No Such Agency and “The Machine”

Dmytro Sazonov
ILLUMINATION
Published in
9 min readJan 17, 2024

In 2016–2017, I worked as a Federal contractor for the U.S. Government in Maryland. The agency to which I was assigned at that time no longer exists, and it had no connection to the NSA.

National Security Agency is part of U.S. Department of Defense

During that time, my curiosity led me to learn various forms of intelligence from public sources, and I gained valuable insights. Today, I would like to share some of those findings here.

You are being watched. The government has a secret system, a Machine that spies on you every hour of every day. I know because I built it. I designed the machine to detect acts of terror but it sees everything.

Harold Finch, TV-series “Person of Interest”

These and subsequent articles in a row do not intend to reveal any classified or confidential information obtained during my government service. Notice, that all the information was obtained from publicly accessible sources. Rather, my purpose is to demonstrate that individuals with a technical background can easily construct their own Surveillance infrastructure for private or commercial missions.

And when you know that, just imagine what a government can build with vast resources on its end.

The Machine

As outlined on the official website, the National Security Agency (NSA) has the role of delivering cyber-security and signals intelligence (SIGINT) to support both United States policy-makers and military forces in defending the nation. Nevertheless, there is the sentiment that the agency’s scope extends beyond these designated functions.

From its origins in World War I, the agency has evolved into a global force. Beyond code-breaking, its mission now extends to controlling information worldwide, with the capability to act swiftly and decisively anywhere.

Photo by Taylor Vick on Unsplash

The agency and its facilities are dedicated to collecting, decrypting, storing, structuring, and analyzing information from various sources and devices worldwide including AI components. They possess robust infrastructure and facilities both in the United States and internationally, enabling the accumulation of vast amounts of information from both public and private domains.

“Every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”

The Washington Post, July 19, 2010

But I believe this amount is much bigger.

This means that the data on your phone or personal computer, your calls, e-mails, as well as information from public cameras in smart cities, air and traffic control data, etc., could potentially be accessed for agency missions or utilized as sources for various reports and alert systems.

I am willing to term ‘The Machine’ as the abstract entity comprising software and hardware tools, facilities, and other components utilized collectively for the task of controlling Big Data globally. Before delving into the practical aspects, which will be covered in the upcoming articles, let’s explore various intelligence types to gain a better understanding of the information sources accessible to ‘The Machine’.

Signals Intelligence (SIGINT)

The NSA’s crucial role includes SIGINT, which involves the interception, decryption, collection, analysis, and interpretation of signals and communications. These signals can take various forms, including electronic signals such as radio, radar, and other methods.

Photo by Marat Gilyadzinov on Unsplash

There are two main categories of SIGINT:

  • Communications Intelligence (COMINT): focuses on intercepting and analyzing communication signals, including voice, text, and data transmitted through various channels such as radio, telephone, or the internet;
  • Electronic Intelligence (ELINT): involves the collection and analysis of non-communication electronic signals, including radar, acoustic and seismic vibrations, weather measurements, and other telemetry.

SIGINT plays a vital role in providing the NSA and military forces with insights into the actual state, plans, intentions, and capabilities of different entities abroad and within the US territory.

Communications Intelligence (COMINT)

COMINT encompasses the monitoring, collection, and analysis of data transmitted over the internet, such as e-mails, instant messages, VoIP calls, and other communication forms like radio or telephone.

Photo by Thomas Jensen on Unsplash

The NSA’s facility may use different devices to gather information, which includes gathering from public sources as well as from private or encrypted sources, decrypting it on its end if necessary. This information can be stored in multiple Agency databases for further use.

An illustrative instance of COMINT in operation is the PRISM program, wherein, according to The Guardian, the NSA gathers data from well-known internet companies: Microsoft, Apple, Google, Facebook, and others.

Any individual with technical proficiency can construct a system for systematically gathering information using Software-Defined Radio (SDR) and Speech Recognition AI. By leveraging these two components, one can develop a system for collecting, interpreting, and storing raw data. Imagine another AI module, based on Google TensorFlow, for example, can be employed to categorize raw data into specific categories and provide metadata for them. Offered for your consideration, this concept already forms a significant portion of the solution.

Electronic Intelligence (ELINT)

Consider another scenario where you are tasked with overseeing aircraft activity in a designated area to spot unusual activities and unauthorized intrusions. In such instances, monitoring the aircraft’s type, speed, altitude, and flight path becomes crucial. If an aircraft breaches restricted airspace, protocols may involve communication with the pilot or, in extreme cases, taking appropriate defensive measures. What would you employ in this situation?

Radar Electronic Intelligence

ELINT related to radar, air, and traffic involves the collection and analysis of electronic signals emitted by radar systems, communication devices, and other electronic sources within the airspace. ELINT is a subset of signal intelligence (SIGINT) that focuses specifically on non-communication signals.

ELINT systems intercept and gather signals emitted by various radar systems, including those employed in air defense, air traffic control, navigation, airborne radars, and communication systems.

In modern warfare, ELINT holds a pivotal role by offering intelligence on the electronic signatures of radar systems. It enhances situational awareness, aids in mitigating electronic threats, and supports the development of effective military strategies.

Information from ELINT is valuable for both civil and military purposes.

For instance, in our scenario, I would consider building a tactical station equipped with an ADS-B receiver and specialized software — without any AI, similar to Plane Plotter. This setup could oversee a defined perimeter, issuing instant message alerts in case of any violation in the secured restricted area.

Geospatial Intelligence (GEOINT)

As per the official website, the National Geospatial-Intelligence Agency (NGA) delivers world-class geospatial intelligence (GEOINT), that gives a strategic advantage to policymakers, warfighters, intelligence professionals, and first responders.

It involves the analysis and interpretation of geographically referenced information. GEOINT integrates data from diverse sources like satellite imagery, aerial photographs, maps, and GIS to offer valuable insights for decision-making in defense, security, and disaster response.

Overview of Baranovichi AB based on Maxar Technologies imagery from 4 October 2020

Key components of GEOINT include:

  • Imagery Intelligence: analysis of visual information obtained from satellite and aerial imagery to gather intelligence on ground activities;
  • Geospatial Information and Services: usage of geographic data and information systems to organize, analyze, and visualize spatial information and intelligence;
  • Mapping and Charting: creating accurate maps and charts for military, intelligence, and civilian applications;
  • Remote Sensing: using sensors on satellites or aircraft to capture data about the Earth’s surface, atmosphere, and oceans;
  • Terrain Analysis: assessing the topography and physical characteristics of the land to understand its impact on military or strategic operations.
Photo by SpaceX on Unsplash

GEOINT plays a crucial role in national security, disaster response, environmental monitoring, and various other fields where location-based information is essential for decision-making. It helps organizations and governments make informed choices.

For example, consider preparing a military operation where the commander needs an approximate number of tanks, aircraft, helicopters, and other items in the adversary’s army. In such a scenario, employing satellite imagery and utilizing Image Recognition AI with Object Detection would be an efficient method for counting and assessment.

I am confident that ‘The Machine’ uses geospatial data across various domains and applications, integrating geographical context into different datasets and AI models, and serving as a lens in decision-making.

Imagery Intelligence (IMINT)

Consider another scenario where you must locate a person of interest traveling to another city or country. In such a situation, it becomes crucial to monitor surveillance cameras in airports, railway stations, bus terminals, etc., to track down the individual. But how can you achieve this quickly and simultaneously on all cameras? Opting for Face Recognition AI proves to be a fitting choice in this case.

Street surveillance programs in smart cities involve the implementation of advanced video monitoring and analysis systems to enhance urban safety, security, and overall efficiency. These programs typically leverage intelligent technologies to collect, process, and interpret visual data from various sources within the city.

Photo by Milan Malkomes on Unsplash

Key components of surveillance programs in smart cities include:

  • CCTV Systems: deploying an extensive network of surveillance cameras strategically placed throughout the city to monitor public spaces, streets, transportation hubs, and critical infrastructure;
  • Facial Recognition: implementing facial recognition technology to enhance identification capabilities and improve public safety efforts;
  • Crowd Monitoring: utilizing video analytics to monitor and manage crowd dynamics during events, emergencies, or peak times, contributing to efficient crowd control;
  • Traffic Management: employing video surveillance for intelligent traffic monitoring, optimizing traffic flow, detecting congestion, and enhancing overall transportation management;
  • Emergency Response Systems: integrating video surveillance into emergency response systems to provide real-time visual information to first responders during incidents or crises.

Incorporating video analytics software that employs Artificial Intelligence and Machine Learning algorithms to identify and analyze patterns, anomalies, and security threats in real-time provides ‘The Machine’ with limitless possibilities for controlling the city.

Outcome

As highlighted initially, ‘The Machine’ possesses boundless capabilities for gathering, decrypting, interpreting, and analyzing vast amounts of Big Data and information sourced globally. This provides those with access the opportunity to influence the world. And this is not necessarily bad.

I don’t agree with Edward Snowden on every aspect of his actions, but I do recognize the significance of the discussions he initiated concerning privacy and government surveillance. Nevertheless, I hold the belief that surveillance and mass surveillance are, in many cases, essential components of public security and well-being.

The great thing is that it could be employed not solely by governmental institutions but by anyone involved in private or commercial missions. Just ensure compliance with local rules and try not to violate the law.

DIY for a Spy

In upcoming articles, I am willing to reveal some of the techniques enabling the establishment of your personal Surveillance infrastructure, encompassing both the requisite hardware and software components for your private mission.

Additionally, we will explore various software tools and methodologies to effectively analyze Big Data datasets collected from diverse devices. The goal is to scrutinize information and its associated metadata, all using cutting-edge technologies, including Artificial Intelligence, of course.

[ADDED]

Rich me out

If you have any questions about the information printed in this article or any other concerns, feel free to reach out to me on Twitter.

Twitter: https://twitter.com/dmytro_sazonov

--

--

Dmytro Sazonov
ILLUMINATION

Blockchain enthusiast and artificial intelligence researcher. I believe with these tools we will build better tomorrow :)