Beluga Whales, Dolphins, Cats and Ravens, all Top Secret Spies

Russian ‘spy whale’ was shot, animal groups say

Helene O'Barry An alleged Russian spy pokes its head out of the water

The mammal was known locally as Hvaldimir, a pun on the Norwegian word for whale, “hval,” and Russian President Vladimir Putin’s first name

A beluga whale suspected of being a Russian spy found dead off the Norwegian coast was shot, animal rights activists have claimed.

The body of the otherwise healthy and relatively young animal – nicknamed Hvaldimir – was found floating in a bay off the country’s south-western coast.

Animal rights groups said the whale was found with bullet wounds and had been shot in a “heinous crime”.

“We will pursue justice for Hvaldimir,” One Whale founder Regina Haug vowed in a statement on social media.

One Whale was founded to track the beluga, which rose to fame after being spotted in Norwegian waters five years ago.
The pale whale was seen with a GoPro camera attached to a harness that read “Equipment of St Petersburg” – sparking speculation that the curious mammal could be engaged in espionage.
It became known locally as Hvaldimir, a pun on the Norwegian word for whale, “hval,” and Russian President Vladimir Putin’s first name.
The Arctic mammal’s body was found floating off the south-western town of Risavika on 1 September and taken to the nearest port for examination.
Noah and One Whale said they had filed a complaint with Norwegian police asking them to open a criminal investigation.
“He had multiple bullet wounds around his body,” Ms Haug from One Whale said via its official Instagram account after viewing the body on Monday.
Photographs published by One Whale on social media appear to show what they say are bullet wounds in Hvaldimir’s bloodied body.
“The injuries on the whale are alarming and of a nature that cannot rule out a criminal act – it is shocking,” said Noah director, Siri Martinsen.

Cats, dolphins and one smart raven: the CIA’s secret animal spies

Washington (AFP) – In early 1974, Do Da was top in espionage class, on the way to becoming a high-flying CIA agent: he handled himself better in the rough, carried heavier loads, and could brush off attackers.

But on his toughest-yet spy school test, he disappeared — done in by some of his own kind: ravens.

The bird was a central figure in a decade-long US Central Intelligence Agency program to train animals as agents, helping Washington fight the Cold War against the Soviet Union.

On Thursday, the CIA released dozens of files from its tests on cats, dogs, dolphins and on birds from pigeons to some of the smartest: ravens and crows.

It studied cats as possible loose-roaming listening devices — “audio surveillance vehicles” — and put electrical implants in dogs’ brains to see if they could be remotely controlled.

Neither of those programs went very far. More effort was put into training dolphins as potential saboteurs and helping spy on the Soviet Union’s development of a nuclear submarine fleet, perhaps the most potent challenge to US power in the mid-1960s.

Projects Oxygas and Chirilogy sought to see if dolphins could be trained to replace human divers and place explosives on moored or moving vessels, sneak into Soviet harbors and leave in place acoustic buoys and rocket detection units, or swim alongside submarines to collect their acoustic signatures.

Those programs, too, were given up, left to the US Navy which to this day makes use of dolphins and seals.

camerax2

– Hawks and owls –

But what also grabbed the US spy chiefs’ imagination in the Cold War days was birds — pigeons, hawks, owls, crows and ravens, and even flocks of wild migratory birds.

For the latter, the agency enlisted ornithologists to try to determine which birds regularly spent part of the year in the area of Shikhany in the Volga River Basin southeast of Moscow, where the Soviets operated a chemical weapons facility.

The CIA saw the migratory birds as “living sensors” which, based on their feeding, would reveal what kinds of substances the Russians were testing, in their flesh.

In the early 1970s, the CIA turned to birds of prey and ravens, hoping they could be trained for “emplacement” missions like dropping a listening device on a windowsill, and photo missions.

In project Axiolite, bird trainers working on San Clemente island off southern California taught the birds to fly miles over the water between a boat and land.

If the training went well, a chosen candidate would have a tough mission: being smuggled to Soviet Russia, where it would be released secretly in the field, tasked to fly 15 miles (25 kilometers) carrying a camera to snap pictures of a radar for SA-5 missiles, and fly back.

They had red-tailed and Harris’s hawks, great horned owls, a vulture, and a cockatoo.

It was not easy. A cockatoo was “a clever flyer” but “maybe too slow to avoid gull attacks.”

Two falcons died from illness; another promising candidate lost feathers and trainers had to wait for it to molt and grow them back.

– ‘Star’ of the project –

The most promising flyer was Do Da, the raven. In just three months, Do Da went from a successful 3/4-mile trip to six miles from shore to boat, and then four miles back to shore on the same day.

He was the most promising candidate for the Russia mission, the “star of this project,” one scientist wrote, who figured out the right altitudes in the right winds, and acquired “sufficient guile to outwit the native ravens and gulls,” which hid for attacks on him.

But on a training mission he was attacked by “the usual pair” of ravens — and was not seen again.

The scientists were deeply dismayed. “He had a large bag of tricks and was loved by all,” one wrote.

cameraz1

Top Ten James Bond Escapes 

007 agent James Bond often gets trapped, but he always finds a way to squirm his way out. Ingenious with a lot of gumption the British super secret agent (that everybody has heard about and recognizes) has many tricks up his sleeve. The evil madmen of the planet just cannot put an end to this white knight crusader of the western world, even when he has been snared and cornered.

bond1

bond

bond2

Agent Elvis

Elvis trades in his jumpsuit for a jetpack when he joins a secret government spy program to help battle the dark forces that threaten the country.

Wedding the irreverence of Adult Swim to the kinetic animation style of “Spider-Man: Into the Spider-Verse,” “Agent Elvis” is a psychedelic head trip that takes that old story about Elvis Presley’s fascination with the FBI and running (and jumping and kicking) with it. Produced with Priscilla Presley, it’s certainly weird, although given all the ’70s references, it’s frankly hard to envision for whom this is intended.

Working with a cynical agent named CeCe Ryder (Kaitlin Olson), who isn’t a big fan, Elvis’ entourage includes not only Priscilla (who voices herself) but his pal Bobby Ray (Johnny Knoxville), mother-figure Bertie (Niecy Nash) and a homicidal chimp culled from the space program, because once you’ve come this far on the bizarro scale, why not?

Anomaly Six

Anomaly Six (A6) is an American media intelligence company. It sells global-location-data products to the United States government and the private sector. The company has embedded its software in over 500 mobile applications, giving it the ability to track hundreds of millions of mobile phones. In one presentation, the company claimed it could track 3 billion phones in real time.

The company was founded in 2018 by two former military intelligence officers. It is based in Alexandria, Virginia.

The company purchases cell phone location data from advertisers who in turn get the information from embedded software development kits (SDK) in commonly used phone applications. The publishers of apps frequently allow third parties to insert SDKs into their apps for a fee. Some of the apps have Anomaly Six’s own SDK embedded in them. This system often relies on disclosures in the complex terms of service that must be agreed to in order to use an application. Most apps’ privacy policies do not disclose whether or not SDKs are embedded in their product.

In September 2020, U.S. Special Operations Command Africa, an operational unit of the United States Special Operations Command, paid Anomaly 6 $589,500 for a “Commercial Telemetry Feed”. This is the first reported contract between the United States government and Anomaly 6.

In April 2022, it was revealed that the company had demonstrated its surveillance ability by tracking the mobile phones of members of the CIA and NSA. The company revealed the tracking during a meeting between A6 and Zignal Labs. The two companies were in talks to discuss a potential partnership, which they decided not to proceed on.

They are watching you. This goes against privacy rights and norms. However, they have to keep tabs on radical suicidal terrorists.

C.I.A.’s Venture Capital Arm, In-Q-Tel 

In-Q-Tel (IQT), formerly Peleus and known as In-Q-It, is an American not-for-profit venture capital firm based in Arlington, Virginia. It invests in high-tech companies for the sole purpose of keeping the Central Intelligence Agency, and other intelligence agencies, equipped with the latest in information technology in support of United States intelligence capability. The name, “In-Q-Tel” is an intentional reference to Q, the fictional inventor who supplies technology to James Bond.

q

The firm is seen as a trend-setter in the information technology industry, with the average dollar invested by In-Q-Tel in 2012 attracting nine dollars of investment from other companies.

Originally named Peleus and known as In-Q-It, In-Q-Tel was founded by Norm Augustine, a former CEO of Lockheed Martin and by Gilman Louie, who was In-Q-Tel’s first CEO. In-Q-Tel’s mission is to identify and invest in companies developing cutting-edge technologies that serve United States national security interests. Origins of the corporation can be traced to Dr. Ruth A. David, who headed the Central Intelligence Agency Directorate of Science & Technology in the 1990s and promoted the importance of rapidly advancing information technology for the CIA. In-Q-Tel now engages with entrepreneurs, growth companies, researchers, and venture capitalists to deliver technologies that provide superior capabilities for the CIA, DIA, NGA, and the wider intelligence community. In-Q-Tel concentrates on three broad commercial technology areas: software, infrastructure and materials sciences.

Former CIA director George Tenet says,

We [the CIA] decided to use our limited dollars to leverage technology developed elsewhere. In 1999 we chartered … In-Q-Tel. … While we pay the bills, In-Q-Tel is independent of CIA. CIA identifies pressing problems, and In-Q-Tel provides the technology to address them. The In-Q-Tel alliance has put the Agency back at the leading edge of technology … This … collaboration … enabled CIA to take advantage of the technology that Las Vegas uses to identify corrupt card players and apply it to link analysis for terrorists [cf. the parallel data-mining effort by the SOCOM-DIA operation Able Danger ], and to adapt the technology that online booksellers use and convert it to scour millions of pages of documents looking for unexpected results.

In-Q-Tel sold 5,636 shares of Google, worth over $2.2 million, on November 15, 2005. The stocks were a result of Google’s acquisition of Keyhole, the CIA funded satellite mapping software now known as Google Earth.

As of August 2006, In-Q-Tel had reviewed more than 5,800 business plans, invested some $150 million in more than 90 companies, and delivered more than 130 technology solutions to the intelligence community. In 2005 it was said to be funded with about $37 million a year from the CIA.

iqt1

In-Q-Tel is a Virginia-registered corporation, legally independent of the CIA or any other government agency. The corporation is bound by its Charter agreement and annual contract with the CIA, which set out the relationship between the two organizations. In-Q-Tel’s mission to support the Intelligence Community’s technical needs is promoted by the In-Q-Tel Interface Center (QIC), an office within the CIA that facilitates communication and relationships between In-Q-Tel and government intelligence organizations. While In-Q-Tel is a nonprofit corporation, it differs from IARPA (Intelligence Advanced Research Projects Activity) and other models in that its employees can profit from its investments.

Many companies listed on In-Q-Tel’s investment website page are secret. In-Q-Tel functions partially in public; however, what products it has and how they are used is strictly secret. According to the Washington Post, “virtually any U.S. entrepreneur, inventor or research scientist working on ways to analyze data has probably received a phone call from In-Q-Tel or at least been Googled by its staff of technology-watchers.”

The CIA has its tentacles in so many things it’s mind-boggling. I just discovered the existence of In-Q-Tel today. It was laying low, keeping its profile below the radar. What other things is the CIA, NSA, DIA etc. involved in and with? Many secrets in the labyrinth that is the world of intelligence and espionage.

iqtcia

In-Q-Tel headquarters in Arlington, Virginia.

iqt2

Alert: The Most Northern Settlement in The World

Located just over eight hundred kilometers away from the North Pole, the community of Alert, on the northeastern tip of Ellesmere Island, in Nunavut, Canada, is the most northerly permanent settlement in the world. The nearest populated place is another 540 kilometers south, in Greenland, while the nearest Canadian city is over two thousand kilometers away. The place is so close to the North Pole that it can’t connect with communication satellites because their orbit lies below the horizon.

For four months, Alert exist in total darkness. For another four months, the sun never leaves the sky, but rising no more than 30 degrees above the horizon at noon. The land remains frozen and snow covered for almost ten months of the year. Winters are harsh and cold with temperatures regularly dropping thirty degrees below zero. Peak summer temperatures are just a couple of degrees above freezing.

alert-nunavut-canada-11

At any time in this godforsaken place, you’ll find several dozen people living. Thankfully, Alert is not their permanent home; they are merely here on work. These cold and miserable people, nicknamed “The Frozen Chosen”, include members of the Canadian Armed Forces —which maintains a signals intelligence intercept facility called CFS Alert— and scientific personnel working at the two research facilities here —the Environment Canada weather station and a Global Atmosphere Watch (GAW) atmosphere monitoring observatory.

In July 2019, during a global heat wave Alert recorded the highest ever temperature—an unprecedented 21 degrees Celsius, about 14 degrees higher than normal.

The community of Alert is named after HMS Alert, a British ship which set up camp near Alert in the winters of 1875–76. The ship’s captain, George Nares, and his crew were the first recorded people to reach the northern end of Ellesmere Island.

The weather station was established here in 1950. The military station came eight years later. During the Cold War, Alert was strategically important because it was the only point in North America that was closest to the northwestern area of the Soviet Union. In fact, Alert is closer to Moscow (2,500 miles or 4,000 km) than it is to Ottawa (2,580 miles or 4,150 km). Alert’s proximity to the Soviet Union allowed the US-Canada-UK-Australia-New Zealand intelligence sharing alliance, also known as the Five Eyes, to eavesdrop on the Russian communication network. The station soon became a key asset in the global ECHELON network.

At its peak, CFS Alert had upwards of 215 personnel posted at any one time. But after budget cuts in the 1990s, CFS Alert was downsized to approximately 74 personnel, but during summers, its population can rise to over hundred.

A Sun newspaper article dated November 14, 2004, provides readers with a glimpse of life at Alert:

The soldiers, a lot of them volunteers, serve six month postings — divided by a three week vacation. Today, the food is as good as it ever was.  TV’s in various rooms show four channels of live television and another four of movies, played from the stations stock of 4,500 video and DVDs. Listening to the base’s CHAR-FM 105.9 trivia shows are another popular pastime. Much of the station is devoted to recreation, with two gyms, a darkroom, a bowling alley and a theatre. Evenings are filled with activities — multi-player computer games, woodworking, bingo, euchre and trivia. Most personnel volunteer to come here. Like a crew inside a submarine, the isolation and uniqueness of Alert pull people together and drive others apart — earning them all the 50-year-old nickname of  ‘The Frozen Chosen.”.

The only way to transport anything here is by air. Every year, the RCAF makes about 225 Hercules flights to Alert to bring in around two million litres of fuel and 300 tonnes of cargo. In addition to the weekly flights, supplies are shuttled in twice a year in massive operations involving dozens of flights to and from the nearest deep-water port, Thule, Greenland. The problem is, much of the time Canada’s Hercules C-130 aircraft aren’t flying. The resupply flights are routinely delayed 24 hours or cancelled altogether when planes are grounded by mechanical problems or diverted elsewhere by military priority.

Military physicians note most people gain weight after arriving. Those who aren’t able to deal with the remoteness are weeded out before they touch down on the gravel and snow runway. “It’s great to be here, but you must keep yourself busy all the time,” says  Station Warrant Officer Serge Oullet in 2004. “We try to get people to socialize with each other in off hours.”

alert-map
alert-nunavut-canada-1

United States Ambassador Jacobson in front of CSB Alert welcome sign.

alert-nunavut-canada-2

Danish sled dogs in Alert, Nunavut.

alert-nunavut-canada-3

Canadian Rangers training camp near CSB Alert, Nunavuk.

alert-nunavut-canada-4

Snow transport in Alert, Nunavut.

alert-nunavut-canada-15

A memorial commemorating the men who died in a 1950 plane crash in Alert.

alert-nunavut-canada-6

The graves of the crew who died in the 1950 crash remains buried at Alert.

alert-nunavut-canada-16

The wreckage of an airplane. There were actually three crashes on Alert. The photographer doesn’t mention to which crash this wreckage belongs to.

alert-nunavut-canada-7

Ice crystals.

alert-nunavut-canada-8

Frost flowers.

alert-nunavut-canada-9
alert-nunavut-canada-10
alert-nunavut-canada-12
alert-nunavut-canada-14

Sun rise at 2am.

alert-nunavut-canada-17

Satellite photo of Alert. Photo credit: Google Maps

At any given time there are roughly 60-80 personnel at the base. This includes military and contractors.

C-17 resupply aircraft landing at Alert.

Some signals intelligence spy equipment.

Mr. Yves Gauthier guides Master Corporal Marty Stride and Corporal Graeme Ross (CFS LEITRIM) through the maintenance program on one of the High Arctic Data Communication Systems Line of Sight Systems (HADCS LOS) Sites. (lt (N) clayton erickson, joint task force north, dnd)

Spy Bases: Secretive HQs of the World’s Intelligence Agencies 

danger

Architecture is a language, one used by institutions to say something about themselves.

The same basic principle is true for the world’s spy agencies. All show their secrecy in their buildings, while some may appear starkly utilitarian, and some may even be frightening and alienating. But they also have their quirks and differences, whether it be an isolated complex hidden by trees, in a location that’s never been officially disclosed, or a prominent complex built by superstar architects and put on prominent display in the middle of a capital city.

United States: Central Intelligence Agency

ciax1

If John Brennan becomes the next CIA director — a likely event — he’ll be working from inside a complex that could blend into a business park anywhere in America. But this park contains the headquarters of America’s foreign intelligence agency.

Protected from prying eyes by a wooded belt in suburban Langley, Virginia, just northwest of Washington, D.C., the complex is actually two sets of buildings connected to a central core, with each set built at different times. The first half of the building and designed by New York architecture firm Harrison and Abramovitz — who had a role in designing the United Nations headquarters — dates back to 1963. It’s a sign of its times, and built from sterile pre-fabricated concrete.  But by the 1980s, the agency was running out of space. Today, the complex is much larger, with an added west wing of two glass office towers, designed by Detroit architects Smith, Hinchman & Grylls in the 1980s.

The CIA also has a penchant for art and assorted knick-knacks. The agency has a chunk of the Berlin Wall on display, and an A-12 Oxcart spy plane. There’s a museum inside the building with all sorts of weird memorabilia inside, from a robotic fish to a Cold War-era mini-submarine. Outside the cafeteria on the grounds of the headquarters’ new wing is the copper sculpture Kryptos, containing 869 encrypted characters on four plates. The final plate, with its 97 characters, is still unbroken. The cafeteria is remarkably pleasant and airy for a government building, actually, with enormous windows and green views. (The food, however, is not quite as pleasing.)

danger1

United States: National Security Agency

There are clear views of the National Security Agency’s headquarters off the Patuxent Freeway, just skirting Fort Meade, Maryland, about 15 miles southwest of Baltimore. But we wouldn’t advise getting any closer, as the NSA is the highly secretive agency responsible for the U.S. government’s codebreaking and collecting communications from around the world. The NSA’s headquarters also fits the part, rising blank and expressionless above a desert of parking lots. Completed in 1986, it resembles a collection of stubby, black, reflective monoliths like from 2001: A Space Odyssey. And according to the Center for Land Use Interpretation, the complex has an estimated 10 acres of underground space.

But like the CIA during the Cold War, the NSA in recent years has outgrown its own building. Fort Meade altogether has grown extremely rapidly as defense agencies relocate there and the NSA boosts its Cyber Command headquarters. Defense and government contractors now have offices surrounding the place, and contract and government jobs have surged, largely due to growth at the base more generally, and partly because of growth at the NSA. The Baltimore Business Journal reported that the base is expected to add an eye-popping 42,500 jobs by the end of the decade. The Defense Department even paved over part of the base’s golf course for the headquarters of the Defense Media Activity organization, the Pentagon’s media wing. Hopefully the Pentagon and the NSA will include a lot more parking.

danger2

United Kingdom: Secret Intelligence Service

There’s perhaps no spy headquarters more recognizable than the SIS Building, headquarters of the British Secret Intelligence Service, or MI6. It’s not only smack-dab in the middle of London, but has been featured in six James Bond movies, and blown up in two of them. Designed by architect Terry Farrell, the structure has been compared to a cross between a Babylonian ziggurat and a power plant. And it’s built like a veritable fortress, capable of withstanding bomb attacks. There are also reportedly extensive underground areas.

It’s also put its defenses to use. In September 2000, militants suspected to be from the Real Irish Republican Army — a splinter faction of the Irish paramilitary group — fired a rocket-propelled grenade round at the building’s eighth floor, causing no injuries. In a demonstration of just how heavily armored the building is, the rocket reportedly bounced off a glass window.

danger3

Russia: Federal Security Service

The Lubyanka building — the yellow, neo-Baroque former headquarters of Russia’s spies — is still the most recognizable symbol of Russian secrecy, even if the bulk of their office space has moved elsewhere. Dating to 1897, the building once housed an insurance company before becoming the headquarters for the feared Soviet spy agency KGB. It was remodeled by Stalin. (The basement contained a KGB prison.) The building was then transferred to the KGB’s successor agency, the Federal Security Service (FSB), after the collapse of the USSR.

According to cybersecurity analyst Jeffrey Carr’s book Inside Cyberware: Mapping the Cyber Underworld, the building today houses the FSB’s Communications Security Center, which oversees and encrypts Russian government computer security systems; and the Center for Licensing, Certification, and Protection of State Secrets, which handles export licenses for cryptographic and surveillance technology. Twin suicide bombing attacks in 2010 also came close to the building — one of the blasts exploded at the nearby Lubyanka metro station.

CDU-Innenexperte Bosbach rechnet mit 1,5 Milliarden fuer BND-Neubau

Germany: Federal Intelligence Service

Germany’s chief spy agency, which in German goes by the name Bundesnachrichtendienst (BND), is proud of its spiffy new headquarters. ABC has reported that it’s “set to be one of the most technologically sophisticated buildings in the world” once it opens in 2014. Located within walking distance of the Reichstag building in Berlin and on the site of a former East German soccer stadium, the BND has even gone online to show off of its facades of “natural stone, render, fair-faced concrete, brick or metal.” It has room for 4,000 employees, and has weird blob art. The agency is also touting its architect, Jan Kleihues, the son of famous architect Josef Paul Kleihaus, who was known for museums in Germany and Chicago.

But the design is also perhaps more open than the Germans would like. In July 2011, Munich news magazine Focus reported that the building’s blueprints were stolen from the construction site. According to Focus, the blueprints contained “the exact function of every single room, the thickness of each wall, the exact position of every toilet and every emergency exit and every security checkpoint.” The theft hasn’t ended Berlin’s plans. However, it was reported to have forced an estimated $1.8 billion interior redesign.

danger7

France: Directorate-General for External Security

This walled compound doesn’t stand out — because it’s not supposed to. It would be an ordinary and undistinguished complex of buildings, that is, if you ignore the high walls topped with spikes and a tall sensor tower. Located on the eastern edge of the Paris city limits is the headquarters for the French Directorate-General for External Security (DGSE), the agency responsible for France’s overseas intelligence works. It’s headquarters also nicknamed “the swimming pool” for its proximity to a facility used by the French Swimming Federation, and Google Maps has even blurred its image in satellite photographs.

danger8

China: Ministry of State Security

The building seen above is not the main headquarters for the Chinese Ministry of State Security (MSS), but a regional office in China’s central Hubei Province. The official headquarters is a little harder to spot. Attempts to track it down have led to frequent — but mistaken — associations with the Ministry of Public Security: the giant Borg-like structure in downtown Beijing which houses China’s national police command. A closer bet for the main MSS offices is a low-key compound in Beijing’s northwest.

The MSS is also different from many Western intelligence agencies because it handles both foreign and domestic intelligence, instead of splitting them up like the CIA and FBI. Hence the reason why it has regional offices inside China, in addition to carrying out Chinese espionage overseas. The Hubei office also sends something of a statement, with its imposing columns, wedding cake facade, sensor dishes and observation perch. Another photo shows what appears to be a police officer on duty, in case anyone gets the wrong idea and wanders a little too closely.

U.S. Intelligence Utah Data Center

The Utah Data Center (UDC), also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, is a data storage facility for the United States Intelligence Community that is designed to store data estimated to be on the order of exabytes or larger. Its purpose is to support the Comprehensive National Cybersecurity Initiative (CNCI), though its precise mission is classified. The National Security Agency (NSA) leads operations at the facility as the executive agent for the Director of National Intelligence. It is located at Camp Williams near Bluffdale, Utah, between Utah Lake and Great Salt Lake and was completed in May 2014 at a cost of $1.5 billion.

Critics believe that data center has the capability to process “all forms of communication, including the complete contents of private emails, cell phone calls, and Internet searches, as well as all types of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital ‘pocket litter’.” In response to claims that the data center would be used to illegally monitor email of U.S. citizens, in April 2013 an NSA spokesperson said, “Many unfounded allegations have been made about the planned activities of the Utah Data Center, … one of the biggest misconceptions about NSA is that we are unlawfully listening in on, or reading emails of, U.S. citizens. This is simply not the case.”

In April 2009, officials at the United States Department of Justice acknowledged that the NSA had engaged in large-scale overcollection of domestic communications in excess of the United States Foreign Intelligence Surveillance Court’s authority, but claimed that the acts were unintentional and had since been rectified.

In August 2012, The New York Times published short documentaries by independent filmmakers titled The Program, based on interviews with former NSA technical director and whistleblower William Binney. The project had been designed for foreign signals intelligence (SIGINT) collection, but Binney alleged that after the September 11 terrorist attacks, controls that limited unintentional collection of data pertaining to U.S. citizens were removed, prompting concerns by him and others that the actions were illegal and unconstitutional. Binney alleged that the Bluffdale facility was designed to store a broad range of domestic communications for data mining without warrants.

Documents leaked to the media in June 2013 described PRISM, a national security computer and network surveillance program operated by the NSA, as enabling in-depth surveillance on live Internet communications and stored information. Reports linked the data center to the NSA’s controversial expansion of activities, which store extremely large amounts of data. Privacy and civil liberties advocates raised concerns about the unique capabilities that such a facility would give to intelligence agencies. “They park stuff in storage in the hopes that they will eventually have time to get to it,” said James Lewis, a cyberexpert at the Center for Strategic and International Studies, “or that they’ll find something that they need to go back and look for in the masses of data.” But, he added, “most of it sits and is never looked at by anyone.”

The UDC was expected to store Internet data, as well as telephone records from the controversial NSA telephone call database, MAINWAY, when it opened in 2013.

In light of the controversy over the NSA’s involvement in the practice of mass surveillance in the United States, and prompted by the 2013 mass surveillance disclosures by ex-NSA contractor Edward Snowden, the Utah Data Center was hailed by The Wall Street Journal as a “symbol of the spy agency’s surveillance prowess”.

Binney has said that the facility was built to store recordings and other content of communications, not only for metadata.

According to an interview with Snowden, the project was initially known as the Massive Data Repository within NSA, but was renamed to Mission Data Repository due to the former sounding too “creepy”.

An article by Forbes estimates the storage capacity as between 3 and 12 exabytes in the near term, based on analysis of unclassified blueprints, but mentions Moore’s Law, meaning that advances in technology could be expected to increase the capacity by orders of magnitude in the coming years.

Toward the end of the project’s construction it was plagued by electrical problems in the form of “massive power surges” that damaged equipment. This delayed its opening by a year.

The finished structure is characterized as a Tier III Data Center, with over a million square feet, that cost over 1.5 billion dollars to build. Of the million square feet, 100,000 square feet are dedicated to the data center. The other 900,000 square feet are utilized as technical support and administrative space.

Super Spyware That Can Take Total Control of Smartphones

NSO Group Technologies (NSO standing for Niv, Shalev and Omri, the names of the company’s founders) is an Israeli technology firm whose spyware called Pegasus enables the remote surveillance of smartphones. It was founded in 2010 by Niv Carmi, Omri Lavie, and Shalev Hulio. It employed almost 500 people as of 2017, and is based in Herzliya, near Tel Aviv, Israel.

Pegasus is spyware developed by the Israeli cyberarms firm NSO Group that can be covertly installed on mobile phones (and other devices) running most versions of iOS and Android. The 2021 Project Pegasus revelations suggest that current Pegasus software is able to exploit all recent iOS versions up to iOS 14.6. According to the Washington Post and other prominent media sources, Pegasus not only enables the keystroke monitoring of all communications from a phone (texts, emails, web searches) but it also enables phone call and location tracking, while also permitting NSO Group to hijack both the mobile phone’s microphone and camera, thus turning it into a constant surveillance device.

Pegasus was discovered in August 2018 after a failed attempt at installing it on an iPhone belonging to a human rights activist led to an investigation revealing details about the spyware, its abilities, and the security vulnerabilities it exploited. As of 2016, Pegasus was capable of reading text messages, tracking calls, collecting passwords, tracking location, accessing the target device’s microphone and camera, and harvesting information from apps. News of the spyware caused significant media coverage. It was called the “most sophisticated” smartphone attack ever, and was the first time that a malicious remote exploit using jailbreak to gain unrestricted access to an iPhone had been detected.

On August 23, 2020, according to intelligence obtained by the Israeli newspaper Haaretz, the NSO Group was reported to have sold Pegasus spyware software for hundreds of millions of US dollars to the United Arab Emirates and the other Gulf States, for surveillance of anti-regime activists, journalists and political leaders from rival nations, with Israeli government encouragement and mediation. Later, in December 2020, Al Jazeera investigation show The Tip of the Iceberg, Spy partners, showed exclusive footage about Pegasus and its penetration into the phones of media professionals and activists, used by Israel to eavesdrop on its opponents and even its allies.

The spyware can be installed on devices running certain versions of iOS, Apple’s mobile operating system, as well as some Android devices. Rather than being a specific exploit, Pegasus is a suite of exploits that uses many vulnerabilities in the system. Infection vectors include clicking links, the Photos app, the Apple Music app, and iMessage. Some of the exploits Pegasus uses are zero-click—that is, they can run without any interaction from the victim. Once installed, Pegasus has been reported to be able to run arbitrary code, extract contacts, call logs, messages, photos, web browsing history, settings, as well as gather information from apps including but not limited to communications apps iMessage, Gmail, Viber, Facebook, WhatsApp, Telegram, and Skype.

Misuse
Although Pegasus is stated as intended to be used against criminals and terrorists, use by authoritarian governments to spy on critics and opponents has often been reported.

Use by India
In late 2019, Facebook initiated a suit against NSO, claiming that Pegasus had been used to intercept the WhatsApp communications of a number of activists, journalists, and bureaucrats in India, leading to accusations that the Indian government was involved.

Phone numbers of Indian ministers, opposition leaders, ex-election commissioners and journalists were allegedly found on a database of NSO hacking targets by Project Pegasus in 2021.

Independent digital forensic analysis conducted on 10 Indian phones whose numbers were present in the data showed signs of either an attempted or successful Pegasus hack. The results of the forensic analysis threw up shows sequential correlations between the time and date a phone number is entered in the list and the beginning of surveillance. The gap usually ranges between a few minutes and a couple of hours.

11 phone numbers associated with a female employee of The Supreme Court of India and her immediate family, who accused the former Chief Justice of India, Ranjan Gogoi, of sexual harrasment, are also allegedly found on a database indicating possibility of their phones being snooped.

Records also indicate that phone numbers of some of the key political players in Karnataka appear to have been selected around the time when an intense power struggle was taking place between the Bharatiya Janata Party and the Janata Dal (Secular)-Congress-led state government in 2019.

It was reported that the Indian government used Pegasus to spy on Pakistan Prime Minister Imran Khan and diplomats from Iran, Afghanistan, China, Nepal and Saudi Arabia.

Use by Mexican drug cartels
Reversing the intended use against criminals, Pegasus has been used to target and intimidate Mexican journalists by drug cartels and cartel-entwined government actors.

Use by Saudi Arabia
Pegasus software, whose sales are licensed by the government of Israel to foreign governments, helped Saudi Arabia spy on Jamal Kashoggi, who was later killed in Turkey.

Pegasus was also used to spy on Jeff Bezos after Mohammed bin Salman, the crown-prince of Saudi Arabia, exchanged messages with him that exploited then-unknown vulnerabilities in WhatsApp.