Xbox Live among game services targeted by US and UK spy agencies
Read the NSA document: Exploiting Terrorist Use of Games & Virtual Environments
The Guardian, Monday 9 December 2013 18.26 EST
To the National Security Agency analyst writing a briefing to his superiors, the situation was clear: their current surveillance efforts were lacking something. The agency’s impressive arsenal of cable taps and sophisticated hacking attacks was not enough. What it really needed was a horde of undercover Orcs.
That vision of spycraft sparked a concerted drive by the NSA and its UK sister agency GCHQ to infiltrate the massive communities playing online games, according to secret documents disclosed by whistleblower Edward Snowden.
The agencies, the documents show, have built mass-collection capabilities against the Xbox Live console network, which has more than 48 million players. Real-life agents have been deployed into virtual realms, from those Orc hordes in World of Warcraft to the human avatars of Second Life. There were attempts, too, to recruit potential informants from the games’ tech-friendly users.
Online gaming is big business, attracting tens of millions of users worldwide who inhabit their digital worlds as make-believe characters, living and competing with the avatars of other players. What the intelligence agencies feared, however, was that among these clans of elves and goblins, terrorists were lurking.
The NSA document, written in 2008 and titled Exploiting Terrorist Use of Games & Virtual Environments, stressed the risk of leaving games communities under-monitored, describing them as a “target-rich communications network” where intelligence targets could “hide in plain sight”.
Games, the analyst wrote, “are an opportunity!”. According to the briefing notes, so many different US intelligence agents were conducting operations inside games that a “deconfliction” group was required to ensure they weren’t spying on, or interfering with, each other.
If properly exploited, games could produce vast amounts of intelligence, according to the NSA document. They could be used as a window for hacking attacks, to build pictures of people’s social networks through “buddylists and interaction”, to make approaches by undercover agents, and to obtain target identifiers (such as profile photos), geolocation, and collection of communications.
The ability to extract communications from talk channels in games would be necessary, the NSA paper argued, because of the potential for them to be used to communicate anonymously: Second Life was enabling anonymous texts and planning to introduce voice calls, while game noticeboards could, it states, be used to share information on the web addresses of terrorism forums.
Given that gaming consoles often include voice headsets, video cameras, and other identifiers, the potential for joining together biometric information with activities was also an exciting one.
But the documents contain no indication that the surveillance ever foiled any terrorist plots, nor is there any clear evidence that terror groups were using the virtual communities to communicate as the intelligence agencies predicted.
The operations raise concerns about the privacy of gamers. It is unclear how the agencies accessed their data, or how many communications were collected. Nor is it clear how the NSA ensured that it was not monitoring innocent Americans whose identity and nationality may have been concealed behind their virtual avatar.