Exposing the NSA’s Mass Surveillance of Americans | CYBERWAR - バイリンガル字幕

The leaked documents revealed the scope of the NSA's mass surveillance program.
We cannot prevent terrorist attacks or cyber threats without some capability to penetrate digital communications.
Others a mass unit called tailored access operations.
I don't need mass surveillance, I need you to break into that guy's computer.
Their mission is to get the ungetable.
If you want to hack into systems lawfully, the only game in town is the government.
Their targets are secrets.
They are very important.
They're actually tracking down people who are then subsequently killed.
And there's almost nothing they can't hack.
The National Security Agency is one of the world's largest intelligence agencies.
Headquartered in Fort Meade, Maryland, the NSA's mandate is to collect foreign intelligence.
After 9-11, George W.
Bush authorized the NSA to collect even more, including American communications to and from foreign targets.
Good This is a highly classified program that is crucial to our national security.
This program shocked an NSA senior executive named Thomas Drake.
Drake is a decorated veteran who blew the whistle and NSA's activities to the press.
He barely escaped 35 years in jail after being charged at the end.
A law first written in 1917.
The National Security Agency is focused on foreign intelligence.
It formed in 1952.
People don't realize it was not formed by an act of Congress.
It was literally signed into existence by the stroke of a secret presidential pen.
In fact, the joke was it was no such agency or never say anything.
You never even referenced the actual name.
People who used to work there, oh, I at DOD, now I accelerate forward.
Internet explodes.
You have this rapid transition from analog to digital and the explosion of data.
became exponential.
What do you think is the easiest way to deal with it?
Just suck it all.
So what happened after 9-11 was it NSA should do better?
Here's where you have culture and secret meeting itself,
realizing it failed but can it had not prevented the next Pearl Harbor and now NSA is literally unleashed.
It's unleashed on an extraordinary scale.
A scale we have never seen in US history or the world all means necessary to confront the threat.
Who cares about the Constitution?
Who cares about law?
Who about the rights of U.S.
persons?
Hey, if you've done nothing wrong, I even heard this, then it should matter.
And the mantra was, just get the data, collect it all so we can know it all.
so we can know it all." Drake inspired another NSA worker to sound the alarm.
This afternoon, the Guardian newspapers revealed the name of their source.
In Edward Snowden leaked tens of thousands of classified NSA documents.
The first to get published was a secret court order forcing Verizon to fork over the call data of millions of US customers.
The next big leak was a PowerPoint presentation.
The NSA boasted that PRISM gave them direct access to emails, video chats, and more from some of America's biggest tech companies.
The media was obsessed with Snowden in the leaks,
but few people noticed information hidden in the documents about a top secret NSA unit called TAO, or Access.
operations.
Until the German magazine, Der Spiegel, revealed more about it than ever before.
Jürgen Schindler is the magazine's award-winning national security reporter.
You can call them the highly skilled plumbers of the NSA who are able to get into every sort of pipe.
What they are doing is getting the ungettable.
They're like the special forces of the NSA, essentially.
Yeah, special hacker force.
I the whole NSA is a special force, but those are the highly skilled handyman who create certain...
to infiltrate, manipulate and sabotage every kind of digital device you might think of.
What's the relationship between tailored access operations by the NSA and their mass surveillance?
I mean to explain it easily,
I would say that mass surveillance is like going into the ocean with a huge fishing net and to draw everything out with whatever you do.
And what the tailored access operation units are doing is like using the harpoon to find special targets and the fishes they really need.
So that might be the difference, so it's like going hand in hand.
NTA is pretty good at it.
They're extremely good at it, yes.
The Snowden leaks revealed more about tailored access operations.
But lot is still unknown.
I wanted to talk to someone who knows the NSA from the inside.
An Air Force veteran and former NSA exec named John Harbaugh.
Oh John Harbaugh.
Thank you John.
Please come in.
Let's see this place.
Route 9B.
Yeah.
by the way.
So root is system level access, 9B is hexadecimal for 911.
So a it's a nod to the fact that the next 911 event is most likely going to be cyber-related.
Route 9B, which has defense contracts, aims to hunt and pursue adversaries inside a client's network.
This is where we do all of our hunt operations, what we call it, for our clients.
So what this is showing you is what the operator sees while they're doing their op, right?
So there'll be windows of time where they're actually active inside the client's network pursuing the adversary.
And this is really driven by our experiences.
this and for me.
This is better.
Your bio it says something like you were the director of a super elite cyber operation unit.
Yeah so basically what what that's about is what we've tried to recreate here.
So my time inside the organization.
I had the pleasure and the and the fortune to be asked to run a team of about eight individuals
And that team was focused on the most challenging problems in cyber.
Was that tailored access operations?
So so you know there is there is elements of that space right because right if you're in cyber and you do all of that
then you're doing all of those types of things.
And so the bosses could come in and say, we a significant national event.
I need you guys to be able to do this in the next 12 hours.
I could walk into that space and say, hey guys, I need five minutes.
I would give them what we would call the Op Order.
This is what we need to achieve.
We need to achieve in the next 12, 24, 48 hours.
And I could walk away.
And I knew when I came back, no matter what time of day, how long they were working on it, they would get it done.
And it was that kind of...
Teamwork.
Teamwork that really drew people and it's a very similar thing to the special ops community And it does sound like a military chain of command.
Yeah, I mean NSA is a very military organization To build a team like TAO the NSA has to hire highly skilled hackers
So how does it head hunt them to find out I asked Chris Seguyan
He's a privacy activist with the American Civil Liberties Union
Who are they and where's the NSA recruiting them from the government wants people who can get a security clients?
particularly, you know, after Snowden and after Chelsea Manning, they people who...
who they know or are going to play by the rules.
They want people who cannot easily be blackmailed.
So I think,
you know,
NSA tries to recruit the best and brightest from computer science programs around the
country and in particular computer security programs like Carnegie Mellon that have probably the most sophisticated offensive cybersecurity programs in academia in the United States,
and their students are heavily recruited both by NSA, but also, you know, by Valley.
They're competing for the same people.
So they're competing for the same people and the problem that NSA has is they can't pay the same.
They're not going to be able to offer the smoothies and massages and perks of life that Google and Facebook can,
but they have something that those companies don't.
What they have is a monopoly on violence.
In the same way that if you want to repel out of helicopters and shoot people in the heads,
you go join the Special Forces,
if you want to hack into systems lawfully,
The only game in town is the government and in many other walks of life
You would be you would be a criminal you would be a stalker you'd be a bad person
But when you go to NSA suddenly you get to wrap yourself from the flag and do it for king and country
If you can legally do things no one else can who are they hacking and why
I Not much is known about who tailored access operations hacks, but the Snowden leaks revealed one major targets.
Oh, some I've been latin T.A.O hacked into the mobile phones of Al-Qaeda operatives in the hunt for bin Laden as reported by the Washington people
The unit's work also led to the capture of 40 insurgents in Afghanistan.
Ryan Gallagher is an investigative reporter at the Intercept, where he has covered the role of surveillance in the ongoing war on terror.
How did TAO and how does TAO fit into the war on terror?
Well, they are very important.
I mean,
people don't necessarily think of surveillance even as a thing being integral to what the military is doing on the ground, but it's absolutely vital.
What the tailored access guys are doing, for instance, is because they're so skilled to actually...
You know,
breaking into systems and going after what they would refer to as hard targets,
people are elusive or,
you know,
skilled at like dodging surveillance,
they are very important actually tracking down people who are then subsequently killed or captured in past years,
probably rendered and through the black sites program.
the Vision Administration, so they are very entwined with these physical kind of kinetically call it operations on the ground.
So they basically the commandos of the NSA?
You could put it like that,
it's maybe glorifying them a little bit,
but sense of these guys are just sort of geeky nerds, but they do kind of do that sort of commando type role.
They're facilitating military operations on the ground by hacking into targets.
They're actually directly able to track people who are then killed and say a drone strike.
So they do is it is kind of commando work,
but they are also providing assistance on the ground to real commando types that are out there to look at all people.
And the hunt for bin Laden, TAO, reportedly used with the unit calls, Implants.
Spy installed in mobile phones or other hardware.
Implants are just some of the tools that appear in a leaked document called the Ant Catalog.
other spy gear, Theo's disposal.
Security researchers Michael Osmond, Joe Fitzpatrick, and Dean Pierce decided to build some of these spy tools themselves.
The media kind of saw it and reported on bits and pieces of it and said, oh, look at this thing, this is magic.
And I think all of us looked at it and said, oh, yeah, I know how I would do that.
Yeah, I know how to do that.
Joe recreated a graphics card that can see what's running on a computer's active memory.
And Dean rigged a so it picks up the mobile traffic in the area.
Mike reproduced Rage Master, a tiny chip implanted in a computer video cable to reflect information via radar.
add it and that's transmitting a signal and then my other antenna is also pointed at it and it's receiving the reflection.
By measuring that reflection I can on my laptop recover information that's going over the cable.
And what I get is a video image, a screen image, from the target computer system.
And this is an example of something where an implant is required.
Getting an implant into a piece of hardware, like a video cable, requires physical access.
But planting bugs into terrorist cell phones isn't the only thing TAO does.
Some of their activities...
security at large.
One Snowden League shows how TAO found a vulnerability, a software bug, and Mozilla Firefox.
TAO used the bug to try to identify some users also running an anonymizing software called Tor.
Not only did TAO need to be able to monitor in hijack internet traffic to pull off its tack,
but hundreds of millions of Firefox users were left vulnerable to the software bug, which has since been patched.
Hacker Guarnieri has helped expose TAO's activities.
I met him in an old Stasi surveillance tower that still stands on what used to be Soviet-controlled East Berlin.
A lot of the mass surveillance and bulk collection capability of the NSA is empowered by
some of the break-ins that the AO is able to do, for example.
they would ask Theo to break into some core parts of the internet infrastructure, of the whole global backbone.
You from internet...
structure perspective,
when you connect from Germany to Google,
you move through a number of hops and 15 notes that relay your message from Berlin to Hamburg and Frankfurt and then to
who knows Netherlands, wherever the cables are.
If the NSA is able to break into any one of these points, then they're able to see you communicating with Google.
When they're able to observe that, they're also able to hijack it.
So pretend like you're getting a response from Google.
While instead you're getting a response from the NSA.
None of this comes cheap.
Claudio and I wouldn't say leak known as the black budget.
The NSA spends more than $600 million a year for just the kind of offensive hacks T.A.O.
conducts.
Yeah, this is what it's been called the black budget and the trend that we see is
that, you know, again, the balance between how much is invested in breaking things and how much it's investing in things is uneven.
You know,
part of the mandate of intelligence services is to keep the country secure at the same time from a technological perspective,
they're undermining the security of the country.
And like you said, we all use the exact same internet.
Once it's broken for one, it's broken for all.
So the question is, is it worth it to break something and keep it back?
for catching one or two terrorists that he probably could catch otherwise.
Breaking into the internet or hacking into phones might make us all less secure, so his TEO's hacking really all that targeted.
To find out more about who TEO targets, I met up with Robert M.
Lee.
He'd been out of the military for only a and also worked for an intelligence agency.
If you won't confirm or deny, that's the NSA.
How did you get into being a hacker?
So, the Air Force has a wonderful program where it volunteers you to do shit.
I joined the Air Force, said, here I am, Lord.
What would you like me to do?
And they said, go be a cyber guy.
So if you were to take Snowden's slides completely seriously, you'd think that it's all mass surveillance.
I actually, for the first time, ended up seeing slides that I had actually seen before in real life.
I was like, holy shit, I've seen these ones.
But once you bring something into the intelligence community, you don't delete files.
Like, everything is stored.
And so there was some files that get translated out.
Like, their truth.
And were just remnants of product pitches or something like that.
And I think that you can't take all the slides seriously.
We also know that there is something called TAO in the NSA.
What is that team?
What they do?
Yeah, so I think when you look at TAO, it's actually the thing that I think most of the should be cool with.
Right, so I'm actually a privacy advocate.
I hate it.
And enough, I hate the idea of any sort of mass surveillance.
From a perspective of TAO or whoever would be breaking into those networks, that's targeted.
And so privacy advocates should actually enjoy that.
They should say, hey, master balance sucks.
We need more targeted surveillance.
We more targeted.
If you're going to do intelligence,
do the kind that you put resources into and have to think about and have to prioritize your own efforts.
It's not going to be something dissident or accidentally picking up somebody else's communications.
So who are TA's targets?
I don't know exactly the targets, right?
I wouldn't be able to speak out of it
But I would say that it would be ask the nine to assume that anything international policy of interest isn't one of their targets, right?
So if we say, if the president says global terrorism is something we're concerned with, well, then TA is not doing their job.
Like the government is not doing their job if they don't go after it.
Anything that the president wakes up in the morning and says, hey, this is important to me.
Anybody in the government who's not supporting his needs is not doing their
job So I would just offer to you of that say that Tio has to be doing that stuff or they're incompetent and they're wasting taxpayer money
You know,
so you can't have it both ways Rob made a pretty convincing case for the so-called targeted surveillance Tio conducts
But investigative reporter Ryan Gallagher disagrees as the problem is that the unit's methods aren't as targeted as they seem.
TIO is doing some of the most aggressive work that NSA does.
The traditional eavesdropping where they're listing it in a phone call just by like wiretapping a cable,
which call kind of passive surveillance,
that's actually becoming almost secondary now to the active surveillance the college is attacking and
hacking systems and part of the reason for that is because increasingly networks
and technologies is adopting in
And so they can't listen to it by just tapping the keel because then they can't read it or listen to it
It's just you know jargon going forward especially with the sort of booming encryption
You're going to see more and more of these hacking attacks to the point that it may become a in the future where it is described as a master
valance gonna technique Teo's hacking skills may be in higher demand than ever before And while the group goes after terrorists,
that's not all they get How does TAO decide who to target, and are they really legitimate threats?
The elite unit has gone after Al Qaeda and Taliban fighters,
but the Snowden leaks also revealed the group hacked into the president of Mexico's emails,
and workers at a Belgian communications company were spied on by the British, possibly with help from TAO.
Generally, there is consensus that mass surveillance is a bad thing, while targeted surveillance
is tolerable because they go after very specific individuals or very specific groups.
However, there is multiple things that we need to consider.
One is what makes legitimate target, you ultimately the NSA only has to respond to, somehow, to the U.S.
government.
But they have no respect whatsoever towards foreigners.
And we had cases where, you know, there's Biden, UNICEF, there's Biden, for many ministries, there's Biden, private companies, energy you know.
So what...
At that point makes it legitimate to hack directly and target a certain organization, we don't know.
One of the some documents that came out about the Taylor Daxes group is one of the guys from within the unit is saying,
look, we don't just do terrorism, we do everything, we do all operations, we're here.
here to support any operations.
I it's one of the comic and the misconceptions that the government has managed to build up around a lot of these revelations.
So like, don't worry about it.
We're only going after these extreme terrorists,
people who are,
you know, we're trying to protect you and all that, but that's kind of disingenuous because it's not at all just what they're doing.
They're doing a lot more than that.
Ultimately, it seems TAO may be just one more tool in the NSA's mass surveillance arsenal.
What happens in a mass surveillance regime, you sweep up essentially everybody.
Everybody, by definition, becomes a target, which means there's no target.
The problem is that when you do this in secret and you protect your...
secret powers.
This usually doesn't end well in terms of history.
It doesn't.
You know, in 1984, the extraordinary George Orwell novel.
The only place wins him.
The only place he could go to.
out of sight was in the corner because that's where the surveillance cameras couldn't reach which meant what they knew where he was.
And remember people forget even in 1984 he didn't prevail.
He basically cried uncle can't fight them can't beat them join them.
So a whistleblower you cried uncle at some extent or you cried at Do you think it was worth it?
Yeah.
History was a state.
We know the NSA's elite hacking unit has helped capture terrorists, but they've also targeted friendly nation-states.
So who else have they gone after?
For now, much of T.A.O.'s work remains shrouded.
in secrecy, but privacy activists, whistleblowers, and aren't giving up on the fight to know more and to live surveillance-free.

さらなる機能をアンロック

Trancy拡張機能をインストールすると、AI字幕、AI単語定義、AI文法分析、AIスピーチなど、さらなる機能をアンロックできます。

feature cover

主要なビデオプラットフォームに対応

TrancyはYouTube、Netflix、Udemy、Disney+、TED、edX、Kehan、Courseraなどのプラットフォームにバイリンガル字幕を提供するだけでなく、一般のウェブページでのAIワード/フレーズ翻訳、全文翻訳などの機能も提供します。

全プラットフォームのブラウザに対応

TrancyはiOS Safariブラウザ拡張機能を含む、全プラットフォームで使用できます。

複数の視聴モード

シアターモード、リーディングモード、ミックスモードなど、複数の視聴モードをサポートし、バイリンガル体験を提供します。

複数の練習モード

文のリスニング、スピーキングテスト、選択肢補完、書き取りなど、複数の練習方法をサポートします。

AIビデオサマリー

OpenAIを使用してビデオを要約し、キーポイントを把握します。

AI字幕

たった3〜5分でYouTubeのAI字幕を生成し、正確かつ迅速に提供します。

AI単語定義

字幕内の単語をタップするだけで定義を検索し、AIによる定義を利用できます。

AI文法分析

文を文法的に分析し、文の意味を迅速に理解し、難しい文法をマスターします。

その他のウェブ機能

Trancyはビデオのバイリンガル字幕だけでなく、ウェブページの単語翻訳や全文翻訳などの機能も提供します。

始める準備ができました

今すぐTrancyを試して、ユニークな機能をご自分で体験してください。

ダウンロード