabic for 'transfer') traders, and/or the use of anonymous ('bearer') or preloaded value cards. The sale of prepaid phone cards has also been observed in the financing of terrorist entities."

The Europol report dispels the notion that terror suspects would be technologically inept enough to fall for government intelligence "honey traps" and other such trickery: "An increased level of security awareness is evident among extremists on the Internet. They have made use of commonly available anonymisation software (e.g. TOR), encryption applications designed and propagated by extremist groups (e.g. 'Mujahideen Secrets' and 'Asrar al-Dardashah') and private chatrooms (e.g. Paltalk)."

There is no question that technology has its place in intelligence work and is capable of enhancing human analysis and reasoning, but citizens must be able to actually see the evidence of that enhancement. They need details of the actual successes, such as the identities of apprehended or eliminated targets. They need explanations of how the technology proved to be of value (adequately redacted for national security purposes, of course).

Otherwise, when these types of documents leak out into the public domain, intelligence agencies are left trying to explain to taxpayers why they're investing in the ability to fudge online polls and play with website statistics. To be frank, it makes it sound as if government intelligence agencies are one step away from spending their days playing Angry Birds.


TOPICS: Editorial; Government
KEYWORDS: edwardsnowden; internet; nsa; technology

1 posted on 07/16/2014 11:55:36 AM PDT by Kaslin
[ Post Reply | Private Reply | View Replies]

To: Kaslin

The NSA and CIA have become too dependent on Domestic Politics and need to be phoenixed.


2 posted on 07/16/2014 12:02:37 PM PDT by Paladin2
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

If the NSA really wanted to live up to their name “National SECURITY Agency”, they would drop everything they are doing right now and focus 100% of their attention on the foreign born twice unconstitutionally elected Muslim B. Hussein Obama, and do anything and everything they can to get him the F out of office ASAP. Whatever they can find, get and use it because this guy is doing stuff to this country Al-Qaeda, the Taliban, ISIS, etc etc could only dream of doing, and it gets worse and worse every week. What is the point of a “security agency” when they country’s security is getting absolutely raped on a daily basis?


3 posted on 07/16/2014 12:10:09 PM PDT by GrandJediMasterYoda (Hitlery: Incarnation of evil.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

A common theme amongst modern politicians is that ALL life must be spared. Nobody can have any risk. Therefore putting some one in harm’s way as an agent (or soldier) must be replaced by “technology”

They fail to understand that the on the spot thinking and computing of information a human does in respect to it’s situation has yet to be replaced by a machine or gadget.

Or as I always say - “whattya going to do when the batteries fail?”


4 posted on 07/16/2014 12:17:24 PM PDT by llevrok (Straight. Since 1950.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

Too much data - too little thought...


5 posted on 07/16/2014 12:18:30 PM PDT by GOPJ (A ship once out of port is hard to capture:know this now before it is too late. - Solon)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Paladin2

“need to be phoenixed.......”

Nicely put. I’m going to remember that phrase.


6 posted on 07/16/2014 12:21:22 PM PDT by CrazyIvan (I lost my phased plasma rifle in a tragic hovercraft accident.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Kaslin

The so-called intelligence community had a baby,
when a certain deceased author wrote stories,
only using the Jane’s technological
encyclopedias, and the skills of a fiction writer.

Today, the govermental sanctioned intrusions
Ainto the lives of Georges Everyman, has gone
beyond ridiculous, looking for that boogeyman,
that lone American, or lone Arab.

How could these organizations return, to the
person wearing the trenchcoat, when they have
their heads so far inside that digital alimentary
canal?

Truth is, they cannot. Their agencies are no
longer filled with folks, doing it for their nation,
as in The Cold War. They are all filled wi th career
chasers, instead, or those who are encased
in their political clusterbucks, the nation be damned.


7 posted on 07/16/2014 12:21:25 PM PDT by Terry L Smith
[ Post Reply | Private Reply | To 1 | View Replies]

To: Paladin2

No, dropped completely.
Cut EVERYTHING out of the federal government that the Constitution does not explicitly commission/authorize.


8 posted on 07/16/2014 12:23:25 PM PDT by OneWingedShark (Q: Why am I here? A: To do Justly, to love mercy, and to walk humbly with my God.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: CrazyIvan

Long live the English language...


9 posted on 07/16/2014 12:23:46 PM PDT by Paladin2
[ Post Reply | Private Reply | To 6 | View Replies]

To: Kaslin

Men ran across Omaha Beach FOR THIS…?

Defund and destroy.

10 posted on 07/16/2014 12:38:16 PM PDT by gaijin
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

The Chinese got their technology the old fashioned way.

They bought it from Bill Clinton.


11 posted on 07/16/2014 12:49:37 PM PDT by yarddog (Romans 8: verses 38 and 39. "For I am persuaded".)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

Yes, and it will be there undoing. Next question.


12 posted on 07/16/2014 1:24:40 PM PDT by Noamie
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

HUMINT is a lost art.

It’s all about the $$ now, that snazzy multi-billion dollar satellite or fancy listening post.

The really important stuff is missed. They didn’t talk about AQ terrorists learning one-way flying skills on the satellite network, you see..


13 posted on 07/16/2014 7:02:31 PM PDT by Kodos the Executioner (.. the revolution is successful, but survival depends upon drastic measures..")
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson