The USA has followed targetted assassination strategy since WW II days. It has cooped its allies such as Israel, Australia, and the UK. Targetted killings in the Middle East has been led by Israel with active intelligence support by the USA. With modern ISR capabilities, targets can be monitored or looked for on 24/7 basis for all 365 days of the year. A world that is integrated by common communications protocols and digital standards for ease of normal business becomes vulnerable to intelligence agencies by the same process of commonality.
On July 31, 2022, Osama bin Laden’s successor as the global head of Al Qaeda, Ayman al-Zawahiri, stepped out onto the balcony of his Taliban safe house in Kabul’s tony Wazir Akbar Khan area to catch a breath of fresh air and a bit of sunshine. About 40,000 feet above an American Predator B (aka Reaper MQ-9) drone, loitering to get a glimpse of him, caught him in its camera, and after its operators in Nevada, USA confirmed it with facial identification technology, ordered it to fire its single Hellfire R9X missile. The Hellfire is a small 100 lbs and five feet long air-to-ground missile (AGM) that races down a reflected laser beam with unerring accuracy. It costs about $ 150,000. The R9X, which was developed at the express request of Barack Obama, who wanted to minimise collateral damage due to an explosive charge, is a kinetic weapon that unsheathes multiple blades from its fuselage as it approaches the target at almost 900 mph like a whirling swordsman. Al-Zawahiri didn’t stand a chance.
The USA and some other countries have bevvies of space satellites orbiting at preselected trajectories to watch over areas of interest. These satellites not only listen to targets but also track them and identify faces and vehicles by their plates. Osama bin Laden never looked up while on his morning walk at his Abbottabad residence but he was recognised by his height and the length of his shadow at the time of the day and by his gait. Al-Zawahari was either careless or underestimated America’s appetite for his head. He still had a $ 25 million reward, appetising enough for any informants.
The number of active mobile phones worldwide exceeded 15 billion, which means that many people have more than a couple. Of these 7.2 billion are smartphones connecting people with huge reservoirs of information and content. India has 1.28 billion and China has 1.9 billion phones. The USA follows with 327 million and a dysfunctional country like Pakistan has 125 million. Even in countries with little semblance of a government or a state, like Somalia and Afghanistan or Mali or Libya, there are functioning mobile phone networks.
As of June 30, 2021, there were about 4.86 billion internet users worldwide. Of these 44.8% were in Asia, 21.5% in Europe and 11.4% in all of North America. India was one of the last countries operating a telegraph service and as of end 2021, even that is in the past. Literally, it’s all up in the air now.
But since data exchanged on cellular and internet networks fly through the ether and not as pulses racing through copper wires, they are easier to net by electronic interception. But these nets catch them in huge numbers. This is where the supercomputers come in. The messages that are netted every moment are run through sieves of sophisticated and complex computer programs that can simultaneously decode, detect and unravel, and by further analyzing the incoming and outgoing patterns of calls and data transfers for the sending and receiving terminals or phones, can with a fair probability of accuracy tell the agency seeking information about what is going on and who is up to what?
The problem is that since this information also goes through mobile phone networks and Internet Service Providers (ISP), and the data actually gets decoded from electronic blips into voice and digital data, the private players too can gain access to such information.
A few years ago we had the case of the infamous Amar Singh CDs, which titillated so many with their graphic content and low-brow conversations featuring the likes of Anil Ambani, Jayaprada, Bipasha Basu and some others. Then we had the episode of the Radia tapes where we were privy to the machinations of Tata’s corporate lobbyist in the national capital fixing policy, positioning ministers and string-pulling media stars. But more useful than this, a mobile phone, by nature of its technology, is also a personalised GPS indicator. It tells them where that phone is at any instant it is on. The Al Qaeda terrorist and US citizen Anwar el-Awlaki was blasted by a Hellfire missile fired from a CIA Predator drone flying over Yemen with the coordinates provided by Awlaki’s mobile phone.
Since a mobile phone is usually with you it tells the network ( and other interested parties) where you are or were, and even where you are headed. If you are on a certain street since it reveals where exactly you are and the direction of your movement, it can tell you where the next pizza place is or where and what is on sale. This is also a breach of privacy, but often useful to you. But if you are up to no good, then a switched-on mobile phone is a certain giveaway.
That’s what gave away Osama bin Laden in the end. A momentary indiscretion by a trusted courier and bodyguard and a name gleaned from a long-ago water-boarding session was all it took. To know what happened next see “Zero Dark Thirty” by Katherine Bigelow (now on Netflix and YouTube).
The NSA is all hi-tech. NSA collects intelligence from four geostationary satellites. These satellites track and monitor millions of conversations and the NSA’s banks of high-speed supercomputers process all these messages for certain phrases and patterns of conversations to decide if the persons at either end were worthy of further interest.
The NSA’s eavesdropping mission includes radio broadcasting, both from various organisations and individuals, the internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications. The NSA is all hi-tech. NSA collects intelligence from four geostationary satellites. These satellites track and monitor millions of conversations and the NSA’s banks of high-speed supercomputers process all these messages for certain phrases and patterns of conversations to decide if the persons at either end were worthy of further interest. Link this information with the data from the CIA’s spinning satellites watching the movements of groups, individuals and vehicles, and you have a broad picture of what the people are doing.
According to the Washington Post, “every day, collections systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications.” The NSA and CIA together comprise the greatest intelligence-gathering effort in the world. The overall U.S. intelligence budget is now declared to be $62.8 billion.
Feature Image Credit: E-International Relations
Article Image Credit: www.twz.com