Results 1 to 3 of 3
  1. #1 How the CIA can send a Killer Drone after someone using their Mobile Phone 
    Senior Member
    Join Date
    Jun 2008
    Posts
    9,032
    How the CIA can send a Killer Drone after someone using their Mobile Phone
    http://www.fastcompany.com/3014675/f...y-mobile-phone

    Since 2001, armed Predator drones have been used by the CIA in many foreign nations to attack individuals on the ground. There's a new revelation about them, too: In some cases, the NSA helped the CIA find targets by locking onto their powered-off mobile phones. Even when phones have their batteries removed, it appears the NSA still has the ability to locate them.

    Buried inside a Washington Post story by Dana Priest is the following tidbit:

    By September 2004, a new NSA technique enabled the agency to find cellphones even when they were turned off. JSOC troops called this "The Find," and it gave them thousands of new targets, including members of a burgeoning al-Qaeda-sponsored insurgency in Iraq, according to members of the unit.

    At the same time, the NSA developed a new computer linkup called the Real Time Regional Gateway into which the military and intelligence officers could feed every bit of data or seized documents and get back a phone number or list of potential targets. It also allowed commanders to see, on a screen, every type of surveillance available in a given territory.


    "The Find," the Post article says, is run by a team in the basement of the NSA's headquarters whose job is to track the location of mobile phones in real time. Because many phones have chips that stay on even after a battery has been removed, tracking powered-down phones is within the realm of possibility.

    The revelations fit right in with the Edward Snowden disclosures, but the NSA isn't the only one tracking phones: Other government agencies and private companies regularly track them without warrants or court orders as well.
    Reply With Quote  
     

  2. #2  
    LTC Member Odysseus's Avatar
    Join Date
    May 2008
    Location
    FT Belvoir, VA
    Posts
    15,638
    Quote Originally Posted by Elspeth View Post
    How the CIA can send a Killer Drone after someone using their Mobile Phone
    http://www.fastcompany.com/3014675/f...y-mobile-phone

    Since 2001, armed Predator drones have been used by the CIA in many foreign nations to attack individuals on the ground. There's a new revelation about them, too: In some cases, the NSA helped the CIA find targets by locking onto their powered-off mobile phones. Even when phones have their batteries removed, it appears the NSA still has the ability to locate them.

    Buried inside a Washington Post story by Dana Priest is the following tidbit:

    By September 2004, a new NSA technique enabled the agency to find cellphones even when they were turned off. JSOC troops called this "The Find," and it gave them thousands of new targets, including members of a burgeoning al-Qaeda-sponsored insurgency in Iraq, according to members of the unit.

    At the same time, the NSA developed a new computer linkup called the Real Time Regional Gateway into which the military and intelligence officers could feed every bit of data or seized documents and get back a phone number or list of potential targets. It also allowed commanders to see, on a screen, every type of surveillance available in a given territory
    .

    "The Find," the Post article says, is run by a team in the basement of the NSA's headquarters whose job is to track the location of mobile phones in real time. Because many phones have chips that stay on even after a battery has been removed, tracking powered-down phones is within the realm of possibility.

    The revelations fit right in with the Edward Snowden disclosures, but the NSA isn't the only one tracking phones: Other government agencies and private companies regularly track them without warrants or court orders as well.
    Thanks to the Washington Post, yet another US military program that is perfectly legal and critical to tracking down and eliminating terrorists has been exposed, giving the various terrorist insurgents the knowledge to develope countermeasures. This will complicate tracking murderous jihadis and put our own personnel in harm's way, yet again. A reminder to everyone that Article 3, Section 3 of the US Constitution has a reference to this: "Treason against the United States, shall consist only in levying War against them, or in adhering to their Enemies, giving them Aid and Comfort." I'd say that exposing how we track and kill our enemies so that they can evade us constitutes giving them aid and comfort.
    --Odysseus
    Sic Hacer Pace, Para Bellum.

    Before you can do things for people, you must be the kind of man who can get things done. But to get things done, you must love the doing, not the people!
    Reply With Quote  
     

  3. #3  
    eeeevil Sith Admin SarasotaRepub's Avatar
    Join Date
    Mar 2002
    Location
    Sarasota,FL
    Posts
    42,812
    Fucking morons...

    And I'm sure they think they are "helping".
    May the FORCE be with you!
    Reply With Quote  
     

Bookmarks
Bookmarks
Posting Permissions
  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •