HOME

TheInfoList



OR:

The Special Collection Service (SCS), codenamed F6, is a highly classified joint U.S.
Central Intelligence Agency The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
program charged with inserting eavesdropping equipment in difficult-to-reach places, such as foreign embassies, communications centers, and foreign government installations. Established in the late 1970s and headquartered in
Beltsville Beltsville is a census-designated place (CDP) in northern Prince George's County, Maryland, United States. The community was named for Truman Belt, a local landowner. The 2020 census counted 20,133 residents. Beltsville includes the unincorporated ...
,
Maryland Maryland ( ) is a state in the Mid-Atlantic region of the United States. It shares borders with Virginia, West Virginia, and the District of Columbia to its south and west; Pennsylvania to its north; and Delaware and the Atlantic Ocean t ...
, the SCS has been involved in operations ranging from the
Cold War The Cold War is a term commonly used to refer to a period of geopolitical tension between the United States and the Soviet Union and their respective allies, the Western Bloc and the Eastern Bloc. The term '' cold war'' is used because t ...
to the
Global War on Terrorism The war on terror, officially the Global War on Terrorism (GWOT), is an ongoing international counterterrorism military campaign initiated by the United States following the September 11 attacks. The main targets of the campaign are militant ...
.


Mission

The SCS is a U.S. black budget program that has been described as the United States' "''Mission Impossible'' force," responsible for "close surveillance, burglary, wiretapping, breaking and entering." It is headquartered in Beltsville, Maryland, in an obscured building that was at one time labeled simply "CSSG." Next door is the
U.S. Department of State The United States Department of State (DOS), or State Department, is an executive department of the U.S. federal government responsible for the country's foreign policy and relations. Equivalent to the ministry of foreign affairs of other n ...
's
Beltsville Messaging Center The Beltsville Information Management Center (BIMC), formerly named the Beltsville Messaging Center (BMC) and the Beltsville Communications Center (also known as the Beltsville Communications Annex), is a United States Department of State facility ...
, to which the SCS is linked via fiber optic cable. The SCS is jointly staffed by the Central Intelligence Agency (CIA) and the National Security Agency (NSA). According to intelligence historian James Bamford, "The position of SCS chief alternates between NSA and CIA officials." SCS operatives are based out of U.S. embassies and consulates overseas, and operatives often use Foreign Service or
Diplomatic Telecommunications Service The Diplomatic Telecommunications Service (DTS) is a system of integrated telecommunications networks that supports foreign affairs agencies in Washington, D.C., and U.S. diplomatic missions abroad. It is administered by the United States Departm ...
cover when deployed. Their mission is to intercept sensitive information on espionage, nuclear arms, terrorist networks, drug trafficking and other national-security-related issues. The SCS was established to overcome a problem in that the NSA typically intercepts communications "passively" from its various intercept facilities throughout the world, yet the increasing sophistication of foreign communications equipment renders passive interception futile and instead requires direct access to the communications equipment. The CIA, meanwhile, has access to agents specializing in clandestine operations and thus is more able to gain access to foreign communication equipment, yet lacks the NSA's expertise in communications eavesdropping. Hence, the SCS was born, combining the communications intelligence capabilities of the NSA with the covert action capabilities of the CIA in order to facilitate access to sophisticated foreign communications systems. The SCS employs exotic
covert listening device A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage ...
technologies to bug foreign embassies, communications centers, computer facilities, fiber-optic networks, and government installations. The U.S. government has never officially acknowledged its existence, and little is known about the technologies and techniques it employs. The sole inside account of SCS comes from a
Canadian Canadians (french: Canadiens) are people identified with the country of Canada. This connection may be residential, legal, historical or cultural. For most Canadians, many (or all) of these connections exist and are collectively the source of ...
, Mike Frost, whose 1994 book ''Spyworld'' revealed that the program was known to insiders at the time as "College Park". As of 2008, the SCS is reported to target for recruitment key foreign communications personnel such as database managers, systems administrators, and
information technology Information technology (IT) is the use of computers to create, process, store, retrieve, and exchange all kinds of data . and information. IT forms part of information and communications technology (ICT). An information technology syste ...
specialists. During October 2013, reports by former NSA contractor
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
led to the unveiling of the SCS having systematically wiretapped
Chancellor of Germany The chancellor of Germany, officially the federal chancellor of the Federal Republic of Germany,; often shortened to ''Bundeskanzler''/''Bundeskanzlerin'', / is the head of the federal government of Germany and the commander in chief of the Ge ...
Angela Merkel Angela Dorothea Merkel (; ; born 17 July 1954) is a German former politician and scientist who served as Chancellor of Germany from 2005 to 2021. A member of the Christian Democratic Union (CDU), she previously served as Leader of the Opp ...
's private cell phone over a period of over 10 years, which among other activities to wiretap and systematically record large amounts of European and South American leaders' and citizens' communication by the NSA led to a distinct diplomatic backlash at the United States government.


History


Background

The SCS program was established in 1978 during the Cold War between the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country Continental United States, primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., ...
and the
Soviet Union The Soviet Union,. officially the Union of Soviet Socialist Republics. (USSR),. was a transcontinental country that spanned much of Eurasia from 1922 to 1991. A flagship communist state, it was nominally a federal union of fifteen nationa ...
. As
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can d ...
technology increased in sophistication, by the end of the 20th century many coded signals proved unbreakable. Due to this problem, bugging techniques and technologies saw a revival: unable to easily intercept and decrypt foreign communications through passive means, the U.S. government needed to instead intercept the communications at their source, and thus the SCS program was expanded in the 1990s to fulfill this need.


Snowden Leak

According to documents leaked by
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
, the SCS is part of a larger global surveillance program known as
STATEROOM A state room in a large European mansion is usually one of a suite of very grand rooms which were designed for use when entertaining royalty. The term was most widely used in the 17th and 18th centuries. They were the most lavishly decorated in ...
.


Activities


Cold War

SCS operatives reportedly hid eavesdropping devices in
pigeon Columbidae () is a bird family consisting of doves and pigeons. It is the only family in the order Columbiformes. These are stout-bodied birds with short necks and short slender bills that in some species feature fleshy ceres. They primarily ...
s perched on the windowsills of the Soviet Embassy in Washington, D.C.


Infiltration

The SCS program was compromised by infamous
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice ...
(FBI) mole Robert Hanssen in the 1990s, which provided
Moscow Moscow ( , US chiefly ; rus, links=no, Москва, r=Moskva, p=mɐskˈva, a=Москва.ogg) is the capital and largest city of Russia. The city stands on the Moskva River in Central Russia, with a population estimated at 13.0 million ...
with sensitive information about highly sophisticated U.S. overseas bugging operations. However, the program was so secret that, after Hanssen's arrest, the FBI would only describe it in general terms, as a "program of enormous value, expense, and importance to the U.S. government".


Afghanistan

In 1999, as the
Clinton Administration Bill Clinton's tenure as the 42nd president of the United States began with his first inauguration on January 20, 1993, and ended on January 20, 2001. Clinton, a Democrat from Arkansas, took office following a decisive election victory over ...
sought to kill
Osama bin Laden Osama bin Mohammed bin Awad bin Laden (10 March 1957 – 2 May 2011) was a Saudi-born extremist militant who founded al-Qaeda and served as its leader from 1988 until his death in 2011. Ideologically a pan-Islamist, his group is designated ...
following the 1998 U.S. embassy bombings, SCS operatives covertly entered
Afghanistan Afghanistan, officially the Islamic Emirate of Afghanistan,; prs, امارت اسلامی افغانستان is a landlocked country located at the crossroads of Central Asia and South Asia. Referred to as the Heart of Asia, it is borde ...
to place eavesdropping devices within range of
Al-Qaeda Al-Qaeda (; , ) is an Islamic extremist organization composed of Salafist jihadists. Its members are mostly composed of Arabs, but also include other peoples. Al-Qaeda has mounted attacks on civilian and military targets in various countr ...
's tactical radios.


China

The SCS was rumored to have been involved in the 2001 operation that planted 27 satellite-controlled bugs in the
Boeing 767-300ER The Boeing 767 is an American wide-body aircraft developed and manufactured by Boeing Commercial Airplanes. The aircraft was launched as the 7X7 program on July 14, 1978, the prototype first flew on September 26, 1981, and it was certified o ...
that was to be used as Chinese leader
Jiang Zemin Jiang Zemin (17 August 1926 – 30 November 2022) was a Chinese politician who served as general secretary of the Chinese Communist Party (CCP) from 1989 to 2002, as chairman of the Central Military Commission from 1989 to 2004, and as p ...
's official jet. The bugs were discovered, however, before they could be switched on.


Iraq War

Prior to the 2003 U.S. invasion of Iraq, SCS was described as the "prime mover" of electronic surveillance in the country. SCS operatives built numerous antennae, spaced throughout the Iraqi countryside, capable of intercepting Iraqi microwave communications. These Iraqi communications would have been otherwise difficult to intercept, because they beamed hilltop to hilltop in a narrow band, with an angle too oblique and thus too dissipated to be intercepted by air or spacecraft. In 1998, the U.S. government recruited an
Australia Australia, officially the Commonwealth of Australia, is a sovereign country comprising the mainland of the Australian continent, the island of Tasmania, and numerous smaller islands. With an area of , Australia is the largest country by ...
n operative under SCS and deployed him to Iraq. The operative reported concerns about what was transpiring in Iraq, in that there was "a very high volume of data, and that he was getting no feedback about whether it was good, bad, or useful". He further reported that "this was a massive intelligence collection operation one that was not in accordance with what UNSCOM was supposed to be doing" at the time. After the invasion, SCS operatives were employed in the hunt for
Saddam Hussein Saddam Hussein ( ; ar, صدام حسين, Ṣaddām Ḥusayn; 28 April 1937 – 30 December 2006) was an Iraqi politician who served as the fifth president of Iraq from 16 July 1979 until 9 April 2003. A leading member of the revolutio ...
, planting sophisticated eavesdropping equipment in target areas to intercept communications that were then analyzed by
voice analysis Voice analysis is the study of speech sounds for purposes other than linguistic content, such as in speech recognition. Such studies include mostly medical analysis of the voice (phoniatrics), but also speaker identification. More controversiall ...
experts.


War on Terror

The SCS was heavily involved in eavesdropping to advance the Global War on Terrorism, setting up eavesdropping posts around
Middle East The Middle East ( ar, الشرق الأوسط, ISO 233: ) is a geopolitical region commonly encompassing Arabian Peninsula, Arabia (including the Arabian Peninsula and Bahrain), Anatolia, Asia Minor (Asian part of Turkey except Hatay Pro ...
ern capitals and figures close to Osama bin Laden's terrorism network. In 1999, an SCS team monitored al-Qaeda training camps near
Khost Khōst ( ps, خوست) is the capital of Khost Province in Afghanistan. It is the largest city in the southeastern part of the country, and also the largest in the region of Loya Paktia. To the south and east of Khost lie Waziristan and Kurram ...
. When the United States located Osama bin Laden's compound in Abbottabad,
Pakistan Pakistan ( ur, ), officially the Islamic Republic of Pakistan ( ur, , label=none), is a country in South Asia. It is the world's List of countries and dependencies by population, fifth-most populous country, with a population of almost 24 ...
, SCS operatives established a base in an apartment that the CIA had rented a mile away from the compound. They focused lasers on the compound windows and, by analyzing the vibrations, were able to count the number of people inside and outside, and also ascertained that there was one person who never ventured outside the compound. Bin Laden was killed inside the compound during a raid by U.S. special operations forces on May 2, 2011.


Programs

*
STATEROOM A state room in a large European mansion is usually one of a suite of very grand rooms which were designed for use when entertaining royalty. The term was most widely used in the 17th and 18th centuries. They were the most lavishly decorated in ...


See also

*
Central Security Service The Central Security Service (CSS) is a combat support agency of the United States Department of Defense which was established in 1972 to integrate the National Security Agency (NSA) and the Service Cryptologic Components (SCC) of the United ...
*
Signals intelligence Signals intelligence (SIGINT) is intelligence-gathering by interception of '' signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication ...
* Tailored Access Operations


References


External links

* * Powerpoint: Pacific SIGDEV Conference March 2011 Special Collection Service
PowerPoint Microsoft PowerPoint is a presentation program, created by Robert Gaskins and Dennis Austin at a software company named Forethought, Inc. It was released on April 20, 1987, initially for Macintosh computers only. Microsoft acquired Powe ...
presentation {{coord, 39.045, -76.857, display=title 1978 establishments in the United States Beltsville, Maryland National Security Agency Central Intelligence Agency Signals intelligence Secret places in the United States