- Eyeballing the NSA 044
- “Defeat adversary cyber-security practices
- in order to acquire the SIGINT data we need
- from anyone, anytime, anywhere.”
- - NSA ; SIGINT Strategy 2012 - 2016
- ¤ A Look at the Inner Workings of NSA’s XKEYSCORE ::
- http://cryptome.org/2015/07/nsa-xks-more-intercept-15-0701.7z
- http://cryptome.org/2015/07/nsa-xks-four-revised-intercept-15-0702.7z
- https://firstlook.org/theintercept/2015/07/01/nsas-google-worlds-private-communications/
- https://firstlook.org/theintercept/2015/07/02/look-under-hood-xkeyscore/
- _______________________________________
- ¤ NSA German Spying via WikiLeaks ::
- https://wikileaks.org/nsa-germany/
- https://wikileaks.org/nsa-germany/intercepts/WikiLeaks_US_Bugs_Franco-German_EU_Financial_Crisis_Treaty.pdf
- https://wikileaks.org/nsa-germany/intercepts/WikiLeaks_Merkel_Bugged_Pondering_Greece_Crisis.pdf
- https://wikileaks.org/nsa-germany/intercepts/WikiLeaks_US_Bugs_Germany_Plotting_BRICS_Bailout_for_Greece.pdf
- ¤ Attack on Press Freedom: SPIEGEL Targeted by NSA ::
- Revelations from WikiLeaks published this week show
- how boundlessly and comprehensively American intelligence
- services spied on the German government. It has now
- emerged that the US also conducted surveillance against
- Der SPIEGEL.
- http://www.spiegel.de/international/germany/the-nsa-and-american-spies-targeted-spiegel-a-1042023.html
- _______________________________________
- ¤ NSA Brazil Spying via WikiLeaks ::
- https://wikileaks.org/nsa-brazil/
- http://cryptome.org/2015/07/wl-nsa-brazil-01.jpg
- http://cryptome.org/2015/07/wl-nsa-brazil-02.jpg
- _______________________________________
- ¤ NSA French Spying via WikiLeaks ::
- https://wikileaks.org/nsa-france/
- http://www.cryptome.org/2015/06/NSA-French-Spying-WikiLeaks-15-0623.pdf
- http://www.cryptome.org/2015/06/NSA-French-Spying-WikiLeaks-15-0629.pdf
- http://www.cryptome.org/2015/06/NSA-French-Spying-WikiLeaks-15-0629-2.pdf
- _______________________________________
- ¤ NSA Eyeballed NY Times During Bush Regime ::
- http://cryptome.org/2015/06/nsa-nyt-warrantless-wiretap.pdf
- _______________________________________
- ¤ NSA Sifts Americans' Internet Traffic to Hunt Hackers ::
- http://cryptome.org/2015/06/cyber-spy-nyt-15-0604.pdf
- http://www.propublica.org/article/new-snowden-documents-reveal-secret-memos-expanding-spying
- http://www.nytimes.com/2015/06/05/us/hunting-for-hackers-nsa-secretly-expands-internet-spying-at-us-border.html
- https://firstlook.org/theintercept/2015/06/04/nsa-hackers-nyt-warrantless-surveillance/
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA Officials Privately Criticize “Collect It All” Surveillance ::
- AS MEMBERS OF CONGRESS struggle to agree on which surveillance
- programs to re-authorize before the Patriot Act expires, they
- might consider the unusual advice of an intelligence analyst
- at the National Security Agency who warned about the danger
- of collecting too much data. Imagine, the analyst wrote in
- a leaked document, that you are standing in a shopping aisle
- trying to decide between jam, jelly or fruit spread, which
- size, sugar-free or not, generic or Smucker’s. It can be
- paralyzing. ... ...
- “We are drowning in information. And yet we know nothing.”
- – NSA (via SID Today) Intelligence Analyst
- http://cryptome.org/2015/05/nsa-sid-today-intercept-15-0527.pdf
- https://firstlook.org/theintercept/2015/05/28/nsa-officials-privately-criticize-collect-it-all-surveillance/
- http://www.infowars.com/current-nsa-officials-admit-agency-is-drowning-in-too-much-info/
- _______________________________________
- ¤ Joint NSA-BND Operation Eikonal Cable Tapping ::
- http://electrospaces.blogspot.com/2015/05/new-details-about-joint-nsa-bnd.html
- _______________________________________
- ¤ NSA Planned to Hijack Google App Store to Hack Smartphones ::
- http://cryptome.org/2015/05/5-eyes-cellspy-cbc-intercept-15-0521.pdf
- https://www.documentcloud.org/documents/2083944/uc-web-report-final-for-dc.pdf
- https://firstlook.org/theintercept/2015/05/21/nsa-five-eyes-google-samsung-app-stores-spyware/
- http://www.cbc.ca/news/canada/spy-agencies-target-mobile-phones-app-stores-to-implant-spyware-1.3076546
- _______________________________________
- ¤ NSA MEDINT Medical Spying (Bin Laden Intercept) ::
- http://cryptome.org/2015/05/nsa-medint-intercept-15-0521.pdf
- https://firstlook.org/theintercept/2015/05/21/nsa-plan-find-osama-bin-laden-infiltrating-medical-supply-chain/
- ¤ NSA Bin Laden Intercept (NATO / JTAC / Black Budget) ::
- http://cryptome.org/2015/05/nsa-sid-nato-intercept-15-0515.pdf
- http://cryptome.org/2015/05/jtac-attack-intercept-15-0515.pdf
- http://cryptome.org/2015/05/bin-laden-raid-intercept-15-0518.pdf
- http://cryptome.org/2015/05/nctc-terrorism-figures-intercept-15-0518.pdf
- _______________________________________
- ¤ ICWATCH: This Database Gathers the Resumes of 27,000
- Intelligence Workers ::
- https://github.com/TransparencyToolkit/ICWATCH-Data
- https://transparencytoolkit.org/project/icwatch/
- https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton/
- https://motherboard.vice.com/read/this-database-gathers-the-resumes-of-27000-intelligence-workers
- mirrored: #!gQ8EgbxZ!2hgGLnsfEK-Nss4nUImGL5nDr3QqxUhpqZZNd6TJL3o
- _______________________________________
- ¤ US Government Designated Prominent Al Jazeera Journalist
- as “Member of Al Qaeda” ::
- The document cites Zaidan as an example to demonstrate the
- powers of SKYNET, a program that analyzes location and
- communication data (or “metadata”) from bulk call records
- in order to detect suspicious patterns.
- In the Terminator movies, SKYNET is a self-aware military
- computer system that launches a nuclear war to exterminate
- the human race, and then systematically kills the survivors.
- According to the presentation, the NSA uses its version of
- SKYNET to identify people that it believes move like couriers
- used by Al Qaeda’s senior leadership. The program assessed
- Zaidan as a likely match, which raises troubling questions
- about the US government’s method of identifying terrorist
- targets based on metadata.
- It appears, however, that Zaidan had already been identified
- as an Al Qaeda member before he showed up on SKYNET’s radar.
- That he was already assigned a watch list number would seem
- to indicate that the government had a prior intelligence
- file on him. The Terrorist Identities Datamart Environment,
- or TIDE, is a US government database of over one million
- names suspected of a connection to terrorism, which is
- shared across the US intelligence community.
- The presentation contains no evidence to explain the designation.
- https://firstlook.org/theintercept/2015/05/08/u-s-government-designated-prominent-al-jazeera-journalist-al-qaeda-member-put-watch-list/
- ¤ NSA SKYNET Cloud Analytics-Courier Detection ::
- http://cryptome.org/2015/05/nsa-skynet-intercept-15-0507.pdf
- _______________________________________
- ¤ How the NSA Converts Spoken Words Into Searchable Text ::
- Most people realize that emails and other digital communications
- they once considered private can now become part of their
- permanent record.
- But even as they increasingly use apps that understand what
- they say, most people don’t realize that the words they speak
- are not so private anymore, either.
- Top-secret documents from the archive of former NSA contractor
- Edward Snowden show the National Security Agency can now
- automatically recognize the content within phone calls by
- creating rough transcripts and phonetic representations that
- can be easily searched and stored.
- The documents show NSA analysts celebrating the development
- of what they called “Google for Voice” nearly a decade ago.
- https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/
- ... the real solution is end-to-end encryption, preferably of
- the unbreakable kind. https://whispersystems.org/
- https://firstlook.org/theintercept/2015/05/08/keep-nsa-computers-turning-phone-conversations-searchable-text/
- ¤ NSA Converts Spoken Words Into Searchable Text Documents ::
- http://cryptome.org/2015/05/nsa-black-budget-sid-rt10-wg-language-intercept-15-0504.pdf
- _______________________________________
- ¤ Declassified Report Shows Doubts About Value of NSA
- Warrantless Spying ::
- The secrecy surrounding the National Security Agency’s
- post-9/11 warrantless surveillance and bulk data collection
- program hampered its effectiveness, and many members of the
- intelligence community later struggled to identify any
- specific terrorist attacks it thwarted, a newly declassified
- document shows.
- The document is a lengthy report on a once secret NSA
- program code-named Stellarwind. The report was a joint
- project in 2009 by inspectors general for five intelligence
- and law enforcement agencies, and it was withheld from the
- public at the time, although a short, unclassified version
- was made public. The government released a redacted version
- of the full report to The New York Times on Friday evening
- in response to a Freedom of Information Act lawsuit.
- http://www.nytimes.com/2015/04/25/us/politics/value-of-nsa-warrantless-spying-is-doubted-in-declassified-reports.htm
- ¤ NSA Stellar Wind OIG Analysis ::
- http://cryptome.org/2015/04/nsa-stellar-wind-oig-nyt-15-0424.pdf
- _______________________________________
- ¤ NSA Torus Receivers of 35 Satellite Signals ::
- At three satellite facilities, in Britain, Cyprus and New Zealand,
- there's a special antenna that allows NSA's partner agencies a
- significant increase in their capability to collect satellite
- communications.
- This antenna is called Torus, and while conventional parabolic
- dish antennas can only view one satellite at a time, one single
- Torus antenna is able to receive the signals from up to 35
- communications satellites.
- These rare and expensive Torus antennas are used by some television
- networks, but a close look at photos of the Five Eyes satellite
- stations has now revealed the locations where Torus antennas are
- also used for gathering signals intelligence.
- http://electrospaces.blogspot.com/2015/04/torus-antenna-to-significantly-increase.html
- _______________________________________
- ¤ CSEC Cyberwarfare Toolbox Revealed ::
- Top-secret documents obtained by the CBC show Canada’s
- electronic spy agency has developed a vast arsenal of
- cyberwarfare tools alongside its US and British counterparts
- to hack into computers and phones in many parts of the
- world, including in friendly trade countries like Mexico
- and hotspots like the Middle East. ... ...
- The CSE toolbox includes the ability to redirect someone
- to a fake website, create unrest by pretending to be
- another government or hacker, and siphon classified
- information out of computer networks, according to experts
- who viewed the documents. ... ...
- But the latest top-secret documents released to CBC News
- and The Intercept illustrate the development of a large
- stockpile of Canadian cyber-spy capabilities that go beyond
- hacking for intelligence, including:
- • destroying infrastructure, which could include electricity,
- transportation or banking systems;
- • creating unrest by using false-flags — ie. making a target
- think another country conducted the operation;
- • disrupting online traffic by such techniques as deleting
- emails, freezing internet connections, blocking websites and
- redirecting wire money transfers.
- http://www.cbc.ca/news/canada/communication-security-establishment-s-cyberwarfare-toolbox-revealed-1.3002978
- https://firstlook.org/theintercept/2015/03/23/canada-cse-hacking-cyberwar-secret-arsenal
- ¤ CSEC Cyber Threats / Cyberwarfare Toolbox ::
- http://cryptome.org/2015/03/csec-cyber-threats-cbc-15-0320.pdf
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA Releases William Friedman Papers ::
- http://cryptome.org/2015/03/nsa-friedman-15-0323.pdf
- _______________________________________
- ¤ The CIA Campaign to Steal Apple’s Secrets ::
- https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/
- http://www.infowars.com/new-snowden-documents-cia-has-spent-10-years-hacking-iphones-ipads/
- ¤ NSA-CIA Apple DPA Cryptanalysis ::
- http://cryptome.org/2015/03/nsa-apple-dpa-intercept-15-0309.zip
- _______________________________________
- ¤ Leaked Snowden Files Show Most of GCSB’s Targets Are NOT
- Security Threats to New Zealand (UPDATED SEVERAL TIMES) ::
- New Zealand’s electronic surveillance agency, the GCSB, has
- dramatically expanded its spying operations during the years
- of John Key's National Government and is automatically funnelling
- vast amounts of intelligence to the US National Security Agency,
- top-secret documents reveal.
- Since 2009, the Government Communications Security Bureau
- intelligence base at Waihopai has moved to “full-take collection”,
- indiscriminately intercepting Asia-Pacific communications and
- providing them en masse to the NSA through the controversial
- NSA intelligence system XKeyscore, which is used to monitor
- emails and internet browsing habits. ... ...
- New Zealand is selling out its close relations with the Pacific
- nations to be close with the United States, author Nicky Hager
- has said.
- Hager, in conjunction with the New Zealand Herald and the
- Intercept news site, revealed today how New Zealand’s spies
- are targeting the entire email, phone and social media
- communications of the country’s closest, friendliest and
- most vulnerable neighbours.
- This morning, Hager told Radio New Zealand that the documents
- revealed even more countries which New Zealand was spying on,
- and more information would come.
- “The Five Eyes countries led by the US are literally trying
- to spy on every country in the world ... and what we’re going
- to be hearing about in the next few days is New Zealand in all
- kinds of very surprising ways playing a role in that,” he said.
- http://cryptome.org/2015/03/gcsb-xkeyscore-nz-herald-15-0305.pdf
- http://cryptome.org/2015/03/gcsb-xkeyscore-nz-herald-15-0306.pdf
- http://cryptome.org/2015/03/gcsb-xkeyscore-nz-star-times-15-0308.pdf
- http://cryptome.org/2015/03/nsa-nz-nz-herald-15-0310.pdf
- http://cryptome.org/2015/03/gcsb-solomons-nz-herald-15-0314.pdf
- http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11411759
- http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11411730
- http://media.nzherald.co.nz/webcontent/document/pdf/201513/WTO%20document.pdf
- https://firstlook.org/theintercept/2015/03/04/new-zealand-gcsb-surveillance-waihopai-xkeyscore/
- https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/
- https://firstlook.org/theintercept/2015/03/07/new-zealand-ironsand-waihopai-nsa-gcsb/
- https://firstlook.org/theintercept/2015/03/22/new-zealand-gcsb-spying-wto-director-general/
- http://www.stuff.co.nz/national/67082905/snowden-files-inside-waihopais-domes
- https://leaksource.files.wordpress.com/2015/03/gcsb-asia-pacific-spying-five-eyes-nsa-xkeyscore.pdf
- https://leaksource.files.wordpress.com/2015/03/gcsb-provide-nsa-nz-data.pdf
- https://leaksource.files.wordpress.com/2015/03/gcsb-xks-ironsand-access-multiple-choice-test-check-box.pdf
- https://leaksource.files.wordpress.com/2015/03/gcsb-asd-nzsis-asis-south-pacific-spying-high-priority.pdf
- http://www.radionz.co.nz/news/national/267923/gcsb-in-mass-collection-of-pacific-data-ferguson
- http://www.bbc.com/news/world-asia-31741564
- _______________________________________
- ¤ How NSA-GCHQ Stole the Keys to the Encryption Castle ::
- AMERICAN AND BRITISH spies hacked into the internal computer network
- of the largest manufacturer of SIM cards in the world, stealing
- encryption keys used to protect the privacy of cellphone communications
- across the globe, according to top-secret documents provided to The
- Intercept by National Security Agency whistleblower Edward Snowden.
- The hack was perpetrated by a joint unit consisting of operatives
- from the NSA and its British counterpart Government Communications
- Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ
- document, gave the surveillance agencies the potential to secretly
- monitor a large portion of the world’s cellular communications,
- including both voice and data.
- http://cryptome.org/2015/02/gchq-pcs-harvesting-intercept-15-0219.pdf
- https://firstlook.org/theintercept/2015/02/19/great-sim-heist/
- http://www.democracynow.org/2015/2/20/nsa_british_gchq_hacked_sim_card
- https://firstlook.org/theintercept/2015/02/20/gemalto-heist-shocks-europe/
- ¤ Gemalto Government National Mobile ID Schemes / Partners ::
- http://cryptome.org/2015/02/gemalto-gov-national-mobile-id.pdf
- http://cryptome.org/2015/02/gemalto-partner-list.htm
- ¤ Gemalto Responds After SIM Encryption Key Heist Exposed ::
- http://www.gemalto.com/press/Pages/Information-regarding-a-report-mentioning-a-hacking-of-SIM-card-encryption-keys.aspx
- http://www.infowars.com/sim-card-producer-denies-any-real-risk-from-nsa-hacking-its-encryption-keys/
- ¤ White House Responds After SIM Encryption Key Heist Exposed ::
- MIRROR #1 http://postimg.org/image/yj37iju33/
- MIRROR #2 https://pbs.twimg.com/media/B-U0B20CIAASRpq.png
- _______________________________________
- ¤ NSA’s “Equation Group” Firmware-imbedded Malware Found ::
- NSA stores secret imbedded malware inside the firmware of
- harddrives and USB(s).
- Malware can be used as a beacon once plugged into an air-gapped
- system and data can be accessed remotely while OFFLINE.
- Kaspersky’s reconstructions of the spying programs show that
- they could work in disk drives sold by more than a dozen
- companies, comprising essentially the entire market. They
- include Western Digital Corp, Seagate Technology Plc, Toshiba
- Corp, IBM, Micron Technology Inc and Samsung Electronics Co Ltd.
- Western Digital, Seagate and Micron said they had no knowledge
- of these spying programs. Toshiba and Samsung declined to comment.
- IBM did not respond to requests for comment.
- http://cryptome.org/2015/02/nsa-equation-group.pdf
- http://www.stuff.co.nz/technology/digital-living/66279485/nsa-hiding-equation-spy-program-on-hard-drives
- https://news.yahoo.com/russian-researchers-expose-breakthrough-u-spying-program-194217480--sector.html
- http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/
- _______________________________________
- ¤ NY Times’ David Carr Snowden Interview Hours Before Death ::
- http://timestalks.com/laura-poitras-glenn-greenwald-edward-snowden.html
- http://www.newsmax.com/Newsfront/David-Carr-died-New-York-Times-Snowden/2015/02/13/id/624700/
- _______________________________________
- ¤ NSA Claims Iran Learned from Western Cyberattacks ::
- http://cryptome.org/2015/02/iran-gchq-intercept-15-0210.pdf
- https://firstlook.org/theintercept/2015/02/10/nsa-iran-developing-sophisticated-cyber-attacks-learning-attacks/
- _______________________________________
- ¤ White House Spy “Reform” - Increase Spying! Flaunt It! ::
- An in-you’re-face attitude is now considered “reform.”
- http://cryptome.org/2015/02/ic-ppd-28-15-0203.zip
- https://firstlook.org/theintercept/2015/01/29/one-year-major-report-nsa-still-collecting-bulk-domestic-data-still-clueless-much-good-surveillance/
- _______________________________________
- ¤ Hypocrisy of Youtube’s CitizenFour Censorship ::
- http://piratetimes.net/new-snowden-documentary-censored-online/
- ¤ Citizenfour Snowden Documentary (7-Zipped MP4) ::
- http://cryptome.org/Citizenfour.7z
- ¤ Citizenfour Snowden Documentary HD (7-Zip MP4) ::
- http://cryptome.org/Citizenfour-HD.7z
- ¤ Citizenfour Screengrabs, 87 PDFs in 13 Files ::
- http://cryptome.org/2015/01/Citizenfour-Screengrabs-pdfs.7z
- ¤ Citizenfour Screengrabs, 87 JPGs in 13 Folders ::
- http://cryptome.org/2015/01/Citizenfour-Screengrabs.7z
- _______________________________________
- ¤ Western Spy Agencies Secretly Rely on Hackers for Intel ::
- http://cryptome.org/2015/02/gchq-lovely-horse-intercept-15-0204.pdf
- https://firstlook.org/theintercept/2015/02/04/demonize-prosecute-hackers-nsa-gchq-rely-intel-expertise/
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ CSEC Eyeballs File Sharing Host User Data ::
- http://torrentfreak.com/canadian-government-spies-on-millions-of-file-sharers-150128/
- http://www.cbc.ca/news/cse-tracks-millions-of-downloads-daily-snowden-documents-1.2930120
- https://firstlook.org/theintercept/2015/01/28/canada-cse-levitation-mass-surveillance
- http://motherboard.vice.com/read/how-canadian-spies-infiltrated-the-internets-core-to-watch-what-you-do-online?
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA MORECOWBELL HTTP GET Attacking ::
- http://cryptome.org/2015/01/nsa-morecowbell.htm
- http://cryptome.org/2015/01/MORECOWBELL.pdf
- http://cryptome.org/2015/01/MORECOWBELL-Analysis-Grothoff-etal.pdf
- http://cryptome.org/2015/01/Wertheim-NSA-and-Encryption-NotiAMS-Feb15.pdf
- http://www.lemonde.fr/economie/visuel/2015/01/24/cowbells-nouvelles-revelations-sur-les-pratiques-de-la-nsa_4561547_3234.html
- _______________________________________
- ¤ Compilation of Snowden Documents - January 30, 2015 ::
- https://github.com/nsa-observer/documents/archive/master.zip
- https://github.com/nsa-observer/documents/tree/master/files/pdf
- _______________________________________
- ¤ How GCHQ Prepares Interception of Phone Calls From Satellites ::
- http://electrospaces.blogspot.com/2015/01/how-gchq-prepares-for-interception-of.html
- _______________________________________
- ¤ NSA Documents Expose NSA’s Digital Arms Race for Cyber Warfare ::
- The NSA’s mass surveillance is just the beginning. Documents from
- Edward Snowden show that the intelligence agency is arming America
- for future digital wars -- a struggle for control of the Internet
- that is already well underway.
- Normally, internship applicants need to have polished resumes,
- with volunteer work on social projects considered a plus. But at
- Politerain, the job posting calls for candidates with significantly
- different skill sets. We are, the ad says, “looking for interns who
- want to break things.”
- Politerain is not a project associated with a conventional company.
- It is run by a US government intelligence organization, the National
- Security Agency (NSA). More precisely, it’s operated by the NSA’s
- digital snipers with Tailored Access Operations (TAO), the department
- responsible for breaking into computers.
- Potential interns are also told that research into third party
- computers might include plans to “remotely degrade or destroy
- opponent computers, routers, servers and network enabled devices
- by attacking the hardware.” Using a program called Passionatepolka,
- for example, they may be asked to “remotely brick network cards."
- With programs like Berserkr they would implant “persistent backdoors”
- and “parasitic drivers.” Using another piece of software called
- Barnfire, they would “erase the BIOS on a brand of servers that
- act as a backbone to many rival governments.”
- An intern’s tasks might also include remotely destroying the
- functionality of hard drives. Ultimately, the goal of the internship
- program was “developing an attacker’s mindset.”
- The internship listing is eight years old, but the attacker’s mindset
- has since become a kind of doctrine for the NSA’s data spies. And the
- intelligence service isn’t just trying to achieve mass surveillance
- of Internet communication, either. The digital spies of the Five Eyes
- alliance -- comprised of the United States, Britain, Canada, Australia
- and New Zealand -- want more.
- http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html
- ¤ Der Spiegel Releases NSA’s Plans for Cyber Warfare ::
- http://cryptome.org/2015/01/spiegel-15-0117.7z
- _______________________________________
- ¤ Prying Eyes: Inside the NSA’s War on Internet Security ::
- US and British intelligence agencies undertake every effort imaginable
- to crack all types of encrypted Internet communication. The cloud, it
- seems, is full of holes. The good news: New Snowden documents show that
- some forms of encryption still cause problems for the NSA. ... ...
- As one document from the Snowden archive shows, the NSA had been
- unsuccessful in attempts to decrypt several communications protocols,
- at least as of 2012. An NSA presentation for a conference that took
- place that year lists the encryption programs the Americans failed to
- crack. In the process, the NSA cryptologists divided their targets
- into five levels corresponding to the degree of the difficulty of the
- attack and the outcome, ranging from “trivial” to “catastrophic.”
- Monitoring a document’s path through the Internet is classified as
- “trivial.” Recording Facebook chats is considered a “minor” task,
- while the level of difficulty involved in decrypting emails sent
- through Moscow-based Internet service provider mail.ru is considered
- “moderate.” Still, all three of those classifications don’t appear to
- pose any significant problems for the NSA.
- Things first become troublesome at the fourth level. The presentation
- states that the NSA encounters “major” problems in its attempts to
- decrypt messages sent through heavily encrypted email service providers
- like Zoho or in monitoring users of the Tor network, which was
- developed for surfing the web anonymously. Tor, otherwise known as
- The Onion Router, is free and open source software that allows users
- to surf the web through a network of more than 6,000 linked volunteer
- computers. The software automatically encrypts data in a way that
- ensures that no single computer in the network has all of a user’s
- information. For surveillance experts, it becomes very difficult to
- trace the whereabouts of a person who visits a particular website or
- to attack a specific person while they are using Tor to surf the Web.
- The NSA also has “major” problems with Truecrypt, a program for
- encrypting files on computers. Truecrypt’s developers stopped their
- work on the program last May, prompting speculation about pressures
- from government agencies. A protocol called Off-the-Record (OTR) for
- encrypting instant messaging in an end-to-end encryption process also
- seems to cause the NSA major problems. Both are programs whose source
- code can be viewed, modified, shared and used by anyone. Experts agree
- it is far more difficult for intelligence agencies to manipulate open
- source software programs than many of the closed systems developed by
- companies like Apple and Microsoft. Since anyone can view free and
- open source software, it becomes difficult to insert secret back doors
- without it being noticed. Transcripts of intercepted chats using OTR
- encryption handed over to the intelligence agency by a partner in
- Prism -- an NSA program that accesses data from at least nine American
- internet companies such as Google, Facebook and Apple -- show that
- the NSA’s efforts appear to have been thwarted in these cases: “No
- decrypt available for this OTR message.” This shows that OTR at least
- sometimes makes communications impossible to read for the NSA.
- Things become “catastrophic” for the NSA at level five - when, for
- example, a subject uses a combination of Tor, another anonymization
- service, the instant messaging system CSpace and a system for Internet
- telephony (voice over IP) called ZRTP. This type of combination results
- in a “near-total loss/lack of insight to target communications, presence,”
- the NSA document states.
- ZRTP, which is used to securely encrypt conversations and text chats
- on mobile phones, is used in free and open source programs like RedPhone
- and Signal. “It’s satisfying to know that the NSA considers encrypted
- communication from our apps to be truly opaque,” says RedPhone developer
- Moxie Marlinspike.
- http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html
- ¤ NSA Attacks on VPN, SSL, TLS, SSH, Tor ::
- http://cryptome.org/2014/12/nsa-spiegel-14-1228.rar
- _______________________________________
- ¤ Operation Socialist ; How GCHQ Spies Hacked Belgium’s Largest Telco ::
- https://firstlook.org/theintercept/2014/12/13/belgacom-hack-gchq-inside-story/
- ¤ GCHQ Belgacom Telecom Hacking (ZIP) ::
- Slides show Canada’s intelligence agency, CSEC, was involved in helping
- GCHQ intercept Belgacom communications. It also proves 3rd party cookies
- are very much instrumental in being used to exploit information about IPs.
- http://cryptome.org/2014/12/gchq-belgacom-intercept-14-1213.zip
- _______________________________________
- ¤ Keith Alexander’s Anti-spy Patent Leaked ::
- http://cryptome.org/2014/12/nsa-alexander-patent-14-1125.pdf
- ¤ Keith Alexander Now Works To Secure Banking Networks ::
- http://www.bloomberg.com/news/2014-06-20/ex-nsa-chief-pitches-advice-on-cyber-threats-to-the-banks.html
- _______________________________________
- ¤ Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide ::
- Codenamed AURORAGOLD, the covert operation has monitored the content of
- messages sent and received by more than 1,200 email accounts associated
- with major cellphone network operators, intercepting confidential company
- planning papers that help the NSA hack into phone networks.
- One high-profile surveillance target is the GSM Association, an influential
- UK-headquartered trade group that works closely with large US-based firms
- including Microsoft, Facebook, AT&T, and Cisco, and is currently being
- funded by the US government to develop privacy-enhancing technologies.
- Karsten Nohl, a leading cellphone security expert and cryptographer who
- was consulted by The Intercept about details contained in the AURORAGOLD
- documents, said that the broad scope of information swept up in the operation
- appears aimed at ensuring virtually every cellphone network in the world is
- NSA accessible.
- https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/
- ¤ NSA Operation AURORAGOLD Slides ::
- http://cryptome.org/2014/12/nsa-aurora-gold-intercept-14-1203.pdf
- ¤ NSA OPULANT PUP Circumventing Strong Cryptography ::
- Last year, the Washington Post reported that the NSA had already managed
- to break the most commonly used cellphone encryption algorithm in the world,
- known as A5/1. But the information collected under AURORAGOLD allows the
- agency to focus on circumventing newer and stronger versions of A5 cellphone
- encryption, such as A5/3.
- http://cryptome.org/2014/12/nsa-opulant-pup-intercept-14-1203.pdf
- _______________________________________
- ¤ Germany’s Intelligence Agency, the BND, Spies On Civilians Too ::
- German MPs examining the surveillance activities the US National
- Security Agency have found a legal loophole that allows the Berlin’s
- foreign intelligence agency to spy on its own citizens.
- The agency, known by its German acronym BND, is not usually allowed
- to intercept communications made by Germans or German companies, but a
- former BND lawyer told parliament this week that citizens working abroad
- for foreign companies were not protected.
- The German government confirmed on Saturday that work-related calls
- or emails were attributed to the employer. As a result, if the employer
- is foreign, the BND could legally intercept them.
- Angela Merkel pretends to be outraged about industrial espionage by
- the NSA while condoning illegal surveillance itself.
- http://www.theguardian.com/world/2014/nov/29/german-loophole-allows-bnd-agency-spy-own-people
- http://www.infowars.com/like-the-nsa-and-gchq-germanys-foreign-intelligence-agency-uses-a-legal-loophole-to-spy-on-its-own-citizens/
- https://www.techdirt.com/articles/20141202/09513729296/like-nsa-gchq-germanys-foreign-intelligence-agency-uses-legal-loophole-to-spy-its-own-citizens.shtml
- _______________________________________
- ¤ How Vodafone-Subsidiary Telecom Aided GCHQ’s Spying Efforts ::
- Previously unpublished documents show how the UK telecom firm Cable
- & Wireless, acquired by Vodafone in 2012, played a key role in
- establishing one of the Government Communications Headquarters’
- (GCHQ) most controversial surveillance programs.
- A joint investigation by NDR, WDR, Süddeutsche Zeitung and Channel 4
- based on documents leaked by whistleblower Edward Snowden, reveals
- that Cable & Wireless actively shaped and provided the most data to
- GCHQ mass surveillance programs, and received millions of pounds in
- compensation. The documents also suggest that Cable & Wireless
- assisted GCHQ in breaking into a competitor’s network.
- In response to these allegations, Vodafone said that an internal
- investigation found no evidence of unlawful conduct, but the company
- would not deny it happened.
- http://www.channel4.com/news/spy-cable-revealed-how-telecoms-firm-worked-with-gchq
- http://www.tagesschau.de/ausland/snowden-vodafone-101.html
- http://www1.wdr.de/daserste/monitor/videos/videovodafonederlangearmdesbritischengeheimdienstes100.html
- http://international.sueddeutsche.de/post/103543418200/snowden-leaks-how-vodafone-subsidiary-cable
- ¤ GCHQ’s Vodafone Cable Master List ::
- https://netzpolitik.org/2014/cable-master-list-wir-spiegeln-die-snowden-dokumente-ueber-angezapfte-glasfasern-auch-von-vodafone/
- ¤ GCHQ Vodafone Gerontic Cables & Slides ::
- http://cryptome.org/2014/11/vodafone-gchq-slides.pdf
- http://cryptome.org/2014/11/vodafone-gchq-netzpolitik-slides-14-1125.pdf
- http://cryptome.org/2014/11/vodafone-gchq-netzpolitik-cables-14-1125.pdf
- ¤ GCHQ Vodafone Gerontic Cables & Slides ZIPPED ::
- http://cryptome.org/2014/11/Gerontic_GCHQ_SZ.zip
- ¤ INCENSER: How NSA and GCHQ Are Tapping Internet Cables ::
- http://electrospaces.blogspot.fi/2014/11/incenser-or-how-nsa-and-gchq-are.html
- _______________________________________
- ¤ Microsoft SkyDrive (aka OneDrive) Gateway Into NSA PRISM ::
- http://cryptome.org/2014/11/ms-onedrive-nsa-prism.htm
- NOTE: Anything uploaded to “the cloud” is going to be available
- for the government to snoop through, the new Apple iphone gadgets
- automatically upload all users’ personal files into “the cloud”
- and yes, looks like Microsoft is also doing it as well.
- You might want to avoid using these new systems, go back to using
- older desktop computers which are rather easy to fortify. As for
- phones, you can buy an old jitterbug phone - it’s a basic cellphone
- without all the other crap included - just plain oldschool, mofos!
- And add one more thing - a “Blockit Pocket.” ;)
- _______________________________________
- ¤ German Investigation of the Cooperation Between NSA-BND Part 1 ::
- http://electrospaces.blogspot.fr/2014/11/german-investigation-of-cooperation.html
- _______________________________________
- ¤ UK Lawyers Spied by GCHQ Spies ::
- http://cryptome.org/2014/11/uk-lawyers-spies-intercept-14-1106.pdf
- https://firstlook.org/theintercept/2014/11/06/uk-surveillance-of-lawyers-journalists-gchq/
- _______________________________________
- ¤ The German Operation Eikonal Part of NSA’s RAMPART-A Program ::
- Just over a week ago, the regional German paper Süddeutsche Zeitung
- and the regional broadcasters NDR and WDR came with a story saying that
- between 2004 and 2008, the German foreign intelligence service BND had
- tapped into the Frankfurt internet exchange DE-CIX and shared the
- intercepted data with the NSA. As not all communications of German
- citizens could be filtered out, this is considered a violation of the
- constitution.
- Here we will give a summary of what is currently known about this BND
- operation and we will combine this with information from earlier reports.
- This will show that it was most likely part of the RAMPART-A program of
- the NSA, which includes similar interception efforts by foreign partner
- agencies. Finally, we will look at where exactly the BND interception
- might have taken place.
- http://electrospaces.blogspot.fr/2014/10/the-german-operation-eikonal-as-part-of.html
- ---------------------------------------
- ¤ How Secret Partners Expand NSA’s Surveillance Dragnet ::
- https://firstlook.org/theintercept/article/2014/06/18/nsa-surveillance-secret-cable-partners-revealed-rampart-a/
- https://www.techdirt.com/articles/20140619/08062627624/nsa-working-with-denmark-germany-to-access-three-terabits-data-per-second-overseas-cables.shtml
- http://www.infowars.com/nsa-uses-33-countries-to-intercept-web-traffic-snowden-files/
- http://gigaom.com/2014/06/20/governments-let-nsa-tap-cables-on-their-territory-latest-snowden-revelations-show/
- ¤ Foreign Partner Access to Black Budget FY 2013 ::
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1200866/foreignpartneraccessbudgetfy2013-redacted.pdf
- ¤ Overview Presenting the RAMPART-A Spy Program ::
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1200860/odd-s3-overviewnov2011-v1-0-redacted-information.pdf
- ¤ Three RAMPART-A Slides ::
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1200865/uodds2overview-v1-1-redacted-information-dk.pdf
- ¤ Black Budget FY 2013 / RAMPART-A Slides (Mirror) ::
- http://cryptome.org/2014/06/nsa-intercept-14-0618.pdf
- ¤ Update ; Intercept Releases More RAMPART-A Slides ::
- http://cryptome.org/2014/06/nsa-information-intercept-14-0619.pdf
- _______________________________________
- ¤ Core Secrets: NSA Saboteurs in China and Germany
- The National Security Agency has had agents in China, Germany,
- and South Korea working on programs that use “physical subversion”
- to infiltrate and compromise networks and devices, according to
- documents obtained by The Intercept.
- The documents, leaked by NSA whistleblower Edward Snowden, also
- indicate that the agency has used “under cover” operatives to gain
- access to sensitive data and systems in the global communications
- industry, and that these secret agents may have even dealt with
- American firms. The documents describe a range of clandestine field
- activities that are among the agency’s “core secrets” when it comes
- to computer network attacks, details of which are apparently shared
- with only a small number of officials outside the NSA.
- “It’s something that many people have been wondering about for a
- long time,” said Chris Soghoian, principal technologist for the
- American Civil Liberties Union, after reviewing the documents.
- “I’ve had conversations with executives at tech companies about
- this precise thing. How do you know the NSA is not sending people
- into your data centers?”
- Previous disclosures about the NSA’s corporate partnerships have
- focused largely on US companies providing the agency with vast amounts
- of customer data, including phone records and email traffic. But
- documents published today by The Intercept suggest that even as the
- agency uses secret operatives to penetrate them, companies have also
- cooperated more broadly to undermine the physical infrastructure of
- the internet than has been previously confirmed.
- In addition to so-called “close access” operations, the NSA’s “core
- secrets” include the fact that the agency works with US and foreign
- companies to weaken their encryption systems; the fact that the NSA
- spends “hundreds of millions of dollars” on technology to defeat
- commercial encryption; and the fact that the agency works with US
- and foreign companies to penetrate computer networks, possibly without
- the knowledge of the host countries. Many of the NSA’s core secrets
- concern its relationships to domestic and foreign corporations.
- Some of the documents in this article appear in a new documentary,
- CITIZENFOUR, which tells the story of the Snowden disclosures and is
- directed by Intercept co-founder Laura Poitras. The documents describe
- a panoply of programs classified with the rare designation of
- “Exceptionally Compartmented Information,” or ECI, which are only
- disclosed to a “very select” number of government officials.
- https://firstlook.org/theintercept/2014/10/10/core-secrets/
- ¤ Top Secret Special Source Operations Classification Guides ::
- http://cryptome.org/2014/10/nsa-whipgenie-the-intercept-14-1010.pdf
- http://cryptome.org/2014/10/nsa-tarex-the-intercept-14-1010.pdf
- ¤ Operation Sentry Eagle (Parts 1 & 2) ::
- http://cryptome.org/2014/10/nsa-sentry-eagle-the-intercept-14-1010.pdf
- http://cryptome.org/2014/10/nsa-sentry-eagle-2-the-intercept-14-1010.pdf
- ¤ NSA Exceptionally Controlled Information ::
- http://cryptome.org/2014/10/nsa-eci-the-intercept-14-1010.pdf
- http://cryptome.org/2014/10/nsa-eci-pawleys-the-intercept-14-1010.pdf
- http://cryptome.org/2014/10/nsa-eci-compartments-the-intercept-14-1010.pdf
- ¤ NSA National Initiative Task Security (Parts 1 & 2) ::
- http://cryptome.org/2014/10/nsa-nit-the-intercept-14-1010.pdf
- http://cryptome.org/2014/10/nsa-nit-2-the-intercept-14-1010.pdf
- ¤ NSA Computer Network Exploitation ::
- http://cryptome.org/2014/10/nsa-cne-declass-the-intercept-14-1010.pdf
- ¤ Following 10 NSA Releases (8.5MB | ZIP) ::
- http://cryptome.org/2014/10/nsa-releases-the-intercept-14-1010.zip
- _______________________________________
- ¤ Retired NSA Technical Director Explains NSA Slides ::
- http://proxy.rickmartensen.nl/www.alexaobrien.com/secondsight/wb/binney.html
- ¤ Retired NSA Technical Director Explains NSA Slides (ZIP) ::
- Includes the report and the slides.
- http://fileb.ag/i627vr7a6bkx
- _______________________________________
- ¤ ACLU’s FOIA Documents Shed Light on One of the NSA’s Most
- Powerful Tools (Other Agencies and Legal Loopholes) ::
- https://www.aclu.org/blog/national-security/new-documents-shed-light-one-nsas-most-powerful-tools
- ¤ Overview of (Other) Signals Intelligence Authorities ::
- https://www.aclu.org/files/assets/eo12333/NSA/Overview%20of%20Signals%20Intelligence%20Authorities.pdf
- ¤ DoD-DIA’s 16 Legal Loopholes to Spy On US Persons ::
- https://www.aclu.org/files/assets/eo12333/DIA/DoD%20HUMINT%20Legal%20Workshop%20Fundamentals%20of%20HUMINT%20Targeting.pdf
- ¤ Intelligence Law Handbook Defense HUMINT Service ::
- https://www.aclu.org/files/assets/eo12333/DIA/Intelligence%20Law%20Handbook%20Defense%20HUMINT%20Service.pdf
- _______________________________________
- ¤ NSA Spies on UN in Vienna ::
- http://fm4.orf.at/stories/1746596/
- http://securityaffairs.co/wordpress/28666/intelligence/nsa-spying-un-vienna.html
- http://www.techworm.net/2014/09/erich-mochel-leaks-photos-nsa-spying-united-nations.html
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ How Covert Agents Infiltrate the Internet to Manipulate, Deceive,
- and Destroy Reputations ::
- https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
- http://www.infowars.com/cointelrpo-revisited-greenwald-exposes-nsa-agenda-to-destroy-journalists/
- One of the many pressing stories that remains to be told from the
- Snowden archive is how western intelligence agencies are attempting
- to manipulate and control online discourse with extreme tactics of
- deception and reputation-destruction. It’s time to tell a chunk of
- that story, complete with the relevant documents.
- Over the last several weeks, I worked with NBC News to publish a
- series of articles about “dirty trick” tactics used by GCHQ’s previously
- secret unit, JTRIG (Joint Threat Research Intelligence Group). These
- were based on four classified GCHQ documents presented to the NSA
- and the other three partners in the English-speaking “Five Eyes”
- alliance. Today, we at the Intercept are publishing another new
- JTRIG document, in full, entitled “The Art of Deception: Training
- for Online Covert Operations.”
- ¤ GCHQ ; The Art of Deception: Training for Online Covert Operations ::
- https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1021430/the-art-of-deception-training-for-a-new.pdf
- ---------------------------------------
- ¤ Hacking Online Polls and Other Ways British Spies
- Seek to Control the Internet ::
- The secretive British spy agency GCHQ has developed
- covert tools to seed the internet with false information,
- including the ability to manipulate the results of online
- polls, artificially inflate pageview counts on web sites,
- “amplify” sanctioned messages on YouTube, and censor video
- content judged to be “extremist.” The capabilities, detailed
- in documents provided by NSA whistleblower Edward Snowden,
- even include an old standby for pre-adolescent prank callers
- everywhere: A way to connect two unsuspecting phone users
- together in a call.
- The tools were created by GCHQ’s Joint Threat Research
- Intelligence Group (JTRIG), and constitute some of the most
- startling methods of propaganda and internet deception
- contained within the Snowden archive. Previously disclosed
- documents have detailed JTRIG’s use of “fake victim blog
- posts,” “false flag operations,” “honey traps” and
- psychological manipulation to target online activists,
- monitor visitors to WikiLeaks, and spy on YouTube and
- Facebook users.
- https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/
- http://www.infowars.com/what-exactly-are-the-spy-agencies-actually-doing-with-their-bag-of-dirty-tricks/
- ¤ GCHQ’s JTRIG Tools and Techniques ::
- http://cryptome.org/2014/07/nsa-jtrigall-intercept-14-0714.pdf
- ---------------------------------------
- ¤ More Details on GCHQ Propaganda/Deception Tactics ::
- https://firstlook.org/theintercept/2014/04/04/cuban-twitter-scam-social-media-tool-disseminating-government-propaganda/
- This week, the Associated Press exposed a secret
- program run by the US Agency for International
- Development to create “a Twitter-like Cuban
- communications network” run through “secret shell
- companies” in order to create the false appearance
- of being a privately owned operation. Unbeknownst
- to the service’s Cuban users was the fact that
- “American contractors were gathering their private
- data in the hope that it might be used for political
- purposes”–specifically, to manipulate those users
- in order to foment dissent in Cuba and subvert its
- government. According to top-secret documents
- published today by The Intercept, this sort of
- operation is frequently discussed at western
- intelligence agencies, which have plotted ways to
- covertly use social media for “propaganda,” “deception,”
- “mass messaging,” and “pushing stories.” ...
- ¤ GCHQ Full Spectrum Cyber Effects ::
- “Destroy Deny Degrade Disrupt Deceive Protect”
- http://cryptome.org/2014/04/gchq-full-spectrum-cyber.pdf
- ... The annual SIGDEV conference, according to one
- NSA document published today by The Intercept, “enables
- unprecedented visibility of SIGINT Development activities
- from across the Extended Enterprise, Second Party and US
- Intelligence communities.” The 2009 Conference, held at
- Fort Meade, included “eighty-six representatives from
- the wider US Intelligence Community, covering agencies
- as diverse as CIA (a record 50 participants), the Air
- Force Research Laboratory and the National Air and
- Space Intelligence Center.”
- Defenders of surveillance agencies have often insinuated
- that such proposals are nothing more than pipe dreams
- and wishful thinking on the part of intelligence agents.
- But these documents are not merely proposals or hypothetical
- scenarios. As described by the NSA document published
- today, the purpose of SIGDEV presentations is “to
- synchronize discovery efforts, share breakthroughs,
- and swap knowledge on the art of analysis.”
- For instance: One of the programs described by the newly
- released GCHQ document is dubbed “Royal Concierge,” under
- which the British agency intercepts email confirmations
- of hotel reservations to enable it to subject hotel
- guests to electronic monitoring. It also contemplates
- how to “influence the hotel choice” of travelers and
- to determine whether they stay at “SIGINT friendly”
- hotels. The document asks: “Can we influence the hotel
- choice? Can we cancel their visit?” ...
- ¤ NSA 5 Eyes 2009 SIGDEV Conference ::
- http://cryptome.org/2014/04/nsa-5-eyes-2009-sigdev.pdf
- ---------------------------------------
- ¤ GCHQ Trolls, Spies and Deceives Online Users ::
- http://cryptome.org/2014/02/gchq-online-deception.pdf
- ¤ GCHQ Disruption Operations ::
- http://cryptome.org/2014/02/gchq-disruption.pdf
- ¤ GCHQ Spreads Propaganda to Discredit Critics ::
- The documents from the GCHQ (the British equivalent
- of the NSA), titled “The Art of Deception: Training
- for Online Covert Operations,” were given to the
- NSA and leaked by Snowden. They reveal that the
- GCHQ is involved, through a unit known as JTRIG
- (Joint Threat Research Intelligence Group), in
- “the monitoring of YouTube and Blogger, the
- targeting of Anonymous with the very same DDoS
- attacks they accuse “hacktivists” of using, the
- use of honey traps (luring people into compromising
- situations using sex) and destructive viruses.”
- The goals of the JTRIG program are “(1) to inject
- all sorts of false material onto the internet in
- order to destroy the reputation of its targets;
- and (2) to use social sciences and other techniques
- to manipulate online discourse and activism to
- generate outcomes it considers desirable.”
- https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
- http://www.examiner.com/article/government-infiltrating-websites-to-deny-disrupt-degrade-deceive
- http://rt.com/news/five-eyes-online-manipulation-deception-564/
- ---------------------------------------
- ¤ GCHQ Attacked Anonymous in 2012 ::
- http://cryptome.org/2014/02/gchq-anonymous.pdf
- http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_anonymous_nbc_document.pdf
- ¤ GCHQ Cyber Attack Operations ::
- http://cryptome.org/2014/02/gchq-cyber-attack.pdf
- http://s3.documentcloud.org/documents/1015553/snowden-cyber-offensive1-nbc-document.pdf
- ¤ GCHQ Full-Spectrum Cyber Effects ::
- http://cryptome.org/2014/02/gchq-cyber-effects.pdf
- ¤ GCHQ Spies Attacked Anonymous IRC Chats ::
- http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361
- http://www.zdnet.com/uk-used-denial-of-service-against-anonymous-7000025993/
- http://www.wired.co.uk/news/archive/2014-02/05/gchq-ddos-attack-anonymous
- ¤ British Spies Used Porn and Dirty Tricks to
- Lure Targets to Honeypots ::
- http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-sex-dirty-tricks-n23091
- ---------------------------------------
- ¤ NSA & GCHQ Spies on Wikileaks, TPB Visitors ::
- https://firstlook.org/theintercept/article/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/
- http://wikileaks.org/NSA-and-GCHQ-spying-on-WikiLeaks.html
- https://www.eff.org/deeplinks/2014/02/surveillance-and-pressure-wikileaks-readers
- http://torrentcrazy.com/news/nsa-authorized-monitoring-of-pirate-bay-and-proxy-users
- ¤ NSA-GCHQ Discovery SIGINT Targeting ::
- http://cryptome.org/2014/02/nsa-gchq-discovery.pdf
- ¤ Youtube Targets by SQUEAKYDOLPHIN Presentation ::
- http://cryptome.org/2014/02/gchq-squeakydolphin-videos.htm
- ¤ GCHQ Psychology SIGDEV ::
- http://cryptome.org/2014/02/gchq-psychology.pdf
- ---------------------------------------
- ▲ Reddit Censors All Stories Above ::
- http://www.infowars.com/reddit-censors-big-story-about-government-manipulation-and-disruption-of-the-internet/
- _______________________________________
- ¤ Unraveling NSA’s TURBULENCE Programs ::
- https://robert.sesek.com/2014/9/unraveling_nsa_s_turbulence_programs.html
- _______________________________________
- ¤ New Zealand’s Prime Minister Isn’t Telling the Truth About
- Mass Surveillance ::
- https://firstlook.org/theintercept/2014/09/15/snowden-new-zealand-surveillance/
- ¤ New Zealand Launched Mass Surveillance Project While Publicly
- Denying It ::
- https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/
- ¤ Snowden and Greenwald Reveal Prime Minister John Key Lied About
- Kiwi Mass Surveillance, Key Calls Greenwald “A Loser” ::
- https://www.techdirt.com/articles/20140915/06175828518/snowden-greenwald-reveal-pm-john-key-lied-about-kiwi-mass-surveillance-key-hits-back-calling-greenwald-loser.shtml
- ¤ New Zealand Prime Minister Releases GCSB Spy Documents ::
- http://cryptome.org/2014/09/gcsb-nz-pm-nz-herald-14-0916.zip
- ¤ NSA Visit by New Zealand Spy PM Ferguson ::
- http://cryptome.org/2014/09/nsa-nz-ferguson-visit-the-intercept-14-0915.pdf
- ¤ The Questions for New Zealand on Mass Surveillance ::
- https://firstlook.org/theintercept/2014/09/15/questions-new-zealand-mass-surveillance/
- _______________________________________
- ▼ NSA Spooks Deny The Evidence (Provided Below) Exists ::
- Did the NSA forget Ed Snowden contacted NBC and released
- the evidence contacting authorities regarding his concerns?
- https://news.vice.com/article/the-nsa-has-revealed-new-details-about-its-exhaustive-search-of-edward-snowdens-emails
- ▲ FLASHBACK! Snowden Strikes Back at NSA, Emails NBC News ::
- Fugitive Edward Snowden on Friday challenged the
- NSA’s insistence that it has no evidence he tried
- to raise concerns about the agency’s surveillance
- activity before he began leaking government documents
- to reporters, calling the response a “clearly tailored
- and incomplete leak ... for a political advantage.”
- “The NSA’s new discovery of written contact between
- me and its lawyers -- after more than a year of denying
- any such contact existed - raises serious concerns,”
- Snowden said in an email Friday to NBC News. “It
- reveals as false the NSA’s claim to Barton Gellman
- of the Washington Post in December of last year, that
- ‘after extensive investigation, including interviews
- with his former NSA supervisors and co-workers, we
- have not found any evidence to support Mr. Snowden’s
- contention that he brought these matters to anyone’s
- attention.’”
- Snowden’s email followed Thursday’s release by the US
- Office of the Director of Intelligence of an email
- exchange between Snowden and the NSA’s Office of the
- General Counsel. The Washington Post received and
- published a similar response from Snowden on Thursday.
- http://www.nbcnews.com/feature/edward-snowden-interview/snowden-strikes-back-nsa-emails-nbc-news-n118821
- ▲ NSA Oversight Training, OVSC1800 Minimization Training,
- NSA OGC Snowden Emails on OVSC1800 Course ::
- http://cryptome.org/2014/05/nsa-oversight.pdf
- http://cryptome.org/2014/05/nsa-ovsc1800.pdf
- http://cryptome.org/2014/05/nsa-ogc-snowden.pdf
- ---------------------------------------
- ¤ NBC Interviews Edward Snowden (Full) ::
- https://www.youtube.com/watch?v=yNhMXyAdjp8
- Mirror here » http://upstore.net/62ocku
- _______________________________________
- ¤ NSA-GCHQ Breached Deutsche Telekom and Other German Firms ::
- According to top-secret documents from the NSA and the British
- agency GCHQ, the intelligence agencies are seeking to map the entire
- Internet, including end-user devices. In pursuing that goal, they
- have broken into networks belonging to Deutsche Telekom.
- http://www.spiegel.de/international/world/snowden-documents-indicate-nsa-has-breached-deutsche-telekom-a-991503.html
- https://firstlook.org/theintercept/2014/09/14/nsa-stellar/
- ¤ GCHQ Satellite Teleport Knowledge ::
- http://cryptome.org/2014/09/gchq-stellar-der-spiegel-14-0914.pdf
- ¤ NSA Treasure Map New Release ::
- http://cryptome.org/2014/09/nsa-treasure-map-new-der-spiegel-14-0914.pdf
- ¤ NSA Treasure Map Slides ::
- http://cryptome.org/2014/09/nsa-treasure-map-der-spiegel-14-0914.pdf
- http://s3.documentcloud.org/documents/1301057/tm-m-402.pdf
- _______________________________________
- ¤ NSA Economic Espionage Benefits American Corporations ::
- https://firstlook.org/theintercept/2014/09/05/us-governments-plans-use-economic-espionage-benefit-american-corporations/
- ¤ Masterspy Quadrennial Report 2009 (Spy For US Corporations) ::
- http://cryptome.org/2014/09/dni-qicr-2009-the-intercept-14-0905.pdf
- ▲ UPDATE: Obama Rubber Stamps Economic Espionage, Mass Spying ::
- http://www.nationaljournal.com/tech/despite-obama-s-pledge-to-curb-it-nsa-mass-surveillance-wins-rubber-stamp-20140913
- _______________________________________
- ¤ Bush-era Justification For Warrantless Wiretapping ::
- http://www.washingtonpost.com/world/national-security/legal-memos-released-on-bush-era-justification-for-warrantless-wiretapping/2014/09/05/91b86c52-356d-11e4-9e92-0899b306bbea_story.html
- http://www.dailystar.com.lb/News/World/2014/Sep-06/269796-bush-era-memos-president-can-wiretap-americans-at-all-times.ashx
- http://mic.com/articles/98116/just-released-bush-administration-memos-explain-deeply-disturbing-government-spying
- ¤ NSA STELLAR WIND Assessed by DoJ 2004 (REDACTED) ::
- http://cryptome.org/2014/09/nsa-olc-stellar-wind-wapo-14-0906.pdf
- ¤ NSA STELLAR WIND Assessed by DoJ 2004 (UNREDACTED) ::
- Above DOJ assessment released by WaPo compared to ACLU document.
- http://cryptome.org/2014/09/nsa-olc-stellar-wind-annotated.pdf
- ¤ NSA’s STELLAR WIND PROGRAM (DECLASSIFIED 2013) ::
- RAGTIME was the codename for Stellar Wind.
- http://cryptome.org/2013/06/nsa-stellar-wind.pdf
- ¤ NSA STELLARWIND Classification Marking ::
- http://electrospaces.blogspot.com/2014/09/about-stellarwind-and-another.html
- _______________________________________
- ¤ DNI Releases 47 FISC Yahoo Documents ::
- http://cryptome.org/2014/09/dni-fisc-yahoo-14-0911.zip
- _______________________________________
- KILLCEN ; Eyeballing Snowden’s Info
- Includes all news reports, videos, images, slides and
- documents from and related to Snowden’s leaks so far,
- up to September 5th of 2014. I’m still collecting any
- information that comes out and will provide an updated
- archive twice per year.
- Due to the enormous size of this current archive, the
- archive has been split concurrent to the names of each
- file and directory in alphabetical order to facilitate
- the size limit while uploading to the file hosts below.
- After decompression, the first folder is titled “Eyeballing_
- Snowden_Info_Folder_01” and the second is titled “Eyeballing_
- Snowden_Info_Folder_02” , both holding a total of 1,668 files
- (1.37GB) after being decompressed and consolidated.
- This was stored on an old OFFLINE system, without any
- WiFi card or modem attached so the archive is safe from
- being modified, exploited or stolen.
- Eyeballing_Snowden_Info_Folder_01.zip
- (589 files | ZIP | 686MB)
- http://fileb.ag/ojvlj5rqihw2
- http://bitshare.com/files/pigqc2bo/Eyeballing_Snowden_Info_Folder_01.zip.html
- http://fpsbay.com/download/64709X14099602822363X347361/Eyeballing_Snowden_Info_Folder_01.zip
- Eyeballing_Snowden_Info_Folder_02.zip
- (1,079 files | ZIP | 476MB)
- http://fileb.ag/xqtrujp8jcey
- http://bitshare.com/files/ztfcjdwg/Eyeballing_Snowden_Info_Folder_02.zip.html
- http://fpsbay.com/download/64711X14099654782364X347381/Eyeballing_Snowden_Info_Folder_02.zip
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA ; Ask Zelda (Redacted) ::
- http://cryptome.org/2014/03/nsa-ask-zelda.pdf
- https://firstlook.org/theintercept/article/2014/03/07/nsa-advice-columnist-seriously/
- ¤ NSA ; Ask Zelda (Full, DECLASSIFIED) ::
- http://cryptome.org/2014/09/nsa-ask-zelda-14-0828.pdf
- _______________________________________
- ¤ NSA’s Foreign Partnerships ::
- http://electrospaces.blogspot.com/2014/09/nsas-foreign-partnerships.html
- _______________________________________
- ¤ Two-Faced Friendship: Turkey Is Partner and Target for NSA ::
- http://www.spiegel.de/international/documents-show-nsa-and-gchq-spied-on-partner-turkey-a-989011.html
- https://firstlook.org/theintercept/2014/08/31/nsaturkeyspiegel/
- ¤ NSA-GCHQ Eyeball Turkey (Original Links) ::
- http://www.spiegel.de/media/media-34650.pdf
- http://www.spiegel.de/media/media-34651.pdf
- http://www.spiegel.de/media/media-34652.pdf
- http://www.spiegel.de/media/media-34653.pdf
- http://www.spiegel.de/media/media-34654.pdf
- http://www.spiegel.de/media/media-34655.pdf
- http://www.spiegel.de/media/media-34656.pdf
- http://www.spiegel.de/media/media-34657.pdf
- http://www.spiegel.de/media/media-34658.pdf
- http://www.spiegel.de/media/media-34659.pdf
- http://www.spiegel.de/media/media-34660.pdf
- http://www.spiegel.de/media/media-34661.pdf
- http://www.spiegel.de/media/media-34662.pdf
- ¤ NSA-GCHQ Eyeball Turkey (Mirrored) ::
- http://cryptome.org/2014/08/nsa-gchq-spy-turkey-der-spiegel-14-0831.pdf
- _______________________________________
- ¤ How the NSA Built Its Own Secret Google ::
- https://firstlook.org/theintercept/article/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton
- ¤ NSA ICREACH Slides ::
- http://cryptome.org/2014/08/nsa-icreach.pdf
- _______________________________________
- ¤ NSA-GCHQ-CSEC HACIENDA Program for Internet Colonization ::
- http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html
- ¤ NSA-GCHQ-CSEC HACIENDA Slides (ZIP) ::
- http://www.xup.to/dl,62909734/HACIENDA_Slides.zip/
- ¤ NSA-GCHQ-CSEC HACIENDA Slides (PDF) ::
- http://cryptome.org/2014/08/nsa-gchq-csec-hacienda-heise-14-0816.pdf
- _______________________________________
- ¤ Now US Corporations Admit They Profit From Spying ::
- Beat them at their own game - lie.
- http://www.forbes.com/sites/quickerbettertech/2014/08/18/the-other-sharing-economy-thats-about-to-change-the-world/
- ¤ Money And Power - The Real Reason For The NSA Spying On Everyone ::
- Put out false information. Flood them with false data.
- https://www.techdirt.com/articles/20140819/17104028259/money-power-real-reason-nsa-spying-everyone.shtml
- _______________________________________
- ¤ Newly Declassified Documents Regarding the “Now-Discontinued” (?)
- NSA Bulk Electronic Communications Metadata Pursuant to Section 402
- of the Foreign Intelligence Surveillance Act ::
- http://icontherecord.tumblr.com/
- _______________________________________
- ¤ GCHQ Covert Mobile Phone Security Tactics ::
- http://cryptome.org/2014/08/gchq-covert-mobiles-the-intercept-14-0812.pdf
- ¤ Compare GCHQ Security Tactics to Jihadist Tactics ::
- https://prod01-cdn03.cdn.firstlook.org/wp-uploads/sites/1/2014/08/GCHQ-Jihadist-handbook.gif
- _______________________________________
- ¤ Barack Obama’s Secret “Terrorist-Tracking” System ::
- Nearly half of the people on the US government’s widely shared
- database of terrorist suspects are not connected to any known
- terrorist group, according to classified government documents
- obtained by The Intercept.
- https://firstlook.org/theintercept/article/2014/08/05/watch-commander/
- ¤ NCTC Directorate of Terrorist Identities ::
- http://cryptome.org/2014/08/nctc-dti-the-intercept.pdf
- ¤ Secret Government Rulebook For Labeling You a Terrorist ::
- The Obama administration has quietly approved a substantial
- expansion of the terrorist watchlist system, authorizing a
- secret process that requires neither “concrete facts” nor
- “irrefutable evidence” to designate an American or foreigner
- as a terrorist, according to a key government document obtained
- by The Intercept.
- http://cryptome.org/2014/07/nctc-watchlist-intercept-14-0723.pdf
- https://firstlook.org/theintercept/article/2014/07/23/blacklisted/
- http://www.infowars.com/leaked-document-facts-and-evidence-not-considered-when-adding-americans-to-terror-lists/
- https://www.techdirt.com/articles/20140723/14232027979/intercept-reveals-us-governments-guidebook-declaring-your-terrorist-putting-you-no-fly-list.shtml
- https://www.techdirt.com/articles/20140723/14321427980/revealed-what-kind-extra-scrutiny-government-gives-to-folks-terrorist-watchlist.shtml
- NOBODY notes
- Sounds much like the (now defunct) COINTELPRO operation the
- FBI once was launched to target, blacklist and harrass US
- civil rights activists and whistleblowers back in the day -
- only these “dirty tricks” are now fully digitalized.
- ¤ Executive Order 12333: They Do Spy on Americans ::
- John Tye is but the latest surveillance whistleblower,
- though he took pains to distinguish himself from Snowden
- and his approach to dissent. “Before I left the State
- Department, I filed a complaint with the department’s
- inspector general, arguing that the current system of
- collection and storage of communications by US persons
- under Executive Order 12333 violates the Fourth Amendment,
- which prohibits unreasonable searches and seizures,”
- Tye explained. “I have also brought my complaint to the
- House and Senate intelligence committees and to the
- inspector general of the NSA.”
- These steps — which many say Snowden should’ve taken —
- produced no changes to the objectionable NSA spying and
- wouldn’t be garnering attention at all if not for
- Snowden’s leaks.
- http://www.washingtonpost.com/opinions/meet-executive-order-12333-the-reagan-rule-that-lets-the-nsa-spy-on-americans/2014/07/18/93d2ac22-0b93-11e4-b8e5-d0de80767fc2_story.html
- http://www.theatlantic.com/politics/archive/2014/07/a-new-surveillance-whistleblower-emerges/374722/
- _______________________________________
- ¤ Cash, Weapons, Surveillance - The US is a Key Party to Every
- Israeli Attack ::
- The US government has long lavished overwhelming aid on Israel,
- providing cash, weapons and surveillance technology that play a
- crucial role in Israel’s attacks on its neighbors. But top secret
- documents provided by NSA whistleblower Edward Snowden shed
- substantial new light on how the US and its partners directly
- enable Israel’s military assaults – such as the one on Gaza.
- https://firstlook.org/theintercept/2014/08/04/cash-weapons-surveillance/
- ¤ ISNU-NSA Spying Pact (1999 & 2013) ::
- http://cryptome.org/2014/08/israel-us-1999-the-intercept.pdf
- http://cryptome.org/2014/08/nsa-israel-2013-the-intercept.pdf
- ¤ US Empire Pays Israel $500,000 in 2004 ::
- http://cryptome.org/2014/08/nsa-israel-500k-2004.pdf
- ¤ (RELATED) Terrorism in the Israeli Attack on Gaza ::
- https://firstlook.org/theintercept/2014/07/29/terrorism-israelgaza-context/
- http://www.presstv.ir/detail/2014/08/04/374016/us-directly-enables-israeli-attacks-on-gaza/
- http://rt.com/news/177716-us-israel-funding-aggression/
- ¤ (RELATED) Gaza Natural Gas - Why Israel Kills for It ::
- http://cryptome.org/2014/08/gaza-natural-gas.zip
- _______________________________________
- ¤ USA-Saudi Arabia Spy Partnership ::
- http://cryptome.org/2014/07/nsa-saudi-arabia-intercept-14-0725.pdf
- ¤ NSA’s New Partner in Spying ; Saudi Arabia’s Brutal State Police ::
- The National Security Agency last year significantly expanded
- its cooperative relationship with the Saudi Ministry of Interior,
- one of the world’s most repressive and abusive government agencies.
- An April 2013 top secret memo provided by NSA whistleblower Edward
- Snowden details the agency’s plans “to provide direct analytic and
- technical support” to the Saudis on “internal security” matters.
- The Saudi Ministry of Interior—referred to in the document as MOI
- — has been condemned for years as one of the most brutal human rights
- violators in the world. In 2013, the U.S. State Department reported
- that “Ministry of Interior officials sometimes subjected prisoners
- and detainees to torture and other physical abuse,” specifically
- mentioning a 2011 episode in which MOI agents allegedly “poured an
- antiseptic cleaning liquid down [the] throat” of one human rights
- activist. The report also notes the MOI’s use of invasive surveillance
- targeted at political and religious dissidents.
- But as the State Department publicly catalogued those very abuses,
- the NSA worked to provide increased surveillance assistance to the
- ministry that perpetrated them. The move is part of the Obama
- Administration’s increasingly close ties with the Saudi regime;
- beyond the new cooperation with the MOI, the memo describes “a
- period of rejuvenation” for the NSA’s relationship with the Saudi
- Ministry of Defense.
- In general, US support for the Saudi regime is long-standing. One
- secret 2007 NSA memo lists Saudi Arabia as one of four countries
- where the US “has [an] interest in regime continuity.”
- https://firstlook.org/theintercept/2014/07/25/nsas-new-partner-spying-saudi-arabias-brutal-state-police/
- _______________________________________
- ¤ Senate Bill Spy Funding FY 2015 ::
- http://cryptome.org/2014/07/spy-funding-fy2015.pdf
- _______________________________________
- ¤ NSA Spying Costs to US Businesses ::
- http://cryptome.org/2014/07/nsa-naf-spy-costs.pdf
- http://www.bloomberg.com/news/2014-07-29/tech-companies-reel-as-nsa-spying-mars-image-for-clients.html
- _______________________________________
- ¤ Insider - Intelligence Agencies Are Running Governments ::
- Alex Jones talks with NSA whistleblower William Binney about the
- growing corruption and power of the NSA and how they abuse their
- power behind the scenes to pull strings.
- http://www.youtube.com/watch?v=DERMBOJBDCk
- http://www.infowars.com/insider-says-intelligence-agencies-are-running-the-government/
- _______________________________________
- ¤ NSA/FISA Spying Timeline ::
- 1978 FISA ; 1981 EO 12333, 1982 DoD Reg 5240.1-R,
- 1993 USSID SP0018 ; 2001 USA Patriot Act, 2002 FISC
- “Raw Take” Share Motion ; 2003 SP002 ; 2004 PR/TT FISA ;
- 2004 NSA/CSS Policy 1-23 ; 2006 BR FISA ; 2006 RAS Memo ;
- 2007 PAA (expired) ; 2008 FAA ; 2008 SP002 (Revised) ;
- 2008 EO 12333 (Revised) ; 2008 RAS Memo (Revised) ;
- 2009 NSA/CSS Policy 1-23 (Revised).
- http://cryptome.org/2014/03/nsa-spy-timeline.pdf
- ▲ FISA Surveillance Leaks ::
- http://cryptome.org/2013/06/nsa-fisa-targeting.pdf
- http://cryptome.org/2013/06/nsa-fisa-minimization.pdf
- http://cryptome.org/2013/06/nsa-fisa-certification.pdf
- ▲ Executive Order 12333 (Default 1981) ::
- http://www.archives.gov/federal-register/codification/executive-order/12333.html
- ▲ DoD Regulation 5240.1-R (1982) ::
- Guidance to DoD components in implementing EO 12333
- and general rules pursuant to FISA.
- http://cryptome.org/dod5240-1-r.htm
- ▲ USSID SP0018 (2003) ::
- http://www.dni.gov/files/documents/1118/CLEANEDFinal%20USSID%20SP0018.pdf
- ▲ FISA ; Pen Register and Trap and Trace (PR/TT) ::
- Opinion of the FISC granting the government application
- seeking the collection of bulk electronic communications
- metadata pursuant to Section 402 of FISA, the Pen Register
- and Trap and Trace (PR/TT) provision.
- http://cryptome.org/2013/11/nsa-13-1118/CLEANEDPRTT%201.pdf
- ▲ Bulk Collection Programs Under PATRIOT ACT ::
- http://cryptome.org/2013/07/obama-releases-13-0731.pdf
- ▲ NSA/CSS Policy 1-23 (Default 2004) ::
- http://cryptome.org/nsa-css-1-23.pdf
- ▲ NSA/CSS Policy 1-23 (Revised 2009) ::
- http://cryptome.org/2014/07/nsa-css-policy-1-23-nyt-14-0727.pdf
- ▲ Executive Order 12333 (Revised 2008) ::
- http://cryptome.org/eo12333-amend.htm
- NSA’s FOIA Release » http://cryptome.org/nsa-eo12333.pdf
- ▲ NSA ; FISA/PAA/FAA Classification Guide ::
- http://cryptome.org/2014/03/nsa-fisa-faa-class.pdf
- ▲ NSA Attorney General Dissemination Procedures ::
- http://cryptome.org/2014/03/nsa-ag-dissemination.pdf
- _______________________________________
- ¤ NSA SIGINT Records Disposition Schedule ::
- http://cryptome.org/2014/08/nsa-sigint-rds.pdf
- http://www.nsa.gov/public_info/declass/records_management/index.shtml
- _______________________________________
- ¤ The NSA Said Edward Snowden Had No Access to Surveillance
- Intercepts, They Lied ::
- The contents of the surveillance files — almost half of which
- contained information from US citizens or residents — “tell
- stories of love and heartbreak, illicit sexual liaisons,
- mental-health crises, political and religious conversions,
- financial anxieties and disappointed hopes.”
- http://www.theatlantic.com/politics/archive/2014/07/a-devastating-leak-for-edward-snowdens-critics/373991/
- http://www.motherjones.com/kevin-drum/2014/07/nsa-said-edward-snowden-had-no-access-surveillance-intercepts-they-lied
- http://www.nationaljournal.com/tech/snowden-undermines-presidential-panel-s-defense-of-nsa-spying-20140708
- ¤ Meet the Muslim-American Leaders the FBI and NSA Have
- Been Spying On ::
- The National Security Agency and FBI have covertly
- monitored the emails of prominent Muslim-Americans—including
- a political candidate and several civil rights activists,
- academics, and lawyers—under secretive procedures intended
- to target terrorists and foreign spies.
- According to documents provided by NSA whistleblower
- Edward Snowden, the list of Americans monitored by their
- own government includes:
- • Faisal Gill, a longtime Republican Party operative and
- one-time candidate for public office who held a top-secret
- security clearance and served in the Department of Homeland
- Security under President George W. Bush;
- • Asim Ghafoor, a prominent attorney who has represented
- clients in terrorism-related cases;
- • Hooshang Amirahmadi, an Iranian-American professor of
- international relations at Rutgers University;
- • Agha Saeed, a former political science professor at
- California State University who champions Muslim civil
- liberties and Palestinian rights;
- • Nihad Awad, the executive director of the Council on
- American-Islamic Relations (CAIR), the largest Muslim civil
- rights organization in the country.
- https://firstlook.org/theintercept/article/2014/07/09/under-surveillance/
- http://www.infowars.com/fbi-directly-spying-on-prominent-muslim-american-politicians-lawyers-and-civil-rights-activists/
- http://electrospaces.blogspot.ca/2014/07/document-shows-that-it-was-not-nsa-but.html
- ¤ NSA FISA Accounts and Emails ::
- http://cryptome.org/2014/07/nsa-fisa-accounts.pdf
- http://cryptome.org/2014/07/nsa-emails.pdf
- ¤ Those Not Targeted Far Outnumber Foreigners Who Are ::
- NSA targeted domestic communications as well as foreign.
- http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-who-are/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html
- ▼ NSA OKs Domestic Spying for Suspected Criminals ::
- ¯¯¯¯¯¯¯¯¯
- “The FBI is also permitted to disseminate US person
- information that reasonably appears to be evidence of a
- crime to law enforcement authorities.”
- http://cryptome.org/2014/07/pclob-14-0702.pdf
- ▲ US Government Denies Spying US Persons ::
- http://cryptome.org/2014/07/dni-doj-14-0709.pdf
- NOBODY responds
- Compare the new DoJ memo (dni-doj-14-0709.pdf)
- with the one during 2007, before any of the NSA
- documents were ever leaked (doj-nsa-memo.pdf)
- http://cryptome.org/2013/06/doj-nsa-memo.pdf
- Now compare the arrogance of the political class
- back in 2004 up till today.
- http://www.infowars.com/congress-insisted-they-be-kept-in-the-dark-on-nsa-spying/
- Notice their lack of oversight during the Bush regime
- now stuck in continuum under the Obama regime?
- http://www.infowars.com/senate-committee-passes-cisa-cybersecurity-bill-that-could-broaden-nsa-powers/
- Just like those in the “Department of Justice” they
- never learn from their mistakes, they are stuck in a
- state of blissful ignorance, they lie and when the truth
- comes out (as it often does), then they deny it happened.
- ¤ Some New Thoughts on the Snowden Cache ::
- http://members.efn.org/~paulmd/SomeNewThoughtsontheSnowdenCache.html
- “So, apparently the Snowden cache contains quite a large number
- of intercepted communications, not just technical documents,
- PowerPoint slides, and memos. This opens up a whole can of worms,
- and some new possibilities for the cache.
- Worms first: several journalists have access to an incredibly
- sensitive cache of personal information. According to some NSA
- defenders: Snowden has committed a horrible privacy violation
- of thousands of innocent Americans. This is a big problem, but
- it requires some mental gymnastics not to recognize that if
- Snowden had violated the privacy of innocents by giving this
- information to journalists, so had the NSA by storing it in the
- first place. Realistically, it’s not one or the other, it’s
- both. Now that we know what it contains, the long term storage
- of that portion cache by journalists becomes very problematic.
- On one hand: it’s evidence, on the other, it’s private information
- on many thousands of people.
- While there are some problems, there are also new possibilities.
- First, it could be a boon for defendants, and those facing legal
- jeopardy, to confront the evidence against them, to receive a
- genuinely fair trial. This is doubly important for drug cases,
- particularly those with DEA involvement, because of the highly
- questionably practice of Parallel Reconstruction, wherein
- classified evidence is laundered, and is reconstructed using
- traditional methods. In effect: perjury. Second, it is prima
- facie evidence to use in lawsuits against the NSA, proof that
- a plaintiff had been spied on. Third, one of the wilder stories:
- Snowden to Reveal the Secrets of Arab Dictators, really can
- happen now. The US government’s dealings with brutal regimes
- are newsworthy, so are the dealings of those regimes against
- their own people.
- One of the things that makes Cablegate so powerful, and
- simultaneously controversial, is the ability of ordinary
- citizens to query it, and learn what the government had kept
- hidden. In at least one case, it allowed a rendition victim
- to seek justice. I am not suggesting leaking it out in full,
- but ways of allowing ordinary citizens the ability to get
- their own communications, and broadening access, should be
- considered. Contrary to the opinions of those who described
- the Post’s story as a dud, it’s the first page of the next
- chapter of the Snowden Saga, with wide-reaching, and
- unpredictable consequences.”
- By Paul Dietrich, Jul 8, 2014
- _______________________________________
- ¤ Networks vs. Hierarchies: Which Will Win? ::
- http://libertyblitzkrieg.com/2014/06/22/networks-vs-hierarchies-which-will-win-niall-furguson-weighs-in/
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ Ultimate Goal of the NSA ; Total Population Control ::
- At least 80% of all audio calls, not just metadata, are
- recorded and stored in the US, says whistleblower William
- Binney – that’s a “totalitarian mentality.”
- http://www.theguardian.com/commentisfree/2014/jul/11/the-ultimate-goal-of-the-nsa-is-total-population-control
- _______________________________________
- ¤ NSA Hacks TOR in Germany, Calls Users Extremists ::
- http://cryptome.org/2014/07/nsa-tor-de.htm
- It is one of the most sensitive secrets of the NSA,
- the engine of the global monitoring machine: the source
- code of the XKeyscore program, the most comprehensive
- Ausspähprogramm of US foreign intelligence.
- NDR and WDR have excerpts of the source code. Parts of
- the collection infrastructure ie, so-called software rules
- that define the intelligence, what or who they want to
- investigate.
- There are only a few numbers and characters to string
- together the programmer. But when the program executes
- XKeyscore these rules, get people and their data in their
- sights. The connections from computers to the Internet
- are identified and stored in a database type. The users
- are quasi marked. It is the dragnet of the 21st century.
- http://download.media.tagesschau.de/video/2014/0703/TV-20140703-0546-2401.webl.webm
- MP4 Video Format » http://fileb.ag/u12my0tpvr8y
- ¤ XKeyscore Targets Tor ::
- http://daserste.ndr.de/panorama/xkeyscorerules100.txt
- ¤ NSA Targets the Privacy-conscious Using Tor ::
- http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html
- ---------------------------------------
- ¤ NSA/FRA XKeyscore Targets Tor, etc. ::
- http://cryptome.org/2013/12/nsa-xkeyscore-tor-slides.pdf
- ¤ NSA & GCHQ Counter-Tor Slides ::
- “Use cookies to identify Tor users when they are not
- using Tor.”
- “Investigate Evercookie persistence.”
- http://cryptome.org/2013/10/nsa-tor-stinks.pdf
- ¤ Cookies Threaten Tor User Anonymity ::
- “Just because you’re using Tor doesn’t mean that your
- browser isn’t storing cookies,” said Jeremiah Grossman,
- a colleague of Hansen’s who also specializes in browser
- vulnerabilities.
- As Grossman described the procedure to CNET, the NSA is
- aware of Tor’s entry and exit nodes because of its Internet
- wide surveillance.
- “The very feature that makes Tor a powerful anonymity
- service, and the fact that all Tor users look alike on the
- Internet, makes it easy to differentiate Tor users from
- other Web users,” he wrote.
- “The NSA then cookies that ad, so that every time you go
- to a site, the cookie identifies you. Even though your IP
- address changed [because of Tor], the cookies gave you away,”
- he said.
- http://news.cnet.com/8301-1009_3-57606178-83/nsa-tracks-google-ads-to-find-tor-users/
- ¤ GCHQ ; MULLENIZE Operation to Tag and Identify Packet
- Traffic From Machines ::
- “Working together, CT and CNE have devised a method to carry
- out large-scale ‘staining’ as a means to identify individual
- machines linked to that IP address. ... ...
- User Agent Staining is a technique that involves writing a
- unique marker (or stain) onto a target machine. Each stain
- is visible in passively collected SIGINT and is stamped into
- every packet, which enables all the events from that stained
- machine to be brought back together to recreate a browsing
- session.”
- http://cryptome.org/2013/10/gchq-mullenize.pdf
- http://s3.documentcloud.org/documents/801762/mullenize-28redacted-29.pdf
- ¤ Packet Staining ::
- http://prezi.com/p5et9yawg2c6/ip-packet-staining/
- http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-00
- http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-01
- http://cryptome.org/2013/10/packet-stain/packet-staining.htm
- ¤ NSA Peeling Back the Layers of Tor ::
- http://cryptome.org/2013/10/nsa-egotisticalgiraffe.pdf
- http://www.theguardian.com/world/interactive/2013/oct/04/egotistical-giraffe-nsa-tor-document
- http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity
- http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
- ¤ NSA ; Tor Source Code Vulnerabilities ::
- “We have seen several targets using Tor. Our goal was to
- analyze Tor source code and determine any vulnerabilities
- in the system. We set up an internal Tor network to analyze
- Tor traffic, in the hopes of discovering ways to passively
- identify it. We also worked to create a custom Tor client
- which allows the user finer control.” ... ...
- “This accomplishes several things. Most basically, the Tor
- servers, many of which are listed on publicly advertised
- directory servers, are chosen to act as a series of proxies.
- This may seem to be excessively complex, as a single proxy
- server can be used to hide one’s location, but a single-hop
- proxy is vulnerable in two ways. First, by analyzing the
- pattern of the traffic going to and from the proxy server,
- it is possible to deduce which clients are making which requests.
- Second, if an attacker owns the proxy server, then it certainly
- knows who is asking for what, and anonymization is ruined. By
- using multiple hops, Tor is much more resistant to both of
- these attacks. Traffic analysis becomes extraordinarily
- difficult, as it must be coordinated across several machines,
- and an attacker must own all the hops along the circuit in
- order to trace requests back to the originating client.”
- ... ...
- “In our time in the lab, we found that running an nmap on a
- node that is offering a hidden service will turn up the port
- that the hidden service is using to deal with incoming
- connections. It can then be directly connected to, outside
- of Tor.”
- ... ...
- “We would have to try to connect to each of the ports we see
- open on a machine to determine if there is a hidden service
- being run. We would not even know which protocol the hidden
- service is running. It may be an HTTP server, an FTP server,
- an SMTP server, etc. The only thing we know is that the protocol
- must run over TCP. It is not enough to attempt to connect once
- to each port, using an HTTP GET request. Several protocols must
- be tried.”
- ... ...
- “It may also be useful to study Tor directory servers in more
- detail. Our work focused solely on the client, but many attacks
- would be much easier with access to more Tor servers. The
- directory servers ultimately control which Tor servers are
- used by clients. We have found that a server can put itself on
- a directory server multiple times; all it takes is the server
- running several Tor processes, each having a different nickname,
- open port, fingerprint, and LOG FILE. This only requires different
- configuration files for the different processes, which are easy
- to set up. That machine will handle a disproportionate amount of
- traffic, since it is listed several times. This increases the
- density of friendly servers in the cloud without increasing the
- number of servers we have set up. Unfortunately, each listing
- has the same IP address, which would be very noticeable to anyone
- who inspecting the directories.”
- http://cryptome.org/2013/10/nsa-tor.pdf
- http://s3.documentcloud.org/documents/802061/ces-summer-2006-tor-paper-28redacted-29-1.pdf
- http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html
- ¤ NSA ; Types of IAT ::
- http://cryptome.org/2013/10/nsa-iat-tor.pdf
- ¤ NSA Link Removed by Guardian ::
- http://cryptome.org/2013/10/nsa-link-removed.htm
- ¤ Tor Media Reports Disinformative (?) ::
- “This document doesn’t give much insight into capabilities
- the IC has developed against Tor. It’s apparently quite common
- to run multiple research teams (either known or unknown to
- each other) against a single target, and a few summer
- students with a dozen lab machines is a pretty small
- investment. I’d expect there are other programs with more
- sophisticated attacks, especially now 7 years later.”
- http://cryptome.org/2013/10/nsa-tor-disinfo.htm
- _______________________________________
- ¤ UPDATE ; German CIA Agent Arrested ::
- http://cryptocomb.org/?p=869
- ¤ UPDATE ; Der Spiegel Exposed Spy Scandle Between US-Germany, ;
- Angela Merkel Plans to Scrap No-spy Agreement with US-Britain ::
- A new surveillance scandal is threatening to unsettle US-German
- relations after it emerged that an employee of Germany’s
- intelligence agency has been arrested under suspicion of acting
- as a double agent for the US.
- According to several reports in the German media, a 31-year-old
- member of the Bundesnachrichtendienst (BND) administration
- department in Pullach was on Wednesday arrested by the country’s
- federal prosecutor, originally under suspicion of passing on
- information to Russian intelligence services. ... ...
- The plan is in response to the scandal resulting from last
- week’s arrest of a 31-year-old BND “double agent” who spent
- at least two years selling top-secret German intelligence
- documents to his US spymasters in return for cash payments
- of €10,000 (£7,940) per document. ...
- The double agent is reported to have simply emailed Berlin’s
- American embassy and asked whether officials were interested
- in “co-operation”. He subsequently downloaded at least 300
- secret documents on to USB sticks that he handed to his
- American spymasters at secret location in Austria.
- He was caught by German counter-espionage agents only after
- he was found offering similar BND documents to Berlin’s Russian
- embassy. The Germans had considered it “impossible” that one
- of their own intelligence men could be working as a “double agent”
- for the Americans.
- http://www.independent.co.uk/news/world/europe/germany-to-spy-on-us-for-first-time-since-1945-after-double-agentscandal-9590645.html
- http://www.theguardian.com/commentisfree/2014/jul/07/nsa-chancellor-double-agent-german-us-relations
- http://www.theguardian.com/world/2014/jul/04/germany-arrest-bnd-spying-allegations-double-agent-us
- http://www.nytimes.com/2014/07/11/world/europe/germany-expels-top-us-intelligence-officer.html?_r=0
- ¤ Der Spiegel Releases NSA-BND Spy Documents ::
- http://cryptome.org/2014/06/nsa-spiegel-snowden-14-0618.pdf
- http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html
- ¤ NSA-BND_Spy_Documents_2014.zip (Mirror) ::
- http://filedump.org/files/epVgbFV91403117533.html
- ¤ Der Spiegel Release on German SIGADs ::
- http://cryptome.org/2014/06/nsa-spiegel-german-sigads.pdf
- ¤ Inside the New NSA-BND Revelations ::
- http://www.spiegel.de/international/germany/new-snowden-revelations-on-nsa-spying-in-germany-a-975441.html
- http://www.dw.de/new-leaks-show-germanys-collusion-with-nsa/a-17726141
- ¤ NSA and BND Spying Telecommunications ::
- http://cryptome.org/2014/06/nsa-german-spying.pdf
- http://cryptome.org/2014/06/nsa-der-spiegel-14-0616.pdf
- ¤ Germany Cooperates Closely with NSA ::
- http://www.spiegel.de/international/world/spiegel-reveals-cooperation-between-nsa-and-german-bnd-a-909954.html
- ¤ Key Partners ; Secret Links Between BND and NSA ::
- http://www.spiegel.de/international/world/german-intelligence-worked-closely-with-nsa-on-data-surveillance-a-912355.html
- ▲ FLASHBACK ; Angela Merkel Compares NSA to Stasi ::
- In an angry exchange with Barack Obama, Angela Merkel
- has compared the snooping practices of the US with those
- of the Stasi, the ubiquitous and all-powerful secret
- police of the communist dictatorship in East Germany,
- where she grew up.
- http://www.theguardian.com/world/2013/dec/17/merkel-compares-nsa-stasi-obama
- _______________________________________
- ¤ NSA FORNSAT Intercept in 2002 and Economic Motives ::
- http://electrospaces.blogspot.fr/2014/07/the-national-security-agency-in-2002.html
- _______________________________________
- ¤ Look Out for Falling Redactions ::
- http://cryptome.org/2014/06/nsa-falling-redactions.pdf
- _______________________________________
- ¤ Dump of BOUNDLESSINFORMANT IP Data ::
- https://gist.github.com/9b/de3f0510cccbd5dbfdf0
- _______________________________________
- ¤ NSA Playset ; Tailored Access for Hackers ::
- http://www.nsaplayset.org/
- _______________________________________
- ¤ How Secret Partners Expand NSA’s Surveillance Dragnet ::
- https://firstlook.org/theintercept/article/2014/06/18/nsa-surveillance-secret-cable-partners-revealed-rampart-a/
- https://www.techdirt.com/articles/20140619/08062627624/nsa-working-with-denmark-germany-to-access-three-terabits-data-per-second-overseas-cables.shtml
- http://www.infowars.com/nsa-uses-33-countries-to-intercept-web-traffic-snowden-files/
- http://gigaom.com/2014/06/20/governments-let-nsa-tap-cables-on-their-territory-latest-snowden-revelations-show/
- ¤ Foreign Partner Access to Black Budget FY 2013 ::
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1200866/foreignpartneraccessbudgetfy2013-redacted.pdf
- ¤ Overview Presenting the RAMPART-A Spy Program ::
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1200860/odd-s3-overviewnov2011-v1-0-redacted-information.pdf
- ¤ Three RAMPART-A Slides ::
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1200865/uodds2overview-v1-1-redacted-information-dk.pdf
- ¤ Black Budget FY 2013 / RAMPART-A Slides (Mirror) ::
- http://cryptome.org/2014/06/nsa-intercept-14-0618.pdf
- ¤ Update ; Intercept Releases More RAMPART-A Slides ::
- http://cryptome.org/2014/06/nsa-information-intercept-14-0619.pdf
- _______________________________________
- Keith Alexander’s talking points for strategic meeting
- between the NSA and the Danish Defense Intelligence
- Service (DDIS).
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1200859/diropeningremarksguidancefordp1-v1-1-v1-0.pdf
- _______________________________________
- ¤ FISA Court Rules to Retain Spy Data Past 5 Years ::
- http://cryptome.org/2014/04/fisc-br14-01-14-0410.pdf
- ¤ NSA Admits They Keep All Spy Data Past 5 Years ::
- http://dailycaller.com/2014/06/10/nsa-our-systems-are-too-complex-to-stop-deleting-evidence/
- _______________________________________
- ¤ Head of GCHQ Very Pissed Off Over Media Coverage ::
- http://www.telegraph.co.uk/technology/internet-security/10910212/Head-of-GCHQ-launches-thinly-veiled-attack-on-The-Guardian.html
- _______________________________________
- ¤ GCHQ Forced to Reveal Secret Policy for Mass Spying
- of Residents’ Facebook and Google Use ::
- https://www.privacyinternational.org/press-releases/uk-intelligence-forced-to-reveal-secret-policy-for-mass-surveillance-of-residents
- http://www.nytimes.com/2014/06/17/business/international/british-spy-agencies-said-to-assert-broad-power-to-intercept-web-traffic.html?_r=0
- http://hosted.ap.org/dynamic/stories/E/EU_BRITAIN_ONLINE_SURVEILLANCE
- Britain’s top counter-terrorism official has been forced
- to reveal a secret Government policy justifying the mass
- surveillance of every Facebook, Twitter, Youtube and Google
- user in the UK.
- https://www.privacyinternational.org/sites/privacyinternational.org/files/downloads/press-releases/witness_st_of_charles_blandford_farr.pdf
- http://cryptome.org/2014/06/gchq-farr-pi.pdf (mirror)
- _______________________________________
- ¤ THIS IS HOW THE US GOVERNMENT TREATS WHISTLEBLOWERS ;
- CIA Rendition Jet Was Waiting in Europe to Blackbag Snowden ::
- http://www.theregister.co.uk/2014/06/13/cia_rendition_jet_was_waiting_in_europe_to_snatch_snowden/
- ---------------------------------------
- ¤ Leak Spy Documents @ The Intercept Dropbox ::
- http://y6xjgkgwj47us5ca.onion/
- _______________________________________
- ¤ PRISM FOIA Request Highly Censored ::
- http://cryptome.org/2014/06/nsa-prism-foia-email.pdf
- _______________________________________
- ¤ DEA-NSA SANDKEY Voice Intercepts ::
- http://cryptomeorg.siteprotect.net/dea-nsa-sandkey.pdf
- Mirrored » http://fileb.ag/pmu6ugcxsxq1
- _______________________________________
- ¤ How Governments Around The World Responded To
- Snowden’s Revelations ::
- https://www.techdirt.com/articles/20140612/03532827554/how-have-governments-around-world-responded-to-snowdens-revelations.shtml
- _______________________________________
- ¤ GCHQ’s Beyond Top Secret Middle Eastern Spy Base ::
- http://www.theregister.co.uk/2014/06/03/revealed_beyond_top_secret_british_intelligence_middleeast_internet_spy_base/
- ¤ GCHQ’s Middle Eastern Spy Base Eyeball ::
- http://cryptome.org/2014-info/gchq-seeb/gchq-seeb.htm
- _______________________________________
- ¤ UK Teleco Admits Governments Used Secret Cables
- to Tap Phones ::
- http://www.telegraph.co.uk/technology/internet-security/10880208/Vodafone-governments-use-secret-cables-to-tap-phones.html
- _______________________________________
- ¤ Some Numbers About NSA’s Data Collection ::
- http://electrospaces.blogspot.com.br/2014/06/some-numbers-about-nsas-data-collection.html
- _______________________________________
- ¤ NSA Whistleblower Russel Tice Reveals NSA Has
- Documents “Above Top Secret” and Many Are Burned
- After Covert Operations, Routinely ::
- “Think of it this way. Remember I told you about the
- NSA doing everything they could to make sure that the
- information from 40 years ago – from spying on Frank
- Church and Lord knows how many other Congressman that
- they were spying on – was hidden?
- Now do you think they’re going to put that information
- into Powerpoint slides that are easy to explain to
- everybody what they’re doing?
- They would not even put their own NSA designators on
- the reports [so that no one would know that] it came
- from the NSA. They made the reports look like they were
- Humint (human intelligence) reports. They did it to
- hide the fact that they were NSA and they were doing
- the collection. That’s 40 years ago. [The NSA and other
- agencies are still doing "parallel construction",
- "laundering" information to hide the fact that the
- information is actually from mass NSA surveillance.]
- Now, what NSA is doing right now is that they’re taking
- the information and they’re putting it in a much higher
- security level. It’s called “ECI” – Exceptionally Controlled
- Information – and it’s called the black program … which I
- was a specialist in, by the way.
- I specialized in black world – DOD and IC (Intelligence
- Community) – programs, operations and missions … in “VRKs”,
- “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access
- Program. It’s highly unlikely Mr. Snowden had any access
- to these. STO equals Special Technical Operations It’s
- highly unlikely Mr. Snowden had any access to these.
- Now in that world – the ECI/VRK world – everything in that
- system is classified at a higher level and it has its own
- computer systems that house it. It’s totally separate than
- the system which Mr. Snowden was privy to, which was called
- the “JWICS”: Joint Worldwide Intelligence Communications
- System. The JWICS system is what everybody at NSA has access
- to. Mr Snowden had Sys Admin [systems administrator] authority
- for the JWICS.
- And you still have to have TS/SCI clearance [i.e. Top Secret/
- Sensitive Compartmented Information - also known as “code word”
- - clearance] to get on the JWICS. But the ECI/VRK systems are
- much higher[levels of special compartmentalized clearance]
- than the JWICS. And you have to be in the black world to get
- that [clearance].
- ECI = Exceptionally Controlled Information. I do not believe
- Mr. Snowden had any access to these ECI controlled networks).
- VRK = Very Restricted Knowledge. I do not believe Mr. Snowden
- had any access to these VRK controlled networks.
- These programs typically have, at the least, a requirement of
- 100 year or until death, ’till the person first being “read in”
- [i.e. sworn to secrecy as part of access to the higher
- classification program] can talk about them. [As an interesting
- sidenote, the Washington Times reported in 2006 that – when Tice
- offered to testify to Congress about this illegal spying – he
- was informed by the NSA that the Senate and House intelligence
- committees were not cleared to hear such information.]
- It’s very compartmentalized and – even with stuff that they had
- – you might have something at NSA, that there’s literally 40
- people at NSA that know that it’s going on in the entire agency.
- When the stuff came out in the New York Times [the first big
- spying story, which broke in 2005] – and I was a source of
- information for the New York Times – that’s when President Bush
- made up that nonsense about the “terrorist surveillance program.”
- By the way, that never existed. That was made up.
- There was no such thing beforehand. It was made up … to try
- to placate the American people.
- The NSA IG (Inspector General) – who was not cleared for this –
- all of a sudden is told he has to do an investigation on this;
- something he has no information or knowledge of.
- So what they did, is they took a few documents and they
- downgraded [he classification level of the documents] – just
- a few – and gave them to them to placate this basic whitewash
- investigation.”
- http://cryptome.org/2014/06/tice-shoot-snowden.pdf
- http://www.washingtonsblog.com/2014/06/original-nsa-whistleblower-snowden-
- http://www.infowars.com/nsa-whistleblower-snowden-never-had-access-to-the-juiciest-documents/
- http://www.youtube.com/watch?v=az-YWMNWQuU
- http://www.youtube.com/watch?v=GJS7F-mShpI
- _______________________________________
- ¤ NSA MYSTIC SIGAD Reporting Tabulation ::
- http://cryptome.org/2014/06/nsa-sigad-reporting.pdf
- ¤ NSA SOMALGET Spy Programme ::
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1164088/somalget.pdf
- ¤ SOMALGET SSO Dictionary Excerpt ::
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1164086/sso-dictionary-excerpt.pdf
- ¤ MYSTIC/SOMALGET Spy Documents ::
- http://cryptome.org/2014/05/nsa-intercept-14-0519.pdf
- ¤ Toward the Identity of “Country X” in MYSTIC ::
- http://cryptome.org/2014/05/nsa-mystic-identity.pdf
- ¤ Wikileaks Releases Identity of “Country X” ::
- http://wikileaks.org/WikiLeaks-statement-on-the-mass.html
- http://www.infowars.com/country-x-wikileaks-reveals-nsa-recording-nearly-all-phone-calls-in-afghanistan/
- ¤ Google Idea’s Director Jared Cohen Was Tasked With
- Getting Afghan Telcos to Move Towers to US Bases ::
- https://wikileaks.org/plusd/cables/09KABUL2020_a.html
- ¤ Data Pirates of the Caribbean ; The NSA Is
- Recording Every Cell Phone Call in the Bahamas ::
- https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/
- ¤ UPDATE ; The Bahamas Wants to Know Why the NSA is
- Recording Its Phone Calls ::
- https://firstlook.org/theintercept/2014/05/20/bahamas-wants-know-nsa-recording-phone-calls/
- _______________________________________
- ¤ NSA Collecting Millions of Faces From Web Images ::
- The FBI, DHS, state and local law enforcement
- agencies are now also using the same facial
- recognition systems as the NSA. Other biometric
- identification systems are being developed as well.
- A panopticon for endless spying in the police state.
- http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-web-images.html
- http://rt.com/usa/162868-nsa-snowden-social-facial/
- ¤ NSA Identity Spying ::
- http://cryptome.org/2014/06/nsa-identity-spy.pdf
- _______________________________________
- ¤ 10 Things (Most People) Didn’t Know Before Snowden ::
- 1. Everything you do online can be monitored.
- 2. What you do offline can be monitored!
- 3. They are collecting your phone records, too.
- 4. In some countries, it is not just metadata.
- 5. Or ordinary citizens for that matter.
- 6. The NSA engages in industrial espionage.
- 7. The NSA is also hacking the global financial system.
- 8. The NSA is also hacking into online video games.
- 9. The NSA uses pornography to honeytrap targets.
- 10. The NSA dragnet is collecting facial images.
- http://rt.com/usa/163700-year-whistleblower-before-snowden/
- And a few more to think about,
- 11. The NSA has access to crypto-breaking supercomputers.
- 12. The NSA spied on human rights activists, organizations.
- 13. Google does in fact have personal relations in the NSA.
- 14. All electronic products are manufactured with backdoors.
- 15. NSA tampers with electronics being shipped by mail.
- _______________________________________
- ▼ Snowden Strikes Back at NSA, Emails NBC News ::
- Fugitive Edward Snowden on Friday challenged the
- NSA’s insistence that it has no evidence he tried
- to raise concerns about the agency’s surveillance
- activity before he began leaking government documents
- to reporters, calling the response a “clearly tailored
- and incomplete leak ... for a political advantage.”
- “The NSA’s new discovery of written contact between
- me and its lawyers -- after more than a year of denying
- any such contact existed - raises serious concerns,”
- Snowden said in an email Friday to NBC News. “It
- reveals as false the NSA’s claim to Barton Gellman
- of the Washington Post in December of last year, that
- ‘after extensive investigation, including interviews
- with his former NSA supervisors and co-workers, we
- have not found any evidence to support Mr. Snowden’s
- contention that he brought these matters to anyone’s
- attention.’”
- Snowden’s email followed Thursday’s release by the US
- Office of the Director of Intelligence of an email
- exchange between Snowden and the NSA’s Office of the
- General Counsel. The Washington Post received and
- published a similar response from Snowden on Thursday.
- http://www.nbcnews.com/feature/edward-snowden-interview/snowden-strikes-back-nsa-emails-nbc-news-n118821
- ▲ NSA Oversight Training, OVSC1800 Minimization Training,
- NSA OGC Snowden Emails on OVSC1800 Course ::
- http://cryptome.org/2014/05/nsa-oversight.pdf
- http://cryptome.org/2014/05/nsa-ovsc1800.pdf
- http://cryptome.org/2014/05/nsa-ogc-snowden.pdf
- ---------------------------------------
- ¤ NBC Interviews Edward Snowden (Full) ::
- https://www.youtube.com/watch?v=yNhMXyAdjp8
- Mirror here » http://upstore.net/62ocku
- _______________________________________
- ¤ What Does GCHQ Know About Our Devices We Don’t? ::
- https://www.privacyinternational.org/blog/what-does-gchq-know-about-our-devices-that-we-dont
- ¤ A Hint? ; “Flashdrive Cache Paths” (Repost) ::
- http://paste.security-portal.cz/view/b30bffb6
- _______________________________________
- ¤ Onionshare App Lets the Next Snowden Send Big Files
- Securely and Anonymously ::
- OnionShare lets you securely and anonymously
- share a file of any size with someone. It works
- by starting a web server, making it accessible
- as a Tor hidden service, and generating an
- unguessable URL to access and download the file.
- It doesn’t require setting up a server on the
- internet somewhere or using a third party
- filesharing service. You host the file on your
- own computer and use a Tor hidden service to
- make it temporarily accessible over the internet.
- The other user just needs to use Tor Browser to
- download the file from you.
- https://github.com/micahflee/onionshare
- http://www.wired.com/2014/05/onionshare/
- ¤ Mirrored Onionshare App w/ Report (ZIP) ::
- https://anonfiles.com/file/9805fddaf90e3ecf37b957e5bed3f474
- ¤ Mirrored Onionshare App w/ Report (RAR) ::
- https://anonfiles.com/file/ea22d9e866875e02a5a0c95e2f69b5d4
- _______________________________________
- ¤ Former NSA-CIA Director Michael Hayden Admits
- Metadata SIGINT Collection Used to Kill People ::
- http://www.youtube.com/watch?v=yaTGkSoI8Ic
- ¤ The Price of Privacy Debate - Re-Evaluating the NSA ::
- http://www.youtube.com/watch?v=kV2HDM86XgI
- _______________________________________
- ¤ Glenn Greenwald - “No Place To Hide” (EPUB) ::
- magnet:?xt=urn:btih:2d1ace5d3b854a9afffc4c2b576cdadc4a0e2718
- http://torrage.com/torrent/2D1ACE5D3B854A9AFFFC4C2B576CDADC4A0E2718.torrent
- ¤ Glenn Greenwald - “No Place To Hide” (PDF) ::
- http://cryptome.org/2014/05/npth.7z
- ▼ NSA Documents From “No Place To Hide” ::
- http://hbpub.vo.llnwd.net/o16/video/olmk/holt/greenwald/NoPlaceToHide-Documents-Uncompressed.pdf
- Mirror here » http://fileb.ag/94dwpno2eokp
- ▲ An Avalanche of Snowden Documents To Be Released
- Online Next Week ::
- http://www.engadget.com/2014/05/08/an-avalanche-of-new-snowden-documents-will-go-online-next-week/
- ---------------------------------------
- ¤ NSA’s Largest Cable Tapping Program ::
- http://electrospaces.blogspot.de/2014/05/nsas-largest-cable-tapping-program.html
- ¤ Glenn Greenwald On Democracy Now ::
- http://publish.dvlabs.com/democracynow/ipod/dn2014-0513.mp4
- http://publish.dvlabs.com/democracynow/ipod/dn2014-0514.mp4
- ¤ New Snowden Document Implies NSA May Be Putting
- Israel’s Security Ahead of America’s ::
- http://www.infowars.com/new-snowden-document-implies-nsa-may-be-putting-israels-security-ahead-of-americas/
- ¤ New Snowden Documents Reveal Depth Of Facebook
- Infiltration by NSA ::
- http://revolution-news.com/new-snowden-documents-reveal-depth-of-facebook-infiltration-by-nsa/
- http://www.infowars.com/how-the-nsa-fbi-made-facebook-the-perfect-mass-surveillance-tool/
- ¤ Leaked Photos of the NSA’s TAO Factory ::
- A document included in the trove of National Security
- Agency files released with Glenn Greenwald’s book
- “No Place To Hide” details how the agency’s Tailored
- Access Operations (TAO) unit and other NSA employees
- intercept servers, routers, and other network gear
- being shipped to organizations targeted for surveillance
- and install covert implant firmware onto them before
- they’re delivered.
- http://govtslaves.info/leaked-photos-nsas-router-upgrade-factory/
- http://cryptome.org/2014/05/nsa-customs.htm
- ¤ Cisco Letter to Obama Objecting to NSA Implants ::
- http://cryptome.org/2014/05/cisco-implant.pdf
- ¤ No Place to Hide Documents Compared to Previous ::
- http://cryptome.org/2014/05/npth-docs-compare.pdf
- ______________________________________
- ¤ House Leaders and Obama Regime Water Down
- Surveillance Reform Bill ::
- http://newamerica.net/node/110983
- _______________________________________
- ¤ US Justice Department Told Supreme Court to Dismiss
- NSA Spying Cases? ::
- http://www.theguardian.com/commentisfree/2014/may/17/government-lies-nsa-justice-department-supreme-court
- _______________________________________
- ¤ The New Yorker Interviews Keith Alexander ::
- http://www.newyorker.com/online/blogs/newsdesk/2014/05/were-at-greater-risk-q-a-with-general-keith-alexander.html
- _______________________________________
- ▼ Leak Spy Documents @ The Intercept Dropbox ::
- http://y6xjgkgwj47us5ca.onion/
- http://cryptome.org/2014/05/intercept-drop.pdf
- ▲ Obama’s Directive Makes Mere Citing of Snowden’s
- Leaks a Punishable Offense ::
- In a new policy directive from the Obama administrative,
- national security and other government officials will no
- longer be allowed to publicly discuss or even reference
- news reporting that is based on “unauthorized leaks.”
- https://www.commondreams.org/headline/2014/05/09
- _______________________________________
- ¤ Munk Debate on State Surveillance ::
- Greenwald, Ohanian vs Hayden, Dershowitz
- http://www.youtube.com/watch?v=_d1tw3mEOoE
- ______________________________________
- ¤ NSA ; Manageable Network Plan ::
- http://cryptome.org/2014/05/nsa-network-plan.pdf
- ______________________________________
- ¤ United States of Secrets ; How the Government
- Came to Spy on Millions of Americans ::
- Part One: Tuesday, May 13, 2014, at 9 p.m. on PBS
- Part Two: Tuesday, May 20, 2014, at 10 p.m. on PBS
- http://www.pbs.org/wgbh/pages/frontline/united-states-of-secrets/
- http://www.pbs.org/wgbh/pages/frontline/pressroom/press-release-united-states-of-secrets-how-the-government-came-to-spy-on-millions-of-americans/
- ______________________________________
- ¤ NSA, Google Inc. Relationship Emails ::
- http://cryptome.org/2014/05/nsa-google.pdf
- ¤ NSA Scares CEOs Into Cyber Spying (Related) ::
- http://cryptome.org/2014/05/nsa-scares-ceos.pdf
- ¤ Emails Reveal Close Google Relationship With NSA ::
- “Keep in mind that social media survives by
- selling user data. Spying is their business model.
- In padding their bottom lines executives have
- worked diligently to dilute privacy legislation
- in addition to garnering a myriad of fines. All
- of this data harvesting services a data broker
- industry which generates something in the
- neighborhood of $200 billion in revenue annually.”
- - Bill Blunden, counterpunch.org
- http://america.aljazeera.com/articles/2014/5/6/nsa-chief-google.html
- http://www.theregister.co.uk/2014/05/07/googles_nsa_data_dealings_not_as_bad_as_first_thought_theyre_much_worse/
- http://www.counterpunch.org/2014/05/09/the-nsas-corporate-collaborators/
- _______________________________________
- ¤ GCHQ Director Visits NSA for PRISM Data Access ::
- Hosted Dinner: 30 April 2013//1830Hrs - Quarters
- Hosted Discussions: 1 May 2013//0800-0830
- “PURPOSE OF THE VISIT: (U//FOUO) As the Director
- of GCHQ, Sir Iain wants to reconnect with NSA
- Leadership on matters of mutual concern, and to
- ensure each partner is aware of the other’s
- activities and future plans.” … …
- “Unsupervised access to FAA 702 data, in a manner
- similar to Olympics Option, remains on GCHQ’s wish
- list and is something its leadership still desires.”
- http://cryptome.org/2014/04/nsa-gchq-lobban-visit.pdf
- ¤ GCHQ Unsupervised PRISM Access in 2012 ::
- http://cryptome.org/2014/04/nsa-prism-olympics.pdf
- ¤ NSA Spied “Suspected Terrorists” At 2012 Olympics ::
- http://cryptome.org/2014/04/nsa-ghostmachine-echobase.pdf
- ¤ NSA & GCHQ Eyeballed “Suspected Terrorists” Before,
- During and After 2012 Olympics ::
- The Snowden files do not indicate whether NSA granted
- GCHQ’s request, but they do show that the NSA was
- “supportive” of the idea, and that GCHQ was permitted
- extensive access to PRISM during the London Olympics
- in 2012. The request for the broad access was
- communicated at “leadership” level, according to
- the documents. Neither agency would comment on the
- proposed arrangement or whether it was approved. … …
- The data sharing between the agencies during the
- Olympics, though, was not isolated to PRISM. … …
- The NSA was funneling troves of intercepted data
- to GCHQ from a system called GHOSTMACHINE, a massive
- cloud database used by the NSA to analyze metadata
- and store, according to one document in the Snowden
- archive, “100s of billions of entries.”
- https://firstlook.org/theintercept/article/2014/04/30/gchq-prism-nsa-fisa-unsupervised-access-snowden/
- _______________________________________
- ¤ NSA MYSTIC Telephone Interception Program ::
- http://s3.documentcloud.org/documents/1086618/mysticssoweeklybrief.pdf
- http://s3.documentcloud.org/documents/1086616/fromsso-key-brief-overview.pdf
- http://s3.documentcloud.org/documents/1088934/mystic-tearsheet-cropped-v2.pdf
- The National Security Agency has built a surveillance
- system capable of recording “100 percent” of a foreign
- country’s telephone calls, enabling the agency to rewind
- and review conversations as long as a month after they
- take place, according to people with direct knowledge of
- the effort and documents supplied by former contractor
- Edward Snowden.
- A senior manager for the program compares it to a time
- machine — one that can replay the voices from any call
- without requiring that a person be identified in advance
- for surveillance.
- The voice interception program, called MYSTIC, began in
- 2009. Its RETRO tool, short for “retrospective retrieval,”
- and related projects reached full capacity against the
- first target nation in 2011. Planning documents two years
- later anticipated similar operations elsewhere.
- In the initial deployment, collection systems are recording
- “every single” conversation nationwide, storing billions of
- them in a 30-day rolling buffer that clears the oldest
- calls as new ones arrive, according to a classified summary.
- The call buffer opens a door “into the past,” the summary
- says, enabling users to “retrieve audio of interest that
- was not tasked at the time of the original call.” Analysts
- listen to only a fraction of 1 percent of the calls, but
- the absolute numbers are high. Each month, they send
- millions of voice clippings, or “cuts,” for processing
- and long-term storage.
- http://www.washingtonpost.com/world/national-security/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls/2014/03/18/226d2646-ade9-11e3-a49e-76adc9210f19_story.html
- ¤ Washington Post Censors MYSTIC Slides ::
- The Washington Post is reporting, based on the
- files of whistleblower Edward Snowden, that the NSA
- is able to store every phone call made in an entire
- nation and replay them for up to 30 days. Not only
- can the agency do this, but there is a country where
- it’s actually doing this now–the Post knows where,
- but they won’t say.
- http://www.fair.org/blog/2014/03/19/the-nsa-built-a-time-machine-but-washington-post-wont-say-where/
- ¤ NSA Records All Phone Calls Using Project MYSTIC ::
- http://www.youtube.com/watch?v=NYq44T5e3lU
- Mirror here » http://fileb.ag/3cva7msxqefx
- _______________________________________
- ¤ NSA/NIS Dagbladet Documents Decensored ::
- There are a couple images in the latest Dagbladet
- story from the Snowden trove that were originally
- blurred instead of blacked out. This allowed the
- text to be recovered. There was no particular point
- in making a project out of the first, since it had
- already been published previously. The second was
- completely decoded in a matter of a few hours.
- http://cryptome.org/2014/04/DagbladetDecensor.pdf
- ¤ NSA/NIS Aquired Supercomputer to Break Crypto ::
- The Norwegian Inteligence Service (NIS) is also
- nauseous from the unmanageable amounts of data it
- is served daily. This is partly the reason why NSA
- now purchases a supercomputer codenamed Steelwinter.
- This information comes from a document Edward Snowden
- took from NSA and has later shared with Dagbladet.
- The document, marked “top secret” is a summary of
- how the NSA sees the collaboration with Norway after
- a meeting between the two services in March 2013.
- The supercomputer NIS buys is a derivation of the
- so-called Windsor Blue supercomputer.
- “NIS is in the process of acquiring STEEL WINTER
- (a WINDSORBLUE derivative supercomputer) and has
- entered into a partnership with NSA - cryptanalysis
- ( ...) service to develop applications of mutual
- benefit” the document says.
- “Windsor Blue” is the name of a program for
- supercomputers at the American IT-giant IBM. The
- company is working towards creating a so-called
- exascale supercomputer which means it can make a
- quintillion - 1,000,000,000,000,000,000 - calculations
- per second.
- http://www.dagbladet.no/2014/04/26/nyheter/snowden_i_norge/edward_snowden/nsa/etterretningstjenesten/32991102/
- _______________________________________
- ¤ Germany Blocks Edward Snowden From Testifying ::
- http://www.theguardian.com/world/2014/may/01/germany-edward-snowden-nsa-inquiry
- _______________________________________
- ¤ NSA Spies More on Americans Than Russians ::
- http://www.nationaljournal.com/tech/edward-snowden-nsa-spies-more-on-americans-than-russians-20140430
- _______________________________________
- ¤ Snowden Asks Putin About Russian Spying ::
- http://www.youtube.com/watch?v=w1yH554emkY
- http://rt.com/news/snowden-putin-spy-online-140/
- http://www.zerohedge.com/news/2014-04-17/snowden-calls-putin-telethon-discuss-legality-mass-surveillance
- _______________________________________
- ¤ NSA Spied on Human Rights Workers ::
- The US has spied on the staff of prominent
- human rights organisations, Edward Snowden has
- told the Council of Europe in Strasbourg, Europe’s
- top human rights body.
- Giving evidence via a videolink from Moscow,
- Snowden said the National Security Agency – for
- which he worked as a contractor – had deliberately
- snooped on bodies like Amnesty International and
- Human Rights Watch.
- http://www.theguardian.com/world/2014/apr/08/edwards-snowden-us-government-spied-human-rights-workers
- ¤ Edward Snowden Testimony @ Parliamentary Assembly
- of the Council of Europe (Full) ::
- http://www.youtube.com/watch?v=3f8Lunf1a2w
- _______________________________________
- ¤ EU High Court Allows Banning Metadata Collection ::
- Due to the particularities of EU lawmaking, the
- effects of the directive (spying) will still be in
- place in most EU member states for the time being.
- According to EU legal procedure, a directive is
- a type of law that requires each of the 28 member
- countries to “transpose” it into their own national
- laws. In this case, countries could even choose
- whether to expand the six-month requirement to as
- high as two years. ... ...
- Current EU data retention law will remain in
- effect until repealed legislatively or invalidated
- by domestic courts.
- http://arstechnica.com/tech-policy/2014/04/eu-high-court-strikes-down-metadata-collection-law/
- _______________________________________
- ¤ Masterspy Orders Snub on Media Contacts ::
- http://www.infowars.com/intelligence-head-who-lied-to-congress-bans-employees-from-talking-to-media/
- _______________________________________
- ¤ US Whines - ‘Anti-Snooping Plans are Unfair’ ::
- “Recent proposals from countries within the
- European Union to create a Europe-only electronic
- network (dubbed a ‘Schengen cloud’ by advocates) or
- to create national-only electronic networks could
- potentially lead to effective exclusion or discrimination
- against foreign service suppliers that are directly
- offering network services, or dependent on them,”
- the USTR said in its annual report.
- http://www.ustr.gov/sites/default/files/2014%20NTE%20Report%20on%20FTB.pdf
- http://inserbia.info/today/2014/04/us-blasts-eus-plan-for-schengen-cloud/
- http://rt.com/news/us-europe-nsa-snowden-549/
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ ACLU Offers NSA Document Search ::
- https://www.aclu.org/nsa-documents-search
- ¤ ACLU Offers Mirrored NSA Documents ::
- https://www.aclu.org/nsa-documents-released-public-june-2013
- _______________________________________
- ¤ KILLCEN ; Eyeballing_Snowden_Info.zip ::
- Includes all news reports, videos, images, slides
- and documents from and related to Snowden’s leaks
- so far, up to April 2nd of 2014. I’m still collecting
- any information that comes out and will provide an
- updated archive from time to time.
- After decompression - the main folder is titled
- “Eyeballing_Snowden_Info” and it holds a total of
- 927MB decompressed.
- This was stored on an old OFFLINE system, without
- any WiFi card or modem attached so the archive is
- safe from being modified, exploited or stolen.
- Eyeballing_Snowden_Info.zip
- (1,325 files | ZIP | 743MB)
- http://fileb.ag/1ixi6dqmbj80
- http://fpsbay.com/download/64465X13965734822241X344921/Eyeballing_Snowden_Info.zip
- http://davvas.com/l21m47ls819e
- http://jumbofiles.org/newfile?n=528498&Eyeballing_Snowden_Info.zip
- _______________________________________
- ¤ It’s Finally Admitted! ::
- https://www.documentcloud.org/documents/1100298-unclassified-702-response.html
- http://www.emptywheel.net/2014/04/01/james-clapper-confirms-vadm-mike-rogers-needlessly-obfuscated-in-confirmation-hearing/
- http://www.theguardian.com/world/2014/apr/01/nsa-surveillance-loophole-americans-data
- http://www.zdnet.com/nsa-searched-u-s-calls-emails-without-warrant-u-s-intelligence-chief-admits-7000027938/
- http://rt.com/usa/clapper-wyden-nsa-fisa-665/
- _______________________________________
- ¤ NSA Spy Chiefs of State ::
- http://cryptome.org/2014/03/nsa-spy-cos.pdf
- ¤ NSA Spy Chiefs of State (Full List) ::
- http://cryptome.org/2014/03/nsa-nymrod-spy-cos.pdf
- ¤ GCHQ and NSA Targeted Private German Companies ::
- http://www.spiegel.de/international/germany/gchq-and-nsa-targeted-private-german-companies-a-961444.html
- https://firstlook.org/theintercept/article/2014/03/29/der-spiegel-nsa-ghcq-hacked-german-companies-put-merkel-list-122-targeted-leaders/
- https://www.wsws.org/en/articles/2014/03/31/nsas-m31.html
- http://leaksource.info/2014/03/31/122-country-leaders-in-nsas-target-knowledge-database-2009-document/
- ▲ UPDATE ; European Parliament Suspends US
- Trade Talks Due to Political Spying ::
- http://falkvinge.net/2014/03/12/europarl-suspends-u-s-trade-talks-data-sharing-over-mass-surveillance/
- _______________________________________
- ¤ Video Demonstration of Two Intelligence Analysis Tools ::
- http://electrospaces.blogspot.se/2014/03/video-demonstration-of-two-intelligence.html
- ¤ Telephone Call Data Record Link Analysis Software ::
- http://www.youtube.com/watch?v=J38tKqq9kpY
- ¤ IBM i2 Analysts Notebook - Esri Edition ::
- http://www.youtube.com/watch?v=MJ5CovDQDYU
- ¤ Report and Both Videos ZIPPED & Mirrored ::
- http://fpsbay.com/download/64445X13961058822231X344721/Two%20Intelligence%20Analysis%20Tools.zip
- _______________________________________
- ¤ NSA’s New Civil Liberties and Privacy Officer ::
- Becky Richards promises more transparency. She
- also promises the NSA will “build privacy into
- new technologies” to “protect privacy and civil
- liberties” and “to be as transparent with the
- public as possible” as well helping the public
- “understand how we’re protecting their privacy,
- how we’re protecting national security.”
- http://cryptome.org/2014/03/nsa-richards-14-0320.htm
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA Huawei SHOTGIANT Hardware Exploit ::
- http://cryptome.org/2014/03/nsa-huawei.pdf
- http://cryptome.org/2014/03/nsa-huawei-02.pdf
- ¤ Huawei Global Cyber Security Assurance ::
- http://cryptome.org/2014/03/huawei-cyber-security.pdf
- ¤ Huawei Network Migration Tool (48.7MB) ::
- http://cryptome.org/2014/03/huawei-network-migration.zip
- ¤ NSA Breached Chinese Telecom Giant Huawei ::
- The American government conducted a major intelligence
- offensive against China, with targets including the
- Chinese government and networking company Huawei,
- according to documents from former NSA worker Edward
- Snowden that have been viewed by SPIEGEL and the
- New York Times. Among the American intelligence
- service’s targets were former Chinese President
- Hu Jintao, the Chinese Trade Ministry, banks, as
- well as telecommunications companies.
- But the NSA made a special effort to target Huawei.
- With 150,000 employees and €28 billion ($38.6 billion)
- in annual revenues, the company is the world’s second
- largest network equipment supplier. At the beginning
- of 2009, the NSA began an extensive operation, referred
- to internally as “Shotgiant,” against the company, which
- is considered a major competitor to US-based Cisco. The
- company produces smartphones and tablets, but also mobile
- phone infrastructure, WLAN routers and fiber optic cable
- -- the kind of technology that is decisive in the NSA’s
- battle for data supremacy.
- A special unit with the US intelligence agency succeeded
- in infiltrating Huwaei’s network and copied a list of
- 1,400 customers as well as internal documents providing
- training to engineers on the use of Huwaei products,
- among other things.
- http://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html
- http://www.spiegel.de/international/world/nsa-spied-on-chinese-government-and-networking-firm-huawei-a-960199.html
- http://news.yahoo.com/nsa-infiltrates-servers-china-telecom-giant-huawei-report-022030765--finance.html
- http://www.forbes.com/sites/rosatrieu/2014/03/24/chinas-huawei-condemns-nsa-spying-calls-for-unity-against-cyber-mischief/
- ¤ Hong Lei Responds to Huawei NSA Backdoors ::
- “We are seriously concerned with relevant reports. The
- media has disclosed a lot about the eavesdropping,
- surveillance and spying activities that the US has
- carried out on other countries, including China. China
- has lodged representations with the American side on
- many occasions. We require the American side to give a
- clear explanation and stop such behaviours.”
- http://www.fmprc.gov.cn/eng/xwfw/s2510/t1140281.shtml
- _______________________________________
- ¤ NSA Mapping and Spying System Administrators ::
- The document consists of several posts – one of
- them is titled “I hunt sys admins” – that were
- published in 2012 on an internal discussion board
- hosted on the agency’s classified servers. They
- were written by an NSA official involved in the
- agency’s effort to break into foreign network
- routers, the devices that connect computer
- networks and transport data across the Internet.
- By infiltrating the computers of system administrators
- who work for foreign phone and Internet companies,
- the NSA can gain access to the calls and emails
- that flow over their networks.
- The classified posts reveal how the NSA official
- aspired to create a database that would function
- as an international hit list of sys admins to
- potentially target. Yet the document makes clear
- that the admins are not suspected of any criminal
- activity – they are targeted only because they
- control access to networks the agency wants to
- infiltrate. “Who better to target than the person
- that already has the ‘keys to the kingdom’?” one
- of the posts says.
- The NSA wants more than just passwords. The document
- includes a list of other data that can be harvested
- from computers belonging to sys admins, including
- network maps, customer lists, business correspondence
- and, the author jokes, “pictures of cats in funny
- poses with amusing captions.”
- http://cryptome.org/2014/03/nsa-hunt-sysadmins.pdf
- https://firstlook.org/theintercept/document/2014/03/20/hunt-sys-admins/
- https://firstlook.org/theintercept/article/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/
- _______________________________________
- ¤ NSA Culture, 1980s to the 21st Century ::
- http://cryptome.org/2014/03/nsa-sid-culture.pdf
- _______________________________________
- ¤ CSEC SNOWGLOBE Slides ::
- http://cryptome.org/2014/03/cse-snowglobe.pdf
- http://s3.documentcloud.org/documents/1094526/babarfull.pdf
- ¤ Default Le Monde Report ::
- http://www.lemonde.fr/international/article/2014/03/21/quand-les-canadiens-partent-en-chasse-de-babar_4387233_3210.html
- ¤ Le Monde Report Translated to English ::
- http://slexy.org/view/s20ThA9Vog
- _______________________________________
- ¤ DNI National Security / Secrecy Panic ::
- http://cryptome.org/2014/03/litt-14-0318.pdf
- _______________________________________
- ¤ TED ; Ask Snowden ::
- http://www.youtube.com/watch?v=yVwAodrjZMY
- http://iroots.org/2014/03/18/transcript-edward-snowden-today-at-ted-talk/
- _______________________________________
- ¤ SXSW ; Ask Snowden ::
- http://www.youtube.com/watch?v=nRQTDNbYjqY
- http://cryptome.org/2014/03/snowden-sxsw.htm
- http://blog.inside.com/blog/2014/3/10/edward-snowden-sxsw-full-transcription-and-video
- _______________________________________
- ¤ NSA ; Ask Zelda ::
- http://cryptome.org/2014/03/nsa-ask-zelda.pdf
- https://firstlook.org/theintercept/article/2014/03/07/nsa-advice-columnist-seriously/
- _______________________________________
- ¤ NSA Third Party (Five Eye) Relationships ::
- http://cryptome.org/2014/03/nsa-third-parties.pdf
- _______________________________________
- ¤ Comsec as Essential Public Utility ::
- http://cryptome.org/2014/03/comsec-public-utility.htm
- ¤ Update ; Comsec as Essential Failure ::
- http://cryptome.org/2014/03/comsec-ewafmss.htm
- _______________________________________
- ¤ NSA/CSS Classification/Damage Control ::
- http://cryptome.org/2014/03/nsa-policy-1-52.pdf
- _______________________________________
- ¤ NSA/FBI Cryptanalysts Database Sharing ::
- http://cryptome.org/2014/03/nsa-crypt-fisa-share.pdf
- ▲ FBI’s Data Intercept Technology Unit (DITU) ::
- http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work
- ▲ FISA Court Releases FBI Spy Documents ::
- http://cryptome.org/2013/09/fisc-13-0917-4.pdf
- _______________________________________
- ¤ STELLARWIND Classification Guide ::
- http://cryptome.org/2014/03/nsa-stellarwind-class.pdf
- ▲ NSA ; STELLARWIND Program ::
- http://cryptome.org/2013/06/nsa-stellar-wind.pdf
- _______________________________________
- ¤ FISC Orders to Preserve NSA Metadata Spying ::
- http://cryptome.org/2014/03/fisc-br14-01-order-14-0312.pdf
- http://cryptome.org/2014/03/fisc-br14-01-tro-14-0311.pdf
- _______________________________________
- ¤ How the NSA Plans to Infect Millions of Computers
- With Malware ::
- Top-secret documents reveal that the National
- Security Agency is dramatically expanding its
- ability to covertly hack into computers on a mass
- scale by using automated systems that reduce the
- level of human oversight in the process.
- The classified files – provided previously by NSA
- whistleblower Edward Snowden – contain new details
- about groundbreaking surveillance technology the
- agency has developed to infect potentially millions
- of computers worldwide with malware “implants.” The
- clandestine initiative enables the NSA to break into
- targeted computers and to siphon out data from foreign
- Internet and phone networks.
- https://prod01-cdn02.cdn.firstlook.org/wp-uploads/2014/03/nsa_malware_feature.jpg
- https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/turbine-large.jpg
- https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/tao-2-1024x768.png
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1076889/nsa-technology-directorate-analysis-of-converged.pdf
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1077724/industry-scale-exploitation.pdf
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1077721/thousands-of-implants.pdf
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1076859/nsa-phishing-tactics-and-man-in-the-middle-attacks.pdf
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pdf
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1076862/quantum-insert-diagrams.pdf
- The covert infrastructure that supports the hacking
- efforts operates from the agency’s headquarters in
- Fort Meade, Maryland, and from eavesdropping bases
- in the United Kingdom and Japan. GCHQ, the British
- intelligence agency, appears to have played an integral
- role in helping to develop the implants tactic.
- The implants being deployed were once reserved for
- a few hundred hard-to-reach targets, whose communications
- could not be monitored through traditional wiretaps. But
- the documents analyzed by The Intercept show how the NSA
- has aggressively accelerated its hacking initiatives in
- the past decade by computerizing some processes previously
- handled by humans. The automated system – codenamed TURBINE
- – is designed to “allow the current implant network to
- scale to large size (millions of implants) by creating
- a system that does automated control implants by groups
- instead of individually.”
- https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/
- ¤ “Thousands of Implants” ::
- “Building the operations floor and increasing the number
- of break-out rooms will enable us to grow from the current
- average of these operations per clay to over per day and will
- facilitate the integration of 55 computer network operations
- and real--time customer support. Sustained collection involving
- automated implants pushing collected data from targets to the
- RDC as well as voice and geolocation collection are managed from
- the Operations Teaming Areas. The increased capacity in this
- area will support a growth from managing an average of I 543
- active implants today to simultaneously managing thousands of
- implanted targets. The increased personnel capacity will support
- this net growth in operations tempo and will allow the integration
- of TAD's Requirements Targeting Division alongside the operators
- in order to better target development and efficiently plan and
- execute endpoint operations.”
- http://cryptome.org/2014/03/nsa-thousands-implants.pdf
- According to one top-secret document from 2012, the agency
- can deploy malware by sending out spam emails that trick targets
- into clicking a malicious link. Once activated, a “back-door
- implant” infects their computers within eight seconds.
- There’s only one problem with this tactic, codenamed WILLOWVIXEN:
- According to the documents, the spam method has become less
- successful in recent years, as Internet users have become wary
- of unsolicited emails and less likely to click on anything that
- looks suspicious.
- Consequently, the NSA has turned to new and more advanced
- hacking techniques. These include performing so-called
- “man-in-the-middle” and “man-on-the-side” attacks, which
- covertly force a user’s internet browser to route to NSA
- computer servers that try to infect them with an implant.
- To perform a man-on-the-side attack, the NSA observes a
- target’s Internet traffic using its global network of covert
- “accesses” to data as it flows over fiber optic cables or
- satellites. When the target visits a website that the NSA
- is able to exploit, the agency’s surveillance sensors alert
- the TURBINE system, which then “shoots” data packets at the
- targeted computer’s IP address within a fraction of a second.
- In one man-on-the-side technique, codenamed QUANTUMHAND,
- the agency disguises itself as a fake Facebook server. When
- a target attempts to log in to the social media site, the
- NSA transmits malicious data packets that trick the target’s
- computer into thinking they are being sent from the real
- Facebook. By concealing its malware within what looks like
- an ordinary Facebook page, the NSA is able to hack into the
- targeted computer and covertly siphon out data from its
- hard drive. A top-secret animation demonstrates the tactic
- in action.
- ¤ How the NSA Secretly Masqueraded as Facebook to Hack
- Computers for Surveillance ::
- https://player.vimeo.com/video/88822483
- and @ https://www.youtube.com/watch?v=Td8nZscYvT4
- Mirrored » http://megaswf.com/f/2647410
- According to Matt Blaze, a surveillance and cryptography
- expert at the University of Pennsylvania, it appears that
- the QUANTUMHAND technique is aimed at targeting specific
- individuals. But he expresses concerns about how it has
- been covertly integrated within Internet networks as part
- of the NSA’s automated TURBINE system.
- ¤ NSA TURBINE Automated Hacking Documents (Mirrored) ::
- http://cryptome.org/2014/03/nsa-turbine-turmoil.pdf
- http://cryptome.org/2014/03/nsa-industry-exploit.pdf
- http://cryptome.org/2014/03/nsa-converged.pdf
- http://cryptome.org/2014/03/nsa-quantum-insert.pdf
- http://cryptome.org/2014/03/nsa-thousands-implants.pdf
- http://cryptome.org/2014/03/nsa-gchq-quantumtheory.pdf
- http://cryptome.org/2014/03/nsa-more-than-one-way.pdf
- http://cryptome.org/2014/03/nsa-hammerchant.pdf
- http://cryptome.org/2014/03/nsa-phishing-mtm.pdf
- http://cryptome.org/2014/03/tao-quantuminsert-bonanza.htm
- ¤ Compare TURBINE Slides (Spiegel vs Intercept) ::
- http://cryptome.org/2014/03/nsa-spot-differences.pdf
- ¤ NSA Denies Thousands of Implants ::
- http://cryptome.org/2014/03/nsa-14-0313.pdf
- _______________________________________
- ¤ NSA Hacking Routers & Social Media (Misc) ::
- http://cryptome.org/2014/03/nsa-5-eyes-hacking.pdf
- http://cryptome.org/2014/03/nsa-menwith-xkeyscore.pdf
- http://cryptome.org/2014/03/nsa-selector.pdf
- _______________________________________
- ¤ Cryptome Eyeballs Deputy Director Richard Ledgett ::
- http://cryptome.org/2014-info/richard-ledgett/richard-ledgett.htm
- _______________________________________
- ¤ NSA Assistance to Dutch Somali Piracy Control ::
- Alliances between security services are usually
- kept secret. But thousands of NSA documents are
- now in the hands of a select group of journalists,
- thanks to former NSA worker Edward Snowden. They
- show that the NSA is the central organisation in
- an international exchange of tapped telephone and
- internet traffic.
- The Netherlands is also a part of this. In September,
- the German weekly Der Spiegel published an NSA document
- about the Netherlands. The graph, entitled ‘Netherlands
- – 30 days’, appeared to show that the NSA had listened
- in to 1.8 million Dutch telephone calls.
- But last month, the cabinet showed that the reality
- was different. The 1.8 million telephone calls, wrote
- home affairs minister Ronald Plasterk and defence
- minister Jeanine Hennis, were not intercepted by
- the Americans, but by the Dutch and then shared with
- the NSA. It was not American, but Dutch espionage.
- Two new documents give further details. The Netherlands,
- it transpires, intercepts vast amounts of Somali
- telephone traffic and shares it with the NSA. The
- Dutch use the information to combat piracy. But the
- Americans may possibly use the information for
- something else as well: taking out terrorism suspects
- by attacking them with armed drones.
- http://cryptome.org/2014/03/nsa-dutch-assist.pdf
- http://www.nrc.nl/nieuws/2014/03/05/the-secret-role-of-the-dutch-in-the-american-war-on-terror/
- _______________________________________
- ¤ NSA Blames Tech Firms, Vice Versa ::
- http://cryptome.org/2014/03/tech-stop-spying.htm
- http://cryptome.org/2014/03/big-data-spying.htm
- ---------------------------------------
- ¤ Tech Firms Spy ::
- http://cryptome.org/isp-spy/online-spying.htm
- ¤ NSA Spies Too ::
- https://www.aclu.org/nsa-documents-released-public-june-2013
- _______________________________________
- ¤ GCHQ “OPTIC NERVE” Spy Programme ::
- http://cryptome.org/2014/02/gchq-optic-nerve.pdf
- ¤ GCHQ Collects Webcam Photos of Yahoo Users ::
- The documents show that images were collected
- from webcams at regular intervals, one image
- every five minutes, and were used by the spy
- agency to trial automated facial recognition
- programs.
- http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo
- http://www.infowars.com/you-read-it-here-first-government-spies-on-innocent-people-via-webcams-laptops-xbox/
- http://news.softpedia.com/news/GCHQ-Collected-Webcam-Images-of-Millions-of-Yahoo-Fans-429705.shtml
- https://www.wsws.org/en/articles/2014/02/28/gchq-f28.html
- ¤ FLASHBACK ; Infowars Warned Users in 2006 ::
- http://www.infowars.com/articles/bb/gov_industry_use_computer_mics_spy_on_americans.htm
- _______________________________________
- ¤ NSA Director Alexander’s Phones ::
- http://electrospaces.blogspot.com/2014/02/nsa-director-alexanders-phones.html
- _______________________________________
- ¤ NSA Seeks to Expand Database, 26 Feb 2014 ::
- http://www.breitbart.com/InstaBlog/2014/02/27/NSA-Seeks-to-Expand-Database
- http://www.uscourts.gov/uscourts/courts/fisc/br14-01-motion-140226.pdf
- _______________________________________
- ¤ NSA Bugged Top German Officials After Orders
- Not to Spy On Chancellor Claims New Whistleblower ::
- http://www.mintpressnews.com/snowden-2-0-new-active-duty-nsa-whistleblower/180502/
- http://techcrunch.com/2014/02/24/report-nsa-bugged-top-german-officials-after-obama-ordered-cease-of-spying-on-chancellor/
- _______________________________________
- ¤ NSA Observer ::
- https://nsa-observer.laquadrature.net/
- _______________________________________
- ¤ Spy Documents Released Since June 2013 ::
- https://www.aclu.org/nsa-documents-released-public-june-2013
- http://cryptome.org/2014/02/snowden-tabulations.htm
- _______________________________________
- ¤ NSA Spying Zero Hedge Connections ::
- http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2014/02/ZH%20browsing%20govt_1.jpg
- http://www.zerohedge.com/news/2014-02-19/while-browsing-zero-hedge-certain-government-agency
- _______________________________________
- ¤ NYT Samantha Storey Inept Redactions ::
- Inlcudes two GCHQ documents.
- 01 “MOBILE THEME BRIEFING MAY 28 2010”
- 02 “Converged Analysis of Smartphone Devices”
- http://cryptome.org/2014/02/nyt-leak.zip
- _______________________________________
- ¤ NSA’s Secret Role in the US Assassination Program ::
- An anonymous former drone operator for Joint
- Special Operations Command (JSOC) told The
- Intercept — a new publication helmed by
- Glenn Greenwald, who broke the first of many
- NSA revelations last year — that the US military
- and CIA use the NSA’s metadata analysis and
- phone-tracking abilities to identify airstrike
- targets without confirming their veracity on
- the ground.
- https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/
- https://www.activistpost.com/2013/10/add-death-by-drone-to-nsas-list-of.html
- http://www.infowars.com/new-whistleblower-reveals-nsa-picking-drone-targets-based-on-bad-data-death-by-unreliable-metadata/
- _______________________________________
- ¤ ASD Helps NSA Spy on Law Firms, Laywers ::
- A top-secret document, obtained by the
- former NSA contractor Edward J. Snowden,
- shows that an American law firm was
- monitored while representing a foreign
- government in trade disputes with the
- United States. The disclosure offers a
- rare glimpse of a specific instance in
- which Americans were ensnared by the
- eavesdroppers, and is of particular
- interest because lawyers in the United
- States with clients overseas have
- expressed growing concern that their
- confidential communications could be
- compromised by such surveillance.
- http://www.nytimes.com/2014/02/16/us/eavesdropping-ensnared-american-law-firm.html
- http://www.activistpost.com/2014/02/new-snowden-docs-implicate-nsa-in.html
- http://thehill.com/blogs/global-affairs/asia-pacific/198506-report-spies-watched-us-lawyers-in-trade-deal
- NOBODY comments
- NY Times has not provided any documentation.
- There should be an FOIA request to the IC
- and perhaps to the DNI for this document to
- be declassified for research in public domain.
- _______________________________________
- ¤ NSA FISA Business Spying ::
- http://cryptome.org/2014/02/nsa-fisa-business.pdf
- ¤ NSA Course on FISA Spying Operations ::
- http://cryptome.org/2014/02/nsa-fisa-course.pdf
- _______________________________________
- ¤ Snowden Allegedly Used Web Scraper Tool ::
- http://www.nytimes.com/2014/02/09/us/snowden-used-low-cost-tool-to-best-nsa.html?hp&_r=1
- _______________________________________
- ¤ Ex-chancellor Gerhard Schröder Allegedly
- Spied by NSA (No Documentation Presented) ::
- Munich daily Sueddeutsche Zeitung and
- public broadcaster NDR reported Tuesday
- that Merkel’s predecessor Gerhard Schroeder
- was added to the NSA’s National Sigint
- Requirement List as number 388 in 2002.
- http://www.dw.de/reports-nsa-first-targeted-german-chancellor-schr%C3%B6der-then-merkel/a-17408683
- http://www.theguardian.com/world/2014/feb/04/us-nsa-gerhard-schroeder-surveillance?view=mobile
- http://www.faz.net/aktuell/politik/ausland/ausspaeh-affaere-die-spionage-botschaft-12635377.html
- ¤ New Interpretations of NSA Monitoring
- the German Chancellor ::
- http://electrospaces.blogspot.de/2014/02/new-interpretations-of-nsa-monitoring.html
- _______________________________________
- ¤ Dutch Intelligence Claims Responsibility for
- Phone Call Spying ::
- http://www.dutchnews.nl/news/archives/2014/02/the_netherlands_not_usa_gather.php
- http://static3.volkskrant.nl/static/asset/2014/kamerbrief_met_reactie_op_berichtgeving_metadata_telefoonverkeer_3761.pdf
- _______________________________________
- ¤ First Congressman To Battle the NSA is Dead ::
- http://pando.com/2014/02/04/the-first-congressman-to-battle-the-nsa-is-dead-no-one-noticed-no-one-cares/
- _______________________________________
- ¤ Mike Rogers Wants Journalists With Leaks Jailed ::
- http://nypost.com/2014/02/05/pol-journalist-fencing-snowden-secrets-should-be-jailed/
- _______________________________________
- On Saturday 20 July 2013, in the basement of the
- Guardian’s office in Kings Cross, London, watched by
- two GCHQ technicians, Guardian editors destroyed
- hard drives and memory cards on which encrypted files
- leaked by Edward Snowden had been stored. This is
- the first time footage of the event has been released.
- http://www.youtube.com/watch?v=bUokM5d1qic
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ CSEC IP Profiling & Mission Impacts ::
- http://www.cbc.ca/news2/pdf/airports_redacted.pdf
- http://cryptome.org/2014/01/csec-ip-profile.pdf
- ¤ CSEC Objects to Disclosure of IP Profiling ::
- http://cryptome.org/2014/01/csec-14-0131.pdf
- ¤ CSEC Used Airport Wi-Fi to Track Travellers ::
- A top secret document retrieved by US whistleblower
- Edward Snowden and obtained by CBC News shows
- that Canada’s electronic spy agency used information
- from the free internet service at a major Canadian
- airport to track the wireless devices of thousands
- of ordinary airline passengers for days after they
- left the terminal.
- After reviewing the document, one of Canada’s
- foremost authorities on cyber-security says the
- clandestine operation by the Communications
- Security Establishment Canada (CSEC) was almost
- certainly illegal. ... ...
- The document indicates the passenger tracking
- operation was a trial run of a powerful new
- software program CSEC was developing with help
- from its US counterpart, the NSA.
- In the document, CSEC called the new technologies
- “game-changing,” and said they could be used for
- tracking “any target that makes occasional forays
- into other cities/regions.”
- http://www.cbc.ca/news/politics/csec-used-airport-wi-fi-to-track-canadian-travellers-edward-snowden-documents-1.2517881
- CSEC concluded: “Can then take seeds from these
- airports and repeat to cover whole world.”
- http://arstechnica.com/tech-policy/2014/01/new-snowden-docs-show-canadian-spies-tracked-thousands-of-travelers/
- ¤ More Details Into CSEC IP Profiling ::
- http://electrospaces.blogspot.fr/2014/02/did-csec-really-tracked-canadian.html
- ¤ How Canada’s CSEC Maps Phone and Internet Connections ::
- http://electrospaces.blogspot.com/2014/03/olympia-how-canadas-csec-maps-phone-and.html
- _______________________________________
- ¤ NSA, GCHQ Allegedly Hack Cryptographer ::
- http://cryptome.org/2014/02/nsa-gchq-quisquater.pdf
- ¤ ... And Now It’s Personal ::
- http://cryptome.org/2014/02/stopping-nsa.htm
- _______________________________________
- ¤ GCHQ Snooped on YouTube and Facebook ::
- Documents taken from the National Security
- Agency by Edward Snowden and obtained by NBC
- News detail how British cyber spies demonstrated
- a pilot program to their US partners in 2012
- in which they were able to monitor YouTube in
- real time and collect addresses from the billions
- of videos watched daily, as well as some user
- information, for analysis. At the time the
- documents were printed, they were also able to
- spy on Facebook and Twitter.
- Called “Psychology A New Kind of SIGDEV”
- (Signals Development), the presentation includes
- a section that spells out “Broad real-time
- monitoring of online activity” of YouTube videos,
- URLs “liked” on Facebook, and Blogspot/Blogger
- visits. The monitoring program is called
- “Squeaky Dolphin.”
- Experts told NBC News the documents show the
- British had to have been either physically able
- to tap the cables carrying the world’s web
- traffic or able to use a third party to gain
- physical access to the massive stream of data,
- and would be able to extract some key data
- about specific users as well.
- http://cryptome.org/2014/01/gchq-squeaky-dolphin.pdf
- http://cryptome.org/2014/01/gchq-newtons-cat.pdf
- http://msnbcmedia.msn.com/i/msnbc/Sections/NEWS/snowden_youtube_nbc_document.pdf
- http://investigations.nbcnews.com/_news/2014/01/27/22469304-snowden-docs-reveal-british-spies-snooped-on-youtube-and-facebook?lite
- _______________________________________
- ¤ NSA/GCHQ Smartphone App Location Spying ::
- http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data
- https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data
- http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html?_r=0
- ¤ GCHQ Mobile Theme Briefing ::
- “Over 200 3rd party Location Aware Applications
- on the iPhone alone.”
- http://cryptome.org/2014/01/gchq-mobile-theme.pdf
- ¤ NSA Converged Analysis of Smartphone Devices ::
- “Android Phones pass GPS data in the clear.”
- http://cryptome.org/2014/01/nsa-smartphones-analysis.pdf
- _______________________________________
- ¤ Obama Grants NSA Exemption From Law ::
- The National Security Agency program that
- collects data on nearly every US phone call
- isn’t legal, a privacy review board said
- Thursday in a newly released report.
- http://cryptome.org/2014/01/pclob-14-0123.pdf
- “We have not identified a single instance
- involving a threat to the United States in
- which the program made a concrete difference
- in the outcome of a counterterrorism
- investigation,” the board wrote in the
- report released Thursday.
- Despite Obama’s promise to reform the NSA,
- domestic spying will continue.
- http://edition.cnn.com/2014/01/23/politics/nsa-telephone-records-privacy/index.html?hpt=hp_t3
- _______________________________________
- ¤ Snowden Speaks ::
- http://cryptome.org/2014/01/snowden-video-13-0126.zip
- _______________________________________
- ▼ Snowden Calls Russian-Spy Story “Absurd” ::
- http://www.newyorker.com/online/blogs/newsdesk/2014/01/snowden-calls-russian-spy-story-absurd.html
- ▲ NSA is NOT the Source of All Spying ::
- ¯¯¯
- http://20committee.com/2014/01/18/the-end-of-the-snowden-operation/
- NOBODY’s comment blocked @ 20committee.com
- Reform? Reform was never intended to come
- from politicians or the white house. Reform
- will come from peoples’ change of online use ;
- growing public use of open-source encryption,
- growing use of services such as Tor, a growing
- amount of computers air-gapped, growing use of
- hardcopy backups rather than “the cloud” - and
- add to that, more people bleaching their cookies
- among other web browser cache, surging VPN use,
- growing use of proxies. Sudden disconnections
- of users’ modems when not actually being used. The
- use of alternative search engines (such as ixquick,
- duckduckgo, startpage, privatelee, et al) and
- also consider the growing use of XPIs such as
- Noscript, Ghostery, HTTPS Everywhere and others.
- Reform?
- How about the death of RSA and a new generation
- of young privacy-crypto-enthusiasts who start to
- say “fuck the corporate platforms” and change it
- whether legal or not?
- The reform will come from people taking action.
- Here’s what I’d like to know - will “big government”
- follow up reform with their “internet kill switch?”
- _______________________________________
- ¤ NSA Redactions Fail, Fail and Fail Again ::
- http://cryptome.org/2014/01/nsa-redaction-fails.pdf
- _______________________________________
- ¤ NSA’s Upstream Collection Detailed ::
- The corporate partnerships are one of
- three ways NSA is intercepting the world’s
- main internet cables:
- - Cooperation with telecommunication companies
- - Cooperation with foreign intelligence agencies
- - Unilateral cable tapping operations
- http://electrospaces.blogspot.de/2014/01/slides-about-nsas-upstream-collection.html
- ---------------------------------------
- http://postimg.org/image/9viuxblpd/
- http://www.youtube.com/watch?v=kOAv7zbJkCk
- http://www.dailydot.com/news/nsa-fairview-slides-brazil-spying/
- http://cryptome.org/2013/08/nsa-codenames.htm
- _______________________________________
- ¤ 24 FISA Court Documents DECLASSIFIED ::
- http://cryptome.org/2014/01/fisc-13-0117.zip
- ¤ FISA Court Orders Comparison ::
- http://cryptome.org/vz-slip.jpg
- http://cryptome.org/2014/01/fisc/fisc-orders-compare.htm
- http://cryptome.org/2014/01/fisc2/fisc-before-after-obama.htm
- http://cryptome.org/2014/01/fisc3/fisc-br-11-07-v-11-57.htm
- ---------------------------------------
- http://icontherecord.tumblr.com/
- _______________________________________
- ¤ SMS Text Messages - A Goldmine to Exploit ::
- http://cryptome.org/2014/01/nsa-sms-exploit.pdf
- http://s3.documentcloud.org/documents/1006111/sms.pdf
- ¤ NSA Vacuuming SMS Texts Around the World ::
- The documents also reveal the UK spy agency
- GCHQ has made use of the NSA database to search
- the metadata of “untargeted and unwarranted”
- communications belonging to people in the UK.
- The NSA program, codenamed Dishfire, collects
- “pretty much everything it can”, according to
- GCHQ documents, rather than merely storing the
- communications of existing surveillance targets.
- The NSA has made extensive use of its vast
- text message database to extract information
- on people’s travel plans, contact books, financial
- transactions and more – including of individuals
- under no suspicion of illegal activity.
- http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep
- _______________________________________
- ¤ NSA Covert Radio Signals Break Air-gaps ::
- http://cryptome.org/2014/01/nsa-quantum-radio.htm
- http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html
- The technology, which the agency has used
- since at least 2008, relies on a covert
- channel of radio waves that can be transmitted
- from tiny circuit boards and USB cards inserted
- surreptitiously into the computers. In some
- cases, they are sent to a briefcase-size
- relay station that intelligence agencies can
- set up miles away from the target.
- The radio frequency technology has helped
- solve one of the biggest problems facing
- American intelligence agencies for years:
- getting into computers that adversaries,
- and some American partners, have tried to
- make impervious to spying or cyberattack.
- In most cases, the radio frequency hardware
- must be physically inserted by a spy, a
- manufacturer or an unwitting user.
- ---------------------------------------
- Refer to NSA’s Tailored Access Operations
- http://paste.cdtag.de/view.php?id=23643
- _______________________________________
- ¤ NSA Windows Event Monitoring ::
- http://cryptome.org/2014/01/nsa-windows-event.pdf
- ---------------------------------------
- ¤ Locate And Destroy WinRM Registry ::
- http://pastebin.jity.de/view/e8a662d4
- _______________________________________
- ¤ NSA Reducing the Effectiveness of Hash ::
- http://cryptome.org/2014/01/nsa-pass-hash.pdf
- _______________________________________
- ¤ NSA’s Organizational Designations ::
- http://electrospaces.blogspot.com/2014/01/nsas-organizational-designations.html
- _______________________________________
- ¤ Analysis of NSA’s 215 Metadata Spy Programs ::
- http://politicalscience.osu.edu/faculty/jmueller/NSAshane3.pdf
- _______________________________________
- ¤ John Inglis Explains Why US-Based Collection
- of Internet Metadata Doesn’t Work ::
- http://www.npr.org/2014/01/10/261282601/transcript-nsa-deputy-director-john-inglis?live=1
- http://www.emptywheel.net/2014/01/10/john-inglis-explains-why-us-based-collection-of-internet-metadata-doesnt-work/
- _______________________________________
- ¤ Rand Paul to Lead Class-Action Lawsuit
- Against Obama Over NSA Spying ::
- http://www.breitbart.com/Big-Government/2014/01/03/Rand-Paul-to-Sue-Obama-over-NSA-Spying
- _______________________________________
- ¤ NSA Quantum Computing Research for Cracking
- All Encryption ::
- In room-size metal boxes secure against
- electromagnetic leaks, the National Security
- Agency is racing to build a computer that
- could break nearly every kind of encryption
- used to protect banking, medical, business
- and government records around the world.
- According to documents provided by former
- NSA contractor Edward Snowden, the effort
- to build “a cryptologically useful quantum
- computer” — a machine exponentially faster
- than classical computers — is part of a
- $79.7 million research program titled
- “Penetrating Hard Targets.” Much of the
- work is hosted under classified contracts
- at a laboratory in College Park, Md.
- http://cryptome.org/2014/01/nsa-quantum-computer.pdf
- http://cryptome.org/2014/01/nsa-quantum-computer-2.pdf
- http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_print.html
- _______________________________________
- ¤ NSA and Random Number Generators ::
- http://blog.cryptographyengineering.com/2013/12/a-few-more-notes-on-nsa-random-number.html
- _______________________________________
- ¤ Updated List of NSA Codenames ::
- http://cryptome.org/2014/01/nsa-codenames.htm
- _______________________________________
- ¤ Jacob Appelbaum Explains New NSA Leaks ::
- https://www.youtube.com/watch?v=b0w36GAyZIA
- Mirror » http://fileb.ag/xwcp0jrewk2o
- ¤ Jacob’s NSA Slides @ioerror (ZIP) ::
- http://cryptome.org/2013/12/nsa-catalog.zip
- ¤ NSA Catalog Image Formats (16.7MB) Mirrored ::
- http://upsto.re/CtXqio
- http://f.lui.li/get_1228_a2b4.html
- http://blakker.pl/files/get/fenW1XyGrl/nsa-catalog-images.zip
- ¤ Documents Reveal Top NSA Hacking Unit ::
- The NSA’s TAO hacking unit is considered
- to be the intelligence agency’s top secret
- weapon. It maintains its own covert network,
- infiltrates computers around the world and
- even intercepts shipping deliveries to plant
- back doors in electronics ordered by those
- it is targeting. ... ...
- http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html
- The insert method and other variants of
- QUANTUM are closely linked to a shadow
- network operated by the NSA alongside the
- Internet, with its own, well-hidden
- infrastructure comprised of “covert”
- routers and servers. It appears the NSA
- also incorporates routers and servers
- from non-NSA networks into its covert
- network by infecting these networks with
- “implants” that then allow the government
- hackers to control the computers remotely.
- In this way, the intelligence service seeks
- to identify and track its targets based on
- their digital footprints. These identifiers
- could include certain email addresses or
- website cookies set on a person’s computer.
- Of course, a cookie doesn’t automatically
- identify a person, but it can if it includes
- additional information like an email address.
- In that case, a cookie becomes something
- like the web equivalent of a fingerprint.
- ---------------------------------------
- ¤ NSA QUANTUM Theory (FOXACID) ::
- http://cryptome.org/2013/12/nsa-quantumtheory.pdf
- ¤ NSA/GCHQ QUANTUM Tasking Techniques ::
- “YahooBcookie’s are unique to a specific
- computer and can hold other <yahoo> addresses
- that are being logged into on that computer
- as long as the user does not clear browser
- cookies.”
- http://cryptome.org/2013/12/nsa-quantum-tasking.pdf
- ¤ NSA QFIRE Packet Injection Attacks ::
- http://cryptome.org/2013/12/nsa-qfire.pdf
- ---------------------------------------
- ¤ NSA Catalog for Hardware Backdoors ::
- The specialists at ANT, which presumably
- stands for Advanced or Access Network Technology,
- could be described as master carpenters for
- the NSA’s department for Tailored Access
- Operations (TAO). In cases where TAO’s usual
- hacking and data-skimming methods don’t suffice,
- ANT workers step in with their special tools,
- penetrating networking equipment, monitoring
- mobile phones and computers and diverting or
- even modifying data. Such implants, as they are
- referred to in NSA parlance, have played a
- considerable role in the intelligence agency’s
- ability to establish a global covert network
- that operates alongside the Internet.
- Some of the equipment available is quite
- inexpensive. A rigged monitor cable that
- allows “TAO personnel to see what is displayed
- on the targeted monitor,” for example, is
- available for just $30. But an “active GSM
- base station” -- a tool that makes it possible
- to mimic a mobile phone tower and thus monitor
- cell phones -- costs a full $40,000. Computer
- bugging devices disguised as normal USB plugs,
- capable of sending and receiving data via radio
- undetected, are available in packs of 50 for
- over $1 million.
- The ANT division doesn’t just manufacture
- surveillance hardware. It also develops software
- for special tasks. The ANT developers have a
- clear preference for planting their malicious
- code in so-called BIOS, software located on a
- computer’s motherboard that is the first thing
- to load when a computer is turned on.
- This has a number of valuable advantages: an
- infected PC or server appears to be functioning
- normally, so the infection remains invisible
- to virus protection and other security programs.
- And even if the hard drive of an infected
- computer has been completely erased and a new
- operating system is installed, the ANT malware
- can continue to function and ensures that new
- spyware can once again be loaded onto what is
- presumed to be a clean computer. The ANT
- developers call this “Persistence” and believe
- this approach has provided them with the
- possibility of permanent access.
- Another program attacks the firmware in
- hard drives manufactured by Western Digital,
- Seagate, Maxtor and Samsung, all of which,
- with the exception of latter, are American
- companies. Here, too, it appears the US
- intelligence agency is compromising the
- technology and products of American companies.
- http://cryptome.org/2013/12/nsa-tao-ant-pdf.pdf
- http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html
- http://gizmodo.com/the-nsa-actually-intercepted-packages-to-put-backdoors-1491169592
- http://www.theguardian.com/world/2013/dec/29/der-spiegel-nsa-hacking-unit-tao
- https://www.wsws.org/en/articles/2013/12/31/snow-d31.html
- ¤ NSA Cisco / Juniper Router Backdoors ::
- http://cryptome.org/2013/12/nsa-ant-firewalls.pdf
- http://cryptome.org/2013/12/nsa-ant-router.pdf
- ¤ NSA Computer Monitor Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-bildschirm.pdf
- ¤ NSA PCI Bus Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-rechner.pdf
- ¤ NSA Motherboard Backdoor (#BadBIOS) ::
- http://cryptome.org/2013/12/nsa-ant-server.pdf
- ¤ NSA Keyboard Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-tastatu.pdf
- ¤ NSA Apple iPhone Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-handys.pdf
- ¤ NSA WiFi Card / Apple Airport Backdoors ::
- http://cryptome.org/2013/12/nsa-ant-mobilfunk.pdf
- ¤ NSA Active 802.11 Netcard Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-w-lan.pdf
- ¤ NSA USB Backdoor to Bridge Air-gaps ::
- http://cryptome.org/2013/12/nsa-ant-usb.pdf
- ¤ NSA Alternative SIGINT Hunter ::
- http://cryptome.org/2013/12/nsa-ant-raumuber.pdf
- ¤ NSA Keystroke, Screenshot & SIGINT Hunting ::
- http://cryptome.org/2013/12/greenwald-13-1231.pdf
- http://truth-out.org/news/item/20948-glenn-greenwald-the-nsa-can-literally-watch-every-keystroke-you-make
- ¤ Jacob Appelbaum Comment on Der Spiegel Reports ::
- http://cryptome.org/2014/01/appelbaum-der-spiegel.htm
- ---------------------------------------
- BLOWBACK SETS IN ...
- ¤ IT Firms Lose Billions After NSA Scandal ::
- http://www.independent.co.uk/life-style/gadgets-and-tech/news/it-firms-lose-billions-after-nsa-scandal-exposed-by-whistleblower-edward-snowden-9028599.html
- ¤ Foreign Firms Won’t Buy American Tech ::
- https://www.informationweek.com/security/risk-management/nsa-fallout-why-foreign-firms-wont-buy-american-tech/d/d-id/1113384
- ---------------------------------------
- ¤ Apple Claims They Know Nothing About Backdoors ::
- http://www.infowars.com/apple-says-it-knows-nothing-about-your-iphone-spying-on-you/
- ¤ Apple Inc. Lying Exposed ::
- Logs from a properly air-gapped Mac OSX show
- the system attempting to access the Airport -
- yet the Airport card was physically disconnected.
- http://pastebin.jity.de/view/77d624be
- ¤ Cyber–Security Experts Ask If Apple “Flaw”
- Was Really NSA Backdoor ::
- Following an admission by Apple that a “bug”
- in its operating system had left devices open
- to potential hacking, experts are questioning
- whether the security hole was intentional, in
- order to allow the NSA backdoor access as part
- of its mass spying program.
- http://www.infowars.com/cyber-security-experts-ask-apple-flaw-was-really-nsa-backdoor/
- ---------------------------------------
- ¤ Intel CEO Refuses To Answer Questions On
- Whether NSA Can Access Processors ::
- http://www.infowars.com/intel-ceo-refuses-to-answer-questions-on-whether-nsa-can-access-processors/
- ¤ Dell Inc. Apologizes for the ‘Inconvenience’
- of Helping NSA Install Backdoors ::
- http://www.techdirt.com/articles/20131230/17174425718/dells-twitter-account-apologizes-inconvenience-helping-nsa-place-hidden-bios-bug.shtml
- http://www.infowars.com/dells-twitter-account-apologizes-for-the-inconvenience-of-helping-nsa-install-spyware/
- ¤ Locate And Destroy 802.11 Registry ::
- How to disable SOMBERKNAVE implant to
- properly air-gap the Windows XP system.
- http://pastebin.jity.de/view/bdd440b3
- _______________________________________
- ¤ NSA Whistleblower ; Planned Police State ::
- http://www.youtube.com/watch?v=x9Kcgme2I0c
- ¤ NSA Whistleblower ; National Security Scam ::
- http://www.youtube.com/watch?v=xPemLhvwfos
- _______________________________________
- ¤ Edward Snowden Interview by Barton Gellman ::
- http://www.washingtonpost.com/world/national-security/edward-snowden-after-months-of-nsa-revelations-says-his-missions-accomplished/2013/12/23/49fc36de-6c1c-11e3-a523-fe73f0ff6b8d_story.html
- Beginning in October 2012, he said, he
- brought his misgivings to two superiors
- in the NSA’s Technology Directorate and
- two more in the NSA Threat Operations
- Center’s regional base in Hawaii. For
- each of them, and 15 other co-workers,
- Snowden said he opened a data query tool
- called BOUNDLESSINFORMANT, which used
- color-coded “heat maps” to depict the
- volume of data ingested by NSA taps.
- His colleagues were often “astonished to
- learn we are collecting more in the United
- States on Americans than we are on Russians
- in Russia,” he said. Many of them were
- troubled, he said, and several said they
- did not want to know any more.
- ---------------------------------------
- BOUNDLESS INFORMANT REPORTS/DOCS REFER HERE ;
- http://paste.cdtag.de/view.php?id=19580
- _______________________________________
- ¤ New York Judge, William Pauley III, Declares
- Metadata Hoarding Legal ::
- http://cryptome.org/2013/12/pauley-13-1227.pdf
- http://www.scribd.com/doc/194082600/NSA-Opinion
- http://www.politico.com/story/2013/12/nsa-phone-surveillance-ruling-101569.html
- http://www.infowars.com/judge-falls-for-the-big-lie-about-nsa-spying/
- /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/
- \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
- ¤ Judge Declares Metadata Hoarding Violates
- Fourth Amendment Rights ::
- http://cryptome.org/2013/12/klayman-048-049.pdf
- A federal judge ruled Monday that the
- National Security Agency program which
- collects information on nearly all telephone
- calls made to, from or within the United
- States is likely unconstitutional.
- US District Court Judge Richard Leon found
- that the program appears to violate the
- Fourth Amendment ban on unreasonable
- searches and seizures. He also said the
- Justice Department had failed to demonstrate
- that collecting the information had helped
- to head off terrorist attacks.
- Acting on a lawsuit brought by conservative
- legal activist Larry Klayman, Leon issued
- a preliminary injunction barring the NSA
- from collecting so-called metadata pertaining
- to the Verizon accounts of Klayman and one
- of his clients. However, the judge stayed
- the order to allow for an appeal.
- http://www.politico.com/story/2013/12/national-security-agency-phones-judge-101203.html
- http://www.wsws.org/en/articles/2013/12/17/cour-d17.html
- Leon’s 68-page opinion is the first
- significant legal setback for the NSA’s
- surveillance program since it was disclosed
- in June in news stories based on leaks
- from former NSA contractor Edward Snowden.
- For seven years, the metadata program has
- been approved repeatedly by numerous judges
- on the Foreign Intelligence Surveillance
- Court and found constitutional by at least
- one judge sitting in a criminal case.
- https://ecf.dcd.uscourts.gov/cgi-bin/show_public_doc?2013cv0851-48
- ¤ Klayman v. NSA 7 Court Documents ::
- http://cryptome.org/2013/12/klayman-051-058.zip
- ▼ Delay Motion for Class Action Lawsuit ::
- http://cryptome.org/2013/12/klayman-060.pdf
- ▲ White House Tries to Prevent Judge From
- Ruling on Surveillance Efforts ::
- http://www.nytimes.com/2013/12/22/us/white-house-tries-to-prevent-judge-from-ruling-on-surveillance-efforts.html?_r=0
- ¤ Bulk Metadata Collection Ruled Illegal ::
- http://cryptome.org/2013/12/leon-13-1216.pdf
- ---------------------------------------
- ¤ White House Spying Review Group Report ::
- http://cryptome.org/2013/12/obama-nsa-report.pdf
- ¤ White House Spy Report Commentary ::
- http://cryptome.org/2013/12/prgi-comments-001.htm
- http://cryptome.org/2013/12/prgi-comments-002.htm
- ¤ Obama Advisory Committee Whitewashes US
- Spying Programs ::
- http://www.wsws.org/en/articles/2013/12/19/spyi-d19.html
- ---------------------------------------
- ▼ FLASHBACK ; Michael Hayden Admits They
- Will NOT Stifle Surveillance ::
- http://www.youtube.com/watch?v=XS6nfkbNvlo
- http://www.infowars.com/former-nsa-boss-government-will-continue-surveillance-so-get-used-to-it/
- ▲ Counter-spy_Manual.zip
- (22 files | ZIP | 2.93MB)
- http://paste.darkbyte.ru/view/5459487
- http://ae7.st/p/26c (mirror)
- _______________________________________
- ¤ NSA/CSS Mission Slides ::
- These slides, from an internal presentation
- in the first week of October 2001, show how
- critical the NSA sees electronic eavesdropping.
- http://cryptome.org/2013/12/nsa-css-mission.pdf
- “ 1B. Ability to exploit:
- - Military Information
- - Economic Information
- - Information Operations Information
- - Political Information ”
- _______________________________________
- ¤ Eben Moglen & Bruce Schneier Talk About
- NSA Leaks, Software and Cryptography ::
- https://www.youtube.com/watch?v=N8Sc6pUR1mA
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA Rigging RSA Crypto Market ::
- http://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220
- ¤ RSA Cryptographers Duped and Bribed by NSA ::
- http://cryptome.org/2013/12/nsa-kills-rsa.htm
- ¤ NSA Kills RSA Trust and Therefore RSA Jobs ::
- http://cryptome.org/2013/12/nsa-kills-rsa-workers.htm
- ¤ List of Canceled RSA Talks Continues to Grow ::
- http://threatpost.com/list-of-canceled-rsa-talks-continues-to-grow/103508
- ¤ FLASHBACK ; NSA Rigging the Crypto Market ::
- http://cryptome.org/jya/nsa-sun.htm
- _______________________________________
- ¤ Did British Telecom Provides Backdoors
- for NSA and GCHQ (?) ::
- In a paper titled ‘The Internet Dark Age’
- the researchers say that BT is shipping
- hardware with backdoors that allow secret
- government access in order to make network
- compromise easier. “BT are directly responsible
- for covertly embedding secret spy equipment
- in millions of homes and businesses within
- the UK,” the paper states.
- Recently on Cryptome (the better leaks
- than wikileaks site), a paper appeared
- pointing out that BT (British Telecom)
- assigns all their modems an extra address
- in the 30.x.x.x address space, and then
- attaches SSH and SNMP to that address.
- This looks like what many ISPs do, assigning
- a second IP address for management, except
- for one thing: the 30.0.0.0/8 block is
- assigned to the United States Department
- of Defense. This has caused a fevered round
- of speculation that this is actually a
- secret backdoor for the NSA/GCHQ, so that
- they can secretly monitor and control
- peoples’ home networks.
- Maybe, but it’s probably not the case.
- The better explanation is that BT simply
- chose this address space because it’s
- non-routable. While it’s assigned public
- address, it’s only used inside the private
- DoD military network. Try tracerouting to
- that address space, you’ll see that your
- packets go nowhere.
- http://cryptome.org/2013/12/Full-Disclosure.pdf
- http://www.csoonline.com/article/744697/report-accuses-bt-of-supplying-backdoors-for-gchq-and-nsa
- http://blog.erratasec.com/2013/12/dod-address-space-its-not-conspiracy.html
- ¤ Bruce Schneier Leaves British Telecom ::
- “Yes, it’s true. And contrary to rumors,
- this has nothing to do with the NSA or GCHQ.
- No, BT wasn’t always happy with my writings
- on the topic, but it knew that I am an
- independent thinker and didn’t try to
- muzzle me in any way. I’m just ready to
- leave. I spent seven years at BT, and
- seven years at Counterpane Internet
- Security, Inc., before BT bought us.
- It’s past time for something new.”
- http://www.schneier.com/blog/archives/2013/12/yes_im_leaving.html
- http://arstechnica.com/information-technology/2013/12/nsa-surveillance-critic-bruce-schneier-to-leave-post-at-bt/
- http://www.computing.co.uk/ctg/news/2319296/bruce-schneier-leaves-bt-after-eight-years-as-security-futurologist
- ---------------------------------------
- ¤ NSA Infected Around 50,000 Networks Worldwide ::
- The American intelligence service - NSA -
- infected more than 50,000 computer networks
- worldwide with malicious software designed
- to steal sensitive information. Documents
- provided by former NSA-employee Edward Snowden
- and seen by this newspaper, prove this.
- A management presentation dating from 2012
- explains how the NSA collects information
- worldwide. In addition, the presentation
- shows that the intelligence service uses
- ‘Computer Network Exploitation’ (CNE) in
- more than 50,000 locations. CNE is the
- secret infiltration of computer systems
- achieved by installing malware, malicious
- software.
- One example of this type of hacking was
- discovered in September 2013 at the Belgium
- telecom provider Belgacom. For a number of
- years the British intelligence service - GCHQ –
- has been installing this malicious software
- in the Belgacom network in order to tap
- their customers’ telephone and data traffic.
- The Belgacom network was infiltrated by GCHQ
- through a process of luring employees to a
- false Linkedin page.
- http://www.nrc.nl/wp-content/uploads/2013/11/nsa568.jpg
- http://cryptome.org/2013/11/nsa-sigint-cryptologic-platform.pdf
- http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/
- http://hothardware.com/News/Dutch-News-Agency-Reports-NSA-Infected-50000-Networks-With-Malware/
- ¤ NSA Power to Generate Profits and Pay ::
- The NSA SIGINT Strategy 2012-2016 pretty
- well covers all the comsec and crypto
- initiatives to covertly exploit people,
- cryptographers, anonymizers, informants,
- planted spies, security firms, networks,
- governments, nations, friends, lovers
- and citizens.
- Not sure leaks, lawsuits and protests
- will deter this bounty of profits for
- the comsec industry, unless the public
- is aroused to demand the 3 branches grasp
- the nettle, and all those making money
- from this deception operation decide to
- give up their profits, perks and prestige.
- I mean those on the comsec and crypto
- lists, those participating in standards
- committees, those enjoying contracts and
- grants in think tanks and universities,
- those in law firms and public interest
- orgs, those in the media and academia,
- those in non-spy gov agencies, pretending
- to be in opposition as they scramble to
- rejigger their products and sales pitches,
- to exploit what is being fabricated to
- diminish Snowden’s revelations with new
- forms of secrecy, technology, law,
- regulations, bribery, lobbying, grants,
- contracts, list lurking, online and
- offline spying, break-ins, the usual
- kaboodle, to assure the NSA goals are
- fulfilled.
- http://cryptome.org/2013/11/nsa-power-profit-pay.htm
- http://cryptome.org/2013/11/nsa-sigint-cryptologic-platform.pdf
- ¤ NSA’s Global Interception Network ::
- http://electrospaces.blogspot.fr/2013/12/nsas-global-interception-network.html
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ GCHQ Accused of Spying European, German
- and Israeli Politicians (No Documentation) ::
- http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135.html
- http://www.theguardian.com/uk-news/2013/dec/20/gchq-targeted-aid-agencies-german-government-eu-commissioner
- http://www.nytimes.com/2013/12/21/world/nsa-dragnet-included-allies-aid-groups-and-business-elite.html?_r=0
- _______________________________________
- ¤ CBS 60min ; Inside the NSA (Part One) ::
- http://www.youtube.com/watch?v=WgPNyAYOr04
- ¤ CBS 60min ; The Snowden Affair (Part Two) ::
- http://www.youtube.com/watch?v=5AaREKHQI8E
- ¤ NSA Interviewed by CBS - Transcript ::
- http://cryptome.org/2013/12/nsa-60mins/nsa-60mins.htm
- _______________________________________
- ¤ Proposal for Distribution of Snowden Cache ::
- http://cryptome.org/2013/12/snowden-cache-dist.htm
- _______________________________________
- ¤ EU Data Retention Directive “Unlawful”
- and “Incompatible” with Charter of Rights ::
- http://www.scribd.com/doc/191078925/Data-Retention-Challenge-Press-Release
- http://www.computing.co.uk/ctg/news/2318838/eu-data-retention-directive-unlawful-and-incompatible-with-charter-of-rights
- _______________________________________
- ¤ GOOGLE CENSORING NSA SEARCH RESULTS (?) ::
- http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/17/edward-snowden-doesnt-show-up-once-in-googles-list-of-top-2013-searches/
- _______________________________________
- ¤ Clapper, Feinstein, Obama Total Disregard
- of Public Concerns ::
- http://cryptome.org/2013/12/spies-reign-obama.htm
- ¤ Merkel Throws a Pissy Fit ::
- http://www.theguardian.com/world/2013/dec/17/merkel-compares-nsa-stasi-obama
- _______________________________________
- ¤ GCHQ’s Use of FLYING PIG to Spy ::
- “FLYING PIG is a program that allows
- analysts to query GCHQ’s vast repository
- of metadata about the world’s secure
- communications over TLS/SSL. It’s
- certainly not a program through which
- the GCHQ, or NSA for that matter, performs
- man-in-the-middle attacks against internet
- services like Google, as reported by others,
- including Bruce Schneier. The reports that
- claim the NSA performed MITM attacks against
- Google are based on a small piece of a
- document that describes a FLYING PIG
- (which is a not an NSA program, as you may
- have noticed) use case (presumably, an
- investigation into the DigiNotar CA breach).
- That’s not to say the GCHQ doesn’t perform
- MITM attacks, but there’s no evidence to
- be found in this document. Though, FLYING PIG
- may be used to prepare MITM attacks, e.g.
- by providing information about a target.”
- http://koen.io/2013/12/flying-pig-gchq-tls-ssl-knowledge-base/
- ¤ NSA Use of FLYING PIG to Spy ::
- https://www.documentcloud.org/documents/785152-166819124-mitm-google.html
- http://www.techdirt.com/articles/20130910/10470024468/flying-pig-nsa-is-running-man-middle-attacks-imitating-googles-servers.shtml
- http://news.cnet.com/8301-13578_3-57602701-38/nsa-disguised-itself-as-google-to-spy-say-reports/
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ John Young Breaks Down the NSA Leaks ::
- http://www.corbettreport.com/mp3/2013-12-17%20John%20Young.mp3
- http://www.corbettreport.com/interview-793-john-young-breaks-down-the-snowdennsa-saga/
- _______________________________________
- ¤ FASCIA Database of Device-Location Records ::
- http://cryptome.org/2013/12/nsa-fascia.pdf
- ---------------------------------------
- ¤ hdfs:// Cloud Holds FASCIA Database ::
- http://cryptome.org/2013/12/nsa-ghost-machine.pdf
- HDFS stands for “Hadoop Distributed File
- System” which was inspired by Google Inc,
- and later managed by big data corporations
- such as IBM, Yahoo, Facebook, et al.
- HDFS is designed to reliably store very
- large files across machines in a large
- cluster.
- ¤ Hadoop Emerging Technology ::
- “Hadoop is a data processing system that
- follows the MapReduce paradigm for scalable
- data analysis.” ... “Largest install is at
- Yahoo, a major contributor.”
- HDFS is a scalable file system with two
- major components, a central metadata server
- and file servers from data.
- http://www.upload-box.com/index.php/files/get/uTqMG-LMlY/hadoop-emerging-technology.pdf
- ¤ Yahoo - Managing a Hadoop Cluster ::
- This was taken from the Yahoo website,
- posted on public domain.
- http://msfire.tk/files/get/SIut69QW7Q/yahoo-hadoop.zip
- ¤ Apache Hadoop FileSystem and its Usage
- in Facebook (This File Is Mirrored) ::
- http://4lodzik.de/xu2/files/get/U-eeftxCDJ/facebook-hadhoop.zip
- http://www.uploadmini.com/index.php/files/get/rnvpDpXfZu/facebook-hadhoop.zip
- http://cloudseminar.berkeley.edu/data/hdfs.pdf
- ¤ hadoop_install.zip (Mirrored) ::
- http://fileb.ag/nukq1uicayye
- http://f.ishoo.ru/files/get/vfym4eZHvY/hadoop-install.zip
- http://cloud.elearning.uq.edu.au/download/hadoop_install.zip
- ---------------------------------------
- ¤ CO-TRAVELER Cellphone Tracking ; FASCIA
- Database Available With Ghostmachine ::
- “Proxies can make IP resolution challenging.”
- http://cryptome.org/2013/12/nsa-cotraveler.pdf
- ¤ CHALKFUN Location Tool Highly Censored ::
- http://cryptome.org/2013/12/nsa-chalkfun.pdf
- ¤ NSA Targets Device Location Verification ::
- http://cryptome.org/2013/12/nsa-target-location.pdf
- ¤ NSA’s Global Interception Network ::
- http://electrospaces.blogspot.com/2013/12/nsas-global-interception-network.html
- ¤ NSA Tracking Cellphone Locations ::
- In unveiling new Edward Snowden revelations
- about NSA spying, the Washington Post has
- once again whitewashed the fact that the
- content of all our communications have
- been stored and analyzed under the Echelon
- program since the 1990s.
- The new details concern how, “The National
- Security Agency is gathering nearly 5
- billion records a day on the whereabouts
- of cellphones around the world.”
- However, the report reveals itself to
- be little more than an exercise in soft-
- peddling when it claims that, “The NSA
- does not target Americans’ location data
- by design, but the agency acquires a
- substantial amount of information on
- the whereabouts of domestic cellphones
- “incidentally.”
- This notion that the NSA just accidentally
- happens to record the locations of Americans
- using data from their cellphones, and is
- not deliberately engaging in domestic
- surveillance, is yet another example of
- damage control by the establishment.
- http://www.infowars.com/new-nsa-revelations-another-limited-hangout-whitewash/
- http://www.washingtonpost.com/wp-srv/special/_ie-fallbacks/NSA_Co-traveler_g.jpg
- http://apps.washingtonpost.com/g/page/world/fascia-the-nsas-huge-trove-of-location-records/637/
- http://apps.washingtonpost.com/g/page/world/how-to-tell-if-a-target-is-foreign/635/
- http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_print.html
- http://www.theguardian.com/world/2013/dec/04/nsa-storing-cell-phone-records-daily-snowden
- ---------------------------------------
- ¤ NSA Uses Google Cookies and GSM Geohashes
- to Pinpoint Targets ::
- The National Security Agency is ‘secretly’
- piggybacking on the tools that enable
- Internet advertisers to track consumers,
- using cookies and location data to pinpoint
- targets for government hacking and to
- bolster surveillance.
- http://cryptome.org/2013/12/nsa-sigint-successes.pdf
- http://cryptome.org/2013/12/nsa-gsm-tracking.pdf
- http://apps.washingtonpost.com/g/page/national/nsa-signal-surveillance-success-stories/647/
- http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-targets-for-hacking/
- http://boingboing.net/2013/12/10/nsa-uses-googles-tracking-co.html
- http://www.theverge.com/2013/12/10/5198592/nsa-reportedly-piggybacking-on-google-advertising-cookies
- https://www.wsws.org/en/articles/2013/12/14/snow-d14.html
- ---------------------------------------
- ¤ FLASHBACK ; Anonymizing Google’s Cookie ::
- http://www.imilly.com/google-cookie.htm
- ---------------------------------------
- ¤ How Marketers Will Find and Track You
- In a World Without Cookies ::
- http://blog.thefetch.com/2013/11/18/cookie-monsters-how-marketers-will-find-and-track-you-in-a-world-without-cookies/
- _______________________________________
- ¤ How the NSA Targets Italy ::
- http://espresso.repubblica.it/foto/2013/12/05/galleria/nsa-intercettazioni-1.144400
- http://espresso.repubblica.it/inchieste/2013/12/05/news/revealed-how-the-nsa-targets-italy-1.144428
- http://www.pcworld.com/article/2070480/nsa-spies-on-italians-from-roof-of-us-embassy-in-rome-magazine-reports.html
- ¤ SCS_Italy_Spying.zip | 371KB ::
- http://ge.tt/api/1/files/2Bbc4C81/0/blob?download
- http://megaswf.com/f/2625421
- http://msfire.tk/files/get/srIJUWgvYg/scs-italy-spying.zip
- _______________________________________
- ¤ Swedish Intelligence Agency (FRA) Spied
- on Russian Leaders for NSA ::
- http://cryptome.org/2013/12/nsa-se-spied-ru.htm
- http://cryptome.org/2013/12/nsa-se-fra-ru-baltic.pdf
- http://www.youtube.com/watch?v=0yP7n8qZrz0
- http://rt.com/news/sweden-spied-russia-nsa-759/
- http://www.infowars.com/nsa-leaks-sweden-spied-on-russian-leaders-for-us/
- http://www.thelocal.se/20131211/sweden-aided-in-nsa-hacking-operations-report
- ¤ NSA & FRA Quantum Hacking Programme ::
- http://www.svt.se/ug/fra-part-of-top-secret-hacker-project
- ¤ NSA & FRA Relationship Was “Top Secret” ::
- http://cryptome.org/2013/12/nsa-se-spies.pdf
- http://s3.documentcloud.org/documents/889126/nsa-intelligence-relationship-with-sweden.pdf
- ¤ NSA & FRA Relationship “Actively Engaged” ::
- http://cryptome.org/2013/12/nsa-se-fra-relationship.pdf
- http://s3.documentcloud.org/documents/894384/nsa-internal-pm-on-fra-and-sweden-relations.pdf
- ¤ NSA & FRA Joint Quantum Spy Agenda ::
- http://cryptome.org/2013/12/nsa-se-fra-spying-agenda.pdf
- ¤ NSA/GCHQ/FRA Quantum Spying Accomplishments ::
- http://cryptome.org/2013/12/nsa-gchq-fra-quantum.pdf
- http://cryptome.org/2013/12/nsa-se-fra-quantum-2.pdf
- http://cryptome.org/2013/12/gchq-se-fra-quantum-3.pdf
- ¤ NSA/GCHQ/FRA Communication Intelligence ::
- http://cryptome.org/2013/12/nsa-gchq-se-fra-comint.pdf
- ---------------------------------------
- PAST XKEYSCORE REPORTS/DOCUMENTS REFER HERE ;
- http://paste.cdtag.de/view.php?id=16647
- ---------------------------------------
- ¤ NSA/FRA XKeyscore Targets Website Viewers ::
- http://cryptome.org/2013/12/nsa-se-fra-xkeyscore-slide.pdf
- ¤ NSA/FRA XKeyscore Targets Tor, etc. ::
- http://cryptome.org/2013/12/nsa-xkeyscore-tor-slides.pdf
- ¤ NSA/FRA XKeyscore Exploit Sources ::
- http://cryptome.org/2013/12/nsa-xkeyscore-sources.pdf
- ¤ NSA/FRA XKeyscore Data Hoarding Plans ::
- http://cryptome.org/2013/12/nsa-se-fra-xkeyscore.pdf
- _______________________________________
- “Earlier, a map showing SCS locations
- worldwide was published by the German
- magazine Der Spiegel. Initially an unredacted
- map was put online by accident, but before
- it was replaced, it was already copied onto
- several websites. This map showed 74 staffed
- SCS locations, 14 unmanned remote controlled
- locations and 8 other locations as of August
- 2010. Except for the SCS locations in Europe,
- the names of all other cities were blurred
- by Der Spiegel.”
- - electrospaces.blogspot.fr
- REDACTED MAP (CENSORED)
- https://lh3.ggpht.com/-ymi_oEW0XcI/UpzfqqqPRsI/AAAAAAAABCs/WU4lKnfs52w/s320/scs-global-map-redacted.jpg
- UNREDACTED MAP (DEFAULT)
- http://postimg.org/image/6kzpypy1l/
- BOTH REDACTED AND UNREDACTED (ZIP | 223KB)
- http://f.lui.li/get_1065_f4ab.html
- ---------------------------------------
- ¤ Decensoring SCS Locations ::
- http://cryptome.org/2013/12/decensoring-scs-slides.htm
- The NSA spies under diplomatic cover.
- _______________________________________
- ¤ Five Eyes ::
- http://cryptome.org/2013/12/nsa-5-eyes-partners.pdf
- _______________________________________
- ¤ A Conspiracy So Vast ::
- http://www.lewrockwell.com/2013/12/andrew-p-napolitano/a-conspiracy-so-vast%E2%80%A8/
- _______________________________________
- ¤ PayPal Corporation Said To Be Implicated
- in Withheld NSA Documents ::
- http://www.youtube.com/watch?v=tTivPZZorWY
- http://www.boilingfrogspost.com/2013/12/11/bfp-breaking-news-omidyars-paypal-corporation-said-to-be-implicated-in-withheld-nsa-documents/
- _______________________________________
- ¤ NSA GCHQ Spies on Video Game Geeks ::
- Say hello to undercover NSA orcs.
- http://cryptome.org/2013/12/nsa-gchq-spy-games.pdf
- http://cryptome.org/2013/12/nsa-spy-games.pdf
- http://arstechnica.com/tech-policy/2013/12/world-of-spycraft-nsa-gchq-hacked-wow-and-xbox-live-other-games/
- http://www.theguardian.com/world/2013/dec/09/nsa-spies-online-games-world-warcraft-second-life
- http://www.breitbart.com/Big-Government/2013/12/09/Report--NSA-spying-on-virtual-worlds--online-games
- http://www.businessinsider.com/spy-agencies-infiltrated-video-games-nsa-gchq-world-of-warcraft-2013-12
- _______________________________________
- ¤ Rollingstone Describes NSA’s Influx of Money ::
- September 11th, which also happened to
- be Drake’s first day at Fort Meade, changed
- the equation. Drake explains the shift in
- two ways: The first was a massive expansion
- of US spying capabilities as the agency
- “unchained itself from the Constitution,”
- and began to spy on Americans and foreign
- citizens, at home and abroad. The other
- change, felt across the entire intelligence
- community, was a rapid expansion of the NSA
- itself.
- “Massive amounts of money were pumped
- into the NSA after 9/11, and Congress was
- saying, ‘How big do you want the check?’”
- says Drake. With virtually every agency
- involved in tracking terrorists clamoring
- for its SIGINT, or signals intelligence,
- the NSA expanded its outposts in Texas,
- Georgia, Hawaii, Colorado and Utah, as
- well as listening posts abroad, and also
- went on a building spree at Fort Meade,
- where the NSA’s sprawling 5,000-acre
- campus is now almost 10 times the size
- of the Pentagon. By 2013, according to
- The Washington Post, the NSA had expanded
- its workforce by one-third, to about
- 33,000. The number of private companies
- it depended upon more than tripled during
- that time.
- Soon, thanks to this influx of money
- and the increasing reliance on the private
- sector to handle even sensitive jobs,
- the very heart of America’s intelligence
- infrastructure was being outsourced to
- contractors. “Essentially, 9/11 was a
- massive jobs program, in which the ticket
- you needed for the party was your clearance,”
- says Drake. “And tons of people were
- getting those clearances. So you had
- this huge apparatus being built, and
- the government was just managing it.
- And in some cases, they weren’t even
- doing that.” ... ...
- By the time Snowden joined the agency’s
- workforce, the surveillance he would
- later expose was becoming not just
- institutionalized but very big business.
- “It was around 2009, 2010 that you saw
- the full flower of that massive, massive
- bubble of money,” says Drake. “And people
- were taking it for a ride as far as it
- could go.” ... ...
- Prior to 2009, Snowden had considered
- leaking government secrets when he was
- at the CIA, but held off, he later said,
- not wanting to harm agents in the field,
- and hoping that Obama would reform the
- system. His optimism didn’t last long.
- “I watched as Obama advanced the very
- policies that I thought would be reined
- in,” he later said. As a result, he added,
- “I got hardened.” The more Snowden saw of
- the NSA’s actual business – and, particularly,
- the more he read “true information,”
- including a 2009 Inspector General’s report
- detailing the Bush era’s warrantless-
- surveillance program – the more he realized
- that there were actually two governments:
- the one that was elected, and the other,
- secret regime, governing in the dark.
- “If the highest officials in government
- can break the law without fearing punishment
- or even any repercussions at all, secret
- powers become tremendously dangerous.”
- http://www.rollingstone.com/politics/news/snowden-and-greenwald-the-men-who-leaked-the-secrets-20131204
- _______________________________________
- ¤ Rajiv Pant Describes Snowden Files Transfer ::
- http://cryptome.org/2013/12/nyt-snowden-transfer.htm
- _______________________________________
- ¤ Is British Intelligence in Damage Control? ::
- http://www.globalresearch.ca/british-intelligence-operation-to-kidnap-snowden-number-one-mi-6-officer-working-undercover-in-moscow-embassy/5358555
- _______________________________________
- ¤ Snowden Leaks “Greatest Intelligence
- Failure Since World War 2” Exaggerated ::
- The Director of NSA claims Snowden stole
- 200,000 documents. Allegations in Australian
- press claim he stole “up to 20,000.” British
- authorities accuse Snowden of stealing 58,000.
- Claims are bruited in the 5 Eyes that this
- is the “greatest intelligence failure since
- World War 2.” High officials and ex-spies
- accuse Snowden and related media of engaging
- in terrorism.
- This suggests a counter-espionage campaign
- to exaggerate Snowden’s damage, of betrayal
- to his country, of aiding the enemy, of
- threatening national security. It is
- successfully restricting release of the
- Snowden material and will likely become
- more forceful as releases continue to the
- extent of legislation (open or secret)
- to criminalize release as a national
- security threat.
- http://cryptome.org/2013/12/snowden-civil-war.htm
- _______________________________________
- ¤ KILLCEN ; Eyeballing_Snowden_Info.7z ::
- Includes most reports, slides and
- documents all related to the recent
- Snowden leaks so far up to December
- 4th of 2013. I’m still collecting
- any information that comes out and
- will provide updated archives from
- time to time. Grab this while you can.
- After decompression - the folder is
- titled “Eyeballing_Snowden_Info” and
- holds a total of 371MB decompressed.
- Eyeballing_Snowden_Info.7z
- (783 files | 7zip | 286MB)
- http://fileb.ag/iv8x797lqzdw
- http://uploadhero.co/dl/aBBhCePf
- http://bitshare.com/files/fuxhd3ry/Eyeballing_Snowden_Info.7z.html
- http://www.upload-box.com/index.php/files/get/0VPCtiKFxf/eyeballing-snowden-info.7z
- http://f.ishoo.ru/files/get/3GfGXXqGSH/eyeballing-snowden-info.7z
- http://davvas.com/frrbbi2975xe
- http://BillionUploads.com/hpww20r554x4
- http://bayfiles.net/file/119rR/Y6ax0Z/Eyeballing_Snowden_Info.7z
- _______________________________________
- ¤ indonesia-spying-slides.zip (mirrored) ::
- http://up.sef.ps/xu/files/get/Aen2UBNeep/indonesia-spying-slides.zip
- http://document-space.com/index.php/files/get/yWGp5DplsK/indonesia-spying-slides.zip
- http://www.quickupdown.com/files/get/BEqtDnYz8M/indonesia-spying-slides.zip
- ¤ Australian Intelligence Agency (ASD)
- Swaps Bulk Metadata With the NSA ::
- Australia’s intelligence apparatus mines
- the telecommunications data of ordinary
- Australians, and hands over the material
- to the US and its closest allies, according
- to the latest leaked document from Edward
- Snowden, partly published by the Guardian
- Australia web site.
- The document obtained by the former US
- National Security Agency (NSA) contractor
- confirms that the electronic surveillance
- agency, the Australian Signals Directorate
- (ASD), monitors the domestic population,
- as well as the people and governments of
- many Asian countries.
- Despite Australian legislation supposedly
- restricting the ASD’s internal spying,