World Library  
Flag as Inappropriate
Email this Article
 

Turbulence (NSA)

A reference to Turbulence and Turmoil in an XKeyscore slide.

Turbulence is a United States National Security Agency (NSA) information-technology project started circa 2005. It was developed in small, inexpensive "test" pieces rather than one grand plan like its failed predecessor, the Trailblazer Project. It also includes offensive cyber-warfare capabilities, like injecting malware into remote computers. The U.S. Congress criticized the project in 2007 for having similar bureaucratic problems as the Trailblazer Project.[1]

Contents

  • Criticism 1
  • Link to Trailblazer 2
  • Programs 3
  • See also 4
  • References 5
  • External links 6

Criticism

According to Siobhan Gorman in a 2007 Baltimore Sun article, "The conclusion in Congress, two former government officials said, was that Turbulence was over budget, not delivering and poorly led, and that there was little or no strategy to pull it all together."[2]

Link to Trailblazer

Trailblazer, the predecessor of Turbulence, had been cancelled in 2006 after a congressional investigation and a Defense Department's Inspector General's report found it over budget, wasteful, and ineffective.[1][3]

One of the Trailblazer whistleblowers who helped with the inspector-general report, Thomas Andrews Drake, was later charged under the Espionage Act of 1917 for allegedly retaining five documents in his home. Two of those documents were about Turbulence; his defense pointed out that one of these documents was clearly marked "UNCLASSIFIED" and the other was declassified shortly after his indictment.[3] Thomas Drake plead to a misdemeanor count of unauthorized use of a computer on June 10, 2011, and was sentenced to one year probation.[4]

Programs

Turbulence includes nine core programs, of which names are known:[2]

  • TURMOIL
    • Turmoil is involved in the process of decrypting communications.[5]
  • TUTELAGE
  • TRAFFICTHIEF
    • According to an XKeyscore presentation, TRAFFICTHIEF is a database of "Meta-data from a subset of tasked strong-selectors" [6] According to the XKeyscore presentation, an example of a strong selector is an email address. In other words, it would be a database of the metadata associated with names, phone numbers, email addresses, etc., that the intelligence services are specifically targeting. Marc Ambinder gives what he calls an educated guess: "raw SIGINT viewer for data analysis." [7]

See also

References

  1. ^ a b Bamford, James (2008). The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America. New York City: Doubleday. ISBN 978-0-385-52132-1. p. 325–340.
  2. ^ a b Gorman, Siobhan (February 11, 2007). "Costly NSA Initiative Has a Shaky Takeoff – Vexing Snags for Cyberspace Tool 'Turbulence'". The Baltimore Sun. Retrieved July 6, 2013.
  3. ^ a b Mayer, Jane (May 23, 2011). "The Secret Sharer – Is Thomas Drake an Enemy of the State?". The New Yorker. Retrieved July 6, 2013.
  4. ^ "Transcript of Sentencing Proceeding, United States of America v. Thomas A. Drake". United States District Court of Maryland. July 15, 2011. Retrieved August 8, 2013. 
  5. ^ James Ball, Julian Borger and Glenn Greenwald (September 5, 2013). "Revealed: how US and UK spy agencies defeat internet privacy and security". Retrieved September 6, 2013. 
  6. ^ Greenwald, Glenn (July 31, 2013). "'"XKeyscore: NSA tool collects 'nearly everything a user does on the internet. Retrieved August 5, 2013. 
  7. ^ Ambinder, Marc (August 14, 2013). "An Educated Guess About How the NSA Is Structured". The Atlantic.com. Retrieved August 14, 2013. 

External links

  • Democracy Now interview with whistleblower William Binney
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and USA.gov, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for USA.gov and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
 
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
 
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.
 



Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.