Year Zero

AP photo

 

By

Ricardo Swire

 

Highly confidential US Central Intelligence Agency (CIA) files, comprised of eight thousand web pages and one thousand attachments, have been leaked and published online. On Tuesday March 7, 2017 “Vault 7,” or the CIA’s technical blueprints for extracting data from digital applications and electronic devices, was widely circulated, unique CIA collection methods for extracting information from flash drives and smart TVs, made public. This first part of Year Zero was impactful enough to pause critical CIA “projects” and start a formal Federal Bureau of Investigations (FBI) probe.

Cyber-criminals pledged to randomly leak additional instalments of Vault 7 documents. Deep in the shadows of America’s National Security Agency (NSA), the Special Collection Service (SCS) invisibly manipulates global intelligence data. As part of America’s “Black Budget” program code-named “F6” the clandestine joint Central Intelligence Agency (CIA)/NSA platform is more easily recognized by internal security officials as the SCS.

Since 1978 the Service functioned as the bridge that joins NSA quantum computers’ foreign network infiltration to the CIA’s international cloak and dagger exploits. Officially Washington calls the F6 Program a myth, the tree-lined three hundred acre fortified complex, located on the outskirts of Beltsville Maryland USA, a figment of human imagination. The installation is physically situated beside the US Department of State’s Beltsville Messaging Center that electronically connects via fiber optic cable. SCS has its own dedicated “Einstein” satellite.

Independent intelligence identified SCS agents who operate in two and five person teams. They rotate through US embassies worldwide as Foreign Services Officers (FSOs), Diplomatic Telecommunications Service Officers or entrepreneurs. The SCS agents use such consular masquerades to position “super-high-tech” surveillance devices, created by the SCS’ Maryland headquarters. Gathered data is transmitted to the NSA control center for decryption and analysis.

Four missing NSA laptop computers containing troves of top-secret metadata, originally in the famous exiled NSA contractor’s possession, are still lost. Select US Embassies have been equipped with SCS technologies such as the “ORATORY,” a surveillance device fist proven in the Gulf War. The gadget is currently used in more advanced variations. Once SCS agents are assigned mission objectives they deploy the ORATORY’s antenna in a nondescript position. The electronic tool is programed to monitor “key words” for conversational capture and analysis.

SCS staff are experts at “Black Bag jobs.” Sensitive listening devices, placed in computer keyboards, covertly record the unique click of each key for Agents’ reconstruction of typed messages. The Special Collections Service also mastered a technique whereby invisible laser beams are directed at a windowpane from “safe houses” hundreds of feet away. Pursued conversations are recorded by measuring vibrations in the targeted window’s glass. After America’s 2003 invasion of Iraq the NSA Director deployed SCS agents to supplement US Joint Special Operations Command (JSOC) in Balad, northern Iraq. Joint Base Balad was America’s second largest facility in Iraq.

 

 

 

 

Ricardo Swire - Tuck Magazine

Ricardo Swire

Ricardo Swire is the Principal Consultant at R-L-H Security Consultants & Business Support Services and writes on a number of important issues.

Editor review

0 Comments

No Comments Yet!

You can be first to comment this post!

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.