Job Networking Site LinkedIn Filled With Secret NSA Program Names

Illustration for article titled Job Networking Site LinkedIn Filled With Secret NSA Program Names

Want to know all the code names for America's massive intelligence gathering programs? Just browse through the "intelligence analysts" who post their resumes on the public career networking site LinkedIn. ANCHORY, NUCLEON, TRAFFICTHIEF, ARCMAP, SIGNAV, COASTLINE, DISHFIRE, FASTSCOPE, OCTAVE/CONTRAOCTAVE, PINWALE, UTT, WEBCANDID, FASCIA, OCTSKYWARD, INTELINK, METRICS, BANYAN, MARINA ... these all sound absolutely terrifying.


Of course, some of them are just mundane commercial software and systems. Finding the newly revealed NSA surveillance programs amidst the "risk management suites" is part of the fun.

American Civil Liberties Union techonologist Christopher Soghoian discovered that the secret programs the Washington Post revealed on June 15 can also be found by searching LinkedIn.

Linkedin profiles of people in Maryland that mention MARINA & NUCLEON have some fun other codenames like TRAFFICTHIEF

— Christopher Soghoian (@csoghoian) June 16, 2013

The profile linked by the ACLU's Soghoian lists more than two dozen intelligence programs with menacing names in the current techno-creep NSA style. This analyst also says he is responsible for NSA PowerPoint presentations to explain the massive surveillance systems to intelligence management and political leaders: "Prepared topic-specific, detailed presentations for senior leadership using Powerpoint, Word, ZapGrab, ARCMap, and SIGNAV."

Front located many similar lists of current NSA projects on other career and networking sites, including this one on

Tools Used: Cadence/UTT, Blazing Saddles, Xkeyscore, Marina, Maui/Anchory, Sharkfinn, Agility, Mastershake, Pinwale, UIS, TKB, Target Profiler, Agent Logic, NKB/Foxtrail, Banyan, Bellview, Octskyward, Cineplex, Arcmap, Analyst Notebook/Renoir, Microsft Powerpoint, /Excel, NSLOOKUP, Traceroutes, Whois, Treasuremap, Goldpoint, Nucleon, Octskyward, Goldminer, Roadbed, RT-RG Tool Suite, Tuningfork, Pathfinder, Cloud_ABR, Airgap


In fact, the names of these programs are all over the Internet, including lengthy descriptions of the technology and methodology included within working papers and presentations intended for NSA management. Familiar with "BROOMSTICK"? There are many Top Secret-clearance jobs available!

Here's the introduction to something called "TEMPEST 101":

When modern electrical devices operate they generate electromagnetic fields. Digital computers, radio equipment, typewriters, and so on generate massive amounts of electromagnetic signals which if properly intercepted and processed will allow certain amounts of information to be reconstructed based on these "compromising emanations". Basically anything with a microchip, diode, or transistor, gives off these fields.

Compromising emanations are these unintentional intelligence-bearing signals, which, if intercepted and analyzed, potentially disclose the national security information, transmitted, received, handled, or otherwise processed by any information-processing equipment.

These compromising emanation signals can then escape out of a controlled area by power line conduction, other fortuitous conduction paths such as the air conditioning duct work, or by simply radiating a signal into the air (like a radio station).

An excellent example of these compromising emanations may be found in modems and fax machines which utilize the Rockwell DataPump modem chip sets and several modems made by U.S. Robotics. When these modems operate they generate a very strong electromagnetic field which may be intercepted, demodulated, and monitored with most VHF radios. This is also a very serious problem with many speaker phone systems used in executive conference rooms.

This is also a very serious problem with many fax machines, computer monitors, external disc drives, CD-R drives, scanners, printers, and other high bandwidth or high speed peripherals.

If an eavesdropper is using high quality intercept equipment the signal may be easily acquired several hundred feet or more away from the target.


Relax! Or don't. It doesn't really matter. They can see, hear and read whatever you're seeing, hearing, reading or typing.

Finally, here's a detailed profile of NSA surveillance programs from Booz Allen Hamilton—Edward Snowden's former employer:


BoozAllenHamiltonNSA (PDF)
BoozAllenHamiltonNSA (Text)



Not for nothin', but LinkedIn is the garbologist of websites. People I haven't heard from in years (and in one case decades) pop up under "people you may know", or however they phrase it. They scour emails like nobody's business. I'm sure it's because I sent a cv as text in an email, and they connected me with someone from ages ago whom I used to work with.

My upstairs housemate sent me a logo from his job for me to work on, and not too long afterwards, he popped up as a person I may know. I'm gettin a tinfoil computer cover is what.