{"id":147703,"date":"2016-05-23T20:43:54","date_gmt":"2016-05-24T00:43:54","guid":{"rendered":"http:\/\/www.designerchildren.com\/inside-the-governments-secret-nsa-program-to-target\/"},"modified":"2016-05-23T20:43:54","modified_gmt":"2016-05-24T00:43:54","slug":"inside-the-governments-secret-nsa-program-to-target-2","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/inside-the-governments-secret-nsa-program-to-target-2\/","title":{"rendered":"Inside the government&#039;s secret NSA program to target &#8230;"},"content":{"rendered":"<p><p>    EXCLUSIVE: Relentless attacks on American    military personnel at the height of the Iraq war made the U.S.    intelligence community confront a dire problem: They needed    real-time intelligence to take Al Qaeda off the battlefield and    dismantle its bomb-making factories.  <\/p>\n<p>    This realization was the start of a highly secretive program,    developed by the National Security Agency, to put NSA    specialists on the battlefield in order to send near    real-time intelligence to the troops so they could avoid    ambushes and root out insurgents. For the first time, going in    depth with Fox News, senior NSA leadership is speaking publicly    about that program, called the Real Time Regional Gateway or    RT-RG.  <\/p>\n<p>    \"Starting in 2005, we started seeing a big uptick in casualties    caused by IEDs [improvised explosive devices] and    ambushes,\"NSA Deputy Director Rick Ledgett told Fox News.    The RT-RG program created to combat those attacks, he said,    was really a complete change in how we provided signals    intelligence support to the tactical war fighter.  <\/p>\n<p>    The program, parts of which were classified until now, has    dispatched thousands of NSA experts into war zones since 9\/11.    It has put those experts  from an agency most-known for its    controversial surveillance programs  at grave risk across    multiple theatres. But in the process, officials say, RT-RG has    saved the lives of fellow Americans.  <\/p>\n<p>    Col. Bob Harms, one of the first people on the ground for the    NSA at Baghdad's Camp Victory, said the goal was to get in    front of our adversaries.  <\/p>\n<p>    Exclusive images shared with Fox News from Camp Victory show    the basic set-up, which took traditional streams of    intelligence and married it up with information gathered from    raids  for instance, taking satellite images and combining    that with on-the-ground information about an insurgents    movements and contacts, to pinpoint threats.  <\/p>\n<p>    Some of the most useful information came from captured    operatives  information known in the intel world as \"pocket    litter.\" Harms said this included pattern of life details    including when do they go to sleep, where do they go to sleep,    where do they work and those types of things.\"  <\/p>\n<p>    The NSA's goal was to compress the timeline for crunching all    this information from a period of weeks or days, to just hours    or minutes. Think of it like a phone app -- but instead of    giving directions, it's flagging threats.   <\/p>\n<p>    \"[Battlefield commanders] would actually feed us information     so that we could give them a roadmap to the next    site,Harms explained.  <\/p>\n<p>    Ledgett said the program harnessed big data, in a way that it    could be used immediately on the battlefield. Ledgett said    RT-RG \"integrated hundreds of pieces of information,\" and then    software was developed to draw connections that could \"put    things on graphical displays\" so it was easy for analysts and    operators to understand.  <\/p>\n<p>    \"It might connect something like a phone number to a location,    to an activity and display that to an analyst who could then,    via radio, contact a convoy and say, Hey looks like there's an    ambush waiting for you at this point -- go left or go right or    take an alternate route,\" he said.  <\/p>\n<p>    Asked about collateral damage  the accidental killing of    civilians -- Ledgett said the program reduced those numbers    because targeting data was drawn from multiple sources.No    further specifics were offered.  <\/p>\n<p>    Retired Gen. Jack Keane, a Fox News military analyst, said the    program \"gave a tool to brigade commanders, who were spread out    all over the battlefield, something that they never had    before.\"  <\/p>\n<p>    It also took NSA experts out of the office and placed them in    the field, to work side-by-side with special operations.  <\/p>\n<\/p>\n<p>    \"We needed to be coffee-breath close in order to have that    shared situational understanding,\" Harms said.  <\/p>\n<p>    The program extended from Iraq to Afghanistan, and then other    conflict zones that the NSA will not publicly    identify.The statistics, declassified for this report,    are sobering.  <\/p>\n<p>    \"Since 2001, we've deployed 5,000 NSA people to Iraq and 8,000    to Afghanistan -- and in total, 18,000 to hostile areas around    the world,\"Ledgett said.\"When the operational    community embraces you that way and says I want you on my team    and I want you there with me  that's a pretty significant    statement of value.\"  <\/p>\n<p>    The deployments came with risk. Since 9\/11, 24 names have been    added to the NSAs memorial wall, which pays tribute to fallen    employees. Among them is NSA technical expert Christian Pike,    who was killed in Afghanistan in 2013 working with the Navy    SEALs.  <\/p>\n<p>    \"I'm sorry, I get a little emotional about this one,\" Ledgett    said, taking a pause during the interview as he described a    cabinet in his office with memorial cards for James T. Davis,    one of the first Americans killed in Vietnam;NSAs Amanda    Pinson, killed by an IED in Iraq while providing signals    intelligence support; and Christian Pike. Pike was also a    family friend.  <\/p>\n<p>    This Saturday is Armed Forces Day  and what was a    ground-breaking NSA program a decade ago is now widely used by    the war fighter.  <\/p>\n<p>    Ledgett said one of the commanding generals in Iraq during the    surge credited the NSA with helping take over 4,000 insurgents    off the battlefield.  <\/p>\n<p>    There was an intense effort here  How do we drive those    losses down? Ledgett said. \"Our job was to get the information    to the people who needed it.\"  <\/p>\n<p>    Catherine Herridge is an award-winning Chief Intelligence    correspondent for FOX News Channel (FNC) based in Washington,    D.C. She covers intelligence, the Justice Department and the    Department of Homeland Security. Herridge joined FNC in 1996 as    a London-based correspondent.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.foxnews.com\/politics\/2016\/05\/17\/inside-governments-secret-nsa-program-to-target-terrorists.html\" title=\"Inside the government's secret NSA program to target ...\">Inside the government's secret NSA program to target ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> EXCLUSIVE: Relentless attacks on American military personnel at the height of the Iraq war made the U.S. intelligence community confront a dire problem: They needed real-time intelligence to take Al Qaeda off the battlefield and dismantle its bomb-making factories. This realization was the start of a highly secretive program, developed by the National Security Agency, to put NSA specialists on the battlefield in order to send near real-time intelligence to the troops so they could avoid ambushes and root out insurgents <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/inside-the-governments-secret-nsa-program-to-target-2\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-147703","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/147703"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=147703"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/147703\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=147703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=147703"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=147703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}