Special Collection Service

Recent Posts

Unsupported Browser
Davis March 12, Ryge July 3, Rumsfeld deprecates this view. Retrieved June 25, On April 25, , the NSA obtained a court order requiring Verizon 's Business Network Services to provide metadata on all calls in its system to the NSA "on an ongoing daily basis" for a three-month period, as reported by The Guardian on June 6,

Features & Resources

“F6″ the NSA’s global surveillance unit, the “Special Collection Service.”

But some cybersecurity experts said that the techniques contained in the leaked documents did not appear to be uniquely advanced, and most focused on exploiting technical vulnerabilities that were generally known. However, federal investigators are not excluding the possibility that the leaker of the information may be a full-time CIA employee. Reports suggest that the FBI is preparing to conduct hundreds, and possibly thousands, of interviews with individuals who are believed to have had access to the documents that were released by WikiLeaks.

March 8, by Joseph Fitsanakis 4 Comments. Thousands of documents belonging to the United States Central Intelligence Agency, which were released on Tuesday by the international anti-secrecy website WikiLeaks, are almost certainly genuine. They reveal an entire universe of technical intelligence collection methods used by the CIA to extract information from digital applications and electronic devices, ranging from flash drives to smart screen televisions.

WikiLeaks named the collection Vault 7 , and said that it consists of nearly 8, web pages and 1, attachments. It also said that its editors redacted hundreds of pages of computer code, in order to prevent the public release of advanced cyberweapons that are allegedly used by the CIA to sabotage electronic devices and systems.

Targets include popular communications systems like Skype and WhatsApp, smartphones produced by Google and Apple, commercial software like PDF and Microsoft Windows, and even so-called smart televisions that connect to the Internet. It used advanced communications-interception facilities around the world to collect information. WikiLeaks did not reveal the source of the documents. October 13, by Ian Allen Leave a comment. The existence of the program was disclosed in the summer of by Snowden, who told German newsmagazine Der Spiegel that it consisted of SIGINT collection facilities in nearly US embassies and consulates in almost as many countries.

The documents date from , and contain a synopsis of a number of NSA intelligence-collection programs, along with their operational titles and status. According to the document, the SCS operates its own sophisticated listening devices with which they can intercept virtually every popular method of communication: The necessary equipment is usually installed on the upper floors of the embassy buildings or on rooftops where the technology is covered with screens or Potemkin-like structures that protect it from prying eyes.

That is apparently the case in Berlin, as well. In his so-called "Echelon Report" in , he described for the European Parliament the existence of the global surveillance network of the same name.

Campbell refers to window-like indentations on the roof of the US Embassy. They are not glazed but rather veneered with "dielectric" material and are painted to blend into the surrounding masonry. This material is permeable even by weak radio signals.

The interception technology is located behind these radio-transparent screens, says Campbell. The offices of SCS agents would most likely be located in the same windowless attic. They show, for example, an SCS office in another US embassy -- a small windowless room full of cables with a work station of "signal processing racks" containing dozens of plug-in units for "signal analysis. Apparently, SCS agents use the same technology all over the world. They can intercept cellphone signals while simultaneously locating people of interest.

One antenna system used by the SCS is known by the affable code name "Einstein. The SCS are careful to hide their technology, especially the large antennas on the roofs of embassies and consulates. If the equipment is discovered, explains a "top secret" set of classified internal guidelines, it "would cause serious harm to relations between the United States and a foreign government.

According to the documents, SCS units can also intercept microwave and millimeter-wave signals. Some programs, such as one entitled "Birdwatcher," deal primarily with encrypted communications in foreign countries and the search for potential access points. Birdwatcher is controlled directly from SCS headquarters in Maryland. With the growing importance of the Internet, the work of the SCS has changed. Some 80 branches offer "thousands of opportunities on the net" for web-based operations, according to an internal presentation.

The organization is now able not only to intercept cellphone calls and satellite communication, but also to proceed against criminals or hackers. From some embassies, the Americans have planted sensors in communications equipment of the respective host countries that are triggered by selected terms.

How the Scandal Began Part 3: Discuss this issue with other readers! Show all comments Page 1. While I do not approve of tapping Angela Merkel's phone, I believe that Germany is acting with some degree of hypocrisy given that it is a fact that Germany spies on the U. The issue is of degree. It is fair to criticize [ It is fair to criticize America for the extent of its eavesdropping but Germany should at least admit that it has its own operations going on in the U.

Second, the NSA has a right to engage in anti-terror intelligence gathering in Germany, given that several terrorists came from Hamburg. Clearly there is a known threat. A "code of conduct" among allies is desirable. And, at the same time, it would be appreciated if Germany stops acting like it has no dirty secrets of its own at least the French acknowledge that they spy on the U. The whole affair has damaged world wide security operations.

These two states are deeply integrated in military and espionage co-operation. Look, what's really afoot here is not that Mrs.

Merkel uses her cellphone to conduct state business and her privacy has been compromised. Unless her cellphone is "scrambled" she should never communicate in the open. That's her fault and her problem, and she apparently knows it.

The greater quandary, whether we like it or not, is that the NSA et al had their cover blown, and that under those circumstances, they should immediately have gone to their allies with appropriate "mea culpas", proactively, instead of allowing the whole awkwardness of it blow up in their faces.

Of course, this is mostly theatre: They are putting on these histrionics for local consumption, mostly because they are truly angry for having their cover blow, too. This is really not about spying, which is done all the time. It's about clumsiness, unprofessionalism. The Eleventh Commandment is: The Americans, in their hubris, violated that commandment once too often, and they are to blame. Time to pay the dues and move on. I'm guessing the German leader will be kicking the US military off their landscape?

Welcome to Electrospaces.net!

The Special Collection Service (SCS), codenamed F6, is a highly classified joint U.S. Central Intelligence Agency–National Security Agency program charged with inserting eavesdropping equipment in difficult-to-reach places, such as foreign embassies, communications centers, and foreign government installations. Established in the late . Inside the secret world of America's top eavesdropping spies. David W director of the National Security Agency, sent Special Collection the Special Collection Service . Posts about NSA Special Collection Service written by Joseph Fitsanakis and Ian Allen.