recommended reading

How the NSA Is Using Cell Phone Data to Drone Civilians In Pakistan

Pakistan women take part in a rally against the U.S. drone strikes in Pakistani tribal areas in Peshawar, Pakistan.

Pakistan women take part in a rally against the U.S. drone strikes in Pakistani tribal areas in Peshawar, Pakistan. // Mohammad Sajjad/AP File Photo

In late 2001, a National Security Agency analyst was asked to do something unusual. Instead of locating a target's cell phone to eavesdrop on his conversation, the analyst was asked for the phone's location in real-time. It was apparently the beginning of the NSA's role in the CIA's drone operations that, a new report compiled by Pakistan suggests, had killed nearly 200 civilians by 2009.

The details of that first NSA-supported strike appear in a new story from The Washington Post. A Navy SEAL, standing in a trailer that was once home to the CIA's child care program, asked the analyst where the NSA's target was located.

“We just want you to find the phone!” the SEAL urged. No one cared about the conversation it might be transmitting. …

The NSA collector in Georgia took what was then considered a gigantic leap — from using the nation’s most sophisticated spy technology to record the words of presidents, kings and dictators to using it to kill a single man in a terrorist group.

This, The Post suggests, spurred the NSA's rapid expansion in the last decade, building and expanding its facilities around the world. Meanwhile, the technology used by the agency to track targets also expanded. 

Read more at The Atlantic Wire

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.