- Eyeballing the NSA 043 (HTML & UTF-8 Embedded) »
- http://3f74555297f19f6c.paste.se/
- Eyeballing the NSA 043 (PDF) »
- http://upstore.net/NV5koS
- “Defeat adversary cyber-security practices
- in order to acquire the SIGINT data we need
- from anyone, anytime, anywhere.”
- - NSA ; SIGINT Strategy 2012 - 2016
- ¤ ICWATCH: This Database Gathers the Resumes of 27,000
- Intelligence Workers ::
- https://github.com/TransparencyToolkit/ICWATCH-Data
- https://transparencytoolkit.org/project/icwatch/
- https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton/
- https://motherboard.vice.com/read/this-database-gathers-the-resumes-of-27000-intelligence-workers
- mirrored: #!gQ8EgbxZ!2hgGLnsfEK-Nss4nUImGL5nDr3QqxUhpqZZNd6TJL3o
- _______________________________________
- ¤ US Government Designated Prominent Al Jazeera Journalist
- as “Member of Al Qaeda” ::
- The document cites Zaidan as an example to demonstrate the
- powers of SKYNET, a program that analyzes location and
- communication data (or “metadata”) from bulk call records
- in order to detect suspicious patterns.
- In the Terminator movies, SKYNET is a self-aware military
- computer system that launches a nuclear war to exterminate
- the human race, and then systematically kills the survivors.
- According to the presentation, the NSA uses its version of
- SKYNET to identify people that it believes move like couriers
- used by Al Qaeda’s senior leadership. The program assessed
- Zaidan as a likely match, which raises troubling questions
- about the US government’s method of identifying terrorist
- targets based on metadata.
- It appears, however, that Zaidan had already been identified
- as an Al Qaeda member before he showed up on SKYNET’s radar.
- That he was already assigned a watch list number would seem
- to indicate that the government had a prior intelligence
- file on him. The Terrorist Identities Datamart Environment,
- or TIDE, is a US government database of over one million
- names suspected of a connection to terrorism, which is
- shared across the US intelligence community.
- The presentation contains no evidence to explain the designation.
- https://firstlook.org/theintercept/2015/05/08/u-s-government-designated-prominent-al-jazeera-journalist-al-qaeda-member-put-watch-list/
- ¤ NSA SKYNET Cloud Analytics-Courier Detection ::
- http://cryptome.org/2015/05/nsa-skynet-intercept-15-0507.pdf
- _______________________________________
- ¤ How the NSA Converts Spoken Words Into Searchable Text ::
- Most people realize that emails and other digital communications
- they once considered private can now become part of their
- permanent record.
- But even as they increasingly use apps that understand what
- they say, most people don’t realize that the words they speak
- are not so private anymore, either.
- Top-secret documents from the archive of former NSA contractor
- Edward Snowden show the National Security Agency can now
- automatically recognize the content within phone calls by
- creating rough transcripts and phonetic representations that
- can be easily searched and stored.
- The documents show NSA analysts celebrating the development
- of what they called “Google for Voice” nearly a decade ago.
- https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/
- ... the real solution is end-to-end encryption, preferably of
- the unbreakable kind. https://whispersystems.org/
- https://firstlook.org/theintercept/2015/05/08/keep-nsa-computers-turning-phone-conversations-searchable-text/
- ¤ NSA Converts Spoken Words Into Searchable Text Documents ::
- http://cryptome.org/2015/05/nsa-black-budget-sid-rt10-wg-language-intercept-15-0504.pdf
- _______________________________________
- ¤ Declassified Report Shows Doubts About Value of NSA
- Warrantless Spying ::
- The secrecy surrounding the National Security Agency’s
- post-9/11 warrantless surveillance and bulk data collection
- program hampered its effectiveness, and many members of the
- intelligence community later struggled to identify any
- specific terrorist attacks it thwarted, a newly declassified
- document shows.
- The document is a lengthy report on a once secret NSA
- program code-named Stellarwind. The report was a joint
- project in 2009 by inspectors general for five intelligence
- and law enforcement agencies, and it was withheld from the
- public at the time, although a short, unclassified version
- was made public. The government released a redacted version
- of the full report to The New York Times on Friday evening
- in response to a Freedom of Information Act lawsuit.
- http://www.nytimes.com/2015/04/25/us/politics/value-of-nsa-warrantless-spying-is-doubted-in-declassified-reports.htm
- ¤ NSA Stellar Wind OIG Analysis ::
- http://cryptome.org/2015/04/nsa-stellar-wind-oig-nyt-15-0424.pdf
- _______________________________________
- ¤ NSA Torus Receivers of 35 Satellite Signals ::
- At three satellite facilities, in Britain, Cyprus and New Zealand,
- there's a special antenna that allows NSA's partner agencies a
- significant increase in their capability to collect satellite
- communications.
- This antenna is called Torus, and while conventional parabolic
- dish antennas can only view one satellite at a time, one single
- Torus antenna is able to receive the signals from up to 35
- communications satellites.
- These rare and expensive Torus antennas are used by some television
- networks, but a close look at photos of the Five Eyes satellite
- stations has now revealed the locations where Torus antennas are
- also used for gathering signals intelligence.
- http://electrospaces.blogspot.com/2015/04/torus-antenna-to-significantly-increase.html
- _______________________________________
- ¤ CSEC Cyberwarfare Toolbox Revealed ::
- Top-secret documents obtained by the CBC show Canada’s
- electronic spy agency has developed a vast arsenal of
- cyberwarfare tools alongside its US and British counterparts
- to hack into computers and phones in many parts of the
- world, including in friendly trade countries like Mexico
- and hotspots like the Middle East. ... ...
- The CSE toolbox includes the ability to redirect someone
- to a fake website, create unrest by pretending to be
- another government or hacker, and siphon classified
- information out of computer networks, according to experts
- who viewed the documents. ... ...
- But the latest top-secret documents released to CBC News
- and The Intercept illustrate the development of a large
- stockpile of Canadian cyber-spy capabilities that go beyond
- hacking for intelligence, including:
- • destroying infrastructure, which could include electricity,
- transportation or banking systems;
- • creating unrest by using false-flags — ie. making a target
- think another country conducted the operation;
- • disrupting online traffic by such techniques as deleting
- emails, freezing internet connections, blocking websites and
- redirecting wire money transfers.
- http://www.cbc.ca/news/canada/communication-security-establishment-s-cyberwarfare-toolbox-revealed-1.3002978
- https://firstlook.org/theintercept/2015/03/23/canada-cse-hacking-cyberwar-secret-arsenal
- ¤ CSEC Cyber Threats / Cyberwarfare Toolbox ::
- http://cryptome.org/2015/03/csec-cyber-threats-cbc-15-0320.pdf
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA Releases William Friedman Papers ::
- http://cryptome.org/2015/03/nsa-friedman-15-0323.pdf
- _______________________________________
- ¤ The CIA Campaign to Steal Apple’s Secrets ::
- https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/
- http://www.infowars.com/new-snowden-documents-cia-has-spent-10-years-hacking-iphones-ipads/
- ¤ NSA-CIA Apple DPA Cryptanalysis ::
- http://cryptome.org/2015/03/nsa-apple-dpa-intercept-15-0309.zip
- _______________________________________
- ¤ Leaked Snowden Files Show Most of GCSB’s Targets Are NOT
- Security Threats to New Zealand (UPDATED SEVERAL TIMES) ::
- New Zealand’s electronic surveillance agency, the GCSB, has
- dramatically expanded its spying operations during the years
- of John Key's National Government and is automatically funnelling
- vast amounts of intelligence to the US National Security Agency,
- top-secret documents reveal.
- Since 2009, the Government Communications Security Bureau
- intelligence base at Waihopai has moved to “full-take collection”,
- indiscriminately intercepting Asia-Pacific communications and
- providing them en masse to the NSA through the controversial
- NSA intelligence system XKeyscore, which is used to monitor
- emails and internet browsing habits. ... ...
- New Zealand is selling out its close relations with the Pacific
- nations to be close with the United States, author Nicky Hager
- has said.
- Hager, in conjunction with the New Zealand Herald and the
- Intercept news site, revealed today how New Zealand’s spies
- are targeting the entire email, phone and social media
- communications of the country’s closest, friendliest and
- most vulnerable neighbours.
- This morning, Hager told Radio New Zealand that the documents
- revealed even more countries which New Zealand was spying on,
- and more information would come.
- “The Five Eyes countries led by the US are literally trying
- to spy on every country in the world ... and what we’re going
- to be hearing about in the next few days is New Zealand in all
- kinds of very surprising ways playing a role in that,” he said.
- http://cryptome.org/2015/03/gcsb-xkeyscore-nz-herald-15-0305.pdf
- http://cryptome.org/2015/03/gcsb-xkeyscore-nz-herald-15-0306.pdf
- http://cryptome.org/2015/03/gcsb-xkeyscore-nz-star-times-15-0308.pdf
- http://cryptome.org/2015/03/nsa-nz-nz-herald-15-0310.pdf
- http://cryptome.org/2015/03/gcsb-solomons-nz-herald-15-0314.pdf
- http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11411759
- http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11411730
- http://media.nzherald.co.nz/webcontent/document/pdf/201513/WTO%20document.pdf
- https://firstlook.org/theintercept/2015/03/04/new-zealand-gcsb-surveillance-waihopai-xkeyscore/
- https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/
- https://firstlook.org/theintercept/2015/03/07/new-zealand-ironsand-waihopai-nsa-gcsb/
- https://firstlook.org/theintercept/2015/03/22/new-zealand-gcsb-spying-wto-director-general/
- http://www.stuff.co.nz/national/67082905/snowden-files-inside-waihopais-domes
- https://leaksource.files.wordpress.com/2015/03/gcsb-asia-pacific-spying-five-eyes-nsa-xkeyscore.pdf
- https://leaksource.files.wordpress.com/2015/03/gcsb-provide-nsa-nz-data.pdf
- https://leaksource.files.wordpress.com/2015/03/gcsb-xks-ironsand-access-multiple-choice-test-check-box.pdf
- https://leaksource.files.wordpress.com/2015/03/gcsb-asd-nzsis-asis-south-pacific-spying-high-priority.pdf
- http://www.radionz.co.nz/news/national/267923/gcsb-in-mass-collection-of-pacific-data-ferguson
- http://www.bbc.com/news/world-asia-31741564
- _______________________________________
- ¤ How NSA-GCHQ Stole the Keys to the Encryption Castle ::
- AMERICAN AND BRITISH spies hacked into the internal computer network
- of the largest manufacturer of SIM cards in the world, stealing
- encryption keys used to protect the privacy of cellphone communications
- across the globe, according to top-secret documents provided to The
- Intercept by National Security Agency whistleblower Edward Snowden.
- The hack was perpetrated by a joint unit consisting of operatives
- from the NSA and its British counterpart Government Communications
- Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ
- document, gave the surveillance agencies the potential to secretly
- monitor a large portion of the world’s cellular communications,
- including both voice and data.
- http://cryptome.org/2015/02/gchq-pcs-harvesting-intercept-15-0219.pdf
- https://firstlook.org/theintercept/2015/02/19/great-sim-heist/
- http://www.democracynow.org/2015/2/20/nsa_british_gchq_hacked_sim_card
- https://firstlook.org/theintercept/2015/02/20/gemalto-heist-shocks-europe/
- ¤ Gemalto Government National Mobile ID Schemes / Partners ::
- http://cryptome.org/2015/02/gemalto-gov-national-mobile-id.pdf
- http://cryptome.org/2015/02/gemalto-partner-list.htm
- ¤ Gemalto Responds After SIM Encryption Key Heist Exposed ::
- http://www.gemalto.com/press/Pages/Information-regarding-a-report-mentioning-a-hacking-of-SIM-card-encryption-keys.aspx
- http://www.infowars.com/sim-card-producer-denies-any-real-risk-from-nsa-hacking-its-encryption-keys/
- ¤ White House Responds After SIM Encryption Key Heist Exposed ::
- MIRROR #1 http://postimg.org/image/yj37iju33/
- MIRROR #2 https://pbs.twimg.com/media/B-U0B20CIAASRpq.png
- _______________________________________
- ¤ NSA’s “Equation Group” Firmware-imbedded Malware Found ::
- NSA stores secret imbedded malware inside the firmware of
- harddrives and USB(s).
- Malware can be used as a beacon once plugged into an air-gapped
- system and data can be accessed remotely while OFFLINE.
- Kaspersky’s reconstructions of the spying programs show that
- they could work in disk drives sold by more than a dozen
- companies, comprising essentially the entire market. They
- include Western Digital Corp, Seagate Technology Plc, Toshiba
- Corp, IBM, Micron Technology Inc and Samsung Electronics Co Ltd.
- Western Digital, Seagate and Micron said they had no knowledge
- of these spying programs. Toshiba and Samsung declined to comment.
- IBM did not respond to requests for comment.
- http://cryptome.org/2015/02/nsa-equation-group.pdf
- http://www.stuff.co.nz/technology/digital-living/66279485/nsa-hiding-equation-spy-program-on-hard-drives
- https://news.yahoo.com/russian-researchers-expose-breakthrough-u-spying-program-194217480--sector.html
- http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/
- _______________________________________
- ¤ NY Times’ David Carr Snowden Interview Hours Before Death ::
- http://timestalks.com/laura-poitras-glenn-greenwald-edward-snowden.html
- http://www.newsmax.com/Newsfront/David-Carr-died-New-York-Times-Snowden/2015/02/13/id/624700/
- _______________________________________
- ¤ NSA Claims Iran Learned from Western Cyberattacks ::
- http://cryptome.org/2015/02/iran-gchq-intercept-15-0210.pdf
- https://firstlook.org/theintercept/2015/02/10/nsa-iran-developing-sophisticated-cyber-attacks-learning-attacks/
- _______________________________________
- ¤ White House Spy “Reform” - Increase Spying! Flaunt It! ::
- An in-you’re-face attitude is now considered “reform.”
- http://cryptome.org/2015/02/ic-ppd-28-15-0203.zip
- https://firstlook.org/theintercept/2015/01/29/one-year-major-report-nsa-still-collecting-bulk-domestic-data-still-clueless-much-good-surveillance/
- _______________________________________
- ¤ Hypocrisy of Youtube’s CitizenFour Censorship ::
- http://piratetimes.net/new-snowden-documentary-censored-online/
- ¤ Citizenfour Snowden Documentary (7-Zipped MP4) ::
- http://cryptome.org/Citizenfour.7z
- ¤ Citizenfour Snowden Documentary HD (7-Zip MP4) ::
- http://cryptome.org/Citizenfour-HD.7z
- ¤ Citizenfour Screengrabs, 87 PDFs in 13 Files ::
- http://cryptome.org/2015/01/Citizenfour-Screengrabs-pdfs.7z
- ¤ Citizenfour Screengrabs, 87 JPGs in 13 Folders ::
- http://cryptome.org/2015/01/Citizenfour-Screengrabs.7z
- _______________________________________
- ¤ Western Spy Agencies Secretly Rely on Hackers for Intel ::
- http://cryptome.org/2015/02/gchq-lovely-horse-intercept-15-0204.pdf
- https://firstlook.org/theintercept/2015/02/04/demonize-prosecute-hackers-nsa-gchq-rely-intel-expertise/
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ CSEC Eyeballs File Sharing Host User Data ::
- http://torrentfreak.com/canadian-government-spies-on-millions-of-file-sharers-150128/
- http://www.cbc.ca/news/cse-tracks-millions-of-downloads-daily-snowden-documents-1.2930120
- https://firstlook.org/theintercept/2015/01/28/canada-cse-levitation-mass-surveillance
- http://motherboard.vice.com/read/how-canadian-spies-infiltrated-the-internets-core-to-watch-what-you-do-online?
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA MORECOWBELL HTTP GET Attacking ::
- http://cryptome.org/2015/01/nsa-morecowbell.htm
- http://cryptome.org/2015/01/MORECOWBELL.pdf
- http://cryptome.org/2015/01/MORECOWBELL-Analysis-Grothoff-etal.pdf
- http://cryptome.org/2015/01/Wertheim-NSA-and-Encryption-NotiAMS-Feb15.pdf
- http://www.lemonde.fr/economie/visuel/2015/01/24/cowbells-nouvelles-revelations-sur-les-pratiques-de-la-nsa_4561547_3234.html
- _______________________________________
- ¤ Compilation of Snowden Documents - January 30, 2015 ::
- https://github.com/nsa-observer/documents/archive/master.zip
- https://github.com/nsa-observer/documents/tree/master/files/pdf
- _______________________________________
- ¤ How GCHQ Prepares Interception of Phone Calls From Satellites ::
- http://electrospaces.blogspot.com/2015/01/how-gchq-prepares-for-interception-of.html
- _______________________________________
- ¤ NSA Documents Expose NSA’s Digital Arms Race for Cyber Warfare ::
- The NSA’s mass surveillance is just the beginning. Documents from
- Edward Snowden show that the intelligence agency is arming America
- for future digital wars -- a struggle for control of the Internet
- that is already well underway.
- Normally, internship applicants need to have polished resumes,
- with volunteer work on social projects considered a plus. But at
- Politerain, the job posting calls for candidates with significantly
- different skill sets. We are, the ad says, “looking for interns who
- want to break things.”
- Politerain is not a project associated with a conventional company.
- It is run by a US government intelligence organization, the National
- Security Agency (NSA). More precisely, it’s operated by the NSA’s
- digital snipers with Tailored Access Operations (TAO), the department
- responsible for breaking into computers.
- Potential interns are also told that research into third party
- computers might include plans to “remotely degrade or destroy
- opponent computers, routers, servers and network enabled devices
- by attacking the hardware.” Using a program called Passionatepolka,
- for example, they may be asked to “remotely brick network cards."
- With programs like Berserkr they would implant “persistent backdoors”
- and “parasitic drivers.” Using another piece of software called
- Barnfire, they would “erase the BIOS on a brand of servers that
- act as a backbone to many rival governments.”
- An intern’s tasks might also include remotely destroying the
- functionality of hard drives. Ultimately, the goal of the internship
- program was “developing an attacker’s mindset.”
- The internship listing is eight years old, but the attacker’s mindset
- has since become a kind of doctrine for the NSA’s data spies. And the
- intelligence service isn’t just trying to achieve mass surveillance
- of Internet communication, either. The digital spies of the Five Eyes
- alliance -- comprised of the United States, Britain, Canada, Australia
- and New Zealand -- want more.
- http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html
- ¤ Der Spiegel Releases NSA’s Plans for Cyber Warfare ::
- http://cryptome.org/2015/01/spiegel-15-0117.7z
- _______________________________________
- ¤ Prying Eyes: Inside the NSA’s War on Internet Security ::
- US and British intelligence agencies undertake every effort imaginable
- to crack all types of encrypted Internet communication. The cloud, it
- seems, is full of holes. The good news: New Snowden documents show that
- some forms of encryption still cause problems for the NSA. ... ...
- As one document from the Snowden archive shows, the NSA had been
- unsuccessful in attempts to decrypt several communications protocols,
- at least as of 2012. An NSA presentation for a conference that took
- place that year lists the encryption programs the Americans failed to
- crack. In the process, the NSA cryptologists divided their targets
- into five levels corresponding to the degree of the difficulty of the
- attack and the outcome, ranging from “trivial” to “catastrophic.”
- Monitoring a document’s path through the Internet is classified as
- “trivial.” Recording Facebook chats is considered a “minor” task,
- while the level of difficulty involved in decrypting emails sent
- through Moscow-based Internet service provider mail.ru is considered
- “moderate.” Still, all three of those classifications don’t appear to
- pose any significant problems for the NSA.
- Things first become troublesome at the fourth level. The presentation
- states that the NSA encounters “major” problems in its attempts to
- decrypt messages sent through heavily encrypted email service providers
- like Zoho or in monitoring users of the Tor network, which was
- developed for surfing the web anonymously. Tor, otherwise known as
- The Onion Router, is free and open source software that allows users
- to surf the web through a network of more than 6,000 linked volunteer
- computers. The software automatically encrypts data in a way that
- ensures that no single computer in the network has all of a user’s
- information. For surveillance experts, it becomes very difficult to
- trace the whereabouts of a person who visits a particular website or
- to attack a specific person while they are using Tor to surf the Web.
- The NSA also has “major” problems with Truecrypt, a program for
- encrypting files on computers. Truecrypt’s developers stopped their
- work on the program last May, prompting speculation about pressures
- from government agencies. A protocol called Off-the-Record (OTR) for
- encrypting instant messaging in an end-to-end encryption process also
- seems to cause the NSA major problems. Both are programs whose source
- code can be viewed, modified, shared and used by anyone. Experts agree
- it is far more difficult for intelligence agencies to manipulate open
- source software programs than many of the closed systems developed by
- companies like Apple and Microsoft. Since anyone can view free and
- open source software, it becomes difficult to insert secret back doors
- without it being noticed. Transcripts of intercepted chats using OTR
- encryption handed over to the intelligence agency by a partner in
- Prism -- an NSA program that accesses data from at least nine American
- internet companies such as Google, Facebook and Apple -- show that
- the NSA’s efforts appear to have been thwarted in these cases: “No
- decrypt available for this OTR message.” This shows that OTR at least
- sometimes makes communications impossible to read for the NSA.
- Things become “catastrophic” for the NSA at level five - when, for
- example, a subject uses a combination of Tor, another anonymization
- service, the instant messaging system CSpace and a system for Internet
- telephony (voice over IP) called ZRTP. This type of combination results
- in a “near-total loss/lack of insight to target communications, presence,”
- the NSA document states.
- ZRTP, which is used to securely encrypt conversations and text chats
- on mobile phones, is used in free and open source programs like RedPhone
- and Signal. “It’s satisfying to know that the NSA considers encrypted
- communication from our apps to be truly opaque,” says RedPhone developer
- Moxie Marlinspike.
- http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html
- ¤ NSA Attacks on VPN, SSL, TLS, SSH, Tor ::
- http://cryptome.org/2014/12/nsa-spiegel-14-1228.rar
- _______________________________________
- ¤ Operation Socialist ; How GCHQ Spies Hacked Belgium’s Largest Telco ::
- https://firstlook.org/theintercept/2014/12/13/belgacom-hack-gchq-inside-story/
- ¤ GCHQ Belgacom Telecom Hacking (ZIP) ::
- Slides show Canada’s intelligence agency, CSEC, was involved in helping
- GCHQ intercept Belgacom communications. It also proves 3rd party cookies
- are very much instrumental in being used to exploit information about IPs.
- http://cryptome.org/2014/12/gchq-belgacom-intercept-14-1213.zip
- _______________________________________
- ¤ Keith Alexander’s Anti-spy Patent Leaked ::
- http://cryptome.org/2014/12/nsa-alexander-patent-14-1125.pdf
- ¤ Keith Alexander Now Works To Secure Banking Networks ::
- http://www.bloomberg.com/news/2014-06-20/ex-nsa-chief-pitches-advice-on-cyber-threats-to-the-banks.html
- _______________________________________
- ¤ Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide ::
- Codenamed AURORAGOLD, the covert operation has monitored the content of
- messages sent and received by more than 1,200 email accounts associated
- with major cellphone network operators, intercepting confidential company
- planning papers that help the NSA hack into phone networks.
- One high-profile surveillance target is the GSM Association, an influential
- UK-headquartered trade group that works closely with large US-based firms
- including Microsoft, Facebook, AT&T, and Cisco, and is currently being
- funded by the US government to develop privacy-enhancing technologies.
- Karsten Nohl, a leading cellphone security expert and cryptographer who
- was consulted by The Intercept about details contained in the AURORAGOLD
- documents, said that the broad scope of information swept up in the operation
- appears aimed at ensuring virtually every cellphone network in the world is
- NSA accessible.
- https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/
- ¤ NSA Operation AURORAGOLD Slides ::
- http://cryptome.org/2014/12/nsa-aurora-gold-intercept-14-1203.pdf
- ¤ NSA OPULANT PUP Circumventing Strong Cryptography ::
- Last year, the Washington Post reported that the NSA had already managed
- to break the most commonly used cellphone encryption algorithm in the world,
- known as A5/1. But the information collected under AURORAGOLD allows the
- agency to focus on circumventing newer and stronger versions of A5 cellphone
- encryption, such as A5/3.
- http://cryptome.org/2014/12/nsa-opulant-pup-intercept-14-1203.pdf
- _______________________________________
- ¤ Germany’s Intelligence Agency, the BND, Spies On Civilians Too ::
- German MPs examining the surveillance activities the US National
- Security Agency have found a legal loophole that allows the Berlin’s
- foreign intelligence agency to spy on its own citizens.
- The agency, known by its German acronym BND, is not usually allowed
- to intercept communications made by Germans or German companies, but a
- former BND lawyer told parliament this week that citizens working abroad
- for foreign companies were not protected.
- The German government confirmed on Saturday that work-related calls
- or emails were attributed to the employer. As a result, if the employer
- is foreign, the BND could legally intercept them.
- Angela Merkel pretends to be outraged about industrial espionage by
- the NSA while condoning illegal surveillance itself.
- http://www.theguardian.com/world/2014/nov/29/german-loophole-allows-bnd-agency-spy-own-people
- http://www.infowars.com/like-the-nsa-and-gchq-germanys-foreign-intelligence-agency-uses-a-legal-loophole-to-spy-on-its-own-citizens/
- https://www.techdirt.com/articles/20141202/09513729296/like-nsa-gchq-germanys-foreign-intelligence-agency-uses-legal-loophole-to-spy-its-own-citizens.shtml
- _______________________________________
- ¤ How Vodafone-Subsidiary Telecom Aided GCHQ’s Spying Efforts ::
- Previously unpublished documents show how the UK telecom firm Cable
- & Wireless, acquired by Vodafone in 2012, played a key role in
- establishing one of the Government Communications Headquarters’
- (GCHQ) most controversial surveillance programs.
- A joint investigation by NDR, WDR, Süddeutsche Zeitung and Channel 4
- based on documents leaked by whistleblower Edward Snowden, reveals
- that Cable & Wireless actively shaped and provided the most data to
- GCHQ mass surveillance programs, and received millions of pounds in
- compensation. The documents also suggest that Cable & Wireless
- assisted GCHQ in breaking into a competitor’s network.
- In response to these allegations, Vodafone said that an internal
- investigation found no evidence of unlawful conduct, but the company
- would not deny it happened.
- http://www.channel4.com/news/spy-cable-revealed-how-telecoms-firm-worked-with-gchq
- http://www.tagesschau.de/ausland/snowden-vodafone-101.html
- http://www1.wdr.de/daserste/monitor/videos/videovodafonederlangearmdesbritischengeheimdienstes100.html
- http://international.sueddeutsche.de/post/103543418200/snowden-leaks-how-vodafone-subsidiary-cable
- ¤ GCHQ’s Vodafone Cable Master List ::
- https://netzpolitik.org/2014/cable-master-list-wir-spiegeln-die-snowden-dokumente-ueber-angezapfte-glasfasern-auch-von-vodafone/
- ¤ GCHQ Vodafone Gerontic Cables & Slides ::
- http://cryptome.org/2014/11/vodafone-gchq-slides.pdf
- http://cryptome.org/2014/11/vodafone-gchq-netzpolitik-slides-14-1125.pdf
- http://cryptome.org/2014/11/vodafone-gchq-netzpolitik-cables-14-1125.pdf
- ¤ GCHQ Vodafone Gerontic Cables & Slides ZIPPED ::
- http://cryptome.org/2014/11/Gerontic_GCHQ_SZ.zip
- ¤ INCENSER: How NSA and GCHQ Are Tapping Internet Cables ::
- http://electrospaces.blogspot.fi/2014/11/incenser-or-how-nsa-and-gchq-are.html
- _______________________________________
- ¤ Microsoft SkyDrive (aka OneDrive) Gateway Into NSA PRISM ::
- http://cryptome.org/2014/11/ms-onedrive-nsa-prism.htm
- NOTE: Anything uploaded to “the cloud” is going to be available
- for the government to snoop through, the new Apple iphone gadgets
- automatically upload all users’ personal files into “the cloud”
- and yes, looks like Microsoft is also doing it as well.
- You might want to avoid using these new systems, go back to using
- older desktop computers which are rather easy to fortify. As for
- phones, you can buy an old jitterbug phone - it’s a basic cellphone
- without all the other crap included - just plain oldschool, mofos!
- And add one more thing - a “Blockit Pocket.” ;)
- _______________________________________
- ¤ German Investigation of the Cooperation Between NSA-BND Part 1 ::
- http://electrospaces.blogspot.fr/2014/11/german-investigation-of-cooperation.html
- _______________________________________
- ¤ UK Lawyers Spied by GCHQ Spies ::
- http://cryptome.org/2014/11/uk-lawyers-spies-intercept-14-1106.pdf
- https://firstlook.org/theintercept/2014/11/06/uk-surveillance-of-lawyers-journalists-gchq/
- _______________________________________
- ¤ The German Operation Eikonal Part of NSA’s RAMPART-A Program ::
- Just over a week ago, the regional German paper Süddeutsche Zeitung
- and the regional broadcasters NDR and WDR came with a story saying that
- between 2004 and 2008, the German foreign intelligence service BND had
- tapped into the Frankfurt internet exchange DE-CIX and shared the
- intercepted data with the NSA. As not all communications of German
- citizens could be filtered out, this is considered a violation of the
- constitution.
- Here we will give a summary of what is currently known about this BND
- operation and we will combine this with information from earlier reports.
- This will show that it was most likely part of the RAMPART-A program of
- the NSA, which includes similar interception efforts by foreign partner
- agencies. Finally, we will look at where exactly the BND interception
- might have taken place.
- http://electrospaces.blogspot.fr/2014/10/the-german-operation-eikonal-as-part-of.html
- ---------------------------------------
- ¤ How Secret Partners Expand NSA’s Surveillance Dragnet ::
- https://firstlook.org/theintercept/article/2014/06/18/nsa-surveillance-secret-cable-partners-revealed-rampart-a/
- https://www.techdirt.com/articles/20140619/08062627624/nsa-working-with-denmark-germany-to-access-three-terabits-data-per-second-overseas-cables.shtml
- http://www.infowars.com/nsa-uses-33-countries-to-intercept-web-traffic-snowden-files/
- http://gigaom.com/2014/06/20/governments-let-nsa-tap-cables-on-their-territory-latest-snowden-revelations-show/
- ¤ Foreign Partner Access to Black Budget FY 2013 ::
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1200866/foreignpartneraccessbudgetfy2013-redacted.pdf
- ¤ Overview Presenting the RAMPART-A Spy Program ::
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1200860/odd-s3-overviewnov2011-v1-0-redacted-information.pdf
- ¤ Three RAMPART-A Slides ::
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1200865/uodds2overview-v1-1-redacted-information-dk.pdf
- ¤ Black Budget FY 2013 / RAMPART-A Slides (Mirror) ::
- http://cryptome.org/2014/06/nsa-intercept-14-0618.pdf
- ¤ Update ; Intercept Releases More RAMPART-A Slides ::
- http://cryptome.org/2014/06/nsa-information-intercept-14-0619.pdf
- _______________________________________
- ¤ Core Secrets: NSA Saboteurs in China and Germany
- The National Security Agency has had agents in China, Germany,
- and South Korea working on programs that use “physical subversion”
- to infiltrate and compromise networks and devices, according to
- documents obtained by The Intercept.
- The documents, leaked by NSA whistleblower Edward Snowden, also
- indicate that the agency has used “under cover” operatives to gain
- access to sensitive data and systems in the global communications
- industry, and that these secret agents may have even dealt with
- American firms. The documents describe a range of clandestine field
- activities that are among the agency’s “core secrets” when it comes
- to computer network attacks, details of which are apparently shared
- with only a small number of officials outside the NSA.
- “It’s something that many people have been wondering about for a
- long time,” said Chris Soghoian, principal technologist for the
- American Civil Liberties Union, after reviewing the documents.
- “I’ve had conversations with executives at tech companies about
- this precise thing. How do you know the NSA is not sending people
- into your data centers?”
- Previous disclosures about the NSA’s corporate partnerships have
- focused largely on US companies providing the agency with vast amounts
- of customer data, including phone records and email traffic. But
- documents published today by The Intercept suggest that even as the
- agency uses secret operatives to penetrate them, companies have also
- cooperated more broadly to undermine the physical infrastructure of
- the internet than has been previously confirmed.
- In addition to so-called “close access” operations, the NSA’s “core
- secrets” include the fact that the agency works with US and foreign
- companies to weaken their encryption systems; the fact that the NSA
- spends “hundreds of millions of dollars” on technology to defeat
- commercial encryption; and the fact that the agency works with US
- and foreign companies to penetrate computer networks, possibly without
- the knowledge of the host countries. Many of the NSA’s core secrets
- concern its relationships to domestic and foreign corporations.
- Some of the documents in this article appear in a new documentary,
- CITIZENFOUR, which tells the story of the Snowden disclosures and is
- directed by Intercept co-founder Laura Poitras. The documents describe
- a panoply of programs classified with the rare designation of
- “Exceptionally Compartmented Information,” or ECI, which are only
- disclosed to a “very select” number of government officials.
- https://firstlook.org/theintercept/2014/10/10/core-secrets/
- ¤ Top Secret Special Source Operations Classification Guides ::
- http://cryptome.org/2014/10/nsa-whipgenie-the-intercept-14-1010.pdf
- http://cryptome.org/2014/10/nsa-tarex-the-intercept-14-1010.pdf
- ¤ Operation Sentry Eagle (Parts 1 & 2) ::
- http://cryptome.org/2014/10/nsa-sentry-eagle-the-intercept-14-1010.pdf
- http://cryptome.org/2014/10/nsa-sentry-eagle-2-the-intercept-14-1010.pdf
- ¤ NSA Exceptionally Controlled Information ::
- http://cryptome.org/2014/10/nsa-eci-the-intercept-14-1010.pdf
- http://cryptome.org/2014/10/nsa-eci-pawleys-the-intercept-14-1010.pdf
- http://cryptome.org/2014/10/nsa-eci-compartments-the-intercept-14-1010.pdf
- ¤ NSA National Initiative Task Security (Parts 1 & 2) ::
- http://cryptome.org/2014/10/nsa-nit-the-intercept-14-1010.pdf
- http://cryptome.org/2014/10/nsa-nit-2-the-intercept-14-1010.pdf
- ¤ NSA Computer Network Exploitation ::
- http://cryptome.org/2014/10/nsa-cne-declass-the-intercept-14-1010.pdf
- ¤ Following 10 NSA Releases (8.5MB | ZIP) ::
- http://cryptome.org/2014/10/nsa-releases-the-intercept-14-1010.zip
- _______________________________________
- ¤ Retired NSA Technical Director Explains NSA Slides ::
- http://proxy.rickmartensen.nl/www.alexaobrien.com/secondsight/wb/binney.html
- ¤ Retired NSA Technical Director Explains NSA Slides (ZIP) ::
- Includes the report and the slides.
- http://fileb.ag/i627vr7a6bkx
- _______________________________________
- ¤ ACLU’s FOIA Documents Shed Light on One of the NSA’s Most
- Powerful Tools (Other Agencies and Legal Loopholes) ::
- https://www.aclu.org/blog/national-security/new-documents-shed-light-one-nsas-most-powerful-tools
- ¤ Overview of (Other) Signals Intelligence Authorities ::
- https://www.aclu.org/files/assets/eo12333/NSA/Overview%20of%20Signals%20Intelligence%20Authorities.pdf
- ¤ DoD-DIA’s 16 Legal Loopholes to Spy On US Persons ::
- https://www.aclu.org/files/assets/eo12333/DIA/DoD%20HUMINT%20Legal%20Workshop%20Fundamentals%20of%20HUMINT%20Targeting.pdf
- ¤ Intelligence Law Handbook Defense HUMINT Service ::
- https://www.aclu.org/files/assets/eo12333/DIA/Intelligence%20Law%20Handbook%20Defense%20HUMINT%20Service.pdf
- _______________________________________
- ¤ NSA Spies on UN in Vienna ::
- http://fm4.orf.at/stories/1746596/
- http://securityaffairs.co/wordpress/28666/intelligence/nsa-spying-un-vienna.html
- http://www.techworm.net/2014/09/erich-mochel-leaks-photos-nsa-spying-united-nations.html
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ How Covert Agents Infiltrate the Internet to Manipulate, Deceive,
- and Destroy Reputations ::
- https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
- http://www.infowars.com/cointelrpo-revisited-greenwald-exposes-nsa-agenda-to-destroy-journalists/
- One of the many pressing stories that remains to be told from the
- Snowden archive is how western intelligence agencies are attempting
- to manipulate and control online discourse with extreme tactics of
- deception and reputation-destruction. It’s time to tell a chunk of
- that story, complete with the relevant documents.
- Over the last several weeks, I worked with NBC News to publish a
- series of articles about “dirty trick” tactics used by GCHQ’s previously
- secret unit, JTRIG (Joint Threat Research Intelligence Group). These
- were based on four classified GCHQ documents presented to the NSA
- and the other three partners in the English-speaking “Five Eyes”
- alliance. Today, we at the Intercept are publishing another new
- JTRIG document, in full, entitled “The Art of Deception: Training
- for Online Covert Operations.”
- ¤ GCHQ ; The Art of Deception: Training for Online Covert Operations ::
- https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1021430/the-art-of-deception-training-for-a-new.pdf
- ---------------------------------------
- ¤ Hacking Online Polls and Other Ways British Spies
- Seek to Control the Internet ::
- The secretive British spy agency GCHQ has developed
- covert tools to seed the internet with false information,
- including the ability to manipulate the results of online
- polls, artificially inflate pageview counts on web sites,
- “amplify” sanctioned messages on YouTube, and censor video
- content judged to be “extremist.” The capabilities, detailed
- in documents provided by NSA whistleblower Edward Snowden,
- even include an old standby for pre-adolescent prank callers
- everywhere: A way to connect two unsuspecting phone users
- together in a call.
- The tools were created by GCHQ’s Joint Threat Research
- Intelligence Group (JTRIG), and constitute some of the most
- startling methods of propaganda and internet deception
- contained within the Snowden archive. Previously disclosed
- documents have detailed JTRIG’s use of “fake victim blog
- posts,” “false flag operations,” “honey traps” and
- psychological manipulation to target online activists,
- monitor visitors to WikiLeaks, and spy on YouTube and
- Facebook users.
- https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/
- http://www.infowars.com/what-exactly-are-the-spy-agencies-actually-doing-with-their-bag-of-dirty-tricks/
- ¤ GCHQ’s JTRIG Tools and Techniques ::
- http://cryptome.org/2014/07/nsa-jtrigall-intercept-14-0714.pdf
- ---------------------------------------
- ¤ More Details on GCHQ Propaganda/Deception Tactics ::
- https://firstlook.org/theintercept/2014/04/04/cuban-twitter-scam-social-media-tool-disseminating-government-propaganda/
- This week, the Associated Press exposed a secret
- program run by the US Agency for International
- Development to create “a Twitter-like Cuban
- communications network” run through “secret shell
- companies” in order to create the false appearance
- of being a privately owned operation. Unbeknownst
- to the service’s Cuban users was the fact that
- “American contractors were gathering their private
- data in the hope that it might be used for political
- purposes”–specifically, to manipulate those users
- in order to foment dissent in Cuba and subvert its
- government. According to top-secret documents
- published today by The Intercept, this sort of
- operation is frequently discussed at western
- intelligence agencies, which have plotted ways to
- covertly use social media for “propaganda,” “deception,”
- “mass messaging,” and “pushing stories.” ...
- ¤ GCHQ Full Spectrum Cyber Effects ::
- “Destroy Deny Degrade Disrupt Deceive Protect”
- http://cryptome.org/2014/04/gchq-full-spectrum-cyber.pdf
- ... The annual SIGDEV conference, according to one
- NSA document published today by The Intercept, “enables
- unprecedented visibility of SIGINT Development activities
- from across the Extended Enterprise, Second Party and US
- Intelligence communities.” The 2009 Conference, held at
- Fort Meade, included “eighty-six representatives from
- the wider US Intelligence Community, covering agencies
- as diverse as CIA (a record 50 participants), the Air
- Force Research Laboratory and the National Air and
- Space Intelligence Center.”
- Defenders of surveillance agencies have often insinuated
- that such proposals are nothing more than pipe dreams
- and wishful thinking on the part of intelligence agents.
- But these documents are not merely proposals or hypothetical
- scenarios. As described by the NSA document published
- today, the purpose of SIGDEV presentations is “to
- synchronize discovery efforts, share breakthroughs,
- and swap knowledge on the art of analysis.”
- For instance: One of the programs described by the newly
- released GCHQ document is dubbed “Royal Concierge,” under
- which the British agency intercepts email confirmations
- of hotel reservations to enable it to subject hotel
- guests to electronic monitoring. It also contemplates
- how to “influence the hotel choice” of travelers and
- to determine whether they stay at “SIGINT friendly”
- hotels. The document asks: “Can we influence the hotel
- choice? Can we cancel their visit?” ...
- ¤ NSA 5 Eyes 2009 SIGDEV Conference ::
- http://cryptome.org/2014/04/nsa-5-eyes-2009-sigdev.pdf
- ---------------------------------------
- ¤ GCHQ Trolls, Spies and Deceives Online Users ::
- http://cryptome.org/2014/02/gchq-online-deception.pdf
- ¤ GCHQ Disruption Operations ::
- http://cryptome.org/2014/02/gchq-disruption.pdf
- ¤ GCHQ Spreads Propaganda to Discredit Critics ::
- The documents from the GCHQ (the British equivalent
- of the NSA), titled “The Art of Deception: Training
- for Online Covert Operations,” were given to the
- NSA and leaked by Snowden. They reveal that the
- GCHQ is involved, through a unit known as JTRIG
- (Joint Threat Research Intelligence Group), in
- “the monitoring of YouTube and Blogger, the
- targeting of Anonymous with the very same DDoS
- attacks they accuse “hacktivists” of using, the
- use of honey traps (luring people into compromising
- situations using sex) and destructive viruses.”
- The goals of the JTRIG program are “(1) to inject
- all sorts of false material onto the internet in
- order to destroy the reputation of its targets;
- and (2) to use social sciences and other techniques
- to manipulate online discourse and activism to
- generate outcomes it considers desirable.”
- https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
- http://www.examiner.com/article/government-infiltrating-websites-to-deny-disrupt-degrade-deceive
- http://rt.com/news/five-eyes-online-manipulation-deception-564/
- ---------------------------------------
- ¤ GCHQ Attacked Anonymous in 2012 ::
- http://cryptome.org/2014/02/gchq-anonymous.pdf
- http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_anonymous_nbc_document.pdf
- ¤ GCHQ Cyber Attack Operations ::
- http://cryptome.org/2014/02/gchq-cyber-attack.pdf
- http://s3.documentcloud.org/documents/1015553/snowden-cyber-offensive1-nbc-document.pdf
- ¤ GCHQ Full-Spectrum Cyber Effects ::
- http://cryptome.org/2014/02/gchq-cyber-effects.pdf
- ¤ GCHQ Spies Attacked Anonymous IRC Chats ::
- http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361
- http://www.zdnet.com/uk-used-denial-of-service-against-anonymous-7000025993/
- http://www.wired.co.uk/news/archive/2014-02/05/gchq-ddos-attack-anonymous
- ¤ British Spies Used Porn and Dirty Tricks to
- Lure Targets to Honeypots ::
- http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-sex-dirty-tricks-n23091
- ---------------------------------------
- ¤ NSA & GCHQ Spies on Wikileaks, TPB Visitors ::
- https://firstlook.org/theintercept/article/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/
- http://wikileaks.org/NSA-and-GCHQ-spying-on-WikiLeaks.html
- https://www.eff.org/deeplinks/2014/02/surveillance-and-pressure-wikileaks-readers
- http://torrentcrazy.com/news/nsa-authorized-monitoring-of-pirate-bay-and-proxy-users
- ¤ NSA-GCHQ Discovery SIGINT Targeting ::
- http://cryptome.org/2014/02/nsa-gchq-discovery.pdf
- ¤ Youtube Targets by SQUEAKYDOLPHIN Presentation ::
- http://cryptome.org/2014/02/gchq-squeakydolphin-videos.htm
- ¤ GCHQ Psychology SIGDEV ::
- http://cryptome.org/2014/02/gchq-psychology.pdf
- ---------------------------------------
- ▲ Reddit Censors All Stories Above ::
- http://www.infowars.com/reddit-censors-big-story-about-government-manipulation-and-disruption-of-the-internet/
- _______________________________________
- ¤ Unraveling NSA’s TURBULENCE Programs ::
- https://robert.sesek.com/2014/9/unraveling_nsa_s_turbulence_programs.html
- _______________________________________
- ¤ New Zealand’s Prime Minister Isn’t Telling the Truth About
- Mass Surveillance ::
- https://firstlook.org/theintercept/2014/09/15/snowden-new-zealand-surveillance/
- ¤ New Zealand Launched Mass Surveillance Project While Publicly
- Denying It ::
- https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/
- ¤ Snowden and Greenwald Reveal Prime Minister John Key Lied About
- Kiwi Mass Surveillance, Key Calls Greenwald “A Loser” ::
- https://www.techdirt.com/articles/20140915/06175828518/snowden-greenwald-reveal-pm-john-key-lied-about-kiwi-mass-surveillance-key-hits-back-calling-greenwald-loser.shtml
- ¤ New Zealand Prime Minister Releases GCSB Spy Documents ::
- http://cryptome.org/2014/09/gcsb-nz-pm-nz-herald-14-0916.zip
- ¤ NSA Visit by New Zealand Spy PM Ferguson ::
- http://cryptome.org/2014/09/nsa-nz-ferguson-visit-the-intercept-14-0915.pdf
- ¤ The Questions for New Zealand on Mass Surveillance ::
- https://firstlook.org/theintercept/2014/09/15/questions-new-zealand-mass-surveillance/
- _______________________________________
- ▼ NSA Spooks Deny The Evidence (Provided Below) Exists ::
- Did the NSA forget Ed Snowden contacted NBC and released
- the evidence contacting authorities regarding his concerns?
- https://news.vice.com/article/the-nsa-has-revealed-new-details-about-its-exhaustive-search-of-edward-snowdens-emails
- ▲ FLASHBACK! Snowden Strikes Back at NSA, Emails NBC News ::
- Fugitive Edward Snowden on Friday challenged the
- NSA’s insistence that it has no evidence he tried
- to raise concerns about the agency’s surveillance
- activity before he began leaking government documents
- to reporters, calling the response a “clearly tailored
- and incomplete leak ... for a political advantage.”
- “The NSA’s new discovery of written contact between
- me and its lawyers -- after more than a year of denying
- any such contact existed - raises serious concerns,”
- Snowden said in an email Friday to NBC News. “It
- reveals as false the NSA’s claim to Barton Gellman
- of the Washington Post in December of last year, that
- ‘after extensive investigation, including interviews
- with his former NSA supervisors and co-workers, we
- have not found any evidence to support Mr. Snowden’s
- contention that he brought these matters to anyone’s
- attention.’”
- Snowden’s email followed Thursday’s release by the US
- Office of the Director of Intelligence of an email
- exchange between Snowden and the NSA’s Office of the
- General Counsel. The Washington Post received and
- published a similar response from Snowden on Thursday.
- http://www.nbcnews.com/feature/edward-snowden-interview/snowden-strikes-back-nsa-emails-nbc-news-n118821
- ▲ NSA Oversight Training, OVSC1800 Minimization Training,
- NSA OGC Snowden Emails on OVSC1800 Course ::
- http://cryptome.org/2014/05/nsa-oversight.pdf
- http://cryptome.org/2014/05/nsa-ovsc1800.pdf
- http://cryptome.org/2014/05/nsa-ogc-snowden.pdf
- ---------------------------------------
- ¤ NBC Interviews Edward Snowden (Full) ::
- https://www.youtube.com/watch?v=yNhMXyAdjp8
- Mirror here » http://upstore.net/62ocku
- _______________________________________
- ¤ NSA-GCHQ Breached Deutsche Telekom and Other German Firms ::
- According to top-secret documents from the NSA and the British
- agency GCHQ, the intelligence agencies are seeking to map the entire
- Internet, including end-user devices. In pursuing that goal, they
- have broken into networks belonging to Deutsche Telekom.
- http://www.spiegel.de/international/world/snowden-documents-indicate-nsa-has-breached-deutsche-telekom-a-991503.html
- https://firstlook.org/theintercept/2014/09/14/nsa-stellar/
- ¤ GCHQ Satellite Teleport Knowledge ::
- http://cryptome.org/2014/09/gchq-stellar-der-spiegel-14-0914.pdf
- ¤ NSA Treasure Map New Release ::
- http://cryptome.org/2014/09/nsa-treasure-map-new-der-spiegel-14-0914.pdf
- ¤ NSA Treasure Map Slides ::
- http://cryptome.org/2014/09/nsa-treasure-map-der-spiegel-14-0914.pdf
- http://s3.documentcloud.org/documents/1301057/tm-m-402.pdf
- _______________________________________
- ¤ NSA Economic Espionage Benefits American Corporations ::
- https://firstlook.org/theintercept/2014/09/05/us-governments-plans-use-economic-espionage-benefit-american-corporations/
- ¤ Masterspy Quadrennial Report 2009 (Spy For US Corporations) ::
- http://cryptome.org/2014/09/dni-qicr-2009-the-intercept-14-0905.pdf
- ▲ UPDATE: Obama Rubber Stamps Economic Espionage, Mass Spying ::
- http://www.nationaljournal.com/tech/despite-obama-s-pledge-to-curb-it-nsa-mass-surveillance-wins-rubber-stamp-20140913
- _______________________________________
- ¤ Bush-era Justification For Warrantless Wiretapping ::
- http://www.washingtonpost.com/world/national-security/legal-memos-released-on-bush-era-justification-for-warrantless-wiretapping/2014/09/05/91b86c52-356d-11e4-9e92-0899b306bbea_story.html
- http://www.dailystar.com.lb/News/World/2014/Sep-06/269796-bush-era-memos-president-can-wiretap-americans-at-all-times.ashx
- http://mic.com/articles/98116/just-released-bush-administration-memos-explain-deeply-disturbing-government-spying
- ¤ NSA STELLAR WIND Assessed by DoJ 2004 (REDACTED) ::
- http://cryptome.org/2014/09/nsa-olc-stellar-wind-wapo-14-0906.pdf
- ¤ NSA STELLAR WIND Assessed by DoJ 2004 (UNREDACTED) ::
- Above DOJ assessment released by WaPo compared to ACLU document.
- http://cryptome.org/2014/09/nsa-olc-stellar-wind-annotated.pdf
- ¤ NSA’s STELLAR WIND PROGRAM (DECLASSIFIED 2013) ::
- RAGTIME was the codename for Stellar Wind.
- http://cryptome.org/2013/06/nsa-stellar-wind.pdf
- ¤ NSA STELLARWIND Classification Marking ::
- http://electrospaces.blogspot.com/2014/09/about-stellarwind-and-another.html
- _______________________________________
- ¤ DNI Releases 47 FISC Yahoo Documents ::
- http://cryptome.org/2014/09/dni-fisc-yahoo-14-0911.zip
- _______________________________________
- KILLCEN ; Eyeballing Snowden’s Info
- Includes all news reports, videos, images, slides and
- documents from and related to Snowden’s leaks so far,
- up to September 5th of 2014. I’m still collecting any
- information that comes out and will provide an updated
- archive twice per year.
- Due to the enormous size of this current archive, the
- archive has been split concurrent to the names of each
- file and directory in alphabetical order to facilitate
- the size limit while uploading to the file hosts below.
- After decompression, the first folder is titled “Eyeballing_
- Snowden_Info_Folder_01” and the second is titled “Eyeballing_
- Snowden_Info_Folder_02” , both holding a total of 1,668 files
- (1.37GB) after being decompressed and consolidated.
- This was stored on an old OFFLINE system, without any
- WiFi card or modem attached so the archive is safe from
- being modified, exploited or stolen.
- Eyeballing_Snowden_Info_Folder_01.zip
- (589 files | ZIP | 686MB)
- http://fileb.ag/ojvlj5rqihw2
- http://bitshare.com/files/pigqc2bo/Eyeballing_Snowden_Info_Folder_01.zip.html
- http://fpsbay.com/download/64709X14099602822363X347361/Eyeballing_Snowden_Info_Folder_01.zip
- Eyeballing_Snowden_Info_Folder_02.zip
- (1,079 files | ZIP | 476MB)
- http://fileb.ag/xqtrujp8jcey
- http://bitshare.com/files/ztfcjdwg/Eyeballing_Snowden_Info_Folder_02.zip.html
- http://fpsbay.com/download/64711X14099654782364X347381/Eyeballing_Snowden_Info_Folder_02.zip
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA ; Ask Zelda (Redacted) ::
- http://cryptome.org/2014/03/nsa-ask-zelda.pdf
- https://firstlook.org/theintercept/article/2014/03/07/nsa-advice-columnist-seriously/
- ¤ NSA ; Ask Zelda (Full, DECLASSIFIED) ::
- http://cryptome.org/2014/09/nsa-ask-zelda-14-0828.pdf
- _______________________________________
- ¤ NSA’s Foreign Partnerships ::
- http://electrospaces.blogspot.com/2014/09/nsas-foreign-partnerships.html
- _______________________________________
- ¤ Two-Faced Friendship: Turkey Is Partner and Target for NSA ::
- http://www.spiegel.de/international/documents-show-nsa-and-gchq-spied-on-partner-turkey-a-989011.html
- https://firstlook.org/theintercept/2014/08/31/nsaturkeyspiegel/
- ¤ NSA-GCHQ Eyeball Turkey (Original Links) ::
- http://www.spiegel.de/media/media-34650.pdf
- http://www.spiegel.de/media/media-34651.pdf
- http://www.spiegel.de/media/media-34652.pdf
- http://www.spiegel.de/media/media-34653.pdf
- http://www.spiegel.de/media/media-34654.pdf
- http://www.spiegel.de/media/media-34655.pdf
- http://www.spiegel.de/media/media-34656.pdf
- http://www.spiegel.de/media/media-34657.pdf
- http://www.spiegel.de/media/media-34658.pdf
- http://www.spiegel.de/media/media-34659.pdf
- http://www.spiegel.de/media/media-34660.pdf
- http://www.spiegel.de/media/media-34661.pdf
- http://www.spiegel.de/media/media-34662.pdf
- ¤ NSA-GCHQ Eyeball Turkey (Mirrored) ::
- http://cryptome.org/2014/08/nsa-gchq-spy-turkey-der-spiegel-14-0831.pdf
- _______________________________________
- ¤ How the NSA Built Its Own Secret Google ::
- https://firstlook.org/theintercept/article/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton
- ¤ NSA ICREACH Slides ::
- http://cryptome.org/2014/08/nsa-icreach.pdf
- _______________________________________
- ¤ NSA-GCHQ-CSEC HACIENDA Program for Internet Colonization ::
- http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html
- ¤ NSA-GCHQ-CSEC HACIENDA Slides (ZIP) ::
- http://www.xup.to/dl,62909734/HACIENDA_Slides.zip/
- ¤ NSA-GCHQ-CSEC HACIENDA Slides (PDF) ::
- http://cryptome.org/2014/08/nsa-gchq-csec-hacienda-heise-14-0816.pdf
- _______________________________________
- ¤ Now US Corporations Admit They Profit From Spying ::
- Beat them at their own game - lie.
- http://www.forbes.com/sites/quickerbettertech/2014/08/18/the-other-sharing-economy-thats-about-to-change-the-world/
- ¤ Money And Power - The Real Reason For The NSA Spying On Everyone ::
- Put out false information. Flood them with false data.
- https://www.techdirt.com/articles/20140819/17104028259/money-power-real-reason-nsa-spying-everyone.shtml
- _______________________________________
- ¤ Newly Declassified Documents Regarding the “Now-Discontinued” (?)
- NSA Bulk Electronic Communications Metadata Pursuant to Section 402
- of the Foreign Intelligence Surveillance Act ::
- http://icontherecord.tumblr.com/
- _______________________________________
- ¤ GCHQ Covert Mobile Phone Security Tactics ::
- http://cryptome.org/2014/08/gchq-covert-mobiles-the-intercept-14-0812.pdf
- ¤ Compare GCHQ Security Tactics to Jihadist Tactics ::
- https://prod01-cdn03.cdn.firstlook.org/wp-uploads/sites/1/2014/08/GCHQ-Jihadist-handbook.gif
- _______________________________________
- ¤ Barack Obama’s Secret “Terrorist-Tracking” System ::
- Nearly half of the people on the US government’s widely shared
- database of terrorist suspects are not connected to any known
- terrorist group, according to classified government documents
- obtained by The Intercept.
- https://firstlook.org/theintercept/article/2014/08/05/watch-commander/
- ¤ NCTC Directorate of Terrorist Identities ::
- http://cryptome.org/2014/08/nctc-dti-the-intercept.pdf
- ¤ Secret Government Rulebook For Labeling You a Terrorist ::
- The Obama administration has quietly approved a substantial
- expansion of the terrorist watchlist system, authorizing a
- secret process that requires neither “concrete facts” nor
- “irrefutable evidence” to designate an American or foreigner
- as a terrorist, according to a key government document obtained
- by The Intercept.
- http://cryptome.org/2014/07/nctc-watchlist-intercept-14-0723.pdf
- https://firstlook.org/theintercept/article/2014/07/23/blacklisted/
- http://www.infowars.com/leaked-document-facts-and-evidence-not-considered-when-adding-americans-to-terror-lists/
- https://www.techdirt.com/articles/20140723/14232027979/intercept-reveals-us-governments-guidebook-declaring-your-terrorist-putting-you-no-fly-list.shtml
- https://www.techdirt.com/articles/20140723/14321427980/revealed-what-kind-extra-scrutiny-government-gives-to-folks-terrorist-watchlist.shtml
- NOBODY notes
- Sounds much like the (now defunct) COINTELPRO operation the
- FBI once was launched to target, blacklist and harrass US
- civil rights activists and whistleblowers back in the day -
- only these “dirty tricks” are now fully digitalized.
- ¤ Executive Order 12333: They Do Spy on Americans ::
- John Tye is but the latest surveillance whistleblower,
- though he took pains to distinguish himself from Snowden
- and his approach to dissent. “Before I left the State
- Department, I filed a complaint with the department’s
- inspector general, arguing that the current system of
- collection and storage of communications by US persons
- under Executive Order 12333 violates the Fourth Amendment,
- which prohibits unreasonable searches and seizures,”
- Tye explained. “I have also brought my complaint to the
- House and Senate intelligence committees and to the
- inspector general of the NSA.”
- These steps — which many say Snowden should’ve taken —
- produced no changes to the objectionable NSA spying and
- wouldn’t be garnering attention at all if not for
- Snowden’s leaks.
- http://www.washingtonpost.com/opinions/meet-executive-order-12333-the-reagan-rule-that-lets-the-nsa-spy-on-americans/2014/07/18/93d2ac22-0b93-11e4-b8e5-d0de80767fc2_story.html
- http://www.theatlantic.com/politics/archive/2014/07/a-new-surveillance-whistleblower-emerges/374722/
- _______________________________________
- ¤ Cash, Weapons, Surveillance - The US is a Key Party to Every
- Israeli Attack ::
- The US government has long lavished overwhelming aid on Israel,
- providing cash, weapons and surveillance technology that play a
- crucial role in Israel’s attacks on its neighbors. But top secret
- documents provided by NSA whistleblower Edward Snowden shed
- substantial new light on how the US and its partners directly
- enable Israel’s military assaults – such as the one on Gaza.
- https://firstlook.org/theintercept/2014/08/04/cash-weapons-surveillance/
- ¤ ISNU-NSA Spying Pact (1999 & 2013) ::
- http://cryptome.org/2014/08/israel-us-1999-the-intercept.pdf
- http://cryptome.org/2014/08/nsa-israel-2013-the-intercept.pdf
- ¤ US Empire Pays Israel $500,000 in 2004 ::
- http://cryptome.org/2014/08/nsa-israel-500k-2004.pdf
- ¤ (RELATED) Terrorism in the Israeli Attack on Gaza ::
- https://firstlook.org/theintercept/2014/07/29/terrorism-israelgaza-context/
- http://www.presstv.ir/detail/2014/08/04/374016/us-directly-enables-israeli-attacks-on-gaza/
- http://rt.com/news/177716-us-israel-funding-aggression/
- ¤ (RELATED) Gaza Natural Gas - Why Israel Kills for It ::
- http://cryptome.org/2014/08/gaza-natural-gas.zip
- _______________________________________
- ¤ USA-Saudi Arabia Spy Partnership ::
- http://cryptome.org/2014/07/nsa-saudi-arabia-intercept-14-0725.pdf
- ¤ NSA’s New Partner in Spying ; Saudi Arabia’s Brutal State Police ::
- The National Security Agency last year significantly expanded
- its cooperative relationship with the Saudi Ministry of Interior,
- one of the world’s most repressive and abusive government agencies.
- An April 2013 top secret memo provided by NSA whistleblower Edward
- Snowden details the agency’s plans “to provide direct analytic and
- technical support” to the Saudis on “internal security” matters.
- The Saudi Ministry of Interior—referred to in the document as MOI
- — has been condemned for years as one of the most brutal human rights
- violators in the world. In 2013, the U.S. State Department reported
- that “Ministry of Interior officials sometimes subjected prisoners
- and detainees to torture and other physical abuse,” specifically
- mentioning a 2011 episode in which MOI agents allegedly “poured an
- antiseptic cleaning liquid down [the] throat” of one human rights
- activist. The report also notes the MOI’s use of invasive surveillance
- targeted at political and religious dissidents.
- But as the State Department publicly catalogued those very abuses,
- the NSA worked to provide increased surveillance assistance to the
- ministry that perpetrated them. The move is part of the Obama
- Administration’s increasingly close ties with the Saudi regime;
- beyond the new cooperation with the MOI, the memo describes “a
- period of rejuvenation” for the NSA’s relationship with the Saudi
- Ministry of Defense.
- In general, US support for the Saudi regime is long-standing. One
- secret 2007 NSA memo lists Saudi Arabia as one of four countries
- where the US “has [an] interest in regime continuity.”
- https://firstlook.org/theintercept/2014/07/25/nsas-new-partner-spying-saudi-arabias-brutal-state-police/
- _______________________________________
- ¤ Senate Bill Spy Funding FY 2015 ::
- http://cryptome.org/2014/07/spy-funding-fy2015.pdf
- _______________________________________
- ¤ NSA Spying Costs to US Businesses ::
- http://cryptome.org/2014/07/nsa-naf-spy-costs.pdf
- http://www.bloomberg.com/news/2014-07-29/tech-companies-reel-as-nsa-spying-mars-image-for-clients.html
- _______________________________________
- ¤ Insider - Intelligence Agencies Are Running Governments ::
- Alex Jones talks with NSA whistleblower William Binney about the
- growing corruption and power of the NSA and how they abuse their
- power behind the scenes to pull strings.
- http://www.youtube.com/watch?v=DERMBOJBDCk
- http://www.infowars.com/insider-says-intelligence-agencies-are-running-the-government/
- _______________________________________
- ¤ NSA/FISA Spying Timeline ::
- 1978 FISA ; 1981 EO 12333, 1982 DoD Reg 5240.1-R,
- 1993 USSID SP0018 ; 2001 USA Patriot Act, 2002 FISC
- “Raw Take” Share Motion ; 2003 SP002 ; 2004 PR/TT FISA ;
- 2004 NSA/CSS Policy 1-23 ; 2006 BR FISA ; 2006 RAS Memo ;
- 2007 PAA (expired) ; 2008 FAA ; 2008 SP002 (Revised) ;
- 2008 EO 12333 (Revised) ; 2008 RAS Memo (Revised) ;
- 2009 NSA/CSS Policy 1-23 (Revised).
- http://cryptome.org/2014/03/nsa-spy-timeline.pdf
- ▲ FISA Surveillance Leaks ::
- http://cryptome.org/2013/06/nsa-fisa-targeting.pdf
- http://cryptome.org/2013/06/nsa-fisa-minimization.pdf
- http://cryptome.org/2013/06/nsa-fisa-certification.pdf
- ▲ Executive Order 12333 (Default 1981) ::
- http://www.archives.gov/federal-register/codification/executive-order/12333.html
- ▲ DoD Regulation 5240.1-R (1982) ::
- Guidance to DoD components in implementing EO 12333
- and general rules pursuant to FISA.
- http://cryptome.org/dod5240-1-r.htm
- ▲ USSID SP0018 (2003) ::
- http://www.dni.gov/files/documents/1118/CLEANEDFinal%20USSID%20SP0018.pdf
- ▲ FISA ; Pen Register and Trap and Trace (PR/TT) ::
- Opinion of the FISC granting the government application
- seeking the collection of bulk electronic communications
- metadata pursuant to Section 402 of FISA, the Pen Register
- and Trap and Trace (PR/TT) provision.
- http://cryptome.org/2013/11/nsa-13-1118/CLEANEDPRTT%201.pdf
- ▲ Bulk Collection Programs Under PATRIOT ACT ::
- http://cryptome.org/2013/07/obama-releases-13-0731.pdf
- ▲ NSA/CSS Policy 1-23 (Default 2004) ::
- http://cryptome.org/nsa-css-1-23.pdf
- ▲ NSA/CSS Policy 1-23 (Revised 2009) ::
- http://cryptome.org/2014/07/nsa-css-policy-1-23-nyt-14-0727.pdf
- ▲ Executive Order 12333 (Revised 2008) ::
- http://cryptome.org/eo12333-amend.htm
- NSA’s FOIA Release » http://cryptome.org/nsa-eo12333.pdf
- ▲ NSA ; FISA/PAA/FAA Classification Guide ::
- http://cryptome.org/2014/03/nsa-fisa-faa-class.pdf
- ▲ NSA Attorney General Dissemination Procedures ::
- http://cryptome.org/2014/03/nsa-ag-dissemination.pdf
- _______________________________________
- ¤ NSA SIGINT Records Disposition Schedule ::
- http://cryptome.org/2014/08/nsa-sigint-rds.pdf
- http://www.nsa.gov/public_info/declass/records_management/index.shtml
- _______________________________________
- ¤ The NSA Said Edward Snowden Had No Access to Surveillance
- Intercepts, They Lied ::
- The contents of the surveillance files — almost half of which
- contained information from US citizens or residents — “tell
- stories of love and heartbreak, illicit sexual liaisons,
- mental-health crises, political and religious conversions,
- financial anxieties and disappointed hopes.”
- http://www.theatlantic.com/politics/archive/2014/07/a-devastating-leak-for-edward-snowdens-critics/373991/
- http://www.motherjones.com/kevin-drum/2014/07/nsa-said-edward-snowden-had-no-access-surveillance-intercepts-they-lied
- http://www.nationaljournal.com/tech/snowden-undermines-presidential-panel-s-defense-of-nsa-spying-20140708
- ¤ Meet the Muslim-American Leaders the FBI and NSA Have
- Been Spying On ::
- The National Security Agency and FBI have covertly
- monitored the emails of prominent Muslim-Americans—including
- a political candidate and several civil rights activists,
- academics, and lawyers—under secretive procedures intended
- to target terrorists and foreign spies.
- According to documents provided by NSA whistleblower
- Edward Snowden, the list of Americans monitored by their
- own government includes:
- • Faisal Gill, a longtime Republican Party operative and
- one-time candidate for public office who held a top-secret
- security clearance and served in the Department of Homeland
- Security under President George W. Bush;
- • Asim Ghafoor, a prominent attorney who has represented
- clients in terrorism-related cases;
- • Hooshang Amirahmadi, an Iranian-American professor of
- international relations at Rutgers University;
- • Agha Saeed, a former political science professor at
- California State University who champions Muslim civil
- liberties and Palestinian rights;
- • Nihad Awad, the executive director of the Council on
- American-Islamic Relations (CAIR), the largest Muslim civil
- rights organization in the country.
- https://firstlook.org/theintercept/article/2014/07/09/under-surveillance/
- http://www.infowars.com/fbi-directly-spying-on-prominent-muslim-american-politicians-lawyers-and-civil-rights-activists/
- http://electrospaces.blogspot.ca/2014/07/document-shows-that-it-was-not-nsa-but.html
- ¤ NSA FISA Accounts and Emails ::
- http://cryptome.org/2014/07/nsa-fisa-accounts.pdf
- http://cryptome.org/2014/07/nsa-emails.pdf
- ¤ Those Not Targeted Far Outnumber Foreigners Who Are ::
- NSA targeted domestic communications as well as foreign.
- http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-who-are/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html
- ▼ NSA OKs Domestic Spying for Suspected Criminals ::
- ¯¯¯¯¯¯¯¯¯
- “The FBI is also permitted to disseminate US person
- information that reasonably appears to be evidence of a
- crime to law enforcement authorities.”
- http://cryptome.org/2014/07/pclob-14-0702.pdf
- ▲ US Government Denies Spying US Persons ::
- http://cryptome.org/2014/07/dni-doj-14-0709.pdf
- NOBODY responds
- Compare the new DoJ memo (dni-doj-14-0709.pdf)
- with the one during 2007, before any of the NSA
- documents were ever leaked (doj-nsa-memo.pdf)
- http://cryptome.org/2013/06/doj-nsa-memo.pdf
- Now compare the arrogance of the political class
- back in 2004 up till today.
- http://www.infowars.com/congress-insisted-they-be-kept-in-the-dark-on-nsa-spying/
- Notice their lack of oversight during the Bush regime
- now stuck in continuum under the Obama regime?
- http://www.infowars.com/senate-committee-passes-cisa-cybersecurity-bill-that-could-broaden-nsa-powers/
- Just like those in the “Department of Justice” they
- never learn from their mistakes, they are stuck in a
- state of blissful ignorance, they lie and when the truth
- comes out (as it often does), then they deny it happened.
- ¤ Some New Thoughts on the Snowden Cache ::
- http://members.efn.org/~paulmd/SomeNewThoughtsontheSnowdenCache.html
- “So, apparently the Snowden cache contains quite a large number
- of intercepted communications, not just technical documents,
- PowerPoint slides, and memos. This opens up a whole can of worms,
- and some new possibilities for the cache.
- Worms first: several journalists have access to an incredibly
- sensitive cache of personal information. According to some NSA
- defenders: Snowden has committed a horrible privacy violation
- of thousands of innocent Americans. This is a big problem, but
- it requires some mental gymnastics not to recognize that if
- Snowden had violated the privacy of innocents by giving this
- information to journalists, so had the NSA by storing it in the
- first place. Realistically, it’s not one or the other, it’s
- both. Now that we know what it contains, the long term storage
- of that portion cache by journalists becomes very problematic.
- On one hand: it’s evidence, on the other, it’s private information
- on many thousands of people.
- While there are some problems, there are also new possibilities.
- First, it could be a boon for defendants, and those facing legal
- jeopardy, to confront the evidence against them, to receive a
- genuinely fair trial. This is doubly important for drug cases,
- particularly those with DEA involvement, because of the highly
- questionably practice of Parallel Reconstruction, wherein
- classified evidence is laundered, and is reconstructed using
- traditional methods. In effect: perjury. Second, it is prima
- facie evidence to use in lawsuits against the NSA, proof that
- a plaintiff had been spied on. Third, one of the wilder stories:
- Snowden to Reveal the Secrets of Arab Dictators, really can
- happen now. The US government’s dealings with brutal regimes
- are newsworthy, so are the dealings of those regimes against
- their own people.
- One of the things that makes Cablegate so powerful, and
- simultaneously controversial, is the ability of ordinary
- citizens to query it, and learn what the government had kept
- hidden. In at least one case, it allowed a rendition victim
- to seek justice. I am not suggesting leaking it out in full,
- but ways of allowing ordinary citizens the ability to get
- their own communications, and broadening access, should be
- considered. Contrary to the opinions of those who described
- the Post’s story as a dud, it’s the first page of the next
- chapter of the Snowden Saga, with wide-reaching, and
- unpredictable consequences.”
- By Paul Dietrich, Jul 8, 2014
- _______________________________________
- ¤ Networks vs. Hierarchies: Which Will Win? ::
- http://libertyblitzkrieg.com/2014/06/22/networks-vs-hierarchies-which-will-win-niall-furguson-weighs-in/
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ Ultimate Goal of the NSA ; Total Population Control ::
- At least 80% of all audio calls, not just metadata, are
- recorded and stored in the US, says whistleblower William
- Binney – that’s a “totalitarian mentality.”
- http://www.theguardian.com/commentisfree/2014/jul/11/the-ultimate-goal-of-the-nsa-is-total-population-control
- _______________________________________
- ¤ NSA Hacks TOR in Germany, Calls Users Extremists ::
- http://cryptome.org/2014/07/nsa-tor-de.htm
- It is one of the most sensitive secrets of the NSA,
- the engine of the global monitoring machine: the source
- code of the XKeyscore program, the most comprehensive
- Ausspähprogramm of US foreign intelligence.
- NDR and WDR have excerpts of the source code. Parts of
- the collection infrastructure ie, so-called software rules
- that define the intelligence, what or who they want to
- investigate.
- There are only a few numbers and characters to string
- together the programmer. But when the program executes
- XKeyscore these rules, get people and their data in their
- sights. The connections from computers to the Internet
- are identified and stored in a database type. The users
- are quasi marked. It is the dragnet of the 21st century.
- http://download.media.tagesschau.de/video/2014/0703/TV-20140703-0546-2401.webl.webm
- MP4 Video Format » http://fileb.ag/u12my0tpvr8y
- ¤ XKeyscore Targets Tor ::
- http://daserste.ndr.de/panorama/xkeyscorerules100.txt
- ¤ NSA Targets the Privacy-conscious Using Tor ::
- http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html
- ---------------------------------------
- ¤ NSA/FRA XKeyscore Targets Tor, etc. ::
- http://cryptome.org/2013/12/nsa-xkeyscore-tor-slides.pdf
- ¤ NSA & GCHQ Counter-Tor Slides ::
- “Use cookies to identify Tor users when they are not
- using Tor.”
- “Investigate Evercookie persistence.”
- http://cryptome.org/2013/10/nsa-tor-stinks.pdf
- ¤ Cookies Threaten Tor User Anonymity ::
- “Just because you’re using Tor doesn’t mean that your
- browser isn’t storing cookies,” said Jeremiah Grossman,
- a colleague of Hansen’s who also specializes in browser
- vulnerabilities.
- As Grossman described the procedure to CNET, the NSA is
- aware of Tor’s entry and exit nodes because of its Internet
- wide surveillance.
- “The very feature that makes Tor a powerful anonymity
- service, and the fact that all Tor users look alike on the
- Internet, makes it easy to differentiate Tor users from
- other Web users,” he wrote.
- “The NSA then cookies that ad, so that every time you go
- to a site, the cookie identifies you. Even though your IP
- address changed [because of Tor], the cookies gave you away,”
- he said.
- http://news.cnet.com/8301-1009_3-57606178-83/nsa-tracks-google-ads-to-find-tor-users/
- ¤ GCHQ ; MULLENIZE Operation to Tag and Identify Packet
- Traffic From Machines ::
- “Working together, CT and CNE have devised a method to carry
- out large-scale ‘staining’ as a means to identify individual
- machines linked to that IP address. ... ...
- User Agent Staining is a technique that involves writing a
- unique marker (or stain) onto a target machine. Each stain
- is visible in passively collected SIGINT and is stamped into
- every packet, which enables all the events from that stained
- machine to be brought back together to recreate a browsing
- session.”
- http://cryptome.org/2013/10/gchq-mullenize.pdf
- http://s3.documentcloud.org/documents/801762/mullenize-28redacted-29.pdf
- ¤ Packet Staining ::
- http://prezi.com/p5et9yawg2c6/ip-packet-staining/
- http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-00
- http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-01
- http://cryptome.org/2013/10/packet-stain/packet-staining.htm
- ¤ NSA Peeling Back the Layers of Tor ::
- http://cryptome.org/2013/10/nsa-egotisticalgiraffe.pdf
- http://www.theguardian.com/world/interactive/2013/oct/04/egotistical-giraffe-nsa-tor-document
- http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity
- http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
- ¤ NSA ; Tor Source Code Vulnerabilities ::
- “We have seen several targets using Tor. Our goal was to
- analyze Tor source code and determine any vulnerabilities
- in the system. We set up an internal Tor network to analyze
- Tor traffic, in the hopes of discovering ways to passively
- identify it. We also worked to create a custom Tor client
- which allows the user finer control.” ... ...
- “This accomplishes several things. Most basically, the Tor
- servers, many of which are listed on publicly advertised
- directory servers, are chosen to act as a series of proxies.
- This may seem to be excessively complex, as a single proxy
- server can be used to hide one’s location, but a single-hop
- proxy is vulnerable in two ways. First, by analyzing the
- pattern of the traffic going to and from the proxy server,
- it is possible to deduce which clients are making which requests.
- Second, if an attacker owns the proxy server, then it certainly
- knows who is asking for what, and anonymization is ruined. By
- using multiple hops, Tor is much more resistant to both of
- these attacks. Traffic analysis becomes extraordinarily
- difficult, as it must be coordinated across several machines,
- and an attacker must own all the hops along the circuit in
- order to trace requests back to the originating client.”
- ... ...
- “In our time in the lab, we found that running an nmap on a
- node that is offering a hidden service will turn up the port
- that the hidden service is using to deal with incoming
- connections. It can then be directly connected to, outside
- of Tor.”
- ... ...
- “We would have to try to connect to each of the ports we see
- open on a machine to determine if there is a hidden service
- being run. We would not even know which protocol the hidden
- service is running. It may be an HTTP server, an FTP server,
- an SMTP server, etc. The only thing we know is that the protocol
- must run over TCP. It is not enough to attempt to connect once
- to each port, using an HTTP GET request. Several protocols must
- be tried.”
- ... ...
- “It may also be useful to study Tor directory servers in more
- detail. Our work focused solely on the client, but many attacks
- would be much easier with access to more Tor servers. The
- directory servers ultimately control which Tor servers are
- used by clients. We have found that a server can put itself on
- a directory server multiple times; all it takes is the server
- running several Tor processes, each having a different nickname,
- open port, fingerprint, and LOG FILE. This only requires different
- configuration files for the different processes, which are easy
- to set up. That machine will handle a disproportionate amount of
- traffic, since it is listed several times. This increases the
- density of friendly servers in the cloud without increasing the
- number of servers we have set up. Unfortunately, each listing
- has the same IP address, which would be very noticeable to anyone
- who inspecting the directories.”
- http://cryptome.org/2013/10/nsa-tor.pdf
- http://s3.documentcloud.org/documents/802061/ces-summer-2006-tor-paper-28redacted-29-1.pdf
- http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html
- ¤ NSA ; Types of IAT ::
- http://cryptome.org/2013/10/nsa-iat-tor.pdf
- ¤ NSA Link Removed by Guardian ::
- http://cryptome.org/2013/10/nsa-link-removed.htm
- ¤ Tor Media Reports Disinformative (?) ::
- “This document doesn’t give much insight into capabilities
- the IC has developed against Tor. It’s apparently quite common
- to run multiple research teams (either known or unknown to
- each other) against a single target, and a few summer
- students with a dozen lab machines is a pretty small
- investment. I’d expect there are other programs with more
- sophisticated attacks, especially now 7 years later.”
- http://cryptome.org/2013/10/nsa-tor-disinfo.htm
- _______________________________________
- ¤ UPDATE ; German CIA Agent Arrested ::
- http://cryptocomb.org/?p=869
- ¤ UPDATE ; Der Spiegel Exposed Spy Scandle Between US-Germany, ;
- Angela Merkel Plans to Scrap No-spy Agreement with US-Britain ::
- A new surveillance scandal is threatening to unsettle US-German
- relations after it emerged that an employee of Germany’s
- intelligence agency has been arrested under suspicion of acting
- as a double agent for the US.
- According to several reports in the German media, a 31-year-old
- member of the Bundesnachrichtendienst (BND) administration
- department in Pullach was on Wednesday arrested by the country’s
- federal prosecutor, originally under suspicion of passing on
- information to Russian intelligence services. ... ...
- The plan is in response to the scandal resulting from last
- week’s arrest of a 31-year-old BND “double agent” who spent
- at least two years selling top-secret German intelligence
- documents to his US spymasters in return for cash payments
- of €10,000 (£7,940) per document. ...
- The double agent is reported to have simply emailed Berlin’s
- American embassy and asked whether officials were interested
- in “co-operation”. He subsequently downloaded at least 300
- secret documents on to USB sticks that he handed to his
- American spymasters at secret location in Austria.
- He was caught by German counter-espionage agents only after
- he was found offering similar BND documents to Berlin’s Russian
- embassy. The Germans had considered it “impossible” that one
- of their own intelligence men could be working as a “double agent”
- for the Americans.
- http://www.independent.co.uk/news/world/europe/germany-to-spy-on-us-for-first-time-since-1945-after-double-agentscandal-9590645.html
- http://www.theguardian.com/commentisfree/2014/jul/07/nsa-chancellor-double-agent-german-us-relations
- http://www.theguardian.com/world/2014/jul/04/germany-arrest-bnd-spying-allegations-double-agent-us
- http://www.nytimes.com/2014/07/11/world/europe/germany-expels-top-us-intelligence-officer.html?_r=0
- ¤ Der Spiegel Releases NSA-BND Spy Documents ::
- http://cryptome.org/2014/06/nsa-spiegel-snowden-14-0618.pdf
- http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html
- ¤ NSA-BND_Spy_Documents_2014.zip (Mirror) ::
- http://filedump.org/files/epVgbFV91403117533.html
- ¤ Der Spiegel Release on German SIGADs ::
- http://cryptome.org/2014/06/nsa-spiegel-german-sigads.pdf
- ¤ Inside the New NSA-BND Revelations ::
- http://www.spiegel.de/international/germany/new-snowden-revelations-on-nsa-spying-in-germany-a-975441.html
- http://www.dw.de/new-leaks-show-germanys-collusion-with-nsa/a-17726141
- ¤ NSA and BND Spying Telecommunications ::
- http://cryptome.org/2014/06/nsa-german-spying.pdf
- http://cryptome.org/2014/06/nsa-der-spiegel-14-0616.pdf
- ¤ Germany Cooperates Closely with NSA ::
- http://www.spiegel.de/international/world/spiegel-reveals-cooperation-between-nsa-and-german-bnd-a-909954.html
- ¤ Key Partners ; Secret Links Between BND and NSA ::
- http://www.spiegel.de/international/world/german-intelligence-worked-closely-with-nsa-on-data-surveillance-a-912355.html
- ▲ FLASHBACK ; Angela Merkel Compares NSA to Stasi ::
- In an angry exchange with Barack Obama, Angela Merkel
- has compared the snooping practices of the US with those
- of the Stasi, the ubiquitous and all-powerful secret
- police of the communist dictatorship in East Germany,
- where she grew up.
- http://www.theguardian.com/world/2013/dec/17/merkel-compares-nsa-stasi-obama
- _______________________________________
- ¤ NSA FORNSAT Intercept in 2002 and Economic Motives ::
- http://electrospaces.blogspot.fr/2014/07/the-national-security-agency-in-2002.html
- _______________________________________
- ¤ Look Out for Falling Redactions ::
- http://cryptome.org/2014/06/nsa-falling-redactions.pdf
- _______________________________________
- ¤ Dump of BOUNDLESSINFORMANT IP Data ::
- https://gist.github.com/9b/de3f0510cccbd5dbfdf0
- _______________________________________
- ¤ NSA Playset ; Tailored Access for Hackers ::
- http://www.nsaplayset.org/
- _______________________________________
- ¤ How Secret Partners Expand NSA’s Surveillance Dragnet ::
- https://firstlook.org/theintercept/article/2014/06/18/nsa-surveillance-secret-cable-partners-revealed-rampart-a/
- https://www.techdirt.com/articles/20140619/08062627624/nsa-working-with-denmark-germany-to-access-three-terabits-data-per-second-overseas-cables.shtml
- http://www.infowars.com/nsa-uses-33-countries-to-intercept-web-traffic-snowden-files/
- http://gigaom.com/2014/06/20/governments-let-nsa-tap-cables-on-their-territory-latest-snowden-revelations-show/
- ¤ Foreign Partner Access to Black Budget FY 2013 ::
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1200866/foreignpartneraccessbudgetfy2013-redacted.pdf
- ¤ Overview Presenting the RAMPART-A Spy Program ::
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1200860/odd-s3-overviewnov2011-v1-0-redacted-information.pdf
- ¤ Three RAMPART-A Slides ::
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1200865/uodds2overview-v1-1-redacted-information-dk.pdf
- ¤ Black Budget FY 2013 / RAMPART-A Slides (Mirror) ::
- http://cryptome.org/2014/06/nsa-intercept-14-0618.pdf
- ¤ Update ; Intercept Releases More RAMPART-A Slides ::
- http://cryptome.org/2014/06/nsa-information-intercept-14-0619.pdf
- _______________________________________
- Keith Alexander’s talking points for strategic meeting
- between the NSA and the Danish Defense Intelligence
- Service (DDIS).
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1200859/diropeningremarksguidancefordp1-v1-1-v1-0.pdf
- _______________________________________
- ¤ FISA Court Rules to Retain Spy Data Past 5 Years ::
- http://cryptome.org/2014/04/fisc-br14-01-14-0410.pdf
- ¤ NSA Admits They Keep All Spy Data Past 5 Years ::
- http://dailycaller.com/2014/06/10/nsa-our-systems-are-too-complex-to-stop-deleting-evidence/
- _______________________________________
- ¤ Head of GCHQ Very Pissed Off Over Media Coverage ::
- http://www.telegraph.co.uk/technology/internet-security/10910212/Head-of-GCHQ-launches-thinly-veiled-attack-on-The-Guardian.html
- _______________________________________
- ¤ GCHQ Forced to Reveal Secret Policy for Mass Spying
- of Residents’ Facebook and Google Use ::
- https://www.privacyinternational.org/press-releases/uk-intelligence-forced-to-reveal-secret-policy-for-mass-surveillance-of-residents
- http://www.nytimes.com/2014/06/17/business/international/british-spy-agencies-said-to-assert-broad-power-to-intercept-web-traffic.html?_r=0
- http://hosted.ap.org/dynamic/stories/E/EU_BRITAIN_ONLINE_SURVEILLANCE
- Britain’s top counter-terrorism official has been forced
- to reveal a secret Government policy justifying the mass
- surveillance of every Facebook, Twitter, Youtube and Google
- user in the UK.
- https://www.privacyinternational.org/sites/privacyinternational.org/files/downloads/press-releases/witness_st_of_charles_blandford_farr.pdf
- http://cryptome.org/2014/06/gchq-farr-pi.pdf (mirror)
- _______________________________________
- ¤ THIS IS HOW THE US GOVERNMENT TREATS WHISTLEBLOWERS ;
- CIA Rendition Jet Was Waiting in Europe to Blackbag Snowden ::
- http://www.theregister.co.uk/2014/06/13/cia_rendition_jet_was_waiting_in_europe_to_snatch_snowden/
- ---------------------------------------
- ¤ Leak Spy Documents @ The Intercept Dropbox ::
- http://y6xjgkgwj47us5ca.onion/
- _______________________________________
- ¤ PRISM FOIA Request Highly Censored ::
- http://cryptome.org/2014/06/nsa-prism-foia-email.pdf
- _______________________________________
- ¤ DEA-NSA SANDKEY Voice Intercepts ::
- http://cryptomeorg.siteprotect.net/dea-nsa-sandkey.pdf
- Mirrored » http://fileb.ag/pmu6ugcxsxq1
- _______________________________________
- ¤ How Governments Around The World Responded To
- Snowden’s Revelations ::
- https://www.techdirt.com/articles/20140612/03532827554/how-have-governments-around-world-responded-to-snowdens-revelations.shtml
- _______________________________________
- ¤ GCHQ’s Beyond Top Secret Middle Eastern Spy Base ::
- http://www.theregister.co.uk/2014/06/03/revealed_beyond_top_secret_british_intelligence_middleeast_internet_spy_base/
- ¤ GCHQ’s Middle Eastern Spy Base Eyeball ::
- http://cryptome.org/2014-info/gchq-seeb/gchq-seeb.htm
- _______________________________________
- ¤ UK Teleco Admits Governments Used Secret Cables
- to Tap Phones ::
- http://www.telegraph.co.uk/technology/internet-security/10880208/Vodafone-governments-use-secret-cables-to-tap-phones.html
- _______________________________________
- ¤ Some Numbers About NSA’s Data Collection ::
- http://electrospaces.blogspot.com.br/2014/06/some-numbers-about-nsas-data-collection.html
- _______________________________________
- ¤ NSA Whistleblower Russel Tice Reveals NSA Has
- Documents “Above Top Secret” and Many Are Burned
- After Covert Operations, Routinely ::
- “Think of it this way. Remember I told you about the
- NSA doing everything they could to make sure that the
- information from 40 years ago – from spying on Frank
- Church and Lord knows how many other Congressman that
- they were spying on – was hidden?
- Now do you think they’re going to put that information
- into Powerpoint slides that are easy to explain to
- everybody what they’re doing?
- They would not even put their own NSA designators on
- the reports [so that no one would know that] it came
- from the NSA. They made the reports look like they were
- Humint (human intelligence) reports. They did it to
- hide the fact that they were NSA and they were doing
- the collection. That’s 40 years ago. [The NSA and other
- agencies are still doing "parallel construction",
- "laundering" information to hide the fact that the
- information is actually from mass NSA surveillance.]
- Now, what NSA is doing right now is that they’re taking
- the information and they’re putting it in a much higher
- security level. It’s called “ECI” – Exceptionally Controlled
- Information – and it’s called the black program … which I
- was a specialist in, by the way.
- I specialized in black world – DOD and IC (Intelligence
- Community) – programs, operations and missions … in “VRKs”,
- “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access
- Program. It’s highly unlikely Mr. Snowden had any access
- to these. STO equals Special Technical Operations It’s
- highly unlikely Mr. Snowden had any access to these.
- Now in that world – the ECI/VRK world – everything in that
- system is classified at a higher level and it has its own
- computer systems that house it. It’s totally separate than
- the system which Mr. Snowden was privy to, which was called
- the “JWICS”: Joint Worldwide Intelligence Communications
- System. The JWICS system is what everybody at NSA has access
- to. Mr Snowden had Sys Admin [systems administrator] authority
- for the JWICS.
- And you still have to have TS/SCI clearance [i.e. Top Secret/
- Sensitive Compartmented Information - also known as “code word”
- - clearance] to get on the JWICS. But the ECI/VRK systems are
- much higher[levels of special compartmentalized clearance]
- than the JWICS. And you have to be in the black world to get
- that [clearance].
- ECI = Exceptionally Controlled Information. I do not believe
- Mr. Snowden had any access to these ECI controlled networks).
- VRK = Very Restricted Knowledge. I do not believe Mr. Snowden
- had any access to these VRK controlled networks.
- These programs typically have, at the least, a requirement of
- 100 year or until death, ’till the person first being “read in”
- [i.e. sworn to secrecy as part of access to the higher
- classification program] can talk about them. [As an interesting
- sidenote, the Washington Times reported in 2006 that – when Tice
- offered to testify to Congress about this illegal spying – he
- was informed by the NSA that the Senate and House intelligence
- committees were not cleared to hear such information.]
- It’s very compartmentalized and – even with stuff that they had
- – you might have something at NSA, that there’s literally 40
- people at NSA that know that it’s going on in the entire agency.
- When the stuff came out in the New York Times [the first big
- spying story, which broke in 2005] – and I was a source of
- information for the New York Times – that’s when President Bush
- made up that nonsense about the “terrorist surveillance program.”
- By the way, that never existed. That was made up.
- There was no such thing beforehand. It was made up … to try
- to placate the American people.
- The NSA IG (Inspector General) – who was not cleared for this –
- all of a sudden is told he has to do an investigation on this;
- something he has no information or knowledge of.
- So what they did, is they took a few documents and they
- downgraded [he classification level of the documents] – just
- a few – and gave them to them to placate this basic whitewash
- investigation.”
- http://cryptome.org/2014/06/tice-shoot-snowden.pdf
- http://www.washingtonsblog.com/2014/06/original-nsa-whistleblower-snowden-
- http://www.infowars.com/nsa-whistleblower-snowden-never-had-access-to-the-juiciest-documents/
- http://www.youtube.com/watch?v=az-YWMNWQuU
- http://www.youtube.com/watch?v=GJS7F-mShpI
- _______________________________________
- ¤ NSA MYSTIC SIGAD Reporting Tabulation ::
- http://cryptome.org/2014/06/nsa-sigad-reporting.pdf
- ¤ NSA SOMALGET Spy Programme ::
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1164088/somalget.pdf
- ¤ SOMALGET SSO Dictionary Excerpt ::
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1164086/sso-dictionary-excerpt.pdf
- ¤ MYSTIC/SOMALGET Spy Documents ::
- http://cryptome.org/2014/05/nsa-intercept-14-0519.pdf
- ¤ Toward the Identity of “Country X” in MYSTIC ::
- http://cryptome.org/2014/05/nsa-mystic-identity.pdf
- ¤ Wikileaks Releases Identity of “Country X” ::
- http://wikileaks.org/WikiLeaks-statement-on-the-mass.html
- http://www.infowars.com/country-x-wikileaks-reveals-nsa-recording-nearly-all-phone-calls-in-afghanistan/
- ¤ Google Idea’s Director Jared Cohen Was Tasked With
- Getting Afghan Telcos to Move Towers to US Bases ::
- https://wikileaks.org/plusd/cables/09KABUL2020_a.html
- ¤ Data Pirates of the Caribbean ; The NSA Is
- Recording Every Cell Phone Call in the Bahamas ::
- https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/
- ¤ UPDATE ; The Bahamas Wants to Know Why the NSA is
- Recording Its Phone Calls ::
- https://firstlook.org/theintercept/2014/05/20/bahamas-wants-know-nsa-recording-phone-calls/
- _______________________________________
- ¤ NSA Collecting Millions of Faces From Web Images ::
- The FBI, DHS, state and local law enforcement
- agencies are now also using the same facial
- recognition systems as the NSA. Other biometric
- identification systems are being developed as well.
- A panopticon for endless spying in the police state.
- http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-web-images.html
- http://rt.com/usa/162868-nsa-snowden-social-facial/
- ¤ NSA Identity Spying ::
- http://cryptome.org/2014/06/nsa-identity-spy.pdf
- _______________________________________
- ¤ 10 Things (Most People) Didn’t Know Before Snowden ::
- 1. Everything you do online can be monitored.
- 2. What you do offline can be monitored!
- 3. They are collecting your phone records, too.
- 4. In some countries, it is not just metadata.
- 5. Or ordinary citizens for that matter.
- 6. The NSA engages in industrial espionage.
- 7. The NSA is also hacking the global financial system.
- 8. The NSA is also hacking into online video games.
- 9. The NSA uses pornography to honeytrap targets.
- 10. The NSA dragnet is collecting facial images.
- http://rt.com/usa/163700-year-whistleblower-before-snowden/
- And a few more to think about,
- 11. The NSA has access to crypto-breaking supercomputers.
- 12. The NSA spied on human rights activists, organizations.
- 13. Google does in fact have personal relations in the NSA.
- 14. All electronic products are manufactured with backdoors.
- 15. NSA tampers with electronics being shipped by mail.
- _______________________________________
- ▼ Snowden Strikes Back at NSA, Emails NBC News ::
- Fugitive Edward Snowden on Friday challenged the
- NSA’s insistence that it has no evidence he tried
- to raise concerns about the agency’s surveillance
- activity before he began leaking government documents
- to reporters, calling the response a “clearly tailored
- and incomplete leak ... for a political advantage.”
- “The NSA’s new discovery of written contact between
- me and its lawyers -- after more than a year of denying
- any such contact existed - raises serious concerns,”
- Snowden said in an email Friday to NBC News. “It
- reveals as false the NSA’s claim to Barton Gellman
- of the Washington Post in December of last year, that
- ‘after extensive investigation, including interviews
- with his former NSA supervisors and co-workers, we
- have not found any evidence to support Mr. Snowden’s
- contention that he brought these matters to anyone’s
- attention.’”
- Snowden’s email followed Thursday’s release by the US
- Office of the Director of Intelligence of an email
- exchange between Snowden and the NSA’s Office of the
- General Counsel. The Washington Post received and
- published a similar response from Snowden on Thursday.
- http://www.nbcnews.com/feature/edward-snowden-interview/snowden-strikes-back-nsa-emails-nbc-news-n118821
- ▲ NSA Oversight Training, OVSC1800 Minimization Training,
- NSA OGC Snowden Emails on OVSC1800 Course ::
- http://cryptome.org/2014/05/nsa-oversight.pdf
- http://cryptome.org/2014/05/nsa-ovsc1800.pdf
- http://cryptome.org/2014/05/nsa-ogc-snowden.pdf
- ---------------------------------------
- ¤ NBC Interviews Edward Snowden (Full) ::
- https://www.youtube.com/watch?v=yNhMXyAdjp8
- Mirror here » http://upstore.net/62ocku
- _______________________________________
- ¤ What Does GCHQ Know About Our Devices We Don’t? ::
- https://www.privacyinternational.org/blog/what-does-gchq-know-about-our-devices-that-we-dont
- ¤ A Hint? ; “Flashdrive Cache Paths” (Repost) ::
- http://paste.security-portal.cz/view/b30bffb6
- _______________________________________
- ¤ Onionshare App Lets the Next Snowden Send Big Files
- Securely and Anonymously ::
- OnionShare lets you securely and anonymously
- share a file of any size with someone. It works
- by starting a web server, making it accessible
- as a Tor hidden service, and generating an
- unguessable URL to access and download the file.
- It doesn’t require setting up a server on the
- internet somewhere or using a third party
- filesharing service. You host the file on your
- own computer and use a Tor hidden service to
- make it temporarily accessible over the internet.
- The other user just needs to use Tor Browser to
- download the file from you.
- https://github.com/micahflee/onionshare
- http://www.wired.com/2014/05/onionshare/
- ¤ Mirrored Onionshare App w/ Report (ZIP) ::
- https://anonfiles.com/file/9805fddaf90e3ecf37b957e5bed3f474
- ¤ Mirrored Onionshare App w/ Report (RAR) ::
- https://anonfiles.com/file/ea22d9e866875e02a5a0c95e2f69b5d4
- _______________________________________
- ¤ Former NSA-CIA Director Michael Hayden Admits
- Metadata SIGINT Collection Used to Kill People ::
- http://www.youtube.com/watch?v=yaTGkSoI8Ic
- ¤ The Price of Privacy Debate - Re-Evaluating the NSA ::
- http://www.youtube.com/watch?v=kV2HDM86XgI
- _______________________________________
- ¤ Glenn Greenwald - “No Place To Hide” (EPUB) ::
- magnet:?xt=urn:btih:2d1ace5d3b854a9afffc4c2b576cdadc4a0e2718
- http://torrage.com/torrent/2D1ACE5D3B854A9AFFFC4C2B576CDADC4A0E2718.torrent
- ¤ Glenn Greenwald - “No Place To Hide” (PDF) ::
- http://cryptome.org/2014/05/npth.7z
- ▼ NSA Documents From “No Place To Hide” ::
- http://hbpub.vo.llnwd.net/o16/video/olmk/holt/greenwald/NoPlaceToHide-Documents-Uncompressed.pdf
- Mirror here » http://fileb.ag/94dwpno2eokp
- ▲ An Avalanche of Snowden Documents To Be Released
- Online Next Week ::
- http://www.engadget.com/2014/05/08/an-avalanche-of-new-snowden-documents-will-go-online-next-week/
- ---------------------------------------
- ¤ NSA’s Largest Cable Tapping Program ::
- http://electrospaces.blogspot.de/2014/05/nsas-largest-cable-tapping-program.html
- ¤ Glenn Greenwald On Democracy Now ::
- http://publish.dvlabs.com/democracynow/ipod/dn2014-0513.mp4
- http://publish.dvlabs.com/democracynow/ipod/dn2014-0514.mp4
- ¤ New Snowden Document Implies NSA May Be Putting
- Israel’s Security Ahead of America’s ::
- http://www.infowars.com/new-snowden-document-implies-nsa-may-be-putting-israels-security-ahead-of-americas/
- ¤ New Snowden Documents Reveal Depth Of Facebook
- Infiltration by NSA ::
- http://revolution-news.com/new-snowden-documents-reveal-depth-of-facebook-infiltration-by-nsa/
- http://www.infowars.com/how-the-nsa-fbi-made-facebook-the-perfect-mass-surveillance-tool/
- ¤ Leaked Photos of the NSA’s TAO Factory ::
- A document included in the trove of National Security
- Agency files released with Glenn Greenwald’s book
- “No Place To Hide” details how the agency’s Tailored
- Access Operations (TAO) unit and other NSA employees
- intercept servers, routers, and other network gear
- being shipped to organizations targeted for surveillance
- and install covert implant firmware onto them before
- they’re delivered.
- http://govtslaves.info/leaked-photos-nsas-router-upgrade-factory/
- http://cryptome.org/2014/05/nsa-customs.htm
- ¤ Cisco Letter to Obama Objecting to NSA Implants ::
- http://cryptome.org/2014/05/cisco-implant.pdf
- ¤ No Place to Hide Documents Compared to Previous ::
- http://cryptome.org/2014/05/npth-docs-compare.pdf
- ______________________________________
- ¤ House Leaders and Obama Regime Water Down
- Surveillance Reform Bill ::
- http://newamerica.net/node/110983
- _______________________________________
- ¤ US Justice Department Told Supreme Court to Dismiss
- NSA Spying Cases? ::
- http://www.theguardian.com/commentisfree/2014/may/17/government-lies-nsa-justice-department-supreme-court
- _______________________________________
- ¤ The New Yorker Interviews Keith Alexander ::
- http://www.newyorker.com/online/blogs/newsdesk/2014/05/were-at-greater-risk-q-a-with-general-keith-alexander.html
- _______________________________________
- ▼ Leak Spy Documents @ The Intercept Dropbox ::
- http://y6xjgkgwj47us5ca.onion/
- http://cryptome.org/2014/05/intercept-drop.pdf
- ▲ Obama’s Directive Makes Mere Citing of Snowden’s
- Leaks a Punishable Offense ::
- In a new policy directive from the Obama administrative,
- national security and other government officials will no
- longer be allowed to publicly discuss or even reference
- news reporting that is based on “unauthorized leaks.”
- https://www.commondreams.org/headline/2014/05/09
- _______________________________________
- ¤ Munk Debate on State Surveillance ::
- Greenwald, Ohanian vs Hayden, Dershowitz
- http://www.youtube.com/watch?v=_d1tw3mEOoE
- ______________________________________
- ¤ NSA ; Manageable Network Plan ::
- http://cryptome.org/2014/05/nsa-network-plan.pdf
- ______________________________________
- ¤ United States of Secrets ; How the Government
- Came to Spy on Millions of Americans ::
- Part One: Tuesday, May 13, 2014, at 9 p.m. on PBS
- Part Two: Tuesday, May 20, 2014, at 10 p.m. on PBS
- http://www.pbs.org/wgbh/pages/frontline/united-states-of-secrets/
- http://www.pbs.org/wgbh/pages/frontline/pressroom/press-release-united-states-of-secrets-how-the-government-came-to-spy-on-millions-of-americans/
- ______________________________________
- ¤ NSA, Google Inc. Relationship Emails ::
- http://cryptome.org/2014/05/nsa-google.pdf
- ¤ NSA Scares CEOs Into Cyber Spying (Related) ::
- http://cryptome.org/2014/05/nsa-scares-ceos.pdf
- ¤ Emails Reveal Close Google Relationship With NSA ::
- “Keep in mind that social media survives by
- selling user data. Spying is their business model.
- In padding their bottom lines executives have
- worked diligently to dilute privacy legislation
- in addition to garnering a myriad of fines. All
- of this data harvesting services a data broker
- industry which generates something in the
- neighborhood of $200 billion in revenue annually.”
- - Bill Blunden, counterpunch.org
- http://america.aljazeera.com/articles/2014/5/6/nsa-chief-google.html
- http://www.theregister.co.uk/2014/05/07/googles_nsa_data_dealings_not_as_bad_as_first_thought_theyre_much_worse/
- http://www.counterpunch.org/2014/05/09/the-nsas-corporate-collaborators/
- _______________________________________
- ¤ GCHQ Director Visits NSA for PRISM Data Access ::
- Hosted Dinner: 30 April 2013//1830Hrs - Quarters
- Hosted Discussions: 1 May 2013//0800-0830
- “PURPOSE OF THE VISIT: (U//FOUO) As the Director
- of GCHQ, Sir Iain wants to reconnect with NSA
- Leadership on matters of mutual concern, and to
- ensure each partner is aware of the other’s
- activities and future plans.” … …
- “Unsupervised access to FAA 702 data, in a manner
- similar to Olympics Option, remains on GCHQ’s wish
- list and is something its leadership still desires.”
- http://cryptome.org/2014/04/nsa-gchq-lobban-visit.pdf
- ¤ GCHQ Unsupervised PRISM Access in 2012 ::
- http://cryptome.org/2014/04/nsa-prism-olympics.pdf
- ¤ NSA Spied “Suspected Terrorists” At 2012 Olympics ::
- http://cryptome.org/2014/04/nsa-ghostmachine-echobase.pdf
- ¤ NSA & GCHQ Eyeballed “Suspected Terrorists” Before,
- During and After 2012 Olympics ::
- The Snowden files do not indicate whether NSA granted
- GCHQ’s request, but they do show that the NSA was
- “supportive” of the idea, and that GCHQ was permitted
- extensive access to PRISM during the London Olympics
- in 2012. The request for the broad access was
- communicated at “leadership” level, according to
- the documents. Neither agency would comment on the
- proposed arrangement or whether it was approved. … …
- The data sharing between the agencies during the
- Olympics, though, was not isolated to PRISM. … …
- The NSA was funneling troves of intercepted data
- to GCHQ from a system called GHOSTMACHINE, a massive
- cloud database used by the NSA to analyze metadata
- and store, according to one document in the Snowden
- archive, “100s of billions of entries.”
- https://firstlook.org/theintercept/article/2014/04/30/gchq-prism-nsa-fisa-unsupervised-access-snowden/
- _______________________________________
- ¤ NSA MYSTIC Telephone Interception Program ::
- http://s3.documentcloud.org/documents/1086618/mysticssoweeklybrief.pdf
- http://s3.documentcloud.org/documents/1086616/fromsso-key-brief-overview.pdf
- http://s3.documentcloud.org/documents/1088934/mystic-tearsheet-cropped-v2.pdf
- The National Security Agency has built a surveillance
- system capable of recording “100 percent” of a foreign
- country’s telephone calls, enabling the agency to rewind
- and review conversations as long as a month after they
- take place, according to people with direct knowledge of
- the effort and documents supplied by former contractor
- Edward Snowden.
- A senior manager for the program compares it to a time
- machine — one that can replay the voices from any call
- without requiring that a person be identified in advance
- for surveillance.
- The voice interception program, called MYSTIC, began in
- 2009. Its RETRO tool, short for “retrospective retrieval,”
- and related projects reached full capacity against the
- first target nation in 2011. Planning documents two years
- later anticipated similar operations elsewhere.
- In the initial deployment, collection systems are recording
- “every single” conversation nationwide, storing billions of
- them in a 30-day rolling buffer that clears the oldest
- calls as new ones arrive, according to a classified summary.
- The call buffer opens a door “into the past,” the summary
- says, enabling users to “retrieve audio of interest that
- was not tasked at the time of the original call.” Analysts
- listen to only a fraction of 1 percent of the calls, but
- the absolute numbers are high. Each month, they send
- millions of voice clippings, or “cuts,” for processing
- and long-term storage.
- http://www.washingtonpost.com/world/national-security/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls/2014/03/18/226d2646-ade9-11e3-a49e-76adc9210f19_story.html
- ¤ Washington Post Censors MYSTIC Slides ::
- The Washington Post is reporting, based on the
- files of whistleblower Edward Snowden, that the NSA
- is able to store every phone call made in an entire
- nation and replay them for up to 30 days. Not only
- can the agency do this, but there is a country where
- it’s actually doing this now–the Post knows where,
- but they won’t say.
- http://www.fair.org/blog/2014/03/19/the-nsa-built-a-time-machine-but-washington-post-wont-say-where/
- ¤ NSA Records All Phone Calls Using Project MYSTIC ::
- http://www.youtube.com/watch?v=NYq44T5e3lU
- Mirror here » http://fileb.ag/3cva7msxqefx
- _______________________________________
- ¤ NSA/NIS Dagbladet Documents Decensored ::
- There are a couple images in the latest Dagbladet
- story from the Snowden trove that were originally
- blurred instead of blacked out. This allowed the
- text to be recovered. There was no particular point
- in making a project out of the first, since it had
- already been published previously. The second was
- completely decoded in a matter of a few hours.
- http://cryptome.org/2014/04/DagbladetDecensor.pdf
- ¤ NSA/NIS Aquired Supercomputer to Break Crypto ::
- The Norwegian Inteligence Service (NIS) is also
- nauseous from the unmanageable amounts of data it
- is served daily. This is partly the reason why NSA
- now purchases a supercomputer codenamed Steelwinter.
- This information comes from a document Edward Snowden
- took from NSA and has later shared with Dagbladet.
- The document, marked “top secret” is a summary of
- how the NSA sees the collaboration with Norway after
- a meeting between the two services in March 2013.
- The supercomputer NIS buys is a derivation of the
- so-called Windsor Blue supercomputer.
- “NIS is in the process of acquiring STEEL WINTER
- (a WINDSORBLUE derivative supercomputer) and has
- entered into a partnership with NSA - cryptanalysis
- ( ...) service to develop applications of mutual
- benefit” the document says.
- “Windsor Blue” is the name of a program for
- supercomputers at the American IT-giant IBM. The
- company is working towards creating a so-called
- exascale supercomputer which means it can make a
- quintillion - 1,000,000,000,000,000,000 - calculations
- per second.
- http://www.dagbladet.no/2014/04/26/nyheter/snowden_i_norge/edward_snowden/nsa/etterretningstjenesten/32991102/
- _______________________________________
- ¤ Germany Blocks Edward Snowden From Testifying ::
- http://www.theguardian.com/world/2014/may/01/germany-edward-snowden-nsa-inquiry
- _______________________________________
- ¤ NSA Spies More on Americans Than Russians ::
- http://www.nationaljournal.com/tech/edward-snowden-nsa-spies-more-on-americans-than-russians-20140430
- _______________________________________
- ¤ Snowden Asks Putin About Russian Spying ::
- http://www.youtube.com/watch?v=w1yH554emkY
- http://rt.com/news/snowden-putin-spy-online-140/
- http://www.zerohedge.com/news/2014-04-17/snowden-calls-putin-telethon-discuss-legality-mass-surveillance
- _______________________________________
- ¤ NSA Spied on Human Rights Workers ::
- The US has spied on the staff of prominent
- human rights organisations, Edward Snowden has
- told the Council of Europe in Strasbourg, Europe’s
- top human rights body.
- Giving evidence via a videolink from Moscow,
- Snowden said the National Security Agency – for
- which he worked as a contractor – had deliberately
- snooped on bodies like Amnesty International and
- Human Rights Watch.
- http://www.theguardian.com/world/2014/apr/08/edwards-snowden-us-government-spied-human-rights-workers
- ¤ Edward Snowden Testimony @ Parliamentary Assembly
- of the Council of Europe (Full) ::
- http://www.youtube.com/watch?v=3f8Lunf1a2w
- _______________________________________
- ¤ EU High Court Allows Banning Metadata Collection ::
- Due to the particularities of EU lawmaking, the
- effects of the directive (spying) will still be in
- place in most EU member states for the time being.
- According to EU legal procedure, a directive is
- a type of law that requires each of the 28 member
- countries to “transpose” it into their own national
- laws. In this case, countries could even choose
- whether to expand the six-month requirement to as
- high as two years. ... ...
- Current EU data retention law will remain in
- effect until repealed legislatively or invalidated
- by domestic courts.
- http://arstechnica.com/tech-policy/2014/04/eu-high-court-strikes-down-metadata-collection-law/
- _______________________________________
- ¤ Masterspy Orders Snub on Media Contacts ::
- http://www.infowars.com/intelligence-head-who-lied-to-congress-bans-employees-from-talking-to-media/
- _______________________________________
- ¤ US Whines - ‘Anti-Snooping Plans are Unfair’ ::
- “Recent proposals from countries within the
- European Union to create a Europe-only electronic
- network (dubbed a ‘Schengen cloud’ by advocates) or
- to create national-only electronic networks could
- potentially lead to effective exclusion or discrimination
- against foreign service suppliers that are directly
- offering network services, or dependent on them,”
- the USTR said in its annual report.
- http://www.ustr.gov/sites/default/files/2014%20NTE%20Report%20on%20FTB.pdf
- http://inserbia.info/today/2014/04/us-blasts-eus-plan-for-schengen-cloud/
- http://rt.com/news/us-europe-nsa-snowden-549/
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ ACLU Offers NSA Document Search ::
- https://www.aclu.org/nsa-documents-search
- ¤ ACLU Offers Mirrored NSA Documents ::
- https://www.aclu.org/nsa-documents-released-public-june-2013
- _______________________________________
- ¤ KILLCEN ; Eyeballing_Snowden_Info.zip ::
- Includes all news reports, videos, images, slides
- and documents from and related to Snowden’s leaks
- so far, up to April 2nd of 2014. I’m still collecting
- any information that comes out and will provide an
- updated archive from time to time.
- After decompression - the main folder is titled
- “Eyeballing_Snowden_Info” and it holds a total of
- 927MB decompressed.
- This was stored on an old OFFLINE system, without
- any WiFi card or modem attached so the archive is
- safe from being modified, exploited or stolen.
- Eyeballing_Snowden_Info.zip
- (1,325 files | ZIP | 743MB)
- http://fileb.ag/1ixi6dqmbj80
- http://fpsbay.com/download/64465X13965734822241X344921/Eyeballing_Snowden_Info.zip
- http://davvas.com/l21m47ls819e
- http://jumbofiles.org/newfile?n=528498&Eyeballing_Snowden_Info.zip
- _______________________________________
- ¤ It’s Finally Admitted! ::
- https://www.documentcloud.org/documents/1100298-unclassified-702-response.html
- http://www.emptywheel.net/2014/04/01/james-clapper-confirms-vadm-mike-rogers-needlessly-obfuscated-in-confirmation-hearing/
- http://www.theguardian.com/world/2014/apr/01/nsa-surveillance-loophole-americans-data
- http://www.zdnet.com/nsa-searched-u-s-calls-emails-without-warrant-u-s-intelligence-chief-admits-7000027938/
- http://rt.com/usa/clapper-wyden-nsa-fisa-665/
- _______________________________________
- ¤ NSA Spy Chiefs of State ::
- http://cryptome.org/2014/03/nsa-spy-cos.pdf
- ¤ NSA Spy Chiefs of State (Full List) ::
- http://cryptome.org/2014/03/nsa-nymrod-spy-cos.pdf
- ¤ GCHQ and NSA Targeted Private German Companies ::
- http://www.spiegel.de/international/germany/gchq-and-nsa-targeted-private-german-companies-a-961444.html
- https://firstlook.org/theintercept/article/2014/03/29/der-spiegel-nsa-ghcq-hacked-german-companies-put-merkel-list-122-targeted-leaders/
- https://www.wsws.org/en/articles/2014/03/31/nsas-m31.html
- http://leaksource.info/2014/03/31/122-country-leaders-in-nsas-target-knowledge-database-2009-document/
- ▲ UPDATE ; European Parliament Suspends US
- Trade Talks Due to Political Spying ::
- http://falkvinge.net/2014/03/12/europarl-suspends-u-s-trade-talks-data-sharing-over-mass-surveillance/
- _______________________________________
- ¤ Video Demonstration of Two Intelligence Analysis Tools ::
- http://electrospaces.blogspot.se/2014/03/video-demonstration-of-two-intelligence.html
- ¤ Telephone Call Data Record Link Analysis Software ::
- http://www.youtube.com/watch?v=J38tKqq9kpY
- ¤ IBM i2 Analysts Notebook - Esri Edition ::
- http://www.youtube.com/watch?v=MJ5CovDQDYU
- ¤ Report and Both Videos ZIPPED & Mirrored ::
- http://fpsbay.com/download/64445X13961058822231X344721/Two%20Intelligence%20Analysis%20Tools.zip
- _______________________________________
- ¤ NSA’s New Civil Liberties and Privacy Officer ::
- Becky Richards promises more transparency. She
- also promises the NSA will “build privacy into
- new technologies” to “protect privacy and civil
- liberties” and “to be as transparent with the
- public as possible” as well helping the public
- “understand how we’re protecting their privacy,
- how we’re protecting national security.”
- http://cryptome.org/2014/03/nsa-richards-14-0320.htm
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA Huawei SHOTGIANT Hardware Exploit ::
- http://cryptome.org/2014/03/nsa-huawei.pdf
- http://cryptome.org/2014/03/nsa-huawei-02.pdf
- ¤ Huawei Global Cyber Security Assurance ::
- http://cryptome.org/2014/03/huawei-cyber-security.pdf
- ¤ Huawei Network Migration Tool (48.7MB) ::
- http://cryptome.org/2014/03/huawei-network-migration.zip
- ¤ NSA Breached Chinese Telecom Giant Huawei ::
- The American government conducted a major intelligence
- offensive against China, with targets including the
- Chinese government and networking company Huawei,
- according to documents from former NSA worker Edward
- Snowden that have been viewed by SPIEGEL and the
- New York Times. Among the American intelligence
- service’s targets were former Chinese President
- Hu Jintao, the Chinese Trade Ministry, banks, as
- well as telecommunications companies.
- But the NSA made a special effort to target Huawei.
- With 150,000 employees and €28 billion ($38.6 billion)
- in annual revenues, the company is the world’s second
- largest network equipment supplier. At the beginning
- of 2009, the NSA began an extensive operation, referred
- to internally as “Shotgiant,” against the company, which
- is considered a major competitor to US-based Cisco. The
- company produces smartphones and tablets, but also mobile
- phone infrastructure, WLAN routers and fiber optic cable
- -- the kind of technology that is decisive in the NSA’s
- battle for data supremacy.
- A special unit with the US intelligence agency succeeded
- in infiltrating Huwaei’s network and copied a list of
- 1,400 customers as well as internal documents providing
- training to engineers on the use of Huwaei products,
- among other things.
- http://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html
- http://www.spiegel.de/international/world/nsa-spied-on-chinese-government-and-networking-firm-huawei-a-960199.html
- http://news.yahoo.com/nsa-infiltrates-servers-china-telecom-giant-huawei-report-022030765--finance.html
- http://www.forbes.com/sites/rosatrieu/2014/03/24/chinas-huawei-condemns-nsa-spying-calls-for-unity-against-cyber-mischief/
- ¤ Hong Lei Responds to Huawei NSA Backdoors ::
- “We are seriously concerned with relevant reports. The
- media has disclosed a lot about the eavesdropping,
- surveillance and spying activities that the US has
- carried out on other countries, including China. China
- has lodged representations with the American side on
- many occasions. We require the American side to give a
- clear explanation and stop such behaviours.”
- http://www.fmprc.gov.cn/eng/xwfw/s2510/t1140281.shtml
- _______________________________________
- ¤ NSA Mapping and Spying System Administrators ::
- The document consists of several posts – one of
- them is titled “I hunt sys admins” – that were
- published in 2012 on an internal discussion board
- hosted on the agency’s classified servers. They
- were written by an NSA official involved in the
- agency’s effort to break into foreign network
- routers, the devices that connect computer
- networks and transport data across the Internet.
- By infiltrating the computers of system administrators
- who work for foreign phone and Internet companies,
- the NSA can gain access to the calls and emails
- that flow over their networks.
- The classified posts reveal how the NSA official
- aspired to create a database that would function
- as an international hit list of sys admins to
- potentially target. Yet the document makes clear
- that the admins are not suspected of any criminal
- activity – they are targeted only because they
- control access to networks the agency wants to
- infiltrate. “Who better to target than the person
- that already has the ‘keys to the kingdom’?” one
- of the posts says.
- The NSA wants more than just passwords. The document
- includes a list of other data that can be harvested
- from computers belonging to sys admins, including
- network maps, customer lists, business correspondence
- and, the author jokes, “pictures of cats in funny
- poses with amusing captions.”
- http://cryptome.org/2014/03/nsa-hunt-sysadmins.pdf
- https://firstlook.org/theintercept/document/2014/03/20/hunt-sys-admins/
- https://firstlook.org/theintercept/article/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/
- _______________________________________
- ¤ NSA Culture, 1980s to the 21st Century ::
- http://cryptome.org/2014/03/nsa-sid-culture.pdf
- _______________________________________
- ¤ CSEC SNOWGLOBE Slides ::
- http://cryptome.org/2014/03/cse-snowglobe.pdf
- http://s3.documentcloud.org/documents/1094526/babarfull.pdf
- ¤ Default Le Monde Report ::
- http://www.lemonde.fr/international/article/2014/03/21/quand-les-canadiens-partent-en-chasse-de-babar_4387233_3210.html
- ¤ Le Monde Report Translated to English ::
- http://slexy.org/view/s20ThA9Vog
- _______________________________________
- ¤ DNI National Security / Secrecy Panic ::
- http://cryptome.org/2014/03/litt-14-0318.pdf
- _______________________________________
- ¤ TED ; Ask Snowden ::
- http://www.youtube.com/watch?v=yVwAodrjZMY
- http://iroots.org/2014/03/18/transcript-edward-snowden-today-at-ted-talk/
- _______________________________________
- ¤ SXSW ; Ask Snowden ::
- http://www.youtube.com/watch?v=nRQTDNbYjqY
- http://cryptome.org/2014/03/snowden-sxsw.htm
- http://blog.inside.com/blog/2014/3/10/edward-snowden-sxsw-full-transcription-and-video
- _______________________________________
- ¤ NSA ; Ask Zelda ::
- http://cryptome.org/2014/03/nsa-ask-zelda.pdf
- https://firstlook.org/theintercept/article/2014/03/07/nsa-advice-columnist-seriously/
- _______________________________________
- ¤ NSA Third Party (Five Eye) Relationships ::
- http://cryptome.org/2014/03/nsa-third-parties.pdf
- _______________________________________
- ¤ Comsec as Essential Public Utility ::
- http://cryptome.org/2014/03/comsec-public-utility.htm
- ¤ Update ; Comsec as Essential Failure ::
- http://cryptome.org/2014/03/comsec-ewafmss.htm
- _______________________________________
- ¤ NSA/CSS Classification/Damage Control ::
- http://cryptome.org/2014/03/nsa-policy-1-52.pdf
- _______________________________________
- ¤ NSA/FBI Cryptanalysts Database Sharing ::
- http://cryptome.org/2014/03/nsa-crypt-fisa-share.pdf
- ▲ FBI’s Data Intercept Technology Unit (DITU) ::
- http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work
- ▲ FISA Court Releases FBI Spy Documents ::
- http://cryptome.org/2013/09/fisc-13-0917-4.pdf
- _______________________________________
- ¤ STELLARWIND Classification Guide ::
- http://cryptome.org/2014/03/nsa-stellarwind-class.pdf
- ▲ NSA ; STELLARWIND Program ::
- http://cryptome.org/2013/06/nsa-stellar-wind.pdf
- _______________________________________
- ¤ FISC Orders to Preserve NSA Metadata Spying ::
- http://cryptome.org/2014/03/fisc-br14-01-order-14-0312.pdf
- http://cryptome.org/2014/03/fisc-br14-01-tro-14-0311.pdf
- _______________________________________
- ¤ How the NSA Plans to Infect Millions of Computers
- With Malware ::
- Top-secret documents reveal that the National
- Security Agency is dramatically expanding its
- ability to covertly hack into computers on a mass
- scale by using automated systems that reduce the
- level of human oversight in the process.
- The classified files – provided previously by NSA
- whistleblower Edward Snowden – contain new details
- about groundbreaking surveillance technology the
- agency has developed to infect potentially millions
- of computers worldwide with malware “implants.” The
- clandestine initiative enables the NSA to break into
- targeted computers and to siphon out data from foreign
- Internet and phone networks.
- https://prod01-cdn02.cdn.firstlook.org/wp-uploads/2014/03/nsa_malware_feature.jpg
- https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/turbine-large.jpg
- https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/tao-2-1024x768.png
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1076889/nsa-technology-directorate-analysis-of-converged.pdf
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1077724/industry-scale-exploitation.pdf
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1077721/thousands-of-implants.pdf
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1076859/nsa-phishing-tactics-and-man-in-the-middle-attacks.pdf
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pdf
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1076862/quantum-insert-diagrams.pdf
- The covert infrastructure that supports the hacking
- efforts operates from the agency’s headquarters in
- Fort Meade, Maryland, and from eavesdropping bases
- in the United Kingdom and Japan. GCHQ, the British
- intelligence agency, appears to have played an integral
- role in helping to develop the implants tactic.
- The implants being deployed were once reserved for
- a few hundred hard-to-reach targets, whose communications
- could not be monitored through traditional wiretaps. But
- the documents analyzed by The Intercept show how the NSA
- has aggressively accelerated its hacking initiatives in
- the past decade by computerizing some processes previously
- handled by humans. The automated system – codenamed TURBINE
- – is designed to “allow the current implant network to
- scale to large size (millions of implants) by creating
- a system that does automated control implants by groups
- instead of individually.”
- https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/
- ¤ “Thousands of Implants” ::
- “Building the operations floor and increasing the number
- of break-out rooms will enable us to grow from the current
- average of these operations per clay to over per day and will
- facilitate the integration of 55 computer network operations
- and real--time customer support. Sustained collection involving
- automated implants pushing collected data from targets to the
- RDC as well as voice and geolocation collection are managed from
- the Operations Teaming Areas. The increased capacity in this
- area will support a growth from managing an average of I 543
- active implants today to simultaneously managing thousands of
- implanted targets. The increased personnel capacity will support
- this net growth in operations tempo and will allow the integration
- of TAD's Requirements Targeting Division alongside the operators
- in order to better target development and efficiently plan and
- execute endpoint operations.”
- http://cryptome.org/2014/03/nsa-thousands-implants.pdf
- According to one top-secret document from 2012, the agency
- can deploy malware by sending out spam emails that trick targets
- into clicking a malicious link. Once activated, a “back-door
- implant” infects their computers within eight seconds.
- There’s only one problem with this tactic, codenamed WILLOWVIXEN:
- According to the documents, the spam method has become less
- successful in recent years, as Internet users have become wary
- of unsolicited emails and less likely to click on anything that
- looks suspicious.
- Consequently, the NSA has turned to new and more advanced
- hacking techniques. These include performing so-called
- “man-in-the-middle” and “man-on-the-side” attacks, which
- covertly force a user’s internet browser to route to NSA
- computer servers that try to infect them with an implant.
- To perform a man-on-the-side attack, the NSA observes a
- target’s Internet traffic using its global network of covert
- “accesses” to data as it flows over fiber optic cables or
- satellites. When the target visits a website that the NSA
- is able to exploit, the agency’s surveillance sensors alert
- the TURBINE system, which then “shoots” data packets at the
- targeted computer’s IP address within a fraction of a second.
- In one man-on-the-side technique, codenamed QUANTUMHAND,
- the agency disguises itself as a fake Facebook server. When
- a target attempts to log in to the social media site, the
- NSA transmits malicious data packets that trick the target’s
- computer into thinking they are being sent from the real
- Facebook. By concealing its malware within what looks like
- an ordinary Facebook page, the NSA is able to hack into the
- targeted computer and covertly siphon out data from its
- hard drive. A top-secret animation demonstrates the tactic
- in action.
- ¤ How the NSA Secretly Masqueraded as Facebook to Hack
- Computers for Surveillance ::
- https://player.vimeo.com/video/88822483
- and @ https://www.youtube.com/watch?v=Td8nZscYvT4
- Mirrored » http://megaswf.com/f/2647410
- According to Matt Blaze, a surveillance and cryptography
- expert at the University of Pennsylvania, it appears that
- the QUANTUMHAND technique is aimed at targeting specific
- individuals. But he expresses concerns about how it has
- been covertly integrated within Internet networks as part
- of the NSA’s automated TURBINE system.
- ¤ NSA TURBINE Automated Hacking Documents (Mirrored) ::
- http://cryptome.org/2014/03/nsa-turbine-turmoil.pdf
- http://cryptome.org/2014/03/nsa-industry-exploit.pdf
- http://cryptome.org/2014/03/nsa-converged.pdf
- http://cryptome.org/2014/03/nsa-quantum-insert.pdf
- http://cryptome.org/2014/03/nsa-thousands-implants.pdf
- http://cryptome.org/2014/03/nsa-gchq-quantumtheory.pdf
- http://cryptome.org/2014/03/nsa-more-than-one-way.pdf
- http://cryptome.org/2014/03/nsa-hammerchant.pdf
- http://cryptome.org/2014/03/nsa-phishing-mtm.pdf
- http://cryptome.org/2014/03/tao-quantuminsert-bonanza.htm
- ¤ Compare TURBINE Slides (Spiegel vs Intercept) ::
- http://cryptome.org/2014/03/nsa-spot-differences.pdf
- ¤ NSA Denies Thousands of Implants ::
- http://cryptome.org/2014/03/nsa-14-0313.pdf
- _______________________________________
- ¤ NSA Hacking Routers & Social Media (Misc) ::
- http://cryptome.org/2014/03/nsa-5-eyes-hacking.pdf
- http://cryptome.org/2014/03/nsa-menwith-xkeyscore.pdf
- http://cryptome.org/2014/03/nsa-selector.pdf
- _______________________________________
- ¤ Cryptome Eyeballs Deputy Director Richard Ledgett ::
- http://cryptome.org/2014-info/richard-ledgett/richard-ledgett.htm
- _______________________________________
- ¤ NSA Assistance to Dutch Somali Piracy Control ::
- Alliances between security services are usually
- kept secret. But thousands of NSA documents are
- now in the hands of a select group of journalists,
- thanks to former NSA worker Edward Snowden. They
- show that the NSA is the central organisation in
- an international exchange of tapped telephone and
- internet traffic.
- The Netherlands is also a part of this. In September,
- the German weekly Der Spiegel published an NSA document
- about the Netherlands. The graph, entitled ‘Netherlands
- – 30 days’, appeared to show that the NSA had listened
- in to 1.8 million Dutch telephone calls.
- But last month, the cabinet showed that the reality
- was different. The 1.8 million telephone calls, wrote
- home affairs minister Ronald Plasterk and defence
- minister Jeanine Hennis, were not intercepted by
- the Americans, but by the Dutch and then shared with
- the NSA. It was not American, but Dutch espionage.
- Two new documents give further details. The Netherlands,
- it transpires, intercepts vast amounts of Somali
- telephone traffic and shares it with the NSA. The
- Dutch use the information to combat piracy. But the
- Americans may possibly use the information for
- something else as well: taking out terrorism suspects
- by attacking them with armed drones.
- http://cryptome.org/2014/03/nsa-dutch-assist.pdf
- http://www.nrc.nl/nieuws/2014/03/05/the-secret-role-of-the-dutch-in-the-american-war-on-terror/
- _______________________________________
- ¤ NSA Blames Tech Firms, Vice Versa ::
- http://cryptome.org/2014/03/tech-stop-spying.htm
- http://cryptome.org/2014/03/big-data-spying.htm
- ---------------------------------------
- ¤ Tech Firms Spy ::
- http://cryptome.org/isp-spy/online-spying.htm
- ¤ NSA Spies Too ::
- https://www.aclu.org/nsa-documents-released-public-june-2013
- _______________________________________
- ¤ GCHQ “OPTIC NERVE” Spy Programme ::
- http://cryptome.org/2014/02/gchq-optic-nerve.pdf
- ¤ GCHQ Collects Webcam Photos of Yahoo Users ::
- The documents show that images were collected
- from webcams at regular intervals, one image
- every five minutes, and were used by the spy
- agency to trial automated facial recognition
- programs.
- http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo
- http://www.infowars.com/you-read-it-here-first-government-spies-on-innocent-people-via-webcams-laptops-xbox/
- http://news.softpedia.com/news/GCHQ-Collected-Webcam-Images-of-Millions-of-Yahoo-Fans-429705.shtml
- https://www.wsws.org/en/articles/2014/02/28/gchq-f28.html
- ¤ FLASHBACK ; Infowars Warned Users in 2006 ::
- http://www.infowars.com/articles/bb/gov_industry_use_computer_mics_spy_on_americans.htm
- _______________________________________
- ¤ NSA Director Alexander’s Phones ::
- http://electrospaces.blogspot.com/2014/02/nsa-director-alexanders-phones.html
- _______________________________________
- ¤ NSA Seeks to Expand Database, 26 Feb 2014 ::
- http://www.breitbart.com/InstaBlog/2014/02/27/NSA-Seeks-to-Expand-Database
- http://www.uscourts.gov/uscourts/courts/fisc/br14-01-motion-140226.pdf
- _______________________________________
- ¤ NSA Bugged Top German Officials After Orders
- Not to Spy On Chancellor Claims New Whistleblower ::
- http://www.mintpressnews.com/snowden-2-0-new-active-duty-nsa-whistleblower/180502/
- http://techcrunch.com/2014/02/24/report-nsa-bugged-top-german-officials-after-obama-ordered-cease-of-spying-on-chancellor/
- _______________________________________
- ¤ NSA Observer ::
- https://nsa-observer.laquadrature.net/
- _______________________________________
- ¤ Spy Documents Released Since June 2013 ::
- https://www.aclu.org/nsa-documents-released-public-june-2013
- http://cryptome.org/2014/02/snowden-tabulations.htm
- _______________________________________
- ¤ NSA Spying Zero Hedge Connections ::
- http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2014/02/ZH%20browsing%20govt_1.jpg
- http://www.zerohedge.com/news/2014-02-19/while-browsing-zero-hedge-certain-government-agency
- _______________________________________
- ¤ NYT Samantha Storey Inept Redactions ::
- Inlcudes two GCHQ documents.
- 01 “MOBILE THEME BRIEFING MAY 28 2010”
- 02 “Converged Analysis of Smartphone Devices”
- http://cryptome.org/2014/02/nyt-leak.zip
- _______________________________________
- ¤ NSA’s Secret Role in the US Assassination Program ::
- An anonymous former drone operator for Joint
- Special Operations Command (JSOC) told The
- Intercept — a new publication helmed by
- Glenn Greenwald, who broke the first of many
- NSA revelations last year — that the US military
- and CIA use the NSA’s metadata analysis and
- phone-tracking abilities to identify airstrike
- targets without confirming their veracity on
- the ground.
- https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/
- https://www.activistpost.com/2013/10/add-death-by-drone-to-nsas-list-of.html
- http://www.infowars.com/new-whistleblower-reveals-nsa-picking-drone-targets-based-on-bad-data-death-by-unreliable-metadata/
- _______________________________________
- ¤ ASD Helps NSA Spy on Law Firms, Laywers ::
- A top-secret document, obtained by the
- former NSA contractor Edward J. Snowden,
- shows that an American law firm was
- monitored while representing a foreign
- government in trade disputes with the
- United States. The disclosure offers a
- rare glimpse of a specific instance in
- which Americans were ensnared by the
- eavesdroppers, and is of particular
- interest because lawyers in the United
- States with clients overseas have
- expressed growing concern that their
- confidential communications could be
- compromised by such surveillance.
- http://www.nytimes.com/2014/02/16/us/eavesdropping-ensnared-american-law-firm.html
- http://www.activistpost.com/2014/02/new-snowden-docs-implicate-nsa-in.html
- http://thehill.com/blogs/global-affairs/asia-pacific/198506-report-spies-watched-us-lawyers-in-trade-deal
- NOBODY comments
- NY Times has not provided any documentation.
- There should be an FOIA request to the IC
- and perhaps to the DNI for this document to
- be declassified for research in public domain.
- _______________________________________
- ¤ NSA FISA Business Spying ::
- http://cryptome.org/2014/02/nsa-fisa-business.pdf
- ¤ NSA Course on FISA Spying Operations ::
- http://cryptome.org/2014/02/nsa-fisa-course.pdf
- _______________________________________
- ¤ Snowden Allegedly Used Web Scraper Tool ::
- http://www.nytimes.com/2014/02/09/us/snowden-used-low-cost-tool-to-best-nsa.html?hp&_r=1
- _______________________________________
- ¤ Ex-chancellor Gerhard Schröder Allegedly
- Spied by NSA (No Documentation Presented) ::
- Munich daily Sueddeutsche Zeitung and
- public broadcaster NDR reported Tuesday
- that Merkel’s predecessor Gerhard Schroeder
- was added to the NSA’s National Sigint
- Requirement List as number 388 in 2002.
- http://www.dw.de/reports-nsa-first-targeted-german-chancellor-schr%C3%B6der-then-merkel/a-17408683
- http://www.theguardian.com/world/2014/feb/04/us-nsa-gerhard-schroeder-surveillance?view=mobile
- http://www.faz.net/aktuell/politik/ausland/ausspaeh-affaere-die-spionage-botschaft-12635377.html
- ¤ New Interpretations of NSA Monitoring
- the German Chancellor ::
- http://electrospaces.blogspot.de/2014/02/new-interpretations-of-nsa-monitoring.html
- _______________________________________
- ¤ Dutch Intelligence Claims Responsibility for
- Phone Call Spying ::
- http://www.dutchnews.nl/news/archives/2014/02/the_netherlands_not_usa_gather.php
- http://static3.volkskrant.nl/static/asset/2014/kamerbrief_met_reactie_op_berichtgeving_metadata_telefoonverkeer_3761.pdf
- _______________________________________
- ¤ First Congressman To Battle the NSA is Dead ::
- http://pando.com/2014/02/04/the-first-congressman-to-battle-the-nsa-is-dead-no-one-noticed-no-one-cares/
- _______________________________________
- ¤ Mike Rogers Wants Journalists With Leaks Jailed ::
- http://nypost.com/2014/02/05/pol-journalist-fencing-snowden-secrets-should-be-jailed/
- _______________________________________
- On Saturday 20 July 2013, in the basement of the
- Guardian’s office in Kings Cross, London, watched by
- two GCHQ technicians, Guardian editors destroyed
- hard drives and memory cards on which encrypted files
- leaked by Edward Snowden had been stored. This is
- the first time footage of the event has been released.
- http://www.youtube.com/watch?v=bUokM5d1qic
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ CSEC IP Profiling & Mission Impacts ::
- http://www.cbc.ca/news2/pdf/airports_redacted.pdf
- http://cryptome.org/2014/01/csec-ip-profile.pdf
- ¤ CSEC Objects to Disclosure of IP Profiling ::
- http://cryptome.org/2014/01/csec-14-0131.pdf
- ¤ CSEC Used Airport Wi-Fi to Track Travellers ::
- A top secret document retrieved by US whistleblower
- Edward Snowden and obtained by CBC News shows
- that Canada’s electronic spy agency used information
- from the free internet service at a major Canadian
- airport to track the wireless devices of thousands
- of ordinary airline passengers for days after they
- left the terminal.
- After reviewing the document, one of Canada’s
- foremost authorities on cyber-security says the
- clandestine operation by the Communications
- Security Establishment Canada (CSEC) was almost
- certainly illegal. ... ...
- The document indicates the passenger tracking
- operation was a trial run of a powerful new
- software program CSEC was developing with help
- from its US counterpart, the NSA.
- In the document, CSEC called the new technologies
- “game-changing,” and said they could be used for
- tracking “any target that makes occasional forays
- into other cities/regions.”
- http://www.cbc.ca/news/politics/csec-used-airport-wi-fi-to-track-canadian-travellers-edward-snowden-documents-1.2517881
- CSEC concluded: “Can then take seeds from these
- airports and repeat to cover whole world.”
- http://arstechnica.com/tech-policy/2014/01/new-snowden-docs-show-canadian-spies-tracked-thousands-of-travelers/
- ¤ More Details Into CSEC IP Profiling ::
- http://electrospaces.blogspot.fr/2014/02/did-csec-really-tracked-canadian.html
- ¤ How Canada’s CSEC Maps Phone and Internet Connections ::
- http://electrospaces.blogspot.com/2014/03/olympia-how-canadas-csec-maps-phone-and.html
- _______________________________________
- ¤ NSA, GCHQ Allegedly Hack Cryptographer ::
- http://cryptome.org/2014/02/nsa-gchq-quisquater.pdf
- ¤ ... And Now It’s Personal ::
- http://cryptome.org/2014/02/stopping-nsa.htm
- _______________________________________
- ¤ GCHQ Snooped on YouTube and Facebook ::
- Documents taken from the National Security
- Agency by Edward Snowden and obtained by NBC
- News detail how British cyber spies demonstrated
- a pilot program to their US partners in 2012
- in which they were able to monitor YouTube in
- real time and collect addresses from the billions
- of videos watched daily, as well as some user
- information, for analysis. At the time the
- documents were printed, they were also able to
- spy on Facebook and Twitter.
- Called “Psychology A New Kind of SIGDEV”
- (Signals Development), the presentation includes
- a section that spells out “Broad real-time
- monitoring of online activity” of YouTube videos,
- URLs “liked” on Facebook, and Blogspot/Blogger
- visits. The monitoring program is called
- “Squeaky Dolphin.”
- Experts told NBC News the documents show the
- British had to have been either physically able
- to tap the cables carrying the world’s web
- traffic or able to use a third party to gain
- physical access to the massive stream of data,
- and would be able to extract some key data
- about specific users as well.
- http://cryptome.org/2014/01/gchq-squeaky-dolphin.pdf
- http://cryptome.org/2014/01/gchq-newtons-cat.pdf
- http://msnbcmedia.msn.com/i/msnbc/Sections/NEWS/snowden_youtube_nbc_document.pdf
- http://investigations.nbcnews.com/_news/2014/01/27/22469304-snowden-docs-reveal-british-spies-snooped-on-youtube-and-facebook?lite
- _______________________________________
- ¤ NSA/GCHQ Smartphone App Location Spying ::
- http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data
- https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data
- http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html?_r=0
- ¤ GCHQ Mobile Theme Briefing ::
- “Over 200 3rd party Location Aware Applications
- on the iPhone alone.”
- http://cryptome.org/2014/01/gchq-mobile-theme.pdf
- ¤ NSA Converged Analysis of Smartphone Devices ::
- “Android Phones pass GPS data in the clear.”
- http://cryptome.org/2014/01/nsa-smartphones-analysis.pdf
- _______________________________________
- ¤ Obama Grants NSA Exemption From Law ::
- The National Security Agency program that
- collects data on nearly every US phone call
- isn’t legal, a privacy review board said
- Thursday in a newly released report.
- http://cryptome.org/2014/01/pclob-14-0123.pdf
- “We have not identified a single instance
- involving a threat to the United States in
- which the program made a concrete difference
- in the outcome of a counterterrorism
- investigation,” the board wrote in the
- report released Thursday.
- Despite Obama’s promise to reform the NSA,
- domestic spying will continue.
- http://edition.cnn.com/2014/01/23/politics/nsa-telephone-records-privacy/index.html?hpt=hp_t3
- _______________________________________
- ¤ Snowden Speaks ::
- http://cryptome.org/2014/01/snowden-video-13-0126.zip
- _______________________________________
- ▼ Snowden Calls Russian-Spy Story “Absurd” ::
- http://www.newyorker.com/online/blogs/newsdesk/2014/01/snowden-calls-russian-spy-story-absurd.html
- ▲ NSA is NOT the Source of All Spying ::
- ¯¯¯
- http://20committee.com/2014/01/18/the-end-of-the-snowden-operation/
- NOBODY’s comment blocked @ 20committee.com
- Reform? Reform was never intended to come
- from politicians or the white house. Reform
- will come from peoples’ change of online use ;
- growing public use of open-source encryption,
- growing use of services such as Tor, a growing
- amount of computers air-gapped, growing use of
- hardcopy backups rather than “the cloud” - and
- add to that, more people bleaching their cookies
- among other web browser cache, surging VPN use,
- growing use of proxies. Sudden disconnections
- of users’ modems when not actually being used. The
- use of alternative search engines (such as ixquick,
- duckduckgo, startpage, privatelee, et al) and
- also consider the growing use of XPIs such as
- Noscript, Ghostery, HTTPS Everywhere and others.
- Reform?
- How about the death of RSA and a new generation
- of young privacy-crypto-enthusiasts who start to
- say “fuck the corporate platforms” and change it
- whether legal or not?
- The reform will come from people taking action.
- Here’s what I’d like to know - will “big government”
- follow up reform with their “internet kill switch?”
- _______________________________________
- ¤ NSA Redactions Fail, Fail and Fail Again ::
- http://cryptome.org/2014/01/nsa-redaction-fails.pdf
- _______________________________________
- ¤ NSA’s Upstream Collection Detailed ::
- The corporate partnerships are one of
- three ways NSA is intercepting the world’s
- main internet cables:
- - Cooperation with telecommunication companies
- - Cooperation with foreign intelligence agencies
- - Unilateral cable tapping operations
- http://electrospaces.blogspot.de/2014/01/slides-about-nsas-upstream-collection.html
- ---------------------------------------
- http://postimg.org/image/9viuxblpd/
- http://www.youtube.com/watch?v=kOAv7zbJkCk
- http://www.dailydot.com/news/nsa-fairview-slides-brazil-spying/
- http://cryptome.org/2013/08/nsa-codenames.htm
- _______________________________________
- ¤ 24 FISA Court Documents DECLASSIFIED ::
- http://cryptome.org/2014/01/fisc-13-0117.zip
- ¤ FISA Court Orders Comparison ::
- http://cryptome.org/vz-slip.jpg
- http://cryptome.org/2014/01/fisc/fisc-orders-compare.htm
- http://cryptome.org/2014/01/fisc2/fisc-before-after-obama.htm
- http://cryptome.org/2014/01/fisc3/fisc-br-11-07-v-11-57.htm
- ---------------------------------------
- http://icontherecord.tumblr.com/
- _______________________________________
- ¤ SMS Text Messages - A Goldmine to Exploit ::
- http://cryptome.org/2014/01/nsa-sms-exploit.pdf
- http://s3.documentcloud.org/documents/1006111/sms.pdf
- ¤ NSA Vacuuming SMS Texts Around the World ::
- The documents also reveal the UK spy agency
- GCHQ has made use of the NSA database to search
- the metadata of “untargeted and unwarranted”
- communications belonging to people in the UK.
- The NSA program, codenamed Dishfire, collects
- “pretty much everything it can”, according to
- GCHQ documents, rather than merely storing the
- communications of existing surveillance targets.
- The NSA has made extensive use of its vast
- text message database to extract information
- on people’s travel plans, contact books, financial
- transactions and more – including of individuals
- under no suspicion of illegal activity.
- http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep
- _______________________________________
- ¤ NSA Covert Radio Signals Break Air-gaps ::
- http://cryptome.org/2014/01/nsa-quantum-radio.htm
- http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html
- The technology, which the agency has used
- since at least 2008, relies on a covert
- channel of radio waves that can be transmitted
- from tiny circuit boards and USB cards inserted
- surreptitiously into the computers. In some
- cases, they are sent to a briefcase-size
- relay station that intelligence agencies can
- set up miles away from the target.
- The radio frequency technology has helped
- solve one of the biggest problems facing
- American intelligence agencies for years:
- getting into computers that adversaries,
- and some American partners, have tried to
- make impervious to spying or cyberattack.
- In most cases, the radio frequency hardware
- must be physically inserted by a spy, a
- manufacturer or an unwitting user.
- ---------------------------------------
- Refer to NSA’s Tailored Access Operations
- http://paste.cdtag.de/view.php?id=23643
- _______________________________________
- ¤ NSA Windows Event Monitoring ::
- http://cryptome.org/2014/01/nsa-windows-event.pdf
- ---------------------------------------
- ¤ Locate And Destroy WinRM Registry ::
- http://pastebin.jity.de/view/e8a662d4
- _______________________________________
- ¤ NSA Reducing the Effectiveness of Hash ::
- http://cryptome.org/2014/01/nsa-pass-hash.pdf
- _______________________________________
- ¤ NSA’s Organizational Designations ::
- http://electrospaces.blogspot.com/2014/01/nsas-organizational-designations.html
- _______________________________________
- ¤ Analysis of NSA’s 215 Metadata Spy Programs ::
- http://politicalscience.osu.edu/faculty/jmueller/NSAshane3.pdf
- _______________________________________
- ¤ John Inglis Explains Why US-Based Collection
- of Internet Metadata Doesn’t Work ::
- http://www.npr.org/2014/01/10/261282601/transcript-nsa-deputy-director-john-inglis?live=1
- http://www.emptywheel.net/2014/01/10/john-inglis-explains-why-us-based-collection-of-internet-metadata-doesnt-work/
- _______________________________________
- ¤ Rand Paul to Lead Class-Action Lawsuit
- Against Obama Over NSA Spying ::
- http://www.breitbart.com/Big-Government/2014/01/03/Rand-Paul-to-Sue-Obama-over-NSA-Spying
- _______________________________________
- ¤ NSA Quantum Computing Research for Cracking
- All Encryption ::
- In room-size metal boxes secure against
- electromagnetic leaks, the National Security
- Agency is racing to build a computer that
- could break nearly every kind of encryption
- used to protect banking, medical, business
- and government records around the world.
- According to documents provided by former
- NSA contractor Edward Snowden, the effort
- to build “a cryptologically useful quantum
- computer” — a machine exponentially faster
- than classical computers — is part of a
- $79.7 million research program titled
- “Penetrating Hard Targets.” Much of the
- work is hosted under classified contracts
- at a laboratory in College Park, Md.
- http://cryptome.org/2014/01/nsa-quantum-computer.pdf
- http://cryptome.org/2014/01/nsa-quantum-computer-2.pdf
- http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_print.html
- _______________________________________
- ¤ NSA and Random Number Generators ::
- http://blog.cryptographyengineering.com/2013/12/a-few-more-notes-on-nsa-random-number.html
- _______________________________________
- ¤ Updated List of NSA Codenames ::
- http://cryptome.org/2014/01/nsa-codenames.htm
- _______________________________________
- ¤ Jacob Appelbaum Explains New NSA Leaks ::
- https://www.youtube.com/watch?v=b0w36GAyZIA
- Mirror » http://fileb.ag/xwcp0jrewk2o
- ¤ Jacob’s NSA Slides @ioerror (ZIP) ::
- http://cryptome.org/2013/12/nsa-catalog.zip
- ¤ NSA Catalog Image Formats (16.7MB) Mirrored ::
- http://upsto.re/CtXqio
- http://f.lui.li/get_1228_a2b4.html
- http://blakker.pl/files/get/fenW1XyGrl/nsa-catalog-images.zip
- ¤ Documents Reveal Top NSA Hacking Unit ::
- The NSA’s TAO hacking unit is considered
- to be the intelligence agency’s top secret
- weapon. It maintains its own covert network,
- infiltrates computers around the world and
- even intercepts shipping deliveries to plant
- back doors in electronics ordered by those
- it is targeting. ... ...
- http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html
- The insert method and other variants of
- QUANTUM are closely linked to a shadow
- network operated by the NSA alongside the
- Internet, with its own, well-hidden
- infrastructure comprised of “covert”
- routers and servers. It appears the NSA
- also incorporates routers and servers
- from non-NSA networks into its covert
- network by infecting these networks with
- “implants” that then allow the government
- hackers to control the computers remotely.
- In this way, the intelligence service seeks
- to identify and track its targets based on
- their digital footprints. These identifiers
- could include certain email addresses or
- website cookies set on a person’s computer.
- Of course, a cookie doesn’t automatically
- identify a person, but it can if it includes
- additional information like an email address.
- In that case, a cookie becomes something
- like the web equivalent of a fingerprint.
- ---------------------------------------
- ¤ NSA QUANTUM Theory (FOXACID) ::
- http://cryptome.org/2013/12/nsa-quantumtheory.pdf
- ¤ NSA/GCHQ QUANTUM Tasking Techniques ::
- “YahooBcookie’s are unique to a specific
- computer and can hold other <yahoo> addresses
- that are being logged into on that computer
- as long as the user does not clear browser
- cookies.”
- http://cryptome.org/2013/12/nsa-quantum-tasking.pdf
- ¤ NSA QFIRE Packet Injection Attacks ::
- http://cryptome.org/2013/12/nsa-qfire.pdf
- ---------------------------------------
- ¤ NSA Catalog for Hardware Backdoors ::
- The specialists at ANT, which presumably
- stands for Advanced or Access Network Technology,
- could be described as master carpenters for
- the NSA’s department for Tailored Access
- Operations (TAO). In cases where TAO’s usual
- hacking and data-skimming methods don’t suffice,
- ANT workers step in with their special tools,
- penetrating networking equipment, monitoring
- mobile phones and computers and diverting or
- even modifying data. Such implants, as they are
- referred to in NSA parlance, have played a
- considerable role in the intelligence agency’s
- ability to establish a global covert network
- that operates alongside the Internet.
- Some of the equipment available is quite
- inexpensive. A rigged monitor cable that
- allows “TAO personnel to see what is displayed
- on the targeted monitor,” for example, is
- available for just $30. But an “active GSM
- base station” -- a tool that makes it possible
- to mimic a mobile phone tower and thus monitor
- cell phones -- costs a full $40,000. Computer
- bugging devices disguised as normal USB plugs,
- capable of sending and receiving data via radio
- undetected, are available in packs of 50 for
- over $1 million.
- The ANT division doesn’t just manufacture
- surveillance hardware. It also develops software
- for special tasks. The ANT developers have a
- clear preference for planting their malicious
- code in so-called BIOS, software located on a
- computer’s motherboard that is the first thing
- to load when a computer is turned on.
- This has a number of valuable advantages: an
- infected PC or server appears to be functioning
- normally, so the infection remains invisible
- to virus protection and other security programs.
- And even if the hard drive of an infected
- computer has been completely erased and a new
- operating system is installed, the ANT malware
- can continue to function and ensures that new
- spyware can once again be loaded onto what is
- presumed to be a clean computer. The ANT
- developers call this “Persistence” and believe
- this approach has provided them with the
- possibility of permanent access.
- Another program attacks the firmware in
- hard drives manufactured by Western Digital,
- Seagate, Maxtor and Samsung, all of which,
- with the exception of latter, are American
- companies. Here, too, it appears the US
- intelligence agency is compromising the
- technology and products of American companies.
- http://cryptome.org/2013/12/nsa-tao-ant-pdf.pdf
- http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html
- http://gizmodo.com/the-nsa-actually-intercepted-packages-to-put-backdoors-1491169592
- http://www.theguardian.com/world/2013/dec/29/der-spiegel-nsa-hacking-unit-tao
- https://www.wsws.org/en/articles/2013/12/31/snow-d31.html
- ¤ NSA Cisco / Juniper Router Backdoors ::
- http://cryptome.org/2013/12/nsa-ant-firewalls.pdf
- http://cryptome.org/2013/12/nsa-ant-router.pdf
- ¤ NSA Computer Monitor Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-bildschirm.pdf
- ¤ NSA PCI Bus Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-rechner.pdf
- ¤ NSA Motherboard Backdoor (#BadBIOS) ::
- http://cryptome.org/2013/12/nsa-ant-server.pdf
- ¤ NSA Keyboard Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-tastatu.pdf
- ¤ NSA Apple iPhone Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-handys.pdf
- ¤ NSA WiFi Card / Apple Airport Backdoors ::
- http://cryptome.org/2013/12/nsa-ant-mobilfunk.pdf
- ¤ NSA Active 802.11 Netcard Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-w-lan.pdf
- ¤ NSA USB Backdoor to Bridge Air-gaps ::
- http://cryptome.org/2013/12/nsa-ant-usb.pdf
- ¤ NSA Alternative SIGINT Hunter ::
- http://cryptome.org/2013/12/nsa-ant-raumuber.pdf
- ¤ NSA Keystroke, Screenshot & SIGINT Hunting ::
- http://cryptome.org/2013/12/greenwald-13-1231.pdf
- http://truth-out.org/news/item/20948-glenn-greenwald-the-nsa-can-literally-watch-every-keystroke-you-make
- ¤ Jacob Appelbaum Comment on Der Spiegel Reports ::
- http://cryptome.org/2014/01/appelbaum-der-spiegel.htm
- ---------------------------------------
- BLOWBACK SETS IN ...
- ¤ IT Firms Lose Billions After NSA Scandal ::
- http://www.independent.co.uk/life-style/gadgets-and-tech/news/it-firms-lose-billions-after-nsa-scandal-exposed-by-whistleblower-edward-snowden-9028599.html
- ¤ Foreign Firms Won’t Buy American Tech ::
- https://www.informationweek.com/security/risk-management/nsa-fallout-why-foreign-firms-wont-buy-american-tech/d/d-id/1113384
- ---------------------------------------
- ¤ Apple Claims They Know Nothing About Backdoors ::
- http://www.infowars.com/apple-says-it-knows-nothing-about-your-iphone-spying-on-you/
- ¤ Apple Inc. Lying Exposed ::
- Logs from a properly air-gapped Mac OSX show
- the system attempting to access the Airport -
- yet the Airport card was physically disconnected.
- http://pastebin.jity.de/view/77d624be
- ¤ Cyber–Security Experts Ask If Apple “Flaw”
- Was Really NSA Backdoor ::
- Following an admission by Apple that a “bug”
- in its operating system had left devices open
- to potential hacking, experts are questioning
- whether the security hole was intentional, in
- order to allow the NSA backdoor access as part
- of its mass spying program.
- http://www.infowars.com/cyber-security-experts-ask-apple-flaw-was-really-nsa-backdoor/
- ---------------------------------------
- ¤ Intel CEO Refuses To Answer Questions On
- Whether NSA Can Access Processors ::
- http://www.infowars.com/intel-ceo-refuses-to-answer-questions-on-whether-nsa-can-access-processors/
- ¤ Dell Inc. Apologizes for the ‘Inconvenience’
- of Helping NSA Install Backdoors ::
- http://www.techdirt.com/articles/20131230/17174425718/dells-twitter-account-apologizes-inconvenience-helping-nsa-place-hidden-bios-bug.shtml
- http://www.infowars.com/dells-twitter-account-apologizes-for-the-inconvenience-of-helping-nsa-install-spyware/
- ¤ Locate And Destroy 802.11 Registry ::
- How to disable SOMBERKNAVE implant to
- properly air-gap the Windows XP system.
- http://pastebin.jity.de/view/bdd440b3
- _______________________________________
- ¤ NSA Whistleblower ; Planned Police State ::
- http://www.youtube.com/watch?v=x9Kcgme2I0c
- ¤ NSA Whistleblower ; National Security Scam ::
- http://www.youtube.com/watch?v=xPemLhvwfos
- _______________________________________
- ¤ Edward Snowden Interview by Barton Gellman ::
- http://www.washingtonpost.com/world/national-security/edward-snowden-after-months-of-nsa-revelations-says-his-missions-accomplished/2013/12/23/49fc36de-6c1c-11e3-a523-fe73f0ff6b8d_story.html
- Beginning in October 2012, he said, he
- brought his misgivings to two superiors
- in the NSA’s Technology Directorate and
- two more in the NSA Threat Operations
- Center’s regional base in Hawaii. For
- each of them, and 15 other co-workers,
- Snowden said he opened a data query tool
- called BOUNDLESSINFORMANT, which used
- color-coded “heat maps” to depict the
- volume of data ingested by NSA taps.
- His colleagues were often “astonished to
- learn we are collecting more in the United
- States on Americans than we are on Russians
- in Russia,” he said. Many of them were
- troubled, he said, and several said they
- did not want to know any more.
- ---------------------------------------
- BOUNDLESS INFORMANT REPORTS/DOCS REFER HERE ;
- http://paste.cdtag.de/view.php?id=19580
- _______________________________________
- ¤ New York Judge, William Pauley III, Declares
- Metadata Hoarding Legal ::
- http://cryptome.org/2013/12/pauley-13-1227.pdf
- http://www.scribd.com/doc/194082600/NSA-Opinion
- http://www.politico.com/story/2013/12/nsa-phone-surveillance-ruling-101569.html
- http://www.infowars.com/judge-falls-for-the-big-lie-about-nsa-spying/
- /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/
- \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
- ¤ Judge Declares Metadata Hoarding Violates
- Fourth Amendment Rights ::
- http://cryptome.org/2013/12/klayman-048-049.pdf
- A federal judge ruled Monday that the
- National Security Agency program which
- collects information on nearly all telephone
- calls made to, from or within the United
- States is likely unconstitutional.
- US District Court Judge Richard Leon found
- that the program appears to violate the
- Fourth Amendment ban on unreasonable
- searches and seizures. He also said the
- Justice Department had failed to demonstrate
- that collecting the information had helped
- to head off terrorist attacks.
- Acting on a lawsuit brought by conservative
- legal activist Larry Klayman, Leon issued
- a preliminary injunction barring the NSA
- from collecting so-called metadata pertaining
- to the Verizon accounts of Klayman and one
- of his clients. However, the judge stayed
- the order to allow for an appeal.
- http://www.politico.com/story/2013/12/national-security-agency-phones-judge-101203.html
- http://www.wsws.org/en/articles/2013/12/17/cour-d17.html
- Leon’s 68-page opinion is the first
- significant legal setback for the NSA’s
- surveillance program since it was disclosed
- in June in news stories based on leaks
- from former NSA contractor Edward Snowden.
- For seven years, the metadata program has
- been approved repeatedly by numerous judges
- on the Foreign Intelligence Surveillance
- Court and found constitutional by at least
- one judge sitting in a criminal case.
- https://ecf.dcd.uscourts.gov/cgi-bin/show_public_doc?2013cv0851-48
- ¤ Klayman v. NSA 7 Court Documents ::
- http://cryptome.org/2013/12/klayman-051-058.zip
- ▼ Delay Motion for Class Action Lawsuit ::
- http://cryptome.org/2013/12/klayman-060.pdf
- ▲ White House Tries to Prevent Judge From
- Ruling on Surveillance Efforts ::
- http://www.nytimes.com/2013/12/22/us/white-house-tries-to-prevent-judge-from-ruling-on-surveillance-efforts.html?_r=0
- ¤ Bulk Metadata Collection Ruled Illegal ::
- http://cryptome.org/2013/12/leon-13-1216.pdf
- ---------------------------------------
- ¤ White House Spying Review Group Report ::
- http://cryptome.org/2013/12/obama-nsa-report.pdf
- ¤ White House Spy Report Commentary ::
- http://cryptome.org/2013/12/prgi-comments-001.htm
- http://cryptome.org/2013/12/prgi-comments-002.htm
- ¤ Obama Advisory Committee Whitewashes US
- Spying Programs ::
- http://www.wsws.org/en/articles/2013/12/19/spyi-d19.html
- ---------------------------------------
- ▼ FLASHBACK ; Michael Hayden Admits They
- Will NOT Stifle Surveillance ::
- http://www.youtube.com/watch?v=XS6nfkbNvlo
- http://www.infowars.com/former-nsa-boss-government-will-continue-surveillance-so-get-used-to-it/
- ▲ Counter-spy_Manual.zip
- (22 files | ZIP | 2.93MB)
- http://paste.darkbyte.ru/view/5459487
- http://ae7.st/p/26c (mirror)
- _______________________________________
- ¤ NSA/CSS Mission Slides ::
- These slides, from an internal presentation
- in the first week of October 2001, show how
- critical the NSA sees electronic eavesdropping.
- http://cryptome.org/2013/12/nsa-css-mission.pdf
- “ 1B. Ability to exploit:
- - Military Information
- - Economic Information
- - Information Operations Information
- - Political Information ”
- _______________________________________
- ¤ Eben Moglen & Bruce Schneier Talk About
- NSA Leaks, Software and Cryptography ::
- https://www.youtube.com/watch?v=N8Sc6pUR1mA
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA Rigging RSA Crypto Market ::
- http://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220
- ¤ RSA Cryptographers Duped and Bribed by NSA ::
- http://cryptome.org/2013/12/nsa-kills-rsa.htm
- ¤ NSA Kills RSA Trust and Therefore RSA Jobs ::
- http://cryptome.org/2013/12/nsa-kills-rsa-workers.htm
- ¤ List of Canceled RSA Talks Continues to Grow ::
- http://threatpost.com/list-of-canceled-rsa-talks-continues-to-grow/103508
- ¤ FLASHBACK ; NSA Rigging the Crypto Market ::
- http://cryptome.org/jya/nsa-sun.htm
- _______________________________________
- ¤ Did British Telecom Provides Backdoors
- for NSA and GCHQ (?) ::
- In a paper titled ‘The Internet Dark Age’
- the researchers say that BT is shipping
- hardware with backdoors that allow secret
- government access in order to make network
- compromise easier. “BT are directly responsible
- for covertly embedding secret spy equipment
- in millions of homes and businesses within
- the UK,” the paper states.
- Recently on Cryptome (the better leaks
- than wikileaks site), a paper appeared
- pointing out that BT (British Telecom)
- assigns all their modems an extra address
- in the 30.x.x.x address space, and then
- attaches SSH and SNMP to that address.
- This looks like what many ISPs do, assigning
- a second IP address for management, except
- for one thing: the 30.0.0.0/8 block is
- assigned to the United States Department
- of Defense. This has caused a fevered round
- of speculation that this is actually a
- secret backdoor for the NSA/GCHQ, so that
- they can secretly monitor and control
- peoples’ home networks.
- Maybe, but it’s probably not the case.
- The better explanation is that BT simply
- chose this address space because it’s
- non-routable. While it’s assigned public
- address, it’s only used inside the private
- DoD military network. Try tracerouting to
- that address space, you’ll see that your
- packets go nowhere.
- http://cryptome.org/2013/12/Full-Disclosure.pdf
- http://www.csoonline.com/article/744697/report-accuses-bt-of-supplying-backdoors-for-gchq-and-nsa
- http://blog.erratasec.com/2013/12/dod-address-space-its-not-conspiracy.html
- ¤ Bruce Schneier Leaves British Telecom ::
- “Yes, it’s true. And contrary to rumors,
- this has nothing to do with the NSA or GCHQ.
- No, BT wasn’t always happy with my writings
- on the topic, but it knew that I am an
- independent thinker and didn’t try to
- muzzle me in any way. I’m just ready to
- leave. I spent seven years at BT, and
- seven years at Counterpane Internet
- Security, Inc., before BT bought us.
- It’s past time for something new.”
- http://www.schneier.com/blog/archives/2013/12/yes_im_leaving.html
- http://arstechnica.com/information-technology/2013/12/nsa-surveillance-critic-bruce-schneier-to-leave-post-at-bt/
- http://www.computing.co.uk/ctg/news/2319296/bruce-schneier-leaves-bt-after-eight-years-as-security-futurologist
- ---------------------------------------
- ¤ NSA Infected Around 50,000 Networks Worldwide ::
- The American intelligence service - NSA -
- infected more than 50,000 computer networks
- worldwide with malicious software designed
- to steal sensitive information. Documents
- provided by former NSA-employee Edward Snowden
- and seen by this newspaper, prove this.
- A management presentation dating from 2012
- explains how the NSA collects information
- worldwide. In addition, the presentation
- shows that the intelligence service uses
- ‘Computer Network Exploitation’ (CNE) in
- more than 50,000 locations. CNE is the
- secret infiltration of computer systems
- achieved by installing malware, malicious
- software.
- One example of this type of hacking was
- discovered in September 2013 at the Belgium
- telecom provider Belgacom. For a number of
- years the British intelligence service - GCHQ –
- has been installing this malicious software
- in the Belgacom network in order to tap
- their customers’ telephone and data traffic.
- The Belgacom network was infiltrated by GCHQ
- through a process of luring employees to a
- false Linkedin page.
- http://www.nrc.nl/wp-content/uploads/2013/11/nsa568.jpg
- http://cryptome.org/2013/11/nsa-sigint-cryptologic-platform.pdf
- http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/
- http://hothardware.com/News/Dutch-News-Agency-Reports-NSA-Infected-50000-Networks-With-Malware/
- ¤ NSA Power to Generate Profits and Pay ::
- The NSA SIGINT Strategy 2012-2016 pretty
- well covers all the comsec and crypto
- initiatives to covertly exploit people,
- cryptographers, anonymizers, informants,
- planted spies, security firms, networks,
- governments, nations, friends, lovers
- and citizens.
- Not sure leaks, lawsuits and protests
- will deter this bounty of profits for
- the comsec industry, unless the public
- is aroused to demand the 3 branches grasp
- the nettle, and all those making money
- from this deception operation decide to
- give up their profits, perks and prestige.
- I mean those on the comsec and crypto
- lists, those participating in standards
- committees, those enjoying contracts and
- grants in think tanks and universities,
- those in law firms and public interest
- orgs, those in the media and academia,
- those in non-spy gov agencies, pretending
- to be in opposition as they scramble to
- rejigger their products and sales pitches,
- to exploit what is being fabricated to
- diminish Snowden’s revelations with new
- forms of secrecy, technology, law,
- regulations, bribery, lobbying, grants,
- contracts, list lurking, online and
- offline spying, break-ins, the usual
- kaboodle, to assure the NSA goals are
- fulfilled.
- http://cryptome.org/2013/11/nsa-power-profit-pay.htm
- http://cryptome.org/2013/11/nsa-sigint-cryptologic-platform.pdf
- ¤ NSA’s Global Interception Network ::
- http://electrospaces.blogspot.fr/2013/12/nsas-global-interception-network.html
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ GCHQ Accused of Spying European, German
- and Israeli Politicians (No Documentation) ::
- http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135.html
- http://www.theguardian.com/uk-news/2013/dec/20/gchq-targeted-aid-agencies-german-government-eu-commissioner
- http://www.nytimes.com/2013/12/21/world/nsa-dragnet-included-allies-aid-groups-and-business-elite.html?_r=0
- _______________________________________
- ¤ CBS 60min ; Inside the NSA (Part One) ::
- http://www.youtube.com/watch?v=WgPNyAYOr04
- ¤ CBS 60min ; The Snowden Affair (Part Two) ::
- http://www.youtube.com/watch?v=5AaREKHQI8E
- ¤ NSA Interviewed by CBS - Transcript ::
- http://cryptome.org/2013/12/nsa-60mins/nsa-60mins.htm
- _______________________________________
- ¤ Proposal for Distribution of Snowden Cache ::
- http://cryptome.org/2013/12/snowden-cache-dist.htm
- _______________________________________
- ¤ EU Data Retention Directive “Unlawful”
- and “Incompatible” with Charter of Rights ::
- http://www.scribd.com/doc/191078925/Data-Retention-Challenge-Press-Release
- http://www.computing.co.uk/ctg/news/2318838/eu-data-retention-directive-unlawful-and-incompatible-with-charter-of-rights
- _______________________________________
- ¤ GOOGLE CENSORING NSA SEARCH RESULTS (?) ::
- http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/17/edward-snowden-doesnt-show-up-once-in-googles-list-of-top-2013-searches/
- _______________________________________
- ¤ Clapper, Feinstein, Obama Total Disregard
- of Public Concerns ::
- http://cryptome.org/2013/12/spies-reign-obama.htm
- ¤ Merkel Throws a Pissy Fit ::
- http://www.theguardian.com/world/2013/dec/17/merkel-compares-nsa-stasi-obama
- _______________________________________
- ¤ GCHQ’s Use of FLYING PIG to Spy ::
- “FLYING PIG is a program that allows
- analysts to query GCHQ’s vast repository
- of metadata about the world’s secure
- communications over TLS/SSL. It’s
- certainly not a program through which
- the GCHQ, or NSA for that matter, performs
- man-in-the-middle attacks against internet
- services like Google, as reported by others,
- including Bruce Schneier. The reports that
- claim the NSA performed MITM attacks against
- Google are based on a small piece of a
- document that describes a FLYING PIG
- (which is a not an NSA program, as you may
- have noticed) use case (presumably, an
- investigation into the DigiNotar CA breach).
- That’s not to say the GCHQ doesn’t perform
- MITM attacks, but there’s no evidence to
- be found in this document. Though, FLYING PIG
- may be used to prepare MITM attacks, e.g.
- by providing information about a target.”
- http://koen.io/2013/12/flying-pig-gchq-tls-ssl-knowledge-base/
- ¤ NSA Use of FLYING PIG to Spy ::
- https://www.documentcloud.org/documents/785152-166819124-mitm-google.html
- http://www.techdirt.com/articles/20130910/10470024468/flying-pig-nsa-is-running-man-middle-attacks-imitating-googles-servers.shtml
- http://news.cnet.com/8301-13578_3-57602701-38/nsa-disguised-itself-as-google-to-spy-say-reports/
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ John Young Breaks Down the NSA Leaks ::
- http://www.corbettreport.com/mp3/2013-12-17%20John%20Young.mp3
- http://www.corbettreport.com/interview-793-john-young-breaks-down-the-snowdennsa-saga/
- _______________________________________
- ¤ FASCIA Database of Device-Location Records ::
- http://cryptome.org/2013/12/nsa-fascia.pdf
- ---------------------------------------
- ¤ hdfs:// Cloud Holds FASCIA Database ::
- http://cryptome.org/2013/12/nsa-ghost-machine.pdf
- HDFS stands for “Hadoop Distributed File
- System” which was inspired by Google Inc,
- and later managed by big data corporations
- such as IBM, Yahoo, Facebook, et al.
- HDFS is designed to reliably store very
- large files across machines in a large
- cluster.
- ¤ Hadoop Emerging Technology ::
- “Hadoop is a data processing system that
- follows the MapReduce paradigm for scalable
- data analysis.” ... “Largest install is at
- Yahoo, a major contributor.”
- HDFS is a scalable file system with two
- major components, a central metadata server
- and file servers from data.
- http://www.upload-box.com/index.php/files/get/uTqMG-LMlY/hadoop-emerging-technology.pdf
- ¤ Yahoo - Managing a Hadoop Cluster ::
- This was taken from the Yahoo website,
- posted on public domain.
- http://msfire.tk/files/get/SIut69QW7Q/yahoo-hadoop.zip
- ¤ Apache Hadoop FileSystem and its Usage
- in Facebook (This File Is Mirrored) ::
- http://4lodzik.de/xu2/files/get/U-eeftxCDJ/facebook-hadhoop.zip
- http://www.uploadmini.com/index.php/files/get/rnvpDpXfZu/facebook-hadhoop.zip
- http://cloudseminar.berkeley.edu/data/hdfs.pdf
- ¤ hadoop_install.zip (Mirrored) ::
- http://fileb.ag/nukq1uicayye
- http://f.ishoo.ru/files/get/vfym4eZHvY/hadoop-install.zip
- http://cloud.elearning.uq.edu.au/download/hadoop_install.zip
- ---------------------------------------
- ¤ CO-TRAVELER Cellphone Tracking ; FASCIA
- Database Available With Ghostmachine ::
- “Proxies can make IP resolution challenging.”
- http://cryptome.org/2013/12/nsa-cotraveler.pdf
- ¤ CHALKFUN Location Tool Highly Censored ::
- http://cryptome.org/2013/12/nsa-chalkfun.pdf
- ¤ NSA Targets Device Location Verification ::
- http://cryptome.org/2013/12/nsa-target-location.pdf
- ¤ NSA’s Global Interception Network ::
- http://electrospaces.blogspot.com/2013/12/nsas-global-interception-network.html
- ¤ NSA Tracking Cellphone Locations ::
- In unveiling new Edward Snowden revelations
- about NSA spying, the Washington Post has
- once again whitewashed the fact that the
- content of all our communications have
- been stored and analyzed under the Echelon
- program since the 1990s.
- The new details concern how, “The National
- Security Agency is gathering nearly 5
- billion records a day on the whereabouts
- of cellphones around the world.”
- However, the report reveals itself to
- be little more than an exercise in soft-
- peddling when it claims that, “The NSA
- does not target Americans’ location data
- by design, but the agency acquires a
- substantial amount of information on
- the whereabouts of domestic cellphones
- “incidentally.”
- This notion that the NSA just accidentally
- happens to record the locations of Americans
- using data from their cellphones, and is
- not deliberately engaging in domestic
- surveillance, is yet another example of
- damage control by the establishment.
- http://www.infowars.com/new-nsa-revelations-another-limited-hangout-whitewash/
- http://www.washingtonpost.com/wp-srv/special/_ie-fallbacks/NSA_Co-traveler_g.jpg
- http://apps.washingtonpost.com/g/page/world/fascia-the-nsas-huge-trove-of-location-records/637/
- http://apps.washingtonpost.com/g/page/world/how-to-tell-if-a-target-is-foreign/635/
- http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_print.html
- http://www.theguardian.com/world/2013/dec/04/nsa-storing-cell-phone-records-daily-snowden
- ---------------------------------------
- ¤ NSA Uses Google Cookies and GSM Geohashes
- to Pinpoint Targets ::
- The National Security Agency is ‘secretly’
- piggybacking on the tools that enable
- Internet advertisers to track consumers,
- using cookies and location data to pinpoint
- targets for government hacking and to
- bolster surveillance.
- http://cryptome.org/2013/12/nsa-sigint-successes.pdf
- http://cryptome.org/2013/12/nsa-gsm-tracking.pdf
- http://apps.washingtonpost.com/g/page/national/nsa-signal-surveillance-success-stories/647/
- http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-targets-for-hacking/
- http://boingboing.net/2013/12/10/nsa-uses-googles-tracking-co.html
- http://www.theverge.com/2013/12/10/5198592/nsa-reportedly-piggybacking-on-google-advertising-cookies
- https://www.wsws.org/en/articles/2013/12/14/snow-d14.html
- ---------------------------------------
- ¤ FLASHBACK ; Anonymizing Google’s Cookie ::
- http://www.imilly.com/google-cookie.htm
- ---------------------------------------
- ¤ How Marketers Will Find and Track You
- In a World Without Cookies ::
- http://blog.thefetch.com/2013/11/18/cookie-monsters-how-marketers-will-find-and-track-you-in-a-world-without-cookies/
- _______________________________________
- ¤ How the NSA Targets Italy ::
- http://espresso.repubblica.it/foto/2013/12/05/galleria/nsa-intercettazioni-1.144400
- http://espresso.repubblica.it/inchieste/2013/12/05/news/revealed-how-the-nsa-targets-italy-1.144428
- http://www.pcworld.com/article/2070480/nsa-spies-on-italians-from-roof-of-us-embassy-in-rome-magazine-reports.html
- ¤ SCS_Italy_Spying.zip | 371KB ::
- http://ge.tt/api/1/files/2Bbc4C81/0/blob?download
- http://megaswf.com/f/2625421
- http://msfire.tk/files/get/srIJUWgvYg/scs-italy-spying.zip
- _______________________________________
- ¤ Swedish Intelligence Agency (FRA) Spied
- on Russian Leaders for NSA ::
- http://cryptome.org/2013/12/nsa-se-spied-ru.htm
- http://cryptome.org/2013/12/nsa-se-fra-ru-baltic.pdf
- http://www.youtube.com/watch?v=0yP7n8qZrz0
- http://rt.com/news/sweden-spied-russia-nsa-759/
- http://www.infowars.com/nsa-leaks-sweden-spied-on-russian-leaders-for-us/
- http://www.thelocal.se/20131211/sweden-aided-in-nsa-hacking-operations-report
- ¤ NSA & FRA Quantum Hacking Programme ::
- http://www.svt.se/ug/fra-part-of-top-secret-hacker-project
- ¤ NSA & FRA Relationship Was “Top Secret” ::
- http://cryptome.org/2013/12/nsa-se-spies.pdf
- http://s3.documentcloud.org/documents/889126/nsa-intelligence-relationship-with-sweden.pdf
- ¤ NSA & FRA Relationship “Actively Engaged” ::
- http://cryptome.org/2013/12/nsa-se-fra-relationship.pdf
- http://s3.documentcloud.org/documents/894384/nsa-internal-pm-on-fra-and-sweden-relations.pdf
- ¤ NSA & FRA Joint Quantum Spy Agenda ::
- http://cryptome.org/2013/12/nsa-se-fra-spying-agenda.pdf
- ¤ NSA/GCHQ/FRA Quantum Spying Accomplishments ::
- http://cryptome.org/2013/12/nsa-gchq-fra-quantum.pdf
- http://cryptome.org/2013/12/nsa-se-fra-quantum-2.pdf
- http://cryptome.org/2013/12/gchq-se-fra-quantum-3.pdf
- ¤ NSA/GCHQ/FRA Communication Intelligence ::
- http://cryptome.org/2013/12/nsa-gchq-se-fra-comint.pdf
- ---------------------------------------
- PAST XKEYSCORE REPORTS/DOCUMENTS REFER HERE ;
- http://paste.cdtag.de/view.php?id=16647
- ---------------------------------------
- ¤ NSA/FRA XKeyscore Targets Website Viewers ::
- http://cryptome.org/2013/12/nsa-se-fra-xkeyscore-slide.pdf
- ¤ NSA/FRA XKeyscore Targets Tor, etc. ::
- http://cryptome.org/2013/12/nsa-xkeyscore-tor-slides.pdf
- ¤ NSA/FRA XKeyscore Exploit Sources ::
- http://cryptome.org/2013/12/nsa-xkeyscore-sources.pdf
- ¤ NSA/FRA XKeyscore Data Hoarding Plans ::
- http://cryptome.org/2013/12/nsa-se-fra-xkeyscore.pdf
- _______________________________________
- “Earlier, a map showing SCS locations
- worldwide was published by the German
- magazine Der Spiegel. Initially an unredacted
- map was put online by accident, but before
- it was replaced, it was already copied onto
- several websites. This map showed 74 staffed
- SCS locations, 14 unmanned remote controlled
- locations and 8 other locations as of August
- 2010. Except for the SCS locations in Europe,
- the names of all other cities were blurred
- by Der Spiegel.”
- - electrospaces.blogspot.fr
- REDACTED MAP (CENSORED)
- https://lh3.ggpht.com/-ymi_oEW0XcI/UpzfqqqPRsI/AAAAAAAABCs/WU4lKnfs52w/s320/scs-global-map-redacted.jpg
- UNREDACTED MAP (DEFAULT)
- http://postimg.org/image/6kzpypy1l/
- BOTH REDACTED AND UNREDACTED (ZIP | 223KB)
- http://f.lui.li/get_1065_f4ab.html
- ---------------------------------------
- ¤ Decensoring SCS Locations ::
- http://cryptome.org/2013/12/decensoring-scs-slides.htm
- The NSA spies under diplomatic cover.
- _______________________________________
- ¤ Five Eyes ::
- http://cryptome.org/2013/12/nsa-5-eyes-partners.pdf
- _______________________________________
- ¤ A Conspiracy So Vast ::
- http://www.lewrockwell.com/2013/12/andrew-p-napolitano/a-conspiracy-so-vast%E2%80%A8/
- _______________________________________
- ¤ PayPal Corporation Said To Be Implicated
- in Withheld NSA Documents ::
- http://www.youtube.com/watch?v=tTivPZZorWY
- http://www.boilingfrogspost.com/2013/12/11/bfp-breaking-news-omidyars-paypal-corporation-said-to-be-implicated-in-withheld-nsa-documents/
- _______________________________________
- ¤ NSA GCHQ Spies on Video Game Geeks ::
- Say hello to undercover NSA orcs.
- http://cryptome.org/2013/12/nsa-gchq-spy-games.pdf
- http://cryptome.org/2013/12/nsa-spy-games.pdf
- http://arstechnica.com/tech-policy/2013/12/world-of-spycraft-nsa-gchq-hacked-wow-and-xbox-live-other-games/
- http://www.theguardian.com/world/2013/dec/09/nsa-spies-online-games-world-warcraft-second-life
- http://www.breitbart.com/Big-Government/2013/12/09/Report--NSA-spying-on-virtual-worlds--online-games
- http://www.businessinsider.com/spy-agencies-infiltrated-video-games-nsa-gchq-world-of-warcraft-2013-12
- _______________________________________
- ¤ Rollingstone Describes NSA’s Influx of Money ::
- September 11th, which also happened to
- be Drake’s first day at Fort Meade, changed
- the equation. Drake explains the shift in
- two ways: The first was a massive expansion
- of US spying capabilities as the agency
- “unchained itself from the Constitution,”
- and began to spy on Americans and foreign
- citizens, at home and abroad. The other
- change, felt across the entire intelligence
- community, was a rapid expansion of the NSA
- itself.
- “Massive amounts of money were pumped
- into the NSA after 9/11, and Congress was
- saying, ‘How big do you want the check?’”
- says Drake. With virtually every agency
- involved in tracking terrorists clamoring
- for its SIGINT, or signals intelligence,
- the NSA expanded its outposts in Texas,
- Georgia, Hawaii, Colorado and Utah, as
- well as listening posts abroad, and also
- went on a building spree at Fort Meade,
- where the NSA’s sprawling 5,000-acre
- campus is now almost 10 times the size
- of the Pentagon. By 2013, according to
- The Washington Post, the NSA had expanded
- its workforce by one-third, to about
- 33,000. The number of private companies
- it depended upon more than tripled during
- that time.
- Soon, thanks to this influx of money
- and the increasing reliance on the private
- sector to handle even sensitive jobs,
- the very heart of America’s intelligence
- infrastructure was being outsourced to
- contractors. “Essentially, 9/11 was a
- massive jobs program, in which the ticket
- you needed for the party was your clearance,”
- says Drake. “And tons of people were
- getting those clearances. So you had
- this huge apparatus being built, and
- the government was just managing it.
- And in some cases, they weren’t even
- doing that.” ... ...
- By the time Snowden joined the agency’s
- workforce, the surveillance he would
- later expose was becoming not just
- institutionalized but very big business.
- “It was around 2009, 2010 that you saw
- the full flower of that massive, massive
- bubble of money,” says Drake. “And people
- were taking it for a ride as far as it
- could go.” ... ...
- Prior to 2009, Snowden had considered
- leaking government secrets when he was
- at the CIA, but held off, he later said,
- not wanting to harm agents in the field,
- and hoping that Obama would reform the
- system. His optimism didn’t last long.
- “I watched as Obama advanced the very
- policies that I thought would be reined
- in,” he later said. As a result, he added,
- “I got hardened.” The more Snowden saw of
- the NSA’s actual business – and, particularly,
- the more he read “true information,”
- including a 2009 Inspector General’s report
- detailing the Bush era’s warrantless-
- surveillance program – the more he realized
- that there were actually two governments:
- the one that was elected, and the other,
- secret regime, governing in the dark.
- “If the highest officials in government
- can break the law without fearing punishment
- or even any repercussions at all, secret
- powers become tremendously dangerous.”
- http://www.rollingstone.com/politics/news/snowden-and-greenwald-the-men-who-leaked-the-secrets-20131204
- _______________________________________
- ¤ Rajiv Pant Describes Snowden Files Transfer ::
- http://cryptome.org/2013/12/nyt-snowden-transfer.htm
- _______________________________________
- ¤ Is British Intelligence in Damage Control? ::
- http://www.globalresearch.ca/british-intelligence-operation-to-kidnap-snowden-number-one-mi-6-officer-working-undercover-in-moscow-embassy/5358555
- _______________________________________
- ¤ Snowden Leaks “Greatest Intelligence
- Failure Since World War 2” Exaggerated ::
- The Director of NSA claims Snowden stole
- 200,000 documents. Allegations in Australian
- press claim he stole “up to 20,000.” British
- authorities accuse Snowden of stealing 58,000.
- Claims are bruited in the 5 Eyes that this
- is the “greatest intelligence failure since
- World War 2.” High officials and ex-spies
- accuse Snowden and related media of engaging
- in terrorism.
- This suggests a counter-espionage campaign
- to exaggerate Snowden’s damage, of betrayal
- to his country, of aiding the enemy, of
- threatening national security. It is
- successfully restricting release of the
- Snowden material and will likely become
- more forceful as releases continue to the
- extent of legislation (open or secret)
- to criminalize release as a national
- security threat.
- http://cryptome.org/2013/12/snowden-civil-war.htm
- _______________________________________
- ¤ KILLCEN ; Eyeballing_Snowden_Info.7z ::
- Includes most reports, slides and
- documents all related to the recent
- Snowden leaks so far up to December
- 4th of 2013. I’m still collecting
- any information that comes out and
- will provide updated archives from
- time to time. Grab this while you can.
- After decompression - the folder is
- titled “Eyeballing_Snowden_Info” and
- holds a total of 371MB decompressed.
- Eyeballing_Snowden_Info.7z
- (783 files | 7zip | 286MB)
- http://fileb.ag/iv8x797lqzdw
- http://uploadhero.co/dl/aBBhCePf
- http://bitshare.com/files/fuxhd3ry/Eyeballing_Snowden_Info.7z.html
- http://www.upload-box.com/index.php/files/get/0VPCtiKFxf/eyeballing-snowden-info.7z
- http://f.ishoo.ru/files/get/3GfGXXqGSH/eyeballing-snowden-info.7z
- http://davvas.com/frrbbi2975xe
- http://BillionUploads.com/hpww20r554x4
- http://bayfiles.net/file/119rR/Y6ax0Z/Eyeballing_Snowden_Info.7z
- _______________________________________
- ¤ indonesia-spying-slides.zip (mirrored) ::
- http://up.sef.ps/xu/files/get/Aen2UBNeep/indonesia-spying-slides.zip
- http://document-space.com/index.php/files/get/yWGp5DplsK/indonesia-spying-slides.zip
- http://www.quickupdown.com/files/get/BEqtDnYz8M/indonesia-spying-slides.zip
- ¤ Australian Intelligence Agency (ASD)
- Swaps Bulk Metadata With the NSA ::
- Australia’s intelligence apparatus mines
- the telecommunications data of ordinary
- Australians, and hands over the material
- to the US and its closest allies, according
- to the latest leaked document from Edward
- Snowden, partly published by the Guardian
- Australia web site.
- The document obtained by the former US
- National Security Agency (NSA) contractor
- confirms that the electronic surveillance
- agency, the Australian Signals Directorate
- (ASD), monitors the domestic population,
- as well as the people and governments of
- many Asian countries.
- Despite Australian legislation supposedly
- restricting the ASD’s internal spying,
- the agency hands over to the NSA and its
- global partners so-called metadata of
- the phone calls, texts, emails, on-line
- address books and social media posts of
- millions of people.
- This exposure of mass surveillance follows
- the recent revelations, also from documents
- leaked by Snowden, that the ASD, then known
- as the Defence Signals Directorate (DSD),
- tapped the phone calls of Indonesian
- prez Susilo Bambang Yudhoyono, and that
- Australian embassies throughout Asia
- operate as electronic listening posts
- for the US-led spying network.
- http://www.abc.net.au/news/2013-11-18/australia-spied-on-indonesian-president-leaked-docu
- http://www.abc.net.au/news/2013-11-18/canberra-jakarta-and-the-digital-great-game/5100502
- http://www.theguardian.com/world/2013/nov/18/australia-tried-to-monitor-indonesian-presidents-phone
- http://www.wsws.org/en/articles/2013/12/03/data-d03.html
- http://www.scmp.com/news/asia/article/1359356/indonesian-ambassador-australia-recalled-over-spying-claims
- http://www.voanews.com/content/indonesia-to-review-cooperation-with-australia-due-to-spying-claims/1792523.html
- ¤ Australian Media Denounces Exposure of
- Indonesia Spying Operations ::
- The Australian Broadcasting Corporation’s
- (ABC) recent joint reporting of Australian
- espionage operations targeting Indonesian
- political figures has been furiously
- denounced by other media outlets for
- breaching “national security” and the
- “national interest.” The reaction
- underscores the extent to which the
- media establishment has been integrated
- into the state-intelligence apparatus.
- On November 18, after being approached
- by the Guardian with documents leaked
- by former National Security Agency (NSA)
- contractor Edward Snowden, the ABC
- co-released the story, revealing Australian
- phone tapping of Indonesian Prez Susilo
- Bambang Yudhoyono, his wife and eight
- senior political figures. The report
- triggered a still-unresolved diplomatic
- crisis for the Australian government, with
- the Indonesian president suspending military
- and intelligence cooperation.
- http://www.wsws.org/en/articles/2013/12/03/medi-d03.html
- _______________________________________
- ¤ NSA G8 - G20 Summit SIGINT Directive ::
- Top secret documents retrieved by US
- whistleblower Edward Snowden show that
- Prime Minister Stephen Harper’s dictatorship
- allowed the largest American spy agency
- to conduct widespread surveillance in
- Canada during the 2010 G8 and G20 summits.
- The documents are being reported exclusively
- by CBC News.
- The briefing notes, stamped “Top Secret,”
- show the US turned its Ottawa embassy into
- a security command post during a six-day
- spying operation by the National Security
- Agency while US Prez Barack Obama and 25
- other foreign heads of government were on
- Canadian soil in June of 2010.
- The covert US operation was no secret to
- Canadian authorities. ... ...
- The world was still struggling to climb
- out of the great recession of 2008. Leaders
- were debating a wide array of possible
- measures including a global tax on banks,
- an idea strongly opposed by both the US
- and Canadian governments. That notion was
- eventually scotched.
- http://cryptome.org/2013/12/nsa-g8-g20-spying.pdf
- http://www.cbc.ca/news/politics/read-snowden-nsa-document-on-g8-g20-summit-surveillance-1.2447387
- http://www.cbc.ca/news/politics/new-snowden-docs-show-u-s-spied-during-g20-in-toronto-1.2442448
- http://www.wsws.org/en/articles/2013/12/03/cana-d03.html
- https://www.wsws.org/en/articles/2013/12/14/cses-d14.html
- ¤ Canada’s CSEC Slides Expose Espionage
- Against Brazilian Ministry ::
- http://cryptome.org/2013/10/cse-br/cse-br.htm
- UPDATE ; 18 CSEC slides posted on PDF @
- cryptome.org, November 30, 2013.
- http://cryptome.org/2013/11/csec-br-spy.pdf
- ¤ Interpreting the CSEC Presentation ::
- http://theoreti.ca/?p=5057
- ¤ Ministério de Minas e Energia está na
- mira de espiões americanos e canadenses ::
- http://m.g1.globo.com/fantastico/noticia/2013/10/ministerio-das-minas-e-energia-esta-na-mira-de-espioes-americanos-e-canadenses.html
- TRANSLATED @ slexy.org
- http://slexy.org/view/s2tDGSktog
- ¤ American and Canadian Spies Target Brazilian
- Energy and Mining Ministry (English) ::
- http://g1.globo.com/fantastico/noticia/2013/10/american-and-canadian-spies-target-brazilian-energy-and-mining-ministry.html
- ¤ Canada’s CSEC Provides Data to NSA ::
- The politicians and corporate media would have Canadians
- believe that they have only “moved on” from discussing
- CSEC’s activities because there is nothing for Canadians
- to worry about.
- In reality, the CSEC is a vital tool of the Canadian ruling
- class that plays an important role in the pursuit of its
- imperialist foreign policy and in the surveillance and
- suppression of opposition at home. The size of CSEC’s
- staff—it employs almost 2,000 people and a further thousand
- military personnel assist its work—give an inkling of the
- scale of its activities.
- These include everything from supporting the overseas
- operations of the Canadian military, to spying on governments
- that are reputed allies of Canada and assisting CSIS and the
- RCMP in conducting a vast program of domestic surveillance.
- Of especial importance is the CSEC’s partnership with the NSA.
- According to former NSA technical director William Binney,
- the two organizations “have integrated personnel” i.e. swap
- personnel to improve seamless collaboration. They also share
- Internet surveillance programs.
- As a further element of its collaboration with the Five Eyes
- alliance, CSEC was relied on in the project of spying on
- diplomats and officials during the 2009 London G20 meeting
- according to a report in the British newspaper The Guardian,
- which was based on documents supplied by Snowden. The highly
- sensitive operation involved the penetration of delegates’
- smartphones to monitor their email messages and calls.
- http://www.wsws.org/en/articles/2013/09/28/csec-s28.html
- http://www.scribd.com/doc/188094600/CSEC-Presentation
- ¤ NSA CSEC Partnership ::
- http://cryptome.org/2013/12/nsa-csec-partners.pdf
- _______________________________________
- ¤ EU Nations Address Mass Spying ::
- http://cryptome.org/2013/11/eu-mass-spying.pdf
- ¤ EU Hearings On NSA ::
- http://www.europarl.europa.eu/committees/en/libe/events.html?id=hearings
- http://euobserver.com/justice/121979
- http://blog.cyberwar.nl/2013/11/viviane-reding-nsa-needs-counterweight.html
- ¤ EU/US Data Protection Hoot ::
- http://cryptome.org/2013/11/eu-us-data-protect-13-1127.pdf
- ¤ EU to Run Yet Another Ineffectual Probe ::
- http://www.theguardian.com/world/2013/dec/02/edward-snowden-un-investigation-surveillance
- _______________________________________
- Draft state-level legislation called the
- Fourth Amendment Protection Act would –
- in theory – forbid local governments from
- providing services to federal agencies
- that collect electronic data from Americans
- without a personalized warrant.
- No Utah lawmaker has came forward to
- introduce the suggested legislation yet,
- but at least one legislator has committed
- to doing so, according to Mike Maharrey
- of the Tenth Amendment Center. He declined
- to identify the lawmaker before the bill
- is introduced.
- “We are still very early in the campaign,
- and this is in fact a multi-step, multi-year
- long-term strategy,” says Maharrey, whose
- group is part of the OffNow coalition along
- with the Bill of Rights Defense Committee
- and a handful of other groups.
- The campaign is looking beyond Utah,
- Maharrey adds.
- http://www.usnews.com/news/articles/2013/12/03/some-nsa-opponents-want-to-nullify-surveillance-with-state-law
- _______________________________________
- ¤ Guardian’s Reporters Face Threats and
- Intimidation From British Dictatorship ::
- In the months since, the Guardian has
- continued to make officials here exceedingly
- nervous by exposing the joint operations of
- US and British intelligence — particularly
- their cooperation in data collection and
- snooping programs involving British citizens
- and close allies on the European continent.
- In response, the Guardian is being called
- to account by British authorities for
- jeopardizing national security. The
- Guardian’s top editor, Alan Rusbridger,
- is being forced to appear before a
- parliamentary committee Tuesday to explain
- the news outlet’s actions.
- http://www.washingtonpost.com/world/europe/britain-targets-guardian-newspaper-over-intelligence-leaks-related-to-edward-snowden/2013/11/29/1ec3d9c0-581e-11e3-bdbf-097ab2a3dc2b_story.html
- http://www.infowars.com/uk-police-threaten-guardian-editor-with-terrorism-charges-over-snowden-leaks/
- http://www.wsws.org/en/articles/2013/10/18/guar-o18.html
- ¤ Alan Rusbridger Interviewed ::
- http://www.washingtonpost.com/world/q-and-a-with-alan-rusbridger-editor-of-the-guardian/2013/11/29/11b36798-5821-11e3-bdbf-097ab2a3dc2b_story.html
- ¤ US Dictatorship Fuels the Same Threats
- as the British Dictatorship ::
- Glenn Greenwald, the Guardian reporter who
- published Edward Snowden’s leaks, was
- recently suggested to be a criminal for
- shining light on the NSA’s abuse of power.
- This is a key identifiable step when societies
- close down; it is a point of no return. It
- seems the United States is reaching the event
- horizon to a police state.
- http://falkvinge.net/2013/06/30/with-journalism-persecuted-the-united-states-is-now-at-event-horizon-to-a-police-state/
- Cryptome noted
- “There have been no reports of leakage
- from the insurance stashes, the publication
- outlets or the various reported transmissions
- among them (except for the Miranda snatch by
- UKG), although there could be some which have
- not been disclosed, not known, were sold or
- bartered, or were stolen for future use.
- It is likely that intelligence and law
- enforcement agencies have made stringent
- efforts to access the documents by customarily
- secret burglary, bribery, barter, purchase,
- deception, co-optation.
- Those multiple persons and outlets who have
- had access, or suspected of access, are
- certain to have been targeted, some perhaps
- successfully persuaded to cooperate with
- promises of confidentiality, backed by
- threats if cooperation is refused -- a
- standard coercive means of authorities.
- While Edward Snowden is knowledgeable
- about counter-espionage and likely advised
- his initial correspondents, who in turn
- advised successive cooperators, usually
- these counter-operations are not revealed,
- but hints of them are leaked to discourage
- participation.
- Beyond that, it is customary to foment
- disputes and disagreements among competing
- publications, reporters, opinionators,
- experts, the spying industry and consumers,
- along with threats against families, friends
- and employers, as now occurring, to rattle
- and pressure targets to consider cooperating
- with authorities, including use of rewards
- -- monetary and career -- for informants.”
- http://cryptome.org/2013/11/snowden-related-targets.htm
- _______________________________________
- ¤ NSA Describes Dutch SIGINT Spying ::
- http://cryptome.org/2013/11/nsa-dutch-sigint.pdf
- _______________________________________
- ¤ Mass Surveillance Is Big Business ;
- Corporations Are as Good at Spying as
- Governments ::
- http://motherboard.vice.com/blog/mass-surveillance-is-big-business-corporations-are-as-good-at-spying-as-governments
- _______________________________________
- ¤ NSA Spies on Pornography Viewing to
- Discredit Targeted Enemies ::
- http://cryptome.org/2013/11/nsa-muslim-porn.pdf
- http://www.techdirt.com/articles/20131127/00243625384/nsa-spied-porn-habits-radicalizers-planned-to-use-details-to-embarrass-them.shtml
- http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html
- http://www.dailykos.com/story/2013/11/26/1258660/-NSA-spied-on-radicalizers-to-discredit-them
- _______________________________________
- ¤ NSA WINDSTOP, MUSCULAR, INCENSER Slides ::
- http://cryptome.org/2013/10/nsa-windstop-muscular-incenser.pdf
- ¤ What Else Do We Know About MUSCULAR? ::
- http://cryptome.org/2013/10/nsa-muscular.htm
- ¤ NSA WINDSTOP Month of Mass Spying ::
- http://cryptome.org/2013/11/nsa-windstop.pdf
- ¤ NSA Collection Optimization Overview ::
- http://cryptome.org/2013/10/nsa-sso-overview.pdf
- ¤ NSA Content Acquisition Optimization ::
- http://cryptome.org/2013/10/nsa-sso-content.pdf
- ¤ NSA Collection Optimization Slides ::
- http://cryptome.org/2013/10/nsa-sso-slides.pdf
- ¤ NSA SSO Cryptologic Provider ::
- http://cryptome.org/2013/11/nsa-sso-crypto.pdf
- ¤ NSA SSO Yahoo, Google Exploitation ::
- http://cryptome.org/2013/11/nsa-sso-yahoo-google.pdf
- ¤ NSA and GCHQ Breaks 3rd Party SSL to
- Steal Email Metadata ::
- Even though they cooperate with the US
- spy agency on court-ordered surveillance,
- firms like Google and Yahoo are subject to
- additional surveillance they never agreed to.
- Web companies host copies of your data on
- servers around the world, reducing the
- chance of losing your information should
- one fail. When you log in to an account
- with these firms, the data sent between
- you and their servers is encrypted, making
- it difficult to snoop – but the internal
- transfers between data centres are unencrypted.
- And because many of the transfers take place
- outside the US, approval from a FISA court
- isn’t required to tap the information.
- The National Security Agency has secretly
- broken into the main communications links
- that connect Yahoo and Google data centers
- around the world, according to documents
- obtained from former NSA contractor Edward
- Snowden and interviews with knowledgeable
- officials.
- By tapping those links, the agency has
- positioned itself to collect at will from
- hundreds of millions of user accounts,
- many of them belonging to Americans. The
- NSA does not keep everything it collects,
- but it keeps a lot.
- The NSA’s principal tool to exploit the
- data links is a project called MUSCULAR,
- operated jointly with the agency’s British
- counterpart, the Government Communications
- Headquarters. From undisclosed interception
- points, the NSA and the GCHQ are copying
- entire data flows across fiber-optic cables
- that carry information among the data
- centers of the Silicon Valley giants.
- http://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html
- http://articles.economictimes.indiatimes.com/2013-10-31/news/43528723_1_data-centers-google-claire-cain-miller
- http://www.newscientist.com/article/dn24519-nsa-snoops-tech-companies-fibreoptic-networks.html
- http://www.theguardian.com/technology/2013/nov/04/eric-schmidt-nsa-spying-data-centres-outrageous
- http://article.wn.com/view/2013/10/30/NSA_Broke_Into_Yahoo_Google_Data_Centers_Report/
- ¤ NSA Collects Bulk Email Address Books ::
- In June, President Obama said the NSA’s
- email collecting program “does not apply
- to US citizens.”
- The National Security Agency is harvesting
- hundreds of millions of contact lists from
- personal e-mail and instant messaging
- accounts around the world, many of them
- belonging to Americans, according to
- senior intelligence officials and top-secret
- documents provided by former NSA contractor
- Edward Snowden.
- The collection program, which has not
- been disclosed before, intercepts e-mail
- address books and “buddy lists” from
- instant messaging services as they move
- across global data links. Online services
- often transmit those contacts when a user
- logs on, composes a message, or synchronizes
- a computer or mobile device with information
- stored on remote servers.
- http://www.washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html
- http://www.theblaze.com/stories/2013/10/14/report-nsa-collects-millions-of-contact-lists-from-personal-email-and-instant-messaging-accounts-globally/
- http://www.theatlanticwire.com/technology/2013/10/nsa-collects-email-address-books-contact-lists/70535/
- ¤ Special Collection Services Wikis ::
- http://cryptome.org/2013/11/scs-fr-us.pdf
- ¤ NSA Exploits Microsoft Vulnerabilities ::
- http://cryptome.org/2013/11/nsa-microsoft.pdf
- http://s3.documentcloud.org/documents/841655/microsoft-realms-redacted.pdf
- http://cryptome.org/2013/11/nsa-microsoft-cloud-exploit.pdf
- http://s3.documentcloud.org/documents/841654/microsoft-in-cloud-exploitation-redacted.pdf
- http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA’s Boundless Informant ::
- http://cryptome.org/2013/10/nsa-boundless-informant.pdf
- ¤ NSA’s Boundless Informant Collected
- 124+ Billion Phone Calls in One Month ::
- http://cryptome.org/2013/10/nsa-125b-calls.htm
- ¤ NSA’s Boundless Informant Metadata ::
- http://electrospaces.blogspot.com/2013/10/boundlessinformant-only-shows-metadata.html
- ¤ Guardian’s Boundless Informant Report ::
- http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining
- ¤ Le Monde’s Boundless Informant Report ::
- http://www.lemonde.fr/technologies/article/2013/10/21/france-in-the-nsa-s-crosshair-phone-networks-under-surveillance_3499741_651865.html
- ¤ Three Boundless Informant “Heatmaps” ::
- http://cryptome.org/2013/10/nsa-boundless-informant-images.htm
- ¤ NSA Boundless Informant Spied Norway ::
- http://cryptome.org/2013/11/nsa-boundlessinformant-no-33m.pdf
- ¤ US Says France, Spain Aided NSA Spying ::
- http://cryptome.org/2013/10/nsa-us-france-spain.htm
- ---------------------------------------
- NOBODY comments ▼
- Le Monde’s Boundless Informant document
- differs from the Guardians.
- Le Monde’s Boundless Informant Graph ...
- http://s3.documentcloud.org/documents/807033/boundless-monde.pdf
- Guardians’ Boundless Informant Graph ...
- http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2013/6/8/1370716131074/boundless-heatmap-008.jpg
- Le Monde shows 3,095,533,478 intercepts
- in the US compared to the Guardian showing
- 2,392,343,446 US intercepts.
- Le Monde’s Boundless Informant graph
- shows the “aggregate” estimate, both
- digital networks (DNI) and telephony (DNR)
- interception ; while the Guardian’s graph
- only shows the digital “DNI” estimate.
- ---------------------------------------
- ¤ DRTBOX and the DRT Surveillance Systems ::
- http://electrospaces.blogspot.com/2013/11/drtbox-and-drt-surveillance-systems.html
- ¤ BOUNDLESS INFORMANT Explicated ::
- This was written from a person who purports
- to actually use the Boundless Informant tool.
- http://cryptome.org/2013/11/nsa-boundless-informant-explicated.htm
- ¤ RE-BOUNDLESS INFORMANT Explicated ::
- http://cryptome.org/2013/11/nsa-boundless-informant-gm-place.htm
- ¤ BOUNDLESS INFORMANT Screenshots Can Be
- Misleading ::
- http://electrospaces.blogspot.com/2013/11/screenshots-from-boundlessinformant-can.html
- ¤ DNI Masterspy Says Le Monde Misleads
- on NSA Spying ::
- http://cryptome.org/2013/10/dni-13-1022.pdf
- “Recent articles published in the
- French newspaper Le Monde contain
- inaccurate and misleading information
- regarding US foreign intelligence
- activities. The allegation that the
- National Security Agency collected more
- than 70 million “recordings of French
- citizens’ telephone data” is false.
- While we are not going to discuss the
- details of our activities, we have
- repeatedly made it clear that the
- United States gathers intelligence of
- the type gathered by all nations. The
- US collects intelligence to protect the
- nation, its interests, and its allies
- from, among other things, threats such
- as terrorism and the proliferation of
- weapons of mass destruction.
- The United States values our longstanding
- friendship and alliance with France and
- we will continue to cooperate on security
- and intelligence matters going forward.”
- James R. Clapper
- Director of National Intelligence
- ---------------------------------------
- ¤ Snowden Responds to Feinstein’s Stupidity ::
- http://thehill.com/blogs/hillicon-valley/technology/330497-snowden-fires-back-at-feinstein-over-surveillance-claim
- “Today, no telephone in America makes
- a call without leaving a record with the
- NSA. Today, no Internet transaction enters
- or leaves America without passing through
- the NSA’s hands,” Snowden said in a
- statement Thursday.
- “Our representatives in Congress tell us
- this is not surveillance. They’re wrong.”
- _______________________________________
- ¤ US and UK Governments Still Worry Over
- Cache of Encrypted Documents by Snowden ::
- US and British intelligence officials
- say they are concerned about a “doomsday”
- collection of highly classified, heavily
- encrypted materials they believe former
- National Security Agency contractor
- Edward Snowden may have stored away.
- One source saw the cache of documents
- as an “insurance policy” for Snowden
- should he feel threatened by arrest or
- other harm. ... ...
- Adding merit to the suspicion that the
- well-secured cache may be an insurance
- policy of sorts, Greenwald said in June
- that “if anything happens at all to
- Edward Snowden, he has arranged for them
- to get access to the full archives.”
- http://www.infowars.com/us-uk-officials-worry-snowden-still-has-doomsday-collection-of-classified-material/
- _______________________________________
- ¤ (Go Figure) Obama’s “Overhaul” of Spy
- Programs Cloaked in More Secrecy ::
- Obama has been gradually tweaking vast
- government surveillance policies. But he
- is not disclosing those changes to the
- public. Has he stopped spying on friendly
- world leaders? He won’t say. Has he stopped
- eavesdropping on the United Nations, the
- World Bank and the International Monetary
- Fund? He won’t say.
- Even the report by the group Obama created
- to review and recommend changes to his
- surveillance programs has been kept secret.
- http://www.mcclatchydc.com/2013/11/25/209465/obamas-overhaul-of-spy-programs.html
- _______________________________________
- ¤ NSA Report Outlined Goals for More Power ::
- Officials at the National Security Agency,
- intent on maintaining its dominance in
- intelligence collection, pledged last year
- to push to expand its surveillance powers,
- according to a top-secret strategy document.
- Written as an agency mission statement with
- broad goals, the five-page document said
- that existing American laws were not adequate
- to meet the needs of the NSA to conduct broad
- surveillance in what it cited as “the golden
- age of Sigint,” or signals intelligence.
- “The interpretation and guidelines for
- applying our authorities, and in some cases
- the authorities themselves, have not kept
- pace with the complexity of the technology
- and target environments, or the operational
- expectations levied on NSA’s mission,” the
- document concluded.
- http://cryptome.org/2013/11/nsa-sigint-strategy-2012-2016.pdf
- http://cryptome.org/2013/11/nsa-power-goals.htm
- http://www.nytimes.com/2013/11/23/us/politics/nsa-report-outlined-goals-for-more-power.html
- http://rt.com/usa/snowden-leak-expand-surveillance-goal-185/
- http://www.dailydot.com/politics/snowden-leak-nsa-power/
- ¤ NSA TreasureMap Description ::
- The NY Times today cites an NSA tool
- called Treasure Map and describes its
- capabilities but does not publish visual
- examples. Also cited is Packaged Goods,
- an associated tool. If publicly available,
- Cryptome asked for pointers to the two.
- http://cryptome.org/2013/11/nsa-treasuremap.htm
- _______________________________________
- ¤ Documents Show Tony Blair Let US Spy Britons ::
- http://www.channel4.com/news/nsa-edward-snowden-america-britain-tony-blair
- _______________________________________
- ¤ GCHQ ROYAL CONCIERGE Diplomatic Hotel Spy ::
- http://cryptome.org/2013/11/gchq-royal-concierge-de.pdf
- http://cryptome.org/2013/11/gchq-royal-concierge.jpg
- ¤ GCHQ Monitors Diplomats Hotel Bookings ::
- Britain’s GCHQ intelligence service monitors
- diplomats’ travels using a sophisticated
- automated system that tracks hotel bookings.
- Once a room has been identified, it opens
- the door to a variety of spying options.
- http://www.spiegel.de/international/europe/gchq-monitors-hotel-reservations-to-track-diplomats-a-933914.html
- _______________________________________
- ¤ Supreme Court Blocks Challenge to Spying ::
- “We ask the NSA to immediately suspend
- collection of solely domestic communications
- pending the competition of a public rulemaking
- as required by law. We intend to renew our
- request each week until we receive your
- response,” EPIC said.
- Five months later, though, the Supreme Court
- said this week that it would not be hearing
- EPIC’s plea. A document began circulating
- early Monday in which the high court listed
- the petition filed by the privacy advocates
- as denied.
- http://rt.com/usa/supreme-court-nsa-spying-906/
- http://www.infowars.com/supreme-court-blocks-challenge-to-nsa-phone-tracking/
- _______________________________________
- ¤ NSA Deputy Director John Inglis Speaks ::
- http://www.youtube.com/watch?v=6ydkw4xgZ-Y
- ¤ Intelligence Community Lawyers Argue
- Over Metadata Hoarding ::
- http://www.techdirt.com/articles/20131105/08030825135/dni-lawyer-argues-that-curbing-metadata-collections-will-damage-americans-privacy.shtml
- http://www.dailybinarynews.com/intelligence-community-lawyers-argue-that-curbing-metadata-collections-will/
- ¤ Bill Clinton Warns We Have No Security,
- No Privacy ::
- http://www.infowars.com/bill-clinton-on-nsa-spying-we-are-on-the-verge-of-having-the-worst-of-all-worlds-well-have-no-security-and-no-privacy/
- ¤ Obama Regime Pledges to Continue Illegal
- Spying Programs ::
- http://www.wsws.org/en/articles/2013/11/06/spyi-n06.html
- ¤ John McCain Interview by Der Spiegel ::
- http://cryptome.org/2013/11/mccain-nsa-affair.pdf
- http://www.spiegel.de/international/world/interview-with-john-mccain-on-nsa-spying-on-angela-merkel-a-932721.html
- _______________________________________
- ¤ NSA & GCHQ “Bullrun” Decryption Brief ::
- http://cryptome.org/2013/09/nsa-bullrun-brief-propublica-13-0905.pdf
- http://s3.documentcloud.org/documents/784284/bullrun-briefing-sheet-from-gchq.pdf
- ¤ NSA & GCHQ “Bullrun” Decryption Guide ::
- http://cryptome.org/2013/09/nsa-bullrun-2-16-guardian-13-0905.pdf
- http://s3.documentcloud.org/documents/784047/bullrun-guide-final.pdf
- ¤ NSA ; Cryptanalysis & Exploitation ::
- “TOP SECRET//COMINT at a minimum”
- “(TS//SI) The fact that NSA/CSS makes
- cryptographic modifications to commercial
- or indigenous cryptographic information
- security devices or systems in order to
- make them exploitable.”
- “TOP SECRET//COMINT at a minimum”
- “(U//FOUO) The fact that NSA/CSS
- successfully exploits cryptographic
- components of commercial information
- security devices or systems when the
- device or system specified.”
- http://cryptome.org/2013/09/nsa-cryptanalysis-2-12-guardian-13-0905.pdf
- http://s3.documentcloud.org/documents/784048/crypt-guide2.pdf
- ¤ NSA & GCHQ Breaks Other SIGINT Crypto ::
- http://cryptome.org/2013/09/nsa-sigint-enabling-guardian-13-0905.pdf
- http://cryptome.org/2013/09/nsa-sigint-enabling-propublica-13-0905.pdf
- http://cryptome.org/2013/09/nsa-sigint-enabling-redacts.jpg
- ¤ NSA and GCHQ Defeats Encryption ::
- US and British intelligence agencies
- have successfully cracked much of the
- online encryption relied upon by hundreds
- of millions of people to protect the
- privacy of their personal data, online
- transactions and emails, according to
- top-secret documents revealed by former
- contractor Edward Snowden. ...
- Those methods include covert measures
- to ensure NSA control over setting of
- international encryption standards, the
- use of supercomputers to break encryption
- with “brute force”, and – the most closely
- guarded secret of all – collaboration with
- technology companies and internet service
- providers themselves.
- Through these covert partnerships, the
- agencies have inserted secret vulnerabilities
- – known as backdoors or trapdoors – into
- commercial encryption software. ... ...
- Independent security experts have long
- suspected that the NSA has been introducing
- weaknesses into security standards, a fact
- confirmed for the first time by another
- secret document. It shows the agency
- worked covertly to get its own version
- of a draft security standard issued by
- the US National Institute of Standards
- and Technology approved for worldwide
- use in 2006.
- http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
- ¤ Full Guardian Report Mirrored ::
- http://cryptome.org/2013/09/nsa-decrypt-guardian-13-0905.pdf
- ¤ Full New York Times Report Mirrored ::
- http://cryptome.org/2013/09/nsa-decrypt-nyt-13-0905.pdf
- ¤ Full ProPublica Report Mirrored ::
- http://cryptome.org/2013/09/nsa-decrypt-propublica-13-0905.pdf
- ¤ Bruce Schneier - NSA Cracks Crypto ::
- http://cryptome.org/2013/09/nsa-decrypt-schneier-13-0905-01.pdf
- http://cryptome.org/2013/09/nsa-decrypt-schneier-13-0905-02.pdf
- http://cryptome.org/2013/09/nsa-decrypt-schneier-13-0905-03.pdf
- ¤ Matthew Green - NSA Cracks Crypto ::
- http://cryptome.org/2013/09/nsa-decrypt-matthew-green-13-0905.pdf
- http://cryptome.org/2013/09/nsa-decrypt-matthew-green-13-0910.pdf
- ¤ DNI Response to NSA Cracks Crypto ::
- http://cryptome.org/2013/09/nsa-decrypt-masterspy-13-0906.htm
- ¤ Cryptography List Members Face Ulcers ::
- http://cryptome.org/2013/09/nsa-decrypt-cryptography-13-0905.htm
- ¤ Documents Confirm “Back Doors” Inserted
- Into Web and Software to Exploit Crypto ::
- http://rt.com/usa/nsa-gchq-encryption-snowden-478/
- http://www.infowars.com/documents-confirm-nsa-inserts-back-doors-into-web-software/
- A range of US hardware and software
- companies are in danger of being dragged
- into the widening scandal over internet
- surveillance, following the latest leaks
- from Edward Snowden, the former National
- Security Agency contractor.
- The leaked documents include NSA claims
- that it has collaborated with technology
- companies to plant “back doors” into
- their systems – or ways for the agency
- secretly to penetrate systems without
- the users’ knowledge.
- http://www.ft.com/cms/s/0/0054adb2-1709-11e3-9ec2-00144feabdc0.html
- ¤ You Are the Enemy of the Police State ::
- http://anewdomain.net/2013/09/06/john-c-dvorak-nsa-spying-americans-now-enemy/
- _______________________________________
- ¤ SSL Inspector ::
- http://www.wikileaks.org/spyfiles/docs/NETRONOME-2011-SSLInsp-en.pdf
- ¤ Examining SSL-Encrypted Communications ::
- http://www.wikileaks.org/spyfiles/docs/METRONOME-2011-ExamSSL-Comm-en.pdf
- _______________________________________
- ¤ Bobby R. Inman Suggests NSA Declassify
- All Suspected Leaks From Snowden ASAP ::
- http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html?_r=0
- ¤ Around 42 Years to Publish All Leaks ::
- http://cryptome.org/2013/11/snowden-tally.htm
- ¤ US SIGINT Strategic Mission 2007 ::
- http://cryptome.org/2013/11/nsa-sigint-strategic-mission-2007.pdf
- ¤ US SIGINT Strategic Mission 2013 ::
- http://cryptome.org/2013/11/nsa-sigint-strategic-mission-2013.pdf
- ¤ A Weeks Worth of Eavesdropping ::
- http://cryptome.org/2013/11/nsa-week-spy-2009.pdf
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ Greenwald’s Partner, David Miranda
- Accused of Terrorism in the UK ::
- http://www.reuters.com/article/2013/11/01/us-uk-nsa-idUSBRE9A013O20131101
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ Meet the Spies Doing the NSA’s Dirty Work ::
- The heart of the FBI’s signals intelligence
- activities is an obscure organization called
- the Data Intercept Technology Unit, or DITU
- (pronounced DEE-too). The handful of news
- articles that mentioned it prior to revelations
- of NSA surveillance this summer did so mostly
- in passing. It has barely been discussed in
- congressional testimony. An NSA PowerPoint
- presentation given to journalists by former
- NSA contractor Edward Snowden hints at DITU’s
- pivotal role in the NSA’s Prism system --
- it appears as a nondescript box on a flowchart
- showing how the NSA task[s] information to
- be collected, which is then gathered and
- delivered by the DITU.
- The DITU is located in a sprawling compound
- at Marine Corps Base Quantico in Virginia,
- home of the FBI’s training academy and the
- bureau’s Operational Technology Division,
- which runs all the FBI’s technical intelligence
- collection, processing, and reporting.
- http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work
- ¤ More PRISM Slides Published ::
- http://cryptome.org/2013/10/nsa-prism-13-1021.pdf
- https://s3.amazonaws.com/s3.documentcloud.org/documents/807036/prism-entier.pdf
- http://www.lemonde.fr/technologies/article/2013/10/21/espionnage-de-la-nsa-tous-les-documents-publies-par-le-monde_3499986_651865.html
- ¤ PRISM ; FAA Passive Spying ::
- http://cryptome.org/2013/10/nsa-wanadoo-alcatel.pdf
- http://s3.documentcloud.org/documents/807031/wanadoo-alcatel.pdf
- http://www.lemonde.fr/technologies/article/2013/10/21/espionnage-de-la-nsa-tous-les-documents-publies-par-le-monde_3499986_651865.html
- ¤ Compare PRISM Slide Publication ::
- http://cryptome.org/2013-info/10/le-monde-prism/le-monde-prism.htm
- ¤ NSA PRISM Slides From Guardian ::
- http://cryptome.org/2013/11/nsa-prism-guardian-13-1101.pdf
- ¤ Le Monde’s PRISM Report (TRANSLATED) ::
- http://www.lemonde.fr/technologies/article/2013/10/21/l-ampleur-de-l-espionnage-mondial-par-la-nsa_3499756_651865.html
- The magnitude of the global espionage
- by the NSA.
- During the summer, the documents provided to the Guardian
- and the Washington Post by former NSA employee Edward
- Snowden helped unveil the extent of surveillance and
- espionage carried out by the NSA and its allies. Le Monde
- also now has access to some of these documents.
- Before the summer, the NSA was the most secretive intelligence
- agencies of the United States. Then came Edward Snowden,
- who was granted an asylum for a year in Russia. Wanting to
- denounce "the largest program of arbitrary monitoring of human
- history," the American working for a subcontractor of the NSA
- has obtained several thousands of highly confidential documents.
- In early June, the first secrets of the National Security
- Agency in these parts start to filter. The Guardian reveals
- that the telephone operator Verizon provides NSA phone data
- of several million Americans, according to a court order secret.
- Then it was the turn of the Prism program to be unveiled. It
- allows the US Secret Service, and first and foremost to the
- NSA, to access a privileged manner, since December 2007,
- data from nine major Internet companies, including Google,
- Facebook and Microsoft.
- MONITORING OF SUBMARINE CABLE
- A document providing internal training on Prism, which Le
- Monde has also had access, how the NSA analysts can query
- the databases of Web giants, research documents, emails or
- instant discussions. All within a legal framework that
- overcomes the request of an individual mandate. The companies
- named in the documents have denied that the NSA had a direct
- and unilateral access to their servers.
- In addition to this targeted surveillance, Snowden records
- reveal another method of massive collection of the NSA called
- Upstream. This system can collect data from the submarine
- cable and Internet infrastructures. A logical strategy, when
- we know that 99% of global communications now pass through
- diving.
- To learn more about the context of the revelations of the
- World, the editorial read : "Fight Big Brother"
- The British equivalent of the NSA, the Government Communications
- Headquarters (GCHQ), plays a major role in this system, because
- of the historical proximity of Great Britain and the United States,
- confidentiality agreements and a financial dependence of those
- services from London to Washington. There are also technical
- reasons : a significant portion of submarine cables linking
- Europe to America through Britain. With Edward Snowden, the
- Tempora program , which aims to "control the Internet" by
- monitoring these cables, has been revealed. "You're in an
- enviable position, says a document presenting Tempora, presented
- by the Guardian, have fun and pull in the best." Turning a page
- of the document presenting the Prism program, we discover Upstream
- relies on four programs (Blarney, Fairview, and oakstar Stormbrew)
- which we know to date, the outline. Fairview, for example,
- would largely on intercepted telephone conversations via the
- major US carriers.
- DATA ANALYSIS TOOLS
- Many tools are needed to sort the mass of intercepted data.
- One of them is called XKeyscore, and its operation has been
- detailed in the columns of the Guardian. The extreme precision
- of the data are clear. With XKeyscore, analysts can access
- the content of e-mails to a list of websites visited by their
- target or the keywords entered by the latter in the search
- engines.
- The framework for this research is not binding, as the Guardian
- explained, and many Americans are data made available to agents.
- According to the presentation materials, to promote the
- capabilities of the tool, three hundred terrorists have been
- arrested since 2008 thanks to XKeyscore.
- NSA and GCHQ not only devote their considerable resources
- monitoring the fight against terrorism, but also to spy allies.
- At the G20 summit in London in 2009, computers of diplomats
- and heads of state were monitored by GCHQ, as well as some of
- their phone calls. NSA, she focused on the European Union (EU),
- as revealed by Der Spiegel, always on the basis of documents
- Snowden. NSA has installed cookies on the premises of the EU
- representation in Washington. The EU delegation to the UN in
- New York, and the building of the Council of the European Union
- in Brussels were also scrutinized by the US agency. Brazil is
- also one of the countries affected by this intelligence. According
- to Brazilian media group O Globo, its political leaders as some
- companies have been targeted.
- The Snowden documents have informed the considerable efforts
- made by the United States to start listening to Internet, in a
- sometimes unclear legal framework and often away from real
- democratic debate. Interviewed by Le Monde, the US authorities
- have assured that the Prism program was the subject of a
- parliamentary debate in the United States and was working
- in a strictly regulated legal framework. Asked on September 12
- revelations Snowden, James Clapper, the US Director of National
- Intelligence, said: "What happened - and that is harmful - sparked
- conversation and debate that it probably was necessary."
- _______________________________________
- ¤ UN Resolution Against US Spying ::
- http://cryptome.org/2013/10/un-v-us-spying.htm
- ¤ 21 Nations Line Up Behind UN Effort ::
- http://thecable.foreignpolicy.com/posts/2013/10/25/exclusive_21_nations_line_up_behind_un_effort_to_restrain_nsa
- ¤ Government May Stop Spying On So-called
- ‘World Leaders’, But Not You ::
- http://www.infowars.com/government-may-stop-spying-on-world-leaders-but-not-you/
- NOBODY comments
- 100% expected. They will continue to
- spy on 99.9% of the world, no doubt.
- Any secret data-hoardering agency will.
- We must adjust to it by learning how
- to counter their surveillance.
- ¤ UPDATE ; Inside America’s Plan to Kill
- Online Privacy Rights Everywhere ::
- The United States and its key intelligence
- allies are quietly working behind the scenes
- to kneecap a mounting movement in the United
- Nations to promote a universal human right
- to online privacy, according to diplomatic
- sources and an internal American government
- document obtained by The Cable.
- The diplomatic battle is playing out in an
- obscure UN General Assembly committee that
- is considering a proposal by Brazil and
- Germany to place constraints on unchecked
- internet surveillance by the National
- Security Agency and other foreign intelligence
- services. American representatives have made
- it clear that they won’t tolerate such
- checks on their global surveillance network.
- The stakes are high, particularly in
- Washington -- which is seeking to contain
- an international backlash against NSA
- spying -- and in Brasilia, where Brazilian
- President Dilma Roussef is personally
- involved in monitoring the UN negotiations.
- http://cryptome.org/2013/11/us-kill-privacy.htm
- http://thecable.foreignpolicy.com/posts/2013/11/20/exclusive_inside_americas_plan_to_kill_online_privacy_rights_everywhere
- _______________________________________
- ¤ Keith Alexander Promotes NSA / Scorns
- Public News Coverage ::
- http://www.youtube.com/watch?v=6Kc5Xvr24Aw
- http://www.politico.com/blogs/under-the-radar/2013/10/nsa-chief-stop-reporters-selling-spy-documents-175896.html
- http://www.theguardian.com/commentisfree/2013/oct/25/europe-erupts-nsa-spying-chief-government
- _______________________________________
- ¤ Leaked Memos Reveal GCHQ Efforts to
- Keep Mass Surveillance Secret ::
- http://www.theguardian.com/uk-news/2013/oct/25/leaked-memos-gchq-mass-surveillance-secret-snowden
- _______________________________________
- ¤ US Dictatorship Spied Mexican Dictator ::
- The National Security Agency (NSA) has
- a division for particularly difficult
- missions. Called “Tailored Access Operations”
- (TAO), this department devises special
- methods for special targets.
- That category includes surveillance of
- neighboring Mexico, and in May 2010,
- the division reported its mission
- accomplished. A report classified as
- “top secret” said: “TAO successfully
- exploited a key mail server in the
- Mexican Presidencia domain within the
- Mexican Presidential network to gain
- first-ever access to President Felipe
- Calderon’s public email account.”
- http://www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html
- http://cryptome.org/2013/10/nsa-leak-mx-2.htm
- Cryptome comments ▼
- This spying was apparently done from
- the NSA’s Medina Regional SIGINT Operations
- Center (MRSOC), Lackland Air Force Base
- Annex, San Antonio, TX (formerly Medina
- Regional SIGINT Operations Center):
- http://cryptome.org/2012-info/nsa-mrsoc-2012/nsa-mrsoc-2012.htm
- http://cryptome.org/mrsoc.pdf
- _______________________________________
- ¤ More NSA Targets Revealed ::
- http://cryptome.org/2013/10/nsa-selected-coverage.htm
- ¤ NSA Spies on French Government ::
- http://cryptome.org/2013/10/nsa-close-access-sigads.pdf
- ¤ NSA Spies on Indian Government ::
- http://cryptome.org/2013/10/india-close-access-sigads.pdf
- ¤ NSA Spies on Everyone ::
- http://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-calls
- ¤ EU Rules New Policy to Curb NSA Spying ::
- http://www.theguardian.com/world/2013/oct/17/eu-rules-data-us-edward-snowden
- ¤ Other Governments “Envious” of NSA ::
- http://theweek.com/article/index/251628/why-the-nsa-spies-on-france-and-germany
- David Addington, Cheney’s chief of staff,
- thought that the NSA should use its
- technology to intercept emails and
- telephone calls sent from one domestic
- terminal to another, and was upset to
- learn that Hayden thought differently.
- That was a line he would only cross,
- deliberately, with court and congressional
- approval. Addington dropped the idea,
- but as we now know, the agency added
- to its portfolio a mandate to monitor
- suspicious communications that transited
- the border of the United States, and
- later began to collect reams of metadata
- in order to analyze it.
- Hayden wasn’t being cautious just for
- the record: NSA’s job was to collect
- foreign intelligence — to steal stuff,
- or purloin letters, real and digital,
- in order to provide policymakers with a
- decision advantage. The advantage the
- NSA provided was accurate information
- about what people who interacted with
- the United States said in private about
- their intentions; that gap between saying
- and doing, and the ability to predict
- action from it, allows the president of
- the United States to stay a step ahead.
- It’s one thing to say that the United
- States’ actions don’t always match up
- with the values we espouse, and that’s
- true. When our hypocrisy is exposed,
- our moral authority wanes and our
- ability to maneuver is reduced.
- It’s quite another to assume that other
- countries are any purer. They never have
- been and probably won’t be. Many are much
- purer than others, so the amount of
- resources the intelligence community
- devotes to harder strategic targets ought
- to correspond with how honest our allies
- are, or how little they deceive us. The
- egg comes before the chicken: How the hell
- can we figure out which allies are more
- reliable if we don’t figure out the
- correspondence between public and private
- words and actions.
- Of course, Brazil, France, Germany, and
- Mexico do exactly the same thing. They
- want their leaders to gain a decision
- advantage in the give and take between
- countries. They want to know what US
- policymakers will do before the Americans
- do it. And in the case of Brazil and
- France, they aggressively spy on the
- United States, on US citizens and
- politicians, in order to collect that
- information. The difference lies in the
- scale of intelligence collection: The
- US has the most effective, most distributed,
- most sophisticated intelligence community
- in the West. It is Goliath. And other
- countries, rightly in their mind, are
- envious.
- _______________________________________
- ¤ NSA Involvement in Drone Kill Operations ::
- http://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story.html
- _______________________________________
- ¤ 58 Things Learned About NSA Spying ::
- http://www.tedgioia.com/nsa_facts.html
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ Brazil Prepares to Counter NSA’s PRISM
- with ‘Secure Email’ Plan ::
- http://www.theregister.co.uk/2013/10/14/brazil_waxes_lyrical_on_security/
- _______________________________________
- ¤ Dutch Cabinet Response to Parliamentary
- Questions About NSA Wiretapping ::
- http://blog.cyberwar.nl/2013/10/dutch-govt-response-to-parliamentary.html
- _______________________________________
- This week Edward Snowden received the
- Integrity Award from the Sam Adams Associates
- for Integrity in Intelligence. These videos
- from the award ceremony are the first of
- Mr Snowden after being granted asylum in
- Russia.
- http://wikileaks.org/Video-Edward-Snowden-wins-Sam.html
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ▼ GCHQ Freaks Out Over Recent Leaks ::
- Andrew Parker, the director general
- of the Security Service, said the
- exposing of intelligence techniques,
- by the Guardian newspaper, had given
- fanatics the ability to evade the spy
- agencies.
- http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10365026/GCHQ-leaks-have-gifted-terrorists-ability-to-attack-at-will-warns-spy-chief.html
- ¤ NSA & GCHQ Counter-Tor Slides ::
- “Use cookies to identify Tor users when
- they are not using Tor.”
- “Investigate Evercookie persistence.”
- http://cryptome.org/2013/10/nsa-tor-stinks.pdf
- ---------------------------------------
- Here is evercookie.sol found from an
- old bleach log.
- C:\Documents and Settings\Owner\Application Data\
- Macromedia\Flash Player\#SharedObjects\ED5YHQQU\
- bbcdn-bbnaut.ibillboard.com\server-static-files\
- bbnaut.swf\evercookie.sol
- bbnaut.swf holding evercookie.sol
- “SWF is an Adobe Flash file format used
- for multimedia, vector graphics and
- ActionScript. Originating with FutureWave
- Software, then transferred to Macromedia,
- and then coming under the control of Adobe,
- SWF files can contain animations or applets
- of varying degrees of interactivity and
- function.
- There are also various third party
- programs that can produce files in
- this format, such as Multimedia Fusion,
- Captivate and SWiSH Max.”
- “.sol files are created by Adobe Flash
- Player to hold Local Shared Objects,
- data stored on the system running the
- Flash player.”
- ---------------------------------------
- ▲ NOBODY comments on Evercookie
- Evercookie is an .sol format, created
- as a macromedia (or flashplayer) cache.
- It can be found within Windows systems
- and can be wiped out here ;
- C:\Documents and Settings\User\
- Application Data\Macromedia\
- and may also be cloned here ;
- C:\WINDOWS\system32\Macromed\Flash\
- I recommend users ALWAYS bleach their
- cache, cookies, logs, TEMP.
- The %TEMP% directory can be found here ;
- C:\Documents and Settings\User\
- Local Settings\Temp\
- ---------------------------------------
- • Adobe Flash Player Registry »
- http://code.str0.be/view/1d23ed24
- http://ae7.st/p/6ci (mirror)
- • swflash.ocx Raw Data Dump »
- http://code.str0.be/view/41185b11
- http://ae7.st/p/1ve (mirror)
- • Evercookie Cache Format Registry »
- http://pb.stoleyour.com/view/1d527692
- http://ae7.st/p/35m (mirror)
- • Adobe “Asset Cache” Format Registry »
- http://pb.stoleyour.com/view/722ea22f
- http://ae7.st/p/4rq (mirror)
- • Macromedia - a Third-party Cacher »
- http://p.pomf.se/1252
- http://ae7.st/p/5dk (mirror)
- ---------------------------------------
- http://en.wikipedia.org/wiki/Evercookie
- Evercookie is a JavaScript-based
- application created by Samy Kamkar
- which produces zombie cookies in a
- web browser that are intentionally
- difficult to delete. ... ...
- An Evercookie is not merely difficult
- to delete. It actively resists deletion
- by copying itself in different forms on
- the user’s machine and resurrecting
- itself if it notices that some of the
- copies are missing or expired.
- Specifically, when creating a new cookie,
- Evercookie uses the following storage
- mechanisms when available:
- • Standard HTTP cookies
- • Local Shared Objects (Flash cookies)
- • Silverlight Isolated Storage
- • Storing cookies in RGB values of
- auto-generated, force-cached PNGs
- using HTML5 Canvas tag to read pixels
- (cookies) back out
- • Storing cookies in Web history
- • Storing cookies in HTTP ETags
- • Storing cookies in Web cache
- • window.name caching
- • Internet Explorer userData storage
- • HTML5 Session Storage
- • HTML5 Local Storage
- • HTML5 Global Storage
- • HTML5 Database Storage via SQLite
- ---------------------------------------
- ¤ Cookies Threaten Tor User Anonymity ::
- “Just because you’re using Tor doesn’t
- mean that your browser isn't storing
- cookies,” said Jeremiah Grossman, a
- colleague of Hansen’s who also specializes
- in browser vulnerabilities.
- As Grossman described the procedure to
- CNET, the NSA is aware of Tor’s entry
- and exit nodes because of its Internet
- wide surveillance.
- “The very feature that makes Tor a
- powerful anonymity service, and the
- fact that all Tor users look alike on
- the Internet, makes it easy to
- differentiate Tor users from other
- Web users,” he wrote.
- “The NSA then cookies that ad, so that
- every time you go to a site, the cookie
- identifies you. Even though your IP
- address changed [because of Tor], the
- cookies gave you away,” he said.
- http://news.cnet.com/8301-1009_3-57606178-83/nsa-tracks-google-ads-to-find-tor-users/
- ---------------------------------------
- ¤ GCHQ ; MULLENIZE Operation to Tag and
- Identify Packet Traffic From Machines ::
- “Working together, CT and CNE have
- devised a method to carry out large-scale
- ‘staining’ as a means to identify
- individual machines linked to that
- IP address. ... ...
- User Agent Staining is a technique that
- involves writing a unique marker (or stain)
- onto a target machine. Each stain is
- visible in passively collected SIGINT
- and is stamped into every packet, which
- enables all the events from that stained
- machine to be brought back together to
- recreate a browsing session.”
- http://cryptome.org/2013/10/gchq-mullenize.pdf
- http://s3.documentcloud.org/documents/801762/mullenize-28redacted-29.pdf
- ¤ Packet Staining ::
- http://prezi.com/p5et9yawg2c6/ip-packet-staining/
- http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-00
- http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-01
- http://cryptome.org/2013/10/packet-stain/packet-staining.htm
- ¤ NSA Peeling Back the Layers of Tor ::
- http://cryptome.org/2013/10/nsa-egotisticalgiraffe.pdf
- http://www.theguardian.com/world/interactive/2013/oct/04/egotistical-giraffe-nsa-tor-document
- http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity
- http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
- ¤ NSA ; Tor Source Code Vulnerabilities ::
- “We have seen several targets using Tor.
- Our goal was to analyze Tor source code
- and determine any vulnerabilities in
- the system. We set up an internal Tor
- network to analyze Tor traffic, in the
- hopes of discovering ways to passively
- identify it. We also worked to create
- a custom Tor client which allows the
- user finer control.” ... ...
- “This accomplishes several things.
- Most basically, the Tor servers, many
- of which are listed on publicly advertised
- directory servers, are chosen to act as
- a series of proxies. This may seem to
- be excessively complex, as a single
- proxy server can be used to hide one’s
- location, but a single-hop proxy is
- vulnerable in two ways. First, by
- analyzing the pattern of the traffic
- going to and from the proxy server,
- it is possible to deduce which clients
- are making which requests. Second, if
- an attacker owns the proxy server, then
- it certainly knows who is asking for what,
- and anonymization is ruined. By using
- multiple hops, Tor is much more resistant
- to both of these attacks. Traffic analysis
- becomes extraordinarily difficult, as it
- must be coordinated across several machines,
- and an attacker must own all the hops
- along the circuit in order to trace
- requests back to the originating client.”
- ... ...
- “In our time in the lab, we found that
- running an nmap on a node that is offering
- a hidden service will turn up the port
- that the hidden service is using to deal
- with incoming connections. It can then be
- directly connected to, outside of Tor.”
- ... ...
- “We would have to try to connect to
- each of the ports we see open on a
- machine to determine if there is a
- hidden service being run. We would not
- even know which protocol the hidden
- service is running. It may be an HTTP
- server, an FTP server, an SMTP server,
- etc. The only thing we know is that
- the protocol must run over TCP. It is
- not enough to attempt to connect once
- to each port, using an HTTP GET request.
- Several protocols must be tried.”
- ... ...
- “It may also be useful to study Tor
- directory servers in more detail. Our
- work focused solely on the client, but
- many attacks would be much easier with
- access to more Tor servers. The directory
- servers ultimately control which Tor
- servers are used by clients. We have found
- that a server can put itself on a directory
- server multiple times; all it takes is the
- server running several Tor processes, each
- having a different nickname, open port,
- fingerprint, and LOG FILE. This only
- requires different configuration files
- for the different processes, which are
- easy to set up. That machine will handle
- a disproportionate amount of traffic,
- since it is listed several times. This
- increases the density of friendly servers
- in the cloud without increasing the number
- of servers we have set up. Unfortunately,
- each listing has the same IP address,
- which would be very noticeable to anyone
- who inspecting the directories.”
- http://cryptome.org/2013/10/nsa-tor.pdf
- http://s3.documentcloud.org/documents/802061/ces-summer-2006-tor-paper-28redacted-29-1.pdf
- http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html
- ¤ NSA ; Types of IAT ::
- http://cryptome.org/2013/10/nsa-iat-tor.pdf
- ¤ NSA Link Removed by Guardian ::
- http://cryptome.org/2013/10/nsa-link-removed.htm
- ¤ Tor Media Reports Disinformative (?) ::
- “This document doesn’t give much insight
- into capabilities the IC has developed
- against Tor. It’s apparently quite common
- to run multiple research teams (either
- known or unknown to each other) against
- a single target, and a few summer students
- with a dozen lab machines is a pretty
- small investment. I’d expect there are
- other programs with more sophisticated
- attacks, especially now 7 years later.”
- http://cryptome.org/2013/10/nsa-tor-disinfo.htm
- _______________________________________
- ¤ Greenwald and Gibson Q&A @ Reddit ::
- http://cryptome.org/2013/10/greenwald-gibson-reddit.pdf
- _______________________________________
- ¤ Mike Rogers Says He’d Like To See
- Snowden On a Hit List ::
- http://www.infowars.com/former-nsa-head-says-hed-like-to-see-snowden-on-us-kill-list/
- “I must admit, in my darker moment over
- the past several months, I’d also thought
- of nominating Mr. Snowden, but it was
- for a different list,” Hayden said during
- a panel discussion, according to Brendan
- Sasso of The Hill.
- Sasso notes that the audience laughed,
- and Rep. Mike Rogers (R-Mich), chairman
- of the House Intelligence Committee who
- was also on the panel, responded, “I can
- help you with that.”
- http://thehill.com/blogs/hillicon-valley/technology/326315-former-nsa-chief-jokes-about-putting-snowden-on-kill-list
- The conversation then turned specifically
- to the government’s use of targeted
- killings, with Hayden noting “Yes, we
- do targeted killings, and I certainly
- hope they make full use of the capacities
- of the National Security Agency when we
- do that.”
- Hayden was responding to a question
- about a new project announced by journalists
- Glenn Greenwald and Jeremy Scahill,
- delving into the NSA’s alleged role in
- assassinations.
- http://rt.com/usa/nsa-assassination-leaks-greenwald-514/
- _______________________________________
- ¤ NSA Police Guard Threatens Reporters ::
- Infowars crew arrive at Utah Data Center.
- http://www.infowars.com/nsa-goons-confiscate-cameras-from-reporters/
- http://www.sltrib.com/sltrib/politics/56958862-90/data-center-utah-amp.html.csp
- _______________________________________
- ¤ Cost and Responsibility for Snowden’s
- Breaches ::
- http://cryptome.org/2013/10/snowden-cost.htm
- ¤ Questioning Snowden Truth ::
- http://cryptome.org/2013/10/questioning-snowden-truth.htm
- _______________________________________
- ¤ NSA Gathers Data on Social Networks
- of US Citizens ::
- The new disclosures add to the growing
- body of knowledge in recent months about
- the NSA’s access to and use of private
- information concerning Americans, prompting
- lawmakers in Washington to call for reining
- in the agency and President Obama to order
- an examination of its surveillance policies.
- Almost everything about the agency’s
- operations is hidden, and the decision
- to revise the limits concerning Americans
- was made in secret, without review by the
- nation’s intelligence court or any public
- debate. As far back as 2006, a Justice
- Department memo warned of the potential
- for the “misuse” of such information
- without adequate safeguards.
- http://cryptome.org/2013/09/nsa-syanpse.htm
- http://cryptome.org/2013/09/nsa-syanpse-large.jpg
- http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html?_r=0
- ¤ NSA Director Admits NSA Collects Data
- From American Social Networks ::
- http://hosted.ap.org/dynamic/stories/U/US_NSA_SURVEILLANCE_SOCIAL_NETWORKS?SITE=AP
- _______________________________________
- ¤ GCHQ Faces Legal Challenge in European
- Court Over Online Privacy ::
- http://www.theguardian.com/uk-news/2013/oct/03/gchq-legal-challenge-europe-privacy-surveillance
- _______________________________________
- UNITED STATES ONLY COUNTRY TO VOTE “NO”
- TO A NEW TREATY FOR DIGITAL PRIVACY ::
- Led by the German government, a loose
- coalition of privacy chiefs from countries
- across the world is pushing to update an
- influential international human rights
- treaty that enshrines the right to privacy.
- ... ...
- The annual conference was attended by a
- diverse selection of privacy and data
- protection officials from across the
- world, with representatives attending
- from countries including Japan, New Zealand,
- France, Slovenia, Uruguay, Belgium, Ireland,
- Finland, Spain, Australia, Germany, Burkina
- Faso, Canada, the United States, and the
- United Kingdom.
- During a closed session at the conference
- open only to the privacy chiefs, a
- resolution was put forward for a vote
- on the proposal to update Article 17.
- They voted overwhelmingly in favor of
- the idea, recognizing a need to “create
- globally applicable standards for data
- protection and the protection of privacy
- in accordance with the rule of law.”
- Notably, only one country did not approve
- of the resolution ... the United States.
- At this point, the proposed Article 17
- protocol is still a long way off. It will
- eventually need to be put forward at the
- United Nations and voted on by member
- states, and that could take time. But
- the growing appetite to amend the
- international treaty in light of the
- Snowden revelations is highly symbolic
- if nothing else, reflecting widespread
- concerns about the power of mass surveillance
- technology in the digital age to trample
- over basic universal privacy rights.
- https://privacyconference2013.org/web/pageFiles/kcfinder/files/5.%20International%20law%20resolution%20EN%281%29.pdf
- http://www.slate.com/blogs/future_tense/2013/09/26/article_17_surveillance_update_countries_want_digital_privacy_in_the_iccpr.html
- NOBODY comments
- “The problem is not just the NSA, but
- all secret agencies around the world,
- in general. All secret agencies and
- their third-party vendors or allies
- break (or bypass) crypto and manufacture
- backdoors in electronic communication
- devices by stealth. Not just the NSA.
- Not just the GCHQ. Not just the GFO.
- Not just the ISNU, et al. The major
- problem is trust. If you desire privacy,
- you must kill any trust in security.
- Security does not exist on the web.
- Digital privacy is a hoax. It’s null.
- It’s a wet dream. It’s justice FUBAR.”
- _______________________________________
- ¤ Deutsche Telekom Defies NSA Spying ::
- http://online.wsj.com/article/SB10001424052702303983904579096082938662594.html
- ¤ Deutsche DSL Phone Switch Data Dump ::
- http://cryptome.org/2013/09/dtag-dsl-switches.txt
- _______________________________________
- ¤ Senate FISA Hearings, September 2013 ::
- http://cryptome.org/2013/09/edgar-13-0926.pdf
- http://cryptome.org/2013/09/wittes-13-0926.pdf
- http://cryptome.org/2013/09/dni-nsa-doj-13-0926.pdf
- http://cryptome.org/2013/09/dni-13-0926.pdf
- http://cryptome.org/2013/09/nsa-13-0926.pdf
- ¤ Dianne Feinstein Accidentally Confirms
- NSA Tapped the Internet Backbone ::
- http://www.techdirt.com/articles/20130927/13562624678/dianne-feinstein-accidentally-confirms-that-nsa-tapped-internet-backbone.shtml
- http://www.infowars.com/dianne-feinstein-accidentally-confirms-that-nsa-tapped-the-internet-backbone/
- http://www.c-spanvideo.org/clip/4466341
- In short, “upstream” capabilities are tapping the
- backbone itself, via the willing assistance of the
- telcos (who still have remained mostly silent on all
- of this) as opposed to “downstream” collection, which
- requires going to the internet companies directly.
- ¤ Senators Blame Public News Covering Leaks ::
- http://www.huffingtonpost.com/2013/09/26/senators-nsa-media_n_3998229.html
- ▼ Lawmakers Who Upheld NSA Phone Spying ::
- (1) http://c.nopaste.dk/p56175
- (2) http://c.nopaste.dk/p56176
- (3) http://c.nopaste.dk/p56177
- (4) http://c.nopaste.dk/p56178
- (5) http://c.nopaste.dk/p56179
- _______________________________________
- ¤ Declassified Documents Reveal the NSA
- Wiretapped Martin Luther King, Muhammad
- Ali and Two US Senators ::
- http://www.theguardian.com/world/2013/sep/26/nsa-surveillance-anti-vietnam-muhammad-ali-mlk
- _______________________________________
- ¤ NSA Hacked Indian Politicos, Scientists ::
- According to a top secret document disclosed by NSA
- whistleblower Edward Snowden and obtained by The Hindu,
- the PRISM programme was deployed by the American agency
- to gather key information from India by tapping directly
- into the servers of tech giants which provide services
- such as email, video sharing, voice-over-IPs, online chats,
- file transfer and social networking services.
- And, according to the PRISM document seen by The Hindu,
- much of the communication targeted by the NSA is unrelated
- to terrorism, contrary to claims of Indian and American
- officials.
- Instead, much of the surveillance was focused on India’s
- domestic politics and the country’s strategic and commercial
- interests.
- http://www.thehindu.com/news/national/nsa-targets-indian-politics-space-nprogrammes/article5161299.ece
- According to the 2010 COMINT (communication intelligence)
- document about “Close Access SIGADs”, the offices of Indian
- diplomats and high-ranking military officials stationed
- at these important posts were targets of four different
- kinds of electronic snooping devices:
- Lifesaver, which facilitates imaging of the hard drive
- of computers.
- Highlands, which makes digital collection from implants.
- Vagrant, which collects data of open computer screens.
- Magnetic, which is a collection of digital signals.
- http://www.thehindu.com/news/international/world/nsa-planted-bugs-at-indian-missions-in-dc-un/article5164944.ece
- _______________________________________
- ¤ Secret Bunkers, a Challenge for US Intelligence ::
- Accessing archived government documents, the National
- Security Archive, an anti-secrecy group, has revealed a
- decades-long effort by the US to detect, monitor, and
- in some cases plan the destruction of, “more than 10,000
- such facilities worldwide, many of them in hostile territory,
- and many presumably intended to hide or protect lethal military
- equipment and activities, including weapons of mass destruction,
- that could threaten US or allied interests.”
- http://www.thehindu.com/news/international/world/secret-bunkers-a-challenge-for-us-intelligence/article5164833.ece
- _______________________________________
- ¤ More Unreported, Unredacted NSA Slides ::
- http://leaksource.wordpress.com/2013/09/09/unreportedunredacted-nsa-slidesprogram-names-revealed-on-brazil-news/
- _______________________________________
- ¤ Guardian’s Alan Rusbridger on the Inside Story of
- NSA Leaks ::
- http://leaksource.wordpress.com/2013/09/24/guardians-alan-rusbridger-on-the-inside-story-of-snowden-nsa-leaks/
- _______________________________________
- ¤ PRISM Part of the BLARNEY Program ::
- http://electrospaces.blogspot.nl/2013/09/prism-as-part-of-blarney-program.html
- _______________________________________
- ¤ New Separate Internet Being Built by
- Countries Targeted by NSA and GCHQ ::
- http://www.bricscable.com/wp-content/uploads/2013/03/U564-Imphandze-BRICS-Leaflet.pdf
- http://www.bricscable.com/wp-content/uploads/2013/04/2013-submarine-cable-market-industry-report.pdf
- http://www.bricscable.com/wp-content/uploads/2013/04/BRICS-BUSINESS-FORUM-JOINT-COMMUNIQUE-26-March-2013.pdf
- ¤ New Separate Internet Will Not be
- Under United States Control ::
- The President of Brazil, Dilma Rousseff announces publicly
- the creation of a world internet system INDEPENDENT from
- US and Britain or “US-centric internet.”
- Not many understand that, while the immediate trigger for
- the decision (coupled with the cancellation of a summit with
- the US president) was the revelations on NSA spying, the reason
- why Rousseff can take such a historic step is that the
- alternative infrastructure: The BRICS cable from Vladivostock,
- Russia to Shantou, China to Chennai, India to Cape Town,
- South Africa to Fortaleza, Brazil, is being built and it’s,
- actually, in its final phase of implementation.
- “The global backlash is only beginning and will get far more
- severe in coming months,” said Sascha Meinrath, director
- of the Open Technology Institute at the Washington-based New
- America Foundation think-tank. “This notion of national
- privacy sovereignty is going to be an increasingly salient
- issue around the globe.”
- http://proxy.rickmartensen.nl/www.globalresearch.ca/the-brics-independent-internet-in-defiance-of-the-us-centric-internet/5350272
- http://www.thehindu.com/news/international/world/brazil-plans-to-go-offline-from-uscentric-internet/article5137689.ece
- http://www.excitingrio.com/brazil-looks-break-us-centric-internet/
- http://indrus.in/economics/2013/03/01/brics_cable_connecting_continents_brick_by_brick_22617.html
- ¤ The BRICS Fiber-optic Cable ::
- A 34,000 km, 2 fibre pair, 12.8 Tbit/s capacity, fibre
- optic cable system.
- http://www.bricscable.com/
- https://www.youtube.com/watch?v=OkQI4bJcDGw
- _______________________________________
- ¤ No Phone Company Ever Challenged NSA Spying ::
- A newly declassified opinion from the Foreign Intelligence
- Surveillance Court from this summer shows the court’s
- interpretation of the controversial Section 215 of the USA
- PATRIOT Act that’s used to justify the National Security
- Agency’s bulk telephone metadata collections, and reveals
- that none of the companies that have been served with such
- orders has ever challenged one.
- http://proxy.rickmartensen.nl/threatpost.com/fisc-no-phone-company-ever-challenged-metadata-collection-orders/102334
- _______________________________________
- ¤ Corporations Worry About Long-Term Blowback of NSA
- Revelations ::
- With all of the disturbing revelations that have come
- to light in the last few weeks regarding the NSA’s
- collection methods and its efforts to weaken cryptographic
- protocols and security products, experts say that perhaps
- the most worrisome result of all of this is that no one
- knows who or what they can trust anymore.
- The fallout from the most-recent NSA leaks, which revealed
- the agency’s ability to subvert some cryptographic standards
- and its “partnerships” with software and hardware vendors
- to insert backdoors into various unnamed products, has
- continued to accumulate over the course of the last couple
- of weeks. Cryptographers and security researchers have been
- eager to determine which products and protocols are suspect,
- and the discussion has veered in a lot of different directions.
- But one thing that’s become clear is that when the government
- lost the so-called Crypto Wars in the 1990s, the NSA didn’t
- just go back to Fort Meade and tend to its knitting.
- http://proxy.rickmartensen.nl/threatpost.com/experts-worry-about-long-term-implications-of-nsa-revelations/102355
- ¤ The Sky is Not Falling – It’s Fallen ::
- The security community didn’t invent the concept of fear,
- uncertainty and doubt, but it has perfected it and raised
- it to the level of religion. It’s the way that security products
- are marketed and sold, but it’s also the way that the intelligence
- community justifies its extra-legal and, in some cases,
- unconstitutional, data-gathering practices. Just as vendors
- use the specter of catastrophic hacks, data loss and public
- embarrassment to push their wares, the NSA and its allies
- have used the dark shadow of 9/11 and global terrorism to
- justify their increasingly aggressive practices, some of which
- have now been shown to have deliberately weakened some of the
- fundamental building blocks of security.
- The most damning bit of string in this ball is the news that
- the NSA likely inserted a back door into a key cryptographic
- algorithm known as DUAL EC DRBG. That’s bad. What’s worse
- is that RSA on Thursday sent a warning to its developer
- customers warning them to immediately stop using the company’s
- BSAFE library because it uses the compromised random number
- generator. That means that untold numbers of products that
- include the BSAFE crypto libraries are compromised.
- http://proxy.rickmartensen.nl/threatpost.com/the-sky-is-not-falling-its-fallen/102372
- _______________________________________
- ¤ President Surveillance Program Review ::
- “The program was reauthorized by the
- President approximately every 45 days,
- with certain modifications. Collectively,
- the activities carried out under these
- Authorizations are referred to as the
- “President’s Surveillance Program” or
- “PSP.” One of the activities authorized
- as part of the PSP was the interception of
- the content of communications into and out
- of the United States where there was a
- reasonable basis to conclude that one
- party to the communication was a member
- of al-Qa’ida or related terrorist organizations.
- This aspect of the PSP was publicly
- acknowledged and described by the President,
- the Attorney General, and other Administration
- officials beginning in December 2005 following
- a series of articles published in The New York
- Times. The Attorney General subsequently
- publicly acknowledged the fact that other
- intelligence activities were also authorized
- under the same Presidential Authorization,
- but the details of those activities remain
- classified.” ... ...
- “Prior to September 11,2001, the Foreign
- Intelligence Surveillance Act of 1978 and
- Executive Order 12333 were generally viewed
- as the principal governing authorities for
- conducting electronic surveillance for
- national security purposes. The Foreign
- Intelligence Surveillance Act, 50 U.S.C.
- § 1801, et seq., was enacted in 1978 to
- "provide legislative authorization and
- regulation for all electronic surveillance
- conducted within the United States for
- foreign intelligence purposes."”
- http://cryptome.org/2013/09/psp-09-0710.pdf
- ¤ NSA ; PSP Analysis Loophole to Snoop
- Domestic Contacts Along with Metadata ::
- http://cryptome.org/2013/08/nsa-ig-09-0324.pdf
- NOBODY comments (nsa-ig-09-0324.pdf)
- The President’s Surveillance Program (PSP)
- should be of high interest. As mentioned
- on page 17, the PSP did not - “did not” -
- require special approval. Therefore, just
- another gap. Also take in consideration
- other abuse against FISA laws, court order
- to stifle FAA 702 upstream analysis, EO 12333,
- and of-course NSA’s now admitted abuse -
- deliberately ignoring restrictions against
- domestic communications (a risk to comsec).
- _______________________________________
- ¤ Britain’s GCHQ Hacked Belgian Telecom
- Firm ::
- Documents from the archive of whistleblower
- Edward Snowden indicate that Britain’s
- GCHQ intelligence service was behind a
- cyber attack against Belgacom, a partly
- state-owned Belgian telecoms company.
- A “top secret” Government Communications
- Headquarters (GCHQ) presentation seen by
- SPIEGEL indicate that the goal of project,
- conducted under the codename “Operation
- Socialist,” was “to enable better
- exploitation of Belgacom” and to
- improve understanding of the provider’s
- infrastructure. ... ...
- According to the slides in the GCHQ
- presentation, the attack was directed
- at several Belgacom employees and
- involved the planting of a highly
- developed attack technology referred
- to as a “Quantum Insert” (“QI”). It
- appears to be a method with which the
- person being targeted, without their
- knowledge, is redirected to websites
- that then plant malware on their
- computers that can then manipulate
- them. Some of the employees whose
- computers were infiltrated had “good
- access” to important parts of Belgacom’s
- infrastructure, and this seemed to
- please the British spies, according
- to the slides.
- http://www.spiegel.de/international/europe/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html
- http://www.infowars.com/latest-snowden-leaks-show-gchq-gleefully-hacking-belgian-telco/
- https://www.techdirt.com/articles/20130920/16112724595/latest-snowden-leaks-show-gchq-gleefully-hacking-belgian-telco.shtml
- http://cryptome.org/2013/09/belgacom-hack-en.htm
- http://cryptome.org/2013/09/belgacom.htm
- _______________________________________
- ¤ European Parliament Brief on NSA ::
- http://cryptome.org/2013/09/europarl-nsa.pdf
- http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/dv/briefingnote_/briefingnote_en.pdf
- _______________________________________
- ¤ NSA Buys Vupen Exploits ::
- http://cryptome.org/2013/09/nsa-vupen.pdf
- http://news.softpedia.com/news/Security-Firm-VUPEN-Confirms-the-NSA-Bought-Exploits-Service-Subscription-383597.shtml
- http://proxy.rickmartensen.nl/threatpost.com/nsa-bought-exploit-service-from-vupen-contract-shows
- _______________________________________
- ¤ US Government Foreign Telecommunications
- Providers Network Security Agreements ::
- http://publicintelligence.net/us-nsas/
- http://info.publicintelligence.net/US-NSAs.zip
- http://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story.html
- _______________________________________
- ¤ FISA Court Releases FBI Spy Documents ::
- http://cryptome.org/2013/09/fisc-13-0917-4.pdf
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ▼ FISC Orders All Spy Data Disclosure
- Allocated to One Release ::
- http://cryptome.org/2013/09/fisc-five-13-0918.pdf
- ¤ Linkedin Moves to Disclose Spy Data ::
- http://cryptome.org/2013/09/fisc-linkedin-13-0917.pdf
- ¤ FISC Schedule for Microsoft, Google,
- Yahoo and Facebook Spy Data Release ::
- http://cryptome.org/2013/09/fisc-ms-google-yahoo-fb-13-0913.pdf
- ¤ Microsoft, Google Spy Data Briefing
- Schedule ::
- http://cryptome.org/2013/09/ms-goog-fisc-13-0909.pdf
- ¤ Google Moves to Disclose User Spy Data ::
- http://cryptome.org/2013/09/google-fisc-13-0909.pdf
- ¤ Yahoo Moves to Disclose User Spy Data ::
- http://cryptome.org/2013/09/yahoo-fisc-13-0909.pdf
- ¤ Facebook Moves to Disclose User Spy Data ::
- http://cryptome.org/2013/09/facebook-fisc-13-0909.pdf
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ DoJ Stonewalls USA Today ::
- In response to a FOIA request from
- USA TODAY, the Justice Department said
- its ethics office never looked into
- complaints from two federal judges
- that they had been misled about NSA
- surveillance.
- http://cryptome.org/2013/09/usa-today-doj.pdf
- http://cryptome.org/2013/09/usa-today-doj-shots.jpg
- http://www.usatoday.com/story/news/nation/2013/09/19/nsa-surveillance-justice-opr-investigation/2805867/
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- Perry Metzger: Matthew Green tweeted
- earlier today that Johns Hopkins will
- be hosting a roundtable at 10am EDT
- tomorrow (Wednesday, September 18th)
- to discuss the NSA crypto revelations.
- Livestream will be at:
- https://connect.johnshopkins.edu/jhuisicrypto/
- _______________________________________
- ¤ NSA Spying Documents to be Released as
- Result of EFF Lawsuit Against NSA ::
- https://www.eff.org/deeplinks/2013/09/hundreds-pages-nsa-spying-documents-be-released-result-eff-lawsuit
- ¤ Government Releases NSA Surveillance
- Docs and Previously Secret FISA Court
- Opinions In Response to EFF Lawsuit ::
- https://www.eff.org/deeplinks/2013/09/government-releases-nsa-surveillance-docs-and-previously-secret-fisa-court
- The Director of National Intelligence
- (DNI) just today released hundreds of
- pages of documents related to the
- government’s secret interpretation of
- Patriot Act Section 215 and the NSA’s
- (mis)use of its massive database of
- every American’s phone records. The
- documents were released as a result
- of EFF’s ongoing Freedom of Information
- Act lawsuit.
- We’ve posted links to each document
- below. While the government also posted
- many of the documents here ...
- http://icontherecord.tumblr.com/
- ... our copies are completely searchable.
- Links to the documents ;
- • May 24, 2006 — Order from the Foreign
- Intelligence Surveillance Court
- https://www.eff.org/sites/default/files/filenode/docket_06-05_1dec201_redacted.ex_-_ocr_0.pdf
- • December 12, 2008 — Supplemental Opinion
- from the Foreign Intelligence Surveillance
- Court
- https://www.eff.org/sites/default/files/filenode/4_february_2011_production_br10-82_final_redacted.ex_-_ocr_1.pdf
- • January 28, 2009 — Order Regarding Preliminary
- Notice of Compliance Incident Dated January 15,
- 2009 from the Foreign Intelligence Surveillance
- Court
- https://www.eff.org/sites/default/files/filenode/br_08-13_alert_list_order_1-28-09_final_redacted1.ex_-_ocr_0.pdf
- • January 28, 2009 — Order Regarding Preliminary
- Notice of Compliance Incident Dated January 15,
- 2009 from the Foreign Intelligence Surveillance
- Court - With Cover Letter and Attached Declarations
- https://www.eff.org/sites/default/files/filenode/5_march_09_production-final_redacted.ex_-_ocr_1.pdf
- • February 26, 2009 — Notice of Compliance
- Incident
- https://www.eff.org/sites/default/files/filenode/br_08-13_doj_notice_with_supp_decl_as_filed_26_feb_09_final_redacted.ex_-_ocr_1.pdf
- • March 2, 2009 — Order from the Foreign
- Intelligence Court
- https://www.eff.org/sites/default/files/filenode/br_08-13_order_3-2-09_final_redacted.ex_-_ocr_1.pdf
- • June 22, 2009 — Order from the Foreign
- Intelligence Court
- https://www.eff.org/sites/default/files/filenode/br_09-06_order_and_supplemental_order_6-22-09_final_redacted.ex_-_ocr_0.pdf
- • June 25, 2009 — Implementation of the Foreign
- Intelligence Surveillance Court Authorized
- Business Records FISA
- https://www.eff.org/sites/default/files/filenode/nsa_business_records_fisa_redacted.ex_-_ocr_0.pdf
- • August 19, 2009 — Report of the United
- States with Attachments and Cover Letter
- https://www.eff.org/sites/default/files/filenode/4_september_09_production_final_redacted.ex_-_ocr_1.pdf
- • September 3, 2009 — Primary Order from the
- Foreign Intelligence Surveillance Court
- https://www.eff.org/sites/default/files/filenode/br_09-13_orders_signed_3_sept_09_final_redacted.ex_-_ocr_0.pdf
- • September 25, 2009 — Order Regarding Further
- Compliance Incidence from the Foreign Intelligence
- Surveillance Court
- https://www.eff.org/sites/default/files/filenode/br_09-13_-_september_25_order_regarding_further_compliance_incidents_final_redacted.ex_-_ocr_0.pdf
- • November 5, 2009 — Supplemental Opinion
- and Order from the Foreign Intelligence
- Surveillance Court
- https://www.eff.org/sites/default/files/filenode/br_09-15_supplemental_order_and_opinion_11-5-09_final_redacted.ex_-_ocr_0.pdf
- ¤ Gems Mined from the NSA Documents and
- FISA Court Opinions Released Today ::
- https://www.eff.org/deeplinks/2013/09/gems-mined-nsa-docs-released-today
- ¤ NSA FISA Business Records Offer a Lot
- to Learn (NSA Networks Not Encrypted) ::
- http://cryptome.org/2013/09/nsa-fisa-business-records.htm
- _______________________________________
- ¤ NSA Spy Community Architecture 2011 ::
- http://cryptome.org/2013/09/nsa-spy-architecture.pdf
- ¤ DNI Spy Community Architecture 2009 ::
- http://cryptome.org/2013/09/dni-spy-architecture.pdf
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ Keith’s Information Dominance Center ::
- http://cryptome.org/2013/09/info-dominance.pdf
- http://www.foreignpolicy.com/articles/2013/09/08/the_cowboy_of_the_nsa_keith_alexander?print=yes
- http://www.zerohedge.com/news/2013-09-15/man-charge-nsa-modeled-his-office-bridge-starship-enterprise
- _______________________________________
- ¤ Germany’s Domestic Spy Agency Hands
- Over Data to the NSA ::
- Germany’s Federal Office for the
- Protection of the Constitution regularly
- hands over classified data to the NSA,
- media report. The revelation comes as
- Edward Snowden’s leaks show that
- Germany’s foreign spy agencies share
- troves of data with the US and UK.
- Citing secret government documents,
- Suddeutsche Zeitung reported that
- Germany’s Federal Office for the
- Protection of the Constitution, charged
- with domestic security, works closely
- with the US and regularly sends them
- information.
- The security service gathers intelligence
- on internal security threats. The documents
- obtained by Sueddeutsche Zeitung recorded
- 864 data packages sent to the NSA, as
- well as regular meetings between officers
- of the German Federal Office and the NSA.
- http://rt.com/news/germany-shares-data-nsa-spying-858/
- _______________________________________
- ¤ Dutch Government Response to Snowden’s
- Revelations ::
- This is an unofficial translation.
- http://blog.cyberwar.nl/2013/09/dutch-govt-response-to-revelations-by.html
- On September 13th 2013, the Dutch
- government responded (.pdf, in Dutch)
- to the revelations by Edward Snowded.
- http://www.rijksoverheid.nl/bestanden/documenten-en-publicaties/kamerstukken/2013/09/14/kabinetsreactie-op-onthullingen-edward-snowden/nederlandse-kabinetsreactie-edward-snowden-13-sept-2013-1.pdf
- https://www.aivd.nl/publish/pages/2533/nederlandse_kabinetsreactie_edward_snowden_13_sept_2013.pdf
- _______________________________________
- ¤ NSA Spied Credit Card Transactions ::
- http://cryptome.org/2013/09/nsa-finance-spy-de.pdf
- http://cryptome.org/2013/09/nsa-finance-spy-slides.jpg
- http://www.spiegel.de/international/world/spiegel-exclusive-nsa-spies-on-international-bank-transactions-a-922276.html
- http://www.politico.com/story/2013/06/report-nsa-credit-card-transactions-92390.html
- http://weaselzippers.us/2013/06/06/wsj-report-nsa-tracking-credit-card-transactions-also-has-access-to-phone-records-from-att-and-sprint-along-with-verizon/
- _______________________________________
- ¤ NSA Brazil Spy Slides Decensored ::
- http://cryptome.org/2013-info/09/nsa-br-mx-3/nsa-br-mx-3.htm
- ¤ All SATC Slides, Brazil Spying Reports ::
- NSA_SATC_Slides.zip
- (54 files | ZIP | 3.37MB)
- http://filebeam.com/dacf6706b520431f2c4052484abd5b36
- Why does the NSA spy on Brazil?
- (1) The US wants to maintain global economic power,
- (2) the US wants to maintain control over major natural
- resources and (3) the US is afraid the new economic powers
- (within the BRICS) may destabilize their economic power
- and control over natural resources.
- _______________________________________
- ¤ A Font to Discourage NSA Snooping ::
- The ZXX font is designed to be difficult for
- machines to read.
- http://dl.dropbox.com/u/20517415/ZXX.zip
- http://reason.com/blog/2013/06/21/dont-want-the-nsa-to-read-your-email-use
- http://reason.com/archives/2013/09/14/a-font-to-discourage-nsa-snooping
- _______________________________________
- ¤ IETF Draft to Prevent NSA Intercepts ::
- http://cryptome.org/2013/09/prism-proof.htm
- http://www.ietf.org/id/draft-hallambaker-prismproof-req-00.txt
- _______________________________________
- ¤ NSA Targeted Israel for Surveillance,
- Also Sharing Data With Israeli SIGINT
- National Unit ::
- A copy of a top-secret deal inked
- in 2009 between the NSA and the
- Israeli Signals-intelligence National
- Unit (ISNU) was provided by NSA
- leaker Edward J. Snowden to the
- Guardian newspaper, which posted
- it Wednesday.
- It reveals that the NSA “routinely”
- passed to its Israeli counterpart
- raw signals intelligence, referred
- to as “SIGINT,” including the vast
- swathes of digital data traffic that
- the agency gathers under secret court
- authority from US Internet providers.
- So sensitive is this data that even
- before being disseminated to other US
- agencies, the NSA has to subject it
- to a court-mandated process called
- minimization, under which the names
- of any Americans are removed unless
- they are essential for foreign
- intelligence interest.
- But the US-Israeli agreement states
- that the data shared with Israel
- “includes, but is not limited to,
- unevaluated and unminimized transcripts,
- gists, facsimiles, telex, voice and
- Digital Network Intelligence metadata
- and content.”
- “NSA routinely sends ISNU minimized
- and unminimized raw collection associated
- with selectors from multiple Target office
- Primary Interest (TOPI) offices in Analysis
- and Production, S2 as part of SIGINT
- relationship between the two organizations.”
- http://cryptome.org/2013/09/nsa-israel-spy-share.pdf
- http://s3.documentcloud.org/documents/785495/doc1.pdf
- http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents
- http://www.washingtontimes.com/news/2013/sep/11/nsa-shares-raw-data-americans-israeli-spy-agency/
- http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/11/the-nsa-is-sharing-data-with-israel-before-filtering-out-americans-information/
- http://killerapps.foreignpolicy.com/posts/2013/09/11/irony_alert_nsa_targets_israel_and_still_gives_your_data_to_its_spies
- Other documents leaked by Mr. Snowden
- reveal that Israel was one of the nations
- that spy most aggressively against the
- United States.
- “To further safeguard our classified
- networks, we continue to strengthen
- insider threat detection capabilities
- across the Community. In addition, we
- are investing in target surveillance
- and offensive CI against key targets,
- such as China, Russia, Iran, Israel,
- Pakistan, and Cuba.” - Page 3
- http://cryptome.org/2013/08/spy-budget-fy13.pdf
- http://s3.documentcloud.org/documents/781537/cbjb-fy13-v1-extract.pdf
- http://thehill.com/blogs/global-affairs/middle-east-north-africa/319513-leaked-documents-reveal-us-sees-israel-as-a-major-spying-threat
- NOBODY comments
- Ironic NSA considers Israel an “insider
- threat” - meanwhile we provide them with
- plenty of inside information.
- However the NSA used cryptanalysis and
- exploitation against Brazil leadership
- and Brazil was never a “key target.”
- This reminds of a quote ;
- “What if all secret agencies were of one
- accord spiritually, like in the paintings
- of dogs playing poker, just using humanity
- to play out one big game of destruction
- and domination with humans as the visible
- and spiritual puppets?”
- _______________________________________
- ¤ DNI Releases Phone Metadata Spying Docs ::
- http://cryptome.org/2013/09/dni-13-0910.pdf
- _______________________________________
- ¤ Smartphones Are Gold Mines to NSA ::
- (EN)
- http://cryptome.org/2013/09/nsa-smartphones-en.pdf
- (DE)
- http://cryptome.org/2013/09/nsa-smartphones.pdf
- ¤ NSA Presentation You Won’t Believe ::
- Referring to customers as “zombies” is
- the sort of thing you’d expect from
- neckbearded hipsters and other self-
- proclaimed individualists who tend to
- take a dim view of any popular activity.
- It’s rather jarring to hear the lingo
- deployed in a government intelligence
- agency presentation.
- http://cryptome.org/2013/09/nsa-smartphones-en.pdf
- https://www.techdirt.com/articles/20130909/08582024452/steve-jobs-is-big-brother-smartphone-users-are-zombies-according-to-nsa-cell-phone-tapping-presentation.shtml
- http://www.infowars.com/steve-jobs-is-big-brother-and-smartphone-users-are-zombies-according-to-nsa-cell-phone-tapping-presentation/
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ DNI and NSA Blame Obama to Cover Up
- Violations Against a 2011 Court Order ::
- The Obama regime secretly won permission
- from a surveillance court in 2011 to
- reverse restrictions on the National
- Security Agency’s use of intercepted
- phone calls and e-mails, permitting
- the agency to search deliberately for
- Americans’ communications in its massive
- databases, ACCORDING TO INTERVIEWS WITH
- GOVERNMENT OFFICIALS and recently
- “declassified material” - (which, by
- the way, had NO classification, NO date,
- NO stamp, NO names, NO identification
- of which agency it came from and most
- shocking of all NO blackouts, odd.)
- http://www.dni.gov/files/documents/DNI%20Clapper%20Section%20702%20Declassification%20Cover%20Letter.pdf
- In addition, the court extended the
- length of time that the NSA is allowed
- to retain intercepted US communications
- from five years to six years — and more
- under special circumstances, according
- to the documents, which include a
- recently released 2011 opinion by US
- District Judge John D. Bates, then
- chief judge of the Foreign Intelligence
- Surveillance Court.
- http://www.washingtonpost.com/world/national-security/obama-administration-had-restrictions-on-nsa-reversed-in-2011/2013/09/07/c26ef658-0fe5-11e3-85b6-d27422650fd5_story.html
- NOBODY comments
- The document which was declassified by
- US intelligence officials explains the
- chief judge of the Foreign Intelligence
- Surveillance Court ruled the FAA 702
- upstream collection unconstitutional.
- http://cryptome.org/2013/08/fisa-shut-nsa-phone-records.pdf
- http://apps.washingtonpost.com/g/page/national/fisa-court-documents-on-illegal-nsa-e-mail-collection-program/409/
- http://www.washingtonpost.com/world/national-security/nsa-gathered-thousands-of-americans-e-mails-before-court-struck-down-program/2013/08/21/146ba4b6-0a90-11e3-b87c-476db8ac34cd_story.html
- National Security Agency analysts
- deliberately ignored restrictions on
- their authority to spy on Americans.
- http://www.bloomberg.com/news/2013-08-23/nsa-analysts-intentionally-abused-spying-powers-multiple-times.html
- NSA analysts admitted to abuse after
- the 2012 FISA Court audit was released.
- http://cryptome.org/2013/08/nsa-fisa-audit.pdf
- http://apps.washingtonpost.com/g/page/national/nsa-report-on-privacy-violations-in-the-first-quarter-of-2012/395/
- And this is not the first attempt to
- try to cover up their FISA violations.
- http://cryptome.org/2013/08/nsa-fisa-audit-note.pdf
- http://apps.washingtonpost.com/g/page/national/what-to-say-and-not-to-say-to-our-overseers/390/
- The new Washington Post report has
- linked to disinformation from a DNI
- (press) release exposing yet another
- attempt to dodge any criminal charges
- or take responsibility for the abuses
- exposed from the FISA Court audit.
- http://www.washingtonpost.com/world/national-security/obama-administration-had-restrictions-on-nsa-reversed-in-2011/2013/09/07/c26ef658-0fe5-11e3-85b6-d27422650fd5_story.html
- I suspect another attempt by the DNI
- and NSA to cover up FISA violations.
- Just blame the puppet-in-charge, Obama,
- to use as a scapegoat - go figure.
- All of this information is backed up
- and will be mirrored soon. Meanwhile,
- here is the leaked 2012 audit exposing
- 2,776 violations one year after the
- FISA Court order.
- http://cryptome.org/2013/08/nsa-fisa-audit.pdf
- As for Congress they will lay down like
- a bunch of leashed dogs who are getting
- kickbacks for doing nothing to prevent
- this abuse nor fix any problems. I will not
- link to their PR circus stunts anymore and
- I encourage voters to throw a majority of
- them out of office come next election.
- _______________________________________
- ¤ Snowden, NSA, and Counterintelligence? ::
- http://20committee.com/2013/09/04/snowden-nsa-and-counterintelligence/
- _______________________________________
- ¤ NSA SATC Slide [Images] Leak ::
- http://www.youtube.com/watch?v=XlkHBB3-DhY
- Screen shots of Brazilian Fanstastico
- TV show on NSA spying Brazil and Mexico
- presidents, aired 1 September 2013. ▼
- http://cryptome.org/2013-info/09/nsa-br-mx/nsa-br-mx.htm
- ¤ NSA Spying Brazil, Mexico Presidents ::
- Translation by Google, tidied by Cryptome.
- http://cryptome.org/2013/09/nsa-spying-brazil.htm
- ¤ NSA SATC Eavesdropping Case Study ::
- http://electrospaces.blogspot.com/2013/09/an-nsa-eavesdropping-case-study.html
- ▲ All 14 SATC Slides Released (Mirrored) ::
- http://up.inet.ge/download.php?file=eb9465849119fa5efe4256304d2c5630
- http://filebeam.com/eb9465849119fa5efe4256304d2c5630
- http://tishare.com/y7ldwxx397kl.htm
- http://f.lui.li/get_822_b946.html
- ¤ Brazil Senate Committee to Probe Espionage ::
- Brazil’s senate has formed an Investigative
- Parliamentary Commission to follow up on
- reports that the US National Security Agency
- (NSA) spied on Brazilian Prez Dilma Rousseff.
- “We intend to protect national sovereignty,”
- Xinhua quoted Senator Vanessa Graziotin of
- the Communist Party of Brazil as saying
- Tuesday.
- The committee, comprising 11 main members
- and seven substitutes, initially has 180
- days to investigate claims that the NSA
- monitored emails between Rousseff and
- several of her top aides, and tapped
- her phone.
- http://news.yahoo.com/brazil-senate-committee-probe-us-spying-032012289.html
- ¤ BLOWBACK ; US/Brazil Bilateral Relation
- Impacted ::
- Revelations of a US spy program that
- allegedly allows digital surveillance
- of the presidents of Brazil and Mexico
- have drawn cries of indignation and anger
- in both nations, but the fallout may be
- strongest for US-Brazil relations.
- At stake is whether Brazilian Prez Dilma
- Rousseff will cancel a planned state
- visit to Washington in October, the
- first offered by Prez Barack Obama this
- year, or will take action on digital
- security that may affect US companies
- such as Google, Facebook and Yahoo.
- Rousseff is reported to be considering
- a proposal that would suspend operations
- of companies that cooperate with the
- NSA or US intelligence agencies.
- http://www.mcclatchydc.com/2013/09/03/201125/nsa-leak-might-lead-to-cancellation.html
- _______________________________________
- ¤ ACLU Sues the NSA Update 02 ::
- http://thehill.com/blogs/hillicon-valley/technology/320357-nra-claims-nsa-illegally-created-a-gun-database
- ¤ ACLU Sues the NSA Update 01 ::
- http://www.theguardian.com/world/2013/aug/27/nsa-surveillance-program-illegal-aclu-lawsuit
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ Top Secret US Spy Budget FY 2013 Vol 1 ::
- “We are bolstering our support for
- clandestine SIGINT capabilities to
- collect against high priority targets,
- including foreign leadership targets.
- Also, we are investing in groundbreaking
- cryptanalytic capabilities to defeat
- adversarial cryptography and exploit
- internet traffic.”
- http://cryptome.org/2013/08/spy-budget-fy13.pdf
- http://s3.documentcloud.org/documents/781537/cbjb-fy13-v1-extract.pdf
- ▲ Snapshots of Budget Exhibit ::
- http://cryptome.org/2013/08/spy-budget-fy13-exhibit-13.pdf
- http://cryptome.org/2013/08/spy-tidbits.pdf
- ▼ US Spy Budget FY 2013 - Spoon Fed ::
- “The Post is withholding some information
- after consultation with US officials who
- expressed concerns about the risk to
- intelligence sources and methods.
- Sensitive details are so pervasive in
- the documents that The Post is publishing
- only summary tables and charts online.”
- http://www.washingtonpost.com/world/national-security/black-budget-summary-details-us-spy-networks-successes-failures-and-objectives/2013/08/29/7e57bb78-10ab-11e3-8cdd-bcdc09410972_story.html
- ▲ Declassified, Censored US Spy Budget
- FY 2013 Vol 4 ::
- http://cryptome.org/2013/08/spy-budget-fy13-v4.pdf
- http://www.fas.org/irp/nro/fy2013cbjb.pdf
- ▲ Declassified, Censored US Spy Budget
- FY 2013 Vol 12 ::
- http://cryptome.org/2013/08/spy-budget-fy13-v12.pdf
- http://www.fas.org/irp/dni/cbjb-2013.pdf
- ¤ Intelligence vs Intelligence ::
- The Obama regime views Israel as one
- of the top spying threats facing it’s
- intelligence services, leaked documents
- reveal.
- “Israel should be assumed to continue
- to have an aggressive intelligence
- collection operations against the
- United States,” Pillar said. While
- much information is collected through
- traditional political contacts, “I
- would personally have no doubt that
- that is supplemented by whatever means
- they can use to find out as much as
- they can about what we’re doing,
- thinking, deciding on anything of
- interest to Israel, which would include
- just about any Middle Eastern topic.”
- http://thehill.com/blogs/global-affairs/middle-east-north-africa/319513-leaked-documents-reveal-us-sees-israel-as-a-major-spying-threat
- From US Spy Budget FY 2013 Vol 1 ...
- “To further safeguard our classified
- networks, we continue to strengthen
- insider threat detection capabilities
- across the Community. In addition, we
- are investing in target surveillance
- and offensive CI against key targets,
- such as China, Russia, Iran, Israel,
- Pakistan, and Cuba.”
- _______________________________________
- ¤ NSA Exploit Isn’t Crypto, It’s SMTP ::
- “The crypto is the easy part. The hard
- part is the traffic analysis, of which
- the worst part is the Received headers.
- Everyone should look at their own headers
- -- especially people on this list and
- at least comprehend that your email
- geotracks you forever, as it’s all in
- the Mailman archive.
- There are plenty of other leaks like
- Message-ID, Mime-Version, X-Mailer,
- the actual separators in MIME part
- breaks, and so on.
- It’s absolutely correct that some
- combination of VPNs, Tor, remailers of
- whatever stripe, and so on can help
- with this, but we’re all lazy and we
- don’t do it all the time.
- What we’re learning from Snowden is
- that they’re doing traffic analysis --
- analyzing movements, social graphs,
- and so on and so forth. The irony here
- is that this tells us that the crypto
- works. That’s where I’ve been thinking
- for quite some time.
- Imagine that you’re a SIGINT group trying
- to deal with the inevitability of crypto
- that works being deployed everywhere.
- What do you do? You just be patient and
- start filling in scatter plots of traffic
- analysis.
- The problem isn’t the crypto, it’s SMTP.”
- http://cryptome.org/2013/08/callas-nsa-smtp.htm
- ¤ NSA Trying to Break Encryption ::
- Among the NSA’s annual budget of $52.6
- billion are requests to bankroll ground-
- breaking cryptanalytic capabilities that
- can beat cryptography and mine regular
- Internet traffic, new documents leaked
- by Edward Snowden to the Washington Post
- reveal.
- http://news.cnet.com/8301-13578_3-57600647-38/nsa-seeks-groundbreaking-spying-powers-new-leak-reveals/
- “We are bolstering our support for
- clandestine SIGINT capabilities to
- collect against high priority targets,
- including foreign leadership targets.
- Also, we are investing in groundbreaking
- cryptanalytic capabilities to defeat
- adversarial cryptography and exploit
- internet traffic.” ... ...
- Processing & Exploitation 15% of budget.
- Cryptanalysis & Exploitation Services ;
- Analysis of Target Systems, Cryptanalytic
- IT Systems, Cyber Cryptanalysis, Exploitation
- Solutions, Microelectronics, PEO Program,
- PEO Program B, PEO Program C, Target Pursuit,
- Target Reconnaissance & Survey.
- SIGINT Stations ; Cryptologic Centers,
- Field Sites, OCMC, SIGINT Ground Operations.
- http://cryptome.org/2013/08/spy-budget-fy13.pdf
- http://s3.documentcloud.org/documents/781537/cbjb-fy13-v1-extract.pdf
- ¤ NSA Rigging the Crypto Market Repost ::
- http://cryptome.org/jya/nsa-sun.htm
- ▲ NSA May Have SSL Encryption Keys ::
- The US government has attempted to
- obtain the master encryption keys that
- Internet companies use to shield millions
- of users’ private web communications
- from eavesdropping.
- These demands for master encryption keys,
- which have not been disclosed previously,
- represent a technological escalation in
- the clandestine methods that the FBI and
- the National Security Agency employ when
- conducting electronic surveillance against
- Internet users. ... ...
- Leaked NSA surveillance procedures,
- authorized by Attorney General Eric
- Holder, suggest that intercepted domestic
- communications are typically destroyed
- -- unless they’re encrypted. If that’s
- the case, the procedures say, “retention
- of all communications that are enciphered”
- is permissible.
- http://news.cnet.com/8301-13578_3-57595202-38/feds-put-heat-on-web-firms-for-master-encryption-keys/
- _______________________________________
- ¤ NSA Arrangements with Foreign Internet
- Providers and Foreign Intelligence ::
- “The NSA started setting up Internet
- intercepts well before 2001, former
- intelligence officials say. Run by NSA’s
- secretive Special Services Office,
- these types of programs were at first
- designed to intercept communications
- overseas through arrangements with
- foreign Internet providers, the former
- officials say. NSA still has such
- arrangements in many countries,
- particularly in the Middle East and
- Europe, the former officials say.”
- http://electrospaces.blogspot.com/2013/08/nsa-has-also-arrangements-with-foreign.html
- ¤ NSA’s Global Surveillance ::
- http://online.wsj.com/public/resources/documents/WSJ-NSAB08202013.jpg
- http://www.presstv.ir/detail/2013/08/21/319731/nsa-surveillance-new-detail/
- http://www.dailypaul.com/296515/wsj-new-details-show-broader-nsa-surveillance-reach-programs-cover-seventy-five-of-nations-traffic
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ Another Loophole Around FISA Laws for
- the NSA - Postpone Timestamp Process ::
- A common hacking technique can be used
- to make emails look as if they came from
- outside the United States.
- http://paste.servut.us/wsiq
- _______________________________________
- ¤ Google and the NSA ; Who’s Holding the
- Shit-Bag Now? ::
- http://cryptome.org/2013/08/assange-google-nsa.htm
- http://thestringer.com.au/google-and-the-nsa-whos-holding-the-shit-bag-now
- ▲ Related ; Surveillance Industry Profit ::
- http://rt.com/usa/nsa-payed-internet-companies-911/
- http://www.infowars.com/leaked-document-reveals-government-paid-millions-to-prism-participants/
- http://www.theguardian.com/world/2013/aug/23/nsa-prism-costs-tech-companies-paid
- http://www.informationweek.com/security/government/nsa-paid-tech-companies-millions-for-pri/240160383
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ Judge Walton FISA Letter to Senator
- Patrick Leahy ::
- http://cryptome.org/2013/08/walton-leahy-13-0729.pdf
- ¤ USA to Provide Declassified FISA Documents ::
- http://cryptome.org/2013/08/usa-fisa-13-0729.pdf
- _______________________________________
- ¤ NSA Analysts Admit Deliberate Abuse ::
- Some National Security Agency analysts
- deliberately ignored restrictions on
- their authority to spy on Americans
- multiple times in the past decade,
- contradicting Obama regime officials’
- and lawmakers’ statements that no
- willful violations occurred. ...
- Legal opinions declassified on Aug. 21
- revealed that the NSA intercepted as
- many as 56,000 electronic communications
- a year of Americans who weren’t suspected
- of having links to terrorism, before a
- secret court that oversees surveillance
- found the operation unconstitutional
- in 2011.
- http://www.bloomberg.com/news/2013-08-23/nsa-analysts-intentionally-abused-spying-powers-multiple-times.html
- ¤ FISA Court Shut Down NSA’s Authority to
- Collect Domestic Calls (FAA 702 Upstream)
- in 2011 but the NSA Kept Collecting ::
- The 86-page document, which was declassified
- by US intelligence officials Wednesday,
- explains why the chief judge of the Foreign
- Intelligence Surveillance Court ruled the
- collection method unconstitutional. ...
- The documents were released in response
- to a Freedom of Information Act lawsuit
- filed by the Electronic Frontier Foundation.
- “It’s unfortunate it took a year of
- litigation and the most significant leak
- in American history to finally get them
- to release this opinion,” EFF staff
- attorney Mark Rumold said Wednesday,
- “but I’m happy that the administration
- is beginning to take this debate seriously.”
- http://cryptome.org/2013/08/fisa-shut-nsa-phone-records.pdf
- http://apps.washingtonpost.com/g/page/national/fisa-court-documents-on-illegal-nsa-e-mail-collection-program/409/
- http://www.washingtonpost.com/world/national-security/nsa-gathered-thousands-of-americans-e-mails-before-court-struck-down-program/2013/08/21/146ba4b6-0a90-11e3-b87c-476db8ac34cd_story.html
- ¤ NSA Audit of 2,776 FISA Violations ::
- http://cryptome.org/2013/08/nsa-fisa-audit.pdf
- http://apps.washingtonpost.com/g/page/national/nsa-report-on-privacy-violations-in-the-first-quarter-of-2012/395/
- ¤ NSA Fudging FISA Violations ::
- http://cryptome.org/2013/08/nsa-fisa-audit-note.pdf
- http://apps.washingtonpost.com/g/page/national/what-to-say-and-not-to-say-to-our-overseers/390/
- ¤ Leaked NSA Audit Found Agency Broke
- Privacy Rules Thousands of Times ::
- http://apps.washingtonpost.com/g/page/national/nsa-report-on-privacy-violations-in-the-first-quarter-of-2012/395/
- http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story_1.html
- http://www.dailybinarynews.com/leaked-nsa-audit-found-agency-broke-privacy-rules-thousands-of-times/
- http://www.dailybinarynews.com/wapo-nsa-broke-privacy-rules-thousands-of-times-harms-uncertain/
- http://www.infowars.com/uncontrolled-by-fisa-court-nsa-commits-thousands-of-privacy-violations-per-year/
- http://www.theguardian.com/world/2013/aug/16/nsa-violated-privacy-rules-audit
- The account is based on top-secret
- documents and a May 2012 internal NSA
- audit that found 2,776 infractions –
- including unauthorized collection,
- storage, access to or distribution of
- legally protected communications – in
- the preceding 12 months alone. The audit,
- originally only meant to be seen by top
- NSA leaders, only accounted for violations
- at NSA headquarters at Fort Meade, Virginia,
- and other locations in the Washington DC
- region.
- ▲ NSA Claims to Have Zero Tolerance Policy ::
- “I do think in a lot of the headlines
- and other things, there’s people talking
- about privacy violations or abuses or
- willful or violations, right, it is
- important for people to understand,
- NSA has a zero tolerance policy for
- willful misconduct. Zero. That’s our
- tolerance, it’s very simple.
- Right, we do realize mistakes do occur.
- We detect them, as early as we can.
- We correct them, right. None of the
- mistakes, the incidents that were in
- the document released were willful.
- Right, it doesn’t mean that we have
- any desire to have any mistakes; it
- doesn’t mean we think a mistake is okay.”
- http://cryptome.org/2013/08/nsa-13-0816.pdf
- ¤ NSA Reveals That It Does 20,000,000
- Database Queries Per Month ::
- http://www.techdirt.com/articles/20130819/02153624228/nsa-reveals-that-it-does-20-million-database-queries-per-month.shtml
- ¤ Breaking Down Mass NSA Spying & Lies ::
- http://www.infowars.com/you-wont-believe-whats-going-on-with-government-spying-on-americans/
- _______________________________________
- ¤ UK GCHQ Bude and NSA Exchange Data ::
- Britain runs a secret internet-monitoring
- station in the Middle East to intercept
- and process vast quantities of emails,
- telephone calls and web traffic on behalf
- of Western intelligence agencies, The
- Independent has learnt. ... ...
- The information is then processed for
- intelligence and passed to GCHQ in
- Cheltenham and shared with the National
- Security Agency (NSA) in the United States.
- The Government claims the station is a
- key element in the West’s “war on terror”
- and provides a vital “early warning”
- system for potential attacks around
- the world.
- The Independent is not revealing the
- precise location of the station but
- information on its activities was
- contained in the leaked documents
- obtained from the NSA by Edward Snowden.
- The Guardian newspaper’s reporting on
- these documents in recent months has
- sparked a dispute with the Government,
- with GCHQ security experts overseeing
- the destruction of hard drives containing
- the data. ... ...
- The data-gathering operation is part of
- a £1,000,000,000 internet project still
- being assembled by GCHQ. It is part of
- the surveillance and monitoring system,
- code-named “Tempora”, whose wider aim is
- the global interception of digital
- communications, such as emails and text
- messages.
- Across three sites, communications –
- including telephone calls – are tracked
- both by satellite dishes and by tapping
- into underwater fibre-optic cables.
- http://www.independent.co.uk/news/uk/politics/exclusive-uks-secret-mideast-internet-surveillance-base-is-revealed-in-edward-snowden-leaks-8781082.html
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ Backbone Wiretaps to Backdoor Microcode ::
- http://cryptome.org/2013/08/callas-snowden.htm
- _______________________________________
- ¤ FISA Reauthorization to John Boehner,
- Harry Reid, Nancy Pelosi, Mitch McConnell,
- Mike Rodgers, Dutch Ruppersberger, Lamar
- Smith, John Conyers Jr, Dianne Feinstein,
- Sexby Chambliss, Patrick J Leahy, Charles
- E Grassley ::
- http://cryptome.org/2013/08/fisa-dni-12-0326.pdf
- http://cryptome.org/2013/08/fisa-dni-ag-12-0208.pdf
- ¤ FISA 2008 Heavy Censorship March 2009 ::
- http://cryptome.org/2013/08/fisa-march-2009.pdf
- ¤ FISA 2008 Heavy Censorship May 2010 ::
- http://cryptome.org/2013/08/fisa-may-2010.pdf
- ¤ FISA 2008 Heavy Censorship December 2009 ::
- http://cryptome.org/2013/08/fisa-december-2009.pdf
- ¤ FISA Horse Droppings ::
- http://cryptome.org/2013/08/fisa-droppings.htm
- ¤ FISA Documents Withheld From Most of
- Congress ::
- “I can now confirm that the House
- Permanent Select Committee on Intelligence
- did NOT, in fact, make the 2011 document
- available to Representatives in Congress,
- meaning that the large class of Representatives
- elected in 2010 did not receive either of
- the now declassified documents detailing
- these programs.” - Justin Amash
- http://www.theguardian.com/world/2013/aug/12/intelligence-committee-nsa-vote-justin-amash
- http://www.infowars.com/amash-nsa-docs-were-withheld-from-congress-by-higher-ups/
- ▼
- http://www.youtube.com/watch?v=4Sg4AtcW0LU
- Youtube video ; 27:18 “So on this program,
- 100% audibility on every query that we make.
- And that is overseen by our Inspector General,
- our General Council. In 2009 in our
- discussions with the president when he
- first came on board we talked to him about
- these programs and the issue was how do
- we know the compliance is there and what
- more could we do? We stood up working with
- the COMMITTEES IN CONGRESS a directorate
- of compliance. This directorate of
- compliance is headed by legal professionals
- and information specialists that can look
- at everything that we do in these programs
- and ensure they (comply ?) with the court
- orders but we also have oversight from
- the Director of National Intelligence,
- General Council and IEG, from the Defense
- Department, from the Department of Justice,
- from the White House, FROM CONGRESS, the
- Intel(ligence) committees and from the
- courts.” - Keith Alexander
- _______________________________________
- ¤ EU Privacy Watchdogs Seek PRISM Slides ::
- Only 9 out of 41 slides have become
- public so far.
- http://cnsnews.com/news/article/eu-privacy-watchdogs-seek-details-nsa-spying
- _______________________________________
- ¤ NEVER LET SURVEILLANCE SHUT YOU UP ::
- http://online.wsj.com/article/SB10001424127887323639704579015101857760922.html
- _______________________________________
- ¤ NSA Funds New “Top Secret” $60,000,000
- Data Lab ::
- http://www.infowars.com/nsa-funds-new-top-secret-60-million-dollar-data-lab/
- http://www.newsobserver.com/2013/08/15/3109412/nc-state-teams-up-with-nsa-on.html
- _______________________________________
- ¤ What the NSA’s Massive Org Chart
- (Probably) Looks Like ::
- http://www.defenseone.com/ideas/2013/08/what-nsas-massive-org-chart-probably-looks/68642/
- http://www.mindmeister.com/308518551/the-national-security-agency-operates-more-than-500-separate-signals-intelligence-platforms-employs-roughly-30-000-civilians-and-military-budget-10-billion
- http://cdn.govexec.com/media/gbc/docs/pdfs_edit/d1nsaorgmapimg.jpg
- _______________________________________
- ¤ NSA Spying Under Fire in Latin America ::
- The massive NSA snooping revelations
- have cast a shadow over John Kerry’s
- trip to Latin America – his first visit
- there since he assumed the position
- of Secretary of State. He has already
- received a chilly reception in Colombia
- – where officials demanded an explanation
- to reports that Washington had collected
- vast amounts of internet data there.
- The next stop on his trip is Brazil –
- which allegedly was the top regional
- target of the surveillance program.
- http://www.youtube.com/watch?v=fpRPnc6Ucy8
- http://sgtreport.com/2013/08/kerry-on-damage-control-nsa-spying-under-fire-in-latin-america/
- ¤ Brazil Demands Clarifications on NSA
- Surveillance ::
- http://www.youtube.com/watch?v=txCcJ0wqdFc
- http://www.youtube.com/watch?v=cv1WjVI3lQA
- http://news.yahoo.com/brazil-demands-clarifications-nsa-surveillance-200545031.html
- _______________________________________
- ¤ Ten Operational Directorates of NSA ::
- http://williamaarkin.wordpress.com/2013/08/13/nsa-a-little-help-with-transparency/
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA Strategy and Core Values ::
- http://www.nsa.gov/about/_files/nsacss_strategy.pdf
- http://cryptome.org/2013/08/nsa-strategy-values.htm
- ¤ NSA Deputy Director on NSA Core Values ::
- http://www.nsa.gov/about/values/core_values.shtml
- http://cryptome.org/2013/08/nsa-core-values-inglis.htm
- _______________________________________
- ¤ Edward Snowden Speaks to Peter Maass ::
- http://www.nytimes.com/2013/08/18/magazine/snowden-maass-transcript.html
- http://cryptome.org/2013/08/snowden-maass.htm
- _______________________________________
- ¤ Detail Into FAA Section 702 ::
- http://www.theguardian.com/world/2013/aug/09/nsa-loophole-warrantless-searches-email-calls
- “While the FAA 702 minimization procedures
- approved on 3 October 2011 now allow for
- use of certain United States person names
- and identifiers as query terms when reviewing
- collected FAA 702 data, analysts may NOT/NOT
- implement any USP queries until an effective
- oversight process has been developed by NSA
- and agreed to by DOJ/ODNI. Until further
- notice, collected FAA 702 data (702 data is
- contained in MARINA, MAINWAY, NUCLEON, PINWALE
- (Sweet* and Sour* partitions) and other
- databases).”
- http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2013/8/9/1376060880108/FAA-document-001.jpg
- NOBODY comments
- Refer to this leaked FISA document.
- http://cryptome.org/2013/06/nsa-fisa-minimization.pdf
- Under the FISA minimization, section 3
- (b) (2) “Monitoring, Recording, and
- Processing (U)” the NSA can hold domestic
- communications not related to foreign
- information or foreign activity for up
- to five years.
- Found in section 3 (1) “Such inadvertently
- acquired communications of or concerning a
- United States person may be retained no
- longer than five years in any event.”
- Under the FISA minimization, section 5
- “Domestic Communications (U)” there is
- more than one loophole the NSA can use to
- be granted authorization to snoop domestic
- communications that have been stored.
- Look into section 5, sub-sections (2) and
- (3). ║ (2) refers to criminal activity and
- *suspected* criminal activity. (3) refers
- to “communications security vulnerability”
- both being used as excuses to snoop.
- _______________________________________
- ¤ NSA ; Adobe Reader Very Vulnerable ::
- http://cryptome.org/2013/08/nsa-adobe-reader-XI.pdf
- _______________________________________
- ¤ NSA ; Mobility Capability Package ::
- http://cryptome.org/2013/08/nsa-mobility-capability.pdf
- _______________________________________
- ¤ Obama Meets With Third-Party Corporate
- Executives Behind Closed Doors ::
- As the steady stream of revelations
- continues, the White House has choosen
- to meet quietly with tech executives and
- consumer groups behind closed doors.
- http://www.politico.com/story/2013/08/tim-cook-barack-obama-technology-95362.html
- _______________________________________
- ¤ Obama Press Conference on NSA Spying ::
- http://cryptome.org/2013/08/obama-nsa-13-0809.htm
- ¤ Luke Rudkowski Talks About Obama’s NSA
- Spying Press Conference ::
- Luke Rudkowski breaks down today’s
- Presidential press conference in which the
- focus was predominantly on the NSA spying
- program. Luke points out many of the lies
- that Obama told today about the program
- by citing multiple articles with information
- that completely contradict what Obama said.
- http://www.youtube.com/watch?v=adZyfrcvtgg
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA Missions, Authorities, Oversight,
- Partners ::
- http://cryptome.org/2013/08/nsa-13-0809.pdf
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ DoJ ; NSA Bulk Collection of Telephony
- Metadata ::
- http://cryptome.org/2013/08/doj-13-0809.pdf
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ National Security Run Amok ::
- http://www.washingtontimes.com/news/2013/aug/9/paul-national-security-run-amok/
- _______________________________________
- The Western Center for Journalism released
- a video briefing over Russel Tice former
- NSA whistleblower and his story about
- blackmailing former senator Barack Obama.
- http://www.youtube.com/watch?v=K31xCh6f_VY
- Abby Martin talks to Russell Tice, former
- intelligence analyst and original NSA
- whistleblower, about how the recent NSA
- scandal is only scratches the surface of
- a massive surveillance apparatus, citing
- specific targets the he saw spying orders
- for including former senators Hillary
- Clinton and Barack Obama.
- http://www.youtube.com/watch?v=d6m1XbWOfVk
- ¤ Boiling Frogs Post Podcast Show of NSA
- whistleblower Russell Tice ::
- http://www.youtube.com/watch?v=2DmN80yi5mo
- http://www.boilingfrogspost.com/podpress_trac/web/20927/0/BF.0112.Tice_20130617.mp3
- ¤ Corbett Report ; NSA Wiretapped Obama,
- Petraeus, Alito, and Others ::
- http://www.youtube.com/watch?v=H1ZAzu_0YZU
- Ron Paul talks about NSA spying and
- why they want to sweep it under the rug.
- http://www.youtube.com/watch?v=0h4yOr-27mA
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA and Spying Nicknames and Codewords ::
- http://electrospaces.blogspot.com/p/nicknames-and-codewords.html
- ¤ NSA’s Code Names Revealed (2012) ::
- http://williamaarkin.wordpress.com/2012/03/13/nsa-code-names-revealed/
- NOBODY comments
- RAGTIME is the codename for Stellar Wind.
- This operation was debated years ago, yet
- the document was still classified. It was
- leaked to cryptome.org last month. ▼
- http://cryptome.org/2013/06/nsa-stellar-wind.pdf
- OCELOT and STORMBREW are both managed
- by Stu Bathurst - both telephony data
- grabbing operations. RAGTIME sponsored
- many of these operations being leaked.
- _______________________________________
- ¤ Uncensored NSA FAIRVIEW Slides Air
- on Brazilian Television ::
- http://www.youtube.com/watch?v=kOAv7zbJkCk
- http://www.dailydot.com/news/nsa-fairview-slides-brazil-spying/
- http://cryptome.org/2013/08/nsa-codenames.htm
- NOBODY comments
- Upstream collection via FAA 702 includes
- FAIRVIEW, STORMBREW, BLARNEY and OAKSTAR.
- Original leaks of FAIRVIEW slides censored
- program managers - for FAIRVIEW “Craig Hicks”
- and for STORMBREW “Stu Bathurst.” ▼
- http://postimg.org/image/9viuxblpd/
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ Transfers From Germany Aid US Surveillance,
- English Report ::
- German intelligence sends massive amounts
- of intercepted data to the NSA, according
- to documents from whistleblower Edward
- Snowden, which SPIEGEL has seen. The
- trans-Atlantic cooperation on technical
- matters is also much closer than first
- thought. ... ...
- Day after day and month after month,
- the BND passes on to the NSA massive
- amounts of connection data relating
- to the communications it had placed
- under surveillance. The so-called
- metadata -- telephone numbers, email
- addresses, IP connections -- then flow
- into the Americans’ giant databases.
- http://www.spiegel.de/international/world/german-intelligence-sends-massive-amounts-of-data-to-the-nsa-a-914821.html
- ¤ Transfers from Germany Aid US Surveillance,
- Deutsch Report ::
- http://cryptome.org/2013/08/der-spiegel-13-0804.pdf
- ¤ Germany Nixes Spy Pact With US, UK (?) ::
- http://bigstory.ap.org/article/germany-nixes-surveillance-pact-us-britain
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA XKEYSCORE Slides, 2008 ::
- http://cryptome.org/2013/07/nsa-xkeyscore.pdf
- http://www.slideshare.net/xkeyscore/xkeyscore-nsa-program-presentation
- http://www.documentcloud.org/documents/743244-xkeyscore-slidedeck.html
- ¤ XKEYSCORE God-terminal Into Internet ::
- http://www.dw.de/xkeyscore-a-god-terminal-into-internet/a-16994780
- The latest revelations will add to the intense public
- and congressional debate around the extent of NSA
- surveillance programs. They come as senior intelligence
- officials testify to the Senate judiciary committee on
- Wednesday, releasing classified documents in response to
- the Guardian’s earlier stories on bulk collection of
- phone records and FISA surveillance court oversight.
- http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation
- http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
- http://www.reuters.com/article/2013/07/31/us-usa-security-intelligence-idUSBRE96U03320130731
- http://www.washingtontimes.com/news/2013/jul/31/declassified-documents-show-nsa-snooping-had-compl/
- ¤ NSA XKeyscore Produced by SAIC ::
- http://cryptome.org/2013/08/nsa-xkeyscore-saic.htm
- ¤ NSA Press Statement on XKEYSCORE ::
- http://cryptome.org/2013/07/nsa-xkeystore.htm
- http://www.nsa.gov/public_info/press_room/2013/30_July_2013.shtml
- ¤ NSA X-KEYSCORE Server Locations ::
- http://cryptome.org/2013/08/nsa-x-keyscore-servers.htm
- ¤ NSA X-KEYSCORE Global Cyber-espionage ::
- http://cryptome.org/2013/08/nsa-x-keyscore-family.htm
- ¤ Instrument of Mass Surveillance ::
- http://www.infowars.com/xkeyscore-instrument-of-mass-surveillance/
- ¤ NSA’s X-Keyscore One of Many More ::
- http://www.infowars.com/nsas-x-keyscore-one-of-many-surveillance-programs-used-on-americans/
- ¤ RAGTIME and X-KEYSCORE @ Fort Meade ::
- “At Fort Meade, a program called
- XKEYSCORE processes all signals before
- they are shunted off to various “production
- lines” that deal with specific issues.
- PINWALE is the main NSA database for
- recorded signals intercepts. It is
- compartmentalized by keywords (the NSA
- calls them “selectors”). Metadata is
- stored in a database called MARINA and
- is generally retained for five years.
- ... ...
- “Congress repeatedly resisted the
- entreaties of the Bush Administration
- to change the surveillance laws once the
- RAGTIME program had been institutionalized.
- This was for a simple reason: they did
- not want to be responsible for a program
- that was not legal.”
- https://www.law.upenn.edu/live/files/1718-ambinder10-things.pdf
- NOBODY comments
- Under the FISA minimization, section 3
- (b) (2) “Monitoring, Recording, and
- Processing (U)” the NSA can hold domestic
- communications not related to foreign
- information or foreign activity for up
- to five years.
- This confirms an XKeyscore presentation
- posted by the Guardian regarding the
- metadata aggregation to PINWALE databank
- seen in the DNI discovery options.
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA Pays £100,000,000 in Secret Funding
- for GCHQ Bude ::
- http://www.theguardian.com/uk-news/2013/aug/01/nsa-paid-gchq-spying-edward-snowden
- _______________________________________
- ¤ Other Agencies Clamor for Data NSA
- Compiles but Claim Rejections ::
- Agencies working to curb drug trafficking,
- cyberattacks, money laundering,
- counterfeiting and even copyright
- infringement complain that their
- attempts to exploit the security
- agency’s vast resources have often
- been turned down because their own
- investigations are not considered a
- high enough priority, current and
- former government officials say.
- Intelligence officials say they have
- been careful to limit the use of the
- security agency’s troves of data and
- eavesdropping spyware for fear they
- could be misused in ways that violate
- Americans’ privacy rights. ...
- “It’s a very common complaint about
- NSA,” said Timothy H. Edgar, a former
- senior intelligence official at the
- White House and at the office of the
- director of national intelligence.
- “They collect all this information,
- but it’s difficult for the other
- agencies to get access to what
- they want.”
- http://www.nytimes.com/2013/08/04/us/other-agencies-clamor-for-data-nsa-compiles.html?hp&_r=0
- _______________________________________
- ¤ NSA’s Keith Alexander Remarks at Aspen
- Security Forum ::
- http://cryptome.org/2013/07/nsa-aspen.pdf
- ¤ NSA’s Keith Alexander Remarks at AFCEA
- Conference ::
- http://cryptome.org/2013/07/nsa-afcea.pdf
- ¤ NSA’s Keith Alexander Remarks at Blackhat
- Conference ::
- http://www.youtube.com/watch?v=4Sg4AtcW0LU
- https://soundcloud.com/larrymagid/nsa-director-general-keith
- http://cryptome.org/2013/08/nsa-13-0731.pdf
- Youtube video ; 27:18 “So on this program,
- 100% audibility on every query that we make.
- And that is overseen by our Inspector General,
- our General Council. In 2009 in our
- discussions with the president when he
- first came on board we talked to him about
- these programs and the issue was how do
- we know the compliance is there and what
- more could we do? We stood up working with
- the committees in Congress a directorate
- of compliance. This directorate of
- compliance is headed by legal professionals
- and information specialists that can look
- at everything that we do in these programs
- and ensure they (comply ?) with the court
- orders but we also have oversight from
- the Director of National Intelligence,
- General Council and IEG, from the Defense
- Department, from the Department of Justice,
- from the White House, from Congress, the
- Intel(ligence) committees and from the
- courts.” - Keith Alexander
- ▲ NSA’s Keith Alexander Angers a Few at
- Blackhat Conference ::
- “Read the constitution” someone shouts.
- “I did, you should too” replied Keith.
- http://www.infowars.com/security-consultant-heckles-nsa-head-shouts-freedom-read-the-constitution/
- http://www.forbes.com/sites/andygreenberg/2013/07/31/nsa-director-heckled-at-conference-as-he-asks-for-security-communitys-understanding/
- ¤ NSA’s Keith Alexander Remarks to Workforce ::
- http://cryptome.org/2013/07/nsa-workforce.htm
- http://www.nsa.gov/public_info/speeches_testimonies/25jun13_dir.shtml
- _______________________________________
- ¤ Obama Releases Three Patriot Act Docs ::
- http://cryptome.org/2013/07/obama-releases-13-0731.pdf
- ¤ US Outlines NSA Culling of Data for
- All Domestic Calls ::
- On Wednesday, the Obama regime released
- three documents related to the National
- Security Agency’s collection of phone
- records, including briefings to Congress
- as the relevant provision of the Patriot
- Act was up for renewal, and a ruling
- from the Foreign Intelligence Surveillance
- Court that outlines rules that must be
- followed when accessing data provided by
- a Verizon subsidiary.
- http://www.nytimes.com/interactive/2013/08/01/us/01nsa-docs.html
- Before Mr. Snowden’s leaks made clear
- what the government was doing with the
- Patriot Act program, several senators
- on the Intelligence Committee had made
- cryptic warnings that it was interpreting
- the law in a twisted way to do something
- alarming and made reference to the 2011
- briefing paper. The New York Times filed
- a lawsuit under the Freedom of Information
- Act to obtain that document.
- https://www.documentcloud.org/documents/743215-2011-coverletters-report-collection.html
- _______________________________________
- ¤ Senate FISA Spying Hearing Statements ::
- http://cryptome.org/2013/07/fisa-hearing-13-0731.pdf
- http://cryptome.org/2013/07/fisa-hearing-13-0731-2.pdf
- _______________________________________
- ¤ Monitoring Emails Purely “Accidental” ::
- Saxby Chambliss ; “no emails are monitored
- now” ... “they used to be but that stopped
- two or three years ago.”
- http://abcnews.go.com/blogs/politics/2013/07/glenn-greenwald-low-level-nsa-analysts-have-powerful-and-invasive-search-tool/
- _______________________________________
- ▼ Lawmakers Who Upheld NSA Phone Spying
- Received Dox ::
- (1) http://c.nopaste.dk/p56175
- (2) http://c.nopaste.dk/p56176
- (3) http://c.nopaste.dk/p56177
- (4) http://c.nopaste.dk/p56178
- (5) http://c.nopaste.dk/p56179
- ▼ Lawmakers Who Sold Out ::
- http://pastebin.com/6fhaDJMp
- ¤ Lawmakers Who Upheld NSA Phone Spying
- Received Double Defense Campaign Funds ::
- The numbers tell the story — in votes
- and dollars. On Wednesday, the house
- voted 217 to 205 not to rein in the
- NSA’s phone-spying dragnet. It turns
- out that those 217 “no” voters received
- twice as much campaign financing from
- the defense and intelligence industry
- as the 205 “yes” voters.
- http://www.wired.com/threatlevel/2013/07/money-nsa-vote/
- ¤ These Are The 217 People Who Voted
- To Preserve NSA Surveillance ::
- http://www.infowars.com/these-are-the-217-people-who-voted-to-preserve-nsa-surveillance/
- http://clerk.house.gov/evs/2013/roll412.xml
- http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2013/07/NOES_0.jpg
- ▲ US Congress Doxed, July 2013 ::
- http://slexy.org/view/s2fZ764IzB
- ¤ Justin Amash’s Amendment to Defund
- the NSA Will Get a Vote [Failed] ::
- http://www.youtube.com/watch?v=IUy3IT0A8hM
- http://washingtonexaminer.com/defund-nsa-amendment-will-get-a-vote/article/2533380
- http://www.mcclatchydc.com/2013/07/23/197485/sen-wyden-says-he-tried-to-warn.html
- http://www.infowars.com/house-fight-brews-over-nsa-stasi-state/
- ¤ White House Responds to Amash’s
- Amendment [Before It Failed] ::
- “In light of the recent unauthorized
- disclosures, the President has said
- that he welcomes a debate about how
- best to simultaneously safeguard both
- our national security and the privacy
- of our citizens. The Administration
- has taken various proactive steps to
- advance this debate including the
- President’s meeting with the Privacy
- and Civil Liberties Oversight Board,
- his public statements on the disclosed
- programs, the Office of the Director
- of National Intelligence’s release of
- its own public statements, ODNI General
- Counsel Bob Litt’s speech at Brookings,
- and ODNI’s decision to declassify and
- disclose publicly that the Administration
- filed an application with the Foreign
- Intelligence Surveillance Court. We
- look forward to continuing to discuss
- these critical issues with the American
- people and the Congress.
- However, we oppose the current effort
- in the House to hastily dismantle one
- of our Intelligence Community’s
- counterterrorism tools. This blunt
- approach is not the product of an
- informed, open, or deliberative process.
- We urge the House to reject the Amash
- Amendment, and instead move forward
- with an approach that appropriately
- takes into account the need for a
- reasoned review of what tools can
- best secure the nation.” - WH Press
- http://www.whitehouse.gov/the-press-office/2013/07/23/statement-press-secretary-amash-amendment
- http://washingtonexaminer.com/white-house-scrambles-to-defeat-bill-to-defund-nsa-program/article/2533418
- ▲ RELATED ; Privacy and Civil Liberties
- Board Meets Behind Closed Doors ::
- http://cryptome.org/2013/06/pclob-13-0617.htm
- ¤ NSA Director Calls Emergency Meeting to
- Lobby Against Justin Amash’s Amendment
- to Defund NSA ::
- http://washingtonexaminer.com/nsa-director-calls-emergency-meeting-to-lobby-against-rep.-justin-amashs-nsa-amendment/article/2533407
- _______________________________________
- Yesterday, German media wrote about an
- official letter from the NSA, which was
- sent to the German government to clarify
- some misconceptions about PRISM. This
- because German media and politics were
- heavily confused after it became clear
- that there’s more than one program named
- PRISM.
- The NSA letter explains what the PRISM
- data collection program is about and
- then confirms that this program is
- different from a more common military
- web tool called "Planning tool for
- Resource Integration, Synchronization
- and Management" (PRISM).
- Surprisingly, the NSA also reveals that
- there’s even a third program called
- PRISM. In this case the name stands
- for “Portal for Real-time Information
- Sharing and Management” and it’s
- apparently an internal NSA information
- sharing program. It was unknown until
- now, probably because it’s used in the
- NSA’s highly sensitive Information
- Assurance Directorate (IAD). ... ...
- Here’s a short summary of all three
- different PRISM programs:
- 1. PRISM
- This is a codeword for an NSA project
- of collecting information about foreign
- targets from data of nine major US
- internet companies. This program started
- in 2007 and was unveiled by Edward Snowden
- in June 2013.
- 2. Planning tool for Resource Integration,
- Synchronization and Management (PRISM)
- This is a web tool used by US military
- intelligence to send tasking instructions
- to data collection platforms deployed to
- military operations. This program is
- not very secret and was first mentioned
- in 2002.
- 3. Portal for Real-time Information
- Sharing and Management (PRISM)
- This is an internal NSA program for
- real-time sharing of information,
- apparently in the NSA’s Information
- Assurance Directorate. Its existance
- was revealed by the NSA in July 2013.
- http://electrospaces.blogspot.com/2013/07/nsa-says-there-are-three-different.html
- ¤ Three Different PRISM Programs? German
- Parliament Seeks Clarity in NSA Scandal ::
- A Thursday meeting in German parliament
- was supposed to shed light on NSA
- surveillance activities in Germany.
- It only added to the mystery. A US
- response to a Berlin inquiry claims
- that there are actually three unrelated
- Prism programs. ... ...
- In addition to testimony from Schindler
- and Maassen, officials also read a
- written statement from the NSA in
- response to a query from the German
- government. According to the statement,
- there are three separate Prism programs,
- all of them unconnected to each other.
- Meeting participants say the NSA response
- said that one of the Prism programs was
- only used internally. That program had
- thus far remained secret. Another of
- the programs was used by the Pentagon
- in Afghanistan. Yet another NSA tool
- -- vaguely described in the statement
- and allegedly “totally unrelated to the
- first” -- carries the name PRISM and
- “tracks and queries requests pertaining
- to our Information Assurance Directorate.”
- http://www.spiegel.de/international/germany/merkel-chief-of-staff-testifies-before-parliament-on-nsa-spying-a-913268.html
- NOBODY comments
- The snapshot of the PRISM input tool
- posted on electrospaces blogspot must
- have been from the Pentagon’s PRISM.
- _______________________________________
- ¤ UPDATE ; NSA Utah Data Center Probe ::
- http://cryptome.org/2013/07/nsa-utah-probe/nsa-utah-probe.htm
- ¤ NSA Utah Data Center Construction ::
- http://cryptome.org/2013-info/07/nsa-utah-dc/nsa-utah-dc.htm
- Description and drawings by US Army
- Corps of Engineers.
- http://cryptome.org/nsa-utah-data.zip
- http://cryptome.org/dodi/nsa-utah-award.pdf
- http://cryptome.org/dodi/nsa-utah-data-02.pdf
- _______________________________________
- ¤ Eyeballing the UK’s GCHQ Spy Policy ::
- http://cryptome.org/2013/07/uk-spy-commish-2012.pdf
- ¤ Eyeballing the UK’s RIPA Spy Policy ::
- http://cryptome.org/2013/07/uk-cop-spy-2012-13.pdf
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA Organizational Chart 1950 ::
- http://cryptome.org/2013/07/nsa-org-chart-1950.pdf
- ¤ NSA Headquarters Plans/Drawings 1953 ::
- http://cryptome.org/2013/07/nsa-hq-plans-1953.pdf
- ¤ NSA Employee Conduct Guide 1955 ::
- http://cryptome.org/2013/07/nsa-conduct-guide-1955.pdf
- _______________________________________
- ¤ DoJ Responds to Snowden Russia Asylum ::
- “First, the United States would not seek
- death penalty for Mr. Snowden should he
- return to the United States. The charges
- he faces do not carry that possibility,
- and the United States would not seek the
- death penalty even if Mr. Snowden were
- charged with additional, death penalty-
- eligible crimes.”
- “Second, Mr. Snowden will not be tortured.”
- http://cryptome.org/2013/07/usdoj-rumoj-snowden.pdf
- _______________________________________
- ¤ Edward Snowden Nominated for Nobel
- Peace Prize ::
- Edward Snowden, the National Security
- Agency whistleblower who revealed the
- agency’s data collection program, has
- been nominated for a Nobel Peace Prize.
- “Edward Snowden has — in a heroic effort
- at great personal cost — revealed the
- existence and extent of the surveillance,
- the US government devotes electronic
- communications worldwide,” read the
- nomination. “By putting light on this
- monitoring program — conducted in
- contravention of national laws and
- international agreements — Edward Snowden
- has helped to make the world a little
- bit better and safer.” ...
- “The decision to award the 2013 prize
- to Edward Snowden would — in addition
- to being well justified in itself —
- also help to save the Nobel Peace Prize
- from the disrepute that incurred by the
- hasty and ill-conceived decision to
- award [war criminal] Barack Obama the 2009
- award,” Svallfors wrote to the committee.
- http://washingtonexaminer.com/edward-snowden-nominated-for-nobel-peace-prize/article/2533071
- _______________________________________
- ¤ Glenn Greenwald Interviewed Moskovsky
- Komsomolets News ::
- http://cryptome.org/2013/07/gg-snowden-leak-halt.htm
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ Minute Details of How the NSA Installs
- Their Surveillance Equipment ::
- Pete Ashdown, the CEO of XMission, detailed
- his experience when he received a Foreign
- Intelligence Surveillance Act (FISA) warrant
- in 2010 which forced him to allow the
- federal government to monitor a customer
- of his.
- Of course, like all FISA orders, it also
- contained a broad gag order, which still
- prevents him from telling all the details.
- “The FISA request was a tricky one, because
- it was a warrant through the FISA court —
- whether you believe that is legitimate or
- not,” Ashdown wrote.
- He had to help the agents “set up a
- duplicate port to tap in to monitor that
- customer’s traffic. It was a 2U (two-unit)
- PC that we ran a mirrored ethernet port to.”
- Ashdown eventually had a box in his
- facility that was capturing all of the
- traffic sent to his customer. He did not
- remember if it was connected to the internet,
- but wrote that it was likely capturing
- all data to a hard drive for later analysis.
- http://endthelie.com/2013/07/21/owner-of-small-utah-isp-describes-how-the-nsa-attempted-to-get-him-to-install-surveillance-equipment/
- _______________________________________
- ¤ NSA Briefs a New Administration, 2004 ::
- http://tinyurl.com/kqmpf4w
- _______________________________________
- ¤ New Slides About NSA Collection Programs ::
- http://electrospaces.blogspot.com/2013/07/new-slides-about-nsa-collection-programs.html
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA Admits They Snoop Targets’ Contacts’
- Contacts’ Contacts (3 Hops) ::
- As an aside during testimony on Capitol
- Hill today, a National Security Agency
- representative rather casually indicated
- that the government looks at data from
- a universe of far, far more people than
- previously indicated.
- Chris Inglis, the agency’s deputy director,
- was one of several government representatives
- —including from the FBI and the office of
- the Director of National Intelligence—
- testifying before the House Judiciary
- Committee this morning. Most of the testimony
- largely echoed previous testimony by the
- agencies on the topic of the government’s
- surveillance, including a retread of the
- same offered examples for how the Patriot
- Act and Foreign Intelligence Surveillance
- Act had stopped terror events.
- But Inglis’ statement was new. Analysts
- look “two or three hops” from terror
- suspects when evaluating terror activity,
- Inglis revealed. Previously, the limit of
- how surveillance was extended had been
- described as two hops. This meant that
- if the NSA were following a phone metadata
- or web trail from a terror suspect, it
- could also look at the calls from the
- people that suspect has spoken with one
- hop. And then, the calls that second person
- had also spoken with two hops. Terror suspect
- to person two to person three. Two hops.
- And now: A third hop. ... ...
- So all of your friends, that’s one hop.
- Your friends’ friends, whether you know
- them or not - two hops.
- Your friends’ friends’ friends, whoever
- they happen to be, are that third hop.
- http://www.theatlanticwire.com/politics/2013/07/nsa-admits-it-analyzes-more-peoples-data-previously-revealed/67287/
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ The Private Global Information Grid ::
- It is a good thing that people are
- becoming aware of the fact that they
- are being monitored - it is not only
- speculation anymore. We have seen PRISM,
- FinSpy and ECHELON. These programs are
- made to collect information and to store
- them in a database. Now just imagine the
- resources that PRISM used and how it
- could combine these resources to multiple
- databases. This is where GiG comes in.
- http://cyberwarzone.com/government-spying-database-global-information-grid
- _______________________________________
- ¤ Edward Snowden Application for Asylum ::
- http://cryptome.org/2013/07/snowden-ru-asylum.htm
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA Leaks Nothing Compared to Further
- Leaks Not-Yet-Released-to-Public ::
- Fugitive NSA leaker Edward Snowden today
- applied for asylum in Russia and, as a
- condition, agreed to stop ‘harming’ the
- US, according to a Russian lawyer who
- is advising him, but that doesn’t
- necessarily mean headline-grabbing
- stories about the US government’s vast
- foreign and domestic spying programs
- will stop. ... ...
- Putin has said that Snowden can stay
- in Russia, but only if he stops “harming”
- the United States by releasing more
- intelligence secrets. ... ...
- But while Snowden agreed to stop leaking
- secrets, it could prove a technicality
- since he has already said that he gave
- all of his classified information --
- thousands of documents -- to several
- journalists. The most prominent of which,
- The Guardian columnist Glenn Greenwald,
- told ABC News Friday that he’s not even
- half done with the stories he plans to
- write based on the secret information.
- http://abcnews.go.com/Blotter/edward-snowden-legal-apply-russian-asylum/story?id=19678502
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ Mirror of Removed NSA Recruitment Drive ::
- http://cypherpoet.com/nsa/
- _______________________________________
- ¤ Snowden NSA Revelations Mirrored ::
- http://cryptome.org/2013/07/cryptogram-13-0715.htm
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ When You’re Online, You’re Hacked ::
- In Russia, Prez Putin’s office just
- stopped using PC’s and switched to
- typewriters. What do they know that
- we don’t?
- http://steveblank.com/2013/07/15/your-computer-may-already-be-hacked-nsa-inside/
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ MITRE Corporation Outlined Collection
- Management for PRISM and Other Spying ::
- Planning Tool for Resource Integration,
- Synchronization, and Management aka PRISM
- has existed since at least 2002. The
- following document refers to it directly.
- This demonstrates PRISM not only existed
- in July 2002, but it had been undergoing
- usage for some time, enough time to recognize
- limitation of it and similar projects.
- http://pastebin.com/h5a1c1Pd
- http://www.mitre.org/work/tech_papers/tech_papers_02/kane_isrplatforms/isrinformationservices.pdf
- _______________________________________
- ¤ Brasil é alvo da Maciça Operação de
- Espionagem da NSA (TRANSLATED) ::
- http://code.str0.be/view/raw/540c2ebf
- ¤ Brazil is the Most Monitored Country
- in Latin America ::
- http://cryptome.org/2013/07/nsa-tracking/nsa-tracking.htm
- http://oglobo.globo.com/infograficos/volume-rastreamento-governo-americano/
- http://www.washingtonpost.com/world/the_americas/paper-reveals-nsa-ops-in-latin-america/2013/07/09/eff0cc7e-e8e3-11e2-818e-aa29e855f3ab_print.html
- _______________________________________
- ¤ US Dictatorship in Damage Control,
- Hyper-paranoia Over Snowden’s Leaks ::
- http://cryptome.org/2013/07/snowden-us-threat.htm
- http://in.reuters.com/article/2013/07/13/usa-security-snowden-greenwald-idINDEE96C05520130713
- ¤ Future PRISM Leaks May Be Used As An
- Excuse for Global Internet Censorship ::
- http://in.reuters.com/article/2013/07/15/usa-security-cybertruce-idINDEE96E0DQ20130715
- _______________________________________
- ¤ Intel in Bed with NSA ::
- http://cryptome.org/2013/07/intel-bed-nsa.htm
- _______________________________________
- ¤ News Media Censoring or Editing PRISM
- Slides / Slides Differ ::
- http://cryptome.org/2013/07/nsa-upstream-differ.htm
- http://cryptome.org/2013/07/nsa-upstream-differ.jpg
- http://www.washingtonpost.com/business/economy/the-nsa-slide-you-havent-seen/2013/07/10/32801426-e8e6-11e2-aa9f-c03a72e2d342_story.html
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA Policy on IP Encryptor ::
- http://cryptome.org/2013/07/CNSSP-19.pdf
- ¤ NSA Policy on Information Assurance ::
- http://cryptome.org/2013/07/CNSSP-11.pdf
- _______________________________________
- ¤ PRISM Method of Storing and Transferring
- Metadata ::
- http://electrospaces.blogspot.com/2013/07/new-insights-into-prism-program.html
- _______________________________________
- ¤ NSA Rejecting Every FOIA Request Made
- by US Citizens ::
- http://www.dailykos.com/story/2013/07/06/1221694/-NSA-Rejecting-Every-FOIA-Request-Made-by-U-S-Citizens
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ National Security Agency DNS Tunnels ::
- http://pastebin.com/TpGTHDSy
- “This may look like a small release, but
- it's actually huge. See, we hacked the
- NSA yet again because we just love doing
- that. These are DNS tunnels that are
- sending encrypted data to and from the
- PRISM databases. We have the IP's of
- those servers. If you crash these servers
- with DDoS, you literally render PRISM
- "broken". We are also planning to release
- some of that data (which we have access
- to) if we can decrypt it.”
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ BEFORE PRISM ; Presidents Surveillance
- Program 2001 - 2006 ::
- Contractors include Booze Allen Hamilton,
- Snowden’s employer.
- http://cryptome.org/2013/07/Presidents-Spy-Program-Sept14-2001.htm
- ¤ History Behind Fiber-optic Wiretapping ::
- http://pastebin.com/VzqpaF8y
- _______________________________________
- ¤ France Has Own PRISM Spy System ::
- http://www.megapastebin.com.ar/DU5BPIIK
- _______________________________________
- ¤ Edward Snowden’s WikiLeaks Statement ::
- “One week ago I left Hong Kong after
- it became clear that my freedom and
- safety were under threat for revealing
- the truth. My continued liberty has been
- owed to the efforts of friends new and
- old, family, and others who I have never
- met and probably never will. I trusted
- them with my life and they returned that
- trust with a faith in me for which I will
- always be thankful.
- On Thursday, President Obama declared
- before the world that he would not permit
- any diplomatic “wheeling and dealing” over
- my case. Yet now it is being reported that
- after promising not to do so, the President
- ordered his Vice President to pressure the
- leaders of nations from which I have
- requested protection to deny my asylum
- petitions.
- This kind of deception from a world leader
- is not justice, and neither is the extralegal
- penalty of exile. These are the old, bad
- tools of political aggression. Their purpose
- is to frighten, not me, but those who would
- come after me.
- For decades the United States of America
- have been one of the strongest defenders
- of the human right to seek asylum. Sadly,
- this right, laid out and voted for by the
- US in Article 14 of the Universal Declaration
- of Human Rights, is now being rejected by
- the current government of my country. The
- Obama administration has now adopted the
- strategy of using citizenship as a weapon.
- Although I am convicted of nothing, it has
- unilaterally revoked my passport, leaving
- me a stateless person. Without any judicial
- order, the administration now seeks to stop
- me exercising a basic right. A right that
- belongs to everybody. The right to seek
- asylum.
- In the end the Obama administration is
- not afraid of whistleblowers like me,
- Bradley Manning or Thomas Drake. We are
- stateless, imprisoned, or powerless. No,
- the Obama administration is afraid of you.
- It is afraid of an informed, angry public
- demanding the constitutional government
- it was promised – and it should be.
- I am unbowed in my convictions and
- impressed at the efforts taken by so
- many.”
- http://www.telegraph.co.uk/news/worldnews/europe/russia/10154064/Edward-Snowdens-WikiLeaks-statement-in-full.html
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ The Internet Counter-culture ::
- http://media.risky.biz/RB284.mp3
- ¤ Surveillance Scandals and Thought Crimes ::
- http://media.risky.biz/RB283.mp3
- _______________________________________
- ¤ Cyber Command Suffers Second Defeat ::
- http://cryptome.org/2013/07/uscybercom-dump.htm
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ Washington Post Publishes More PRISM ::
- http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/
- http://www.guardian.co.uk/world/2013/jun/30/washington-post-new-slides-prism
- http://cryptome.org/2013-info/06/wapo-13-0629/prism-wapo-13-0629.htm
- _______________________________________
- ¤ US Army Blocked Access to The Guardian ::
- http://www.infowars.com/u-s-army-now-censoring-the-guardian/
- http://www.montereyherald.com/local/ci_23554739/restricted-web-access-guardian-is-army-wide-officials
- http://endthelie.com/2013/06/28/u-s-army-restricting-access-to-the-guardian-across-all-of-their-networks-over-security-concerns/
- _______________________________________
- ¤ Mirror of Deleted Article by Guardian ::
- http://pastebin.com/NTJvUZdJ
- Revealed: secret European deals to hand
- over private data to America.
- Germany among countries offering intelligence
- according to new claims by former US defence
- analyst.
- At least six European Union countries in
- addition to Britain have been colluding
- with the US over the mass harvesting of
- personal communications data, according
- to a former contractor to America’s
- National Security Agency, who said the
- public should not be “kept in the dark.”
- Wayne Madsen, a former US navy lieutenant
- who first worked for the NSA in 1985
- and over the next 12 years held several
- sensitive positions within the agency,
- names Denmark, the Netherlands, France,
- Germany, Spain and Italy as having secret
- deals with the US.
- Madsen said the countries had “formal
- second and third party status” under
- signal intelligence (sigint) agreements
- that compels them to hand over data,
- including mobile phone and internet
- information to the NSA if requested.
- Under international intelligence agreements,
- confirmed by declassified documents,
- nations are categorised by the US according
- to their trust level. The US is first party
- while the UK, Canada, Australia and New
- Zealand enjoy second party relationships.
- Germany and France have third party
- relationships.
- In an interview published last night
- on the PrivacySurgeon.org blog, Madsen,
- who has been attacked for holding
- controversial views on espionage issues,
- said he had decided to speak out after
- becoming concerned about the “half story”
- told by EU politicians regarding the
- extent of the NSA’s activities in Europe.
- He said that under the agreements,
- which were drawn up after the second
- world war, the “NSA gets the lion’s
- share” of the sigint “take.” In return,
- the third parties to the NSA agreements
- received “highly sanitised intelligence.”
- Madsen said he was alarmed at the
- “sanctimonious outcry” of political
- leaders who were “feigning shock”
- about the spying operations while staying
- silent about their own arrangements
- with the US, and was particularly
- concerned that senior German politicians
- had accused the UK of spying when their
- country had a similar third-party deal
- with the NSA.
- Although the level of co-operation provided
- by other European countries to the NSA is
- not on the same scale as that provided by
- the UK, the allegations are potentially
- embarrassing.
- “I can’t understand how Angela Merkel can
- keep a straight face, demanding assurances
- from [Barack] Obama and the UK while Germany
- has entered into those exact relationships,”
- Madsen said.
- The Liberal Democrat MEP Baroness Ludford,
- a senior member of the European parliament’s
- civil liberties, justice and home affairs
- committee, said Madsen’s allegations
- confirmed that the entire system for
- monitoring data interception was a mess,
- because the EU was unable to intervene
- in intelligence matters, which remained
- the exclusive concern of national
- governments.
- “The intelligence agencies are exploiting
- these contradictions and no one is really
- holding them to account,” Ludford said.
- “It’s terribly undermining to liberal
- democracy.”
- Madsen’s disclosures have prompted calls
- for European governments to come clean
- on their arrangements with the NSA.
- “There needs to be transparency as to
- whether or not it is legal for the US
- or any other security service to
- interrogate private material,” said
- John Cooper QC, a leading international
- human rights lawyer. “The problem here
- is that none of these arrangements has
- been debated in any democratic arena.
- I agree with William Hague that sometimes
- things have to be done in secret, but you
- don’t break the law in secret.”
- Madsen said all seven European countries
- and the US have access to the Tat 14
- fibre-optic cable network running between
- Denmark and Germany, the Netherlands,
- France, the UK and the US, allowing them
- to intercept vast amounts of data,
- including phone calls, emails and records
- of users’ access to websites.
- He said the public needed to be made
- aware of the full scale of the communication
- -sharing arrangements between European
- countries and the US, which predate the
- internet and became of strategic importance
- during the cold war.
- The covert relationship between the
- countries was first outlined in a 2001
- report by the European parliament, but
- their explicit connection with the NSA
- was not publicised until Madsen decided
- to speak out.
- The European parliament’s report followed
- revelations that the NSA was conducting a
- global intelligence-gathering operation,
- known as Echelon, which appears to have
- established the framework for European
- member states to collaborate with the US.
- “A lot of this information isn’t secret,
- nor is it new,” Madsen said. “It’s just
- that governments have chosen to keep the
- public in the dark about it. The days
- when they could get away with a conspiracy
- of silence are over.”
- This month another former NSA contractor,
- Edward Snowden, revealed to the Guardian
- previously undisclosed US programmes to
- monitor telephone and internet traffic.
- The NSA is alleged to have shared some of
- its data, gathered using a specialist tool
- called Prism, with Britain’s GCHQ.
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ Wayne Madsen, Former Contractor for NSA,
- Talks About Global SIGINT Interception ::
- A former contractor to the US National
- Security Agency (NSA) has told the
- Privacy Surgeon that communications
- intelligence arrangements between the
- US and Europe are much more “complex,
- murky and far reaching” than the public
- has been led to believe. ...
- He was particularly concerned about the
- “sanctimonious outcry” of political leaders
- who were “feigning shock” about recently
- disclosed spying operations such as PRISM
- while staying silent about their own role
- in global interception arrangements with
- the United States. ...
- Madsen also expressed anger over the
- NSA’s hypocrisy over Edward Snowden.
- “Snowden is being roundly condemned by
- many who say he had no authority or right
- to provide the public with details of
- NSA snooping. But what right or authority
- did NSA director, General Keith Alexander,
- have to provide information on NSA
- surveillance at five meetings of the
- global Bilderberg Conference – two in
- Virginia and one meeting each in Greece,
- Spain and Switzerland?”
- “Alexander claims he is protecting the
- American people from a constantly changing
- number of terrorist attacks. In fact, he
- is providing information to elites on
- the methods NSA uses to spy on labor,
- student, religious and progressive
- organizations.”
- “When Alexander leaks to the elites,
- he’s thanked. When Snowden does it,
- he’s called a traitor and a coward.”
- http://www.privacysurgeon.org/blog/incision/former-nsa-contractor-warns-of-murky-interception-arrangements/
- _______________________________________
- ¤ NSA Spying Pisses Off European Union ::
- http://www.rawstory.com/rs/2013/06/30/new-nsa-leak-documents-show-how-the-us-is-bugging-its-european-allies/
- http://www.cbsnews.com/8301-202_162-57591678/european-officials-lash-out-at-new-nsa-spying-report/
- http://www.guardian.co.uk/world/2013/jun/30/nsa-spying-europe-claims-us-eu-trade
- http://www.infowars.com/report-nsa-joint-wiretapping-operations-with-foreign-nations/
- http://www.waynemadsenreport.com/articles/20130630
- http://www.spiegel.de/international/world/secret-documents-nsa-targeted-germany-and-eu-buildings-a-908609.html
- http://www.telegraph.co.uk/news/worldnews/northamerica/usa/10152478/Francois-Hollande-tells-the-US-to-stop-eavesdropping-on-Europe-if-it-wants-progress-on-trade-deal.html
- ¤ FLASHBACK ; Why We Spy on Our Allies ::
- http://cryptome.org/echelon-cia2.htm
- ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
- ¤ NSA Stellar Wind Email Internet Data Collection ::
- http://cryptome.org/2013/06/nsa-stellar-wind.pdf
- _______________________________________
- ¤ Two NSA IG Reports Differ ::
- http://cryptome.org/2013/06/nsa-reports-differ.htm
- _______________________________________
- ¤ Congress Insisted They Be Kept in the Dark on NSA Spying ::
- http://www.infowars.com/congress-insisted-they-be-kept-in-the-dark-on-nsa-spying/
- _______________________________________
- ¤ DoJ Memo on NSA Data Collection on Americans 2007 ::
- http://cryptome.org/2013/06/doj-nsa-memo.pdf
- _______________________________________
- ¤ NSA FISA Surveillance Leaks ::
- http://cryptome.org/2013/06/nsa-fisa-targeting.pdf
- http://cryptome.org/2013/06/nsa-fisa-minimization.pdf
- http://cryptome.org/2013/06/nsa-fisa-certification.pdf
- ¤ Mass Spying of All Telecommunication via FISA ::
- http://cryptome.org/2014/01/nsa-prism-dk.pdf
- http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/
- http://apps.washingtonpost.com/g/page/national/inner-workings-of-a-top-secret-spy-program/282/
- http://www.guardian.co.uk/world/2013/jun/20/fisa-court-nsa-without-warrant
- http://techcrunch.com/2013/06/21/new-nsa-warrantless-tactics-reveal-little-room-for-presumption-of-innocence/
- http://www.informationweek.com/global-cio/interviews/nsa-dragnet-debacle-what-it-means-to-it/240156243
- http://www.independent.co.uk/news/world/americas/inside-the-nsa-peeling-back-the-curtain-on-americas-intelligence-agency-8658016.html
- http://www.washingtonsblog.com/2013/06/nsa-whistleblower-nsa-spying-on-and-blackmailing-high-level-government-officials-and-military-officers.html
- http://boilingfrogspost.com/wp-content/uploads/BF.0112.Tice_20130617.mp3
- http://boilingfrogspost.com/wp-content/uploads/BF.0111.Young_20130613.mp3
- http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html
- http://cryptome.org/2013/06/nsa-arch-spy.htm
- http://www.usnews.com/news/newsgram/articles/2013/06/12/prism-class-action-lawsuit-filed-20b-injunction-sought-against-complicit-companies-and-officials
- http://www.usnews.com/news/newsgram/articles/2013/06/11/nine-companies-tied-to-prism-obama-will-be-smacked-with-class-action-lawsuit-wednesday
- http://www.washingtonpost.com/blogs/federal-eye/wp/2013/06/13/former-justice-prosecutor-seeks-23-billion-in-damages-for-nsa-surveillance-programs/
- http://www.washingtonpost.com/blogs/post-politics/wp/2013/06/09/rand-paul-planning-class-action-lawsuit-against-surveillance-programs/
- http://www.chicagotribune.com/news/chi-nsa-prism-scandal-20130609,0,432240.story
- http://cryptome.org/2013/06/snowden-censored.htm
- http://www.cbsnews.com/8301-250_162-57588385/nsa-seeks-criminal-probe-of-program-leaker/
- http://theweek.com/article/index/245311/sources-nsa-sucks-in-data-from-50-companies
- http://theweek.com/article/index/245360/solving-the-mystery-of-prism
- http://www.nationaljournal.com/politics/welcome-to-the-bush-obama-white-house-they-re-spying-on-us-20130606
- http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data
- http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_print.html
- http://cryptome.org/2013/06/obama-prism.pdf
- http://cryptome.org/2013/06/tpm-palantir-prism.pdf
- http://cryptome.org/2013/06/prism-spy-tools.htm
- http://openchannel.nbcnews.com/_news/2013/06/07/18831985-officials-nsa-mistakenly-intercepted-emails-phone-calls-of-innocent-americans
- http://rt.com/usa/nsa-payed-internet-companies-911/
- http://www.infowars.com/leaked-document-reveals-government-paid-millions-to-prism-participants/
- http://threatpost.com/fisc-no-phone-company-ever-challenged-metadata-collection-orders/102334
- http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work
- http://www.infowars.com/new-nsa-revelations-another-limited-hangout-whitewash/
- http://electrospaces.blogspot.com/2013/12/nsas-global-interception-network.html
- http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_print.html
- http://www.theguardian.com/world/2013/dec/04/nsa-storing-cell-phone-records-daily-snowden
- http://www.washingtonpost.com/opinions/meet-executive-order-12333-the-reagan-rule-that-lets-the-nsa-spy-on-americans/2014/07/18/93d2ac22-0b93-11e4-b8e5-d0de80767fc2_story.html
- _______________________________________
- ¤ FLASHBACK ; Pentagon Wanted Searchable
- Database of People’s Lives in 2003 ::
- http://dailycaller.com/2013/07/01/pentagon-wanted-searchable-database-of-peoples-lives-in-2003/?print=1
- _______________________________________
- ¤ FLASHBACK ; NSA Undersea Fiber Cable Tapping 1 & 2 ::
- http://cryptome.org/nsa-fibertap.htm
- http://cryptome.org/telecomm-weak.htm
- ¤ FLASHBACK ; NSA Undersea Fiber Optic Tapping ::
- http://cryptome.org/nsa-seatap.htm
- _______________________________________
- ¤ RELATED ; All Online Spy Guides 7zip ::
- http://cryptome.org/isp-spy/online-spying.htm
- http://cryptome.org/online-spying-11-1206.7z
- {[▓▒▒▒▓██▓░░▓██▓░░▓██▓░░▓██▓░░▓██▓▒▒▒▓]}
- {[▓▒▒▒▓██▓░░▓██▓░░▓██▓░░▓██▓░░▓██▓▒▒▒▓]}