Eyeballing the NSA 044 “Defeat adversary cyber-security practices in order to acquire the SIGINT data we need from anyone, anytime, anywhere.” - NSA ; SIGINT Strategy 2012 - 2016 ¤ A Look at the Inner Workings of NSA’s XKEYSCORE :: http://cryptome.org/2015/07/nsa-xks-more-intercept-15-0701.7z http://cryptome.org/2015/07/nsa-xks-four-revised-intercept-15-0702.7z https://firstlook.org/theintercept/2015/07/01/nsas-google-worlds-private-communications/ https://firstlook.org/theintercept/2015/07/02/look-under-hood-xkeyscore/ _______________________________________ ¤ NSA German Spying via WikiLeaks :: https://wikileaks.org/nsa-germany/ https://wikileaks.org/nsa-germany/intercepts/WikiLeaks_US_Bugs_Franco-German_EU_Financial_Crisis_Treaty.pdf https://wikileaks.org/nsa-germany/intercepts/WikiLeaks_Merkel_Bugged_Pondering_Greece_Crisis.pdf https://wikileaks.org/nsa-germany/intercepts/WikiLeaks_US_Bugs_Germany_Plotting_BRICS_Bailout_for_Greece.pdf ¤ Attack on Press Freedom: SPIEGEL Targeted by NSA :: Revelations from WikiLeaks published this week show how boundlessly and comprehensively American intelligence services spied on the German government. It has now emerged that the US also conducted surveillance against Der SPIEGEL. http://www.spiegel.de/international/germany/the-nsa-and-american-spies-targeted-spiegel-a-1042023.html _______________________________________ ¤ NSA Brazil Spying via WikiLeaks :: https://wikileaks.org/nsa-brazil/ http://cryptome.org/2015/07/wl-nsa-brazil-01.jpg http://cryptome.org/2015/07/wl-nsa-brazil-02.jpg _______________________________________ ¤ NSA French Spying via WikiLeaks :: https://wikileaks.org/nsa-france/ http://www.cryptome.org/2015/06/NSA-French-Spying-WikiLeaks-15-0623.pdf http://www.cryptome.org/2015/06/NSA-French-Spying-WikiLeaks-15-0629.pdf http://www.cryptome.org/2015/06/NSA-French-Spying-WikiLeaks-15-0629-2.pdf _______________________________________ ¤ NSA Eyeballed NY Times During Bush Regime :: http://cryptome.org/2015/06/nsa-nyt-warrantless-wiretap.pdf _______________________________________ ¤ NSA Sifts Americans' Internet Traffic to Hunt Hackers :: http://cryptome.org/2015/06/cyber-spy-nyt-15-0604.pdf http://www.propublica.org/article/new-snowden-documents-reveal-secret-memos-expanding-spying http://www.nytimes.com/2015/06/05/us/hunting-for-hackers-nsa-secretly-expands-internet-spying-at-us-border.html https://firstlook.org/theintercept/2015/06/04/nsa-hackers-nyt-warrantless-surveillance/ ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ NSA Officials Privately Criticize “Collect It All” Surveillance :: AS MEMBERS OF CONGRESS struggle to agree on which surveillance programs to re-authorize before the Patriot Act expires, they might consider the unusual advice of an intelligence analyst at the National Security Agency who warned about the danger of collecting too much data. Imagine, the analyst wrote in a leaked document, that you are standing in a shopping aisle trying to decide between jam, jelly or fruit spread, which size, sugar-free or not, generic or Smucker’s. It can be paralyzing. ... ... “We are drowning in information. And yet we know nothing.” – NSA (via SID Today) Intelligence Analyst http://cryptome.org/2015/05/nsa-sid-today-intercept-15-0527.pdf https://firstlook.org/theintercept/2015/05/28/nsa-officials-privately-criticize-collect-it-all-surveillance/ http://www.infowars.com/current-nsa-officials-admit-agency-is-drowning-in-too-much-info/ _______________________________________ ¤ Joint NSA-BND Operation Eikonal Cable Tapping :: http://electrospaces.blogspot.com/2015/05/new-details-about-joint-nsa-bnd.html _______________________________________ ¤ NSA Planned to Hijack Google App Store to Hack Smartphones :: http://cryptome.org/2015/05/5-eyes-cellspy-cbc-intercept-15-0521.pdf https://www.documentcloud.org/documents/2083944/uc-web-report-final-for-dc.pdf https://firstlook.org/theintercept/2015/05/21/nsa-five-eyes-google-samsung-app-stores-spyware/ http://www.cbc.ca/news/canada/spy-agencies-target-mobile-phones-app-stores-to-implant-spyware-1.3076546 _______________________________________ ¤ NSA MEDINT Medical Spying (Bin Laden Intercept) :: http://cryptome.org/2015/05/nsa-medint-intercept-15-0521.pdf https://firstlook.org/theintercept/2015/05/21/nsa-plan-find-osama-bin-laden-infiltrating-medical-supply-chain/ ¤ NSA Bin Laden Intercept (NATO / JTAC / Black Budget) :: http://cryptome.org/2015/05/nsa-sid-nato-intercept-15-0515.pdf http://cryptome.org/2015/05/jtac-attack-intercept-15-0515.pdf http://cryptome.org/2015/05/bin-laden-raid-intercept-15-0518.pdf http://cryptome.org/2015/05/nctc-terrorism-figures-intercept-15-0518.pdf _______________________________________ ¤ ICWATCH: This Database Gathers the Resumes of 27,000 Intelligence Workers :: https://github.com/TransparencyToolkit/ICWATCH-Data https://transparencytoolkit.org/project/icwatch/ https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton/ https://motherboard.vice.com/read/this-database-gathers-the-resumes-of-27000-intelligence-workers mirrored: #!gQ8EgbxZ!2hgGLnsfEK-Nss4nUImGL5nDr3QqxUhpqZZNd6TJL3o _______________________________________ ¤ US Government Designated Prominent Al Jazeera Journalist as “Member of Al Qaeda” :: The document cites Zaidan as an example to demonstrate the powers of SKYNET, a program that analyzes location and communication data (or “metadata”) from bulk call records in order to detect suspicious patterns. In the Terminator movies, SKYNET is a self-aware military computer system that launches a nuclear war to exterminate the human race, and then systematically kills the survivors. According to the presentation, the NSA uses its version of SKYNET to identify people that it believes move like couriers used by Al Qaeda’s senior leadership. The program assessed Zaidan as a likely match, which raises troubling questions about the US government’s method of identifying terrorist targets based on metadata. It appears, however, that Zaidan had already been identified as an Al Qaeda member before he showed up on SKYNET’s radar. That he was already assigned a watch list number would seem to indicate that the government had a prior intelligence file on him. The Terrorist Identities Datamart Environment, or TIDE, is a US government database of over one million names suspected of a connection to terrorism, which is shared across the US intelligence community. The presentation contains no evidence to explain the designation. https://firstlook.org/theintercept/2015/05/08/u-s-government-designated-prominent-al-jazeera-journalist-al-qaeda-member-put-watch-list/ ¤ NSA SKYNET Cloud Analytics-Courier Detection :: http://cryptome.org/2015/05/nsa-skynet-intercept-15-0507.pdf _______________________________________ ¤ How the NSA Converts Spoken Words Into Searchable Text :: Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored. The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago. https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/ ... the real solution is end-to-end encryption, preferably of the unbreakable kind. https://whispersystems.org/ https://firstlook.org/theintercept/2015/05/08/keep-nsa-computers-turning-phone-conversations-searchable-text/ ¤ NSA Converts Spoken Words Into Searchable Text Documents :: http://cryptome.org/2015/05/nsa-black-budget-sid-rt10-wg-language-intercept-15-0504.pdf _______________________________________ ¤ Declassified Report Shows Doubts About Value of NSA Warrantless Spying :: The secrecy surrounding the National Security Agency’s post-9/11 warrantless surveillance and bulk data collection program hampered its effectiveness, and many members of the intelligence community later struggled to identify any specific terrorist attacks it thwarted, a newly declassified document shows. The document is a lengthy report on a once secret NSA program code-named Stellarwind. The report was a joint project in 2009 by inspectors general for five intelligence and law enforcement agencies, and it was withheld from the public at the time, although a short, unclassified version was made public. The government released a redacted version of the full report to The New York Times on Friday evening in response to a Freedom of Information Act lawsuit. http://www.nytimes.com/2015/04/25/us/politics/value-of-nsa-warrantless-spying-is-doubted-in-declassified-reports.htm ¤ NSA Stellar Wind OIG Analysis :: http://cryptome.org/2015/04/nsa-stellar-wind-oig-nyt-15-0424.pdf _______________________________________ ¤ NSA Torus Receivers of 35 Satellite Signals :: At three satellite facilities, in Britain, Cyprus and New Zealand, there's a special antenna that allows NSA's partner agencies a significant increase in their capability to collect satellite communications. This antenna is called Torus, and while conventional parabolic dish antennas can only view one satellite at a time, one single Torus antenna is able to receive the signals from up to 35 communications satellites. These rare and expensive Torus antennas are used by some television networks, but a close look at photos of the Five Eyes satellite stations has now revealed the locations where Torus antennas are also used for gathering signals intelligence. http://electrospaces.blogspot.com/2015/04/torus-antenna-to-significantly-increase.html _______________________________________ ¤ CSEC Cyberwarfare Toolbox Revealed :: Top-secret documents obtained by the CBC show Canada’s electronic spy agency has developed a vast arsenal of cyberwarfare tools alongside its US and British counterparts to hack into computers and phones in many parts of the world, including in friendly trade countries like Mexico and hotspots like the Middle East. ... ... The CSE toolbox includes the ability to redirect someone to a fake website, create unrest by pretending to be another government or hacker, and siphon classified information out of computer networks, according to experts who viewed the documents. ... ... But the latest top-secret documents released to CBC News and The Intercept illustrate the development of a large stockpile of Canadian cyber-spy capabilities that go beyond hacking for intelligence, including: • destroying infrastructure, which could include electricity, transportation or banking systems; • creating unrest by using false-flags — ie. making a target think another country conducted the operation; • disrupting online traffic by such techniques as deleting emails, freezing internet connections, blocking websites and redirecting wire money transfers. http://www.cbc.ca/news/canada/communication-security-establishment-s-cyberwarfare-toolbox-revealed-1.3002978 https://firstlook.org/theintercept/2015/03/23/canada-cse-hacking-cyberwar-secret-arsenal ¤ CSEC Cyber Threats / Cyberwarfare Toolbox :: http://cryptome.org/2015/03/csec-cyber-threats-cbc-15-0320.pdf ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ NSA Releases William Friedman Papers :: http://cryptome.org/2015/03/nsa-friedman-15-0323.pdf _______________________________________ ¤ The CIA Campaign to Steal Apple’s Secrets :: https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/ http://www.infowars.com/new-snowden-documents-cia-has-spent-10-years-hacking-iphones-ipads/ ¤ NSA-CIA Apple DPA Cryptanalysis :: http://cryptome.org/2015/03/nsa-apple-dpa-intercept-15-0309.zip _______________________________________ ¤ Leaked Snowden Files Show Most of GCSB’s Targets Are NOT Security Threats to New Zealand (UPDATED SEVERAL TIMES) :: New Zealand’s electronic surveillance agency, the GCSB, has dramatically expanded its spying operations during the years of John Key's National Government and is automatically funnelling vast amounts of intelligence to the US National Security Agency, top-secret documents reveal. Since 2009, the Government Communications Security Bureau intelligence base at Waihopai has moved to “full-take collection”, indiscriminately intercepting Asia-Pacific communications and providing them en masse to the NSA through the controversial NSA intelligence system XKeyscore, which is used to monitor emails and internet browsing habits. ... ... New Zealand is selling out its close relations with the Pacific nations to be close with the United States, author Nicky Hager has said. Hager, in conjunction with the New Zealand Herald and the Intercept news site, revealed today how New Zealand’s spies are targeting the entire email, phone and social media communications of the country’s closest, friendliest and most vulnerable neighbours. This morning, Hager told Radio New Zealand that the documents revealed even more countries which New Zealand was spying on, and more information would come. “The Five Eyes countries led by the US are literally trying to spy on every country in the world ... and what we’re going to be hearing about in the next few days is New Zealand in all kinds of very surprising ways playing a role in that,” he said. http://cryptome.org/2015/03/gcsb-xkeyscore-nz-herald-15-0305.pdf http://cryptome.org/2015/03/gcsb-xkeyscore-nz-herald-15-0306.pdf http://cryptome.org/2015/03/gcsb-xkeyscore-nz-star-times-15-0308.pdf http://cryptome.org/2015/03/nsa-nz-nz-herald-15-0310.pdf http://cryptome.org/2015/03/gcsb-solomons-nz-herald-15-0314.pdf http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11411759 http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11411730 http://media.nzherald.co.nz/webcontent/document/pdf/201513/WTO%20document.pdf https://firstlook.org/theintercept/2015/03/04/new-zealand-gcsb-surveillance-waihopai-xkeyscore/ https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/ https://firstlook.org/theintercept/2015/03/07/new-zealand-ironsand-waihopai-nsa-gcsb/ https://firstlook.org/theintercept/2015/03/22/new-zealand-gcsb-spying-wto-director-general/ http://www.stuff.co.nz/national/67082905/snowden-files-inside-waihopais-domes https://leaksource.files.wordpress.com/2015/03/gcsb-asia-pacific-spying-five-eyes-nsa-xkeyscore.pdf https://leaksource.files.wordpress.com/2015/03/gcsb-provide-nsa-nz-data.pdf https://leaksource.files.wordpress.com/2015/03/gcsb-xks-ironsand-access-multiple-choice-test-check-box.pdf https://leaksource.files.wordpress.com/2015/03/gcsb-asd-nzsis-asis-south-pacific-spying-high-priority.pdf http://www.radionz.co.nz/news/national/267923/gcsb-in-mass-collection-of-pacific-data-ferguson http://www.bbc.com/news/world-asia-31741564 _______________________________________ ¤ How NSA-GCHQ Stole the Keys to the Encryption Castle :: AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data. http://cryptome.org/2015/02/gchq-pcs-harvesting-intercept-15-0219.pdf https://firstlook.org/theintercept/2015/02/19/great-sim-heist/ http://www.democracynow.org/2015/2/20/nsa_british_gchq_hacked_sim_card https://firstlook.org/theintercept/2015/02/20/gemalto-heist-shocks-europe/ ¤ Gemalto Government National Mobile ID Schemes / Partners :: http://cryptome.org/2015/02/gemalto-gov-national-mobile-id.pdf http://cryptome.org/2015/02/gemalto-partner-list.htm ¤ Gemalto Responds After SIM Encryption Key Heist Exposed :: http://www.gemalto.com/press/Pages/Information-regarding-a-report-mentioning-a-hacking-of-SIM-card-encryption-keys.aspx http://www.infowars.com/sim-card-producer-denies-any-real-risk-from-nsa-hacking-its-encryption-keys/ ¤ White House Responds After SIM Encryption Key Heist Exposed :: MIRROR #1 http://postimg.org/image/yj37iju33/ MIRROR #2 https://pbs.twimg.com/media/B-U0B20CIAASRpq.png _______________________________________ ¤ NSA’s “Equation Group” Firmware-imbedded Malware Found :: NSA stores secret imbedded malware inside the firmware of harddrives and USB(s). Malware can be used as a beacon once plugged into an air-gapped system and data can be accessed remotely while OFFLINE. Kaspersky’s reconstructions of the spying programs show that they could work in disk drives sold by more than a dozen companies, comprising essentially the entire market. They include Western Digital Corp, Seagate Technology Plc, Toshiba Corp, IBM, Micron Technology Inc and Samsung Electronics Co Ltd. Western Digital, Seagate and Micron said they had no knowledge of these spying programs. Toshiba and Samsung declined to comment. IBM did not respond to requests for comment. http://cryptome.org/2015/02/nsa-equation-group.pdf http://www.stuff.co.nz/technology/digital-living/66279485/nsa-hiding-equation-spy-program-on-hard-drives https://news.yahoo.com/russian-researchers-expose-breakthrough-u-spying-program-194217480--sector.html http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/ _______________________________________ ¤ NY Times’ David Carr Snowden Interview Hours Before Death :: http://timestalks.com/laura-poitras-glenn-greenwald-edward-snowden.html http://www.newsmax.com/Newsfront/David-Carr-died-New-York-Times-Snowden/2015/02/13/id/624700/ _______________________________________ ¤ NSA Claims Iran Learned from Western Cyberattacks :: http://cryptome.org/2015/02/iran-gchq-intercept-15-0210.pdf https://firstlook.org/theintercept/2015/02/10/nsa-iran-developing-sophisticated-cyber-attacks-learning-attacks/ _______________________________________ ¤ White House Spy “Reform” - Increase Spying! Flaunt It! :: An in-you’re-face attitude is now considered “reform.” http://cryptome.org/2015/02/ic-ppd-28-15-0203.zip https://firstlook.org/theintercept/2015/01/29/one-year-major-report-nsa-still-collecting-bulk-domestic-data-still-clueless-much-good-surveillance/ _______________________________________ ¤ Hypocrisy of Youtube’s CitizenFour Censorship :: http://piratetimes.net/new-snowden-documentary-censored-online/ ¤ Citizenfour Snowden Documentary (7-Zipped MP4) :: http://cryptome.org/Citizenfour.7z ¤ Citizenfour Snowden Documentary HD (7-Zip MP4) :: http://cryptome.org/Citizenfour-HD.7z ¤ Citizenfour Screengrabs, 87 PDFs in 13 Files :: http://cryptome.org/2015/01/Citizenfour-Screengrabs-pdfs.7z ¤ Citizenfour Screengrabs, 87 JPGs in 13 Folders :: http://cryptome.org/2015/01/Citizenfour-Screengrabs.7z _______________________________________ ¤ Western Spy Agencies Secretly Rely on Hackers for Intel :: http://cryptome.org/2015/02/gchq-lovely-horse-intercept-15-0204.pdf https://firstlook.org/theintercept/2015/02/04/demonize-prosecute-hackers-nsa-gchq-rely-intel-expertise/ ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ CSEC Eyeballs File Sharing Host User Data :: http://torrentfreak.com/canadian-government-spies-on-millions-of-file-sharers-150128/ http://www.cbc.ca/news/cse-tracks-millions-of-downloads-daily-snowden-documents-1.2930120 https://firstlook.org/theintercept/2015/01/28/canada-cse-levitation-mass-surveillance http://motherboard.vice.com/read/how-canadian-spies-infiltrated-the-internets-core-to-watch-what-you-do-online? ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ NSA MORECOWBELL HTTP GET Attacking :: http://cryptome.org/2015/01/nsa-morecowbell.htm http://cryptome.org/2015/01/MORECOWBELL.pdf http://cryptome.org/2015/01/MORECOWBELL-Analysis-Grothoff-etal.pdf http://cryptome.org/2015/01/Wertheim-NSA-and-Encryption-NotiAMS-Feb15.pdf http://www.lemonde.fr/economie/visuel/2015/01/24/cowbells-nouvelles-revelations-sur-les-pratiques-de-la-nsa_4561547_3234.html _______________________________________ ¤ Compilation of Snowden Documents - January 30, 2015 :: https://github.com/nsa-observer/documents/archive/master.zip https://github.com/nsa-observer/documents/tree/master/files/pdf _______________________________________ ¤ How GCHQ Prepares Interception of Phone Calls From Satellites :: http://electrospaces.blogspot.com/2015/01/how-gchq-prepares-for-interception-of.html _______________________________________ ¤ NSA Documents Expose NSA’s Digital Arms Race for Cyber Warfare :: The NSA’s mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway. Normally, internship applicants need to have polished resumes, with volunteer work on social projects considered a plus. But at Politerain, the job posting calls for candidates with significantly different skill sets. We are, the ad says, “looking for interns who want to break things.” Politerain is not a project associated with a conventional company. It is run by a US government intelligence organization, the National Security Agency (NSA). More precisely, it’s operated by the NSA’s digital snipers with Tailored Access Operations (TAO), the department responsible for breaking into computers. Potential interns are also told that research into third party computers might include plans to “remotely degrade or destroy opponent computers, routers, servers and network enabled devices by attacking the hardware.” Using a program called Passionatepolka, for example, they may be asked to “remotely brick network cards." With programs like Berserkr they would implant “persistent backdoors” and “parasitic drivers.” Using another piece of software called Barnfire, they would “erase the BIOS on a brand of servers that act as a backbone to many rival governments.” An intern’s tasks might also include remotely destroying the functionality of hard drives. Ultimately, the goal of the internship program was “developing an attacker’s mindset.” The internship listing is eight years old, but the attacker’s mindset has since become a kind of doctrine for the NSA’s data spies. And the intelligence service isn’t just trying to achieve mass surveillance of Internet communication, either. The digital spies of the Five Eyes alliance -- comprised of the United States, Britain, Canada, Australia and New Zealand -- want more. http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html ¤ Der Spiegel Releases NSA’s Plans for Cyber Warfare :: http://cryptome.org/2015/01/spiegel-15-0117.7z _______________________________________ ¤ Prying Eyes: Inside the NSA’s War on Internet Security :: US and British intelligence agencies undertake every effort imaginable to crack all types of encrypted Internet communication. The cloud, it seems, is full of holes. The good news: New Snowden documents show that some forms of encryption still cause problems for the NSA. ... ... As one document from the Snowden archive shows, the NSA had been unsuccessful in attempts to decrypt several communications protocols, at least as of 2012. An NSA presentation for a conference that took place that year lists the encryption programs the Americans failed to crack. In the process, the NSA cryptologists divided their targets into five levels corresponding to the degree of the difficulty of the attack and the outcome, ranging from “trivial” to “catastrophic.” Monitoring a document’s path through the Internet is classified as “trivial.” Recording Facebook chats is considered a “minor” task, while the level of difficulty involved in decrypting emails sent through Moscow-based Internet service provider mail.ru is considered “moderate.” Still, all three of those classifications don’t appear to pose any significant problems for the NSA. Things first become troublesome at the fourth level. The presentation states that the NSA encounters “major” problems in its attempts to decrypt messages sent through heavily encrypted email service providers like Zoho or in monitoring users of the Tor network, which was developed for surfing the web anonymously. Tor, otherwise known as The Onion Router, is free and open source software that allows users to surf the web through a network of more than 6,000 linked volunteer computers. The software automatically encrypts data in a way that ensures that no single computer in the network has all of a user’s information. For surveillance experts, it becomes very difficult to trace the whereabouts of a person who visits a particular website or to attack a specific person while they are using Tor to surf the Web. The NSA also has “major” problems with Truecrypt, a program for encrypting files on computers. Truecrypt’s developers stopped their work on the program last May, prompting speculation about pressures from government agencies. A protocol called Off-the-Record (OTR) for encrypting instant messaging in an end-to-end encryption process also seems to cause the NSA major problems. Both are programs whose source code can be viewed, modified, shared and used by anyone. Experts agree it is far more difficult for intelligence agencies to manipulate open source software programs than many of the closed systems developed by companies like Apple and Microsoft. Since anyone can view free and open source software, it becomes difficult to insert secret back doors without it being noticed. Transcripts of intercepted chats using OTR encryption handed over to the intelligence agency by a partner in Prism -- an NSA program that accesses data from at least nine American internet companies such as Google, Facebook and Apple -- show that the NSA’s efforts appear to have been thwarted in these cases: “No decrypt available for this OTR message.” This shows that OTR at least sometimes makes communications impossible to read for the NSA. Things become “catastrophic” for the NSA at level five - when, for example, a subject uses a combination of Tor, another anonymization service, the instant messaging system CSpace and a system for Internet telephony (voice over IP) called ZRTP. This type of combination results in a “near-total loss/lack of insight to target communications, presence,” the NSA document states. ZRTP, which is used to securely encrypt conversations and text chats on mobile phones, is used in free and open source programs like RedPhone and Signal. “It’s satisfying to know that the NSA considers encrypted communication from our apps to be truly opaque,” says RedPhone developer Moxie Marlinspike. http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html ¤ NSA Attacks on VPN, SSL, TLS, SSH, Tor :: http://cryptome.org/2014/12/nsa-spiegel-14-1228.rar _______________________________________ ¤ Operation Socialist ; How GCHQ Spies Hacked Belgium’s Largest Telco :: https://firstlook.org/theintercept/2014/12/13/belgacom-hack-gchq-inside-story/ ¤ GCHQ Belgacom Telecom Hacking (ZIP) :: Slides show Canada’s intelligence agency, CSEC, was involved in helping GCHQ intercept Belgacom communications. It also proves 3rd party cookies are very much instrumental in being used to exploit information about IPs. http://cryptome.org/2014/12/gchq-belgacom-intercept-14-1213.zip _______________________________________ ¤ Keith Alexander’s Anti-spy Patent Leaked :: http://cryptome.org/2014/12/nsa-alexander-patent-14-1125.pdf ¤ Keith Alexander Now Works To Secure Banking Networks :: http://www.bloomberg.com/news/2014-06-20/ex-nsa-chief-pitches-advice-on-cyber-threats-to-the-banks.html _______________________________________ ¤ Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide :: Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks. One high-profile surveillance target is the GSM Association, an influential UK-headquartered trade group that works closely with large US-based firms including Microsoft, Facebook, AT&T, and Cisco, and is currently being funded by the US government to develop privacy-enhancing technologies. Karsten Nohl, a leading cellphone security expert and cryptographer who was consulted by The Intercept about details contained in the AURORAGOLD documents, said that the broad scope of information swept up in the operation appears aimed at ensuring virtually every cellphone network in the world is NSA accessible. https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/ ¤ NSA Operation AURORAGOLD Slides :: http://cryptome.org/2014/12/nsa-aurora-gold-intercept-14-1203.pdf ¤ NSA OPULANT PUP Circumventing Strong Cryptography :: Last year, the Washington Post reported that the NSA had already managed to break the most commonly used cellphone encryption algorithm in the world, known as A5/1. But the information collected under AURORAGOLD allows the agency to focus on circumventing newer and stronger versions of A5 cellphone encryption, such as A5/3. http://cryptome.org/2014/12/nsa-opulant-pup-intercept-14-1203.pdf _______________________________________ ¤ Germany’s Intelligence Agency, the BND, Spies On Civilians Too :: German MPs examining the surveillance activities the US National Security Agency have found a legal loophole that allows the Berlin’s foreign intelligence agency to spy on its own citizens. The agency, known by its German acronym BND, is not usually allowed to intercept communications made by Germans or German companies, but a former BND lawyer told parliament this week that citizens working abroad for foreign companies were not protected. The German government confirmed on Saturday that work-related calls or emails were attributed to the employer. As a result, if the employer is foreign, the BND could legally intercept them. Angela Merkel pretends to be outraged about industrial espionage by the NSA while condoning illegal surveillance itself. http://www.theguardian.com/world/2014/nov/29/german-loophole-allows-bnd-agency-spy-own-people http://www.infowars.com/like-the-nsa-and-gchq-germanys-foreign-intelligence-agency-uses-a-legal-loophole-to-spy-on-its-own-citizens/ https://www.techdirt.com/articles/20141202/09513729296/like-nsa-gchq-germanys-foreign-intelligence-agency-uses-legal-loophole-to-spy-its-own-citizens.shtml _______________________________________ ¤ How Vodafone-Subsidiary Telecom Aided GCHQ’s Spying Efforts :: Previously unpublished documents show how the UK telecom firm Cable & Wireless, acquired by Vodafone in 2012, played a key role in establishing one of the Government Communications Headquarters’ (GCHQ) most controversial surveillance programs. A joint investigation by NDR, WDR, Süddeutsche Zeitung and Channel 4 based on documents leaked by whistleblower Edward Snowden, reveals that Cable & Wireless actively shaped and provided the most data to GCHQ mass surveillance programs, and received millions of pounds in compensation. The documents also suggest that Cable & Wireless assisted GCHQ in breaking into a competitor’s network. In response to these allegations, Vodafone said that an internal investigation found no evidence of unlawful conduct, but the company would not deny it happened. http://www.channel4.com/news/spy-cable-revealed-how-telecoms-firm-worked-with-gchq http://www.tagesschau.de/ausland/snowden-vodafone-101.html http://www1.wdr.de/daserste/monitor/videos/videovodafonederlangearmdesbritischengeheimdienstes100.html http://international.sueddeutsche.de/post/103543418200/snowden-leaks-how-vodafone-subsidiary-cable ¤ GCHQ’s Vodafone Cable Master List :: https://netzpolitik.org/2014/cable-master-list-wir-spiegeln-die-snowden-dokumente-ueber-angezapfte-glasfasern-auch-von-vodafone/ ¤ GCHQ Vodafone Gerontic Cables & Slides :: http://cryptome.org/2014/11/vodafone-gchq-slides.pdf http://cryptome.org/2014/11/vodafone-gchq-netzpolitik-slides-14-1125.pdf http://cryptome.org/2014/11/vodafone-gchq-netzpolitik-cables-14-1125.pdf ¤ GCHQ Vodafone Gerontic Cables & Slides ZIPPED :: http://cryptome.org/2014/11/Gerontic_GCHQ_SZ.zip ¤ INCENSER: How NSA and GCHQ Are Tapping Internet Cables :: http://electrospaces.blogspot.fi/2014/11/incenser-or-how-nsa-and-gchq-are.html _______________________________________ ¤ Microsoft SkyDrive (aka OneDrive) Gateway Into NSA PRISM :: http://cryptome.org/2014/11/ms-onedrive-nsa-prism.htm NOTE: Anything uploaded to “the cloud” is going to be available for the government to snoop through, the new Apple iphone gadgets automatically upload all users’ personal files into “the cloud” and yes, looks like Microsoft is also doing it as well. You might want to avoid using these new systems, go back to using older desktop computers which are rather easy to fortify. As for phones, you can buy an old jitterbug phone - it’s a basic cellphone without all the other crap included - just plain oldschool, mofos! And add one more thing - a “Blockit Pocket.” ;) _______________________________________ ¤ German Investigation of the Cooperation Between NSA-BND Part 1 :: http://electrospaces.blogspot.fr/2014/11/german-investigation-of-cooperation.html _______________________________________ ¤ UK Lawyers Spied by GCHQ Spies :: http://cryptome.org/2014/11/uk-lawyers-spies-intercept-14-1106.pdf https://firstlook.org/theintercept/2014/11/06/uk-surveillance-of-lawyers-journalists-gchq/ _______________________________________ ¤ The German Operation Eikonal Part of NSA’s RAMPART-A Program :: Just over a week ago, the regional German paper Süddeutsche Zeitung and the regional broadcasters NDR and WDR came with a story saying that between 2004 and 2008, the German foreign intelligence service BND had tapped into the Frankfurt internet exchange DE-CIX and shared the intercepted data with the NSA. As not all communications of German citizens could be filtered out, this is considered a violation of the constitution. Here we will give a summary of what is currently known about this BND operation and we will combine this with information from earlier reports. This will show that it was most likely part of the RAMPART-A program of the NSA, which includes similar interception efforts by foreign partner agencies. Finally, we will look at where exactly the BND interception might have taken place. http://electrospaces.blogspot.fr/2014/10/the-german-operation-eikonal-as-part-of.html --------------------------------------- ¤ How Secret Partners Expand NSA’s Surveillance Dragnet :: https://firstlook.org/theintercept/article/2014/06/18/nsa-surveillance-secret-cable-partners-revealed-rampart-a/ https://www.techdirt.com/articles/20140619/08062627624/nsa-working-with-denmark-germany-to-access-three-terabits-data-per-second-overseas-cables.shtml http://www.infowars.com/nsa-uses-33-countries-to-intercept-web-traffic-snowden-files/ http://gigaom.com/2014/06/20/governments-let-nsa-tap-cables-on-their-territory-latest-snowden-revelations-show/ ¤ Foreign Partner Access to Black Budget FY 2013 :: https://s3.amazonaws.com/s3.documentcloud.org/documents/1200866/foreignpartneraccessbudgetfy2013-redacted.pdf ¤ Overview Presenting the RAMPART-A Spy Program :: https://s3.amazonaws.com/s3.documentcloud.org/documents/1200860/odd-s3-overviewnov2011-v1-0-redacted-information.pdf ¤ Three RAMPART-A Slides :: https://s3.amazonaws.com/s3.documentcloud.org/documents/1200865/uodds2overview-v1-1-redacted-information-dk.pdf ¤ Black Budget FY 2013 / RAMPART-A Slides (Mirror) :: http://cryptome.org/2014/06/nsa-intercept-14-0618.pdf ¤ Update ; Intercept Releases More RAMPART-A Slides :: http://cryptome.org/2014/06/nsa-information-intercept-14-0619.pdf _______________________________________ ¤ Core Secrets: NSA Saboteurs in China and Germany The National Security Agency has had agents in China, Germany, and South Korea working on programs that use “physical subversion” to infiltrate and compromise networks and devices, according to documents obtained by The Intercept. The documents, leaked by NSA whistleblower Edward Snowden, also indicate that the agency has used “under cover” operatives to gain access to sensitive data and systems in the global communications industry, and that these secret agents may have even dealt with American firms. The documents describe a range of clandestine field activities that are among the agency’s “core secrets” when it comes to computer network attacks, details of which are apparently shared with only a small number of officials outside the NSA. “It’s something that many people have been wondering about for a long time,” said Chris Soghoian, principal technologist for the American Civil Liberties Union, after reviewing the documents. “I’ve had conversations with executives at tech companies about this precise thing. How do you know the NSA is not sending people into your data centers?” Previous disclosures about the NSA’s corporate partnerships have focused largely on US companies providing the agency with vast amounts of customer data, including phone records and email traffic. But documents published today by The Intercept suggest that even as the agency uses secret operatives to penetrate them, companies have also cooperated more broadly to undermine the physical infrastructure of the internet than has been previously confirmed. In addition to so-called “close access” operations, the NSA’s “core secrets” include the fact that the agency works with US and foreign companies to weaken their encryption systems; the fact that the NSA spends “hundreds of millions of dollars” on technology to defeat commercial encryption; and the fact that the agency works with US and foreign companies to penetrate computer networks, possibly without the knowledge of the host countries. Many of the NSA’s core secrets concern its relationships to domestic and foreign corporations. Some of the documents in this article appear in a new documentary, CITIZENFOUR, which tells the story of the Snowden disclosures and is directed by Intercept co-founder Laura Poitras. The documents describe a panoply of programs classified with the rare designation of “Exceptionally Compartmented Information,” or ECI, which are only disclosed to a “very select” number of government officials. https://firstlook.org/theintercept/2014/10/10/core-secrets/ ¤ Top Secret Special Source Operations Classification Guides :: http://cryptome.org/2014/10/nsa-whipgenie-the-intercept-14-1010.pdf http://cryptome.org/2014/10/nsa-tarex-the-intercept-14-1010.pdf ¤ Operation Sentry Eagle (Parts 1 & 2) :: http://cryptome.org/2014/10/nsa-sentry-eagle-the-intercept-14-1010.pdf http://cryptome.org/2014/10/nsa-sentry-eagle-2-the-intercept-14-1010.pdf ¤ NSA Exceptionally Controlled Information :: http://cryptome.org/2014/10/nsa-eci-the-intercept-14-1010.pdf http://cryptome.org/2014/10/nsa-eci-pawleys-the-intercept-14-1010.pdf http://cryptome.org/2014/10/nsa-eci-compartments-the-intercept-14-1010.pdf ¤ NSA National Initiative Task Security (Parts 1 & 2) :: http://cryptome.org/2014/10/nsa-nit-the-intercept-14-1010.pdf http://cryptome.org/2014/10/nsa-nit-2-the-intercept-14-1010.pdf ¤ NSA Computer Network Exploitation :: http://cryptome.org/2014/10/nsa-cne-declass-the-intercept-14-1010.pdf ¤ Following 10 NSA Releases (8.5MB | ZIP) :: http://cryptome.org/2014/10/nsa-releases-the-intercept-14-1010.zip _______________________________________ ¤ Retired NSA Technical Director Explains NSA Slides :: http://proxy.rickmartensen.nl/www.alexaobrien.com/secondsight/wb/binney.html ¤ Retired NSA Technical Director Explains NSA Slides (ZIP) :: Includes the report and the slides. http://fileb.ag/i627vr7a6bkx _______________________________________ ¤ ACLU’s FOIA Documents Shed Light on One of the NSA’s Most Powerful Tools (Other Agencies and Legal Loopholes) :: https://www.aclu.org/blog/national-security/new-documents-shed-light-one-nsas-most-powerful-tools ¤ Overview of (Other) Signals Intelligence Authorities :: https://www.aclu.org/files/assets/eo12333/NSA/Overview%20of%20Signals%20Intelligence%20Authorities.pdf ¤ DoD-DIA’s 16 Legal Loopholes to Spy On US Persons :: https://www.aclu.org/files/assets/eo12333/DIA/DoD%20HUMINT%20Legal%20Workshop%20Fundamentals%20of%20HUMINT%20Targeting.pdf ¤ Intelligence Law Handbook Defense HUMINT Service :: https://www.aclu.org/files/assets/eo12333/DIA/Intelligence%20Law%20Handbook%20Defense%20HUMINT%20Service.pdf _______________________________________ ¤ NSA Spies on UN in Vienna :: http://fm4.orf.at/stories/1746596/ http://securityaffairs.co/wordpress/28666/intelligence/nsa-spying-un-vienna.html http://www.techworm.net/2014/09/erich-mochel-leaks-photos-nsa-spying-united-nations.html ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations :: https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/ http://www.infowars.com/cointelrpo-revisited-greenwald-exposes-nsa-agenda-to-destroy-journalists/ One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents. Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.” ¤ GCHQ ; The Art of Deception: Training for Online Covert Operations :: https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/ https://s3.amazonaws.com/s3.documentcloud.org/documents/1021430/the-art-of-deception-training-for-a-new.pdf --------------------------------------- ¤ Hacking Online Polls and Other Ways British Spies Seek to Control the Internet :: The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplify” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call. The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users. https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ http://www.infowars.com/what-exactly-are-the-spy-agencies-actually-doing-with-their-bag-of-dirty-tricks/ ¤ GCHQ’s JTRIG Tools and Techniques :: http://cryptome.org/2014/07/nsa-jtrigall-intercept-14-0714.pdf --------------------------------------- ¤ More Details on GCHQ Propaganda/Deception Tactics :: https://firstlook.org/theintercept/2014/04/04/cuban-twitter-scam-social-media-tool-disseminating-government-propaganda/ This week, the Associated Press exposed a secret program run by the US Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published today by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for “propaganda,” “deception,” “mass messaging,” and “pushing stories.” ... ¤ GCHQ Full Spectrum Cyber Effects :: “Destroy Deny Degrade Disrupt Deceive Protect” http://cryptome.org/2014/04/gchq-full-spectrum-cyber.pdf ... The annual SIGDEV conference, according to one NSA document published today by The Intercept, “enables unprecedented visibility of SIGINT Development activities from across the Extended Enterprise, Second Party and US Intelligence communities.” The 2009 Conference, held at Fort Meade, included “eighty-six representatives from the wider US Intelligence Community, covering agencies as diverse as CIA (a record 50 participants), the Air Force Research Laboratory and the National Air and Space Intelligence Center.” Defenders of surveillance agencies have often insinuated that such proposals are nothing more than pipe dreams and wishful thinking on the part of intelligence agents. But these documents are not merely proposals or hypothetical scenarios. As described by the NSA document published today, the purpose of SIGDEV presentations is “to synchronize discovery efforts, share breakthroughs, and swap knowledge on the art of analysis.” For instance: One of the programs described by the newly released GCHQ document is dubbed “Royal Concierge,” under which the British agency intercepts email confirmations of hotel reservations to enable it to subject hotel guests to electronic monitoring. It also contemplates how to “influence the hotel choice” of travelers and to determine whether they stay at “SIGINT friendly” hotels. The document asks: “Can we influence the hotel choice? Can we cancel their visit?” ... ¤ NSA 5 Eyes 2009 SIGDEV Conference :: http://cryptome.org/2014/04/nsa-5-eyes-2009-sigdev.pdf --------------------------------------- ¤ GCHQ Trolls, Spies and Deceives Online Users :: http://cryptome.org/2014/02/gchq-online-deception.pdf ¤ GCHQ Disruption Operations :: http://cryptome.org/2014/02/gchq-disruption.pdf ¤ GCHQ Spreads Propaganda to Discredit Critics :: The documents from the GCHQ (the British equivalent of the NSA), titled “The Art of Deception: Training for Online Covert Operations,” were given to the NSA and leaked by Snowden. They reveal that the GCHQ is involved, through a unit known as JTRIG (Joint Threat Research Intelligence Group), in “the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of honey traps (luring people into compromising situations using sex) and destructive viruses.” The goals of the JTRIG program are “(1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable.” https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/ http://www.examiner.com/article/government-infiltrating-websites-to-deny-disrupt-degrade-deceive http://rt.com/news/five-eyes-online-manipulation-deception-564/ --------------------------------------- ¤ GCHQ Attacked Anonymous in 2012 :: http://cryptome.org/2014/02/gchq-anonymous.pdf http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_anonymous_nbc_document.pdf ¤ GCHQ Cyber Attack Operations :: http://cryptome.org/2014/02/gchq-cyber-attack.pdf http://s3.documentcloud.org/documents/1015553/snowden-cyber-offensive1-nbc-document.pdf ¤ GCHQ Full-Spectrum Cyber Effects :: http://cryptome.org/2014/02/gchq-cyber-effects.pdf ¤ GCHQ Spies Attacked Anonymous IRC Chats :: http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361 http://www.zdnet.com/uk-used-denial-of-service-against-anonymous-7000025993/ http://www.wired.co.uk/news/archive/2014-02/05/gchq-ddos-attack-anonymous ¤ British Spies Used Porn and Dirty Tricks to Lure Targets to Honeypots :: http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-sex-dirty-tricks-n23091 --------------------------------------- ¤ NSA & GCHQ Spies on Wikileaks, TPB Visitors :: https://firstlook.org/theintercept/article/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/ http://wikileaks.org/NSA-and-GCHQ-spying-on-WikiLeaks.html https://www.eff.org/deeplinks/2014/02/surveillance-and-pressure-wikileaks-readers http://torrentcrazy.com/news/nsa-authorized-monitoring-of-pirate-bay-and-proxy-users ¤ NSA-GCHQ Discovery SIGINT Targeting :: http://cryptome.org/2014/02/nsa-gchq-discovery.pdf ¤ Youtube Targets by SQUEAKYDOLPHIN Presentation :: http://cryptome.org/2014/02/gchq-squeakydolphin-videos.htm ¤ GCHQ Psychology SIGDEV :: http://cryptome.org/2014/02/gchq-psychology.pdf --------------------------------------- ▲ Reddit Censors All Stories Above :: http://www.infowars.com/reddit-censors-big-story-about-government-manipulation-and-disruption-of-the-internet/ _______________________________________ ¤ Unraveling NSA’s TURBULENCE Programs :: https://robert.sesek.com/2014/9/unraveling_nsa_s_turbulence_programs.html _______________________________________ ¤ New Zealand’s Prime Minister Isn’t Telling the Truth About Mass Surveillance :: https://firstlook.org/theintercept/2014/09/15/snowden-new-zealand-surveillance/ ¤ New Zealand Launched Mass Surveillance Project While Publicly Denying It :: https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/ ¤ Snowden and Greenwald Reveal Prime Minister John Key Lied About Kiwi Mass Surveillance, Key Calls Greenwald “A Loser” :: https://www.techdirt.com/articles/20140915/06175828518/snowden-greenwald-reveal-pm-john-key-lied-about-kiwi-mass-surveillance-key-hits-back-calling-greenwald-loser.shtml ¤ New Zealand Prime Minister Releases GCSB Spy Documents :: http://cryptome.org/2014/09/gcsb-nz-pm-nz-herald-14-0916.zip ¤ NSA Visit by New Zealand Spy PM Ferguson :: http://cryptome.org/2014/09/nsa-nz-ferguson-visit-the-intercept-14-0915.pdf ¤ The Questions for New Zealand on Mass Surveillance :: https://firstlook.org/theintercept/2014/09/15/questions-new-zealand-mass-surveillance/ _______________________________________ ▼ NSA Spooks Deny The Evidence (Provided Below) Exists :: Did the NSA forget Ed Snowden contacted NBC and released the evidence contacting authorities regarding his concerns? https://news.vice.com/article/the-nsa-has-revealed-new-details-about-its-exhaustive-search-of-edward-snowdens-emails ▲ FLASHBACK! Snowden Strikes Back at NSA, Emails NBC News :: Fugitive Edward Snowden on Friday challenged the NSA’s insistence that it has no evidence he tried to raise concerns about the agency’s surveillance activity before he began leaking government documents to reporters, calling the response a “clearly tailored and incomplete leak ... for a political advantage.” “The NSA’s new discovery of written contact between me and its lawyers -- after more than a year of denying any such contact existed - raises serious concerns,” Snowden said in an email Friday to NBC News. “It reveals as false the NSA’s claim to Barton Gellman of the Washington Post in December of last year, that ‘after extensive investigation, including interviews with his former NSA supervisors and co-workers, we have not found any evidence to support Mr. Snowden’s contention that he brought these matters to anyone’s attention.’” Snowden’s email followed Thursday’s release by the US Office of the Director of Intelligence of an email exchange between Snowden and the NSA’s Office of the General Counsel. The Washington Post received and published a similar response from Snowden on Thursday. http://www.nbcnews.com/feature/edward-snowden-interview/snowden-strikes-back-nsa-emails-nbc-news-n118821 ▲ NSA Oversight Training, OVSC1800 Minimization Training, NSA OGC Snowden Emails on OVSC1800 Course :: http://cryptome.org/2014/05/nsa-oversight.pdf http://cryptome.org/2014/05/nsa-ovsc1800.pdf http://cryptome.org/2014/05/nsa-ogc-snowden.pdf --------------------------------------- ¤ NBC Interviews Edward Snowden (Full) :: https://www.youtube.com/watch?v=yNhMXyAdjp8 Mirror here » http://upstore.net/62ocku _______________________________________ ¤ NSA-GCHQ Breached Deutsche Telekom and Other German Firms :: According to top-secret documents from the NSA and the British agency GCHQ, the intelligence agencies are seeking to map the entire Internet, including end-user devices. In pursuing that goal, they have broken into networks belonging to Deutsche Telekom. http://www.spiegel.de/international/world/snowden-documents-indicate-nsa-has-breached-deutsche-telekom-a-991503.html https://firstlook.org/theintercept/2014/09/14/nsa-stellar/ ¤ GCHQ Satellite Teleport Knowledge :: http://cryptome.org/2014/09/gchq-stellar-der-spiegel-14-0914.pdf ¤ NSA Treasure Map New Release :: http://cryptome.org/2014/09/nsa-treasure-map-new-der-spiegel-14-0914.pdf ¤ NSA Treasure Map Slides :: http://cryptome.org/2014/09/nsa-treasure-map-der-spiegel-14-0914.pdf http://s3.documentcloud.org/documents/1301057/tm-m-402.pdf _______________________________________ ¤ NSA Economic Espionage Benefits American Corporations :: https://firstlook.org/theintercept/2014/09/05/us-governments-plans-use-economic-espionage-benefit-american-corporations/ ¤ Masterspy Quadrennial Report 2009 (Spy For US Corporations) :: http://cryptome.org/2014/09/dni-qicr-2009-the-intercept-14-0905.pdf ▲ UPDATE: Obama Rubber Stamps Economic Espionage, Mass Spying :: http://www.nationaljournal.com/tech/despite-obama-s-pledge-to-curb-it-nsa-mass-surveillance-wins-rubber-stamp-20140913 _______________________________________ ¤ Bush-era Justification For Warrantless Wiretapping :: http://www.washingtonpost.com/world/national-security/legal-memos-released-on-bush-era-justification-for-warrantless-wiretapping/2014/09/05/91b86c52-356d-11e4-9e92-0899b306bbea_story.html http://www.dailystar.com.lb/News/World/2014/Sep-06/269796-bush-era-memos-president-can-wiretap-americans-at-all-times.ashx http://mic.com/articles/98116/just-released-bush-administration-memos-explain-deeply-disturbing-government-spying ¤ NSA STELLAR WIND Assessed by DoJ 2004 (REDACTED) :: http://cryptome.org/2014/09/nsa-olc-stellar-wind-wapo-14-0906.pdf ¤ NSA STELLAR WIND Assessed by DoJ 2004 (UNREDACTED) :: Above DOJ assessment released by WaPo compared to ACLU document. http://cryptome.org/2014/09/nsa-olc-stellar-wind-annotated.pdf ¤ NSA’s STELLAR WIND PROGRAM (DECLASSIFIED 2013) :: RAGTIME was the codename for Stellar Wind. http://cryptome.org/2013/06/nsa-stellar-wind.pdf ¤ NSA STELLARWIND Classification Marking :: http://electrospaces.blogspot.com/2014/09/about-stellarwind-and-another.html _______________________________________ ¤ DNI Releases 47 FISC Yahoo Documents :: http://cryptome.org/2014/09/dni-fisc-yahoo-14-0911.zip _______________________________________ KILLCEN ; Eyeballing Snowden’s Info Includes all news reports, videos, images, slides and documents from and related to Snowden’s leaks so far, up to September 5th of 2014. I’m still collecting any information that comes out and will provide an updated archive twice per year. Due to the enormous size of this current archive, the archive has been split concurrent to the names of each file and directory in alphabetical order to facilitate the size limit while uploading to the file hosts below. After decompression, the first folder is titled “Eyeballing_ Snowden_Info_Folder_01” and the second is titled “Eyeballing_ Snowden_Info_Folder_02” , both holding a total of 1,668 files (1.37GB) after being decompressed and consolidated. This was stored on an old OFFLINE system, without any WiFi card or modem attached so the archive is safe from being modified, exploited or stolen. Eyeballing_Snowden_Info_Folder_01.zip (589 files | ZIP | 686MB) http://fileb.ag/ojvlj5rqihw2 http://bitshare.com/files/pigqc2bo/Eyeballing_Snowden_Info_Folder_01.zip.html http://fpsbay.com/download/64709X14099602822363X347361/Eyeballing_Snowden_Info_Folder_01.zip Eyeballing_Snowden_Info_Folder_02.zip (1,079 files | ZIP | 476MB) http://fileb.ag/xqtrujp8jcey http://bitshare.com/files/ztfcjdwg/Eyeballing_Snowden_Info_Folder_02.zip.html http://fpsbay.com/download/64711X14099654782364X347381/Eyeballing_Snowden_Info_Folder_02.zip ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ NSA ; Ask Zelda (Redacted) :: http://cryptome.org/2014/03/nsa-ask-zelda.pdf https://firstlook.org/theintercept/article/2014/03/07/nsa-advice-columnist-seriously/ ¤ NSA ; Ask Zelda (Full, DECLASSIFIED) :: http://cryptome.org/2014/09/nsa-ask-zelda-14-0828.pdf _______________________________________ ¤ NSA’s Foreign Partnerships :: http://electrospaces.blogspot.com/2014/09/nsas-foreign-partnerships.html _______________________________________ ¤ Two-Faced Friendship: Turkey Is Partner and Target for NSA :: http://www.spiegel.de/international/documents-show-nsa-and-gchq-spied-on-partner-turkey-a-989011.html https://firstlook.org/theintercept/2014/08/31/nsaturkeyspiegel/ ¤ NSA-GCHQ Eyeball Turkey (Original Links) :: http://www.spiegel.de/media/media-34650.pdf http://www.spiegel.de/media/media-34651.pdf http://www.spiegel.de/media/media-34652.pdf http://www.spiegel.de/media/media-34653.pdf http://www.spiegel.de/media/media-34654.pdf http://www.spiegel.de/media/media-34655.pdf http://www.spiegel.de/media/media-34656.pdf http://www.spiegel.de/media/media-34657.pdf http://www.spiegel.de/media/media-34658.pdf http://www.spiegel.de/media/media-34659.pdf http://www.spiegel.de/media/media-34660.pdf http://www.spiegel.de/media/media-34661.pdf http://www.spiegel.de/media/media-34662.pdf ¤ NSA-GCHQ Eyeball Turkey (Mirrored) :: http://cryptome.org/2014/08/nsa-gchq-spy-turkey-der-spiegel-14-0831.pdf _______________________________________ ¤ How the NSA Built Its Own Secret Google :: https://firstlook.org/theintercept/article/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton ¤ NSA ICREACH Slides :: http://cryptome.org/2014/08/nsa-icreach.pdf _______________________________________ ¤ NSA-GCHQ-CSEC HACIENDA Program for Internet Colonization :: http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html ¤ NSA-GCHQ-CSEC HACIENDA Slides (ZIP) :: http://www.xup.to/dl,62909734/HACIENDA_Slides.zip/ ¤ NSA-GCHQ-CSEC HACIENDA Slides (PDF) :: http://cryptome.org/2014/08/nsa-gchq-csec-hacienda-heise-14-0816.pdf _______________________________________ ¤ Now US Corporations Admit They Profit From Spying :: Beat them at their own game - lie. http://www.forbes.com/sites/quickerbettertech/2014/08/18/the-other-sharing-economy-thats-about-to-change-the-world/ ¤ Money And Power - The Real Reason For The NSA Spying On Everyone :: Put out false information. Flood them with false data. https://www.techdirt.com/articles/20140819/17104028259/money-power-real-reason-nsa-spying-everyone.shtml _______________________________________ ¤ Newly Declassified Documents Regarding the “Now-Discontinued” (?) NSA Bulk Electronic Communications Metadata Pursuant to Section 402 of the Foreign Intelligence Surveillance Act :: http://icontherecord.tumblr.com/ _______________________________________ ¤ GCHQ Covert Mobile Phone Security Tactics :: http://cryptome.org/2014/08/gchq-covert-mobiles-the-intercept-14-0812.pdf ¤ Compare GCHQ Security Tactics to Jihadist Tactics :: https://prod01-cdn03.cdn.firstlook.org/wp-uploads/sites/1/2014/08/GCHQ-Jihadist-handbook.gif _______________________________________ ¤ Barack Obama’s Secret “Terrorist-Tracking” System :: Nearly half of the people on the US government’s widely shared database of terrorist suspects are not connected to any known terrorist group, according to classified government documents obtained by The Intercept. https://firstlook.org/theintercept/article/2014/08/05/watch-commander/ ¤ NCTC Directorate of Terrorist Identities :: http://cryptome.org/2014/08/nctc-dti-the-intercept.pdf ¤ Secret Government Rulebook For Labeling You a Terrorist :: The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither “concrete facts” nor “irrefutable evidence” to designate an American or foreigner as a terrorist, according to a key government document obtained by The Intercept. http://cryptome.org/2014/07/nctc-watchlist-intercept-14-0723.pdf https://firstlook.org/theintercept/article/2014/07/23/blacklisted/ http://www.infowars.com/leaked-document-facts-and-evidence-not-considered-when-adding-americans-to-terror-lists/ https://www.techdirt.com/articles/20140723/14232027979/intercept-reveals-us-governments-guidebook-declaring-your-terrorist-putting-you-no-fly-list.shtml https://www.techdirt.com/articles/20140723/14321427980/revealed-what-kind-extra-scrutiny-government-gives-to-folks-terrorist-watchlist.shtml NOBODY notes Sounds much like the (now defunct) COINTELPRO operation the FBI once was launched to target, blacklist and harrass US civil rights activists and whistleblowers back in the day - only these “dirty tricks” are now fully digitalized. ¤ Executive Order 12333: They Do Spy on Americans :: John Tye is but the latest surveillance whistleblower, though he took pains to distinguish himself from Snowden and his approach to dissent. “Before I left the State Department, I filed a complaint with the department’s inspector general, arguing that the current system of collection and storage of communications by US persons under Executive Order 12333 violates the Fourth Amendment, which prohibits unreasonable searches and seizures,” Tye explained. “I have also brought my complaint to the House and Senate intelligence committees and to the inspector general of the NSA.” These steps — which many say Snowden should’ve taken — produced no changes to the objectionable NSA spying and wouldn’t be garnering attention at all if not for Snowden’s leaks. http://www.washingtonpost.com/opinions/meet-executive-order-12333-the-reagan-rule-that-lets-the-nsa-spy-on-americans/2014/07/18/93d2ac22-0b93-11e4-b8e5-d0de80767fc2_story.html http://www.theatlantic.com/politics/archive/2014/07/a-new-surveillance-whistleblower-emerges/374722/ _______________________________________ ¤ Cash, Weapons, Surveillance - The US is a Key Party to Every Israeli Attack :: The US government has long lavished overwhelming aid on Israel, providing cash, weapons and surveillance technology that play a crucial role in Israel’s attacks on its neighbors. But top secret documents provided by NSA whistleblower Edward Snowden shed substantial new light on how the US and its partners directly enable Israel’s military assaults – such as the one on Gaza. https://firstlook.org/theintercept/2014/08/04/cash-weapons-surveillance/ ¤ ISNU-NSA Spying Pact (1999 & 2013) :: http://cryptome.org/2014/08/israel-us-1999-the-intercept.pdf http://cryptome.org/2014/08/nsa-israel-2013-the-intercept.pdf ¤ US Empire Pays Israel $500,000 in 2004 :: http://cryptome.org/2014/08/nsa-israel-500k-2004.pdf ¤ (RELATED) Terrorism in the Israeli Attack on Gaza :: https://firstlook.org/theintercept/2014/07/29/terrorism-israelgaza-context/ http://www.presstv.ir/detail/2014/08/04/374016/us-directly-enables-israeli-attacks-on-gaza/ http://rt.com/news/177716-us-israel-funding-aggression/ ¤ (RELATED) Gaza Natural Gas - Why Israel Kills for It :: http://cryptome.org/2014/08/gaza-natural-gas.zip _______________________________________ ¤ USA-Saudi Arabia Spy Partnership :: http://cryptome.org/2014/07/nsa-saudi-arabia-intercept-14-0725.pdf ¤ NSA’s New Partner in Spying ; Saudi Arabia’s Brutal State Police :: The National Security Agency last year significantly expanded its cooperative relationship with the Saudi Ministry of Interior, one of the world’s most repressive and abusive government agencies. An April 2013 top secret memo provided by NSA whistleblower Edward Snowden details the agency’s plans “to provide direct analytic and technical support” to the Saudis on “internal security” matters. The Saudi Ministry of Interior—referred to in the document as MOI — has been condemned for years as one of the most brutal human rights violators in the world. In 2013, the U.S. State Department reported that “Ministry of Interior officials sometimes subjected prisoners and detainees to torture and other physical abuse,” specifically mentioning a 2011 episode in which MOI agents allegedly “poured an antiseptic cleaning liquid down [the] throat” of one human rights activist. The report also notes the MOI’s use of invasive surveillance targeted at political and religious dissidents. But as the State Department publicly catalogued those very abuses, the NSA worked to provide increased surveillance assistance to the ministry that perpetrated them. The move is part of the Obama Administration’s increasingly close ties with the Saudi regime; beyond the new cooperation with the MOI, the memo describes “a period of rejuvenation” for the NSA’s relationship with the Saudi Ministry of Defense. In general, US support for the Saudi regime is long-standing. One secret 2007 NSA memo lists Saudi Arabia as one of four countries where the US “has [an] interest in regime continuity.” https://firstlook.org/theintercept/2014/07/25/nsas-new-partner-spying-saudi-arabias-brutal-state-police/ _______________________________________ ¤ Senate Bill Spy Funding FY 2015 :: http://cryptome.org/2014/07/spy-funding-fy2015.pdf _______________________________________ ¤ NSA Spying Costs to US Businesses :: http://cryptome.org/2014/07/nsa-naf-spy-costs.pdf http://www.bloomberg.com/news/2014-07-29/tech-companies-reel-as-nsa-spying-mars-image-for-clients.html _______________________________________ ¤ Insider - Intelligence Agencies Are Running Governments :: Alex Jones talks with NSA whistleblower William Binney about the growing corruption and power of the NSA and how they abuse their power behind the scenes to pull strings. http://www.youtube.com/watch?v=DERMBOJBDCk http://www.infowars.com/insider-says-intelligence-agencies-are-running-the-government/ _______________________________________ ¤ NSA/FISA Spying Timeline :: 1978 FISA ; 1981 EO 12333, 1982 DoD Reg 5240.1-R, 1993 USSID SP0018 ; 2001 USA Patriot Act, 2002 FISC “Raw Take” Share Motion ; 2003 SP002 ; 2004 PR/TT FISA ; 2004 NSA/CSS Policy 1-23 ; 2006 BR FISA ; 2006 RAS Memo ; 2007 PAA (expired) ; 2008 FAA ; 2008 SP002 (Revised) ; 2008 EO 12333 (Revised) ; 2008 RAS Memo (Revised) ; 2009 NSA/CSS Policy 1-23 (Revised). http://cryptome.org/2014/03/nsa-spy-timeline.pdf ▲ FISA Surveillance Leaks :: http://cryptome.org/2013/06/nsa-fisa-targeting.pdf http://cryptome.org/2013/06/nsa-fisa-minimization.pdf http://cryptome.org/2013/06/nsa-fisa-certification.pdf ▲ Executive Order 12333 (Default 1981) :: http://www.archives.gov/federal-register/codification/executive-order/12333.html ▲ DoD Regulation 5240.1-R (1982) :: Guidance to DoD components in implementing EO 12333 and general rules pursuant to FISA. http://cryptome.org/dod5240-1-r.htm ▲ USSID SP0018 (2003) :: http://www.dni.gov/files/documents/1118/CLEANEDFinal%20USSID%20SP0018.pdf ▲ FISA ; Pen Register and Trap and Trace (PR/TT) :: Opinion of the FISC granting the government application seeking the collection of bulk electronic communications metadata pursuant to Section 402 of FISA, the Pen Register and Trap and Trace (PR/TT) provision. http://cryptome.org/2013/11/nsa-13-1118/CLEANEDPRTT%201.pdf ▲ Bulk Collection Programs Under PATRIOT ACT :: http://cryptome.org/2013/07/obama-releases-13-0731.pdf ▲ NSA/CSS Policy 1-23 (Default 2004) :: http://cryptome.org/nsa-css-1-23.pdf ▲ NSA/CSS Policy 1-23 (Revised 2009) :: http://cryptome.org/2014/07/nsa-css-policy-1-23-nyt-14-0727.pdf ▲ Executive Order 12333 (Revised 2008) :: http://cryptome.org/eo12333-amend.htm NSA’s FOIA Release » http://cryptome.org/nsa-eo12333.pdf ▲ NSA ; FISA/PAA/FAA Classification Guide :: http://cryptome.org/2014/03/nsa-fisa-faa-class.pdf ▲ NSA Attorney General Dissemination Procedures :: http://cryptome.org/2014/03/nsa-ag-dissemination.pdf _______________________________________ ¤ NSA SIGINT Records Disposition Schedule :: http://cryptome.org/2014/08/nsa-sigint-rds.pdf http://www.nsa.gov/public_info/declass/records_management/index.shtml _______________________________________ ¤ The NSA Said Edward Snowden Had No Access to Surveillance Intercepts, They Lied :: The contents of the surveillance files — almost half of which contained information from US citizens or residents — “tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes.” http://www.theatlantic.com/politics/archive/2014/07/a-devastating-leak-for-edward-snowdens-critics/373991/ http://www.motherjones.com/kevin-drum/2014/07/nsa-said-edward-snowden-had-no-access-surveillance-intercepts-they-lied http://www.nationaljournal.com/tech/snowden-undermines-presidential-panel-s-defense-of-nsa-spying-20140708 ¤ Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On :: The National Security Agency and FBI have covertly monitored the emails of prominent Muslim-Americans—including a political candidate and several civil rights activists, academics, and lawyers—under secretive procedures intended to target terrorists and foreign spies. According to documents provided by NSA whistleblower Edward Snowden, the list of Americans monitored by their own government includes: • Faisal Gill, a longtime Republican Party operative and one-time candidate for public office who held a top-secret security clearance and served in the Department of Homeland Security under President George W. Bush; • Asim Ghafoor, a prominent attorney who has represented clients in terrorism-related cases; • Hooshang Amirahmadi, an Iranian-American professor of international relations at Rutgers University; • Agha Saeed, a former political science professor at California State University who champions Muslim civil liberties and Palestinian rights; • Nihad Awad, the executive director of the Council on American-Islamic Relations (CAIR), the largest Muslim civil rights organization in the country. https://firstlook.org/theintercept/article/2014/07/09/under-surveillance/ http://www.infowars.com/fbi-directly-spying-on-prominent-muslim-american-politicians-lawyers-and-civil-rights-activists/ http://electrospaces.blogspot.ca/2014/07/document-shows-that-it-was-not-nsa-but.html ¤ NSA FISA Accounts and Emails :: http://cryptome.org/2014/07/nsa-fisa-accounts.pdf http://cryptome.org/2014/07/nsa-emails.pdf ¤ Those Not Targeted Far Outnumber Foreigners Who Are :: NSA targeted domestic communications as well as foreign. http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-who-are/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html ▼ NSA OKs Domestic Spying for Suspected Criminals :: ¯¯¯¯¯¯¯¯¯ “The FBI is also permitted to disseminate US person information that reasonably appears to be evidence of a crime to law enforcement authorities.” http://cryptome.org/2014/07/pclob-14-0702.pdf ▲ US Government Denies Spying US Persons :: http://cryptome.org/2014/07/dni-doj-14-0709.pdf NOBODY responds Compare the new DoJ memo (dni-doj-14-0709.pdf) with the one during 2007, before any of the NSA documents were ever leaked (doj-nsa-memo.pdf) http://cryptome.org/2013/06/doj-nsa-memo.pdf Now compare the arrogance of the political class back in 2004 up till today. http://www.infowars.com/congress-insisted-they-be-kept-in-the-dark-on-nsa-spying/ Notice their lack of oversight during the Bush regime now stuck in continuum under the Obama regime? http://www.infowars.com/senate-committee-passes-cisa-cybersecurity-bill-that-could-broaden-nsa-powers/ Just like those in the “Department of Justice” they never learn from their mistakes, they are stuck in a state of blissful ignorance, they lie and when the truth comes out (as it often does), then they deny it happened. ¤ Some New Thoughts on the Snowden Cache :: http://members.efn.org/~paulmd/SomeNewThoughtsontheSnowdenCache.html “So, apparently the Snowden cache contains quite a large number of intercepted communications, not just technical documents, PowerPoint slides, and memos. This opens up a whole can of worms, and some new possibilities for the cache. Worms first: several journalists have access to an incredibly sensitive cache of personal information. According to some NSA defenders: Snowden has committed a horrible privacy violation of thousands of innocent Americans. This is a big problem, but it requires some mental gymnastics not to recognize that if Snowden had violated the privacy of innocents by giving this information to journalists, so had the NSA by storing it in the first place. Realistically, it’s not one or the other, it’s both. Now that we know what it contains, the long term storage of that portion cache by journalists becomes very problematic. On one hand: it’s evidence, on the other, it’s private information on many thousands of people. While there are some problems, there are also new possibilities. First, it could be a boon for defendants, and those facing legal jeopardy, to confront the evidence against them, to receive a genuinely fair trial. This is doubly important for drug cases, particularly those with DEA involvement, because of the highly questionably practice of Parallel Reconstruction, wherein classified evidence is laundered, and is reconstructed using traditional methods. In effect: perjury. Second, it is prima facie evidence to use in lawsuits against the NSA, proof that a plaintiff had been spied on. Third, one of the wilder stories: Snowden to Reveal the Secrets of Arab Dictators, really can happen now. The US government’s dealings with brutal regimes are newsworthy, so are the dealings of those regimes against their own people. One of the things that makes Cablegate so powerful, and simultaneously controversial, is the ability of ordinary citizens to query it, and learn what the government had kept hidden. In at least one case, it allowed a rendition victim to seek justice. I am not suggesting leaking it out in full, but ways of allowing ordinary citizens the ability to get their own communications, and broadening access, should be considered. Contrary to the opinions of those who described the Post’s story as a dud, it’s the first page of the next chapter of the Snowden Saga, with wide-reaching, and unpredictable consequences.” By Paul Dietrich, Jul 8, 2014 _______________________________________ ¤ Networks vs. Hierarchies: Which Will Win? :: http://libertyblitzkrieg.com/2014/06/22/networks-vs-hierarchies-which-will-win-niall-furguson-weighs-in/ ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ Ultimate Goal of the NSA ; Total Population Control :: At least 80% of all audio calls, not just metadata, are recorded and stored in the US, says whistleblower William Binney – that’s a “totalitarian mentality.” http://www.theguardian.com/commentisfree/2014/jul/11/the-ultimate-goal-of-the-nsa-is-total-population-control _______________________________________ ¤ NSA Hacks TOR in Germany, Calls Users Extremists :: http://cryptome.org/2014/07/nsa-tor-de.htm It is one of the most sensitive secrets of the NSA, the engine of the global monitoring machine: the source code of the XKeyscore program, the most comprehensive Ausspähprogramm of US foreign intelligence. NDR and WDR have excerpts of the source code. Parts of the collection infrastructure ie, so-called software rules that define the intelligence, what or who they want to investigate. There are only a few numbers and characters to string together the programmer. But when the program executes XKeyscore these rules, get people and their data in their sights. The connections from computers to the Internet are identified and stored in a database type. The users are quasi marked. It is the dragnet of the 21st century. http://download.media.tagesschau.de/video/2014/0703/TV-20140703-0546-2401.webl.webm MP4 Video Format » http://fileb.ag/u12my0tpvr8y ¤ XKeyscore Targets Tor :: http://daserste.ndr.de/panorama/xkeyscorerules100.txt ¤ NSA Targets the Privacy-conscious Using Tor :: http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html --------------------------------------- ¤ NSA/FRA XKeyscore Targets Tor, etc. :: http://cryptome.org/2013/12/nsa-xkeyscore-tor-slides.pdf ¤ NSA & GCHQ Counter-Tor Slides :: “Use cookies to identify Tor users when they are not using Tor.” “Investigate Evercookie persistence.” http://cryptome.org/2013/10/nsa-tor-stinks.pdf ¤ Cookies Threaten Tor User Anonymity :: “Just because you’re using Tor doesn’t mean that your browser isn’t storing cookies,” said Jeremiah Grossman, a colleague of Hansen’s who also specializes in browser vulnerabilities. As Grossman described the procedure to CNET, the NSA is aware of Tor’s entry and exit nodes because of its Internet wide surveillance. “The very feature that makes Tor a powerful anonymity service, and the fact that all Tor users look alike on the Internet, makes it easy to differentiate Tor users from other Web users,” he wrote. “The NSA then cookies that ad, so that every time you go to a site, the cookie identifies you. Even though your IP address changed [because of Tor], the cookies gave you away,” he said. http://news.cnet.com/8301-1009_3-57606178-83/nsa-tracks-google-ads-to-find-tor-users/ ¤ GCHQ ; MULLENIZE Operation to Tag and Identify Packet Traffic From Machines :: “Working together, CT and CNE have devised a method to carry out large-scale ‘staining’ as a means to identify individual machines linked to that IP address. ... ... User Agent Staining is a technique that involves writing a unique marker (or stain) onto a target machine. Each stain is visible in passively collected SIGINT and is stamped into every packet, which enables all the events from that stained machine to be brought back together to recreate a browsing session.” http://cryptome.org/2013/10/gchq-mullenize.pdf http://s3.documentcloud.org/documents/801762/mullenize-28redacted-29.pdf ¤ Packet Staining :: http://prezi.com/p5et9yawg2c6/ip-packet-staining/ http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-00 http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-01 http://cryptome.org/2013/10/packet-stain/packet-staining.htm ¤ NSA Peeling Back the Layers of Tor :: http://cryptome.org/2013/10/nsa-egotisticalgiraffe.pdf http://www.theguardian.com/world/interactive/2013/oct/04/egotistical-giraffe-nsa-tor-document http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption ¤ NSA ; Tor Source Code Vulnerabilities :: “We have seen several targets using Tor. Our goal was to analyze Tor source code and determine any vulnerabilities in the system. We set up an internal Tor network to analyze Tor traffic, in the hopes of discovering ways to passively identify it. We also worked to create a custom Tor client which allows the user finer control.” ... ... “This accomplishes several things. Most basically, the Tor servers, many of which are listed on publicly advertised directory servers, are chosen to act as a series of proxies. This may seem to be excessively complex, as a single proxy server can be used to hide one’s location, but a single-hop proxy is vulnerable in two ways. First, by analyzing the pattern of the traffic going to and from the proxy server, it is possible to deduce which clients are making which requests. Second, if an attacker owns the proxy server, then it certainly knows who is asking for what, and anonymization is ruined. By using multiple hops, Tor is much more resistant to both of these attacks. Traffic analysis becomes extraordinarily difficult, as it must be coordinated across several machines, and an attacker must own all the hops along the circuit in order to trace requests back to the originating client.” ... ... “In our time in the lab, we found that running an nmap on a node that is offering a hidden service will turn up the port that the hidden service is using to deal with incoming connections. It can then be directly connected to, outside of Tor.” ... ... “We would have to try to connect to each of the ports we see open on a machine to determine if there is a hidden service being run. We would not even know which protocol the hidden service is running. It may be an HTTP server, an FTP server, an SMTP server, etc. The only thing we know is that the protocol must run over TCP. It is not enough to attempt to connect once to each port, using an HTTP GET request. Several protocols must be tried.” ... ... “It may also be useful to study Tor directory servers in more detail. Our work focused solely on the client, but many attacks would be much easier with access to more Tor servers. The directory servers ultimately control which Tor servers are used by clients. We have found that a server can put itself on a directory server multiple times; all it takes is the server running several Tor processes, each having a different nickname, open port, fingerprint, and LOG FILE. This only requires different configuration files for the different processes, which are easy to set up. That machine will handle a disproportionate amount of traffic, since it is listed several times. This increases the density of friendly servers in the cloud without increasing the number of servers we have set up. Unfortunately, each listing has the same IP address, which would be very noticeable to anyone who inspecting the directories.” http://cryptome.org/2013/10/nsa-tor.pdf http://s3.documentcloud.org/documents/802061/ces-summer-2006-tor-paper-28redacted-29-1.pdf http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html ¤ NSA ; Types of IAT :: http://cryptome.org/2013/10/nsa-iat-tor.pdf ¤ NSA Link Removed by Guardian :: http://cryptome.org/2013/10/nsa-link-removed.htm ¤ Tor Media Reports Disinformative (?) :: “This document doesn’t give much insight into capabilities the IC has developed against Tor. It’s apparently quite common to run multiple research teams (either known or unknown to each other) against a single target, and a few summer students with a dozen lab machines is a pretty small investment. I’d expect there are other programs with more sophisticated attacks, especially now 7 years later.” http://cryptome.org/2013/10/nsa-tor-disinfo.htm _______________________________________ ¤ UPDATE ; German CIA Agent Arrested :: http://cryptocomb.org/?p=869 ¤ UPDATE ; Der Spiegel Exposed Spy Scandle Between US-Germany, ; Angela Merkel Plans to Scrap No-spy Agreement with US-Britain :: A new surveillance scandal is threatening to unsettle US-German relations after it emerged that an employee of Germany’s intelligence agency has been arrested under suspicion of acting as a double agent for the US. According to several reports in the German media, a 31-year-old member of the Bundesnachrichtendienst (BND) administration department in Pullach was on Wednesday arrested by the country’s federal prosecutor, originally under suspicion of passing on information to Russian intelligence services. ... ... The plan is in response to the scandal resulting from last week’s arrest of a 31-year-old BND “double agent” who spent at least two years selling top-secret German intelligence documents to his US spymasters in return for cash payments of €10,000 (£7,940) per document. ... The double agent is reported to have simply emailed Berlin’s American embassy and asked whether officials were interested in “co-operation”. He subsequently downloaded at least 300 secret documents on to USB sticks that he handed to his American spymasters at secret location in Austria. He was caught by German counter-espionage agents only after he was found offering similar BND documents to Berlin’s Russian embassy. The Germans had considered it “impossible” that one of their own intelligence men could be working as a “double agent” for the Americans. http://www.independent.co.uk/news/world/europe/germany-to-spy-on-us-for-first-time-since-1945-after-double-agentscandal-9590645.html http://www.theguardian.com/commentisfree/2014/jul/07/nsa-chancellor-double-agent-german-us-relations http://www.theguardian.com/world/2014/jul/04/germany-arrest-bnd-spying-allegations-double-agent-us http://www.nytimes.com/2014/07/11/world/europe/germany-expels-top-us-intelligence-officer.html?_r=0 ¤ Der Spiegel Releases NSA-BND Spy Documents :: http://cryptome.org/2014/06/nsa-spiegel-snowden-14-0618.pdf http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html ¤ NSA-BND_Spy_Documents_2014.zip (Mirror) :: http://filedump.org/files/epVgbFV91403117533.html ¤ Der Spiegel Release on German SIGADs :: http://cryptome.org/2014/06/nsa-spiegel-german-sigads.pdf ¤ Inside the New NSA-BND Revelations :: http://www.spiegel.de/international/germany/new-snowden-revelations-on-nsa-spying-in-germany-a-975441.html http://www.dw.de/new-leaks-show-germanys-collusion-with-nsa/a-17726141 ¤ NSA and BND Spying Telecommunications :: http://cryptome.org/2014/06/nsa-german-spying.pdf http://cryptome.org/2014/06/nsa-der-spiegel-14-0616.pdf ¤ Germany Cooperates Closely with NSA :: http://www.spiegel.de/international/world/spiegel-reveals-cooperation-between-nsa-and-german-bnd-a-909954.html ¤ Key Partners ; Secret Links Between BND and NSA :: http://www.spiegel.de/international/world/german-intelligence-worked-closely-with-nsa-on-data-surveillance-a-912355.html ▲ FLASHBACK ; Angela Merkel Compares NSA to Stasi :: In an angry exchange with Barack Obama, Angela Merkel has compared the snooping practices of the US with those of the Stasi, the ubiquitous and all-powerful secret police of the communist dictatorship in East Germany, where she grew up. http://www.theguardian.com/world/2013/dec/17/merkel-compares-nsa-stasi-obama _______________________________________ ¤ NSA FORNSAT Intercept in 2002 and Economic Motives :: http://electrospaces.blogspot.fr/2014/07/the-national-security-agency-in-2002.html _______________________________________ ¤ Look Out for Falling Redactions :: http://cryptome.org/2014/06/nsa-falling-redactions.pdf _______________________________________ ¤ Dump of BOUNDLESSINFORMANT IP Data :: https://gist.github.com/9b/de3f0510cccbd5dbfdf0 _______________________________________ ¤ NSA Playset ; Tailored Access for Hackers :: http://www.nsaplayset.org/ _______________________________________ ¤ How Secret Partners Expand NSA’s Surveillance Dragnet :: https://firstlook.org/theintercept/article/2014/06/18/nsa-surveillance-secret-cable-partners-revealed-rampart-a/ https://www.techdirt.com/articles/20140619/08062627624/nsa-working-with-denmark-germany-to-access-three-terabits-data-per-second-overseas-cables.shtml http://www.infowars.com/nsa-uses-33-countries-to-intercept-web-traffic-snowden-files/ http://gigaom.com/2014/06/20/governments-let-nsa-tap-cables-on-their-territory-latest-snowden-revelations-show/ ¤ Foreign Partner Access to Black Budget FY 2013 :: https://s3.amazonaws.com/s3.documentcloud.org/documents/1200866/foreignpartneraccessbudgetfy2013-redacted.pdf ¤ Overview Presenting the RAMPART-A Spy Program :: https://s3.amazonaws.com/s3.documentcloud.org/documents/1200860/odd-s3-overviewnov2011-v1-0-redacted-information.pdf ¤ Three RAMPART-A Slides :: https://s3.amazonaws.com/s3.documentcloud.org/documents/1200865/uodds2overview-v1-1-redacted-information-dk.pdf ¤ Black Budget FY 2013 / RAMPART-A Slides (Mirror) :: http://cryptome.org/2014/06/nsa-intercept-14-0618.pdf ¤ Update ; Intercept Releases More RAMPART-A Slides :: http://cryptome.org/2014/06/nsa-information-intercept-14-0619.pdf _______________________________________ Keith Alexander’s talking points for strategic meeting between the NSA and the Danish Defense Intelligence Service (DDIS). https://s3.amazonaws.com/s3.documentcloud.org/documents/1200859/diropeningremarksguidancefordp1-v1-1-v1-0.pdf _______________________________________ ¤ FISA Court Rules to Retain Spy Data Past 5 Years :: http://cryptome.org/2014/04/fisc-br14-01-14-0410.pdf ¤ NSA Admits They Keep All Spy Data Past 5 Years :: http://dailycaller.com/2014/06/10/nsa-our-systems-are-too-complex-to-stop-deleting-evidence/ _______________________________________ ¤ Head of GCHQ Very Pissed Off Over Media Coverage :: http://www.telegraph.co.uk/technology/internet-security/10910212/Head-of-GCHQ-launches-thinly-veiled-attack-on-The-Guardian.html _______________________________________ ¤ GCHQ Forced to Reveal Secret Policy for Mass Spying of Residents’ Facebook and Google Use :: https://www.privacyinternational.org/press-releases/uk-intelligence-forced-to-reveal-secret-policy-for-mass-surveillance-of-residents http://www.nytimes.com/2014/06/17/business/international/british-spy-agencies-said-to-assert-broad-power-to-intercept-web-traffic.html?_r=0 http://hosted.ap.org/dynamic/stories/E/EU_BRITAIN_ONLINE_SURVEILLANCE Britain’s top counter-terrorism official has been forced to reveal a secret Government policy justifying the mass surveillance of every Facebook, Twitter, Youtube and Google user in the UK. https://www.privacyinternational.org/sites/privacyinternational.org/files/downloads/press-releases/witness_st_of_charles_blandford_farr.pdf http://cryptome.org/2014/06/gchq-farr-pi.pdf (mirror) _______________________________________ ¤ THIS IS HOW THE US GOVERNMENT TREATS WHISTLEBLOWERS ; CIA Rendition Jet Was Waiting in Europe to Blackbag Snowden :: http://www.theregister.co.uk/2014/06/13/cia_rendition_jet_was_waiting_in_europe_to_snatch_snowden/ --------------------------------------- ¤ Leak Spy Documents @ The Intercept Dropbox :: http://y6xjgkgwj47us5ca.onion/ _______________________________________ ¤ PRISM FOIA Request Highly Censored :: http://cryptome.org/2014/06/nsa-prism-foia-email.pdf _______________________________________ ¤ DEA-NSA SANDKEY Voice Intercepts :: http://cryptomeorg.siteprotect.net/dea-nsa-sandkey.pdf Mirrored » http://fileb.ag/pmu6ugcxsxq1 _______________________________________ ¤ How Governments Around The World Responded To Snowden’s Revelations :: https://www.techdirt.com/articles/20140612/03532827554/how-have-governments-around-world-responded-to-snowdens-revelations.shtml _______________________________________ ¤ GCHQ’s Beyond Top Secret Middle Eastern Spy Base :: http://www.theregister.co.uk/2014/06/03/revealed_beyond_top_secret_british_intelligence_middleeast_internet_spy_base/ ¤ GCHQ’s Middle Eastern Spy Base Eyeball :: http://cryptome.org/2014-info/gchq-seeb/gchq-seeb.htm _______________________________________ ¤ UK Teleco Admits Governments Used Secret Cables to Tap Phones :: http://www.telegraph.co.uk/technology/internet-security/10880208/Vodafone-governments-use-secret-cables-to-tap-phones.html _______________________________________ ¤ Some Numbers About NSA’s Data Collection :: http://electrospaces.blogspot.com.br/2014/06/some-numbers-about-nsas-data-collection.html _______________________________________ ¤ NSA Whistleblower Russel Tice Reveals NSA Has Documents “Above Top Secret” and Many Are Burned After Covert Operations, Routinely :: “Think of it this way. Remember I told you about the NSA doing everything they could to make sure that the information from 40 years ago – from spying on Frank Church and Lord knows how many other Congressman that they were spying on – was hidden? Now do you think they’re going to put that information into Powerpoint slides that are easy to explain to everybody what they’re doing? They would not even put their own NSA designators on the reports [so that no one would know that] it came from the NSA. They made the reports look like they were Humint (human intelligence) reports. They did it to hide the fact that they were NSA and they were doing the collection. That’s 40 years ago. [The NSA and other agencies are still doing "parallel construction", "laundering" information to hide the fact that the information is actually from mass NSA surveillance.] Now, what NSA is doing right now is that they’re taking the information and they’re putting it in a much higher security level. It’s called “ECI” – Exceptionally Controlled Information – and it’s called the black program … which I was a specialist in, by the way. I specialized in black world – DOD and IC (Intelligence Community) – programs, operations and missions … in “VRKs”, “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access Program. It’s highly unlikely Mr. Snowden had any access to these. STO equals Special Technical Operations It’s highly unlikely Mr. Snowden had any access to these. Now in that world – the ECI/VRK world – everything in that system is classified at a higher level and it has its own computer systems that house it. It’s totally separate than the system which Mr. Snowden was privy to, which was called the “JWICS”: Joint Worldwide Intelligence Communications System. The JWICS system is what everybody at NSA has access to. Mr Snowden had Sys Admin [systems administrator] authority for the JWICS. And you still have to have TS/SCI clearance [i.e. Top Secret/ Sensitive Compartmented Information - also known as “code word” - clearance] to get on the JWICS. But the ECI/VRK systems are much higher[levels of special compartmentalized clearance] than the JWICS. And you have to be in the black world to get that [clearance]. ECI = Exceptionally Controlled Information. I do not believe Mr. Snowden had any access to these ECI controlled networks). VRK = Very Restricted Knowledge. I do not believe Mr. Snowden had any access to these VRK controlled networks. These programs typically have, at the least, a requirement of 100 year or until death, ’till the person first being “read in” [i.e. sworn to secrecy as part of access to the higher classification program] can talk about them. [As an interesting sidenote, the Washington Times reported in 2006 that – when Tice offered to testify to Congress about this illegal spying – he was informed by the NSA that the Senate and House intelligence committees were not cleared to hear such information.] It’s very compartmentalized and – even with stuff that they had – you might have something at NSA, that there’s literally 40 people at NSA that know that it’s going on in the entire agency. When the stuff came out in the New York Times [the first big spying story, which broke in 2005] – and I was a source of information for the New York Times – that’s when President Bush made up that nonsense about the “terrorist surveillance program.” By the way, that never existed. That was made up. There was no such thing beforehand. It was made up … to try to placate the American people. The NSA IG (Inspector General) – who was not cleared for this – all of a sudden is told he has to do an investigation on this; something he has no information or knowledge of. So what they did, is they took a few documents and they downgraded [he classification level of the documents] – just a few – and gave them to them to placate this basic whitewash investigation.” http://cryptome.org/2014/06/tice-shoot-snowden.pdf http://www.washingtonsblog.com/2014/06/original-nsa-whistleblower-snowden- http://www.infowars.com/nsa-whistleblower-snowden-never-had-access-to-the-juiciest-documents/ http://www.youtube.com/watch?v=az-YWMNWQuU http://www.youtube.com/watch?v=GJS7F-mShpI _______________________________________ ¤ NSA MYSTIC SIGAD Reporting Tabulation :: http://cryptome.org/2014/06/nsa-sigad-reporting.pdf ¤ NSA SOMALGET Spy Programme :: https://s3.amazonaws.com/s3.documentcloud.org/documents/1164088/somalget.pdf ¤ SOMALGET SSO Dictionary Excerpt :: https://s3.amazonaws.com/s3.documentcloud.org/documents/1164086/sso-dictionary-excerpt.pdf ¤ MYSTIC/SOMALGET Spy Documents :: http://cryptome.org/2014/05/nsa-intercept-14-0519.pdf ¤ Toward the Identity of “Country X” in MYSTIC :: http://cryptome.org/2014/05/nsa-mystic-identity.pdf ¤ Wikileaks Releases Identity of “Country X” :: http://wikileaks.org/WikiLeaks-statement-on-the-mass.html http://www.infowars.com/country-x-wikileaks-reveals-nsa-recording-nearly-all-phone-calls-in-afghanistan/ ¤ Google Idea’s Director Jared Cohen Was Tasked With Getting Afghan Telcos to Move Towers to US Bases :: https://wikileaks.org/plusd/cables/09KABUL2020_a.html ¤ Data Pirates of the Caribbean ; The NSA Is Recording Every Cell Phone Call in the Bahamas :: https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/ ¤ UPDATE ; The Bahamas Wants to Know Why the NSA is Recording Its Phone Calls :: https://firstlook.org/theintercept/2014/05/20/bahamas-wants-know-nsa-recording-phone-calls/ _______________________________________ ¤ NSA Collecting Millions of Faces From Web Images :: The FBI, DHS, state and local law enforcement agencies are now also using the same facial recognition systems as the NSA. Other biometric identification systems are being developed as well. A panopticon for endless spying in the police state. http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-web-images.html http://rt.com/usa/162868-nsa-snowden-social-facial/ ¤ NSA Identity Spying :: http://cryptome.org/2014/06/nsa-identity-spy.pdf _______________________________________ ¤ 10 Things (Most People) Didn’t Know Before Snowden :: 1. Everything you do online can be monitored. 2. What you do offline can be monitored! 3. They are collecting your phone records, too. 4. In some countries, it is not just metadata. 5. Or ordinary citizens for that matter. 6. The NSA engages in industrial espionage. 7. The NSA is also hacking the global financial system. 8. The NSA is also hacking into online video games. 9. The NSA uses pornography to honeytrap targets. 10. The NSA dragnet is collecting facial images. http://rt.com/usa/163700-year-whistleblower-before-snowden/ And a few more to think about, 11. The NSA has access to crypto-breaking supercomputers. 12. The NSA spied on human rights activists, organizations. 13. Google does in fact have personal relations in the NSA. 14. All electronic products are manufactured with backdoors. 15. NSA tampers with electronics being shipped by mail. _______________________________________ ▼ Snowden Strikes Back at NSA, Emails NBC News :: Fugitive Edward Snowden on Friday challenged the NSA’s insistence that it has no evidence he tried to raise concerns about the agency’s surveillance activity before he began leaking government documents to reporters, calling the response a “clearly tailored and incomplete leak ... for a political advantage.” “The NSA’s new discovery of written contact between me and its lawyers -- after more than a year of denying any such contact existed - raises serious concerns,” Snowden said in an email Friday to NBC News. “It reveals as false the NSA’s claim to Barton Gellman of the Washington Post in December of last year, that ‘after extensive investigation, including interviews with his former NSA supervisors and co-workers, we have not found any evidence to support Mr. Snowden’s contention that he brought these matters to anyone’s attention.’” Snowden’s email followed Thursday’s release by the US Office of the Director of Intelligence of an email exchange between Snowden and the NSA’s Office of the General Counsel. The Washington Post received and published a similar response from Snowden on Thursday. http://www.nbcnews.com/feature/edward-snowden-interview/snowden-strikes-back-nsa-emails-nbc-news-n118821 ▲ NSA Oversight Training, OVSC1800 Minimization Training, NSA OGC Snowden Emails on OVSC1800 Course :: http://cryptome.org/2014/05/nsa-oversight.pdf http://cryptome.org/2014/05/nsa-ovsc1800.pdf http://cryptome.org/2014/05/nsa-ogc-snowden.pdf --------------------------------------- ¤ NBC Interviews Edward Snowden (Full) :: https://www.youtube.com/watch?v=yNhMXyAdjp8 Mirror here » http://upstore.net/62ocku _______________________________________ ¤ What Does GCHQ Know About Our Devices We Don’t? :: https://www.privacyinternational.org/blog/what-does-gchq-know-about-our-devices-that-we-dont ¤ A Hint? ; “Flashdrive Cache Paths” (Repost) :: http://paste.security-portal.cz/view/b30bffb6 _______________________________________ ¤ Onionshare App Lets the Next Snowden Send Big Files Securely and Anonymously :: OnionShare lets you securely and anonymously share a file of any size with someone. It works by starting a web server, making it accessible as a Tor hidden service, and generating an unguessable URL to access and download the file. It doesn’t require setting up a server on the internet somewhere or using a third party filesharing service. You host the file on your own computer and use a Tor hidden service to make it temporarily accessible over the internet. The other user just needs to use Tor Browser to download the file from you. https://github.com/micahflee/onionshare http://www.wired.com/2014/05/onionshare/ ¤ Mirrored Onionshare App w/ Report (ZIP) :: https://anonfiles.com/file/9805fddaf90e3ecf37b957e5bed3f474 ¤ Mirrored Onionshare App w/ Report (RAR) :: https://anonfiles.com/file/ea22d9e866875e02a5a0c95e2f69b5d4 _______________________________________ ¤ Former NSA-CIA Director Michael Hayden Admits Metadata SIGINT Collection Used to Kill People :: http://www.youtube.com/watch?v=yaTGkSoI8Ic ¤ The Price of Privacy Debate - Re-Evaluating the NSA :: http://www.youtube.com/watch?v=kV2HDM86XgI _______________________________________ ¤ Glenn Greenwald - “No Place To Hide” (EPUB) :: magnet:?xt=urn:btih:2d1ace5d3b854a9afffc4c2b576cdadc4a0e2718 http://torrage.com/torrent/2D1ACE5D3B854A9AFFFC4C2B576CDADC4A0E2718.torrent ¤ Glenn Greenwald - “No Place To Hide” (PDF) :: http://cryptome.org/2014/05/npth.7z ▼ NSA Documents From “No Place To Hide” :: http://hbpub.vo.llnwd.net/o16/video/olmk/holt/greenwald/NoPlaceToHide-Documents-Uncompressed.pdf Mirror here » http://fileb.ag/94dwpno2eokp ▲ An Avalanche of Snowden Documents To Be Released Online Next Week :: http://www.engadget.com/2014/05/08/an-avalanche-of-new-snowden-documents-will-go-online-next-week/ --------------------------------------- ¤ NSA’s Largest Cable Tapping Program :: http://electrospaces.blogspot.de/2014/05/nsas-largest-cable-tapping-program.html ¤ Glenn Greenwald On Democracy Now :: http://publish.dvlabs.com/democracynow/ipod/dn2014-0513.mp4 http://publish.dvlabs.com/democracynow/ipod/dn2014-0514.mp4 ¤ New Snowden Document Implies NSA May Be Putting Israel’s Security Ahead of America’s :: http://www.infowars.com/new-snowden-document-implies-nsa-may-be-putting-israels-security-ahead-of-americas/ ¤ New Snowden Documents Reveal Depth Of Facebook Infiltration by NSA :: http://revolution-news.com/new-snowden-documents-reveal-depth-of-facebook-infiltration-by-nsa/ http://www.infowars.com/how-the-nsa-fbi-made-facebook-the-perfect-mass-surveillance-tool/ ¤ Leaked Photos of the NSA’s TAO Factory :: A document included in the trove of National Security Agency files released with Glenn Greenwald’s book “No Place To Hide” details how the agency’s Tailored Access Operations (TAO) unit and other NSA employees intercept servers, routers, and other network gear being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they’re delivered. http://govtslaves.info/leaked-photos-nsas-router-upgrade-factory/ http://cryptome.org/2014/05/nsa-customs.htm ¤ Cisco Letter to Obama Objecting to NSA Implants :: http://cryptome.org/2014/05/cisco-implant.pdf ¤ No Place to Hide Documents Compared to Previous :: http://cryptome.org/2014/05/npth-docs-compare.pdf ______________________________________ ¤ House Leaders and Obama Regime Water Down Surveillance Reform Bill :: http://newamerica.net/node/110983 _______________________________________ ¤ US Justice Department Told Supreme Court to Dismiss NSA Spying Cases? :: http://www.theguardian.com/commentisfree/2014/may/17/government-lies-nsa-justice-department-supreme-court _______________________________________ ¤ The New Yorker Interviews Keith Alexander :: http://www.newyorker.com/online/blogs/newsdesk/2014/05/were-at-greater-risk-q-a-with-general-keith-alexander.html _______________________________________ ▼ Leak Spy Documents @ The Intercept Dropbox :: http://y6xjgkgwj47us5ca.onion/ http://cryptome.org/2014/05/intercept-drop.pdf ▲ Obama’s Directive Makes Mere Citing of Snowden’s Leaks a Punishable Offense :: In a new policy directive from the Obama administrative, national security and other government officials will no longer be allowed to publicly discuss or even reference news reporting that is based on “unauthorized leaks.” https://www.commondreams.org/headline/2014/05/09 _______________________________________ ¤ Munk Debate on State Surveillance :: Greenwald, Ohanian vs Hayden, Dershowitz http://www.youtube.com/watch?v=_d1tw3mEOoE ______________________________________ ¤ NSA ; Manageable Network Plan :: http://cryptome.org/2014/05/nsa-network-plan.pdf ______________________________________ ¤ United States of Secrets ; How the Government Came to Spy on Millions of Americans :: Part One: Tuesday, May 13, 2014, at 9 p.m. on PBS Part Two: Tuesday, May 20, 2014, at 10 p.m. on PBS http://www.pbs.org/wgbh/pages/frontline/united-states-of-secrets/ http://www.pbs.org/wgbh/pages/frontline/pressroom/press-release-united-states-of-secrets-how-the-government-came-to-spy-on-millions-of-americans/ ______________________________________ ¤ NSA, Google Inc. Relationship Emails :: http://cryptome.org/2014/05/nsa-google.pdf ¤ NSA Scares CEOs Into Cyber Spying (Related) :: http://cryptome.org/2014/05/nsa-scares-ceos.pdf ¤ Emails Reveal Close Google Relationship With NSA :: “Keep in mind that social media survives by selling user data. Spying is their business model. In padding their bottom lines executives have worked diligently to dilute privacy legislation in addition to garnering a myriad of fines. All of this data harvesting services a data broker industry which generates something in the neighborhood of $200 billion in revenue annually.” - Bill Blunden, counterpunch.org http://america.aljazeera.com/articles/2014/5/6/nsa-chief-google.html http://www.theregister.co.uk/2014/05/07/googles_nsa_data_dealings_not_as_bad_as_first_thought_theyre_much_worse/ http://www.counterpunch.org/2014/05/09/the-nsas-corporate-collaborators/ _______________________________________ ¤ GCHQ Director Visits NSA for PRISM Data Access :: Hosted Dinner: 30 April 2013//1830Hrs - Quarters Hosted Discussions: 1 May 2013//0800-0830 “PURPOSE OF THE VISIT: (U//FOUO) As the Director of GCHQ, Sir Iain wants to reconnect with NSA Leadership on matters of mutual concern, and to ensure each partner is aware of the other’s activities and future plans.” … … “Unsupervised access to FAA 702 data, in a manner similar to Olympics Option, remains on GCHQ’s wish list and is something its leadership still desires.” http://cryptome.org/2014/04/nsa-gchq-lobban-visit.pdf ¤ GCHQ Unsupervised PRISM Access in 2012 :: http://cryptome.org/2014/04/nsa-prism-olympics.pdf ¤ NSA Spied “Suspected Terrorists” At 2012 Olympics :: http://cryptome.org/2014/04/nsa-ghostmachine-echobase.pdf ¤ NSA & GCHQ Eyeballed “Suspected Terrorists” Before, During and After 2012 Olympics :: The Snowden files do not indicate whether NSA granted GCHQ’s request, but they do show that the NSA was “supportive” of the idea, and that GCHQ was permitted extensive access to PRISM during the London Olympics in 2012. The request for the broad access was communicated at “leadership” level, according to the documents. Neither agency would comment on the proposed arrangement or whether it was approved. … … The data sharing between the agencies during the Olympics, though, was not isolated to PRISM. … … The NSA was funneling troves of intercepted data to GCHQ from a system called GHOSTMACHINE, a massive cloud database used by the NSA to analyze metadata and store, according to one document in the Snowden archive, “100s of billions of entries.” https://firstlook.org/theintercept/article/2014/04/30/gchq-prism-nsa-fisa-unsupervised-access-snowden/ _______________________________________ ¤ NSA MYSTIC Telephone Interception Program :: http://s3.documentcloud.org/documents/1086618/mysticssoweeklybrief.pdf http://s3.documentcloud.org/documents/1086616/fromsso-key-brief-overview.pdf http://s3.documentcloud.org/documents/1088934/mystic-tearsheet-cropped-v2.pdf The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden. A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance. The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere. In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary. The call buffer opens a door “into the past,” the summary says, enabling users to “retrieve audio of interest that was not tasked at the time of the original call.” Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage. http://www.washingtonpost.com/world/national-security/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls/2014/03/18/226d2646-ade9-11e3-a49e-76adc9210f19_story.html ¤ Washington Post Censors MYSTIC Slides :: The Washington Post is reporting, based on the files of whistleblower Edward Snowden, that the NSA is able to store every phone call made in an entire nation and replay them for up to 30 days. Not only can the agency do this, but there is a country where it’s actually doing this now–the Post knows where, but they won’t say. http://www.fair.org/blog/2014/03/19/the-nsa-built-a-time-machine-but-washington-post-wont-say-where/ ¤ NSA Records All Phone Calls Using Project MYSTIC :: http://www.youtube.com/watch?v=NYq44T5e3lU Mirror here » http://fileb.ag/3cva7msxqefx _______________________________________ ¤ NSA/NIS Dagbladet Documents Decensored :: There are a couple images in the latest Dagbladet story from the Snowden trove that were originally blurred instead of blacked out. This allowed the text to be recovered. There was no particular point in making a project out of the first, since it had already been published previously. The second was completely decoded in a matter of a few hours. http://cryptome.org/2014/04/DagbladetDecensor.pdf ¤ NSA/NIS Aquired Supercomputer to Break Crypto :: The Norwegian Inteligence Service (NIS) is also nauseous from the unmanageable amounts of data it is served daily. This is partly the reason why NSA now purchases a supercomputer codenamed Steelwinter. This information comes from a document Edward Snowden took from NSA and has later shared with Dagbladet. The document, marked “top secret” is a summary of how the NSA sees the collaboration with Norway after a meeting between the two services in March 2013. The supercomputer NIS buys is a derivation of the so-called Windsor Blue supercomputer. “NIS is in the process of acquiring STEEL WINTER (a WINDSORBLUE derivative supercomputer) and has entered into a partnership with NSA - cryptanalysis ( ...) service to develop applications of mutual benefit” the document says. “Windsor Blue” is the name of a program for supercomputers at the American IT-giant IBM. The company is working towards creating a so-called exascale supercomputer which means it can make a quintillion - 1,000,000,000,000,000,000 - calculations per second. http://www.dagbladet.no/2014/04/26/nyheter/snowden_i_norge/edward_snowden/nsa/etterretningstjenesten/32991102/ _______________________________________ ¤ Germany Blocks Edward Snowden From Testifying :: http://www.theguardian.com/world/2014/may/01/germany-edward-snowden-nsa-inquiry _______________________________________ ¤ NSA Spies More on Americans Than Russians :: http://www.nationaljournal.com/tech/edward-snowden-nsa-spies-more-on-americans-than-russians-20140430 _______________________________________ ¤ Snowden Asks Putin About Russian Spying :: http://www.youtube.com/watch?v=w1yH554emkY http://rt.com/news/snowden-putin-spy-online-140/ http://www.zerohedge.com/news/2014-04-17/snowden-calls-putin-telethon-discuss-legality-mass-surveillance _______________________________________ ¤ NSA Spied on Human Rights Workers :: The US has spied on the staff of prominent human rights organisations, Edward Snowden has told the Council of Europe in Strasbourg, Europe’s top human rights body. Giving evidence via a videolink from Moscow, Snowden said the National Security Agency – for which he worked as a contractor – had deliberately snooped on bodies like Amnesty International and Human Rights Watch. http://www.theguardian.com/world/2014/apr/08/edwards-snowden-us-government-spied-human-rights-workers ¤ Edward Snowden Testimony @ Parliamentary Assembly of the Council of Europe (Full) :: http://www.youtube.com/watch?v=3f8Lunf1a2w _______________________________________ ¤ EU High Court Allows Banning Metadata Collection :: Due to the particularities of EU lawmaking, the effects of the directive (spying) will still be in place in most EU member states for the time being. According to EU legal procedure, a directive is a type of law that requires each of the 28 member countries to “transpose” it into their own national laws. In this case, countries could even choose whether to expand the six-month requirement to as high as two years. ... ... Current EU data retention law will remain in effect until repealed legislatively or invalidated by domestic courts. http://arstechnica.com/tech-policy/2014/04/eu-high-court-strikes-down-metadata-collection-law/ _______________________________________ ¤ Masterspy Orders Snub on Media Contacts :: http://www.infowars.com/intelligence-head-who-lied-to-congress-bans-employees-from-talking-to-media/ _______________________________________ ¤ US Whines - ‘Anti-Snooping Plans are Unfair’ :: “Recent proposals from countries within the European Union to create a Europe-only electronic network (dubbed a ‘Schengen cloud’ by advocates) or to create national-only electronic networks could potentially lead to effective exclusion or discrimination against foreign service suppliers that are directly offering network services, or dependent on them,” the USTR said in its annual report. http://www.ustr.gov/sites/default/files/2014%20NTE%20Report%20on%20FTB.pdf http://inserbia.info/today/2014/04/us-blasts-eus-plan-for-schengen-cloud/ http://rt.com/news/us-europe-nsa-snowden-549/ ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ ACLU Offers NSA Document Search :: https://www.aclu.org/nsa-documents-search ¤ ACLU Offers Mirrored NSA Documents :: https://www.aclu.org/nsa-documents-released-public-june-2013 _______________________________________ ¤ KILLCEN ; Eyeballing_Snowden_Info.zip :: Includes all news reports, videos, images, slides and documents from and related to Snowden’s leaks so far, up to April 2nd of 2014. I’m still collecting any information that comes out and will provide an updated archive from time to time. After decompression - the main folder is titled “Eyeballing_Snowden_Info” and it holds a total of 927MB decompressed. This was stored on an old OFFLINE system, without any WiFi card or modem attached so the archive is safe from being modified, exploited or stolen. Eyeballing_Snowden_Info.zip (1,325 files | ZIP | 743MB) http://fileb.ag/1ixi6dqmbj80 http://fpsbay.com/download/64465X13965734822241X344921/Eyeballing_Snowden_Info.zip http://davvas.com/l21m47ls819e http://jumbofiles.org/newfile?n=528498&Eyeballing_Snowden_Info.zip _______________________________________ ¤ It’s Finally Admitted! :: https://www.documentcloud.org/documents/1100298-unclassified-702-response.html http://www.emptywheel.net/2014/04/01/james-clapper-confirms-vadm-mike-rogers-needlessly-obfuscated-in-confirmation-hearing/ http://www.theguardian.com/world/2014/apr/01/nsa-surveillance-loophole-americans-data http://www.zdnet.com/nsa-searched-u-s-calls-emails-without-warrant-u-s-intelligence-chief-admits-7000027938/ http://rt.com/usa/clapper-wyden-nsa-fisa-665/ _______________________________________ ¤ NSA Spy Chiefs of State :: http://cryptome.org/2014/03/nsa-spy-cos.pdf ¤ NSA Spy Chiefs of State (Full List) :: http://cryptome.org/2014/03/nsa-nymrod-spy-cos.pdf ¤ GCHQ and NSA Targeted Private German Companies :: http://www.spiegel.de/international/germany/gchq-and-nsa-targeted-private-german-companies-a-961444.html https://firstlook.org/theintercept/article/2014/03/29/der-spiegel-nsa-ghcq-hacked-german-companies-put-merkel-list-122-targeted-leaders/ https://www.wsws.org/en/articles/2014/03/31/nsas-m31.html http://leaksource.info/2014/03/31/122-country-leaders-in-nsas-target-knowledge-database-2009-document/ ▲ UPDATE ; European Parliament Suspends US Trade Talks Due to Political Spying :: http://falkvinge.net/2014/03/12/europarl-suspends-u-s-trade-talks-data-sharing-over-mass-surveillance/ _______________________________________ ¤ Video Demonstration of Two Intelligence Analysis Tools :: http://electrospaces.blogspot.se/2014/03/video-demonstration-of-two-intelligence.html ¤ Telephone Call Data Record Link Analysis Software :: http://www.youtube.com/watch?v=J38tKqq9kpY ¤ IBM i2 Analysts Notebook - Esri Edition :: http://www.youtube.com/watch?v=MJ5CovDQDYU ¤ Report and Both Videos ZIPPED & Mirrored :: http://fpsbay.com/download/64445X13961058822231X344721/Two%20Intelligence%20Analysis%20Tools.zip _______________________________________ ¤ NSA’s New Civil Liberties and Privacy Officer :: Becky Richards promises more transparency. She also promises the NSA will “build privacy into new technologies” to “protect privacy and civil liberties” and “to be as transparent with the public as possible” as well helping the public “understand how we’re protecting their privacy, how we’re protecting national security.” http://cryptome.org/2014/03/nsa-richards-14-0320.htm ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ NSA Huawei SHOTGIANT Hardware Exploit :: http://cryptome.org/2014/03/nsa-huawei.pdf http://cryptome.org/2014/03/nsa-huawei-02.pdf ¤ Huawei Global Cyber Security Assurance :: http://cryptome.org/2014/03/huawei-cyber-security.pdf ¤ Huawei Network Migration Tool (48.7MB) :: http://cryptome.org/2014/03/huawei-network-migration.zip ¤ NSA Breached Chinese Telecom Giant Huawei :: The American government conducted a major intelligence offensive against China, with targets including the Chinese government and networking company Huawei, according to documents from former NSA worker Edward Snowden that have been viewed by SPIEGEL and the New York Times. Among the American intelligence service’s targets were former Chinese President Hu Jintao, the Chinese Trade Ministry, banks, as well as telecommunications companies. But the NSA made a special effort to target Huawei. With 150,000 employees and €28 billion ($38.6 billion) in annual revenues, the company is the world’s second largest network equipment supplier. At the beginning of 2009, the NSA began an extensive operation, referred to internally as “Shotgiant,” against the company, which is considered a major competitor to US-based Cisco. The company produces smartphones and tablets, but also mobile phone infrastructure, WLAN routers and fiber optic cable -- the kind of technology that is decisive in the NSA’s battle for data supremacy. A special unit with the US intelligence agency succeeded in infiltrating Huwaei’s network and copied a list of 1,400 customers as well as internal documents providing training to engineers on the use of Huwaei products, among other things. http://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html http://www.spiegel.de/international/world/nsa-spied-on-chinese-government-and-networking-firm-huawei-a-960199.html http://news.yahoo.com/nsa-infiltrates-servers-china-telecom-giant-huawei-report-022030765--finance.html http://www.forbes.com/sites/rosatrieu/2014/03/24/chinas-huawei-condemns-nsa-spying-calls-for-unity-against-cyber-mischief/ ¤ Hong Lei Responds to Huawei NSA Backdoors :: “We are seriously concerned with relevant reports. The media has disclosed a lot about the eavesdropping, surveillance and spying activities that the US has carried out on other countries, including China. China has lodged representations with the American side on many occasions. We require the American side to give a clear explanation and stop such behaviours.” http://www.fmprc.gov.cn/eng/xwfw/s2510/t1140281.shtml _______________________________________ ¤ NSA Mapping and Spying System Administrators :: The document consists of several posts – one of them is titled “I hunt sys admins” – that were published in 2012 on an internal discussion board hosted on the agency’s classified servers. They were written by an NSA official involved in the agency’s effort to break into foreign network routers, the devices that connect computer networks and transport data across the Internet. By infiltrating the computers of system administrators who work for foreign phone and Internet companies, the NSA can gain access to the calls and emails that flow over their networks. The classified posts reveal how the NSA official aspired to create a database that would function as an international hit list of sys admins to potentially target. Yet the document makes clear that the admins are not suspected of any criminal activity – they are targeted only because they control access to networks the agency wants to infiltrate. “Who better to target than the person that already has the ‘keys to the kingdom’?” one of the posts says. The NSA wants more than just passwords. The document includes a list of other data that can be harvested from computers belonging to sys admins, including network maps, customer lists, business correspondence and, the author jokes, “pictures of cats in funny poses with amusing captions.” http://cryptome.org/2014/03/nsa-hunt-sysadmins.pdf https://firstlook.org/theintercept/document/2014/03/20/hunt-sys-admins/ https://firstlook.org/theintercept/article/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/ _______________________________________ ¤ NSA Culture, 1980s to the 21st Century :: http://cryptome.org/2014/03/nsa-sid-culture.pdf _______________________________________ ¤ CSEC SNOWGLOBE Slides :: http://cryptome.org/2014/03/cse-snowglobe.pdf http://s3.documentcloud.org/documents/1094526/babarfull.pdf ¤ Default Le Monde Report :: http://www.lemonde.fr/international/article/2014/03/21/quand-les-canadiens-partent-en-chasse-de-babar_4387233_3210.html ¤ Le Monde Report Translated to English :: http://slexy.org/view/s20ThA9Vog _______________________________________ ¤ DNI National Security / Secrecy Panic :: http://cryptome.org/2014/03/litt-14-0318.pdf _______________________________________ ¤ TED ; Ask Snowden :: http://www.youtube.com/watch?v=yVwAodrjZMY http://iroots.org/2014/03/18/transcript-edward-snowden-today-at-ted-talk/ _______________________________________ ¤ SXSW ; Ask Snowden :: http://www.youtube.com/watch?v=nRQTDNbYjqY http://cryptome.org/2014/03/snowden-sxsw.htm http://blog.inside.com/blog/2014/3/10/edward-snowden-sxsw-full-transcription-and-video _______________________________________ ¤ NSA ; Ask Zelda :: http://cryptome.org/2014/03/nsa-ask-zelda.pdf https://firstlook.org/theintercept/article/2014/03/07/nsa-advice-columnist-seriously/ _______________________________________ ¤ NSA Third Party (Five Eye) Relationships :: http://cryptome.org/2014/03/nsa-third-parties.pdf _______________________________________ ¤ Comsec as Essential Public Utility :: http://cryptome.org/2014/03/comsec-public-utility.htm ¤ Update ; Comsec as Essential Failure :: http://cryptome.org/2014/03/comsec-ewafmss.htm _______________________________________ ¤ NSA/CSS Classification/Damage Control :: http://cryptome.org/2014/03/nsa-policy-1-52.pdf _______________________________________ ¤ NSA/FBI Cryptanalysts Database Sharing :: http://cryptome.org/2014/03/nsa-crypt-fisa-share.pdf ▲ FBI’s Data Intercept Technology Unit (DITU) :: http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work ▲ FISA Court Releases FBI Spy Documents :: http://cryptome.org/2013/09/fisc-13-0917-4.pdf _______________________________________ ¤ STELLARWIND Classification Guide :: http://cryptome.org/2014/03/nsa-stellarwind-class.pdf ▲ NSA ; STELLARWIND Program :: http://cryptome.org/2013/06/nsa-stellar-wind.pdf _______________________________________ ¤ FISC Orders to Preserve NSA Metadata Spying :: http://cryptome.org/2014/03/fisc-br14-01-order-14-0312.pdf http://cryptome.org/2014/03/fisc-br14-01-tro-14-0311.pdf _______________________________________ ¤ How the NSA Plans to Infect Millions of Computers With Malware :: Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. https://prod01-cdn02.cdn.firstlook.org/wp-uploads/2014/03/nsa_malware_feature.jpg https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/turbine-large.jpg https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/tao-2-1024x768.png https://s3.amazonaws.com/s3.documentcloud.org/documents/1076889/nsa-technology-directorate-analysis-of-converged.pdf https://s3.amazonaws.com/s3.documentcloud.org/documents/1077724/industry-scale-exploitation.pdf https://s3.amazonaws.com/s3.documentcloud.org/documents/1077721/thousands-of-implants.pdf https://s3.amazonaws.com/s3.documentcloud.org/documents/1076859/nsa-phishing-tactics-and-man-in-the-middle-attacks.pdf https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pdf https://s3.amazonaws.com/s3.documentcloud.org/documents/1076862/quantum-insert-diagrams.pdf The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic. The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.” https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/ ¤ “Thousands of Implants” :: “Building the operations floor and increasing the number of break-out rooms will enable us to grow from the current average of these operations per clay to over per day and will facilitate the integration of 55 computer network operations and real--time customer support. Sustained collection involving automated implants pushing collected data from targets to the RDC as well as voice and geolocation collection are managed from the Operations Teaming Areas. The increased capacity in this area will support a growth from managing an average of I 543 active implants today to simultaneously managing thousands of implanted targets. The increased personnel capacity will support this net growth in operations tempo and will allow the integration of TAD's Requirements Targeting Division alongside the operators in order to better target development and efficiently plan and execute endpoint operations.” http://cryptome.org/2014/03/nsa-thousands-implants.pdf According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant. To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action. ¤ How the NSA Secretly Masqueraded as Facebook to Hack Computers for Surveillance :: https://player.vimeo.com/video/88822483 and @ https://www.youtube.com/watch?v=Td8nZscYvT4 Mirrored » http://megaswf.com/f/2647410 According to Matt Blaze, a surveillance and cryptography expert at the University of Pennsylvania, it appears that the QUANTUMHAND technique is aimed at targeting specific individuals. But he expresses concerns about how it has been covertly integrated within Internet networks as part of the NSA’s automated TURBINE system. ¤ NSA TURBINE Automated Hacking Documents (Mirrored) :: http://cryptome.org/2014/03/nsa-turbine-turmoil.pdf http://cryptome.org/2014/03/nsa-industry-exploit.pdf http://cryptome.org/2014/03/nsa-converged.pdf http://cryptome.org/2014/03/nsa-quantum-insert.pdf http://cryptome.org/2014/03/nsa-thousands-implants.pdf http://cryptome.org/2014/03/nsa-gchq-quantumtheory.pdf http://cryptome.org/2014/03/nsa-more-than-one-way.pdf http://cryptome.org/2014/03/nsa-hammerchant.pdf http://cryptome.org/2014/03/nsa-phishing-mtm.pdf http://cryptome.org/2014/03/tao-quantuminsert-bonanza.htm ¤ Compare TURBINE Slides (Spiegel vs Intercept) :: http://cryptome.org/2014/03/nsa-spot-differences.pdf ¤ NSA Denies Thousands of Implants :: http://cryptome.org/2014/03/nsa-14-0313.pdf _______________________________________ ¤ NSA Hacking Routers & Social Media (Misc) :: http://cryptome.org/2014/03/nsa-5-eyes-hacking.pdf http://cryptome.org/2014/03/nsa-menwith-xkeyscore.pdf http://cryptome.org/2014/03/nsa-selector.pdf _______________________________________ ¤ Cryptome Eyeballs Deputy Director Richard Ledgett :: http://cryptome.org/2014-info/richard-ledgett/richard-ledgett.htm _______________________________________ ¤ NSA Assistance to Dutch Somali Piracy Control :: Alliances between security services are usually kept secret. But thousands of NSA documents are now in the hands of a select group of journalists, thanks to former NSA worker Edward Snowden. They show that the NSA is the central organisation in an international exchange of tapped telephone and internet traffic. The Netherlands is also a part of this. In September, the German weekly Der Spiegel published an NSA document about the Netherlands. The graph, entitled ‘Netherlands – 30 days’, appeared to show that the NSA had listened in to 1.8 million Dutch telephone calls. But last month, the cabinet showed that the reality was different. The 1.8 million telephone calls, wrote home affairs minister Ronald Plasterk and defence minister Jeanine Hennis, were not intercepted by the Americans, but by the Dutch and then shared with the NSA. It was not American, but Dutch espionage. Two new documents give further details. The Netherlands, it transpires, intercepts vast amounts of Somali telephone traffic and shares it with the NSA. The Dutch use the information to combat piracy. But the Americans may possibly use the information for something else as well: taking out terrorism suspects by attacking them with armed drones. http://cryptome.org/2014/03/nsa-dutch-assist.pdf http://www.nrc.nl/nieuws/2014/03/05/the-secret-role-of-the-dutch-in-the-american-war-on-terror/ _______________________________________ ¤ NSA Blames Tech Firms, Vice Versa :: http://cryptome.org/2014/03/tech-stop-spying.htm http://cryptome.org/2014/03/big-data-spying.htm --------------------------------------- ¤ Tech Firms Spy :: http://cryptome.org/isp-spy/online-spying.htm ¤ NSA Spies Too :: https://www.aclu.org/nsa-documents-released-public-june-2013 _______________________________________ ¤ GCHQ “OPTIC NERVE” Spy Programme :: http://cryptome.org/2014/02/gchq-optic-nerve.pdf ¤ GCHQ Collects Webcam Photos of Yahoo Users :: The documents show that images were collected from webcams at regular intervals, one image every five minutes, and were used by the spy agency to trial automated facial recognition programs. http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo http://www.infowars.com/you-read-it-here-first-government-spies-on-innocent-people-via-webcams-laptops-xbox/ http://news.softpedia.com/news/GCHQ-Collected-Webcam-Images-of-Millions-of-Yahoo-Fans-429705.shtml https://www.wsws.org/en/articles/2014/02/28/gchq-f28.html ¤ FLASHBACK ; Infowars Warned Users in 2006 :: http://www.infowars.com/articles/bb/gov_industry_use_computer_mics_spy_on_americans.htm _______________________________________ ¤ NSA Director Alexander’s Phones :: http://electrospaces.blogspot.com/2014/02/nsa-director-alexanders-phones.html _______________________________________ ¤ NSA Seeks to Expand Database, 26 Feb 2014 :: http://www.breitbart.com/InstaBlog/2014/02/27/NSA-Seeks-to-Expand-Database http://www.uscourts.gov/uscourts/courts/fisc/br14-01-motion-140226.pdf _______________________________________ ¤ NSA Bugged Top German Officials After Orders Not to Spy On Chancellor Claims New Whistleblower :: http://www.mintpressnews.com/snowden-2-0-new-active-duty-nsa-whistleblower/180502/ http://techcrunch.com/2014/02/24/report-nsa-bugged-top-german-officials-after-obama-ordered-cease-of-spying-on-chancellor/ _______________________________________ ¤ NSA Observer :: https://nsa-observer.laquadrature.net/ _______________________________________ ¤ Spy Documents Released Since June 2013 :: https://www.aclu.org/nsa-documents-released-public-june-2013 http://cryptome.org/2014/02/snowden-tabulations.htm _______________________________________ ¤ NSA Spying Zero Hedge Connections :: http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2014/02/ZH%20browsing%20govt_1.jpg http://www.zerohedge.com/news/2014-02-19/while-browsing-zero-hedge-certain-government-agency _______________________________________ ¤ NYT Samantha Storey Inept Redactions :: Inlcudes two GCHQ documents. 01 “MOBILE THEME BRIEFING MAY 28 2010” 02 “Converged Analysis of Smartphone Devices” http://cryptome.org/2014/02/nyt-leak.zip _______________________________________ ¤ NSA’s Secret Role in the US Assassination Program :: An anonymous former drone operator for Joint Special Operations Command (JSOC) told The Intercept — a new publication helmed by Glenn Greenwald, who broke the first of many NSA revelations last year — that the US military and CIA use the NSA’s metadata analysis and phone-tracking abilities to identify airstrike targets without confirming their veracity on the ground. https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/ https://www.activistpost.com/2013/10/add-death-by-drone-to-nsas-list-of.html http://www.infowars.com/new-whistleblower-reveals-nsa-picking-drone-targets-based-on-bad-data-death-by-unreliable-metadata/ _______________________________________ ¤ ASD Helps NSA Spy on Law Firms, Laywers :: A top-secret document, obtained by the former NSA contractor Edward J. Snowden, shows that an American law firm was monitored while representing a foreign government in trade disputes with the United States. The disclosure offers a rare glimpse of a specific instance in which Americans were ensnared by the eavesdroppers, and is of particular interest because lawyers in the United States with clients overseas have expressed growing concern that their confidential communications could be compromised by such surveillance. http://www.nytimes.com/2014/02/16/us/eavesdropping-ensnared-american-law-firm.html http://www.activistpost.com/2014/02/new-snowden-docs-implicate-nsa-in.html http://thehill.com/blogs/global-affairs/asia-pacific/198506-report-spies-watched-us-lawyers-in-trade-deal NOBODY comments NY Times has not provided any documentation. There should be an FOIA request to the IC and perhaps to the DNI for this document to be declassified for research in public domain. _______________________________________ ¤ NSA FISA Business Spying :: http://cryptome.org/2014/02/nsa-fisa-business.pdf ¤ NSA Course on FISA Spying Operations :: http://cryptome.org/2014/02/nsa-fisa-course.pdf _______________________________________ ¤ Snowden Allegedly Used Web Scraper Tool :: http://www.nytimes.com/2014/02/09/us/snowden-used-low-cost-tool-to-best-nsa.html?hp&_r=1 _______________________________________ ¤ Ex-chancellor Gerhard Schröder Allegedly Spied by NSA (No Documentation Presented) :: Munich daily Sueddeutsche Zeitung and public broadcaster NDR reported Tuesday that Merkel’s predecessor Gerhard Schroeder was added to the NSA’s National Sigint Requirement List as number 388 in 2002. http://www.dw.de/reports-nsa-first-targeted-german-chancellor-schr%C3%B6der-then-merkel/a-17408683 http://www.theguardian.com/world/2014/feb/04/us-nsa-gerhard-schroeder-surveillance?view=mobile http://www.faz.net/aktuell/politik/ausland/ausspaeh-affaere-die-spionage-botschaft-12635377.html ¤ New Interpretations of NSA Monitoring the German Chancellor :: http://electrospaces.blogspot.de/2014/02/new-interpretations-of-nsa-monitoring.html _______________________________________ ¤ Dutch Intelligence Claims Responsibility for Phone Call Spying :: http://www.dutchnews.nl/news/archives/2014/02/the_netherlands_not_usa_gather.php http://static3.volkskrant.nl/static/asset/2014/kamerbrief_met_reactie_op_berichtgeving_metadata_telefoonverkeer_3761.pdf _______________________________________ ¤ First Congressman To Battle the NSA is Dead :: http://pando.com/2014/02/04/the-first-congressman-to-battle-the-nsa-is-dead-no-one-noticed-no-one-cares/ _______________________________________ ¤ Mike Rogers Wants Journalists With Leaks Jailed :: http://nypost.com/2014/02/05/pol-journalist-fencing-snowden-secrets-should-be-jailed/ _______________________________________ On Saturday 20 July 2013, in the basement of the Guardian’s office in Kings Cross, London, watched by two GCHQ technicians, Guardian editors destroyed hard drives and memory cards on which encrypted files leaked by Edward Snowden had been stored. This is the first time footage of the event has been released. http://www.youtube.com/watch?v=bUokM5d1qic ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ CSEC IP Profiling & Mission Impacts :: http://www.cbc.ca/news2/pdf/airports_redacted.pdf http://cryptome.org/2014/01/csec-ip-profile.pdf ¤ CSEC Objects to Disclosure of IP Profiling :: http://cryptome.org/2014/01/csec-14-0131.pdf ¤ CSEC Used Airport Wi-Fi to Track Travellers :: A top secret document retrieved by US whistleblower Edward Snowden and obtained by CBC News shows that Canada’s electronic spy agency used information from the free internet service at a major Canadian airport to track the wireless devices of thousands of ordinary airline passengers for days after they left the terminal. After reviewing the document, one of Canada’s foremost authorities on cyber-security says the clandestine operation by the Communications Security Establishment Canada (CSEC) was almost certainly illegal. ... ... The document indicates the passenger tracking operation was a trial run of a powerful new software program CSEC was developing with help from its US counterpart, the NSA. In the document, CSEC called the new technologies “game-changing,” and said they could be used for tracking “any target that makes occasional forays into other cities/regions.” http://www.cbc.ca/news/politics/csec-used-airport-wi-fi-to-track-canadian-travellers-edward-snowden-documents-1.2517881 CSEC concluded: “Can then take seeds from these airports and repeat to cover whole world.” http://arstechnica.com/tech-policy/2014/01/new-snowden-docs-show-canadian-spies-tracked-thousands-of-travelers/ ¤ More Details Into CSEC IP Profiling :: http://electrospaces.blogspot.fr/2014/02/did-csec-really-tracked-canadian.html ¤ How Canada’s CSEC Maps Phone and Internet Connections :: http://electrospaces.blogspot.com/2014/03/olympia-how-canadas-csec-maps-phone-and.html _______________________________________ ¤ NSA, GCHQ Allegedly Hack Cryptographer :: http://cryptome.org/2014/02/nsa-gchq-quisquater.pdf ¤ ... And Now It’s Personal :: http://cryptome.org/2014/02/stopping-nsa.htm _______________________________________ ¤ GCHQ Snooped on YouTube and Facebook :: Documents taken from the National Security Agency by Edward Snowden and obtained by NBC News detail how British cyber spies demonstrated a pilot program to their US partners in 2012 in which they were able to monitor YouTube in real time and collect addresses from the billions of videos watched daily, as well as some user information, for analysis. At the time the documents were printed, they were also able to spy on Facebook and Twitter. Called “Psychology A New Kind of SIGDEV” (Signals Development), the presentation includes a section that spells out “Broad real-time monitoring of online activity” of YouTube videos, URLs “liked” on Facebook, and Blogspot/Blogger visits. The monitoring program is called “Squeaky Dolphin.” Experts told NBC News the documents show the British had to have been either physically able to tap the cables carrying the world’s web traffic or able to use a third party to gain physical access to the massive stream of data, and would be able to extract some key data about specific users as well. http://cryptome.org/2014/01/gchq-squeaky-dolphin.pdf http://cryptome.org/2014/01/gchq-newtons-cat.pdf http://msnbcmedia.msn.com/i/msnbc/Sections/NEWS/snowden_youtube_nbc_document.pdf http://investigations.nbcnews.com/_news/2014/01/27/22469304-snowden-docs-reveal-british-spies-snooped-on-youtube-and-facebook?lite _______________________________________ ¤ NSA/GCHQ Smartphone App Location Spying :: http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html?_r=0 ¤ GCHQ Mobile Theme Briefing :: “Over 200 3rd party Location Aware Applications on the iPhone alone.” http://cryptome.org/2014/01/gchq-mobile-theme.pdf ¤ NSA Converged Analysis of Smartphone Devices :: “Android Phones pass GPS data in the clear.” http://cryptome.org/2014/01/nsa-smartphones-analysis.pdf _______________________________________ ¤ Obama Grants NSA Exemption From Law :: The National Security Agency program that collects data on nearly every US phone call isn’t legal, a privacy review board said Thursday in a newly released report. http://cryptome.org/2014/01/pclob-14-0123.pdf “We have not identified a single instance involving a threat to the United States in which the program made a concrete difference in the outcome of a counterterrorism investigation,” the board wrote in the report released Thursday. Despite Obama’s promise to reform the NSA, domestic spying will continue. http://edition.cnn.com/2014/01/23/politics/nsa-telephone-records-privacy/index.html?hpt=hp_t3 _______________________________________ ¤ Snowden Speaks :: http://cryptome.org/2014/01/snowden-video-13-0126.zip _______________________________________ ▼ Snowden Calls Russian-Spy Story “Absurd” :: http://www.newyorker.com/online/blogs/newsdesk/2014/01/snowden-calls-russian-spy-story-absurd.html ▲ NSA is NOT the Source of All Spying :: ¯¯¯ http://20committee.com/2014/01/18/the-end-of-the-snowden-operation/ NOBODY’s comment blocked @ 20committee.com Reform? Reform was never intended to come from politicians or the white house. Reform will come from peoples’ change of online use ; growing public use of open-source encryption, growing use of services such as Tor, a growing amount of computers air-gapped, growing use of hardcopy backups rather than “the cloud” - and add to that, more people bleaching their cookies among other web browser cache, surging VPN use, growing use of proxies. Sudden disconnections of users’ modems when not actually being used. The use of alternative search engines (such as ixquick, duckduckgo, startpage, privatelee, et al) and also consider the growing use of XPIs such as Noscript, Ghostery, HTTPS Everywhere and others. Reform? How about the death of RSA and a new generation of young privacy-crypto-enthusiasts who start to say “fuck the corporate platforms” and change it whether legal or not? The reform will come from people taking action. Here’s what I’d like to know - will “big government” follow up reform with their “internet kill switch?” _______________________________________ ¤ NSA Redactions Fail, Fail and Fail Again :: http://cryptome.org/2014/01/nsa-redaction-fails.pdf _______________________________________ ¤ NSA’s Upstream Collection Detailed :: The corporate partnerships are one of three ways NSA is intercepting the world’s main internet cables: - Cooperation with telecommunication companies - Cooperation with foreign intelligence agencies - Unilateral cable tapping operations http://electrospaces.blogspot.de/2014/01/slides-about-nsas-upstream-collection.html --------------------------------------- http://postimg.org/image/9viuxblpd/ http://www.youtube.com/watch?v=kOAv7zbJkCk http://www.dailydot.com/news/nsa-fairview-slides-brazil-spying/ http://cryptome.org/2013/08/nsa-codenames.htm _______________________________________ ¤ 24 FISA Court Documents DECLASSIFIED :: http://cryptome.org/2014/01/fisc-13-0117.zip ¤ FISA Court Orders Comparison :: http://cryptome.org/vz-slip.jpg http://cryptome.org/2014/01/fisc/fisc-orders-compare.htm http://cryptome.org/2014/01/fisc2/fisc-before-after-obama.htm http://cryptome.org/2014/01/fisc3/fisc-br-11-07-v-11-57.htm --------------------------------------- http://icontherecord.tumblr.com/ _______________________________________ ¤ SMS Text Messages - A Goldmine to Exploit :: http://cryptome.org/2014/01/nsa-sms-exploit.pdf http://s3.documentcloud.org/documents/1006111/sms.pdf ¤ NSA Vacuuming SMS Texts Around the World :: The documents also reveal the UK spy agency GCHQ has made use of the NSA database to search the metadata of “untargeted and unwarranted” communications belonging to people in the UK. The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets. The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity. http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep _______________________________________ ¤ NSA Covert Radio Signals Break Air-gaps :: http://cryptome.org/2014/01/nsa-quantum-radio.htm http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user. --------------------------------------- Refer to NSA’s Tailored Access Operations http://paste.cdtag.de/view.php?id=23643 _______________________________________ ¤ NSA Windows Event Monitoring :: http://cryptome.org/2014/01/nsa-windows-event.pdf --------------------------------------- ¤ Locate And Destroy WinRM Registry :: http://pastebin.jity.de/view/e8a662d4 _______________________________________ ¤ NSA Reducing the Effectiveness of Hash :: http://cryptome.org/2014/01/nsa-pass-hash.pdf _______________________________________ ¤ NSA’s Organizational Designations :: http://electrospaces.blogspot.com/2014/01/nsas-organizational-designations.html _______________________________________ ¤ Analysis of NSA’s 215 Metadata Spy Programs :: http://politicalscience.osu.edu/faculty/jmueller/NSAshane3.pdf _______________________________________ ¤ John Inglis Explains Why US-Based Collection of Internet Metadata Doesn’t Work :: http://www.npr.org/2014/01/10/261282601/transcript-nsa-deputy-director-john-inglis?live=1 http://www.emptywheel.net/2014/01/10/john-inglis-explains-why-us-based-collection-of-internet-metadata-doesnt-work/ _______________________________________ ¤ Rand Paul to Lead Class-Action Lawsuit Against Obama Over NSA Spying :: http://www.breitbart.com/Big-Government/2014/01/03/Rand-Paul-to-Sue-Obama-over-NSA-Spying _______________________________________ ¤ NSA Quantum Computing Research for Cracking All Encryption :: In room-size metal boxes ­secure against electromagnetic leaks, the National Security Agency is racing to build a computer that could break nearly every kind of encryption used to protect banking, medical, business and government records around the world. According to documents provided by former NSA contractor Edward Snowden, the effort to build “a cryptologically useful quantum computer” — a machine exponentially faster than classical computers — is part of a $79.7 million research program titled “Penetrating Hard Targets.” Much of the work is hosted under classified contracts at a laboratory in College Park, Md. http://cryptome.org/2014/01/nsa-quantum-computer.pdf http://cryptome.org/2014/01/nsa-quantum-computer-2.pdf http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_print.html _______________________________________ ¤ NSA and Random Number Generators :: http://blog.cryptographyengineering.com/2013/12/a-few-more-notes-on-nsa-random-number.html _______________________________________ ¤ Updated List of NSA Codenames :: http://cryptome.org/2014/01/nsa-codenames.htm _______________________________________ ¤ Jacob Appelbaum Explains New NSA Leaks :: https://www.youtube.com/watch?v=b0w36GAyZIA Mirror » http://fileb.ag/xwcp0jrewk2o ¤ Jacob’s NSA Slides @ioerror (ZIP) :: http://cryptome.org/2013/12/nsa-catalog.zip ¤ NSA Catalog Image Formats (16.7MB) Mirrored :: http://upsto.re/CtXqio http://f.lui.li/get_1228_a2b4.html http://blakker.pl/files/get/fenW1XyGrl/nsa-catalog-images.zip ¤ Documents Reveal Top NSA Hacking Unit :: The NSA’s TAO hacking unit is considered to be the intelligence agency’s top secret weapon. It maintains its own covert network, infiltrates computers around the world and even intercepts shipping deliveries to plant back doors in electronics ordered by those it is targeting. ... ... http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html The insert method and other variants of QUANTUM are closely linked to a shadow network operated by the NSA alongside the Internet, with its own, well-hidden infrastructure comprised of “covert” routers and servers. It appears the NSA also incorporates routers and servers from non-NSA networks into its covert network by infecting these networks with “implants” that then allow the government hackers to control the computers remotely. In this way, the intelligence service seeks to identify and track its targets based on their digital footprints. These identifiers could include certain email addresses or website cookies set on a person’s computer. Of course, a cookie doesn’t automatically identify a person, but it can if it includes additional information like an email address. In that case, a cookie becomes something like the web equivalent of a fingerprint. --------------------------------------- ¤ NSA QUANTUM Theory (FOXACID) :: http://cryptome.org/2013/12/nsa-quantumtheory.pdf ¤ NSA/GCHQ QUANTUM Tasking Techniques :: “YahooBcookie’s are unique to a specific computer and can hold other addresses that are being logged into on that computer as long as the user does not clear browser cookies.” http://cryptome.org/2013/12/nsa-quantum-tasking.pdf ¤ NSA QFIRE Packet Injection Attacks :: http://cryptome.org/2013/12/nsa-qfire.pdf --------------------------------------- ¤ NSA Catalog for Hardware Backdoors :: The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA’s department for Tailored Access Operations (TAO). In cases where TAO’s usual hacking and data-skimming methods don’t suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such implants, as they are referred to in NSA parlance, have played a considerable role in the intelligence agency’s ability to establish a global covert network that operates alongside the Internet. Some of the equipment available is quite inexpensive. A rigged monitor cable that allows “TAO personnel to see what is displayed on the targeted monitor,” for example, is available for just $30. But an “active GSM base station” -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million. The ANT division doesn’t just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer’s motherboard that is the first thing to load when a computer is turned on. This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this “Persistence” and believe this approach has provided them with the possibility of permanent access. Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies. http://cryptome.org/2013/12/nsa-tao-ant-pdf.pdf http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html http://gizmodo.com/the-nsa-actually-intercepted-packages-to-put-backdoors-1491169592 http://www.theguardian.com/world/2013/dec/29/der-spiegel-nsa-hacking-unit-tao https://www.wsws.org/en/articles/2013/12/31/snow-d31.html ¤ NSA Cisco / Juniper Router Backdoors :: http://cryptome.org/2013/12/nsa-ant-firewalls.pdf http://cryptome.org/2013/12/nsa-ant-router.pdf ¤ NSA Computer Monitor Backdoor :: http://cryptome.org/2013/12/nsa-ant-bildschirm.pdf ¤ NSA PCI Bus Backdoor :: http://cryptome.org/2013/12/nsa-ant-rechner.pdf ¤ NSA Motherboard Backdoor (#BadBIOS) :: http://cryptome.org/2013/12/nsa-ant-server.pdf ¤ NSA Keyboard Backdoor :: http://cryptome.org/2013/12/nsa-ant-tastatu.pdf ¤ NSA Apple iPhone Backdoor :: http://cryptome.org/2013/12/nsa-ant-handys.pdf ¤ NSA WiFi Card / Apple Airport Backdoors :: http://cryptome.org/2013/12/nsa-ant-mobilfunk.pdf ¤ NSA Active 802.11 Netcard Backdoor :: http://cryptome.org/2013/12/nsa-ant-w-lan.pdf ¤ NSA USB Backdoor to Bridge Air-gaps :: http://cryptome.org/2013/12/nsa-ant-usb.pdf ¤ NSA Alternative SIGINT Hunter :: http://cryptome.org/2013/12/nsa-ant-raumuber.pdf ¤ NSA Keystroke, Screenshot & SIGINT Hunting :: http://cryptome.org/2013/12/greenwald-13-1231.pdf http://truth-out.org/news/item/20948-glenn-greenwald-the-nsa-can-literally-watch-every-keystroke-you-make ¤ Jacob Appelbaum Comment on Der Spiegel Reports :: http://cryptome.org/2014/01/appelbaum-der-spiegel.htm --------------------------------------- BLOWBACK SETS IN ... ¤ IT Firms Lose Billions After NSA Scandal :: http://www.independent.co.uk/life-style/gadgets-and-tech/news/it-firms-lose-billions-after-nsa-scandal-exposed-by-whistleblower-edward-snowden-9028599.html ¤ Foreign Firms Won’t Buy American Tech :: https://www.informationweek.com/security/risk-management/nsa-fallout-why-foreign-firms-wont-buy-american-tech/d/d-id/1113384 --------------------------------------- ¤ Apple Claims They Know Nothing About Backdoors :: http://www.infowars.com/apple-says-it-knows-nothing-about-your-iphone-spying-on-you/ ¤ Apple Inc. Lying Exposed :: Logs from a properly air-gapped Mac OSX show the system attempting to access the Airport - yet the Airport card was physically disconnected. http://pastebin.jity.de/view/77d624be ¤ Cyber–Security Experts Ask If Apple “Flaw” Was Really NSA Backdoor :: Following an admission by Apple that a “bug” in its operating system had left devices open to potential hacking, experts are questioning whether the security hole was intentional, in order to allow the NSA backdoor access as part of its mass spying program. http://www.infowars.com/cyber-security-experts-ask-apple-flaw-was-really-nsa-backdoor/ --------------------------------------- ¤ Intel CEO Refuses To Answer Questions On Whether NSA Can Access Processors :: http://www.infowars.com/intel-ceo-refuses-to-answer-questions-on-whether-nsa-can-access-processors/ ¤ Dell Inc. Apologizes for the ‘Inconvenience’ of Helping NSA Install Backdoors :: http://www.techdirt.com/articles/20131230/17174425718/dells-twitter-account-apologizes-inconvenience-helping-nsa-place-hidden-bios-bug.shtml http://www.infowars.com/dells-twitter-account-apologizes-for-the-inconvenience-of-helping-nsa-install-spyware/ ¤ Locate And Destroy 802.11 Registry :: How to disable SOMBERKNAVE implant to properly air-gap the Windows XP system. http://pastebin.jity.de/view/bdd440b3 _______________________________________ ¤ NSA Whistleblower ; Planned Police State :: http://www.youtube.com/watch?v=x9Kcgme2I0c ¤ NSA Whistleblower ; National Security Scam :: http://www.youtube.com/watch?v=xPemLhvwfos _______________________________________ ¤ Edward Snowden Interview by Barton Gellman :: http://www.washingtonpost.com/world/national-security/edward-snowden-after-months-of-nsa-revelations-says-his-missions-accomplished/2013/12/23/49fc36de-6c1c-11e3-a523-fe73f0ff6b8d_story.html Beginning in October 2012, he said, he brought his misgivings to two superiors in the NSA’s Technology Directorate and two more in the NSA Threat Operations Center’s regional base in Hawaii. For each of them, and 15 other co-workers, Snowden said he opened a data query tool called BOUNDLESSINFORMANT, which used color-coded “heat maps” to depict the volume of data ingested by NSA taps. His colleagues were often “astonished to learn we are collecting more in the United States on Americans than we are on Russians in Russia,” he said. Many of them were troubled, he said, and several said they did not want to know any more. --------------------------------------- BOUNDLESS INFORMANT REPORTS/DOCS REFER HERE ; http://paste.cdtag.de/view.php?id=19580 _______________________________________ ¤ New York Judge, William Pauley III, Declares Metadata Hoarding Legal :: http://cryptome.org/2013/12/pauley-13-1227.pdf http://www.scribd.com/doc/194082600/NSA-Opinion http://www.politico.com/story/2013/12/nsa-phone-surveillance-ruling-101569.html http://www.infowars.com/judge-falls-for-the-big-lie-about-nsa-spying/ /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/ \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\ ¤ Judge Declares Metadata Hoarding Violates Fourth Amendment Rights :: http://cryptome.org/2013/12/klayman-048-049.pdf A federal judge ruled Monday that the National Security Agency program which collects information on nearly all telephone calls made to, from or within the United States is likely unconstitutional. US District Court Judge Richard Leon found that the program appears to violate the Fourth Amendment ban on unreasonable searches and seizures. He also said the Justice Department had failed to demonstrate that collecting the information had helped to head off terrorist attacks. Acting on a lawsuit brought by conservative legal activist Larry Klayman, Leon issued a preliminary injunction barring the NSA from collecting so-called metadata pertaining to the Verizon accounts of Klayman and one of his clients. However, the judge stayed the order to allow for an appeal. http://www.politico.com/story/2013/12/national-security-agency-phones-judge-101203.html http://www.wsws.org/en/articles/2013/12/17/cour-d17.html Leon’s 68-page opinion is the first significant legal setback for the NSA’s surveillance program since it was disclosed in June in news stories based on leaks from former NSA contractor Edward Snowden. For seven years, the metadata program has been approved repeatedly by numerous judges on the Foreign Intelligence Surveillance Court and found constitutional by at least one judge sitting in a criminal case. https://ecf.dcd.uscourts.gov/cgi-bin/show_public_doc?2013cv0851-48 ¤ Klayman v. NSA 7 Court Documents :: http://cryptome.org/2013/12/klayman-051-058.zip ▼ Delay Motion for Class Action Lawsuit :: http://cryptome.org/2013/12/klayman-060.pdf ▲ White House Tries to Prevent Judge From Ruling on Surveillance Efforts :: http://www.nytimes.com/2013/12/22/us/white-house-tries-to-prevent-judge-from-ruling-on-surveillance-efforts.html?_r=0 ¤ Bulk Metadata Collection Ruled Illegal :: http://cryptome.org/2013/12/leon-13-1216.pdf --------------------------------------- ¤ White House Spying Review Group Report :: http://cryptome.org/2013/12/obama-nsa-report.pdf ¤ White House Spy Report Commentary :: http://cryptome.org/2013/12/prgi-comments-001.htm http://cryptome.org/2013/12/prgi-comments-002.htm ¤ Obama Advisory Committee Whitewashes US Spying Programs :: http://www.wsws.org/en/articles/2013/12/19/spyi-d19.html --------------------------------------- ▼ FLASHBACK ; Michael Hayden Admits They Will NOT Stifle Surveillance :: http://www.youtube.com/watch?v=XS6nfkbNvlo http://www.infowars.com/former-nsa-boss-government-will-continue-surveillance-so-get-used-to-it/ ▲ Counter-spy_Manual.zip (22 files | ZIP | 2.93MB) http://paste.darkbyte.ru/view/5459487 http://ae7.st/p/26c (mirror) _______________________________________ ¤ NSA/CSS Mission Slides :: These slides, from an internal presentation in the first week of October 2001, show how critical the NSA sees electronic eavesdropping. http://cryptome.org/2013/12/nsa-css-mission.pdf “ 1B. Ability to exploit: - Military Information - Economic Information - Information Operations Information - Political Information ” _______________________________________ ¤ Eben Moglen & Bruce Schneier Talk About NSA Leaks, Software and Cryptography :: https://www.youtube.com/watch?v=N8Sc6pUR1mA ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ NSA Rigging RSA Crypto Market :: http://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220 ¤ RSA Cryptographers Duped and Bribed by NSA :: http://cryptome.org/2013/12/nsa-kills-rsa.htm ¤ NSA Kills RSA Trust and Therefore RSA Jobs :: http://cryptome.org/2013/12/nsa-kills-rsa-workers.htm ¤ List of Canceled RSA Talks Continues to Grow :: http://threatpost.com/list-of-canceled-rsa-talks-continues-to-grow/103508 ¤ FLASHBACK ; NSA Rigging the Crypto Market :: http://cryptome.org/jya/nsa-sun.htm _______________________________________ ¤ Did British Telecom Provides Backdoors for NSA and GCHQ (?) :: In a paper titled ‘The Internet Dark Age’ the researchers say that BT is shipping hardware with backdoors that allow secret government access in order to make network compromise easier. “BT are directly responsible for covertly embedding secret spy equipment in millions of homes and businesses within the UK,” the paper states. Recently on Cryptome (the better leaks than wikileaks site), a paper appeared pointing out that BT (British Telecom) assigns all their modems an extra address in the 30.x.x.x address space, and then attaches SSH and SNMP to that address. This looks like what many ISPs do, assigning a second IP address for management, except for one thing: the 30.0.0.0/8 block is assigned to the United States Department of Defense. This has caused a fevered round of speculation that this is actually a secret backdoor for the NSA/GCHQ, so that they can secretly monitor and control peoples’ home networks. Maybe, but it’s probably not the case. The better explanation is that BT simply chose this address space because it’s non-routable. While it’s assigned public address, it’s only used inside the private DoD military network. Try tracerouting to that address space, you’ll see that your packets go nowhere. http://cryptome.org/2013/12/Full-Disclosure.pdf http://www.csoonline.com/article/744697/report-accuses-bt-of-supplying-backdoors-for-gchq-and-nsa http://blog.erratasec.com/2013/12/dod-address-space-its-not-conspiracy.html ¤ Bruce Schneier Leaves British Telecom :: “Yes, it’s true. And contrary to rumors, this has nothing to do with the NSA or GCHQ. No, BT wasn’t always happy with my writings on the topic, but it knew that I am an independent thinker and didn’t try to muzzle me in any way. I’m just ready to leave. I spent seven years at BT, and seven years at Counterpane Internet Security, Inc., before BT bought us. It’s past time for something new.” http://www.schneier.com/blog/archives/2013/12/yes_im_leaving.html http://arstechnica.com/information-technology/2013/12/nsa-surveillance-critic-bruce-schneier-to-leave-post-at-bt/ http://www.computing.co.uk/ctg/news/2319296/bruce-schneier-leaves-bt-after-eight-years-as-security-futurologist --------------------------------------- ¤ NSA Infected Around 50,000 Networks Worldwide :: The American intelligence service - NSA - infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information. Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this. A management presentation dating from 2012 explains how the NSA collects information worldwide. In addition, the presentation shows that the intelligence service uses ‘Computer Network Exploitation’ (CNE) in more than 50,000 locations. CNE is the secret infiltration of computer systems achieved by installing malware, malicious software. One example of this type of hacking was discovered in September 2013 at the Belgium telecom provider Belgacom. For a number of years the British intelligence service - GCHQ – has been installing this malicious software in the Belgacom network in order to tap their customers’ telephone and data traffic. The Belgacom network was infiltrated by GCHQ through a process of luring employees to a false Linkedin page. http://www.nrc.nl/wp-content/uploads/2013/11/nsa568.jpg http://cryptome.org/2013/11/nsa-sigint-cryptologic-platform.pdf http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/ http://hothardware.com/News/Dutch-News-Agency-Reports-NSA-Infected-50000-Networks-With-Malware/ ¤ NSA Power to Generate Profits and Pay :: The NSA SIGINT Strategy 2012-2016 pretty well covers all the comsec and crypto initiatives to covertly exploit people, cryptographers, anonymizers, informants, planted spies, security firms, networks, governments, nations, friends, lovers and citizens. Not sure leaks, lawsuits and protests will deter this bounty of profits for the comsec industry, unless the public is aroused to demand the 3 branches grasp the nettle, and all those making money from this deception operation decide to give up their profits, perks and prestige. I mean those on the comsec and crypto lists, those participating in standards committees, those enjoying contracts and grants in think tanks and universities, those in law firms and public interest orgs, those in the media and academia, those in non-spy gov agencies, pretending to be in opposition as they scramble to rejigger their products and sales pitches, to exploit what is being fabricated to diminish Snowden’s revelations with new forms of secrecy, technology, law, regulations, bribery, lobbying, grants, contracts, list lurking, online and offline spying, break-ins, the usual kaboodle, to assure the NSA goals are fulfilled. http://cryptome.org/2013/11/nsa-power-profit-pay.htm http://cryptome.org/2013/11/nsa-sigint-cryptologic-platform.pdf ¤ NSA’s Global Interception Network :: http://electrospaces.blogspot.fr/2013/12/nsas-global-interception-network.html ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ GCHQ Accused of Spying European, German and Israeli Politicians (No Documentation) :: http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135.html http://www.theguardian.com/uk-news/2013/dec/20/gchq-targeted-aid-agencies-german-government-eu-commissioner http://www.nytimes.com/2013/12/21/world/nsa-dragnet-included-allies-aid-groups-and-business-elite.html?_r=0 _______________________________________ ¤ CBS 60min ; Inside the NSA (Part One) :: http://www.youtube.com/watch?v=WgPNyAYOr04 ¤ CBS 60min ; The Snowden Affair (Part Two) :: http://www.youtube.com/watch?v=5AaREKHQI8E ¤ NSA Interviewed by CBS - Transcript :: http://cryptome.org/2013/12/nsa-60mins/nsa-60mins.htm _______________________________________ ¤ Proposal for Distribution of Snowden Cache :: http://cryptome.org/2013/12/snowden-cache-dist.htm _______________________________________ ¤ EU Data Retention Directive “Unlawful” and “Incompatible” with Charter of Rights :: http://www.scribd.com/doc/191078925/Data-Retention-Challenge-Press-Release http://www.computing.co.uk/ctg/news/2318838/eu-data-retention-directive-unlawful-and-incompatible-with-charter-of-rights _______________________________________ ¤ GOOGLE CENSORING NSA SEARCH RESULTS (?) :: http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/17/edward-snowden-doesnt-show-up-once-in-googles-list-of-top-2013-searches/ _______________________________________ ¤ Clapper, Feinstein, Obama Total Disregard of Public Concerns :: http://cryptome.org/2013/12/spies-reign-obama.htm ¤ Merkel Throws a Pissy Fit :: http://www.theguardian.com/world/2013/dec/17/merkel-compares-nsa-stasi-obama _______________________________________ ¤ GCHQ’s Use of FLYING PIG to Spy :: “FLYING PIG is a program that allows analysts to query GCHQ’s vast repository of metadata about the world’s secure communications over TLS/SSL. It’s certainly not a program through which the GCHQ, or NSA for that matter, performs man-in-the-middle attacks against internet services like Google, as reported by others, including Bruce Schneier. The reports that claim the NSA performed MITM attacks against Google are based on a small piece of a document that describes a FLYING PIG (which is a not an NSA program, as you may have noticed) use case (presumably, an investigation into the DigiNotar CA breach). That’s not to say the GCHQ doesn’t perform MITM attacks, but there’s no evidence to be found in this document. Though, FLYING PIG may be used to prepare MITM attacks, e.g. by providing information about a target.” http://koen.io/2013/12/flying-pig-gchq-tls-ssl-knowledge-base/ ¤ NSA Use of FLYING PIG to Spy :: https://www.documentcloud.org/documents/785152-166819124-mitm-google.html http://www.techdirt.com/articles/20130910/10470024468/flying-pig-nsa-is-running-man-middle-attacks-imitating-googles-servers.shtml http://news.cnet.com/8301-13578_3-57602701-38/nsa-disguised-itself-as-google-to-spy-say-reports/ ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ John Young Breaks Down the NSA Leaks :: http://www.corbettreport.com/mp3/2013-12-17%20John%20Young.mp3 http://www.corbettreport.com/interview-793-john-young-breaks-down-the-snowdennsa-saga/ _______________________________________ ¤ FASCIA Database of Device-Location Records :: http://cryptome.org/2013/12/nsa-fascia.pdf --------------------------------------- ¤ hdfs:// Cloud Holds FASCIA Database :: http://cryptome.org/2013/12/nsa-ghost-machine.pdf HDFS stands for “Hadoop Distributed File System” which was inspired by Google Inc, and later managed by big data corporations such as IBM, Yahoo, Facebook, et al. HDFS is designed to reliably store very large files across machines in a large cluster. ¤ Hadoop Emerging Technology :: “Hadoop is a data processing system that follows the MapReduce paradigm for scalable data analysis.” ... “Largest install is at Yahoo, a major contributor.” HDFS is a scalable file system with two major components, a central metadata server and file servers from data. http://www.upload-box.com/index.php/files/get/uTqMG-LMlY/hadoop-emerging-technology.pdf ¤ Yahoo - Managing a Hadoop Cluster :: This was taken from the Yahoo website, posted on public domain. http://msfire.tk/files/get/SIut69QW7Q/yahoo-hadoop.zip ¤ Apache Hadoop FileSystem and its Usage in Facebook (This File Is Mirrored) :: http://4lodzik.de/xu2/files/get/U-eeftxCDJ/facebook-hadhoop.zip http://www.uploadmini.com/index.php/files/get/rnvpDpXfZu/facebook-hadhoop.zip http://cloudseminar.berkeley.edu/data/hdfs.pdf ¤ hadoop_install.zip (Mirrored) :: http://fileb.ag/nukq1uicayye http://f.ishoo.ru/files/get/vfym4eZHvY/hadoop-install.zip http://cloud.elearning.uq.edu.au/download/hadoop_install.zip --------------------------------------- ¤ CO-TRAVELER Cellphone Tracking ; FASCIA Database Available With Ghostmachine :: “Proxies can make IP resolution challenging.” http://cryptome.org/2013/12/nsa-cotraveler.pdf ¤ CHALKFUN Location Tool Highly Censored :: http://cryptome.org/2013/12/nsa-chalkfun.pdf ¤ NSA Targets Device Location Verification :: http://cryptome.org/2013/12/nsa-target-location.pdf ¤ NSA’s Global Interception Network :: http://electrospaces.blogspot.com/2013/12/nsas-global-interception-network.html ¤ NSA Tracking Cellphone Locations :: In unveiling new Edward Snowden revelations about NSA spying, the Washington Post has once again whitewashed the fact that the content of all our communications have been stored and analyzed under the Echelon program since the 1990s. The new details concern how, “The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world.” However, the report reveals itself to be little more than an exercise in soft- peddling when it claims that, “The NSA does not target Americans’ location data by design, but the agency acquires a substantial amount of information on the whereabouts of domestic cellphones “incidentally.” This notion that the NSA just accidentally happens to record the locations of Americans using data from their cellphones, and is not deliberately engaging in domestic surveillance, is yet another example of damage control by the establishment. http://www.infowars.com/new-nsa-revelations-another-limited-hangout-whitewash/ http://www.washingtonpost.com/wp-srv/special/_ie-fallbacks/NSA_Co-traveler_g.jpg http://apps.washingtonpost.com/g/page/world/fascia-the-nsas-huge-trove-of-location-records/637/ http://apps.washingtonpost.com/g/page/world/how-to-tell-if-a-target-is-foreign/635/ http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_print.html http://www.theguardian.com/world/2013/dec/04/nsa-storing-cell-phone-records-daily-snowden --------------------------------------- ¤ NSA Uses Google Cookies and GSM Geohashes to Pinpoint Targets :: The National Security Agency is ‘secretly’ piggybacking on the tools that enable Internet advertisers to track consumers, using cookies and location data to pinpoint targets for government hacking and to bolster surveillance. http://cryptome.org/2013/12/nsa-sigint-successes.pdf http://cryptome.org/2013/12/nsa-gsm-tracking.pdf http://apps.washingtonpost.com/g/page/national/nsa-signal-surveillance-success-stories/647/ http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-targets-for-hacking/ http://boingboing.net/2013/12/10/nsa-uses-googles-tracking-co.html http://www.theverge.com/2013/12/10/5198592/nsa-reportedly-piggybacking-on-google-advertising-cookies https://www.wsws.org/en/articles/2013/12/14/snow-d14.html --------------------------------------- ¤ FLASHBACK ; Anonymizing Google’s Cookie :: http://www.imilly.com/google-cookie.htm --------------------------------------- ¤ How Marketers Will Find and Track You In a World Without Cookies :: http://blog.thefetch.com/2013/11/18/cookie-monsters-how-marketers-will-find-and-track-you-in-a-world-without-cookies/ _______________________________________ ¤ How the NSA Targets Italy :: http://espresso.repubblica.it/foto/2013/12/05/galleria/nsa-intercettazioni-1.144400 http://espresso.repubblica.it/inchieste/2013/12/05/news/revealed-how-the-nsa-targets-italy-1.144428 http://www.pcworld.com/article/2070480/nsa-spies-on-italians-from-roof-of-us-embassy-in-rome-magazine-reports.html ¤ SCS_Italy_Spying.zip | 371KB :: http://ge.tt/api/1/files/2Bbc4C81/0/blob?download http://megaswf.com/f/2625421 http://msfire.tk/files/get/srIJUWgvYg/scs-italy-spying.zip _______________________________________ ¤ Swedish Intelligence Agency (FRA) Spied on Russian Leaders for NSA :: http://cryptome.org/2013/12/nsa-se-spied-ru.htm http://cryptome.org/2013/12/nsa-se-fra-ru-baltic.pdf http://www.youtube.com/watch?v=0yP7n8qZrz0 http://rt.com/news/sweden-spied-russia-nsa-759/ http://www.infowars.com/nsa-leaks-sweden-spied-on-russian-leaders-for-us/ http://www.thelocal.se/20131211/sweden-aided-in-nsa-hacking-operations-report ¤ NSA & FRA Quantum Hacking Programme :: http://www.svt.se/ug/fra-part-of-top-secret-hacker-project ¤ NSA & FRA Relationship Was “Top Secret” :: http://cryptome.org/2013/12/nsa-se-spies.pdf http://s3.documentcloud.org/documents/889126/nsa-intelligence-relationship-with-sweden.pdf ¤ NSA & FRA Relationship “Actively Engaged” :: http://cryptome.org/2013/12/nsa-se-fra-relationship.pdf http://s3.documentcloud.org/documents/894384/nsa-internal-pm-on-fra-and-sweden-relations.pdf ¤ NSA & FRA Joint Quantum Spy Agenda :: http://cryptome.org/2013/12/nsa-se-fra-spying-agenda.pdf ¤ NSA/GCHQ/FRA Quantum Spying Accomplishments :: http://cryptome.org/2013/12/nsa-gchq-fra-quantum.pdf http://cryptome.org/2013/12/nsa-se-fra-quantum-2.pdf http://cryptome.org/2013/12/gchq-se-fra-quantum-3.pdf ¤ NSA/GCHQ/FRA Communication Intelligence :: http://cryptome.org/2013/12/nsa-gchq-se-fra-comint.pdf --------------------------------------- PAST XKEYSCORE REPORTS/DOCUMENTS REFER HERE ; http://paste.cdtag.de/view.php?id=16647 --------------------------------------- ¤ NSA/FRA XKeyscore Targets Website Viewers :: http://cryptome.org/2013/12/nsa-se-fra-xkeyscore-slide.pdf ¤ NSA/FRA XKeyscore Targets Tor, etc. :: http://cryptome.org/2013/12/nsa-xkeyscore-tor-slides.pdf ¤ NSA/FRA XKeyscore Exploit Sources :: http://cryptome.org/2013/12/nsa-xkeyscore-sources.pdf ¤ NSA/FRA XKeyscore Data Hoarding Plans :: http://cryptome.org/2013/12/nsa-se-fra-xkeyscore.pdf _______________________________________ “Earlier, a map showing SCS locations worldwide was published by the German magazine Der Spiegel. Initially an unredacted map was put online by accident, but before it was replaced, it was already copied onto several websites. This map showed 74 staffed SCS locations, 14 unmanned remote controlled locations and 8 other locations as of August 2010. Except for the SCS locations in Europe, the names of all other cities were blurred by Der Spiegel.” - electrospaces.blogspot.fr REDACTED MAP (CENSORED) https://lh3.ggpht.com/-ymi_oEW0XcI/UpzfqqqPRsI/AAAAAAAABCs/WU4lKnfs52w/s320/scs-global-map-redacted.jpg UNREDACTED MAP (DEFAULT) http://postimg.org/image/6kzpypy1l/ BOTH REDACTED AND UNREDACTED (ZIP | 223KB) http://f.lui.li/get_1065_f4ab.html --------------------------------------- ¤ Decensoring SCS Locations :: http://cryptome.org/2013/12/decensoring-scs-slides.htm The NSA spies under diplomatic cover. _______________________________________ ¤ Five Eyes :: http://cryptome.org/2013/12/nsa-5-eyes-partners.pdf _______________________________________ ¤ A Conspiracy So Vast :: http://www.lewrockwell.com/2013/12/andrew-p-napolitano/a-conspiracy-so-vast%E2%80%A8/ _______________________________________ ¤ PayPal Corporation Said To Be Implicated in Withheld NSA Documents :: http://www.youtube.com/watch?v=tTivPZZorWY http://www.boilingfrogspost.com/2013/12/11/bfp-breaking-news-omidyars-paypal-corporation-said-to-be-implicated-in-withheld-nsa-documents/ _______________________________________ ¤ NSA GCHQ Spies on Video Game Geeks :: Say hello to undercover NSA orcs. http://cryptome.org/2013/12/nsa-gchq-spy-games.pdf http://cryptome.org/2013/12/nsa-spy-games.pdf http://arstechnica.com/tech-policy/2013/12/world-of-spycraft-nsa-gchq-hacked-wow-and-xbox-live-other-games/ http://www.theguardian.com/world/2013/dec/09/nsa-spies-online-games-world-warcraft-second-life http://www.breitbart.com/Big-Government/2013/12/09/Report--NSA-spying-on-virtual-worlds--online-games http://www.businessinsider.com/spy-agencies-infiltrated-video-games-nsa-gchq-world-of-warcraft-2013-12 _______________________________________ ¤ Rollingstone Describes NSA’s Influx of Money :: September 11th, which also happened to be Drake’s first day at Fort Meade, changed the equation. Drake explains the shift in two ways: The first was a massive expansion of US spying capabilities as the agency “unchained itself from the Constitution,” and began to spy on Americans and foreign citizens, at home and abroad. The other change, felt across the entire intelligence community, was a rapid expansion of the NSA itself. “Massive amounts of money were pumped into the NSA after 9/11, and Congress was saying, ‘How big do you want the check?’” says Drake. With virtually every agency involved in tracking terrorists clamoring for its SIGINT, or signals intelligence, the NSA expanded its outposts in Texas, Georgia, Hawaii, Colorado and Utah, as well as listening posts abroad, and also went on a building spree at Fort Meade, where the NSA’s sprawling 5,000-acre campus is now almost 10 times the size of the Pentagon. By 2013, according to The Washington Post, the NSA had expanded its workforce by one-third, to about 33,000. The number of private companies it depended upon more than tripled during that time. Soon, thanks to this influx of money and the increasing reliance on the private sector to handle even sensitive jobs, the very heart of America’s intelligence infrastructure was being outsourced to contractors. “Essentially, 9/11 was a massive jobs program, in which the ticket you needed for the party was your clearance,” says Drake. “And tons of people were getting those clearances. So you had this huge apparatus being built, and the government was just managing it. And in some cases, they weren’t even doing that.” ... ... By the time Snowden joined the agency’s workforce, the surveillance he would later expose was becoming not just institutionalized but very big business. “It was around 2009, 2010 that you saw the full flower of that massive, massive bubble of money,” says Drake. “And people were taking it for a ride as far as it could go.” ... ... Prior to 2009, Snowden had considered leaking government secrets when he was at the CIA, but held off, he later said, not wanting to harm agents in the field, and hoping that Obama would reform the system. His optimism didn’t last long. “I watched as Obama advanced the very policies that I thought would be reined in,” he later said. As a result, he added, “I got hardened.” The more Snowden saw of the NSA’s actual business – and, particularly, the more he read “true information,” including a 2009 Inspector General’s report detailing the Bush era’s warrantless- surveillance program – the more he realized that there were actually two governments: the one that was elected, and the other, secret regime, governing in the dark. “If the highest officials in government can break the law without fearing punishment or even any repercussions at all, secret powers become tremendously dangerous.” http://www.rollingstone.com/politics/news/snowden-and-greenwald-the-men-who-leaked-the-secrets-20131204 _______________________________________ ¤ Rajiv Pant Describes Snowden Files Transfer :: http://cryptome.org/2013/12/nyt-snowden-transfer.htm _______________________________________ ¤ Is British Intelligence in Damage Control? :: http://www.globalresearch.ca/british-intelligence-operation-to-kidnap-snowden-number-one-mi-6-officer-working-undercover-in-moscow-embassy/5358555 _______________________________________ ¤ Snowden Leaks “Greatest Intelligence Failure Since World War 2” Exaggerated :: The Director of NSA claims Snowden stole 200,000 documents. Allegations in Australian press claim he stole “up to 20,000.” British authorities accuse Snowden of stealing 58,000. Claims are bruited in the 5 Eyes that this is the “greatest intelligence failure since World War 2.” High officials and ex-spies accuse Snowden and related media of engaging in terrorism. This suggests a counter-espionage campaign to exaggerate Snowden’s damage, of betrayal to his country, of aiding the enemy, of threatening national security. It is successfully restricting release of the Snowden material and will likely become more forceful as releases continue to the extent of legislation (open or secret) to criminalize release as a national security threat. http://cryptome.org/2013/12/snowden-civil-war.htm _______________________________________ ¤ KILLCEN ; Eyeballing_Snowden_Info.7z :: Includes most reports, slides and documents all related to the recent Snowden leaks so far up to December 4th of 2013. I’m still collecting any information that comes out and will provide updated archives from time to time. Grab this while you can. After decompression - the folder is titled “Eyeballing_Snowden_Info” and holds a total of 371MB decompressed. Eyeballing_Snowden_Info.7z (783 files | 7zip | 286MB) http://fileb.ag/iv8x797lqzdw http://uploadhero.co/dl/aBBhCePf http://bitshare.com/files/fuxhd3ry/Eyeballing_Snowden_Info.7z.html http://www.upload-box.com/index.php/files/get/0VPCtiKFxf/eyeballing-snowden-info.7z http://f.ishoo.ru/files/get/3GfGXXqGSH/eyeballing-snowden-info.7z http://davvas.com/frrbbi2975xe http://BillionUploads.com/hpww20r554x4 http://bayfiles.net/file/119rR/Y6ax0Z/Eyeballing_Snowden_Info.7z _______________________________________ ¤ indonesia-spying-slides.zip (mirrored) :: http://up.sef.ps/xu/files/get/Aen2UBNeep/indonesia-spying-slides.zip http://document-space.com/index.php/files/get/yWGp5DplsK/indonesia-spying-slides.zip http://www.quickupdown.com/files/get/BEqtDnYz8M/indonesia-spying-slides.zip ¤ Australian Intelligence Agency (ASD) Swaps Bulk Metadata With the NSA :: Australia’s intelligence apparatus mines the telecommunications data of ordinary Australians, and hands over the material to the US and its closest allies, according to the latest leaked document from Edward Snowden, partly published by the Guardian Australia web site. The document obtained by the former US National Security Agency (NSA) contractor confirms that the electronic surveillance agency, the Australian Signals Directorate (ASD), monitors the domestic population, as well as the people and governments of many Asian countries. Despite Australian legislation supposedly restricting the ASD’s internal spying, the agency hands over to the NSA and its global partners so-called metadata of the phone calls, texts, emails, on-line address books and social media posts of millions of people. This exposure of mass surveillance follows the recent revelations, also from documents leaked by Snowden, that the ASD, then known as the Defence Signals Directorate (DSD), tapped the phone calls of Indonesian prez Susilo Bambang Yudhoyono, and that Australian embassies throughout Asia operate as electronic listening posts for the US-led spying network. http://www.abc.net.au/news/2013-11-18/australia-spied-on-indonesian-president-leaked-docu http://www.abc.net.au/news/2013-11-18/canberra-jakarta-and-the-digital-great-game/5100502 http://www.theguardian.com/world/2013/nov/18/australia-tried-to-monitor-indonesian-presidents-phone http://www.wsws.org/en/articles/2013/12/03/data-d03.html http://www.scmp.com/news/asia/article/1359356/indonesian-ambassador-australia-recalled-over-spying-claims http://www.voanews.com/content/indonesia-to-review-cooperation-with-australia-due-to-spying-claims/1792523.html ¤ Australian Media Denounces Exposure of Indonesia Spying Operations :: The Australian Broadcasting Corporation’s (ABC) recent joint reporting of Australian espionage operations targeting Indonesian political figures has been furiously denounced by other media outlets for breaching “national security” and the “national interest.” The reaction underscores the extent to which the media establishment has been integrated into the state-intelligence apparatus. On November 18, after being approached by the Guardian with documents leaked by former National Security Agency (NSA) contractor Edward Snowden, the ABC co-released the story, revealing Australian phone tapping of Indonesian Prez Susilo Bambang Yudhoyono, his wife and eight senior political figures. The report triggered a still-unresolved diplomatic crisis for the Australian government, with the Indonesian president suspending military and intelligence cooperation. http://www.wsws.org/en/articles/2013/12/03/medi-d03.html _______________________________________ ¤ NSA G8 - G20 Summit SIGINT Directive :: Top secret documents retrieved by US whistleblower Edward Snowden show that Prime Minister Stephen Harper’s dictatorship allowed the largest American spy agency to conduct widespread surveillance in Canada during the 2010 G8 and G20 summits. The documents are being reported exclusively by CBC News. The briefing notes, stamped “Top Secret,” show the US turned its Ottawa embassy into a security command post during a six-day spying operation by the National Security Agency while US Prez Barack Obama and 25 other foreign heads of government were on Canadian soil in June of 2010. The covert US operation was no secret to Canadian authorities. ... ... The world was still struggling to climb out of the great recession of 2008. Leaders were debating a wide array of possible measures including a global tax on banks, an idea strongly opposed by both the US and Canadian governments. That notion was eventually scotched. http://cryptome.org/2013/12/nsa-g8-g20-spying.pdf http://www.cbc.ca/news/politics/read-snowden-nsa-document-on-g8-g20-summit-surveillance-1.2447387 http://www.cbc.ca/news/politics/new-snowden-docs-show-u-s-spied-during-g20-in-toronto-1.2442448 http://www.wsws.org/en/articles/2013/12/03/cana-d03.html https://www.wsws.org/en/articles/2013/12/14/cses-d14.html ¤ Canada’s CSEC Slides Expose Espionage Against Brazilian Ministry :: http://cryptome.org/2013/10/cse-br/cse-br.htm UPDATE ; 18 CSEC slides posted on PDF @ cryptome.org, November 30, 2013. http://cryptome.org/2013/11/csec-br-spy.pdf ¤ Interpreting the CSEC Presentation :: http://theoreti.ca/?p=5057 ¤ Ministério de Minas e Energia está na mira de espiões americanos e canadenses :: http://m.g1.globo.com/fantastico/noticia/2013/10/ministerio-das-minas-e-energia-esta-na-mira-de-espioes-americanos-e-canadenses.html TRANSLATED @ slexy.org http://slexy.org/view/s2tDGSktog ¤ American and Canadian Spies Target Brazilian Energy and Mining Ministry (English) :: http://g1.globo.com/fantastico/noticia/2013/10/american-and-canadian-spies-target-brazilian-energy-and-mining-ministry.html ¤ Canada’s CSEC Provides Data to NSA :: The politicians and corporate media would have Canadians believe that they have only “moved on” from discussing CSEC’s activities because there is nothing for Canadians to worry about. In reality, the CSEC is a vital tool of the Canadian ruling class that plays an important role in the pursuit of its imperialist foreign policy and in the surveillance and suppression of opposition at home. The size of CSEC’s staff—it employs almost 2,000 people and a further thousand military personnel assist its work—give an inkling of the scale of its activities. These include everything from supporting the overseas operations of the Canadian military, to spying on governments that are reputed allies of Canada and assisting CSIS and the RCMP in conducting a vast program of domestic surveillance. Of especial importance is the CSEC’s partnership with the NSA. According to former NSA technical director William Binney, the two organizations “have integrated personnel” i.e. swap personnel to improve seamless collaboration. They also share Internet surveillance programs. As a further element of its collaboration with the Five Eyes alliance, CSEC was relied on in the project of spying on diplomats and officials during the 2009 London G20 meeting according to a report in the British newspaper The Guardian, which was based on documents supplied by Snowden. The highly sensitive operation involved the penetration of delegates’ smartphones to monitor their email messages and calls. http://www.wsws.org/en/articles/2013/09/28/csec-s28.html http://www.scribd.com/doc/188094600/CSEC-Presentation ¤ NSA CSEC Partnership :: http://cryptome.org/2013/12/nsa-csec-partners.pdf _______________________________________ ¤ EU Nations Address Mass Spying :: http://cryptome.org/2013/11/eu-mass-spying.pdf ¤ EU Hearings On NSA :: http://www.europarl.europa.eu/committees/en/libe/events.html?id=hearings http://euobserver.com/justice/121979 http://blog.cyberwar.nl/2013/11/viviane-reding-nsa-needs-counterweight.html ¤ EU/US Data Protection Hoot :: http://cryptome.org/2013/11/eu-us-data-protect-13-1127.pdf ¤ EU to Run Yet Another Ineffectual Probe :: http://www.theguardian.com/world/2013/dec/02/edward-snowden-un-investigation-surveillance _______________________________________ Draft state-level legislation called the Fourth Amendment Protection Act would – in theory – forbid local governments from providing services to federal agencies that collect electronic data from Americans without a personalized warrant. No Utah lawmaker has came forward to introduce the suggested legislation yet, but at least one legislator has committed to doing so, according to Mike Maharrey of the Tenth Amendment Center. He declined to identify the lawmaker before the bill is introduced. “We are still very early in the campaign, and this is in fact a multi-step, multi-year long-term strategy,” says Maharrey, whose group is part of the OffNow coalition along with the Bill of Rights Defense Committee and a handful of other groups. The campaign is looking beyond Utah, Maharrey adds. http://www.usnews.com/news/articles/2013/12/03/some-nsa-opponents-want-to-nullify-surveillance-with-state-law _______________________________________ ¤ Guardian’s Reporters Face Threats and Intimidation From British Dictatorship :: In the months since, the Guardian has continued to make officials here exceedingly nervous by exposing the joint operations of US and British intelligence — particularly their cooperation in data collection and snooping programs involving British citizens and close allies on the European continent. In response, the Guardian is being called to account by British authorities for jeopardizing national security. The Guardian’s top editor, Alan Rusbridger, is being forced to appear before a parliamentary committee Tuesday to explain the news outlet’s actions. http://www.washingtonpost.com/world/europe/britain-targets-guardian-newspaper-over-intelligence-leaks-related-to-edward-snowden/2013/11/29/1ec3d9c0-581e-11e3-bdbf-097ab2a3dc2b_story.html http://www.infowars.com/uk-police-threaten-guardian-editor-with-terrorism-charges-over-snowden-leaks/ http://www.wsws.org/en/articles/2013/10/18/guar-o18.html ¤ Alan Rusbridger Interviewed :: http://www.washingtonpost.com/world/q-and-a-with-alan-rusbridger-editor-of-the-guardian/2013/11/29/11b36798-5821-11e3-bdbf-097ab2a3dc2b_story.html ¤ US Dictatorship Fuels the Same Threats as the British Dictatorship :: Glenn Greenwald, the Guardian reporter who published Edward Snowden’s leaks, was recently suggested to be a criminal for shining light on the NSA’s abuse of power. This is a key identifiable step when societies close down; it is a point of no return. It seems the United States is reaching the event horizon to a police state. http://falkvinge.net/2013/06/30/with-journalism-persecuted-the-united-states-is-now-at-event-horizon-to-a-police-state/ Cryptome noted “There have been no reports of leakage from the insurance stashes, the publication outlets or the various reported transmissions among them (except for the Miranda snatch by UKG), although there could be some which have not been disclosed, not known, were sold or bartered, or were stolen for future use. It is likely that intelligence and law enforcement agencies have made stringent efforts to access the documents by customarily secret burglary, bribery, barter, purchase, deception, co-optation. Those multiple persons and outlets who have had access, or suspected of access, are certain to have been targeted, some perhaps successfully persuaded to cooperate with promises of confidentiality, backed by threats if cooperation is refused -- a standard coercive means of authorities. While Edward Snowden is knowledgeable about counter-espionage and likely advised his initial correspondents, who in turn advised successive cooperators, usually these counter-operations are not revealed, but hints of them are leaked to discourage participation. Beyond that, it is customary to foment disputes and disagreements among competing publications, reporters, opinionators, experts, the spying industry and consumers, along with threats against families, friends and employers, as now occurring, to rattle and pressure targets to consider cooperating with authorities, including use of rewards -- monetary and career -- for informants.” http://cryptome.org/2013/11/snowden-related-targets.htm _______________________________________ ¤ NSA Describes Dutch SIGINT Spying :: http://cryptome.org/2013/11/nsa-dutch-sigint.pdf _______________________________________ ¤ Mass Surveillance Is Big Business ; Corporations Are as Good at Spying as Governments :: http://motherboard.vice.com/blog/mass-surveillance-is-big-business-corporations-are-as-good-at-spying-as-governments _______________________________________ ¤ NSA Spies on Pornography Viewing to Discredit Targeted Enemies :: http://cryptome.org/2013/11/nsa-muslim-porn.pdf http://www.techdirt.com/articles/20131127/00243625384/nsa-spied-porn-habits-radicalizers-planned-to-use-details-to-embarrass-them.shtml http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html http://www.dailykos.com/story/2013/11/26/1258660/-NSA-spied-on-radicalizers-to-discredit-them _______________________________________ ¤ NSA WINDSTOP, MUSCULAR, INCENSER Slides :: http://cryptome.org/2013/10/nsa-windstop-muscular-incenser.pdf ¤ What Else Do We Know About MUSCULAR? :: http://cryptome.org/2013/10/nsa-muscular.htm ¤ NSA WINDSTOP Month of Mass Spying :: http://cryptome.org/2013/11/nsa-windstop.pdf ¤ NSA Collection Optimization Overview :: http://cryptome.org/2013/10/nsa-sso-overview.pdf ¤ NSA Content Acquisition Optimization :: http://cryptome.org/2013/10/nsa-sso-content.pdf ¤ NSA Collection Optimization Slides :: http://cryptome.org/2013/10/nsa-sso-slides.pdf ¤ NSA SSO Cryptologic Provider :: http://cryptome.org/2013/11/nsa-sso-crypto.pdf ¤ NSA SSO Yahoo, Google Exploitation :: http://cryptome.org/2013/11/nsa-sso-yahoo-google.pdf ¤ NSA and GCHQ Breaks 3rd Party SSL to Steal Email Metadata :: Even though they cooperate with the US spy agency on court-ordered surveillance, firms like Google and Yahoo are subject to additional surveillance they never agreed to. Web companies host copies of your data on servers around the world, reducing the chance of losing your information should one fail. When you log in to an account with these firms, the data sent between you and their servers is encrypted, making it difficult to snoop – but the internal transfers between data centres are unencrypted. And because many of the transfers take place outside the US, approval from a FISA court isn’t required to tap the information. The National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers around the world, according to documents obtained from former NSA contractor Edward Snowden and interviews with knowledgeable officials. By tapping those links, the agency has positioned itself to collect at will from hundreds of millions of user accounts, many of them belonging to Americans. The NSA does not keep everything it collects, but it keeps a lot. The NSA’s principal tool to exploit the data links is a project called MUSCULAR, operated jointly with the agency’s British counterpart, the Government Communications Headquarters. From undisclosed interception points, the NSA and the GCHQ are copying entire data flows across fiber-optic cables that carry information among the data centers of the Silicon Valley giants. http://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html http://articles.economictimes.indiatimes.com/2013-10-31/news/43528723_1_data-centers-google-claire-cain-miller http://www.newscientist.com/article/dn24519-nsa-snoops-tech-companies-fibreoptic-networks.html http://www.theguardian.com/technology/2013/nov/04/eric-schmidt-nsa-spying-data-centres-outrageous http://article.wn.com/view/2013/10/30/NSA_Broke_Into_Yahoo_Google_Data_Centers_Report/ ¤ NSA Collects Bulk Email Address Books :: In June, President Obama said the NSA’s email collecting program “does not apply to US citizens.” The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world, many of them belonging to Americans, according to senior intelligence officials and top-secret documents provided by former NSA contractor Edward Snowden. The collection program, which has not been disclosed before, intercepts e-mail address books and “buddy lists” from instant messaging services as they move across global data links. Online services often transmit those contacts when a user logs on, composes a message, or synchronizes a computer or mobile device with information stored on remote servers. http://www.washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html http://www.theblaze.com/stories/2013/10/14/report-nsa-collects-millions-of-contact-lists-from-personal-email-and-instant-messaging-accounts-globally/ http://www.theatlanticwire.com/technology/2013/10/nsa-collects-email-address-books-contact-lists/70535/ ¤ Special Collection Services Wikis :: http://cryptome.org/2013/11/scs-fr-us.pdf ¤ NSA Exploits Microsoft Vulnerabilities :: http://cryptome.org/2013/11/nsa-microsoft.pdf http://s3.documentcloud.org/documents/841655/microsoft-realms-redacted.pdf http://cryptome.org/2013/11/nsa-microsoft-cloud-exploit.pdf http://s3.documentcloud.org/documents/841654/microsoft-in-cloud-exploitation-redacted.pdf http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ NSA’s Boundless Informant :: http://cryptome.org/2013/10/nsa-boundless-informant.pdf ¤ NSA’s Boundless Informant Collected 124+ Billion Phone Calls in One Month :: http://cryptome.org/2013/10/nsa-125b-calls.htm ¤ NSA’s Boundless Informant Metadata :: http://electrospaces.blogspot.com/2013/10/boundlessinformant-only-shows-metadata.html ¤ Guardian’s Boundless Informant Report :: http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining ¤ Le Monde’s Boundless Informant Report :: http://www.lemonde.fr/technologies/article/2013/10/21/france-in-the-nsa-s-crosshair-phone-networks-under-surveillance_3499741_651865.html ¤ Three Boundless Informant “Heatmaps” :: http://cryptome.org/2013/10/nsa-boundless-informant-images.htm ¤ NSA Boundless Informant Spied Norway :: http://cryptome.org/2013/11/nsa-boundlessinformant-no-33m.pdf ¤ US Says France, Spain Aided NSA Spying :: http://cryptome.org/2013/10/nsa-us-france-spain.htm --------------------------------------- NOBODY comments ▼ Le Monde’s Boundless Informant document differs from the Guardians. Le Monde’s Boundless Informant Graph ... http://s3.documentcloud.org/documents/807033/boundless-monde.pdf Guardians’ Boundless Informant Graph ... http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2013/6/8/1370716131074/boundless-heatmap-008.jpg Le Monde shows 3,095,533,478 intercepts in the US compared to the Guardian showing 2,392,343,446 US intercepts. Le Monde’s Boundless Informant graph shows the “aggregate” estimate, both digital networks (DNI) and telephony (DNR) interception ; while the Guardian’s graph only shows the digital “DNI” estimate. --------------------------------------- ¤ DRTBOX and the DRT Surveillance Systems :: http://electrospaces.blogspot.com/2013/11/drtbox-and-drt-surveillance-systems.html ¤ BOUNDLESS INFORMANT Explicated :: This was written from a person who purports to actually use the Boundless Informant tool. http://cryptome.org/2013/11/nsa-boundless-informant-explicated.htm ¤ RE-BOUNDLESS INFORMANT Explicated :: http://cryptome.org/2013/11/nsa-boundless-informant-gm-place.htm ¤ BOUNDLESS INFORMANT Screenshots Can Be Misleading :: http://electrospaces.blogspot.com/2013/11/screenshots-from-boundlessinformant-can.html ¤ DNI Masterspy Says Le Monde Misleads on NSA Spying :: http://cryptome.org/2013/10/dni-13-1022.pdf “Recent articles published in the French newspaper Le Monde contain inaccurate and misleading information regarding US foreign intelligence activities. The allegation that the National Security Agency collected more than 70 million “recordings of French citizens’ telephone data” is false. While we are not going to discuss the details of our activities, we have repeatedly made it clear that the United States gathers intelligence of the type gathered by all nations. The US collects intelligence to protect the nation, its interests, and its allies from, among other things, threats such as terrorism and the proliferation of weapons of mass destruction. The United States values our longstanding friendship and alliance with France and we will continue to cooperate on security and intelligence matters going forward.” James R. Clapper Director of National Intelligence --------------------------------------- ¤ Snowden Responds to Feinstein’s Stupidity :: http://thehill.com/blogs/hillicon-valley/technology/330497-snowden-fires-back-at-feinstein-over-surveillance-claim “Today, no telephone in America makes a call without leaving a record with the NSA. Today, no Internet transaction enters or leaves America without passing through the NSA’s hands,” Snowden said in a statement Thursday. “Our representatives in Congress tell us this is not surveillance. They’re wrong.” _______________________________________ ¤ US and UK Governments Still Worry Over Cache of Encrypted Documents by Snowden :: US and British intelligence officials say they are concerned about a “doomsday” collection of highly classified, heavily encrypted materials they believe former National Security Agency contractor Edward Snowden may have stored away. One source saw the cache of documents as an “insurance policy” for Snowden should he feel threatened by arrest or other harm. ... ... Adding merit to the suspicion that the well-secured cache may be an insurance policy of sorts, Greenwald said in June that “if anything happens at all to Edward Snowden, he has arranged for them to get access to the full archives.” http://www.infowars.com/us-uk-officials-worry-snowden-still-has-doomsday-collection-of-classified-material/ _______________________________________ ¤ (Go Figure) Obama’s “Overhaul” of Spy Programs Cloaked in More Secrecy :: Obama has been gradually tweaking vast government surveillance policies. But he is not disclosing those changes to the public. Has he stopped spying on friendly world leaders? He won’t say. Has he stopped eavesdropping on the United Nations, the World Bank and the International Monetary Fund? He won’t say. Even the report by the group Obama created to review and recommend changes to his surveillance programs has been kept secret. http://www.mcclatchydc.com/2013/11/25/209465/obamas-overhaul-of-spy-programs.html _______________________________________ ¤ NSA Report Outlined Goals for More Power :: Officials at the National Security Agency, intent on maintaining its dominance in intelligence collection, pledged last year to push to expand its surveillance powers, according to a top-secret strategy document. Written as an agency mission statement with broad goals, the five-page document said that existing American laws were not adequate to meet the needs of the NSA to conduct broad surveillance in what it cited as “the golden age of Sigint,” or signals intelligence. “The interpretation and guidelines for applying our authorities, and in some cases the authorities themselves, have not kept pace with the complexity of the technology and target environments, or the operational expectations levied on NSA’s mission,” the document concluded. http://cryptome.org/2013/11/nsa-sigint-strategy-2012-2016.pdf http://cryptome.org/2013/11/nsa-power-goals.htm http://www.nytimes.com/2013/11/23/us/politics/nsa-report-outlined-goals-for-more-power.html http://rt.com/usa/snowden-leak-expand-surveillance-goal-185/ http://www.dailydot.com/politics/snowden-leak-nsa-power/ ¤ NSA TreasureMap Description :: The NY Times today cites an NSA tool called Treasure Map and describes its capabilities but does not publish visual examples. Also cited is Packaged Goods, an associated tool. If publicly available, Cryptome asked for pointers to the two. http://cryptome.org/2013/11/nsa-treasuremap.htm _______________________________________ ¤ Documents Show Tony Blair Let US Spy Britons :: http://www.channel4.com/news/nsa-edward-snowden-america-britain-tony-blair _______________________________________ ¤ GCHQ ROYAL CONCIERGE Diplomatic Hotel Spy :: http://cryptome.org/2013/11/gchq-royal-concierge-de.pdf http://cryptome.org/2013/11/gchq-royal-concierge.jpg ¤ GCHQ Monitors Diplomats Hotel Bookings :: Britain’s GCHQ intelligence service monitors diplomats’ travels using a sophisticated automated system that tracks hotel bookings. Once a room has been identified, it opens the door to a variety of spying options. http://www.spiegel.de/international/europe/gchq-monitors-hotel-reservations-to-track-diplomats-a-933914.html _______________________________________ ¤ Supreme Court Blocks Challenge to Spying :: “We ask the NSA to immediately suspend collection of solely domestic communications pending the competition of a public rulemaking as required by law. We intend to renew our request each week until we receive your response,” EPIC said. Five months later, though, the Supreme Court said this week that it would not be hearing EPIC’s plea. A document began circulating early Monday in which the high court listed the petition filed by the privacy advocates as denied. http://rt.com/usa/supreme-court-nsa-spying-906/ http://www.infowars.com/supreme-court-blocks-challenge-to-nsa-phone-tracking/ _______________________________________ ¤ NSA Deputy Director John Inglis Speaks :: http://www.youtube.com/watch?v=6ydkw4xgZ-Y ¤ Intelligence Community Lawyers Argue Over Metadata Hoarding :: http://www.techdirt.com/articles/20131105/08030825135/dni-lawyer-argues-that-curbing-metadata-collections-will-damage-americans-privacy.shtml http://www.dailybinarynews.com/intelligence-community-lawyers-argue-that-curbing-metadata-collections-will/ ¤ Bill Clinton Warns We Have No Security, No Privacy :: http://www.infowars.com/bill-clinton-on-nsa-spying-we-are-on-the-verge-of-having-the-worst-of-all-worlds-well-have-no-security-and-no-privacy/ ¤ Obama Regime Pledges to Continue Illegal Spying Programs :: http://www.wsws.org/en/articles/2013/11/06/spyi-n06.html ¤ John McCain Interview by Der Spiegel :: http://cryptome.org/2013/11/mccain-nsa-affair.pdf http://www.spiegel.de/international/world/interview-with-john-mccain-on-nsa-spying-on-angela-merkel-a-932721.html _______________________________________ ¤ NSA & GCHQ “Bullrun” Decryption Brief :: http://cryptome.org/2013/09/nsa-bullrun-brief-propublica-13-0905.pdf http://s3.documentcloud.org/documents/784284/bullrun-briefing-sheet-from-gchq.pdf ¤ NSA & GCHQ “Bullrun” Decryption Guide :: http://cryptome.org/2013/09/nsa-bullrun-2-16-guardian-13-0905.pdf http://s3.documentcloud.org/documents/784047/bullrun-guide-final.pdf ¤ NSA ; Cryptanalysis & Exploitation :: “TOP SECRET//COMINT at a minimum” “(TS//SI) The fact that NSA/CSS makes cryptographic modifications to commercial or indigenous cryptographic information security devices or systems in order to make them exploitable.” “TOP SECRET//COMINT at a minimum” “(U//FOUO) The fact that NSA/CSS successfully exploits cryptographic components of commercial information security devices or systems when the device or system specified.” http://cryptome.org/2013/09/nsa-cryptanalysis-2-12-guardian-13-0905.pdf http://s3.documentcloud.org/documents/784048/crypt-guide2.pdf ¤ NSA & GCHQ Breaks Other SIGINT Crypto :: http://cryptome.org/2013/09/nsa-sigint-enabling-guardian-13-0905.pdf http://cryptome.org/2013/09/nsa-sigint-enabling-propublica-13-0905.pdf http://cryptome.org/2013/09/nsa-sigint-enabling-redacts.jpg ¤ NSA and GCHQ Defeats Encryption :: US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden. ... Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with “brute force”, and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves. Through these covert partnerships, the agencies have inserted secret vulnerabilities – known as backdoors or trapdoors – into commercial encryption software. ... ... Independent security experts have long suspected that the NSA has been introducing weaknesses into security standards, a fact confirmed for the first time by another secret document. It shows the agency worked covertly to get its own version of a draft security standard issued by the US National Institute of Standards and Technology approved for worldwide use in 2006. http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security ¤ Full Guardian Report Mirrored :: http://cryptome.org/2013/09/nsa-decrypt-guardian-13-0905.pdf ¤ Full New York Times Report Mirrored :: http://cryptome.org/2013/09/nsa-decrypt-nyt-13-0905.pdf ¤ Full ProPublica Report Mirrored :: http://cryptome.org/2013/09/nsa-decrypt-propublica-13-0905.pdf ¤ Bruce Schneier - NSA Cracks Crypto :: http://cryptome.org/2013/09/nsa-decrypt-schneier-13-0905-01.pdf http://cryptome.org/2013/09/nsa-decrypt-schneier-13-0905-02.pdf http://cryptome.org/2013/09/nsa-decrypt-schneier-13-0905-03.pdf ¤ Matthew Green - NSA Cracks Crypto :: http://cryptome.org/2013/09/nsa-decrypt-matthew-green-13-0905.pdf http://cryptome.org/2013/09/nsa-decrypt-matthew-green-13-0910.pdf ¤ DNI Response to NSA Cracks Crypto :: http://cryptome.org/2013/09/nsa-decrypt-masterspy-13-0906.htm ¤ Cryptography List Members Face Ulcers :: http://cryptome.org/2013/09/nsa-decrypt-cryptography-13-0905.htm ¤ Documents Confirm “Back Doors” Inserted Into Web and Software to Exploit Crypto :: http://rt.com/usa/nsa-gchq-encryption-snowden-478/ http://www.infowars.com/documents-confirm-nsa-inserts-back-doors-into-web-software/ A range of US hardware and software companies are in danger of being dragged into the widening scandal over internet surveillance, following the latest leaks from Edward Snowden, the former National Security Agency contractor. The leaked documents include NSA claims that it has collaborated with technology companies to plant “back doors” into their systems – or ways for the agency secretly to penetrate systems without the users’ knowledge. http://www.ft.com/cms/s/0/0054adb2-1709-11e3-9ec2-00144feabdc0.html ¤ You Are the Enemy of the Police State :: http://anewdomain.net/2013/09/06/john-c-dvorak-nsa-spying-americans-now-enemy/ _______________________________________ ¤ SSL Inspector :: http://www.wikileaks.org/spyfiles/docs/NETRONOME-2011-SSLInsp-en.pdf ¤ Examining SSL-Encrypted Communications :: http://www.wikileaks.org/spyfiles/docs/METRONOME-2011-ExamSSL-Comm-en.pdf _______________________________________ ¤ Bobby R. Inman Suggests NSA Declassify All Suspected Leaks From Snowden ASAP :: http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html?_r=0 ¤ Around 42 Years to Publish All Leaks :: http://cryptome.org/2013/11/snowden-tally.htm ¤ US SIGINT Strategic Mission 2007 :: http://cryptome.org/2013/11/nsa-sigint-strategic-mission-2007.pdf ¤ US SIGINT Strategic Mission 2013 :: http://cryptome.org/2013/11/nsa-sigint-strategic-mission-2013.pdf ¤ A Weeks Worth of Eavesdropping :: http://cryptome.org/2013/11/nsa-week-spy-2009.pdf ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ Greenwald’s Partner, David Miranda Accused of Terrorism in the UK :: http://www.reuters.com/article/2013/11/01/us-uk-nsa-idUSBRE9A013O20131101 ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ Meet the Spies Doing the NSA’s Dirty Work :: The heart of the FBI’s signals intelligence activities is an obscure organization called the Data Intercept Technology Unit, or DITU (pronounced DEE-too). The handful of news articles that mentioned it prior to revelations of NSA surveillance this summer did so mostly in passing. It has barely been discussed in congressional testimony. An NSA PowerPoint presentation given to journalists by former NSA contractor Edward Snowden hints at DITU’s pivotal role in the NSA’s Prism system -- it appears as a nondescript box on a flowchart showing how the NSA task[s] information to be collected, which is then gathered and delivered by the DITU. The DITU is located in a sprawling compound at Marine Corps Base Quantico in Virginia, home of the FBI’s training academy and the bureau’s Operational Technology Division, which runs all the FBI’s technical intelligence collection, processing, and reporting. http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work ¤ More PRISM Slides Published :: http://cryptome.org/2013/10/nsa-prism-13-1021.pdf https://s3.amazonaws.com/s3.documentcloud.org/documents/807036/prism-entier.pdf http://www.lemonde.fr/technologies/article/2013/10/21/espionnage-de-la-nsa-tous-les-documents-publies-par-le-monde_3499986_651865.html ¤ PRISM ; FAA Passive Spying :: http://cryptome.org/2013/10/nsa-wanadoo-alcatel.pdf http://s3.documentcloud.org/documents/807031/wanadoo-alcatel.pdf http://www.lemonde.fr/technologies/article/2013/10/21/espionnage-de-la-nsa-tous-les-documents-publies-par-le-monde_3499986_651865.html ¤ Compare PRISM Slide Publication :: http://cryptome.org/2013-info/10/le-monde-prism/le-monde-prism.htm ¤ NSA PRISM Slides From Guardian :: http://cryptome.org/2013/11/nsa-prism-guardian-13-1101.pdf ¤ Le Monde’s PRISM Report (TRANSLATED) :: http://www.lemonde.fr/technologies/article/2013/10/21/l-ampleur-de-l-espionnage-mondial-par-la-nsa_3499756_651865.html The magnitude of the global espionage by the NSA. During the summer, the documents provided to the Guardian and the Washington Post by former NSA employee Edward Snowden helped unveil the extent of surveillance and espionage carried out by the NSA and its allies. Le Monde also now has access to some of these documents. Before the summer, the NSA was the most secretive intelligence agencies of the United States. Then came Edward Snowden, who was granted an asylum for a year in Russia. Wanting to denounce "the largest program of arbitrary monitoring of human history," the American working for a subcontractor of the NSA has obtained several thousands of highly confidential documents. In early June, the first secrets of the National Security Agency in these parts start to filter. The Guardian reveals that the telephone operator Verizon provides NSA phone data of several million Americans, according to a court order secret. Then it was the turn of the Prism program to be unveiled. It allows the US Secret Service, and first and foremost to the NSA, to access a privileged manner, since December 2007, data from nine major Internet companies, including Google, Facebook and Microsoft. MONITORING OF SUBMARINE CABLE A document providing internal training on Prism, which Le Monde has also had access, how the NSA analysts can query the databases of Web giants, research documents, emails or instant discussions. All within a legal framework that overcomes the request of an individual mandate. The companies named in the documents have denied that the NSA had a direct and unilateral access to their servers. In addition to this targeted surveillance, Snowden records reveal another method of massive collection of the NSA called Upstream. This system can collect data from the submarine cable and Internet infrastructures. A logical strategy, when we know that 99% of global communications now pass through diving. To learn more about the context of the revelations of the World, the editorial read : "Fight Big Brother" The British equivalent of the NSA, the Government Communications Headquarters (GCHQ), plays a major role in this system, because of the historical proximity of Great Britain and the United States, confidentiality agreements and a financial dependence of those services from London to Washington. There are also technical reasons : a significant portion of submarine cables linking Europe to America through Britain. With Edward Snowden, the Tempora program , which aims to "control the Internet" by monitoring these cables, has been revealed. "You're in an enviable position, says a document presenting Tempora, presented by the Guardian, have fun and pull in the best." Turning a page of the document presenting the Prism program, we discover Upstream relies on four programs (Blarney, Fairview, and oakstar Stormbrew) which we know to date, the outline. Fairview, for example, would largely on intercepted telephone conversations via the major US carriers. DATA ANALYSIS TOOLS Many tools are needed to sort the mass of intercepted data. One of them is called XKeyscore, and its operation has been detailed in the columns of the Guardian. The extreme precision of the data are clear. With XKeyscore, analysts can access the content of e-mails to a list of websites visited by their target or the keywords entered by the latter in the search engines. The framework for this research is not binding, as the Guardian explained, and many Americans are data made available to agents. According to the presentation materials, to promote the capabilities of the tool, three hundred terrorists have been arrested since 2008 thanks to XKeyscore. NSA and GCHQ not only devote their considerable resources monitoring the fight against terrorism, but also to spy allies. At the G20 summit in London in 2009, computers of diplomats and heads of state were monitored by GCHQ, as well as some of their phone calls. NSA, she focused on the European Union (EU), as revealed by Der Spiegel, always on the basis of documents Snowden. NSA has installed cookies on the premises of the EU representation in Washington. The EU delegation to the UN in New York, and the building of the Council of the European Union in Brussels were also scrutinized by the US agency. Brazil is also one of the countries affected by this intelligence. According to Brazilian media group O Globo, its political leaders as some companies have been targeted. The Snowden documents have informed the considerable efforts made by the United States to start listening to Internet, in a sometimes unclear legal framework and often away from real democratic debate. Interviewed by Le Monde, the US authorities have assured that the Prism program was the subject of a parliamentary debate in the United States and was working in a strictly regulated legal framework. Asked on September 12 revelations Snowden, James Clapper, the US Director of National Intelligence, said: "What happened - and that is harmful - sparked conversation and debate that it probably was necessary." _______________________________________ ¤ UN Resolution Against US Spying :: http://cryptome.org/2013/10/un-v-us-spying.htm ¤ 21 Nations Line Up Behind UN Effort :: http://thecable.foreignpolicy.com/posts/2013/10/25/exclusive_21_nations_line_up_behind_un_effort_to_restrain_nsa ¤ Government May Stop Spying On So-called ‘World Leaders’, But Not You :: http://www.infowars.com/government-may-stop-spying-on-world-leaders-but-not-you/ NOBODY comments 100% expected. They will continue to spy on 99.9% of the world, no doubt. Any secret data-hoardering agency will. We must adjust to it by learning how to counter their surveillance. ¤ UPDATE ; Inside America’s Plan to Kill Online Privacy Rights Everywhere :: The United States and its key intelligence allies are quietly working behind the scenes to kneecap a mounting movement in the United Nations to promote a universal human right to online privacy, according to diplomatic sources and an internal American government document obtained by The Cable. The diplomatic battle is playing out in an obscure UN General Assembly committee that is considering a proposal by Brazil and Germany to place constraints on unchecked internet surveillance by the National Security Agency and other foreign intelligence services. American representatives have made it clear that they won’t tolerate such checks on their global surveillance network. The stakes are high, particularly in Washington -- which is seeking to contain an international backlash against NSA spying -- and in Brasilia, where Brazilian President Dilma Roussef is personally involved in monitoring the UN negotiations. http://cryptome.org/2013/11/us-kill-privacy.htm http://thecable.foreignpolicy.com/posts/2013/11/20/exclusive_inside_americas_plan_to_kill_online_privacy_rights_everywhere _______________________________________ ¤ Keith Alexander Promotes NSA / Scorns Public News Coverage :: http://www.youtube.com/watch?v=6Kc5Xvr24Aw http://www.politico.com/blogs/under-the-radar/2013/10/nsa-chief-stop-reporters-selling-spy-documents-175896.html http://www.theguardian.com/commentisfree/2013/oct/25/europe-erupts-nsa-spying-chief-government _______________________________________ ¤ Leaked Memos Reveal GCHQ Efforts to Keep Mass Surveillance Secret :: http://www.theguardian.com/uk-news/2013/oct/25/leaked-memos-gchq-mass-surveillance-secret-snowden _______________________________________ ¤ US Dictatorship Spied Mexican Dictator :: The National Security Agency (NSA) has a division for particularly difficult missions. Called “Tailored Access Operations” (TAO), this department devises special methods for special targets. That category includes surveillance of neighboring Mexico, and in May 2010, the division reported its mission accomplished. A report classified as “top secret” said: “TAO successfully exploited a key mail server in the Mexican Presidencia domain within the Mexican Presidential network to gain first-ever access to President Felipe Calderon’s public email account.” http://www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html http://cryptome.org/2013/10/nsa-leak-mx-2.htm Cryptome comments ▼ This spying was apparently done from the NSA’s Medina Regional SIGINT Operations Center (MRSOC), Lackland Air Force Base Annex, San Antonio, TX (formerly Medina Regional SIGINT Operations Center): http://cryptome.org/2012-info/nsa-mrsoc-2012/nsa-mrsoc-2012.htm http://cryptome.org/mrsoc.pdf _______________________________________ ¤ More NSA Targets Revealed :: http://cryptome.org/2013/10/nsa-selected-coverage.htm ¤ NSA Spies on French Government :: http://cryptome.org/2013/10/nsa-close-access-sigads.pdf ¤ NSA Spies on Indian Government :: http://cryptome.org/2013/10/india-close-access-sigads.pdf ¤ NSA Spies on Everyone :: http://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-calls ¤ EU Rules New Policy to Curb NSA Spying :: http://www.theguardian.com/world/2013/oct/17/eu-rules-data-us-edward-snowden ¤ Other Governments “Envious” of NSA :: http://theweek.com/article/index/251628/why-the-nsa-spies-on-france-and-germany David Addington, Cheney’s chief of staff, thought that the NSA should use its technology to intercept emails and telephone calls sent from one domestic terminal to another, and was upset to learn that Hayden thought differently. That was a line he would only cross, deliberately, with court and congressional approval. Addington dropped the idea, but as we now know, the agency added to its portfolio a mandate to monitor suspicious communications that transited the border of the United States, and later began to collect reams of metadata in order to analyze it. Hayden wasn’t being cautious just for the record: NSA’s job was to collect foreign intelligence — to steal stuff, or purloin letters, real and digital, in order to provide policymakers with a decision advantage. The advantage the NSA provided was accurate information about what people who interacted with the United States said in private about their intentions; that gap between saying and doing, and the ability to predict action from it, allows the president of the United States to stay a step ahead. It’s one thing to say that the United States’ actions don’t always match up with the values we espouse, and that’s true. When our hypocrisy is exposed, our moral authority wanes and our ability to maneuver is reduced. It’s quite another to assume that other countries are any purer. They never have been and probably won’t be. Many are much purer than others, so the amount of resources the intelligence community devotes to harder strategic targets ought to correspond with how honest our allies are, or how little they deceive us. The egg comes before the chicken: How the hell can we figure out which allies are more reliable if we don’t figure out the correspondence between public and private words and actions. Of course, Brazil, France, Germany, and Mexico do exactly the same thing. They want their leaders to gain a decision advantage in the give and take between countries. They want to know what US policymakers will do before the Americans do it. And in the case of Brazil and France, they aggressively spy on the United States, on US citizens and politicians, in order to collect that information. The difference lies in the scale of intelligence collection: The US has the most effective, most distributed, most sophisticated intelligence community in the West. It is Goliath. And other countries, rightly in their mind, are envious. _______________________________________ ¤ NSA Involvement in Drone Kill Operations :: http://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story.html _______________________________________ ¤ 58 Things Learned About NSA Spying :: http://www.tedgioia.com/nsa_facts.html ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ Brazil Prepares to Counter NSA’s PRISM with ‘Secure Email’ Plan :: http://www.theregister.co.uk/2013/10/14/brazil_waxes_lyrical_on_security/ _______________________________________ ¤ Dutch Cabinet Response to Parliamentary Questions About NSA Wiretapping :: http://blog.cyberwar.nl/2013/10/dutch-govt-response-to-parliamentary.html _______________________________________ This week Edward Snowden received the Integrity Award from the Sam Adams Associates for Integrity in Intelligence. These videos from the award ceremony are the first of Mr Snowden after being granted asylum in Russia. http://wikileaks.org/Video-Edward-Snowden-wins-Sam.html ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ▼ GCHQ Freaks Out Over Recent Leaks :: Andrew Parker, the director general of the Security Service, said the exposing of intelligence techniques, by the Guardian newspaper, had given fanatics the ability to evade the spy agencies. http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10365026/GCHQ-leaks-have-gifted-terrorists-ability-to-attack-at-will-warns-spy-chief.html ¤ NSA & GCHQ Counter-Tor Slides :: “Use cookies to identify Tor users when they are not using Tor.” “Investigate Evercookie persistence.” http://cryptome.org/2013/10/nsa-tor-stinks.pdf --------------------------------------- Here is evercookie.sol found from an old bleach log. C:\Documents and Settings\Owner\Application Data\ Macromedia\Flash Player\#SharedObjects\ED5YHQQU\ bbcdn-bbnaut.ibillboard.com\server-static-files\ bbnaut.swf\evercookie.sol bbnaut.swf holding evercookie.sol “SWF is an Adobe Flash file format used for multimedia, vector graphics and ActionScript. Originating with FutureWave Software, then transferred to Macromedia, and then coming under the control of Adobe, SWF files can contain animations or applets of varying degrees of interactivity and function. There are also various third party programs that can produce files in this format, such as Multimedia Fusion, Captivate and SWiSH Max.” “.sol files are created by Adobe Flash Player to hold Local Shared Objects, data stored on the system running the Flash player.” --------------------------------------- ▲ NOBODY comments on Evercookie Evercookie is an .sol format, created as a macromedia (or flashplayer) cache. It can be found within Windows systems and can be wiped out here ; C:\Documents and Settings\User\ Application Data\Macromedia\ and may also be cloned here ; C:\WINDOWS\system32\Macromed\Flash\ I recommend users ALWAYS bleach their cache, cookies, logs, TEMP. The %TEMP% directory can be found here ; C:\Documents and Settings\User\ Local Settings\Temp\ --------------------------------------- • Adobe Flash Player Registry » http://code.str0.be/view/1d23ed24 http://ae7.st/p/6ci (mirror) • swflash.ocx Raw Data Dump » http://code.str0.be/view/41185b11 http://ae7.st/p/1ve (mirror) • Evercookie Cache Format Registry » http://pb.stoleyour.com/view/1d527692 http://ae7.st/p/35m (mirror) • Adobe “Asset Cache” Format Registry » http://pb.stoleyour.com/view/722ea22f http://ae7.st/p/4rq (mirror) • Macromedia - a Third-party Cacher » http://p.pomf.se/1252 http://ae7.st/p/5dk (mirror) --------------------------------------- http://en.wikipedia.org/wiki/Evercookie Evercookie is a JavaScript-based application created by Samy Kamkar which produces zombie cookies in a web browser that are intentionally difficult to delete. ... ... An Evercookie is not merely difficult to delete. It actively resists deletion by copying itself in different forms on the user’s machine and resurrecting itself if it notices that some of the copies are missing or expired. Specifically, when creating a new cookie, Evercookie uses the following storage mechanisms when available: • Standard HTTP cookies • Local Shared Objects (Flash cookies) • Silverlight Isolated Storage • Storing cookies in RGB values of auto-generated, force-cached PNGs using HTML5 Canvas tag to read pixels (cookies) back out • Storing cookies in Web history • Storing cookies in HTTP ETags • Storing cookies in Web cache • window.name caching • Internet Explorer userData storage • HTML5 Session Storage • HTML5 Local Storage • HTML5 Global Storage • HTML5 Database Storage via SQLite --------------------------------------- ¤ Cookies Threaten Tor User Anonymity :: “Just because you’re using Tor doesn’t mean that your browser isn't storing cookies,” said Jeremiah Grossman, a colleague of Hansen’s who also specializes in browser vulnerabilities. As Grossman described the procedure to CNET, the NSA is aware of Tor’s entry and exit nodes because of its Internet wide surveillance. “The very feature that makes Tor a powerful anonymity service, and the fact that all Tor users look alike on the Internet, makes it easy to differentiate Tor users from other Web users,” he wrote. “The NSA then cookies that ad, so that every time you go to a site, the cookie identifies you. Even though your IP address changed [because of Tor], the cookies gave you away,” he said. http://news.cnet.com/8301-1009_3-57606178-83/nsa-tracks-google-ads-to-find-tor-users/ --------------------------------------- ¤ GCHQ ; MULLENIZE Operation to Tag and Identify Packet Traffic From Machines :: “Working together, CT and CNE have devised a method to carry out large-scale ‘staining’ as a means to identify individual machines linked to that IP address. ... ... User Agent Staining is a technique that involves writing a unique marker (or stain) onto a target machine. Each stain is visible in passively collected SIGINT and is stamped into every packet, which enables all the events from that stained machine to be brought back together to recreate a browsing session.” http://cryptome.org/2013/10/gchq-mullenize.pdf http://s3.documentcloud.org/documents/801762/mullenize-28redacted-29.pdf ¤ Packet Staining :: http://prezi.com/p5et9yawg2c6/ip-packet-staining/ http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-00 http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-01 http://cryptome.org/2013/10/packet-stain/packet-staining.htm ¤ NSA Peeling Back the Layers of Tor :: http://cryptome.org/2013/10/nsa-egotisticalgiraffe.pdf http://www.theguardian.com/world/interactive/2013/oct/04/egotistical-giraffe-nsa-tor-document http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption ¤ NSA ; Tor Source Code Vulnerabilities :: “We have seen several targets using Tor. Our goal was to analyze Tor source code and determine any vulnerabilities in the system. We set up an internal Tor network to analyze Tor traffic, in the hopes of discovering ways to passively identify it. We also worked to create a custom Tor client which allows the user finer control.” ... ... “This accomplishes several things. Most basically, the Tor servers, many of which are listed on publicly advertised directory servers, are chosen to act as a series of proxies. This may seem to be excessively complex, as a single proxy server can be used to hide one’s location, but a single-hop proxy is vulnerable in two ways. First, by analyzing the pattern of the traffic going to and from the proxy server, it is possible to deduce which clients are making which requests. Second, if an attacker owns the proxy server, then it certainly knows who is asking for what, and anonymization is ruined. By using multiple hops, Tor is much more resistant to both of these attacks. Traffic analysis becomes extraordinarily difficult, as it must be coordinated across several machines, and an attacker must own all the hops along the circuit in order to trace requests back to the originating client.” ... ... “In our time in the lab, we found that running an nmap on a node that is offering a hidden service will turn up the port that the hidden service is using to deal with incoming connections. It can then be directly connected to, outside of Tor.” ... ... “We would have to try to connect to each of the ports we see open on a machine to determine if there is a hidden service being run. We would not even know which protocol the hidden service is running. It may be an HTTP server, an FTP server, an SMTP server, etc. The only thing we know is that the protocol must run over TCP. It is not enough to attempt to connect once to each port, using an HTTP GET request. Several protocols must be tried.” ... ... “It may also be useful to study Tor directory servers in more detail. Our work focused solely on the client, but many attacks would be much easier with access to more Tor servers. The directory servers ultimately control which Tor servers are used by clients. We have found that a server can put itself on a directory server multiple times; all it takes is the server running several Tor processes, each having a different nickname, open port, fingerprint, and LOG FILE. This only requires different configuration files for the different processes, which are easy to set up. That machine will handle a disproportionate amount of traffic, since it is listed several times. This increases the density of friendly servers in the cloud without increasing the number of servers we have set up. Unfortunately, each listing has the same IP address, which would be very noticeable to anyone who inspecting the directories.” http://cryptome.org/2013/10/nsa-tor.pdf http://s3.documentcloud.org/documents/802061/ces-summer-2006-tor-paper-28redacted-29-1.pdf http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html ¤ NSA ; Types of IAT :: http://cryptome.org/2013/10/nsa-iat-tor.pdf ¤ NSA Link Removed by Guardian :: http://cryptome.org/2013/10/nsa-link-removed.htm ¤ Tor Media Reports Disinformative (?) :: “This document doesn’t give much insight into capabilities the IC has developed against Tor. It’s apparently quite common to run multiple research teams (either known or unknown to each other) against a single target, and a few summer students with a dozen lab machines is a pretty small investment. I’d expect there are other programs with more sophisticated attacks, especially now 7 years later.” http://cryptome.org/2013/10/nsa-tor-disinfo.htm _______________________________________ ¤ Greenwald and Gibson Q&A @ Reddit :: http://cryptome.org/2013/10/greenwald-gibson-reddit.pdf _______________________________________ ¤ Mike Rogers Says He’d Like To See Snowden On a Hit List :: http://www.infowars.com/former-nsa-head-says-hed-like-to-see-snowden-on-us-kill-list/ “I must admit, in my darker moment over the past several months, I’d also thought of nominating Mr. Snowden, but it was for a different list,” Hayden said during a panel discussion, according to Brendan Sasso of The Hill. Sasso notes that the audience laughed, and Rep. Mike Rogers (R-Mich), chairman of the House Intelligence Committee who was also on the panel, responded, “I can help you with that.” http://thehill.com/blogs/hillicon-valley/technology/326315-former-nsa-chief-jokes-about-putting-snowden-on-kill-list The conversation then turned specifically to the government’s use of targeted killings, with Hayden noting “Yes, we do targeted killings, and I certainly hope they make full use of the capacities of the National Security Agency when we do that.” Hayden was responding to a question about a new project announced by journalists Glenn Greenwald and Jeremy Scahill, delving into the NSA’s alleged role in assassinations. http://rt.com/usa/nsa-assassination-leaks-greenwald-514/ _______________________________________ ¤ NSA Police Guard Threatens Reporters :: Infowars crew arrive at Utah Data Center. http://www.infowars.com/nsa-goons-confiscate-cameras-from-reporters/ http://www.sltrib.com/sltrib/politics/56958862-90/data-center-utah-amp.html.csp _______________________________________ ¤ Cost and Responsibility for Snowden’s Breaches :: http://cryptome.org/2013/10/snowden-cost.htm ¤ Questioning Snowden Truth :: http://cryptome.org/2013/10/questioning-snowden-truth.htm _______________________________________ ¤ NSA Gathers Data on Social Networks of US Citizens :: The new disclosures add to the growing body of knowledge in recent months about the NSA’s access to and use of private information concerning Americans, prompting lawmakers in Washington to call for reining in the agency and President Obama to order an examination of its surveillance policies. Almost everything about the agency’s operations is hidden, and the decision to revise the limits concerning Americans was made in secret, without review by the nation’s intelligence court or any public debate. As far back as 2006, a Justice Department memo warned of the potential for the “misuse” of such information without adequate safeguards. http://cryptome.org/2013/09/nsa-syanpse.htm http://cryptome.org/2013/09/nsa-syanpse-large.jpg http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html?_r=0 ¤ NSA Director Admits NSA Collects Data From American Social Networks :: http://hosted.ap.org/dynamic/stories/U/US_NSA_SURVEILLANCE_SOCIAL_NETWORKS?SITE=AP _______________________________________ ¤ GCHQ Faces Legal Challenge in European Court Over Online Privacy :: http://www.theguardian.com/uk-news/2013/oct/03/gchq-legal-challenge-europe-privacy-surveillance _______________________________________ UNITED STATES ONLY COUNTRY TO VOTE “NO” TO A NEW TREATY FOR DIGITAL PRIVACY :: Led by the German government, a loose coalition of privacy chiefs from countries across the world is pushing to update an influential international human rights treaty that enshrines the right to privacy. ... ... The annual conference was attended by a diverse selection of privacy and data protection officials from across the world, with representatives attending from countries including Japan, New Zealand, France, Slovenia, Uruguay, Belgium, Ireland, Finland, Spain, Australia, Germany, Burkina Faso, Canada, the United States, and the United Kingdom. During a closed session at the conference open only to the privacy chiefs, a resolution was put forward for a vote on the proposal to update Article 17. They voted overwhelmingly in favor of the idea, recognizing a need to “create globally applicable standards for data protection and the protection of privacy in accordance with the rule of law.” Notably, only one country did not approve of the resolution ... the United States. At this point, the proposed Article 17 protocol is still a long way off. It will eventually need to be put forward at the United Nations and voted on by member states, and that could take time. But the growing appetite to amend the international treaty in light of the Snowden revelations is highly symbolic if nothing else, reflecting widespread concerns about the power of mass surveillance technology in the digital age to trample over basic universal privacy rights. https://privacyconference2013.org/web/pageFiles/kcfinder/files/5.%20International%20law%20resolution%20EN%281%29.pdf http://www.slate.com/blogs/future_tense/2013/09/26/article_17_surveillance_update_countries_want_digital_privacy_in_the_iccpr.html NOBODY comments “The problem is not just the NSA, but all secret agencies around the world, in general. All secret agencies and their third-party vendors or allies break (or bypass) crypto and manufacture backdoors in electronic communication devices by stealth. Not just the NSA. Not just the GCHQ. Not just the GFO. Not just the ISNU, et al. The major problem is trust. If you desire privacy, you must kill any trust in security. Security does not exist on the web. Digital privacy is a hoax. It’s null. It’s a wet dream. It’s justice FUBAR.” _______________________________________ ¤ Deutsche Telekom Defies NSA Spying :: http://online.wsj.com/article/SB10001424052702303983904579096082938662594.html ¤ Deutsche DSL Phone Switch Data Dump :: http://cryptome.org/2013/09/dtag-dsl-switches.txt _______________________________________ ¤ Senate FISA Hearings, September 2013 :: http://cryptome.org/2013/09/edgar-13-0926.pdf http://cryptome.org/2013/09/wittes-13-0926.pdf http://cryptome.org/2013/09/dni-nsa-doj-13-0926.pdf http://cryptome.org/2013/09/dni-13-0926.pdf http://cryptome.org/2013/09/nsa-13-0926.pdf ¤ Dianne Feinstein Accidentally Confirms NSA Tapped the Internet Backbone :: http://www.techdirt.com/articles/20130927/13562624678/dianne-feinstein-accidentally-confirms-that-nsa-tapped-internet-backbone.shtml http://www.infowars.com/dianne-feinstein-accidentally-confirms-that-nsa-tapped-the-internet-backbone/ http://www.c-spanvideo.org/clip/4466341 In short, “upstream” capabilities are tapping the backbone itself, via the willing assistance of the telcos (who still have remained mostly silent on all of this) as opposed to “downstream” collection, which requires going to the internet companies directly. ¤ Senators Blame Public News Covering Leaks :: http://www.huffingtonpost.com/2013/09/26/senators-nsa-media_n_3998229.html ▼ Lawmakers Who Upheld NSA Phone Spying :: (1) http://c.nopaste.dk/p56175 (2) http://c.nopaste.dk/p56176 (3) http://c.nopaste.dk/p56177 (4) http://c.nopaste.dk/p56178 (5) http://c.nopaste.dk/p56179 _______________________________________ ¤ Declassified Documents Reveal the NSA Wiretapped Martin Luther King, Muhammad Ali and Two US Senators :: http://www.theguardian.com/world/2013/sep/26/nsa-surveillance-anti-vietnam-muhammad-ali-mlk _______________________________________ ¤ NSA Hacked Indian Politicos, Scientists :: According to a top secret document disclosed by NSA whistleblower Edward Snowden and obtained by The Hindu, the PRISM programme was deployed by the American agency to gather key information from India by tapping directly into the servers of tech giants which provide services such as email, video sharing, voice-over-IPs, online chats, file transfer and social networking services. And, according to the PRISM document seen by The Hindu, much of the communication targeted by the NSA is unrelated to terrorism, contrary to claims of Indian and American officials. Instead, much of the surveillance was focused on India’s domestic politics and the country’s strategic and commercial interests. http://www.thehindu.com/news/national/nsa-targets-indian-politics-space-nprogrammes/article5161299.ece According to the 2010 COMINT (communication intelligence) document about “Close Access SIGADs”, the offices of Indian diplomats and high-ranking military officials stationed at these important posts were targets of four different kinds of electronic snooping devices: Lifesaver, which facilitates imaging of the hard drive of computers. Highlands, which makes digital collection from implants. Vagrant, which collects data of open computer screens. Magnetic, which is a collection of digital signals. http://www.thehindu.com/news/international/world/nsa-planted-bugs-at-indian-missions-in-dc-un/article5164944.ece _______________________________________ ¤ Secret Bunkers, a Challenge for US Intelligence :: Accessing archived government documents, the National Security Archive, an anti-secrecy group, has revealed a decades-long effort by the US to detect, monitor, and in some cases plan the destruction of, “more than 10,000 such facilities worldwide, many of them in hostile territory, and many presumably intended to hide or protect lethal military equipment and activities, including weapons of mass destruction, that could threaten US or allied interests.” http://www.thehindu.com/news/international/world/secret-bunkers-a-challenge-for-us-intelligence/article5164833.ece _______________________________________ ¤ More Unreported, Unredacted NSA Slides :: http://leaksource.wordpress.com/2013/09/09/unreportedunredacted-nsa-slidesprogram-names-revealed-on-brazil-news/ _______________________________________ ¤ Guardian’s Alan Rusbridger on the Inside Story of NSA Leaks :: http://leaksource.wordpress.com/2013/09/24/guardians-alan-rusbridger-on-the-inside-story-of-snowden-nsa-leaks/ _______________________________________ ¤ PRISM Part of the BLARNEY Program :: http://electrospaces.blogspot.nl/2013/09/prism-as-part-of-blarney-program.html _______________________________________ ¤ New Separate Internet Being Built by Countries Targeted by NSA and GCHQ :: http://www.bricscable.com/wp-content/uploads/2013/03/U564-Imphandze-BRICS-Leaflet.pdf http://www.bricscable.com/wp-content/uploads/2013/04/2013-submarine-cable-market-industry-report.pdf http://www.bricscable.com/wp-content/uploads/2013/04/BRICS-BUSINESS-FORUM-JOINT-COMMUNIQUE-26-March-2013.pdf ¤ New Separate Internet Will Not be Under United States Control :: The President of Brazil, Dilma Rousseff announces publicly the creation of a world internet system INDEPENDENT from US and Britain or “US-centric internet.” Not many understand that, while the immediate trigger for the decision (coupled with the cancellation of a summit with the US president) was the revelations on NSA spying, the reason why Rousseff can take such a historic step is that the alternative infrastructure: The BRICS cable from Vladivostock, Russia to Shantou, China to Chennai, India to Cape Town, South Africa to Fortaleza, Brazil, is being built and it’s, actually, in its final phase of implementation. “The global backlash is only beginning and will get far more severe in coming months,” said Sascha Meinrath, director of the Open Technology Institute at the Washington-based New America Foundation think-tank. “This notion of national privacy sovereignty is going to be an increasingly salient issue around the globe.” http://proxy.rickmartensen.nl/www.globalresearch.ca/the-brics-independent-internet-in-defiance-of-the-us-centric-internet/5350272 http://www.thehindu.com/news/international/world/brazil-plans-to-go-offline-from-uscentric-internet/article5137689.ece http://www.excitingrio.com/brazil-looks-break-us-centric-internet/ http://indrus.in/economics/2013/03/01/brics_cable_connecting_continents_brick_by_brick_22617.html ¤ The BRICS Fiber-optic Cable :: A 34,000 km, 2 fibre pair, 12.8 Tbit/s capacity, fibre optic cable system. http://www.bricscable.com/ https://www.youtube.com/watch?v=OkQI4bJcDGw _______________________________________ ¤ No Phone Company Ever Challenged NSA Spying :: A newly declassified opinion from the Foreign Intelligence Surveillance Court from this summer shows the court’s interpretation of the controversial Section 215 of the USA PATRIOT Act that’s used to justify the National Security Agency’s bulk telephone metadata collections, and reveals that none of the companies that have been served with such orders has ever challenged one. http://proxy.rickmartensen.nl/threatpost.com/fisc-no-phone-company-ever-challenged-metadata-collection-orders/102334 _______________________________________ ¤ Corporations Worry About Long-Term Blowback of NSA Revelations :: With all of the disturbing revelations that have come to light in the last few weeks regarding the NSA’s collection methods and its efforts to weaken cryptographic protocols and security products, experts say that perhaps the most worrisome result of all of this is that no one knows who or what they can trust anymore. The fallout from the most-recent NSA leaks, which revealed the agency’s ability to subvert some cryptographic standards and its “partnerships” with software and hardware vendors to insert backdoors into various unnamed products, has continued to accumulate over the course of the last couple of weeks. Cryptographers and security researchers have been eager to determine which products and protocols are suspect, and the discussion has veered in a lot of different directions. But one thing that’s become clear is that when the government lost the so-called Crypto Wars in the 1990s, the NSA didn’t just go back to Fort Meade and tend to its knitting. http://proxy.rickmartensen.nl/threatpost.com/experts-worry-about-long-term-implications-of-nsa-revelations/102355 ¤ The Sky is Not Falling – It’s Fallen :: The security community didn’t invent the concept of fear, uncertainty and doubt, but it has perfected it and raised it to the level of religion. It’s the way that security products are marketed and sold, but it’s also the way that the intelligence community justifies its extra-legal and, in some cases, unconstitutional, data-gathering practices. Just as vendors use the specter of catastrophic hacks, data loss and public embarrassment to push their wares, the NSA and its allies have used the dark shadow of 9/11 and global terrorism to justify their increasingly aggressive practices, some of which have now been shown to have deliberately weakened some of the fundamental building blocks of security. The most damning bit of string in this ball is the news that the NSA likely inserted a back door into a key cryptographic algorithm known as DUAL EC DRBG. That’s bad. What’s worse is that RSA on Thursday sent a warning to its developer customers warning them to immediately stop using the company’s BSAFE library because it uses the compromised random number generator. That means that untold numbers of products that include the BSAFE crypto libraries are compromised. http://proxy.rickmartensen.nl/threatpost.com/the-sky-is-not-falling-its-fallen/102372 _______________________________________ ¤ President Surveillance Program Review :: “The program was reauthorized by the President approximately every 45 days, with certain modifications. Collectively, the activities carried out under these Authorizations are referred to as the “President’s Surveillance Program” or “PSP.” One of the activities authorized as part of the PSP was the interception of the content of communications into and out of the United States where there was a reasonable basis to conclude that one party to the communication was a member of al-Qa’ida or related terrorist organizations. This aspect of the PSP was publicly acknowledged and described by the President, the Attorney General, and other Administration officials beginning in December 2005 following a series of articles published in The New York Times. The Attorney General subsequently publicly acknowledged the fact that other intelligence activities were also authorized under the same Presidential Authorization, but the details of those activities remain classified.” ... ... “Prior to September 11,2001, the Foreign Intelligence Surveillance Act of 1978 and Executive Order 12333 were generally viewed as the principal governing authorities for conducting electronic surveillance for national security purposes. The Foreign Intelligence Surveillance Act, 50 U.S.C. § 1801, et seq., was enacted in 1978 to "provide legislative authorization and regulation for all electronic surveillance conducted within the United States for foreign intelligence purposes."” http://cryptome.org/2013/09/psp-09-0710.pdf ¤ NSA ; PSP Analysis Loophole to Snoop Domestic Contacts Along with Metadata :: http://cryptome.org/2013/08/nsa-ig-09-0324.pdf NOBODY comments (nsa-ig-09-0324.pdf) The President’s Surveillance Program (PSP) should be of high interest. As mentioned on page 17, the PSP did not - “did not” - require special approval. Therefore, just another gap. Also take in consideration other abuse against FISA laws, court order to stifle FAA 702 upstream analysis, EO 12333, and of-course NSA’s now admitted abuse - deliberately ignoring restrictions against domestic communications (a risk to comsec). _______________________________________ ¤ Britain’s GCHQ Hacked Belgian Telecom Firm :: Documents from the archive of whistleblower Edward Snowden indicate that Britain’s GCHQ intelligence service was behind a cyber attack against Belgacom, a partly state-owned Belgian telecoms company. A “top secret” Government Communications Headquarters (GCHQ) presentation seen by SPIEGEL indicate that the goal of project, conducted under the codename “Operation Socialist,” was “to enable better exploitation of Belgacom” and to improve understanding of the provider’s infrastructure. ... ... According to the slides in the GCHQ presentation, the attack was directed at several Belgacom employees and involved the planting of a highly developed attack technology referred to as a “Quantum Insert” (“QI”). It appears to be a method with which the person being targeted, without their knowledge, is redirected to websites that then plant malware on their computers that can then manipulate them. Some of the employees whose computers were infiltrated had “good access” to important parts of Belgacom’s infrastructure, and this seemed to please the British spies, according to the slides. http://www.spiegel.de/international/europe/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html http://www.infowars.com/latest-snowden-leaks-show-gchq-gleefully-hacking-belgian-telco/ https://www.techdirt.com/articles/20130920/16112724595/latest-snowden-leaks-show-gchq-gleefully-hacking-belgian-telco.shtml http://cryptome.org/2013/09/belgacom-hack-en.htm http://cryptome.org/2013/09/belgacom.htm _______________________________________ ¤ European Parliament Brief on NSA :: http://cryptome.org/2013/09/europarl-nsa.pdf http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/dv/briefingnote_/briefingnote_en.pdf _______________________________________ ¤ NSA Buys Vupen Exploits :: http://cryptome.org/2013/09/nsa-vupen.pdf http://news.softpedia.com/news/Security-Firm-VUPEN-Confirms-the-NSA-Bought-Exploits-Service-Subscription-383597.shtml http://proxy.rickmartensen.nl/threatpost.com/nsa-bought-exploit-service-from-vupen-contract-shows _______________________________________ ¤ US Government Foreign Telecommunications Providers Network Security Agreements :: http://publicintelligence.net/us-nsas/ http://info.publicintelligence.net/US-NSAs.zip http://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story.html _______________________________________ ¤ FISA Court Releases FBI Spy Documents :: http://cryptome.org/2013/09/fisc-13-0917-4.pdf ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ▼ FISC Orders All Spy Data Disclosure Allocated to One Release :: http://cryptome.org/2013/09/fisc-five-13-0918.pdf ¤ Linkedin Moves to Disclose Spy Data :: http://cryptome.org/2013/09/fisc-linkedin-13-0917.pdf ¤ FISC Schedule for Microsoft, Google, Yahoo and Facebook Spy Data Release :: http://cryptome.org/2013/09/fisc-ms-google-yahoo-fb-13-0913.pdf ¤ Microsoft, Google Spy Data Briefing Schedule :: http://cryptome.org/2013/09/ms-goog-fisc-13-0909.pdf ¤ Google Moves to Disclose User Spy Data :: http://cryptome.org/2013/09/google-fisc-13-0909.pdf ¤ Yahoo Moves to Disclose User Spy Data :: http://cryptome.org/2013/09/yahoo-fisc-13-0909.pdf ¤ Facebook Moves to Disclose User Spy Data :: http://cryptome.org/2013/09/facebook-fisc-13-0909.pdf ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ DoJ Stonewalls USA Today :: In response to a FOIA request from USA TODAY, the Justice Department said its ethics office never looked into complaints from two federal judges that they had been misled about NSA surveillance. http://cryptome.org/2013/09/usa-today-doj.pdf http://cryptome.org/2013/09/usa-today-doj-shots.jpg http://www.usatoday.com/story/news/nation/2013/09/19/nsa-surveillance-justice-opr-investigation/2805867/ ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ Perry Metzger: Matthew Green tweeted earlier today that Johns Hopkins will be hosting a roundtable at 10am EDT tomorrow (Wednesday, September 18th) to discuss the NSA crypto revelations. Livestream will be at: https://connect.johnshopkins.edu/jhuisicrypto/ _______________________________________ ¤ NSA Spying Documents to be Released as Result of EFF Lawsuit Against NSA :: https://www.eff.org/deeplinks/2013/09/hundreds-pages-nsa-spying-documents-be-released-result-eff-lawsuit ¤ Government Releases NSA Surveillance Docs and Previously Secret FISA Court Opinions In Response to EFF Lawsuit :: https://www.eff.org/deeplinks/2013/09/government-releases-nsa-surveillance-docs-and-previously-secret-fisa-court The Director of National Intelligence (DNI) just today released hundreds of pages of documents related to the government’s secret interpretation of Patriot Act Section 215 and the NSA’s (mis)use of its massive database of every American’s phone records. The documents were released as a result of EFF’s ongoing Freedom of Information Act lawsuit. We’ve posted links to each document below. While the government also posted many of the documents here ... http://icontherecord.tumblr.com/ ... our copies are completely searchable. Links to the documents ; • May 24, 2006 — Order from the Foreign Intelligence Surveillance Court https://www.eff.org/sites/default/files/filenode/docket_06-05_1dec201_redacted.ex_-_ocr_0.pdf • December 12, 2008 — Supplemental Opinion from the Foreign Intelligence Surveillance Court https://www.eff.org/sites/default/files/filenode/4_february_2011_production_br10-82_final_redacted.ex_-_ocr_1.pdf • January 28, 2009 — Order Regarding Preliminary Notice of Compliance Incident Dated January 15, 2009 from the Foreign Intelligence Surveillance Court https://www.eff.org/sites/default/files/filenode/br_08-13_alert_list_order_1-28-09_final_redacted1.ex_-_ocr_0.pdf • January 28, 2009 — Order Regarding Preliminary Notice of Compliance Incident Dated January 15, 2009 from the Foreign Intelligence Surveillance Court - With Cover Letter and Attached Declarations https://www.eff.org/sites/default/files/filenode/5_march_09_production-final_redacted.ex_-_ocr_1.pdf • February 26, 2009 — Notice of Compliance Incident https://www.eff.org/sites/default/files/filenode/br_08-13_doj_notice_with_supp_decl_as_filed_26_feb_09_final_redacted.ex_-_ocr_1.pdf • March 2, 2009 — Order from the Foreign Intelligence Court https://www.eff.org/sites/default/files/filenode/br_08-13_order_3-2-09_final_redacted.ex_-_ocr_1.pdf • June 22, 2009 — Order from the Foreign Intelligence Court https://www.eff.org/sites/default/files/filenode/br_09-06_order_and_supplemental_order_6-22-09_final_redacted.ex_-_ocr_0.pdf • June 25, 2009 — Implementation of the Foreign Intelligence Surveillance Court Authorized Business Records FISA https://www.eff.org/sites/default/files/filenode/nsa_business_records_fisa_redacted.ex_-_ocr_0.pdf • August 19, 2009 — Report of the United States with Attachments and Cover Letter https://www.eff.org/sites/default/files/filenode/4_september_09_production_final_redacted.ex_-_ocr_1.pdf • September 3, 2009 — Primary Order from the Foreign Intelligence Surveillance Court https://www.eff.org/sites/default/files/filenode/br_09-13_orders_signed_3_sept_09_final_redacted.ex_-_ocr_0.pdf • September 25, 2009 — Order Regarding Further Compliance Incidence from the Foreign Intelligence Surveillance Court https://www.eff.org/sites/default/files/filenode/br_09-13_-_september_25_order_regarding_further_compliance_incidents_final_redacted.ex_-_ocr_0.pdf • November 5, 2009 — Supplemental Opinion and Order from the Foreign Intelligence Surveillance Court https://www.eff.org/sites/default/files/filenode/br_09-15_supplemental_order_and_opinion_11-5-09_final_redacted.ex_-_ocr_0.pdf ¤ Gems Mined from the NSA Documents and FISA Court Opinions Released Today :: https://www.eff.org/deeplinks/2013/09/gems-mined-nsa-docs-released-today ¤ NSA FISA Business Records Offer a Lot to Learn (NSA Networks Not Encrypted) :: http://cryptome.org/2013/09/nsa-fisa-business-records.htm _______________________________________ ¤ NSA Spy Community Architecture 2011 :: http://cryptome.org/2013/09/nsa-spy-architecture.pdf ¤ DNI Spy Community Architecture 2009 :: http://cryptome.org/2013/09/dni-spy-architecture.pdf ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ Keith’s Information Dominance Center :: http://cryptome.org/2013/09/info-dominance.pdf http://www.foreignpolicy.com/articles/2013/09/08/the_cowboy_of_the_nsa_keith_alexander?print=yes http://www.zerohedge.com/news/2013-09-15/man-charge-nsa-modeled-his-office-bridge-starship-enterprise _______________________________________ ¤ Germany’s Domestic Spy Agency Hands Over Data to the NSA :: Germany’s Federal Office for the Protection of the Constitution regularly hands over classified data to the NSA, media report. The revelation comes as Edward Snowden’s leaks show that Germany’s foreign spy agencies share troves of data with the US and UK. Citing secret government documents, Suddeutsche Zeitung reported that Germany’s Federal Office for the Protection of the Constitution, charged with domestic security, works closely with the US and regularly sends them information. The security service gathers intelligence on internal security threats. The documents obtained by Sueddeutsche Zeitung recorded 864 data packages sent to the NSA, as well as regular meetings between officers of the German Federal Office and the NSA. http://rt.com/news/germany-shares-data-nsa-spying-858/ _______________________________________ ¤ Dutch Government Response to Snowden’s Revelations :: This is an unofficial translation. http://blog.cyberwar.nl/2013/09/dutch-govt-response-to-revelations-by.html On September 13th 2013, the Dutch government responded (.pdf, in Dutch) to the revelations by Edward Snowded. http://www.rijksoverheid.nl/bestanden/documenten-en-publicaties/kamerstukken/2013/09/14/kabinetsreactie-op-onthullingen-edward-snowden/nederlandse-kabinetsreactie-edward-snowden-13-sept-2013-1.pdf https://www.aivd.nl/publish/pages/2533/nederlandse_kabinetsreactie_edward_snowden_13_sept_2013.pdf _______________________________________ ¤ NSA Spied Credit Card Transactions :: http://cryptome.org/2013/09/nsa-finance-spy-de.pdf http://cryptome.org/2013/09/nsa-finance-spy-slides.jpg http://www.spiegel.de/international/world/spiegel-exclusive-nsa-spies-on-international-bank-transactions-a-922276.html http://www.politico.com/story/2013/06/report-nsa-credit-card-transactions-92390.html http://weaselzippers.us/2013/06/06/wsj-report-nsa-tracking-credit-card-transactions-also-has-access-to-phone-records-from-att-and-sprint-along-with-verizon/ _______________________________________ ¤ NSA Brazil Spy Slides Decensored :: http://cryptome.org/2013-info/09/nsa-br-mx-3/nsa-br-mx-3.htm ¤ All SATC Slides, Brazil Spying Reports :: NSA_SATC_Slides.zip (54 files | ZIP | 3.37MB) http://filebeam.com/dacf6706b520431f2c4052484abd5b36 Why does the NSA spy on Brazil? (1) The US wants to maintain global economic power, (2) the US wants to maintain control over major natural resources and (3) the US is afraid the new economic powers (within the BRICS) may destabilize their economic power and control over natural resources. _______________________________________ ¤ A Font to Discourage NSA Snooping :: The ZXX font is designed to be difficult for machines to read. http://dl.dropbox.com/u/20517415/ZXX.zip http://reason.com/blog/2013/06/21/dont-want-the-nsa-to-read-your-email-use http://reason.com/archives/2013/09/14/a-font-to-discourage-nsa-snooping _______________________________________ ¤ IETF Draft to Prevent NSA Intercepts :: http://cryptome.org/2013/09/prism-proof.htm http://www.ietf.org/id/draft-hallambaker-prismproof-req-00.txt _______________________________________ ¤ NSA Targeted Israel for Surveillance, Also Sharing Data With Israeli SIGINT National Unit :: A copy of a top-secret deal inked in 2009 between the NSA and the Israeli Signals-intelligence National Unit (ISNU) was provided by NSA leaker Edward J. Snowden to the Guardian newspaper, which posted it Wednesday. It reveals that the NSA “routinely” passed to its Israeli counterpart raw signals intelligence, referred to as “SIGINT,” including the vast swathes of digital data traffic that the agency gathers under secret court authority from US Internet providers. So sensitive is this data that even before being disseminated to other US agencies, the NSA has to subject it to a court-mandated process called minimization, under which the names of any Americans are removed unless they are essential for foreign intelligence interest. But the US-Israeli agreement states that the data shared with Israel “includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content.” “NSA routinely sends ISNU minimized and unminimized raw collection associated with selectors from multiple Target office Primary Interest (TOPI) offices in Analysis and Production, S2 as part of SIGINT relationship between the two organizations.” http://cryptome.org/2013/09/nsa-israel-spy-share.pdf http://s3.documentcloud.org/documents/785495/doc1.pdf http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents http://www.washingtontimes.com/news/2013/sep/11/nsa-shares-raw-data-americans-israeli-spy-agency/ http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/11/the-nsa-is-sharing-data-with-israel-before-filtering-out-americans-information/ http://killerapps.foreignpolicy.com/posts/2013/09/11/irony_alert_nsa_targets_israel_and_still_gives_your_data_to_its_spies Other documents leaked by Mr. Snowden reveal that Israel was one of the nations that spy most aggressively against the United States. “To further safeguard our classified networks, we continue to strengthen insider threat detection capabilities across the Community. In addition, we are investing in target surveillance and offensive CI against key targets, such as China, Russia, Iran, Israel, Pakistan, and Cuba.” - Page 3 http://cryptome.org/2013/08/spy-budget-fy13.pdf http://s3.documentcloud.org/documents/781537/cbjb-fy13-v1-extract.pdf http://thehill.com/blogs/global-affairs/middle-east-north-africa/319513-leaked-documents-reveal-us-sees-israel-as-a-major-spying-threat NOBODY comments Ironic NSA considers Israel an “insider threat” - meanwhile we provide them with plenty of inside information. However the NSA used cryptanalysis and exploitation against Brazil leadership and Brazil was never a “key target.” This reminds of a quote ; “What if all secret agencies were of one accord spiritually, like in the paintings of dogs playing poker, just using humanity to play out one big game of destruction and domination with humans as the visible and spiritual puppets?” _______________________________________ ¤ DNI Releases Phone Metadata Spying Docs :: http://cryptome.org/2013/09/dni-13-0910.pdf _______________________________________ ¤ Smartphones Are Gold Mines to NSA :: (EN) http://cryptome.org/2013/09/nsa-smartphones-en.pdf (DE) http://cryptome.org/2013/09/nsa-smartphones.pdf ¤ NSA Presentation You Won’t Believe :: Referring to customers as “zombies” is the sort of thing you’d expect from neckbearded hipsters and other self- proclaimed individualists who tend to take a dim view of any popular activity. It’s rather jarring to hear the lingo deployed in a government intelligence agency presentation. http://cryptome.org/2013/09/nsa-smartphones-en.pdf https://www.techdirt.com/articles/20130909/08582024452/steve-jobs-is-big-brother-smartphone-users-are-zombies-according-to-nsa-cell-phone-tapping-presentation.shtml http://www.infowars.com/steve-jobs-is-big-brother-and-smartphone-users-are-zombies-according-to-nsa-cell-phone-tapping-presentation/ ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ DNI and NSA Blame Obama to Cover Up Violations Against a 2011 Court Order :: The Obama regime secretly won permission from a surveillance court in 2011 to reverse restrictions on the National Security Agency’s use of intercepted phone calls and e-mails, permitting the agency to search deliberately for Americans’ communications in its massive databases, ACCORDING TO INTERVIEWS WITH GOVERNMENT OFFICIALS and recently “declassified material” - (which, by the way, had NO classification, NO date, NO stamp, NO names, NO identification of which agency it came from and most shocking of all NO blackouts, odd.) http://www.dni.gov/files/documents/DNI%20Clapper%20Section%20702%20Declassification%20Cover%20Letter.pdf In addition, the court extended the length of time that the NSA is allowed to retain intercepted US communications from five years to six years — and more under special circumstances, according to the documents, which include a recently released 2011 opinion by US District Judge John D. Bates, then chief judge of the Foreign Intelligence Surveillance Court. http://www.washingtonpost.com/world/national-security/obama-administration-had-restrictions-on-nsa-reversed-in-2011/2013/09/07/c26ef658-0fe5-11e3-85b6-d27422650fd5_story.html NOBODY comments The document which was declassified by US intelligence officials explains the chief judge of the Foreign Intelligence Surveillance Court ruled the FAA 702 upstream collection unconstitutional. http://cryptome.org/2013/08/fisa-shut-nsa-phone-records.pdf http://apps.washingtonpost.com/g/page/national/fisa-court-documents-on-illegal-nsa-e-mail-collection-program/409/ http://www.washingtonpost.com/world/national-security/nsa-gathered-thousands-of-americans-e-mails-before-court-struck-down-program/2013/08/21/146ba4b6-0a90-11e3-b87c-476db8ac34cd_story.html National Security Agency analysts deliberately ignored restrictions on their authority to spy on Americans. http://www.bloomberg.com/news/2013-08-23/nsa-analysts-intentionally-abused-spying-powers-multiple-times.html NSA analysts admitted to abuse after the 2012 FISA Court audit was released. http://cryptome.org/2013/08/nsa-fisa-audit.pdf http://apps.washingtonpost.com/g/page/national/nsa-report-on-privacy-violations-in-the-first-quarter-of-2012/395/ And this is not the first attempt to try to cover up their FISA violations. http://cryptome.org/2013/08/nsa-fisa-audit-note.pdf http://apps.washingtonpost.com/g/page/national/what-to-say-and-not-to-say-to-our-overseers/390/ The new Washington Post report has linked to disinformation from a DNI (press) release exposing yet another attempt to dodge any criminal charges or take responsibility for the abuses exposed from the FISA Court audit. http://www.washingtonpost.com/world/national-security/obama-administration-had-restrictions-on-nsa-reversed-in-2011/2013/09/07/c26ef658-0fe5-11e3-85b6-d27422650fd5_story.html I suspect another attempt by the DNI and NSA to cover up FISA violations. Just blame the puppet-in-charge, Obama, to use as a scapegoat - go figure. All of this information is backed up and will be mirrored soon. Meanwhile, here is the leaked 2012 audit exposing 2,776 violations one year after the FISA Court order. http://cryptome.org/2013/08/nsa-fisa-audit.pdf As for Congress they will lay down like a bunch of leashed dogs who are getting kickbacks for doing nothing to prevent this abuse nor fix any problems. I will not link to their PR circus stunts anymore and I encourage voters to throw a majority of them out of office come next election. _______________________________________ ¤ Snowden, NSA, and Counterintelligence? :: http://20committee.com/2013/09/04/snowden-nsa-and-counterintelligence/ _______________________________________ ¤ NSA SATC Slide [Images] Leak :: http://www.youtube.com/watch?v=XlkHBB3-DhY Screen shots of Brazilian Fanstastico TV show on NSA spying Brazil and Mexico presidents, aired 1 September 2013. ▼ http://cryptome.org/2013-info/09/nsa-br-mx/nsa-br-mx.htm ¤ NSA Spying Brazil, Mexico Presidents :: Translation by Google, tidied by Cryptome. http://cryptome.org/2013/09/nsa-spying-brazil.htm ¤ NSA SATC Eavesdropping Case Study :: http://electrospaces.blogspot.com/2013/09/an-nsa-eavesdropping-case-study.html ▲ All 14 SATC Slides Released (Mirrored) :: http://up.inet.ge/download.php?file=eb9465849119fa5efe4256304d2c5630 http://filebeam.com/eb9465849119fa5efe4256304d2c5630 http://tishare.com/y7ldwxx397kl.htm http://f.lui.li/get_822_b946.html ¤ Brazil Senate Committee to Probe Espionage :: Brazil’s senate has formed an Investigative Parliamentary Commission to follow up on reports that the US National Security Agency (NSA) spied on Brazilian Prez Dilma Rousseff. “We intend to protect national sovereignty,” Xinhua quoted Senator Vanessa Graziotin of the Communist Party of Brazil as saying Tuesday. The committee, comprising 11 main members and seven substitutes, initially has 180 days to investigate claims that the NSA monitored emails between Rousseff and several of her top aides, and tapped her phone. http://news.yahoo.com/brazil-senate-committee-probe-us-spying-032012289.html ¤ BLOWBACK ; US/Brazil Bilateral Relation Impacted :: Revelations of a US spy program that allegedly allows digital surveillance of the presidents of Brazil and Mexico have drawn cries of indignation and anger in both nations, but the fallout may be strongest for US-Brazil relations. At stake is whether Brazilian Prez Dilma Rousseff will cancel a planned state visit to Washington in October, the first offered by Prez Barack Obama this year, or will take action on digital security that may affect US companies such as Google, Facebook and Yahoo. Rousseff is reported to be considering a proposal that would suspend operations of companies that cooperate with the NSA or US intelligence agencies. http://www.mcclatchydc.com/2013/09/03/201125/nsa-leak-might-lead-to-cancellation.html _______________________________________ ¤ ACLU Sues the NSA Update 02 :: http://thehill.com/blogs/hillicon-valley/technology/320357-nra-claims-nsa-illegally-created-a-gun-database ¤ ACLU Sues the NSA Update 01 :: http://www.theguardian.com/world/2013/aug/27/nsa-surveillance-program-illegal-aclu-lawsuit ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ Top Secret US Spy Budget FY 2013 Vol 1 :: “We are bolstering our support for clandestine SIGINT capabilities to collect against high priority targets, including foreign leadership targets. Also, we are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit internet traffic.” http://cryptome.org/2013/08/spy-budget-fy13.pdf http://s3.documentcloud.org/documents/781537/cbjb-fy13-v1-extract.pdf ▲ Snapshots of Budget Exhibit :: http://cryptome.org/2013/08/spy-budget-fy13-exhibit-13.pdf http://cryptome.org/2013/08/spy-tidbits.pdf ▼ US Spy Budget FY 2013 - Spoon Fed :: “The Post is withholding some information after consultation with US officials who expressed concerns about the risk to intelligence sources and methods. Sensitive details are so pervasive in the documents that The Post is publishing only summary tables and charts online.” http://www.washingtonpost.com/world/national-security/black-budget-summary-details-us-spy-networks-successes-failures-and-objectives/2013/08/29/7e57bb78-10ab-11e3-8cdd-bcdc09410972_story.html ▲ Declassified, Censored US Spy Budget FY 2013 Vol 4 :: http://cryptome.org/2013/08/spy-budget-fy13-v4.pdf http://www.fas.org/irp/nro/fy2013cbjb.pdf ▲ Declassified, Censored US Spy Budget FY 2013 Vol 12 :: http://cryptome.org/2013/08/spy-budget-fy13-v12.pdf http://www.fas.org/irp/dni/cbjb-2013.pdf ¤ Intelligence vs Intelligence :: The Obama regime views Israel as one of the top spying threats facing it’s intelligence services, leaked documents reveal. “Israel should be assumed to continue to have an aggressive intelligence collection operations against the United States,” Pillar said. While much information is collected through traditional political contacts, “I would personally have no doubt that that is supplemented by whatever means they can use to find out as much as they can about what we’re doing, thinking, deciding on anything of interest to Israel, which would include just about any Middle Eastern topic.” http://thehill.com/blogs/global-affairs/middle-east-north-africa/319513-leaked-documents-reveal-us-sees-israel-as-a-major-spying-threat From US Spy Budget FY 2013 Vol 1 ... “To further safeguard our classified networks, we continue to strengthen insider threat detection capabilities across the Community. In addition, we are investing in target surveillance and offensive CI against key targets, such as China, Russia, Iran, Israel, Pakistan, and Cuba.” _______________________________________ ¤ NSA Exploit Isn’t Crypto, It’s SMTP :: “The crypto is the easy part. The hard part is the traffic analysis, of which the worst part is the Received headers. Everyone should look at their own headers -- especially people on this list and at least comprehend that your email geotracks you forever, as it’s all in the Mailman archive. There are plenty of other leaks like Message-ID, Mime-Version, X-Mailer, the actual separators in MIME part breaks, and so on. It’s absolutely correct that some combination of VPNs, Tor, remailers of whatever stripe, and so on can help with this, but we’re all lazy and we don’t do it all the time. What we’re learning from Snowden is that they’re doing traffic analysis -- analyzing movements, social graphs, and so on and so forth. The irony here is that this tells us that the crypto works. That’s where I’ve been thinking for quite some time. Imagine that you’re a SIGINT group trying to deal with the inevitability of crypto that works being deployed everywhere. What do you do? You just be patient and start filling in scatter plots of traffic analysis. The problem isn’t the crypto, it’s SMTP.” http://cryptome.org/2013/08/callas-nsa-smtp.htm ¤ NSA Trying to Break Encryption :: Among the NSA’s annual budget of $52.6 billion are requests to bankroll ground- breaking cryptanalytic capabilities that can beat cryptography and mine regular Internet traffic, new documents leaked by Edward Snowden to the Washington Post reveal. http://news.cnet.com/8301-13578_3-57600647-38/nsa-seeks-groundbreaking-spying-powers-new-leak-reveals/ “We are bolstering our support for clandestine SIGINT capabilities to collect against high priority targets, including foreign leadership targets. Also, we are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit internet traffic.” ... ... Processing & Exploitation 15% of budget. Cryptanalysis & Exploitation Services ; Analysis of Target Systems, Cryptanalytic IT Systems, Cyber Cryptanalysis, Exploitation Solutions, Microelectronics, PEO Program, PEO Program B, PEO Program C, Target Pursuit, Target Reconnaissance & Survey. SIGINT Stations ; Cryptologic Centers, Field Sites, OCMC, SIGINT Ground Operations. http://cryptome.org/2013/08/spy-budget-fy13.pdf http://s3.documentcloud.org/documents/781537/cbjb-fy13-v1-extract.pdf ¤ NSA Rigging the Crypto Market Repost :: http://cryptome.org/jya/nsa-sun.htm ▲ NSA May Have SSL Encryption Keys :: The US government has attempted to obtain the master encryption keys that Internet companies use to shield millions of users’ private web communications from eavesdropping. These demands for master encryption keys, which have not been disclosed previously, represent a technological escalation in the clandestine methods that the FBI and the National Security Agency employ when conducting electronic surveillance against Internet users. ... ... Leaked NSA surveillance procedures, authorized by Attorney General Eric Holder, suggest that intercepted domestic communications are typically destroyed -- unless they’re encrypted. If that’s the case, the procedures say, “retention of all communications that are enciphered” is permissible. http://news.cnet.com/8301-13578_3-57595202-38/feds-put-heat-on-web-firms-for-master-encryption-keys/ _______________________________________ ¤ NSA Arrangements with Foreign Internet Providers and Foreign Intelligence :: “The NSA started setting up Internet intercepts well before 2001, former intelligence officials say. Run by NSA’s secretive Special Services Office, these types of programs were at first designed to intercept communications overseas through arrangements with foreign Internet providers, the former officials say. NSA still has such arrangements in many countries, particularly in the Middle East and Europe, the former officials say.” http://electrospaces.blogspot.com/2013/08/nsa-has-also-arrangements-with-foreign.html ¤ NSA’s Global Surveillance :: http://online.wsj.com/public/resources/documents/WSJ-NSAB08202013.jpg http://www.presstv.ir/detail/2013/08/21/319731/nsa-surveillance-new-detail/ http://www.dailypaul.com/296515/wsj-new-details-show-broader-nsa-surveillance-reach-programs-cover-seventy-five-of-nations-traffic ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ Another Loophole Around FISA Laws for the NSA - Postpone Timestamp Process :: A common hacking technique can be used to make emails look as if they came from outside the United States. http://paste.servut.us/wsiq _______________________________________ ¤ Google and the NSA ; Who’s Holding the Shit-Bag Now? :: http://cryptome.org/2013/08/assange-google-nsa.htm http://thestringer.com.au/google-and-the-nsa-whos-holding-the-shit-bag-now ▲ Related ; Surveillance Industry Profit :: http://rt.com/usa/nsa-payed-internet-companies-911/ http://www.infowars.com/leaked-document-reveals-government-paid-millions-to-prism-participants/ http://www.theguardian.com/world/2013/aug/23/nsa-prism-costs-tech-companies-paid http://www.informationweek.com/security/government/nsa-paid-tech-companies-millions-for-pri/240160383 ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ Judge Walton FISA Letter to Senator Patrick Leahy :: http://cryptome.org/2013/08/walton-leahy-13-0729.pdf ¤ USA to Provide Declassified FISA Documents :: http://cryptome.org/2013/08/usa-fisa-13-0729.pdf _______________________________________ ¤ NSA Analysts Admit Deliberate Abuse :: Some National Security Agency analysts deliberately ignored restrictions on their authority to spy on Americans multiple times in the past decade, contradicting Obama regime officials’ and lawmakers’ statements that no willful violations occurred. ... Legal opinions declassified on Aug. 21 revealed that the NSA intercepted as many as 56,000 electronic communications a year of Americans who weren’t suspected of having links to terrorism, before a secret court that oversees surveillance found the operation unconstitutional in 2011. http://www.bloomberg.com/news/2013-08-23/nsa-analysts-intentionally-abused-spying-powers-multiple-times.html ¤ FISA Court Shut Down NSA’s Authority to Collect Domestic Calls (FAA 702 Upstream) in 2011 but the NSA Kept Collecting :: The 86-page document, which was declassified by US intelligence officials Wednesday, explains why the chief judge of the Foreign Intelligence Surveillance Court ruled the collection method unconstitutional. ... The documents were released in response to a Freedom of Information Act lawsuit filed by the Electronic Frontier Foundation. “It’s unfortunate it took a year of litigation and the most significant leak in American history to finally get them to release this opinion,” EFF staff attorney Mark Rumold said Wednesday, “but I’m happy that the administration is beginning to take this debate seriously.” http://cryptome.org/2013/08/fisa-shut-nsa-phone-records.pdf http://apps.washingtonpost.com/g/page/national/fisa-court-documents-on-illegal-nsa-e-mail-collection-program/409/ http://www.washingtonpost.com/world/national-security/nsa-gathered-thousands-of-americans-e-mails-before-court-struck-down-program/2013/08/21/146ba4b6-0a90-11e3-b87c-476db8ac34cd_story.html ¤ NSA Audit of 2,776 FISA Violations :: http://cryptome.org/2013/08/nsa-fisa-audit.pdf http://apps.washingtonpost.com/g/page/national/nsa-report-on-privacy-violations-in-the-first-quarter-of-2012/395/ ¤ NSA Fudging FISA Violations :: http://cryptome.org/2013/08/nsa-fisa-audit-note.pdf http://apps.washingtonpost.com/g/page/national/what-to-say-and-not-to-say-to-our-overseers/390/ ¤ Leaked NSA Audit Found Agency Broke Privacy Rules Thousands of Times :: http://apps.washingtonpost.com/g/page/national/nsa-report-on-privacy-violations-in-the-first-quarter-of-2012/395/ http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story_1.html http://www.dailybinarynews.com/leaked-nsa-audit-found-agency-broke-privacy-rules-thousands-of-times/ http://www.dailybinarynews.com/wapo-nsa-broke-privacy-rules-thousands-of-times-harms-uncertain/ http://www.infowars.com/uncontrolled-by-fisa-court-nsa-commits-thousands-of-privacy-violations-per-year/ http://www.theguardian.com/world/2013/aug/16/nsa-violated-privacy-rules-audit The account is based on top-secret documents and a May 2012 internal NSA audit that found 2,776 infractions – including unauthorized collection, storage, access to or distribution of legally protected communications – in the preceding 12 months alone. The audit, originally only meant to be seen by top NSA leaders, only accounted for violations at NSA headquarters at Fort Meade, Virginia, and other locations in the Washington DC region. ▲ NSA Claims to Have Zero Tolerance Policy :: “I do think in a lot of the headlines and other things, there’s people talking about privacy violations or abuses or willful or violations, right, it is important for people to understand, NSA has a zero tolerance policy for willful misconduct. Zero. That’s our tolerance, it’s very simple. Right, we do realize mistakes do occur. We detect them, as early as we can. We correct them, right. None of the mistakes, the incidents that were in the document released were willful. Right, it doesn’t mean that we have any desire to have any mistakes; it doesn’t mean we think a mistake is okay.” http://cryptome.org/2013/08/nsa-13-0816.pdf ¤ NSA Reveals That It Does 20,000,000 Database Queries Per Month :: http://www.techdirt.com/articles/20130819/02153624228/nsa-reveals-that-it-does-20-million-database-queries-per-month.shtml ¤ Breaking Down Mass NSA Spying & Lies :: http://www.infowars.com/you-wont-believe-whats-going-on-with-government-spying-on-americans/ _______________________________________ ¤ UK GCHQ Bude and NSA Exchange Data :: Britain runs a secret internet-monitoring station in the Middle East to intercept and process vast quantities of emails, telephone calls and web traffic on behalf of Western intelligence agencies, The Independent has learnt. ... ... The information is then processed for intelligence and passed to GCHQ in Cheltenham and shared with the National Security Agency (NSA) in the United States. The Government claims the station is a key element in the West’s “war on terror” and provides a vital “early warning” system for potential attacks around the world. The Independent is not revealing the precise location of the station but information on its activities was contained in the leaked documents obtained from the NSA by Edward Snowden. The Guardian newspaper’s reporting on these documents in recent months has sparked a dispute with the Government, with GCHQ security experts overseeing the destruction of hard drives containing the data. ... ... The data-gathering operation is part of a £1,000,000,000 internet project still being assembled by GCHQ. It is part of the surveillance and monitoring system, code-named “Tempora”, whose wider aim is the global interception of digital communications, such as emails and text messages. Across three sites, communications – including telephone calls – are tracked both by satellite dishes and by tapping into underwater fibre-optic cables. http://www.independent.co.uk/news/uk/politics/exclusive-uks-secret-mideast-internet-surveillance-base-is-revealed-in-edward-snowden-leaks-8781082.html ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ Backbone Wiretaps to Backdoor Microcode :: http://cryptome.org/2013/08/callas-snowden.htm _______________________________________ ¤ FISA Reauthorization to John Boehner, Harry Reid, Nancy Pelosi, Mitch McConnell, Mike Rodgers, Dutch Ruppersberger, Lamar Smith, John Conyers Jr, Dianne Feinstein, Sexby Chambliss, Patrick J Leahy, Charles E Grassley :: http://cryptome.org/2013/08/fisa-dni-12-0326.pdf http://cryptome.org/2013/08/fisa-dni-ag-12-0208.pdf ¤ FISA 2008 Heavy Censorship March 2009 :: http://cryptome.org/2013/08/fisa-march-2009.pdf ¤ FISA 2008 Heavy Censorship May 2010 :: http://cryptome.org/2013/08/fisa-may-2010.pdf ¤ FISA 2008 Heavy Censorship December 2009 :: http://cryptome.org/2013/08/fisa-december-2009.pdf ¤ FISA Horse Droppings :: http://cryptome.org/2013/08/fisa-droppings.htm ¤ FISA Documents Withheld From Most of Congress :: “I can now confirm that the House Permanent Select Committee on Intelligence did NOT, in fact, make the 2011 document available to Representatives in Congress, meaning that the large class of Representatives elected in 2010 did not receive either of the now declassified documents detailing these programs.” - Justin Amash http://www.theguardian.com/world/2013/aug/12/intelligence-committee-nsa-vote-justin-amash http://www.infowars.com/amash-nsa-docs-were-withheld-from-congress-by-higher-ups/ ▼ http://www.youtube.com/watch?v=4Sg4AtcW0LU Youtube video ; 27:18 “So on this program, 100% audibility on every query that we make. And that is overseen by our Inspector General, our General Council. In 2009 in our discussions with the president when he first came on board we talked to him about these programs and the issue was how do we know the compliance is there and what more could we do? We stood up working with the COMMITTEES IN CONGRESS a directorate of compliance. This directorate of compliance is headed by legal professionals and information specialists that can look at everything that we do in these programs and ensure they (comply ?) with the court orders but we also have oversight from the Director of National Intelligence, General Council and IEG, from the Defense Department, from the Department of Justice, from the White House, FROM CONGRESS, the Intel(ligence) committees and from the courts.” - Keith Alexander _______________________________________ ¤ EU Privacy Watchdogs Seek PRISM Slides :: Only 9 out of 41 slides have become public so far. http://cnsnews.com/news/article/eu-privacy-watchdogs-seek-details-nsa-spying _______________________________________ ¤ NEVER LET SURVEILLANCE SHUT YOU UP :: http://online.wsj.com/article/SB10001424127887323639704579015101857760922.html _______________________________________ ¤ NSA Funds New “Top Secret” $60,000,000 Data Lab :: http://www.infowars.com/nsa-funds-new-top-secret-60-million-dollar-data-lab/ http://www.newsobserver.com/2013/08/15/3109412/nc-state-teams-up-with-nsa-on.html _______________________________________ ¤ What the NSA’s Massive Org Chart (Probably) Looks Like :: http://www.defenseone.com/ideas/2013/08/what-nsas-massive-org-chart-probably-looks/68642/ http://www.mindmeister.com/308518551/the-national-security-agency-operates-more-than-500-separate-signals-intelligence-platforms-employs-roughly-30-000-civilians-and-military-budget-10-billion http://cdn.govexec.com/media/gbc/docs/pdfs_edit/d1nsaorgmapimg.jpg _______________________________________ ¤ NSA Spying Under Fire in Latin America :: The massive NSA snooping revelations have cast a shadow over John Kerry’s trip to Latin America – his first visit there since he assumed the position of Secretary of State. He has already received a chilly reception in Colombia – where officials demanded an explanation to reports that Washington had collected vast amounts of internet data there. The next stop on his trip is Brazil – which allegedly was the top regional target of the surveillance program. http://www.youtube.com/watch?v=fpRPnc6Ucy8 http://sgtreport.com/2013/08/kerry-on-damage-control-nsa-spying-under-fire-in-latin-america/ ¤ Brazil Demands Clarifications on NSA Surveillance :: http://www.youtube.com/watch?v=txCcJ0wqdFc http://www.youtube.com/watch?v=cv1WjVI3lQA http://news.yahoo.com/brazil-demands-clarifications-nsa-surveillance-200545031.html _______________________________________ ¤ Ten Operational Directorates of NSA :: http://williamaarkin.wordpress.com/2013/08/13/nsa-a-little-help-with-transparency/ ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ NSA Strategy and Core Values :: http://www.nsa.gov/about/_files/nsacss_strategy.pdf http://cryptome.org/2013/08/nsa-strategy-values.htm ¤ NSA Deputy Director on NSA Core Values :: http://www.nsa.gov/about/values/core_values.shtml http://cryptome.org/2013/08/nsa-core-values-inglis.htm _______________________________________ ¤ Edward Snowden Speaks to Peter Maass :: http://www.nytimes.com/2013/08/18/magazine/snowden-maass-transcript.html http://cryptome.org/2013/08/snowden-maass.htm _______________________________________ ¤ Detail Into FAA Section 702 :: http://www.theguardian.com/world/2013/aug/09/nsa-loophole-warrantless-searches-email-calls “While the FAA 702 minimization procedures approved on 3 October 2011 now allow for use of certain United States person names and identifiers as query terms when reviewing collected FAA 702 data, analysts may NOT/NOT implement any USP queries until an effective oversight process has been developed by NSA and agreed to by DOJ/ODNI. Until further notice, collected FAA 702 data (702 data is contained in MARINA, MAINWAY, NUCLEON, PINWALE (Sweet* and Sour* partitions) and other databases).” http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2013/8/9/1376060880108/FAA-document-001.jpg NOBODY comments Refer to this leaked FISA document. http://cryptome.org/2013/06/nsa-fisa-minimization.pdf Under the FISA minimization, section 3 (b) (2) “Monitoring, Recording, and Processing (U)” the NSA can hold domestic communications not related to foreign information or foreign activity for up to five years. Found in section 3 (1) “Such inadvertently acquired communications of or concerning a United States person may be retained no longer than five years in any event.” Under the FISA minimization, section 5 “Domestic Communications (U)” there is more than one loophole the NSA can use to be granted authorization to snoop domestic communications that have been stored. Look into section 5, sub-sections (2) and (3). ║ (2) refers to criminal activity and *suspected* criminal activity. (3) refers to “communications security vulnerability” both being used as excuses to snoop. _______________________________________ ¤ NSA ; Adobe Reader Very Vulnerable :: http://cryptome.org/2013/08/nsa-adobe-reader-XI.pdf _______________________________________ ¤ NSA ; Mobility Capability Package :: http://cryptome.org/2013/08/nsa-mobility-capability.pdf _______________________________________ ¤ Obama Meets With Third-Party Corporate Executives Behind Closed Doors :: As the steady stream of revelations continues, the White House has choosen to meet quietly with tech executives and consumer groups behind closed doors. http://www.politico.com/story/2013/08/tim-cook-barack-obama-technology-95362.html _______________________________________ ¤ Obama Press Conference on NSA Spying :: http://cryptome.org/2013/08/obama-nsa-13-0809.htm ¤ Luke Rudkowski Talks About Obama’s NSA Spying Press Conference :: Luke Rudkowski breaks down today’s Presidential press conference in which the focus was predominantly on the NSA spying program. Luke points out many of the lies that Obama told today about the program by citing multiple articles with information that completely contradict what Obama said. http://www.youtube.com/watch?v=adZyfrcvtgg ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ NSA Missions, Authorities, Oversight, Partners :: http://cryptome.org/2013/08/nsa-13-0809.pdf ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ DoJ ; NSA Bulk Collection of Telephony Metadata :: http://cryptome.org/2013/08/doj-13-0809.pdf ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ National Security Run Amok :: http://www.washingtontimes.com/news/2013/aug/9/paul-national-security-run-amok/ _______________________________________ The Western Center for Journalism released a video briefing over Russel Tice former NSA whistleblower and his story about blackmailing former senator Barack Obama. http://www.youtube.com/watch?v=K31xCh6f_VY Abby Martin talks to Russell Tice, former intelligence analyst and original NSA whistleblower, about how the recent NSA scandal is only scratches the surface of a massive surveillance apparatus, citing specific targets the he saw spying orders for including former senators Hillary Clinton and Barack Obama. http://www.youtube.com/watch?v=d6m1XbWOfVk ¤ Boiling Frogs Post Podcast Show of NSA whistleblower Russell Tice :: http://www.youtube.com/watch?v=2DmN80yi5mo http://www.boilingfrogspost.com/podpress_trac/web/20927/0/BF.0112.Tice_20130617.mp3 ¤ Corbett Report ; NSA Wiretapped Obama, Petraeus, Alito, and Others :: http://www.youtube.com/watch?v=H1ZAzu_0YZU Ron Paul talks about NSA spying and why they want to sweep it under the rug. http://www.youtube.com/watch?v=0h4yOr-27mA ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ NSA and Spying Nicknames and Codewords :: http://electrospaces.blogspot.com/p/nicknames-and-codewords.html ¤ NSA’s Code Names Revealed (2012) :: http://williamaarkin.wordpress.com/2012/03/13/nsa-code-names-revealed/ NOBODY comments RAGTIME is the codename for Stellar Wind. This operation was debated years ago, yet the document was still classified. It was leaked to cryptome.org last month. ▼ http://cryptome.org/2013/06/nsa-stellar-wind.pdf OCELOT and STORMBREW are both managed by Stu Bathurst - both telephony data grabbing operations. RAGTIME sponsored many of these operations being leaked. _______________________________________ ¤ Uncensored NSA FAIRVIEW Slides Air on Brazilian Television :: http://www.youtube.com/watch?v=kOAv7zbJkCk http://www.dailydot.com/news/nsa-fairview-slides-brazil-spying/ http://cryptome.org/2013/08/nsa-codenames.htm NOBODY comments Upstream collection via FAA 702 includes FAIRVIEW, STORMBREW, BLARNEY and OAKSTAR. Original leaks of FAIRVIEW slides censored program managers - for FAIRVIEW “Craig Hicks” and for STORMBREW “Stu Bathurst.” ▼ http://postimg.org/image/9viuxblpd/ ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ Transfers From Germany Aid US Surveillance, English Report :: German intelligence sends massive amounts of intercepted data to the NSA, according to documents from whistleblower Edward Snowden, which SPIEGEL has seen. The trans-Atlantic cooperation on technical matters is also much closer than first thought. ... ... Day after day and month after month, the BND passes on to the NSA massive amounts of connection data relating to the communications it had placed under surveillance. The so-called metadata -- telephone numbers, email addresses, IP connections -- then flow into the Americans’ giant databases. http://www.spiegel.de/international/world/german-intelligence-sends-massive-amounts-of-data-to-the-nsa-a-914821.html ¤ Transfers from Germany Aid US Surveillance, Deutsch Report :: http://cryptome.org/2013/08/der-spiegel-13-0804.pdf ¤ Germany Nixes Spy Pact With US, UK (?) :: http://bigstory.ap.org/article/germany-nixes-surveillance-pact-us-britain ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ NSA XKEYSCORE Slides, 2008 :: http://cryptome.org/2013/07/nsa-xkeyscore.pdf http://www.slideshare.net/xkeyscore/xkeyscore-nsa-program-presentation http://www.documentcloud.org/documents/743244-xkeyscore-slidedeck.html ¤ XKEYSCORE God-terminal Into Internet :: http://www.dw.de/xkeyscore-a-god-terminal-into-internet/a-16994780 The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and FISA surveillance court oversight. http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data http://www.reuters.com/article/2013/07/31/us-usa-security-intelligence-idUSBRE96U03320130731 http://www.washingtontimes.com/news/2013/jul/31/declassified-documents-show-nsa-snooping-had-compl/ ¤ NSA XKeyscore Produced by SAIC :: http://cryptome.org/2013/08/nsa-xkeyscore-saic.htm ¤ NSA Press Statement on XKEYSCORE :: http://cryptome.org/2013/07/nsa-xkeystore.htm http://www.nsa.gov/public_info/press_room/2013/30_July_2013.shtml ¤ NSA X-KEYSCORE Server Locations :: http://cryptome.org/2013/08/nsa-x-keyscore-servers.htm ¤ NSA X-KEYSCORE Global Cyber-espionage :: http://cryptome.org/2013/08/nsa-x-keyscore-family.htm ¤ Instrument of Mass Surveillance :: http://www.infowars.com/xkeyscore-instrument-of-mass-surveillance/ ¤ NSA’s X-Keyscore One of Many More :: http://www.infowars.com/nsas-x-keyscore-one-of-many-surveillance-programs-used-on-americans/ ¤ RAGTIME and X-KEYSCORE @ Fort Meade :: “At Fort Meade, a program called XKEYSCORE processes all signals before they are shunted off to various “production lines” that deal with specific issues. PINWALE is the main NSA database for recorded signals intercepts. It is compartmentalized by keywords (the NSA calls them “selectors”). Metadata is stored in a database called MARINA and is generally retained for five years. ... ... “Congress repeatedly resisted the entreaties of the Bush Administration to change the surveillance laws once the RAGTIME program had been institutionalized. This was for a simple reason: they did not want to be responsible for a program that was not legal.” https://www.law.upenn.edu/live/files/1718-ambinder10-things.pdf NOBODY comments Under the FISA minimization, section 3 (b) (2) “Monitoring, Recording, and Processing (U)” the NSA can hold domestic communications not related to foreign information or foreign activity for up to five years. This confirms an XKeyscore presentation posted by the Guardian regarding the metadata aggregation to PINWALE databank seen in the DNI discovery options. ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ NSA Pays £100,000,000 in Secret Funding for GCHQ Bude :: http://www.theguardian.com/uk-news/2013/aug/01/nsa-paid-gchq-spying-edward-snowden _______________________________________ ¤ Other Agencies Clamor for Data NSA Compiles but Claim Rejections :: Agencies working to curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement complain that their attempts to exploit the security agency’s vast resources have often been turned down because their own investigations are not considered a high enough priority, current and former government officials say. Intelligence officials say they have been careful to limit the use of the security agency’s troves of data and eavesdropping spyware for fear they could be misused in ways that violate Americans’ privacy rights. ... “It’s a very common complaint about NSA,” said Timothy H. Edgar, a former senior intelligence official at the White House and at the office of the director of national intelligence. “They collect all this information, but it’s difficult for the other agencies to get access to what they want.” http://www.nytimes.com/2013/08/04/us/other-agencies-clamor-for-data-nsa-compiles.html?hp&_r=0 _______________________________________ ¤ NSA’s Keith Alexander Remarks at Aspen Security Forum :: http://cryptome.org/2013/07/nsa-aspen.pdf ¤ NSA’s Keith Alexander Remarks at AFCEA Conference :: http://cryptome.org/2013/07/nsa-afcea.pdf ¤ NSA’s Keith Alexander Remarks at Blackhat Conference :: http://www.youtube.com/watch?v=4Sg4AtcW0LU https://soundcloud.com/larrymagid/nsa-director-general-keith http://cryptome.org/2013/08/nsa-13-0731.pdf Youtube video ; 27:18 “So on this program, 100% audibility on every query that we make. And that is overseen by our Inspector General, our General Council. In 2009 in our discussions with the president when he first came on board we talked to him about these programs and the issue was how do we know the compliance is there and what more could we do? We stood up working with the committees in Congress a directorate of compliance. This directorate of compliance is headed by legal professionals and information specialists that can look at everything that we do in these programs and ensure they (comply ?) with the court orders but we also have oversight from the Director of National Intelligence, General Council and IEG, from the Defense Department, from the Department of Justice, from the White House, from Congress, the Intel(ligence) committees and from the courts.” - Keith Alexander ▲ NSA’s Keith Alexander Angers a Few at Blackhat Conference :: “Read the constitution” someone shouts. “I did, you should too” replied Keith. http://www.infowars.com/security-consultant-heckles-nsa-head-shouts-freedom-read-the-constitution/ http://www.forbes.com/sites/andygreenberg/2013/07/31/nsa-director-heckled-at-conference-as-he-asks-for-security-communitys-understanding/ ¤ NSA’s Keith Alexander Remarks to Workforce :: http://cryptome.org/2013/07/nsa-workforce.htm http://www.nsa.gov/public_info/speeches_testimonies/25jun13_dir.shtml _______________________________________ ¤ Obama Releases Three Patriot Act Docs :: http://cryptome.org/2013/07/obama-releases-13-0731.pdf ¤ US Outlines NSA Culling of Data for All Domestic Calls :: On Wednesday, the Obama regime released three documents related to the National Security Agency’s collection of phone records, including briefings to Congress as the relevant provision of the Patriot Act was up for renewal, and a ruling from the Foreign Intelligence Surveillance Court that outlines rules that must be followed when accessing data provided by a Verizon subsidiary. http://www.nytimes.com/interactive/2013/08/01/us/01nsa-docs.html Before Mr. Snowden’s leaks made clear what the government was doing with the Patriot Act program, several senators on the Intelligence Committee had made cryptic warnings that it was interpreting the law in a twisted way to do something alarming and made reference to the 2011 briefing paper. The New York Times filed a lawsuit under the Freedom of Information Act to obtain that document. https://www.documentcloud.org/documents/743215-2011-coverletters-report-collection.html _______________________________________ ¤ Senate FISA Spying Hearing Statements :: http://cryptome.org/2013/07/fisa-hearing-13-0731.pdf http://cryptome.org/2013/07/fisa-hearing-13-0731-2.pdf _______________________________________ ¤ Monitoring Emails Purely “Accidental” :: Saxby Chambliss ; “no emails are monitored now” ... “they used to be but that stopped two or three years ago.” http://abcnews.go.com/blogs/politics/2013/07/glenn-greenwald-low-level-nsa-analysts-have-powerful-and-invasive-search-tool/ _______________________________________ ▼ Lawmakers Who Upheld NSA Phone Spying Received Dox :: (1) http://c.nopaste.dk/p56175 (2) http://c.nopaste.dk/p56176 (3) http://c.nopaste.dk/p56177 (4) http://c.nopaste.dk/p56178 (5) http://c.nopaste.dk/p56179 ▼ Lawmakers Who Sold Out :: http://pastebin.com/6fhaDJMp ¤ Lawmakers Who Upheld NSA Phone Spying Received Double Defense Campaign Funds :: The numbers tell the story — in votes and dollars. On Wednesday, the house voted 217 to 205 not to rein in the NSA’s phone-spying dragnet. It turns out that those 217 “no” voters received twice as much campaign financing from the defense and intelligence industry as the 205 “yes” voters. http://www.wired.com/threatlevel/2013/07/money-nsa-vote/ ¤ These Are The 217 People Who Voted To Preserve NSA Surveillance :: http://www.infowars.com/these-are-the-217-people-who-voted-to-preserve-nsa-surveillance/ http://clerk.house.gov/evs/2013/roll412.xml http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2013/07/NOES_0.jpg ▲ US Congress Doxed, July 2013 :: http://slexy.org/view/s2fZ764IzB ¤ Justin Amash’s Amendment to Defund the NSA Will Get a Vote [Failed] :: http://www.youtube.com/watch?v=IUy3IT0A8hM http://washingtonexaminer.com/defund-nsa-amendment-will-get-a-vote/article/2533380 http://www.mcclatchydc.com/2013/07/23/197485/sen-wyden-says-he-tried-to-warn.html http://www.infowars.com/house-fight-brews-over-nsa-stasi-state/ ¤ White House Responds to Amash’s Amendment [Before It Failed] :: “In light of the recent unauthorized disclosures, the President has said that he welcomes a debate about how best to simultaneously safeguard both our national security and the privacy of our citizens. The Administration has taken various proactive steps to advance this debate including the President’s meeting with the Privacy and Civil Liberties Oversight Board, his public statements on the disclosed programs, the Office of the Director of National Intelligence’s release of its own public statements, ODNI General Counsel Bob Litt’s speech at Brookings, and ODNI’s decision to declassify and disclose publicly that the Administration filed an application with the Foreign Intelligence Surveillance Court. We look forward to continuing to discuss these critical issues with the American people and the Congress. However, we oppose the current effort in the House to hastily dismantle one of our Intelligence Community’s counterterrorism tools. This blunt approach is not the product of an informed, open, or deliberative process. We urge the House to reject the Amash Amendment, and instead move forward with an approach that appropriately takes into account the need for a reasoned review of what tools can best secure the nation.” - WH Press http://www.whitehouse.gov/the-press-office/2013/07/23/statement-press-secretary-amash-amendment http://washingtonexaminer.com/white-house-scrambles-to-defeat-bill-to-defund-nsa-program/article/2533418 ▲ RELATED ; Privacy and Civil Liberties Board Meets Behind Closed Doors :: http://cryptome.org/2013/06/pclob-13-0617.htm ¤ NSA Director Calls Emergency Meeting to Lobby Against Justin Amash’s Amendment to Defund NSA :: http://washingtonexaminer.com/nsa-director-calls-emergency-meeting-to-lobby-against-rep.-justin-amashs-nsa-amendment/article/2533407 _______________________________________ Yesterday, German media wrote about an official letter from the NSA, which was sent to the German government to clarify some misconceptions about PRISM. This because German media and politics were heavily confused after it became clear that there’s more than one program named PRISM. The NSA letter explains what the PRISM data collection program is about and then confirms that this program is different from a more common military web tool called "Planning tool for Resource Integration, Synchronization and Management" (PRISM). Surprisingly, the NSA also reveals that there’s even a third program called PRISM. In this case the name stands for “Portal for Real-time Information Sharing and Management” and it’s apparently an internal NSA information sharing program. It was unknown until now, probably because it’s used in the NSA’s highly sensitive Information Assurance Directorate (IAD). ... ... Here’s a short summary of all three different PRISM programs: 1. PRISM This is a codeword for an NSA project of collecting information about foreign targets from data of nine major US internet companies. This program started in 2007 and was unveiled by Edward Snowden in June 2013. 2. Planning tool for Resource Integration, Synchronization and Management (PRISM) This is a web tool used by US military intelligence to send tasking instructions to data collection platforms deployed to military operations. This program is not very secret and was first mentioned in 2002. 3. Portal for Real-time Information Sharing and Management (PRISM) This is an internal NSA program for real-time sharing of information, apparently in the NSA’s Information Assurance Directorate. Its existance was revealed by the NSA in July 2013. http://electrospaces.blogspot.com/2013/07/nsa-says-there-are-three-different.html ¤ Three Different PRISM Programs? German Parliament Seeks Clarity in NSA Scandal :: A Thursday meeting in German parliament was supposed to shed light on NSA surveillance activities in Germany. It only added to the mystery. A US response to a Berlin inquiry claims that there are actually three unrelated Prism programs. ... ... In addition to testimony from Schindler and Maassen, officials also read a written statement from the NSA in response to a query from the German government. According to the statement, there are three separate Prism programs, all of them unconnected to each other. Meeting participants say the NSA response said that one of the Prism programs was only used internally. That program had thus far remained secret. Another of the programs was used by the Pentagon in Afghanistan. Yet another NSA tool -- vaguely described in the statement and allegedly “totally unrelated to the first” -- carries the name PRISM and “tracks and queries requests pertaining to our Information Assurance Directorate.” http://www.spiegel.de/international/germany/merkel-chief-of-staff-testifies-before-parliament-on-nsa-spying-a-913268.html NOBODY comments The snapshot of the PRISM input tool posted on electrospaces blogspot must have been from the Pentagon’s PRISM. _______________________________________ ¤ UPDATE ; NSA Utah Data Center Probe :: http://cryptome.org/2013/07/nsa-utah-probe/nsa-utah-probe.htm ¤ NSA Utah Data Center Construction :: http://cryptome.org/2013-info/07/nsa-utah-dc/nsa-utah-dc.htm Description and drawings by US Army Corps of Engineers. http://cryptome.org/nsa-utah-data.zip http://cryptome.org/dodi/nsa-utah-award.pdf http://cryptome.org/dodi/nsa-utah-data-02.pdf _______________________________________ ¤ Eyeballing the UK’s GCHQ Spy Policy :: http://cryptome.org/2013/07/uk-spy-commish-2012.pdf ¤ Eyeballing the UK’s RIPA Spy Policy :: http://cryptome.org/2013/07/uk-cop-spy-2012-13.pdf ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ NSA Organizational Chart 1950 :: http://cryptome.org/2013/07/nsa-org-chart-1950.pdf ¤ NSA Headquarters Plans/Drawings 1953 :: http://cryptome.org/2013/07/nsa-hq-plans-1953.pdf ¤ NSA Employee Conduct Guide 1955 :: http://cryptome.org/2013/07/nsa-conduct-guide-1955.pdf _______________________________________ ¤ DoJ Responds to Snowden Russia Asylum :: “First, the United States would not seek death penalty for Mr. Snowden should he return to the United States. The charges he faces do not carry that possibility, and the United States would not seek the death penalty even if Mr. Snowden were charged with additional, death penalty- eligible crimes.” “Second, Mr. Snowden will not be tortured.” http://cryptome.org/2013/07/usdoj-rumoj-snowden.pdf _______________________________________ ¤ Edward Snowden Nominated for Nobel Peace Prize :: Edward Snowden, the National Security Agency whistleblower who revealed the agency’s data collection program, has been nominated for a Nobel Peace Prize. “Edward Snowden has — in a heroic effort at great personal cost — revealed the existence and extent of the surveillance, the US government devotes electronic communications worldwide,” read the nomination. “By putting light on this monitoring program — conducted in contravention of national laws and international agreements — Edward Snowden has helped to make the world a little bit better and safer.” ... “The decision to award the 2013 prize to Edward Snowden would — in addition to being well justified in itself — also help to save the Nobel Peace Prize from the disrepute that incurred by the hasty and ill-conceived decision to award [war criminal] Barack Obama the 2009 award,” Svallfors wrote to the committee. http://washingtonexaminer.com/edward-snowden-nominated-for-nobel-peace-prize/article/2533071 _______________________________________ ¤ Glenn Greenwald Interviewed Moskovsky Komsomolets News :: http://cryptome.org/2013/07/gg-snowden-leak-halt.htm ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ Minute Details of How the NSA Installs Their Surveillance Equipment :: Pete Ashdown, the CEO of XMission, detailed his experience when he received a Foreign Intelligence Surveillance Act (FISA) warrant in 2010 which forced him to allow the federal government to monitor a customer of his. Of course, like all FISA orders, it also contained a broad gag order, which still prevents him from telling all the details. “The FISA request was a tricky one, because it was a warrant through the FISA court — whether you believe that is legitimate or not,” Ashdown wrote. He had to help the agents “set up a duplicate port to tap in to monitor that customer’s traffic. It was a 2U (two-unit) PC that we ran a mirrored ethernet port to.” Ashdown eventually had a box in his facility that was capturing all of the traffic sent to his customer. He did not remember if it was connected to the internet, but wrote that it was likely capturing all data to a hard drive for later analysis. http://endthelie.com/2013/07/21/owner-of-small-utah-isp-describes-how-the-nsa-attempted-to-get-him-to-install-surveillance-equipment/ _______________________________________ ¤ NSA Briefs a New Administration, 2004 :: http://tinyurl.com/kqmpf4w _______________________________________ ¤ New Slides About NSA Collection Programs :: http://electrospaces.blogspot.com/2013/07/new-slides-about-nsa-collection-programs.html ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ NSA Admits They Snoop Targets’ Contacts’ Contacts’ Contacts (3 Hops) :: As an aside during testimony on Capitol Hill today, a National Security Agency representative rather casually indicated that the government looks at data from a universe of far, far more people than previously indicated. Chris Inglis, the agency’s deputy director, was one of several government representatives —including from the FBI and the office of the Director of National Intelligence— testifying before the House Judiciary Committee this morning. Most of the testimony largely echoed previous testimony by the agencies on the topic of the government’s surveillance, including a retread of the same offered examples for how the Patriot Act and Foreign Intelligence Surveillance Act had stopped terror events. But Inglis’ statement was new. Analysts look “two or three hops” from terror suspects when evaluating terror activity, Inglis revealed. Previously, the limit of how surveillance was extended had been described as two hops. This meant that if the NSA were following a phone metadata or web trail from a terror suspect, it could also look at the calls from the people that suspect has spoken with one hop. And then, the calls that second person had also spoken with two hops. Terror suspect to person two to person three. Two hops. And now: A third hop. ... ... So all of your friends, that’s one hop. Your friends’ friends, whether you know them or not - two hops. Your friends’ friends’ friends, whoever they happen to be, are that third hop. http://www.theatlanticwire.com/politics/2013/07/nsa-admits-it-analyzes-more-peoples-data-previously-revealed/67287/ ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ The Private Global Information Grid :: It is a good thing that people are becoming aware of the fact that they are being monitored - it is not only speculation anymore. We have seen PRISM, FinSpy and ECHELON. These programs are made to collect information and to store them in a database. Now just imagine the resources that PRISM used and how it could combine these resources to multiple databases. This is where GiG comes in. http://cyberwarzone.com/government-spying-database-global-information-grid _______________________________________ ¤ Edward Snowden Application for Asylum :: http://cryptome.org/2013/07/snowden-ru-asylum.htm ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ NSA Leaks Nothing Compared to Further Leaks Not-Yet-Released-to-Public :: Fugitive NSA leaker Edward Snowden today applied for asylum in Russia and, as a condition, agreed to stop ‘harming’ the US, according to a Russian lawyer who is advising him, but that doesn’t necessarily mean headline-grabbing stories about the US government’s vast foreign and domestic spying programs will stop. ... ... Putin has said that Snowden can stay in Russia, but only if he stops “harming” the United States by releasing more intelligence secrets. ... ... But while Snowden agreed to stop leaking secrets, it could prove a technicality since he has already said that he gave all of his classified information -- thousands of documents -- to several journalists. The most prominent of which, The Guardian columnist Glenn Greenwald, told ABC News Friday that he’s not even half done with the stories he plans to write based on the secret information. http://abcnews.go.com/Blotter/edward-snowden-legal-apply-russian-asylum/story?id=19678502 ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ Mirror of Removed NSA Recruitment Drive :: http://cypherpoet.com/nsa/ _______________________________________ ¤ Snowden NSA Revelations Mirrored :: http://cryptome.org/2013/07/cryptogram-13-0715.htm ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ When You’re Online, You’re Hacked :: In Russia, Prez Putin’s office just stopped using PC’s and switched to typewriters. What do they know that we don’t? http://steveblank.com/2013/07/15/your-computer-may-already-be-hacked-nsa-inside/ ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ MITRE Corporation Outlined Collection Management for PRISM and Other Spying :: Planning Tool for Resource Integration, Synchronization, and Management aka PRISM has existed since at least 2002. The following document refers to it directly. This demonstrates PRISM not only existed in July 2002, but it had been undergoing usage for some time, enough time to recognize limitation of it and similar projects. http://pastebin.com/h5a1c1Pd http://www.mitre.org/work/tech_papers/tech_papers_02/kane_isrplatforms/isrinformationservices.pdf _______________________________________ ¤ Brasil é alvo da Maciça Operação de Espionagem da NSA (TRANSLATED) :: http://code.str0.be/view/raw/540c2ebf ¤ Brazil is the Most Monitored Country in Latin America :: http://cryptome.org/2013/07/nsa-tracking/nsa-tracking.htm http://oglobo.globo.com/infograficos/volume-rastreamento-governo-americano/ http://www.washingtonpost.com/world/the_americas/paper-reveals-nsa-ops-in-latin-america/2013/07/09/eff0cc7e-e8e3-11e2-818e-aa29e855f3ab_print.html _______________________________________ ¤ US Dictatorship in Damage Control, Hyper-paranoia Over Snowden’s Leaks :: http://cryptome.org/2013/07/snowden-us-threat.htm http://in.reuters.com/article/2013/07/13/usa-security-snowden-greenwald-idINDEE96C05520130713 ¤ Future PRISM Leaks May Be Used As An Excuse for Global Internet Censorship :: http://in.reuters.com/article/2013/07/15/usa-security-cybertruce-idINDEE96E0DQ20130715 _______________________________________ ¤ Intel in Bed with NSA :: http://cryptome.org/2013/07/intel-bed-nsa.htm _______________________________________ ¤ News Media Censoring or Editing PRISM Slides / Slides Differ :: http://cryptome.org/2013/07/nsa-upstream-differ.htm http://cryptome.org/2013/07/nsa-upstream-differ.jpg http://www.washingtonpost.com/business/economy/the-nsa-slide-you-havent-seen/2013/07/10/32801426-e8e6-11e2-aa9f-c03a72e2d342_story.html ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ NSA Policy on IP Encryptor :: http://cryptome.org/2013/07/CNSSP-19.pdf ¤ NSA Policy on Information Assurance :: http://cryptome.org/2013/07/CNSSP-11.pdf _______________________________________ ¤ PRISM Method of Storing and Transferring Metadata :: http://electrospaces.blogspot.com/2013/07/new-insights-into-prism-program.html _______________________________________ ¤ NSA Rejecting Every FOIA Request Made by US Citizens :: http://www.dailykos.com/story/2013/07/06/1221694/-NSA-Rejecting-Every-FOIA-Request-Made-by-U-S-Citizens ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ National Security Agency DNS Tunnels :: http://pastebin.com/TpGTHDSy “This may look like a small release, but it's actually huge. See, we hacked the NSA yet again because we just love doing that. These are DNS tunnels that are sending encrypted data to and from the PRISM databases. We have the IP's of those servers. If you crash these servers with DDoS, you literally render PRISM "broken". We are also planning to release some of that data (which we have access to) if we can decrypt it.” ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ BEFORE PRISM ; Presidents Surveillance Program 2001 - 2006 :: Contractors include Booze Allen Hamilton, Snowden’s employer. http://cryptome.org/2013/07/Presidents-Spy-Program-Sept14-2001.htm ¤ History Behind Fiber-optic Wiretapping :: http://pastebin.com/VzqpaF8y _______________________________________ ¤ France Has Own PRISM Spy System :: http://www.megapastebin.com.ar/DU5BPIIK _______________________________________ ¤ Edward Snowden’s WikiLeaks Statement :: “One week ago I left Hong Kong after it became clear that my freedom and safety were under threat for revealing the truth. My continued liberty has been owed to the efforts of friends new and old, family, and others who I have never met and probably never will. I trusted them with my life and they returned that trust with a faith in me for which I will always be thankful. On Thursday, President Obama declared before the world that he would not permit any diplomatic “wheeling and dealing” over my case. Yet now it is being reported that after promising not to do so, the President ordered his Vice President to pressure the leaders of nations from which I have requested protection to deny my asylum petitions. This kind of deception from a world leader is not justice, and neither is the extralegal penalty of exile. These are the old, bad tools of political aggression. Their purpose is to frighten, not me, but those who would come after me. For decades the United States of America have been one of the strongest defenders of the human right to seek asylum. Sadly, this right, laid out and voted for by the US in Article 14 of the Universal Declaration of Human Rights, is now being rejected by the current government of my country. The Obama administration has now adopted the strategy of using citizenship as a weapon. Although I am convicted of nothing, it has unilaterally revoked my passport, leaving me a stateless person. Without any judicial order, the administration now seeks to stop me exercising a basic right. A right that belongs to everybody. The right to seek asylum. In the end the Obama administration is not afraid of whistleblowers like me, Bradley Manning or Thomas Drake. We are stateless, imprisoned, or powerless. No, the Obama administration is afraid of you. It is afraid of an informed, angry public demanding the constitutional government it was promised – and it should be. I am unbowed in my convictions and impressed at the efforts taken by so many.” http://www.telegraph.co.uk/news/worldnews/europe/russia/10154064/Edward-Snowdens-WikiLeaks-statement-in-full.html ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ The Internet Counter-culture :: http://media.risky.biz/RB284.mp3 ¤ Surveillance Scandals and Thought Crimes :: http://media.risky.biz/RB283.mp3 _______________________________________ ¤ Cyber Command Suffers Second Defeat :: http://cryptome.org/2013/07/uscybercom-dump.htm ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ Washington Post Publishes More PRISM :: http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/ http://www.guardian.co.uk/world/2013/jun/30/washington-post-new-slides-prism http://cryptome.org/2013-info/06/wapo-13-0629/prism-wapo-13-0629.htm _______________________________________ ¤ US Army Blocked Access to The Guardian :: http://www.infowars.com/u-s-army-now-censoring-the-guardian/ http://www.montereyherald.com/local/ci_23554739/restricted-web-access-guardian-is-army-wide-officials http://endthelie.com/2013/06/28/u-s-army-restricting-access-to-the-guardian-across-all-of-their-networks-over-security-concerns/ _______________________________________ ¤ Mirror of Deleted Article by Guardian :: http://pastebin.com/NTJvUZdJ Revealed: secret European deals to hand over private data to America. Germany among countries offering intelligence according to new claims by former US defence analyst. At least six European Union countries in addition to Britain have been colluding with the US over the mass harvesting of personal communications data, according to a former contractor to America’s National Security Agency, who said the public should not be “kept in the dark.” Wayne Madsen, a former US navy lieutenant who first worked for the NSA in 1985 and over the next 12 years held several sensitive positions within the agency, names Denmark, the Netherlands, France, Germany, Spain and Italy as having secret deals with the US. Madsen said the countries had “formal second and third party status” under signal intelligence (sigint) agreements that compels them to hand over data, including mobile phone and internet information to the NSA if requested. Under international intelligence agreements, confirmed by declassified documents, nations are categorised by the US according to their trust level. The US is first party while the UK, Canada, Australia and New Zealand enjoy second party relationships. Germany and France have third party relationships. In an interview published last night on the PrivacySurgeon.org blog, Madsen, who has been attacked for holding controversial views on espionage issues, said he had decided to speak out after becoming concerned about the “half story” told by EU politicians regarding the extent of the NSA’s activities in Europe. He said that under the agreements, which were drawn up after the second world war, the “NSA gets the lion’s share” of the sigint “take.” In return, the third parties to the NSA agreements received “highly sanitised intelligence.” Madsen said he was alarmed at the “sanctimonious outcry” of political leaders who were “feigning shock” about the spying operations while staying silent about their own arrangements with the US, and was particularly concerned that senior German politicians had accused the UK of spying when their country had a similar third-party deal with the NSA. Although the level of co-operation provided by other European countries to the NSA is not on the same scale as that provided by the UK, the allegations are potentially embarrassing. “I can’t understand how Angela Merkel can keep a straight face, demanding assurances from [Barack] Obama and the UK while Germany has entered into those exact relationships,” Madsen said. The Liberal Democrat MEP Baroness Ludford, a senior member of the European parliament’s civil liberties, justice and home affairs committee, said Madsen’s allegations confirmed that the entire system for monitoring data interception was a mess, because the EU was unable to intervene in intelligence matters, which remained the exclusive concern of national governments. “The intelligence agencies are exploiting these contradictions and no one is really holding them to account,” Ludford said. “It’s terribly undermining to liberal democracy.” Madsen’s disclosures have prompted calls for European governments to come clean on their arrangements with the NSA. “There needs to be transparency as to whether or not it is legal for the US or any other security service to interrogate private material,” said John Cooper QC, a leading international human rights lawyer. “The problem here is that none of these arrangements has been debated in any democratic arena. I agree with William Hague that sometimes things have to be done in secret, but you don’t break the law in secret.” Madsen said all seven European countries and the US have access to the Tat 14 fibre-optic cable network running between Denmark and Germany, the Netherlands, France, the UK and the US, allowing them to intercept vast amounts of data, including phone calls, emails and records of users’ access to websites. He said the public needed to be made aware of the full scale of the communication -sharing arrangements between European countries and the US, which predate the internet and became of strategic importance during the cold war. The covert relationship between the countries was first outlined in a 2001 report by the European parliament, but their explicit connection with the NSA was not publicised until Madsen decided to speak out. The European parliament’s report followed revelations that the NSA was conducting a global intelligence-gathering operation, known as Echelon, which appears to have established the framework for European member states to collaborate with the US. “A lot of this information isn’t secret, nor is it new,” Madsen said. “It’s just that governments have chosen to keep the public in the dark about it. The days when they could get away with a conspiracy of silence are over.” This month another former NSA contractor, Edward Snowden, revealed to the Guardian previously undisclosed US programmes to monitor telephone and internet traffic. The NSA is alleged to have shared some of its data, gathered using a specialist tool called Prism, with Britain’s GCHQ. ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ Wayne Madsen, Former Contractor for NSA, Talks About Global SIGINT Interception :: A former contractor to the US National Security Agency (NSA) has told the Privacy Surgeon that communications intelligence arrangements between the US and Europe are much more “complex, murky and far reaching” than the public has been led to believe. ... He was particularly concerned about the “sanctimonious outcry” of political leaders who were “feigning shock” about recently disclosed spying operations such as PRISM while staying silent about their own role in global interception arrangements with the United States. ... Madsen also expressed anger over the NSA’s hypocrisy over Edward Snowden. “Snowden is being roundly condemned by many who say he had no authority or right to provide the public with details of NSA snooping. But what right or authority did NSA director, General Keith Alexander, have to provide information on NSA surveillance at five meetings of the global Bilderberg Conference – two in Virginia and one meeting each in Greece, Spain and Switzerland?” “Alexander claims he is protecting the American people from a constantly changing number of terrorist attacks. In fact, he is providing information to elites on the methods NSA uses to spy on labor, student, religious and progressive organizations.” “When Alexander leaks to the elites, he’s thanked. When Snowden does it, he’s called a traitor and a coward.” http://www.privacysurgeon.org/blog/incision/former-nsa-contractor-warns-of-murky-interception-arrangements/ _______________________________________ ¤ NSA Spying Pisses Off European Union :: http://www.rawstory.com/rs/2013/06/30/new-nsa-leak-documents-show-how-the-us-is-bugging-its-european-allies/ http://www.cbsnews.com/8301-202_162-57591678/european-officials-lash-out-at-new-nsa-spying-report/ http://www.guardian.co.uk/world/2013/jun/30/nsa-spying-europe-claims-us-eu-trade http://www.infowars.com/report-nsa-joint-wiretapping-operations-with-foreign-nations/ http://www.waynemadsenreport.com/articles/20130630 http://www.spiegel.de/international/world/secret-documents-nsa-targeted-germany-and-eu-buildings-a-908609.html http://www.telegraph.co.uk/news/worldnews/northamerica/usa/10152478/Francois-Hollande-tells-the-US-to-stop-eavesdropping-on-Europe-if-it-wants-progress-on-trade-deal.html ¤ FLASHBACK ; Why We Spy on Our Allies :: http://cryptome.org/echelon-cia2.htm ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¤ NSA Stellar Wind Email Internet Data Collection :: http://cryptome.org/2013/06/nsa-stellar-wind.pdf _______________________________________ ¤ Two NSA IG Reports Differ :: http://cryptome.org/2013/06/nsa-reports-differ.htm _______________________________________ ¤ Congress Insisted They Be Kept in the Dark on NSA Spying :: http://www.infowars.com/congress-insisted-they-be-kept-in-the-dark-on-nsa-spying/ _______________________________________ ¤ DoJ Memo on NSA Data Collection on Americans 2007 :: http://cryptome.org/2013/06/doj-nsa-memo.pdf _______________________________________ ¤ NSA FISA Surveillance Leaks :: http://cryptome.org/2013/06/nsa-fisa-targeting.pdf http://cryptome.org/2013/06/nsa-fisa-minimization.pdf http://cryptome.org/2013/06/nsa-fisa-certification.pdf ¤ Mass Spying of All Telecommunication via FISA :: http://cryptome.org/2014/01/nsa-prism-dk.pdf http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/ http://apps.washingtonpost.com/g/page/national/inner-workings-of-a-top-secret-spy-program/282/ http://www.guardian.co.uk/world/2013/jun/20/fisa-court-nsa-without-warrant http://techcrunch.com/2013/06/21/new-nsa-warrantless-tactics-reveal-little-room-for-presumption-of-innocence/ http://www.informationweek.com/global-cio/interviews/nsa-dragnet-debacle-what-it-means-to-it/240156243 http://www.independent.co.uk/news/world/americas/inside-the-nsa-peeling-back-the-curtain-on-americas-intelligence-agency-8658016.html http://www.washingtonsblog.com/2013/06/nsa-whistleblower-nsa-spying-on-and-blackmailing-high-level-government-officials-and-military-officers.html http://boilingfrogspost.com/wp-content/uploads/BF.0112.Tice_20130617.mp3 http://boilingfrogspost.com/wp-content/uploads/BF.0111.Young_20130613.mp3 http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html http://cryptome.org/2013/06/nsa-arch-spy.htm http://www.usnews.com/news/newsgram/articles/2013/06/12/prism-class-action-lawsuit-filed-20b-injunction-sought-against-complicit-companies-and-officials http://www.usnews.com/news/newsgram/articles/2013/06/11/nine-companies-tied-to-prism-obama-will-be-smacked-with-class-action-lawsuit-wednesday http://www.washingtonpost.com/blogs/federal-eye/wp/2013/06/13/former-justice-prosecutor-seeks-23-billion-in-damages-for-nsa-surveillance-programs/ http://www.washingtonpost.com/blogs/post-politics/wp/2013/06/09/rand-paul-planning-class-action-lawsuit-against-surveillance-programs/ http://www.chicagotribune.com/news/chi-nsa-prism-scandal-20130609,0,432240.story http://cryptome.org/2013/06/snowden-censored.htm http://www.cbsnews.com/8301-250_162-57588385/nsa-seeks-criminal-probe-of-program-leaker/ http://theweek.com/article/index/245311/sources-nsa-sucks-in-data-from-50-companies http://theweek.com/article/index/245360/solving-the-mystery-of-prism http://www.nationaljournal.com/politics/welcome-to-the-bush-obama-white-house-they-re-spying-on-us-20130606 http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_print.html http://cryptome.org/2013/06/obama-prism.pdf http://cryptome.org/2013/06/tpm-palantir-prism.pdf http://cryptome.org/2013/06/prism-spy-tools.htm http://openchannel.nbcnews.com/_news/2013/06/07/18831985-officials-nsa-mistakenly-intercepted-emails-phone-calls-of-innocent-americans http://rt.com/usa/nsa-payed-internet-companies-911/ http://www.infowars.com/leaked-document-reveals-government-paid-millions-to-prism-participants/ http://threatpost.com/fisc-no-phone-company-ever-challenged-metadata-collection-orders/102334 http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work http://www.infowars.com/new-nsa-revelations-another-limited-hangout-whitewash/ http://electrospaces.blogspot.com/2013/12/nsas-global-interception-network.html http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_print.html http://www.theguardian.com/world/2013/dec/04/nsa-storing-cell-phone-records-daily-snowden http://www.washingtonpost.com/opinions/meet-executive-order-12333-the-reagan-rule-that-lets-the-nsa-spy-on-americans/2014/07/18/93d2ac22-0b93-11e4-b8e5-d0de80767fc2_story.html _______________________________________ ¤ FLASHBACK ; Pentagon Wanted Searchable Database of People’s Lives in 2003 :: http://dailycaller.com/2013/07/01/pentagon-wanted-searchable-database-of-peoples-lives-in-2003/?print=1 _______________________________________ ¤ FLASHBACK ; NSA Undersea Fiber Cable Tapping 1 & 2 :: http://cryptome.org/nsa-fibertap.htm http://cryptome.org/telecomm-weak.htm ¤ FLASHBACK ; NSA Undersea Fiber Optic Tapping :: http://cryptome.org/nsa-seatap.htm _______________________________________ ¤ RELATED ; All Online Spy Guides 7zip :: http://cryptome.org/isp-spy/online-spying.htm http://cryptome.org/online-spying-11-1206.7z {[▓▒▒▒▓██▓░░▓██▓░░▓██▓░░▓██▓░░▓██▓▒▒▒▓]} {[▓▒▒▒▓██▓░░▓██▓░░▓██▓░░▓██▓░░▓██▓▒▒▒▓]}